Date
July 6, 2025, 11:09 p.m.
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 25.041771] ================================================================== [ 25.053177] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x166/0x330 [ 25.060406] Write of size 2 at addr ffff8881066f8277 by task kunit_try_catch/213 [ 25.067806] [ 25.069306] CPU: 3 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 25.069315] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 25.069318] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 25.069321] Call Trace: [ 25.069323] <TASK> [ 25.069325] dump_stack_lvl+0x73/0xb0 [ 25.069346] print_report+0xd1/0x650 [ 25.069351] ? __virt_addr_valid+0x1db/0x2d0 [ 25.069355] ? kmalloc_oob_memset_2+0x166/0x330 [ 25.069359] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.069364] ? kmalloc_oob_memset_2+0x166/0x330 [ 25.069368] kasan_report+0x141/0x180 [ 25.069372] ? kmalloc_oob_memset_2+0x166/0x330 [ 25.069377] kasan_check_range+0x10c/0x1c0 [ 25.069394] __asan_memset+0x27/0x50 [ 25.069397] kmalloc_oob_memset_2+0x166/0x330 [ 25.069401] ? __pfx_kmalloc_oob_memset_2+0x10/0x10 [ 25.069406] ? __schedule+0x10cc/0x2b60 [ 25.069410] ? ktime_get_ts64+0x83/0x230 [ 25.069414] kunit_try_run_case+0x1a2/0x480 [ 25.069418] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.069422] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.069427] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.069431] ? __kthread_parkme+0x82/0x180 [ 25.069434] ? preempt_count_sub+0x50/0x80 [ 25.069438] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.069443] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 25.069447] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.069451] kthread+0x334/0x6f0 [ 25.069455] ? trace_preempt_on+0x20/0xc0 [ 25.069459] ? __pfx_kthread+0x10/0x10 [ 25.069462] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.069466] ? calculate_sigpending+0x7b/0xa0 [ 25.069471] ? __pfx_kthread+0x10/0x10 [ 25.069474] ret_from_fork+0x113/0x1d0 [ 25.069478] ? __pfx_kthread+0x10/0x10 [ 25.069481] ret_from_fork_asm+0x1a/0x30 [ 25.069487] </TASK> [ 25.069489] [ 25.238581] Allocated by task 213: [ 25.241987] kasan_save_stack+0x45/0x70 [ 25.245827] kasan_save_track+0x18/0x40 [ 25.249666] kasan_save_alloc_info+0x3b/0x50 [ 25.253941] __kasan_kmalloc+0xb7/0xc0 [ 25.257692] __kmalloc_cache_noprof+0x189/0x420 [ 25.262223] kmalloc_oob_memset_2+0xac/0x330 [ 25.266497] kunit_try_run_case+0x1a2/0x480 [ 25.270683] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 25.276083] kthread+0x334/0x6f0 [ 25.279316] ret_from_fork+0x113/0x1d0 [ 25.283103] ret_from_fork_asm+0x1a/0x30 [ 25.287030] [ 25.288527] The buggy address belongs to the object at ffff8881066f8200 [ 25.288527] which belongs to the cache kmalloc-128 of size 128 [ 25.301041] The buggy address is located 119 bytes inside of [ 25.301041] allocated 120-byte region [ffff8881066f8200, ffff8881066f8278) [ 25.313645] [ 25.315143] The buggy address belongs to the physical page: [ 25.320717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f8 [ 25.328725] flags: 0x200000000000000(node=0|zone=2) [ 25.333604] page_type: f5(slab) [ 25.336751] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 25.344498] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.352236] page dumped because: kasan: bad access detected [ 25.357809] [ 25.359309] Memory state around the buggy address: [ 25.364100] ffff8881066f8100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.371320] ffff8881066f8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.378567] >ffff8881066f8200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.385786] ^ [ 25.392919] ffff8881066f8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.400136] ffff8881066f8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.407361] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 24.668454] ================================================================== [ 24.679274] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x15f/0x320 [ 24.686589] Write of size 128 at addr ffff8881066f8100 by task kunit_try_catch/211 [ 24.694160] [ 24.695663] CPU: 3 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 24.695672] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 24.695675] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 24.695678] Call Trace: [ 24.695680] <TASK> [ 24.695682] dump_stack_lvl+0x73/0xb0 [ 24.695686] print_report+0xd1/0x650 [ 24.695690] ? __virt_addr_valid+0x1db/0x2d0 [ 24.695694] ? kmalloc_oob_in_memset+0x15f/0x320 [ 24.695698] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.695703] ? kmalloc_oob_in_memset+0x15f/0x320 [ 24.695707] kasan_report+0x141/0x180 [ 24.695711] ? kmalloc_oob_in_memset+0x15f/0x320 [ 24.695716] kasan_check_range+0x10c/0x1c0 [ 24.695721] __asan_memset+0x27/0x50 [ 24.695724] kmalloc_oob_in_memset+0x15f/0x320 [ 24.695728] ? __pfx_kmalloc_oob_in_memset+0x10/0x10 [ 24.695732] ? __schedule+0x10cc/0x2b60 [ 24.695736] ? ktime_get_ts64+0x83/0x230 [ 24.695740] kunit_try_run_case+0x1a2/0x480 [ 24.695745] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.695749] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.695753] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.695757] ? __kthread_parkme+0x82/0x180 [ 24.695761] ? preempt_count_sub+0x50/0x80 [ 24.695765] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.695769] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 24.695773] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.695777] kthread+0x334/0x6f0 [ 24.695781] ? trace_preempt_on+0x20/0xc0 [ 24.695785] ? __pfx_kthread+0x10/0x10 [ 24.695789] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.695792] ? calculate_sigpending+0x7b/0xa0 [ 24.695797] ? __pfx_kthread+0x10/0x10 [ 24.695801] ret_from_fork+0x113/0x1d0 [ 24.695804] ? __pfx_kthread+0x10/0x10 [ 24.695807] ret_from_fork_asm+0x1a/0x30 [ 24.695813] </TASK> [ 24.695815] [ 24.865224] Allocated by task 211: [ 24.868629] kasan_save_stack+0x45/0x70 [ 24.872468] kasan_save_track+0x18/0x40 [ 24.876310] kasan_save_alloc_info+0x3b/0x50 [ 24.880589] __kasan_kmalloc+0xb7/0xc0 [ 24.884368] __kmalloc_cache_noprof+0x189/0x420 [ 24.888927] kmalloc_oob_in_memset+0xac/0x320 [ 24.893285] kunit_try_run_case+0x1a2/0x480 [ 24.897471] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 24.902870] kthread+0x334/0x6f0 [ 24.906104] ret_from_fork+0x113/0x1d0 [ 24.909856] ret_from_fork_asm+0x1a/0x30 [ 24.913782] [ 24.915283] The buggy address belongs to the object at ffff8881066f8100 [ 24.915283] which belongs to the cache kmalloc-128 of size 128 [ 24.927799] The buggy address is located 0 bytes inside of [ 24.927799] allocated 120-byte region [ffff8881066f8100, ffff8881066f8178) [ 24.940234] [ 24.941733] The buggy address belongs to the physical page: [ 24.947305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f8 [ 24.955306] flags: 0x200000000000000(node=0|zone=2) [ 24.960185] page_type: f5(slab) [ 24.963349] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 24.971148] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.978886] page dumped because: kasan: bad access detected [ 24.984461] [ 24.985957] Memory state around the buggy address: [ 24.990752] ffff8881066f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.997980] ffff8881066f8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.005199] >ffff8881066f8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.012418] ^ [ 25.019549] ffff8881066f8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.026770] ffff8881066f8200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.033990] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 24.259101] ================================================================== [ 24.269913] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x47b/0x4c0 [ 24.276699] Read of size 16 at addr ffff888100c91680 by task kunit_try_catch/209 [ 24.284091] [ 24.285594] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 24.285603] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 24.285606] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 24.285609] Call Trace: [ 24.285611] <TASK> [ 24.285613] dump_stack_lvl+0x73/0xb0 [ 24.285617] print_report+0xd1/0x650 [ 24.285621] ? __virt_addr_valid+0x1db/0x2d0 [ 24.285626] ? kmalloc_uaf_16+0x47b/0x4c0 [ 24.285629] ? kasan_complete_mode_report_info+0x64/0x200 [ 24.285634] ? kmalloc_uaf_16+0x47b/0x4c0 [ 24.285638] kasan_report+0x141/0x180 [ 24.285642] ? kmalloc_uaf_16+0x47b/0x4c0 [ 24.285646] __asan_report_load16_noabort+0x18/0x20 [ 24.285651] kmalloc_uaf_16+0x47b/0x4c0 [ 24.285655] ? __pfx_kmalloc_uaf_16+0x10/0x10 [ 24.285659] ? __schedule+0x10cc/0x2b60 [ 24.285663] ? ktime_get_ts64+0x83/0x230 [ 24.285667] kunit_try_run_case+0x1a2/0x480 [ 24.285672] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.285676] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 24.285680] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.285684] ? __kthread_parkme+0x82/0x180 [ 24.285688] ? preempt_count_sub+0x50/0x80 [ 24.285692] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.285696] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 24.285701] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.285705] kthread+0x334/0x6f0 [ 24.285708] ? trace_preempt_on+0x20/0xc0 [ 24.285712] ? __pfx_kthread+0x10/0x10 [ 24.285716] ? _raw_spin_unlock_irq+0x47/0x80 [ 24.285720] ? calculate_sigpending+0x7b/0xa0 [ 24.285724] ? __pfx_kthread+0x10/0x10 [ 24.285728] ret_from_fork+0x113/0x1d0 [ 24.285731] ? __pfx_kthread+0x10/0x10 [ 24.285735] ret_from_fork_asm+0x1a/0x30 [ 24.285741] </TASK> [ 24.285742] [ 24.449259] Allocated by task 209: [ 24.452668] kasan_save_stack+0x45/0x70 [ 24.456513] kasan_save_track+0x18/0x40 [ 24.460363] kasan_save_alloc_info+0x3b/0x50 [ 24.464661] __kasan_kmalloc+0xb7/0xc0 [ 24.468415] __kmalloc_cache_noprof+0x189/0x420 [ 24.472956] kmalloc_uaf_16+0x15b/0x4c0 [ 24.476794] kunit_try_run_case+0x1a2/0x480 [ 24.480979] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 24.486392] kthread+0x334/0x6f0 [ 24.489630] ret_from_fork+0x113/0x1d0 [ 24.493406] ret_from_fork_asm+0x1a/0x30 [ 24.497362] [ 24.498886] Freed by task 209: [ 24.501946] kasan_save_stack+0x45/0x70 [ 24.505783] kasan_save_track+0x18/0x40 [ 24.509625] kasan_save_free_info+0x3f/0x60 [ 24.513816] __kasan_slab_free+0x56/0x70 [ 24.517743] kfree+0x222/0x3f0 [ 24.520802] kmalloc_uaf_16+0x1d6/0x4c0 [ 24.524642] kunit_try_run_case+0x1a2/0x480 [ 24.528828] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 24.534229] kthread+0x334/0x6f0 [ 24.537460] ret_from_fork+0x113/0x1d0 [ 24.541212] ret_from_fork_asm+0x1a/0x30 [ 24.545140] [ 24.546637] The buggy address belongs to the object at ffff888100c91680 [ 24.546637] which belongs to the cache kmalloc-16 of size 16 [ 24.558972] The buggy address is located 0 bytes inside of [ 24.558972] freed 16-byte region [ffff888100c91680, ffff888100c91690) [ 24.570967] [ 24.572466] The buggy address belongs to the physical page: [ 24.578039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c91 [ 24.586044] flags: 0x200000000000000(node=0|zone=2) [ 24.590925] page_type: f5(slab) [ 24.594073] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 24.601820] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.609559] page dumped because: kasan: bad access detected [ 24.615131] [ 24.616629] Memory state around the buggy address: [ 24.621424] ffff888100c91580: 00 06 fc fc 00 06 fc fc 00 00 fc fc 00 00 fc fc [ 24.628644] ffff888100c91600: 00 00 fc fc 00 04 fc fc 00 06 fc fc 00 00 fc fc [ 24.635871] >ffff888100c91680: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.643090] ^ [ 24.646322] ffff888100c91700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.653568] ffff888100c91780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.660785] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 23.895081] ================================================================== [ 23.905706] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x452/0x4a0 [ 23.912408] Write of size 16 at addr ffff888106713140 by task kunit_try_catch/207 [ 23.919894] [ 23.921410] CPU: 3 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 23.921419] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 23.921421] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 23.921424] Call Trace: [ 23.921426] <TASK> [ 23.921428] dump_stack_lvl+0x73/0xb0 [ 23.921433] print_report+0xd1/0x650 [ 23.921437] ? __virt_addr_valid+0x1db/0x2d0 [ 23.921441] ? kmalloc_oob_16+0x452/0x4a0 [ 23.921445] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.921450] ? kmalloc_oob_16+0x452/0x4a0 [ 23.921453] kasan_report+0x141/0x180 [ 23.921457] ? kmalloc_oob_16+0x452/0x4a0 [ 23.921462] __asan_report_store16_noabort+0x1b/0x30 [ 23.921467] kmalloc_oob_16+0x452/0x4a0 [ 23.921470] ? __pfx_kmalloc_oob_16+0x10/0x10 [ 23.921474] ? __schedule+0x10cc/0x2b60 [ 23.921478] ? ktime_get_ts64+0x83/0x230 [ 23.921483] kunit_try_run_case+0x1a2/0x480 [ 23.921487] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.921491] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.921495] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.921500] ? __kthread_parkme+0x82/0x180 [ 23.921503] ? preempt_count_sub+0x50/0x80 [ 23.921507] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.921512] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 23.921516] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.921520] kthread+0x334/0x6f0 [ 23.921523] ? trace_preempt_on+0x20/0xc0 [ 23.921527] ? __pfx_kthread+0x10/0x10 [ 23.921531] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.921535] ? calculate_sigpending+0x7b/0xa0 [ 23.921539] ? __pfx_kthread+0x10/0x10 [ 23.921543] ret_from_fork+0x113/0x1d0 [ 23.921546] ? __pfx_kthread+0x10/0x10 [ 23.921550] ret_from_fork_asm+0x1a/0x30 [ 23.921556] </TASK> [ 23.921557] [ 24.085243] Allocated by task 207: [ 24.088651] kasan_save_stack+0x45/0x70 [ 24.092491] kasan_save_track+0x18/0x40 [ 24.096328] kasan_save_alloc_info+0x3b/0x50 [ 24.100627] __kasan_kmalloc+0xb7/0xc0 [ 24.104417] __kmalloc_cache_noprof+0x189/0x420 [ 24.108972] kmalloc_oob_16+0xa8/0x4a0 [ 24.112726] kunit_try_run_case+0x1a2/0x480 [ 24.116911] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 24.122311] kthread+0x334/0x6f0 [ 24.125543] ret_from_fork+0x113/0x1d0 [ 24.129298] ret_from_fork_asm+0x1a/0x30 [ 24.133224] [ 24.134721] The buggy address belongs to the object at ffff888106713140 [ 24.134721] which belongs to the cache kmalloc-16 of size 16 [ 24.147054] The buggy address is located 0 bytes inside of [ 24.147054] allocated 13-byte region [ffff888106713140, ffff88810671314d) [ 24.159420] [ 24.160923] The buggy address belongs to the physical page: [ 24.166495] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713 [ 24.174504] flags: 0x200000000000000(node=0|zone=2) [ 24.179415] page_type: f5(slab) [ 24.182590] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 24.190378] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.198127] page dumped because: kasan: bad access detected [ 24.203700] [ 24.205199] Memory state around the buggy address: [ 24.209992] ffff888106713000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.217211] ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.224452] >ffff888106713100: fa fb fc fc fa fb fc fc 00 05 fc fc 00 00 fc fc [ 24.231674] ^ [ 24.237248] ffff888106713180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.244469] ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.251689] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 23.442665] ================================================================== [ 23.449896] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x53c/0x5e0 [ 23.456516] Read of size 1 at addr ffff88810033ec00 by task kunit_try_catch/205 [ 23.463830] [ 23.465348] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 23.465356] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 23.465359] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 23.465362] Call Trace: [ 23.465363] <TASK> [ 23.465365] dump_stack_lvl+0x73/0xb0 [ 23.465369] print_report+0xd1/0x650 [ 23.465386] ? __virt_addr_valid+0x1db/0x2d0 [ 23.465390] ? krealloc_uaf+0x53c/0x5e0 [ 23.465393] ? kasan_complete_mode_report_info+0x64/0x200 [ 23.465398] ? krealloc_uaf+0x53c/0x5e0 [ 23.465402] kasan_report+0x141/0x180 [ 23.465406] ? krealloc_uaf+0x53c/0x5e0 [ 23.465411] __asan_report_load1_noabort+0x18/0x20 [ 23.465416] krealloc_uaf+0x53c/0x5e0 [ 23.465419] ? __pfx_krealloc_uaf+0x10/0x10 [ 23.465423] ? finish_task_switch.isra.0+0x153/0x700 [ 23.465427] ? __switch_to+0x544/0xf50 [ 23.465432] ? __schedule+0x10cc/0x2b60 [ 23.465436] ? ktime_get_ts64+0x83/0x230 [ 23.465440] kunit_try_run_case+0x1a2/0x480 [ 23.465444] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.465449] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.465453] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.465457] ? __kthread_parkme+0x82/0x180 [ 23.465460] ? preempt_count_sub+0x50/0x80 [ 23.465464] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.465469] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 23.465473] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.465477] kthread+0x334/0x6f0 [ 23.465480] ? trace_preempt_on+0x20/0xc0 [ 23.465484] ? __pfx_kthread+0x10/0x10 [ 23.465488] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.465492] ? calculate_sigpending+0x7b/0xa0 [ 23.465496] ? __pfx_kthread+0x10/0x10 [ 23.465500] ret_from_fork+0x113/0x1d0 [ 23.465503] ? __pfx_kthread+0x10/0x10 [ 23.465507] ret_from_fork_asm+0x1a/0x30 [ 23.465513] </TASK> [ 23.465514] [ 23.636904] Allocated by task 205: [ 23.640307] kasan_save_stack+0x45/0x70 [ 23.644148] kasan_save_track+0x18/0x40 [ 23.647986] kasan_save_alloc_info+0x3b/0x50 [ 23.652259] __kasan_kmalloc+0xb7/0xc0 [ 23.656013] __kmalloc_cache_noprof+0x189/0x420 [ 23.660553] krealloc_uaf+0xbb/0x5e0 [ 23.664133] kunit_try_run_case+0x1a2/0x480 [ 23.668320] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 23.673753] kthread+0x334/0x6f0 [ 23.676986] ret_from_fork+0x113/0x1d0 [ 23.680739] ret_from_fork_asm+0x1a/0x30 [ 23.684665] [ 23.686163] Freed by task 205: [ 23.689222] kasan_save_stack+0x45/0x70 [ 23.693061] kasan_save_track+0x18/0x40 [ 23.696902] kasan_save_free_info+0x3f/0x60 [ 23.701087] __kasan_slab_free+0x56/0x70 [ 23.705015] kfree+0x222/0x3f0 [ 23.708073] krealloc_uaf+0x13d/0x5e0 [ 23.711740] kunit_try_run_case+0x1a2/0x480 [ 23.715925] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 23.721326] kthread+0x334/0x6f0 [ 23.724583] ret_from_fork+0x113/0x1d0 [ 23.728363] ret_from_fork_asm+0x1a/0x30 [ 23.732313] [ 23.733814] The buggy address belongs to the object at ffff88810033ec00 [ 23.733814] which belongs to the cache kmalloc-256 of size 256 [ 23.746328] The buggy address is located 0 bytes inside of [ 23.746328] freed 256-byte region [ffff88810033ec00, ffff88810033ed00) [ 23.758426] [ 23.759926] The buggy address belongs to the physical page: [ 23.765497] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10033e [ 23.773498] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.781149] flags: 0x200000000000040(head|node=0|zone=2) [ 23.786463] page_type: f5(slab) [ 23.789611] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 23.797362] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.805131] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 23.812957] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.820782] head: 0200000000000001 ffffea000400cf81 00000000ffffffff 00000000ffffffff [ 23.828611] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 23.836444] page dumped because: kasan: bad access detected [ 23.842016] [ 23.843514] Memory state around the buggy address: [ 23.848308] ffff88810033eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.855526] ffff88810033eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.862746] >ffff88810033ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.869964] ^ [ 23.873198] ffff88810033ec80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.880418] ffff88810033ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.887636] ================================================================== [ 22.979323] ================================================================== [ 22.990929] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b8/0x5e0 [ 22.997548] Read of size 1 at addr ffff88810033ec00 by task kunit_try_catch/205 [ 23.004862] [ 23.006365] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 23.006373] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 23.006388] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 23.006391] Call Trace: [ 23.006393] <TASK> [ 23.006394] dump_stack_lvl+0x73/0xb0 [ 23.006399] print_report+0xd1/0x650 [ 23.006403] ? __virt_addr_valid+0x1db/0x2d0 [ 23.006407] ? krealloc_uaf+0x1b8/0x5e0 [ 23.006410] ? kasan_complete_mode_report_info+0x64/0x200 [ 23.006415] ? krealloc_uaf+0x1b8/0x5e0 [ 23.006419] kasan_report+0x141/0x180 [ 23.006423] ? krealloc_uaf+0x1b8/0x5e0 [ 23.006427] ? krealloc_uaf+0x1b8/0x5e0 [ 23.006431] __kasan_check_byte+0x3d/0x50 [ 23.006435] krealloc_noprof+0x3f/0x340 [ 23.006439] krealloc_uaf+0x1b8/0x5e0 [ 23.006443] ? __pfx_krealloc_uaf+0x10/0x10 [ 23.006447] ? finish_task_switch.isra.0+0x153/0x700 [ 23.006451] ? __switch_to+0x544/0xf50 [ 23.006455] ? __schedule+0x10cc/0x2b60 [ 23.006459] ? ktime_get_ts64+0x83/0x230 [ 23.006463] kunit_try_run_case+0x1a2/0x480 [ 23.006468] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.006472] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 23.006476] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.006480] ? __kthread_parkme+0x82/0x180 [ 23.006483] ? preempt_count_sub+0x50/0x80 [ 23.006487] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.006492] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 23.006496] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.006500] kthread+0x334/0x6f0 [ 23.006503] ? trace_preempt_on+0x20/0xc0 [ 23.006507] ? __pfx_kthread+0x10/0x10 [ 23.006511] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.006515] ? calculate_sigpending+0x7b/0xa0 [ 23.006519] ? __pfx_kthread+0x10/0x10 [ 23.006523] ret_from_fork+0x113/0x1d0 [ 23.006526] ? __pfx_kthread+0x10/0x10 [ 23.006530] ret_from_fork_asm+0x1a/0x30 [ 23.006535] </TASK> [ 23.006537] [ 23.184740] Allocated by task 205: [ 23.188145] kasan_save_stack+0x45/0x70 [ 23.191985] kasan_save_track+0x18/0x40 [ 23.195824] kasan_save_alloc_info+0x3b/0x50 [ 23.200097] __kasan_kmalloc+0xb7/0xc0 [ 23.203850] __kmalloc_cache_noprof+0x189/0x420 [ 23.208405] krealloc_uaf+0xbb/0x5e0 [ 23.211986] kunit_try_run_case+0x1a2/0x480 [ 23.216173] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 23.221573] kthread+0x334/0x6f0 [ 23.224804] ret_from_fork+0x113/0x1d0 [ 23.228556] ret_from_fork_asm+0x1a/0x30 [ 23.232483] [ 23.233982] Freed by task 205: [ 23.237041] kasan_save_stack+0x45/0x70 [ 23.240881] kasan_save_track+0x18/0x40 [ 23.244722] kasan_save_free_info+0x3f/0x60 [ 23.248914] __kasan_slab_free+0x56/0x70 [ 23.252841] kfree+0x222/0x3f0 [ 23.255901] krealloc_uaf+0x13d/0x5e0 [ 23.259565] kunit_try_run_case+0x1a2/0x480 [ 23.263753] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 23.269153] kthread+0x334/0x6f0 [ 23.272405] ret_from_fork+0x113/0x1d0 [ 23.276163] ret_from_fork_asm+0x1a/0x30 [ 23.280090] [ 23.281589] The buggy address belongs to the object at ffff88810033ec00 [ 23.281589] which belongs to the cache kmalloc-256 of size 256 [ 23.294103] The buggy address is located 0 bytes inside of [ 23.294103] freed 256-byte region [ffff88810033ec00, ffff88810033ed00) [ 23.306185] [ 23.307684] The buggy address belongs to the physical page: [ 23.313256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10033e [ 23.321263] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.328915] flags: 0x200000000000040(head|node=0|zone=2) [ 23.334228] page_type: f5(slab) [ 23.337376] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 23.345141] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.352881] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 23.360706] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.368532] head: 0200000000000001 ffffea000400cf81 00000000ffffffff 00000000ffffffff [ 23.376365] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 23.384220] page dumped because: kasan: bad access detected [ 23.389792] [ 23.391291] Memory state around the buggy address: [ 23.396082] ffff88810033eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.403303] ffff88810033eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.410524] >ffff88810033ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.417749] ^ [ 23.420984] ffff88810033ec80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.428201] ffff88810033ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.435421] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 21.282185] ================================================================== [ 21.293768] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 21.301428] Write of size 1 at addr ffff888104eb20c9 by task kunit_try_catch/203 [ 21.308822] [ 21.310343] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 21.310353] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 21.310356] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 21.310359] Call Trace: [ 21.310373] <TASK> [ 21.310375] dump_stack_lvl+0x73/0xb0 [ 21.310380] print_report+0xd1/0x650 [ 21.310397] ? __virt_addr_valid+0x1db/0x2d0 [ 21.310401] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 21.310405] ? kasan_addr_to_slab+0x11/0xa0 [ 21.310409] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 21.310413] kasan_report+0x141/0x180 [ 21.310417] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 21.310422] __asan_report_store1_noabort+0x1b/0x30 [ 21.310427] krealloc_less_oob_helper+0xd70/0x11d0 [ 21.310432] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 21.310437] ? finish_task_switch.isra.0+0x153/0x700 [ 21.310441] ? __switch_to+0x544/0xf50 [ 21.310445] ? __schedule+0x10cc/0x2b60 [ 21.310450] krealloc_large_less_oob+0x1c/0x30 [ 21.310454] kunit_try_run_case+0x1a2/0x480 [ 21.310459] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.310463] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.310467] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.310471] ? __kthread_parkme+0x82/0x180 [ 21.310475] ? preempt_count_sub+0x50/0x80 [ 21.310479] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.310483] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 21.310487] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.310491] kthread+0x334/0x6f0 [ 21.310495] ? trace_preempt_on+0x20/0xc0 [ 21.310499] ? __pfx_kthread+0x10/0x10 [ 21.310503] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.310506] ? calculate_sigpending+0x7b/0xa0 [ 21.310511] ? __pfx_kthread+0x10/0x10 [ 21.310514] ret_from_fork+0x113/0x1d0 [ 21.310518] ? __pfx_kthread+0x10/0x10 [ 21.310521] ret_from_fork_asm+0x1a/0x30 [ 21.310527] </TASK> [ 21.310529] [ 21.486859] The buggy address belongs to the physical page: [ 21.492434] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104eb0 [ 21.500439] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.508094] flags: 0x200000000000040(head|node=0|zone=2) [ 21.513423] page_type: f8(unknown) [ 21.516830] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.524569] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.532309] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.540168] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.547996] head: 0200000000000002 ffffea000413ac01 00000000ffffffff 00000000ffffffff [ 21.555829] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.563655] page dumped because: kasan: bad access detected [ 21.569229] [ 21.570725] Memory state around the buggy address: [ 21.575520] ffff888104eb1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.582738] ffff888104eb2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.589957] >ffff888104eb2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 21.597177] ^ [ 21.602751] ffff888104eb2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.609969] ffff888104eb2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.617188] ================================================================== [ 22.301071] ================================================================== [ 22.308317] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 22.316006] Write of size 1 at addr ffff888104eb20ea by task kunit_try_catch/203 [ 22.323430] [ 22.324923] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 22.324931] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 22.324933] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 22.324936] Call Trace: [ 22.324938] <TASK> [ 22.324940] dump_stack_lvl+0x73/0xb0 [ 22.324944] print_report+0xd1/0x650 [ 22.324948] ? __virt_addr_valid+0x1db/0x2d0 [ 22.324951] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 22.324956] ? kasan_addr_to_slab+0x11/0xa0 [ 22.324959] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 22.324964] kasan_report+0x141/0x180 [ 22.324968] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 22.324973] __asan_report_store1_noabort+0x1b/0x30 [ 22.324978] krealloc_less_oob_helper+0xe90/0x11d0 [ 22.324982] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 22.324987] ? finish_task_switch.isra.0+0x153/0x700 [ 22.324991] ? __switch_to+0x544/0xf50 [ 22.324996] ? __schedule+0x10cc/0x2b60 [ 22.325000] krealloc_large_less_oob+0x1c/0x30 [ 22.325004] kunit_try_run_case+0x1a2/0x480 [ 22.325009] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.325013] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.325017] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.325021] ? __kthread_parkme+0x82/0x180 [ 22.325024] ? preempt_count_sub+0x50/0x80 [ 22.325028] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.325033] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 22.325037] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.325041] kthread+0x334/0x6f0 [ 22.325044] ? trace_preempt_on+0x20/0xc0 [ 22.325048] ? __pfx_kthread+0x10/0x10 [ 22.325052] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.325056] ? calculate_sigpending+0x7b/0xa0 [ 22.325060] ? __pfx_kthread+0x10/0x10 [ 22.325064] ret_from_fork+0x113/0x1d0 [ 22.325067] ? __pfx_kthread+0x10/0x10 [ 22.325071] ret_from_fork_asm+0x1a/0x30 [ 22.325076] </TASK> [ 22.325078] [ 22.501418] The buggy address belongs to the physical page: [ 22.506991] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104eb0 [ 22.514991] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.522643] flags: 0x200000000000040(head|node=0|zone=2) [ 22.527954] page_type: f8(unknown) [ 22.531363] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.539128] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.546869] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.554701] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.562527] head: 0200000000000002 ffffea000413ac01 00000000ffffffff 00000000ffffffff [ 22.570361] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.578240] page dumped because: kasan: bad access detected [ 22.583813] [ 22.585311] Memory state around the buggy address: [ 22.590138] ffff888104eb1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.597375] ffff888104eb2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.604629] >ffff888104eb2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 22.611847] ^ [ 22.618461] ffff888104eb2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.625682] ffff888104eb2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.632909] ================================================================== [ 18.905164] ================================================================== [ 18.912403] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 18.920057] Write of size 1 at addr ffff88810561ced0 by task kunit_try_catch/199 [ 18.927457] [ 18.928959] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 18.928967] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 18.928970] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 18.928973] Call Trace: [ 18.928974] <TASK> [ 18.928976] dump_stack_lvl+0x73/0xb0 [ 18.928980] print_report+0xd1/0x650 [ 18.928984] ? __virt_addr_valid+0x1db/0x2d0 [ 18.928988] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 18.928992] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.928997] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 18.929002] kasan_report+0x141/0x180 [ 18.929006] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 18.929011] __asan_report_store1_noabort+0x1b/0x30 [ 18.929016] krealloc_less_oob_helper+0xe23/0x11d0 [ 18.929020] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 18.929025] ? finish_task_switch.isra.0+0x153/0x700 [ 18.929029] ? __switch_to+0x544/0xf50 [ 18.929033] ? __schedule+0x10cc/0x2b60 [ 18.929038] krealloc_less_oob+0x1c/0x30 [ 18.929042] kunit_try_run_case+0x1a2/0x480 [ 18.929046] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.929050] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.929054] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.929059] ? __kthread_parkme+0x82/0x180 [ 18.929062] ? preempt_count_sub+0x50/0x80 [ 18.929066] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.929070] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 18.929075] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.929079] kthread+0x334/0x6f0 [ 18.929082] ? trace_preempt_on+0x20/0xc0 [ 18.929086] ? __pfx_kthread+0x10/0x10 [ 18.929090] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.929093] ? calculate_sigpending+0x7b/0xa0 [ 18.929098] ? __pfx_kthread+0x10/0x10 [ 18.929102] ret_from_fork+0x113/0x1d0 [ 18.929105] ? __pfx_kthread+0x10/0x10 [ 18.929109] ret_from_fork_asm+0x1a/0x30 [ 18.929114] </TASK> [ 18.929116] [ 19.106093] Allocated by task 199: [ 19.109500] kasan_save_stack+0x45/0x70 [ 19.113361] kasan_save_track+0x18/0x40 [ 19.117223] kasan_save_alloc_info+0x3b/0x50 [ 19.121504] __kasan_krealloc+0x190/0x1f0 [ 19.125524] krealloc_noprof+0xf3/0x340 [ 19.129367] krealloc_less_oob_helper+0x1aa/0x11d0 [ 19.134182] krealloc_less_oob+0x1c/0x30 [ 19.138107] kunit_try_run_case+0x1a2/0x480 [ 19.142293] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 19.147695] kthread+0x334/0x6f0 [ 19.150925] ret_from_fork+0x113/0x1d0 [ 19.154678] ret_from_fork_asm+0x1a/0x30 [ 19.158605] [ 19.160105] The buggy address belongs to the object at ffff88810561ce00 [ 19.160105] which belongs to the cache kmalloc-256 of size 256 [ 19.172620] The buggy address is located 7 bytes to the right of [ 19.172620] allocated 201-byte region [ffff88810561ce00, ffff88810561cec9) [ 19.185566] [ 19.187067] The buggy address belongs to the physical page: [ 19.192638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10561c [ 19.200638] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.208291] flags: 0x200000000000040(head|node=0|zone=2) [ 19.213604] page_type: f5(slab) [ 19.216750] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 19.224499] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.232246] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 19.240073] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.247907] head: 0200000000000001 ffffea0004158701 00000000ffffffff 00000000ffffffff [ 19.255741] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.263566] page dumped because: kasan: bad access detected [ 19.269138] [ 19.270630] Memory state around the buggy address: [ 19.275423] ffff88810561cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.282641] ffff88810561ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.289862] >ffff88810561ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 19.297079] ^ [ 19.302912] ffff88810561cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.310132] ffff88810561cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.317362] ================================================================== [ 19.324613] ================================================================== [ 19.331861] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 19.339520] Write of size 1 at addr ffff88810561ceda by task kunit_try_catch/199 [ 19.346913] [ 19.348413] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 19.348421] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 19.348423] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 19.348426] Call Trace: [ 19.348428] <TASK> [ 19.348429] dump_stack_lvl+0x73/0xb0 [ 19.348434] print_report+0xd1/0x650 [ 19.348438] ? __virt_addr_valid+0x1db/0x2d0 [ 19.348441] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 19.348446] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.348451] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 19.348455] kasan_report+0x141/0x180 [ 19.348459] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 19.348465] __asan_report_store1_noabort+0x1b/0x30 [ 19.348469] krealloc_less_oob_helper+0xec6/0x11d0 [ 19.348474] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 19.348479] ? finish_task_switch.isra.0+0x153/0x700 [ 19.348482] ? __switch_to+0x544/0xf50 [ 19.348487] ? __schedule+0x10cc/0x2b60 [ 19.348492] krealloc_less_oob+0x1c/0x30 [ 19.348496] kunit_try_run_case+0x1a2/0x480 [ 19.348500] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.348504] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.348508] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.348512] ? __kthread_parkme+0x82/0x180 [ 19.348516] ? preempt_count_sub+0x50/0x80 [ 19.348520] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.348524] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 19.348528] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.348532] kthread+0x334/0x6f0 [ 19.348536] ? trace_preempt_on+0x20/0xc0 [ 19.348540] ? __pfx_kthread+0x10/0x10 [ 19.348543] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.348547] ? calculate_sigpending+0x7b/0xa0 [ 19.348551] ? __pfx_kthread+0x10/0x10 [ 19.348555] ret_from_fork+0x113/0x1d0 [ 19.348558] ? __pfx_kthread+0x10/0x10 [ 19.348562] ret_from_fork_asm+0x1a/0x30 [ 19.348567] </TASK> [ 19.348569] [ 19.525560] Allocated by task 199: [ 19.528965] kasan_save_stack+0x45/0x70 [ 19.532805] kasan_save_track+0x18/0x40 [ 19.536644] kasan_save_alloc_info+0x3b/0x50 [ 19.540926] __kasan_krealloc+0x190/0x1f0 [ 19.544938] krealloc_noprof+0xf3/0x340 [ 19.548776] krealloc_less_oob_helper+0x1aa/0x11d0 [ 19.553570] krealloc_less_oob+0x1c/0x30 [ 19.557504] kunit_try_run_case+0x1a2/0x480 [ 19.561691] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 19.567099] kthread+0x334/0x6f0 [ 19.570348] ret_from_fork+0x113/0x1d0 [ 19.574109] ret_from_fork_asm+0x1a/0x30 [ 19.578036] [ 19.579534] The buggy address belongs to the object at ffff88810561ce00 [ 19.579534] which belongs to the cache kmalloc-256 of size 256 [ 19.592050] The buggy address is located 17 bytes to the right of [ 19.592050] allocated 201-byte region [ffff88810561ce00, ffff88810561cec9) [ 19.605093] [ 19.606591] The buggy address belongs to the physical page: [ 19.612164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10561c [ 19.620163] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.627816] flags: 0x200000000000040(head|node=0|zone=2) [ 19.633128] page_type: f5(slab) [ 19.636276] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 19.644023] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.651764] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 19.659588] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.667420] head: 0200000000000001 ffffea0004158701 00000000ffffffff 00000000ffffffff [ 19.675248] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.683075] page dumped because: kasan: bad access detected [ 19.688647] [ 19.690147] Memory state around the buggy address: [ 19.694938] ffff88810561cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.702159] ffff88810561ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.709389] >ffff88810561ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 19.716614] ^ [ 19.722709] ffff88810561cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.729935] ffff88810561cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.737154] ================================================================== [ 21.962657] ================================================================== [ 21.969902] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0 [ 21.977554] Write of size 1 at addr ffff888104eb20da by task kunit_try_catch/203 [ 21.984947] [ 21.986448] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 21.986456] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 21.986458] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 21.986461] Call Trace: [ 21.986463] <TASK> [ 21.986465] dump_stack_lvl+0x73/0xb0 [ 21.986469] print_report+0xd1/0x650 [ 21.986473] ? __virt_addr_valid+0x1db/0x2d0 [ 21.986477] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 21.986481] ? kasan_addr_to_slab+0x11/0xa0 [ 21.986485] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 21.986489] kasan_report+0x141/0x180 [ 21.986493] ? krealloc_less_oob_helper+0xec6/0x11d0 [ 21.986498] __asan_report_store1_noabort+0x1b/0x30 [ 21.986503] krealloc_less_oob_helper+0xec6/0x11d0 [ 21.986508] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 21.986512] ? finish_task_switch.isra.0+0x153/0x700 [ 21.986516] ? __switch_to+0x544/0xf50 [ 21.986521] ? __schedule+0x10cc/0x2b60 [ 21.986525] krealloc_large_less_oob+0x1c/0x30 [ 21.986529] kunit_try_run_case+0x1a2/0x480 [ 21.986534] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.986538] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.986542] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.986546] ? __kthread_parkme+0x82/0x180 [ 21.986550] ? preempt_count_sub+0x50/0x80 [ 21.986554] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.986558] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 21.986562] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.986566] kthread+0x334/0x6f0 [ 21.986570] ? trace_preempt_on+0x20/0xc0 [ 21.986574] ? __pfx_kthread+0x10/0x10 [ 21.986577] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.986581] ? calculate_sigpending+0x7b/0xa0 [ 21.986585] ? __pfx_kthread+0x10/0x10 [ 21.986589] ret_from_fork+0x113/0x1d0 [ 21.986592] ? __pfx_kthread+0x10/0x10 [ 21.986596] ret_from_fork_asm+0x1a/0x30 [ 21.986602] </TASK> [ 21.986603] [ 22.162979] The buggy address belongs to the physical page: [ 22.168552] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104eb0 [ 22.176559] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.184210] flags: 0x200000000000040(head|node=0|zone=2) [ 22.189523] page_type: f8(unknown) [ 22.192930] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.200669] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.208416] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.216244] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.224078] head: 0200000000000002 ffffea000413ac01 00000000ffffffff 00000000ffffffff [ 22.231906] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.239737] page dumped because: kasan: bad access detected [ 22.245309] [ 22.246809] Memory state around the buggy address: [ 22.251604] ffff888104eb1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.258823] ffff888104eb2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.266041] >ffff888104eb2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 22.273260] ^ [ 22.279359] ffff888104eb2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.286626] ffff888104eb2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.293844] ================================================================== [ 19.744392] ================================================================== [ 19.751636] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0 [ 19.759290] Write of size 1 at addr ffff88810561ceea by task kunit_try_catch/199 [ 19.766691] [ 19.768191] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 19.768199] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 19.768201] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 19.768204] Call Trace: [ 19.768206] <TASK> [ 19.768207] dump_stack_lvl+0x73/0xb0 [ 19.768212] print_report+0xd1/0x650 [ 19.768215] ? __virt_addr_valid+0x1db/0x2d0 [ 19.768219] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 19.768224] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.768229] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 19.768233] kasan_report+0x141/0x180 [ 19.768237] ? krealloc_less_oob_helper+0xe90/0x11d0 [ 19.768242] __asan_report_store1_noabort+0x1b/0x30 [ 19.768247] krealloc_less_oob_helper+0xe90/0x11d0 [ 19.768252] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 19.768256] ? finish_task_switch.isra.0+0x153/0x700 [ 19.768260] ? __switch_to+0x544/0xf50 [ 19.768265] ? __schedule+0x10cc/0x2b60 [ 19.768269] krealloc_less_oob+0x1c/0x30 [ 19.768273] kunit_try_run_case+0x1a2/0x480 [ 19.768277] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.768282] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.768286] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.768290] ? __kthread_parkme+0x82/0x180 [ 19.768293] ? preempt_count_sub+0x50/0x80 [ 19.768297] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.768302] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 19.768306] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.768310] kthread+0x334/0x6f0 [ 19.768313] ? trace_preempt_on+0x20/0xc0 [ 19.768317] ? __pfx_kthread+0x10/0x10 [ 19.768321] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.768324] ? calculate_sigpending+0x7b/0xa0 [ 19.768346] ? __pfx_kthread+0x10/0x10 [ 19.768350] ret_from_fork+0x113/0x1d0 [ 19.768353] ? __pfx_kthread+0x10/0x10 [ 19.768357] ret_from_fork_asm+0x1a/0x30 [ 19.768363] </TASK> [ 19.768364] [ 19.945275] Allocated by task 199: [ 19.948682] kasan_save_stack+0x45/0x70 [ 19.952521] kasan_save_track+0x18/0x40 [ 19.956359] kasan_save_alloc_info+0x3b/0x50 [ 19.960657] __kasan_krealloc+0x190/0x1f0 [ 19.964669] krealloc_noprof+0xf3/0x340 [ 19.968510] krealloc_less_oob_helper+0x1aa/0x11d0 [ 19.973303] krealloc_less_oob+0x1c/0x30 [ 19.977229] kunit_try_run_case+0x1a2/0x480 [ 19.981415] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 19.986814] kthread+0x334/0x6f0 [ 19.990046] ret_from_fork+0x113/0x1d0 [ 19.993798] ret_from_fork_asm+0x1a/0x30 [ 19.997726] [ 19.999224] The buggy address belongs to the object at ffff88810561ce00 [ 19.999224] which belongs to the cache kmalloc-256 of size 256 [ 20.011730] The buggy address is located 33 bytes to the right of [ 20.011730] allocated 201-byte region [ffff88810561ce00, ffff88810561cec9) [ 20.024764] [ 20.026264] The buggy address belongs to the physical page: [ 20.031839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10561c [ 20.039845] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.047496] flags: 0x200000000000040(head|node=0|zone=2) [ 20.052811] page_type: f5(slab) [ 20.055958] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 20.063706] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.071454] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 20.079287] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.087114] head: 0200000000000001 ffffea0004158701 00000000ffffffff 00000000ffffffff [ 20.094939] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 20.102765] page dumped because: kasan: bad access detected [ 20.108363] [ 20.109862] Memory state around the buggy address: [ 20.114655] ffff88810561cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.121874] ffff88810561ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.129095] >ffff88810561ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 20.136312] ^ [ 20.142927] ffff88810561cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.150144] ffff88810561cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.157366] ================================================================== [ 21.624478] ================================================================== [ 21.631723] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0 [ 21.639399] Write of size 1 at addr ffff888104eb20d0 by task kunit_try_catch/203 [ 21.646793] [ 21.648295] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 21.648303] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 21.648306] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 21.648309] Call Trace: [ 21.648311] <TASK> [ 21.648313] dump_stack_lvl+0x73/0xb0 [ 21.648317] print_report+0xd1/0x650 [ 21.648321] ? __virt_addr_valid+0x1db/0x2d0 [ 21.648344] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 21.648349] ? kasan_addr_to_slab+0x11/0xa0 [ 21.648353] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 21.648357] kasan_report+0x141/0x180 [ 21.648374] ? krealloc_less_oob_helper+0xe23/0x11d0 [ 21.648379] __asan_report_store1_noabort+0x1b/0x30 [ 21.648396] krealloc_less_oob_helper+0xe23/0x11d0 [ 21.648401] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 21.648406] ? finish_task_switch.isra.0+0x153/0x700 [ 21.648410] ? __switch_to+0x544/0xf50 [ 21.648414] ? __schedule+0x10cc/0x2b60 [ 21.648419] krealloc_large_less_oob+0x1c/0x30 [ 21.648423] kunit_try_run_case+0x1a2/0x480 [ 21.648428] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.648432] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.648436] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.648440] ? __kthread_parkme+0x82/0x180 [ 21.648444] ? preempt_count_sub+0x50/0x80 [ 21.648448] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.648452] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 21.648456] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.648460] kthread+0x334/0x6f0 [ 21.648464] ? trace_preempt_on+0x20/0xc0 [ 21.648468] ? __pfx_kthread+0x10/0x10 [ 21.648471] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.648475] ? calculate_sigpending+0x7b/0xa0 [ 21.648479] ? __pfx_kthread+0x10/0x10 [ 21.648483] ret_from_fork+0x113/0x1d0 [ 21.648486] ? __pfx_kthread+0x10/0x10 [ 21.648490] ret_from_fork_asm+0x1a/0x30 [ 21.648496] </TASK> [ 21.648497] [ 21.824849] The buggy address belongs to the physical page: [ 21.830428] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104eb0 [ 21.838430] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.846084] flags: 0x200000000000040(head|node=0|zone=2) [ 21.851417] page_type: f8(unknown) [ 21.854820] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.862559] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.870299] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.878133] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.885960] head: 0200000000000002 ffffea000413ac01 00000000ffffffff 00000000ffffffff [ 21.893793] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.901620] page dumped because: kasan: bad access detected [ 21.907191] [ 21.908689] Memory state around the buggy address: [ 21.913485] ffff888104eb1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.920704] ffff888104eb2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.927922] >ffff888104eb2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 21.935140] ^ [ 21.940975] ffff888104eb2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.948194] ffff888104eb2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.955429] ================================================================== [ 18.482195] ================================================================== [ 18.493250] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0 [ 18.500903] Write of size 1 at addr ffff88810561cec9 by task kunit_try_catch/199 [ 18.508295] [ 18.509798] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 18.509806] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 18.509809] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 18.509812] Call Trace: [ 18.509813] <TASK> [ 18.509815] dump_stack_lvl+0x73/0xb0 [ 18.509819] print_report+0xd1/0x650 [ 18.509823] ? __virt_addr_valid+0x1db/0x2d0 [ 18.509827] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 18.509832] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.509837] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 18.509841] kasan_report+0x141/0x180 [ 18.509845] ? krealloc_less_oob_helper+0xd70/0x11d0 [ 18.509850] __asan_report_store1_noabort+0x1b/0x30 [ 18.509855] krealloc_less_oob_helper+0xd70/0x11d0 [ 18.509860] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 18.509864] ? finish_task_switch.isra.0+0x153/0x700 [ 18.509868] ? __switch_to+0x544/0xf50 [ 18.509873] ? __schedule+0x10cc/0x2b60 [ 18.509877] krealloc_less_oob+0x1c/0x30 [ 18.509881] kunit_try_run_case+0x1a2/0x480 [ 18.509886] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.509890] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.509894] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.509898] ? __kthread_parkme+0x82/0x180 [ 18.509902] ? preempt_count_sub+0x50/0x80 [ 18.509906] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.509910] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 18.509914] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.509918] kthread+0x334/0x6f0 [ 18.509922] ? trace_preempt_on+0x20/0xc0 [ 18.509926] ? __pfx_kthread+0x10/0x10 [ 18.509929] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.509933] ? calculate_sigpending+0x7b/0xa0 [ 18.509938] ? __pfx_kthread+0x10/0x10 [ 18.509941] ret_from_fork+0x113/0x1d0 [ 18.509945] ? __pfx_kthread+0x10/0x10 [ 18.509948] ret_from_fork_asm+0x1a/0x30 [ 18.509954] </TASK> [ 18.509955] [ 18.686899] Allocated by task 199: [ 18.690305] kasan_save_stack+0x45/0x70 [ 18.694142] kasan_save_track+0x18/0x40 [ 18.697983] kasan_save_alloc_info+0x3b/0x50 [ 18.702254] __kasan_krealloc+0x190/0x1f0 [ 18.706268] krealloc_noprof+0xf3/0x340 [ 18.710108] krealloc_less_oob_helper+0x1aa/0x11d0 [ 18.714909] krealloc_less_oob+0x1c/0x30 [ 18.718836] kunit_try_run_case+0x1a2/0x480 [ 18.723029] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 18.728428] kthread+0x334/0x6f0 [ 18.731661] ret_from_fork+0x113/0x1d0 [ 18.735414] ret_from_fork_asm+0x1a/0x30 [ 18.739364] [ 18.740866] The buggy address belongs to the object at ffff88810561ce00 [ 18.740866] which belongs to the cache kmalloc-256 of size 256 [ 18.753403] The buggy address is located 0 bytes to the right of [ 18.753403] allocated 201-byte region [ffff88810561ce00, ffff88810561cec9) [ 18.766364] [ 18.767863] The buggy address belongs to the physical page: [ 18.773435] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10561c [ 18.781441] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.789095] flags: 0x200000000000040(head|node=0|zone=2) [ 18.794409] page_type: f5(slab) [ 18.797556] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 18.805302] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.813040] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 18.820866] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.828693] head: 0200000000000001 ffffea0004158701 00000000ffffffff 00000000ffffffff [ 18.836520] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 18.844364] page dumped because: kasan: bad access detected [ 18.849960] [ 18.851460] Memory state around the buggy address: [ 18.856253] ffff88810561cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.863471] ffff88810561ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.870690] >ffff88810561ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 18.877911] ^ [ 18.883482] ffff88810561cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.890701] ffff88810561cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.897923] ================================================================== [ 20.164615] ================================================================== [ 20.171854] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 20.179509] Write of size 1 at addr ffff88810561ceeb by task kunit_try_catch/199 [ 20.186909] [ 20.188411] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 20.188418] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 20.188421] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 20.188424] Call Trace: [ 20.188426] <TASK> [ 20.188427] dump_stack_lvl+0x73/0xb0 [ 20.188431] print_report+0xd1/0x650 [ 20.188435] ? __virt_addr_valid+0x1db/0x2d0 [ 20.188439] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 20.188443] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.188448] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 20.188453] kasan_report+0x141/0x180 [ 20.188457] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 20.188462] __asan_report_store1_noabort+0x1b/0x30 [ 20.188467] krealloc_less_oob_helper+0xd47/0x11d0 [ 20.188472] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 20.188476] ? finish_task_switch.isra.0+0x153/0x700 [ 20.188480] ? __switch_to+0x544/0xf50 [ 20.188484] ? __schedule+0x10cc/0x2b60 [ 20.188489] krealloc_less_oob+0x1c/0x30 [ 20.188493] kunit_try_run_case+0x1a2/0x480 [ 20.188497] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.188501] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.188505] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.188509] ? __kthread_parkme+0x82/0x180 [ 20.188513] ? preempt_count_sub+0x50/0x80 [ 20.188517] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.188521] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 20.188525] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.188529] kthread+0x334/0x6f0 [ 20.188533] ? trace_preempt_on+0x20/0xc0 [ 20.188537] ? __pfx_kthread+0x10/0x10 [ 20.188540] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.188544] ? calculate_sigpending+0x7b/0xa0 [ 20.188548] ? __pfx_kthread+0x10/0x10 [ 20.188552] ret_from_fork+0x113/0x1d0 [ 20.188556] ? __pfx_kthread+0x10/0x10 [ 20.188559] ret_from_fork_asm+0x1a/0x30 [ 20.188565] </TASK> [ 20.188566] [ 20.365572] Allocated by task 199: [ 20.368976] kasan_save_stack+0x45/0x70 [ 20.372817] kasan_save_track+0x18/0x40 [ 20.376658] kasan_save_alloc_info+0x3b/0x50 [ 20.380938] __kasan_krealloc+0x190/0x1f0 [ 20.384950] krealloc_noprof+0xf3/0x340 [ 20.388790] krealloc_less_oob_helper+0x1aa/0x11d0 [ 20.393583] krealloc_less_oob+0x1c/0x30 [ 20.397516] kunit_try_run_case+0x1a2/0x480 [ 20.401704] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 20.407112] kthread+0x334/0x6f0 [ 20.410363] ret_from_fork+0x113/0x1d0 [ 20.414138] ret_from_fork_asm+0x1a/0x30 [ 20.418064] [ 20.419565] The buggy address belongs to the object at ffff88810561ce00 [ 20.419565] which belongs to the cache kmalloc-256 of size 256 [ 20.432080] The buggy address is located 34 bytes to the right of [ 20.432080] allocated 201-byte region [ffff88810561ce00, ffff88810561cec9) [ 20.445114] [ 20.446612] The buggy address belongs to the physical page: [ 20.452186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10561c [ 20.460192] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.467845] flags: 0x200000000000040(head|node=0|zone=2) [ 20.473159] page_type: f5(slab) [ 20.476306] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 20.484044] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.491786] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 20.499619] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.507444] head: 0200000000000001 ffffea0004158701 00000000ffffffff 00000000ffffffff [ 20.515271] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 20.523096] page dumped because: kasan: bad access detected [ 20.528667] [ 20.530160] Memory state around the buggy address: [ 20.534953] ffff88810561cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.542171] ffff88810561ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.549403] >ffff88810561ce80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 20.556628] ^ [ 20.563240] ffff88810561cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.570459] ffff88810561cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.577678] ================================================================== [ 22.640133] ================================================================== [ 22.647414] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0 [ 22.655069] Write of size 1 at addr ffff888104eb20eb by task kunit_try_catch/203 [ 22.662462] [ 22.663962] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 22.663969] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 22.663972] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 22.663975] Call Trace: [ 22.663977] <TASK> [ 22.663978] dump_stack_lvl+0x73/0xb0 [ 22.663982] print_report+0xd1/0x650 [ 22.663986] ? __virt_addr_valid+0x1db/0x2d0 [ 22.663990] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 22.663994] ? kasan_addr_to_slab+0x11/0xa0 [ 22.663998] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 22.664002] kasan_report+0x141/0x180 [ 22.664006] ? krealloc_less_oob_helper+0xd47/0x11d0 [ 22.664011] __asan_report_store1_noabort+0x1b/0x30 [ 22.664016] krealloc_less_oob_helper+0xd47/0x11d0 [ 22.664021] ? __pfx_krealloc_less_oob_helper+0x10/0x10 [ 22.664025] ? finish_task_switch.isra.0+0x153/0x700 [ 22.664029] ? __switch_to+0x544/0xf50 [ 22.664034] ? __schedule+0x10cc/0x2b60 [ 22.664038] krealloc_large_less_oob+0x1c/0x30 [ 22.664043] kunit_try_run_case+0x1a2/0x480 [ 22.664047] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.664051] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 22.664055] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.664059] ? __kthread_parkme+0x82/0x180 [ 22.664063] ? preempt_count_sub+0x50/0x80 [ 22.664067] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.664071] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 22.664075] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.664079] kthread+0x334/0x6f0 [ 22.664083] ? trace_preempt_on+0x20/0xc0 [ 22.664087] ? __pfx_kthread+0x10/0x10 [ 22.664090] ? _raw_spin_unlock_irq+0x47/0x80 [ 22.664094] ? calculate_sigpending+0x7b/0xa0 [ 22.664098] ? __pfx_kthread+0x10/0x10 [ 22.664102] ret_from_fork+0x113/0x1d0 [ 22.664105] ? __pfx_kthread+0x10/0x10 [ 22.664109] ret_from_fork_asm+0x1a/0x30 [ 22.664115] </TASK> [ 22.664116] [ 22.840449] The buggy address belongs to the physical page: [ 22.846020] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104eb0 [ 22.854020] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.861674] flags: 0x200000000000040(head|node=0|zone=2) [ 22.866985] page_type: f8(unknown) [ 22.870421] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.878165] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.885904] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.893733] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 22.901565] head: 0200000000000002 ffffea000413ac01 00000000ffffffff 00000000ffffffff [ 22.909415] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.917244] page dumped because: kasan: bad access detected [ 22.922817] [ 22.924315] Memory state around the buggy address: [ 22.929143] ffff888104eb1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.936365] ffff888104eb2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.943607] >ffff888104eb2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 22.950828] ^ [ 22.957439] ffff888104eb2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.964659] ffff888104eb2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.971878] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 20.939434] ================================================================== [ 20.946661] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 20.954235] Write of size 1 at addr ffff888104ffa0f0 by task kunit_try_catch/201 [ 20.961628] [ 20.963127] CPU: 3 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 20.963135] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 20.963138] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 20.963141] Call Trace: [ 20.963143] <TASK> [ 20.963144] dump_stack_lvl+0x73/0xb0 [ 20.963149] print_report+0xd1/0x650 [ 20.963152] ? __virt_addr_valid+0x1db/0x2d0 [ 20.963156] ? krealloc_more_oob_helper+0x7eb/0x930 [ 20.963161] ? kasan_addr_to_slab+0x11/0xa0 [ 20.963164] ? krealloc_more_oob_helper+0x7eb/0x930 [ 20.963168] kasan_report+0x141/0x180 [ 20.963172] ? krealloc_more_oob_helper+0x7eb/0x930 [ 20.963178] __asan_report_store1_noabort+0x1b/0x30 [ 20.963182] krealloc_more_oob_helper+0x7eb/0x930 [ 20.963186] ? __schedule+0x10cc/0x2b60 [ 20.963190] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 20.963195] ? finish_task_switch.isra.0+0x153/0x700 [ 20.963199] ? __switch_to+0x544/0xf50 [ 20.963203] ? __schedule+0x10cc/0x2b60 [ 20.963208] krealloc_large_more_oob+0x1c/0x30 [ 20.963212] kunit_try_run_case+0x1a2/0x480 [ 20.963216] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.963220] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.963224] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.963229] ? __kthread_parkme+0x82/0x180 [ 20.963232] ? preempt_count_sub+0x50/0x80 [ 20.963236] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.963240] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 20.963244] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.963249] kthread+0x334/0x6f0 [ 20.963252] ? trace_preempt_on+0x20/0xc0 [ 20.963256] ? __pfx_kthread+0x10/0x10 [ 20.963260] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.963263] ? calculate_sigpending+0x7b/0xa0 [ 20.963268] ? __pfx_kthread+0x10/0x10 [ 20.963272] ret_from_fork+0x113/0x1d0 [ 20.963275] ? __pfx_kthread+0x10/0x10 [ 20.963278] ret_from_fork_asm+0x1a/0x30 [ 20.963284] </TASK> [ 20.963286] [ 21.143063] The buggy address belongs to the physical page: [ 21.148636] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ff8 [ 21.156644] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.164298] flags: 0x200000000000040(head|node=0|zone=2) [ 21.169617] page_type: f8(unknown) [ 21.173025] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.180765] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.188513] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.196365] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 21.204215] head: 0200000000000002 ffffea000413fe01 00000000ffffffff 00000000ffffffff [ 21.212041] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 21.219867] page dumped because: kasan: bad access detected [ 21.225440] [ 21.226939] Memory state around the buggy address: [ 21.231733] ffff888104ff9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.238959] ffff888104ffa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.246181] >ffff888104ffa080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 21.253407] ^ [ 21.260279] ffff888104ffa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.267498] ffff888104ffa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.274717] ================================================================== [ 18.058241] ================================================================== [ 18.065465] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930 [ 18.073032] Write of size 1 at addr ffff88810561ccf0 by task kunit_try_catch/197 [ 18.080425] [ 18.081926] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 18.081934] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 18.081937] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 18.081940] Call Trace: [ 18.081941] <TASK> [ 18.081943] dump_stack_lvl+0x73/0xb0 [ 18.081948] print_report+0xd1/0x650 [ 18.081952] ? __virt_addr_valid+0x1db/0x2d0 [ 18.081955] ? krealloc_more_oob_helper+0x7eb/0x930 [ 18.081960] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.081965] ? krealloc_more_oob_helper+0x7eb/0x930 [ 18.081969] kasan_report+0x141/0x180 [ 18.081973] ? krealloc_more_oob_helper+0x7eb/0x930 [ 18.081978] __asan_report_store1_noabort+0x1b/0x30 [ 18.081983] krealloc_more_oob_helper+0x7eb/0x930 [ 18.081987] ? __schedule+0x10cc/0x2b60 [ 18.081991] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 18.081996] ? finish_task_switch.isra.0+0x153/0x700 [ 18.082000] ? __switch_to+0x544/0xf50 [ 18.082004] ? __schedule+0x10cc/0x2b60 [ 18.082009] krealloc_more_oob+0x1c/0x30 [ 18.082013] kunit_try_run_case+0x1a2/0x480 [ 18.082017] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.082021] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.082025] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.082029] ? __kthread_parkme+0x82/0x180 [ 18.082033] ? preempt_count_sub+0x50/0x80 [ 18.082037] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.082041] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 18.082045] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.082050] kthread+0x334/0x6f0 [ 18.082053] ? trace_preempt_on+0x20/0xc0 [ 18.082057] ? __pfx_kthread+0x10/0x10 [ 18.082061] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.082064] ? calculate_sigpending+0x7b/0xa0 [ 18.082069] ? __pfx_kthread+0x10/0x10 [ 18.082073] ret_from_fork+0x113/0x1d0 [ 18.082076] ? __pfx_kthread+0x10/0x10 [ 18.082080] ret_from_fork_asm+0x1a/0x30 [ 18.082085] </TASK> [ 18.082087] [ 18.262509] Allocated by task 197: [ 18.265917] kasan_save_stack+0x45/0x70 [ 18.269756] kasan_save_track+0x18/0x40 [ 18.273595] kasan_save_alloc_info+0x3b/0x50 [ 18.277866] __kasan_krealloc+0x190/0x1f0 [ 18.281880] krealloc_noprof+0xf3/0x340 [ 18.285719] krealloc_more_oob_helper+0x1a9/0x930 [ 18.290425] krealloc_more_oob+0x1c/0x30 [ 18.294363] kunit_try_run_case+0x1a2/0x480 [ 18.298572] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 18.303971] kthread+0x334/0x6f0 [ 18.307205] ret_from_fork+0x113/0x1d0 [ 18.310956] ret_from_fork_asm+0x1a/0x30 [ 18.314882] [ 18.316394] The buggy address belongs to the object at ffff88810561cc00 [ 18.316394] which belongs to the cache kmalloc-256 of size 256 [ 18.328914] The buggy address is located 5 bytes to the right of [ 18.328914] allocated 235-byte region [ffff88810561cc00, ffff88810561cceb) [ 18.341861] [ 18.343364] The buggy address belongs to the physical page: [ 18.348942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10561c [ 18.356941] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.364593] flags: 0x200000000000040(head|node=0|zone=2) [ 18.369908] page_type: f5(slab) [ 18.373054] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 18.380792] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.388534] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 18.396367] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.404220] head: 0200000000000001 ffffea0004158701 00000000ffffffff 00000000ffffffff [ 18.412055] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 18.419888] page dumped because: kasan: bad access detected [ 18.425461] [ 18.426960] Memory state around the buggy address: [ 18.431753] ffff88810561cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.438972] ffff88810561cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.446193] >ffff88810561cc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 18.453417] ^ [ 18.460291] ffff88810561cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.467512] ffff88810561cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.474729] ================================================================== [ 17.630962] ================================================================== [ 17.641773] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 17.649363] Write of size 1 at addr ffff88810561cceb by task kunit_try_catch/197 [ 17.656782] [ 17.658282] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.658291] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 17.658294] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 17.658297] Call Trace: [ 17.658299] <TASK> [ 17.658301] dump_stack_lvl+0x73/0xb0 [ 17.658306] print_report+0xd1/0x650 [ 17.658310] ? __virt_addr_valid+0x1db/0x2d0 [ 17.658314] ? krealloc_more_oob_helper+0x821/0x930 [ 17.658318] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.658323] ? krealloc_more_oob_helper+0x821/0x930 [ 17.658327] kasan_report+0x141/0x180 [ 17.658348] ? krealloc_more_oob_helper+0x821/0x930 [ 17.658354] __asan_report_store1_noabort+0x1b/0x30 [ 17.658359] krealloc_more_oob_helper+0x821/0x930 [ 17.658363] ? __schedule+0x10cc/0x2b60 [ 17.658367] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 17.658384] ? finish_task_switch.isra.0+0x153/0x700 [ 17.658388] ? __switch_to+0x544/0xf50 [ 17.658393] ? __schedule+0x10cc/0x2b60 [ 17.658397] krealloc_more_oob+0x1c/0x30 [ 17.658401] kunit_try_run_case+0x1a2/0x480 [ 17.658406] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.658410] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.658414] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.658418] ? __kthread_parkme+0x82/0x180 [ 17.658422] ? preempt_count_sub+0x50/0x80 [ 17.658426] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.658430] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 17.658434] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.658439] kthread+0x334/0x6f0 [ 17.658442] ? trace_preempt_on+0x20/0xc0 [ 17.658446] ? __pfx_kthread+0x10/0x10 [ 17.658450] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.658454] ? calculate_sigpending+0x7b/0xa0 [ 17.658458] ? __pfx_kthread+0x10/0x10 [ 17.658462] ret_from_fork+0x113/0x1d0 [ 17.658465] ? __pfx_kthread+0x10/0x10 [ 17.658469] ret_from_fork_asm+0x1a/0x30 [ 17.658474] </TASK> [ 17.658476] [ 17.838902] Allocated by task 197: [ 17.842309] kasan_save_stack+0x45/0x70 [ 17.846147] kasan_save_track+0x18/0x40 [ 17.849986] kasan_save_alloc_info+0x3b/0x50 [ 17.854259] __kasan_krealloc+0x190/0x1f0 [ 17.858272] krealloc_noprof+0xf3/0x340 [ 17.862113] krealloc_more_oob_helper+0x1a9/0x930 [ 17.866827] krealloc_more_oob+0x1c/0x30 [ 17.870754] kunit_try_run_case+0x1a2/0x480 [ 17.874947] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 17.880363] kthread+0x334/0x6f0 [ 17.883612] ret_from_fork+0x113/0x1d0 [ 17.887367] ret_from_fork_asm+0x1a/0x30 [ 17.891317] [ 17.892817] The buggy address belongs to the object at ffff88810561cc00 [ 17.892817] which belongs to the cache kmalloc-256 of size 256 [ 17.905323] The buggy address is located 0 bytes to the right of [ 17.905323] allocated 235-byte region [ffff88810561cc00, ffff88810561cceb) [ 17.918288] [ 17.919789] The buggy address belongs to the physical page: [ 17.925364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10561c [ 17.933403] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.941057] flags: 0x200000000000040(head|node=0|zone=2) [ 17.946370] page_type: f5(slab) [ 17.949534] raw: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 17.957282] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.965031] head: 0200000000000040 ffff888100042b40 dead000000000122 0000000000000000 [ 17.972864] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.980697] head: 0200000000000001 ffffea0004158701 00000000ffffffff 00000000ffffffff [ 17.988525] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.996365] page dumped because: kasan: bad access detected [ 18.001964] [ 18.003466] Memory state around the buggy address: [ 18.008256] ffff88810561cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.015478] ffff88810561cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.022698] >ffff88810561cc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 18.029922] ^ [ 18.036536] ffff88810561cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.043755] ffff88810561cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.050976] ================================================================== [ 20.593258] ================================================================== [ 20.604329] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930 [ 20.611947] Write of size 1 at addr ffff888104ffa0eb by task kunit_try_catch/201 [ 20.619364] [ 20.620891] CPU: 3 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 20.620900] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 20.620902] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 20.620905] Call Trace: [ 20.620907] <TASK> [ 20.620909] dump_stack_lvl+0x73/0xb0 [ 20.620914] print_report+0xd1/0x650 [ 20.620918] ? __virt_addr_valid+0x1db/0x2d0 [ 20.620922] ? krealloc_more_oob_helper+0x821/0x930 [ 20.620926] ? kasan_addr_to_slab+0x11/0xa0 [ 20.620930] ? krealloc_more_oob_helper+0x821/0x930 [ 20.620934] kasan_report+0x141/0x180 [ 20.620938] ? krealloc_more_oob_helper+0x821/0x930 [ 20.620943] __asan_report_store1_noabort+0x1b/0x30 [ 20.620948] krealloc_more_oob_helper+0x821/0x930 [ 20.620952] ? __schedule+0x10cc/0x2b60 [ 20.620956] ? __pfx_krealloc_more_oob_helper+0x10/0x10 [ 20.620961] ? finish_task_switch.isra.0+0x153/0x700 [ 20.620965] ? __switch_to+0x544/0xf50 [ 20.620970] ? __schedule+0x10cc/0x2b60 [ 20.620974] krealloc_large_more_oob+0x1c/0x30 [ 20.620978] kunit_try_run_case+0x1a2/0x480 [ 20.620983] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.620987] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.620991] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.620995] ? __kthread_parkme+0x82/0x180 [ 20.620999] ? preempt_count_sub+0x50/0x80 [ 20.621003] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.621007] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 20.621011] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.621015] kthread+0x334/0x6f0 [ 20.621019] ? trace_preempt_on+0x20/0xc0 [ 20.621023] ? __pfx_kthread+0x10/0x10 [ 20.621027] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.621030] ? calculate_sigpending+0x7b/0xa0 [ 20.621035] ? __pfx_kthread+0x10/0x10 [ 20.621039] ret_from_fork+0x113/0x1d0 [ 20.621042] ? __pfx_kthread+0x10/0x10 [ 20.621046] ret_from_fork_asm+0x1a/0x30 [ 20.621051] </TASK> [ 20.621053] [ 20.800802] The buggy address belongs to the physical page: [ 20.806395] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ff8 [ 20.814404] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.822060] flags: 0x200000000000040(head|node=0|zone=2) [ 20.827393] page_type: f8(unknown) [ 20.830806] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.838552] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.846294] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.854128] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.861953] head: 0200000000000002 ffffea000413fe01 00000000ffffffff 00000000ffffffff [ 20.869778] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.877603] page dumped because: kasan: bad access detected [ 20.883176] [ 20.884675] Memory state around the buggy address: [ 20.889470] ffff888104ff9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.896688] ffff888104ffa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.903910] >ffff888104ffa080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 20.911137] ^ [ 20.917748] ffff888104ffa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.924969] ffff888104ffa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.932187] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 114.658368] ================================================================== [ 114.665616] BUG: KFENCE: use-after-free read in test_krealloc+0x6fc/0xbe0 [ 114.665616] [ 114.673892] Use-after-free read at 0x0000000096fb9f2f (in kfence-#15): [ 114.680420] test_krealloc+0x6fc/0xbe0 [ 114.684171] kunit_try_run_case+0x1a2/0x480 [ 114.688358] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 114.693758] kthread+0x334/0x6f0 [ 114.696997] ret_from_fork+0x113/0x1d0 [ 114.700752] ret_from_fork_asm+0x1a/0x30 [ 114.704685] [ 114.706184] kfence-#15: 0x0000000096fb9f2f-0x0000000089c6bd6c, size=32, cache=kmalloc-32 [ 114.706184] [ 114.715746] allocated by task 378 on cpu 0 at 114.658356s (0.057390s ago): [ 114.722628] test_alloc+0x364/0x10f0 [ 114.726214] test_krealloc+0xad/0xbe0 [ 114.729878] kunit_try_run_case+0x1a2/0x480 [ 114.734064] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 114.739463] kthread+0x334/0x6f0 [ 114.742699] ret_from_fork+0x113/0x1d0 [ 114.746451] ret_from_fork_asm+0x1a/0x30 [ 114.750376] [ 114.751874] freed by task 378 on cpu 0 at 114.658360s (0.093514s ago): [ 114.758403] krealloc_noprof+0x108/0x340 [ 114.762338] test_krealloc+0x226/0xbe0 [ 114.766089] kunit_try_run_case+0x1a2/0x480 [ 114.770275] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 114.775673] kthread+0x334/0x6f0 [ 114.778906] ret_from_fork+0x113/0x1d0 [ 114.782661] ret_from_fork_asm+0x1a/0x30 [ 114.786586] [ 114.788085] CPU: 0 UID: 0 PID: 378 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 114.798965] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 114.804977] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 114.812376] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 114.388687] ================================================================== [ 114.395921] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x2ec/0x670 [ 114.395921] [ 114.405583] Use-after-free read at 0x00000000657c9be8 (in kfence-#13): [ 114.412118] test_memcache_typesafe_by_rcu+0x2ec/0x670 [ 114.417266] kunit_try_run_case+0x1a2/0x480 [ 114.421462] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 114.426869] kthread+0x334/0x6f0 [ 114.430102] ret_from_fork+0x113/0x1d0 [ 114.433861] ret_from_fork_asm+0x1a/0x30 [ 114.437787] [ 114.439286] kfence-#13: 0x00000000657c9be8-0x00000000f1c15b0b, size=32, cache=test [ 114.439286] [ 114.448327] allocated by task 376 on cpu 1 at 114.362358s (0.085968s ago): [ 114.455210] test_alloc+0x2a6/0x10f0 [ 114.458795] test_memcache_typesafe_by_rcu+0x16f/0x670 [ 114.463936] kunit_try_run_case+0x1a2/0x480 [ 114.468131] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 114.473529] kthread+0x334/0x6f0 [ 114.476760] ret_from_fork+0x113/0x1d0 [ 114.480516] ret_from_fork_asm+0x1a/0x30 [ 114.484451] [ 114.485948] freed by task 376 on cpu 1 at 114.362360s (0.123588s ago): [ 114.492477] test_memcache_typesafe_by_rcu+0x1bf/0x670 [ 114.497624] kunit_try_run_case+0x1a2/0x480 [ 114.501818] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 114.507216] kthread+0x334/0x6f0 [ 114.510449] ret_from_fork+0x113/0x1d0 [ 114.514200] ret_from_fork_asm+0x1a/0x30 [ 114.518126] [ 114.519630] CPU: 1 UID: 0 PID: 376 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 114.530504] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 114.536510] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 114.543902] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 91.082824] ================================================================== [ 91.093996] BUG: KFENCE: invalid read in test_invalid_access+0xf0/0x210 [ 91.093996] [ 91.102097] Invalid read at 0x00000000161be419: [ 91.106631] test_invalid_access+0xf0/0x210 [ 91.110816] kunit_try_run_case+0x1a2/0x480 [ 91.115010] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 91.120409] kthread+0x334/0x6f0 [ 91.123643] ret_from_fork+0x113/0x1d0 [ 91.127396] ret_from_fork_asm+0x1a/0x30 [ 91.131353] [ 91.132873] CPU: 1 UID: 0 PID: 372 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 91.143751] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 91.149762] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 91.157156] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 90.690360] ================================================================== [ 90.697610] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x24f/0x340 [ 90.697610] [ 90.707176] Corrupted memory at 0x00000000667be82d [ ! . . . . . . . . . . . . . . . ] (in kfence-#6): [ 90.716521] test_kmalloc_aligned_oob_write+0x24f/0x340 [ 90.721753] kunit_try_run_case+0x1a2/0x480 [ 90.725941] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 90.731338] kthread+0x334/0x6f0 [ 90.734572] ret_from_fork+0x113/0x1d0 [ 90.738324] ret_from_fork_asm+0x1a/0x30 [ 90.742251] [ 90.743750] kfence-#6: 0x00000000a62209e0-0x00000000de8deca9, size=73, cache=kmalloc-96 [ 90.743750] [ 90.753231] allocated by task 366 on cpu 3 at 90.690351s (0.062880s ago): [ 90.760029] test_alloc+0x364/0x10f0 [ 90.763615] test_kmalloc_aligned_oob_write+0xc8/0x340 [ 90.768753] kunit_try_run_case+0x1a2/0x480 [ 90.772940] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 90.778337] kthread+0x334/0x6f0 [ 90.781569] ret_from_fork+0x113/0x1d0 [ 90.785324] ret_from_fork_asm+0x1a/0x30 [ 90.789250] [ 90.790748] freed by task 366 on cpu 3 at 90.690353s (0.100394s ago): [ 90.797192] test_kmalloc_aligned_oob_write+0x24f/0x340 [ 90.802424] kunit_try_run_case+0x1a2/0x480 [ 90.806609] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 90.812008] kthread+0x334/0x6f0 [ 90.815241] ret_from_fork+0x113/0x1d0 [ 90.818994] ret_from_fork_asm+0x1a/0x30 [ 90.822920] [ 90.824420] CPU: 3 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 90.835298] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 90.841300] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 90.848695] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 14.277512] ================================================================== [ 14.284736] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0 [ 14.291704] Write of size 1 at addr ffff8881066f8078 by task kunit_try_catch/177 [ 14.299098] [ 14.300596] CPU: 3 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.300604] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 14.300607] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 14.300610] Call Trace: [ 14.300611] <TASK> [ 14.300613] dump_stack_lvl+0x73/0xb0 [ 14.300618] print_report+0xd1/0x650 [ 14.300621] ? __virt_addr_valid+0x1db/0x2d0 [ 14.300625] ? kmalloc_oob_right+0x6bd/0x7f0 [ 14.300629] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.300634] ? kmalloc_oob_right+0x6bd/0x7f0 [ 14.300638] kasan_report+0x141/0x180 [ 14.300642] ? kmalloc_oob_right+0x6bd/0x7f0 [ 14.300647] __asan_report_store1_noabort+0x1b/0x30 [ 14.300651] kmalloc_oob_right+0x6bd/0x7f0 [ 14.300655] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 14.300659] ? __schedule+0x10cc/0x2b60 [ 14.300663] ? ktime_get_ts64+0x83/0x230 [ 14.300668] kunit_try_run_case+0x1a2/0x480 [ 14.300672] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.300676] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.300680] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.300684] ? __kthread_parkme+0x82/0x180 [ 14.300688] ? preempt_count_sub+0x50/0x80 [ 14.300692] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.300696] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 14.300700] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.300704] kthread+0x334/0x6f0 [ 14.300708] ? trace_preempt_on+0x20/0xc0 [ 14.300712] ? __pfx_kthread+0x10/0x10 [ 14.300715] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.300719] ? calculate_sigpending+0x7b/0xa0 [ 14.300723] ? __pfx_kthread+0x10/0x10 [ 14.300727] ret_from_fork+0x113/0x1d0 [ 14.300730] ? __pfx_kthread+0x10/0x10 [ 14.300734] ret_from_fork_asm+0x1a/0x30 [ 14.300740] </TASK> [ 14.300741] [ 14.465730] Allocated by task 177: [ 14.469136] kasan_save_stack+0x45/0x70 [ 14.472975] kasan_save_track+0x18/0x40 [ 14.476814] kasan_save_alloc_info+0x3b/0x50 [ 14.481086] __kasan_kmalloc+0xb7/0xc0 [ 14.484840] __kmalloc_cache_noprof+0x189/0x420 [ 14.489385] kmalloc_oob_right+0xa9/0x7f0 [ 14.493403] kunit_try_run_case+0x1a2/0x480 [ 14.497587] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 14.502988] kthread+0x334/0x6f0 [ 14.506219] ret_from_fork+0x113/0x1d0 [ 14.509972] ret_from_fork_asm+0x1a/0x30 [ 14.513898] [ 14.515398] The buggy address belongs to the object at ffff8881066f8000 [ 14.515398] which belongs to the cache kmalloc-128 of size 128 [ 14.527912] The buggy address is located 5 bytes to the right of [ 14.527912] allocated 115-byte region [ffff8881066f8000, ffff8881066f8073) [ 14.540861] [ 14.542362] The buggy address belongs to the physical page: [ 14.547960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f8 [ 14.555967] flags: 0x200000000000000(node=0|zone=2) [ 14.560845] page_type: f5(slab) [ 14.563993] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 14.571733] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.579470] page dumped because: kasan: bad access detected [ 14.585044] [ 14.586544] Memory state around the buggy address: [ 14.591347] ffff8881066f7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.598590] ffff8881066f7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.605811] >ffff8881066f8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 14.613036] ^ [ 14.620170] ffff8881066f8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.627402] ffff8881066f8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.634626] ================================================================== [ 14.641868] ================================================================== [ 14.649100] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0 [ 14.656067] Read of size 1 at addr ffff8881066f8080 by task kunit_try_catch/177 [ 14.663386] [ 14.664880] CPU: 3 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.664888] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 14.664891] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 14.664894] Call Trace: [ 14.664896] <TASK> [ 14.664897] dump_stack_lvl+0x73/0xb0 [ 14.664902] print_report+0xd1/0x650 [ 14.664905] ? __virt_addr_valid+0x1db/0x2d0 [ 14.664909] ? kmalloc_oob_right+0x68a/0x7f0 [ 14.664913] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.664918] ? kmalloc_oob_right+0x68a/0x7f0 [ 14.664922] kasan_report+0x141/0x180 [ 14.664926] ? kmalloc_oob_right+0x68a/0x7f0 [ 14.664931] __asan_report_load1_noabort+0x18/0x20 [ 14.664935] kmalloc_oob_right+0x68a/0x7f0 [ 14.664939] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 14.664943] ? __schedule+0x10cc/0x2b60 [ 14.664947] ? ktime_get_ts64+0x83/0x230 [ 14.664951] kunit_try_run_case+0x1a2/0x480 [ 14.664956] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.664960] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.664964] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.664968] ? __kthread_parkme+0x82/0x180 [ 14.664971] ? preempt_count_sub+0x50/0x80 [ 14.664976] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.664980] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 14.664984] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.664988] kthread+0x334/0x6f0 [ 14.664991] ? trace_preempt_on+0x20/0xc0 [ 14.664995] ? __pfx_kthread+0x10/0x10 [ 14.664999] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.665003] ? calculate_sigpending+0x7b/0xa0 [ 14.665007] ? __pfx_kthread+0x10/0x10 [ 14.665011] ret_from_fork+0x113/0x1d0 [ 14.665014] ? __pfx_kthread+0x10/0x10 [ 14.665018] ret_from_fork_asm+0x1a/0x30 [ 14.665024] </TASK> [ 14.665025] [ 14.829834] Allocated by task 177: [ 14.833240] kasan_save_stack+0x45/0x70 [ 14.837078] kasan_save_track+0x18/0x40 [ 14.840916] kasan_save_alloc_info+0x3b/0x50 [ 14.845190] __kasan_kmalloc+0xb7/0xc0 [ 14.848942] __kmalloc_cache_noprof+0x189/0x420 [ 14.853476] kmalloc_oob_right+0xa9/0x7f0 [ 14.857489] kunit_try_run_case+0x1a2/0x480 [ 14.861681] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 14.867082] kthread+0x334/0x6f0 [ 14.870313] ret_from_fork+0x113/0x1d0 [ 14.874067] ret_from_fork_asm+0x1a/0x30 [ 14.877991] [ 14.879493] The buggy address belongs to the object at ffff8881066f8000 [ 14.879493] which belongs to the cache kmalloc-128 of size 128 [ 14.892006] The buggy address is located 13 bytes to the right of [ 14.892006] allocated 115-byte region [ffff8881066f8000, ffff8881066f8073) [ 14.905041] [ 14.906541] The buggy address belongs to the physical page: [ 14.912113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f8 [ 14.920114] flags: 0x200000000000000(node=0|zone=2) [ 14.924992] page_type: f5(slab) [ 14.928140] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 14.935888] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.943633] page dumped because: kasan: bad access detected [ 14.949206] [ 14.950706] Memory state around the buggy address: [ 14.955498] ffff8881066f7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.962717] ffff8881066f8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 14.969939] >ffff8881066f8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.977166] ^ [ 14.980397] ffff8881066f8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.987618] ffff8881066f8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.994836] ================================================================== [ 13.909169] ================================================================== [ 13.916407] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0 [ 13.923384] Write of size 1 at addr ffff8881066f8073 by task kunit_try_catch/177 [ 13.930781] [ 13.932284] CPU: 3 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G S N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 13.932293] Tainted: [S]=CPU_OUT_OF_SPEC, [N]=TEST [ 13.932296] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 13.932299] Call Trace: [ 13.932301] <TASK> [ 13.932303] dump_stack_lvl+0x73/0xb0 [ 13.932309] print_report+0xd1/0x650 [ 13.932313] ? __virt_addr_valid+0x1db/0x2d0 [ 13.932333] ? kmalloc_oob_right+0x6f0/0x7f0 [ 13.932336] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.932342] ? kmalloc_oob_right+0x6f0/0x7f0 [ 13.932346] kasan_report+0x141/0x180 [ 13.932350] ? kmalloc_oob_right+0x6f0/0x7f0 [ 13.932367] __asan_report_store1_noabort+0x1b/0x30 [ 13.932372] kmalloc_oob_right+0x6f0/0x7f0 [ 13.932376] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 13.932380] ? __schedule+0x10cc/0x2b60 [ 13.932385] ? ktime_get_ts64+0x83/0x230 [ 13.932389] kunit_try_run_case+0x1a2/0x480 [ 13.932394] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.932399] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.932403] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.932408] ? __kthread_parkme+0x82/0x180 [ 13.932411] ? preempt_count_sub+0x50/0x80 [ 13.932416] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.932421] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 13.932425] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.932429] kthread+0x334/0x6f0 [ 13.932432] ? trace_preempt_on+0x20/0xc0 [ 13.932437] ? __pfx_kthread+0x10/0x10 [ 13.932441] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.932444] ? calculate_sigpending+0x7b/0xa0 [ 13.932449] ? __pfx_kthread+0x10/0x10 [ 13.932453] ret_from_fork+0x113/0x1d0 [ 13.932457] ? __pfx_kthread+0x10/0x10 [ 13.932460] ret_from_fork_asm+0x1a/0x30 [ 13.932466] </TASK> [ 13.932468] [ 14.096220] Allocated by task 177: [ 14.099624] kasan_save_stack+0x45/0x70 [ 14.103466] kasan_save_track+0x18/0x40 [ 14.107303] kasan_save_alloc_info+0x3b/0x50 [ 14.111603] __kasan_kmalloc+0xb7/0xc0 [ 14.115369] __kmalloc_cache_noprof+0x189/0x420 [ 14.119916] kmalloc_oob_right+0xa9/0x7f0 [ 14.123926] kunit_try_run_case+0x1a2/0x480 [ 14.128114] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 14.133511] kthread+0x334/0x6f0 [ 14.136746] ret_from_fork+0x113/0x1d0 [ 14.140499] ret_from_fork_asm+0x1a/0x30 [ 14.144432] [ 14.145932] The buggy address belongs to the object at ffff8881066f8000 [ 14.145932] which belongs to the cache kmalloc-128 of size 128 [ 14.158448] The buggy address is located 0 bytes to the right of [ 14.158448] allocated 115-byte region [ffff8881066f8000, ffff8881066f8073) [ 14.171404] [ 14.172901] The buggy address belongs to the physical page: [ 14.178477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f8 [ 14.186484] flags: 0x200000000000000(node=0|zone=2) [ 14.191384] page_type: f5(slab) [ 14.194536] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 14.202282] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 14.210020] page dumped because: kasan: bad access detected [ 14.215594] [ 14.217092] Memory state around the buggy address: [ 14.221886] ffff8881066f7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.229104] ffff8881066f7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 14.236351] >ffff8881066f8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 14.243594] ^ [ 14.250468] ffff8881066f8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.257689] ffff8881066f8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.264906] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 90.354356] ================================================================== [ 90.361611] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x27e/0x560 [ 90.361611] [ 90.371190] Out-of-bounds read at 0x0000000033c106e2 (105B right of kfence-#2): [ 90.378503] test_kmalloc_aligned_oob_read+0x27e/0x560 [ 90.383642] kunit_try_run_case+0x1a2/0x480 [ 90.387829] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 90.393229] kthread+0x334/0x6f0 [ 90.396469] ret_from_fork+0x113/0x1d0 [ 90.400220] ret_from_fork_asm+0x1a/0x30 [ 90.404147] [ 90.405648] kfence-#2: 0x00000000a1e945ac-0x00000000dc35735b, size=73, cache=kmalloc-96 [ 90.405648] [ 90.415130] allocated by task 364 on cpu 0 at 90.354351s (0.060778s ago): [ 90.421925] test_alloc+0x364/0x10f0 [ 90.425510] test_kmalloc_aligned_oob_read+0x105/0x560 [ 90.430649] kunit_try_run_case+0x1a2/0x480 [ 90.434838] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 90.440235] kthread+0x334/0x6f0 [ 90.443468] ret_from_fork+0x113/0x1d0 [ 90.447220] ret_from_fork_asm+0x1a/0x30 [ 90.451146] [ 90.452648] CPU: 0 UID: 0 PID: 364 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 90.463525] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 90.469538] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 90.476929] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[ 83.890356] ================================================================== [ 83.897609] BUG: KFENCE: memory corruption in test_corruption+0x2d2/0x3e0 [ 83.897609] [ 83.905876] Corrupted memory at 0x000000003aa360ce [ ! . . . . . . . . . . . . . . . ] (in kfence-#196): [ 83.915394] test_corruption+0x2d2/0x3e0 [ 83.919326] kunit_try_run_case+0x1a2/0x480 [ 83.923511] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 83.928912] kthread+0x334/0x6f0 [ 83.932144] ret_from_fork+0x113/0x1d0 [ 83.935898] ret_from_fork_asm+0x1a/0x30 [ 83.939833] [ 83.941332] kfence-#196: 0x00000000f926adfa-0x0000000013e31388, size=32, cache=kmalloc-32 [ 83.941332] [ 83.950986] allocated by task 352 on cpu 0 at 83.890348s (0.060637s ago): [ 83.957775] test_alloc+0x364/0x10f0 [ 83.961359] test_corruption+0xe6/0x3e0 [ 83.965200] kunit_try_run_case+0x1a2/0x480 [ 83.969394] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 83.974794] kthread+0x334/0x6f0 [ 83.978026] ret_from_fork+0x113/0x1d0 [ 83.981779] ret_from_fork_asm+0x1a/0x30 [ 83.985706] [ 83.987204] freed by task 352 on cpu 0 at 83.890350s (0.096853s ago): [ 83.993645] test_corruption+0x2d2/0x3e0 [ 83.997570] kunit_try_run_case+0x1a2/0x480 [ 84.001756] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 84.007154] kthread+0x334/0x6f0 [ 84.010393] ret_from_fork+0x113/0x1d0 [ 84.014149] ret_from_fork_asm+0x1a/0x30 [ 84.018074] [ 84.019576] CPU: 0 UID: 0 PID: 352 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 84.030454] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 84.036458] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 84.043849] ================================================================== [ 84.154355] ================================================================== [ 84.161585] BUG: KFENCE: memory corruption in test_corruption+0x2df/0x3e0 [ 84.161585] [ 84.169843] Corrupted memory at 0x00000000fec71d90 [ ! ] (in kfence-#198): [ 84.176736] test_corruption+0x2df/0x3e0 [ 84.180661] kunit_try_run_case+0x1a2/0x480 [ 84.184847] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 84.190245] kthread+0x334/0x6f0 [ 84.193480] ret_from_fork+0x113/0x1d0 [ 84.197231] ret_from_fork_asm+0x1a/0x30 [ 84.201156] [ 84.202658] kfence-#198: 0x00000000972808e0-0x00000000eaa2685c, size=32, cache=kmalloc-32 [ 84.202658] [ 84.212311] allocated by task 352 on cpu 0 at 84.154348s (0.057963s ago): [ 84.219099] test_alloc+0x364/0x10f0 [ 84.222686] test_corruption+0x1cb/0x3e0 [ 84.226620] kunit_try_run_case+0x1a2/0x480 [ 84.230805] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 84.236205] kthread+0x334/0x6f0 [ 84.239438] ret_from_fork+0x113/0x1d0 [ 84.243191] ret_from_fork_asm+0x1a/0x30 [ 84.247125] [ 84.248625] freed by task 352 on cpu 0 at 84.154350s (0.094275s ago): [ 84.255065] test_corruption+0x2df/0x3e0 [ 84.258999] kunit_try_run_case+0x1a2/0x480 [ 84.263194] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 84.268600] kthread+0x334/0x6f0 [ 84.271832] ret_from_fork+0x113/0x1d0 [ 84.275585] ret_from_fork_asm+0x1a/0x30 [ 84.279512] [ 84.281011] CPU: 0 UID: 0 PID: 352 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 84.291882] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 84.297893] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 84.305285] ================================================================== [ 85.202354] ================================================================== [ 85.209605] BUG: KFENCE: memory corruption in test_corruption+0x216/0x3e0 [ 85.209605] [ 85.217864] Corrupted memory at 0x00000000bca51629 [ ! ] (in kfence-#207): [ 85.224754] test_corruption+0x216/0x3e0 [ 85.228680] kunit_try_run_case+0x1a2/0x480 [ 85.232866] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 85.238267] kthread+0x334/0x6f0 [ 85.241500] ret_from_fork+0x113/0x1d0 [ 85.245252] ret_from_fork_asm+0x1a/0x30 [ 85.249178] [ 85.250677] kfence-#207: 0x000000004faa9cd9-0x00000000eb1bb2a6, size=32, cache=test [ 85.250677] [ 85.259803] allocated by task 354 on cpu 1 at 85.202348s (0.057454s ago): [ 85.266591] test_alloc+0x2a6/0x10f0 [ 85.270178] test_corruption+0x1cb/0x3e0 [ 85.274112] kunit_try_run_case+0x1a2/0x480 [ 85.278298] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 85.283696] kthread+0x334/0x6f0 [ 85.286928] ret_from_fork+0x113/0x1d0 [ 85.290682] ret_from_fork_asm+0x1a/0x30 [ 85.294607] [ 85.296106] freed by task 354 on cpu 1 at 85.202350s (0.093756s ago): [ 85.302548] test_corruption+0x216/0x3e0 [ 85.306472] kunit_try_run_case+0x1a2/0x480 [ 85.310657] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 85.316058] kthread+0x334/0x6f0 [ 85.319290] ret_from_fork+0x113/0x1d0 [ 85.323042] ret_from_fork_asm+0x1a/0x30 [ 85.326970] [ 85.328469] CPU: 1 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 85.339337] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 85.345343] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 85.352734] ================================================================== [ 84.938356] ================================================================== [ 84.945613] BUG: KFENCE: memory corruption in test_corruption+0x131/0x3e0 [ 84.945613] [ 84.953880] Corrupted memory at 0x00000000fd8cedfb [ ! . . . . . . . . . . . . . . . ] (in kfence-#205): [ 84.963397] test_corruption+0x131/0x3e0 [ 84.967329] kunit_try_run_case+0x1a2/0x480 [ 84.971516] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 84.976914] kthread+0x334/0x6f0 [ 84.980149] ret_from_fork+0x113/0x1d0 [ 84.983901] ret_from_fork_asm+0x1a/0x30 [ 84.987825] [ 84.989340] kfence-#205: 0x00000000bb3fb3b1-0x000000003852deeb, size=32, cache=test [ 84.989340] [ 84.998495] allocated by task 354 on cpu 1 at 84.938349s (0.060145s ago): [ 85.005283] test_alloc+0x2a6/0x10f0 [ 85.008871] test_corruption+0xe6/0x3e0 [ 85.012709] kunit_try_run_case+0x1a2/0x480 [ 85.016902] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 85.022303] kthread+0x334/0x6f0 [ 85.025536] ret_from_fork+0x113/0x1d0 [ 85.029289] ret_from_fork_asm+0x1a/0x30 [ 85.033214] [ 85.034714] freed by task 354 on cpu 1 at 84.938351s (0.096362s ago): [ 85.041164] test_corruption+0x131/0x3e0 [ 85.045095] kunit_try_run_case+0x1a2/0x480 [ 85.049282] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 85.054680] kthread+0x334/0x6f0 [ 85.057914] ret_from_fork+0x113/0x1d0 [ 85.061668] ret_from_fork_asm+0x1a/0x30 [ 85.065600] [ 85.067102] CPU: 1 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 85.077979] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 85.083982] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 85.091388] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 83.242354] ================================================================== [ 83.249607] BUG: KFENCE: invalid free in test_invalid_addr_free+0xfb/0x260 [ 83.249607] [ 83.257961] Invalid free of 0x000000001d4d85c2 (in kfence-#190): [ 83.263975] test_invalid_addr_free+0xfb/0x260 [ 83.268427] kunit_try_run_case+0x1a2/0x480 [ 83.272614] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 83.278012] kthread+0x334/0x6f0 [ 83.281245] ret_from_fork+0x113/0x1d0 [ 83.285001] ret_from_fork_asm+0x1a/0x30 [ 83.288933] [ 83.290432] kfence-#190: 0x00000000c9936bc5-0x000000004965f527, size=32, cache=test [ 83.290432] [ 83.299559] allocated by task 350 on cpu 1 at 83.242349s (0.057210s ago): [ 83.306345] test_alloc+0x2a6/0x10f0 [ 83.309925] test_invalid_addr_free+0xdb/0x260 [ 83.314370] kunit_try_run_case+0x1a2/0x480 [ 83.318557] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 83.323955] kthread+0x334/0x6f0 [ 83.327187] ret_from_fork+0x113/0x1d0 [ 83.330942] ret_from_fork_asm+0x1a/0x30 [ 83.334877] [ 83.336376] CPU: 1 UID: 0 PID: 350 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 83.347254] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 83.353257] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 83.360651] ================================================================== [ 83.010356] ================================================================== [ 83.017610] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1e1/0x260 [ 83.017610] [ 83.026050] Invalid free of 0x0000000058d7f59a (in kfence-#188): [ 83.032065] test_invalid_addr_free+0x1e1/0x260 [ 83.036606] kunit_try_run_case+0x1a2/0x480 [ 83.040799] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 83.046198] kthread+0x334/0x6f0 [ 83.049433] ret_from_fork+0x113/0x1d0 [ 83.053191] ret_from_fork_asm+0x1a/0x30 [ 83.057120] [ 83.058618] kfence-#188: 0x0000000041211a33-0x0000000040647611, size=32, cache=kmalloc-32 [ 83.058618] [ 83.068273] allocated by task 348 on cpu 0 at 83.010350s (0.057922s ago): [ 83.075059] test_alloc+0x364/0x10f0 [ 83.078638] test_invalid_addr_free+0xdb/0x260 [ 83.083085] kunit_try_run_case+0x1a2/0x480 [ 83.087271] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 83.092668] kthread+0x334/0x6f0 [ 83.095903] ret_from_fork+0x113/0x1d0 [ 83.099655] ret_from_fork_asm+0x1a/0x30 [ 83.103580] [ 83.105083] CPU: 0 UID: 0 PID: 348 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 83.115958] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 83.121964] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 83.129356] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[ 82.746358] ================================================================== [ 82.753615] BUG: KFENCE: invalid free in test_double_free+0x112/0x260 [ 82.753615] [ 82.761536] Invalid free of 0x00000000f11130fc (in kfence-#186): [ 82.767549] test_double_free+0x112/0x260 [ 82.771562] kunit_try_run_case+0x1a2/0x480 [ 82.775749] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 82.781147] kthread+0x334/0x6f0 [ 82.784380] ret_from_fork+0x113/0x1d0 [ 82.788133] ret_from_fork_asm+0x1a/0x30 [ 82.792058] [ 82.793559] kfence-#186: 0x00000000f11130fc-0x00000000b89beab0, size=32, cache=test [ 82.793559] [ 82.802693] allocated by task 346 on cpu 1 at 82.746351s (0.056341s ago): [ 82.809479] test_alloc+0x2a6/0x10f0 [ 82.813058] test_double_free+0xdb/0x260 [ 82.816983] kunit_try_run_case+0x1a2/0x480 [ 82.821170] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 82.826568] kthread+0x334/0x6f0 [ 82.829801] ret_from_fork+0x113/0x1d0 [ 82.833555] ret_from_fork_asm+0x1a/0x30 [ 82.837481] [ 82.838979] freed by task 346 on cpu 1 at 82.746353s (0.092625s ago): [ 82.845422] test_double_free+0xfa/0x260 [ 82.849354] kunit_try_run_case+0x1a2/0x480 [ 82.853540] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 82.858940] kthread+0x334/0x6f0 [ 82.862173] ret_from_fork+0x113/0x1d0 [ 82.865925] ret_from_fork_asm+0x1a/0x30 [ 82.869851] [ 82.871353] CPU: 1 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 82.882228] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 82.888231] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 82.895624] ================================================================== [ 82.482363] ================================================================== [ 82.489619] BUG: KFENCE: invalid free in test_double_free+0x1d3/0x260 [ 82.489619] [ 82.497540] Invalid free of 0x00000000dc6b3dc2 (in kfence-#184): [ 82.503548] test_double_free+0x1d3/0x260 [ 82.507567] kunit_try_run_case+0x1a2/0x480 [ 82.511753] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 82.517154] kthread+0x334/0x6f0 [ 82.520386] ret_from_fork+0x113/0x1d0 [ 82.524139] ret_from_fork_asm+0x1a/0x30 [ 82.528065] [ 82.529563] kfence-#184: 0x00000000dc6b3dc2-0x000000003276d158, size=32, cache=kmalloc-32 [ 82.529563] [ 82.539209] allocated by task 344 on cpu 0 at 82.482355s (0.056854s ago): [ 82.545998] test_alloc+0x364/0x10f0 [ 82.549584] test_double_free+0xdb/0x260 [ 82.553509] kunit_try_run_case+0x1a2/0x480 [ 82.557695] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 82.563096] kthread+0x334/0x6f0 [ 82.566328] ret_from_fork+0x113/0x1d0 [ 82.570080] ret_from_fork_asm+0x1a/0x30 [ 82.574006] [ 82.575507] freed by task 344 on cpu 0 at 82.482357s (0.093150s ago): [ 82.581956] test_double_free+0x1e0/0x260 [ 82.585976] kunit_try_run_case+0x1a2/0x480 [ 82.590169] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 82.595570] kthread+0x334/0x6f0 [ 82.598802] ret_from_fork+0x113/0x1d0 [ 82.602554] ret_from_fork_asm+0x1a/0x30 [ 82.606480] [ 82.607981] CPU: 0 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 82.618859] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 82.624872] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 82.632263] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 82.010355] ================================================================== [ 82.017608] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x129/0x270 [ 82.017608] [ 82.026830] Use-after-free read at 0x00000000ed776a4e (in kfence-#180): [ 82.033443] test_use_after_free_read+0x129/0x270 [ 82.038159] kunit_try_run_case+0x1a2/0x480 [ 82.042352] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 82.047750] kthread+0x334/0x6f0 [ 82.050983] ret_from_fork+0x113/0x1d0 [ 82.054738] ret_from_fork_asm+0x1a/0x30 [ 82.058670] [ 82.060172] kfence-#180: 0x00000000ed776a4e-0x000000002d024017, size=32, cache=test [ 82.060172] [ 82.069305] allocated by task 338 on cpu 0 at 82.010349s (0.058954s ago): [ 82.076092] test_alloc+0x2a6/0x10f0 [ 82.079671] test_use_after_free_read+0xdc/0x270 [ 82.084289] kunit_try_run_case+0x1a2/0x480 [ 82.088475] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 82.093876] kthread+0x334/0x6f0 [ 82.097109] ret_from_fork+0x113/0x1d0 [ 82.100861] ret_from_fork_asm+0x1a/0x30 [ 82.104786] [ 82.106287] freed by task 338 on cpu 0 at 82.010351s (0.095935s ago): [ 82.112736] test_use_after_free_read+0xfb/0x270 [ 82.117363] kunit_try_run_case+0x1a2/0x480 [ 82.121558] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 82.126964] kthread+0x334/0x6f0 [ 82.130196] ret_from_fork+0x113/0x1d0 [ 82.133950] ret_from_fork_asm+0x1a/0x30 [ 82.137876] [ 82.139376] CPU: 0 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 82.150254] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 82.156267] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 82.163659] ================================================================== [ 81.746355] ================================================================== [ 81.753607] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x129/0x270 [ 81.753607] [ 81.762836] Use-after-free read at 0x000000008a4c0fd5 (in kfence-#178): [ 81.769448] test_use_after_free_read+0x129/0x270 [ 81.774154] kunit_try_run_case+0x1a2/0x480 [ 81.778340] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 81.783739] kthread+0x334/0x6f0 [ 81.786972] ret_from_fork+0x113/0x1d0 [ 81.790726] ret_from_fork_asm+0x1a/0x30 [ 81.794652] [ 81.796151] kfence-#178: 0x000000008a4c0fd5-0x00000000935a1876, size=32, cache=kmalloc-32 [ 81.796151] [ 81.805805] allocated by task 336 on cpu 2 at 81.746349s (0.059455s ago): [ 81.812602] test_alloc+0x364/0x10f0 [ 81.816188] test_use_after_free_read+0xdc/0x270 [ 81.820807] kunit_try_run_case+0x1a2/0x480 [ 81.824993] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 81.830394] kthread+0x334/0x6f0 [ 81.833633] ret_from_fork+0x113/0x1d0 [ 81.837387] ret_from_fork_asm+0x1a/0x30 [ 81.841320] [ 81.842821] freed by task 336 on cpu 2 at 81.746352s (0.096469s ago): [ 81.849261] test_use_after_free_read+0x1e7/0x270 [ 81.853973] kunit_try_run_case+0x1a2/0x480 [ 81.858160] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 81.863558] kthread+0x334/0x6f0 [ 81.866794] ret_from_fork+0x113/0x1d0 [ 81.870546] ret_from_fork_asm+0x1a/0x30 [ 81.874479] [ 81.875979] CPU: 2 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 81.886859] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 81.892869] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 81.900262] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 81.514355] ================================================================== [ 81.521610] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x10d/0x260 [ 81.521610] [ 81.530841] Out-of-bounds write at 0x000000001daa3ee0 (1B left of kfence-#176): [ 81.538155] test_out_of_bounds_write+0x10d/0x260 [ 81.542867] kunit_try_run_case+0x1a2/0x480 [ 81.547056] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 81.552464] kthread+0x334/0x6f0 [ 81.555703] ret_from_fork+0x113/0x1d0 [ 81.559455] ret_from_fork_asm+0x1a/0x30 [ 81.563381] [ 81.564883] kfence-#176: 0x00000000a60ede31-0x0000000062755bc0, size=32, cache=test [ 81.564883] [ 81.574016] allocated by task 334 on cpu 2 at 81.514352s (0.059663s ago): [ 81.580803] test_alloc+0x2a6/0x10f0 [ 81.584382] test_out_of_bounds_write+0xd4/0x260 [ 81.589001] kunit_try_run_case+0x1a2/0x480 [ 81.593186] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 81.598585] kthread+0x334/0x6f0 [ 81.601821] ret_from_fork+0x113/0x1d0 [ 81.605572] ret_from_fork_asm+0x1a/0x30 [ 81.609498] [ 81.611000] CPU: 2 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 81.621877] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 81.627880] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 81.635274] ================================================================== [ 81.178355] ================================================================== [ 81.185606] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x10d/0x260 [ 81.185606] [ 81.194827] Out-of-bounds write at 0x00000000b87b4796 (1B left of kfence-#173): [ 81.202139] test_out_of_bounds_write+0x10d/0x260 [ 81.206845] kunit_try_run_case+0x1a2/0x480 [ 81.211032] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 81.216430] kthread+0x334/0x6f0 [ 81.219664] ret_from_fork+0x113/0x1d0 [ 81.223417] ret_from_fork_asm+0x1a/0x30 [ 81.227343] [ 81.228842] kfence-#173: 0x000000006587152e-0x00000000b2107960, size=32, cache=kmalloc-32 [ 81.228842] [ 81.238498] allocated by task 332 on cpu 2 at 81.178350s (0.060147s ago): [ 81.245294] test_alloc+0x364/0x10f0 [ 81.248879] test_out_of_bounds_write+0xd4/0x260 [ 81.253499] kunit_try_run_case+0x1a2/0x480 [ 81.257685] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 81.263083] kthread+0x334/0x6f0 [ 81.266315] ret_from_fork+0x113/0x1d0 [ 81.270068] ret_from_fork_asm+0x1a/0x30 [ 81.273997] [ 81.275496] CPU: 2 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 81.286374] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 81.292385] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 81.299779] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 80.842354] ================================================================== [ 80.849607] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x216/0x4e0 [ 80.849607] [ 80.858648] Out-of-bounds read at 0x00000000134e28bf (32B right of kfence-#170): [ 80.866049] test_out_of_bounds_read+0x216/0x4e0 [ 80.870667] kunit_try_run_case+0x1a2/0x480 [ 80.874852] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 80.880253] kthread+0x334/0x6f0 [ 80.883486] ret_from_fork+0x113/0x1d0 [ 80.887239] ret_from_fork_asm+0x1a/0x30 [ 80.891173] [ 80.892674] kfence-#170: 0x00000000b1723849-0x000000003b6f25f9, size=32, cache=test [ 80.892674] [ 80.901807] allocated by task 330 on cpu 0 at 80.842351s (0.059455s ago): [ 80.908603] test_alloc+0x2a6/0x10f0 [ 80.912188] test_out_of_bounds_read+0x1e2/0x4e0 [ 80.916809] kunit_try_run_case+0x1a2/0x480 [ 80.920994] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 80.926394] kthread+0x334/0x6f0 [ 80.929626] ret_from_fork+0x113/0x1d0 [ 80.933380] ret_from_fork_asm+0x1a/0x30 [ 80.937315] [ 80.938814] CPU: 0 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 80.949682] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 80.955687] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 80.963080] ================================================================== [ 80.274350] ================================================================== [ 80.281597] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x216/0x4e0 [ 80.281597] [ 80.290644] Out-of-bounds read at 0x00000000588bf01b (32B right of kfence-#165): [ 80.298038] test_out_of_bounds_read+0x216/0x4e0 [ 80.302657] kunit_try_run_case+0x1a2/0x480 [ 80.306844] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 80.312242] kthread+0x334/0x6f0 [ 80.315475] ret_from_fork+0x113/0x1d0 [ 80.319228] ret_from_fork_asm+0x1a/0x30 [ 80.323154] [ 80.324653] kfence-#165: 0x000000009011091b-0x00000000ffc8fa62, size=32, cache=kmalloc-32 [ 80.324653] [ 80.334298] allocated by task 328 on cpu 2 at 80.274348s (0.059950s ago): [ 80.341087] test_alloc+0x364/0x10f0 [ 80.344672] test_out_of_bounds_read+0x1e2/0x4e0 [ 80.349291] kunit_try_run_case+0x1a2/0x480 [ 80.353477] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 80.358876] kthread+0x334/0x6f0 [ 80.362109] ret_from_fork+0x113/0x1d0 [ 80.365864] ret_from_fork_asm+0x1a/0x30 [ 80.369797] [ 80.371299] CPU: 2 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 80.382174] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 80.388178] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 80.395571] ================================================================== [ 80.610352] ================================================================== [ 80.617604] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x126/0x4e0 [ 80.617604] [ 80.626658] Out-of-bounds read at 0x00000000f1915cbb (1B left of kfence-#168): [ 80.633888] test_out_of_bounds_read+0x126/0x4e0 [ 80.638514] kunit_try_run_case+0x1a2/0x480 [ 80.642700] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 80.648100] kthread+0x334/0x6f0 [ 80.651332] ret_from_fork+0x113/0x1d0 [ 80.655086] ret_from_fork_asm+0x1a/0x30 [ 80.659019] [ 80.660520] kfence-#168: 0x00000000ec667a24-0x00000000ecda7ce5, size=32, cache=test [ 80.660520] [ 80.669655] allocated by task 330 on cpu 0 at 80.610348s (0.059307s ago): [ 80.676451] test_alloc+0x2a6/0x10f0 [ 80.680038] test_out_of_bounds_read+0xed/0x4e0 [ 80.684569] kunit_try_run_case+0x1a2/0x480 [ 80.688756] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 80.694163] kthread+0x334/0x6f0 [ 80.697395] ret_from_fork+0x113/0x1d0 [ 80.701148] ret_from_fork_asm+0x1a/0x30 [ 80.705073] [ 80.706575] CPU: 0 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 80.717452] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 80.723466] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 80.730858] ================================================================== [ 79.938354] ================================================================== [ 79.945611] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x126/0x4e0 [ 79.945611] [ 79.954666] Out-of-bounds read at 0x000000009587dcd6 (1B left of kfence-#162): [ 79.961895] test_out_of_bounds_read+0x126/0x4e0 [ 79.966523] kunit_try_run_case+0x1a2/0x480 [ 79.970715] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 79.976116] kthread+0x334/0x6f0 [ 79.979357] ret_from_fork+0x113/0x1d0 [ 79.983108] ret_from_fork_asm+0x1a/0x30 [ 79.987037] [ 79.988535] kfence-#162: 0x0000000048469835-0x000000001b1beb73, size=32, cache=kmalloc-32 [ 79.988535] [ 79.998191] allocated by task 328 on cpu 2 at 79.938349s (0.059842s ago): [ 80.004988] test_alloc+0x364/0x10f0 [ 80.008572] test_out_of_bounds_read+0xed/0x4e0 [ 80.013106] kunit_try_run_case+0x1a2/0x480 [ 80.017290] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 80.022691] kthread+0x334/0x6f0 [ 80.025923] ret_from_fork+0x113/0x1d0 [ 80.029677] ret_from_fork_asm+0x1a/0x30 [ 80.033610] [ 80.035113] CPU: 2 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 80.045980] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 80.051993] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 80.059392] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
[ 15.806860] ================================================================== [ 15.830316] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x288/0x520 [ 15.830316] [ 15.839912] Corrupted memory at 0x0000000012ef1a8f [ ! . . . . . . . . . . . . . . . ] (in kfence-#70): [ 15.849373] kmalloc_track_caller_oob_right+0x288/0x520 [ 15.854636] kunit_try_run_case+0x1a2/0x480 [ 15.858830] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 15.864229] kthread+0x334/0x6f0 [ 15.867463] ret_from_fork+0x113/0x1d0 [ 15.871214] ret_from_fork_asm+0x1a/0x30 [ 15.875141] [ 15.876641] kfence-#70: 0x000000004a7c7daf-0x0000000007811704, size=120, cache=kmalloc-128 [ 15.876641] [ 15.886419] allocated by task 183 on cpu 1 at 15.806815s (0.079604s ago): [ 15.893210] kmalloc_track_caller_oob_right+0x19a/0x520 [ 15.898436] kunit_try_run_case+0x1a2/0x480 [ 15.902622] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 15.908020] kthread+0x334/0x6f0 [ 15.911255] ret_from_fork+0x113/0x1d0 [ 15.915008] ret_from_fork_asm+0x1a/0x30 [ 15.918942] [ 15.920441] freed by task 183 on cpu 1 at 15.806855s (0.113585s ago): [ 15.926882] kmalloc_track_caller_oob_right+0x288/0x520 [ 15.932113] kunit_try_run_case+0x1a2/0x480 [ 15.936299] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 15.941701] kthread+0x334/0x6f0 [ 15.944932] ret_from_fork+0x113/0x1d0 [ 15.948687] ret_from_fork_asm+0x1a/0x30 [ 15.952620] [ 15.954121] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.964996] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 15.971003] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 15.978422] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 79.037519] ================================================================== [ 79.044765] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0 [ 79.051638] Write of size 121 at addr ffff8881066e9300 by task kunit_try_catch/326 [ 79.059213] [ 79.060712] CPU: 3 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 79.060720] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 79.060723] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 79.060727] Call Trace: [ 79.060728] <TASK> [ 79.060730] dump_stack_lvl+0x73/0xb0 [ 79.060735] print_report+0xd1/0x650 [ 79.060739] ? __virt_addr_valid+0x1db/0x2d0 [ 79.060743] ? strncpy_from_user+0x2e/0x1d0 [ 79.060747] ? kasan_complete_mode_report_info+0x2a/0x200 [ 79.060753] ? strncpy_from_user+0x2e/0x1d0 [ 79.060757] kasan_report+0x141/0x180 [ 79.060761] ? strncpy_from_user+0x2e/0x1d0 [ 79.060767] kasan_check_range+0x10c/0x1c0 [ 79.060771] __kasan_check_write+0x18/0x20 [ 79.060775] strncpy_from_user+0x2e/0x1d0 [ 79.060779] ? __kasan_check_read+0x15/0x20 [ 79.060783] copy_user_test_oob+0x760/0x10f0 [ 79.060788] ? __pfx_copy_user_test_oob+0x10/0x10 [ 79.060793] ? finish_task_switch.isra.0+0x153/0x700 [ 79.060797] ? __switch_to+0x544/0xf50 [ 79.060802] ? __schedule+0x10cc/0x2b60 [ 79.060806] ? ktime_get_ts64+0x83/0x230 [ 79.060810] kunit_try_run_case+0x1a2/0x480 [ 79.060815] ? __pfx_kunit_try_run_case+0x10/0x10 [ 79.060819] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 79.060824] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 79.060828] ? __kthread_parkme+0x82/0x180 [ 79.060832] ? preempt_count_sub+0x50/0x80 [ 79.060836] ? __pfx_kunit_try_run_case+0x10/0x10 [ 79.060841] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 79.060845] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 79.060850] kthread+0x334/0x6f0 [ 79.060853] ? trace_preempt_on+0x20/0xc0 [ 79.060857] ? __pfx_kthread+0x10/0x10 [ 79.060861] ? _raw_spin_unlock_irq+0x47/0x80 [ 79.060865] ? calculate_sigpending+0x7b/0xa0 [ 79.060870] ? __pfx_kthread+0x10/0x10 [ 79.060874] ret_from_fork+0x113/0x1d0 [ 79.060878] ? __pfx_kthread+0x10/0x10 [ 79.060881] ret_from_fork_asm+0x1a/0x30 [ 79.060887] </TASK> [ 79.060889] [ 79.246046] Allocated by task 326: [ 79.249452] kasan_save_stack+0x45/0x70 [ 79.253293] kasan_save_track+0x18/0x40 [ 79.257133] kasan_save_alloc_info+0x3b/0x50 [ 79.261421] __kasan_kmalloc+0xb7/0xc0 [ 79.265176] __kmalloc_noprof+0x1c9/0x500 [ 79.269189] kunit_kmalloc_array+0x25/0x60 [ 79.273297] copy_user_test_oob+0xab/0x10f0 [ 79.277492] kunit_try_run_case+0x1a2/0x480 [ 79.281684] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 79.287086] kthread+0x334/0x6f0 [ 79.290325] ret_from_fork+0x113/0x1d0 [ 79.294155] ret_from_fork_asm+0x1a/0x30 [ 79.298081] [ 79.299581] The buggy address belongs to the object at ffff8881066e9300 [ 79.299581] which belongs to the cache kmalloc-128 of size 128 [ 79.312098] The buggy address is located 0 bytes inside of [ 79.312098] allocated 120-byte region [ffff8881066e9300, ffff8881066e9378) [ 79.324525] [ 79.326022] The buggy address belongs to the physical page: [ 79.331596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e9 [ 79.339596] flags: 0x200000000000000(node=0|zone=2) [ 79.344476] page_type: f5(slab) [ 79.347622] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 79.355406] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 79.363150] page dumped because: kasan: bad access detected [ 79.368723] [ 79.370224] Memory state around the buggy address: [ 79.375016] ffff8881066e9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 79.382235] ffff8881066e9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.389456] >ffff8881066e9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 79.396683] ^ [ 79.403815] ffff8881066e9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.411035] ffff8881066e9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.418254] ================================================================== [ 79.425481] ================================================================== [ 79.432727] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a5/0x1d0 [ 79.439686] Write of size 1 at addr ffff8881066e9378 by task kunit_try_catch/326 [ 79.447080] [ 79.448581] CPU: 3 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 79.448589] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 79.448592] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 79.448595] Call Trace: [ 79.448597] <TASK> [ 79.448599] dump_stack_lvl+0x73/0xb0 [ 79.448603] print_report+0xd1/0x650 [ 79.448607] ? __virt_addr_valid+0x1db/0x2d0 [ 79.448611] ? strncpy_from_user+0x1a5/0x1d0 [ 79.448616] ? kasan_complete_mode_report_info+0x2a/0x200 [ 79.448621] ? strncpy_from_user+0x1a5/0x1d0 [ 79.448626] kasan_report+0x141/0x180 [ 79.448630] ? strncpy_from_user+0x1a5/0x1d0 [ 79.448635] __asan_report_store1_noabort+0x1b/0x30 [ 79.448640] strncpy_from_user+0x1a5/0x1d0 [ 79.448645] copy_user_test_oob+0x760/0x10f0 [ 79.448650] ? __pfx_copy_user_test_oob+0x10/0x10 [ 79.448655] ? finish_task_switch.isra.0+0x153/0x700 [ 79.448659] ? __switch_to+0x544/0xf50 [ 79.448664] ? __schedule+0x10cc/0x2b60 [ 79.448668] ? ktime_get_ts64+0x83/0x230 [ 79.448672] kunit_try_run_case+0x1a2/0x480 [ 79.448677] ? __pfx_kunit_try_run_case+0x10/0x10 [ 79.448681] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 79.448686] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 79.448690] ? __kthread_parkme+0x82/0x180 [ 79.448694] ? preempt_count_sub+0x50/0x80 [ 79.448698] ? __pfx_kunit_try_run_case+0x10/0x10 [ 79.448703] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 79.448707] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 79.448712] kthread+0x334/0x6f0 [ 79.448715] ? trace_preempt_on+0x20/0xc0 [ 79.448719] ? __pfx_kthread+0x10/0x10 [ 79.448723] ? _raw_spin_unlock_irq+0x47/0x80 [ 79.448727] ? calculate_sigpending+0x7b/0xa0 [ 79.448732] ? __pfx_kthread+0x10/0x10 [ 79.448736] ret_from_fork+0x113/0x1d0 [ 79.448740] ? __pfx_kthread+0x10/0x10 [ 79.448744] ret_from_fork_asm+0x1a/0x30 [ 79.448749] </TASK> [ 79.448751] [ 79.626763] Allocated by task 326: [ 79.630170] kasan_save_stack+0x45/0x70 [ 79.634011] kasan_save_track+0x18/0x40 [ 79.637857] kasan_save_alloc_info+0x3b/0x50 [ 79.642130] __kasan_kmalloc+0xb7/0xc0 [ 79.645882] __kmalloc_noprof+0x1c9/0x500 [ 79.649896] kunit_kmalloc_array+0x25/0x60 [ 79.653994] copy_user_test_oob+0xab/0x10f0 [ 79.658179] kunit_try_run_case+0x1a2/0x480 [ 79.662380] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 79.667808] kthread+0x334/0x6f0 [ 79.671041] ret_from_fork+0x113/0x1d0 [ 79.674795] ret_from_fork_asm+0x1a/0x30 [ 79.678720] [ 79.680219] The buggy address belongs to the object at ffff8881066e9300 [ 79.680219] which belongs to the cache kmalloc-128 of size 128 [ 79.692725] The buggy address is located 0 bytes to the right of [ 79.692725] allocated 120-byte region [ffff8881066e9300, ffff8881066e9378) [ 79.705673] [ 79.707174] The buggy address belongs to the physical page: [ 79.712746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e9 [ 79.720755] flags: 0x200000000000000(node=0|zone=2) [ 79.725641] page_type: f5(slab) [ 79.728789] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 79.736538] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 79.744284] page dumped because: kasan: bad access detected [ 79.749855] [ 79.751363] Memory state around the buggy address: [ 79.756185] ffff8881066e9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 79.763425] ffff8881066e9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.770647] >ffff8881066e9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 79.777868] ^ [ 79.784998] ffff8881066e9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.792218] ffff8881066e9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.799437] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 78.275945] ================================================================== [ 78.283177] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x557/0x10f0 [ 78.290317] Write of size 121 at addr ffff8881066e9300 by task kunit_try_catch/326 [ 78.297919] [ 78.299420] CPU: 3 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 78.299429] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 78.299432] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 78.299435] Call Trace: [ 78.299437] <TASK> [ 78.299439] dump_stack_lvl+0x73/0xb0 [ 78.299443] print_report+0xd1/0x650 [ 78.299448] ? __virt_addr_valid+0x1db/0x2d0 [ 78.299452] ? copy_user_test_oob+0x557/0x10f0 [ 78.299456] ? kasan_complete_mode_report_info+0x2a/0x200 [ 78.299461] ? copy_user_test_oob+0x557/0x10f0 [ 78.299466] kasan_report+0x141/0x180 [ 78.299470] ? copy_user_test_oob+0x557/0x10f0 [ 78.299476] kasan_check_range+0x10c/0x1c0 [ 78.299480] __kasan_check_write+0x18/0x20 [ 78.299484] copy_user_test_oob+0x557/0x10f0 [ 78.299489] ? __pfx_copy_user_test_oob+0x10/0x10 [ 78.299493] ? finish_task_switch.isra.0+0x153/0x700 [ 78.299498] ? __switch_to+0x544/0xf50 [ 78.299502] ? __schedule+0x10cc/0x2b60 [ 78.299507] ? ktime_get_ts64+0x83/0x230 [ 78.299511] kunit_try_run_case+0x1a2/0x480 [ 78.299516] ? __pfx_kunit_try_run_case+0x10/0x10 [ 78.299520] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 78.299525] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 78.299529] ? __kthread_parkme+0x82/0x180 [ 78.299533] ? preempt_count_sub+0x50/0x80 [ 78.299537] ? __pfx_kunit_try_run_case+0x10/0x10 [ 78.299542] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 78.299546] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 78.299550] kthread+0x334/0x6f0 [ 78.299554] ? trace_preempt_on+0x20/0xc0 [ 78.299558] ? __pfx_kthread+0x10/0x10 [ 78.299562] ? _raw_spin_unlock_irq+0x47/0x80 [ 78.299566] ? calculate_sigpending+0x7b/0xa0 [ 78.299571] ? __pfx_kthread+0x10/0x10 [ 78.299575] ret_from_fork+0x113/0x1d0 [ 78.299578] ? __pfx_kthread+0x10/0x10 [ 78.299582] ret_from_fork_asm+0x1a/0x30 [ 78.299588] </TASK> [ 78.299590] [ 78.477467] Allocated by task 326: [ 78.480872] kasan_save_stack+0x45/0x70 [ 78.484712] kasan_save_track+0x18/0x40 [ 78.488558] kasan_save_alloc_info+0x3b/0x50 [ 78.492832] __kasan_kmalloc+0xb7/0xc0 [ 78.496584] __kmalloc_noprof+0x1c9/0x500 [ 78.500595] kunit_kmalloc_array+0x25/0x60 [ 78.504694] copy_user_test_oob+0xab/0x10f0 [ 78.508882] kunit_try_run_case+0x1a2/0x480 [ 78.513067] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 78.518466] kthread+0x334/0x6f0 [ 78.521699] ret_from_fork+0x113/0x1d0 [ 78.525451] ret_from_fork_asm+0x1a/0x30 [ 78.529399] [ 78.530904] The buggy address belongs to the object at ffff8881066e9300 [ 78.530904] which belongs to the cache kmalloc-128 of size 128 [ 78.543420] The buggy address is located 0 bytes inside of [ 78.543420] allocated 120-byte region [ffff8881066e9300, ffff8881066e9378) [ 78.555856] [ 78.557376] The buggy address belongs to the physical page: [ 78.562980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e9 [ 78.570986] flags: 0x200000000000000(node=0|zone=2) [ 78.575867] page_type: f5(slab) [ 78.579012] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 78.586753] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 78.594501] page dumped because: kasan: bad access detected [ 78.600072] [ 78.601570] Memory state around the buggy address: [ 78.606377] ffff8881066e9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 78.613626] ffff8881066e9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.620846] >ffff8881066e9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 78.628067] ^ [ 78.635199] ffff8881066e9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.642421] ffff8881066e9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.649646] ================================================================== [ 78.656888] ================================================================== [ 78.664120] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x604/0x10f0 [ 78.671261] Read of size 121 at addr ffff8881066e9300 by task kunit_try_catch/326 [ 78.678746] [ 78.680248] CPU: 3 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 78.680257] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 78.680260] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 78.680263] Call Trace: [ 78.680265] <TASK> [ 78.680267] dump_stack_lvl+0x73/0xb0 [ 78.680271] print_report+0xd1/0x650 [ 78.680275] ? __virt_addr_valid+0x1db/0x2d0 [ 78.680279] ? copy_user_test_oob+0x604/0x10f0 [ 78.680284] ? kasan_complete_mode_report_info+0x2a/0x200 [ 78.680289] ? copy_user_test_oob+0x604/0x10f0 [ 78.680294] kasan_report+0x141/0x180 [ 78.680298] ? copy_user_test_oob+0x604/0x10f0 [ 78.680304] kasan_check_range+0x10c/0x1c0 [ 78.680308] __kasan_check_read+0x15/0x20 [ 78.680312] copy_user_test_oob+0x604/0x10f0 [ 78.680317] ? __pfx_copy_user_test_oob+0x10/0x10 [ 78.680321] ? finish_task_switch.isra.0+0x153/0x700 [ 78.680346] ? __switch_to+0x544/0xf50 [ 78.680351] ? __schedule+0x10cc/0x2b60 [ 78.680355] ? ktime_get_ts64+0x83/0x230 [ 78.680360] kunit_try_run_case+0x1a2/0x480 [ 78.680365] ? __pfx_kunit_try_run_case+0x10/0x10 [ 78.680382] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 78.680386] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 78.680391] ? __kthread_parkme+0x82/0x180 [ 78.680394] ? preempt_count_sub+0x50/0x80 [ 78.680399] ? __pfx_kunit_try_run_case+0x10/0x10 [ 78.680403] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 78.680408] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 78.680412] kthread+0x334/0x6f0 [ 78.680416] ? trace_preempt_on+0x20/0xc0 [ 78.680420] ? __pfx_kthread+0x10/0x10 [ 78.680424] ? _raw_spin_unlock_irq+0x47/0x80 [ 78.680428] ? calculate_sigpending+0x7b/0xa0 [ 78.680433] ? __pfx_kthread+0x10/0x10 [ 78.680437] ret_from_fork+0x113/0x1d0 [ 78.680440] ? __pfx_kthread+0x10/0x10 [ 78.680444] ret_from_fork_asm+0x1a/0x30 [ 78.680450] </TASK> [ 78.680452] [ 78.858103] Allocated by task 326: [ 78.861510] kasan_save_stack+0x45/0x70 [ 78.865364] kasan_save_track+0x18/0x40 [ 78.869248] kasan_save_alloc_info+0x3b/0x50 [ 78.873522] __kasan_kmalloc+0xb7/0xc0 [ 78.877273] __kmalloc_noprof+0x1c9/0x500 [ 78.881287] kunit_kmalloc_array+0x25/0x60 [ 78.885393] copy_user_test_oob+0xab/0x10f0 [ 78.889581] kunit_try_run_case+0x1a2/0x480 [ 78.893767] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 78.899166] kthread+0x334/0x6f0 [ 78.902399] ret_from_fork+0x113/0x1d0 [ 78.906178] ret_from_fork_asm+0x1a/0x30 [ 78.910113] [ 78.911610] The buggy address belongs to the object at ffff8881066e9300 [ 78.911610] which belongs to the cache kmalloc-128 of size 128 [ 78.924119] The buggy address is located 0 bytes inside of [ 78.924119] allocated 120-byte region [ffff8881066e9300, ffff8881066e9378) [ 78.936555] [ 78.938052] The buggy address belongs to the physical page: [ 78.943627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e9 [ 78.951634] flags: 0x200000000000000(node=0|zone=2) [ 78.956512] page_type: f5(slab) [ 78.959660] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 78.967430] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 78.975173] page dumped because: kasan: bad access detected [ 78.980746] [ 78.982245] Memory state around the buggy address: [ 78.987038] ffff8881066e9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 78.994266] ffff8881066e9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.001494] >ffff8881066e9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 79.008714] ^ [ 79.015853] ffff8881066e9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.023073] ffff8881066e9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.030292] ================================================================== [ 77.895457] ================================================================== [ 77.902685] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4aa/0x10f0 [ 77.909819] Read of size 121 at addr ffff8881066e9300 by task kunit_try_catch/326 [ 77.917307] [ 77.918808] CPU: 3 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 77.918817] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 77.918820] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 77.918823] Call Trace: [ 77.918825] <TASK> [ 77.918827] dump_stack_lvl+0x73/0xb0 [ 77.918831] print_report+0xd1/0x650 [ 77.918835] ? __virt_addr_valid+0x1db/0x2d0 [ 77.918840] ? copy_user_test_oob+0x4aa/0x10f0 [ 77.918844] ? kasan_complete_mode_report_info+0x2a/0x200 [ 77.918849] ? copy_user_test_oob+0x4aa/0x10f0 [ 77.918854] kasan_report+0x141/0x180 [ 77.918858] ? copy_user_test_oob+0x4aa/0x10f0 [ 77.918864] kasan_check_range+0x10c/0x1c0 [ 77.918869] __kasan_check_read+0x15/0x20 [ 77.918872] copy_user_test_oob+0x4aa/0x10f0 [ 77.918877] ? __pfx_copy_user_test_oob+0x10/0x10 [ 77.918882] ? finish_task_switch.isra.0+0x153/0x700 [ 77.918886] ? __switch_to+0x544/0xf50 [ 77.918891] ? __schedule+0x10cc/0x2b60 [ 77.918895] ? ktime_get_ts64+0x83/0x230 [ 77.918899] kunit_try_run_case+0x1a2/0x480 [ 77.918904] ? __pfx_kunit_try_run_case+0x10/0x10 [ 77.918908] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 77.918913] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 77.918917] ? __kthread_parkme+0x82/0x180 [ 77.918921] ? preempt_count_sub+0x50/0x80 [ 77.918925] ? __pfx_kunit_try_run_case+0x10/0x10 [ 77.918930] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 77.918934] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 77.918939] kthread+0x334/0x6f0 [ 77.918942] ? trace_preempt_on+0x20/0xc0 [ 77.918947] ? __pfx_kthread+0x10/0x10 [ 77.918951] ? _raw_spin_unlock_irq+0x47/0x80 [ 77.918955] ? calculate_sigpending+0x7b/0xa0 [ 77.918959] ? __pfx_kthread+0x10/0x10 [ 77.918963] ret_from_fork+0x113/0x1d0 [ 77.918967] ? __pfx_kthread+0x10/0x10 [ 77.918971] ret_from_fork_asm+0x1a/0x30 [ 77.918977] </TASK> [ 77.918978] [ 78.096618] Allocated by task 326: [ 78.100026] kasan_save_stack+0x45/0x70 [ 78.103874] kasan_save_track+0x18/0x40 [ 78.107720] kasan_save_alloc_info+0x3b/0x50 [ 78.111994] __kasan_kmalloc+0xb7/0xc0 [ 78.115746] __kmalloc_noprof+0x1c9/0x500 [ 78.119760] kunit_kmalloc_array+0x25/0x60 [ 78.123866] copy_user_test_oob+0xab/0x10f0 [ 78.128053] kunit_try_run_case+0x1a2/0x480 [ 78.132238] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 78.137639] kthread+0x334/0x6f0 [ 78.140872] ret_from_fork+0x113/0x1d0 [ 78.144623] ret_from_fork_asm+0x1a/0x30 [ 78.148549] [ 78.150048] The buggy address belongs to the object at ffff8881066e9300 [ 78.150048] which belongs to the cache kmalloc-128 of size 128 [ 78.162562] The buggy address is located 0 bytes inside of [ 78.162562] allocated 120-byte region [ffff8881066e9300, ffff8881066e9378) [ 78.174990] [ 78.176491] The buggy address belongs to the physical page: [ 78.182062] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e9 [ 78.190063] flags: 0x200000000000000(node=0|zone=2) [ 78.194942] page_type: f5(slab) [ 78.198090] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 78.205836] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 78.213575] page dumped because: kasan: bad access detected [ 78.219147] [ 78.220648] Memory state around the buggy address: [ 78.225439] ffff8881066e9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 78.232659] ffff8881066e9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.239878] >ffff8881066e9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 78.247097] ^ [ 78.254231] ffff8881066e9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.261451] ffff8881066e9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.268678] ================================================================== [ 77.514557] ================================================================== [ 77.521788] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3fd/0x10f0 [ 77.528930] Write of size 121 at addr ffff8881066e9300 by task kunit_try_catch/326 [ 77.536503] [ 77.538004] CPU: 3 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 77.538013] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 77.538016] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 77.538019] Call Trace: [ 77.538021] <TASK> [ 77.538023] dump_stack_lvl+0x73/0xb0 [ 77.538028] print_report+0xd1/0x650 [ 77.538032] ? __virt_addr_valid+0x1db/0x2d0 [ 77.538036] ? copy_user_test_oob+0x3fd/0x10f0 [ 77.538041] ? kasan_complete_mode_report_info+0x2a/0x200 [ 77.538046] ? copy_user_test_oob+0x3fd/0x10f0 [ 77.538051] kasan_report+0x141/0x180 [ 77.538055] ? copy_user_test_oob+0x3fd/0x10f0 [ 77.538061] kasan_check_range+0x10c/0x1c0 [ 77.538065] __kasan_check_write+0x18/0x20 [ 77.538069] copy_user_test_oob+0x3fd/0x10f0 [ 77.538074] ? __pfx_copy_user_test_oob+0x10/0x10 [ 77.538078] ? finish_task_switch.isra.0+0x153/0x700 [ 77.538083] ? __switch_to+0x544/0xf50 [ 77.538088] ? __schedule+0x10cc/0x2b60 [ 77.538092] ? ktime_get_ts64+0x83/0x230 [ 77.538096] kunit_try_run_case+0x1a2/0x480 [ 77.538101] ? __pfx_kunit_try_run_case+0x10/0x10 [ 77.538106] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 77.538110] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 77.538114] ? __kthread_parkme+0x82/0x180 [ 77.538118] ? preempt_count_sub+0x50/0x80 [ 77.538122] ? __pfx_kunit_try_run_case+0x10/0x10 [ 77.538127] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 77.538131] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 77.538136] kthread+0x334/0x6f0 [ 77.538140] ? trace_preempt_on+0x20/0xc0 [ 77.538144] ? __pfx_kthread+0x10/0x10 [ 77.538148] ? _raw_spin_unlock_irq+0x47/0x80 [ 77.538152] ? calculate_sigpending+0x7b/0xa0 [ 77.538157] ? __pfx_kthread+0x10/0x10 [ 77.538161] ret_from_fork+0x113/0x1d0 [ 77.538164] ? __pfx_kthread+0x10/0x10 [ 77.538168] ret_from_fork_asm+0x1a/0x30 [ 77.538174] </TASK> [ 77.538176] [ 77.715980] Allocated by task 326: [ 77.719393] kasan_save_stack+0x45/0x70 [ 77.723236] kasan_save_track+0x18/0x40 [ 77.727072] kasan_save_alloc_info+0x3b/0x50 [ 77.731364] __kasan_kmalloc+0xb7/0xc0 [ 77.735167] __kmalloc_noprof+0x1c9/0x500 [ 77.739180] kunit_kmalloc_array+0x25/0x60 [ 77.743282] copy_user_test_oob+0xab/0x10f0 [ 77.747476] kunit_try_run_case+0x1a2/0x480 [ 77.751661] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 77.757062] kthread+0x334/0x6f0 [ 77.760294] ret_from_fork+0x113/0x1d0 [ 77.764045] ret_from_fork_asm+0x1a/0x30 [ 77.767971] [ 77.769473] The buggy address belongs to the object at ffff8881066e9300 [ 77.769473] which belongs to the cache kmalloc-128 of size 128 [ 77.781986] The buggy address is located 0 bytes inside of [ 77.781986] allocated 120-byte region [ffff8881066e9300, ffff8881066e9378) [ 77.794419] [ 77.795921] The buggy address belongs to the physical page: [ 77.801493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e9 [ 77.809494] flags: 0x200000000000000(node=0|zone=2) [ 77.814386] page_type: f5(slab) [ 77.817564] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 77.825312] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 77.833059] page dumped because: kasan: bad access detected [ 77.838631] [ 77.840131] Memory state around the buggy address: [ 77.844922] ffff8881066e9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 77.852144] ffff8881066e9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.859382] >ffff8881066e9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 77.866633] ^ [ 77.873764] ffff8881066e9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.880984] ffff8881066e9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.888203] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-_copy_to_user
[ 77.132912] ================================================================== [ 77.140145] BUG: KASAN: slab-out-of-bounds in _copy_to_user+0x3c/0x70 [ 77.146592] Read of size 121 at addr ffff8881066e9300 by task kunit_try_catch/326 [ 77.154070] [ 77.155571] CPU: 3 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 77.155580] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 77.155583] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 77.155586] Call Trace: [ 77.155588] <TASK> [ 77.155590] dump_stack_lvl+0x73/0xb0 [ 77.155595] print_report+0xd1/0x650 [ 77.155599] ? __virt_addr_valid+0x1db/0x2d0 [ 77.155603] ? _copy_to_user+0x3c/0x70 [ 77.155607] ? kasan_complete_mode_report_info+0x2a/0x200 [ 77.155612] ? _copy_to_user+0x3c/0x70 [ 77.155615] kasan_report+0x141/0x180 [ 77.155620] ? _copy_to_user+0x3c/0x70 [ 77.155624] kasan_check_range+0x10c/0x1c0 [ 77.155629] __kasan_check_read+0x15/0x20 [ 77.155632] _copy_to_user+0x3c/0x70 [ 77.155635] copy_user_test_oob+0x364/0x10f0 [ 77.155641] ? __pfx_copy_user_test_oob+0x10/0x10 [ 77.155645] ? finish_task_switch.isra.0+0x153/0x700 [ 77.155650] ? __switch_to+0x544/0xf50 [ 77.155655] ? __schedule+0x10cc/0x2b60 [ 77.155659] ? ktime_get_ts64+0x83/0x230 [ 77.155663] kunit_try_run_case+0x1a2/0x480 [ 77.155668] ? __pfx_kunit_try_run_case+0x10/0x10 [ 77.155672] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 77.155677] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 77.155681] ? __kthread_parkme+0x82/0x180 [ 77.155685] ? preempt_count_sub+0x50/0x80 [ 77.155689] ? __pfx_kunit_try_run_case+0x10/0x10 [ 77.155694] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 77.155698] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 77.155703] kthread+0x334/0x6f0 [ 77.155707] ? trace_preempt_on+0x20/0xc0 [ 77.155711] ? __pfx_kthread+0x10/0x10 [ 77.155715] ? _raw_spin_unlock_irq+0x47/0x80 [ 77.155719] ? calculate_sigpending+0x7b/0xa0 [ 77.155724] ? __pfx_kthread+0x10/0x10 [ 77.155728] ret_from_fork+0x113/0x1d0 [ 77.155731] ? __pfx_kthread+0x10/0x10 [ 77.155735] ret_from_fork_asm+0x1a/0x30 [ 77.155741] </TASK> [ 77.155743] [ 77.335083] Allocated by task 326: [ 77.338489] kasan_save_stack+0x45/0x70 [ 77.342347] kasan_save_track+0x18/0x40 [ 77.346246] kasan_save_alloc_info+0x3b/0x50 [ 77.350525] __kasan_kmalloc+0xb7/0xc0 [ 77.354279] __kmalloc_noprof+0x1c9/0x500 [ 77.358292] kunit_kmalloc_array+0x25/0x60 [ 77.362394] copy_user_test_oob+0xab/0x10f0 [ 77.366584] kunit_try_run_case+0x1a2/0x480 [ 77.370771] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 77.376172] kthread+0x334/0x6f0 [ 77.379418] ret_from_fork+0x113/0x1d0 [ 77.383172] ret_from_fork_asm+0x1a/0x30 [ 77.387099] [ 77.388597] The buggy address belongs to the object at ffff8881066e9300 [ 77.388597] which belongs to the cache kmalloc-128 of size 128 [ 77.401107] The buggy address is located 0 bytes inside of [ 77.401107] allocated 120-byte region [ffff8881066e9300, ffff8881066e9378) [ 77.413540] [ 77.415042] The buggy address belongs to the physical page: [ 77.420613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e9 [ 77.428612] flags: 0x200000000000000(node=0|zone=2) [ 77.433492] page_type: f5(slab) [ 77.436641] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 77.444417] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 77.452159] page dumped because: kasan: bad access detected [ 77.457734] [ 77.459232] Memory state around the buggy address: [ 77.464025] ffff8881066e9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 77.471253] ffff8881066e9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.478471] >ffff8881066e9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 77.485691] ^ [ 77.492823] ffff8881066e9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.500043] ffff8881066e9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.507261] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-_copy_from_user
[ 76.744116] ================================================================== [ 76.757444] BUG: KASAN: slab-out-of-bounds in _copy_from_user+0x32/0x90 [ 76.764064] Write of size 121 at addr ffff8881066e9300 by task kunit_try_catch/326 [ 76.771632] [ 76.773131] CPU: 3 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 76.773140] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 76.773143] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 76.773147] Call Trace: [ 76.773149] <TASK> [ 76.773151] dump_stack_lvl+0x73/0xb0 [ 76.773156] print_report+0xd1/0x650 [ 76.773161] ? __virt_addr_valid+0x1db/0x2d0 [ 76.773165] ? _copy_from_user+0x32/0x90 [ 76.773168] ? kasan_complete_mode_report_info+0x2a/0x200 [ 76.773174] ? _copy_from_user+0x32/0x90 [ 76.773177] kasan_report+0x141/0x180 [ 76.773181] ? _copy_from_user+0x32/0x90 [ 76.773186] kasan_check_range+0x10c/0x1c0 [ 76.773190] __kasan_check_write+0x18/0x20 [ 76.773194] _copy_from_user+0x32/0x90 [ 76.773198] copy_user_test_oob+0x2be/0x10f0 [ 76.773203] ? __pfx_copy_user_test_oob+0x10/0x10 [ 76.773207] ? finish_task_switch.isra.0+0x153/0x700 [ 76.773212] ? __switch_to+0x544/0xf50 [ 76.773217] ? __schedule+0x10cc/0x2b60 [ 76.773221] ? ktime_get_ts64+0x83/0x230 [ 76.773225] kunit_try_run_case+0x1a2/0x480 [ 76.773230] ? __pfx_kunit_try_run_case+0x10/0x10 [ 76.773235] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 76.773239] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 76.773244] ? __kthread_parkme+0x82/0x180 [ 76.773247] ? preempt_count_sub+0x50/0x80 [ 76.773252] ? __pfx_kunit_try_run_case+0x10/0x10 [ 76.773256] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 76.773261] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 76.773265] kthread+0x334/0x6f0 [ 76.773269] ? trace_preempt_on+0x20/0xc0 [ 76.773273] ? __pfx_kthread+0x10/0x10 [ 76.773277] ? _raw_spin_unlock_irq+0x47/0x80 [ 76.773281] ? calculate_sigpending+0x7b/0xa0 [ 76.773286] ? __pfx_kthread+0x10/0x10 [ 76.773290] ret_from_fork+0x113/0x1d0 [ 76.773294] ? __pfx_kthread+0x10/0x10 [ 76.773297] ret_from_fork_asm+0x1a/0x30 [ 76.773304] </TASK> [ 76.773305] [ 76.953301] Allocated by task 326: [ 76.956706] kasan_save_stack+0x45/0x70 [ 76.960547] kasan_save_track+0x18/0x40 [ 76.964392] kasan_save_alloc_info+0x3b/0x50 [ 76.968685] __kasan_kmalloc+0xb7/0xc0 [ 76.972437] __kmalloc_noprof+0x1c9/0x500 [ 76.976450] kunit_kmalloc_array+0x25/0x60 [ 76.980557] copy_user_test_oob+0xab/0x10f0 [ 76.984742] kunit_try_run_case+0x1a2/0x480 [ 76.988929] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 76.994346] kthread+0x334/0x6f0 [ 76.997613] ret_from_fork+0x113/0x1d0 [ 77.001365] ret_from_fork_asm+0x1a/0x30 [ 77.005362] [ 77.006903] The buggy address belongs to the object at ffff8881066e9300 [ 77.006903] which belongs to the cache kmalloc-128 of size 128 [ 77.019418] The buggy address is located 0 bytes inside of [ 77.019418] allocated 120-byte region [ffff8881066e9300, ffff8881066e9378) [ 77.031847] [ 77.033362] The buggy address belongs to the physical page: [ 77.038962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e9 [ 77.046970] flags: 0x200000000000000(node=0|zone=2) [ 77.051849] page_type: f5(slab) [ 77.054995] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 77.062743] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 77.070480] page dumped because: kasan: bad access detected [ 77.076054] [ 77.077553] Memory state around the buggy address: [ 77.082362] ffff8881066e9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 77.089602] ffff8881066e9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.096828] >ffff8881066e9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 77.104047] ^ [ 77.111182] ffff8881066e9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.118432] ffff8881066e9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.125653] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 76.353990] ================================================================== [ 76.361240] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260 [ 76.368554] Write of size 8 at addr ffff888100cff178 by task kunit_try_catch/322 [ 76.375948] [ 76.377449] CPU: 0 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 76.377458] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 76.377461] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 76.377465] Call Trace: [ 76.377466] <TASK> [ 76.377468] dump_stack_lvl+0x73/0xb0 [ 76.377473] print_report+0xd1/0x650 [ 76.377477] ? __virt_addr_valid+0x1db/0x2d0 [ 76.377482] ? copy_to_kernel_nofault+0x99/0x260 [ 76.377486] ? kasan_complete_mode_report_info+0x2a/0x200 [ 76.377492] ? copy_to_kernel_nofault+0x99/0x260 [ 76.377496] kasan_report+0x141/0x180 [ 76.377500] ? copy_to_kernel_nofault+0x99/0x260 [ 76.377506] kasan_check_range+0x10c/0x1c0 [ 76.377510] __kasan_check_write+0x18/0x20 [ 76.377514] copy_to_kernel_nofault+0x99/0x260 [ 76.377519] copy_to_kernel_nofault_oob+0x288/0x560 [ 76.377523] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 76.377528] ? finish_task_switch.isra.0+0x153/0x700 [ 76.377532] ? __schedule+0x10cc/0x2b60 [ 76.377536] ? trace_hardirqs_on+0x37/0xe0 [ 76.377542] ? ktime_get_ts64+0x83/0x230 [ 76.377546] kunit_try_run_case+0x1a2/0x480 [ 76.377551] ? __pfx_kunit_try_run_case+0x10/0x10 [ 76.377556] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 76.377560] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 76.377564] ? __kthread_parkme+0x82/0x180 [ 76.377568] ? preempt_count_sub+0x50/0x80 [ 76.377573] ? __pfx_kunit_try_run_case+0x10/0x10 [ 76.377577] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 76.377582] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 76.377586] kthread+0x334/0x6f0 [ 76.377590] ? trace_preempt_on+0x20/0xc0 [ 76.377594] ? __pfx_kthread+0x10/0x10 [ 76.377598] ? _raw_spin_unlock_irq+0x47/0x80 [ 76.377602] ? calculate_sigpending+0x7b/0xa0 [ 76.377606] ? __pfx_kthread+0x10/0x10 [ 76.377611] ret_from_fork+0x113/0x1d0 [ 76.377614] ? __pfx_kthread+0x10/0x10 [ 76.377618] ret_from_fork_asm+0x1a/0x30 [ 76.377624] </TASK> [ 76.377626] [ 76.561967] Allocated by task 322: [ 76.565373] kasan_save_stack+0x45/0x70 [ 76.569212] kasan_save_track+0x18/0x40 [ 76.573051] kasan_save_alloc_info+0x3b/0x50 [ 76.577325] __kasan_kmalloc+0xb7/0xc0 [ 76.581111] __kmalloc_cache_noprof+0x189/0x420 [ 76.585646] copy_to_kernel_nofault_oob+0x12f/0x560 [ 76.590534] kunit_try_run_case+0x1a2/0x480 [ 76.594726] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 76.600126] kthread+0x334/0x6f0 [ 76.603363] ret_from_fork+0x113/0x1d0 [ 76.607122] ret_from_fork_asm+0x1a/0x30 [ 76.611055] [ 76.612555] The buggy address belongs to the object at ffff888100cff100 [ 76.612555] which belongs to the cache kmalloc-128 of size 128 [ 76.625070] The buggy address is located 0 bytes to the right of [ 76.625070] allocated 120-byte region [ffff888100cff100, ffff888100cff178) [ 76.638025] [ 76.639524] The buggy address belongs to the physical page: [ 76.645099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cff [ 76.653105] flags: 0x200000000000000(node=0|zone=2) [ 76.657984] page_type: f5(slab) [ 76.661133] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 76.668881] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 76.676628] page dumped because: kasan: bad access detected [ 76.682199] [ 76.683698] Memory state around the buggy address: [ 76.688493] ffff888100cff000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.695721] ffff888100cff080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.702948] >ffff888100cff100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 76.710166] ^ [ 76.717298] ffff888100cff180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.724519] ffff888100cff200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.731738] ================================================================== [ 75.964511] ================================================================== [ 75.979398] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260 [ 75.986806] Read of size 8 at addr ffff888100cff178 by task kunit_try_catch/322 [ 75.994112] [ 75.995613] CPU: 0 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 75.995622] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 75.995626] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 75.995629] Call Trace: [ 75.995631] <TASK> [ 75.995633] dump_stack_lvl+0x73/0xb0 [ 75.995639] print_report+0xd1/0x650 [ 75.995643] ? __virt_addr_valid+0x1db/0x2d0 [ 75.995647] ? copy_to_kernel_nofault+0x225/0x260 [ 75.995652] ? kasan_complete_mode_report_info+0x2a/0x200 [ 75.995657] ? copy_to_kernel_nofault+0x225/0x260 [ 75.995662] kasan_report+0x141/0x180 [ 75.995666] ? copy_to_kernel_nofault+0x225/0x260 [ 75.995672] __asan_report_load8_noabort+0x18/0x20 [ 75.995677] copy_to_kernel_nofault+0x225/0x260 [ 75.995681] copy_to_kernel_nofault_oob+0x1ed/0x560 [ 75.995686] ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10 [ 75.995690] ? finish_task_switch.isra.0+0x153/0x700 [ 75.995695] ? __schedule+0x10cc/0x2b60 [ 75.995699] ? trace_hardirqs_on+0x37/0xe0 [ 75.995705] ? ktime_get_ts64+0x83/0x230 [ 75.995709] kunit_try_run_case+0x1a2/0x480 [ 75.995714] ? __pfx_kunit_try_run_case+0x10/0x10 [ 75.995718] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 75.995723] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 75.995727] ? __kthread_parkme+0x82/0x180 [ 75.995731] ? preempt_count_sub+0x50/0x80 [ 75.995736] ? __pfx_kunit_try_run_case+0x10/0x10 [ 75.995740] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 75.995745] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 75.995749] kthread+0x334/0x6f0 [ 75.995753] ? trace_preempt_on+0x20/0xc0 [ 75.995757] ? __pfx_kthread+0x10/0x10 [ 75.995761] ? _raw_spin_unlock_irq+0x47/0x80 [ 75.995765] ? calculate_sigpending+0x7b/0xa0 [ 75.995770] ? __pfx_kthread+0x10/0x10 [ 75.995774] ret_from_fork+0x113/0x1d0 [ 75.995777] ? __pfx_kthread+0x10/0x10 [ 75.995781] ret_from_fork_asm+0x1a/0x30 [ 75.995787] </TASK> [ 75.995789] [ 76.176952] Allocated by task 322: [ 76.180372] kasan_save_stack+0x45/0x70 [ 76.184225] kasan_save_track+0x18/0x40 [ 76.188062] kasan_save_alloc_info+0x3b/0x50 [ 76.192350] __kasan_kmalloc+0xb7/0xc0 [ 76.196133] __kmalloc_cache_noprof+0x189/0x420 [ 76.200674] copy_to_kernel_nofault_oob+0x12f/0x560 [ 76.205561] kunit_try_run_case+0x1a2/0x480 [ 76.209746] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 76.215146] kthread+0x334/0x6f0 [ 76.218387] ret_from_fork+0x113/0x1d0 [ 76.222140] ret_from_fork_asm+0x1a/0x30 [ 76.226066] [ 76.227565] The buggy address belongs to the object at ffff888100cff100 [ 76.227565] which belongs to the cache kmalloc-128 of size 128 [ 76.240080] The buggy address is located 0 bytes to the right of [ 76.240080] allocated 120-byte region [ffff888100cff100, ffff888100cff178) [ 76.253028] [ 76.254527] The buggy address belongs to the physical page: [ 76.260100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cff [ 76.268109] flags: 0x200000000000000(node=0|zone=2) [ 76.272996] page_type: f5(slab) [ 76.276142] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 76.283883] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 76.291631] page dumped because: kasan: bad access detected [ 76.297203] [ 76.298701] Memory state around the buggy address: [ 76.303496] ffff888100cff000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.310721] ffff888100cff080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.317942] >ffff888100cff100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 76.325162] ^ [ 76.332303] ffff888100cff180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.339520] ffff888100cff200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.346739] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 56.916940] ================================================================== [ 56.924180] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 56.931485] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 56.938887] [ 56.940417] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 56.940425] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 56.940428] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 56.940432] Call Trace: [ 56.940433] <TASK> [ 56.940435] dump_stack_lvl+0x73/0xb0 [ 56.940440] print_report+0xd1/0x650 [ 56.940444] ? __virt_addr_valid+0x1db/0x2d0 [ 56.940448] ? kasan_atomics_helper+0xac7/0x5450 [ 56.940452] ? kasan_complete_mode_report_info+0x2a/0x200 [ 56.940457] ? kasan_atomics_helper+0xac7/0x5450 [ 56.940461] kasan_report+0x141/0x180 [ 56.940466] ? kasan_atomics_helper+0xac7/0x5450 [ 56.940470] kasan_check_range+0x10c/0x1c0 [ 56.940475] __kasan_check_write+0x18/0x20 [ 56.940479] kasan_atomics_helper+0xac7/0x5450 [ 56.940483] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 56.940487] ? __kmalloc_cache_noprof+0x189/0x420 [ 56.940492] ? kasan_atomics+0x152/0x310 [ 56.940497] kasan_atomics+0x1dc/0x310 [ 56.940501] ? __pfx_kasan_atomics+0x10/0x10 [ 56.940506] ? ktime_get_ts64+0x83/0x230 [ 56.940511] kunit_try_run_case+0x1a2/0x480 [ 56.940515] ? __pfx_kunit_try_run_case+0x10/0x10 [ 56.940520] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 56.940524] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 56.940528] ? __kthread_parkme+0x82/0x180 [ 56.940532] ? preempt_count_sub+0x50/0x80 [ 56.940537] ? __pfx_kunit_try_run_case+0x10/0x10 [ 56.940541] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 56.940545] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 56.940550] kthread+0x334/0x6f0 [ 56.940553] ? trace_preempt_on+0x20/0xc0 [ 56.940558] ? __pfx_kthread+0x10/0x10 [ 56.940562] ? _raw_spin_unlock_irq+0x47/0x80 [ 56.940566] ? calculate_sigpending+0x7b/0xa0 [ 56.940570] ? __pfx_kthread+0x10/0x10 [ 56.940574] ret_from_fork+0x113/0x1d0 [ 56.940578] ? __pfx_kthread+0x10/0x10 [ 56.940582] ret_from_fork_asm+0x1a/0x30 [ 56.940588] </TASK> [ 56.940589] [ 57.123288] Allocated by task 306: [ 57.126692] kasan_save_stack+0x45/0x70 [ 57.130531] kasan_save_track+0x18/0x40 [ 57.134413] kasan_save_alloc_info+0x3b/0x50 [ 57.138686] __kasan_kmalloc+0xb7/0xc0 [ 57.142439] __kmalloc_cache_noprof+0x189/0x420 [ 57.146972] kasan_atomics+0x95/0x310 [ 57.150637] kunit_try_run_case+0x1a2/0x480 [ 57.154824] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 57.160223] kthread+0x334/0x6f0 [ 57.163457] ret_from_fork+0x113/0x1d0 [ 57.167208] ret_from_fork_asm+0x1a/0x30 [ 57.171135] [ 57.172635] The buggy address belongs to the object at ffff8881066eaf00 [ 57.172635] which belongs to the cache kmalloc-64 of size 64 [ 57.184975] The buggy address is located 0 bytes to the right of [ 57.184975] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 57.197837] [ 57.199361] The buggy address belongs to the physical page: [ 57.204978] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 57.212986] flags: 0x200000000000000(node=0|zone=2) [ 57.217865] page_type: f5(slab) [ 57.221011] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 57.228751] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.236490] page dumped because: kasan: bad access detected [ 57.242061] [ 57.243562] Memory state around the buggy address: [ 57.248376] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.255627] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 57.262854] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.270082] ^ [ 57.274875] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.282094] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 57.289312] ================================================================== [ 62.219675] ================================================================== [ 62.226925] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 62.234318] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 62.241744] [ 62.243243] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 62.243251] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 62.243254] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 62.243257] Call Trace: [ 62.243259] <TASK> [ 62.243261] dump_stack_lvl+0x73/0xb0 [ 62.243265] print_report+0xd1/0x650 [ 62.243269] ? __virt_addr_valid+0x1db/0x2d0 [ 62.243273] ? kasan_atomics_helper+0x1217/0x5450 [ 62.243277] ? kasan_complete_mode_report_info+0x2a/0x200 [ 62.243283] ? kasan_atomics_helper+0x1217/0x5450 [ 62.243287] kasan_report+0x141/0x180 [ 62.243291] ? kasan_atomics_helper+0x1217/0x5450 [ 62.243296] kasan_check_range+0x10c/0x1c0 [ 62.243300] __kasan_check_write+0x18/0x20 [ 62.243304] kasan_atomics_helper+0x1217/0x5450 [ 62.243308] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 62.243312] ? __kmalloc_cache_noprof+0x189/0x420 [ 62.243317] ? kasan_atomics+0x152/0x310 [ 62.243322] kasan_atomics+0x1dc/0x310 [ 62.243346] ? __pfx_kasan_atomics+0x10/0x10 [ 62.243352] ? ktime_get_ts64+0x83/0x230 [ 62.243356] kunit_try_run_case+0x1a2/0x480 [ 62.243361] ? __pfx_kunit_try_run_case+0x10/0x10 [ 62.243379] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 62.243383] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 62.243388] ? __kthread_parkme+0x82/0x180 [ 62.243392] ? preempt_count_sub+0x50/0x80 [ 62.243396] ? __pfx_kunit_try_run_case+0x10/0x10 [ 62.243413] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 62.243418] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 62.243422] kthread+0x334/0x6f0 [ 62.243426] ? trace_preempt_on+0x20/0xc0 [ 62.243430] ? __pfx_kthread+0x10/0x10 [ 62.243434] ? _raw_spin_unlock_irq+0x47/0x80 [ 62.243438] ? calculate_sigpending+0x7b/0xa0 [ 62.243443] ? __pfx_kthread+0x10/0x10 [ 62.243447] ret_from_fork+0x113/0x1d0 [ 62.243450] ? __pfx_kthread+0x10/0x10 [ 62.243454] ret_from_fork_asm+0x1a/0x30 [ 62.243460] </TASK> [ 62.243462] [ 62.426775] Allocated by task 306: [ 62.430183] kasan_save_stack+0x45/0x70 [ 62.434022] kasan_save_track+0x18/0x40 [ 62.437861] kasan_save_alloc_info+0x3b/0x50 [ 62.442133] __kasan_kmalloc+0xb7/0xc0 [ 62.445885] __kmalloc_cache_noprof+0x189/0x420 [ 62.450421] kasan_atomics+0x95/0x310 [ 62.454094] kunit_try_run_case+0x1a2/0x480 [ 62.458278] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 62.463680] kthread+0x334/0x6f0 [ 62.466911] ret_from_fork+0x113/0x1d0 [ 62.470663] ret_from_fork_asm+0x1a/0x30 [ 62.474589] [ 62.476089] The buggy address belongs to the object at ffff8881066eaf00 [ 62.476089] which belongs to the cache kmalloc-64 of size 64 [ 62.488433] The buggy address is located 0 bytes to the right of [ 62.488433] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 62.501302] [ 62.502800] The buggy address belongs to the physical page: [ 62.508394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 62.516417] flags: 0x200000000000000(node=0|zone=2) [ 62.521305] page_type: f5(slab) [ 62.524449] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 62.532188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.539927] page dumped because: kasan: bad access detected [ 62.545500] [ 62.547001] Memory state around the buggy address: [ 62.551793] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.559013] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 62.566233] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.573458] ^ [ 62.578252] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.585470] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.592691] ================================================================== [ 54.259925] ================================================================== [ 54.267172] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 54.274478] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 54.281872] [ 54.283395] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 54.283415] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 54.283418] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 54.283422] Call Trace: [ 54.283424] <TASK> [ 54.283425] dump_stack_lvl+0x73/0xb0 [ 54.283430] print_report+0xd1/0x650 [ 54.283434] ? __virt_addr_valid+0x1db/0x2d0 [ 54.283439] ? kasan_atomics_helper+0x697/0x5450 [ 54.283442] ? kasan_complete_mode_report_info+0x2a/0x200 [ 54.283448] ? kasan_atomics_helper+0x697/0x5450 [ 54.283452] kasan_report+0x141/0x180 [ 54.283456] ? kasan_atomics_helper+0x697/0x5450 [ 54.283461] kasan_check_range+0x10c/0x1c0 [ 54.283466] __kasan_check_write+0x18/0x20 [ 54.283469] kasan_atomics_helper+0x697/0x5450 [ 54.283473] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 54.283477] ? __kmalloc_cache_noprof+0x189/0x420 [ 54.283482] ? kasan_atomics+0x152/0x310 [ 54.283488] kasan_atomics+0x1dc/0x310 [ 54.283492] ? __pfx_kasan_atomics+0x10/0x10 [ 54.283497] ? ktime_get_ts64+0x83/0x230 [ 54.283501] kunit_try_run_case+0x1a2/0x480 [ 54.283506] ? __pfx_kunit_try_run_case+0x10/0x10 [ 54.283510] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 54.283515] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 54.283519] ? __kthread_parkme+0x82/0x180 [ 54.283523] ? preempt_count_sub+0x50/0x80 [ 54.283528] ? __pfx_kunit_try_run_case+0x10/0x10 [ 54.283532] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 54.283537] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 54.283541] kthread+0x334/0x6f0 [ 54.283545] ? trace_preempt_on+0x20/0xc0 [ 54.283549] ? __pfx_kthread+0x10/0x10 [ 54.283553] ? _raw_spin_unlock_irq+0x47/0x80 [ 54.283557] ? calculate_sigpending+0x7b/0xa0 [ 54.283562] ? __pfx_kthread+0x10/0x10 [ 54.283566] ret_from_fork+0x113/0x1d0 [ 54.283569] ? __pfx_kthread+0x10/0x10 [ 54.283573] ret_from_fork_asm+0x1a/0x30 [ 54.283579] </TASK> [ 54.283581] [ 54.466281] Allocated by task 306: [ 54.469687] kasan_save_stack+0x45/0x70 [ 54.473525] kasan_save_track+0x18/0x40 [ 54.477364] kasan_save_alloc_info+0x3b/0x50 [ 54.481682] __kasan_kmalloc+0xb7/0xc0 [ 54.485432] __kmalloc_cache_noprof+0x189/0x420 [ 54.489966] kasan_atomics+0x95/0x310 [ 54.493632] kunit_try_run_case+0x1a2/0x480 [ 54.497819] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 54.503217] kthread+0x334/0x6f0 [ 54.506450] ret_from_fork+0x113/0x1d0 [ 54.510202] ret_from_fork_asm+0x1a/0x30 [ 54.514129] [ 54.515629] The buggy address belongs to the object at ffff8881066eaf00 [ 54.515629] which belongs to the cache kmalloc-64 of size 64 [ 54.527969] The buggy address is located 0 bytes to the right of [ 54.527969] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 54.540831] [ 54.542348] The buggy address belongs to the physical page: [ 54.547927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 54.555928] flags: 0x200000000000000(node=0|zone=2) [ 54.560807] page_type: f5(slab) [ 54.563953] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 54.571694] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.579441] page dumped because: kasan: bad access detected [ 54.585012] [ 54.586512] Memory state around the buggy address: [ 54.591307] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.598533] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 54.605754] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.612981] ^ [ 54.617774] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.624992] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 54.632213] ================================================================== [ 55.398520] ================================================================== [ 55.405760] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 55.413067] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 55.420466] [ 55.421966] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 55.421974] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 55.421977] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 55.421981] Call Trace: [ 55.421983] <TASK> [ 55.421984] dump_stack_lvl+0x73/0xb0 [ 55.421989] print_report+0xd1/0x650 [ 55.421993] ? __virt_addr_valid+0x1db/0x2d0 [ 55.421997] ? kasan_atomics_helper+0x860/0x5450 [ 55.422001] ? kasan_complete_mode_report_info+0x2a/0x200 [ 55.422006] ? kasan_atomics_helper+0x860/0x5450 [ 55.422010] kasan_report+0x141/0x180 [ 55.422015] ? kasan_atomics_helper+0x860/0x5450 [ 55.422019] kasan_check_range+0x10c/0x1c0 [ 55.422024] __kasan_check_write+0x18/0x20 [ 55.422028] kasan_atomics_helper+0x860/0x5450 [ 55.422032] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 55.422036] ? __kmalloc_cache_noprof+0x189/0x420 [ 55.422041] ? kasan_atomics+0x152/0x310 [ 55.422046] kasan_atomics+0x1dc/0x310 [ 55.422051] ? __pfx_kasan_atomics+0x10/0x10 [ 55.422055] ? ktime_get_ts64+0x83/0x230 [ 55.422060] kunit_try_run_case+0x1a2/0x480 [ 55.422065] ? __pfx_kunit_try_run_case+0x10/0x10 [ 55.422069] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 55.422073] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 55.422078] ? __kthread_parkme+0x82/0x180 [ 55.422082] ? preempt_count_sub+0x50/0x80 [ 55.422086] ? __pfx_kunit_try_run_case+0x10/0x10 [ 55.422091] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 55.422095] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 55.422100] kthread+0x334/0x6f0 [ 55.422103] ? trace_preempt_on+0x20/0xc0 [ 55.422108] ? __pfx_kthread+0x10/0x10 [ 55.422112] ? _raw_spin_unlock_irq+0x47/0x80 [ 55.422115] ? calculate_sigpending+0x7b/0xa0 [ 55.422120] ? __pfx_kthread+0x10/0x10 [ 55.422124] ret_from_fork+0x113/0x1d0 [ 55.422128] ? __pfx_kthread+0x10/0x10 [ 55.422132] ret_from_fork_asm+0x1a/0x30 [ 55.422138] </TASK> [ 55.422140] [ 55.605068] Allocated by task 306: [ 55.608474] kasan_save_stack+0x45/0x70 [ 55.612310] kasan_save_track+0x18/0x40 [ 55.616151] kasan_save_alloc_info+0x3b/0x50 [ 55.620432] __kasan_kmalloc+0xb7/0xc0 [ 55.624184] __kmalloc_cache_noprof+0x189/0x420 [ 55.628716] kasan_atomics+0x95/0x310 [ 55.632415] kunit_try_run_case+0x1a2/0x480 [ 55.636604] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 55.642004] kthread+0x334/0x6f0 [ 55.645235] ret_from_fork+0x113/0x1d0 [ 55.648989] ret_from_fork_asm+0x1a/0x30 [ 55.652915] [ 55.654424] The buggy address belongs to the object at ffff8881066eaf00 [ 55.654424] which belongs to the cache kmalloc-64 of size 64 [ 55.666764] The buggy address is located 0 bytes to the right of [ 55.666764] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 55.679625] [ 55.681126] The buggy address belongs to the physical page: [ 55.686696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 55.694697] flags: 0x200000000000000(node=0|zone=2) [ 55.699575] page_type: f5(slab) [ 55.702723] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 55.710471] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.718218] page dumped because: kasan: bad access detected [ 55.723789] [ 55.725290] Memory state around the buggy address: [ 55.730084] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.737312] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 55.744538] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.751759] ^ [ 55.756550] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.763769] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 55.770988] ================================================================== [ 61.463200] ================================================================== [ 61.470442] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 61.477841] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 61.485233] [ 61.486735] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 61.486743] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 61.486746] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 61.486749] Call Trace: [ 61.486751] <TASK> [ 61.486753] dump_stack_lvl+0x73/0xb0 [ 61.486757] print_report+0xd1/0x650 [ 61.486761] ? __virt_addr_valid+0x1db/0x2d0 [ 61.486766] ? kasan_atomics_helper+0x1148/0x5450 [ 61.486770] ? kasan_complete_mode_report_info+0x2a/0x200 [ 61.486775] ? kasan_atomics_helper+0x1148/0x5450 [ 61.486779] kasan_report+0x141/0x180 [ 61.486783] ? kasan_atomics_helper+0x1148/0x5450 [ 61.486788] kasan_check_range+0x10c/0x1c0 [ 61.486793] __kasan_check_write+0x18/0x20 [ 61.486796] kasan_atomics_helper+0x1148/0x5450 [ 61.486800] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 61.486804] ? __kmalloc_cache_noprof+0x189/0x420 [ 61.486809] ? kasan_atomics+0x152/0x310 [ 61.486815] kasan_atomics+0x1dc/0x310 [ 61.486819] ? __pfx_kasan_atomics+0x10/0x10 [ 61.486824] ? ktime_get_ts64+0x83/0x230 [ 61.486828] kunit_try_run_case+0x1a2/0x480 [ 61.486833] ? __pfx_kunit_try_run_case+0x10/0x10 [ 61.486837] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 61.486842] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 61.486846] ? __kthread_parkme+0x82/0x180 [ 61.486850] ? preempt_count_sub+0x50/0x80 [ 61.486854] ? __pfx_kunit_try_run_case+0x10/0x10 [ 61.486859] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 61.486863] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 61.486868] kthread+0x334/0x6f0 [ 61.486871] ? trace_preempt_on+0x20/0xc0 [ 61.486876] ? __pfx_kthread+0x10/0x10 [ 61.486880] ? _raw_spin_unlock_irq+0x47/0x80 [ 61.486884] ? calculate_sigpending+0x7b/0xa0 [ 61.486888] ? __pfx_kthread+0x10/0x10 [ 61.486892] ret_from_fork+0x113/0x1d0 [ 61.486896] ? __pfx_kthread+0x10/0x10 [ 61.486900] ret_from_fork_asm+0x1a/0x30 [ 61.486906] </TASK> [ 61.486908] [ 61.670033] Allocated by task 306: [ 61.673440] kasan_save_stack+0x45/0x70 [ 61.677277] kasan_save_track+0x18/0x40 [ 61.681116] kasan_save_alloc_info+0x3b/0x50 [ 61.685426] __kasan_kmalloc+0xb7/0xc0 [ 61.689185] __kmalloc_cache_noprof+0x189/0x420 [ 61.693719] kasan_atomics+0x95/0x310 [ 61.697427] kunit_try_run_case+0x1a2/0x480 [ 61.701614] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 61.707012] kthread+0x334/0x6f0 [ 61.710247] ret_from_fork+0x113/0x1d0 [ 61.713998] ret_from_fork_asm+0x1a/0x30 [ 61.717925] [ 61.719427] The buggy address belongs to the object at ffff8881066eaf00 [ 61.719427] which belongs to the cache kmalloc-64 of size 64 [ 61.731766] The buggy address is located 0 bytes to the right of [ 61.731766] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 61.744626] [ 61.746126] The buggy address belongs to the physical page: [ 61.751700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 61.759706] flags: 0x200000000000000(node=0|zone=2) [ 61.764584] page_type: f5(slab) [ 61.767733] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 61.775472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.783220] page dumped because: kasan: bad access detected [ 61.788791] [ 61.790292] Memory state around the buggy address: [ 61.795084] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.802303] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 61.809522] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.816742] ^ [ 61.821533] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.828754] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 61.835972] ================================================================== [ 74.396209] ================================================================== [ 74.403449] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 74.410841] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 74.418242] [ 74.419743] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 74.419751] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 74.419754] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 74.419757] Call Trace: [ 74.419759] <TASK> [ 74.419761] dump_stack_lvl+0x73/0xb0 [ 74.419765] print_report+0xd1/0x650 [ 74.419769] ? __virt_addr_valid+0x1db/0x2d0 [ 74.419774] ? kasan_atomics_helper+0x218a/0x5450 [ 74.419777] ? kasan_complete_mode_report_info+0x2a/0x200 [ 74.419783] ? kasan_atomics_helper+0x218a/0x5450 [ 74.419787] kasan_report+0x141/0x180 [ 74.419791] ? kasan_atomics_helper+0x218a/0x5450 [ 74.419796] kasan_check_range+0x10c/0x1c0 [ 74.419801] __kasan_check_write+0x18/0x20 [ 74.419804] kasan_atomics_helper+0x218a/0x5450 [ 74.419809] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 74.419813] ? __kmalloc_cache_noprof+0x189/0x420 [ 74.419818] ? kasan_atomics+0x152/0x310 [ 74.419823] kasan_atomics+0x1dc/0x310 [ 74.419827] ? __pfx_kasan_atomics+0x10/0x10 [ 74.419832] ? ktime_get_ts64+0x83/0x230 [ 74.419837] kunit_try_run_case+0x1a2/0x480 [ 74.419841] ? __pfx_kunit_try_run_case+0x10/0x10 [ 74.419846] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 74.419850] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 74.419855] ? __kthread_parkme+0x82/0x180 [ 74.419858] ? preempt_count_sub+0x50/0x80 [ 74.419863] ? __pfx_kunit_try_run_case+0x10/0x10 [ 74.419867] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 74.419872] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 74.419876] kthread+0x334/0x6f0 [ 74.419880] ? trace_preempt_on+0x20/0xc0 [ 74.419884] ? __pfx_kthread+0x10/0x10 [ 74.419888] ? _raw_spin_unlock_irq+0x47/0x80 [ 74.419892] ? calculate_sigpending+0x7b/0xa0 [ 74.419896] ? __pfx_kthread+0x10/0x10 [ 74.419901] ret_from_fork+0x113/0x1d0 [ 74.419904] ? __pfx_kthread+0x10/0x10 [ 74.419908] ret_from_fork_asm+0x1a/0x30 [ 74.419914] </TASK> [ 74.419916] [ 74.603059] Allocated by task 306: [ 74.606465] kasan_save_stack+0x45/0x70 [ 74.610303] kasan_save_track+0x18/0x40 [ 74.614142] kasan_save_alloc_info+0x3b/0x50 [ 74.618418] __kasan_kmalloc+0xb7/0xc0 [ 74.622178] __kmalloc_cache_noprof+0x189/0x420 [ 74.626718] kasan_atomics+0x95/0x310 [ 74.630416] kunit_try_run_case+0x1a2/0x480 [ 74.634604] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 74.640004] kthread+0x334/0x6f0 [ 74.643236] ret_from_fork+0x113/0x1d0 [ 74.646989] ret_from_fork_asm+0x1a/0x30 [ 74.650915] [ 74.652421] The buggy address belongs to the object at ffff8881066eaf00 [ 74.652421] which belongs to the cache kmalloc-64 of size 64 [ 74.664756] The buggy address is located 0 bytes to the right of [ 74.664756] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 74.677617] [ 74.679117] The buggy address belongs to the physical page: [ 74.684689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 74.692689] flags: 0x200000000000000(node=0|zone=2) [ 74.697569] page_type: f5(slab) [ 74.700713] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 74.708453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 74.716194] page dumped because: kasan: bad access detected [ 74.721765] [ 74.723263] Memory state around the buggy address: [ 74.728058] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.735287] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 74.742513] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.749732] ^ [ 74.754524] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.761745] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.768962] ================================================================== [ 53.124206] ================================================================== [ 53.131446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 53.138840] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 53.146239] [ 53.147740] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 53.147748] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 53.147751] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 53.147755] Call Trace: [ 53.147756] <TASK> [ 53.147758] dump_stack_lvl+0x73/0xb0 [ 53.147763] print_report+0xd1/0x650 [ 53.147767] ? __virt_addr_valid+0x1db/0x2d0 [ 53.147771] ? kasan_atomics_helper+0x4b3a/0x5450 [ 53.147775] ? kasan_complete_mode_report_info+0x2a/0x200 [ 53.147781] ? kasan_atomics_helper+0x4b3a/0x5450 [ 53.147785] kasan_report+0x141/0x180 [ 53.147789] ? kasan_atomics_helper+0x4b3a/0x5450 [ 53.147794] __asan_report_store4_noabort+0x1b/0x30 [ 53.147799] kasan_atomics_helper+0x4b3a/0x5450 [ 53.147803] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 53.147807] ? __kmalloc_cache_noprof+0x189/0x420 [ 53.147813] ? kasan_atomics+0x152/0x310 [ 53.147818] kasan_atomics+0x1dc/0x310 [ 53.147822] ? __pfx_kasan_atomics+0x10/0x10 [ 53.147827] ? ktime_get_ts64+0x83/0x230 [ 53.147832] kunit_try_run_case+0x1a2/0x480 [ 53.147836] ? __pfx_kunit_try_run_case+0x10/0x10 [ 53.147841] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 53.147845] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 53.147849] ? __kthread_parkme+0x82/0x180 [ 53.147853] ? preempt_count_sub+0x50/0x80 [ 53.147858] ? __pfx_kunit_try_run_case+0x10/0x10 [ 53.147862] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 53.147866] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 53.147871] kthread+0x334/0x6f0 [ 53.147875] ? trace_preempt_on+0x20/0xc0 [ 53.147879] ? __pfx_kthread+0x10/0x10 [ 53.147883] ? _raw_spin_unlock_irq+0x47/0x80 [ 53.147887] ? calculate_sigpending+0x7b/0xa0 [ 53.147891] ? __pfx_kthread+0x10/0x10 [ 53.147896] ret_from_fork+0x113/0x1d0 [ 53.147899] ? __pfx_kthread+0x10/0x10 [ 53.147903] ret_from_fork_asm+0x1a/0x30 [ 53.147909] </TASK> [ 53.147911] [ 53.327764] Allocated by task 306: [ 53.331169] kasan_save_stack+0x45/0x70 [ 53.335008] kasan_save_track+0x18/0x40 [ 53.338847] kasan_save_alloc_info+0x3b/0x50 [ 53.343121] __kasan_kmalloc+0xb7/0xc0 [ 53.346883] __kmalloc_cache_noprof+0x189/0x420 [ 53.351428] kasan_atomics+0x95/0x310 [ 53.355096] kunit_try_run_case+0x1a2/0x480 [ 53.359282] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 53.364684] kthread+0x334/0x6f0 [ 53.367925] ret_from_fork+0x113/0x1d0 [ 53.371677] ret_from_fork_asm+0x1a/0x30 [ 53.375602] [ 53.377103] The buggy address belongs to the object at ffff8881066eaf00 [ 53.377103] which belongs to the cache kmalloc-64 of size 64 [ 53.389443] The buggy address is located 0 bytes to the right of [ 53.389443] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 53.402305] [ 53.403805] The buggy address belongs to the physical page: [ 53.409422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 53.417427] flags: 0x200000000000000(node=0|zone=2) [ 53.422309] page_type: f5(slab) [ 53.425453] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 53.433195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.440940] page dumped because: kasan: bad access detected [ 53.446511] [ 53.448011] Memory state around the buggy address: [ 53.452806] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.460033] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 53.467253] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.474470] ^ [ 53.479264] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.486485] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 53.493710] ================================================================== [ 52.367913] ================================================================== [ 52.375155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 52.382555] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 52.389869] [ 52.391393] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 52.391414] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 52.391417] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 52.391420] Call Trace: [ 52.391422] <TASK> [ 52.391424] dump_stack_lvl+0x73/0xb0 [ 52.391428] print_report+0xd1/0x650 [ 52.391432] ? __virt_addr_valid+0x1db/0x2d0 [ 52.391437] ? kasan_atomics_helper+0x4b54/0x5450 [ 52.391441] ? kasan_complete_mode_report_info+0x2a/0x200 [ 52.391446] ? kasan_atomics_helper+0x4b54/0x5450 [ 52.391450] kasan_report+0x141/0x180 [ 52.391454] ? kasan_atomics_helper+0x4b54/0x5450 [ 52.391459] __asan_report_load4_noabort+0x18/0x20 [ 52.391464] kasan_atomics_helper+0x4b54/0x5450 [ 52.391468] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 52.391472] ? __kmalloc_cache_noprof+0x189/0x420 [ 52.391477] ? kasan_atomics+0x152/0x310 [ 52.391482] kasan_atomics+0x1dc/0x310 [ 52.391487] ? __pfx_kasan_atomics+0x10/0x10 [ 52.391492] ? ktime_get_ts64+0x83/0x230 [ 52.391496] kunit_try_run_case+0x1a2/0x480 [ 52.391501] ? __pfx_kunit_try_run_case+0x10/0x10 [ 52.391505] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 52.391510] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 52.391514] ? __kthread_parkme+0x82/0x180 [ 52.391518] ? preempt_count_sub+0x50/0x80 [ 52.391522] ? __pfx_kunit_try_run_case+0x10/0x10 [ 52.391527] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 52.391531] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 52.391536] kthread+0x334/0x6f0 [ 52.391539] ? trace_preempt_on+0x20/0xc0 [ 52.391544] ? __pfx_kthread+0x10/0x10 [ 52.391547] ? _raw_spin_unlock_irq+0x47/0x80 [ 52.391551] ? calculate_sigpending+0x7b/0xa0 [ 52.391556] ? __pfx_kthread+0x10/0x10 [ 52.391560] ret_from_fork+0x113/0x1d0 [ 52.391564] ? __pfx_kthread+0x10/0x10 [ 52.391568] ret_from_fork_asm+0x1a/0x30 [ 52.391574] </TASK> [ 52.391575] [ 52.571279] Allocated by task 306: [ 52.574686] kasan_save_stack+0x45/0x70 [ 52.578533] kasan_save_track+0x18/0x40 [ 52.582413] kasan_save_alloc_info+0x3b/0x50 [ 52.586687] __kasan_kmalloc+0xb7/0xc0 [ 52.590441] __kmalloc_cache_noprof+0x189/0x420 [ 52.594983] kasan_atomics+0x95/0x310 [ 52.598657] kunit_try_run_case+0x1a2/0x480 [ 52.602844] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 52.608241] kthread+0x334/0x6f0 [ 52.611475] ret_from_fork+0x113/0x1d0 [ 52.615228] ret_from_fork_asm+0x1a/0x30 [ 52.619161] [ 52.620660] The buggy address belongs to the object at ffff8881066eaf00 [ 52.620660] which belongs to the cache kmalloc-64 of size 64 [ 52.633003] The buggy address is located 0 bytes to the right of [ 52.633003] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 52.645863] [ 52.647362] The buggy address belongs to the physical page: [ 52.652954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 52.660960] flags: 0x200000000000000(node=0|zone=2) [ 52.665840] page_type: f5(slab) [ 52.668989] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 52.676734] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.684473] page dumped because: kasan: bad access detected [ 52.690047] [ 52.691546] Memory state around the buggy address: [ 52.696364] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.703629] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 52.710855] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.718075] ^ [ 52.722868] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.730096] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.737313] ================================================================== [ 67.906181] ================================================================== [ 67.913427] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 67.920820] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 67.928214] [ 67.929713] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 67.929721] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 67.929724] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 67.929727] Call Trace: [ 67.929729] <TASK> [ 67.929731] dump_stack_lvl+0x73/0xb0 [ 67.929735] print_report+0xd1/0x650 [ 67.929739] ? __virt_addr_valid+0x1db/0x2d0 [ 67.929743] ? kasan_atomics_helper+0x194a/0x5450 [ 67.929747] ? kasan_complete_mode_report_info+0x2a/0x200 [ 67.929753] ? kasan_atomics_helper+0x194a/0x5450 [ 67.929757] kasan_report+0x141/0x180 [ 67.929761] ? kasan_atomics_helper+0x194a/0x5450 [ 67.929766] kasan_check_range+0x10c/0x1c0 [ 67.929770] __kasan_check_write+0x18/0x20 [ 67.929774] kasan_atomics_helper+0x194a/0x5450 [ 67.929778] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 67.929782] ? __kmalloc_cache_noprof+0x189/0x420 [ 67.929787] ? kasan_atomics+0x152/0x310 [ 67.929792] kasan_atomics+0x1dc/0x310 [ 67.929797] ? __pfx_kasan_atomics+0x10/0x10 [ 67.929802] ? ktime_get_ts64+0x83/0x230 [ 67.929806] kunit_try_run_case+0x1a2/0x480 [ 67.929811] ? __pfx_kunit_try_run_case+0x10/0x10 [ 67.929815] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 67.929820] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 67.929824] ? __kthread_parkme+0x82/0x180 [ 67.929828] ? preempt_count_sub+0x50/0x80 [ 67.929832] ? __pfx_kunit_try_run_case+0x10/0x10 [ 67.929837] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 67.929841] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 67.929845] kthread+0x334/0x6f0 [ 67.929849] ? trace_preempt_on+0x20/0xc0 [ 67.929853] ? __pfx_kthread+0x10/0x10 [ 67.929857] ? _raw_spin_unlock_irq+0x47/0x80 [ 67.929861] ? calculate_sigpending+0x7b/0xa0 [ 67.929866] ? __pfx_kthread+0x10/0x10 [ 67.929870] ret_from_fork+0x113/0x1d0 [ 67.929874] ? __pfx_kthread+0x10/0x10 [ 67.929878] ret_from_fork_asm+0x1a/0x30 [ 67.929883] </TASK> [ 67.929885] [ 68.113071] Allocated by task 306: [ 68.116479] kasan_save_stack+0x45/0x70 [ 68.120318] kasan_save_track+0x18/0x40 [ 68.124190] kasan_save_alloc_info+0x3b/0x50 [ 68.128463] __kasan_kmalloc+0xb7/0xc0 [ 68.132218] __kmalloc_cache_noprof+0x189/0x420 [ 68.136756] kasan_atomics+0x95/0x310 [ 68.140424] kunit_try_run_case+0x1a2/0x480 [ 68.144610] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 68.150018] kthread+0x334/0x6f0 [ 68.153252] ret_from_fork+0x113/0x1d0 [ 68.157002] ret_from_fork_asm+0x1a/0x30 [ 68.160929] [ 68.162428] The buggy address belongs to the object at ffff8881066eaf00 [ 68.162428] which belongs to the cache kmalloc-64 of size 64 [ 68.174769] The buggy address is located 0 bytes to the right of [ 68.174769] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 68.187632] [ 68.189130] The buggy address belongs to the physical page: [ 68.194703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 68.202710] flags: 0x200000000000000(node=0|zone=2) [ 68.207591] page_type: f5(slab) [ 68.210739] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 68.218485] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.226232] page dumped because: kasan: bad access detected [ 68.231805] [ 68.233303] Memory state around the buggy address: [ 68.238098] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.245345] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 68.252571] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.259797] ^ [ 68.264592] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.271819] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 68.279037] ================================================================== [ 69.426325] ================================================================== [ 69.433571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 69.440965] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 69.448379] [ 69.449910] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 69.449917] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 69.449920] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 69.449924] Call Trace: [ 69.449925] <TASK> [ 69.449927] dump_stack_lvl+0x73/0xb0 [ 69.449932] print_report+0xd1/0x650 [ 69.449936] ? __virt_addr_valid+0x1db/0x2d0 [ 69.449940] ? kasan_atomics_helper+0x1c18/0x5450 [ 69.449944] ? kasan_complete_mode_report_info+0x2a/0x200 [ 69.449949] ? kasan_atomics_helper+0x1c18/0x5450 [ 69.449953] kasan_report+0x141/0x180 [ 69.449957] ? kasan_atomics_helper+0x1c18/0x5450 [ 69.449962] kasan_check_range+0x10c/0x1c0 [ 69.449967] __kasan_check_write+0x18/0x20 [ 69.449970] kasan_atomics_helper+0x1c18/0x5450 [ 69.449974] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 69.449979] ? __kmalloc_cache_noprof+0x189/0x420 [ 69.449984] ? kasan_atomics+0x152/0x310 [ 69.449989] kasan_atomics+0x1dc/0x310 [ 69.449993] ? __pfx_kasan_atomics+0x10/0x10 [ 69.449998] ? ktime_get_ts64+0x83/0x230 [ 69.450002] kunit_try_run_case+0x1a2/0x480 [ 69.450007] ? __pfx_kunit_try_run_case+0x10/0x10 [ 69.450011] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 69.450016] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 69.450020] ? __kthread_parkme+0x82/0x180 [ 69.450024] ? preempt_count_sub+0x50/0x80 [ 69.450028] ? __pfx_kunit_try_run_case+0x10/0x10 [ 69.450033] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 69.450037] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 69.450042] kthread+0x334/0x6f0 [ 69.450045] ? trace_preempt_on+0x20/0xc0 [ 69.450050] ? __pfx_kthread+0x10/0x10 [ 69.450054] ? _raw_spin_unlock_irq+0x47/0x80 [ 69.450058] ? calculate_sigpending+0x7b/0xa0 [ 69.450062] ? __pfx_kthread+0x10/0x10 [ 69.450066] ret_from_fork+0x113/0x1d0 [ 69.450070] ? __pfx_kthread+0x10/0x10 [ 69.450074] ret_from_fork_asm+0x1a/0x30 [ 69.450080] </TASK> [ 69.450082] [ 69.633154] Allocated by task 306: [ 69.636562] kasan_save_stack+0x45/0x70 [ 69.640420] kasan_save_track+0x18/0x40 [ 69.644265] kasan_save_alloc_info+0x3b/0x50 [ 69.648538] __kasan_kmalloc+0xb7/0xc0 [ 69.652290] __kmalloc_cache_noprof+0x189/0x420 [ 69.656824] kasan_atomics+0x95/0x310 [ 69.660489] kunit_try_run_case+0x1a2/0x480 [ 69.664675] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 69.670076] kthread+0x334/0x6f0 [ 69.673316] ret_from_fork+0x113/0x1d0 [ 69.677104] ret_from_fork_asm+0x1a/0x30 [ 69.681038] [ 69.682538] The buggy address belongs to the object at ffff8881066eaf00 [ 69.682538] which belongs to the cache kmalloc-64 of size 64 [ 69.694880] The buggy address is located 0 bytes to the right of [ 69.694880] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 69.707741] [ 69.709239] The buggy address belongs to the physical page: [ 69.714813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 69.722821] flags: 0x200000000000000(node=0|zone=2) [ 69.727698] page_type: f5(slab) [ 69.730847] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 69.738596] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.746368] page dumped because: kasan: bad access detected [ 69.751983] [ 69.753481] Memory state around the buggy address: [ 69.758275] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.765493] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 69.772714] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.779932] ^ [ 69.784725] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.791945] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 69.799165] ================================================================== [ 51.612021] ================================================================== [ 51.619267] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 51.626659] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 51.634053] [ 51.635552] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 51.635561] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 51.635563] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 51.635567] Call Trace: [ 51.635569] <TASK> [ 51.635571] dump_stack_lvl+0x73/0xb0 [ 51.635575] print_report+0xd1/0x650 [ 51.635579] ? __virt_addr_valid+0x1db/0x2d0 [ 51.635583] ? kasan_atomics_helper+0x4b6e/0x5450 [ 51.635587] ? kasan_complete_mode_report_info+0x2a/0x200 [ 51.635593] ? kasan_atomics_helper+0x4b6e/0x5450 [ 51.635597] kasan_report+0x141/0x180 [ 51.635601] ? kasan_atomics_helper+0x4b6e/0x5450 [ 51.635606] __asan_report_store4_noabort+0x1b/0x30 [ 51.635611] kasan_atomics_helper+0x4b6e/0x5450 [ 51.635615] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 51.635619] ? __kmalloc_cache_noprof+0x189/0x420 [ 51.635624] ? kasan_atomics+0x152/0x310 [ 51.635629] kasan_atomics+0x1dc/0x310 [ 51.635634] ? __pfx_kasan_atomics+0x10/0x10 [ 51.635639] ? ktime_get_ts64+0x83/0x230 [ 51.635643] kunit_try_run_case+0x1a2/0x480 [ 51.635648] ? __pfx_kunit_try_run_case+0x10/0x10 [ 51.635652] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 51.635656] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 51.635661] ? __kthread_parkme+0x82/0x180 [ 51.635665] ? preempt_count_sub+0x50/0x80 [ 51.635669] ? __pfx_kunit_try_run_case+0x10/0x10 [ 51.635674] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 51.635678] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 51.635682] kthread+0x334/0x6f0 [ 51.635686] ? trace_preempt_on+0x20/0xc0 [ 51.635690] ? __pfx_kthread+0x10/0x10 [ 51.635694] ? _raw_spin_unlock_irq+0x47/0x80 [ 51.635698] ? calculate_sigpending+0x7b/0xa0 [ 51.635703] ? __pfx_kthread+0x10/0x10 [ 51.635707] ret_from_fork+0x113/0x1d0 [ 51.635711] ? __pfx_kthread+0x10/0x10 [ 51.635715] ret_from_fork_asm+0x1a/0x30 [ 51.635720] </TASK> [ 51.635722] [ 51.815376] Allocated by task 306: [ 51.818789] kasan_save_stack+0x45/0x70 [ 51.822628] kasan_save_track+0x18/0x40 [ 51.826468] kasan_save_alloc_info+0x3b/0x50 [ 51.830742] __kasan_kmalloc+0xb7/0xc0 [ 51.834493] __kmalloc_cache_noprof+0x189/0x420 [ 51.839026] kasan_atomics+0x95/0x310 [ 51.842693] kunit_try_run_case+0x1a2/0x480 [ 51.846887] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 51.852288] kthread+0x334/0x6f0 [ 51.855520] ret_from_fork+0x113/0x1d0 [ 51.859273] ret_from_fork_asm+0x1a/0x30 [ 51.863197] [ 51.864698] The buggy address belongs to the object at ffff8881066eaf00 [ 51.864698] which belongs to the cache kmalloc-64 of size 64 [ 51.877039] The buggy address is located 0 bytes to the right of [ 51.877039] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 51.889899] [ 51.891423] The buggy address belongs to the physical page: [ 51.896998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 51.905007] flags: 0x200000000000000(node=0|zone=2) [ 51.909884] page_type: f5(slab) [ 51.913032] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 51.920781] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.928526] page dumped because: kasan: bad access detected [ 51.934100] [ 51.935601] Memory state around the buggy address: [ 51.940417] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.947637] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 51.954856] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.962077] ^ [ 51.966869] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.974087] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 51.981307] ================================================================== [ 68.286280] ================================================================== [ 68.293512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 68.300902] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 68.308295] [ 68.309798] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 68.309805] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 68.309808] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 68.309812] Call Trace: [ 68.309813] <TASK> [ 68.309815] dump_stack_lvl+0x73/0xb0 [ 68.309820] print_report+0xd1/0x650 [ 68.309824] ? __virt_addr_valid+0x1db/0x2d0 [ 68.309828] ? kasan_atomics_helper+0x19e3/0x5450 [ 68.309832] ? kasan_complete_mode_report_info+0x2a/0x200 [ 68.309837] ? kasan_atomics_helper+0x19e3/0x5450 [ 68.309841] kasan_report+0x141/0x180 [ 68.309845] ? kasan_atomics_helper+0x19e3/0x5450 [ 68.309850] kasan_check_range+0x10c/0x1c0 [ 68.309855] __kasan_check_write+0x18/0x20 [ 68.309858] kasan_atomics_helper+0x19e3/0x5450 [ 68.309862] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 68.309866] ? __kmalloc_cache_noprof+0x189/0x420 [ 68.309871] ? kasan_atomics+0x152/0x310 [ 68.309876] kasan_atomics+0x1dc/0x310 [ 68.309881] ? __pfx_kasan_atomics+0x10/0x10 [ 68.309886] ? ktime_get_ts64+0x83/0x230 [ 68.309890] kunit_try_run_case+0x1a2/0x480 [ 68.309895] ? __pfx_kunit_try_run_case+0x10/0x10 [ 68.309899] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 68.309904] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 68.309908] ? __kthread_parkme+0x82/0x180 [ 68.309912] ? preempt_count_sub+0x50/0x80 [ 68.309916] ? __pfx_kunit_try_run_case+0x10/0x10 [ 68.309921] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 68.309925] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 68.309930] kthread+0x334/0x6f0 [ 68.309934] ? trace_preempt_on+0x20/0xc0 [ 68.309938] ? __pfx_kthread+0x10/0x10 [ 68.309942] ? _raw_spin_unlock_irq+0x47/0x80 [ 68.309946] ? calculate_sigpending+0x7b/0xa0 [ 68.309950] ? __pfx_kthread+0x10/0x10 [ 68.309955] ret_from_fork+0x113/0x1d0 [ 68.309958] ? __pfx_kthread+0x10/0x10 [ 68.309962] ret_from_fork_asm+0x1a/0x30 [ 68.309968] </TASK> [ 68.309970] [ 68.493078] Allocated by task 306: [ 68.496483] kasan_save_stack+0x45/0x70 [ 68.500323] kasan_save_track+0x18/0x40 [ 68.504213] kasan_save_alloc_info+0x3b/0x50 [ 68.508485] __kasan_kmalloc+0xb7/0xc0 [ 68.512239] __kmalloc_cache_noprof+0x189/0x420 [ 68.516773] kasan_atomics+0x95/0x310 [ 68.520446] kunit_try_run_case+0x1a2/0x480 [ 68.524632] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 68.530031] kthread+0x334/0x6f0 [ 68.533266] ret_from_fork+0x113/0x1d0 [ 68.537019] ret_from_fork_asm+0x1a/0x30 [ 68.540954] [ 68.542453] The buggy address belongs to the object at ffff8881066eaf00 [ 68.542453] which belongs to the cache kmalloc-64 of size 64 [ 68.554793] The buggy address is located 0 bytes to the right of [ 68.554793] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 68.567654] [ 68.569155] The buggy address belongs to the physical page: [ 68.574725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 68.582725] flags: 0x200000000000000(node=0|zone=2) [ 68.587605] page_type: f5(slab) [ 68.590753] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 68.598498] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.606237] page dumped because: kasan: bad access detected [ 68.611810] [ 68.613310] Memory state around the buggy address: [ 68.618103] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.625321] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 68.632567] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.639786] ^ [ 68.644579] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.651799] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 68.659016] ================================================================== [ 64.489430] ================================================================== [ 64.496670] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 64.504063] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 64.511457] [ 64.512956] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 64.512964] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 64.512966] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 64.512970] Call Trace: [ 64.512971] <TASK> [ 64.512973] dump_stack_lvl+0x73/0xb0 [ 64.512978] print_report+0xd1/0x650 [ 64.512982] ? __virt_addr_valid+0x1db/0x2d0 [ 64.512986] ? kasan_atomics_helper+0x1467/0x5450 [ 64.512990] ? kasan_complete_mode_report_info+0x2a/0x200 [ 64.512995] ? kasan_atomics_helper+0x1467/0x5450 [ 64.512999] kasan_report+0x141/0x180 [ 64.513004] ? kasan_atomics_helper+0x1467/0x5450 [ 64.513009] kasan_check_range+0x10c/0x1c0 [ 64.513013] __kasan_check_write+0x18/0x20 [ 64.513017] kasan_atomics_helper+0x1467/0x5450 [ 64.513021] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 64.513025] ? __kmalloc_cache_noprof+0x189/0x420 [ 64.513030] ? kasan_atomics+0x152/0x310 [ 64.513035] kasan_atomics+0x1dc/0x310 [ 64.513040] ? __pfx_kasan_atomics+0x10/0x10 [ 64.513045] ? ktime_get_ts64+0x83/0x230 [ 64.513049] kunit_try_run_case+0x1a2/0x480 [ 64.513054] ? __pfx_kunit_try_run_case+0x10/0x10 [ 64.513058] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 64.513063] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 64.513067] ? __kthread_parkme+0x82/0x180 [ 64.513071] ? preempt_count_sub+0x50/0x80 [ 64.513075] ? __pfx_kunit_try_run_case+0x10/0x10 [ 64.513080] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 64.513084] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 64.513089] kthread+0x334/0x6f0 [ 64.513092] ? trace_preempt_on+0x20/0xc0 [ 64.513097] ? __pfx_kthread+0x10/0x10 [ 64.513101] ? _raw_spin_unlock_irq+0x47/0x80 [ 64.513104] ? calculate_sigpending+0x7b/0xa0 [ 64.513109] ? __pfx_kthread+0x10/0x10 [ 64.513113] ret_from_fork+0x113/0x1d0 [ 64.513117] ? __pfx_kthread+0x10/0x10 [ 64.513121] ret_from_fork_asm+0x1a/0x30 [ 64.513127] </TASK> [ 64.513129] [ 64.696149] Allocated by task 306: [ 64.699556] kasan_save_stack+0x45/0x70 [ 64.703394] kasan_save_track+0x18/0x40 [ 64.707253] kasan_save_alloc_info+0x3b/0x50 [ 64.711533] __kasan_kmalloc+0xb7/0xc0 [ 64.715288] __kmalloc_cache_noprof+0x189/0x420 [ 64.719829] kasan_atomics+0x95/0x310 [ 64.723501] kunit_try_run_case+0x1a2/0x480 [ 64.727687] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 64.733089] kthread+0x334/0x6f0 [ 64.736348] ret_from_fork+0x113/0x1d0 [ 64.740161] ret_from_fork_asm+0x1a/0x30 [ 64.744093] [ 64.745594] The buggy address belongs to the object at ffff8881066eaf00 [ 64.745594] which belongs to the cache kmalloc-64 of size 64 [ 64.757935] The buggy address is located 0 bytes to the right of [ 64.757935] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 64.770796] [ 64.772294] The buggy address belongs to the physical page: [ 64.777868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 64.785867] flags: 0x200000000000000(node=0|zone=2) [ 64.790747] page_type: f5(slab) [ 64.793893] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 64.801643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.809422] page dumped because: kasan: bad access detected [ 64.814997] [ 64.816494] Memory state around the buggy address: [ 64.821287] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.828508] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 64.835727] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.842946] ^ [ 64.847739] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.854959] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.862184] ================================================================== [ 57.676189] ================================================================== [ 57.683430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 57.690743] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 57.698134] [ 57.699635] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 57.699643] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 57.699646] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 57.699649] Call Trace: [ 57.699651] <TASK> [ 57.699653] dump_stack_lvl+0x73/0xb0 [ 57.699657] print_report+0xd1/0x650 [ 57.699662] ? __virt_addr_valid+0x1db/0x2d0 [ 57.699666] ? kasan_atomics_helper+0xc70/0x5450 [ 57.699669] ? kasan_complete_mode_report_info+0x2a/0x200 [ 57.699675] ? kasan_atomics_helper+0xc70/0x5450 [ 57.699679] kasan_report+0x141/0x180 [ 57.699683] ? kasan_atomics_helper+0xc70/0x5450 [ 57.699688] kasan_check_range+0x10c/0x1c0 [ 57.699693] __kasan_check_write+0x18/0x20 [ 57.699696] kasan_atomics_helper+0xc70/0x5450 [ 57.699700] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 57.699704] ? __kmalloc_cache_noprof+0x189/0x420 [ 57.699709] ? kasan_atomics+0x152/0x310 [ 57.699715] kasan_atomics+0x1dc/0x310 [ 57.699719] ? __pfx_kasan_atomics+0x10/0x10 [ 57.699724] ? ktime_get_ts64+0x83/0x230 [ 57.699728] kunit_try_run_case+0x1a2/0x480 [ 57.699733] ? __pfx_kunit_try_run_case+0x10/0x10 [ 57.699737] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 57.699742] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 57.699746] ? __kthread_parkme+0x82/0x180 [ 57.699750] ? preempt_count_sub+0x50/0x80 [ 57.699754] ? __pfx_kunit_try_run_case+0x10/0x10 [ 57.699759] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 57.699763] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 57.699768] kthread+0x334/0x6f0 [ 57.699772] ? trace_preempt_on+0x20/0xc0 [ 57.699776] ? __pfx_kthread+0x10/0x10 [ 57.699780] ? _raw_spin_unlock_irq+0x47/0x80 [ 57.699784] ? calculate_sigpending+0x7b/0xa0 [ 57.699788] ? __pfx_kthread+0x10/0x10 [ 57.699793] ret_from_fork+0x113/0x1d0 [ 57.699796] ? __pfx_kthread+0x10/0x10 [ 57.699800] ret_from_fork_asm+0x1a/0x30 [ 57.699806] </TASK> [ 57.699808] [ 57.882526] Allocated by task 306: [ 57.885932] kasan_save_stack+0x45/0x70 [ 57.889772] kasan_save_track+0x18/0x40 [ 57.893610] kasan_save_alloc_info+0x3b/0x50 [ 57.897885] __kasan_kmalloc+0xb7/0xc0 [ 57.901643] __kmalloc_cache_noprof+0x189/0x420 [ 57.906178] kasan_atomics+0x95/0x310 [ 57.909850] kunit_try_run_case+0x1a2/0x480 [ 57.914037] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 57.919438] kthread+0x334/0x6f0 [ 57.922670] ret_from_fork+0x113/0x1d0 [ 57.926422] ret_from_fork_asm+0x1a/0x30 [ 57.930376] [ 57.931908] The buggy address belongs to the object at ffff8881066eaf00 [ 57.931908] which belongs to the cache kmalloc-64 of size 64 [ 57.944249] The buggy address is located 0 bytes to the right of [ 57.944249] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 57.957110] [ 57.958611] The buggy address belongs to the physical page: [ 57.964182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 57.972183] flags: 0x200000000000000(node=0|zone=2) [ 57.977062] page_type: f5(slab) [ 57.980207] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 57.987949] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.995696] page dumped because: kasan: bad access detected [ 58.001267] [ 58.002768] Memory state around the buggy address: [ 58.007560] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.014778] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 58.021999] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.029217] ^ [ 58.034010] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.041229] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 58.048448] ================================================================== [ 54.639445] ================================================================== [ 54.646684] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 54.653992] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 54.661422] [ 54.662919] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 54.662927] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 54.662930] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 54.662933] Call Trace: [ 54.662935] <TASK> [ 54.662937] dump_stack_lvl+0x73/0xb0 [ 54.662942] print_report+0xd1/0x650 [ 54.662946] ? __virt_addr_valid+0x1db/0x2d0 [ 54.662950] ? kasan_atomics_helper+0x72f/0x5450 [ 54.662954] ? kasan_complete_mode_report_info+0x2a/0x200 [ 54.662959] ? kasan_atomics_helper+0x72f/0x5450 [ 54.662963] kasan_report+0x141/0x180 [ 54.662967] ? kasan_atomics_helper+0x72f/0x5450 [ 54.662972] kasan_check_range+0x10c/0x1c0 [ 54.662977] __kasan_check_write+0x18/0x20 [ 54.662980] kasan_atomics_helper+0x72f/0x5450 [ 54.662984] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 54.662989] ? __kmalloc_cache_noprof+0x189/0x420 [ 54.662994] ? kasan_atomics+0x152/0x310 [ 54.662999] kasan_atomics+0x1dc/0x310 [ 54.663003] ? __pfx_kasan_atomics+0x10/0x10 [ 54.663008] ? ktime_get_ts64+0x83/0x230 [ 54.663013] kunit_try_run_case+0x1a2/0x480 [ 54.663017] ? __pfx_kunit_try_run_case+0x10/0x10 [ 54.663022] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 54.663026] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 54.663031] ? __kthread_parkme+0x82/0x180 [ 54.663035] ? preempt_count_sub+0x50/0x80 [ 54.663039] ? __pfx_kunit_try_run_case+0x10/0x10 [ 54.663044] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 54.663048] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 54.663052] kthread+0x334/0x6f0 [ 54.663056] ? trace_preempt_on+0x20/0xc0 [ 54.663060] ? __pfx_kthread+0x10/0x10 [ 54.663064] ? _raw_spin_unlock_irq+0x47/0x80 [ 54.663068] ? calculate_sigpending+0x7b/0xa0 [ 54.663073] ? __pfx_kthread+0x10/0x10 [ 54.663077] ret_from_fork+0x113/0x1d0 [ 54.663081] ? __pfx_kthread+0x10/0x10 [ 54.663085] ret_from_fork_asm+0x1a/0x30 [ 54.663090] </TASK> [ 54.663092] [ 54.845782] Allocated by task 306: [ 54.849190] kasan_save_stack+0x45/0x70 [ 54.853030] kasan_save_track+0x18/0x40 [ 54.856876] kasan_save_alloc_info+0x3b/0x50 [ 54.861151] __kasan_kmalloc+0xb7/0xc0 [ 54.864901] __kmalloc_cache_noprof+0x189/0x420 [ 54.869434] kasan_atomics+0x95/0x310 [ 54.873100] kunit_try_run_case+0x1a2/0x480 [ 54.877286] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 54.882687] kthread+0x334/0x6f0 [ 54.885928] ret_from_fork+0x113/0x1d0 [ 54.889679] ret_from_fork_asm+0x1a/0x30 [ 54.893607] [ 54.895105] The buggy address belongs to the object at ffff8881066eaf00 [ 54.895105] which belongs to the cache kmalloc-64 of size 64 [ 54.907448] The buggy address is located 0 bytes to the right of [ 54.907448] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 54.920316] [ 54.921842] The buggy address belongs to the physical page: [ 54.927430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 54.935432] flags: 0x200000000000000(node=0|zone=2) [ 54.940311] page_type: f5(slab) [ 54.943456] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 54.951198] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.958943] page dumped because: kasan: bad access detected [ 54.964516] [ 54.966014] Memory state around the buggy address: [ 54.970807] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.978026] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 54.985247] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.992467] ^ [ 54.997258] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.004480] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 55.011707] ================================================================== [ 58.811698] ================================================================== [ 58.818937] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 58.826245] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 58.833645] [ 58.835144] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 58.835152] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 58.835155] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 58.835158] Call Trace: [ 58.835160] <TASK> [ 58.835162] dump_stack_lvl+0x73/0xb0 [ 58.835167] print_report+0xd1/0x650 [ 58.835171] ? __virt_addr_valid+0x1db/0x2d0 [ 58.835175] ? kasan_atomics_helper+0xde0/0x5450 [ 58.835179] ? kasan_complete_mode_report_info+0x2a/0x200 [ 58.835184] ? kasan_atomics_helper+0xde0/0x5450 [ 58.835188] kasan_report+0x141/0x180 [ 58.835192] ? kasan_atomics_helper+0xde0/0x5450 [ 58.835197] kasan_check_range+0x10c/0x1c0 [ 58.835202] __kasan_check_write+0x18/0x20 [ 58.835205] kasan_atomics_helper+0xde0/0x5450 [ 58.835209] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 58.835213] ? __kmalloc_cache_noprof+0x189/0x420 [ 58.835218] ? kasan_atomics+0x152/0x310 [ 58.835224] kasan_atomics+0x1dc/0x310 [ 58.835228] ? __pfx_kasan_atomics+0x10/0x10 [ 58.835233] ? ktime_get_ts64+0x83/0x230 [ 58.835237] kunit_try_run_case+0x1a2/0x480 [ 58.835242] ? __pfx_kunit_try_run_case+0x10/0x10 [ 58.835246] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 58.835251] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 58.835255] ? __kthread_parkme+0x82/0x180 [ 58.835259] ? preempt_count_sub+0x50/0x80 [ 58.835263] ? __pfx_kunit_try_run_case+0x10/0x10 [ 58.835268] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 58.835272] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 58.835276] kthread+0x334/0x6f0 [ 58.835280] ? trace_preempt_on+0x20/0xc0 [ 58.835284] ? __pfx_kthread+0x10/0x10 [ 58.835288] ? _raw_spin_unlock_irq+0x47/0x80 [ 58.835292] ? calculate_sigpending+0x7b/0xa0 [ 58.835297] ? __pfx_kthread+0x10/0x10 [ 58.835301] ret_from_fork+0x113/0x1d0 [ 58.835304] ? __pfx_kthread+0x10/0x10 [ 58.835308] ret_from_fork_asm+0x1a/0x30 [ 58.835314] </TASK> [ 58.835316] [ 59.018096] Allocated by task 306: [ 59.021504] kasan_save_stack+0x45/0x70 [ 59.025365] kasan_save_track+0x18/0x40 [ 59.029251] kasan_save_alloc_info+0x3b/0x50 [ 59.033522] __kasan_kmalloc+0xb7/0xc0 [ 59.037276] __kmalloc_cache_noprof+0x189/0x420 [ 59.041808] kasan_atomics+0x95/0x310 [ 59.045475] kunit_try_run_case+0x1a2/0x480 [ 59.049661] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 59.055060] kthread+0x334/0x6f0 [ 59.058291] ret_from_fork+0x113/0x1d0 [ 59.062046] ret_from_fork_asm+0x1a/0x30 [ 59.065972] [ 59.067471] The buggy address belongs to the object at ffff8881066eaf00 [ 59.067471] which belongs to the cache kmalloc-64 of size 64 [ 59.079812] The buggy address is located 0 bytes to the right of [ 59.079812] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 59.092673] [ 59.094173] The buggy address belongs to the physical page: [ 59.099744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 59.107744] flags: 0x200000000000000(node=0|zone=2) [ 59.112624] page_type: f5(slab) [ 59.115772] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 59.123517] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.131258] page dumped because: kasan: bad access detected [ 59.136828] [ 59.138348] Memory state around the buggy address: [ 59.143193] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.150420] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 59.157646] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.164866] ^ [ 59.169659] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.176880] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 59.184107] ================================================================== [ 69.046385] ================================================================== [ 69.053652] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 69.061045] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 69.068438] [ 69.069937] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 69.069944] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 69.069947] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 69.069951] Call Trace: [ 69.069952] <TASK> [ 69.069954] dump_stack_lvl+0x73/0xb0 [ 69.069959] print_report+0xd1/0x650 [ 69.069963] ? __virt_addr_valid+0x1db/0x2d0 [ 69.069967] ? kasan_atomics_helper+0x1b22/0x5450 [ 69.069971] ? kasan_complete_mode_report_info+0x2a/0x200 [ 69.069976] ? kasan_atomics_helper+0x1b22/0x5450 [ 69.069980] kasan_report+0x141/0x180 [ 69.069984] ? kasan_atomics_helper+0x1b22/0x5450 [ 69.069989] kasan_check_range+0x10c/0x1c0 [ 69.069994] __kasan_check_write+0x18/0x20 [ 69.069997] kasan_atomics_helper+0x1b22/0x5450 [ 69.070001] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 69.070005] ? __kmalloc_cache_noprof+0x189/0x420 [ 69.070010] ? kasan_atomics+0x152/0x310 [ 69.070015] kasan_atomics+0x1dc/0x310 [ 69.070020] ? __pfx_kasan_atomics+0x10/0x10 [ 69.070025] ? ktime_get_ts64+0x83/0x230 [ 69.070029] kunit_try_run_case+0x1a2/0x480 [ 69.070034] ? __pfx_kunit_try_run_case+0x10/0x10 [ 69.070038] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 69.070043] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 69.070047] ? __kthread_parkme+0x82/0x180 [ 69.070051] ? preempt_count_sub+0x50/0x80 [ 69.070055] ? __pfx_kunit_try_run_case+0x10/0x10 [ 69.070060] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 69.070064] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 69.070069] kthread+0x334/0x6f0 [ 69.070072] ? trace_preempt_on+0x20/0xc0 [ 69.070077] ? __pfx_kthread+0x10/0x10 [ 69.070081] ? _raw_spin_unlock_irq+0x47/0x80 [ 69.070085] ? calculate_sigpending+0x7b/0xa0 [ 69.070089] ? __pfx_kthread+0x10/0x10 [ 69.070093] ret_from_fork+0x113/0x1d0 [ 69.070097] ? __pfx_kthread+0x10/0x10 [ 69.070101] ret_from_fork_asm+0x1a/0x30 [ 69.070107] </TASK> [ 69.070109] [ 69.253108] Allocated by task 306: [ 69.256512] kasan_save_stack+0x45/0x70 [ 69.260376] kasan_save_track+0x18/0x40 [ 69.264253] kasan_save_alloc_info+0x3b/0x50 [ 69.268534] __kasan_kmalloc+0xb7/0xc0 [ 69.272286] __kmalloc_cache_noprof+0x189/0x420 [ 69.276826] kasan_atomics+0x95/0x310 [ 69.280493] kunit_try_run_case+0x1a2/0x480 [ 69.284677] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 69.290077] kthread+0x334/0x6f0 [ 69.293310] ret_from_fork+0x113/0x1d0 [ 69.297063] ret_from_fork_asm+0x1a/0x30 [ 69.300988] [ 69.302489] The buggy address belongs to the object at ffff8881066eaf00 [ 69.302489] which belongs to the cache kmalloc-64 of size 64 [ 69.314829] The buggy address is located 0 bytes to the right of [ 69.314829] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 69.327691] [ 69.329190] The buggy address belongs to the physical page: [ 69.334764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 69.342762] flags: 0x200000000000000(node=0|zone=2) [ 69.347642] page_type: f5(slab) [ 69.350788] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 69.358528] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.366274] page dumped because: kasan: bad access detected [ 69.371848] [ 69.373376] Memory state around the buggy address: [ 69.378202] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.385429] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 69.392646] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.399866] ^ [ 69.404659] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.411880] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 69.419098] ================================================================== [ 72.125911] ================================================================== [ 72.133155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 72.140549] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 72.147949] [ 72.149452] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 72.149460] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 72.149463] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 72.149467] Call Trace: [ 72.149469] <TASK> [ 72.149471] dump_stack_lvl+0x73/0xb0 [ 72.149475] print_report+0xd1/0x650 [ 72.149479] ? __virt_addr_valid+0x1db/0x2d0 [ 72.149483] ? kasan_atomics_helper+0x1f43/0x5450 [ 72.149487] ? kasan_complete_mode_report_info+0x2a/0x200 [ 72.149493] ? kasan_atomics_helper+0x1f43/0x5450 [ 72.149497] kasan_report+0x141/0x180 [ 72.149501] ? kasan_atomics_helper+0x1f43/0x5450 [ 72.149506] kasan_check_range+0x10c/0x1c0 [ 72.149510] __kasan_check_write+0x18/0x20 [ 72.149514] kasan_atomics_helper+0x1f43/0x5450 [ 72.149518] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 72.149522] ? __kmalloc_cache_noprof+0x189/0x420 [ 72.149527] ? kasan_atomics+0x152/0x310 [ 72.149532] kasan_atomics+0x1dc/0x310 [ 72.149537] ? __pfx_kasan_atomics+0x10/0x10 [ 72.149542] ? ktime_get_ts64+0x83/0x230 [ 72.149546] kunit_try_run_case+0x1a2/0x480 [ 72.149551] ? __pfx_kunit_try_run_case+0x10/0x10 [ 72.149555] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 72.149560] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 72.149564] ? __kthread_parkme+0x82/0x180 [ 72.149568] ? preempt_count_sub+0x50/0x80 [ 72.149572] ? __pfx_kunit_try_run_case+0x10/0x10 [ 72.149577] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 72.149581] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 72.149586] kthread+0x334/0x6f0 [ 72.149589] ? trace_preempt_on+0x20/0xc0 [ 72.149594] ? __pfx_kthread+0x10/0x10 [ 72.149597] ? _raw_spin_unlock_irq+0x47/0x80 [ 72.149601] ? calculate_sigpending+0x7b/0xa0 [ 72.149606] ? __pfx_kthread+0x10/0x10 [ 72.149610] ret_from_fork+0x113/0x1d0 [ 72.149614] ? __pfx_kthread+0x10/0x10 [ 72.149617] ret_from_fork_asm+0x1a/0x30 [ 72.149623] </TASK> [ 72.149625] [ 72.332767] Allocated by task 306: [ 72.336171] kasan_save_stack+0x45/0x70 [ 72.340012] kasan_save_track+0x18/0x40 [ 72.343849] kasan_save_alloc_info+0x3b/0x50 [ 72.348123] __kasan_kmalloc+0xb7/0xc0 [ 72.351875] __kmalloc_cache_noprof+0x189/0x420 [ 72.356422] kasan_atomics+0x95/0x310 [ 72.360093] kunit_try_run_case+0x1a2/0x480 [ 72.364286] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 72.369685] kthread+0x334/0x6f0 [ 72.372918] ret_from_fork+0x113/0x1d0 [ 72.376670] ret_from_fork_asm+0x1a/0x30 [ 72.380596] [ 72.382097] The buggy address belongs to the object at ffff8881066eaf00 [ 72.382097] which belongs to the cache kmalloc-64 of size 64 [ 72.394439] The buggy address is located 0 bytes to the right of [ 72.394439] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 72.407309] [ 72.408806] The buggy address belongs to the physical page: [ 72.414422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 72.422423] flags: 0x200000000000000(node=0|zone=2) [ 72.427303] page_type: f5(slab) [ 72.430447] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 72.438188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.445936] page dumped because: kasan: bad access detected [ 72.451507] [ 72.453007] Memory state around the buggy address: [ 72.457800] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.465018] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 72.472237] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.479458] ^ [ 72.484252] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.491480] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 72.498719] ================================================================== [ 73.262980] ================================================================== [ 73.270226] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 73.277618] Read of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 73.284925] [ 73.286425] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 73.286433] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 73.286436] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 73.286440] Call Trace: [ 73.286442] <TASK> [ 73.286443] dump_stack_lvl+0x73/0xb0 [ 73.286448] print_report+0xd1/0x650 [ 73.286452] ? __virt_addr_valid+0x1db/0x2d0 [ 73.286456] ? kasan_atomics_helper+0x4f98/0x5450 [ 73.286460] ? kasan_complete_mode_report_info+0x2a/0x200 [ 73.286466] ? kasan_atomics_helper+0x4f98/0x5450 [ 73.286470] kasan_report+0x141/0x180 [ 73.286474] ? kasan_atomics_helper+0x4f98/0x5450 [ 73.286479] __asan_report_load8_noabort+0x18/0x20 [ 73.286484] kasan_atomics_helper+0x4f98/0x5450 [ 73.286488] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 73.286492] ? __kmalloc_cache_noprof+0x189/0x420 [ 73.286497] ? kasan_atomics+0x152/0x310 [ 73.286502] kasan_atomics+0x1dc/0x310 [ 73.286507] ? __pfx_kasan_atomics+0x10/0x10 [ 73.286511] ? ktime_get_ts64+0x83/0x230 [ 73.286516] kunit_try_run_case+0x1a2/0x480 [ 73.286521] ? __pfx_kunit_try_run_case+0x10/0x10 [ 73.286525] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 73.286529] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 73.286534] ? __kthread_parkme+0x82/0x180 [ 73.286538] ? preempt_count_sub+0x50/0x80 [ 73.286542] ? __pfx_kunit_try_run_case+0x10/0x10 [ 73.286547] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 73.286551] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 73.286555] kthread+0x334/0x6f0 [ 73.286559] ? trace_preempt_on+0x20/0xc0 [ 73.286563] ? __pfx_kthread+0x10/0x10 [ 73.286567] ? _raw_spin_unlock_irq+0x47/0x80 [ 73.286571] ? calculate_sigpending+0x7b/0xa0 [ 73.286576] ? __pfx_kthread+0x10/0x10 [ 73.286580] ret_from_fork+0x113/0x1d0 [ 73.286583] ? __pfx_kthread+0x10/0x10 [ 73.286587] ret_from_fork_asm+0x1a/0x30 [ 73.286593] </TASK> [ 73.286595] [ 73.466266] Allocated by task 306: [ 73.469672] kasan_save_stack+0x45/0x70 [ 73.473511] kasan_save_track+0x18/0x40 [ 73.477376] kasan_save_alloc_info+0x3b/0x50 [ 73.481674] __kasan_kmalloc+0xb7/0xc0 [ 73.485427] __kmalloc_cache_noprof+0x189/0x420 [ 73.489969] kasan_atomics+0x95/0x310 [ 73.493633] kunit_try_run_case+0x1a2/0x480 [ 73.497821] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 73.503219] kthread+0x334/0x6f0 [ 73.506454] ret_from_fork+0x113/0x1d0 [ 73.510204] ret_from_fork_asm+0x1a/0x30 [ 73.514132] [ 73.515632] The buggy address belongs to the object at ffff8881066eaf00 [ 73.515632] which belongs to the cache kmalloc-64 of size 64 [ 73.527972] The buggy address is located 0 bytes to the right of [ 73.527972] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 73.540841] [ 73.542378] The buggy address belongs to the physical page: [ 73.547983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 73.555990] flags: 0x200000000000000(node=0|zone=2) [ 73.560870] page_type: f5(slab) [ 73.564018] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 73.571766] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.579512] page dumped because: kasan: bad access detected [ 73.585085] [ 73.586585] Memory state around the buggy address: [ 73.591400] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.598639] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 73.605859] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.613078] ^ [ 73.617872] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.625101] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 73.632348] ================================================================== [ 61.086682] ================================================================== [ 61.093927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 61.101319] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 61.108661] [ 61.110162] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 61.110169] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 61.110172] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 61.110176] Call Trace: [ 61.110178] <TASK> [ 61.110179] dump_stack_lvl+0x73/0xb0 [ 61.110184] print_report+0xd1/0x650 [ 61.110188] ? __virt_addr_valid+0x1db/0x2d0 [ 61.110192] ? kasan_atomics_helper+0x4a1c/0x5450 [ 61.110196] ? kasan_complete_mode_report_info+0x2a/0x200 [ 61.110201] ? kasan_atomics_helper+0x4a1c/0x5450 [ 61.110205] kasan_report+0x141/0x180 [ 61.110210] ? kasan_atomics_helper+0x4a1c/0x5450 [ 61.110215] __asan_report_load4_noabort+0x18/0x20 [ 61.110219] kasan_atomics_helper+0x4a1c/0x5450 [ 61.110224] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 61.110228] ? __kmalloc_cache_noprof+0x189/0x420 [ 61.110233] ? kasan_atomics+0x152/0x310 [ 61.110238] kasan_atomics+0x1dc/0x310 [ 61.110242] ? __pfx_kasan_atomics+0x10/0x10 [ 61.110247] ? ktime_get_ts64+0x83/0x230 [ 61.110252] kunit_try_run_case+0x1a2/0x480 [ 61.110256] ? __pfx_kunit_try_run_case+0x10/0x10 [ 61.110261] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 61.110265] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 61.110269] ? __kthread_parkme+0x82/0x180 [ 61.110273] ? preempt_count_sub+0x50/0x80 [ 61.110278] ? __pfx_kunit_try_run_case+0x10/0x10 [ 61.110282] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 61.110287] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 61.110291] kthread+0x334/0x6f0 [ 61.110295] ? trace_preempt_on+0x20/0xc0 [ 61.110299] ? __pfx_kthread+0x10/0x10 [ 61.110303] ? _raw_spin_unlock_irq+0x47/0x80 [ 61.110307] ? calculate_sigpending+0x7b/0xa0 [ 61.110312] ? __pfx_kthread+0x10/0x10 [ 61.110316] ret_from_fork+0x113/0x1d0 [ 61.110319] ? __pfx_kthread+0x10/0x10 [ 61.110323] ret_from_fork_asm+0x1a/0x30 [ 61.110349] </TASK> [ 61.110351] [ 61.290080] Allocated by task 306: [ 61.293485] kasan_save_stack+0x45/0x70 [ 61.297325] kasan_save_track+0x18/0x40 [ 61.301189] kasan_save_alloc_info+0x3b/0x50 [ 61.305463] __kasan_kmalloc+0xb7/0xc0 [ 61.309214] __kmalloc_cache_noprof+0x189/0x420 [ 61.313749] kasan_atomics+0x95/0x310 [ 61.317428] kunit_try_run_case+0x1a2/0x480 [ 61.321617] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 61.327017] kthread+0x334/0x6f0 [ 61.330248] ret_from_fork+0x113/0x1d0 [ 61.334001] ret_from_fork_asm+0x1a/0x30 [ 61.337926] [ 61.339429] The buggy address belongs to the object at ffff8881066eaf00 [ 61.339429] which belongs to the cache kmalloc-64 of size 64 [ 61.351768] The buggy address is located 0 bytes to the right of [ 61.351768] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 61.364630] [ 61.366130] The buggy address belongs to the physical page: [ 61.371701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 61.379702] flags: 0x200000000000000(node=0|zone=2) [ 61.384587] page_type: f5(slab) [ 61.387736] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 61.395484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.403222] page dumped because: kasan: bad access detected [ 61.408795] [ 61.410294] Memory state around the buggy address: [ 61.415088] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.422305] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 61.429527] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.436744] ^ [ 61.441538] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.448757] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 61.455976] ================================================================== [ 61.843200] ================================================================== [ 61.850446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 61.857838] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 61.865144] [ 61.866646] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 61.866654] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 61.866657] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 61.866660] Call Trace: [ 61.866662] <TASK> [ 61.866664] dump_stack_lvl+0x73/0xb0 [ 61.866668] print_report+0xd1/0x650 [ 61.866672] ? __virt_addr_valid+0x1db/0x2d0 [ 61.866676] ? kasan_atomics_helper+0x4a02/0x5450 [ 61.866680] ? kasan_complete_mode_report_info+0x2a/0x200 [ 61.866685] ? kasan_atomics_helper+0x4a02/0x5450 [ 61.866689] kasan_report+0x141/0x180 [ 61.866694] ? kasan_atomics_helper+0x4a02/0x5450 [ 61.866699] __asan_report_load4_noabort+0x18/0x20 [ 61.866703] kasan_atomics_helper+0x4a02/0x5450 [ 61.866708] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 61.866712] ? __kmalloc_cache_noprof+0x189/0x420 [ 61.866717] ? kasan_atomics+0x152/0x310 [ 61.866722] kasan_atomics+0x1dc/0x310 [ 61.866726] ? __pfx_kasan_atomics+0x10/0x10 [ 61.866731] ? ktime_get_ts64+0x83/0x230 [ 61.866735] kunit_try_run_case+0x1a2/0x480 [ 61.866740] ? __pfx_kunit_try_run_case+0x10/0x10 [ 61.866745] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 61.866749] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 61.866753] ? __kthread_parkme+0x82/0x180 [ 61.866757] ? preempt_count_sub+0x50/0x80 [ 61.866762] ? __pfx_kunit_try_run_case+0x10/0x10 [ 61.866766] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 61.866770] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 61.866775] kthread+0x334/0x6f0 [ 61.866779] ? trace_preempt_on+0x20/0xc0 [ 61.866783] ? __pfx_kthread+0x10/0x10 [ 61.866787] ? _raw_spin_unlock_irq+0x47/0x80 [ 61.866791] ? calculate_sigpending+0x7b/0xa0 [ 61.866795] ? __pfx_kthread+0x10/0x10 [ 61.866800] ret_from_fork+0x113/0x1d0 [ 61.866803] ? __pfx_kthread+0x10/0x10 [ 61.866807] ret_from_fork_asm+0x1a/0x30 [ 61.866813] </TASK> [ 61.866815] [ 62.046485] Allocated by task 306: [ 62.049890] kasan_save_stack+0x45/0x70 [ 62.053729] kasan_save_track+0x18/0x40 [ 62.057568] kasan_save_alloc_info+0x3b/0x50 [ 62.061843] __kasan_kmalloc+0xb7/0xc0 [ 62.065595] __kmalloc_cache_noprof+0x189/0x420 [ 62.070138] kasan_atomics+0x95/0x310 [ 62.073812] kunit_try_run_case+0x1a2/0x480 [ 62.077996] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 62.083395] kthread+0x334/0x6f0 [ 62.086647] ret_from_fork+0x113/0x1d0 [ 62.090418] ret_from_fork_asm+0x1a/0x30 [ 62.094364] [ 62.095909] The buggy address belongs to the object at ffff8881066eaf00 [ 62.095909] which belongs to the cache kmalloc-64 of size 64 [ 62.108245] The buggy address is located 0 bytes to the right of [ 62.108245] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 62.121114] [ 62.122612] The buggy address belongs to the physical page: [ 62.128187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 62.136193] flags: 0x200000000000000(node=0|zone=2) [ 62.141072] page_type: f5(slab) [ 62.144219] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 62.151957] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.159698] page dumped because: kasan: bad access detected [ 62.165271] [ 62.166770] Memory state around the buggy address: [ 62.171562] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.178781] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 62.186000] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.193220] ^ [ 62.198014] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.205232] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.212451] ================================================================== [ 50.474233] ================================================================== [ 50.489124] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 50.496522] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 50.503830] [ 50.505348] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 50.505358] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 50.505361] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 50.505365] Call Trace: [ 50.505367] <TASK> [ 50.505369] dump_stack_lvl+0x73/0xb0 [ 50.505386] print_report+0xd1/0x650 [ 50.505390] ? __virt_addr_valid+0x1db/0x2d0 [ 50.505407] ? kasan_atomics_helper+0x4bbc/0x5450 [ 50.505411] ? kasan_complete_mode_report_info+0x2a/0x200 [ 50.505416] ? kasan_atomics_helper+0x4bbc/0x5450 [ 50.505420] kasan_report+0x141/0x180 [ 50.505424] ? kasan_atomics_helper+0x4bbc/0x5450 [ 50.505429] __asan_report_load4_noabort+0x18/0x20 [ 50.505434] kasan_atomics_helper+0x4bbc/0x5450 [ 50.505437] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 50.505441] ? __kmalloc_cache_noprof+0x189/0x420 [ 50.505446] ? kasan_atomics+0x152/0x310 [ 50.505451] kasan_atomics+0x1dc/0x310 [ 50.505455] ? __pfx_kasan_atomics+0x10/0x10 [ 50.505460] ? ktime_get_ts64+0x83/0x230 [ 50.505464] kunit_try_run_case+0x1a2/0x480 [ 50.505469] ? __pfx_kunit_try_run_case+0x10/0x10 [ 50.505473] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 50.505477] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 50.505481] ? __kthread_parkme+0x82/0x180 [ 50.505485] ? preempt_count_sub+0x50/0x80 [ 50.505489] ? __pfx_kunit_try_run_case+0x10/0x10 [ 50.505493] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 50.505497] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 50.505502] kthread+0x334/0x6f0 [ 50.505505] ? trace_preempt_on+0x20/0xc0 [ 50.505509] ? __pfx_kthread+0x10/0x10 [ 50.505513] ? _raw_spin_unlock_irq+0x47/0x80 [ 50.505517] ? calculate_sigpending+0x7b/0xa0 [ 50.505521] ? __pfx_kthread+0x10/0x10 [ 50.505525] ret_from_fork+0x113/0x1d0 [ 50.505528] ? __pfx_kthread+0x10/0x10 [ 50.505532] ret_from_fork_asm+0x1a/0x30 [ 50.505538] </TASK> [ 50.505540] [ 50.685309] Allocated by task 306: [ 50.688715] kasan_save_stack+0x45/0x70 [ 50.692552] kasan_save_track+0x18/0x40 [ 50.696415] kasan_save_alloc_info+0x3b/0x50 [ 50.700691] __kasan_kmalloc+0xb7/0xc0 [ 50.704444] __kmalloc_cache_noprof+0x189/0x420 [ 50.708978] kasan_atomics+0x95/0x310 [ 50.712651] kunit_try_run_case+0x1a2/0x480 [ 50.716838] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 50.722245] kthread+0x334/0x6f0 [ 50.725477] ret_from_fork+0x113/0x1d0 [ 50.729229] ret_from_fork_asm+0x1a/0x30 [ 50.733156] [ 50.734654] The buggy address belongs to the object at ffff8881066eaf00 [ 50.734654] which belongs to the cache kmalloc-64 of size 64 [ 50.746988] The buggy address is located 0 bytes to the right of [ 50.746988] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 50.759851] [ 50.761363] The buggy address belongs to the physical page: [ 50.766965] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 50.774965] flags: 0x200000000000000(node=0|zone=2) [ 50.779843] page_type: f5(slab) [ 50.782990] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 50.790731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.798476] page dumped because: kasan: bad access detected [ 50.804050] [ 50.805549] Memory state around the buggy address: [ 50.810377] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.817632] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 50.824860] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 50.832078] ^ [ 50.836870] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.844088] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 50.851308] ================================================================== [ 59.950519] ================================================================== [ 59.957757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 59.965065] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 59.972467] [ 59.973966] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 59.973973] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 59.973976] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 59.973979] Call Trace: [ 59.973981] <TASK> [ 59.973983] dump_stack_lvl+0x73/0xb0 [ 59.973988] print_report+0xd1/0x650 [ 59.973992] ? __virt_addr_valid+0x1db/0x2d0 [ 59.973996] ? kasan_atomics_helper+0xfa9/0x5450 [ 59.973999] ? kasan_complete_mode_report_info+0x2a/0x200 [ 59.974005] ? kasan_atomics_helper+0xfa9/0x5450 [ 59.974009] kasan_report+0x141/0x180 [ 59.974013] ? kasan_atomics_helper+0xfa9/0x5450 [ 59.974018] kasan_check_range+0x10c/0x1c0 [ 59.974023] __kasan_check_write+0x18/0x20 [ 59.974027] kasan_atomics_helper+0xfa9/0x5450 [ 59.974031] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 59.974035] ? __kmalloc_cache_noprof+0x189/0x420 [ 59.974040] ? kasan_atomics+0x152/0x310 [ 59.974045] kasan_atomics+0x1dc/0x310 [ 59.974049] ? __pfx_kasan_atomics+0x10/0x10 [ 59.974054] ? ktime_get_ts64+0x83/0x230 [ 59.974059] kunit_try_run_case+0x1a2/0x480 [ 59.974063] ? __pfx_kunit_try_run_case+0x10/0x10 [ 59.974068] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 59.974072] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 59.974077] ? __kthread_parkme+0x82/0x180 [ 59.974080] ? preempt_count_sub+0x50/0x80 [ 59.974085] ? __pfx_kunit_try_run_case+0x10/0x10 [ 59.974090] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 59.974094] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 59.974099] kthread+0x334/0x6f0 [ 59.974102] ? trace_preempt_on+0x20/0xc0 [ 59.974106] ? __pfx_kthread+0x10/0x10 [ 59.974111] ? _raw_spin_unlock_irq+0x47/0x80 [ 59.974114] ? calculate_sigpending+0x7b/0xa0 [ 59.974119] ? __pfx_kthread+0x10/0x10 [ 59.974123] ret_from_fork+0x113/0x1d0 [ 59.974127] ? __pfx_kthread+0x10/0x10 [ 59.974131] ret_from_fork_asm+0x1a/0x30 [ 59.974137] </TASK> [ 59.974138] [ 60.156858] Allocated by task 306: [ 60.160264] kasan_save_stack+0x45/0x70 [ 60.164101] kasan_save_track+0x18/0x40 [ 60.167941] kasan_save_alloc_info+0x3b/0x50 [ 60.172216] __kasan_kmalloc+0xb7/0xc0 [ 60.175976] __kmalloc_cache_noprof+0x189/0x420 [ 60.180517] kasan_atomics+0x95/0x310 [ 60.184182] kunit_try_run_case+0x1a2/0x480 [ 60.188404] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 60.193811] kthread+0x334/0x6f0 [ 60.197044] ret_from_fork+0x113/0x1d0 [ 60.200797] ret_from_fork_asm+0x1a/0x30 [ 60.204722] [ 60.206221] The buggy address belongs to the object at ffff8881066eaf00 [ 60.206221] which belongs to the cache kmalloc-64 of size 64 [ 60.218563] The buggy address is located 0 bytes to the right of [ 60.218563] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 60.231428] [ 60.232925] The buggy address belongs to the physical page: [ 60.238496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 60.246495] flags: 0x200000000000000(node=0|zone=2) [ 60.251394] page_type: f5(slab) [ 60.254565] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 60.262306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.270051] page dumped because: kasan: bad access detected [ 60.275623] [ 60.277123] Memory state around the buggy address: [ 60.281917] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.289145] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 60.296376] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.303627] ^ [ 60.308427] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.315646] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 60.322866] ================================================================== [ 67.146265] ================================================================== [ 67.153512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 67.160905] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 67.168306] [ 67.169807] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 67.169815] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 67.169818] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 67.169821] Call Trace: [ 67.169823] <TASK> [ 67.169825] dump_stack_lvl+0x73/0xb0 [ 67.169829] print_report+0xd1/0x650 [ 67.169834] ? __virt_addr_valid+0x1db/0x2d0 [ 67.169838] ? kasan_atomics_helper+0x1818/0x5450 [ 67.169842] ? kasan_complete_mode_report_info+0x2a/0x200 [ 67.169847] ? kasan_atomics_helper+0x1818/0x5450 [ 67.169851] kasan_report+0x141/0x180 [ 67.169855] ? kasan_atomics_helper+0x1818/0x5450 [ 67.169860] kasan_check_range+0x10c/0x1c0 [ 67.169865] __kasan_check_write+0x18/0x20 [ 67.169868] kasan_atomics_helper+0x1818/0x5450 [ 67.169873] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 67.169877] ? __kmalloc_cache_noprof+0x189/0x420 [ 67.169882] ? kasan_atomics+0x152/0x310 [ 67.169887] kasan_atomics+0x1dc/0x310 [ 67.169891] ? __pfx_kasan_atomics+0x10/0x10 [ 67.169896] ? ktime_get_ts64+0x83/0x230 [ 67.169901] kunit_try_run_case+0x1a2/0x480 [ 67.169905] ? __pfx_kunit_try_run_case+0x10/0x10 [ 67.169910] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 67.169914] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 67.169919] ? __kthread_parkme+0x82/0x180 [ 67.169922] ? preempt_count_sub+0x50/0x80 [ 67.169927] ? __pfx_kunit_try_run_case+0x10/0x10 [ 67.169931] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 67.169936] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 67.169940] kthread+0x334/0x6f0 [ 67.169944] ? trace_preempt_on+0x20/0xc0 [ 67.169948] ? __pfx_kthread+0x10/0x10 [ 67.169952] ? _raw_spin_unlock_irq+0x47/0x80 [ 67.169956] ? calculate_sigpending+0x7b/0xa0 [ 67.169961] ? __pfx_kthread+0x10/0x10 [ 67.169965] ret_from_fork+0x113/0x1d0 [ 67.169968] ? __pfx_kthread+0x10/0x10 [ 67.169972] ret_from_fork_asm+0x1a/0x30 [ 67.169978] </TASK> [ 67.169980] [ 67.353060] Allocated by task 306: [ 67.356466] kasan_save_stack+0x45/0x70 [ 67.360307] kasan_save_track+0x18/0x40 [ 67.364156] kasan_save_alloc_info+0x3b/0x50 [ 67.368436] __kasan_kmalloc+0xb7/0xc0 [ 67.372188] __kmalloc_cache_noprof+0x189/0x420 [ 67.376722] kasan_atomics+0x95/0x310 [ 67.380419] kunit_try_run_case+0x1a2/0x480 [ 67.384606] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 67.390008] kthread+0x334/0x6f0 [ 67.393239] ret_from_fork+0x113/0x1d0 [ 67.396992] ret_from_fork_asm+0x1a/0x30 [ 67.400918] [ 67.402421] The buggy address belongs to the object at ffff8881066eaf00 [ 67.402421] which belongs to the cache kmalloc-64 of size 64 [ 67.414757] The buggy address is located 0 bytes to the right of [ 67.414757] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 67.427621] [ 67.429119] The buggy address belongs to the physical page: [ 67.434691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 67.442691] flags: 0x200000000000000(node=0|zone=2) [ 67.447570] page_type: f5(slab) [ 67.450718] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 67.458465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.466204] page dumped because: kasan: bad access detected [ 67.471777] [ 67.473276] Memory state around the buggy address: [ 67.478070] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.485298] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 67.492526] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.499751] ^ [ 67.504545] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.511764] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 67.518983] ================================================================== [ 65.246254] ================================================================== [ 65.253501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 65.260894] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 65.268295] [ 65.269795] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 65.269803] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 65.269806] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 65.269809] Call Trace: [ 65.269811] <TASK> [ 65.269813] dump_stack_lvl+0x73/0xb0 [ 65.269818] print_report+0xd1/0x650 [ 65.269822] ? __virt_addr_valid+0x1db/0x2d0 [ 65.269826] ? kasan_atomics_helper+0x151d/0x5450 [ 65.269830] ? kasan_complete_mode_report_info+0x2a/0x200 [ 65.269835] ? kasan_atomics_helper+0x151d/0x5450 [ 65.269839] kasan_report+0x141/0x180 [ 65.269843] ? kasan_atomics_helper+0x151d/0x5450 [ 65.269848] kasan_check_range+0x10c/0x1c0 [ 65.269853] __kasan_check_write+0x18/0x20 [ 65.269856] kasan_atomics_helper+0x151d/0x5450 [ 65.269861] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 65.269865] ? __kmalloc_cache_noprof+0x189/0x420 [ 65.269870] ? kasan_atomics+0x152/0x310 [ 65.269875] kasan_atomics+0x1dc/0x310 [ 65.269879] ? __pfx_kasan_atomics+0x10/0x10 [ 65.269884] ? ktime_get_ts64+0x83/0x230 [ 65.269889] kunit_try_run_case+0x1a2/0x480 [ 65.269893] ? __pfx_kunit_try_run_case+0x10/0x10 [ 65.269898] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 65.269902] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 65.269907] ? __kthread_parkme+0x82/0x180 [ 65.269910] ? preempt_count_sub+0x50/0x80 [ 65.269915] ? __pfx_kunit_try_run_case+0x10/0x10 [ 65.269919] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 65.269923] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 65.269928] kthread+0x334/0x6f0 [ 65.269932] ? trace_preempt_on+0x20/0xc0 [ 65.269936] ? __pfx_kthread+0x10/0x10 [ 65.269940] ? _raw_spin_unlock_irq+0x47/0x80 [ 65.269944] ? calculate_sigpending+0x7b/0xa0 [ 65.269948] ? __pfx_kthread+0x10/0x10 [ 65.269952] ret_from_fork+0x113/0x1d0 [ 65.269956] ? __pfx_kthread+0x10/0x10 [ 65.269960] ret_from_fork_asm+0x1a/0x30 [ 65.269966] </TASK> [ 65.269967] [ 65.453042] Allocated by task 306: [ 65.456448] kasan_save_stack+0x45/0x70 [ 65.460287] kasan_save_track+0x18/0x40 [ 65.464127] kasan_save_alloc_info+0x3b/0x50 [ 65.468422] __kasan_kmalloc+0xb7/0xc0 [ 65.472176] __kmalloc_cache_noprof+0x189/0x420 [ 65.476709] kasan_atomics+0x95/0x310 [ 65.480415] kunit_try_run_case+0x1a2/0x480 [ 65.484604] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 65.490005] kthread+0x334/0x6f0 [ 65.493237] ret_from_fork+0x113/0x1d0 [ 65.496990] ret_from_fork_asm+0x1a/0x30 [ 65.500916] [ 65.502419] The buggy address belongs to the object at ffff8881066eaf00 [ 65.502419] which belongs to the cache kmalloc-64 of size 64 [ 65.514757] The buggy address is located 0 bytes to the right of [ 65.514757] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 65.527618] [ 65.529116] The buggy address belongs to the physical page: [ 65.534691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 65.542698] flags: 0x200000000000000(node=0|zone=2) [ 65.547577] page_type: f5(slab) [ 65.550724] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 65.558470] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.566210] page dumped because: kasan: bad access detected [ 65.571783] [ 65.573282] Memory state around the buggy address: [ 65.578076] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.585302] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 65.592523] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.599742] ^ [ 65.604534] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.611753] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.618973] ================================================================== [ 71.322980] ================================================================== [ 71.330218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 71.337613] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 71.345005] [ 71.346505] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 71.346513] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 71.346515] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 71.346519] Call Trace: [ 71.346521] <TASK> [ 71.346522] dump_stack_lvl+0x73/0xb0 [ 71.346527] print_report+0xd1/0x650 [ 71.346531] ? __virt_addr_valid+0x1db/0x2d0 [ 71.346535] ? kasan_atomics_helper+0x1eaa/0x5450 [ 71.346539] ? kasan_complete_mode_report_info+0x2a/0x200 [ 71.346544] ? kasan_atomics_helper+0x1eaa/0x5450 [ 71.346548] kasan_report+0x141/0x180 [ 71.346552] ? kasan_atomics_helper+0x1eaa/0x5450 [ 71.346557] kasan_check_range+0x10c/0x1c0 [ 71.346562] __kasan_check_write+0x18/0x20 [ 71.346565] kasan_atomics_helper+0x1eaa/0x5450 [ 71.346570] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 71.346574] ? __kmalloc_cache_noprof+0x189/0x420 [ 71.346579] ? kasan_atomics+0x152/0x310 [ 71.346584] kasan_atomics+0x1dc/0x310 [ 71.346588] ? __pfx_kasan_atomics+0x10/0x10 [ 71.346593] ? ktime_get_ts64+0x83/0x230 [ 71.346597] kunit_try_run_case+0x1a2/0x480 [ 71.346602] ? __pfx_kunit_try_run_case+0x10/0x10 [ 71.346607] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 71.346611] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 71.346615] ? __kthread_parkme+0x82/0x180 [ 71.346619] ? preempt_count_sub+0x50/0x80 [ 71.346623] ? __pfx_kunit_try_run_case+0x10/0x10 [ 71.346628] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 71.346632] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 71.346637] kthread+0x334/0x6f0 [ 71.346640] ? trace_preempt_on+0x20/0xc0 [ 71.346645] ? __pfx_kthread+0x10/0x10 [ 71.346648] ? _raw_spin_unlock_irq+0x47/0x80 [ 71.346652] ? calculate_sigpending+0x7b/0xa0 [ 71.346657] ? __pfx_kthread+0x10/0x10 [ 71.346661] ret_from_fork+0x113/0x1d0 [ 71.346665] ? __pfx_kthread+0x10/0x10 [ 71.346669] ret_from_fork_asm+0x1a/0x30 [ 71.346675] </TASK> [ 71.346676] [ 71.485352] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 71.491252] Allocated by task 306: [ 71.494484] rcu: \t3-....: (56 ticks this GP) idle=2e54/1/0x4000000000000000 softirq=321/321 fqs=5250 [ 71.498489] kasan_save_stack+0x45/0x70 [ 71.502232] rcu: \t(detected by 2, t=21018 jiffies, g=-327, q=19 ncpus=4) [ 71.506583] kasan_save_track+0x18/0x40 [ 71.510934] Sending NMI from CPU 2 to CPUs 3: [ 71.510941] NMI backtrace for cpu 3 [ 71.510944] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 71.510952] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 71.510955] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 71.510959] RIP: 0010:io_serial_out+0x6c/0xa0 [ 71.510964] Code: b6 8b c1 00 00 00 48 8d 7b 08 48 ba 00 00 00 00 00 fc ff df d3 e6 48 89 f9 48 c1 e9 03 80 3c 11 00 75 24 66 03 73 08 89 f2 ee <48> 8b 5d f8 c9 c3 cc cc cc cc 89 45 f0 89 75 f4 e8 2f 1f 05 ff 8b [ 71.510972] RSP: 0000:ffff888106c5f510 EFLAGS: 00000006 [ 71.510977] RAX: 0000000000000000 RBX: ffffffffaaaa07c0 RCX: 1ffffffff55540f9 [ 71.510982] RDX: 00000000000003f9 RSI: 00000000000003f9 RDI: ffffffffaaaa07c8 [ 71.510986] RBP: ffff888106c5f520 R08: 0000000000000001 R09: ffffffffaa9fc480 [ 71.510990] R10: 0000000000000003 R11: 0000000000000001 R12: 0000000000000000 [ 71.510993] R13: ffffffffaaaa0a20 R14: ffffffffa9bd8ec0 R15: ffffffffaaaa07c0 [ 71.510997] FS: 0000000000000000(0000) GS:ffff888474df4000(0000) knlGS:0000000000000000 [ 71.511002] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 71.511006] CR2: 0000000000000000 CR3: 00000003a84bc001 CR4: 00000000003726f0 [ 71.511010] DR0: ffffffffaaa50440 DR1: ffffffffaaa50441 DR2: ffffffffaaa50443 [ 71.511013] DR3: ffffffffaaa50445 DR6: 00000000ffff0ff0 DR7: 0000000000000400 [ 71.511017] Call Trace: [ 71.511019] <TASK> [ 71.511021] serial8250_clear_IER+0x8c/0xb0 [ 71.511026] serial8250_console_write+0x1bd/0x1810 [ 71.511032] ? __pfx_serial8250_console_write+0x10/0x10 [ 71.511038] ? __kasan_check_write+0x18/0x20 [ 71.511042] ? _raw_spin_lock+0x8b/0xe0 [ 71.511046] ? __pfx__raw_spin_lock+0x10/0x10 [ 71.511050] univ8250_console_write+0x57/0x80 [ 71.511055] ? _raw_spin_unlock+0x41/0x70 [ 71.511059] console_flush_all+0x57b/0xc00 [ 71.511064] ? __pfx_console_flush_all+0x10/0x10 [ 71.511068] ? __pfx_vprintk_store+0x10/0x10 [ 71.511073] ? __kasan_check_read+0x15/0x20 [ 71.511077] console_unlock+0xf2/0x1f0 [ 71.511080] ? __pfx_console_unlock+0x10/0x10 [ 71.511084] ? __kasan_check_write+0x18/0x20 [ 71.511088] ? _raw_spin_lock+0x8b/0xe0 [ 71.511093] vprintk_emit+0x1e9/0x480 [ 71.511097] ? __pfx_vprintk_emit+0x10/0x10 [ 71.511101] ? vprintk_emit+0x169/0x480 [ 71.511105] vprintk_default+0x21/0x30 [ 71.511109] vprintk+0x12/0x20 [ 71.511112] _printk+0xc3/0xf0 [ 71.511117] ? __pfx__printk+0x10/0x10 [ 71.511121] ? vprintk+0x12/0x20 [ 71.511125] ? _printk+0xc3/0xf0 [ 71.511129] ? __pfx__printk+0x10/0x10 [ 71.511133] ? kasan_save_track+0x18/0x40 [ 71.511137] stack_trace_print+0x5d/0x90 [ 71.511142] stack_depot_print+0x48/0x50 [ 71.511147] print_report+0x61a/0x650 [ 71.511151] ? __virt_addr_valid+0x1db/0x2d0 [ 71.511156] ? kasan_atomics_helper+0x1eaa/0x5450 [ 71.511160] ? kasan_complete_mode_report_info+0x2a/0x200 [ 71.511165] ? kasan_atomics_helper+0x1eaa/0x5450 [ 71.511169] kasan_report+0x141/0x180 [ 71.511173] ? kasan_atomics_helper+0x1eaa/0x5450 [ 71.511178] kasan_check_range+0x10c/0x1c0 [ 71.511183] __kasan_check_write+0x18/0x20 [ 71.511186] kasan_atomics_helper+0x1eaa/0x5450 [ 71.511191] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 71.511195] ? __kmalloc_cache_noprof+0x189/0x420 [ 71.511200] ? kasan_atomics+0x152/0x310 [ 71.511205] kasan_atomics+0x1dc/0x310 [ 71.511209] ? __pfx_kasan_atomics+0x10/0x10 [ 71.511214] ? ktime_get_ts64+0x83/0x230 [ 71.511219] kunit_try_run_case+0x1a2/0x480 [ 71.511223] ? __pfx_kunit_try_run_case+0x10/0x10 [ 71.511228] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 71.511232] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 71.511237] ? __kthread_parkme+0x82/0x180 [ 71.511240] ? preempt_count_sub+0x50/0x80 [ 71.511245] ? __pfx_kunit_try_run_case+0x10/0x10 [ 71.511250] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 71.511254] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 71.511258] kthread+0x334/0x6f0 [ 71.511262] ? trace_preempt_on+0x20/0xc0 [ 71.511267] ? __pfx_kthread+0x10/0x10 [ 71.511271] ? _raw_spin_unlock_irq+0x47/0x80 [ 71.511274] ? calculate_sigpending+0x7b/0xa0 [ 71.511279] ? __pfx_kthread+0x10/0x10 [ 71.511283] ret_from_fork+0x113/0x1d0 [ 71.511287] ? __pfx_kthread+0x10/0x10 [ 71.511291] ret_from_fork_asm+0x1a/0x30 [ 71.511297] </TASK> [ 71.963843] kasan_save_alloc_info+0x3b/0x50 [ 71.968126] __kasan_kmalloc+0xb7/0xc0 [ 71.971879] __kmalloc_cache_noprof+0x189/0x420 [ 71.976420] kasan_atomics+0x95/0x310 [ 71.980087] kunit_try_run_case+0x1a2/0x480 [ 71.984280] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 71.989680] kthread+0x334/0x6f0 [ 71.992912] ret_from_fork+0x113/0x1d0 [ 71.996666] ret_from_fork_asm+0x1a/0x30 [ 72.000602] [ 72.002099] The buggy address belongs to the object at ffff8881066eaf00 [ 72.002099] which belongs to the cache kmalloc-64 of size 64 [ 72.014442] The buggy address is located 0 bytes to the right of [ 72.014442] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 72.027311] [ 72.028811] The buggy address belongs to the physical page: [ 72.034415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 72.042417] flags: 0x200000000000000(node=0|zone=2) [ 72.047295] page_type: f5(slab) [ 72.050444] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 72.058191] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.065929] page dumped because: kasan: bad access detected [ 72.071500] [ 72.073002] Memory state around the buggy address: [ 72.077793] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.085013] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 72.092232] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.099453] ^ [ 72.104245] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.111464] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 72.118683] ================================================================== [ 58.432204] ================================================================== [ 58.439460] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 58.446767] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 58.454169] [ 58.455669] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 58.455677] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 58.455680] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 58.455683] Call Trace: [ 58.455685] <TASK> [ 58.455687] dump_stack_lvl+0x73/0xb0 [ 58.455691] print_report+0xd1/0x650 [ 58.455695] ? __virt_addr_valid+0x1db/0x2d0 [ 58.455700] ? kasan_atomics_helper+0xd47/0x5450 [ 58.455704] ? kasan_complete_mode_report_info+0x2a/0x200 [ 58.455709] ? kasan_atomics_helper+0xd47/0x5450 [ 58.455713] kasan_report+0x141/0x180 [ 58.455717] ? kasan_atomics_helper+0xd47/0x5450 [ 58.455722] kasan_check_range+0x10c/0x1c0 [ 58.455727] __kasan_check_write+0x18/0x20 [ 58.455730] kasan_atomics_helper+0xd47/0x5450 [ 58.455734] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 58.455739] ? __kmalloc_cache_noprof+0x189/0x420 [ 58.455744] ? kasan_atomics+0x152/0x310 [ 58.455749] kasan_atomics+0x1dc/0x310 [ 58.455753] ? __pfx_kasan_atomics+0x10/0x10 [ 58.455758] ? ktime_get_ts64+0x83/0x230 [ 58.455762] kunit_try_run_case+0x1a2/0x480 [ 58.455767] ? __pfx_kunit_try_run_case+0x10/0x10 [ 58.455772] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 58.455776] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 58.455780] ? __kthread_parkme+0x82/0x180 [ 58.455784] ? preempt_count_sub+0x50/0x80 [ 58.455789] ? __pfx_kunit_try_run_case+0x10/0x10 [ 58.455793] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 58.455798] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 58.455802] kthread+0x334/0x6f0 [ 58.455806] ? trace_preempt_on+0x20/0xc0 [ 58.455810] ? __pfx_kthread+0x10/0x10 [ 58.455814] ? _raw_spin_unlock_irq+0x47/0x80 [ 58.455818] ? calculate_sigpending+0x7b/0xa0 [ 58.455823] ? __pfx_kthread+0x10/0x10 [ 58.455827] ret_from_fork+0x113/0x1d0 [ 58.455830] ? __pfx_kthread+0x10/0x10 [ 58.455834] ret_from_fork_asm+0x1a/0x30 [ 58.455840] </TASK> [ 58.455842] [ 58.638445] Allocated by task 306: [ 58.641853] kasan_save_stack+0x45/0x70 [ 58.645693] kasan_save_track+0x18/0x40 [ 58.649530] kasan_save_alloc_info+0x3b/0x50 [ 58.653803] __kasan_kmalloc+0xb7/0xc0 [ 58.657556] __kmalloc_cache_noprof+0x189/0x420 [ 58.662088] kasan_atomics+0x95/0x310 [ 58.665754] kunit_try_run_case+0x1a2/0x480 [ 58.669940] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 58.675362] kthread+0x334/0x6f0 [ 58.678616] ret_from_fork+0x113/0x1d0 [ 58.682416] ret_from_fork_asm+0x1a/0x30 [ 58.686361] [ 58.687907] The buggy address belongs to the object at ffff8881066eaf00 [ 58.687907] which belongs to the cache kmalloc-64 of size 64 [ 58.700247] The buggy address is located 0 bytes to the right of [ 58.700247] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 58.713111] [ 58.714609] The buggy address belongs to the physical page: [ 58.720183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 58.728188] flags: 0x200000000000000(node=0|zone=2) [ 58.733070] page_type: f5(slab) [ 58.736216] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 58.743964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.751709] page dumped because: kasan: bad access detected [ 58.757285] [ 58.758781] Memory state around the buggy address: [ 58.763575] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.770797] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 58.778023] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.785241] ^ [ 58.790035] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.797254] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 58.804475] ================================================================== [ 64.869435] ================================================================== [ 64.876686] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 64.884086] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 64.891479] [ 64.892981] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 64.892989] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 64.892992] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 64.892995] Call Trace: [ 64.892997] <TASK> [ 64.892998] dump_stack_lvl+0x73/0xb0 [ 64.893003] print_report+0xd1/0x650 [ 64.893007] ? __virt_addr_valid+0x1db/0x2d0 [ 64.893011] ? kasan_atomics_helper+0x50d4/0x5450 [ 64.893015] ? kasan_complete_mode_report_info+0x2a/0x200 [ 64.893021] ? kasan_atomics_helper+0x50d4/0x5450 [ 64.893024] kasan_report+0x141/0x180 [ 64.893029] ? kasan_atomics_helper+0x50d4/0x5450 [ 64.893034] __asan_report_store8_noabort+0x1b/0x30 [ 64.893039] kasan_atomics_helper+0x50d4/0x5450 [ 64.893043] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 64.893047] ? __kmalloc_cache_noprof+0x189/0x420 [ 64.893052] ? kasan_atomics+0x152/0x310 [ 64.893057] kasan_atomics+0x1dc/0x310 [ 64.893062] ? __pfx_kasan_atomics+0x10/0x10 [ 64.893066] ? ktime_get_ts64+0x83/0x230 [ 64.893071] kunit_try_run_case+0x1a2/0x480 [ 64.893075] ? __pfx_kunit_try_run_case+0x10/0x10 [ 64.893080] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 64.893084] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 64.893089] ? __kthread_parkme+0x82/0x180 [ 64.893093] ? preempt_count_sub+0x50/0x80 [ 64.893097] ? __pfx_kunit_try_run_case+0x10/0x10 [ 64.893102] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 64.893106] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 64.893110] kthread+0x334/0x6f0 [ 64.893114] ? trace_preempt_on+0x20/0xc0 [ 64.893118] ? __pfx_kthread+0x10/0x10 [ 64.893122] ? _raw_spin_unlock_irq+0x47/0x80 [ 64.893126] ? calculate_sigpending+0x7b/0xa0 [ 64.893131] ? __pfx_kthread+0x10/0x10 [ 64.893135] ret_from_fork+0x113/0x1d0 [ 64.893139] ? __pfx_kthread+0x10/0x10 [ 64.893143] ret_from_fork_asm+0x1a/0x30 [ 64.893149] </TASK> [ 64.893150] [ 65.072925] Allocated by task 306: [ 65.076360] kasan_save_stack+0x45/0x70 [ 65.080247] kasan_save_track+0x18/0x40 [ 65.084086] kasan_save_alloc_info+0x3b/0x50 [ 65.088361] __kasan_kmalloc+0xb7/0xc0 [ 65.092154] __kmalloc_cache_noprof+0x189/0x420 [ 65.096688] kasan_atomics+0x95/0x310 [ 65.100361] kunit_try_run_case+0x1a2/0x480 [ 65.104590] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 65.109991] kthread+0x334/0x6f0 [ 65.113232] ret_from_fork+0x113/0x1d0 [ 65.116985] ret_from_fork_asm+0x1a/0x30 [ 65.120919] [ 65.122425] The buggy address belongs to the object at ffff8881066eaf00 [ 65.122425] which belongs to the cache kmalloc-64 of size 64 [ 65.134760] The buggy address is located 0 bytes to the right of [ 65.134760] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 65.147620] [ 65.149120] The buggy address belongs to the physical page: [ 65.154694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 65.162702] flags: 0x200000000000000(node=0|zone=2) [ 65.167590] page_type: f5(slab) [ 65.170737] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 65.178482] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.186221] page dumped because: kasan: bad access detected [ 65.191794] [ 65.193295] Memory state around the buggy address: [ 65.198088] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.205315] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 65.212569] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.219788] ^ [ 65.224581] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.231801] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.239027] ================================================================== [ 53.500938] ================================================================== [ 53.508186] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 53.515500] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 53.522901] [ 53.524419] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 53.524427] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 53.524430] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 53.524433] Call Trace: [ 53.524435] <TASK> [ 53.524437] dump_stack_lvl+0x73/0xb0 [ 53.524441] print_report+0xd1/0x650 [ 53.524445] ? __virt_addr_valid+0x1db/0x2d0 [ 53.524449] ? kasan_atomics_helper+0x565/0x5450 [ 53.524453] ? kasan_complete_mode_report_info+0x2a/0x200 [ 53.524459] ? kasan_atomics_helper+0x565/0x5450 [ 53.524463] kasan_report+0x141/0x180 [ 53.524467] ? kasan_atomics_helper+0x565/0x5450 [ 53.524472] kasan_check_range+0x10c/0x1c0 [ 53.524477] __kasan_check_write+0x18/0x20 [ 53.524480] kasan_atomics_helper+0x565/0x5450 [ 53.524484] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 53.524489] ? __kmalloc_cache_noprof+0x189/0x420 [ 53.524494] ? kasan_atomics+0x152/0x310 [ 53.524499] kasan_atomics+0x1dc/0x310 [ 53.524503] ? __pfx_kasan_atomics+0x10/0x10 [ 53.524508] ? ktime_get_ts64+0x83/0x230 [ 53.524513] kunit_try_run_case+0x1a2/0x480 [ 53.524517] ? __pfx_kunit_try_run_case+0x10/0x10 [ 53.524522] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 53.524526] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 53.524531] ? __kthread_parkme+0x82/0x180 [ 53.524535] ? preempt_count_sub+0x50/0x80 [ 53.524539] ? __pfx_kunit_try_run_case+0x10/0x10 [ 53.524544] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 53.524548] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 53.524553] kthread+0x334/0x6f0 [ 53.524556] ? trace_preempt_on+0x20/0xc0 [ 53.524561] ? __pfx_kthread+0x10/0x10 [ 53.524565] ? _raw_spin_unlock_irq+0x47/0x80 [ 53.524569] ? calculate_sigpending+0x7b/0xa0 [ 53.524573] ? __pfx_kthread+0x10/0x10 [ 53.524578] ret_from_fork+0x113/0x1d0 [ 53.524581] ? __pfx_kthread+0x10/0x10 [ 53.524585] ret_from_fork_asm+0x1a/0x30 [ 53.524591] </TASK> [ 53.524593] [ 53.707299] Allocated by task 306: [ 53.710707] kasan_save_stack+0x45/0x70 [ 53.714545] kasan_save_track+0x18/0x40 [ 53.718424] kasan_save_alloc_info+0x3b/0x50 [ 53.722701] __kasan_kmalloc+0xb7/0xc0 [ 53.726452] __kmalloc_cache_noprof+0x189/0x420 [ 53.730986] kasan_atomics+0x95/0x310 [ 53.734652] kunit_try_run_case+0x1a2/0x480 [ 53.738839] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 53.744247] kthread+0x334/0x6f0 [ 53.747478] ret_from_fork+0x113/0x1d0 [ 53.751231] ret_from_fork_asm+0x1a/0x30 [ 53.755157] [ 53.756657] The buggy address belongs to the object at ffff8881066eaf00 [ 53.756657] which belongs to the cache kmalloc-64 of size 64 [ 53.768997] The buggy address is located 0 bytes to the right of [ 53.768997] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 53.781860] [ 53.783375] The buggy address belongs to the physical page: [ 53.788956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 53.796957] flags: 0x200000000000000(node=0|zone=2) [ 53.801837] page_type: f5(slab) [ 53.804982] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 53.812721] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.820462] page dumped because: kasan: bad access detected [ 53.826034] [ 53.827533] Memory state around the buggy address: [ 53.832346] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.839580] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 53.846797] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.854019] ^ [ 53.858812] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.866037] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 53.873257] ================================================================== [ 72.882688] ================================================================== [ 72.889934] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 72.897349] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 72.904797] [ 72.906298] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 72.906306] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 72.906309] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 72.906313] Call Trace: [ 72.906315] <TASK> [ 72.906317] dump_stack_lvl+0x73/0xb0 [ 72.906321] print_report+0xd1/0x650 [ 72.906325] ? __virt_addr_valid+0x1db/0x2d0 [ 72.906349] ? kasan_atomics_helper+0x2006/0x5450 [ 72.906353] ? kasan_complete_mode_report_info+0x2a/0x200 [ 72.906359] ? kasan_atomics_helper+0x2006/0x5450 [ 72.906376] kasan_report+0x141/0x180 [ 72.906381] ? kasan_atomics_helper+0x2006/0x5450 [ 72.906398] kasan_check_range+0x10c/0x1c0 [ 72.906402] __kasan_check_write+0x18/0x20 [ 72.906406] kasan_atomics_helper+0x2006/0x5450 [ 72.906410] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 72.906414] ? __kmalloc_cache_noprof+0x189/0x420 [ 72.906419] ? kasan_atomics+0x152/0x310 [ 72.906424] kasan_atomics+0x1dc/0x310 [ 72.906429] ? __pfx_kasan_atomics+0x10/0x10 [ 72.906434] ? ktime_get_ts64+0x83/0x230 [ 72.906438] kunit_try_run_case+0x1a2/0x480 [ 72.906443] ? __pfx_kunit_try_run_case+0x10/0x10 [ 72.906447] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 72.906452] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 72.906456] ? __kthread_parkme+0x82/0x180 [ 72.906460] ? preempt_count_sub+0x50/0x80 [ 72.906464] ? __pfx_kunit_try_run_case+0x10/0x10 [ 72.906469] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 72.906473] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 72.906478] kthread+0x334/0x6f0 [ 72.906481] ? trace_preempt_on+0x20/0xc0 [ 72.906486] ? __pfx_kthread+0x10/0x10 [ 72.906490] ? _raw_spin_unlock_irq+0x47/0x80 [ 72.906493] ? calculate_sigpending+0x7b/0xa0 [ 72.906498] ? __pfx_kthread+0x10/0x10 [ 72.906502] ret_from_fork+0x113/0x1d0 [ 72.906506] ? __pfx_kthread+0x10/0x10 [ 72.906510] ret_from_fork_asm+0x1a/0x30 [ 72.906515] </TASK> [ 72.906517] [ 73.089761] Allocated by task 306: [ 73.093166] kasan_save_stack+0x45/0x70 [ 73.097008] kasan_save_track+0x18/0x40 [ 73.100845] kasan_save_alloc_info+0x3b/0x50 [ 73.105118] __kasan_kmalloc+0xb7/0xc0 [ 73.108871] __kmalloc_cache_noprof+0x189/0x420 [ 73.113421] kasan_atomics+0x95/0x310 [ 73.117088] kunit_try_run_case+0x1a2/0x480 [ 73.121283] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 73.126682] kthread+0x334/0x6f0 [ 73.129915] ret_from_fork+0x113/0x1d0 [ 73.133665] ret_from_fork_asm+0x1a/0x30 [ 73.137594] [ 73.139092] The buggy address belongs to the object at ffff8881066eaf00 [ 73.139092] which belongs to the cache kmalloc-64 of size 64 [ 73.151434] The buggy address is located 0 bytes to the right of [ 73.151434] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 73.164296] [ 73.165794] The buggy address belongs to the physical page: [ 73.171365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 73.179428] flags: 0x200000000000000(node=0|zone=2) [ 73.184314] page_type: f5(slab) [ 73.187497] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 73.195243] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.202982] page dumped because: kasan: bad access detected [ 73.208553] [ 73.210054] Memory state around the buggy address: [ 73.214848] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.222067] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 73.229287] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.236512] ^ [ 73.241306] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.248526] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 73.255752] ================================================================== [ 75.152701] ================================================================== [ 75.159941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 75.167362] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 75.174778] [ 75.176279] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 75.176287] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 75.176290] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 75.176293] Call Trace: [ 75.176295] <TASK> [ 75.176297] dump_stack_lvl+0x73/0xb0 [ 75.176301] print_report+0xd1/0x650 [ 75.176305] ? __virt_addr_valid+0x1db/0x2d0 [ 75.176309] ? kasan_atomics_helper+0x224c/0x5450 [ 75.176313] ? kasan_complete_mode_report_info+0x2a/0x200 [ 75.176319] ? kasan_atomics_helper+0x224c/0x5450 [ 75.176323] kasan_report+0x141/0x180 [ 75.176347] ? kasan_atomics_helper+0x224c/0x5450 [ 75.176352] kasan_check_range+0x10c/0x1c0 [ 75.176357] __kasan_check_write+0x18/0x20 [ 75.176361] kasan_atomics_helper+0x224c/0x5450 [ 75.176378] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 75.176382] ? __kmalloc_cache_noprof+0x189/0x420 [ 75.176400] ? kasan_atomics+0x152/0x310 [ 75.176405] kasan_atomics+0x1dc/0x310 [ 75.176409] ? __pfx_kasan_atomics+0x10/0x10 [ 75.176414] ? ktime_get_ts64+0x83/0x230 [ 75.176419] kunit_try_run_case+0x1a2/0x480 [ 75.176423] ? __pfx_kunit_try_run_case+0x10/0x10 [ 75.176428] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 75.176432] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 75.176437] ? __kthread_parkme+0x82/0x180 [ 75.176441] ? preempt_count_sub+0x50/0x80 [ 75.176445] ? __pfx_kunit_try_run_case+0x10/0x10 [ 75.176450] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 75.176454] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 75.176458] kthread+0x334/0x6f0 [ 75.176462] ? trace_preempt_on+0x20/0xc0 [ 75.176466] ? __pfx_kthread+0x10/0x10 [ 75.176470] ? _raw_spin_unlock_irq+0x47/0x80 [ 75.176474] ? calculate_sigpending+0x7b/0xa0 [ 75.176479] ? __pfx_kthread+0x10/0x10 [ 75.176483] ret_from_fork+0x113/0x1d0 [ 75.176486] ? __pfx_kthread+0x10/0x10 [ 75.176490] ret_from_fork_asm+0x1a/0x30 [ 75.176496] </TASK> [ 75.176498] [ 75.359613] Allocated by task 306: [ 75.363018] kasan_save_stack+0x45/0x70 [ 75.366857] kasan_save_track+0x18/0x40 [ 75.370698] kasan_save_alloc_info+0x3b/0x50 [ 75.374977] __kasan_kmalloc+0xb7/0xc0 [ 75.378729] __kmalloc_cache_noprof+0x189/0x420 [ 75.383264] kasan_atomics+0x95/0x310 [ 75.386928] kunit_try_run_case+0x1a2/0x480 [ 75.391115] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 75.396514] kthread+0x334/0x6f0 [ 75.399747] ret_from_fork+0x113/0x1d0 [ 75.403501] ret_from_fork_asm+0x1a/0x30 [ 75.407435] [ 75.408934] The buggy address belongs to the object at ffff8881066eaf00 [ 75.408934] which belongs to the cache kmalloc-64 of size 64 [ 75.421273] The buggy address is located 0 bytes to the right of [ 75.421273] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 75.434137] [ 75.435636] The buggy address belongs to the physical page: [ 75.441209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 75.449217] flags: 0x200000000000000(node=0|zone=2) [ 75.454096] page_type: f5(slab) [ 75.457243] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 75.464989] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.472730] page dumped because: kasan: bad access detected [ 75.478302] [ 75.479801] Memory state around the buggy address: [ 75.484592] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.491813] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 75.499031] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.506252] ^ [ 75.511043] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.518263] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.525481] ================================================================== [ 75.532707] ================================================================== [ 75.539947] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 75.547362] Read of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 75.554715] [ 75.556215] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 75.556223] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 75.556225] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 75.556229] Call Trace: [ 75.556231] <TASK> [ 75.556232] dump_stack_lvl+0x73/0xb0 [ 75.556237] print_report+0xd1/0x650 [ 75.556241] ? __virt_addr_valid+0x1db/0x2d0 [ 75.556245] ? kasan_atomics_helper+0x5115/0x5450 [ 75.556249] ? kasan_complete_mode_report_info+0x2a/0x200 [ 75.556254] ? kasan_atomics_helper+0x5115/0x5450 [ 75.556258] kasan_report+0x141/0x180 [ 75.556263] ? kasan_atomics_helper+0x5115/0x5450 [ 75.556268] __asan_report_load8_noabort+0x18/0x20 [ 75.556273] kasan_atomics_helper+0x5115/0x5450 [ 75.556277] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 75.556281] ? __kmalloc_cache_noprof+0x189/0x420 [ 75.556286] ? kasan_atomics+0x152/0x310 [ 75.556291] kasan_atomics+0x1dc/0x310 [ 75.556296] ? __pfx_kasan_atomics+0x10/0x10 [ 75.556300] ? ktime_get_ts64+0x83/0x230 [ 75.556305] kunit_try_run_case+0x1a2/0x480 [ 75.556310] ? __pfx_kunit_try_run_case+0x10/0x10 [ 75.556314] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 75.556319] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 75.556323] ? __kthread_parkme+0x82/0x180 [ 75.556327] ? preempt_count_sub+0x50/0x80 [ 75.556351] ? __pfx_kunit_try_run_case+0x10/0x10 [ 75.556356] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 75.556360] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 75.556377] kthread+0x334/0x6f0 [ 75.556381] ? trace_preempt_on+0x20/0xc0 [ 75.556386] ? __pfx_kthread+0x10/0x10 [ 75.556402] ? _raw_spin_unlock_irq+0x47/0x80 [ 75.556406] ? calculate_sigpending+0x7b/0xa0 [ 75.556411] ? __pfx_kthread+0x10/0x10 [ 75.556415] ret_from_fork+0x113/0x1d0 [ 75.556418] ? __pfx_kthread+0x10/0x10 [ 75.556422] ret_from_fork_asm+0x1a/0x30 [ 75.556428] </TASK> [ 75.556430] [ 75.736090] Allocated by task 306: [ 75.739495] kasan_save_stack+0x45/0x70 [ 75.743364] kasan_save_track+0x18/0x40 [ 75.747226] kasan_save_alloc_info+0x3b/0x50 [ 75.751497] __kasan_kmalloc+0xb7/0xc0 [ 75.755252] __kmalloc_cache_noprof+0x189/0x420 [ 75.759794] kasan_atomics+0x95/0x310 [ 75.763469] kunit_try_run_case+0x1a2/0x480 [ 75.767661] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 75.773061] kthread+0x334/0x6f0 [ 75.776293] ret_from_fork+0x113/0x1d0 [ 75.780048] ret_from_fork_asm+0x1a/0x30 [ 75.783981] [ 75.785480] The buggy address belongs to the object at ffff8881066eaf00 [ 75.785480] which belongs to the cache kmalloc-64 of size 64 [ 75.797813] The buggy address is located 0 bytes to the right of [ 75.797813] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 75.810676] [ 75.812175] The buggy address belongs to the physical page: [ 75.817747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 75.825746] flags: 0x200000000000000(node=0|zone=2) [ 75.830626] page_type: f5(slab) [ 75.833774] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 75.841521] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.849268] page dumped because: kasan: bad access detected [ 75.854841] [ 75.856364] Memory state around the buggy address: [ 75.861201] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.868420] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 75.875640] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.882859] ^ [ 75.887653] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.894872] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.902092] ================================================================== [ 59.191352] ================================================================== [ 59.198605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 59.205912] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 59.213311] [ 59.214814] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 59.214822] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 59.214825] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 59.214828] Call Trace: [ 59.214830] <TASK> [ 59.214832] dump_stack_lvl+0x73/0xb0 [ 59.214837] print_report+0xd1/0x650 [ 59.214841] ? __virt_addr_valid+0x1db/0x2d0 [ 59.214845] ? kasan_atomics_helper+0xe78/0x5450 [ 59.214849] ? kasan_complete_mode_report_info+0x2a/0x200 [ 59.214854] ? kasan_atomics_helper+0xe78/0x5450 [ 59.214858] kasan_report+0x141/0x180 [ 59.214863] ? kasan_atomics_helper+0xe78/0x5450 [ 59.214867] kasan_check_range+0x10c/0x1c0 [ 59.214872] __kasan_check_write+0x18/0x20 [ 59.214876] kasan_atomics_helper+0xe78/0x5450 [ 59.214880] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 59.214884] ? __kmalloc_cache_noprof+0x189/0x420 [ 59.214889] ? kasan_atomics+0x152/0x310 [ 59.214894] kasan_atomics+0x1dc/0x310 [ 59.214899] ? __pfx_kasan_atomics+0x10/0x10 [ 59.214904] ? ktime_get_ts64+0x83/0x230 [ 59.214908] kunit_try_run_case+0x1a2/0x480 [ 59.214913] ? __pfx_kunit_try_run_case+0x10/0x10 [ 59.214917] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 59.214921] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 59.214926] ? __kthread_parkme+0x82/0x180 [ 59.214930] ? preempt_count_sub+0x50/0x80 [ 59.214934] ? __pfx_kunit_try_run_case+0x10/0x10 [ 59.214939] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 59.214943] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 59.214947] kthread+0x334/0x6f0 [ 59.214951] ? trace_preempt_on+0x20/0xc0 [ 59.214955] ? __pfx_kthread+0x10/0x10 [ 59.214959] ? _raw_spin_unlock_irq+0x47/0x80 [ 59.214963] ? calculate_sigpending+0x7b/0xa0 [ 59.214968] ? __pfx_kthread+0x10/0x10 [ 59.214972] ret_from_fork+0x113/0x1d0 [ 59.214975] ? __pfx_kthread+0x10/0x10 [ 59.214979] ret_from_fork_asm+0x1a/0x30 [ 59.214985] </TASK> [ 59.214987] [ 59.397774] Allocated by task 306: [ 59.401180] kasan_save_stack+0x45/0x70 [ 59.405017] kasan_save_track+0x18/0x40 [ 59.408859] kasan_save_alloc_info+0x3b/0x50 [ 59.413139] __kasan_kmalloc+0xb7/0xc0 [ 59.416892] __kmalloc_cache_noprof+0x189/0x420 [ 59.421431] kasan_atomics+0x95/0x310 [ 59.425100] kunit_try_run_case+0x1a2/0x480 [ 59.429293] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 59.434694] kthread+0x334/0x6f0 [ 59.437934] ret_from_fork+0x113/0x1d0 [ 59.441686] ret_from_fork_asm+0x1a/0x30 [ 59.445612] [ 59.447112] The buggy address belongs to the object at ffff8881066eaf00 [ 59.447112] which belongs to the cache kmalloc-64 of size 64 [ 59.459455] The buggy address is located 0 bytes to the right of [ 59.459455] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 59.472315] [ 59.473849] The buggy address belongs to the physical page: [ 59.479432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 59.487437] flags: 0x200000000000000(node=0|zone=2) [ 59.492318] page_type: f5(slab) [ 59.495499] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 59.503238] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.510978] page dumped because: kasan: bad access detected [ 59.516549] [ 59.518050] Memory state around the buggy address: [ 59.522843] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.530068] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 59.537290] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.544516] ^ [ 59.549310] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.556530] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 59.563756] ================================================================== [ 63.732930] ================================================================== [ 63.740170] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 63.747563] Read of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 63.754878] [ 63.756417] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 63.756425] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 63.756428] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 63.756431] Call Trace: [ 63.756433] <TASK> [ 63.756435] dump_stack_lvl+0x73/0xb0 [ 63.756439] print_report+0xd1/0x650 [ 63.756443] ? __virt_addr_valid+0x1db/0x2d0 [ 63.756447] ? kasan_atomics_helper+0x13b5/0x5450 [ 63.756451] ? kasan_complete_mode_report_info+0x2a/0x200 [ 63.756456] ? kasan_atomics_helper+0x13b5/0x5450 [ 63.756460] kasan_report+0x141/0x180 [ 63.756465] ? kasan_atomics_helper+0x13b5/0x5450 [ 63.756470] kasan_check_range+0x10c/0x1c0 [ 63.756474] __kasan_check_read+0x15/0x20 [ 63.756478] kasan_atomics_helper+0x13b5/0x5450 [ 63.756482] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 63.756486] ? __kmalloc_cache_noprof+0x189/0x420 [ 63.756491] ? kasan_atomics+0x152/0x310 [ 63.756496] kasan_atomics+0x1dc/0x310 [ 63.756500] ? __pfx_kasan_atomics+0x10/0x10 [ 63.756505] ? ktime_get_ts64+0x83/0x230 [ 63.756510] kunit_try_run_case+0x1a2/0x480 [ 63.756514] ? __pfx_kunit_try_run_case+0x10/0x10 [ 63.756519] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 63.756523] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 63.756528] ? __kthread_parkme+0x82/0x180 [ 63.756531] ? preempt_count_sub+0x50/0x80 [ 63.756536] ? __pfx_kunit_try_run_case+0x10/0x10 [ 63.756540] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 63.756545] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 63.756549] kthread+0x334/0x6f0 [ 63.756553] ? trace_preempt_on+0x20/0xc0 [ 63.756557] ? __pfx_kthread+0x10/0x10 [ 63.756561] ? _raw_spin_unlock_irq+0x47/0x80 [ 63.756565] ? calculate_sigpending+0x7b/0xa0 [ 63.756570] ? __pfx_kthread+0x10/0x10 [ 63.756574] ret_from_fork+0x113/0x1d0 [ 63.756577] ? __pfx_kthread+0x10/0x10 [ 63.756581] ret_from_fork_asm+0x1a/0x30 [ 63.756587] </TASK> [ 63.756589] [ 63.939598] Allocated by task 306: [ 63.943002] kasan_save_stack+0x45/0x70 [ 63.946843] kasan_save_track+0x18/0x40 [ 63.950682] kasan_save_alloc_info+0x3b/0x50 [ 63.954964] __kasan_kmalloc+0xb7/0xc0 [ 63.958716] __kmalloc_cache_noprof+0x189/0x420 [ 63.963249] kasan_atomics+0x95/0x310 [ 63.966915] kunit_try_run_case+0x1a2/0x480 [ 63.971109] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 63.976508] kthread+0x334/0x6f0 [ 63.979740] ret_from_fork+0x113/0x1d0 [ 63.983495] ret_from_fork_asm+0x1a/0x30 [ 63.987431] [ 63.988936] The buggy address belongs to the object at ffff8881066eaf00 [ 63.988936] which belongs to the cache kmalloc-64 of size 64 [ 64.001270] The buggy address is located 0 bytes to the right of [ 64.001270] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 64.014137] [ 64.015639] The buggy address belongs to the physical page: [ 64.021211] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 64.029220] flags: 0x200000000000000(node=0|zone=2) [ 64.034106] page_type: f5(slab) [ 64.037255] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 64.045002] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.052748] page dumped because: kasan: bad access detected [ 64.058323] [ 64.059854] Memory state around the buggy address: [ 64.064649] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.071869] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 64.079095] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.086313] ^ [ 64.091143] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.098365] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.105632] ================================================================== [ 51.988532] ================================================================== [ 51.995771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 52.003078] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 52.010417] [ 52.011919] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 52.011927] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 52.011930] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 52.011934] Call Trace: [ 52.011935] <TASK> [ 52.011937] dump_stack_lvl+0x73/0xb0 [ 52.011942] print_report+0xd1/0x650 [ 52.011946] ? __virt_addr_valid+0x1db/0x2d0 [ 52.011950] ? kasan_atomics_helper+0x3df/0x5450 [ 52.011954] ? kasan_complete_mode_report_info+0x2a/0x200 [ 52.011959] ? kasan_atomics_helper+0x3df/0x5450 [ 52.011963] kasan_report+0x141/0x180 [ 52.011967] ? kasan_atomics_helper+0x3df/0x5450 [ 52.011972] kasan_check_range+0x10c/0x1c0 [ 52.011977] __kasan_check_read+0x15/0x20 [ 52.011980] kasan_atomics_helper+0x3df/0x5450 [ 52.011985] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 52.011989] ? __kmalloc_cache_noprof+0x189/0x420 [ 52.011994] ? kasan_atomics+0x152/0x310 [ 52.011999] kasan_atomics+0x1dc/0x310 [ 52.012003] ? __pfx_kasan_atomics+0x10/0x10 [ 52.012008] ? ktime_get_ts64+0x83/0x230 [ 52.012013] kunit_try_run_case+0x1a2/0x480 [ 52.012017] ? __pfx_kunit_try_run_case+0x10/0x10 [ 52.012022] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 52.012026] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 52.012030] ? __kthread_parkme+0x82/0x180 [ 52.012034] ? preempt_count_sub+0x50/0x80 [ 52.012038] ? __pfx_kunit_try_run_case+0x10/0x10 [ 52.012043] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 52.012048] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 52.012052] kthread+0x334/0x6f0 [ 52.012056] ? trace_preempt_on+0x20/0xc0 [ 52.012060] ? __pfx_kthread+0x10/0x10 [ 52.012064] ? _raw_spin_unlock_irq+0x47/0x80 [ 52.012068] ? calculate_sigpending+0x7b/0xa0 [ 52.012072] ? __pfx_kthread+0x10/0x10 [ 52.012076] ret_from_fork+0x113/0x1d0 [ 52.012080] ? __pfx_kthread+0x10/0x10 [ 52.012084] ret_from_fork_asm+0x1a/0x30 [ 52.012090] </TASK> [ 52.012092] [ 52.194775] Allocated by task 306: [ 52.198180] kasan_save_stack+0x45/0x70 [ 52.202019] kasan_save_track+0x18/0x40 [ 52.205859] kasan_save_alloc_info+0x3b/0x50 [ 52.210133] __kasan_kmalloc+0xb7/0xc0 [ 52.213883] __kmalloc_cache_noprof+0x189/0x420 [ 52.218419] kasan_atomics+0x95/0x310 [ 52.222092] kunit_try_run_case+0x1a2/0x480 [ 52.226278] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 52.231676] kthread+0x334/0x6f0 [ 52.234909] ret_from_fork+0x113/0x1d0 [ 52.238661] ret_from_fork_asm+0x1a/0x30 [ 52.242589] [ 52.244089] The buggy address belongs to the object at ffff8881066eaf00 [ 52.244089] which belongs to the cache kmalloc-64 of size 64 [ 52.256428] The buggy address is located 0 bytes to the right of [ 52.256428] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 52.269291] [ 52.270788] The buggy address belongs to the physical page: [ 52.276376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 52.284418] flags: 0x200000000000000(node=0|zone=2) [ 52.289302] page_type: f5(slab) [ 52.292450] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 52.300196] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.307933] page dumped because: kasan: bad access detected [ 52.313508] [ 52.315008] Memory state around the buggy address: [ 52.319800] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.327018] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 52.334238] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.341457] ^ [ 52.346249] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.353469] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.360689] ================================================================== [ 62.599915] ================================================================== [ 62.607155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 62.614546] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 62.621855] [ 62.623376] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 62.623384] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 62.623387] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 62.623391] Call Trace: [ 62.623393] <TASK> [ 62.623395] dump_stack_lvl+0x73/0xb0 [ 62.623412] print_report+0xd1/0x650 [ 62.623416] ? __virt_addr_valid+0x1db/0x2d0 [ 62.623420] ? kasan_atomics_helper+0x49e8/0x5450 [ 62.623424] ? kasan_complete_mode_report_info+0x2a/0x200 [ 62.623429] ? kasan_atomics_helper+0x49e8/0x5450 [ 62.623433] kasan_report+0x141/0x180 [ 62.623437] ? kasan_atomics_helper+0x49e8/0x5450 [ 62.623442] __asan_report_load4_noabort+0x18/0x20 [ 62.623447] kasan_atomics_helper+0x49e8/0x5450 [ 62.623451] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 62.623455] ? __kmalloc_cache_noprof+0x189/0x420 [ 62.623460] ? kasan_atomics+0x152/0x310 [ 62.623465] kasan_atomics+0x1dc/0x310 [ 62.623469] ? __pfx_kasan_atomics+0x10/0x10 [ 62.623474] ? ktime_get_ts64+0x83/0x230 [ 62.623479] kunit_try_run_case+0x1a2/0x480 [ 62.623483] ? __pfx_kunit_try_run_case+0x10/0x10 [ 62.623488] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 62.623492] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 62.623497] ? __kthread_parkme+0x82/0x180 [ 62.623500] ? preempt_count_sub+0x50/0x80 [ 62.623505] ? __pfx_kunit_try_run_case+0x10/0x10 [ 62.623509] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 62.623514] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 62.623518] kthread+0x334/0x6f0 [ 62.623522] ? trace_preempt_on+0x20/0xc0 [ 62.623526] ? __pfx_kthread+0x10/0x10 [ 62.623530] ? _raw_spin_unlock_irq+0x47/0x80 [ 62.623534] ? calculate_sigpending+0x7b/0xa0 [ 62.623539] ? __pfx_kthread+0x10/0x10 [ 62.623543] ret_from_fork+0x113/0x1d0 [ 62.623547] ? __pfx_kthread+0x10/0x10 [ 62.623551] ret_from_fork_asm+0x1a/0x30 [ 62.623557] </TASK> [ 62.623558] [ 62.803263] Allocated by task 306: [ 62.806669] kasan_save_stack+0x45/0x70 [ 62.810507] kasan_save_track+0x18/0x40 [ 62.814362] kasan_save_alloc_info+0x3b/0x50 [ 62.818682] __kasan_kmalloc+0xb7/0xc0 [ 62.822434] __kmalloc_cache_noprof+0x189/0x420 [ 62.826966] kasan_atomics+0x95/0x310 [ 62.830632] kunit_try_run_case+0x1a2/0x480 [ 62.834819] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 62.840217] kthread+0x334/0x6f0 [ 62.843449] ret_from_fork+0x113/0x1d0 [ 62.847203] ret_from_fork_asm+0x1a/0x30 [ 62.851129] [ 62.852630] The buggy address belongs to the object at ffff8881066eaf00 [ 62.852630] which belongs to the cache kmalloc-64 of size 64 [ 62.864969] The buggy address is located 0 bytes to the right of [ 62.864969] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 62.877831] [ 62.879361] The buggy address belongs to the physical page: [ 62.884957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 62.892963] flags: 0x200000000000000(node=0|zone=2) [ 62.897844] page_type: f5(slab) [ 62.900988] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 62.908728] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.916469] page dumped because: kasan: bad access detected [ 62.922041] [ 62.923538] Memory state around the buggy address: [ 62.928363] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.935631] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 62.942847] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.950069] ^ [ 62.954860] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.962080] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.969307] ================================================================== [ 74.776191] ================================================================== [ 74.783437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 74.790837] Read of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 74.798145] [ 74.799645] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 74.799653] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 74.799656] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 74.799659] Call Trace: [ 74.799661] <TASK> [ 74.799663] dump_stack_lvl+0x73/0xb0 [ 74.799667] print_report+0xd1/0x650 [ 74.799671] ? __virt_addr_valid+0x1db/0x2d0 [ 74.799675] ? kasan_atomics_helper+0x4fa5/0x5450 [ 74.799679] ? kasan_complete_mode_report_info+0x2a/0x200 [ 74.799685] ? kasan_atomics_helper+0x4fa5/0x5450 [ 74.799689] kasan_report+0x141/0x180 [ 74.799693] ? kasan_atomics_helper+0x4fa5/0x5450 [ 74.799698] __asan_report_load8_noabort+0x18/0x20 [ 74.799703] kasan_atomics_helper+0x4fa5/0x5450 [ 74.799707] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 74.799712] ? __kmalloc_cache_noprof+0x189/0x420 [ 74.799717] ? kasan_atomics+0x152/0x310 [ 74.799722] kasan_atomics+0x1dc/0x310 [ 74.799726] ? __pfx_kasan_atomics+0x10/0x10 [ 74.799731] ? ktime_get_ts64+0x83/0x230 [ 74.799735] kunit_try_run_case+0x1a2/0x480 [ 74.799740] ? __pfx_kunit_try_run_case+0x10/0x10 [ 74.799745] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 74.799749] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 74.799754] ? __kthread_parkme+0x82/0x180 [ 74.799757] ? preempt_count_sub+0x50/0x80 [ 74.799762] ? __pfx_kunit_try_run_case+0x10/0x10 [ 74.799766] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 74.799771] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 74.799775] kthread+0x334/0x6f0 [ 74.799779] ? trace_preempt_on+0x20/0xc0 [ 74.799783] ? __pfx_kthread+0x10/0x10 [ 74.799787] ? _raw_spin_unlock_irq+0x47/0x80 [ 74.799791] ? calculate_sigpending+0x7b/0xa0 [ 74.799795] ? __pfx_kthread+0x10/0x10 [ 74.799800] ret_from_fork+0x113/0x1d0 [ 74.799803] ? __pfx_kthread+0x10/0x10 [ 74.799807] ret_from_fork_asm+0x1a/0x30 [ 74.799813] </TASK> [ 74.799815] [ 74.979469] Allocated by task 306: [ 74.982875] kasan_save_stack+0x45/0x70 [ 74.986721] kasan_save_track+0x18/0x40 [ 74.990559] kasan_save_alloc_info+0x3b/0x50 [ 74.994835] __kasan_kmalloc+0xb7/0xc0 [ 74.998586] __kmalloc_cache_noprof+0x189/0x420 [ 75.003118] kasan_atomics+0x95/0x310 [ 75.006786] kunit_try_run_case+0x1a2/0x480 [ 75.010980] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 75.016413] kthread+0x334/0x6f0 [ 75.019646] ret_from_fork+0x113/0x1d0 [ 75.023414] ret_from_fork_asm+0x1a/0x30 [ 75.027363] [ 75.028909] The buggy address belongs to the object at ffff8881066eaf00 [ 75.028909] which belongs to the cache kmalloc-64 of size 64 [ 75.041242] The buggy address is located 0 bytes to the right of [ 75.041242] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 75.054104] [ 75.055604] The buggy address belongs to the physical page: [ 75.061176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 75.069184] flags: 0x200000000000000(node=0|zone=2) [ 75.074065] page_type: f5(slab) [ 75.077212] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 75.084959] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.092706] page dumped because: kasan: bad access detected [ 75.098279] [ 75.099778] Memory state around the buggy address: [ 75.104571] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.111790] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 75.119017] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.126236] ^ [ 75.131028] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.138250] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.145477] ================================================================== [ 60.330093] ================================================================== [ 60.337365] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 60.344810] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 60.352117] [ 60.353617] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 60.353625] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 60.353628] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 60.353631] Call Trace: [ 60.353633] <TASK> [ 60.353635] dump_stack_lvl+0x73/0xb0 [ 60.353639] print_report+0xd1/0x650 [ 60.353643] ? __virt_addr_valid+0x1db/0x2d0 [ 60.353647] ? kasan_atomics_helper+0x4a36/0x5450 [ 60.353651] ? kasan_complete_mode_report_info+0x2a/0x200 [ 60.353657] ? kasan_atomics_helper+0x4a36/0x5450 [ 60.353661] kasan_report+0x141/0x180 [ 60.353665] ? kasan_atomics_helper+0x4a36/0x5450 [ 60.353670] __asan_report_load4_noabort+0x18/0x20 [ 60.353675] kasan_atomics_helper+0x4a36/0x5450 [ 60.353679] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 60.353683] ? __kmalloc_cache_noprof+0x189/0x420 [ 60.353688] ? kasan_atomics+0x152/0x310 [ 60.353693] kasan_atomics+0x1dc/0x310 [ 60.353697] ? __pfx_kasan_atomics+0x10/0x10 [ 60.353702] ? ktime_get_ts64+0x83/0x230 [ 60.353707] kunit_try_run_case+0x1a2/0x480 [ 60.353711] ? __pfx_kunit_try_run_case+0x10/0x10 [ 60.353716] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 60.353720] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 60.353725] ? __kthread_parkme+0x82/0x180 [ 60.353729] ? preempt_count_sub+0x50/0x80 [ 60.353733] ? __pfx_kunit_try_run_case+0x10/0x10 [ 60.353738] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 60.353742] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 60.353746] kthread+0x334/0x6f0 [ 60.353750] ? trace_preempt_on+0x20/0xc0 [ 60.353754] ? __pfx_kthread+0x10/0x10 [ 60.353758] ? _raw_spin_unlock_irq+0x47/0x80 [ 60.353762] ? calculate_sigpending+0x7b/0xa0 [ 60.353767] ? __pfx_kthread+0x10/0x10 [ 60.353771] ret_from_fork+0x113/0x1d0 [ 60.353775] ? __pfx_kthread+0x10/0x10 [ 60.353779] ret_from_fork_asm+0x1a/0x30 [ 60.353785] </TASK> [ 60.353786] [ 60.533428] Allocated by task 306: [ 60.536835] kasan_save_stack+0x45/0x70 [ 60.540675] kasan_save_track+0x18/0x40 [ 60.544516] kasan_save_alloc_info+0x3b/0x50 [ 60.548797] __kasan_kmalloc+0xb7/0xc0 [ 60.552549] __kmalloc_cache_noprof+0x189/0x420 [ 60.557092] kasan_atomics+0x95/0x310 [ 60.560764] kunit_try_run_case+0x1a2/0x480 [ 60.564950] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 60.570363] kthread+0x334/0x6f0 [ 60.573618] ret_from_fork+0x113/0x1d0 [ 60.577371] ret_from_fork_asm+0x1a/0x30 [ 60.581363] [ 60.582884] The buggy address belongs to the object at ffff8881066eaf00 [ 60.582884] which belongs to the cache kmalloc-64 of size 64 [ 60.595224] The buggy address is located 0 bytes to the right of [ 60.595224] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 60.608086] [ 60.609583] The buggy address belongs to the physical page: [ 60.615157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 60.623164] flags: 0x200000000000000(node=0|zone=2) [ 60.628046] page_type: f5(slab) [ 60.631192] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 60.638939] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.646687] page dumped because: kasan: bad access detected [ 60.652258] [ 60.653757] Memory state around the buggy address: [ 60.658550] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.665770] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 60.672991] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.680217] ^ [ 60.685011] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.692237] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 60.699457] ================================================================== [ 70.182972] ================================================================== [ 70.190211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 70.197605] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 70.204996] [ 70.206498] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 70.206506] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 70.206509] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 70.206512] Call Trace: [ 70.206514] <TASK> [ 70.206516] dump_stack_lvl+0x73/0xb0 [ 70.206520] print_report+0xd1/0x650 [ 70.206524] ? __virt_addr_valid+0x1db/0x2d0 [ 70.206528] ? kasan_atomics_helper+0x1ce1/0x5450 [ 70.206532] ? kasan_complete_mode_report_info+0x2a/0x200 [ 70.206538] ? kasan_atomics_helper+0x1ce1/0x5450 [ 70.206542] kasan_report+0x141/0x180 [ 70.206546] ? kasan_atomics_helper+0x1ce1/0x5450 [ 70.206551] kasan_check_range+0x10c/0x1c0 [ 70.206555] __kasan_check_write+0x18/0x20 [ 70.206559] kasan_atomics_helper+0x1ce1/0x5450 [ 70.206563] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 70.206567] ? __kmalloc_cache_noprof+0x189/0x420 [ 70.206572] ? kasan_atomics+0x152/0x310 [ 70.206577] kasan_atomics+0x1dc/0x310 [ 70.206582] ? __pfx_kasan_atomics+0x10/0x10 [ 70.206587] ? ktime_get_ts64+0x83/0x230 [ 70.206591] kunit_try_run_case+0x1a2/0x480 [ 70.206596] ? __pfx_kunit_try_run_case+0x10/0x10 [ 70.206600] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 70.206604] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 70.206609] ? __kthread_parkme+0x82/0x180 [ 70.206612] ? preempt_count_sub+0x50/0x80 [ 70.206617] ? __pfx_kunit_try_run_case+0x10/0x10 [ 70.206621] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 70.206626] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 70.206630] kthread+0x334/0x6f0 [ 70.206634] ? trace_preempt_on+0x20/0xc0 [ 70.206638] ? __pfx_kthread+0x10/0x10 [ 70.206642] ? _raw_spin_unlock_irq+0x47/0x80 [ 70.206646] ? calculate_sigpending+0x7b/0xa0 [ 70.206651] ? __pfx_kthread+0x10/0x10 [ 70.206655] ret_from_fork+0x113/0x1d0 [ 70.206659] ? __pfx_kthread+0x10/0x10 [ 70.206662] ret_from_fork_asm+0x1a/0x30 [ 70.206668] </TASK> [ 70.206670] [ 70.389794] Allocated by task 306: [ 70.393200] kasan_save_stack+0x45/0x70 [ 70.397040] kasan_save_track+0x18/0x40 [ 70.400880] kasan_save_alloc_info+0x3b/0x50 [ 70.405153] __kasan_kmalloc+0xb7/0xc0 [ 70.408906] __kmalloc_cache_noprof+0x189/0x420 [ 70.413446] kasan_atomics+0x95/0x310 [ 70.417111] kunit_try_run_case+0x1a2/0x480 [ 70.421298] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 70.426698] kthread+0x334/0x6f0 [ 70.429930] ret_from_fork+0x113/0x1d0 [ 70.433682] ret_from_fork_asm+0x1a/0x30 [ 70.437609] [ 70.439109] The buggy address belongs to the object at ffff8881066eaf00 [ 70.439109] which belongs to the cache kmalloc-64 of size 64 [ 70.451451] The buggy address is located 0 bytes to the right of [ 70.451451] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 70.464319] [ 70.465852] The buggy address belongs to the physical page: [ 70.471432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 70.479435] flags: 0x200000000000000(node=0|zone=2) [ 70.484314] page_type: f5(slab) [ 70.487496] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 70.495242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.502981] page dumped because: kasan: bad access detected [ 70.508552] [ 70.510052] Memory state around the buggy address: [ 70.514847] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.522075] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 70.529303] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.536531] ^ [ 70.541323] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.548594] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 70.555812] ================================================================== [ 50.858588] ================================================================== [ 50.865818] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 50.873219] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 50.880618] [ 50.882120] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 50.882129] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 50.882131] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 50.882135] Call Trace: [ 50.882136] <TASK> [ 50.882138] dump_stack_lvl+0x73/0xb0 [ 50.882143] print_report+0xd1/0x650 [ 50.882147] ? __virt_addr_valid+0x1db/0x2d0 [ 50.882151] ? kasan_atomics_helper+0x4ba2/0x5450 [ 50.882155] ? kasan_complete_mode_report_info+0x2a/0x200 [ 50.882160] ? kasan_atomics_helper+0x4ba2/0x5450 [ 50.882164] kasan_report+0x141/0x180 [ 50.882169] ? kasan_atomics_helper+0x4ba2/0x5450 [ 50.882173] __asan_report_store4_noabort+0x1b/0x30 [ 50.882179] kasan_atomics_helper+0x4ba2/0x5450 [ 50.882183] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 50.882187] ? __kmalloc_cache_noprof+0x189/0x420 [ 50.882192] ? kasan_atomics+0x152/0x310 [ 50.882197] kasan_atomics+0x1dc/0x310 [ 50.882201] ? __pfx_kasan_atomics+0x10/0x10 [ 50.882206] ? ktime_get_ts64+0x83/0x230 [ 50.882211] kunit_try_run_case+0x1a2/0x480 [ 50.882215] ? __pfx_kunit_try_run_case+0x10/0x10 [ 50.882220] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 50.882224] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 50.882229] ? __kthread_parkme+0x82/0x180 [ 50.882233] ? preempt_count_sub+0x50/0x80 [ 50.882237] ? __pfx_kunit_try_run_case+0x10/0x10 [ 50.882242] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 50.882246] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 50.882250] kthread+0x334/0x6f0 [ 50.882254] ? trace_preempt_on+0x20/0xc0 [ 50.882258] ? __pfx_kthread+0x10/0x10 [ 50.882262] ? _raw_spin_unlock_irq+0x47/0x80 [ 50.882266] ? calculate_sigpending+0x7b/0xa0 [ 50.882271] ? __pfx_kthread+0x10/0x10 [ 50.882275] ret_from_fork+0x113/0x1d0 [ 50.882279] ? __pfx_kthread+0x10/0x10 [ 50.882283] ret_from_fork_asm+0x1a/0x30 [ 50.882289] </TASK> [ 50.882291] [ 51.062089] Allocated by task 306: [ 51.065494] kasan_save_stack+0x45/0x70 [ 51.069363] kasan_save_track+0x18/0x40 [ 51.073245] kasan_save_alloc_info+0x3b/0x50 [ 51.077524] __kasan_kmalloc+0xb7/0xc0 [ 51.081278] __kmalloc_cache_noprof+0x189/0x420 [ 51.085811] kasan_atomics+0x95/0x310 [ 51.089485] kunit_try_run_case+0x1a2/0x480 [ 51.093671] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 51.099071] kthread+0x334/0x6f0 [ 51.102302] ret_from_fork+0x113/0x1d0 [ 51.106056] ret_from_fork_asm+0x1a/0x30 [ 51.109981] [ 51.111480] The buggy address belongs to the object at ffff8881066eaf00 [ 51.111480] which belongs to the cache kmalloc-64 of size 64 [ 51.123824] The buggy address is located 0 bytes to the right of [ 51.123824] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 51.136694] [ 51.138193] The buggy address belongs to the physical page: [ 51.143763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 51.151762] flags: 0x200000000000000(node=0|zone=2) [ 51.156643] page_type: f5(slab) [ 51.159789] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 51.167529] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.175267] page dumped because: kasan: bad access detected [ 51.180839] [ 51.182362] Memory state around the buggy address: [ 51.187201] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.194420] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 51.201641] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.208859] ^ [ 51.213651] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.220872] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 51.228090] ================================================================== [ 55.018931] ================================================================== [ 55.026170] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 55.033476] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 55.040870] [ 55.042382] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 55.042403] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 55.042406] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 55.042410] Call Trace: [ 55.042411] <TASK> [ 55.042413] dump_stack_lvl+0x73/0xb0 [ 55.042418] print_report+0xd1/0x650 [ 55.042422] ? __virt_addr_valid+0x1db/0x2d0 [ 55.042426] ? kasan_atomics_helper+0x7c7/0x5450 [ 55.042430] ? kasan_complete_mode_report_info+0x2a/0x200 [ 55.042435] ? kasan_atomics_helper+0x7c7/0x5450 [ 55.042439] kasan_report+0x141/0x180 [ 55.042443] ? kasan_atomics_helper+0x7c7/0x5450 [ 55.042448] kasan_check_range+0x10c/0x1c0 [ 55.042453] __kasan_check_write+0x18/0x20 [ 55.042456] kasan_atomics_helper+0x7c7/0x5450 [ 55.042461] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 55.042465] ? __kmalloc_cache_noprof+0x189/0x420 [ 55.042470] ? kasan_atomics+0x152/0x310 [ 55.042475] kasan_atomics+0x1dc/0x310 [ 55.042479] ? __pfx_kasan_atomics+0x10/0x10 [ 55.042484] ? ktime_get_ts64+0x83/0x230 [ 55.042489] kunit_try_run_case+0x1a2/0x480 [ 55.042493] ? __pfx_kunit_try_run_case+0x10/0x10 [ 55.042498] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 55.042502] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 55.042507] ? __kthread_parkme+0x82/0x180 [ 55.042511] ? preempt_count_sub+0x50/0x80 [ 55.042515] ? __pfx_kunit_try_run_case+0x10/0x10 [ 55.042520] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 55.042524] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 55.042528] kthread+0x334/0x6f0 [ 55.042532] ? trace_preempt_on+0x20/0xc0 [ 55.042536] ? __pfx_kthread+0x10/0x10 [ 55.042540] ? _raw_spin_unlock_irq+0x47/0x80 [ 55.042544] ? calculate_sigpending+0x7b/0xa0 [ 55.042549] ? __pfx_kthread+0x10/0x10 [ 55.042553] ret_from_fork+0x113/0x1d0 [ 55.042557] ? __pfx_kthread+0x10/0x10 [ 55.042561] ret_from_fork_asm+0x1a/0x30 [ 55.042567] </TASK> [ 55.042569] [ 55.225251] Allocated by task 306: [ 55.228657] kasan_save_stack+0x45/0x70 [ 55.232496] kasan_save_track+0x18/0x40 [ 55.236376] kasan_save_alloc_info+0x3b/0x50 [ 55.240677] __kasan_kmalloc+0xb7/0xc0 [ 55.244431] __kmalloc_cache_noprof+0x189/0x420 [ 55.248964] kasan_atomics+0x95/0x310 [ 55.252637] kunit_try_run_case+0x1a2/0x480 [ 55.256823] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 55.262225] kthread+0x334/0x6f0 [ 55.265465] ret_from_fork+0x113/0x1d0 [ 55.269216] ret_from_fork_asm+0x1a/0x30 [ 55.273142] [ 55.274643] The buggy address belongs to the object at ffff8881066eaf00 [ 55.274643] which belongs to the cache kmalloc-64 of size 64 [ 55.286984] The buggy address is located 0 bytes to the right of [ 55.286984] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 55.299846] [ 55.301364] The buggy address belongs to the physical page: [ 55.306986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 55.314985] flags: 0x200000000000000(node=0|zone=2) [ 55.319864] page_type: f5(slab) [ 55.323011] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 55.330752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.338499] page dumped because: kasan: bad access detected [ 55.344072] [ 55.345571] Memory state around the buggy address: [ 55.350365] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 55.357626] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 55.364844] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 55.372065] ^ [ 55.376857] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.384076] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 55.391296] ================================================================== [ 73.639578] ================================================================== [ 73.646816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 73.654210] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 73.661602] [ 73.663102] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 73.663110] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 73.663113] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 73.663116] Call Trace: [ 73.663118] <TASK> [ 73.663120] dump_stack_lvl+0x73/0xb0 [ 73.663125] print_report+0xd1/0x650 [ 73.663129] ? __virt_addr_valid+0x1db/0x2d0 [ 73.663133] ? kasan_atomics_helper+0x20c8/0x5450 [ 73.663137] ? kasan_complete_mode_report_info+0x2a/0x200 [ 73.663142] ? kasan_atomics_helper+0x20c8/0x5450 [ 73.663146] kasan_report+0x141/0x180 [ 73.663151] ? kasan_atomics_helper+0x20c8/0x5450 [ 73.663155] kasan_check_range+0x10c/0x1c0 [ 73.663160] __kasan_check_write+0x18/0x20 [ 73.663164] kasan_atomics_helper+0x20c8/0x5450 [ 73.663168] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 73.663172] ? __kmalloc_cache_noprof+0x189/0x420 [ 73.663177] ? kasan_atomics+0x152/0x310 [ 73.663182] kasan_atomics+0x1dc/0x310 [ 73.663187] ? __pfx_kasan_atomics+0x10/0x10 [ 73.663192] ? ktime_get_ts64+0x83/0x230 [ 73.663196] kunit_try_run_case+0x1a2/0x480 [ 73.663201] ? __pfx_kunit_try_run_case+0x10/0x10 [ 73.663205] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 73.663209] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 73.663214] ? __kthread_parkme+0x82/0x180 [ 73.663218] ? preempt_count_sub+0x50/0x80 [ 73.663222] ? __pfx_kunit_try_run_case+0x10/0x10 [ 73.663226] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 73.663231] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 73.663235] kthread+0x334/0x6f0 [ 73.663239] ? trace_preempt_on+0x20/0xc0 [ 73.663243] ? __pfx_kthread+0x10/0x10 [ 73.663247] ? _raw_spin_unlock_irq+0x47/0x80 [ 73.663251] ? calculate_sigpending+0x7b/0xa0 [ 73.663256] ? __pfx_kthread+0x10/0x10 [ 73.663260] ret_from_fork+0x113/0x1d0 [ 73.663263] ? __pfx_kthread+0x10/0x10 [ 73.663267] ret_from_fork_asm+0x1a/0x30 [ 73.663273] </TASK> [ 73.663275] [ 73.846454] Allocated by task 306: [ 73.849860] kasan_save_stack+0x45/0x70 [ 73.853697] kasan_save_track+0x18/0x40 [ 73.857537] kasan_save_alloc_info+0x3b/0x50 [ 73.861811] __kasan_kmalloc+0xb7/0xc0 [ 73.865563] __kmalloc_cache_noprof+0x189/0x420 [ 73.870105] kasan_atomics+0x95/0x310 [ 73.873770] kunit_try_run_case+0x1a2/0x480 [ 73.877957] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 73.883365] kthread+0x334/0x6f0 [ 73.886648] ret_from_fork+0x113/0x1d0 [ 73.890419] ret_from_fork_asm+0x1a/0x30 [ 73.894363] [ 73.895906] The buggy address belongs to the object at ffff8881066eaf00 [ 73.895906] which belongs to the cache kmalloc-64 of size 64 [ 73.908246] The buggy address is located 0 bytes to the right of [ 73.908246] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 73.921107] [ 73.922606] The buggy address belongs to the physical page: [ 73.928179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 73.936179] flags: 0x200000000000000(node=0|zone=2) [ 73.941059] page_type: f5(slab) [ 73.944204] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 73.951943] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.959684] page dumped because: kasan: bad access detected [ 73.965257] [ 73.966754] Memory state around the buggy address: [ 73.971548] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.978767] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 73.985985] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.993205] ^ [ 73.997999] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.005227] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.012444] ================================================================== [ 53.880499] ================================================================== [ 53.887748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 53.895056] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 53.902455] [ 53.903957] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 53.903965] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 53.903968] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 53.903971] Call Trace: [ 53.903973] <TASK> [ 53.903975] dump_stack_lvl+0x73/0xb0 [ 53.903979] print_report+0xd1/0x650 [ 53.903983] ? __virt_addr_valid+0x1db/0x2d0 [ 53.903988] ? kasan_atomics_helper+0x5fe/0x5450 [ 53.903991] ? kasan_complete_mode_report_info+0x2a/0x200 [ 53.903997] ? kasan_atomics_helper+0x5fe/0x5450 [ 53.904001] kasan_report+0x141/0x180 [ 53.904005] ? kasan_atomics_helper+0x5fe/0x5450 [ 53.904010] kasan_check_range+0x10c/0x1c0 [ 53.904015] __kasan_check_write+0x18/0x20 [ 53.904018] kasan_atomics_helper+0x5fe/0x5450 [ 53.904022] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 53.904026] ? __kmalloc_cache_noprof+0x189/0x420 [ 53.904031] ? kasan_atomics+0x152/0x310 [ 53.904037] kasan_atomics+0x1dc/0x310 [ 53.904041] ? __pfx_kasan_atomics+0x10/0x10 [ 53.904046] ? ktime_get_ts64+0x83/0x230 [ 53.904050] kunit_try_run_case+0x1a2/0x480 [ 53.904055] ? __pfx_kunit_try_run_case+0x10/0x10 [ 53.904060] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 53.904064] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 53.904069] ? __kthread_parkme+0x82/0x180 [ 53.904072] ? preempt_count_sub+0x50/0x80 [ 53.904077] ? __pfx_kunit_try_run_case+0x10/0x10 [ 53.904082] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 53.904086] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 53.904090] kthread+0x334/0x6f0 [ 53.904094] ? trace_preempt_on+0x20/0xc0 [ 53.904098] ? __pfx_kthread+0x10/0x10 [ 53.904102] ? _raw_spin_unlock_irq+0x47/0x80 [ 53.904106] ? calculate_sigpending+0x7b/0xa0 [ 53.904111] ? __pfx_kthread+0x10/0x10 [ 53.904115] ret_from_fork+0x113/0x1d0 [ 53.904119] ? __pfx_kthread+0x10/0x10 [ 53.904123] ret_from_fork_asm+0x1a/0x30 [ 53.904129] </TASK> [ 53.904130] [ 54.086776] Allocated by task 306: [ 54.090185] kasan_save_stack+0x45/0x70 [ 54.094022] kasan_save_track+0x18/0x40 [ 54.097862] kasan_save_alloc_info+0x3b/0x50 [ 54.102144] __kasan_kmalloc+0xb7/0xc0 [ 54.105896] __kmalloc_cache_noprof+0x189/0x420 [ 54.110428] kasan_atomics+0x95/0x310 [ 54.114094] kunit_try_run_case+0x1a2/0x480 [ 54.118281] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 54.123681] kthread+0x334/0x6f0 [ 54.126920] ret_from_fork+0x113/0x1d0 [ 54.130673] ret_from_fork_asm+0x1a/0x30 [ 54.134600] [ 54.136100] The buggy address belongs to the object at ffff8881066eaf00 [ 54.136100] which belongs to the cache kmalloc-64 of size 64 [ 54.148440] The buggy address is located 0 bytes to the right of [ 54.148440] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 54.161302] [ 54.162801] The buggy address belongs to the physical page: [ 54.168416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 54.176417] flags: 0x200000000000000(node=0|zone=2) [ 54.181295] page_type: f5(slab) [ 54.184444] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 54.192191] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.199937] page dumped because: kasan: bad access detected [ 54.205509] [ 54.207010] Memory state around the buggy address: [ 54.211802] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.219020] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 54.226242] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.233469] ^ [ 54.238262] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.245481] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 54.252700] ================================================================== [ 67.526210] ================================================================== [ 67.533457] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 67.540848] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 67.548243] [ 67.549742] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 67.549750] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 67.549752] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 67.549756] Call Trace: [ 67.549757] <TASK> [ 67.549759] dump_stack_lvl+0x73/0xb0 [ 67.549764] print_report+0xd1/0x650 [ 67.549768] ? __virt_addr_valid+0x1db/0x2d0 [ 67.549772] ? kasan_atomics_helper+0x18b1/0x5450 [ 67.549776] ? kasan_complete_mode_report_info+0x2a/0x200 [ 67.549781] ? kasan_atomics_helper+0x18b1/0x5450 [ 67.549785] kasan_report+0x141/0x180 [ 67.549789] ? kasan_atomics_helper+0x18b1/0x5450 [ 67.549794] kasan_check_range+0x10c/0x1c0 [ 67.549799] __kasan_check_write+0x18/0x20 [ 67.549802] kasan_atomics_helper+0x18b1/0x5450 [ 67.549807] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 67.549811] ? __kmalloc_cache_noprof+0x189/0x420 [ 67.549816] ? kasan_atomics+0x152/0x310 [ 67.549821] kasan_atomics+0x1dc/0x310 [ 67.549825] ? __pfx_kasan_atomics+0x10/0x10 [ 67.549830] ? ktime_get_ts64+0x83/0x230 [ 67.549835] kunit_try_run_case+0x1a2/0x480 [ 67.549839] ? __pfx_kunit_try_run_case+0x10/0x10 [ 67.549844] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 67.549848] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 67.549853] ? __kthread_parkme+0x82/0x180 [ 67.549856] ? preempt_count_sub+0x50/0x80 [ 67.549861] ? __pfx_kunit_try_run_case+0x10/0x10 [ 67.549865] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 67.549870] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 67.549874] kthread+0x334/0x6f0 [ 67.549878] ? trace_preempt_on+0x20/0xc0 [ 67.549882] ? __pfx_kthread+0x10/0x10 [ 67.549886] ? _raw_spin_unlock_irq+0x47/0x80 [ 67.549890] ? calculate_sigpending+0x7b/0xa0 [ 67.549895] ? __pfx_kthread+0x10/0x10 [ 67.549899] ret_from_fork+0x113/0x1d0 [ 67.549902] ? __pfx_kthread+0x10/0x10 [ 67.549906] ret_from_fork_asm+0x1a/0x30 [ 67.549912] </TASK> [ 67.549914] [ 67.733067] Allocated by task 306: [ 67.736473] kasan_save_stack+0x45/0x70 [ 67.740312] kasan_save_track+0x18/0x40 [ 67.744150] kasan_save_alloc_info+0x3b/0x50 [ 67.748422] __kasan_kmalloc+0xb7/0xc0 [ 67.752175] __kmalloc_cache_noprof+0x189/0x420 [ 67.756710] kasan_atomics+0x95/0x310 [ 67.760416] kunit_try_run_case+0x1a2/0x480 [ 67.764604] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 67.770003] kthread+0x334/0x6f0 [ 67.773235] ret_from_fork+0x113/0x1d0 [ 67.776989] ret_from_fork_asm+0x1a/0x30 [ 67.780915] [ 67.782420] The buggy address belongs to the object at ffff8881066eaf00 [ 67.782420] which belongs to the cache kmalloc-64 of size 64 [ 67.794756] The buggy address is located 0 bytes to the right of [ 67.794756] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 67.807618] [ 67.809116] The buggy address belongs to the physical page: [ 67.814688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 67.822688] flags: 0x200000000000000(node=0|zone=2) [ 67.827568] page_type: f5(slab) [ 67.830714] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 67.838453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.846192] page dumped because: kasan: bad access detected [ 67.851764] [ 67.853264] Memory state around the buggy address: [ 67.858058] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.865285] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 67.872503] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.879723] ^ [ 67.884516] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.891734] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 67.898955] ================================================================== [ 72.505949] ================================================================== [ 72.513187] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 72.520581] Read of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 72.527896] [ 72.529423] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 72.529431] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 72.529434] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 72.529437] Call Trace: [ 72.529439] <TASK> [ 72.529441] dump_stack_lvl+0x73/0xb0 [ 72.529445] print_report+0xd1/0x650 [ 72.529450] ? __virt_addr_valid+0x1db/0x2d0 [ 72.529454] ? kasan_atomics_helper+0x4f71/0x5450 [ 72.529458] ? kasan_complete_mode_report_info+0x2a/0x200 [ 72.529463] ? kasan_atomics_helper+0x4f71/0x5450 [ 72.529467] kasan_report+0x141/0x180 [ 72.529471] ? kasan_atomics_helper+0x4f71/0x5450 [ 72.529476] __asan_report_load8_noabort+0x18/0x20 [ 72.529481] kasan_atomics_helper+0x4f71/0x5450 [ 72.529485] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 72.529489] ? __kmalloc_cache_noprof+0x189/0x420 [ 72.529494] ? kasan_atomics+0x152/0x310 [ 72.529499] kasan_atomics+0x1dc/0x310 [ 72.529504] ? __pfx_kasan_atomics+0x10/0x10 [ 72.529509] ? ktime_get_ts64+0x83/0x230 [ 72.529513] kunit_try_run_case+0x1a2/0x480 [ 72.529518] ? __pfx_kunit_try_run_case+0x10/0x10 [ 72.529522] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 72.529527] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 72.529531] ? __kthread_parkme+0x82/0x180 [ 72.529535] ? preempt_count_sub+0x50/0x80 [ 72.529539] ? __pfx_kunit_try_run_case+0x10/0x10 [ 72.529544] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 72.529548] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 72.529552] kthread+0x334/0x6f0 [ 72.529556] ? trace_preempt_on+0x20/0xc0 [ 72.529560] ? __pfx_kthread+0x10/0x10 [ 72.529564] ? _raw_spin_unlock_irq+0x47/0x80 [ 72.529568] ? calculate_sigpending+0x7b/0xa0 [ 72.529573] ? __pfx_kthread+0x10/0x10 [ 72.529577] ret_from_fork+0x113/0x1d0 [ 72.529580] ? __pfx_kthread+0x10/0x10 [ 72.529584] ret_from_fork_asm+0x1a/0x30 [ 72.529590] </TASK> [ 72.529592] [ 72.709350] Allocated by task 306: [ 72.712808] kasan_save_stack+0x45/0x70 [ 72.716645] kasan_save_track+0x18/0x40 [ 72.720486] kasan_save_alloc_info+0x3b/0x50 [ 72.724766] __kasan_kmalloc+0xb7/0xc0 [ 72.728518] __kmalloc_cache_noprof+0x189/0x420 [ 72.733051] kasan_atomics+0x95/0x310 [ 72.736718] kunit_try_run_case+0x1a2/0x480 [ 72.740912] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 72.746312] kthread+0x334/0x6f0 [ 72.749577] ret_from_fork+0x113/0x1d0 [ 72.753362] ret_from_fork_asm+0x1a/0x30 [ 72.757364] [ 72.758896] The buggy address belongs to the object at ffff8881066eaf00 [ 72.758896] which belongs to the cache kmalloc-64 of size 64 [ 72.771238] The buggy address is located 0 bytes to the right of [ 72.771238] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 72.784106] [ 72.785606] The buggy address belongs to the physical page: [ 72.791177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 72.799177] flags: 0x200000000000000(node=0|zone=2) [ 72.804057] page_type: f5(slab) [ 72.807206] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 72.814953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.822701] page dumped because: kasan: bad access detected [ 72.828270] [ 72.829771] Memory state around the buggy address: [ 72.834563] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.841785] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 72.849011] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.856230] ^ [ 72.861023] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.868241] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 72.875461] ================================================================== [ 51.235319] ================================================================== [ 51.242582] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 51.249982] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 51.257289] [ 51.258788] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 51.258796] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 51.258799] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 51.258802] Call Trace: [ 51.258804] <TASK> [ 51.258806] dump_stack_lvl+0x73/0xb0 [ 51.258811] print_report+0xd1/0x650 [ 51.258815] ? __virt_addr_valid+0x1db/0x2d0 [ 51.258819] ? kasan_atomics_helper+0x4b88/0x5450 [ 51.258823] ? kasan_complete_mode_report_info+0x2a/0x200 [ 51.258828] ? kasan_atomics_helper+0x4b88/0x5450 [ 51.258833] kasan_report+0x141/0x180 [ 51.258837] ? kasan_atomics_helper+0x4b88/0x5450 [ 51.258842] __asan_report_load4_noabort+0x18/0x20 [ 51.258847] kasan_atomics_helper+0x4b88/0x5450 [ 51.258851] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 51.258855] ? __kmalloc_cache_noprof+0x189/0x420 [ 51.258860] ? kasan_atomics+0x152/0x310 [ 51.258865] kasan_atomics+0x1dc/0x310 [ 51.258870] ? __pfx_kasan_atomics+0x10/0x10 [ 51.258874] ? ktime_get_ts64+0x83/0x230 [ 51.258879] kunit_try_run_case+0x1a2/0x480 [ 51.258884] ? __pfx_kunit_try_run_case+0x10/0x10 [ 51.258888] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 51.258892] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 51.258897] ? __kthread_parkme+0x82/0x180 [ 51.258901] ? preempt_count_sub+0x50/0x80 [ 51.258905] ? __pfx_kunit_try_run_case+0x10/0x10 [ 51.258910] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 51.258914] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 51.258918] kthread+0x334/0x6f0 [ 51.258922] ? trace_preempt_on+0x20/0xc0 [ 51.258926] ? __pfx_kthread+0x10/0x10 [ 51.258930] ? _raw_spin_unlock_irq+0x47/0x80 [ 51.258934] ? calculate_sigpending+0x7b/0xa0 [ 51.258939] ? __pfx_kthread+0x10/0x10 [ 51.258943] ret_from_fork+0x113/0x1d0 [ 51.258947] ? __pfx_kthread+0x10/0x10 [ 51.258951] ret_from_fork_asm+0x1a/0x30 [ 51.258956] </TASK> [ 51.258958] [ 51.438767] Allocated by task 306: [ 51.442174] kasan_save_stack+0x45/0x70 [ 51.446013] kasan_save_track+0x18/0x40 [ 51.449853] kasan_save_alloc_info+0x3b/0x50 [ 51.454132] __kasan_kmalloc+0xb7/0xc0 [ 51.457887] __kmalloc_cache_noprof+0x189/0x420 [ 51.462428] kasan_atomics+0x95/0x310 [ 51.466103] kunit_try_run_case+0x1a2/0x480 [ 51.470287] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 51.475687] kthread+0x334/0x6f0 [ 51.478921] ret_from_fork+0x113/0x1d0 [ 51.482671] ret_from_fork_asm+0x1a/0x30 [ 51.486598] [ 51.488098] The buggy address belongs to the object at ffff8881066eaf00 [ 51.488098] which belongs to the cache kmalloc-64 of size 64 [ 51.500439] The buggy address is located 0 bytes to the right of [ 51.500439] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 51.513309] [ 51.514808] The buggy address belongs to the physical page: [ 51.520421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 51.528425] flags: 0x200000000000000(node=0|zone=2) [ 51.533312] page_type: f5(slab) [ 51.536494] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 51.544241] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.551987] page dumped because: kasan: bad access detected [ 51.557561] [ 51.559061] Memory state around the buggy address: [ 51.563853] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.571072] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 51.578293] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 51.585519] ^ [ 51.590313] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.597568] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 51.604793] ================================================================== [ 66.386200] ================================================================== [ 66.393441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 66.400841] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 66.408243] [ 66.409743] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 66.409751] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 66.409754] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 66.409758] Call Trace: [ 66.409759] <TASK> [ 66.409761] dump_stack_lvl+0x73/0xb0 [ 66.409766] print_report+0xd1/0x650 [ 66.409770] ? __virt_addr_valid+0x1db/0x2d0 [ 66.409774] ? kasan_atomics_helper+0x16e7/0x5450 [ 66.409778] ? kasan_complete_mode_report_info+0x2a/0x200 [ 66.409783] ? kasan_atomics_helper+0x16e7/0x5450 [ 66.409787] kasan_report+0x141/0x180 [ 66.409792] ? kasan_atomics_helper+0x16e7/0x5450 [ 66.409796] kasan_check_range+0x10c/0x1c0 [ 66.409801] __kasan_check_write+0x18/0x20 [ 66.409805] kasan_atomics_helper+0x16e7/0x5450 [ 66.409809] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 66.409813] ? __kmalloc_cache_noprof+0x189/0x420 [ 66.409818] ? kasan_atomics+0x152/0x310 [ 66.409823] kasan_atomics+0x1dc/0x310 [ 66.409827] ? __pfx_kasan_atomics+0x10/0x10 [ 66.409832] ? ktime_get_ts64+0x83/0x230 [ 66.409837] kunit_try_run_case+0x1a2/0x480 [ 66.409842] ? __pfx_kunit_try_run_case+0x10/0x10 [ 66.409846] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 66.409850] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 66.409855] ? __kthread_parkme+0x82/0x180 [ 66.409859] ? preempt_count_sub+0x50/0x80 [ 66.409863] ? __pfx_kunit_try_run_case+0x10/0x10 [ 66.409868] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 66.409872] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 66.409877] kthread+0x334/0x6f0 [ 66.409880] ? trace_preempt_on+0x20/0xc0 [ 66.409885] ? __pfx_kthread+0x10/0x10 [ 66.409889] ? _raw_spin_unlock_irq+0x47/0x80 [ 66.409893] ? calculate_sigpending+0x7b/0xa0 [ 66.409897] ? __pfx_kthread+0x10/0x10 [ 66.409902] ret_from_fork+0x113/0x1d0 [ 66.409905] ? __pfx_kthread+0x10/0x10 [ 66.409909] ret_from_fork_asm+0x1a/0x30 [ 66.409915] </TASK> [ 66.409917] [ 66.593041] Allocated by task 306: [ 66.596447] kasan_save_stack+0x45/0x70 [ 66.600286] kasan_save_track+0x18/0x40 [ 66.604125] kasan_save_alloc_info+0x3b/0x50 [ 66.608421] __kasan_kmalloc+0xb7/0xc0 [ 66.612177] __kmalloc_cache_noprof+0x189/0x420 [ 66.616718] kasan_atomics+0x95/0x310 [ 66.620418] kunit_try_run_case+0x1a2/0x480 [ 66.624604] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 66.630005] kthread+0x334/0x6f0 [ 66.633236] ret_from_fork+0x113/0x1d0 [ 66.636991] ret_from_fork_asm+0x1a/0x30 [ 66.640924] [ 66.642423] The buggy address belongs to the object at ffff8881066eaf00 [ 66.642423] which belongs to the cache kmalloc-64 of size 64 [ 66.654764] The buggy address is located 0 bytes to the right of [ 66.654764] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 66.667627] [ 66.669125] The buggy address belongs to the physical page: [ 66.674699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 66.682707] flags: 0x200000000000000(node=0|zone=2) [ 66.687594] page_type: f5(slab) [ 66.690741] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 66.698490] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.706237] page dumped because: kasan: bad access detected [ 66.711809] [ 66.713306] Memory state around the buggy address: [ 66.718101] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.725321] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 66.732574] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.739792] ^ [ 66.744586] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.751806] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.759023] ================================================================== [ 68.666243] ================================================================== [ 68.673481] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 68.680876] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 68.688275] [ 68.689776] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 68.689784] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 68.689786] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 68.689790] Call Trace: [ 68.689792] <TASK> [ 68.689793] dump_stack_lvl+0x73/0xb0 [ 68.689798] print_report+0xd1/0x650 [ 68.689802] ? __virt_addr_valid+0x1db/0x2d0 [ 68.689806] ? kasan_atomics_helper+0x1a7f/0x5450 [ 68.689810] ? kasan_complete_mode_report_info+0x2a/0x200 [ 68.689815] ? kasan_atomics_helper+0x1a7f/0x5450 [ 68.689819] kasan_report+0x141/0x180 [ 68.689824] ? kasan_atomics_helper+0x1a7f/0x5450 [ 68.689829] kasan_check_range+0x10c/0x1c0 [ 68.689833] __kasan_check_write+0x18/0x20 [ 68.689837] kasan_atomics_helper+0x1a7f/0x5450 [ 68.689841] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 68.689845] ? __kmalloc_cache_noprof+0x189/0x420 [ 68.689850] ? kasan_atomics+0x152/0x310 [ 68.689855] kasan_atomics+0x1dc/0x310 [ 68.689859] ? __pfx_kasan_atomics+0x10/0x10 [ 68.689864] ? ktime_get_ts64+0x83/0x230 [ 68.689869] kunit_try_run_case+0x1a2/0x480 [ 68.689873] ? __pfx_kunit_try_run_case+0x10/0x10 [ 68.689878] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 68.689882] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 68.689887] ? __kthread_parkme+0x82/0x180 [ 68.689891] ? preempt_count_sub+0x50/0x80 [ 68.689895] ? __pfx_kunit_try_run_case+0x10/0x10 [ 68.689899] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 68.689904] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 68.689908] kthread+0x334/0x6f0 [ 68.689912] ? trace_preempt_on+0x20/0xc0 [ 68.689916] ? __pfx_kthread+0x10/0x10 [ 68.689920] ? _raw_spin_unlock_irq+0x47/0x80 [ 68.689924] ? calculate_sigpending+0x7b/0xa0 [ 68.689929] ? __pfx_kthread+0x10/0x10 [ 68.689933] ret_from_fork+0x113/0x1d0 [ 68.689936] ? __pfx_kthread+0x10/0x10 [ 68.689940] ret_from_fork_asm+0x1a/0x30 [ 68.689946] </TASK> [ 68.689948] [ 68.873100] Allocated by task 306: [ 68.876508] kasan_save_stack+0x45/0x70 [ 68.880377] kasan_save_track+0x18/0x40 [ 68.884246] kasan_save_alloc_info+0x3b/0x50 [ 68.888527] __kasan_kmalloc+0xb7/0xc0 [ 68.892279] __kmalloc_cache_noprof+0x189/0x420 [ 68.896812] kasan_atomics+0x95/0x310 [ 68.900479] kunit_try_run_case+0x1a2/0x480 [ 68.904674] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 68.910080] kthread+0x334/0x6f0 [ 68.913313] ret_from_fork+0x113/0x1d0 [ 68.917102] ret_from_fork_asm+0x1a/0x30 [ 68.921034] [ 68.922536] The buggy address belongs to the object at ffff8881066eaf00 [ 68.922536] which belongs to the cache kmalloc-64 of size 64 [ 68.934877] The buggy address is located 0 bytes to the right of [ 68.934877] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 68.947737] [ 68.949237] The buggy address belongs to the physical page: [ 68.954808] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 68.962808] flags: 0x200000000000000(node=0|zone=2) [ 68.967687] page_type: f5(slab) [ 68.970836] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 68.978582] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.986323] page dumped because: kasan: bad access detected [ 68.991945] [ 68.993445] Memory state around the buggy address: [ 68.998238] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.005457] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 69.012678] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.019896] ^ [ 69.024690] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.031915] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 69.039135] ================================================================== [ 60.706682] ================================================================== [ 60.713922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 60.721316] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 60.728741] [ 60.730241] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 60.730249] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 60.730251] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 60.730255] Call Trace: [ 60.730257] <TASK> [ 60.730258] dump_stack_lvl+0x73/0xb0 [ 60.730263] print_report+0xd1/0x650 [ 60.730267] ? __virt_addr_valid+0x1db/0x2d0 [ 60.730271] ? kasan_atomics_helper+0x1079/0x5450 [ 60.730275] ? kasan_complete_mode_report_info+0x2a/0x200 [ 60.730281] ? kasan_atomics_helper+0x1079/0x5450 [ 60.730285] kasan_report+0x141/0x180 [ 60.730289] ? kasan_atomics_helper+0x1079/0x5450 [ 60.730294] kasan_check_range+0x10c/0x1c0 [ 60.730298] __kasan_check_write+0x18/0x20 [ 60.730302] kasan_atomics_helper+0x1079/0x5450 [ 60.730306] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 60.730310] ? __kmalloc_cache_noprof+0x189/0x420 [ 60.730315] ? kasan_atomics+0x152/0x310 [ 60.730321] kasan_atomics+0x1dc/0x310 [ 60.730325] ? __pfx_kasan_atomics+0x10/0x10 [ 60.730350] ? ktime_get_ts64+0x83/0x230 [ 60.730354] kunit_try_run_case+0x1a2/0x480 [ 60.730359] ? __pfx_kunit_try_run_case+0x10/0x10 [ 60.730364] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 60.730381] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 60.730386] ? __kthread_parkme+0x82/0x180 [ 60.730402] ? preempt_count_sub+0x50/0x80 [ 60.730407] ? __pfx_kunit_try_run_case+0x10/0x10 [ 60.730411] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 60.730416] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 60.730420] kthread+0x334/0x6f0 [ 60.730424] ? trace_preempt_on+0x20/0xc0 [ 60.730428] ? __pfx_kthread+0x10/0x10 [ 60.730432] ? _raw_spin_unlock_irq+0x47/0x80 [ 60.730436] ? calculate_sigpending+0x7b/0xa0 [ 60.730441] ? __pfx_kthread+0x10/0x10 [ 60.730445] ret_from_fork+0x113/0x1d0 [ 60.730448] ? __pfx_kthread+0x10/0x10 [ 60.730452] ret_from_fork_asm+0x1a/0x30 [ 60.730458] </TASK> [ 60.730460] [ 60.913505] Allocated by task 306: [ 60.916910] kasan_save_stack+0x45/0x70 [ 60.920751] kasan_save_track+0x18/0x40 [ 60.924591] kasan_save_alloc_info+0x3b/0x50 [ 60.928870] __kasan_kmalloc+0xb7/0xc0 [ 60.932625] __kmalloc_cache_noprof+0x189/0x420 [ 60.937166] kasan_atomics+0x95/0x310 [ 60.940840] kunit_try_run_case+0x1a2/0x480 [ 60.945025] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 60.950426] kthread+0x334/0x6f0 [ 60.953658] ret_from_fork+0x113/0x1d0 [ 60.957425] ret_from_fork_asm+0x1a/0x30 [ 60.961363] [ 60.962905] The buggy address belongs to the object at ffff8881066eaf00 [ 60.962905] which belongs to the cache kmalloc-64 of size 64 [ 60.975246] The buggy address is located 0 bytes to the right of [ 60.975246] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 60.988108] [ 60.989608] The buggy address belongs to the physical page: [ 60.995180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 61.003179] flags: 0x200000000000000(node=0|zone=2) [ 61.008060] page_type: f5(slab) [ 61.011204] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 61.018944] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.026684] page dumped because: kasan: bad access detected [ 61.032255] [ 61.033755] Memory state around the buggy address: [ 61.038550] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.045777] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 61.053004] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.060224] ^ [ 61.065014] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.072236] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 61.079454] ================================================================== [ 70.942940] ================================================================== [ 70.950179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 70.957572] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 70.964974] [ 70.966474] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 70.966482] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 70.966485] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 70.966488] Call Trace: [ 70.966490] <TASK> [ 70.966492] dump_stack_lvl+0x73/0xb0 [ 70.966496] print_report+0xd1/0x650 [ 70.966500] ? __virt_addr_valid+0x1db/0x2d0 [ 70.966504] ? kasan_atomics_helper+0x1e12/0x5450 [ 70.966508] ? kasan_complete_mode_report_info+0x2a/0x200 [ 70.966514] ? kasan_atomics_helper+0x1e12/0x5450 [ 70.966518] kasan_report+0x141/0x180 [ 70.966522] ? kasan_atomics_helper+0x1e12/0x5450 [ 70.966527] kasan_check_range+0x10c/0x1c0 [ 70.966531] __kasan_check_write+0x18/0x20 [ 70.966535] kasan_atomics_helper+0x1e12/0x5450 [ 70.966539] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 70.966543] ? __kmalloc_cache_noprof+0x189/0x420 [ 70.966548] ? kasan_atomics+0x152/0x310 [ 70.966553] kasan_atomics+0x1dc/0x310 [ 70.966558] ? __pfx_kasan_atomics+0x10/0x10 [ 70.966563] ? ktime_get_ts64+0x83/0x230 [ 70.966567] kunit_try_run_case+0x1a2/0x480 [ 70.966572] ? __pfx_kunit_try_run_case+0x10/0x10 [ 70.966576] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 70.966581] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 70.966585] ? __kthread_parkme+0x82/0x180 [ 70.966589] ? preempt_count_sub+0x50/0x80 [ 70.966593] ? __pfx_kunit_try_run_case+0x10/0x10 [ 70.966598] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 70.966602] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 70.966606] kthread+0x334/0x6f0 [ 70.966610] ? trace_preempt_on+0x20/0xc0 [ 70.966614] ? __pfx_kthread+0x10/0x10 [ 70.966618] ? _raw_spin_unlock_irq+0x47/0x80 [ 70.966622] ? calculate_sigpending+0x7b/0xa0 [ 70.966627] ? __pfx_kthread+0x10/0x10 [ 70.966631] ret_from_fork+0x113/0x1d0 [ 70.966634] ? __pfx_kthread+0x10/0x10 [ 70.966638] ret_from_fork_asm+0x1a/0x30 [ 70.966644] </TASK> [ 70.966646] [ 71.149763] Allocated by task 306: [ 71.153168] kasan_save_stack+0x45/0x70 [ 71.157007] kasan_save_track+0x18/0x40 [ 71.160848] kasan_save_alloc_info+0x3b/0x50 [ 71.165129] __kasan_kmalloc+0xb7/0xc0 [ 71.168880] __kmalloc_cache_noprof+0x189/0x420 [ 71.173421] kasan_atomics+0x95/0x310 [ 71.177089] kunit_try_run_case+0x1a2/0x480 [ 71.181284] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 71.186681] kthread+0x334/0x6f0 [ 71.189916] ret_from_fork+0x113/0x1d0 [ 71.193669] ret_from_fork_asm+0x1a/0x30 [ 71.197602] [ 71.199101] The buggy address belongs to the object at ffff8881066eaf00 [ 71.199101] which belongs to the cache kmalloc-64 of size 64 [ 71.211436] The buggy address is located 0 bytes to the right of [ 71.211436] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 71.224297] [ 71.225796] The buggy address belongs to the physical page: [ 71.231379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 71.239431] flags: 0x200000000000000(node=0|zone=2) [ 71.244317] page_type: f5(slab) [ 71.247496] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 71.255237] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 71.262984] page dumped because: kasan: bad access detected [ 71.268558] [ 71.270056] Memory state around the buggy address: [ 71.274847] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.282067] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 71.289289] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 71.296514] ^ [ 71.301309] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.308536] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 71.315753] ================================================================== [ 63.356478] ================================================================== [ 63.363717] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 63.371109] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 63.378423] [ 63.379924] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 63.379932] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 63.379935] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 63.379938] Call Trace: [ 63.379940] <TASK> [ 63.379942] dump_stack_lvl+0x73/0xb0 [ 63.379946] print_report+0xd1/0x650 [ 63.379950] ? __virt_addr_valid+0x1db/0x2d0 [ 63.379955] ? kasan_atomics_helper+0x49ce/0x5450 [ 63.379958] ? kasan_complete_mode_report_info+0x2a/0x200 [ 63.379964] ? kasan_atomics_helper+0x49ce/0x5450 [ 63.379968] kasan_report+0x141/0x180 [ 63.379972] ? kasan_atomics_helper+0x49ce/0x5450 [ 63.379977] __asan_report_load4_noabort+0x18/0x20 [ 63.379982] kasan_atomics_helper+0x49ce/0x5450 [ 63.379986] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 63.379990] ? __kmalloc_cache_noprof+0x189/0x420 [ 63.379995] ? kasan_atomics+0x152/0x310 [ 63.380000] kasan_atomics+0x1dc/0x310 [ 63.380005] ? __pfx_kasan_atomics+0x10/0x10 [ 63.380010] ? ktime_get_ts64+0x83/0x230 [ 63.380014] kunit_try_run_case+0x1a2/0x480 [ 63.380019] ? __pfx_kunit_try_run_case+0x10/0x10 [ 63.380023] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 63.380027] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 63.380032] ? __kthread_parkme+0x82/0x180 [ 63.380036] ? preempt_count_sub+0x50/0x80 [ 63.380040] ? __pfx_kunit_try_run_case+0x10/0x10 [ 63.380045] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 63.380049] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 63.380053] kthread+0x334/0x6f0 [ 63.380057] ? trace_preempt_on+0x20/0xc0 [ 63.380061] ? __pfx_kthread+0x10/0x10 [ 63.380065] ? _raw_spin_unlock_irq+0x47/0x80 [ 63.380069] ? calculate_sigpending+0x7b/0xa0 [ 63.380074] ? __pfx_kthread+0x10/0x10 [ 63.380078] ret_from_fork+0x113/0x1d0 [ 63.380081] ? __pfx_kthread+0x10/0x10 [ 63.380085] ret_from_fork_asm+0x1a/0x30 [ 63.380091] </TASK> [ 63.380093] [ 63.559772] Allocated by task 306: [ 63.563178] kasan_save_stack+0x45/0x70 [ 63.567018] kasan_save_track+0x18/0x40 [ 63.570857] kasan_save_alloc_info+0x3b/0x50 [ 63.575129] __kasan_kmalloc+0xb7/0xc0 [ 63.578883] __kmalloc_cache_noprof+0x189/0x420 [ 63.583428] kasan_atomics+0x95/0x310 [ 63.587099] kunit_try_run_case+0x1a2/0x480 [ 63.591286] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 63.596692] kthread+0x334/0x6f0 [ 63.599925] ret_from_fork+0x113/0x1d0 [ 63.603678] ret_from_fork_asm+0x1a/0x30 [ 63.607605] [ 63.609104] The buggy address belongs to the object at ffff8881066eaf00 [ 63.609104] which belongs to the cache kmalloc-64 of size 64 [ 63.621447] The buggy address is located 0 bytes to the right of [ 63.621447] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 63.634315] [ 63.635848] The buggy address belongs to the physical page: [ 63.641426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 63.649429] flags: 0x200000000000000(node=0|zone=2) [ 63.654310] page_type: f5(slab) [ 63.657456] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 63.665195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.672935] page dumped because: kasan: bad access detected [ 63.678508] [ 63.680007] Memory state around the buggy address: [ 63.684800] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.692027] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 63.699246] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.706465] ^ [ 63.711259] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.718485] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.725706] ================================================================== [ 74.019671] ================================================================== [ 74.026908] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 74.034301] Read of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 74.041610] [ 74.043108] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 74.043115] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 74.043118] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 74.043122] Call Trace: [ 74.043124] <TASK> [ 74.043126] dump_stack_lvl+0x73/0xb0 [ 74.043130] print_report+0xd1/0x650 [ 74.043134] ? __virt_addr_valid+0x1db/0x2d0 [ 74.043138] ? kasan_atomics_helper+0x4fb2/0x5450 [ 74.043142] ? kasan_complete_mode_report_info+0x2a/0x200 [ 74.043148] ? kasan_atomics_helper+0x4fb2/0x5450 [ 74.043152] kasan_report+0x141/0x180 [ 74.043156] ? kasan_atomics_helper+0x4fb2/0x5450 [ 74.043161] __asan_report_load8_noabort+0x18/0x20 [ 74.043166] kasan_atomics_helper+0x4fb2/0x5450 [ 74.043170] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 74.043174] ? __kmalloc_cache_noprof+0x189/0x420 [ 74.043179] ? kasan_atomics+0x152/0x310 [ 74.043184] kasan_atomics+0x1dc/0x310 [ 74.043189] ? __pfx_kasan_atomics+0x10/0x10 [ 74.043194] ? ktime_get_ts64+0x83/0x230 [ 74.043198] kunit_try_run_case+0x1a2/0x480 [ 74.043203] ? __pfx_kunit_try_run_case+0x10/0x10 [ 74.043207] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 74.043212] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 74.043216] ? __kthread_parkme+0x82/0x180 [ 74.043220] ? preempt_count_sub+0x50/0x80 [ 74.043224] ? __pfx_kunit_try_run_case+0x10/0x10 [ 74.043229] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 74.043233] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 74.043237] kthread+0x334/0x6f0 [ 74.043241] ? trace_preempt_on+0x20/0xc0 [ 74.043245] ? __pfx_kthread+0x10/0x10 [ 74.043249] ? _raw_spin_unlock_irq+0x47/0x80 [ 74.043253] ? calculate_sigpending+0x7b/0xa0 [ 74.043258] ? __pfx_kthread+0x10/0x10 [ 74.043262] ret_from_fork+0x113/0x1d0 [ 74.043265] ? __pfx_kthread+0x10/0x10 [ 74.043269] ret_from_fork_asm+0x1a/0x30 [ 74.043275] </TASK> [ 74.043277] [ 74.222982] Allocated by task 306: [ 74.226416] kasan_save_stack+0x45/0x70 [ 74.230263] kasan_save_track+0x18/0x40 [ 74.234104] kasan_save_alloc_info+0x3b/0x50 [ 74.238416] __kasan_kmalloc+0xb7/0xc0 [ 74.242171] __kmalloc_cache_noprof+0x189/0x420 [ 74.246705] kasan_atomics+0x95/0x310 [ 74.250403] kunit_try_run_case+0x1a2/0x480 [ 74.254598] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 74.259997] kthread+0x334/0x6f0 [ 74.263232] ret_from_fork+0x113/0x1d0 [ 74.266984] ret_from_fork_asm+0x1a/0x30 [ 74.270910] [ 74.272421] The buggy address belongs to the object at ffff8881066eaf00 [ 74.272421] which belongs to the cache kmalloc-64 of size 64 [ 74.284758] The buggy address is located 0 bytes to the right of [ 74.284758] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 74.297620] [ 74.299120] The buggy address belongs to the physical page: [ 74.304694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 74.312701] flags: 0x200000000000000(node=0|zone=2) [ 74.317590] page_type: f5(slab) [ 74.320734] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 74.328475] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 74.336214] page dumped because: kasan: bad access detected [ 74.341786] [ 74.343285] Memory state around the buggy address: [ 74.348077] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.355297] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 74.362518] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.369744] ^ [ 74.374537] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.381758] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.388983] ================================================================== [ 59.570983] ================================================================== [ 59.578229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 59.585536] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 59.592938] [ 59.594436] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 59.594444] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 59.594447] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 59.594450] Call Trace: [ 59.594452] <TASK> [ 59.594454] dump_stack_lvl+0x73/0xb0 [ 59.594458] print_report+0xd1/0x650 [ 59.594462] ? __virt_addr_valid+0x1db/0x2d0 [ 59.594466] ? kasan_atomics_helper+0xf10/0x5450 [ 59.594470] ? kasan_complete_mode_report_info+0x2a/0x200 [ 59.594476] ? kasan_atomics_helper+0xf10/0x5450 [ 59.594480] kasan_report+0x141/0x180 [ 59.594484] ? kasan_atomics_helper+0xf10/0x5450 [ 59.594489] kasan_check_range+0x10c/0x1c0 [ 59.594493] __kasan_check_write+0x18/0x20 [ 59.594497] kasan_atomics_helper+0xf10/0x5450 [ 59.594501] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 59.594505] ? __kmalloc_cache_noprof+0x189/0x420 [ 59.594510] ? kasan_atomics+0x152/0x310 [ 59.594515] kasan_atomics+0x1dc/0x310 [ 59.594520] ? __pfx_kasan_atomics+0x10/0x10 [ 59.594525] ? ktime_get_ts64+0x83/0x230 [ 59.594529] kunit_try_run_case+0x1a2/0x480 [ 59.594534] ? __pfx_kunit_try_run_case+0x10/0x10 [ 59.594538] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 59.594543] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 59.594547] ? __kthread_parkme+0x82/0x180 [ 59.594551] ? preempt_count_sub+0x50/0x80 [ 59.594555] ? __pfx_kunit_try_run_case+0x10/0x10 [ 59.594560] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 59.594564] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 59.594569] kthread+0x334/0x6f0 [ 59.594572] ? trace_preempt_on+0x20/0xc0 [ 59.594577] ? __pfx_kthread+0x10/0x10 [ 59.594581] ? _raw_spin_unlock_irq+0x47/0x80 [ 59.594585] ? calculate_sigpending+0x7b/0xa0 [ 59.594589] ? __pfx_kthread+0x10/0x10 [ 59.594594] ret_from_fork+0x113/0x1d0 [ 59.594597] ? __pfx_kthread+0x10/0x10 [ 59.594601] ret_from_fork_asm+0x1a/0x30 [ 59.594607] </TASK> [ 59.594609] [ 59.777260] Allocated by task 306: [ 59.780664] kasan_save_stack+0x45/0x70 [ 59.784503] kasan_save_track+0x18/0x40 [ 59.788362] kasan_save_alloc_info+0x3b/0x50 [ 59.792685] __kasan_kmalloc+0xb7/0xc0 [ 59.796437] __kmalloc_cache_noprof+0x189/0x420 [ 59.800970] kasan_atomics+0x95/0x310 [ 59.804637] kunit_try_run_case+0x1a2/0x480 [ 59.808833] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 59.814240] kthread+0x334/0x6f0 [ 59.817481] ret_from_fork+0x113/0x1d0 [ 59.821234] ret_from_fork_asm+0x1a/0x30 [ 59.825160] [ 59.826657] The buggy address belongs to the object at ffff8881066eaf00 [ 59.826657] which belongs to the cache kmalloc-64 of size 64 [ 59.838993] The buggy address is located 0 bytes to the right of [ 59.838993] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 59.851852] [ 59.853361] The buggy address belongs to the physical page: [ 59.858985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 59.866994] flags: 0x200000000000000(node=0|zone=2) [ 59.871873] page_type: f5(slab) [ 59.875018] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 59.882757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.890496] page dumped because: kasan: bad access detected [ 59.896068] [ 59.897567] Memory state around the buggy address: [ 59.902363] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.909625] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 59.916844] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.924063] ^ [ 59.928856] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.936074] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 59.943294] ================================================================== [ 55.778231] ================================================================== [ 55.785463] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 55.792770] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 55.800168] [ 55.801669] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 55.801677] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 55.801680] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 55.801683] Call Trace: [ 55.801685] <TASK> [ 55.801687] dump_stack_lvl+0x73/0xb0 [ 55.801691] print_report+0xd1/0x650 [ 55.801695] ? __virt_addr_valid+0x1db/0x2d0 [ 55.801700] ? kasan_atomics_helper+0x8f9/0x5450 [ 55.801703] ? kasan_complete_mode_report_info+0x2a/0x200 [ 55.801709] ? kasan_atomics_helper+0x8f9/0x5450 [ 55.801713] kasan_report+0x141/0x180 [ 55.801717] ? kasan_atomics_helper+0x8f9/0x5450 [ 55.801722] kasan_check_range+0x10c/0x1c0 [ 55.801727] __kasan_check_write+0x18/0x20 [ 55.801730] kasan_atomics_helper+0x8f9/0x5450 [ 55.801734] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 55.801739] ? __kmalloc_cache_noprof+0x189/0x420 [ 55.801744] ? kasan_atomics+0x152/0x310 [ 55.801749] kasan_atomics+0x1dc/0x310 [ 55.801753] ? __pfx_kasan_atomics+0x10/0x10 [ 55.801758] ? ktime_get_ts64+0x83/0x230 [ 55.801762] kunit_try_run_case+0x1a2/0x480 [ 55.801767] ? __pfx_kunit_try_run_case+0x10/0x10 [ 55.801772] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 55.801776] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 55.801780] ? __kthread_parkme+0x82/0x180 [ 55.801784] ? preempt_count_sub+0x50/0x80 [ 55.801788] ? __pfx_kunit_try_run_case+0x10/0x10 [ 55.801793] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 55.801798] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 55.801802] kthread+0x334/0x6f0 [ 55.801806] ? trace_preempt_on+0x20/0xc0 [ 55.801810] ? __pfx_kthread+0x10/0x10 [ 55.801814] ? _raw_spin_unlock_irq+0x47/0x80 [ 55.801818] ? calculate_sigpending+0x7b/0xa0 [ 55.801823] ? __pfx_kthread+0x10/0x10 [ 55.801827] ret_from_fork+0x113/0x1d0 [ 55.801830] ? __pfx_kthread+0x10/0x10 [ 55.801834] ret_from_fork_asm+0x1a/0x30 [ 55.801840] </TASK> [ 55.801842] [ 55.984481] Allocated by task 306: [ 55.987888] kasan_save_stack+0x45/0x70 [ 55.991728] kasan_save_track+0x18/0x40 [ 55.995566] kasan_save_alloc_info+0x3b/0x50 [ 55.999841] __kasan_kmalloc+0xb7/0xc0 [ 56.003592] __kmalloc_cache_noprof+0x189/0x420 [ 56.008124] kasan_atomics+0x95/0x310 [ 56.011791] kunit_try_run_case+0x1a2/0x480 [ 56.015977] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 56.021420] kthread+0x334/0x6f0 [ 56.024654] ret_from_fork+0x113/0x1d0 [ 56.028417] ret_from_fork_asm+0x1a/0x30 [ 56.032365] [ 56.033908] The buggy address belongs to the object at ffff8881066eaf00 [ 56.033908] which belongs to the cache kmalloc-64 of size 64 [ 56.046251] The buggy address is located 0 bytes to the right of [ 56.046251] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 56.059112] [ 56.060610] The buggy address belongs to the physical page: [ 56.066184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 56.074191] flags: 0x200000000000000(node=0|zone=2) [ 56.079072] page_type: f5(slab) [ 56.082217] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 56.089966] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.097711] page dumped because: kasan: bad access detected [ 56.103283] [ 56.104784] Memory state around the buggy address: [ 56.109576] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.116796] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 56.124017] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.131233] ^ [ 56.136029] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.143246] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 56.150464] ================================================================== [ 66.006221] ================================================================== [ 66.013460] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 66.020854] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 66.028253] [ 66.029754] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 66.029762] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 66.029765] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 66.029769] Call Trace: [ 66.029770] <TASK> [ 66.029772] dump_stack_lvl+0x73/0xb0 [ 66.029777] print_report+0xd1/0x650 [ 66.029781] ? __virt_addr_valid+0x1db/0x2d0 [ 66.029785] ? kasan_atomics_helper+0x164f/0x5450 [ 66.029789] ? kasan_complete_mode_report_info+0x2a/0x200 [ 66.029794] ? kasan_atomics_helper+0x164f/0x5450 [ 66.029798] kasan_report+0x141/0x180 [ 66.029802] ? kasan_atomics_helper+0x164f/0x5450 [ 66.029807] kasan_check_range+0x10c/0x1c0 [ 66.029812] __kasan_check_write+0x18/0x20 [ 66.029816] kasan_atomics_helper+0x164f/0x5450 [ 66.029820] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 66.029824] ? __kmalloc_cache_noprof+0x189/0x420 [ 66.029829] ? kasan_atomics+0x152/0x310 [ 66.029834] kasan_atomics+0x1dc/0x310 [ 66.029839] ? __pfx_kasan_atomics+0x10/0x10 [ 66.029844] ? ktime_get_ts64+0x83/0x230 [ 66.029848] kunit_try_run_case+0x1a2/0x480 [ 66.029853] ? __pfx_kunit_try_run_case+0x10/0x10 [ 66.029857] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 66.029862] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 66.029866] ? __kthread_parkme+0x82/0x180 [ 66.029870] ? preempt_count_sub+0x50/0x80 [ 66.029874] ? __pfx_kunit_try_run_case+0x10/0x10 [ 66.029879] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 66.029884] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 66.029888] kthread+0x334/0x6f0 [ 66.029892] ? trace_preempt_on+0x20/0xc0 [ 66.029896] ? __pfx_kthread+0x10/0x10 [ 66.029900] ? _raw_spin_unlock_irq+0x47/0x80 [ 66.029904] ? calculate_sigpending+0x7b/0xa0 [ 66.029909] ? __pfx_kthread+0x10/0x10 [ 66.029913] ret_from_fork+0x113/0x1d0 [ 66.029916] ? __pfx_kthread+0x10/0x10 [ 66.029920] ret_from_fork_asm+0x1a/0x30 [ 66.029926] </TASK> [ 66.029928] [ 66.213060] Allocated by task 306: [ 66.216467] kasan_save_stack+0x45/0x70 [ 66.220308] kasan_save_track+0x18/0x40 [ 66.224147] kasan_save_alloc_info+0x3b/0x50 [ 66.228428] __kasan_kmalloc+0xb7/0xc0 [ 66.232180] __kmalloc_cache_noprof+0x189/0x420 [ 66.236714] kasan_atomics+0x95/0x310 [ 66.240415] kunit_try_run_case+0x1a2/0x480 [ 66.244607] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 66.250008] kthread+0x334/0x6f0 [ 66.253249] ret_from_fork+0x113/0x1d0 [ 66.257000] ret_from_fork_asm+0x1a/0x30 [ 66.260928] [ 66.262426] The buggy address belongs to the object at ffff8881066eaf00 [ 66.262426] which belongs to the cache kmalloc-64 of size 64 [ 66.274768] The buggy address is located 0 bytes to the right of [ 66.274768] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 66.287630] [ 66.289127] The buggy address belongs to the physical page: [ 66.294702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 66.302708] flags: 0x200000000000000(node=0|zone=2) [ 66.307589] page_type: f5(slab) [ 66.310736] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 66.318482] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.326221] page dumped because: kasan: bad access detected [ 66.331793] [ 66.333292] Memory state around the buggy address: [ 66.338086] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.345306] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 66.352525] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.359745] ^ [ 66.364538] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.371757] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.378975] ================================================================== [ 52.744576] ================================================================== [ 52.751822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 52.759129] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 52.766528] [ 52.768029] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 52.768037] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 52.768040] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 52.768043] Call Trace: [ 52.768045] <TASK> [ 52.768047] dump_stack_lvl+0x73/0xb0 [ 52.768052] print_report+0xd1/0x650 [ 52.768056] ? __virt_addr_valid+0x1db/0x2d0 [ 52.768060] ? kasan_atomics_helper+0x4a0/0x5450 [ 52.768064] ? kasan_complete_mode_report_info+0x2a/0x200 [ 52.768069] ? kasan_atomics_helper+0x4a0/0x5450 [ 52.768073] kasan_report+0x141/0x180 [ 52.768078] ? kasan_atomics_helper+0x4a0/0x5450 [ 52.768082] kasan_check_range+0x10c/0x1c0 [ 52.768087] __kasan_check_write+0x18/0x20 [ 52.768091] kasan_atomics_helper+0x4a0/0x5450 [ 52.768095] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 52.768099] ? __kmalloc_cache_noprof+0x189/0x420 [ 52.768104] ? kasan_atomics+0x152/0x310 [ 52.768109] kasan_atomics+0x1dc/0x310 [ 52.768114] ? __pfx_kasan_atomics+0x10/0x10 [ 52.768118] ? ktime_get_ts64+0x83/0x230 [ 52.768123] kunit_try_run_case+0x1a2/0x480 [ 52.768128] ? __pfx_kunit_try_run_case+0x10/0x10 [ 52.768132] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 52.768136] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 52.768141] ? __kthread_parkme+0x82/0x180 [ 52.768145] ? preempt_count_sub+0x50/0x80 [ 52.768149] ? __pfx_kunit_try_run_case+0x10/0x10 [ 52.768153] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 52.768158] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 52.768162] kthread+0x334/0x6f0 [ 52.768166] ? trace_preempt_on+0x20/0xc0 [ 52.768170] ? __pfx_kthread+0x10/0x10 [ 52.768174] ? _raw_spin_unlock_irq+0x47/0x80 [ 52.768178] ? calculate_sigpending+0x7b/0xa0 [ 52.768183] ? __pfx_kthread+0x10/0x10 [ 52.768187] ret_from_fork+0x113/0x1d0 [ 52.768191] ? __pfx_kthread+0x10/0x10 [ 52.768195] ret_from_fork_asm+0x1a/0x30 [ 52.768200] </TASK> [ 52.768202] [ 52.950989] Allocated by task 306: [ 52.954418] kasan_save_stack+0x45/0x70 [ 52.958261] kasan_save_track+0x18/0x40 [ 52.962102] kasan_save_alloc_info+0x3b/0x50 [ 52.966418] __kasan_kmalloc+0xb7/0xc0 [ 52.970169] __kmalloc_cache_noprof+0x189/0x420 [ 52.974709] kasan_atomics+0x95/0x310 [ 52.978418] kunit_try_run_case+0x1a2/0x480 [ 52.982606] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 52.988006] kthread+0x334/0x6f0 [ 52.991238] ret_from_fork+0x113/0x1d0 [ 52.994990] ret_from_fork_asm+0x1a/0x30 [ 52.998917] [ 53.000416] The buggy address belongs to the object at ffff8881066eaf00 [ 53.000416] which belongs to the cache kmalloc-64 of size 64 [ 53.012757] The buggy address is located 0 bytes to the right of [ 53.012757] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 53.025620] [ 53.027117] The buggy address belongs to the physical page: [ 53.032692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 53.040698] flags: 0x200000000000000(node=0|zone=2) [ 53.045577] page_type: f5(slab) [ 53.048726] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 53.056472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.064210] page dumped because: kasan: bad access detected [ 53.069784] [ 53.071283] Memory state around the buggy address: [ 53.076075] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.083294] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 53.090515] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.097741] ^ [ 53.102536] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.109763] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 53.116981] ================================================================== [ 66.766248] ================================================================== [ 66.773487] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 66.780883] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 66.788282] [ 66.789782] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 66.789790] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 66.789793] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 66.789796] Call Trace: [ 66.789798] <TASK> [ 66.789800] dump_stack_lvl+0x73/0xb0 [ 66.789805] print_report+0xd1/0x650 [ 66.789809] ? __virt_addr_valid+0x1db/0x2d0 [ 66.789813] ? kasan_atomics_helper+0x177f/0x5450 [ 66.789817] ? kasan_complete_mode_report_info+0x2a/0x200 [ 66.789822] ? kasan_atomics_helper+0x177f/0x5450 [ 66.789826] kasan_report+0x141/0x180 [ 66.789830] ? kasan_atomics_helper+0x177f/0x5450 [ 66.789835] kasan_check_range+0x10c/0x1c0 [ 66.789840] __kasan_check_write+0x18/0x20 [ 66.789844] kasan_atomics_helper+0x177f/0x5450 [ 66.789848] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 66.789852] ? __kmalloc_cache_noprof+0x189/0x420 [ 66.789857] ? kasan_atomics+0x152/0x310 [ 66.789862] kasan_atomics+0x1dc/0x310 [ 66.789866] ? __pfx_kasan_atomics+0x10/0x10 [ 66.789871] ? ktime_get_ts64+0x83/0x230 [ 66.789876] kunit_try_run_case+0x1a2/0x480 [ 66.789880] ? __pfx_kunit_try_run_case+0x10/0x10 [ 66.789885] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 66.789889] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 66.789894] ? __kthread_parkme+0x82/0x180 [ 66.789897] ? preempt_count_sub+0x50/0x80 [ 66.789902] ? __pfx_kunit_try_run_case+0x10/0x10 [ 66.789906] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 66.789911] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 66.789915] kthread+0x334/0x6f0 [ 66.789919] ? trace_preempt_on+0x20/0xc0 [ 66.789923] ? __pfx_kthread+0x10/0x10 [ 66.789927] ? _raw_spin_unlock_irq+0x47/0x80 [ 66.789931] ? calculate_sigpending+0x7b/0xa0 [ 66.789936] ? __pfx_kthread+0x10/0x10 [ 66.789940] ret_from_fork+0x113/0x1d0 [ 66.789944] ? __pfx_kthread+0x10/0x10 [ 66.789948] ret_from_fork_asm+0x1a/0x30 [ 66.789954] </TASK> [ 66.789955] [ 66.973038] Allocated by task 306: [ 66.976443] kasan_save_stack+0x45/0x70 [ 66.980282] kasan_save_track+0x18/0x40 [ 66.984123] kasan_save_alloc_info+0x3b/0x50 [ 66.988424] __kasan_kmalloc+0xb7/0xc0 [ 66.992183] __kmalloc_cache_noprof+0x189/0x420 [ 66.996723] kasan_atomics+0x95/0x310 [ 67.000418] kunit_try_run_case+0x1a2/0x480 [ 67.004611] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 67.010020] kthread+0x334/0x6f0 [ 67.013261] ret_from_fork+0x113/0x1d0 [ 67.017012] ret_from_fork_asm+0x1a/0x30 [ 67.020939] [ 67.022438] The buggy address belongs to the object at ffff8881066eaf00 [ 67.022438] which belongs to the cache kmalloc-64 of size 64 [ 67.034778] The buggy address is located 0 bytes to the right of [ 67.034778] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 67.047641] [ 67.049141] The buggy address belongs to the physical page: [ 67.054713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 67.062712] flags: 0x200000000000000(node=0|zone=2) [ 67.067592] page_type: f5(slab) [ 67.070739] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 67.078486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.086233] page dumped because: kasan: bad access detected [ 67.091806] [ 67.093303] Memory state around the buggy address: [ 67.098099] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.105325] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 67.112570] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.119791] ^ [ 67.124584] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.131812] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 67.139037] ================================================================== [ 70.563039] ================================================================== [ 70.570288] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 70.577689] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 70.585089] [ 70.586590] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 70.586598] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 70.586600] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 70.586604] Call Trace: [ 70.586605] <TASK> [ 70.586607] dump_stack_lvl+0x73/0xb0 [ 70.586612] print_report+0xd1/0x650 [ 70.586616] ? __virt_addr_valid+0x1db/0x2d0 [ 70.586620] ? kasan_atomics_helper+0x1d7a/0x5450 [ 70.586624] ? kasan_complete_mode_report_info+0x2a/0x200 [ 70.586629] ? kasan_atomics_helper+0x1d7a/0x5450 [ 70.586633] kasan_report+0x141/0x180 [ 70.586637] ? kasan_atomics_helper+0x1d7a/0x5450 [ 70.586642] kasan_check_range+0x10c/0x1c0 [ 70.586647] __kasan_check_write+0x18/0x20 [ 70.586650] kasan_atomics_helper+0x1d7a/0x5450 [ 70.586654] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 70.586659] ? __kmalloc_cache_noprof+0x189/0x420 [ 70.586664] ? kasan_atomics+0x152/0x310 [ 70.586669] kasan_atomics+0x1dc/0x310 [ 70.586673] ? __pfx_kasan_atomics+0x10/0x10 [ 70.586678] ? ktime_get_ts64+0x83/0x230 [ 70.586682] kunit_try_run_case+0x1a2/0x480 [ 70.586687] ? __pfx_kunit_try_run_case+0x10/0x10 [ 70.586691] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 70.586696] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 70.586700] ? __kthread_parkme+0x82/0x180 [ 70.586704] ? preempt_count_sub+0x50/0x80 [ 70.586708] ? __pfx_kunit_try_run_case+0x10/0x10 [ 70.586713] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 70.586717] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 70.586722] kthread+0x334/0x6f0 [ 70.586725] ? trace_preempt_on+0x20/0xc0 [ 70.586729] ? __pfx_kthread+0x10/0x10 [ 70.586733] ? _raw_spin_unlock_irq+0x47/0x80 [ 70.586737] ? calculate_sigpending+0x7b/0xa0 [ 70.586742] ? __pfx_kthread+0x10/0x10 [ 70.586746] ret_from_fork+0x113/0x1d0 [ 70.586750] ? __pfx_kthread+0x10/0x10 [ 70.586754] ret_from_fork_asm+0x1a/0x30 [ 70.586760] </TASK> [ 70.586761] [ 70.769764] Allocated by task 306: [ 70.773172] kasan_save_stack+0x45/0x70 [ 70.777011] kasan_save_track+0x18/0x40 [ 70.780852] kasan_save_alloc_info+0x3b/0x50 [ 70.785133] __kasan_kmalloc+0xb7/0xc0 [ 70.788885] __kmalloc_cache_noprof+0x189/0x420 [ 70.793425] kasan_atomics+0x95/0x310 [ 70.797091] kunit_try_run_case+0x1a2/0x480 [ 70.801279] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 70.806686] kthread+0x334/0x6f0 [ 70.809920] ret_from_fork+0x113/0x1d0 [ 70.813672] ret_from_fork_asm+0x1a/0x30 [ 70.817597] [ 70.819096] The buggy address belongs to the object at ffff8881066eaf00 [ 70.819096] which belongs to the cache kmalloc-64 of size 64 [ 70.831437] The buggy address is located 0 bytes to the right of [ 70.831437] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 70.844299] [ 70.845798] The buggy address belongs to the physical page: [ 70.851393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 70.859430] flags: 0x200000000000000(node=0|zone=2) [ 70.864309] page_type: f5(slab) [ 70.867458] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 70.875204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.882944] page dumped because: kasan: bad access detected [ 70.888517] [ 70.890014] Memory state around the buggy address: [ 70.894808] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.902028] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 70.909247] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.916467] ^ [ 70.921259] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.928480] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 70.935707] ================================================================== [ 56.537332] ================================================================== [ 56.544590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 56.551896] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 56.559287] [ 56.560790] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 56.560798] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 56.560800] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 56.560804] Call Trace: [ 56.560805] <TASK> [ 56.560807] dump_stack_lvl+0x73/0xb0 [ 56.560812] print_report+0xd1/0x650 [ 56.560816] ? __virt_addr_valid+0x1db/0x2d0 [ 56.560820] ? kasan_atomics_helper+0xa2b/0x5450 [ 56.560824] ? kasan_complete_mode_report_info+0x2a/0x200 [ 56.560829] ? kasan_atomics_helper+0xa2b/0x5450 [ 56.560833] kasan_report+0x141/0x180 [ 56.560838] ? kasan_atomics_helper+0xa2b/0x5450 [ 56.560843] kasan_check_range+0x10c/0x1c0 [ 56.560847] __kasan_check_write+0x18/0x20 [ 56.560851] kasan_atomics_helper+0xa2b/0x5450 [ 56.560855] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 56.560859] ? __kmalloc_cache_noprof+0x189/0x420 [ 56.560864] ? kasan_atomics+0x152/0x310 [ 56.560870] kasan_atomics+0x1dc/0x310 [ 56.560874] ? __pfx_kasan_atomics+0x10/0x10 [ 56.560879] ? ktime_get_ts64+0x83/0x230 [ 56.560883] kunit_try_run_case+0x1a2/0x480 [ 56.560888] ? __pfx_kunit_try_run_case+0x10/0x10 [ 56.560892] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 56.560897] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 56.560901] ? __kthread_parkme+0x82/0x180 [ 56.560905] ? preempt_count_sub+0x50/0x80 [ 56.560910] ? __pfx_kunit_try_run_case+0x10/0x10 [ 56.560914] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 56.560919] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 56.560923] kthread+0x334/0x6f0 [ 56.560927] ? trace_preempt_on+0x20/0xc0 [ 56.560931] ? __pfx_kthread+0x10/0x10 [ 56.560935] ? _raw_spin_unlock_irq+0x47/0x80 [ 56.560939] ? calculate_sigpending+0x7b/0xa0 [ 56.560944] ? __pfx_kthread+0x10/0x10 [ 56.560948] ret_from_fork+0x113/0x1d0 [ 56.560951] ? __pfx_kthread+0x10/0x10 [ 56.560955] ret_from_fork_asm+0x1a/0x30 [ 56.560961] </TASK> [ 56.560963] [ 56.743773] Allocated by task 306: [ 56.747180] kasan_save_stack+0x45/0x70 [ 56.751020] kasan_save_track+0x18/0x40 [ 56.754861] kasan_save_alloc_info+0x3b/0x50 [ 56.759141] __kasan_kmalloc+0xb7/0xc0 [ 56.762893] __kmalloc_cache_noprof+0x189/0x420 [ 56.767428] kasan_atomics+0x95/0x310 [ 56.771099] kunit_try_run_case+0x1a2/0x480 [ 56.775288] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 56.780694] kthread+0x334/0x6f0 [ 56.783928] ret_from_fork+0x113/0x1d0 [ 56.787679] ret_from_fork_asm+0x1a/0x30 [ 56.791604] [ 56.793105] The buggy address belongs to the object at ffff8881066eaf00 [ 56.793105] which belongs to the cache kmalloc-64 of size 64 [ 56.805445] The buggy address is located 0 bytes to the right of [ 56.805445] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 56.818309] [ 56.819806] The buggy address belongs to the physical page: [ 56.825422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 56.833427] flags: 0x200000000000000(node=0|zone=2) [ 56.838309] page_type: f5(slab) [ 56.841458] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 56.849204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.856943] page dumped because: kasan: bad access detected [ 56.862515] [ 56.864016] Memory state around the buggy address: [ 56.868809] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.876026] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 56.883248] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.890475] ^ [ 56.895267] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.902488] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 56.909714] ================================================================== [ 69.806432] ================================================================== [ 69.813673] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 69.821073] Read of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 69.828423] [ 69.829922] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 69.829930] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 69.829932] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 69.829936] Call Trace: [ 69.829937] <TASK> [ 69.829939] dump_stack_lvl+0x73/0xb0 [ 69.829944] print_report+0xd1/0x650 [ 69.829948] ? __virt_addr_valid+0x1db/0x2d0 [ 69.829952] ? kasan_atomics_helper+0x4f30/0x5450 [ 69.829956] ? kasan_complete_mode_report_info+0x2a/0x200 [ 69.829962] ? kasan_atomics_helper+0x4f30/0x5450 [ 69.829966] kasan_report+0x141/0x180 [ 69.829970] ? kasan_atomics_helper+0x4f30/0x5450 [ 69.829975] __asan_report_load8_noabort+0x18/0x20 [ 69.829980] kasan_atomics_helper+0x4f30/0x5450 [ 69.829984] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 69.829988] ? __kmalloc_cache_noprof+0x189/0x420 [ 69.829993] ? kasan_atomics+0x152/0x310 [ 69.829998] kasan_atomics+0x1dc/0x310 [ 69.830002] ? __pfx_kasan_atomics+0x10/0x10 [ 69.830007] ? ktime_get_ts64+0x83/0x230 [ 69.830012] kunit_try_run_case+0x1a2/0x480 [ 69.830016] ? __pfx_kunit_try_run_case+0x10/0x10 [ 69.830021] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 69.830025] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 69.830030] ? __kthread_parkme+0x82/0x180 [ 69.830033] ? preempt_count_sub+0x50/0x80 [ 69.830038] ? __pfx_kunit_try_run_case+0x10/0x10 [ 69.830042] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 69.830047] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 69.830051] kthread+0x334/0x6f0 [ 69.830055] ? trace_preempt_on+0x20/0xc0 [ 69.830059] ? __pfx_kthread+0x10/0x10 [ 69.830063] ? _raw_spin_unlock_irq+0x47/0x80 [ 69.830067] ? calculate_sigpending+0x7b/0xa0 [ 69.830072] ? __pfx_kthread+0x10/0x10 [ 69.830076] ret_from_fork+0x113/0x1d0 [ 69.830079] ? __pfx_kthread+0x10/0x10 [ 69.830083] ret_from_fork_asm+0x1a/0x30 [ 69.830089] </TASK> [ 69.830091] [ 70.009790] Allocated by task 306: [ 70.013195] kasan_save_stack+0x45/0x70 [ 70.017034] kasan_save_track+0x18/0x40 [ 70.020873] kasan_save_alloc_info+0x3b/0x50 [ 70.025147] __kasan_kmalloc+0xb7/0xc0 [ 70.028900] __kmalloc_cache_noprof+0x189/0x420 [ 70.033442] kasan_atomics+0x95/0x310 [ 70.037114] kunit_try_run_case+0x1a2/0x480 [ 70.041302] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 70.046709] kthread+0x334/0x6f0 [ 70.049941] ret_from_fork+0x113/0x1d0 [ 70.053694] ret_from_fork_asm+0x1a/0x30 [ 70.057622] [ 70.059119] The buggy address belongs to the object at ffff8881066eaf00 [ 70.059119] which belongs to the cache kmalloc-64 of size 64 [ 70.071461] The buggy address is located 0 bytes to the right of [ 70.071461] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 70.084324] [ 70.085848] The buggy address belongs to the physical page: [ 70.091430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 70.099438] flags: 0x200000000000000(node=0|zone=2) [ 70.104317] page_type: f5(slab) [ 70.107497] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 70.115236] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.122977] page dumped because: kasan: bad access detected [ 70.128549] [ 70.130048] Memory state around the buggy address: [ 70.134842] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.142069] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 70.149297] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.156515] ^ [ 70.161307] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.168527] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 70.175745] ================================================================== [ 62.976533] ================================================================== [ 62.983772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 62.991165] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 62.998558] [ 63.000059] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 63.000067] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 63.000070] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 63.000073] Call Trace: [ 63.000075] <TASK> [ 63.000077] dump_stack_lvl+0x73/0xb0 [ 63.000081] print_report+0xd1/0x650 [ 63.000085] ? __virt_addr_valid+0x1db/0x2d0 [ 63.000089] ? kasan_atomics_helper+0x12e6/0x5450 [ 63.000093] ? kasan_complete_mode_report_info+0x2a/0x200 [ 63.000098] ? kasan_atomics_helper+0x12e6/0x5450 [ 63.000102] kasan_report+0x141/0x180 [ 63.000107] ? kasan_atomics_helper+0x12e6/0x5450 [ 63.000111] kasan_check_range+0x10c/0x1c0 [ 63.000116] __kasan_check_write+0x18/0x20 [ 63.000120] kasan_atomics_helper+0x12e6/0x5450 [ 63.000124] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 63.000128] ? __kmalloc_cache_noprof+0x189/0x420 [ 63.000133] ? kasan_atomics+0x152/0x310 [ 63.000138] kasan_atomics+0x1dc/0x310 [ 63.000142] ? __pfx_kasan_atomics+0x10/0x10 [ 63.000147] ? ktime_get_ts64+0x83/0x230 [ 63.000152] kunit_try_run_case+0x1a2/0x480 [ 63.000156] ? __pfx_kunit_try_run_case+0x10/0x10 [ 63.000161] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 63.000165] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 63.000170] ? __kthread_parkme+0x82/0x180 [ 63.000173] ? preempt_count_sub+0x50/0x80 [ 63.000178] ? __pfx_kunit_try_run_case+0x10/0x10 [ 63.000183] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 63.000187] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 63.000191] kthread+0x334/0x6f0 [ 63.000195] ? trace_preempt_on+0x20/0xc0 [ 63.000199] ? __pfx_kthread+0x10/0x10 [ 63.000203] ? _raw_spin_unlock_irq+0x47/0x80 [ 63.000207] ? calculate_sigpending+0x7b/0xa0 [ 63.000212] ? __pfx_kthread+0x10/0x10 [ 63.000216] ret_from_fork+0x113/0x1d0 [ 63.000219] ? __pfx_kthread+0x10/0x10 [ 63.000223] ret_from_fork_asm+0x1a/0x30 [ 63.000229] </TASK> [ 63.000231] [ 63.183287] Allocated by task 306: [ 63.186692] kasan_save_stack+0x45/0x70 [ 63.190533] kasan_save_track+0x18/0x40 [ 63.194415] kasan_save_alloc_info+0x3b/0x50 [ 63.198686] __kasan_kmalloc+0xb7/0xc0 [ 63.202439] __kmalloc_cache_noprof+0x189/0x420 [ 63.206971] kasan_atomics+0x95/0x310 [ 63.210638] kunit_try_run_case+0x1a2/0x480 [ 63.214825] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 63.220223] kthread+0x334/0x6f0 [ 63.223457] ret_from_fork+0x113/0x1d0 [ 63.227209] ret_from_fork_asm+0x1a/0x30 [ 63.231135] [ 63.232633] The buggy address belongs to the object at ffff8881066eaf00 [ 63.232633] which belongs to the cache kmalloc-64 of size 64 [ 63.244966] The buggy address is located 0 bytes to the right of [ 63.244966] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 63.257829] [ 63.259346] The buggy address belongs to the physical page: [ 63.264927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 63.272934] flags: 0x200000000000000(node=0|zone=2) [ 63.277813] page_type: f5(slab) [ 63.280960] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 63.288700] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.296448] page dumped because: kasan: bad access detected [ 63.302021] [ 63.303517] Memory state around the buggy address: [ 63.308311] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.315565] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 63.322784] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.330003] ^ [ 63.334798] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.342024] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.349245] ================================================================== [ 58.055675] ================================================================== [ 58.062921] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 58.070315] Read of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 58.077655] [ 58.079157] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 58.079165] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 58.079167] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 58.079171] Call Trace: [ 58.079173] <TASK> [ 58.079175] dump_stack_lvl+0x73/0xb0 [ 58.079179] print_report+0xd1/0x650 [ 58.079183] ? __virt_addr_valid+0x1db/0x2d0 [ 58.079187] ? kasan_atomics_helper+0x4a84/0x5450 [ 58.079191] ? kasan_complete_mode_report_info+0x2a/0x200 [ 58.079197] ? kasan_atomics_helper+0x4a84/0x5450 [ 58.079201] kasan_report+0x141/0x180 [ 58.079205] ? kasan_atomics_helper+0x4a84/0x5450 [ 58.079210] __asan_report_load4_noabort+0x18/0x20 [ 58.079215] kasan_atomics_helper+0x4a84/0x5450 [ 58.079219] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 58.079223] ? __kmalloc_cache_noprof+0x189/0x420 [ 58.079228] ? kasan_atomics+0x152/0x310 [ 58.079233] kasan_atomics+0x1dc/0x310 [ 58.079238] ? __pfx_kasan_atomics+0x10/0x10 [ 58.079242] ? ktime_get_ts64+0x83/0x230 [ 58.079247] kunit_try_run_case+0x1a2/0x480 [ 58.079252] ? __pfx_kunit_try_run_case+0x10/0x10 [ 58.079256] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 58.079261] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 58.079265] ? __kthread_parkme+0x82/0x180 [ 58.079269] ? preempt_count_sub+0x50/0x80 [ 58.079273] ? __pfx_kunit_try_run_case+0x10/0x10 [ 58.079278] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 58.079282] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 58.079286] kthread+0x334/0x6f0 [ 58.079290] ? trace_preempt_on+0x20/0xc0 [ 58.079294] ? __pfx_kthread+0x10/0x10 [ 58.079298] ? _raw_spin_unlock_irq+0x47/0x80 [ 58.079302] ? calculate_sigpending+0x7b/0xa0 [ 58.079307] ? __pfx_kthread+0x10/0x10 [ 58.079311] ret_from_fork+0x113/0x1d0 [ 58.079315] ? __pfx_kthread+0x10/0x10 [ 58.079319] ret_from_fork_asm+0x1a/0x30 [ 58.079325] </TASK> [ 58.079346] [ 58.259047] Allocated by task 306: [ 58.262453] kasan_save_stack+0x45/0x70 [ 58.266294] kasan_save_track+0x18/0x40 [ 58.270132] kasan_save_alloc_info+0x3b/0x50 [ 58.274422] __kasan_kmalloc+0xb7/0xc0 [ 58.278173] __kmalloc_cache_noprof+0x189/0x420 [ 58.282709] kasan_atomics+0x95/0x310 [ 58.286416] kunit_try_run_case+0x1a2/0x480 [ 58.290603] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 58.296003] kthread+0x334/0x6f0 [ 58.299235] ret_from_fork+0x113/0x1d0 [ 58.302988] ret_from_fork_asm+0x1a/0x30 [ 58.306921] [ 58.308427] The buggy address belongs to the object at ffff8881066eaf00 [ 58.308427] which belongs to the cache kmalloc-64 of size 64 [ 58.320762] The buggy address is located 0 bytes to the right of [ 58.320762] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 58.333624] [ 58.335124] The buggy address belongs to the physical page: [ 58.340697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 58.348703] flags: 0x200000000000000(node=0|zone=2) [ 58.353583] page_type: f5(slab) [ 58.356730] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 58.364477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.372216] page dumped because: kasan: bad access detected [ 58.377787] [ 58.379290] Memory state around the buggy address: [ 58.384083] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.391310] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 58.398529] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.405747] ^ [ 58.410540] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.417759] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 58.424977] ================================================================== [ 65.626199] ================================================================== [ 65.633445] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 65.640840] Write of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 65.648239] [ 65.649740] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 65.649748] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 65.649751] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 65.649754] Call Trace: [ 65.649756] <TASK> [ 65.649758] dump_stack_lvl+0x73/0xb0 [ 65.649763] print_report+0xd1/0x650 [ 65.649767] ? __virt_addr_valid+0x1db/0x2d0 [ 65.649771] ? kasan_atomics_helper+0x15b6/0x5450 [ 65.649775] ? kasan_complete_mode_report_info+0x2a/0x200 [ 65.649780] ? kasan_atomics_helper+0x15b6/0x5450 [ 65.649784] kasan_report+0x141/0x180 [ 65.649788] ? kasan_atomics_helper+0x15b6/0x5450 [ 65.649793] kasan_check_range+0x10c/0x1c0 [ 65.649798] __kasan_check_write+0x18/0x20 [ 65.649802] kasan_atomics_helper+0x15b6/0x5450 [ 65.649806] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 65.649810] ? __kmalloc_cache_noprof+0x189/0x420 [ 65.649815] ? kasan_atomics+0x152/0x310 [ 65.649820] kasan_atomics+0x1dc/0x310 [ 65.649825] ? __pfx_kasan_atomics+0x10/0x10 [ 65.649829] ? ktime_get_ts64+0x83/0x230 [ 65.649834] kunit_try_run_case+0x1a2/0x480 [ 65.649839] ? __pfx_kunit_try_run_case+0x10/0x10 [ 65.649843] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 65.649847] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 65.649852] ? __kthread_parkme+0x82/0x180 [ 65.649855] ? preempt_count_sub+0x50/0x80 [ 65.649860] ? __pfx_kunit_try_run_case+0x10/0x10 [ 65.649865] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 65.649869] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 65.649873] kthread+0x334/0x6f0 [ 65.649877] ? trace_preempt_on+0x20/0xc0 [ 65.649881] ? __pfx_kthread+0x10/0x10 [ 65.649885] ? _raw_spin_unlock_irq+0x47/0x80 [ 65.649889] ? calculate_sigpending+0x7b/0xa0 [ 65.649894] ? __pfx_kthread+0x10/0x10 [ 65.649898] ret_from_fork+0x113/0x1d0 [ 65.649901] ? __pfx_kthread+0x10/0x10 [ 65.649905] ret_from_fork_asm+0x1a/0x30 [ 65.649911] </TASK> [ 65.649913] [ 65.833065] Allocated by task 306: [ 65.836469] kasan_save_stack+0x45/0x70 [ 65.840309] kasan_save_track+0x18/0x40 [ 65.844148] kasan_save_alloc_info+0x3b/0x50 [ 65.848423] __kasan_kmalloc+0xb7/0xc0 [ 65.852173] __kmalloc_cache_noprof+0x189/0x420 [ 65.856706] kasan_atomics+0x95/0x310 [ 65.860418] kunit_try_run_case+0x1a2/0x480 [ 65.864610] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 65.870010] kthread+0x334/0x6f0 [ 65.873242] ret_from_fork+0x113/0x1d0 [ 65.876995] ret_from_fork_asm+0x1a/0x30 [ 65.880920] [ 65.882421] The buggy address belongs to the object at ffff8881066eaf00 [ 65.882421] which belongs to the cache kmalloc-64 of size 64 [ 65.894762] The buggy address is located 0 bytes to the right of [ 65.894762] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 65.907623] [ 65.909121] The buggy address belongs to the physical page: [ 65.914697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 65.922703] flags: 0x200000000000000(node=0|zone=2) [ 65.927583] page_type: f5(slab) [ 65.930730] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 65.938478] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.946226] page dumped because: kasan: bad access detected [ 65.951797] [ 65.953297] Memory state around the buggy address: [ 65.958089] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.965310] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 65.972527] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.979747] ^ [ 65.984542] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.991769] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.998996] ================================================================== [ 57.296573] ================================================================== [ 57.303822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 57.311134] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 57.318529] [ 57.320029] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 57.320037] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 57.320040] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 57.320044] Call Trace: [ 57.320046] <TASK> [ 57.320047] dump_stack_lvl+0x73/0xb0 [ 57.320052] print_report+0xd1/0x650 [ 57.320056] ? __virt_addr_valid+0x1db/0x2d0 [ 57.320060] ? kasan_atomics_helper+0xb6a/0x5450 [ 57.320064] ? kasan_complete_mode_report_info+0x2a/0x200 [ 57.320070] ? kasan_atomics_helper+0xb6a/0x5450 [ 57.320074] kasan_report+0x141/0x180 [ 57.320078] ? kasan_atomics_helper+0xb6a/0x5450 [ 57.320083] kasan_check_range+0x10c/0x1c0 [ 57.320087] __kasan_check_write+0x18/0x20 [ 57.320091] kasan_atomics_helper+0xb6a/0x5450 [ 57.320095] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 57.320099] ? __kmalloc_cache_noprof+0x189/0x420 [ 57.320104] ? kasan_atomics+0x152/0x310 [ 57.320109] kasan_atomics+0x1dc/0x310 [ 57.320114] ? __pfx_kasan_atomics+0x10/0x10 [ 57.320119] ? ktime_get_ts64+0x83/0x230 [ 57.320123] kunit_try_run_case+0x1a2/0x480 [ 57.320128] ? __pfx_kunit_try_run_case+0x10/0x10 [ 57.320132] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 57.320137] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 57.320141] ? __kthread_parkme+0x82/0x180 [ 57.320145] ? preempt_count_sub+0x50/0x80 [ 57.320149] ? __pfx_kunit_try_run_case+0x10/0x10 [ 57.320153] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 57.320158] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 57.320162] kthread+0x334/0x6f0 [ 57.320166] ? trace_preempt_on+0x20/0xc0 [ 57.320170] ? __pfx_kthread+0x10/0x10 [ 57.320174] ? _raw_spin_unlock_irq+0x47/0x80 [ 57.320178] ? calculate_sigpending+0x7b/0xa0 [ 57.320183] ? __pfx_kthread+0x10/0x10 [ 57.320187] ret_from_fork+0x113/0x1d0 [ 57.320190] ? __pfx_kthread+0x10/0x10 [ 57.320194] ret_from_fork_asm+0x1a/0x30 [ 57.320200] </TASK> [ 57.320202] [ 57.502955] Allocated by task 306: [ 57.506376] kasan_save_stack+0x45/0x70 [ 57.510244] kasan_save_track+0x18/0x40 [ 57.514080] kasan_save_alloc_info+0x3b/0x50 [ 57.518361] __kasan_kmalloc+0xb7/0xc0 [ 57.522157] __kmalloc_cache_noprof+0x189/0x420 [ 57.526690] kasan_atomics+0x95/0x310 [ 57.530361] kunit_try_run_case+0x1a2/0x480 [ 57.534595] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 57.539995] kthread+0x334/0x6f0 [ 57.543227] ret_from_fork+0x113/0x1d0 [ 57.546981] ret_from_fork_asm+0x1a/0x30 [ 57.550905] [ 57.552420] The buggy address belongs to the object at ffff8881066eaf00 [ 57.552420] which belongs to the cache kmalloc-64 of size 64 [ 57.564755] The buggy address is located 0 bytes to the right of [ 57.564755] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 57.577616] [ 57.579117] The buggy address belongs to the physical page: [ 57.584688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 57.592688] flags: 0x200000000000000(node=0|zone=2) [ 57.597569] page_type: f5(slab) [ 57.600713] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 57.608454] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.616190] page dumped because: kasan: bad access detected [ 57.621765] [ 57.623263] Memory state around the buggy address: [ 57.628056] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.635278] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 57.642504] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.649724] ^ [ 57.654517] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.661744] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 57.668963] ================================================================== [ 56.157694] ================================================================== [ 56.164938] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 56.172246] Write of size 4 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 56.179647] [ 56.181146] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 56.181154] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 56.181156] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 56.181160] Call Trace: [ 56.181162] <TASK> [ 56.181163] dump_stack_lvl+0x73/0xb0 [ 56.181168] print_report+0xd1/0x650 [ 56.181172] ? __virt_addr_valid+0x1db/0x2d0 [ 56.181176] ? kasan_atomics_helper+0x992/0x5450 [ 56.181180] ? kasan_complete_mode_report_info+0x2a/0x200 [ 56.181186] ? kasan_atomics_helper+0x992/0x5450 [ 56.181190] kasan_report+0x141/0x180 [ 56.181194] ? kasan_atomics_helper+0x992/0x5450 [ 56.181199] kasan_check_range+0x10c/0x1c0 [ 56.181203] __kasan_check_write+0x18/0x20 [ 56.181207] kasan_atomics_helper+0x992/0x5450 [ 56.181211] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 56.181215] ? __kmalloc_cache_noprof+0x189/0x420 [ 56.181220] ? kasan_atomics+0x152/0x310 [ 56.181225] kasan_atomics+0x1dc/0x310 [ 56.181230] ? __pfx_kasan_atomics+0x10/0x10 [ 56.181235] ? ktime_get_ts64+0x83/0x230 [ 56.181239] kunit_try_run_case+0x1a2/0x480 [ 56.181244] ? __pfx_kunit_try_run_case+0x10/0x10 [ 56.181248] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 56.181253] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 56.181257] ? __kthread_parkme+0x82/0x180 [ 56.181261] ? preempt_count_sub+0x50/0x80 [ 56.181265] ? __pfx_kunit_try_run_case+0x10/0x10 [ 56.181270] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 56.181274] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 56.181279] kthread+0x334/0x6f0 [ 56.181282] ? trace_preempt_on+0x20/0xc0 [ 56.181286] ? __pfx_kthread+0x10/0x10 [ 56.181290] ? _raw_spin_unlock_irq+0x47/0x80 [ 56.181294] ? calculate_sigpending+0x7b/0xa0 [ 56.181299] ? __pfx_kthread+0x10/0x10 [ 56.181303] ret_from_fork+0x113/0x1d0 [ 56.181307] ? __pfx_kthread+0x10/0x10 [ 56.181311] ret_from_fork_asm+0x1a/0x30 [ 56.181316] </TASK> [ 56.181318] [ 56.364088] Allocated by task 306: [ 56.367494] kasan_save_stack+0x45/0x70 [ 56.371367] kasan_save_track+0x18/0x40 [ 56.375233] kasan_save_alloc_info+0x3b/0x50 [ 56.379507] __kasan_kmalloc+0xb7/0xc0 [ 56.383259] __kmalloc_cache_noprof+0x189/0x420 [ 56.387792] kasan_atomics+0x95/0x310 [ 56.391460] kunit_try_run_case+0x1a2/0x480 [ 56.395652] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 56.401053] kthread+0x334/0x6f0 [ 56.404286] ret_from_fork+0x113/0x1d0 [ 56.408038] ret_from_fork_asm+0x1a/0x30 [ 56.411963] [ 56.413463] The buggy address belongs to the object at ffff8881066eaf00 [ 56.413463] which belongs to the cache kmalloc-64 of size 64 [ 56.425804] The buggy address is located 0 bytes to the right of [ 56.425804] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 56.438667] [ 56.440166] The buggy address belongs to the physical page: [ 56.445738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 56.453746] flags: 0x200000000000000(node=0|zone=2) [ 56.458624] page_type: f5(slab) [ 56.461772] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 56.469513] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 56.477258] page dumped because: kasan: bad access detected [ 56.482831] [ 56.484362] Memory state around the buggy address: [ 56.489184] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 56.496419] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 56.503639] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 56.510858] ^ [ 56.515652] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.522872] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 56.530089] ================================================================== [ 64.112856] ================================================================== [ 64.120097] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 64.127491] Read of size 8 at addr ffff8881066eaf30 by task kunit_try_catch/306 [ 64.134803] [ 64.136306] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 64.136314] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 64.136317] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 64.136320] Call Trace: [ 64.136322] <TASK> [ 64.136324] dump_stack_lvl+0x73/0xb0 [ 64.136348] print_report+0xd1/0x650 [ 64.136352] ? __virt_addr_valid+0x1db/0x2d0 [ 64.136357] ? kasan_atomics_helper+0x4eae/0x5450 [ 64.136361] ? kasan_complete_mode_report_info+0x2a/0x200 [ 64.136367] ? kasan_atomics_helper+0x4eae/0x5450 [ 64.136383] kasan_report+0x141/0x180 [ 64.136388] ? kasan_atomics_helper+0x4eae/0x5450 [ 64.136405] __asan_report_load8_noabort+0x18/0x20 [ 64.136410] kasan_atomics_helper+0x4eae/0x5450 [ 64.136414] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 64.136419] ? __kmalloc_cache_noprof+0x189/0x420 [ 64.136423] ? kasan_atomics+0x152/0x310 [ 64.136429] kasan_atomics+0x1dc/0x310 [ 64.136433] ? __pfx_kasan_atomics+0x10/0x10 [ 64.136438] ? ktime_get_ts64+0x83/0x230 [ 64.136442] kunit_try_run_case+0x1a2/0x480 [ 64.136447] ? __pfx_kunit_try_run_case+0x10/0x10 [ 64.136451] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 64.136456] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 64.136460] ? __kthread_parkme+0x82/0x180 [ 64.136464] ? preempt_count_sub+0x50/0x80 [ 64.136468] ? __pfx_kunit_try_run_case+0x10/0x10 [ 64.136473] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 64.136477] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 64.136482] kthread+0x334/0x6f0 [ 64.136485] ? trace_preempt_on+0x20/0xc0 [ 64.136490] ? __pfx_kthread+0x10/0x10 [ 64.136494] ? _raw_spin_unlock_irq+0x47/0x80 [ 64.136498] ? calculate_sigpending+0x7b/0xa0 [ 64.136502] ? __pfx_kthread+0x10/0x10 [ 64.136506] ret_from_fork+0x113/0x1d0 [ 64.136510] ? __pfx_kthread+0x10/0x10 [ 64.136514] ret_from_fork_asm+0x1a/0x30 [ 64.136520] </TASK> [ 64.136521] [ 64.316214] Allocated by task 306: [ 64.319621] kasan_save_stack+0x45/0x70 [ 64.323468] kasan_save_track+0x18/0x40 [ 64.327306] kasan_save_alloc_info+0x3b/0x50 [ 64.331581] __kasan_kmalloc+0xb7/0xc0 [ 64.335361] __kmalloc_cache_noprof+0x189/0x420 [ 64.339918] kasan_atomics+0x95/0x310 [ 64.343591] kunit_try_run_case+0x1a2/0x480 [ 64.347777] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 64.353178] kthread+0x334/0x6f0 [ 64.356419] ret_from_fork+0x113/0x1d0 [ 64.360171] ret_from_fork_asm+0x1a/0x30 [ 64.364097] [ 64.365597] The buggy address belongs to the object at ffff8881066eaf00 [ 64.365597] which belongs to the cache kmalloc-64 of size 64 [ 64.377938] The buggy address is located 0 bytes to the right of [ 64.377938] allocated 48-byte region [ffff8881066eaf00, ffff8881066eaf30) [ 64.390800] [ 64.392300] The buggy address belongs to the physical page: [ 64.397871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 64.405870] flags: 0x200000000000000(node=0|zone=2) [ 64.410749] page_type: f5(slab) [ 64.413895] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 64.421635] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.429410] page dumped because: kasan: bad access detected [ 64.434990] [ 64.436489] Memory state around the buggy address: [ 64.441282] ffff8881066eae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.448502] ffff8881066eae80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 64.455722] >ffff8881066eaf00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.462941] ^ [ 64.467731] ffff8881066eaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.474953] ffff8881066eb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.482171] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 47.304860] ================================================================== [ 47.312100] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 47.321052] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302 [ 47.328445] [ 47.329946] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 47.329953] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 47.329956] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 47.329959] Call Trace: [ 47.329960] <TASK> [ 47.329962] dump_stack_lvl+0x73/0xb0 [ 47.329966] print_report+0xd1/0x650 [ 47.329970] ? __virt_addr_valid+0x1db/0x2d0 [ 47.329974] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 47.329979] ? kasan_complete_mode_report_info+0x2a/0x200 [ 47.329984] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 47.329990] kasan_report+0x141/0x180 [ 47.329994] ? kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 47.330000] kasan_check_range+0x10c/0x1c0 [ 47.330004] __kasan_check_write+0x18/0x20 [ 47.330008] kasan_bitops_test_and_modify.constprop.0+0x1a0/0xd90 [ 47.330013] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 47.330018] ? __kmalloc_cache_noprof+0x189/0x420 [ 47.330023] ? trace_hardirqs_on+0x37/0xe0 [ 47.330027] ? kasan_bitops_generic+0x92/0x1c0 [ 47.330032] kasan_bitops_generic+0x121/0x1c0 [ 47.330036] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 47.330041] ? ktime_get_ts64+0x83/0x230 [ 47.330045] kunit_try_run_case+0x1a2/0x480 [ 47.330050] ? __pfx_kunit_try_run_case+0x10/0x10 [ 47.330054] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 47.330058] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 47.330062] ? __kthread_parkme+0x82/0x180 [ 47.330066] ? preempt_count_sub+0x50/0x80 [ 47.330070] ? __pfx_kunit_try_run_case+0x10/0x10 [ 47.330074] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 47.330078] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 47.330083] kthread+0x334/0x6f0 [ 47.330086] ? trace_preempt_on+0x20/0xc0 [ 47.330090] ? __pfx_kthread+0x10/0x10 [ 47.330094] ? _raw_spin_unlock_irq+0x47/0x80 [ 47.330097] ? calculate_sigpending+0x7b/0xa0 [ 47.330102] ? __pfx_kthread+0x10/0x10 [ 47.330106] ret_from_fork+0x113/0x1d0 [ 47.330109] ? __pfx_kthread+0x10/0x10 [ 47.330113] ret_from_fork_asm+0x1a/0x30 [ 47.330119] </TASK> [ 47.330120] [ 47.526904] Allocated by task 302: [ 47.530308] kasan_save_stack+0x45/0x70 [ 47.534149] kasan_save_track+0x18/0x40 [ 47.537986] kasan_save_alloc_info+0x3b/0x50 [ 47.542259] __kasan_kmalloc+0xb7/0xc0 [ 47.546014] __kmalloc_cache_noprof+0x189/0x420 [ 47.550553] kasan_bitops_generic+0x92/0x1c0 [ 47.554827] kunit_try_run_case+0x1a2/0x480 [ 47.559013] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 47.564411] kthread+0x334/0x6f0 [ 47.567646] ret_from_fork+0x113/0x1d0 [ 47.571409] ret_from_fork_asm+0x1a/0x30 [ 47.575366] [ 47.576867] The buggy address belongs to the object at ffff8881067131a0 [ 47.576867] which belongs to the cache kmalloc-16 of size 16 [ 47.589208] The buggy address is located 8 bytes inside of [ 47.589208] allocated 9-byte region [ffff8881067131a0, ffff8881067131a9) [ 47.601462] [ 47.602963] The buggy address belongs to the physical page: [ 47.608534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713 [ 47.616534] flags: 0x200000000000000(node=0|zone=2) [ 47.621413] page_type: f5(slab) [ 47.624561] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 47.632309] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 47.640054] page dumped because: kasan: bad access detected [ 47.645626] [ 47.647117] Memory state around the buggy address: [ 47.651911] ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 47.659130] ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 47.666363] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 47.673585] ^ [ 47.678120] ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.685366] ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.692608] ================================================================== [ 48.094842] ================================================================== [ 48.102080] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 48.111035] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302 [ 48.118426] [ 48.119928] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 48.119936] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 48.119939] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 48.119942] Call Trace: [ 48.119943] <TASK> [ 48.119945] dump_stack_lvl+0x73/0xb0 [ 48.119949] print_report+0xd1/0x650 [ 48.119953] ? __virt_addr_valid+0x1db/0x2d0 [ 48.119957] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 48.119963] ? kasan_complete_mode_report_info+0x2a/0x200 [ 48.119968] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 48.119973] kasan_report+0x141/0x180 [ 48.119977] ? kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 48.119983] kasan_check_range+0x10c/0x1c0 [ 48.119988] __kasan_check_write+0x18/0x20 [ 48.119992] kasan_bitops_test_and_modify.constprop.0+0x2dd/0xd90 [ 48.119997] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 48.120003] ? __kmalloc_cache_noprof+0x189/0x420 [ 48.120007] ? trace_hardirqs_on+0x37/0xe0 [ 48.120011] ? kasan_bitops_generic+0x92/0x1c0 [ 48.120016] kasan_bitops_generic+0x121/0x1c0 [ 48.120020] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 48.120025] ? ktime_get_ts64+0x83/0x230 [ 48.120030] kunit_try_run_case+0x1a2/0x480 [ 48.120034] ? __pfx_kunit_try_run_case+0x10/0x10 [ 48.120038] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 48.120042] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 48.120047] ? __kthread_parkme+0x82/0x180 [ 48.120050] ? preempt_count_sub+0x50/0x80 [ 48.120054] ? __pfx_kunit_try_run_case+0x10/0x10 [ 48.120059] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 48.120063] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 48.120067] kthread+0x334/0x6f0 [ 48.120070] ? trace_preempt_on+0x20/0xc0 [ 48.120074] ? __pfx_kthread+0x10/0x10 [ 48.120078] ? _raw_spin_unlock_irq+0x47/0x80 [ 48.120082] ? calculate_sigpending+0x7b/0xa0 [ 48.120086] ? __pfx_kthread+0x10/0x10 [ 48.120090] ret_from_fork+0x113/0x1d0 [ 48.120093] ? __pfx_kthread+0x10/0x10 [ 48.120097] ret_from_fork_asm+0x1a/0x30 [ 48.120103] </TASK> [ 48.120104] [ 48.316909] Allocated by task 302: [ 48.320314] kasan_save_stack+0x45/0x70 [ 48.324154] kasan_save_track+0x18/0x40 [ 48.327993] kasan_save_alloc_info+0x3b/0x50 [ 48.332268] __kasan_kmalloc+0xb7/0xc0 [ 48.336019] __kmalloc_cache_noprof+0x189/0x420 [ 48.340552] kasan_bitops_generic+0x92/0x1c0 [ 48.344825] kunit_try_run_case+0x1a2/0x480 [ 48.349009] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 48.354420] kthread+0x334/0x6f0 [ 48.357651] ret_from_fork+0x113/0x1d0 [ 48.361404] ret_from_fork_asm+0x1a/0x30 [ 48.365348] [ 48.366856] The buggy address belongs to the object at ffff8881067131a0 [ 48.366856] which belongs to the cache kmalloc-16 of size 16 [ 48.379198] The buggy address is located 8 bytes inside of [ 48.379198] allocated 9-byte region [ffff8881067131a0, ffff8881067131a9) [ 48.391452] [ 48.392950] The buggy address belongs to the physical page: [ 48.398524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713 [ 48.406530] flags: 0x200000000000000(node=0|zone=2) [ 48.411412] page_type: f5(slab) [ 48.414557] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 48.422305] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 48.430043] page dumped because: kasan: bad access detected [ 48.435616] [ 48.437116] Memory state around the buggy address: [ 48.441909] ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 48.449129] ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 48.456366] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 48.463610] ^ [ 48.468143] ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.475365] ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.482588] ================================================================== [ 46.909854] ================================================================== [ 46.917092] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 46.926045] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302 [ 46.933440] [ 46.934937] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 46.934945] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 46.934948] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 46.934951] Call Trace: [ 46.934953] <TASK> [ 46.934954] dump_stack_lvl+0x73/0xb0 [ 46.934959] print_report+0xd1/0x650 [ 46.934963] ? __virt_addr_valid+0x1db/0x2d0 [ 46.934966] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 46.934972] ? kasan_complete_mode_report_info+0x2a/0x200 [ 46.934977] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 46.934982] kasan_report+0x141/0x180 [ 46.934986] ? kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 46.934993] kasan_check_range+0x10c/0x1c0 [ 46.934997] __kasan_check_write+0x18/0x20 [ 46.935000] kasan_bitops_test_and_modify.constprop.0+0x101/0xd90 [ 46.935006] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 46.935011] ? __kmalloc_cache_noprof+0x189/0x420 [ 46.935016] ? trace_hardirqs_on+0x37/0xe0 [ 46.935020] ? kasan_bitops_generic+0x92/0x1c0 [ 46.935025] kasan_bitops_generic+0x121/0x1c0 [ 46.935029] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 46.935034] ? ktime_get_ts64+0x83/0x230 [ 46.935038] kunit_try_run_case+0x1a2/0x480 [ 46.935042] ? __pfx_kunit_try_run_case+0x10/0x10 [ 46.935047] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 46.935051] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 46.935055] ? __kthread_parkme+0x82/0x180 [ 46.935059] ? preempt_count_sub+0x50/0x80 [ 46.935063] ? __pfx_kunit_try_run_case+0x10/0x10 [ 46.935067] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 46.935071] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 46.935075] kthread+0x334/0x6f0 [ 46.935079] ? trace_preempt_on+0x20/0xc0 [ 46.935083] ? __pfx_kthread+0x10/0x10 [ 46.935087] ? _raw_spin_unlock_irq+0x47/0x80 [ 46.935090] ? calculate_sigpending+0x7b/0xa0 [ 46.935095] ? __pfx_kthread+0x10/0x10 [ 46.935099] ret_from_fork+0x113/0x1d0 [ 46.935102] ? __pfx_kthread+0x10/0x10 [ 46.935106] ret_from_fork_asm+0x1a/0x30 [ 46.935111] </TASK> [ 46.935113] [ 47.131955] Allocated by task 302: [ 47.135364] kasan_save_stack+0x45/0x70 [ 47.139209] kasan_save_track+0x18/0x40 [ 47.143049] kasan_save_alloc_info+0x3b/0x50 [ 47.147322] __kasan_kmalloc+0xb7/0xc0 [ 47.151099] __kmalloc_cache_noprof+0x189/0x420 [ 47.155635] kasan_bitops_generic+0x92/0x1c0 [ 47.159915] kunit_try_run_case+0x1a2/0x480 [ 47.164100] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 47.169500] kthread+0x334/0x6f0 [ 47.172731] ret_from_fork+0x113/0x1d0 [ 47.176484] ret_from_fork_asm+0x1a/0x30 [ 47.180411] [ 47.181910] The buggy address belongs to the object at ffff8881067131a0 [ 47.181910] which belongs to the cache kmalloc-16 of size 16 [ 47.194243] The buggy address is located 8 bytes inside of [ 47.194243] allocated 9-byte region [ffff8881067131a0, ffff8881067131a9) [ 47.206488] [ 47.207989] The buggy address belongs to the physical page: [ 47.213560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713 [ 47.221559] flags: 0x200000000000000(node=0|zone=2) [ 47.226441] page_type: f5(slab) [ 47.229588] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 47.237351] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 47.245099] page dumped because: kasan: bad access detected [ 47.250673] [ 47.252170] Memory state around the buggy address: [ 47.256963] ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 47.264184] ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 47.271409] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 47.278630] ^ [ 47.283164] ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.290404] ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.297635] ================================================================== [ 49.674882] ================================================================== [ 49.682128] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 49.691082] Read of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302 [ 49.698419] [ 49.699915] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 49.699923] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 49.699925] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 49.699929] Call Trace: [ 49.699930] <TASK> [ 49.699932] dump_stack_lvl+0x73/0xb0 [ 49.699936] print_report+0xd1/0x650 [ 49.699940] ? __virt_addr_valid+0x1db/0x2d0 [ 49.699944] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 49.699949] ? kasan_complete_mode_report_info+0x2a/0x200 [ 49.699955] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 49.699960] kasan_report+0x141/0x180 [ 49.699964] ? kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 49.699970] kasan_check_range+0x10c/0x1c0 [ 49.699974] __kasan_check_read+0x15/0x20 [ 49.699978] kasan_bitops_test_and_modify.constprop.0+0x557/0xd90 [ 49.699983] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 49.699988] ? __kmalloc_cache_noprof+0x189/0x420 [ 49.699993] ? trace_hardirqs_on+0x37/0xe0 [ 49.699997] ? kasan_bitops_generic+0x92/0x1c0 [ 49.700002] kasan_bitops_generic+0x121/0x1c0 [ 49.700006] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 49.700011] ? ktime_get_ts64+0x83/0x230 [ 49.700015] kunit_try_run_case+0x1a2/0x480 [ 49.700020] ? __pfx_kunit_try_run_case+0x10/0x10 [ 49.700024] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 49.700028] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 49.700032] ? __kthread_parkme+0x82/0x180 [ 49.700036] ? preempt_count_sub+0x50/0x80 [ 49.700040] ? __pfx_kunit_try_run_case+0x10/0x10 [ 49.700045] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 49.700049] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 49.700053] kthread+0x334/0x6f0 [ 49.700056] ? trace_preempt_on+0x20/0xc0 [ 49.700060] ? __pfx_kthread+0x10/0x10 [ 49.700064] ? _raw_spin_unlock_irq+0x47/0x80 [ 49.700068] ? calculate_sigpending+0x7b/0xa0 [ 49.700072] ? __pfx_kthread+0x10/0x10 [ 49.700076] ret_from_fork+0x113/0x1d0 [ 49.700079] ? __pfx_kthread+0x10/0x10 [ 49.700083] ret_from_fork_asm+0x1a/0x30 [ 49.700089] </TASK> [ 49.700090] [ 49.896817] Allocated by task 302: [ 49.900226] kasan_save_stack+0x45/0x70 [ 49.904064] kasan_save_track+0x18/0x40 [ 49.907904] kasan_save_alloc_info+0x3b/0x50 [ 49.912184] __kasan_kmalloc+0xb7/0xc0 [ 49.915938] __kmalloc_cache_noprof+0x189/0x420 [ 49.920468] kasan_bitops_generic+0x92/0x1c0 [ 49.924742] kunit_try_run_case+0x1a2/0x480 [ 49.928927] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 49.934328] kthread+0x334/0x6f0 [ 49.937585] ret_from_fork+0x113/0x1d0 [ 49.941364] ret_from_fork_asm+0x1a/0x30 [ 49.945316] [ 49.946817] The buggy address belongs to the object at ffff8881067131a0 [ 49.946817] which belongs to the cache kmalloc-16 of size 16 [ 49.959159] The buggy address is located 8 bytes inside of [ 49.959159] allocated 9-byte region [ffff8881067131a0, ffff8881067131a9) [ 49.971412] [ 49.972911] The buggy address belongs to the physical page: [ 49.978483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713 [ 49.986484] flags: 0x200000000000000(node=0|zone=2) [ 49.991364] page_type: f5(slab) [ 49.994509] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 50.002248] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 50.009988] page dumped because: kasan: bad access detected [ 50.015559] [ 50.017059] Memory state around the buggy address: [ 50.021854] ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 50.029082] ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 50.036308] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 50.043528] ^ [ 50.048059] ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.055279] ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.062499] ================================================================== [ 50.069723] ================================================================== [ 50.076962] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 50.085915] Read of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302 [ 50.093221] [ 50.094721] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 50.094729] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 50.094732] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 50.094735] Call Trace: [ 50.094736] <TASK> [ 50.094738] dump_stack_lvl+0x73/0xb0 [ 50.094742] print_report+0xd1/0x650 [ 50.094746] ? __virt_addr_valid+0x1db/0x2d0 [ 50.094750] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 50.094755] ? kasan_complete_mode_report_info+0x2a/0x200 [ 50.094760] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 50.094766] kasan_report+0x141/0x180 [ 50.094770] ? kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 50.094776] __asan_report_load8_noabort+0x18/0x20 [ 50.094781] kasan_bitops_test_and_modify.constprop.0+0xd06/0xd90 [ 50.094786] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 50.094791] ? __kmalloc_cache_noprof+0x189/0x420 [ 50.094796] ? trace_hardirqs_on+0x37/0xe0 [ 50.094800] ? kasan_bitops_generic+0x92/0x1c0 [ 50.094805] kasan_bitops_generic+0x121/0x1c0 [ 50.094809] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 50.094814] ? ktime_get_ts64+0x83/0x230 [ 50.094818] kunit_try_run_case+0x1a2/0x480 [ 50.094823] ? __pfx_kunit_try_run_case+0x10/0x10 [ 50.094827] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 50.094831] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 50.094835] ? __kthread_parkme+0x82/0x180 [ 50.094839] ? preempt_count_sub+0x50/0x80 [ 50.094843] ? __pfx_kunit_try_run_case+0x10/0x10 [ 50.094847] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 50.094852] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 50.094856] kthread+0x334/0x6f0 [ 50.094859] ? trace_preempt_on+0x20/0xc0 [ 50.094863] ? __pfx_kthread+0x10/0x10 [ 50.094867] ? _raw_spin_unlock_irq+0x47/0x80 [ 50.094870] ? calculate_sigpending+0x7b/0xa0 [ 50.094875] ? __pfx_kthread+0x10/0x10 [ 50.094879] ret_from_fork+0x113/0x1d0 [ 50.094882] ? __pfx_kthread+0x10/0x10 [ 50.094886] ret_from_fork_asm+0x1a/0x30 [ 50.094892] </TASK> [ 50.094893] [ 50.288255] Allocated by task 302: [ 50.291662] kasan_save_stack+0x45/0x70 [ 50.295508] kasan_save_track+0x18/0x40 [ 50.299366] kasan_save_alloc_info+0x3b/0x50 [ 50.303664] __kasan_kmalloc+0xb7/0xc0 [ 50.307416] __kmalloc_cache_noprof+0x189/0x420 [ 50.311948] kasan_bitops_generic+0x92/0x1c0 [ 50.316223] kunit_try_run_case+0x1a2/0x480 [ 50.320409] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 50.325807] kthread+0x334/0x6f0 [ 50.329039] ret_from_fork+0x113/0x1d0 [ 50.332791] ret_from_fork_asm+0x1a/0x30 [ 50.336720] [ 50.338220] The buggy address belongs to the object at ffff8881067131a0 [ 50.338220] which belongs to the cache kmalloc-16 of size 16 [ 50.350560] The buggy address is located 8 bytes inside of [ 50.350560] allocated 9-byte region [ffff8881067131a0, ffff8881067131a9) [ 50.362814] [ 50.364314] The buggy address belongs to the physical page: [ 50.369888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713 [ 50.377893] flags: 0x200000000000000(node=0|zone=2) [ 50.382774] page_type: f5(slab) [ 50.385922] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 50.393667] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 50.401406] page dumped because: kasan: bad access detected [ 50.406978] [ 50.408471] Memory state around the buggy address: [ 50.413264] ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 50.420483] ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 50.427700] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 50.434922] ^ [ 50.439454] ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.446673] ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.453890] ================================================================== [ 48.884875] ================================================================== [ 48.892115] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 48.901074] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302 [ 48.908467] [ 48.909967] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 48.909975] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 48.909978] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 48.909981] Call Trace: [ 48.909982] <TASK> [ 48.909984] dump_stack_lvl+0x73/0xb0 [ 48.909989] print_report+0xd1/0x650 [ 48.909992] ? __virt_addr_valid+0x1db/0x2d0 [ 48.909996] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 48.910002] ? kasan_complete_mode_report_info+0x2a/0x200 [ 48.910007] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 48.910012] kasan_report+0x141/0x180 [ 48.910016] ? kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 48.910023] kasan_check_range+0x10c/0x1c0 [ 48.910027] __kasan_check_write+0x18/0x20 [ 48.910031] kasan_bitops_test_and_modify.constprop.0+0x41a/0xd90 [ 48.910036] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 48.910042] ? __kmalloc_cache_noprof+0x189/0x420 [ 48.910046] ? trace_hardirqs_on+0x37/0xe0 [ 48.910050] ? kasan_bitops_generic+0x92/0x1c0 [ 48.910055] kasan_bitops_generic+0x121/0x1c0 [ 48.910060] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 48.910065] ? ktime_get_ts64+0x83/0x230 [ 48.910069] kunit_try_run_case+0x1a2/0x480 [ 48.910073] ? __pfx_kunit_try_run_case+0x10/0x10 [ 48.910077] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 48.910082] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 48.910086] ? __kthread_parkme+0x82/0x180 [ 48.910089] ? preempt_count_sub+0x50/0x80 [ 48.910093] ? __pfx_kunit_try_run_case+0x10/0x10 [ 48.910098] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 48.910102] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 48.910106] kthread+0x334/0x6f0 [ 48.910110] ? trace_preempt_on+0x20/0xc0 [ 48.910114] ? __pfx_kthread+0x10/0x10 [ 48.910117] ? _raw_spin_unlock_irq+0x47/0x80 [ 48.910121] ? calculate_sigpending+0x7b/0xa0 [ 48.910126] ? __pfx_kthread+0x10/0x10 [ 48.910130] ret_from_fork+0x113/0x1d0 [ 48.910133] ? __pfx_kthread+0x10/0x10 [ 48.910137] ret_from_fork_asm+0x1a/0x30 [ 48.910142] </TASK> [ 48.910144] [ 49.106968] Allocated by task 302: [ 49.110373] kasan_save_stack+0x45/0x70 [ 49.114214] kasan_save_track+0x18/0x40 [ 49.118052] kasan_save_alloc_info+0x3b/0x50 [ 49.122324] __kasan_kmalloc+0xb7/0xc0 [ 49.126103] __kmalloc_cache_noprof+0x189/0x420 [ 49.130636] kasan_bitops_generic+0x92/0x1c0 [ 49.134908] kunit_try_run_case+0x1a2/0x480 [ 49.139094] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 49.144495] kthread+0x334/0x6f0 [ 49.147726] ret_from_fork+0x113/0x1d0 [ 49.151478] ret_from_fork_asm+0x1a/0x30 [ 49.155408] [ 49.156904] The buggy address belongs to the object at ffff8881067131a0 [ 49.156904] which belongs to the cache kmalloc-16 of size 16 [ 49.169239] The buggy address is located 8 bytes inside of [ 49.169239] allocated 9-byte region [ffff8881067131a0, ffff8881067131a9) [ 49.181493] [ 49.182991] The buggy address belongs to the physical page: [ 49.188563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713 [ 49.196563] flags: 0x200000000000000(node=0|zone=2) [ 49.201444] page_type: f5(slab) [ 49.204591] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 49.212365] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 49.220128] page dumped because: kasan: bad access detected [ 49.225700] [ 49.227200] Memory state around the buggy address: [ 49.231992] ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 49.239211] ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 49.246431] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 49.253650] ^ [ 49.258185] ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.265414] ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.272631] ================================================================== [ 48.489815] ================================================================== [ 48.497053] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 48.506008] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302 [ 48.513408] [ 48.514909] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 48.514917] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 48.514920] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 48.514923] Call Trace: [ 48.514925] <TASK> [ 48.514926] dump_stack_lvl+0x73/0xb0 [ 48.514930] print_report+0xd1/0x650 [ 48.514934] ? __virt_addr_valid+0x1db/0x2d0 [ 48.514938] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 48.514944] ? kasan_complete_mode_report_info+0x2a/0x200 [ 48.514949] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 48.514954] kasan_report+0x141/0x180 [ 48.514958] ? kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 48.514964] kasan_check_range+0x10c/0x1c0 [ 48.514969] __kasan_check_write+0x18/0x20 [ 48.514972] kasan_bitops_test_and_modify.constprop.0+0x37c/0xd90 [ 48.514977] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 48.514983] ? __kmalloc_cache_noprof+0x189/0x420 [ 48.514988] ? trace_hardirqs_on+0x37/0xe0 [ 48.514992] ? kasan_bitops_generic+0x92/0x1c0 [ 48.514997] kasan_bitops_generic+0x121/0x1c0 [ 48.515001] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 48.515006] ? ktime_get_ts64+0x83/0x230 [ 48.515010] kunit_try_run_case+0x1a2/0x480 [ 48.515014] ? __pfx_kunit_try_run_case+0x10/0x10 [ 48.515019] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 48.515023] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 48.515027] ? __kthread_parkme+0x82/0x180 [ 48.515031] ? preempt_count_sub+0x50/0x80 [ 48.515035] ? __pfx_kunit_try_run_case+0x10/0x10 [ 48.515039] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 48.515043] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 48.515048] kthread+0x334/0x6f0 [ 48.515051] ? trace_preempt_on+0x20/0xc0 [ 48.515055] ? __pfx_kthread+0x10/0x10 [ 48.515059] ? _raw_spin_unlock_irq+0x47/0x80 [ 48.515063] ? calculate_sigpending+0x7b/0xa0 [ 48.515067] ? __pfx_kthread+0x10/0x10 [ 48.515071] ret_from_fork+0x113/0x1d0 [ 48.515074] ? __pfx_kthread+0x10/0x10 [ 48.515078] ret_from_fork_asm+0x1a/0x30 [ 48.515084] </TASK> [ 48.515085] [ 48.711969] Allocated by task 302: [ 48.715375] kasan_save_stack+0x45/0x70 [ 48.719241] kasan_save_track+0x18/0x40 [ 48.723081] kasan_save_alloc_info+0x3b/0x50 [ 48.727365] __kasan_kmalloc+0xb7/0xc0 [ 48.731138] __kmalloc_cache_noprof+0x189/0x420 [ 48.735673] kasan_bitops_generic+0x92/0x1c0 [ 48.739955] kunit_try_run_case+0x1a2/0x480 [ 48.744149] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 48.749546] kthread+0x334/0x6f0 [ 48.752781] ret_from_fork+0x113/0x1d0 [ 48.756532] ret_from_fork_asm+0x1a/0x30 [ 48.760458] [ 48.761958] The buggy address belongs to the object at ffff8881067131a0 [ 48.761958] which belongs to the cache kmalloc-16 of size 16 [ 48.774301] The buggy address is located 8 bytes inside of [ 48.774301] allocated 9-byte region [ffff8881067131a0, ffff8881067131a9) [ 48.786553] [ 48.788053] The buggy address belongs to the physical page: [ 48.793627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713 [ 48.801634] flags: 0x200000000000000(node=0|zone=2) [ 48.806513] page_type: f5(slab) [ 48.809659] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 48.817413] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 48.825155] page dumped because: kasan: bad access detected [ 48.830729] [ 48.832227] Memory state around the buggy address: [ 48.837019] ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 48.844238] ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 48.851459] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 48.858679] ^ [ 48.863212] ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.870430] ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.877648] ================================================================== [ 49.279856] ================================================================== [ 49.287094] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 49.296049] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302 [ 49.303449] [ 49.304951] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 49.304958] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 49.304961] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 49.304964] Call Trace: [ 49.304966] <TASK> [ 49.304968] dump_stack_lvl+0x73/0xb0 [ 49.304972] print_report+0xd1/0x650 [ 49.304976] ? __virt_addr_valid+0x1db/0x2d0 [ 49.304980] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 49.304985] ? kasan_complete_mode_report_info+0x2a/0x200 [ 49.304990] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 49.304996] kasan_report+0x141/0x180 [ 49.305000] ? kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 49.305006] kasan_check_range+0x10c/0x1c0 [ 49.305010] __kasan_check_write+0x18/0x20 [ 49.305014] kasan_bitops_test_and_modify.constprop.0+0x4b9/0xd90 [ 49.305019] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 49.305024] ? __kmalloc_cache_noprof+0x189/0x420 [ 49.305029] ? trace_hardirqs_on+0x37/0xe0 [ 49.305033] ? kasan_bitops_generic+0x92/0x1c0 [ 49.305038] kasan_bitops_generic+0x121/0x1c0 [ 49.305042] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 49.305047] ? ktime_get_ts64+0x83/0x230 [ 49.305051] kunit_try_run_case+0x1a2/0x480 [ 49.305056] ? __pfx_kunit_try_run_case+0x10/0x10 [ 49.305060] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 49.305064] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 49.305068] ? __kthread_parkme+0x82/0x180 [ 49.305072] ? preempt_count_sub+0x50/0x80 [ 49.305076] ? __pfx_kunit_try_run_case+0x10/0x10 [ 49.305080] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 49.305085] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 49.305089] kthread+0x334/0x6f0 [ 49.305092] ? trace_preempt_on+0x20/0xc0 [ 49.305096] ? __pfx_kthread+0x10/0x10 [ 49.305100] ? _raw_spin_unlock_irq+0x47/0x80 [ 49.305104] ? calculate_sigpending+0x7b/0xa0 [ 49.305108] ? __pfx_kthread+0x10/0x10 [ 49.305112] ret_from_fork+0x113/0x1d0 [ 49.305115] ? __pfx_kthread+0x10/0x10 [ 49.305119] ret_from_fork_asm+0x1a/0x30 [ 49.305125] </TASK> [ 49.305126] [ 49.501966] Allocated by task 302: [ 49.505395] kasan_save_stack+0x45/0x70 [ 49.509239] kasan_save_track+0x18/0x40 [ 49.513079] kasan_save_alloc_info+0x3b/0x50 [ 49.517366] __kasan_kmalloc+0xb7/0xc0 [ 49.521146] __kmalloc_cache_noprof+0x189/0x420 [ 49.525687] kasan_bitops_generic+0x92/0x1c0 [ 49.529961] kunit_try_run_case+0x1a2/0x480 [ 49.534154] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 49.539555] kthread+0x334/0x6f0 [ 49.542787] ret_from_fork+0x113/0x1d0 [ 49.546540] ret_from_fork_asm+0x1a/0x30 [ 49.550466] [ 49.551964] The buggy address belongs to the object at ffff8881067131a0 [ 49.551964] which belongs to the cache kmalloc-16 of size 16 [ 49.564299] The buggy address is located 8 bytes inside of [ 49.564299] allocated 9-byte region [ffff8881067131a0, ffff8881067131a9) [ 49.576551] [ 49.578051] The buggy address belongs to the physical page: [ 49.583623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713 [ 49.591622] flags: 0x200000000000000(node=0|zone=2) [ 49.596502] page_type: f5(slab) [ 49.599650] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 49.607409] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 49.615154] page dumped because: kasan: bad access detected [ 49.620727] [ 49.622224] Memory state around the buggy address: [ 49.627018] ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 49.634236] ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 49.641457] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 49.648674] ^ [ 49.653208] ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.660429] ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.667657] ================================================================== [ 47.699836] ================================================================== [ 47.707082] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 47.716043] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302 [ 47.723435] [ 47.724937] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 47.724945] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 47.724948] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 47.724951] Call Trace: [ 47.724953] <TASK> [ 47.724954] dump_stack_lvl+0x73/0xb0 [ 47.724959] print_report+0xd1/0x650 [ 47.724963] ? __virt_addr_valid+0x1db/0x2d0 [ 47.724966] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 47.724972] ? kasan_complete_mode_report_info+0x2a/0x200 [ 47.724977] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 47.724982] kasan_report+0x141/0x180 [ 47.724986] ? kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 47.724992] kasan_check_range+0x10c/0x1c0 [ 47.724997] __kasan_check_write+0x18/0x20 [ 47.725000] kasan_bitops_test_and_modify.constprop.0+0x23e/0xd90 [ 47.725005] ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10 [ 47.725011] ? __kmalloc_cache_noprof+0x189/0x420 [ 47.725015] ? trace_hardirqs_on+0x37/0xe0 [ 47.725019] ? kasan_bitops_generic+0x92/0x1c0 [ 47.725024] kasan_bitops_generic+0x121/0x1c0 [ 47.725028] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 47.725033] ? ktime_get_ts64+0x83/0x230 [ 47.725038] kunit_try_run_case+0x1a2/0x480 [ 47.725042] ? __pfx_kunit_try_run_case+0x10/0x10 [ 47.725046] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 47.725050] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 47.725054] ? __kthread_parkme+0x82/0x180 [ 47.725058] ? preempt_count_sub+0x50/0x80 [ 47.725062] ? __pfx_kunit_try_run_case+0x10/0x10 [ 47.725067] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 47.725071] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 47.725075] kthread+0x334/0x6f0 [ 47.725078] ? trace_preempt_on+0x20/0xc0 [ 47.725082] ? __pfx_kthread+0x10/0x10 [ 47.725086] ? _raw_spin_unlock_irq+0x47/0x80 [ 47.725090] ? calculate_sigpending+0x7b/0xa0 [ 47.725094] ? __pfx_kthread+0x10/0x10 [ 47.725098] ret_from_fork+0x113/0x1d0 [ 47.725101] ? __pfx_kthread+0x10/0x10 [ 47.725105] ret_from_fork_asm+0x1a/0x30 [ 47.725111] </TASK> [ 47.725112] [ 47.921901] Allocated by task 302: [ 47.925309] kasan_save_stack+0x45/0x70 [ 47.929147] kasan_save_track+0x18/0x40 [ 47.932985] kasan_save_alloc_info+0x3b/0x50 [ 47.937259] __kasan_kmalloc+0xb7/0xc0 [ 47.941012] __kmalloc_cache_noprof+0x189/0x420 [ 47.945545] kasan_bitops_generic+0x92/0x1c0 [ 47.949816] kunit_try_run_case+0x1a2/0x480 [ 47.954004] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 47.959413] kthread+0x334/0x6f0 [ 47.962644] ret_from_fork+0x113/0x1d0 [ 47.966417] ret_from_fork_asm+0x1a/0x30 [ 47.970363] [ 47.971863] The buggy address belongs to the object at ffff8881067131a0 [ 47.971863] which belongs to the cache kmalloc-16 of size 16 [ 47.984199] The buggy address is located 8 bytes inside of [ 47.984199] allocated 9-byte region [ffff8881067131a0, ffff8881067131a9) [ 47.996451] [ 47.997952] The buggy address belongs to the physical page: [ 48.003524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713 [ 48.011524] flags: 0x200000000000000(node=0|zone=2) [ 48.016404] page_type: f5(slab) [ 48.019550] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 48.027296] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 48.035037] page dumped because: kasan: bad access detected [ 48.040607] [ 48.042108] Memory state around the buggy address: [ 48.046902] ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 48.054129] ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 48.061363] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 48.068612] ^ [ 48.073145] ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.080373] ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.087618] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 45.739150] ================================================================== [ 45.746418] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 45.754596] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302 [ 45.761995] [ 45.763497] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 45.763504] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 45.763507] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 45.763510] Call Trace: [ 45.763512] <TASK> [ 45.763513] dump_stack_lvl+0x73/0xb0 [ 45.763518] print_report+0xd1/0x650 [ 45.763521] ? __virt_addr_valid+0x1db/0x2d0 [ 45.763525] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 45.763530] ? kasan_complete_mode_report_info+0x2a/0x200 [ 45.763535] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 45.763540] kasan_report+0x141/0x180 [ 45.763544] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 45.763550] kasan_check_range+0x10c/0x1c0 [ 45.763555] __kasan_check_write+0x18/0x20 [ 45.763558] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 45.763563] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 45.763568] ? __kmalloc_cache_noprof+0x189/0x420 [ 45.763572] ? trace_hardirqs_on+0x37/0xe0 [ 45.763576] ? kasan_bitops_generic+0x92/0x1c0 [ 45.763581] kasan_bitops_generic+0x116/0x1c0 [ 45.763586] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 45.763591] ? ktime_get_ts64+0x83/0x230 [ 45.763595] kunit_try_run_case+0x1a2/0x480 [ 45.763599] ? __pfx_kunit_try_run_case+0x10/0x10 [ 45.763604] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 45.763608] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 45.763612] ? __kthread_parkme+0x82/0x180 [ 45.763616] ? preempt_count_sub+0x50/0x80 [ 45.763620] ? __pfx_kunit_try_run_case+0x10/0x10 [ 45.763624] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 45.763628] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 45.763632] kthread+0x334/0x6f0 [ 45.763636] ? trace_preempt_on+0x20/0xc0 [ 45.763640] ? __pfx_kthread+0x10/0x10 [ 45.763644] ? _raw_spin_unlock_irq+0x47/0x80 [ 45.763647] ? calculate_sigpending+0x7b/0xa0 [ 45.763652] ? __pfx_kthread+0x10/0x10 [ 45.763656] ret_from_fork+0x113/0x1d0 [ 45.763659] ? __pfx_kthread+0x10/0x10 [ 45.763663] ret_from_fork_asm+0x1a/0x30 [ 45.763669] </TASK> [ 45.763670] [ 45.956552] Allocated by task 302: [ 45.959960] kasan_save_stack+0x45/0x70 [ 45.963800] kasan_save_track+0x18/0x40 [ 45.967639] kasan_save_alloc_info+0x3b/0x50 [ 45.971921] __kasan_kmalloc+0xb7/0xc0 [ 45.975673] __kmalloc_cache_noprof+0x189/0x420 [ 45.980214] kasan_bitops_generic+0x92/0x1c0 [ 45.984495] kunit_try_run_case+0x1a2/0x480 [ 45.988680] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 45.994080] kthread+0x334/0x6f0 [ 45.997312] ret_from_fork+0x113/0x1d0 [ 46.001064] ret_from_fork_asm+0x1a/0x30 [ 46.004992] [ 46.006489] The buggy address belongs to the object at ffff8881067131a0 [ 46.006489] which belongs to the cache kmalloc-16 of size 16 [ 46.018824] The buggy address is located 8 bytes inside of [ 46.018824] allocated 9-byte region [ffff8881067131a0, ffff8881067131a9) [ 46.031079] [ 46.032578] The buggy address belongs to the physical page: [ 46.038151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713 [ 46.046157] flags: 0x200000000000000(node=0|zone=2) [ 46.051037] page_type: f5(slab) [ 46.054183] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 46.061922] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 46.069662] page dumped because: kasan: bad access detected [ 46.075236] [ 46.076733] Memory state around the buggy address: [ 46.081526] ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 46.088747] ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 46.095965] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 46.103184] ^ [ 46.107716] ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.114936] ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.122157] ================================================================== [ 43.783794] ================================================================== [ 43.794890] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 43.803069] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302 [ 43.810464] [ 43.811963] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 43.811971] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 43.811974] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 43.811977] Call Trace: [ 43.811979] <TASK> [ 43.811980] dump_stack_lvl+0x73/0xb0 [ 43.811985] print_report+0xd1/0x650 [ 43.811989] ? __virt_addr_valid+0x1db/0x2d0 [ 43.811993] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 43.811998] ? kasan_complete_mode_report_info+0x2a/0x200 [ 43.812003] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 43.812008] kasan_report+0x141/0x180 [ 43.812012] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 43.812018] kasan_check_range+0x10c/0x1c0 [ 43.812022] __kasan_check_write+0x18/0x20 [ 43.812026] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 43.812030] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 43.812036] ? __kmalloc_cache_noprof+0x189/0x420 [ 43.812040] ? trace_hardirqs_on+0x37/0xe0 [ 43.812044] ? kasan_bitops_generic+0x92/0x1c0 [ 43.812049] kasan_bitops_generic+0x116/0x1c0 [ 43.812054] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 43.812059] ? ktime_get_ts64+0x83/0x230 [ 43.812063] kunit_try_run_case+0x1a2/0x480 [ 43.812067] ? __pfx_kunit_try_run_case+0x10/0x10 [ 43.812072] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 43.812076] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 43.812080] ? __kthread_parkme+0x82/0x180 [ 43.812084] ? preempt_count_sub+0x50/0x80 [ 43.812088] ? __pfx_kunit_try_run_case+0x10/0x10 [ 43.812092] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 43.812096] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 43.812101] kthread+0x334/0x6f0 [ 43.812104] ? trace_preempt_on+0x20/0xc0 [ 43.812108] ? __pfx_kthread+0x10/0x10 [ 43.812112] ? _raw_spin_unlock_irq+0x47/0x80 [ 43.812116] ? calculate_sigpending+0x7b/0xa0 [ 43.812120] ? __pfx_kthread+0x10/0x10 [ 43.812124] ret_from_fork+0x113/0x1d0 [ 43.812128] ? __pfx_kthread+0x10/0x10 [ 43.812131] ret_from_fork_asm+0x1a/0x30 [ 43.812137] </TASK> [ 43.812139] [ 44.005047] Allocated by task 302: [ 44.008451] kasan_save_stack+0x45/0x70 [ 44.012291] kasan_save_track+0x18/0x40 [ 44.016130] kasan_save_alloc_info+0x3b/0x50 [ 44.020402] __kasan_kmalloc+0xb7/0xc0 [ 44.024156] __kmalloc_cache_noprof+0x189/0x420 [ 44.028687] kasan_bitops_generic+0x92/0x1c0 [ 44.032960] kunit_try_run_case+0x1a2/0x480 [ 44.037147] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 44.042546] kthread+0x334/0x6f0 [ 44.045780] ret_from_fork+0x113/0x1d0 [ 44.049530] ret_from_fork_asm+0x1a/0x30 [ 44.053456] [ 44.054956] The buggy address belongs to the object at ffff8881067131a0 [ 44.054956] which belongs to the cache kmalloc-16 of size 16 [ 44.067298] The buggy address is located 8 bytes inside of [ 44.067298] allocated 9-byte region [ffff8881067131a0, ffff8881067131a9) [ 44.079553] [ 44.081050] The buggy address belongs to the physical page: [ 44.086625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713 [ 44.094632] flags: 0x200000000000000(node=0|zone=2) [ 44.099512] page_type: f5(slab) [ 44.102658] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 44.110411] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.118155] page dumped because: kasan: bad access detected [ 44.123726] [ 44.125226] Memory state around the buggy address: [ 44.130019] ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 44.137237] ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 44.144457] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 44.151678] ^ [ 44.156210] ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.163427] ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.170648] ================================================================== [ 44.177897] ================================================================== [ 44.185146] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 44.193318] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302 [ 44.200739] [ 44.202238] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 44.202246] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 44.202249] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 44.202252] Call Trace: [ 44.202254] <TASK> [ 44.202255] dump_stack_lvl+0x73/0xb0 [ 44.202260] print_report+0xd1/0x650 [ 44.202264] ? __virt_addr_valid+0x1db/0x2d0 [ 44.202267] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 44.202272] ? kasan_complete_mode_report_info+0x2a/0x200 [ 44.202277] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 44.202282] kasan_report+0x141/0x180 [ 44.202286] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 44.202292] kasan_check_range+0x10c/0x1c0 [ 44.202296] __kasan_check_write+0x18/0x20 [ 44.202300] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 44.202305] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 44.202310] ? __kmalloc_cache_noprof+0x189/0x420 [ 44.202315] ? trace_hardirqs_on+0x37/0xe0 [ 44.202318] ? kasan_bitops_generic+0x92/0x1c0 [ 44.202324] kasan_bitops_generic+0x116/0x1c0 [ 44.202328] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 44.202350] ? ktime_get_ts64+0x83/0x230 [ 44.202354] kunit_try_run_case+0x1a2/0x480 [ 44.202359] ? __pfx_kunit_try_run_case+0x10/0x10 [ 44.202363] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 44.202368] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 44.202372] ? __kthread_parkme+0x82/0x180 [ 44.202376] ? preempt_count_sub+0x50/0x80 [ 44.202380] ? __pfx_kunit_try_run_case+0x10/0x10 [ 44.202385] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 44.202402] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 44.202406] kthread+0x334/0x6f0 [ 44.202409] ? trace_preempt_on+0x20/0xc0 [ 44.202413] ? __pfx_kthread+0x10/0x10 [ 44.202417] ? _raw_spin_unlock_irq+0x47/0x80 [ 44.202421] ? calculate_sigpending+0x7b/0xa0 [ 44.202426] ? __pfx_kthread+0x10/0x10 [ 44.202430] ret_from_fork+0x113/0x1d0 [ 44.202433] ? __pfx_kthread+0x10/0x10 [ 44.202437] ret_from_fork_asm+0x1a/0x30 [ 44.202443] </TASK> [ 44.202444] [ 44.395366] Allocated by task 302: [ 44.398798] kasan_save_stack+0x45/0x70 [ 44.402646] kasan_save_track+0x18/0x40 [ 44.406494] kasan_save_alloc_info+0x3b/0x50 [ 44.410774] __kasan_kmalloc+0xb7/0xc0 [ 44.414527] __kmalloc_cache_noprof+0x189/0x420 [ 44.419069] kasan_bitops_generic+0x92/0x1c0 [ 44.423365] kunit_try_run_case+0x1a2/0x480 [ 44.427580] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 44.432986] kthread+0x334/0x6f0 [ 44.436218] ret_from_fork+0x113/0x1d0 [ 44.439973] ret_from_fork_asm+0x1a/0x30 [ 44.443906] [ 44.445406] The buggy address belongs to the object at ffff8881067131a0 [ 44.445406] which belongs to the cache kmalloc-16 of size 16 [ 44.457747] The buggy address is located 8 bytes inside of [ 44.457747] allocated 9-byte region [ffff8881067131a0, ffff8881067131a9) [ 44.470002] [ 44.471502] The buggy address belongs to the physical page: [ 44.477073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713 [ 44.485074] flags: 0x200000000000000(node=0|zone=2) [ 44.489951] page_type: f5(slab) [ 44.493099] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 44.500837] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.508576] page dumped because: kasan: bad access detected [ 44.514150] [ 44.515649] Memory state around the buggy address: [ 44.520443] ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 44.527661] ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 44.534880] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 44.542100] ^ [ 44.546633] ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.553861] ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.561079] ================================================================== [ 46.129394] ================================================================== [ 46.136636] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 46.144810] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302 [ 46.152204] [ 46.153704] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 46.153712] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 46.153714] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 46.153717] Call Trace: [ 46.153719] <TASK> [ 46.153721] dump_stack_lvl+0x73/0xb0 [ 46.153725] print_report+0xd1/0x650 [ 46.153729] ? __virt_addr_valid+0x1db/0x2d0 [ 46.153733] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 46.153738] ? kasan_complete_mode_report_info+0x2a/0x200 [ 46.153743] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 46.153748] kasan_report+0x141/0x180 [ 46.153752] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 46.153758] kasan_check_range+0x10c/0x1c0 [ 46.153762] __kasan_check_write+0x18/0x20 [ 46.153765] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 46.153770] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 46.153775] ? __kmalloc_cache_noprof+0x189/0x420 [ 46.153780] ? trace_hardirqs_on+0x37/0xe0 [ 46.153784] ? kasan_bitops_generic+0x92/0x1c0 [ 46.153789] kasan_bitops_generic+0x116/0x1c0 [ 46.153793] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 46.153798] ? ktime_get_ts64+0x83/0x230 [ 46.153803] kunit_try_run_case+0x1a2/0x480 [ 46.153807] ? __pfx_kunit_try_run_case+0x10/0x10 [ 46.153811] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 46.153816] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 46.153820] ? __kthread_parkme+0x82/0x180 [ 46.153823] ? preempt_count_sub+0x50/0x80 [ 46.153828] ? __pfx_kunit_try_run_case+0x10/0x10 [ 46.153832] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 46.153836] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 46.153841] kthread+0x334/0x6f0 [ 46.153844] ? trace_preempt_on+0x20/0xc0 [ 46.153848] ? __pfx_kthread+0x10/0x10 [ 46.153852] ? _raw_spin_unlock_irq+0x47/0x80 [ 46.153855] ? calculate_sigpending+0x7b/0xa0 [ 46.153860] ? __pfx_kthread+0x10/0x10 [ 46.153864] ret_from_fork+0x113/0x1d0 [ 46.153867] ? __pfx_kthread+0x10/0x10 [ 46.153871] ret_from_fork_asm+0x1a/0x30 [ 46.153876] </TASK> [ 46.153878] [ 46.346759] Allocated by task 302: [ 46.350165] kasan_save_stack+0x45/0x70 [ 46.354004] kasan_save_track+0x18/0x40 [ 46.357843] kasan_save_alloc_info+0x3b/0x50 [ 46.362116] __kasan_kmalloc+0xb7/0xc0 [ 46.365870] __kmalloc_cache_noprof+0x189/0x420 [ 46.370421] kasan_bitops_generic+0x92/0x1c0 [ 46.374701] kunit_try_run_case+0x1a2/0x480 [ 46.378886] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 46.384287] kthread+0x334/0x6f0 [ 46.387518] ret_from_fork+0x113/0x1d0 [ 46.391272] ret_from_fork_asm+0x1a/0x30 [ 46.395206] [ 46.396705] The buggy address belongs to the object at ffff8881067131a0 [ 46.396705] which belongs to the cache kmalloc-16 of size 16 [ 46.409048] The buggy address is located 8 bytes inside of [ 46.409048] allocated 9-byte region [ffff8881067131a0, ffff8881067131a9) [ 46.421302] [ 46.422801] The buggy address belongs to the physical page: [ 46.428374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713 [ 46.436411] flags: 0x200000000000000(node=0|zone=2) [ 46.441295] page_type: f5(slab) [ 46.444441] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 46.452183] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 46.459927] page dumped because: kasan: bad access detected [ 46.465501] [ 46.467000] Memory state around the buggy address: [ 46.471795] ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 46.479013] ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 46.486232] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 46.493451] ^ [ 46.497984] ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.505205] ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.512432] ================================================================== [ 44.568305] ================================================================== [ 44.575578] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 44.583752] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302 [ 44.591142] [ 44.592634] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 44.592643] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 44.592645] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 44.592648] Call Trace: [ 44.592650] <TASK> [ 44.592651] dump_stack_lvl+0x73/0xb0 [ 44.592656] print_report+0xd1/0x650 [ 44.592659] ? __virt_addr_valid+0x1db/0x2d0 [ 44.592663] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 44.592668] ? kasan_complete_mode_report_info+0x2a/0x200 [ 44.592673] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 44.592678] kasan_report+0x141/0x180 [ 44.592682] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 44.592688] kasan_check_range+0x10c/0x1c0 [ 44.592692] __kasan_check_write+0x18/0x20 [ 44.592695] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 44.592700] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 44.592705] ? __kmalloc_cache_noprof+0x189/0x420 [ 44.592710] ? trace_hardirqs_on+0x37/0xe0 [ 44.592714] ? kasan_bitops_generic+0x92/0x1c0 [ 44.592719] kasan_bitops_generic+0x116/0x1c0 [ 44.592723] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 44.592728] ? ktime_get_ts64+0x83/0x230 [ 44.592733] kunit_try_run_case+0x1a2/0x480 [ 44.592737] ? __pfx_kunit_try_run_case+0x10/0x10 [ 44.592741] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 44.592745] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 44.592750] ? __kthread_parkme+0x82/0x180 [ 44.592753] ? preempt_count_sub+0x50/0x80 [ 44.592757] ? __pfx_kunit_try_run_case+0x10/0x10 [ 44.592762] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 44.592766] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 44.592770] kthread+0x334/0x6f0 [ 44.592774] ? trace_preempt_on+0x20/0xc0 [ 44.592778] ? __pfx_kthread+0x10/0x10 [ 44.592781] ? _raw_spin_unlock_irq+0x47/0x80 [ 44.592785] ? calculate_sigpending+0x7b/0xa0 [ 44.592790] ? __pfx_kthread+0x10/0x10 [ 44.592793] ret_from_fork+0x113/0x1d0 [ 44.592797] ? __pfx_kthread+0x10/0x10 [ 44.592800] ret_from_fork_asm+0x1a/0x30 [ 44.592806] </TASK> [ 44.592808] [ 44.785657] Allocated by task 302: [ 44.789062] kasan_save_stack+0x45/0x70 [ 44.792902] kasan_save_track+0x18/0x40 [ 44.796742] kasan_save_alloc_info+0x3b/0x50 [ 44.801013] __kasan_kmalloc+0xb7/0xc0 [ 44.804767] __kmalloc_cache_noprof+0x189/0x420 [ 44.809300] kasan_bitops_generic+0x92/0x1c0 [ 44.813571] kunit_try_run_case+0x1a2/0x480 [ 44.817757] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 44.823159] kthread+0x334/0x6f0 [ 44.826411] ret_from_fork+0x113/0x1d0 [ 44.830168] ret_from_fork_asm+0x1a/0x30 [ 44.834096] [ 44.835596] The buggy address belongs to the object at ffff8881067131a0 [ 44.835596] which belongs to the cache kmalloc-16 of size 16 [ 44.847936] The buggy address is located 8 bytes inside of [ 44.847936] allocated 9-byte region [ffff8881067131a0, ffff8881067131a9) [ 44.860191] [ 44.861688] The buggy address belongs to the physical page: [ 44.867262] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713 [ 44.875261] flags: 0x200000000000000(node=0|zone=2) [ 44.880140] page_type: f5(slab) [ 44.883287] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 44.891028] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.898774] page dumped because: kasan: bad access detected [ 44.904362] [ 44.905864] Memory state around the buggy address: [ 44.910656] ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 44.917876] ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 44.925096] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 44.932314] ^ [ 44.936847] ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.944066] ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.951284] ================================================================== [ 44.958529] ================================================================== [ 44.965758] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 44.973931] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302 [ 44.981323] [ 44.982851] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 44.982859] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 44.982862] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 44.982865] Call Trace: [ 44.982866] <TASK> [ 44.982868] dump_stack_lvl+0x73/0xb0 [ 44.982872] print_report+0xd1/0x650 [ 44.982876] ? __virt_addr_valid+0x1db/0x2d0 [ 44.982880] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 44.982885] ? kasan_complete_mode_report_info+0x2a/0x200 [ 44.982890] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 44.982895] kasan_report+0x141/0x180 [ 44.982899] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 44.982905] kasan_check_range+0x10c/0x1c0 [ 44.982909] __kasan_check_write+0x18/0x20 [ 44.982912] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 44.982917] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 44.982922] ? __kmalloc_cache_noprof+0x189/0x420 [ 44.982927] ? trace_hardirqs_on+0x37/0xe0 [ 44.982931] ? kasan_bitops_generic+0x92/0x1c0 [ 44.982936] kasan_bitops_generic+0x116/0x1c0 [ 44.982940] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 44.982945] ? ktime_get_ts64+0x83/0x230 [ 44.982949] kunit_try_run_case+0x1a2/0x480 [ 44.982954] ? __pfx_kunit_try_run_case+0x10/0x10 [ 44.982958] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 44.982962] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 44.982966] ? __kthread_parkme+0x82/0x180 [ 44.982970] ? preempt_count_sub+0x50/0x80 [ 44.982974] ? __pfx_kunit_try_run_case+0x10/0x10 [ 44.982979] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 44.982983] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 44.982987] kthread+0x334/0x6f0 [ 44.982991] ? trace_preempt_on+0x20/0xc0 [ 44.982995] ? __pfx_kthread+0x10/0x10 [ 44.982998] ? _raw_spin_unlock_irq+0x47/0x80 [ 44.983002] ? calculate_sigpending+0x7b/0xa0 [ 44.983007] ? __pfx_kthread+0x10/0x10 [ 44.983010] ret_from_fork+0x113/0x1d0 [ 44.983014] ? __pfx_kthread+0x10/0x10 [ 44.983017] ret_from_fork_asm+0x1a/0x30 [ 44.983023] </TASK> [ 44.983025] [ 45.175959] Allocated by task 302: [ 45.179364] kasan_save_stack+0x45/0x70 [ 45.183206] kasan_save_track+0x18/0x40 [ 45.187043] kasan_save_alloc_info+0x3b/0x50 [ 45.191315] __kasan_kmalloc+0xb7/0xc0 [ 45.195096] __kmalloc_cache_noprof+0x189/0x420 [ 45.199635] kasan_bitops_generic+0x92/0x1c0 [ 45.203910] kunit_try_run_case+0x1a2/0x480 [ 45.208103] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 45.213502] kthread+0x334/0x6f0 [ 45.216736] ret_from_fork+0x113/0x1d0 [ 45.220487] ret_from_fork_asm+0x1a/0x30 [ 45.224415] [ 45.225914] The buggy address belongs to the object at ffff8881067131a0 [ 45.225914] which belongs to the cache kmalloc-16 of size 16 [ 45.238256] The buggy address is located 8 bytes inside of [ 45.238256] allocated 9-byte region [ffff8881067131a0, ffff8881067131a9) [ 45.250509] [ 45.252008] The buggy address belongs to the physical page: [ 45.257583] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713 [ 45.265588] flags: 0x200000000000000(node=0|zone=2) [ 45.270468] page_type: f5(slab) [ 45.273616] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 45.281364] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 45.289129] page dumped because: kasan: bad access detected [ 45.294700] [ 45.296200] Memory state around the buggy address: [ 45.300992] ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 45.308211] ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 45.315433] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 45.322660] ^ [ 45.327193] ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.334422] ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.341639] ================================================================== [ 45.348864] ================================================================== [ 45.356105] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 45.364286] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302 [ 45.371686] [ 45.373186] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 45.373194] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 45.373197] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 45.373200] Call Trace: [ 45.373201] <TASK> [ 45.373203] dump_stack_lvl+0x73/0xb0 [ 45.373207] print_report+0xd1/0x650 [ 45.373211] ? __virt_addr_valid+0x1db/0x2d0 [ 45.373215] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 45.373220] ? kasan_complete_mode_report_info+0x2a/0x200 [ 45.373225] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 45.373230] kasan_report+0x141/0x180 [ 45.373234] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 45.373240] kasan_check_range+0x10c/0x1c0 [ 45.373244] __kasan_check_write+0x18/0x20 [ 45.373247] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 45.373252] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 45.373257] ? __kmalloc_cache_noprof+0x189/0x420 [ 45.373262] ? trace_hardirqs_on+0x37/0xe0 [ 45.373266] ? kasan_bitops_generic+0x92/0x1c0 [ 45.373271] kasan_bitops_generic+0x116/0x1c0 [ 45.373275] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 45.373280] ? ktime_get_ts64+0x83/0x230 [ 45.373284] kunit_try_run_case+0x1a2/0x480 [ 45.373289] ? __pfx_kunit_try_run_case+0x10/0x10 [ 45.373293] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 45.373297] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 45.373302] ? __kthread_parkme+0x82/0x180 [ 45.373305] ? preempt_count_sub+0x50/0x80 [ 45.373309] ? __pfx_kunit_try_run_case+0x10/0x10 [ 45.373314] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 45.373318] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 45.373322] kthread+0x334/0x6f0 [ 45.373326] ? trace_preempt_on+0x20/0xc0 [ 45.373347] ? __pfx_kthread+0x10/0x10 [ 45.373351] ? _raw_spin_unlock_irq+0x47/0x80 [ 45.373354] ? calculate_sigpending+0x7b/0xa0 [ 45.373359] ? __pfx_kthread+0x10/0x10 [ 45.373363] ret_from_fork+0x113/0x1d0 [ 45.373367] ? __pfx_kthread+0x10/0x10 [ 45.373370] ret_from_fork_asm+0x1a/0x30 [ 45.373389] </TASK> [ 45.373390] [ 45.566271] Allocated by task 302: [ 45.569675] kasan_save_stack+0x45/0x70 [ 45.573515] kasan_save_track+0x18/0x40 [ 45.577366] kasan_save_alloc_info+0x3b/0x50 [ 45.581661] __kasan_kmalloc+0xb7/0xc0 [ 45.585414] __kmalloc_cache_noprof+0x189/0x420 [ 45.589945] kasan_bitops_generic+0x92/0x1c0 [ 45.594220] kunit_try_run_case+0x1a2/0x480 [ 45.598420] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 45.603823] kthread+0x334/0x6f0 [ 45.607054] ret_from_fork+0x113/0x1d0 [ 45.610807] ret_from_fork_asm+0x1a/0x30 [ 45.614735] [ 45.616233] The buggy address belongs to the object at ffff8881067131a0 [ 45.616233] which belongs to the cache kmalloc-16 of size 16 [ 45.628574] The buggy address is located 8 bytes inside of [ 45.628574] allocated 9-byte region [ffff8881067131a0, ffff8881067131a9) [ 45.640829] [ 45.642328] The buggy address belongs to the physical page: [ 45.647926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713 [ 45.655925] flags: 0x200000000000000(node=0|zone=2) [ 45.660804] page_type: f5(slab) [ 45.663951] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 45.671691] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 45.679429] page dumped because: kasan: bad access detected [ 45.685003] [ 45.686502] Memory state around the buggy address: [ 45.691294] ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 45.698514] ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 45.705732] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 45.712951] ^ [ 45.717486] ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.724704] ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.731923] ================================================================== [ 46.519656] ================================================================== [ 46.526895] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 46.535068] Write of size 8 at addr ffff8881067131a8 by task kunit_try_catch/302 [ 46.542460] [ 46.543962] CPU: 3 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 46.543969] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 46.543972] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 46.543975] Call Trace: [ 46.543977] <TASK> [ 46.543979] dump_stack_lvl+0x73/0xb0 [ 46.543983] print_report+0xd1/0x650 [ 46.543987] ? __virt_addr_valid+0x1db/0x2d0 [ 46.543991] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 46.543996] ? kasan_complete_mode_report_info+0x2a/0x200 [ 46.544001] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 46.544005] kasan_report+0x141/0x180 [ 46.544010] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 46.544015] kasan_check_range+0x10c/0x1c0 [ 46.544020] __kasan_check_write+0x18/0x20 [ 46.544023] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 46.544028] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 46.544033] ? __kmalloc_cache_noprof+0x189/0x420 [ 46.544038] ? trace_hardirqs_on+0x37/0xe0 [ 46.544042] ? kasan_bitops_generic+0x92/0x1c0 [ 46.544047] kasan_bitops_generic+0x116/0x1c0 [ 46.544051] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 46.544056] ? ktime_get_ts64+0x83/0x230 [ 46.544060] kunit_try_run_case+0x1a2/0x480 [ 46.544065] ? __pfx_kunit_try_run_case+0x10/0x10 [ 46.544069] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 46.544073] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 46.544077] ? __kthread_parkme+0x82/0x180 [ 46.544081] ? preempt_count_sub+0x50/0x80 [ 46.544085] ? __pfx_kunit_try_run_case+0x10/0x10 [ 46.544089] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 46.544094] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 46.544098] kthread+0x334/0x6f0 [ 46.544101] ? trace_preempt_on+0x20/0xc0 [ 46.544105] ? __pfx_kthread+0x10/0x10 [ 46.544109] ? _raw_spin_unlock_irq+0x47/0x80 [ 46.544113] ? calculate_sigpending+0x7b/0xa0 [ 46.544117] ? __pfx_kthread+0x10/0x10 [ 46.544121] ret_from_fork+0x113/0x1d0 [ 46.544124] ? __pfx_kthread+0x10/0x10 [ 46.544128] ret_from_fork_asm+0x1a/0x30 [ 46.544134] </TASK> [ 46.544135] [ 46.737036] Allocated by task 302: [ 46.740440] kasan_save_stack+0x45/0x70 [ 46.744280] kasan_save_track+0x18/0x40 [ 46.748119] kasan_save_alloc_info+0x3b/0x50 [ 46.752407] __kasan_kmalloc+0xb7/0xc0 [ 46.756162] __kmalloc_cache_noprof+0x189/0x420 [ 46.760694] kasan_bitops_generic+0x92/0x1c0 [ 46.764966] kunit_try_run_case+0x1a2/0x480 [ 46.769154] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 46.774554] kthread+0x334/0x6f0 [ 46.777786] ret_from_fork+0x113/0x1d0 [ 46.781539] ret_from_fork_asm+0x1a/0x30 [ 46.785466] [ 46.786962] The buggy address belongs to the object at ffff8881067131a0 [ 46.786962] which belongs to the cache kmalloc-16 of size 16 [ 46.799295] The buggy address is located 8 bytes inside of [ 46.799295] allocated 9-byte region [ffff8881067131a0, ffff8881067131a9) [ 46.811552] [ 46.813049] The buggy address belongs to the physical page: [ 46.818623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713 [ 46.826622] flags: 0x200000000000000(node=0|zone=2) [ 46.831502] page_type: f5(slab) [ 46.834649] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 46.842396] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 46.850136] page dumped because: kasan: bad access detected [ 46.855709] [ 46.857205] Memory state around the buggy address: [ 46.862000] ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 46.869218] ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 46.876438] >ffff888106713180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 46.883658] ^ [ 46.888191] ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.895409] ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.902627] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 43.365302] ================================================================== [ 43.372572] BUG: KASAN: slab-use-after-free in strnlen+0x73/0x80 [ 43.378578] Read of size 1 at addr ffff8881066e8410 by task kunit_try_catch/300 [ 43.385886] [ 43.387407] CPU: 3 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 43.387415] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 43.387418] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 43.387421] Call Trace: [ 43.387423] <TASK> [ 43.387424] dump_stack_lvl+0x73/0xb0 [ 43.387429] print_report+0xd1/0x650 [ 43.387433] ? __virt_addr_valid+0x1db/0x2d0 [ 43.387437] ? strnlen+0x73/0x80 [ 43.387441] ? kasan_complete_mode_report_info+0x64/0x200 [ 43.387446] ? strnlen+0x73/0x80 [ 43.387450] kasan_report+0x141/0x180 [ 43.387454] ? strnlen+0x73/0x80 [ 43.387459] __asan_report_load1_noabort+0x18/0x20 [ 43.387464] strnlen+0x73/0x80 [ 43.387468] kasan_strings+0x615/0xe80 [ 43.387471] ? trace_hardirqs_on+0x37/0xe0 [ 43.387475] ? __pfx_kasan_strings+0x10/0x10 [ 43.387479] ? finish_task_switch.isra.0+0x153/0x700 [ 43.387483] ? __switch_to+0x544/0xf50 [ 43.387488] ? __schedule+0x10cc/0x2b60 [ 43.387492] ? ktime_get_ts64+0x83/0x230 [ 43.387496] kunit_try_run_case+0x1a2/0x480 [ 43.387501] ? __pfx_kunit_try_run_case+0x10/0x10 [ 43.387505] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 43.387509] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 43.387513] ? __kthread_parkme+0x82/0x180 [ 43.387517] ? preempt_count_sub+0x50/0x80 [ 43.387521] ? __pfx_kunit_try_run_case+0x10/0x10 [ 43.387525] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 43.387530] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 43.387534] kthread+0x334/0x6f0 [ 43.387537] ? trace_preempt_on+0x20/0xc0 [ 43.387541] ? __pfx_kthread+0x10/0x10 [ 43.387545] ? _raw_spin_unlock_irq+0x47/0x80 [ 43.387549] ? calculate_sigpending+0x7b/0xa0 [ 43.387553] ? __pfx_kthread+0x10/0x10 [ 43.387557] ret_from_fork+0x113/0x1d0 [ 43.387560] ? __pfx_kthread+0x10/0x10 [ 43.387564] ret_from_fork_asm+0x1a/0x30 [ 43.387570] </TASK> [ 43.387571] [ 43.564468] Allocated by task 300: [ 43.567875] kasan_save_stack+0x45/0x70 [ 43.571714] kasan_save_track+0x18/0x40 [ 43.575554] kasan_save_alloc_info+0x3b/0x50 [ 43.579826] __kasan_kmalloc+0xb7/0xc0 [ 43.583578] __kmalloc_cache_noprof+0x189/0x420 [ 43.588111] kasan_strings+0xc0/0xe80 [ 43.591778] kunit_try_run_case+0x1a2/0x480 [ 43.595962] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 43.601365] kthread+0x334/0x6f0 [ 43.604620] ret_from_fork+0x113/0x1d0 [ 43.608374] ret_from_fork_asm+0x1a/0x30 [ 43.612326] [ 43.613853] Freed by task 300: [ 43.616911] kasan_save_stack+0x45/0x70 [ 43.620751] kasan_save_track+0x18/0x40 [ 43.624590] kasan_save_free_info+0x3f/0x60 [ 43.628774] __kasan_slab_free+0x56/0x70 [ 43.632702] kfree+0x222/0x3f0 [ 43.635761] kasan_strings+0x2aa/0xe80 [ 43.639513] kunit_try_run_case+0x1a2/0x480 [ 43.643699] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 43.649098] kthread+0x334/0x6f0 [ 43.652349] ret_from_fork+0x113/0x1d0 [ 43.656111] ret_from_fork_asm+0x1a/0x30 [ 43.660035] [ 43.661534] The buggy address belongs to the object at ffff8881066e8400 [ 43.661534] which belongs to the cache kmalloc-32 of size 32 [ 43.673868] The buggy address is located 16 bytes inside of [ 43.673868] freed 32-byte region [ffff8881066e8400, ffff8881066e8420) [ 43.685950] [ 43.687450] The buggy address belongs to the physical page: [ 43.693022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e8 [ 43.701022] flags: 0x200000000000000(node=0|zone=2) [ 43.705909] page_type: f5(slab) [ 43.709055] raw: 0200000000000000 ffff888100042780 dead000000000122 0000000000000000 [ 43.716794] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 43.724532] page dumped because: kasan: bad access detected [ 43.730106] [ 43.731604] Memory state around the buggy address: [ 43.736407] ffff8881066e8300: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 43.743627] ffff8881066e8380: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 43.750844] >ffff8881066e8400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 43.758064] ^ [ 43.761816] ffff8881066e8480: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 43.769037] ffff8881066e8500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 43.776257] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen
[ 42.947370] ================================================================== [ 42.954643] BUG: KASAN: slab-use-after-free in strlen+0x8f/0xb0 [ 42.960571] Read of size 1 at addr ffff8881066e8410 by task kunit_try_catch/300 [ 42.967884] [ 42.969416] CPU: 3 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 42.969424] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 42.969427] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 42.969443] Call Trace: [ 42.969444] <TASK> [ 42.969446] dump_stack_lvl+0x73/0xb0 [ 42.969450] print_report+0xd1/0x650 [ 42.969454] ? __virt_addr_valid+0x1db/0x2d0 [ 42.969458] ? strlen+0x8f/0xb0 [ 42.969462] ? kasan_complete_mode_report_info+0x64/0x200 [ 42.969468] ? strlen+0x8f/0xb0 [ 42.969471] kasan_report+0x141/0x180 [ 42.969476] ? strlen+0x8f/0xb0 [ 42.969480] __asan_report_load1_noabort+0x18/0x20 [ 42.969485] strlen+0x8f/0xb0 [ 42.969489] kasan_strings+0x57b/0xe80 [ 42.969493] ? trace_hardirqs_on+0x37/0xe0 [ 42.969497] ? __pfx_kasan_strings+0x10/0x10 [ 42.969501] ? finish_task_switch.isra.0+0x153/0x700 [ 42.969505] ? __switch_to+0x544/0xf50 [ 42.969509] ? __schedule+0x10cc/0x2b60 [ 42.969513] ? ktime_get_ts64+0x83/0x230 [ 42.969518] kunit_try_run_case+0x1a2/0x480 [ 42.969522] ? __pfx_kunit_try_run_case+0x10/0x10 [ 42.969526] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 42.969531] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 42.969535] ? __kthread_parkme+0x82/0x180 [ 42.969538] ? preempt_count_sub+0x50/0x80 [ 42.969543] ? __pfx_kunit_try_run_case+0x10/0x10 [ 42.969547] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 42.969551] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 42.969555] kthread+0x334/0x6f0 [ 42.969559] ? trace_preempt_on+0x20/0xc0 [ 42.969563] ? __pfx_kthread+0x10/0x10 [ 42.969567] ? _raw_spin_unlock_irq+0x47/0x80 [ 42.969570] ? calculate_sigpending+0x7b/0xa0 [ 42.969575] ? __pfx_kthread+0x10/0x10 [ 42.969579] ret_from_fork+0x113/0x1d0 [ 42.969582] ? __pfx_kthread+0x10/0x10 [ 42.969586] ret_from_fork_asm+0x1a/0x30 [ 42.969592] </TASK> [ 42.969593] [ 43.146096] Allocated by task 300: [ 43.149502] kasan_save_stack+0x45/0x70 [ 43.153402] kasan_save_track+0x18/0x40 [ 43.157250] kasan_save_alloc_info+0x3b/0x50 [ 43.161521] __kasan_kmalloc+0xb7/0xc0 [ 43.165275] __kmalloc_cache_noprof+0x189/0x420 [ 43.169807] kasan_strings+0xc0/0xe80 [ 43.173475] kunit_try_run_case+0x1a2/0x480 [ 43.177659] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 43.183058] kthread+0x334/0x6f0 [ 43.186291] ret_from_fork+0x113/0x1d0 [ 43.190045] ret_from_fork_asm+0x1a/0x30 [ 43.193972] [ 43.195471] Freed by task 300: [ 43.198531] kasan_save_stack+0x45/0x70 [ 43.202382] kasan_save_track+0x18/0x40 [ 43.206250] kasan_save_free_info+0x3f/0x60 [ 43.210437] __kasan_slab_free+0x56/0x70 [ 43.214367] kfree+0x222/0x3f0 [ 43.217422] kasan_strings+0x2aa/0xe80 [ 43.221193] kunit_try_run_case+0x1a2/0x480 [ 43.225412] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 43.230839] kthread+0x334/0x6f0 [ 43.234073] ret_from_fork+0x113/0x1d0 [ 43.237825] ret_from_fork_asm+0x1a/0x30 [ 43.241750] [ 43.243250] The buggy address belongs to the object at ffff8881066e8400 [ 43.243250] which belongs to the cache kmalloc-32 of size 32 [ 43.255592] The buggy address is located 16 bytes inside of [ 43.255592] freed 32-byte region [ffff8881066e8400, ffff8881066e8420) [ 43.267671] [ 43.269172] The buggy address belongs to the physical page: [ 43.274743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e8 [ 43.282744] flags: 0x200000000000000(node=0|zone=2) [ 43.287622] page_type: f5(slab) [ 43.290770] raw: 0200000000000000 ffff888100042780 dead000000000122 0000000000000000 [ 43.298517] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 43.306256] page dumped because: kasan: bad access detected [ 43.311829] [ 43.313328] Memory state around the buggy address: [ 43.318191] ffff8881066e8300: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 43.325419] ffff8881066e8380: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 43.332662] >ffff8881066e8400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 43.339883] ^ [ 43.343634] ffff8881066e8480: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 43.350853] ffff8881066e8500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 43.358072] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 42.529427] ================================================================== [ 42.536661] BUG: KASAN: slab-use-after-free in kasan_strings+0xcbc/0xe80 [ 42.543367] Read of size 1 at addr ffff8881066e8410 by task kunit_try_catch/300 [ 42.550700] [ 42.552199] CPU: 3 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 42.552208] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 42.552210] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 42.552214] Call Trace: [ 42.552215] <TASK> [ 42.552217] dump_stack_lvl+0x73/0xb0 [ 42.552222] print_report+0xd1/0x650 [ 42.552226] ? __virt_addr_valid+0x1db/0x2d0 [ 42.552230] ? kasan_strings+0xcbc/0xe80 [ 42.552233] ? kasan_complete_mode_report_info+0x64/0x200 [ 42.552239] ? kasan_strings+0xcbc/0xe80 [ 42.552242] kasan_report+0x141/0x180 [ 42.552246] ? kasan_strings+0xcbc/0xe80 [ 42.552251] __asan_report_load1_noabort+0x18/0x20 [ 42.552256] kasan_strings+0xcbc/0xe80 [ 42.552259] ? trace_hardirqs_on+0x37/0xe0 [ 42.552263] ? __pfx_kasan_strings+0x10/0x10 [ 42.552267] ? finish_task_switch.isra.0+0x153/0x700 [ 42.552271] ? __switch_to+0x544/0xf50 [ 42.552276] ? __schedule+0x10cc/0x2b60 [ 42.552280] ? ktime_get_ts64+0x83/0x230 [ 42.552284] kunit_try_run_case+0x1a2/0x480 [ 42.552289] ? __pfx_kunit_try_run_case+0x10/0x10 [ 42.552293] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 42.552297] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 42.552301] ? __kthread_parkme+0x82/0x180 [ 42.552305] ? preempt_count_sub+0x50/0x80 [ 42.552309] ? __pfx_kunit_try_run_case+0x10/0x10 [ 42.552314] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 42.552318] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 42.552322] kthread+0x334/0x6f0 [ 42.552325] ? trace_preempt_on+0x20/0xc0 [ 42.552347] ? __pfx_kthread+0x10/0x10 [ 42.552351] ? _raw_spin_unlock_irq+0x47/0x80 [ 42.552354] ? calculate_sigpending+0x7b/0xa0 [ 42.552377] ? __pfx_kthread+0x10/0x10 [ 42.552381] ret_from_fork+0x113/0x1d0 [ 42.552385] ? __pfx_kthread+0x10/0x10 [ 42.552401] ret_from_fork_asm+0x1a/0x30 [ 42.552407] </TASK> [ 42.552409] [ 42.728278] Allocated by task 300: [ 42.731685] kasan_save_stack+0x45/0x70 [ 42.735524] kasan_save_track+0x18/0x40 [ 42.739364] kasan_save_alloc_info+0x3b/0x50 [ 42.743661] __kasan_kmalloc+0xb7/0xc0 [ 42.747415] __kmalloc_cache_noprof+0x189/0x420 [ 42.751947] kasan_strings+0xc0/0xe80 [ 42.755612] kunit_try_run_case+0x1a2/0x480 [ 42.759800] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 42.765207] kthread+0x334/0x6f0 [ 42.768463] ret_from_fork+0x113/0x1d0 [ 42.772218] ret_from_fork_asm+0x1a/0x30 [ 42.776144] [ 42.777642] Freed by task 300: [ 42.780701] kasan_save_stack+0x45/0x70 [ 42.784543] kasan_save_track+0x18/0x40 [ 42.788415] kasan_save_free_info+0x3f/0x60 [ 42.792602] __kasan_slab_free+0x56/0x70 [ 42.796527] kfree+0x222/0x3f0 [ 42.799586] kasan_strings+0x2aa/0xe80 [ 42.803363] kunit_try_run_case+0x1a2/0x480 [ 42.807551] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 42.812950] kthread+0x334/0x6f0 [ 42.816184] ret_from_fork+0x113/0x1d0 [ 42.819935] ret_from_fork_asm+0x1a/0x30 [ 42.823863] [ 42.825363] The buggy address belongs to the object at ffff8881066e8400 [ 42.825363] which belongs to the cache kmalloc-32 of size 32 [ 42.837722] The buggy address is located 16 bytes inside of [ 42.837722] freed 32-byte region [ffff8881066e8400, ffff8881066e8420) [ 42.849801] [ 42.851302] The buggy address belongs to the physical page: [ 42.856874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e8 [ 42.864874] flags: 0x200000000000000(node=0|zone=2) [ 42.869753] page_type: f5(slab) [ 42.872900] raw: 0200000000000000 ffff888100042780 dead000000000122 0000000000000000 [ 42.880646] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 42.888416] page dumped because: kasan: bad access detected [ 42.893994] [ 42.895493] Memory state around the buggy address: [ 42.900286] ffff8881066e8300: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 42.907505] ffff8881066e8380: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 42.914724] >ffff8881066e8400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 42.921942] ^ [ 42.925697] ffff8881066e8480: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 42.932925] ffff8881066e8500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 42.940144] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 42.094876] ================================================================== [ 42.118799] BUG: KASAN: slab-use-after-free in strcmp+0xb0/0xc0 [ 42.124726] Read of size 1 at addr ffff8881066e8410 by task kunit_try_catch/300 [ 42.132042] [ 42.133542] CPU: 3 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 42.133551] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 42.133554] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 42.133558] Call Trace: [ 42.133559] <TASK> [ 42.133561] dump_stack_lvl+0x73/0xb0 [ 42.133566] print_report+0xd1/0x650 [ 42.133570] ? __virt_addr_valid+0x1db/0x2d0 [ 42.133575] ? strcmp+0xb0/0xc0 [ 42.133578] ? kasan_complete_mode_report_info+0x64/0x200 [ 42.133584] ? strcmp+0xb0/0xc0 [ 42.133588] kasan_report+0x141/0x180 [ 42.133592] ? strcmp+0xb0/0xc0 [ 42.133597] __asan_report_load1_noabort+0x18/0x20 [ 42.133601] strcmp+0xb0/0xc0 [ 42.133606] kasan_strings+0x431/0xe80 [ 42.133609] ? trace_hardirqs_on+0x37/0xe0 [ 42.133614] ? __pfx_kasan_strings+0x10/0x10 [ 42.133617] ? finish_task_switch.isra.0+0x153/0x700 [ 42.133621] ? __switch_to+0x544/0xf50 [ 42.133626] ? __schedule+0x10cc/0x2b60 [ 42.133630] ? ktime_get_ts64+0x83/0x230 [ 42.133635] kunit_try_run_case+0x1a2/0x480 [ 42.133639] ? __pfx_kunit_try_run_case+0x10/0x10 [ 42.133644] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 42.133648] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 42.133652] ? __kthread_parkme+0x82/0x180 [ 42.133656] ? preempt_count_sub+0x50/0x80 [ 42.133660] ? __pfx_kunit_try_run_case+0x10/0x10 [ 42.133664] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 42.133669] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 42.133673] kthread+0x334/0x6f0 [ 42.133676] ? trace_preempt_on+0x20/0xc0 [ 42.133680] ? __pfx_kthread+0x10/0x10 [ 42.133684] ? _raw_spin_unlock_irq+0x47/0x80 [ 42.133688] ? calculate_sigpending+0x7b/0xa0 [ 42.133693] ? __pfx_kthread+0x10/0x10 [ 42.133697] ret_from_fork+0x113/0x1d0 [ 42.133700] ? __pfx_kthread+0x10/0x10 [ 42.133704] ret_from_fork_asm+0x1a/0x30 [ 42.133710] </TASK> [ 42.133711] [ 42.310236] Allocated by task 300: [ 42.313640] kasan_save_stack+0x45/0x70 [ 42.317479] kasan_save_track+0x18/0x40 [ 42.321319] kasan_save_alloc_info+0x3b/0x50 [ 42.325626] __kasan_kmalloc+0xb7/0xc0 [ 42.329380] __kmalloc_cache_noprof+0x189/0x420 [ 42.333938] kasan_strings+0xc0/0xe80 [ 42.337604] kunit_try_run_case+0x1a2/0x480 [ 42.341790] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 42.347190] kthread+0x334/0x6f0 [ 42.350423] ret_from_fork+0x113/0x1d0 [ 42.354176] ret_from_fork_asm+0x1a/0x30 [ 42.358108] [ 42.359607] Freed by task 300: [ 42.362668] kasan_save_stack+0x45/0x70 [ 42.366506] kasan_save_track+0x18/0x40 [ 42.370383] kasan_save_free_info+0x3f/0x60 [ 42.374602] __kasan_slab_free+0x56/0x70 [ 42.378529] kfree+0x222/0x3f0 [ 42.381594] kasan_strings+0x2aa/0xe80 [ 42.385364] kunit_try_run_case+0x1a2/0x480 [ 42.389577] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 42.394977] kthread+0x334/0x6f0 [ 42.398208] ret_from_fork+0x113/0x1d0 [ 42.401962] ret_from_fork_asm+0x1a/0x30 [ 42.405889] [ 42.407406] The buggy address belongs to the object at ffff8881066e8400 [ 42.407406] which belongs to the cache kmalloc-32 of size 32 [ 42.419745] The buggy address is located 16 bytes inside of [ 42.419745] freed 32-byte region [ffff8881066e8400, ffff8881066e8420) [ 42.431828] [ 42.433325] The buggy address belongs to the physical page: [ 42.438924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e8 [ 42.446926] flags: 0x200000000000000(node=0|zone=2) [ 42.451803] page_type: f5(slab) [ 42.454952] raw: 0200000000000000 ffff888100042780 dead000000000122 0000000000000000 [ 42.462700] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 42.470445] page dumped because: kasan: bad access detected [ 42.476018] [ 42.477518] Memory state around the buggy address: [ 42.482311] ffff8881066e8300: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 42.489531] ffff8881066e8380: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 42.496750] >ffff8881066e8400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 42.503969] ^ [ 42.507722] ffff8881066e8480: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 42.514942] ffff8881066e8500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 42.522158] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 41.684217] ================================================================== [ 41.695190] BUG: KASAN: slab-out-of-bounds in memcmp+0x1b4/0x1d0 [ 41.701198] Read of size 1 at addr ffff888101328f98 by task kunit_try_catch/298 [ 41.708510] [ 41.710012] CPU: 2 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 41.710021] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 41.710024] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 41.710027] Call Trace: [ 41.710029] <TASK> [ 41.710031] dump_stack_lvl+0x73/0xb0 [ 41.710036] print_report+0xd1/0x650 [ 41.710040] ? __virt_addr_valid+0x1db/0x2d0 [ 41.710044] ? memcmp+0x1b4/0x1d0 [ 41.710047] ? kasan_complete_mode_report_info+0x2a/0x200 [ 41.710052] ? memcmp+0x1b4/0x1d0 [ 41.710055] kasan_report+0x141/0x180 [ 41.710059] ? memcmp+0x1b4/0x1d0 [ 41.710063] __asan_report_load1_noabort+0x18/0x20 [ 41.710068] memcmp+0x1b4/0x1d0 [ 41.710071] kasan_memcmp+0x18f/0x390 [ 41.710075] ? trace_hardirqs_on+0x37/0xe0 [ 41.710079] ? __pfx_kasan_memcmp+0x10/0x10 [ 41.710083] ? finish_task_switch.isra.0+0x153/0x700 [ 41.710087] ? __switch_to+0x544/0xf50 [ 41.710092] ? ktime_get_ts64+0x83/0x230 [ 41.710096] kunit_try_run_case+0x1a2/0x480 [ 41.710101] ? __pfx_kunit_try_run_case+0x10/0x10 [ 41.710105] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 41.710110] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 41.710114] ? __kthread_parkme+0x82/0x180 [ 41.710117] ? preempt_count_sub+0x50/0x80 [ 41.710121] ? __pfx_kunit_try_run_case+0x10/0x10 [ 41.710126] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 41.710130] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 41.710134] kthread+0x334/0x6f0 [ 41.710138] ? trace_preempt_on+0x20/0xc0 [ 41.710142] ? __pfx_kthread+0x10/0x10 [ 41.710146] ? _raw_spin_unlock_irq+0x47/0x80 [ 41.710150] ? calculate_sigpending+0x7b/0xa0 [ 41.710154] ? __pfx_kthread+0x10/0x10 [ 41.710158] ret_from_fork+0x113/0x1d0 [ 41.710161] ? __pfx_kthread+0x10/0x10 [ 41.710165] ret_from_fork_asm+0x1a/0x30 [ 41.710171] </TASK> [ 41.710173] [ 41.883391] Allocated by task 298: [ 41.886802] kasan_save_stack+0x45/0x70 [ 41.890650] kasan_save_track+0x18/0x40 [ 41.894489] kasan_save_alloc_info+0x3b/0x50 [ 41.898769] __kasan_kmalloc+0xb7/0xc0 [ 41.902521] __kmalloc_cache_noprof+0x189/0x420 [ 41.907056] kasan_memcmp+0xb7/0x390 [ 41.910635] kunit_try_run_case+0x1a2/0x480 [ 41.914819] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 41.920219] kthread+0x334/0x6f0 [ 41.923452] ret_from_fork+0x113/0x1d0 [ 41.927206] ret_from_fork_asm+0x1a/0x30 [ 41.931129] [ 41.932629] The buggy address belongs to the object at ffff888101328f80 [ 41.932629] which belongs to the cache kmalloc-32 of size 32 [ 41.944972] The buggy address is located 0 bytes to the right of [ 41.944972] allocated 24-byte region [ffff888101328f80, ffff888101328f98) [ 41.957841] [ 41.959349] The buggy address belongs to the physical page: [ 41.964949] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101328 [ 41.972957] flags: 0x200000000000000(node=0|zone=2) [ 41.977843] page_type: f5(slab) [ 41.980991] raw: 0200000000000000 ffff888100042780 dead000000000122 0000000000000000 [ 41.988737] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 41.996477] page dumped because: kasan: bad access detected [ 42.002050] [ 42.003548] Memory state around the buggy address: [ 42.008350] ffff888101328e80: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 42.015596] ffff888101328f00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 42.022814] >ffff888101328f80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.030033] ^ [ 42.034046] ffff888101329000: fa fb fb fb fb fb fb fb fb fb fc fc fc fc fa fb [ 42.041268] ffff888101329080: fb fb fb fb fb fb fb fb fc fc fc fc fa fb fb fb [ 42.048485] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 41.341990] ================================================================== [ 41.353404] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x329/0x390 [ 41.360979] Read of size 1 at addr ffff8881081bfc4a by task kunit_try_catch/294 [ 41.368284] [ 41.369786] CPU: 3 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 41.369795] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 41.369798] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 41.369801] Call Trace: [ 41.369802] <TASK> [ 41.369804] dump_stack_lvl+0x73/0xb0 [ 41.369809] print_report+0xd1/0x650 [ 41.369813] ? __virt_addr_valid+0x1db/0x2d0 [ 41.369817] ? kasan_alloca_oob_right+0x329/0x390 [ 41.369821] ? kasan_addr_to_slab+0x11/0xa0 [ 41.369825] ? kasan_alloca_oob_right+0x329/0x390 [ 41.369829] kasan_report+0x141/0x180 [ 41.369833] ? kasan_alloca_oob_right+0x329/0x390 [ 41.369838] __asan_report_load1_noabort+0x18/0x20 [ 41.369842] kasan_alloca_oob_right+0x329/0x390 [ 41.369846] ? __kasan_check_write+0x18/0x20 [ 41.369850] ? __pfx_sched_clock_cpu+0x10/0x10 [ 41.369853] ? finish_task_switch.isra.0+0x153/0x700 [ 41.369857] ? __ww_mutex_lock.constprop.0+0x1dbe/0x1e90 [ 41.369862] ? trace_hardirqs_on+0x37/0xe0 [ 41.369867] ? __pfx_kasan_alloca_oob_right+0x10/0x10 [ 41.369871] ? __schedule+0x10cc/0x2b60 [ 41.369875] ? ktime_get_ts64+0x83/0x230 [ 41.369880] kunit_try_run_case+0x1a2/0x480 [ 41.369884] ? __pfx_kunit_try_run_case+0x10/0x10 [ 41.369888] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 41.369893] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 41.369897] ? __kthread_parkme+0x82/0x180 [ 41.369900] ? preempt_count_sub+0x50/0x80 [ 41.369904] ? __pfx_kunit_try_run_case+0x10/0x10 [ 41.369909] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 41.369913] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 41.369918] kthread+0x334/0x6f0 [ 41.369921] ? trace_preempt_on+0x20/0xc0 [ 41.369925] ? __pfx_kthread+0x10/0x10 [ 41.369929] ? _raw_spin_unlock_irq+0x47/0x80 [ 41.369933] ? calculate_sigpending+0x7b/0xa0 [ 41.369937] ? __pfx_kthread+0x10/0x10 [ 41.369941] ret_from_fork+0x113/0x1d0 [ 41.369945] ? __pfx_kthread+0x10/0x10 [ 41.369948] ret_from_fork_asm+0x1a/0x30 [ 41.369954] </TASK> [ 41.369956] [ 41.558753] The buggy address belongs to stack of task kunit_try_catch/294 [ 41.565628] [ 41.567124] The buggy address belongs to the physical page: [ 41.572697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1081bf [ 41.580705] flags: 0x200000000000000(node=0|zone=2) [ 41.585586] raw: 0200000000000000 ffffea0004206fc8 ffffea0004206fc8 0000000000000000 [ 41.593361] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 41.601123] page dumped because: kasan: bad access detected [ 41.606694] [ 41.608187] Memory state around the buggy address: [ 41.612979] ffff8881081bfb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.620197] ffff8881081bfb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.627419] >ffff8881081bfc00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 41.634637] ^ [ 41.640211] ffff8881081bfc80: 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00 [ 41.647437] ffff8881081bfd00: 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 41.654657] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 41.023303] ================================================================== [ 41.034195] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x320/0x380 [ 41.041674] Read of size 1 at addr ffff888108327c3f by task kunit_try_catch/292 [ 41.048979] [ 41.050474] CPU: 3 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 41.050482] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 41.050485] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 41.050488] Call Trace: [ 41.050490] <TASK> [ 41.050492] dump_stack_lvl+0x73/0xb0 [ 41.050496] print_report+0xd1/0x650 [ 41.050500] ? __virt_addr_valid+0x1db/0x2d0 [ 41.050504] ? kasan_alloca_oob_left+0x320/0x380 [ 41.050508] ? kasan_addr_to_slab+0x11/0xa0 [ 41.050512] ? kasan_alloca_oob_left+0x320/0x380 [ 41.050516] kasan_report+0x141/0x180 [ 41.050520] ? kasan_alloca_oob_left+0x320/0x380 [ 41.050525] __asan_report_load1_noabort+0x18/0x20 [ 41.050530] kasan_alloca_oob_left+0x320/0x380 [ 41.050533] ? __kasan_check_write+0x18/0x20 [ 41.050537] ? __pfx_sched_clock_cpu+0x10/0x10 [ 41.050541] ? finish_task_switch.isra.0+0x153/0x700 [ 41.050545] ? __ww_mutex_lock.constprop.0+0x1dbe/0x1e90 [ 41.050550] ? trace_hardirqs_on+0x37/0xe0 [ 41.050554] ? __pfx_kasan_alloca_oob_left+0x10/0x10 [ 41.050559] ? __schedule+0x10cc/0x2b60 [ 41.050563] ? ktime_get_ts64+0x83/0x230 [ 41.050567] kunit_try_run_case+0x1a2/0x480 [ 41.050572] ? __pfx_kunit_try_run_case+0x10/0x10 [ 41.050576] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 41.050580] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 41.050584] ? __kthread_parkme+0x82/0x180 [ 41.050588] ? preempt_count_sub+0x50/0x80 [ 41.050592] ? __pfx_kunit_try_run_case+0x10/0x10 [ 41.050596] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 41.050600] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 41.050605] kthread+0x334/0x6f0 [ 41.050608] ? trace_preempt_on+0x20/0xc0 [ 41.050612] ? __pfx_kthread+0x10/0x10 [ 41.050616] ? _raw_spin_unlock_irq+0x47/0x80 [ 41.050620] ? calculate_sigpending+0x7b/0xa0 [ 41.050624] ? __pfx_kthread+0x10/0x10 [ 41.050628] ret_from_fork+0x113/0x1d0 [ 41.050631] ? __pfx_kthread+0x10/0x10 [ 41.050635] ret_from_fork_asm+0x1a/0x30 [ 41.050641] </TASK> [ 41.050643] [ 41.239049] The buggy address belongs to stack of task kunit_try_catch/292 [ 41.245923] [ 41.247421] The buggy address belongs to the physical page: [ 41.252993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108327 [ 41.261001] flags: 0x200000000000000(node=0|zone=2) [ 41.265883] raw: 0200000000000000 ffffea000420c9c8 ffffea000420c9c8 0000000000000000 [ 41.273628] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 41.281369] page dumped because: kasan: bad access detected [ 41.286967] [ 41.288464] Memory state around the buggy address: [ 41.293258] ffff888108327b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.300479] ffff888108327b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.307705] >ffff888108327c00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 41.314926] ^ [ 41.319978] ffff888108327c80: 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00 [ 41.327197] ffff888108327d00: 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 41.334416] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 40.692415] ================================================================== [ 40.707491] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x2b5/0x300 [ 40.714371] Read of size 1 at addr ffff88810830fd02 by task kunit_try_catch/290 [ 40.721702] [ 40.723204] CPU: 3 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 40.723213] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 40.723216] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 40.723219] Call Trace: [ 40.723221] <TASK> [ 40.723223] dump_stack_lvl+0x73/0xb0 [ 40.723228] print_report+0xd1/0x650 [ 40.723232] ? __virt_addr_valid+0x1db/0x2d0 [ 40.723236] ? kasan_stack_oob+0x2b5/0x300 [ 40.723239] ? kasan_addr_to_slab+0x11/0xa0 [ 40.723243] ? kasan_stack_oob+0x2b5/0x300 [ 40.723246] kasan_report+0x141/0x180 [ 40.723250] ? kasan_stack_oob+0x2b5/0x300 [ 40.723255] __asan_report_load1_noabort+0x18/0x20 [ 40.723259] kasan_stack_oob+0x2b5/0x300 [ 40.723263] ? __pfx_kasan_stack_oob+0x10/0x10 [ 40.723266] ? finish_task_switch.isra.0+0x153/0x700 [ 40.723270] ? __switch_to+0x544/0xf50 [ 40.723276] ? __schedule+0x10cc/0x2b60 [ 40.723280] ? ktime_get_ts64+0x83/0x230 [ 40.723285] kunit_try_run_case+0x1a2/0x480 [ 40.723289] ? __pfx_kunit_try_run_case+0x10/0x10 [ 40.723293] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 40.723298] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 40.723302] ? __kthread_parkme+0x82/0x180 [ 40.723305] ? preempt_count_sub+0x50/0x80 [ 40.723310] ? __pfx_kunit_try_run_case+0x10/0x10 [ 40.723314] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 40.723318] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 40.723322] kthread+0x334/0x6f0 [ 40.723326] ? trace_preempt_on+0x20/0xc0 [ 40.723347] ? __pfx_kthread+0x10/0x10 [ 40.723351] ? _raw_spin_unlock_irq+0x47/0x80 [ 40.723355] ? calculate_sigpending+0x7b/0xa0 [ 40.723360] ? __pfx_kthread+0x10/0x10 [ 40.723364] ret_from_fork+0x113/0x1d0 [ 40.723379] ? __pfx_kthread+0x10/0x10 [ 40.723383] ret_from_fork_asm+0x1a/0x30 [ 40.723389] </TASK> [ 40.723390] [ 40.894768] The buggy address belongs to stack of task kunit_try_catch/290 [ 40.901648] and is located at offset 138 in frame: [ 40.906527] kasan_stack_oob+0x0/0x300 [ 40.910279] [ 40.911778] This frame has 4 objects: [ 40.915447] [48, 49) '__assertion' [ 40.915451] [64, 72) 'array' [ 40.918947] [96, 112) '__assertion' [ 40.921918] [128, 138) 'stack_array' [ 40.925500] [ 40.930665] The buggy address belongs to the physical page: [ 40.936236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10830f [ 40.944236] flags: 0x200000000000000(node=0|zone=2) [ 40.949117] raw: 0200000000000000 ffffea000420c3c8 ffffea000420c3c8 0000000000000000 [ 40.956865] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 40.964609] page dumped because: kasan: bad access detected [ 40.970182] [ 40.971675] Memory state around the buggy address: [ 40.976466] ffff88810830fc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 40.983686] ffff88810830fc80: f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 00 00 f2 f2 00 [ 40.990906] >ffff88810830fd00: 02 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 40.998125] ^ [ 41.001364] ffff88810830fd80: f1 f1 f1 00 00 f2 f2 00 00 f2 f2 00 00 f3 f3 00 [ 41.008611] ffff88810830fe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.015830] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 40.389062] ================================================================== [ 40.401619] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0 [ 40.409193] Read of size 1 at addr ffffffffaaa61e8d by task kunit_try_catch/286 [ 40.416507] [ 40.418009] CPU: 3 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 40.418018] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 40.418021] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 40.418024] Call Trace: [ 40.418026] <TASK> [ 40.418028] dump_stack_lvl+0x73/0xb0 [ 40.418033] print_report+0xd1/0x650 [ 40.418037] ? __virt_addr_valid+0x1db/0x2d0 [ 40.418041] ? kasan_global_oob_right+0x286/0x2d0 [ 40.418045] ? kasan_addr_to_slab+0x11/0xa0 [ 40.418048] ? kasan_global_oob_right+0x286/0x2d0 [ 40.418052] kasan_report+0x141/0x180 [ 40.418056] ? kasan_global_oob_right+0x286/0x2d0 [ 40.418061] __asan_report_load1_noabort+0x18/0x20 [ 40.418065] kasan_global_oob_right+0x286/0x2d0 [ 40.418069] ? __pfx_kasan_global_oob_right+0x10/0x10 [ 40.418074] ? __schedule+0x10cc/0x2b60 [ 40.418078] ? ktime_get_ts64+0x83/0x230 [ 40.418082] kunit_try_run_case+0x1a2/0x480 [ 40.418087] ? __pfx_kunit_try_run_case+0x10/0x10 [ 40.418091] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 40.418096] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 40.418100] ? __kthread_parkme+0x82/0x180 [ 40.418104] ? preempt_count_sub+0x50/0x80 [ 40.418108] ? __pfx_kunit_try_run_case+0x10/0x10 [ 40.418112] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 40.418116] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 40.418121] kthread+0x334/0x6f0 [ 40.418124] ? trace_preempt_on+0x20/0xc0 [ 40.418129] ? __pfx_kthread+0x10/0x10 [ 40.418132] ? _raw_spin_unlock_irq+0x47/0x80 [ 40.418136] ? calculate_sigpending+0x7b/0xa0 [ 40.418141] ? __pfx_kthread+0x10/0x10 [ 40.418145] ret_from_fork+0x113/0x1d0 [ 40.418148] ? __pfx_kthread+0x10/0x10 [ 40.418152] ret_from_fork_asm+0x1a/0x30 [ 40.418158] </TASK> [ 40.418159] [ 40.583913] The buggy address belongs to the variable: [ 40.589052] global_array+0xd/0x40 [ 40.592467] [ 40.593965] The buggy address belongs to the physical page: [ 40.599537] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x3a9861 [ 40.607538] flags: 0x200000000002000(reserved|node=0|zone=2) [ 40.613207] raw: 0200000000002000 ffffea000ea61848 ffffea000ea61848 0000000000000000 [ 40.620953] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 40.628693] page dumped because: kasan: bad access detected [ 40.634264] [ 40.635764] Memory state around the buggy address: [ 40.640556] ffffffffaaa61d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.647778] ffffffffaaa61e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.655004] >ffffffffaaa61e80: 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 40.662223] ^ [ 40.665718] ffffffffaaa61f00: 04 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 [ 40.672936] ffffffffaaa61f80: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 40.680155] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 40.023043] ================================================================== [ 40.035072] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 40.043081] Free of addr ffff888104eb8001 by task kunit_try_catch/284 [ 40.049527] [ 40.051028] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 40.051037] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 40.051040] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 40.051044] Call Trace: [ 40.051046] <TASK> [ 40.051048] dump_stack_lvl+0x73/0xb0 [ 40.051053] print_report+0xd1/0x650 [ 40.051057] ? __virt_addr_valid+0x1db/0x2d0 [ 40.051061] ? kasan_addr_to_slab+0x11/0xa0 [ 40.051064] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 40.051070] kasan_report_invalid_free+0x10a/0x130 [ 40.051074] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 40.051079] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 40.051084] __kasan_mempool_poison_object+0x102/0x1d0 [ 40.051089] mempool_free+0x2ec/0x380 [ 40.051094] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 40.051098] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 40.051104] ? __pfx_sched_clock_cpu+0x10/0x10 [ 40.051108] ? finish_task_switch.isra.0+0x153/0x700 [ 40.051112] mempool_kmalloc_large_invalid_free+0xed/0x140 [ 40.051117] ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10 [ 40.051122] ? __pfx_mempool_kmalloc+0x10/0x10 [ 40.051126] ? __pfx_mempool_kfree+0x10/0x10 [ 40.051131] ? ktime_get_ts64+0x83/0x230 [ 40.051136] kunit_try_run_case+0x1a2/0x480 [ 40.051140] ? __pfx_kunit_try_run_case+0x10/0x10 [ 40.051144] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 40.051149] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 40.051153] ? __kthread_parkme+0x82/0x180 [ 40.051157] ? preempt_count_sub+0x50/0x80 [ 40.051161] ? __pfx_kunit_try_run_case+0x10/0x10 [ 40.051165] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 40.051169] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 40.051174] kthread+0x334/0x6f0 [ 40.051177] ? trace_preempt_on+0x20/0xc0 [ 40.051181] ? __pfx_kthread+0x10/0x10 [ 40.051185] ? _raw_spin_unlock_irq+0x47/0x80 [ 40.051189] ? calculate_sigpending+0x7b/0xa0 [ 40.051193] ? __pfx_kthread+0x10/0x10 [ 40.051197] ret_from_fork+0x113/0x1d0 [ 40.051200] ? __pfx_kthread+0x10/0x10 [ 40.051204] ret_from_fork_asm+0x1a/0x30 [ 40.051210] </TASK> [ 40.051212] [ 40.253515] The buggy address belongs to the physical page: [ 40.259086] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104eb8 [ 40.267085] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 40.274739] flags: 0x200000000000040(head|node=0|zone=2) [ 40.280051] page_type: f8(unknown) [ 40.283458] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 40.291205] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 40.298945] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 40.306772] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 40.314597] head: 0200000000000002 ffffea000413ae01 00000000ffffffff 00000000ffffffff [ 40.322424] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 40.330256] page dumped because: kasan: bad access detected [ 40.335829] [ 40.337330] Memory state around the buggy address: [ 40.342150] ffff888104eb7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 40.349378] ffff888104eb7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 40.356621] >ffff888104eb8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.363839] ^ [ 40.367075] ffff888104eb8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.374302] ffff888104eb8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.381519] ================================================================== [ 39.594219] ================================================================== [ 39.606404] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 39.614412] Free of addr ffff8881066f8f01 by task kunit_try_catch/282 [ 39.620852] [ 39.622365] CPU: 3 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 39.622374] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 39.622389] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 39.622393] Call Trace: [ 39.622394] <TASK> [ 39.622396] dump_stack_lvl+0x73/0xb0 [ 39.622401] print_report+0xd1/0x650 [ 39.622405] ? __virt_addr_valid+0x1db/0x2d0 [ 39.622409] ? kasan_complete_mode_report_info+0x2a/0x200 [ 39.622414] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 39.622419] kasan_report_invalid_free+0x10a/0x130 [ 39.622424] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 39.622429] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 39.622434] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 39.622438] check_slab_allocation+0x11f/0x130 [ 39.622442] __kasan_mempool_poison_object+0x91/0x1d0 [ 39.622447] mempool_free+0x2ec/0x380 [ 39.622452] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 39.622456] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 39.622462] ? __kasan_check_write+0x18/0x20 [ 39.622465] ? __pfx_sched_clock_cpu+0x10/0x10 [ 39.622469] ? finish_task_switch.isra.0+0x153/0x700 [ 39.622474] mempool_kmalloc_invalid_free+0xed/0x140 [ 39.622478] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10 [ 39.622483] ? __pfx_mempool_kmalloc+0x10/0x10 [ 39.622487] ? __pfx_mempool_kfree+0x10/0x10 [ 39.622492] ? ktime_get_ts64+0x83/0x230 [ 39.622496] kunit_try_run_case+0x1a2/0x480 [ 39.622501] ? __pfx_kunit_try_run_case+0x10/0x10 [ 39.622505] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 39.622509] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 39.622513] ? __kthread_parkme+0x82/0x180 [ 39.622517] ? preempt_count_sub+0x50/0x80 [ 39.622521] ? __pfx_kunit_try_run_case+0x10/0x10 [ 39.622526] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 39.622530] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 39.622534] kthread+0x334/0x6f0 [ 39.622538] ? trace_preempt_on+0x20/0xc0 [ 39.622542] ? __pfx_kthread+0x10/0x10 [ 39.622545] ? _raw_spin_unlock_irq+0x47/0x80 [ 39.622549] ? calculate_sigpending+0x7b/0xa0 [ 39.622554] ? __pfx_kthread+0x10/0x10 [ 39.622558] ret_from_fork+0x113/0x1d0 [ 39.622561] ? __pfx_kthread+0x10/0x10 [ 39.622565] ret_from_fork_asm+0x1a/0x30 [ 39.622570] </TASK> [ 39.622572] [ 39.839578] Allocated by task 282: [ 39.842986] kasan_save_stack+0x45/0x70 [ 39.846831] kasan_save_track+0x18/0x40 [ 39.850672] kasan_save_alloc_info+0x3b/0x50 [ 39.854945] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 39.860259] remove_element+0x11e/0x190 [ 39.864106] mempool_alloc_preallocated+0x4d/0x90 [ 39.868812] mempool_kmalloc_invalid_free_helper+0x83/0x2e0 [ 39.874405] mempool_kmalloc_invalid_free+0xed/0x140 [ 39.879387] kunit_try_run_case+0x1a2/0x480 [ 39.883578] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 39.888979] kthread+0x334/0x6f0 [ 39.892210] ret_from_fork+0x113/0x1d0 [ 39.895963] ret_from_fork_asm+0x1a/0x30 [ 39.899889] [ 39.901409] The buggy address belongs to the object at ffff8881066f8f00 [ 39.901409] which belongs to the cache kmalloc-128 of size 128 [ 39.913923] The buggy address is located 1 bytes inside of [ 39.913923] 128-byte region [ffff8881066f8f00, ffff8881066f8f80) [ 39.925492] [ 39.926991] The buggy address belongs to the physical page: [ 39.932563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f8 [ 39.940570] flags: 0x200000000000000(node=0|zone=2) [ 39.945451] page_type: f5(slab) [ 39.948599] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 39.956370] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 39.964134] page dumped because: kasan: bad access detected [ 39.969708] [ 39.971207] Memory state around the buggy address: [ 39.976000] ffff8881066f8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 39.983221] ffff8881066f8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.990438] >ffff8881066f8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.997658] ^ [ 40.000890] ffff8881066f8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.008111] ffff8881066f9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 40.015347] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 39.275428] ================================================================== [ 39.287887] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 39.295030] Free of addr ffff8881081fc000 by task kunit_try_catch/280 [ 39.301478] [ 39.302976] CPU: 3 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 39.302985] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 39.302988] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 39.302991] Call Trace: [ 39.302993] <TASK> [ 39.302995] dump_stack_lvl+0x73/0xb0 [ 39.302999] print_report+0xd1/0x650 [ 39.303003] ? __virt_addr_valid+0x1db/0x2d0 [ 39.303007] ? kasan_addr_to_slab+0x11/0xa0 [ 39.303011] ? mempool_double_free_helper+0x184/0x370 [ 39.303016] kasan_report_invalid_free+0x10a/0x130 [ 39.303020] ? mempool_double_free_helper+0x184/0x370 [ 39.303025] ? mempool_double_free_helper+0x184/0x370 [ 39.303029] __kasan_mempool_poison_pages+0x115/0x130 [ 39.303034] mempool_free+0x290/0x380 [ 39.303039] mempool_double_free_helper+0x184/0x370 [ 39.303043] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 39.303048] ? __pfx_sched_clock_cpu+0x10/0x10 [ 39.303052] ? finish_task_switch.isra.0+0x153/0x700 [ 39.303057] mempool_page_alloc_double_free+0xe8/0x140 [ 39.303062] ? __pfx_mempool_page_alloc_double_free+0x10/0x10 [ 39.303067] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 39.303072] ? __pfx_mempool_free_pages+0x10/0x10 [ 39.303077] ? ktime_get_ts64+0x83/0x230 [ 39.303081] kunit_try_run_case+0x1a2/0x480 [ 39.303086] ? __pfx_kunit_try_run_case+0x10/0x10 [ 39.303090] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 39.303094] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 39.303098] ? __kthread_parkme+0x82/0x180 [ 39.303102] ? preempt_count_sub+0x50/0x80 [ 39.303106] ? __pfx_kunit_try_run_case+0x10/0x10 [ 39.303111] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 39.303115] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 39.303119] kthread+0x334/0x6f0 [ 39.303122] ? trace_preempt_on+0x20/0xc0 [ 39.303126] ? __pfx_kthread+0x10/0x10 [ 39.303130] ? _raw_spin_unlock_irq+0x47/0x80 [ 39.303134] ? calculate_sigpending+0x7b/0xa0 [ 39.303138] ? __pfx_kthread+0x10/0x10 [ 39.303142] ret_from_fork+0x113/0x1d0 [ 39.303146] ? __pfx_kthread+0x10/0x10 [ 39.303149] ret_from_fork_asm+0x1a/0x30 [ 39.303155] </TASK> [ 39.303157] [ 39.501562] The buggy address belongs to the physical page: [ 39.507137] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1081fc [ 39.515145] flags: 0x200000000000000(node=0|zone=2) [ 39.520034] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 39.527780] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.535517] page dumped because: kasan: bad access detected [ 39.541090] [ 39.542582] Memory state around the buggy address: [ 39.547375] ffff8881081fbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.554621] ffff8881081fbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.561839] >ffff8881081fc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.569058] ^ [ 39.572290] ffff8881081fc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.579510] ffff8881081fc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.586729] ================================================================== [ 38.909901] ================================================================== [ 38.921836] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 38.928977] Free of addr ffff8881081fc000 by task kunit_try_catch/278 [ 38.935423] [ 38.936925] CPU: 3 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 38.936934] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 38.936937] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 38.936941] Call Trace: [ 38.936942] <TASK> [ 38.936944] dump_stack_lvl+0x73/0xb0 [ 38.936949] print_report+0xd1/0x650 [ 38.936953] ? __virt_addr_valid+0x1db/0x2d0 [ 38.936958] ? kasan_addr_to_slab+0x11/0xa0 [ 38.936961] ? mempool_double_free_helper+0x184/0x370 [ 38.936966] kasan_report_invalid_free+0x10a/0x130 [ 38.936970] ? mempool_double_free_helper+0x184/0x370 [ 38.936975] ? mempool_double_free_helper+0x184/0x370 [ 38.936980] __kasan_mempool_poison_object+0x1b3/0x1d0 [ 38.936984] mempool_free+0x2ec/0x380 [ 38.936989] mempool_double_free_helper+0x184/0x370 [ 38.936993] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 38.936998] ? __kasan_check_write+0x18/0x20 [ 38.937002] ? __pfx_sched_clock_cpu+0x10/0x10 [ 38.937005] ? finish_task_switch.isra.0+0x153/0x700 [ 38.937010] mempool_kmalloc_large_double_free+0xed/0x140 [ 38.937015] ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10 [ 38.937020] ? __pfx_mempool_kmalloc+0x10/0x10 [ 38.937024] ? __pfx_mempool_kfree+0x10/0x10 [ 38.937029] ? ktime_get_ts64+0x83/0x230 [ 38.937033] kunit_try_run_case+0x1a2/0x480 [ 38.937038] ? __pfx_kunit_try_run_case+0x10/0x10 [ 38.937042] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 38.937046] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 38.937051] ? __kthread_parkme+0x82/0x180 [ 38.937054] ? preempt_count_sub+0x50/0x80 [ 38.937058] ? __pfx_kunit_try_run_case+0x10/0x10 [ 38.937063] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 38.937067] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 38.937071] kthread+0x334/0x6f0 [ 38.937075] ? trace_preempt_on+0x20/0xc0 [ 38.937079] ? __pfx_kthread+0x10/0x10 [ 38.937083] ? _raw_spin_unlock_irq+0x47/0x80 [ 38.937086] ? calculate_sigpending+0x7b/0xa0 [ 38.937091] ? __pfx_kthread+0x10/0x10 [ 38.937095] ret_from_fork+0x113/0x1d0 [ 38.937098] ? __pfx_kthread+0x10/0x10 [ 38.937102] ret_from_fork_asm+0x1a/0x30 [ 38.937108] </TASK> [ 38.937109] [ 39.139767] The buggy address belongs to the physical page: [ 39.145363] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1081fc [ 39.153407] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 39.161058] flags: 0x200000000000040(head|node=0|zone=2) [ 39.166372] page_type: f8(unknown) [ 39.169806] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 39.177554] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 39.185303] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 39.193137] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 39.200970] head: 0200000000000002 ffffea0004207f01 00000000ffffffff 00000000ffffffff [ 39.208797] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 39.216629] page dumped because: kasan: bad access detected [ 39.222202] [ 39.223702] Memory state around the buggy address: [ 39.228495] ffff8881081fbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.235715] ffff8881081fbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.242944] >ffff8881081fc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.250171] ^ [ 39.253410] ffff8881081fc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.260630] ffff8881081fc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.267849] ================================================================== [ 38.433024] ================================================================== [ 38.444521] BUG: KASAN: double-free in mempool_double_free_helper+0x184/0x370 [ 38.451661] Free of addr ffff8881066f8b00 by task kunit_try_catch/276 [ 38.458101] [ 38.459603] CPU: 3 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 38.459612] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 38.459615] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 38.459619] Call Trace: [ 38.459620] <TASK> [ 38.459622] dump_stack_lvl+0x73/0xb0 [ 38.459627] print_report+0xd1/0x650 [ 38.459631] ? __virt_addr_valid+0x1db/0x2d0 [ 38.459636] ? kasan_complete_mode_report_info+0x64/0x200 [ 38.459641] ? mempool_double_free_helper+0x184/0x370 [ 38.459645] kasan_report_invalid_free+0x10a/0x130 [ 38.459650] ? mempool_double_free_helper+0x184/0x370 [ 38.459655] ? mempool_double_free_helper+0x184/0x370 [ 38.459659] ? mempool_double_free_helper+0x184/0x370 [ 38.459663] check_slab_allocation+0x101/0x130 [ 38.459667] __kasan_mempool_poison_object+0x91/0x1d0 [ 38.459672] mempool_free+0x2ec/0x380 [ 38.459677] mempool_double_free_helper+0x184/0x370 [ 38.459681] ? __pfx_mempool_double_free_helper+0x10/0x10 [ 38.459686] ? __kasan_check_write+0x18/0x20 [ 38.459690] ? __pfx_sched_clock_cpu+0x10/0x10 [ 38.459693] ? finish_task_switch.isra.0+0x153/0x700 [ 38.459698] mempool_kmalloc_double_free+0xed/0x140 [ 38.459703] ? __pfx_mempool_kmalloc_double_free+0x10/0x10 [ 38.459708] ? __pfx_mempool_kmalloc+0x10/0x10 [ 38.459712] ? __pfx_mempool_kfree+0x10/0x10 [ 38.459717] ? ktime_get_ts64+0x83/0x230 [ 38.459721] kunit_try_run_case+0x1a2/0x480 [ 38.459726] ? __pfx_kunit_try_run_case+0x10/0x10 [ 38.459730] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 38.459735] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 38.459739] ? __kthread_parkme+0x82/0x180 [ 38.459742] ? preempt_count_sub+0x50/0x80 [ 38.459747] ? __pfx_kunit_try_run_case+0x10/0x10 [ 38.459751] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 38.459755] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 38.459760] kthread+0x334/0x6f0 [ 38.459763] ? trace_preempt_on+0x20/0xc0 [ 38.459767] ? __pfx_kthread+0x10/0x10 [ 38.459771] ? _raw_spin_unlock_irq+0x47/0x80 [ 38.459775] ? calculate_sigpending+0x7b/0xa0 [ 38.459779] ? __pfx_kthread+0x10/0x10 [ 38.459783] ret_from_fork+0x113/0x1d0 [ 38.459786] ? __pfx_kthread+0x10/0x10 [ 38.459790] ret_from_fork_asm+0x1a/0x30 [ 38.459796] </TASK> [ 38.459798] [ 38.671906] Allocated by task 276: [ 38.675314] kasan_save_stack+0x45/0x70 [ 38.679162] kasan_save_track+0x18/0x40 [ 38.682998] kasan_save_alloc_info+0x3b/0x50 [ 38.687272] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 38.692585] remove_element+0x11e/0x190 [ 38.696424] mempool_alloc_preallocated+0x4d/0x90 [ 38.701132] mempool_double_free_helper+0x8a/0x370 [ 38.705931] mempool_kmalloc_double_free+0xed/0x140 [ 38.710812] kunit_try_run_case+0x1a2/0x480 [ 38.714997] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 38.720407] kthread+0x334/0x6f0 [ 38.723645] ret_from_fork+0x113/0x1d0 [ 38.727409] ret_from_fork_asm+0x1a/0x30 [ 38.731362] [ 38.732886] Freed by task 276: [ 38.735944] kasan_save_stack+0x45/0x70 [ 38.739783] kasan_save_track+0x18/0x40 [ 38.743624] kasan_save_free_info+0x3f/0x60 [ 38.747816] __kasan_mempool_poison_object+0x131/0x1d0 [ 38.752957] mempool_free+0x2ec/0x380 [ 38.756622] mempool_double_free_helper+0x109/0x370 [ 38.761502] mempool_kmalloc_double_free+0xed/0x140 [ 38.766402] kunit_try_run_case+0x1a2/0x480 [ 38.770593] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 38.775992] kthread+0x334/0x6f0 [ 38.779225] ret_from_fork+0x113/0x1d0 [ 38.782979] ret_from_fork_asm+0x1a/0x30 [ 38.786903] [ 38.788409] The buggy address belongs to the object at ffff8881066f8b00 [ 38.788409] which belongs to the cache kmalloc-128 of size 128 [ 38.800918] The buggy address is located 0 bytes inside of [ 38.800918] 128-byte region [ffff8881066f8b00, ffff8881066f8b80) [ 38.812480] [ 38.813979] The buggy address belongs to the physical page: [ 38.819552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f8 [ 38.827559] flags: 0x200000000000000(node=0|zone=2) [ 38.832440] page_type: f5(slab) [ 38.835587] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 38.843349] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 38.851099] page dumped because: kasan: bad access detected [ 38.856671] [ 38.858168] Memory state around the buggy address: [ 38.862962] ffff8881066f8a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.870182] ffff8881066f8a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.877400] >ffff8881066f8b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.884622] ^ [ 38.887854] ffff8881066f8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.895073] ffff8881066f8c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.902290] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 37.313510] ================================================================== [ 37.324749] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400 [ 37.331457] Read of size 1 at addr ffff8881081f8000 by task kunit_try_catch/270 [ 37.338773] [ 37.340271] CPU: 3 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 37.340280] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 37.340283] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 37.340287] Call Trace: [ 37.340288] <TASK> [ 37.340290] dump_stack_lvl+0x73/0xb0 [ 37.340295] print_report+0xd1/0x650 [ 37.340299] ? __virt_addr_valid+0x1db/0x2d0 [ 37.340303] ? mempool_uaf_helper+0x392/0x400 [ 37.340307] ? kasan_addr_to_slab+0x11/0xa0 [ 37.340311] ? mempool_uaf_helper+0x392/0x400 [ 37.340315] kasan_report+0x141/0x180 [ 37.340319] ? mempool_uaf_helper+0x392/0x400 [ 37.340324] __asan_report_load1_noabort+0x18/0x20 [ 37.340329] mempool_uaf_helper+0x392/0x400 [ 37.340350] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 37.340355] ? __kasan_check_write+0x18/0x20 [ 37.340358] ? __pfx_sched_clock_cpu+0x10/0x10 [ 37.340362] ? finish_task_switch.isra.0+0x153/0x700 [ 37.340367] mempool_kmalloc_large_uaf+0xef/0x140 [ 37.340371] ? __pfx_mempool_kmalloc_large_uaf+0x10/0x10 [ 37.340389] ? __pfx_mempool_kmalloc+0x10/0x10 [ 37.340393] ? __pfx_mempool_kfree+0x10/0x10 [ 37.340398] ? ktime_get_ts64+0x83/0x230 [ 37.340402] kunit_try_run_case+0x1a2/0x480 [ 37.340407] ? __pfx_kunit_try_run_case+0x10/0x10 [ 37.340411] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 37.340415] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 37.340420] ? __kthread_parkme+0x82/0x180 [ 37.340423] ? preempt_count_sub+0x50/0x80 [ 37.340427] ? __pfx_kunit_try_run_case+0x10/0x10 [ 37.340432] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 37.340436] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 37.340441] kthread+0x334/0x6f0 [ 37.340444] ? trace_preempt_on+0x20/0xc0 [ 37.340448] ? __pfx_kthread+0x10/0x10 [ 37.340452] ? _raw_spin_unlock_irq+0x47/0x80 [ 37.340456] ? calculate_sigpending+0x7b/0xa0 [ 37.340460] ? __pfx_kthread+0x10/0x10 [ 37.340464] ret_from_fork+0x113/0x1d0 [ 37.340467] ? __pfx_kthread+0x10/0x10 [ 37.340471] ret_from_fork_asm+0x1a/0x30 [ 37.340477] </TASK> [ 37.340479] [ 37.533130] The buggy address belongs to the physical page: [ 37.538703] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1081f8 [ 37.546711] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 37.554371] flags: 0x200000000000040(head|node=0|zone=2) [ 37.559709] page_type: f8(unknown) [ 37.563118] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.570864] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 37.578605] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.586438] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 37.594264] head: 0200000000000002 ffffea0004207e01 00000000ffffffff 00000000ffffffff [ 37.602089] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 37.609916] page dumped because: kasan: bad access detected [ 37.615488] [ 37.616989] Memory state around the buggy address: [ 37.621781] ffff8881081f7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.629001] ffff8881081f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.636228] >ffff8881081f8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.643456] ^ [ 37.646690] ffff8881081f8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.653915] ffff8881081f8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.661134] ================================================================== [ 38.125030] ================================================================== [ 38.136008] BUG: KASAN: use-after-free in mempool_uaf_helper+0x392/0x400 [ 38.142714] Read of size 1 at addr ffff888104eb8000 by task kunit_try_catch/274 [ 38.150028] [ 38.151531] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 38.151540] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 38.151543] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 38.151546] Call Trace: [ 38.151548] <TASK> [ 38.151550] dump_stack_lvl+0x73/0xb0 [ 38.151555] print_report+0xd1/0x650 [ 38.151559] ? __virt_addr_valid+0x1db/0x2d0 [ 38.151563] ? mempool_uaf_helper+0x392/0x400 [ 38.151567] ? kasan_addr_to_slab+0x11/0xa0 [ 38.151571] ? mempool_uaf_helper+0x392/0x400 [ 38.151575] kasan_report+0x141/0x180 [ 38.151579] ? mempool_uaf_helper+0x392/0x400 [ 38.151584] __asan_report_load1_noabort+0x18/0x20 [ 38.151589] mempool_uaf_helper+0x392/0x400 [ 38.151593] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 38.151598] ? __pfx_sched_clock_cpu+0x10/0x10 [ 38.151602] ? finish_task_switch.isra.0+0x153/0x700 [ 38.151607] mempool_page_alloc_uaf+0xed/0x140 [ 38.151611] ? __pfx_mempool_page_alloc_uaf+0x10/0x10 [ 38.151617] ? __pfx_mempool_alloc_pages+0x10/0x10 [ 38.151621] ? __pfx_mempool_free_pages+0x10/0x10 [ 38.151627] ? ktime_get_ts64+0x83/0x230 [ 38.151631] kunit_try_run_case+0x1a2/0x480 [ 38.151636] ? __pfx_kunit_try_run_case+0x10/0x10 [ 38.151640] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 38.151644] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 38.151648] ? __kthread_parkme+0x82/0x180 [ 38.151652] ? preempt_count_sub+0x50/0x80 [ 38.151656] ? __pfx_kunit_try_run_case+0x10/0x10 [ 38.151661] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 38.151665] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 38.151670] kthread+0x334/0x6f0 [ 38.151673] ? trace_preempt_on+0x20/0xc0 [ 38.151677] ? __pfx_kthread+0x10/0x10 [ 38.151681] ? _raw_spin_unlock_irq+0x47/0x80 [ 38.151685] ? calculate_sigpending+0x7b/0xa0 [ 38.151690] ? __pfx_kthread+0x10/0x10 [ 38.151694] ret_from_fork+0x113/0x1d0 [ 38.151697] ? __pfx_kthread+0x10/0x10 [ 38.151701] ret_from_fork_asm+0x1a/0x30 [ 38.151707] </TASK> [ 38.151708] [ 38.340277] The buggy address belongs to the physical page: [ 38.345849] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104eb8 [ 38.353852] flags: 0x200000000000000(node=0|zone=2) [ 38.358739] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000 [ 38.366487] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 38.374227] page dumped because: kasan: bad access detected [ 38.379798] [ 38.381296] Memory state around the buggy address: [ 38.386091] ffff888104eb7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.393311] ffff888104eb7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.400537] >ffff888104eb8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.407757] ^ [ 38.410991] ffff888104eb8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.418210] ffff888104eb8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.425437] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 36.861626] ================================================================== [ 36.873131] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400 [ 36.880272] Read of size 1 at addr ffff888105ba0f00 by task kunit_try_catch/268 [ 36.887586] [ 36.889089] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 36.889098] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 36.889101] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 36.889105] Call Trace: [ 36.889107] <TASK> [ 36.889108] dump_stack_lvl+0x73/0xb0 [ 36.889113] print_report+0xd1/0x650 [ 36.889117] ? __virt_addr_valid+0x1db/0x2d0 [ 36.889122] ? mempool_uaf_helper+0x392/0x400 [ 36.889126] ? kasan_complete_mode_report_info+0x64/0x200 [ 36.889131] ? mempool_uaf_helper+0x392/0x400 [ 36.889135] kasan_report+0x141/0x180 [ 36.889139] ? mempool_uaf_helper+0x392/0x400 [ 36.889144] __asan_report_load1_noabort+0x18/0x20 [ 36.889149] mempool_uaf_helper+0x392/0x400 [ 36.889153] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 36.889158] ? __pfx_sched_clock_cpu+0x10/0x10 [ 36.889162] ? finish_task_switch.isra.0+0x153/0x700 [ 36.889166] mempool_kmalloc_uaf+0xef/0x140 [ 36.889170] ? __pfx_mempool_kmalloc_uaf+0x10/0x10 [ 36.889175] ? __pfx_mempool_kmalloc+0x10/0x10 [ 36.889180] ? __pfx_mempool_kfree+0x10/0x10 [ 36.889185] ? ktime_get_ts64+0x83/0x230 [ 36.889189] kunit_try_run_case+0x1a2/0x480 [ 36.889194] ? __pfx_kunit_try_run_case+0x10/0x10 [ 36.889198] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 36.889203] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 36.889207] ? __kthread_parkme+0x82/0x180 [ 36.889210] ? preempt_count_sub+0x50/0x80 [ 36.889215] ? __pfx_kunit_try_run_case+0x10/0x10 [ 36.889219] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 36.889223] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 36.889228] kthread+0x334/0x6f0 [ 36.889231] ? trace_preempt_on+0x20/0xc0 [ 36.889235] ? __pfx_kthread+0x10/0x10 [ 36.889239] ? _raw_spin_unlock_irq+0x47/0x80 [ 36.889243] ? calculate_sigpending+0x7b/0xa0 [ 36.889247] ? __pfx_kthread+0x10/0x10 [ 36.889251] ret_from_fork+0x113/0x1d0 [ 36.889255] ? __pfx_kthread+0x10/0x10 [ 36.889258] ret_from_fork_asm+0x1a/0x30 [ 36.889264] </TASK> [ 36.889266] [ 37.077760] Allocated by task 268: [ 37.081165] kasan_save_stack+0x45/0x70 [ 37.085005] kasan_save_track+0x18/0x40 [ 37.088844] kasan_save_alloc_info+0x3b/0x50 [ 37.093115] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 37.098430] remove_element+0x11e/0x190 [ 37.102276] mempool_alloc_preallocated+0x4d/0x90 [ 37.106984] mempool_uaf_helper+0x96/0x400 [ 37.111090] mempool_kmalloc_uaf+0xef/0x140 [ 37.115277] kunit_try_run_case+0x1a2/0x480 [ 37.119462] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 37.124860] kthread+0x334/0x6f0 [ 37.128093] ret_from_fork+0x113/0x1d0 [ 37.131847] ret_from_fork_asm+0x1a/0x30 [ 37.135774] [ 37.137274] Freed by task 268: [ 37.140350] kasan_save_stack+0x45/0x70 [ 37.144197] kasan_save_track+0x18/0x40 [ 37.148035] kasan_save_free_info+0x3f/0x60 [ 37.152223] __kasan_mempool_poison_object+0x131/0x1d0 [ 37.157394] mempool_free+0x2ec/0x380 [ 37.161062] mempool_uaf_helper+0x11a/0x400 [ 37.165247] mempool_kmalloc_uaf+0xef/0x140 [ 37.169433] kunit_try_run_case+0x1a2/0x480 [ 37.173621] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 37.179019] kthread+0x334/0x6f0 [ 37.182251] ret_from_fork+0x113/0x1d0 [ 37.186006] ret_from_fork_asm+0x1a/0x30 [ 37.189930] [ 37.191430] The buggy address belongs to the object at ffff888105ba0f00 [ 37.191430] which belongs to the cache kmalloc-128 of size 128 [ 37.203943] The buggy address is located 0 bytes inside of [ 37.203943] freed 128-byte region [ffff888105ba0f00, ffff888105ba0f80) [ 37.216026] [ 37.217526] The buggy address belongs to the physical page: [ 37.223098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ba0 [ 37.231105] flags: 0x200000000000000(node=0|zone=2) [ 37.235984] page_type: f5(slab) [ 37.239132] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 37.246881] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 37.254628] page dumped because: kasan: bad access detected [ 37.260200] [ 37.261700] Memory state around the buggy address: [ 37.266492] ffff888105ba0e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.273712] ffff888105ba0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.280931] >ffff888105ba0f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.288149] ^ [ 37.291407] ffff888105ba0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.298629] ffff888105ba1000: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc [ 37.305847] ================================================================== [ 37.668902] ================================================================== [ 37.680663] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x392/0x400 [ 37.687801] Read of size 1 at addr ffff8881066ea240 by task kunit_try_catch/272 [ 37.695110] [ 37.696609] CPU: 3 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 37.696618] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 37.696620] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 37.696624] Call Trace: [ 37.696626] <TASK> [ 37.696628] dump_stack_lvl+0x73/0xb0 [ 37.696632] print_report+0xd1/0x650 [ 37.696636] ? __virt_addr_valid+0x1db/0x2d0 [ 37.696641] ? mempool_uaf_helper+0x392/0x400 [ 37.696645] ? kasan_complete_mode_report_info+0x64/0x200 [ 37.696650] ? mempool_uaf_helper+0x392/0x400 [ 37.696654] kasan_report+0x141/0x180 [ 37.696658] ? mempool_uaf_helper+0x392/0x400 [ 37.696663] __asan_report_load1_noabort+0x18/0x20 [ 37.696668] mempool_uaf_helper+0x392/0x400 [ 37.696672] ? __pfx_mempool_uaf_helper+0x10/0x10 [ 37.696677] ? __pfx_sched_clock_cpu+0x10/0x10 [ 37.696680] ? finish_task_switch.isra.0+0x153/0x700 [ 37.696685] mempool_slab_uaf+0xea/0x140 [ 37.696689] ? __pfx_mempool_slab_uaf+0x10/0x10 [ 37.696694] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 37.696699] ? __pfx_mempool_free_slab+0x10/0x10 [ 37.696704] ? ktime_get_ts64+0x83/0x230 [ 37.696708] kunit_try_run_case+0x1a2/0x480 [ 37.696713] ? __pfx_kunit_try_run_case+0x10/0x10 [ 37.696717] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 37.696722] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 37.696726] ? __kthread_parkme+0x82/0x180 [ 37.696729] ? preempt_count_sub+0x50/0x80 [ 37.696733] ? __pfx_kunit_try_run_case+0x10/0x10 [ 37.696738] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 37.696742] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 37.696747] kthread+0x334/0x6f0 [ 37.696750] ? trace_preempt_on+0x20/0xc0 [ 37.696754] ? __pfx_kthread+0x10/0x10 [ 37.696758] ? _raw_spin_unlock_irq+0x47/0x80 [ 37.696762] ? calculate_sigpending+0x7b/0xa0 [ 37.696766] ? __pfx_kthread+0x10/0x10 [ 37.696770] ret_from_fork+0x113/0x1d0 [ 37.696773] ? __pfx_kthread+0x10/0x10 [ 37.696777] ret_from_fork_asm+0x1a/0x30 [ 37.696783] </TASK> [ 37.696784] [ 37.885308] Allocated by task 272: [ 37.888712] kasan_save_stack+0x45/0x70 [ 37.892553] kasan_save_track+0x18/0x40 [ 37.896404] kasan_save_alloc_info+0x3b/0x50 [ 37.900680] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 37.905992] remove_element+0x11e/0x190 [ 37.909833] mempool_alloc_preallocated+0x4d/0x90 [ 37.914538] mempool_uaf_helper+0x96/0x400 [ 37.918638] mempool_slab_uaf+0xea/0x140 [ 37.922562] kunit_try_run_case+0x1a2/0x480 [ 37.926749] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 37.932151] kthread+0x334/0x6f0 [ 37.935404] ret_from_fork+0x113/0x1d0 [ 37.939161] ret_from_fork_asm+0x1a/0x30 [ 37.943087] [ 37.944587] Freed by task 272: [ 37.947646] kasan_save_stack+0x45/0x70 [ 37.951486] kasan_save_track+0x18/0x40 [ 37.955323] kasan_save_free_info+0x3f/0x60 [ 37.959536] __kasan_mempool_poison_object+0x131/0x1d0 [ 37.964676] mempool_free+0x2ec/0x380 [ 37.968359] mempool_uaf_helper+0x11a/0x400 [ 37.972562] mempool_slab_uaf+0xea/0x140 [ 37.976488] kunit_try_run_case+0x1a2/0x480 [ 37.980674] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 37.986073] kthread+0x334/0x6f0 [ 37.989304] ret_from_fork+0x113/0x1d0 [ 37.993058] ret_from_fork_asm+0x1a/0x30 [ 37.996986] [ 37.998483] The buggy address belongs to the object at ffff8881066ea240 [ 37.998483] which belongs to the cache test_cache of size 123 [ 38.010911] The buggy address is located 0 bytes inside of [ 38.010911] freed 123-byte region [ffff8881066ea240, ffff8881066ea2bb) [ 38.022994] [ 38.024492] The buggy address belongs to the physical page: [ 38.030066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 38.038072] flags: 0x200000000000000(node=0|zone=2) [ 38.042952] page_type: f5(slab) [ 38.046099] raw: 0200000000000000 ffff888103805400 dead000000000122 0000000000000000 [ 38.053847] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 38.061587] page dumped because: kasan: bad access detected [ 38.067158] [ 38.068658] Memory state around the buggy address: [ 38.073452] ffff8881066ea100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.080678] ffff8881066ea180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.087899] >ffff8881066ea200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 38.095118] ^ [ 38.100429] ffff8881066ea280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.107650] ffff8881066ea300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.114867] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 35.685931] ================================================================== [ 35.696828] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 35.704410] Read of size 1 at addr ffff8881066f8773 by task kunit_try_catch/262 [ 35.711723] [ 35.713228] CPU: 3 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 35.713238] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 35.713241] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 35.713245] Call Trace: [ 35.713246] <TASK> [ 35.713249] dump_stack_lvl+0x73/0xb0 [ 35.713254] print_report+0xd1/0x650 [ 35.713259] ? __virt_addr_valid+0x1db/0x2d0 [ 35.713263] ? mempool_oob_right_helper+0x318/0x380 [ 35.713268] ? kasan_complete_mode_report_info+0x2a/0x200 [ 35.713273] ? mempool_oob_right_helper+0x318/0x380 [ 35.713278] kasan_report+0x141/0x180 [ 35.713282] ? mempool_oob_right_helper+0x318/0x380 [ 35.713287] __asan_report_load1_noabort+0x18/0x20 [ 35.713292] mempool_oob_right_helper+0x318/0x380 [ 35.713296] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 35.713301] ? __pfx_sched_clock_cpu+0x10/0x10 [ 35.713305] ? finish_task_switch.isra.0+0x153/0x700 [ 35.713310] mempool_kmalloc_oob_right+0xf2/0x150 [ 35.713315] ? __pfx_mempool_kmalloc_oob_right+0x10/0x10 [ 35.713320] ? __pfx_mempool_kmalloc+0x10/0x10 [ 35.713325] ? __pfx_mempool_kfree+0x10/0x10 [ 35.713347] ? ktime_get_ts64+0x83/0x230 [ 35.713352] kunit_try_run_case+0x1a2/0x480 [ 35.713357] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.713361] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 35.713366] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 35.713371] ? __kthread_parkme+0x82/0x180 [ 35.713387] ? preempt_count_sub+0x50/0x80 [ 35.713391] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.713396] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 35.713400] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.713404] kthread+0x334/0x6f0 [ 35.713408] ? trace_preempt_on+0x20/0xc0 [ 35.713412] ? __pfx_kthread+0x10/0x10 [ 35.713416] ? _raw_spin_unlock_irq+0x47/0x80 [ 35.713420] ? calculate_sigpending+0x7b/0xa0 [ 35.713425] ? __pfx_kthread+0x10/0x10 [ 35.713429] ret_from_fork+0x113/0x1d0 [ 35.713433] ? __pfx_kthread+0x10/0x10 [ 35.713436] ret_from_fork_asm+0x1a/0x30 [ 35.713443] </TASK> [ 35.713444] [ 35.905512] Allocated by task 262: [ 35.908918] kasan_save_stack+0x45/0x70 [ 35.912763] kasan_save_track+0x18/0x40 [ 35.916603] kasan_save_alloc_info+0x3b/0x50 [ 35.920877] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 35.926190] remove_element+0x11e/0x190 [ 35.930038] mempool_alloc_preallocated+0x4d/0x90 [ 35.934751] mempool_oob_right_helper+0x8a/0x380 [ 35.939370] mempool_kmalloc_oob_right+0xf2/0x150 [ 35.944104] kunit_try_run_case+0x1a2/0x480 [ 35.948297] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 35.953698] kthread+0x334/0x6f0 [ 35.956930] ret_from_fork+0x113/0x1d0 [ 35.960682] ret_from_fork_asm+0x1a/0x30 [ 35.964610] [ 35.966107] The buggy address belongs to the object at ffff8881066f8700 [ 35.966107] which belongs to the cache kmalloc-128 of size 128 [ 35.978622] The buggy address is located 0 bytes to the right of [ 35.978622] allocated 115-byte region [ffff8881066f8700, ffff8881066f8773) [ 35.991578] [ 35.993079] The buggy address belongs to the physical page: [ 35.998652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f8 [ 36.006658] flags: 0x200000000000000(node=0|zone=2) [ 36.011537] page_type: f5(slab) [ 36.014685] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 36.022425] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 36.030173] page dumped because: kasan: bad access detected [ 36.035743] [ 36.037242] Memory state around the buggy address: [ 36.042037] ffff8881066f8600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.049255] ffff8881066f8680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.056474] >ffff8881066f8700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 36.063693] ^ [ 36.070566] ffff8881066f8780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.077787] ffff8881066f8800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 36.085005] ================================================================== [ 36.092766] ================================================================== [ 36.104576] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 36.112156] Read of size 1 at addr ffff8881081fa001 by task kunit_try_catch/264 [ 36.119465] [ 36.120964] CPU: 3 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 36.120973] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 36.120976] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 36.120980] Call Trace: [ 36.120981] <TASK> [ 36.120983] dump_stack_lvl+0x73/0xb0 [ 36.120989] print_report+0xd1/0x650 [ 36.120993] ? __virt_addr_valid+0x1db/0x2d0 [ 36.120997] ? mempool_oob_right_helper+0x318/0x380 [ 36.121001] ? kasan_addr_to_slab+0x11/0xa0 [ 36.121005] ? mempool_oob_right_helper+0x318/0x380 [ 36.121009] kasan_report+0x141/0x180 [ 36.121013] ? mempool_oob_right_helper+0x318/0x380 [ 36.121019] __asan_report_load1_noabort+0x18/0x20 [ 36.121023] mempool_oob_right_helper+0x318/0x380 [ 36.121028] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 36.121033] ? __kasan_check_write+0x18/0x20 [ 36.121036] ? __pfx_sched_clock_cpu+0x10/0x10 [ 36.121040] ? finish_task_switch.isra.0+0x153/0x700 [ 36.121045] mempool_kmalloc_large_oob_right+0xf2/0x150 [ 36.121049] ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10 [ 36.121055] ? __pfx_mempool_kmalloc+0x10/0x10 [ 36.121059] ? __pfx_mempool_kfree+0x10/0x10 [ 36.121064] ? ktime_get_ts64+0x83/0x230 [ 36.121068] kunit_try_run_case+0x1a2/0x480 [ 36.121073] ? __pfx_kunit_try_run_case+0x10/0x10 [ 36.121077] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 36.121082] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 36.121086] ? __kthread_parkme+0x82/0x180 [ 36.121090] ? preempt_count_sub+0x50/0x80 [ 36.121094] ? __pfx_kunit_try_run_case+0x10/0x10 [ 36.121099] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 36.121103] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 36.121107] kthread+0x334/0x6f0 [ 36.121111] ? trace_preempt_on+0x20/0xc0 [ 36.121115] ? __pfx_kthread+0x10/0x10 [ 36.121119] ? _raw_spin_unlock_irq+0x47/0x80 [ 36.121123] ? calculate_sigpending+0x7b/0xa0 [ 36.121127] ? __pfx_kthread+0x10/0x10 [ 36.121131] ret_from_fork+0x113/0x1d0 [ 36.121135] ? __pfx_kthread+0x10/0x10 [ 36.121138] ret_from_fork_asm+0x1a/0x30 [ 36.121144] </TASK> [ 36.121146] [ 36.317412] The buggy address belongs to the physical page: [ 36.322991] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1081f8 [ 36.330998] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.338651] flags: 0x200000000000040(head|node=0|zone=2) [ 36.343965] page_type: f8(unknown) [ 36.347372] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.355137] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 36.362883] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.370709] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 36.378537] head: 0200000000000002 ffffea0004207e01 00000000ffffffff 00000000ffffffff [ 36.386369] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 36.394222] page dumped because: kasan: bad access detected [ 36.399795] [ 36.401293] Memory state around the buggy address: [ 36.406085] ffff8881081f9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.413307] ffff8881081f9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.420525] >ffff8881081fa000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.427745] ^ [ 36.430977] ffff8881081fa080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.438197] ffff8881081fa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.445416] ================================================================== [ 36.453058] ================================================================== [ 36.465360] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x318/0x380 [ 36.472932] Read of size 1 at addr ffff8881066eb2bb by task kunit_try_catch/266 [ 36.480247] [ 36.481748] CPU: 3 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 36.481757] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 36.481760] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 36.481763] Call Trace: [ 36.481765] <TASK> [ 36.481767] dump_stack_lvl+0x73/0xb0 [ 36.481771] print_report+0xd1/0x650 [ 36.481775] ? __virt_addr_valid+0x1db/0x2d0 [ 36.481779] ? mempool_oob_right_helper+0x318/0x380 [ 36.481784] ? kasan_complete_mode_report_info+0x2a/0x200 [ 36.481789] ? mempool_oob_right_helper+0x318/0x380 [ 36.481793] kasan_report+0x141/0x180 [ 36.481797] ? mempool_oob_right_helper+0x318/0x380 [ 36.481803] __asan_report_load1_noabort+0x18/0x20 [ 36.481807] mempool_oob_right_helper+0x318/0x380 [ 36.481812] ? __pfx_mempool_oob_right_helper+0x10/0x10 [ 36.481817] ? __pfx_sched_clock_cpu+0x10/0x10 [ 36.481820] ? finish_task_switch.isra.0+0x153/0x700 [ 36.481825] mempool_slab_oob_right+0xed/0x140 [ 36.481830] ? __pfx_mempool_slab_oob_right+0x10/0x10 [ 36.481835] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 36.481840] ? __pfx_mempool_free_slab+0x10/0x10 [ 36.481845] ? ktime_get_ts64+0x83/0x230 [ 36.481849] kunit_try_run_case+0x1a2/0x480 [ 36.481853] ? __pfx_kunit_try_run_case+0x10/0x10 [ 36.481858] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 36.481862] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 36.481866] ? __kthread_parkme+0x82/0x180 [ 36.481870] ? preempt_count_sub+0x50/0x80 [ 36.481874] ? __pfx_kunit_try_run_case+0x10/0x10 [ 36.481878] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 36.481882] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 36.481887] kthread+0x334/0x6f0 [ 36.481890] ? trace_preempt_on+0x20/0xc0 [ 36.481894] ? __pfx_kthread+0x10/0x10 [ 36.481898] ? _raw_spin_unlock_irq+0x47/0x80 [ 36.481902] ? calculate_sigpending+0x7b/0xa0 [ 36.481907] ? __pfx_kthread+0x10/0x10 [ 36.481910] ret_from_fork+0x113/0x1d0 [ 36.481914] ? __pfx_kthread+0x10/0x10 [ 36.481917] ret_from_fork_asm+0x1a/0x30 [ 36.481923] </TASK> [ 36.481925] [ 36.674137] Allocated by task 266: [ 36.677544] kasan_save_stack+0x45/0x70 [ 36.681403] kasan_save_track+0x18/0x40 [ 36.685248] kasan_save_alloc_info+0x3b/0x50 [ 36.689528] __kasan_mempool_unpoison_object+0x1bb/0x200 [ 36.694840] remove_element+0x11e/0x190 [ 36.698679] mempool_alloc_preallocated+0x4d/0x90 [ 36.703406] mempool_oob_right_helper+0x8a/0x380 [ 36.708030] mempool_slab_oob_right+0xed/0x140 [ 36.712478] kunit_try_run_case+0x1a2/0x480 [ 36.716664] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 36.722061] kthread+0x334/0x6f0 [ 36.725295] ret_from_fork+0x113/0x1d0 [ 36.729047] ret_from_fork_asm+0x1a/0x30 [ 36.732974] [ 36.734473] The buggy address belongs to the object at ffff8881066eb240 [ 36.734473] which belongs to the cache test_cache of size 123 [ 36.746902] The buggy address is located 0 bytes to the right of [ 36.746902] allocated 123-byte region [ffff8881066eb240, ffff8881066eb2bb) [ 36.759849] [ 36.761364] The buggy address belongs to the physical page: [ 36.766937] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066eb [ 36.774937] flags: 0x200000000000000(node=0|zone=2) [ 36.779818] page_type: f5(slab) [ 36.782964] raw: 0200000000000000 ffff8881038052c0 dead000000000122 0000000000000000 [ 36.790712] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 36.798450] page dumped because: kasan: bad access detected [ 36.804024] [ 36.805523] Memory state around the buggy address: [ 36.810316] ffff8881066eb180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.817561] ffff8881066eb200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 36.824781] >ffff8881066eb280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 36.831999] ^ [ 36.837051] ffff8881066eb300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.844270] ffff8881066eb380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.851492] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 34.640306] ================================================================== [ 34.651468] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x1bf/0x380 [ 34.659224] Read of size 1 at addr ffff888103805040 by task kunit_try_catch/256 [ 34.666539] [ 34.668039] CPU: 3 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 34.668048] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 34.668052] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 34.668055] Call Trace: [ 34.668057] <TASK> [ 34.668059] dump_stack_lvl+0x73/0xb0 [ 34.668065] print_report+0xd1/0x650 [ 34.668069] ? __virt_addr_valid+0x1db/0x2d0 [ 34.668074] ? kmem_cache_double_destroy+0x1bf/0x380 [ 34.668079] ? kasan_complete_mode_report_info+0x64/0x200 [ 34.668084] ? kmem_cache_double_destroy+0x1bf/0x380 [ 34.668089] kasan_report+0x141/0x180 [ 34.668093] ? kmem_cache_double_destroy+0x1bf/0x380 [ 34.668098] ? kmem_cache_double_destroy+0x1bf/0x380 [ 34.668103] __kasan_check_byte+0x3d/0x50 [ 34.668107] kmem_cache_destroy+0x25/0x1d0 [ 34.668111] kmem_cache_double_destroy+0x1bf/0x380 [ 34.668116] ? __pfx_kmem_cache_double_destroy+0x10/0x10 [ 34.668121] ? finish_task_switch.isra.0+0x153/0x700 [ 34.668125] ? __switch_to+0x544/0xf50 [ 34.668131] ? ktime_get_ts64+0x83/0x230 [ 34.668136] kunit_try_run_case+0x1a2/0x480 [ 34.668141] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.668145] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 34.668150] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.668154] ? __kthread_parkme+0x82/0x180 [ 34.668158] ? preempt_count_sub+0x50/0x80 [ 34.668162] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.668167] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 34.668171] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.668175] kthread+0x334/0x6f0 [ 34.668179] ? trace_preempt_on+0x20/0xc0 [ 34.668184] ? __pfx_kthread+0x10/0x10 [ 34.668187] ? _raw_spin_unlock_irq+0x47/0x80 [ 34.668191] ? calculate_sigpending+0x7b/0xa0 [ 34.668196] ? __pfx_kthread+0x10/0x10 [ 34.668200] ret_from_fork+0x113/0x1d0 [ 34.668204] ? __pfx_kthread+0x10/0x10 [ 34.668208] ret_from_fork_asm+0x1a/0x30 [ 34.668214] </TASK> [ 34.668216] [ 34.849648] Allocated by task 256: [ 34.853054] kasan_save_stack+0x45/0x70 [ 34.856891] kasan_save_track+0x18/0x40 [ 34.860730] kasan_save_alloc_info+0x3b/0x50 [ 34.865004] __kasan_slab_alloc+0x91/0xa0 [ 34.869016] kmem_cache_alloc_noprof+0x123/0x3f0 [ 34.873636] __kmem_cache_create_args+0x169/0x240 [ 34.878367] kmem_cache_double_destroy+0xd5/0x380 [ 34.883100] kunit_try_run_case+0x1a2/0x480 [ 34.887286] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 34.892685] kthread+0x334/0x6f0 [ 34.895918] ret_from_fork+0x113/0x1d0 [ 34.899671] ret_from_fork_asm+0x1a/0x30 [ 34.903598] [ 34.905097] Freed by task 256: [ 34.908155] kasan_save_stack+0x45/0x70 [ 34.911995] kasan_save_track+0x18/0x40 [ 34.915834] kasan_save_free_info+0x3f/0x60 [ 34.920028] __kasan_slab_free+0x56/0x70 [ 34.923955] kmem_cache_free+0x249/0x420 [ 34.927879] slab_kmem_cache_release+0x2e/0x40 [ 34.932327] kmem_cache_release+0x16/0x20 [ 34.936404] kobject_put+0x17e/0x450 [ 34.939986] sysfs_slab_release+0x16/0x20 [ 34.944001] kmem_cache_destroy+0xf0/0x1d0 [ 34.948099] kmem_cache_double_destroy+0x14e/0x380 [ 34.952893] kunit_try_run_case+0x1a2/0x480 [ 34.957077] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 34.962477] kthread+0x334/0x6f0 [ 34.965711] ret_from_fork+0x113/0x1d0 [ 34.969461] ret_from_fork_asm+0x1a/0x30 [ 34.973394] [ 34.974889] The buggy address belongs to the object at ffff888103805040 [ 34.974889] which belongs to the cache kmem_cache of size 208 [ 34.987316] The buggy address is located 0 bytes inside of [ 34.987316] freed 208-byte region [ffff888103805040, ffff888103805110) [ 34.999422] [ 35.000922] The buggy address belongs to the physical page: [ 35.006496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103804 [ 35.014505] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 35.022163] flags: 0x200000000000040(head|node=0|zone=2) [ 35.027476] page_type: f5(slab) [ 35.030625] raw: 0200000000000040 ffff888100042000 dead000000000122 0000000000000000 [ 35.038372] raw: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000 [ 35.046137] head: 0200000000000040 ffff888100042000 dead000000000122 0000000000000000 [ 35.053963] head: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000 [ 35.061789] head: 0200000000000001 ffffea00040e0101 00000000ffffffff 00000000ffffffff [ 35.069615] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 35.077440] page dumped because: kasan: bad access detected [ 35.083012] [ 35.084511] Memory state around the buggy address: [ 35.089305] ffff888103804f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.096524] ffff888103804f80: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 35.103742] >ffff888103805000: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 35.110963] ^ [ 35.116277] ffff888103805080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.123504] ffff888103805100: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.130722] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 34.116572] ================================================================== [ 34.128168] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x3e3/0x510 [ 34.135318] Read of size 1 at addr ffff888103816000 by task kunit_try_catch/254 [ 34.142657] [ 34.144160] CPU: 3 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 34.144170] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 34.144173] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 34.144176] Call Trace: [ 34.144178] <TASK> [ 34.144181] dump_stack_lvl+0x73/0xb0 [ 34.144186] print_report+0xd1/0x650 [ 34.144191] ? __virt_addr_valid+0x1db/0x2d0 [ 34.144196] ? kmem_cache_rcu_uaf+0x3e3/0x510 [ 34.144200] ? kasan_complete_mode_report_info+0x64/0x200 [ 34.144205] ? kmem_cache_rcu_uaf+0x3e3/0x510 [ 34.144210] kasan_report+0x141/0x180 [ 34.144214] ? kmem_cache_rcu_uaf+0x3e3/0x510 [ 34.144219] __asan_report_load1_noabort+0x18/0x20 [ 34.144224] kmem_cache_rcu_uaf+0x3e3/0x510 [ 34.144228] ? __pfx_kmem_cache_rcu_uaf+0x10/0x10 [ 34.144233] ? finish_task_switch.isra.0+0x153/0x700 [ 34.144237] ? __switch_to+0x544/0xf50 [ 34.144243] ? ktime_get_ts64+0x83/0x230 [ 34.144248] kunit_try_run_case+0x1a2/0x480 [ 34.144253] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.144257] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 34.144262] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.144266] ? __kthread_parkme+0x82/0x180 [ 34.144270] ? preempt_count_sub+0x50/0x80 [ 34.144274] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.144279] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 34.144283] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.144287] kthread+0x334/0x6f0 [ 34.144291] ? trace_preempt_on+0x20/0xc0 [ 34.144295] ? __pfx_kthread+0x10/0x10 [ 34.144299] ? _raw_spin_unlock_irq+0x47/0x80 [ 34.144303] ? calculate_sigpending+0x7b/0xa0 [ 34.144308] ? __pfx_kthread+0x10/0x10 [ 34.144312] ret_from_fork+0x113/0x1d0 [ 34.144315] ? __pfx_kthread+0x10/0x10 [ 34.144319] ret_from_fork_asm+0x1a/0x30 [ 34.144325] </TASK> [ 34.144327] [ 34.314466] Allocated by task 254: [ 34.317873] kasan_save_stack+0x45/0x70 [ 34.321721] kasan_save_track+0x18/0x40 [ 34.325559] kasan_save_alloc_info+0x3b/0x50 [ 34.329841] __kasan_slab_alloc+0x91/0xa0 [ 34.333853] kmem_cache_alloc_noprof+0x123/0x3f0 [ 34.338473] kmem_cache_rcu_uaf+0x155/0x510 [ 34.342668] kunit_try_run_case+0x1a2/0x480 [ 34.346860] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 34.352260] kthread+0x334/0x6f0 [ 34.355491] ret_from_fork+0x113/0x1d0 [ 34.359245] ret_from_fork_asm+0x1a/0x30 [ 34.363173] [ 34.364672] Freed by task 0: [ 34.367557] kasan_save_stack+0x45/0x70 [ 34.371405] kasan_save_track+0x18/0x40 [ 34.375243] kasan_save_free_info+0x3f/0x60 [ 34.379431] __kasan_slab_free+0x56/0x70 [ 34.383362] slab_free_after_rcu_debug+0xe4/0x310 [ 34.388096] rcu_core+0x66c/0x1c40 [ 34.391503] rcu_core_si+0x12/0x20 [ 34.394909] handle_softirqs+0x206/0x730 [ 34.398835] __irq_exit_rcu+0xc9/0x110 [ 34.402586] irq_exit_rcu+0x12/0x20 [ 34.406081] sysvec_apic_timer_interrupt+0x81/0x90 [ 34.410882] asm_sysvec_apic_timer_interrupt+0x1f/0x30 [ 34.416019] [ 34.417520] Last potentially related work creation: [ 34.422403] kasan_save_stack+0x45/0x70 [ 34.426247] kasan_record_aux_stack+0xb2/0xc0 [ 34.430607] kmem_cache_free+0x131/0x420 [ 34.434533] kmem_cache_rcu_uaf+0x194/0x510 [ 34.438726] kunit_try_run_case+0x1a2/0x480 [ 34.442914] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 34.448311] kthread+0x334/0x6f0 [ 34.451546] ret_from_fork+0x113/0x1d0 [ 34.455296] ret_from_fork_asm+0x1a/0x30 [ 34.459224] [ 34.460723] The buggy address belongs to the object at ffff888103816000 [ 34.460723] which belongs to the cache test_cache of size 200 [ 34.473151] The buggy address is located 0 bytes inside of [ 34.473151] freed 200-byte region [ffff888103816000, ffff8881038160c8) [ 34.485233] [ 34.486731] The buggy address belongs to the physical page: [ 34.492305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103816 [ 34.500312] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.507965] flags: 0x200000000000040(head|node=0|zone=2) [ 34.513278] page_type: f5(slab) [ 34.516426] raw: 0200000000000040 ffff888103804f00 dead000000000122 0000000000000000 [ 34.524172] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 34.531913] head: 0200000000000040 ffff888103804f00 dead000000000122 0000000000000000 [ 34.539746] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 34.547573] head: 0200000000000001 ffffea00040e0581 00000000ffffffff 00000000ffffffff [ 34.555407] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 34.563233] page dumped because: kasan: bad access detected [ 34.568804] [ 34.570304] Memory state around the buggy address: [ 34.575096] ffff888103815f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.582316] ffff888103815f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.589535] >ffff888103816000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.596755] ^ [ 34.599987] ffff888103816080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 34.607206] ffff888103816100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.614425] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 33.652307] ================================================================== [ 33.663800] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x1d8/0x460 [ 33.670768] Free of addr ffff888100ac2001 by task kunit_try_catch/252 [ 33.677209] [ 33.678710] CPU: 2 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 33.678719] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 33.678722] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 33.678726] Call Trace: [ 33.678727] <TASK> [ 33.678729] dump_stack_lvl+0x73/0xb0 [ 33.678735] print_report+0xd1/0x650 [ 33.678739] ? __virt_addr_valid+0x1db/0x2d0 [ 33.678744] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.678749] ? kmem_cache_invalid_free+0x1d8/0x460 [ 33.678754] kasan_report_invalid_free+0x10a/0x130 [ 33.678758] ? kmem_cache_invalid_free+0x1d8/0x460 [ 33.678764] ? kmem_cache_invalid_free+0x1d8/0x460 [ 33.678768] check_slab_allocation+0x11f/0x130 [ 33.678772] __kasan_slab_pre_free+0x28/0x40 [ 33.678776] kmem_cache_free+0xed/0x420 [ 33.678779] ? kmem_cache_alloc_noprof+0x123/0x3f0 [ 33.678783] ? kmem_cache_invalid_free+0x1d8/0x460 [ 33.678788] kmem_cache_invalid_free+0x1d8/0x460 [ 33.678793] ? __pfx_kmem_cache_invalid_free+0x10/0x10 [ 33.678798] ? finish_task_switch.isra.0+0x153/0x700 [ 33.678802] ? __switch_to+0x544/0xf50 [ 33.678808] ? ktime_get_ts64+0x83/0x230 [ 33.678812] kunit_try_run_case+0x1a2/0x480 [ 33.678818] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.678822] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 33.678827] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.678831] ? __kthread_parkme+0x82/0x180 [ 33.678835] ? preempt_count_sub+0x50/0x80 [ 33.678839] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.678843] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 33.678847] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.678852] kthread+0x334/0x6f0 [ 33.678856] ? trace_preempt_on+0x20/0xc0 [ 33.678860] ? __pfx_kthread+0x10/0x10 [ 33.678864] ? _raw_spin_unlock_irq+0x47/0x80 [ 33.678868] ? calculate_sigpending+0x7b/0xa0 [ 33.678873] ? __pfx_kthread+0x10/0x10 [ 33.678877] ret_from_fork+0x113/0x1d0 [ 33.678880] ? __pfx_kthread+0x10/0x10 [ 33.678884] ret_from_fork_asm+0x1a/0x30 [ 33.678890] </TASK> [ 33.678892] [ 33.869649] Allocated by task 252: [ 33.873056] kasan_save_stack+0x45/0x70 [ 33.876894] kasan_save_track+0x18/0x40 [ 33.880735] kasan_save_alloc_info+0x3b/0x50 [ 33.885008] __kasan_slab_alloc+0x91/0xa0 [ 33.889020] kmem_cache_alloc_noprof+0x123/0x3f0 [ 33.893639] kmem_cache_invalid_free+0x157/0x460 [ 33.898260] kunit_try_run_case+0x1a2/0x480 [ 33.902454] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 33.907854] kthread+0x334/0x6f0 [ 33.911084] ret_from_fork+0x113/0x1d0 [ 33.914839] ret_from_fork_asm+0x1a/0x30 [ 33.918772] [ 33.920273] The buggy address belongs to the object at ffff888100ac2000 [ 33.920273] which belongs to the cache test_cache of size 200 [ 33.932700] The buggy address is located 1 bytes inside of [ 33.932700] 200-byte region [ffff888100ac2000, ffff888100ac20c8) [ 33.944262] [ 33.945762] The buggy address belongs to the physical page: [ 33.951362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ac2 [ 33.959401] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.967056] flags: 0x200000000000040(head|node=0|zone=2) [ 33.972397] page_type: f5(slab) [ 33.975549] raw: 0200000000000040 ffff888100aa28c0 dead000000000122 0000000000000000 [ 33.983296] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 33.991035] head: 0200000000000040 ffff888100aa28c0 dead000000000122 0000000000000000 [ 33.998861] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 34.006688] head: 0200000000000001 ffffea000402b081 00000000ffffffff 00000000ffffffff [ 34.014515] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 34.022365] page dumped because: kasan: bad access detected [ 34.027963] [ 34.029464] Memory state around the buggy address: [ 34.034257] ffff888100ac1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.041475] ffff888100ac1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.048694] >ffff888100ac2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.055914] ^ [ 34.059148] ffff888100ac2080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 34.066365] ffff888100ac2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.073611] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 33.173001] ================================================================== [ 33.183810] BUG: KASAN: double-free in kmem_cache_double_free+0x1e5/0x480 [ 33.190613] Free of addr ffff888103816000 by task kunit_try_catch/250 [ 33.197059] [ 33.198562] CPU: 3 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 33.198572] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 33.198575] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 33.198579] Call Trace: [ 33.198580] <TASK> [ 33.198583] dump_stack_lvl+0x73/0xb0 [ 33.198589] print_report+0xd1/0x650 [ 33.198593] ? __virt_addr_valid+0x1db/0x2d0 [ 33.198598] ? kasan_complete_mode_report_info+0x64/0x200 [ 33.198603] ? kmem_cache_double_free+0x1e5/0x480 [ 33.198608] kasan_report_invalid_free+0x10a/0x130 [ 33.198613] ? kmem_cache_double_free+0x1e5/0x480 [ 33.198618] ? kmem_cache_double_free+0x1e5/0x480 [ 33.198622] check_slab_allocation+0x101/0x130 [ 33.198626] __kasan_slab_pre_free+0x28/0x40 [ 33.198630] kmem_cache_free+0xed/0x420 [ 33.198634] ? kmem_cache_alloc_noprof+0x123/0x3f0 [ 33.198638] ? kmem_cache_double_free+0x1e5/0x480 [ 33.198643] kmem_cache_double_free+0x1e5/0x480 [ 33.198648] ? __pfx_kmem_cache_double_free+0x10/0x10 [ 33.198652] ? finish_task_switch.isra.0+0x153/0x700 [ 33.198657] ? __switch_to+0x544/0xf50 [ 33.198663] ? ktime_get_ts64+0x83/0x230 [ 33.198668] kunit_try_run_case+0x1a2/0x480 [ 33.198673] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.198677] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 33.198682] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.198687] ? __kthread_parkme+0x82/0x180 [ 33.198690] ? preempt_count_sub+0x50/0x80 [ 33.198695] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.198699] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 33.198703] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.198708] kthread+0x334/0x6f0 [ 33.198711] ? trace_preempt_on+0x20/0xc0 [ 33.198716] ? __pfx_kthread+0x10/0x10 [ 33.198720] ? _raw_spin_unlock_irq+0x47/0x80 [ 33.198723] ? calculate_sigpending+0x7b/0xa0 [ 33.198729] ? __pfx_kthread+0x10/0x10 [ 33.198732] ret_from_fork+0x113/0x1d0 [ 33.198736] ? __pfx_kthread+0x10/0x10 [ 33.198740] ret_from_fork_asm+0x1a/0x30 [ 33.198746] </TASK> [ 33.198748] [ 33.388989] Allocated by task 250: [ 33.392410] kasan_save_stack+0x45/0x70 [ 33.396255] kasan_save_track+0x18/0x40 [ 33.400101] kasan_save_alloc_info+0x3b/0x50 [ 33.404375] __kasan_slab_alloc+0x91/0xa0 [ 33.408414] kmem_cache_alloc_noprof+0x123/0x3f0 [ 33.413031] kmem_cache_double_free+0x14f/0x480 [ 33.417565] kunit_try_run_case+0x1a2/0x480 [ 33.421751] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 33.427149] kthread+0x334/0x6f0 [ 33.430406] ret_from_fork+0x113/0x1d0 [ 33.434161] ret_from_fork_asm+0x1a/0x30 [ 33.438086] [ 33.439585] Freed by task 250: [ 33.442644] kasan_save_stack+0x45/0x70 [ 33.446485] kasan_save_track+0x18/0x40 [ 33.450324] kasan_save_free_info+0x3f/0x60 [ 33.454537] __kasan_slab_free+0x56/0x70 [ 33.458461] kmem_cache_free+0x249/0x420 [ 33.462405] kmem_cache_double_free+0x16a/0x480 [ 33.466938] kunit_try_run_case+0x1a2/0x480 [ 33.471124] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 33.476523] kthread+0x334/0x6f0 [ 33.479755] ret_from_fork+0x113/0x1d0 [ 33.483509] ret_from_fork_asm+0x1a/0x30 [ 33.487436] [ 33.488933] The buggy address belongs to the object at ffff888103816000 [ 33.488933] which belongs to the cache test_cache of size 200 [ 33.501368] The buggy address is located 0 bytes inside of [ 33.501368] 200-byte region [ffff888103816000, ffff8881038160c8) [ 33.512951] [ 33.514465] The buggy address belongs to the physical page: [ 33.520041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103816 [ 33.528048] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.535708] flags: 0x200000000000040(head|node=0|zone=2) [ 33.541030] page_type: f5(slab) [ 33.544176] raw: 0200000000000040 ffff888103804dc0 dead000000000122 0000000000000000 [ 33.551923] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 33.559662] head: 0200000000000040 ffff888103804dc0 dead000000000122 0000000000000000 [ 33.567489] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 33.575315] head: 0200000000000001 ffffea00040e0581 00000000ffffffff 00000000ffffffff [ 33.583140] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 33.590966] page dumped because: kasan: bad access detected [ 33.596539] [ 33.598038] Memory state around the buggy address: [ 33.602830] ffff888103815f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.610050] ffff888103815f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.617270] >ffff888103816000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.624488] ^ [ 33.627723] ffff888103816080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 33.634949] ffff888103816100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.642169] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 32.745574] ================================================================== [ 32.756420] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x402/0x530 [ 32.763121] Read of size 1 at addr ffff88810561e0c8 by task kunit_try_catch/248 [ 32.770426] [ 32.771928] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 32.771936] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 32.771939] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 32.771943] Call Trace: [ 32.771944] <TASK> [ 32.771946] dump_stack_lvl+0x73/0xb0 [ 32.771951] print_report+0xd1/0x650 [ 32.771955] ? __virt_addr_valid+0x1db/0x2d0 [ 32.771959] ? kmem_cache_oob+0x402/0x530 [ 32.771963] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.771968] ? kmem_cache_oob+0x402/0x530 [ 32.771973] kasan_report+0x141/0x180 [ 32.771977] ? kmem_cache_oob+0x402/0x530 [ 32.771982] __asan_report_load1_noabort+0x18/0x20 [ 32.771986] kmem_cache_oob+0x402/0x530 [ 32.771990] ? trace_hardirqs_on+0x37/0xe0 [ 32.771994] ? __pfx_kmem_cache_oob+0x10/0x10 [ 32.771998] ? finish_task_switch.isra.0+0x153/0x700 [ 32.772002] ? __switch_to+0x544/0xf50 [ 32.772009] ? ktime_get_ts64+0x83/0x230 [ 32.772013] kunit_try_run_case+0x1a2/0x480 [ 32.772017] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.772021] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 32.772026] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.772030] ? __kthread_parkme+0x82/0x180 [ 32.772033] ? preempt_count_sub+0x50/0x80 [ 32.772037] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.772042] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 32.772046] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.772050] kthread+0x334/0x6f0 [ 32.772053] ? trace_preempt_on+0x20/0xc0 [ 32.772057] ? __pfx_kthread+0x10/0x10 [ 32.772061] ? _raw_spin_unlock_irq+0x47/0x80 [ 32.772065] ? calculate_sigpending+0x7b/0xa0 [ 32.772069] ? __pfx_kthread+0x10/0x10 [ 32.772073] ret_from_fork+0x113/0x1d0 [ 32.772076] ? __pfx_kthread+0x10/0x10 [ 32.772080] ret_from_fork_asm+0x1a/0x30 [ 32.772086] </TASK> [ 32.772087] [ 32.944558] Allocated by task 248: [ 32.947964] kasan_save_stack+0x45/0x70 [ 32.951802] kasan_save_track+0x18/0x40 [ 32.955641] kasan_save_alloc_info+0x3b/0x50 [ 32.959916] __kasan_slab_alloc+0x91/0xa0 [ 32.963928] kmem_cache_alloc_noprof+0x123/0x3f0 [ 32.968547] kmem_cache_oob+0x157/0x530 [ 32.972414] kunit_try_run_case+0x1a2/0x480 [ 32.976605] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 32.982006] kthread+0x334/0x6f0 [ 32.985237] ret_from_fork+0x113/0x1d0 [ 32.988991] ret_from_fork_asm+0x1a/0x30 [ 32.992915] [ 32.994429] The buggy address belongs to the object at ffff88810561e000 [ 32.994429] which belongs to the cache test_cache of size 200 [ 33.006853] The buggy address is located 0 bytes to the right of [ 33.006853] allocated 200-byte region [ffff88810561e000, ffff88810561e0c8) [ 33.019800] [ 33.021301] The buggy address belongs to the physical page: [ 33.026875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10561e [ 33.034880] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.042533] flags: 0x200000000000040(head|node=0|zone=2) [ 33.047847] page_type: f5(slab) [ 33.050993] raw: 0200000000000040 ffff888105612500 dead000000000122 0000000000000000 [ 33.058741] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 33.066489] head: 0200000000000040 ffff888105612500 dead000000000122 0000000000000000 [ 33.074314] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 33.082176] head: 0200000000000001 ffffea0004158781 00000000ffffffff 00000000ffffffff [ 33.090010] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 33.097834] page dumped because: kasan: bad access detected [ 33.103422] [ 33.104917] Memory state around the buggy address: [ 33.109708] ffff88810561df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.116928] ffff88810561e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.124147] >ffff88810561e080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 33.131378] ^ [ 33.136983] ffff88810561e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.144202] ffff88810561e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.151426] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 32.283182] ================================================================== [ 32.293406] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x4d6/0x560 [ 32.300117] Read of size 8 at addr ffff88810134bfc0 by task kunit_try_catch/241 [ 32.307431] [ 32.308932] CPU: 2 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 32.308941] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 32.308944] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 32.308947] Call Trace: [ 32.308949] <TASK> [ 32.308951] dump_stack_lvl+0x73/0xb0 [ 32.308957] print_report+0xd1/0x650 [ 32.308961] ? __virt_addr_valid+0x1db/0x2d0 [ 32.308966] ? workqueue_uaf+0x4d6/0x560 [ 32.308970] ? kasan_complete_mode_report_info+0x64/0x200 [ 32.308975] ? workqueue_uaf+0x4d6/0x560 [ 32.308979] kasan_report+0x141/0x180 [ 32.308983] ? workqueue_uaf+0x4d6/0x560 [ 32.308988] __asan_report_load8_noabort+0x18/0x20 [ 32.308993] workqueue_uaf+0x4d6/0x560 [ 32.308997] ? __pfx_workqueue_uaf+0x10/0x10 [ 32.309001] ? __schedule+0x10cc/0x2b60 [ 32.309005] ? ktime_get_ts64+0x83/0x230 [ 32.309010] kunit_try_run_case+0x1a2/0x480 [ 32.309015] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.309019] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 32.309024] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.309028] ? __kthread_parkme+0x82/0x180 [ 32.309032] ? preempt_count_sub+0x50/0x80 [ 32.309037] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.309041] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 32.309045] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.309049] kthread+0x334/0x6f0 [ 32.309053] ? trace_preempt_on+0x20/0xc0 [ 32.309058] ? __pfx_kthread+0x10/0x10 [ 32.309061] ? _raw_spin_unlock_irq+0x47/0x80 [ 32.309065] ? calculate_sigpending+0x7b/0xa0 [ 32.309070] ? __pfx_kthread+0x10/0x10 [ 32.309074] ret_from_fork+0x113/0x1d0 [ 32.309078] ? __pfx_kthread+0x10/0x10 [ 32.309081] ret_from_fork_asm+0x1a/0x30 [ 32.309087] </TASK> [ 32.309089] [ 32.472216] Allocated by task 241: [ 32.475623] kasan_save_stack+0x45/0x70 [ 32.479463] kasan_save_track+0x18/0x40 [ 32.483301] kasan_save_alloc_info+0x3b/0x50 [ 32.487574] __kasan_kmalloc+0xb7/0xc0 [ 32.491328] __kmalloc_cache_noprof+0x189/0x420 [ 32.495886] workqueue_uaf+0x152/0x560 [ 32.499639] kunit_try_run_case+0x1a2/0x480 [ 32.503823] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 32.509223] kthread+0x334/0x6f0 [ 32.512458] ret_from_fork+0x113/0x1d0 [ 32.516210] ret_from_fork_asm+0x1a/0x30 [ 32.520134] [ 32.521636] Freed by task 49: [ 32.524606] kasan_save_stack+0x45/0x70 [ 32.528445] kasan_save_track+0x18/0x40 [ 32.532286] kasan_save_free_info+0x3f/0x60 [ 32.536470] __kasan_slab_free+0x56/0x70 [ 32.540404] kfree+0x222/0x3f0 [ 32.543466] workqueue_uaf_work+0x12/0x20 [ 32.547478] process_one_work+0x5eb/0xf60 [ 32.551492] worker_thread+0x758/0x1220 [ 32.555348] kthread+0x334/0x6f0 [ 32.558590] ret_from_fork+0x113/0x1d0 [ 32.562361] ret_from_fork_asm+0x1a/0x30 [ 32.566312] [ 32.567812] Last potentially related work creation: [ 32.572689] kasan_save_stack+0x45/0x70 [ 32.576529] kasan_record_aux_stack+0xb2/0xc0 [ 32.580895] __queue_work+0x626/0xeb0 [ 32.584564] queue_work_on+0xb6/0xc0 [ 32.588141] workqueue_uaf+0x26d/0x560 [ 32.591895] kunit_try_run_case+0x1a2/0x480 [ 32.596081] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 32.601479] kthread+0x334/0x6f0 [ 32.604712] ret_from_fork+0x113/0x1d0 [ 32.608465] ret_from_fork_asm+0x1a/0x30 [ 32.612407] [ 32.613901] The buggy address belongs to the object at ffff88810134bfc0 [ 32.613901] which belongs to the cache kmalloc-32 of size 32 [ 32.626242] The buggy address is located 0 bytes inside of [ 32.626242] freed 32-byte region [ffff88810134bfc0, ffff88810134bfe0) [ 32.638236] [ 32.639736] The buggy address belongs to the physical page: [ 32.645307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10134b [ 32.653315] flags: 0x200000000000000(node=0|zone=2) [ 32.658230] page_type: f5(slab) [ 32.661378] raw: 0200000000000000 ffff888100042780 dead000000000122 0000000000000000 [ 32.669143] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 32.676887] page dumped because: kasan: bad access detected [ 32.682461] [ 32.683961] Memory state around the buggy address: [ 32.688754] ffff88810134be80: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.695973] ffff88810134bf00: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 32.703191] >ffff88810134bf80: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc [ 32.710410] ^ [ 32.715723] ffff88810134c000: 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc [ 32.722944] ffff88810134c080: 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc [ 32.730163] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 31.741541] ================================================================== [ 31.751924] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x50/0x60 [ 31.758634] Read of size 4 at addr ffff8881066f7d00 by task swapper/3/0 [ 31.765253] [ 31.766756] CPU: 3 UID: 0 PID: 0 Comm: swapper/3 Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 31.766765] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 31.766767] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 31.766771] Call Trace: [ 31.766773] <IRQ> [ 31.766775] dump_stack_lvl+0x73/0xb0 [ 31.766781] print_report+0xd1/0x650 [ 31.766785] ? __virt_addr_valid+0x1db/0x2d0 [ 31.766790] ? rcu_uaf_reclaim+0x50/0x60 [ 31.766794] ? kasan_complete_mode_report_info+0x64/0x200 [ 31.766799] ? rcu_uaf_reclaim+0x50/0x60 [ 31.766803] kasan_report+0x141/0x180 [ 31.766807] ? rcu_uaf_reclaim+0x50/0x60 [ 31.766811] __asan_report_load4_noabort+0x18/0x20 [ 31.766816] rcu_uaf_reclaim+0x50/0x60 [ 31.766819] rcu_core+0x66c/0x1c40 [ 31.766825] ? __pfx_rcu_core+0x10/0x10 [ 31.766829] ? ktime_get+0x68/0x150 [ 31.766833] ? handle_softirqs+0x18e/0x730 [ 31.766838] rcu_core_si+0x12/0x20 [ 31.766841] handle_softirqs+0x206/0x730 [ 31.766845] ? hrtimer_interrupt+0x2fe/0x780 [ 31.766850] ? __pfx_handle_softirqs+0x10/0x10 [ 31.766855] __irq_exit_rcu+0xc9/0x110 [ 31.766859] irq_exit_rcu+0x12/0x20 [ 31.766862] sysvec_apic_timer_interrupt+0x81/0x90 [ 31.766867] </IRQ> [ 31.766868] <TASK> [ 31.766870] asm_sysvec_apic_timer_interrupt+0x1f/0x30 [ 31.766874] RIP: 0010:cpuidle_enter_state+0xe5/0x2e0 [ 31.766880] Code: ff ff ff 48 89 45 c0 e8 09 ab ff fe 31 ff e8 12 c0 70 fc 80 7d d0 00 0f 85 27 01 00 00 e8 a3 b6 ff fe 84 c0 0f 84 0f 01 00 00 <45> 85 ed 0f 88 ef 00 00 00 4d 63 fd 48 8b 7d c0 4b 8d 04 7f 49 8d [ 31.766888] RSP: 0000:ffff888100907d70 EFLAGS: 00000246 [ 31.766892] RAX: 0000000000000000 RBX: ffff888103847000 RCX: 000000000000001f [ 31.766896] RDX: 1ffff11083ef6c8f RSI: 0000000000000003 RDI: ffff88841f7b6478 [ 31.766900] RBP: ffff888100907db8 R08: 0000000000000004 R09: ffffed1083ef618a [ 31.766903] R10: ffff88841f7b0c53 R11: 0000000000000006 R12: ffffffffa9bb10c0 [ 31.766906] R13: 0000000000000003 R14: 0000000000000003 R15: ffffffffa9bb1210 [ 31.766911] ? tick_nohz_idle_enter+0x13f/0x1b0 [ 31.766916] ? mark_tsc_async_resets+0x10/0x40 [ 31.766921] cpuidle_enter+0x53/0xb0 [ 31.766925] ? cpuidle_select+0x5f/0xb0 [ 31.766930] do_idle+0x360/0x4f0 [ 31.766935] ? __pfx_do_idle+0x10/0x10 [ 31.766939] ? _raw_spin_unlock_irqrestore+0x49/0x90 [ 31.766944] ? complete+0x15b/0x1d0 [ 31.766948] cpu_startup_entry+0x5c/0x70 [ 31.766952] start_secondary+0x211/0x290 [ 31.766956] ? __pfx_start_secondary+0x10/0x10 [ 31.766960] common_startup_64+0x13e/0x148 [ 31.766967] </TASK> [ 31.766968] [ 32.004514] Allocated by task 239: [ 32.007920] kasan_save_stack+0x45/0x70 [ 32.011760] kasan_save_track+0x18/0x40 [ 32.015597] kasan_save_alloc_info+0x3b/0x50 [ 32.019872] __kasan_kmalloc+0xb7/0xc0 [ 32.023624] __kmalloc_cache_noprof+0x189/0x420 [ 32.028165] rcu_uaf+0xb0/0x330 [ 32.031313] kunit_try_run_case+0x1a2/0x480 [ 32.035532] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 32.040933] kthread+0x334/0x6f0 [ 32.044174] ret_from_fork+0x113/0x1d0 [ 32.047926] ret_from_fork_asm+0x1a/0x30 [ 32.051851] [ 32.053364] Freed by task 0: [ 32.056270] kasan_save_stack+0x45/0x70 [ 32.060111] kasan_save_track+0x18/0x40 [ 32.063949] kasan_save_free_info+0x3f/0x60 [ 32.068135] __kasan_slab_free+0x56/0x70 [ 32.072061] kfree+0x222/0x3f0 [ 32.075122] rcu_uaf_reclaim+0x1f/0x60 [ 32.078873] rcu_core+0x66c/0x1c40 [ 32.082280] rcu_core_si+0x12/0x20 [ 32.085684] handle_softirqs+0x206/0x730 [ 32.089612] __irq_exit_rcu+0xc9/0x110 [ 32.093366] irq_exit_rcu+0x12/0x20 [ 32.096883] sysvec_apic_timer_interrupt+0x81/0x90 [ 32.101674] asm_sysvec_apic_timer_interrupt+0x1f/0x30 [ 32.106814] [ 32.108315] Last potentially related work creation: [ 32.113219] kasan_save_stack+0x45/0x70 [ 32.117059] kasan_record_aux_stack+0xb2/0xc0 [ 32.121418] __call_rcu_common.constprop.0+0x7b/0x9e0 [ 32.126470] call_rcu+0x12/0x20 [ 32.129618] rcu_uaf+0x168/0x330 [ 32.132850] kunit_try_run_case+0x1a2/0x480 [ 32.137043] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 32.142444] kthread+0x334/0x6f0 [ 32.145675] ret_from_fork+0x113/0x1d0 [ 32.149430] ret_from_fork_asm+0x1a/0x30 [ 32.153362] [ 32.154881] The buggy address belongs to the object at ffff8881066f7d00 [ 32.154881] which belongs to the cache kmalloc-32 of size 32 [ 32.167222] The buggy address is located 0 bytes inside of [ 32.167222] freed 32-byte region [ffff8881066f7d00, ffff8881066f7d20) [ 32.179217] [ 32.180716] The buggy address belongs to the physical page: [ 32.186287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f7 [ 32.194286] flags: 0x200000000000000(node=0|zone=2) [ 32.199167] page_type: f5(slab) [ 32.202314] raw: 0200000000000000 ffff888100042780 dead000000000122 0000000000000000 [ 32.210086] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 32.217827] page dumped because: kasan: bad access detected [ 32.223403] [ 32.224896] Memory state around the buggy address: [ 32.229690] ffff8881066f7c00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.236909] ffff8881066f7c80: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 32.244128] >ffff8881066f7d00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 32.251367] ^ [ 32.254617] ffff8881066f7d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.261835] ffff8881066f7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.269055] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 30.928057] ================================================================== [ 30.935313] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5fe/0x6c0 [ 30.941698] Read of size 1 at addr ffff888105bb0200 by task kunit_try_catch/237 [ 30.949005] [ 30.950508] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 30.950516] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 30.950518] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 30.950522] Call Trace: [ 30.950523] <TASK> [ 30.950525] dump_stack_lvl+0x73/0xb0 [ 30.950529] print_report+0xd1/0x650 [ 30.950533] ? __virt_addr_valid+0x1db/0x2d0 [ 30.950537] ? ksize_uaf+0x5fe/0x6c0 [ 30.950541] ? kasan_complete_mode_report_info+0x64/0x200 [ 30.950546] ? ksize_uaf+0x5fe/0x6c0 [ 30.950550] kasan_report+0x141/0x180 [ 30.950554] ? ksize_uaf+0x5fe/0x6c0 [ 30.950558] __asan_report_load1_noabort+0x18/0x20 [ 30.950563] ksize_uaf+0x5fe/0x6c0 [ 30.950566] ? __pfx_ksize_uaf+0x10/0x10 [ 30.950570] ? __schedule+0x10cc/0x2b60 [ 30.950574] ? ktime_get_ts64+0x83/0x230 [ 30.950579] kunit_try_run_case+0x1a2/0x480 [ 30.950583] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.950587] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.950591] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.950595] ? __kthread_parkme+0x82/0x180 [ 30.950599] ? preempt_count_sub+0x50/0x80 [ 30.950603] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.950607] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 30.950611] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.950615] kthread+0x334/0x6f0 [ 30.950619] ? trace_preempt_on+0x20/0xc0 [ 30.950623] ? __pfx_kthread+0x10/0x10 [ 30.950626] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.950630] ? calculate_sigpending+0x7b/0xa0 [ 30.950634] ? __pfx_kthread+0x10/0x10 [ 30.950638] ret_from_fork+0x113/0x1d0 [ 30.950641] ? __pfx_kthread+0x10/0x10 [ 30.950645] ret_from_fork_asm+0x1a/0x30 [ 30.950651] </TASK> [ 30.950652] [ 31.112032] Allocated by task 237: [ 31.115440] kasan_save_stack+0x45/0x70 [ 31.119278] kasan_save_track+0x18/0x40 [ 31.123119] kasan_save_alloc_info+0x3b/0x50 [ 31.127406] __kasan_kmalloc+0xb7/0xc0 [ 31.131160] __kmalloc_cache_noprof+0x189/0x420 [ 31.135693] ksize_uaf+0xaa/0x6c0 [ 31.139012] kunit_try_run_case+0x1a2/0x480 [ 31.143199] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 31.148599] kthread+0x334/0x6f0 [ 31.151830] ret_from_fork+0x113/0x1d0 [ 31.155584] ret_from_fork_asm+0x1a/0x30 [ 31.159510] [ 31.161008] Freed by task 237: [ 31.164067] kasan_save_stack+0x45/0x70 [ 31.167907] kasan_save_track+0x18/0x40 [ 31.171747] kasan_save_free_info+0x3f/0x60 [ 31.175942] __kasan_slab_free+0x56/0x70 [ 31.179867] kfree+0x222/0x3f0 [ 31.182928] ksize_uaf+0x12c/0x6c0 [ 31.186361] kunit_try_run_case+0x1a2/0x480 [ 31.190571] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 31.195969] kthread+0x334/0x6f0 [ 31.199203] ret_from_fork+0x113/0x1d0 [ 31.202956] ret_from_fork_asm+0x1a/0x30 [ 31.206881] [ 31.208379] The buggy address belongs to the object at ffff888105bb0200 [ 31.208379] which belongs to the cache kmalloc-128 of size 128 [ 31.220914] The buggy address is located 0 bytes inside of [ 31.220914] freed 128-byte region [ffff888105bb0200, ffff888105bb0280) [ 31.232994] [ 31.234494] The buggy address belongs to the physical page: [ 31.240065] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb0 [ 31.248065] flags: 0x200000000000000(node=0|zone=2) [ 31.252944] page_type: f5(slab) [ 31.256093] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 31.263838] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.271578] page dumped because: kasan: bad access detected [ 31.277150] [ 31.278648] Memory state around the buggy address: [ 31.283444] ffff888105bb0100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.290670] ffff888105bb0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.297891] >ffff888105bb0200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.305110] ^ [ 31.308364] ffff888105bb0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.315586] ffff888105bb0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.322806] ================================================================== [ 30.516166] ================================================================== [ 30.527669] BUG: KASAN: slab-use-after-free in ksize_uaf+0x19d/0x6c0 [ 30.534031] Read of size 1 at addr ffff888105bb0200 by task kunit_try_catch/237 [ 30.541364] [ 30.542881] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 30.542890] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 30.542893] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 30.542897] Call Trace: [ 30.542898] <TASK> [ 30.542900] dump_stack_lvl+0x73/0xb0 [ 30.542905] print_report+0xd1/0x650 [ 30.542909] ? __virt_addr_valid+0x1db/0x2d0 [ 30.542913] ? ksize_uaf+0x19d/0x6c0 [ 30.542916] ? kasan_complete_mode_report_info+0x64/0x200 [ 30.542922] ? ksize_uaf+0x19d/0x6c0 [ 30.542925] kasan_report+0x141/0x180 [ 30.542929] ? ksize_uaf+0x19d/0x6c0 [ 30.542934] ? ksize_uaf+0x19d/0x6c0 [ 30.542937] __kasan_check_byte+0x3d/0x50 [ 30.542941] ksize+0x20/0x60 [ 30.542944] ksize_uaf+0x19d/0x6c0 [ 30.542948] ? __pfx_ksize_uaf+0x10/0x10 [ 30.542952] ? __schedule+0x10cc/0x2b60 [ 30.542956] ? ktime_get_ts64+0x83/0x230 [ 30.542960] kunit_try_run_case+0x1a2/0x480 [ 30.542965] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.542969] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.542973] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.542977] ? __kthread_parkme+0x82/0x180 [ 30.542981] ? preempt_count_sub+0x50/0x80 [ 30.542985] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.542989] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 30.542993] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.542997] kthread+0x334/0x6f0 [ 30.543001] ? trace_preempt_on+0x20/0xc0 [ 30.543005] ? __pfx_kthread+0x10/0x10 [ 30.543009] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.543012] ? calculate_sigpending+0x7b/0xa0 [ 30.543017] ? __pfx_kthread+0x10/0x10 [ 30.543021] ret_from_fork+0x113/0x1d0 [ 30.543024] ? __pfx_kthread+0x10/0x10 [ 30.543027] ret_from_fork_asm+0x1a/0x30 [ 30.543033] </TASK> [ 30.543035] [ 30.709997] Allocated by task 237: [ 30.713403] kasan_save_stack+0x45/0x70 [ 30.717243] kasan_save_track+0x18/0x40 [ 30.721081] kasan_save_alloc_info+0x3b/0x50 [ 30.725367] __kasan_kmalloc+0xb7/0xc0 [ 30.729140] __kmalloc_cache_noprof+0x189/0x420 [ 30.733674] ksize_uaf+0xaa/0x6c0 [ 30.736994] kunit_try_run_case+0x1a2/0x480 [ 30.741180] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 30.746580] kthread+0x334/0x6f0 [ 30.749811] ret_from_fork+0x113/0x1d0 [ 30.753565] ret_from_fork_asm+0x1a/0x30 [ 30.757499] [ 30.758997] Freed by task 237: [ 30.762058] kasan_save_stack+0x45/0x70 [ 30.765897] kasan_save_track+0x18/0x40 [ 30.769737] kasan_save_free_info+0x3f/0x60 [ 30.773922] __kasan_slab_free+0x56/0x70 [ 30.777850] kfree+0x222/0x3f0 [ 30.780918] ksize_uaf+0x12c/0x6c0 [ 30.784323] kunit_try_run_case+0x1a2/0x480 [ 30.788542] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 30.793943] kthread+0x334/0x6f0 [ 30.797176] ret_from_fork+0x113/0x1d0 [ 30.800927] ret_from_fork_asm+0x1a/0x30 [ 30.804853] [ 30.806363] The buggy address belongs to the object at ffff888105bb0200 [ 30.806363] which belongs to the cache kmalloc-128 of size 128 [ 30.818895] The buggy address is located 0 bytes inside of [ 30.818895] freed 128-byte region [ffff888105bb0200, ffff888105bb0280) [ 30.830975] [ 30.832475] The buggy address belongs to the physical page: [ 30.838046] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb0 [ 30.846045] flags: 0x200000000000000(node=0|zone=2) [ 30.850925] page_type: f5(slab) [ 30.854074] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 30.861819] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.869560] page dumped because: kasan: bad access detected [ 30.875130] [ 30.876631] Memory state around the buggy address: [ 30.881425] ffff888105bb0100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.888653] ffff888105bb0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.895870] >ffff888105bb0200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.903088] ^ [ 30.906322] ffff888105bb0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.913567] ffff888105bb0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.920788] ================================================================== [ 31.330048] ================================================================== [ 31.337279] BUG: KASAN: slab-use-after-free in ksize_uaf+0x5e4/0x6c0 [ 31.343631] Read of size 1 at addr ffff888105bb0278 by task kunit_try_catch/237 [ 31.350937] [ 31.352437] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 31.352445] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 31.352448] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 31.352451] Call Trace: [ 31.352452] <TASK> [ 31.352454] dump_stack_lvl+0x73/0xb0 [ 31.352458] print_report+0xd1/0x650 [ 31.352462] ? __virt_addr_valid+0x1db/0x2d0 [ 31.352466] ? ksize_uaf+0x5e4/0x6c0 [ 31.352470] ? kasan_complete_mode_report_info+0x64/0x200 [ 31.352475] ? ksize_uaf+0x5e4/0x6c0 [ 31.352478] kasan_report+0x141/0x180 [ 31.352482] ? ksize_uaf+0x5e4/0x6c0 [ 31.352487] __asan_report_load1_noabort+0x18/0x20 [ 31.352492] ksize_uaf+0x5e4/0x6c0 [ 31.352495] ? __pfx_ksize_uaf+0x10/0x10 [ 31.352499] ? __schedule+0x10cc/0x2b60 [ 31.352503] ? ktime_get_ts64+0x83/0x230 [ 31.352507] kunit_try_run_case+0x1a2/0x480 [ 31.352512] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.352516] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 31.352520] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.352524] ? __kthread_parkme+0x82/0x180 [ 31.352527] ? preempt_count_sub+0x50/0x80 [ 31.352531] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.352536] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 31.352540] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.352544] kthread+0x334/0x6f0 [ 31.352547] ? trace_preempt_on+0x20/0xc0 [ 31.352551] ? __pfx_kthread+0x10/0x10 [ 31.352555] ? _raw_spin_unlock_irq+0x47/0x80 [ 31.352559] ? calculate_sigpending+0x7b/0xa0 [ 31.352563] ? __pfx_kthread+0x10/0x10 [ 31.352567] ret_from_fork+0x113/0x1d0 [ 31.352570] ? __pfx_kthread+0x10/0x10 [ 31.352574] ret_from_fork_asm+0x1a/0x30 [ 31.352579] </TASK> [ 31.352581] [ 31.513906] Allocated by task 237: [ 31.517311] kasan_save_stack+0x45/0x70 [ 31.521150] kasan_save_track+0x18/0x40 [ 31.524988] kasan_save_alloc_info+0x3b/0x50 [ 31.529263] __kasan_kmalloc+0xb7/0xc0 [ 31.533016] __kmalloc_cache_noprof+0x189/0x420 [ 31.537555] ksize_uaf+0xaa/0x6c0 [ 31.540876] kunit_try_run_case+0x1a2/0x480 [ 31.545061] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 31.550460] kthread+0x334/0x6f0 [ 31.553692] ret_from_fork+0x113/0x1d0 [ 31.557445] ret_from_fork_asm+0x1a/0x30 [ 31.561372] [ 31.562897] Freed by task 237: [ 31.565956] kasan_save_stack+0x45/0x70 [ 31.569796] kasan_save_track+0x18/0x40 [ 31.573635] kasan_save_free_info+0x3f/0x60 [ 31.577821] __kasan_slab_free+0x56/0x70 [ 31.581747] kfree+0x222/0x3f0 [ 31.584808] ksize_uaf+0x12c/0x6c0 [ 31.588214] kunit_try_run_case+0x1a2/0x480 [ 31.592409] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 31.597817] kthread+0x334/0x6f0 [ 31.601047] ret_from_fork+0x113/0x1d0 [ 31.604802] ret_from_fork_asm+0x1a/0x30 [ 31.608726] [ 31.610226] The buggy address belongs to the object at ffff888105bb0200 [ 31.610226] which belongs to the cache kmalloc-128 of size 128 [ 31.622742] The buggy address is located 120 bytes inside of [ 31.622742] freed 128-byte region [ffff888105bb0200, ffff888105bb0280) [ 31.634995] [ 31.636494] The buggy address belongs to the physical page: [ 31.642066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb0 [ 31.650065] flags: 0x200000000000000(node=0|zone=2) [ 31.654946] page_type: f5(slab) [ 31.658093] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 31.665833] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.673580] page dumped because: kasan: bad access detected [ 31.679151] [ 31.680649] Memory state around the buggy address: [ 31.685445] ffff888105bb0100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.692671] ffff888105bb0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.699890] >ffff888105bb0200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.707112] ^ [ 31.714243] ffff888105bb0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.721461] ffff888105bb0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.728680] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 29.764179] ================================================================== [ 29.771411] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 29.778812] Read of size 1 at addr ffff88810133d578 by task kunit_try_catch/235 [ 29.786118] [ 29.787617] CPU: 2 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 29.787625] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 29.787628] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 29.787631] Call Trace: [ 29.787632] <TASK> [ 29.787634] dump_stack_lvl+0x73/0xb0 [ 29.787638] print_report+0xd1/0x650 [ 29.787642] ? __virt_addr_valid+0x1db/0x2d0 [ 29.787646] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 29.787650] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.787655] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 29.787660] kasan_report+0x141/0x180 [ 29.787664] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 29.787669] __asan_report_load1_noabort+0x18/0x20 [ 29.787673] ksize_unpoisons_memory+0x7e9/0x9b0 [ 29.787678] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 29.787682] ? finish_task_switch.isra.0+0x153/0x700 [ 29.787686] ? __switch_to+0x544/0xf50 [ 29.787691] ? __schedule+0x10cc/0x2b60 [ 29.787694] ? ktime_get_ts64+0x83/0x230 [ 29.787699] kunit_try_run_case+0x1a2/0x480 [ 29.787703] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.787707] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.787711] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.787715] ? __kthread_parkme+0x82/0x180 [ 29.787719] ? preempt_count_sub+0x50/0x80 [ 29.787723] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.787727] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 29.787731] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.787735] kthread+0x334/0x6f0 [ 29.787739] ? trace_preempt_on+0x20/0xc0 [ 29.787743] ? __pfx_kthread+0x10/0x10 [ 29.787746] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.787750] ? calculate_sigpending+0x7b/0xa0 [ 29.787754] ? __pfx_kthread+0x10/0x10 [ 29.787758] ret_from_fork+0x113/0x1d0 [ 29.787761] ? __pfx_kthread+0x10/0x10 [ 29.787765] ret_from_fork_asm+0x1a/0x30 [ 29.787771] </TASK> [ 29.787772] [ 29.963399] Allocated by task 235: [ 29.966808] kasan_save_stack+0x45/0x70 [ 29.970646] kasan_save_track+0x18/0x40 [ 29.974486] kasan_save_alloc_info+0x3b/0x50 [ 29.978760] __kasan_kmalloc+0xb7/0xc0 [ 29.982511] __kmalloc_cache_noprof+0x189/0x420 [ 29.987046] ksize_unpoisons_memory+0xc7/0x9b0 [ 29.991498] kunit_try_run_case+0x1a2/0x480 [ 29.995687] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 30.001093] kthread+0x334/0x6f0 [ 30.004326] ret_from_fork+0x113/0x1d0 [ 30.008105] ret_from_fork_asm+0x1a/0x30 [ 30.012030] [ 30.013530] The buggy address belongs to the object at ffff88810133d500 [ 30.013530] which belongs to the cache kmalloc-128 of size 128 [ 30.026046] The buggy address is located 5 bytes to the right of [ 30.026046] allocated 115-byte region [ffff88810133d500, ffff88810133d573) [ 30.038992] [ 30.040490] The buggy address belongs to the physical page: [ 30.046066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10133d [ 30.054072] flags: 0x200000000000000(node=0|zone=2) [ 30.058952] page_type: f5(slab) [ 30.062099] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 30.069848] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.077593] page dumped because: kasan: bad access detected [ 30.083167] [ 30.084665] Memory state around the buggy address: [ 30.089459] ffff88810133d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.096676] ffff88810133d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.103896] >ffff88810133d500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.111117] ^ [ 30.118248] ffff88810133d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.125467] ffff88810133d600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.132689] ================================================================== [ 29.384125] ================================================================== [ 29.395582] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 29.402984] Read of size 1 at addr ffff88810133d573 by task kunit_try_catch/235 [ 29.410297] [ 29.411800] CPU: 2 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 29.411809] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 29.411812] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 29.411815] Call Trace: [ 29.411817] <TASK> [ 29.411819] dump_stack_lvl+0x73/0xb0 [ 29.411823] print_report+0xd1/0x650 [ 29.411827] ? __virt_addr_valid+0x1db/0x2d0 [ 29.411831] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 29.411836] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.411841] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 29.411845] kasan_report+0x141/0x180 [ 29.411849] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 29.411854] __asan_report_load1_noabort+0x18/0x20 [ 29.411859] ksize_unpoisons_memory+0x81c/0x9b0 [ 29.411863] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 29.411867] ? finish_task_switch.isra.0+0x153/0x700 [ 29.411871] ? __switch_to+0x544/0xf50 [ 29.411876] ? __schedule+0x10cc/0x2b60 [ 29.411880] ? ktime_get_ts64+0x83/0x230 [ 29.411884] kunit_try_run_case+0x1a2/0x480 [ 29.411888] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.411893] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.411897] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.411901] ? __kthread_parkme+0x82/0x180 [ 29.411904] ? preempt_count_sub+0x50/0x80 [ 29.411908] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.411913] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 29.411917] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.411921] kthread+0x334/0x6f0 [ 29.411925] ? trace_preempt_on+0x20/0xc0 [ 29.411929] ? __pfx_kthread+0x10/0x10 [ 29.411932] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.411936] ? calculate_sigpending+0x7b/0xa0 [ 29.411941] ? __pfx_kthread+0x10/0x10 [ 29.411944] ret_from_fork+0x113/0x1d0 [ 29.411948] ? __pfx_kthread+0x10/0x10 [ 29.411951] ret_from_fork_asm+0x1a/0x30 [ 29.411957] </TASK> [ 29.411959] [ 29.587721] Allocated by task 235: [ 29.591127] kasan_save_stack+0x45/0x70 [ 29.594965] kasan_save_track+0x18/0x40 [ 29.598805] kasan_save_alloc_info+0x3b/0x50 [ 29.603078] __kasan_kmalloc+0xb7/0xc0 [ 29.606832] __kmalloc_cache_noprof+0x189/0x420 [ 29.611372] ksize_unpoisons_memory+0xc7/0x9b0 [ 29.615843] kunit_try_run_case+0x1a2/0x480 [ 29.620030] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 29.625429] kthread+0x334/0x6f0 [ 29.628661] ret_from_fork+0x113/0x1d0 [ 29.632413] ret_from_fork_asm+0x1a/0x30 [ 29.636363] [ 29.637882] The buggy address belongs to the object at ffff88810133d500 [ 29.637882] which belongs to the cache kmalloc-128 of size 128 [ 29.650404] The buggy address is located 0 bytes to the right of [ 29.650404] allocated 115-byte region [ffff88810133d500, ffff88810133d573) [ 29.663366] [ 29.664880] The buggy address belongs to the physical page: [ 29.670454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10133d [ 29.678462] flags: 0x200000000000000(node=0|zone=2) [ 29.683362] page_type: f5(slab) [ 29.686531] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 29.694279] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.702017] page dumped because: kasan: bad access detected [ 29.707590] [ 29.709089] Memory state around the buggy address: [ 29.713882] ffff88810133d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.721102] ffff88810133d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.728328] >ffff88810133d500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.735574] ^ [ 29.742447] ffff88810133d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.749665] ffff88810133d600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.756885] ================================================================== [ 30.139944] ================================================================== [ 30.147195] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 30.154588] Read of size 1 at addr ffff88810133d57f by task kunit_try_catch/235 [ 30.161901] [ 30.163405] CPU: 2 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 30.163413] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 30.163416] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 30.163419] Call Trace: [ 30.163420] <TASK> [ 30.163422] dump_stack_lvl+0x73/0xb0 [ 30.163426] print_report+0xd1/0x650 [ 30.163430] ? __virt_addr_valid+0x1db/0x2d0 [ 30.163434] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 30.163438] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.163443] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 30.163448] kasan_report+0x141/0x180 [ 30.163451] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 30.163457] __asan_report_load1_noabort+0x18/0x20 [ 30.163461] ksize_unpoisons_memory+0x7b6/0x9b0 [ 30.163466] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 30.163470] ? finish_task_switch.isra.0+0x153/0x700 [ 30.163474] ? __switch_to+0x544/0xf50 [ 30.163478] ? __schedule+0x10cc/0x2b60 [ 30.163482] ? ktime_get_ts64+0x83/0x230 [ 30.163486] kunit_try_run_case+0x1a2/0x480 [ 30.163491] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.163495] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.163499] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.163503] ? __kthread_parkme+0x82/0x180 [ 30.163507] ? preempt_count_sub+0x50/0x80 [ 30.163511] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.163515] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 30.163519] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.163523] kthread+0x334/0x6f0 [ 30.163527] ? trace_preempt_on+0x20/0xc0 [ 30.163531] ? __pfx_kthread+0x10/0x10 [ 30.163534] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.163538] ? calculate_sigpending+0x7b/0xa0 [ 30.163542] ? __pfx_kthread+0x10/0x10 [ 30.163546] ret_from_fork+0x113/0x1d0 [ 30.163549] ? __pfx_kthread+0x10/0x10 [ 30.163553] ret_from_fork_asm+0x1a/0x30 [ 30.163559] </TASK> [ 30.163560] [ 30.339229] Allocated by task 235: [ 30.342638] kasan_save_stack+0x45/0x70 [ 30.346477] kasan_save_track+0x18/0x40 [ 30.350316] kasan_save_alloc_info+0x3b/0x50 [ 30.354587] __kasan_kmalloc+0xb7/0xc0 [ 30.358363] __kmalloc_cache_noprof+0x189/0x420 [ 30.362900] ksize_unpoisons_memory+0xc7/0x9b0 [ 30.367362] kunit_try_run_case+0x1a2/0x480 [ 30.371574] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 30.376975] kthread+0x334/0x6f0 [ 30.380216] ret_from_fork+0x113/0x1d0 [ 30.383968] ret_from_fork_asm+0x1a/0x30 [ 30.387895] [ 30.389401] The buggy address belongs to the object at ffff88810133d500 [ 30.389401] which belongs to the cache kmalloc-128 of size 128 [ 30.401917] The buggy address is located 12 bytes to the right of [ 30.401917] allocated 115-byte region [ffff88810133d500, ffff88810133d573) [ 30.414960] [ 30.416457] The buggy address belongs to the physical page: [ 30.422032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10133d [ 30.430040] flags: 0x200000000000000(node=0|zone=2) [ 30.434919] page_type: f5(slab) [ 30.438065] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 30.445805] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.453544] page dumped because: kasan: bad access detected [ 30.459117] [ 30.460616] Memory state around the buggy address: [ 30.465409] ffff88810133d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.472628] ffff88810133d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.479847] >ffff88810133d500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.487067] ^ [ 30.494198] ffff88810133d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.501418] ffff88810133d600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.508636] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[ 28.959089] ================================================================== [ 28.966363] BUG: KASAN: double-free in kfree_sensitive+0x2e/0x90 [ 28.972399] Free of addr ffff888105602c00 by task kunit_try_catch/233 [ 28.978837] [ 28.980363] CPU: 1 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 28.980371] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 28.980374] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 28.980390] Call Trace: [ 28.980391] <TASK> [ 28.980393] dump_stack_lvl+0x73/0xb0 [ 28.980397] print_report+0xd1/0x650 [ 28.980401] ? __virt_addr_valid+0x1db/0x2d0 [ 28.980405] ? kasan_complete_mode_report_info+0x64/0x200 [ 28.980410] ? kfree_sensitive+0x2e/0x90 [ 28.980414] kasan_report_invalid_free+0x10a/0x130 [ 28.980418] ? kfree_sensitive+0x2e/0x90 [ 28.980422] ? kfree_sensitive+0x2e/0x90 [ 28.980425] check_slab_allocation+0x101/0x130 [ 28.980429] __kasan_slab_pre_free+0x28/0x40 [ 28.980433] kfree+0xf0/0x3f0 [ 28.980437] ? kfree_sensitive+0x2e/0x90 [ 28.980441] kfree_sensitive+0x2e/0x90 [ 28.980444] kmalloc_double_kzfree+0x19c/0x350 [ 28.980448] ? __pfx_kmalloc_double_kzfree+0x10/0x10 [ 28.980453] ? __schedule+0x10cc/0x2b60 [ 28.980456] ? ktime_get_ts64+0x83/0x230 [ 28.980461] kunit_try_run_case+0x1a2/0x480 [ 28.980465] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.980469] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.980473] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.980477] ? __kthread_parkme+0x82/0x180 [ 28.980481] ? preempt_count_sub+0x50/0x80 [ 28.980485] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.980489] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 28.980493] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.980497] kthread+0x334/0x6f0 [ 28.980501] ? trace_preempt_on+0x20/0xc0 [ 28.980505] ? __pfx_kthread+0x10/0x10 [ 28.980509] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.980512] ? calculate_sigpending+0x7b/0xa0 [ 28.980517] ? __pfx_kthread+0x10/0x10 [ 28.980520] ret_from_fork+0x113/0x1d0 [ 28.980524] ? __pfx_kthread+0x10/0x10 [ 28.980527] ret_from_fork_asm+0x1a/0x30 [ 28.980533] </TASK> [ 28.980534] [ 29.160709] Allocated by task 233: [ 29.164113] kasan_save_stack+0x45/0x70 [ 29.167952] kasan_save_track+0x18/0x40 [ 29.171791] kasan_save_alloc_info+0x3b/0x50 [ 29.176064] __kasan_kmalloc+0xb7/0xc0 [ 29.179818] __kmalloc_cache_noprof+0x189/0x420 [ 29.184365] kmalloc_double_kzfree+0xa9/0x350 [ 29.188753] kunit_try_run_case+0x1a2/0x480 [ 29.192939] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 29.198365] kthread+0x334/0x6f0 [ 29.201622] ret_from_fork+0x113/0x1d0 [ 29.205388] ret_from_fork_asm+0x1a/0x30 [ 29.209326] [ 29.210853] Freed by task 233: [ 29.213911] kasan_save_stack+0x45/0x70 [ 29.217752] kasan_save_track+0x18/0x40 [ 29.221589] kasan_save_free_info+0x3f/0x60 [ 29.225778] __kasan_slab_free+0x56/0x70 [ 29.229702] kfree+0x222/0x3f0 [ 29.232761] kfree_sensitive+0x67/0x90 [ 29.236514] kmalloc_double_kzfree+0x12b/0x350 [ 29.240960] kunit_try_run_case+0x1a2/0x480 [ 29.245147] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 29.250546] kthread+0x334/0x6f0 [ 29.253778] ret_from_fork+0x113/0x1d0 [ 29.257530] ret_from_fork_asm+0x1a/0x30 [ 29.261456] [ 29.262957] The buggy address belongs to the object at ffff888105602c00 [ 29.262957] which belongs to the cache kmalloc-16 of size 16 [ 29.275298] The buggy address is located 0 bytes inside of [ 29.275298] 16-byte region [ffff888105602c00, ffff888105602c10) [ 29.286771] [ 29.288272] The buggy address belongs to the physical page: [ 29.293844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105602 [ 29.301843] flags: 0x200000000000000(node=0|zone=2) [ 29.306723] page_type: f5(slab) [ 29.309871] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 29.317619] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 29.325364] page dumped because: kasan: bad access detected [ 29.330939] [ 29.332437] Memory state around the buggy address: [ 29.337230] ffff888105602b00: 00 03 fc fc 00 03 fc fc fa fb fc fc 00 04 fc fc [ 29.344450] ffff888105602b80: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 29.351670] >ffff888105602c00: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.358898] ^ [ 29.362129] ffff888105602c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.369364] ffff888105602d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.376585] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 28.530583] ================================================================== [ 28.545022] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x19c/0x350 [ 28.552422] Read of size 1 at addr ffff888105602c00 by task kunit_try_catch/233 [ 28.559728] [ 28.561229] CPU: 1 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 28.561238] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 28.561240] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 28.561244] Call Trace: [ 28.561245] <TASK> [ 28.561247] dump_stack_lvl+0x73/0xb0 [ 28.561252] print_report+0xd1/0x650 [ 28.561256] ? __virt_addr_valid+0x1db/0x2d0 [ 28.561260] ? kmalloc_double_kzfree+0x19c/0x350 [ 28.561264] ? kasan_complete_mode_report_info+0x64/0x200 [ 28.561269] ? kmalloc_double_kzfree+0x19c/0x350 [ 28.561273] kasan_report+0x141/0x180 [ 28.561277] ? kmalloc_double_kzfree+0x19c/0x350 [ 28.561282] ? kmalloc_double_kzfree+0x19c/0x350 [ 28.561286] __kasan_check_byte+0x3d/0x50 [ 28.561290] kfree_sensitive+0x22/0x90 [ 28.561294] kmalloc_double_kzfree+0x19c/0x350 [ 28.561298] ? __pfx_kmalloc_double_kzfree+0x10/0x10 [ 28.561302] ? __schedule+0x10cc/0x2b60 [ 28.561306] ? ktime_get_ts64+0x83/0x230 [ 28.561310] kunit_try_run_case+0x1a2/0x480 [ 28.561315] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.561319] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.561323] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.561327] ? __kthread_parkme+0x82/0x180 [ 28.561347] ? preempt_count_sub+0x50/0x80 [ 28.561352] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.561356] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 28.561360] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.561365] kthread+0x334/0x6f0 [ 28.561368] ? trace_preempt_on+0x20/0xc0 [ 28.561372] ? __pfx_kthread+0x10/0x10 [ 28.561388] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.561392] ? calculate_sigpending+0x7b/0xa0 [ 28.561397] ? __pfx_kthread+0x10/0x10 [ 28.561400] ret_from_fork+0x113/0x1d0 [ 28.561404] ? __pfx_kthread+0x10/0x10 [ 28.561407] ret_from_fork_asm+0x1a/0x30 [ 28.561413] </TASK> [ 28.561415] [ 28.735549] Allocated by task 233: [ 28.738954] kasan_save_stack+0x45/0x70 [ 28.742795] kasan_save_track+0x18/0x40 [ 28.746634] kasan_save_alloc_info+0x3b/0x50 [ 28.750906] __kasan_kmalloc+0xb7/0xc0 [ 28.754658] __kmalloc_cache_noprof+0x189/0x420 [ 28.759191] kmalloc_double_kzfree+0xa9/0x350 [ 28.763549] kunit_try_run_case+0x1a2/0x480 [ 28.767737] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 28.773135] kthread+0x334/0x6f0 [ 28.776370] ret_from_fork+0x113/0x1d0 [ 28.780148] ret_from_fork_asm+0x1a/0x30 [ 28.784074] [ 28.785574] Freed by task 233: [ 28.788633] kasan_save_stack+0x45/0x70 [ 28.792472] kasan_save_track+0x18/0x40 [ 28.796310] kasan_save_free_info+0x3f/0x60 [ 28.800497] __kasan_slab_free+0x56/0x70 [ 28.804422] kfree+0x222/0x3f0 [ 28.807483] kfree_sensitive+0x67/0x90 [ 28.811235] kmalloc_double_kzfree+0x12b/0x350 [ 28.815690] kunit_try_run_case+0x1a2/0x480 [ 28.819883] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 28.825283] kthread+0x334/0x6f0 [ 28.828517] ret_from_fork+0x113/0x1d0 [ 28.832267] ret_from_fork_asm+0x1a/0x30 [ 28.836195] [ 28.837695] The buggy address belongs to the object at ffff888105602c00 [ 28.837695] which belongs to the cache kmalloc-16 of size 16 [ 28.850036] The buggy address is located 0 bytes inside of [ 28.850036] freed 16-byte region [ffff888105602c00, ffff888105602c10) [ 28.862037] [ 28.863539] The buggy address belongs to the physical page: [ 28.869109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105602 [ 28.877110] flags: 0x200000000000000(node=0|zone=2) [ 28.881988] page_type: f5(slab) [ 28.885136] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 28.892883] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.900621] page dumped because: kasan: bad access detected [ 28.906196] [ 28.907693] Memory state around the buggy address: [ 28.912486] ffff888105602b00: 00 03 fc fc 00 03 fc fc fa fb fc fc 00 04 fc fc [ 28.919707] ffff888105602b80: 00 04 fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 28.926926] >ffff888105602c00: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.934143] ^ [ 28.937389] ffff888105602c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.944615] ffff888105602d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.951832] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 28.108890] ================================================================== [ 28.120046] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x4a8/0x520 [ 28.126666] Read of size 1 at addr ffff8881066f50a8 by task kunit_try_catch/229 [ 28.133972] [ 28.135474] CPU: 3 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 28.135482] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 28.135485] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 28.135488] Call Trace: [ 28.135490] <TASK> [ 28.135491] dump_stack_lvl+0x73/0xb0 [ 28.135496] print_report+0xd1/0x650 [ 28.135500] ? __virt_addr_valid+0x1db/0x2d0 [ 28.135504] ? kmalloc_uaf2+0x4a8/0x520 [ 28.135507] ? kasan_complete_mode_report_info+0x64/0x200 [ 28.135512] ? kmalloc_uaf2+0x4a8/0x520 [ 28.135516] kasan_report+0x141/0x180 [ 28.135520] ? kmalloc_uaf2+0x4a8/0x520 [ 28.135524] __asan_report_load1_noabort+0x18/0x20 [ 28.135529] kmalloc_uaf2+0x4a8/0x520 [ 28.135532] ? __pfx_kmalloc_uaf2+0x10/0x10 [ 28.135536] ? finish_task_switch.isra.0+0x153/0x700 [ 28.135540] ? __switch_to+0x544/0xf50 [ 28.135545] ? __schedule+0x10cc/0x2b60 [ 28.135548] ? ktime_get_ts64+0x83/0x230 [ 28.135553] kunit_try_run_case+0x1a2/0x480 [ 28.135557] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.135561] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.135565] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.135570] ? __kthread_parkme+0x82/0x180 [ 28.135573] ? preempt_count_sub+0x50/0x80 [ 28.135577] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.135581] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 28.135585] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.135590] kthread+0x334/0x6f0 [ 28.135593] ? trace_preempt_on+0x20/0xc0 [ 28.135597] ? __pfx_kthread+0x10/0x10 [ 28.135601] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.135605] ? calculate_sigpending+0x7b/0xa0 [ 28.135609] ? __pfx_kthread+0x10/0x10 [ 28.135613] ret_from_fork+0x113/0x1d0 [ 28.135616] ? __pfx_kthread+0x10/0x10 [ 28.135620] ret_from_fork_asm+0x1a/0x30 [ 28.135625] </TASK> [ 28.135627] [ 28.306915] Allocated by task 229: [ 28.310319] kasan_save_stack+0x45/0x70 [ 28.314187] kasan_save_track+0x18/0x40 [ 28.318025] kasan_save_alloc_info+0x3b/0x50 [ 28.322298] __kasan_kmalloc+0xb7/0xc0 [ 28.326049] __kmalloc_cache_noprof+0x189/0x420 [ 28.330584] kmalloc_uaf2+0xc6/0x520 [ 28.334163] kunit_try_run_case+0x1a2/0x480 [ 28.338367] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 28.343792] kthread+0x334/0x6f0 [ 28.347023] ret_from_fork+0x113/0x1d0 [ 28.350777] ret_from_fork_asm+0x1a/0x30 [ 28.354702] [ 28.356202] Freed by task 229: [ 28.359260] kasan_save_stack+0x45/0x70 [ 28.363100] kasan_save_track+0x18/0x40 [ 28.366940] kasan_save_free_info+0x3f/0x60 [ 28.371124] __kasan_slab_free+0x56/0x70 [ 28.375051] kfree+0x222/0x3f0 [ 28.378110] kmalloc_uaf2+0x14c/0x520 [ 28.381776] kunit_try_run_case+0x1a2/0x480 [ 28.385962] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 28.391363] kthread+0x334/0x6f0 [ 28.394621] ret_from_fork+0x113/0x1d0 [ 28.398373] ret_from_fork_asm+0x1a/0x30 [ 28.402316] [ 28.403817] The buggy address belongs to the object at ffff8881066f5080 [ 28.403817] which belongs to the cache kmalloc-64 of size 64 [ 28.416158] The buggy address is located 40 bytes inside of [ 28.416158] freed 64-byte region [ffff8881066f5080, ffff8881066f50c0) [ 28.428241] [ 28.429737] The buggy address belongs to the physical page: [ 28.435312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f5 [ 28.443318] flags: 0x200000000000000(node=0|zone=2) [ 28.448225] page_type: f5(slab) [ 28.451395] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 28.459137] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.466882] page dumped because: kasan: bad access detected [ 28.472456] [ 28.473955] Memory state around the buggy address: [ 28.478748] ffff8881066f4f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.485967] ffff8881066f5000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.493188] >ffff8881066f5080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.500406] ^ [ 28.504939] ffff8881066f5100: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 28.512159] ffff8881066f5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.519378] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 27.694410] ================================================================== [ 27.704975] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x1a3/0x360 [ 27.712115] Write of size 33 at addr ffff88810629ff80 by task kunit_try_catch/227 [ 27.719594] [ 27.721095] CPU: 3 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 27.721104] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 27.721107] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 27.721110] Call Trace: [ 27.721111] <TASK> [ 27.721113] dump_stack_lvl+0x73/0xb0 [ 27.721118] print_report+0xd1/0x650 [ 27.721122] ? __virt_addr_valid+0x1db/0x2d0 [ 27.721125] ? kmalloc_uaf_memset+0x1a3/0x360 [ 27.721129] ? kasan_complete_mode_report_info+0x64/0x200 [ 27.721134] ? kmalloc_uaf_memset+0x1a3/0x360 [ 27.721138] kasan_report+0x141/0x180 [ 27.721142] ? kmalloc_uaf_memset+0x1a3/0x360 [ 27.721147] kasan_check_range+0x10c/0x1c0 [ 27.721151] __asan_memset+0x27/0x50 [ 27.721154] kmalloc_uaf_memset+0x1a3/0x360 [ 27.721158] ? __pfx_kmalloc_uaf_memset+0x10/0x10 [ 27.721162] ? __schedule+0x10cc/0x2b60 [ 27.721166] ? ktime_get_ts64+0x83/0x230 [ 27.721170] kunit_try_run_case+0x1a2/0x480 [ 27.721175] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.721179] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.721183] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.721187] ? __kthread_parkme+0x82/0x180 [ 27.721190] ? preempt_count_sub+0x50/0x80 [ 27.721195] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.721199] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 27.721203] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.721207] kthread+0x334/0x6f0 [ 27.721210] ? trace_preempt_on+0x20/0xc0 [ 27.721214] ? __pfx_kthread+0x10/0x10 [ 27.721218] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.721222] ? calculate_sigpending+0x7b/0xa0 [ 27.721226] ? __pfx_kthread+0x10/0x10 [ 27.721230] ret_from_fork+0x113/0x1d0 [ 27.721233] ? __pfx_kthread+0x10/0x10 [ 27.721237] ret_from_fork_asm+0x1a/0x30 [ 27.721243] </TASK> [ 27.721244] [ 27.889365] Allocated by task 227: [ 27.892771] kasan_save_stack+0x45/0x70 [ 27.896611] kasan_save_track+0x18/0x40 [ 27.900451] kasan_save_alloc_info+0x3b/0x50 [ 27.904730] __kasan_kmalloc+0xb7/0xc0 [ 27.908484] __kmalloc_cache_noprof+0x189/0x420 [ 27.913017] kmalloc_uaf_memset+0xa9/0x360 [ 27.917116] kunit_try_run_case+0x1a2/0x480 [ 27.921303] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 27.926703] kthread+0x334/0x6f0 [ 27.929935] ret_from_fork+0x113/0x1d0 [ 27.933686] ret_from_fork_asm+0x1a/0x30 [ 27.937614] [ 27.939112] Freed by task 227: [ 27.942170] kasan_save_stack+0x45/0x70 [ 27.946010] kasan_save_track+0x18/0x40 [ 27.949849] kasan_save_free_info+0x3f/0x60 [ 27.954036] __kasan_slab_free+0x56/0x70 [ 27.957962] kfree+0x222/0x3f0 [ 27.961020] kmalloc_uaf_memset+0x12b/0x360 [ 27.965206] kunit_try_run_case+0x1a2/0x480 [ 27.969414] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 27.974819] kthread+0x334/0x6f0 [ 27.978050] ret_from_fork+0x113/0x1d0 [ 27.981804] ret_from_fork_asm+0x1a/0x30 [ 27.985731] [ 27.987229] The buggy address belongs to the object at ffff88810629ff80 [ 27.987229] which belongs to the cache kmalloc-64 of size 64 [ 27.999570] The buggy address is located 0 bytes inside of [ 27.999570] freed 64-byte region [ffff88810629ff80, ffff88810629ffc0) [ 28.011565] [ 28.013063] The buggy address belongs to the physical page: [ 28.018636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10629f [ 28.026636] flags: 0x200000000000000(node=0|zone=2) [ 28.031515] page_type: f5(slab) [ 28.034662] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 28.042409] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.050149] page dumped because: kasan: bad access detected [ 28.055721] [ 28.057219] Memory state around the buggy address: [ 28.062013] ffff88810629fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.069234] ffff88810629ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.076454] >ffff88810629ff80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.083681] ^ [ 28.086912] ffff8881062a0000: fa fc fc fc 04 fc fc fc fa fc fc fc fa fc fc fc [ 28.094131] ffff8881062a0080: 02 fc fc fc fa fc fc fc 04 fc fc fc fa fc fc fc [ 28.101365] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 27.285938] ================================================================== [ 27.297973] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x320/0x380 [ 27.304506] Read of size 1 at addr ffff888106713188 by task kunit_try_catch/225 [ 27.311812] [ 27.313314] CPU: 3 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 27.313323] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 27.313326] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 27.313329] Call Trace: [ 27.313331] <TASK> [ 27.313350] dump_stack_lvl+0x73/0xb0 [ 27.313355] print_report+0xd1/0x650 [ 27.313359] ? __virt_addr_valid+0x1db/0x2d0 [ 27.313363] ? kmalloc_uaf+0x320/0x380 [ 27.313379] ? kasan_complete_mode_report_info+0x64/0x200 [ 27.313384] ? kmalloc_uaf+0x320/0x380 [ 27.313388] kasan_report+0x141/0x180 [ 27.313392] ? kmalloc_uaf+0x320/0x380 [ 27.313396] __asan_report_load1_noabort+0x18/0x20 [ 27.313401] kmalloc_uaf+0x320/0x380 [ 27.313404] ? __pfx_kmalloc_uaf+0x10/0x10 [ 27.313408] ? __schedule+0x10cc/0x2b60 [ 27.313412] ? ktime_get_ts64+0x83/0x230 [ 27.313416] kunit_try_run_case+0x1a2/0x480 [ 27.313421] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.313425] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.313429] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.313433] ? __kthread_parkme+0x82/0x180 [ 27.313437] ? preempt_count_sub+0x50/0x80 [ 27.313441] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.313445] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 27.313449] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.313453] kthread+0x334/0x6f0 [ 27.313457] ? trace_preempt_on+0x20/0xc0 [ 27.313461] ? __pfx_kthread+0x10/0x10 [ 27.313464] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.313468] ? calculate_sigpending+0x7b/0xa0 [ 27.313473] ? __pfx_kthread+0x10/0x10 [ 27.313476] ret_from_fork+0x113/0x1d0 [ 27.313480] ? __pfx_kthread+0x10/0x10 [ 27.313483] ret_from_fork_asm+0x1a/0x30 [ 27.313489] </TASK> [ 27.313491] [ 27.475724] Allocated by task 225: [ 27.479129] kasan_save_stack+0x45/0x70 [ 27.482969] kasan_save_track+0x18/0x40 [ 27.486808] kasan_save_alloc_info+0x3b/0x50 [ 27.491080] __kasan_kmalloc+0xb7/0xc0 [ 27.494833] __kmalloc_cache_noprof+0x189/0x420 [ 27.499379] kmalloc_uaf+0xaa/0x380 [ 27.502879] kunit_try_run_case+0x1a2/0x480 [ 27.507072] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 27.512471] kthread+0x334/0x6f0 [ 27.515703] ret_from_fork+0x113/0x1d0 [ 27.519455] ret_from_fork_asm+0x1a/0x30 [ 27.523402] [ 27.524899] Freed by task 225: [ 27.527959] kasan_save_stack+0x45/0x70 [ 27.531798] kasan_save_track+0x18/0x40 [ 27.535637] kasan_save_free_info+0x3f/0x60 [ 27.539824] __kasan_slab_free+0x56/0x70 [ 27.543748] kfree+0x222/0x3f0 [ 27.546807] kmalloc_uaf+0x12c/0x380 [ 27.550404] kunit_try_run_case+0x1a2/0x480 [ 27.554592] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 27.559998] kthread+0x334/0x6f0 [ 27.563231] ret_from_fork+0x113/0x1d0 [ 27.566984] ret_from_fork_asm+0x1a/0x30 [ 27.570911] [ 27.572419] The buggy address belongs to the object at ffff888106713180 [ 27.572419] which belongs to the cache kmalloc-16 of size 16 [ 27.584761] The buggy address is located 8 bytes inside of [ 27.584761] freed 16-byte region [ffff888106713180, ffff888106713190) [ 27.596762] [ 27.598262] The buggy address belongs to the physical page: [ 27.603836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106713 [ 27.611842] flags: 0x200000000000000(node=0|zone=2) [ 27.616723] page_type: f5(slab) [ 27.619868] raw: 0200000000000000 ffff888100042640 dead000000000122 0000000000000000 [ 27.627607] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.635361] page dumped because: kasan: bad access detected [ 27.640962] [ 27.642461] Memory state around the buggy address: [ 27.647256] ffff888106713080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.654475] ffff888106713100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.661695] >ffff888106713180: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.668912] ^ [ 27.672420] ffff888106713200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.679643] ffff888106713280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.686862] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 26.909450] ================================================================== [ 26.921582] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x16f/0x330 [ 26.929501] Read of size 64 at addr ffff888101438f84 by task kunit_try_catch/223 [ 26.936894] [ 26.938411] CPU: 2 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 26.938420] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 26.938423] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 26.938426] Call Trace: [ 26.938428] <TASK> [ 26.938429] dump_stack_lvl+0x73/0xb0 [ 26.938434] print_report+0xd1/0x650 [ 26.938438] ? __virt_addr_valid+0x1db/0x2d0 [ 26.938442] ? kmalloc_memmove_invalid_size+0x16f/0x330 [ 26.938446] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.938451] ? kmalloc_memmove_invalid_size+0x16f/0x330 [ 26.938456] kasan_report+0x141/0x180 [ 26.938459] ? kmalloc_memmove_invalid_size+0x16f/0x330 [ 26.938465] kasan_check_range+0x10c/0x1c0 [ 26.938469] __asan_memmove+0x27/0x70 [ 26.938472] kmalloc_memmove_invalid_size+0x16f/0x330 [ 26.938477] ? __pfx_kmalloc_memmove_invalid_size+0x10/0x10 [ 26.938481] ? __schedule+0x10cc/0x2b60 [ 26.938485] ? ktime_get_ts64+0x83/0x230 [ 26.938490] kunit_try_run_case+0x1a2/0x480 [ 26.938494] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.938498] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.938502] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.938506] ? __kthread_parkme+0x82/0x180 [ 26.938510] ? preempt_count_sub+0x50/0x80 [ 26.938514] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.938518] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 26.938522] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.938526] kthread+0x334/0x6f0 [ 26.938530] ? trace_preempt_on+0x20/0xc0 [ 26.938534] ? __pfx_kthread+0x10/0x10 [ 26.938537] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.938541] ? calculate_sigpending+0x7b/0xa0 [ 26.938545] ? __pfx_kthread+0x10/0x10 [ 26.938549] ret_from_fork+0x113/0x1d0 [ 26.938552] ? __pfx_kthread+0x10/0x10 [ 26.938556] ret_from_fork_asm+0x1a/0x30 [ 26.938562] </TASK> [ 26.938563] [ 27.111094] Allocated by task 223: [ 27.114500] kasan_save_stack+0x45/0x70 [ 27.118361] kasan_save_track+0x18/0x40 [ 27.122232] kasan_save_alloc_info+0x3b/0x50 [ 27.126511] __kasan_kmalloc+0xb7/0xc0 [ 27.130264] __kmalloc_cache_noprof+0x189/0x420 [ 27.134797] kmalloc_memmove_invalid_size+0xac/0x330 [ 27.139772] kunit_try_run_case+0x1a2/0x480 [ 27.143959] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 27.149364] kthread+0x334/0x6f0 [ 27.152614] ret_from_fork+0x113/0x1d0 [ 27.156368] ret_from_fork_asm+0x1a/0x30 [ 27.160312] [ 27.161810] The buggy address belongs to the object at ffff888101438f80 [ 27.161810] which belongs to the cache kmalloc-64 of size 64 [ 27.174151] The buggy address is located 4 bytes inside of [ 27.174151] allocated 64-byte region [ffff888101438f80, ffff888101438fc0) [ 27.186495] [ 27.187992] The buggy address belongs to the physical page: [ 27.193566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101438 [ 27.201573] flags: 0x200000000000000(node=0|zone=2) [ 27.206454] page_type: f5(slab) [ 27.209601] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 27.217363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.225103] page dumped because: kasan: bad access detected [ 27.230675] [ 27.232174] Memory state around the buggy address: [ 27.236968] ffff888101438e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.244187] ffff888101438f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.251408] >ffff888101438f80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 27.258633] ^ [ 27.263946] ffff888101439000: fa fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb [ 27.271166] ffff888101439080: fb fb fc fc fc fc fa fb fb fb fb fb fb fc fc fc [ 27.278408] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 26.534895] ================================================================== [ 26.546306] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x171/0x330 [ 26.553882] Read of size 18446744073709551614 at addr ffff888101438f04 by task kunit_try_catch/221 [ 26.562843] [ 26.564363] CPU: 2 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 26.564372] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 26.564387] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 26.564390] Call Trace: [ 26.564392] <TASK> [ 26.564394] dump_stack_lvl+0x73/0xb0 [ 26.564399] print_report+0xd1/0x650 [ 26.564403] ? __virt_addr_valid+0x1db/0x2d0 [ 26.564407] ? kmalloc_memmove_negative_size+0x171/0x330 [ 26.564411] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.564416] ? kmalloc_memmove_negative_size+0x171/0x330 [ 26.564421] kasan_report+0x141/0x180 [ 26.564425] ? kmalloc_memmove_negative_size+0x171/0x330 [ 26.564430] kasan_check_range+0x10c/0x1c0 [ 26.564434] __asan_memmove+0x27/0x70 [ 26.564438] kmalloc_memmove_negative_size+0x171/0x330 [ 26.564442] ? __pfx_kmalloc_memmove_negative_size+0x10/0x10 [ 26.564447] ? __schedule+0x10cc/0x2b60 [ 26.564451] ? ktime_get_ts64+0x83/0x230 [ 26.564455] kunit_try_run_case+0x1a2/0x480 [ 26.564460] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.564464] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.564468] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.564472] ? __kthread_parkme+0x82/0x180 [ 26.564476] ? preempt_count_sub+0x50/0x80 [ 26.564480] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.564484] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 26.564488] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.564492] kthread+0x334/0x6f0 [ 26.564496] ? trace_preempt_on+0x20/0xc0 [ 26.564500] ? __pfx_kthread+0x10/0x10 [ 26.564503] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.564507] ? calculate_sigpending+0x7b/0xa0 [ 26.564511] ? __pfx_kthread+0x10/0x10 [ 26.564515] ret_from_fork+0x113/0x1d0 [ 26.564518] ? __pfx_kthread+0x10/0x10 [ 26.564522] ret_from_fork_asm+0x1a/0x30 [ 26.564528] </TASK> [ 26.564529] [ 26.737544] Allocated by task 221: [ 26.740952] kasan_save_stack+0x45/0x70 [ 26.744799] kasan_save_track+0x18/0x40 [ 26.748637] kasan_save_alloc_info+0x3b/0x50 [ 26.752910] __kasan_kmalloc+0xb7/0xc0 [ 26.756662] __kmalloc_cache_noprof+0x189/0x420 [ 26.761195] kmalloc_memmove_negative_size+0xac/0x330 [ 26.766250] kunit_try_run_case+0x1a2/0x480 [ 26.770443] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 26.775844] kthread+0x334/0x6f0 [ 26.779074] ret_from_fork+0x113/0x1d0 [ 26.782827] ret_from_fork_asm+0x1a/0x30 [ 26.786752] [ 26.788253] The buggy address belongs to the object at ffff888101438f00 [ 26.788253] which belongs to the cache kmalloc-64 of size 64 [ 26.800594] The buggy address is located 4 bytes inside of [ 26.800594] 64-byte region [ffff888101438f00, ffff888101438f40) [ 26.812070] [ 26.813569] The buggy address belongs to the physical page: [ 26.819140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101438 [ 26.827139] flags: 0x200000000000000(node=0|zone=2) [ 26.832020] page_type: f5(slab) [ 26.835166] raw: 0200000000000000 ffff8881000428c0 dead000000000122 0000000000000000 [ 26.842907] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.850654] page dumped because: kasan: bad access detected [ 26.856226] [ 26.857725] Memory state around the buggy address: [ 26.862518] ffff888101438e00: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 26.869737] ffff888101438e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.876956] >ffff888101438f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.884175] ^ [ 26.887414] ffff888101438f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.894638] ffff888101439000: fa fb fb fb fb fb fb fc fc fc fc fa fb fb fb fb [ 26.901863] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 26.161061] ================================================================== [ 26.172413] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x166/0x330 [ 26.179727] Write of size 16 at addr ffff8881066f8469 by task kunit_try_catch/219 [ 26.187213] [ 26.188715] CPU: 3 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 26.188724] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 26.188727] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 26.188730] Call Trace: [ 26.188732] <TASK> [ 26.188734] dump_stack_lvl+0x73/0xb0 [ 26.188738] print_report+0xd1/0x650 [ 26.188742] ? __virt_addr_valid+0x1db/0x2d0 [ 26.188746] ? kmalloc_oob_memset_16+0x166/0x330 [ 26.188750] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.188755] ? kmalloc_oob_memset_16+0x166/0x330 [ 26.188759] kasan_report+0x141/0x180 [ 26.188763] ? kmalloc_oob_memset_16+0x166/0x330 [ 26.188768] kasan_check_range+0x10c/0x1c0 [ 26.188772] __asan_memset+0x27/0x50 [ 26.188775] kmalloc_oob_memset_16+0x166/0x330 [ 26.188779] ? __pfx_kmalloc_oob_memset_16+0x10/0x10 [ 26.188783] ? __schedule+0x10cc/0x2b60 [ 26.188787] ? ktime_get_ts64+0x83/0x230 [ 26.188792] kunit_try_run_case+0x1a2/0x480 [ 26.188796] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.188800] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.188804] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.188808] ? __kthread_parkme+0x82/0x180 [ 26.188812] ? preempt_count_sub+0x50/0x80 [ 26.188816] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.188820] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 26.188824] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.188829] kthread+0x334/0x6f0 [ 26.188832] ? trace_preempt_on+0x20/0xc0 [ 26.188836] ? __pfx_kthread+0x10/0x10 [ 26.188840] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.188843] ? calculate_sigpending+0x7b/0xa0 [ 26.188848] ? __pfx_kthread+0x10/0x10 [ 26.188852] ret_from_fork+0x113/0x1d0 [ 26.188855] ? __pfx_kthread+0x10/0x10 [ 26.188859] ret_from_fork_asm+0x1a/0x30 [ 26.188864] </TASK> [ 26.188866] [ 26.358303] Allocated by task 219: [ 26.361706] kasan_save_stack+0x45/0x70 [ 26.365548] kasan_save_track+0x18/0x40 [ 26.369417] kasan_save_alloc_info+0x3b/0x50 [ 26.373695] __kasan_kmalloc+0xb7/0xc0 [ 26.377445] __kmalloc_cache_noprof+0x189/0x420 [ 26.381977] kmalloc_oob_memset_16+0xac/0x330 [ 26.386360] kunit_try_run_case+0x1a2/0x480 [ 26.390595] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 26.395993] kthread+0x334/0x6f0 [ 26.399224] ret_from_fork+0x113/0x1d0 [ 26.402977] ret_from_fork_asm+0x1a/0x30 [ 26.406903] [ 26.408421] The buggy address belongs to the object at ffff8881066f8400 [ 26.408421] which belongs to the cache kmalloc-128 of size 128 [ 26.420937] The buggy address is located 105 bytes inside of [ 26.420937] allocated 120-byte region [ffff8881066f8400, ffff8881066f8478) [ 26.433546] [ 26.435044] The buggy address belongs to the physical page: [ 26.440618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f8 [ 26.448624] flags: 0x200000000000000(node=0|zone=2) [ 26.453506] page_type: f5(slab) [ 26.456651] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 26.464416] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.472154] page dumped because: kasan: bad access detected [ 26.477727] [ 26.479227] Memory state around the buggy address: [ 26.484019] ffff8881066f8300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.491239] ffff8881066f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.498458] >ffff8881066f8400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 26.505677] ^ [ 26.512810] ffff8881066f8480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.520029] ffff8881066f8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.527248] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 25.787909] ================================================================== [ 25.799236] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x166/0x330 [ 25.806464] Write of size 8 at addr ffff88810133d471 by task kunit_try_catch/217 [ 25.813864] [ 25.815377] CPU: 2 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 25.815386] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 25.815389] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 25.815392] Call Trace: [ 25.815394] <TASK> [ 25.815396] dump_stack_lvl+0x73/0xb0 [ 25.815400] print_report+0xd1/0x650 [ 25.815404] ? __virt_addr_valid+0x1db/0x2d0 [ 25.815408] ? kmalloc_oob_memset_8+0x166/0x330 [ 25.815412] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.815417] ? kmalloc_oob_memset_8+0x166/0x330 [ 25.815421] kasan_report+0x141/0x180 [ 25.815425] ? kmalloc_oob_memset_8+0x166/0x330 [ 25.815430] kasan_check_range+0x10c/0x1c0 [ 25.815434] __asan_memset+0x27/0x50 [ 25.815437] kmalloc_oob_memset_8+0x166/0x330 [ 25.815441] ? __pfx_kmalloc_oob_memset_8+0x10/0x10 [ 25.815445] ? __schedule+0x10cc/0x2b60 [ 25.815449] ? ktime_get_ts64+0x83/0x230 [ 25.815454] kunit_try_run_case+0x1a2/0x480 [ 25.815458] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.815462] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.815466] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.815471] ? __kthread_parkme+0x82/0x180 [ 25.815474] ? preempt_count_sub+0x50/0x80 [ 25.815478] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.815483] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 25.815487] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.815491] kthread+0x334/0x6f0 [ 25.815494] ? trace_preempt_on+0x20/0xc0 [ 25.815498] ? __pfx_kthread+0x10/0x10 [ 25.815502] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.815505] ? calculate_sigpending+0x7b/0xa0 [ 25.815510] ? __pfx_kthread+0x10/0x10 [ 25.815514] ret_from_fork+0x113/0x1d0 [ 25.815517] ? __pfx_kthread+0x10/0x10 [ 25.815520] ret_from_fork_asm+0x1a/0x30 [ 25.815526] </TASK> [ 25.815528] [ 25.984751] Allocated by task 217: [ 25.988159] kasan_save_stack+0x45/0x70 [ 25.991997] kasan_save_track+0x18/0x40 [ 25.995837] kasan_save_alloc_info+0x3b/0x50 [ 26.000110] __kasan_kmalloc+0xb7/0xc0 [ 26.003863] __kmalloc_cache_noprof+0x189/0x420 [ 26.008416] kmalloc_oob_memset_8+0xac/0x330 [ 26.012695] kunit_try_run_case+0x1a2/0x480 [ 26.016887] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 26.022288] kthread+0x334/0x6f0 [ 26.025519] ret_from_fork+0x113/0x1d0 [ 26.029272] ret_from_fork_asm+0x1a/0x30 [ 26.033198] [ 26.034698] The buggy address belongs to the object at ffff88810133d400 [ 26.034698] which belongs to the cache kmalloc-128 of size 128 [ 26.047212] The buggy address is located 113 bytes inside of [ 26.047212] allocated 120-byte region [ffff88810133d400, ffff88810133d478) [ 26.059815] [ 26.061313] The buggy address belongs to the physical page: [ 26.066921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10133d [ 26.074921] flags: 0x200000000000000(node=0|zone=2) [ 26.079800] page_type: f5(slab) [ 26.082947] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 26.090684] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.098423] page dumped because: kasan: bad access detected [ 26.103996] [ 26.105495] Memory state around the buggy address: [ 26.110289] ffff88810133d300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.117510] ffff88810133d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.124738] >ffff88810133d400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 26.131965] ^ [ 26.139097] ffff88810133d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.146317] ffff88810133d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.153568] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 25.414888] ================================================================== [ 25.426215] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x166/0x330 [ 25.433441] Write of size 4 at addr ffff8881066f8375 by task kunit_try_catch/215 [ 25.440834] [ 25.442363] CPU: 3 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 25.442372] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 25.442387] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 25.442390] Call Trace: [ 25.442392] <TASK> [ 25.442393] dump_stack_lvl+0x73/0xb0 [ 25.442398] print_report+0xd1/0x650 [ 25.442402] ? __virt_addr_valid+0x1db/0x2d0 [ 25.442406] ? kmalloc_oob_memset_4+0x166/0x330 [ 25.442410] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.442415] ? kmalloc_oob_memset_4+0x166/0x330 [ 25.442419] kasan_report+0x141/0x180 [ 25.442422] ? kmalloc_oob_memset_4+0x166/0x330 [ 25.442427] kasan_check_range+0x10c/0x1c0 [ 25.442432] __asan_memset+0x27/0x50 [ 25.442435] kmalloc_oob_memset_4+0x166/0x330 [ 25.442439] ? __pfx_kmalloc_oob_memset_4+0x10/0x10 [ 25.442443] ? __schedule+0x10cc/0x2b60 [ 25.442447] ? ktime_get_ts64+0x83/0x230 [ 25.442451] kunit_try_run_case+0x1a2/0x480 [ 25.442456] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.442460] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.442464] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.442468] ? __kthread_parkme+0x82/0x180 [ 25.442471] ? preempt_count_sub+0x50/0x80 [ 25.442475] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.442480] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 25.442484] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.442488] kthread+0x334/0x6f0 [ 25.442491] ? trace_preempt_on+0x20/0xc0 [ 25.442495] ? __pfx_kthread+0x10/0x10 [ 25.442499] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.442503] ? calculate_sigpending+0x7b/0xa0 [ 25.442507] ? __pfx_kthread+0x10/0x10 [ 25.442511] ret_from_fork+0x113/0x1d0 [ 25.442514] ? __pfx_kthread+0x10/0x10 [ 25.442518] ret_from_fork_asm+0x1a/0x30 [ 25.442523] </TASK> [ 25.442525] [ 25.611567] Allocated by task 215: [ 25.614973] kasan_save_stack+0x45/0x70 [ 25.618813] kasan_save_track+0x18/0x40 [ 25.622654] kasan_save_alloc_info+0x3b/0x50 [ 25.626932] __kasan_kmalloc+0xb7/0xc0 [ 25.630686] __kmalloc_cache_noprof+0x189/0x420 [ 25.635218] kmalloc_oob_memset_4+0xac/0x330 [ 25.639493] kunit_try_run_case+0x1a2/0x480 [ 25.643686] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 25.649084] kthread+0x334/0x6f0 [ 25.652318] ret_from_fork+0x113/0x1d0 [ 25.656096] ret_from_fork_asm+0x1a/0x30 [ 25.660022] [ 25.661521] The buggy address belongs to the object at ffff8881066f8300 [ 25.661521] which belongs to the cache kmalloc-128 of size 128 [ 25.674028] The buggy address is located 117 bytes inside of [ 25.674028] allocated 120-byte region [ffff8881066f8300, ffff8881066f8378) [ 25.686629] [ 25.688130] The buggy address belongs to the physical page: [ 25.693700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f8 [ 25.701701] flags: 0x200000000000000(node=0|zone=2) [ 25.706581] page_type: f5(slab) [ 25.709727] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 25.717476] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.725222] page dumped because: kasan: bad access detected [ 25.730795] [ 25.732295] Memory state around the buggy address: [ 25.737087] ffff8881066f8200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.744307] ffff8881066f8280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.751533] >ffff8881066f8300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 25.758754] ^ [ 25.765886] ffff8881066f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.773106] ffff8881066f8400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.780324] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 17.342177] ================================================================== [ 17.357229] BUG: KASAN: use-after-free in page_alloc_uaf+0x356/0x3d0 [ 17.363592] Read of size 1 at addr ffff8881082d0000 by task kunit_try_catch/195 [ 17.370905] [ 17.372407] CPU: 3 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.372415] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 17.372418] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 17.372421] Call Trace: [ 17.372423] <TASK> [ 17.372425] dump_stack_lvl+0x73/0xb0 [ 17.372430] print_report+0xd1/0x650 [ 17.372434] ? __virt_addr_valid+0x1db/0x2d0 [ 17.372438] ? page_alloc_uaf+0x356/0x3d0 [ 17.372442] ? kasan_addr_to_slab+0x11/0xa0 [ 17.372445] ? page_alloc_uaf+0x356/0x3d0 [ 17.372449] kasan_report+0x141/0x180 [ 17.372453] ? page_alloc_uaf+0x356/0x3d0 [ 17.372458] __asan_report_load1_noabort+0x18/0x20 [ 17.372463] page_alloc_uaf+0x356/0x3d0 [ 17.372467] ? __pfx_page_alloc_uaf+0x10/0x10 [ 17.372471] ? __schedule+0x10cc/0x2b60 [ 17.372475] ? ktime_get_ts64+0x83/0x230 [ 17.372479] kunit_try_run_case+0x1a2/0x480 [ 17.372484] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.372488] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.372492] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.372496] ? __kthread_parkme+0x82/0x180 [ 17.372500] ? preempt_count_sub+0x50/0x80 [ 17.372504] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.372508] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 17.372512] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.372516] kthread+0x334/0x6f0 [ 17.372520] ? trace_preempt_on+0x20/0xc0 [ 17.372524] ? __pfx_kthread+0x10/0x10 [ 17.372528] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.372531] ? calculate_sigpending+0x7b/0xa0 [ 17.372536] ? __pfx_kthread+0x10/0x10 [ 17.372540] ret_from_fork+0x113/0x1d0 [ 17.372543] ? __pfx_kthread+0x10/0x10 [ 17.372547] ret_from_fork_asm+0x1a/0x30 [ 17.372552] </TASK> [ 17.372554] [ 17.534981] The buggy address belongs to the physical page: [ 17.540555] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1082d0 [ 17.548561] flags: 0x200000000000000(node=0|zone=2) [ 17.553442] page_type: f0(buddy) [ 17.556677] raw: 0200000000000000 ffff88846fffd460 ffff88846fffd460 0000000000000000 [ 17.564423] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000 [ 17.572160] page dumped because: kasan: bad access detected [ 17.577734] [ 17.579233] Memory state around the buggy address: [ 17.584027] ffff8881082cff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.591245] ffff8881082cff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.598464] >ffff8881082d0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.605682] ^ [ 17.608917] ffff8881082d0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.616137] ffff8881082d0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.623361] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[ 17.007653] ================================================================== [ 17.018650] BUG: KASAN: invalid-free in kfree+0x274/0x3f0 [ 17.024058] Free of addr ffff888106e9c001 by task kunit_try_catch/191 [ 17.030498] [ 17.031999] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 17.032007] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 17.032010] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 17.032013] Call Trace: [ 17.032015] <TASK> [ 17.032017] dump_stack_lvl+0x73/0xb0 [ 17.032022] print_report+0xd1/0x650 [ 17.032026] ? __virt_addr_valid+0x1db/0x2d0 [ 17.032030] ? kasan_addr_to_slab+0x11/0xa0 [ 17.032033] ? kfree+0x274/0x3f0 [ 17.032037] kasan_report_invalid_free+0x10a/0x130 [ 17.032042] ? kfree+0x274/0x3f0 [ 17.032046] ? kfree+0x274/0x3f0 [ 17.032050] __kasan_kfree_large+0x86/0xd0 [ 17.032054] free_large_kmalloc+0x4b/0x110 [ 17.032058] kfree+0x274/0x3f0 [ 17.032063] kmalloc_large_invalid_free+0x120/0x2b0 [ 17.032067] ? __pfx_kmalloc_large_invalid_free+0x10/0x10 [ 17.032071] ? __schedule+0x10cc/0x2b60 [ 17.032075] ? ktime_get_ts64+0x83/0x230 [ 17.032079] kunit_try_run_case+0x1a2/0x480 [ 17.032084] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.032088] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.032092] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.032096] ? __kthread_parkme+0x82/0x180 [ 17.032100] ? preempt_count_sub+0x50/0x80 [ 17.032104] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.032108] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 17.032112] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.032116] kthread+0x334/0x6f0 [ 17.032120] ? trace_preempt_on+0x20/0xc0 [ 17.032124] ? __pfx_kthread+0x10/0x10 [ 17.032127] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.032131] ? calculate_sigpending+0x7b/0xa0 [ 17.032136] ? __pfx_kthread+0x10/0x10 [ 17.032139] ret_from_fork+0x113/0x1d0 [ 17.032143] ? __pfx_kthread+0x10/0x10 [ 17.032146] ret_from_fork_asm+0x1a/0x30 [ 17.032152] </TASK> [ 17.032154] [ 17.201983] The buggy address belongs to the physical page: [ 17.207556] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e9c [ 17.215557] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.223216] flags: 0x200000000000040(head|node=0|zone=2) [ 17.228530] page_type: f8(unknown) [ 17.231936] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.239676] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.247424] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.255257] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.263084] head: 0200000000000002 ffffea00041ba701 00000000ffffffff 00000000ffffffff [ 17.270909] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.278734] page dumped because: kasan: bad access detected [ 17.284309] [ 17.285809] Memory state around the buggy address: [ 17.290602] ffff888106e9bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.297828] ffff888106e9bf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.305047] >ffff888106e9c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.312267] ^ [ 17.315499] ffff888106e9c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.322718] ffff888106e9c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.329938] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 16.723970] ================================================================== [ 16.735467] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2f1/0x340 [ 16.742080] Read of size 1 at addr ffff888106e9c000 by task kunit_try_catch/189 [ 16.749418] [ 16.750912] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.750921] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 16.750924] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 16.750927] Call Trace: [ 16.750929] <TASK> [ 16.750930] dump_stack_lvl+0x73/0xb0 [ 16.750935] print_report+0xd1/0x650 [ 16.750939] ? __virt_addr_valid+0x1db/0x2d0 [ 16.750943] ? kmalloc_large_uaf+0x2f1/0x340 [ 16.750947] ? kasan_addr_to_slab+0x11/0xa0 [ 16.750950] ? kmalloc_large_uaf+0x2f1/0x340 [ 16.750954] kasan_report+0x141/0x180 [ 16.750958] ? kmalloc_large_uaf+0x2f1/0x340 [ 16.750963] __asan_report_load1_noabort+0x18/0x20 [ 16.750967] kmalloc_large_uaf+0x2f1/0x340 [ 16.750971] ? __pfx_kmalloc_large_uaf+0x10/0x10 [ 16.750975] ? __schedule+0x10cc/0x2b60 [ 16.750979] ? ktime_get_ts64+0x83/0x230 [ 16.750983] kunit_try_run_case+0x1a2/0x480 [ 16.750987] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.750991] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.750996] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.751000] ? __kthread_parkme+0x82/0x180 [ 16.751003] ? preempt_count_sub+0x50/0x80 [ 16.751007] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.751011] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 16.751016] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.751020] kthread+0x334/0x6f0 [ 16.751023] ? trace_preempt_on+0x20/0xc0 [ 16.751027] ? __pfx_kthread+0x10/0x10 [ 16.751031] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.751034] ? calculate_sigpending+0x7b/0xa0 [ 16.751039] ? __pfx_kthread+0x10/0x10 [ 16.751043] ret_from_fork+0x113/0x1d0 [ 16.751046] ? __pfx_kthread+0x10/0x10 [ 16.751049] ret_from_fork_asm+0x1a/0x30 [ 16.751055] </TASK> [ 16.751057] [ 16.914773] The buggy address belongs to the physical page: [ 16.920374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e9c [ 16.928423] flags: 0x200000000000000(node=0|zone=2) [ 16.933310] raw: 0200000000000000 ffffea00041ba908 ffff88841f6b9f80 0000000000000000 [ 16.941051] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 16.948795] page dumped because: kasan: bad access detected [ 16.954414] [ 16.955911] Memory state around the buggy address: [ 16.960704] ffff888106e9bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.967924] ffff888106e9bf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.975142] >ffff888106e9c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.982362] ^ [ 16.985614] ffff888106e9c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.992841] ffff888106e9c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.000059] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 16.393939] ================================================================== [ 16.405271] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x2e9/0x330 [ 16.412758] Write of size 1 at addr ffff888104ffa00a by task kunit_try_catch/187 [ 16.420159] [ 16.421659] CPU: 3 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.421668] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 16.421670] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 16.421674] Call Trace: [ 16.421676] <TASK> [ 16.421678] dump_stack_lvl+0x73/0xb0 [ 16.421682] print_report+0xd1/0x650 [ 16.421686] ? __virt_addr_valid+0x1db/0x2d0 [ 16.421690] ? kmalloc_large_oob_right+0x2e9/0x330 [ 16.421694] ? kasan_addr_to_slab+0x11/0xa0 [ 16.421698] ? kmalloc_large_oob_right+0x2e9/0x330 [ 16.421702] kasan_report+0x141/0x180 [ 16.421706] ? kmalloc_large_oob_right+0x2e9/0x330 [ 16.421710] __asan_report_store1_noabort+0x1b/0x30 [ 16.421715] kmalloc_large_oob_right+0x2e9/0x330 [ 16.421719] ? __pfx_kmalloc_large_oob_right+0x10/0x10 [ 16.421723] ? __schedule+0x10cc/0x2b60 [ 16.421727] ? ktime_get_ts64+0x83/0x230 [ 16.421731] kunit_try_run_case+0x1a2/0x480 [ 16.421736] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.421740] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.421744] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.421748] ? __kthread_parkme+0x82/0x180 [ 16.421752] ? preempt_count_sub+0x50/0x80 [ 16.421756] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.421760] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 16.421764] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.421768] kthread+0x334/0x6f0 [ 16.421772] ? trace_preempt_on+0x20/0xc0 [ 16.421776] ? __pfx_kthread+0x10/0x10 [ 16.421780] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.421783] ? calculate_sigpending+0x7b/0xa0 [ 16.421788] ? __pfx_kthread+0x10/0x10 [ 16.421792] ret_from_fork+0x113/0x1d0 [ 16.421795] ? __pfx_kthread+0x10/0x10 [ 16.421799] ret_from_fork_asm+0x1a/0x30 [ 16.421804] </TASK> [ 16.421806] [ 16.588102] The buggy address belongs to the physical page: [ 16.593674] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104ff8 [ 16.601683] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.609361] flags: 0x200000000000040(head|node=0|zone=2) [ 16.614723] page_type: f8(unknown) [ 16.618133] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.625878] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.633618] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.641446] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.649280] head: 0200000000000002 ffffea000413fe01 00000000ffffffff 00000000ffffffff [ 16.657114] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.664937] page dumped because: kasan: bad access detected [ 16.670510] [ 16.672004] Memory state around the buggy address: [ 16.676794] ffff888104ff9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.684013] ffff888104ff9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.691235] >ffff888104ffa000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.698453] ^ [ 16.701945] ffff888104ffa080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.709164] ffff888104ffa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 16.716412] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 15.986019] ================================================================== [ 15.998477] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x316/0x370 [ 16.005790] Write of size 1 at addr ffff888106f25f00 by task kunit_try_catch/185 [ 16.013192] [ 16.014693] CPU: 3 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.014702] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 16.014705] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 16.014708] Call Trace: [ 16.014710] <TASK> [ 16.014712] dump_stack_lvl+0x73/0xb0 [ 16.014717] print_report+0xd1/0x650 [ 16.014721] ? __virt_addr_valid+0x1db/0x2d0 [ 16.014725] ? kmalloc_big_oob_right+0x316/0x370 [ 16.014729] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.014734] ? kmalloc_big_oob_right+0x316/0x370 [ 16.014738] kasan_report+0x141/0x180 [ 16.014742] ? kmalloc_big_oob_right+0x316/0x370 [ 16.014747] __asan_report_store1_noabort+0x1b/0x30 [ 16.014751] kmalloc_big_oob_right+0x316/0x370 [ 16.014755] ? __pfx_kmalloc_big_oob_right+0x10/0x10 [ 16.014760] ? __schedule+0x10cc/0x2b60 [ 16.014764] ? ktime_get_ts64+0x83/0x230 [ 16.014768] kunit_try_run_case+0x1a2/0x480 [ 16.014772] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.014776] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.014781] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.014785] ? __kthread_parkme+0x82/0x180 [ 16.014788] ? preempt_count_sub+0x50/0x80 [ 16.014792] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.014797] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 16.014801] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.014805] kthread+0x334/0x6f0 [ 16.014808] ? trace_preempt_on+0x20/0xc0 [ 16.014812] ? __pfx_kthread+0x10/0x10 [ 16.014816] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.014820] ? calculate_sigpending+0x7b/0xa0 [ 16.014824] ? __pfx_kthread+0x10/0x10 [ 16.014828] ret_from_fork+0x113/0x1d0 [ 16.014831] ? __pfx_kthread+0x10/0x10 [ 16.014835] ret_from_fork_asm+0x1a/0x30 [ 16.014841] </TASK> [ 16.014842] [ 16.181487] Allocated by task 185: [ 16.184894] kasan_save_stack+0x45/0x70 [ 16.188735] kasan_save_track+0x18/0x40 [ 16.192573] kasan_save_alloc_info+0x3b/0x50 [ 16.196846] __kasan_kmalloc+0xb7/0xc0 [ 16.200597] __kmalloc_cache_noprof+0x189/0x420 [ 16.205132] kmalloc_big_oob_right+0xa9/0x370 [ 16.209490] kunit_try_run_case+0x1a2/0x480 [ 16.213677] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 16.219083] kthread+0x334/0x6f0 [ 16.222318] ret_from_fork+0x113/0x1d0 [ 16.226104] ret_from_fork_asm+0x1a/0x30 [ 16.230032] [ 16.231531] The buggy address belongs to the object at ffff888106f24000 [ 16.231531] which belongs to the cache kmalloc-8k of size 8192 [ 16.244045] The buggy address is located 0 bytes to the right of [ 16.244045] allocated 7936-byte region [ffff888106f24000, ffff888106f25f00) [ 16.257087] [ 16.258588] The buggy address belongs to the physical page: [ 16.264158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f20 [ 16.272159] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.279819] flags: 0x200000000000040(head|node=0|zone=2) [ 16.285132] page_type: f5(slab) [ 16.288280] raw: 0200000000000040 ffff888100043180 dead000000000122 0000000000000000 [ 16.296029] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 16.303775] head: 0200000000000040 ffff888100043180 dead000000000122 0000000000000000 [ 16.311602] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 16.319427] head: 0200000000000003 ffffea00041bc801 00000000ffffffff 00000000ffffffff [ 16.327253] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 16.335080] page dumped because: kasan: bad access detected [ 16.340651] [ 16.342151] Memory state around the buggy address: [ 16.346944] ffff888106f25e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.354163] ffff888106f25e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.361391] >ffff888106f25f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.368609] ^ [ 16.371843] ffff888106f25f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.379061] ffff888106f26000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.386282] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 15.429146] ================================================================== [ 15.440597] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520 [ 15.448690] Write of size 1 at addr ffff888105bb0078 by task kunit_try_catch/183 [ 15.456090] [ 15.457593] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.457602] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 15.457604] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 15.457608] Call Trace: [ 15.457609] <TASK> [ 15.457611] dump_stack_lvl+0x73/0xb0 [ 15.457616] print_report+0xd1/0x650 [ 15.457620] ? __virt_addr_valid+0x1db/0x2d0 [ 15.457624] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 15.457629] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.457634] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 15.457638] kasan_report+0x141/0x180 [ 15.457642] ? kmalloc_track_caller_oob_right+0x4c8/0x520 [ 15.457648] __asan_report_store1_noabort+0x1b/0x30 [ 15.457653] kmalloc_track_caller_oob_right+0x4c8/0x520 [ 15.457657] ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10 [ 15.457662] ? __schedule+0x10cc/0x2b60 [ 15.457666] ? ktime_get_ts64+0x83/0x230 [ 15.457670] kunit_try_run_case+0x1a2/0x480 [ 15.457675] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.457679] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.457683] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.457687] ? __kthread_parkme+0x82/0x180 [ 15.457691] ? preempt_count_sub+0x50/0x80 [ 15.457695] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.457699] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 15.457703] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.457708] kthread+0x334/0x6f0 [ 15.457711] ? trace_preempt_on+0x20/0xc0 [ 15.457715] ? __pfx_kthread+0x10/0x10 [ 15.457719] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.457722] ? calculate_sigpending+0x7b/0xa0 [ 15.457727] ? __pfx_kthread+0x10/0x10 [ 15.457731] ret_from_fork+0x113/0x1d0 [ 15.457734] ? __pfx_kthread+0x10/0x10 [ 15.457738] ret_from_fork_asm+0x1a/0x30 [ 15.457743] </TASK> [ 15.457745] [ 15.628362] Allocated by task 183: [ 15.631815] kasan_save_stack+0x45/0x70 [ 15.635654] kasan_save_track+0x18/0x40 [ 15.639495] kasan_save_alloc_info+0x3b/0x50 [ 15.643766] __kasan_kmalloc+0xb7/0xc0 [ 15.647519] __kmalloc_node_track_caller_noprof+0x1cb/0x500 [ 15.653092] kmalloc_track_caller_oob_right+0x99/0x520 [ 15.658232] kunit_try_run_case+0x1a2/0x480 [ 15.662423] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 15.667824] kthread+0x334/0x6f0 [ 15.671057] ret_from_fork+0x113/0x1d0 [ 15.674810] ret_from_fork_asm+0x1a/0x30 [ 15.678737] [ 15.680237] The buggy address belongs to the object at ffff888105bb0000 [ 15.680237] which belongs to the cache kmalloc-128 of size 128 [ 15.692750] The buggy address is located 0 bytes to the right of [ 15.692750] allocated 120-byte region [ffff888105bb0000, ffff888105bb0078) [ 15.705700] [ 15.707199] The buggy address belongs to the physical page: [ 15.712771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb0 [ 15.720778] flags: 0x200000000000000(node=0|zone=2) [ 15.725658] page_type: f5(slab) [ 15.728804] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 15.736545] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 15.744282] page dumped because: kasan: bad access detected [ 15.749855] [ 15.751361] Memory state around the buggy address: [ 15.756200] ffff888105baff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.763418] ffff888105baff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.770639] >ffff888105bb0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 15.777858] ^ [ 15.784991] ffff888105bb0080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.792211] ffff888105bb0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.799427] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 15.021636] ================================================================== [ 15.032874] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x369/0x3c0 [ 15.040274] Read of size 1 at addr ffff888106e8f000 by task kunit_try_catch/181 [ 15.047582] [ 15.049082] CPU: 2 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.049090] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 15.049093] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 15.049096] Call Trace: [ 15.049098] <TASK> [ 15.049100] dump_stack_lvl+0x73/0xb0 [ 15.049105] print_report+0xd1/0x650 [ 15.049109] ? __virt_addr_valid+0x1db/0x2d0 [ 15.049113] ? kmalloc_node_oob_right+0x369/0x3c0 [ 15.049117] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.049122] ? kmalloc_node_oob_right+0x369/0x3c0 [ 15.049126] kasan_report+0x141/0x180 [ 15.049130] ? kmalloc_node_oob_right+0x369/0x3c0 [ 15.049136] __asan_report_load1_noabort+0x18/0x20 [ 15.049140] kmalloc_node_oob_right+0x369/0x3c0 [ 15.049145] ? __pfx_kmalloc_node_oob_right+0x10/0x10 [ 15.049149] ? __schedule+0x10cc/0x2b60 [ 15.049153] ? ktime_get_ts64+0x83/0x230 [ 15.049158] kunit_try_run_case+0x1a2/0x480 [ 15.049162] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.049166] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.049170] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.049174] ? __kthread_parkme+0x82/0x180 [ 15.049178] ? preempt_count_sub+0x50/0x80 [ 15.049182] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.049186] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 15.049190] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.049195] kthread+0x334/0x6f0 [ 15.049198] ? trace_preempt_on+0x20/0xc0 [ 15.049202] ? __pfx_kthread+0x10/0x10 [ 15.049206] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.049210] ? calculate_sigpending+0x7b/0xa0 [ 15.049214] ? __pfx_kthread+0x10/0x10 [ 15.049218] ret_from_fork+0x113/0x1d0 [ 15.049221] ? __pfx_kthread+0x10/0x10 [ 15.049225] ret_from_fork_asm+0x1a/0x30 [ 15.049230] </TASK> [ 15.049232] [ 15.216303] Allocated by task 181: [ 15.219710] kasan_save_stack+0x45/0x70 [ 15.223556] kasan_save_track+0x18/0x40 [ 15.227417] kasan_save_alloc_info+0x3b/0x50 [ 15.231695] __kasan_kmalloc+0xb7/0xc0 [ 15.235447] __kmalloc_cache_node_noprof+0x188/0x420 [ 15.240416] kmalloc_node_oob_right+0xab/0x3c0 [ 15.244869] kunit_try_run_case+0x1a2/0x480 [ 15.249064] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 15.254463] kthread+0x334/0x6f0 [ 15.257695] ret_from_fork+0x113/0x1d0 [ 15.261448] ret_from_fork_asm+0x1a/0x30 [ 15.265392] [ 15.266915] The buggy address belongs to the object at ffff888106e8e000 [ 15.266915] which belongs to the cache kmalloc-4k of size 4096 [ 15.279422] The buggy address is located 0 bytes to the right of [ 15.279422] allocated 4096-byte region [ffff888106e8e000, ffff888106e8f000) [ 15.292457] [ 15.293955] The buggy address belongs to the physical page: [ 15.299530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106e88 [ 15.307538] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 15.315191] flags: 0x200000000000040(head|node=0|zone=2) [ 15.320510] page_type: f5(slab) [ 15.323657] raw: 0200000000000040 ffff888100043040 dead000000000122 0000000000000000 [ 15.331421] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 15.339162] head: 0200000000000040 ffff888100043040 dead000000000122 0000000000000000 [ 15.346988] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 15.354815] head: 0200000000000003 ffffea00041ba201 00000000ffffffff 00000000ffffffff [ 15.362648] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 15.370473] page dumped because: kasan: bad access detected [ 15.376046] [ 15.377545] Memory state around the buggy address: [ 15.382375] ffff888106e8ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.389628] ffff888106e8ef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.396847] >ffff888106e8f000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.404065] ^ [ 15.407298] ffff888106e8f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.414518] ffff888106e8f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.421738] ==================================================================
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------ [ 120.707904] WARNING: CPU: 1 PID: 697 at lib/math/int_log.c:120 intlog10+0x2a/0x40 [ 120.715402] Modules linked in: [ 120.718479] CPU: 1 UID: 0 PID: 697 Comm: kunit_try_catch Tainted: G S B D W N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 120.729357] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 120.737023] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 120.744417] RIP: 0010:intlog10+0x2a/0x40 [ 120.748384] Code: f3 0f 1e fa 0f 1f 44 00 00 85 ff 74 1c 55 48 89 e5 e8 ca fe ff ff 5d 89 c0 48 69 c0 a1 26 88 26 48 c1 e8 1f c3 cc cc cc cc 90 <0f> 0b 90 31 c0 c3 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 66 90 [ 120.767158] RSP: 0000:ffff88810c87fcb0 EFLAGS: 00010246 [ 120.772410] RAX: 0000000000000000 RBX: ffff8881003afae8 RCX: 1ffff1102190ffb4 [ 120.779551] RDX: 1ffffffff5112c9c RSI: 1ffff1102190ffb3 RDI: 0000000000000000 [ 120.786710] RBP: ffff88810c87fd60 R08: 0000000000000000 R09: ffffed1020194d80 [ 120.793852] R10: ffff888100ca6c07 R11: 0000000000000000 R12: 1ffff1102190ff97 [ 120.801008] R13: ffffffffa88964e0 R14: 0000000000000000 R15: ffff88810c87fd38 [ 120.808144] FS: 0000000000000000(0000) GS:ffff888474cf4000(0000) knlGS:0000000000000000 [ 120.816253] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 120.822028] CR2: ffff88841dc1cfe0 CR3: 00000003a84bc002 CR4: 00000000003726f0 [ 120.829169] DR0: ffffffffaaa50444 DR1: ffffffffaaa50449 DR2: ffffffffaaa5044a [ 120.836340] DR3: ffffffffaaa5044b DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 120.843485] Call Trace: [ 120.845964] <TASK> [ 120.848069] ? intlog10_test+0xf2/0x220 [ 120.851935] ? __pfx_intlog10_test+0x10/0x10 [ 120.856217] ? __schedule+0x10cc/0x2b60 [ 120.860082] ? ktime_get_ts64+0x83/0x230 [ 120.864016] kunit_try_run_case+0x1a2/0x480 [ 120.868228] ? __pfx_kunit_try_run_case+0x10/0x10 [ 120.872942] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 120.877587] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 120.882564] ? __kthread_parkme+0x82/0x180 [ 120.886687] ? preempt_count_sub+0x50/0x80 [ 120.890789] ? __pfx_kunit_try_run_case+0x10/0x10 [ 120.895518] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 120.900919] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 120.907036] kthread+0x334/0x6f0 [ 120.910272] ? trace_preempt_on+0x20/0xc0 [ 120.914308] ? __pfx_kthread+0x10/0x10 [ 120.918089] ? _raw_spin_unlock_irq+0x47/0x80 [ 120.922472] ? calculate_sigpending+0x7b/0xa0 [ 120.926840] ? __pfx_kthread+0x10/0x10 [ 120.930620] ret_from_fork+0x113/0x1d0 [ 120.934398] ? __pfx_kthread+0x10/0x10 [ 120.938175] ret_from_fork_asm+0x1a/0x30 [ 120.942112] </TASK> [ 120.944311] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------ [ 120.408024] WARNING: CPU: 2 PID: 679 at lib/math/int_log.c:63 intlog2+0xdf/0x110 [ 120.415432] Modules linked in: [ 120.418520] CPU: 2 UID: 0 PID: 679 Comm: kunit_try_catch Tainted: G S B D N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 120.429426] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 120.436222] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 120.443641] RIP: 0010:intlog2+0xdf/0x110 [ 120.447594] Code: 89 a8 c1 e0 18 48 83 c4 08 89 d1 c1 e2 08 29 cb 01 d0 0f b7 db 41 0f af dc c1 eb 0f 01 d8 5b 41 5c 41 5d 5d c3 cc cc cc cc 90 <0f> 0b 90 31 c0 c3 cc cc cc cc 89 45 e4 e8 cf 0f 56 ff 8b 45 e4 eb [ 120.466360] RSP: 0000:ffff8881247f7cb0 EFLAGS: 00010246 [ 120.471634] RAX: 0000000000000000 RBX: ffff8881003afae8 RCX: 1ffff110248fefb4 [ 120.478766] RDX: 1ffffffff5112cf0 RSI: 1ffff110248fefb3 RDI: 0000000000000000 [ 120.485925] RBP: ffff8881247f7d60 R08: 0000000000000000 R09: ffffed1020b75de0 [ 120.493058] R10: ffff888105baef07 R11: 0000000000000000 R12: 1ffff110248fef97 [ 120.500223] R13: ffffffffa8896780 R14: 0000000000000000 R15: ffff8881247f7d38 [ 120.507391] FS: 0000000000000000(0000) GS:ffff888474d74000(0000) knlGS:0000000000000000 [ 120.515507] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 120.521277] CR2: ffff88841dd66000 CR3: 00000003a84bc001 CR4: 00000000003726f0 [ 120.528452] DR0: ffffffffaaa50448 DR1: ffffffffaaa50449 DR2: ffffffffaaa5044a [ 120.535613] DR3: ffffffffaaa5044b DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 120.542753] Call Trace: [ 120.545231] <TASK> [ 120.547358] ? intlog2_test+0xf2/0x220 [ 120.551161] ? __pfx_intlog2_test+0x10/0x10 [ 120.555376] ? __schedule+0x10cc/0x2b60 [ 120.559248] ? ktime_get_ts64+0x83/0x230 [ 120.563190] kunit_try_run_case+0x1a2/0x480 [ 120.567400] ? __pfx_kunit_try_run_case+0x10/0x10 [ 120.572135] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 120.576780] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 120.581772] ? __kthread_parkme+0x82/0x180 [ 120.585897] ? preempt_count_sub+0x50/0x80 [ 120.590021] ? __pfx_kunit_try_run_case+0x10/0x10 [ 120.594754] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 120.600177] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 120.606297] kthread+0x334/0x6f0 [ 120.609555] ? trace_preempt_on+0x20/0xc0 [ 120.613602] ? __pfx_kthread+0x10/0x10 [ 120.617390] ? _raw_spin_unlock_irq+0x47/0x80 [ 120.621776] ? calculate_sigpending+0x7b/0xa0 [ 120.626162] ? __pfx_kthread+0x10/0x10 [ 120.629939] ret_from_fork+0x113/0x1d0 [ 120.633718] ? __pfx_kthread+0x10/0x10 [ 120.637497] ret_from_fork_asm+0x1a/0x30 [ 120.641465] </TASK> [ 120.643668] ---[ end trace 0000000000000000 ]---
Failure - lava/job
(no logs available)
Failure - lava/bootloader-action
(no logs available)
Failure - lava/bootloader-retry
(no logs available)
Failure - lava/auto-login-action
(no logs available)
Failure - lava/login-action
(no logs available)
Failure - boot/gcc-13-lkftconfig-kunit
(no logs available)
Failure - log-parser-boot/oops-oops-general-protection-fault-probably-for-non-canonical-address-smp-kasan-pti
KNOWN ISSUE - qemu-x86_64: Oops: general protection fault, probably for non-canonical address - KASAN: null-ptr-deref - kunit_test_null_dereference
[ 119.070273] Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN PTI