Date
Nov. 20, 2024, 6:35 a.m.
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 43.371900] ================================================================== [ 43.373156] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 43.374003] Read of size 8 at addr fff00000c65cbf78 by task kunit_try_catch/270 [ 43.375129] [ 43.375514] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 43.376428] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.377015] Hardware name: linux,dummy-virt (DT) [ 43.378281] Call trace: [ 43.378964] show_stack+0x20/0x38 (C) [ 43.380002] dump_stack_lvl+0x8c/0xd0 [ 43.380627] print_report+0x118/0x5e0 [ 43.381635] kasan_report+0xc8/0x118 [ 43.382145] __asan_report_load8_noabort+0x20/0x30 [ 43.383231] copy_to_kernel_nofault+0x204/0x250 [ 43.384011] copy_to_kernel_nofault_oob+0x158/0x418 [ 43.384765] kunit_try_run_case+0x14c/0x3d0 [ 43.385341] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.386030] kthread+0x24c/0x2d0 [ 43.387048] ret_from_fork+0x10/0x20 [ 43.387542] [ 43.387902] Allocated by task 270: [ 43.388406] kasan_save_stack+0x3c/0x68 [ 43.388946] kasan_save_track+0x20/0x40 [ 43.390637] kasan_save_alloc_info+0x40/0x58 [ 43.391205] __kasan_kmalloc+0xd4/0xd8 [ 43.391790] __kmalloc_cache_noprof+0x15c/0x3c8 [ 43.392326] copy_to_kernel_nofault_oob+0xc8/0x418 [ 43.393004] kunit_try_run_case+0x14c/0x3d0 [ 43.394195] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.394880] kthread+0x24c/0x2d0 [ 43.395469] ret_from_fork+0x10/0x20 [ 43.395998] [ 43.396383] The buggy address belongs to the object at fff00000c65cbf00 [ 43.396383] which belongs to the cache kmalloc-128 of size 128 [ 43.397782] The buggy address is located 0 bytes to the right of [ 43.397782] allocated 120-byte region [fff00000c65cbf00, fff00000c65cbf78) [ 43.399385] [ 43.399737] The buggy address belongs to the physical page: [ 43.400437] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065cb [ 43.402306] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.402707] page_type: f5(slab) [ 43.402941] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 43.403310] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 43.404025] page dumped because: kasan: bad access detected [ 43.404604] [ 43.404836] Memory state around the buggy address: [ 43.407522] fff00000c65cbe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 43.408461] fff00000c65cbe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.409123] >fff00000c65cbf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 43.410395] ^ [ 43.411204] fff00000c65cbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.412185] fff00000c65cc000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.413174] ================================================================== [ 43.416815] ================================================================== [ 43.417593] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 43.418632] Write of size 8 at addr fff00000c65cbf78 by task kunit_try_catch/270 [ 43.419948] [ 43.420411] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 43.421633] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.422184] Hardware name: linux,dummy-virt (DT) [ 43.422796] Call trace: [ 43.423197] show_stack+0x20/0x38 (C) [ 43.424138] dump_stack_lvl+0x8c/0xd0 [ 43.424719] print_report+0x118/0x5e0 [ 43.425372] kasan_report+0xc8/0x118 [ 43.425993] kasan_check_range+0x100/0x1a8 [ 43.426681] __kasan_check_write+0x20/0x30 [ 43.427395] copy_to_kernel_nofault+0x8c/0x250 [ 43.428053] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 43.428630] kunit_try_run_case+0x14c/0x3d0 [ 43.429398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.430227] kthread+0x24c/0x2d0 [ 43.430849] ret_from_fork+0x10/0x20 [ 43.431469] [ 43.431848] Allocated by task 270: [ 43.432342] kasan_save_stack+0x3c/0x68 [ 43.432793] kasan_save_track+0x20/0x40 [ 43.433199] kasan_save_alloc_info+0x40/0x58 [ 43.433909] __kasan_kmalloc+0xd4/0xd8 [ 43.434562] __kmalloc_cache_noprof+0x15c/0x3c8 [ 43.435393] copy_to_kernel_nofault_oob+0xc8/0x418 [ 43.436122] kunit_try_run_case+0x14c/0x3d0 [ 43.436849] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.437581] kthread+0x24c/0x2d0 [ 43.438130] ret_from_fork+0x10/0x20 [ 43.438667] [ 43.439055] The buggy address belongs to the object at fff00000c65cbf00 [ 43.439055] which belongs to the cache kmalloc-128 of size 128 [ 43.440335] The buggy address is located 0 bytes to the right of [ 43.440335] allocated 120-byte region [fff00000c65cbf00, fff00000c65cbf78) [ 43.441670] [ 43.442020] The buggy address belongs to the physical page: [ 43.442780] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065cb [ 43.443792] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.444693] page_type: f5(slab) [ 43.445379] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 43.446214] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 43.447210] page dumped because: kasan: bad access detected [ 43.447861] [ 43.448213] Memory state around the buggy address: [ 43.448798] fff00000c65cbe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 43.449706] fff00000c65cbe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.450605] >fff00000c65cbf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 43.451228] ^ [ 43.452124] fff00000c65cbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.453051] fff00000c65cc000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.453960] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 37.686156] ================================================================== [ 37.688360] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 37.689237] Read of size 8 at addr fff00000c65b0300 by task kunit_try_catch/189 [ 37.690089] [ 37.691270] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 37.692486] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.693043] Hardware name: linux,dummy-virt (DT) [ 37.694189] Call trace: [ 37.694616] show_stack+0x20/0x38 (C) [ 37.695240] dump_stack_lvl+0x8c/0xd0 [ 37.695851] print_report+0x118/0x5e0 [ 37.696406] kasan_report+0xc8/0x118 [ 37.696897] __asan_report_load8_noabort+0x20/0x30 [ 37.697984] workqueue_uaf+0x480/0x4a8 [ 37.698577] kunit_try_run_case+0x14c/0x3d0 [ 37.699186] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.700271] kthread+0x24c/0x2d0 [ 37.700787] ret_from_fork+0x10/0x20 [ 37.701313] [ 37.702095] Allocated by task 189: [ 37.702473] kasan_save_stack+0x3c/0x68 [ 37.702880] kasan_save_track+0x20/0x40 [ 37.703961] kasan_save_alloc_info+0x40/0x58 [ 37.705046] __kasan_kmalloc+0xd4/0xd8 [ 37.705844] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.706654] workqueue_uaf+0x13c/0x4a8 [ 37.707157] kunit_try_run_case+0x14c/0x3d0 [ 37.707723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.708377] kthread+0x24c/0x2d0 [ 37.708849] ret_from_fork+0x10/0x20 [ 37.710121] [ 37.710500] Freed by task 31: [ 37.711011] kasan_save_stack+0x3c/0x68 [ 37.711522] kasan_save_track+0x20/0x40 [ 37.712087] kasan_save_free_info+0x4c/0x78 [ 37.712734] __kasan_slab_free+0x6c/0x98 [ 37.713824] kfree+0x114/0x3d0 [ 37.714249] workqueue_uaf_work+0x18/0x30 [ 37.714851] process_one_work+0x530/0xfa8 [ 37.715358] worker_thread+0x614/0xf28 [ 37.715927] kthread+0x24c/0x2d0 [ 37.716470] ret_from_fork+0x10/0x20 [ 37.716920] [ 37.718458] Last potentially related work creation: [ 37.718946] kasan_save_stack+0x3c/0x68 [ 37.719481] __kasan_record_aux_stack+0xbc/0xe8 [ 37.720119] kasan_record_aux_stack_noalloc+0x14/0x20 [ 37.720777] __queue_work+0x654/0xfe0 [ 37.721255] queue_work_on+0xbc/0xf8 [ 37.721814] workqueue_uaf+0x210/0x4a8 [ 37.722372] kunit_try_run_case+0x14c/0x3d0 [ 37.723549] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.724215] kthread+0x24c/0x2d0 [ 37.724760] ret_from_fork+0x10/0x20 [ 37.725280] [ 37.725980] The buggy address belongs to the object at fff00000c65b0300 [ 37.725980] which belongs to the cache kmalloc-32 of size 32 [ 37.727594] The buggy address is located 0 bytes inside of [ 37.727594] freed 32-byte region [fff00000c65b0300, fff00000c65b0320) [ 37.729203] [ 37.729910] The buggy address belongs to the physical page: [ 37.730783] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b0 [ 37.731683] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.732456] page_type: f5(slab) [ 37.732940] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 37.733796] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 37.734593] page dumped because: kasan: bad access detected [ 37.735258] [ 37.736128] Memory state around the buggy address: [ 37.737255] fff00000c65b0200: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 37.738273] fff00000c65b0280: 00 00 00 fc fc fc fc fc 00 00 00 07 fc fc fc fc [ 37.739188] >fff00000c65b0300: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 37.740023] ^ [ 37.740502] fff00000c65b0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.741153] fff00000c65b0400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.742493] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 37.605903] ================================================================== [ 37.607096] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 37.607928] Read of size 4 at addr fff00000c65b0200 by task swapper/1/0 [ 37.608524] [ 37.608829] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B N 6.12.0-next-20241120 #1 [ 37.610342] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.611125] Hardware name: linux,dummy-virt (DT) [ 37.611840] Call trace: [ 37.612277] show_stack+0x20/0x38 (C) [ 37.612773] dump_stack_lvl+0x8c/0xd0 [ 37.613738] print_report+0x118/0x5e0 [ 37.614431] kasan_report+0xc8/0x118 [ 37.614945] __asan_report_load4_noabort+0x20/0x30 [ 37.615636] rcu_uaf_reclaim+0x64/0x70 [ 37.616138] rcu_core+0xa54/0x1df8 [ 37.616686] rcu_core_si+0x18/0x30 [ 37.617251] handle_softirqs+0x374/0xb20 [ 37.618320] __do_softirq+0x1c/0x28 [ 37.618780] ____do_softirq+0x18/0x30 [ 37.619343] call_on_irq_stack+0x24/0x58 [ 37.619909] do_softirq_own_stack+0x24/0x38 [ 37.620547] __irq_exit_rcu+0x1fc/0x318 [ 37.621135] irq_exit_rcu+0x1c/0x80 [ 37.622111] el1_interrupt+0x38/0x58 [ 37.622610] el1h_64_irq_handler+0x18/0x28 [ 37.623178] el1h_64_irq+0x6c/0x70 [ 37.623819] arch_local_irq_enable+0x4/0x8 (P) [ 37.624534] default_idle_call+0x6c/0x78 (L) [ 37.625127] do_idle+0x384/0x4e8 [ 37.626113] cpu_startup_entry+0x68/0x80 [ 37.626722] secondary_start_kernel+0x288/0x340 [ 37.627320] __secondary_switched+0xc0/0xc8 [ 37.627962] [ 37.628308] Allocated by task 187: [ 37.628825] kasan_save_stack+0x3c/0x68 [ 37.629362] kasan_save_track+0x20/0x40 [ 37.630478] kasan_save_alloc_info+0x40/0x58 [ 37.631035] __kasan_kmalloc+0xd4/0xd8 [ 37.631619] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.632177] rcu_uaf+0xb0/0x2d0 [ 37.632700] kunit_try_run_case+0x14c/0x3d0 [ 37.633394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.634426] kthread+0x24c/0x2d0 [ 37.635140] ret_from_fork+0x10/0x20 [ 37.635767] [ 37.636259] Freed by task 0: [ 37.636775] kasan_save_stack+0x3c/0x68 [ 37.637428] kasan_save_track+0x20/0x40 [ 37.638245] kasan_save_free_info+0x4c/0x78 [ 37.639041] __kasan_slab_free+0x6c/0x98 [ 37.639753] kfree+0x114/0x3d0 [ 37.640327] rcu_uaf_reclaim+0x28/0x70 [ 37.640808] rcu_core+0xa54/0x1df8 [ 37.641231] rcu_core_si+0x18/0x30 [ 37.642299] handle_softirqs+0x374/0xb20 [ 37.642895] __do_softirq+0x1c/0x28 [ 37.643519] [ 37.643966] Last potentially related work creation: [ 37.644721] kasan_save_stack+0x3c/0x68 [ 37.645472] __kasan_record_aux_stack+0xbc/0xe8 [ 37.646482] kasan_record_aux_stack_noalloc+0x14/0x20 [ 37.647009] __call_rcu_common.constprop.0+0x74/0xa18 [ 37.647821] call_rcu+0x18/0x30 [ 37.648484] rcu_uaf+0x14c/0x2d0 [ 37.648910] kunit_try_run_case+0x14c/0x3d0 [ 37.650035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.650969] kthread+0x24c/0x2d0 [ 37.651373] ret_from_fork+0x10/0x20 [ 37.651859] [ 37.652190] The buggy address belongs to the object at fff00000c65b0200 [ 37.652190] which belongs to the cache kmalloc-32 of size 32 [ 37.653171] The buggy address is located 0 bytes inside of [ 37.653171] freed 32-byte region [fff00000c65b0200, fff00000c65b0220) [ 37.655206] [ 37.655626] The buggy address belongs to the physical page: [ 37.656421] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b0 [ 37.657648] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.658660] page_type: f5(slab) [ 37.659182] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 37.660003] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 37.660907] page dumped because: kasan: bad access detected [ 37.661424] [ 37.661785] Memory state around the buggy address: [ 37.662434] fff00000c65b0100: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 37.663836] fff00000c65b0180: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 37.664660] >fff00000c65b0200: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 37.665839] ^ [ 37.666251] fff00000c65b0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.666945] fff00000c65b0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.667712] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 37.443791] ================================================================== [ 37.444831] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x600 [ 37.446284] Read of size 1 at addr fff00000c1bf0100 by task kunit_try_catch/185 [ 37.447612] [ 37.448561] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 37.449625] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.450174] Hardware name: linux,dummy-virt (DT) [ 37.450751] Call trace: [ 37.451090] show_stack+0x20/0x38 (C) [ 37.451613] dump_stack_lvl+0x8c/0xd0 [ 37.452096] print_report+0x118/0x5e0 [ 37.452695] kasan_report+0xc8/0x118 [ 37.453190] __kasan_check_byte+0x54/0x70 [ 37.453750] ksize+0x30/0x88 [ 37.454288] ksize_uaf+0x168/0x600 [ 37.455568] kunit_try_run_case+0x14c/0x3d0 [ 37.456167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.456831] kthread+0x24c/0x2d0 [ 37.457716] ret_from_fork+0x10/0x20 [ 37.458957] [ 37.459752] Allocated by task 185: [ 37.460267] kasan_save_stack+0x3c/0x68 [ 37.460811] kasan_save_track+0x20/0x40 [ 37.461683] kasan_save_alloc_info+0x40/0x58 [ 37.462283] __kasan_kmalloc+0xd4/0xd8 [ 37.462814] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.463370] ksize_uaf+0xb8/0x600 [ 37.464164] kunit_try_run_case+0x14c/0x3d0 [ 37.464783] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.465997] kthread+0x24c/0x2d0 [ 37.466782] ret_from_fork+0x10/0x20 [ 37.467255] [ 37.467554] Freed by task 185: [ 37.468076] kasan_save_stack+0x3c/0x68 [ 37.468733] kasan_save_track+0x20/0x40 [ 37.469767] kasan_save_free_info+0x4c/0x78 [ 37.470217] __kasan_slab_free+0x6c/0x98 [ 37.470820] kfree+0x114/0x3d0 [ 37.471332] ksize_uaf+0x11c/0x600 [ 37.471802] kunit_try_run_case+0x14c/0x3d0 [ 37.472490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.473282] kthread+0x24c/0x2d0 [ 37.474535] ret_from_fork+0x10/0x20 [ 37.475381] [ 37.476103] The buggy address belongs to the object at fff00000c1bf0100 [ 37.476103] which belongs to the cache kmalloc-128 of size 128 [ 37.477289] The buggy address is located 0 bytes inside of [ 37.477289] freed 128-byte region [fff00000c1bf0100, fff00000c1bf0180) [ 37.479133] [ 37.479391] The buggy address belongs to the physical page: [ 37.479941] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf0 [ 37.480743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.481795] page_type: f5(slab) [ 37.482682] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.483481] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 37.484315] page dumped because: kasan: bad access detected [ 37.485863] [ 37.486203] Memory state around the buggy address: [ 37.486729] fff00000c1bf0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.488107] fff00000c1bf0080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.488962] >fff00000c1bf0100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.489757] ^ [ 37.490186] fff00000c1bf0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.492068] fff00000c1bf0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.492798] ================================================================== [ 37.538624] ================================================================== [ 37.539563] BUG: KASAN: slab-use-after-free in ksize_uaf+0x548/0x600 [ 37.540095] Read of size 1 at addr fff00000c1bf0178 by task kunit_try_catch/185 [ 37.541081] [ 37.541851] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 37.543342] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.543934] Hardware name: linux,dummy-virt (DT) [ 37.544770] Call trace: [ 37.545177] show_stack+0x20/0x38 (C) [ 37.546005] dump_stack_lvl+0x8c/0xd0 [ 37.546768] print_report+0x118/0x5e0 [ 37.547368] kasan_report+0xc8/0x118 [ 37.548209] __asan_report_load1_noabort+0x20/0x30 [ 37.549038] ksize_uaf+0x548/0x600 [ 37.549749] kunit_try_run_case+0x14c/0x3d0 [ 37.550389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.551274] kthread+0x24c/0x2d0 [ 37.551844] ret_from_fork+0x10/0x20 [ 37.552405] [ 37.552791] Allocated by task 185: [ 37.553350] kasan_save_stack+0x3c/0x68 [ 37.553943] kasan_save_track+0x20/0x40 [ 37.554508] kasan_save_alloc_info+0x40/0x58 [ 37.555170] __kasan_kmalloc+0xd4/0xd8 [ 37.555811] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.556383] ksize_uaf+0xb8/0x600 [ 37.556959] kunit_try_run_case+0x14c/0x3d0 [ 37.557541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.558260] kthread+0x24c/0x2d0 [ 37.558840] ret_from_fork+0x10/0x20 [ 37.559455] [ 37.559784] Freed by task 185: [ 37.560275] kasan_save_stack+0x3c/0x68 [ 37.560937] kasan_save_track+0x20/0x40 [ 37.561531] kasan_save_free_info+0x4c/0x78 [ 37.562138] __kasan_slab_free+0x6c/0x98 [ 37.562773] kfree+0x114/0x3d0 [ 37.563314] ksize_uaf+0x11c/0x600 [ 37.563905] kunit_try_run_case+0x14c/0x3d0 [ 37.564531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.565211] kthread+0x24c/0x2d0 [ 37.565646] ret_from_fork+0x10/0x20 [ 37.566181] [ 37.566527] The buggy address belongs to the object at fff00000c1bf0100 [ 37.566527] which belongs to the cache kmalloc-128 of size 128 [ 37.567670] The buggy address is located 120 bytes inside of [ 37.567670] freed 128-byte region [fff00000c1bf0100, fff00000c1bf0180) [ 37.568896] [ 37.569253] The buggy address belongs to the physical page: [ 37.569840] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf0 [ 37.570745] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.571461] page_type: f5(slab) [ 37.571906] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.572797] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 37.573472] page dumped because: kasan: bad access detected [ 37.574166] [ 37.574513] Memory state around the buggy address: [ 37.575085] fff00000c1bf0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.575897] fff00000c1bf0080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.576711] >fff00000c1bf0100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.577502] ^ [ 37.578281] fff00000c1bf0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.579049] fff00000c1bf0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.579839] ================================================================== [ 37.496261] ================================================================== [ 37.497385] BUG: KASAN: slab-use-after-free in ksize_uaf+0x59c/0x600 [ 37.498171] Read of size 1 at addr fff00000c1bf0100 by task kunit_try_catch/185 [ 37.499071] [ 37.499504] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 37.500678] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.501242] Hardware name: linux,dummy-virt (DT) [ 37.501919] Call trace: [ 37.502346] show_stack+0x20/0x38 (C) [ 37.502990] dump_stack_lvl+0x8c/0xd0 [ 37.503623] print_report+0x118/0x5e0 [ 37.504184] kasan_report+0xc8/0x118 [ 37.504874] __asan_report_load1_noabort+0x20/0x30 [ 37.505555] ksize_uaf+0x59c/0x600 [ 37.506145] kunit_try_run_case+0x14c/0x3d0 [ 37.506809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.507645] kthread+0x24c/0x2d0 [ 37.508201] ret_from_fork+0x10/0x20 [ 37.508827] [ 37.509157] Allocated by task 185: [ 37.509663] kasan_save_stack+0x3c/0x68 [ 37.510143] kasan_save_track+0x20/0x40 [ 37.510741] kasan_save_alloc_info+0x40/0x58 [ 37.511369] __kasan_kmalloc+0xd4/0xd8 [ 37.511969] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.512634] ksize_uaf+0xb8/0x600 [ 37.513099] kunit_try_run_case+0x14c/0x3d0 [ 37.513750] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.514435] kthread+0x24c/0x2d0 [ 37.514953] ret_from_fork+0x10/0x20 [ 37.515529] [ 37.515873] Freed by task 185: [ 37.516306] kasan_save_stack+0x3c/0x68 [ 37.516837] kasan_save_track+0x20/0x40 [ 37.517353] kasan_save_free_info+0x4c/0x78 [ 37.517978] __kasan_slab_free+0x6c/0x98 [ 37.518536] kfree+0x114/0x3d0 [ 37.518966] ksize_uaf+0x11c/0x600 [ 37.519514] kunit_try_run_case+0x14c/0x3d0 [ 37.520125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.520713] kthread+0x24c/0x2d0 [ 37.521234] ret_from_fork+0x10/0x20 [ 37.521804] [ 37.522152] The buggy address belongs to the object at fff00000c1bf0100 [ 37.522152] which belongs to the cache kmalloc-128 of size 128 [ 37.523249] The buggy address is located 0 bytes inside of [ 37.523249] freed 128-byte region [fff00000c1bf0100, fff00000c1bf0180) [ 37.524581] [ 37.524996] The buggy address belongs to the physical page: [ 37.525731] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf0 [ 37.526479] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.527310] page_type: f5(slab) [ 37.527853] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.528803] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 37.529680] page dumped because: kasan: bad access detected [ 37.530256] [ 37.530570] Memory state around the buggy address: [ 37.531177] fff00000c1bf0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.532027] fff00000c1bf0080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.532789] >fff00000c1bf0100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.533937] ^ [ 37.534496] fff00000c1bf0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.535249] fff00000c1bf0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.536194] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 70.887181] ================================================================== [ 70.887852] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 70.887852] [ 70.888573] Use-after-free read at 0x000000003a070cce (in kfence-#246): [ 70.889367] test_krealloc+0x51c/0x830 [ 70.889913] test_krealloc+0x458/0x830 [ 70.890506] kunit_try_run_case+0x14c/0x3d0 [ 70.891140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.891846] kthread+0x24c/0x2d0 [ 70.892320] ret_from_fork+0x10/0x20 [ 70.892910] [ 70.893262] kfence-#246: 0x000000003a070cce-0x00000000a4a80f0a, size=32, cache=kmalloc-32 [ 70.893262] [ 70.894285] allocated by task 326 on cpu 0 at 70.886088s (0.008186s ago): [ 70.895034] test_alloc+0x298/0x620 [ 70.895566] test_krealloc+0xc0/0x830 [ 70.896038] kunit_try_run_case+0x14c/0x3d0 [ 70.896669] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.897389] kthread+0x24c/0x2d0 [ 70.897849] ret_from_fork+0x10/0x20 [ 70.898404] [ 70.898772] freed by task 326 on cpu 0 at 70.886550s (0.012210s ago): [ 70.899587] krealloc_noprof+0x148/0x360 [ 70.900166] test_krealloc+0x1dc/0x830 [ 70.900698] kunit_try_run_case+0x14c/0x3d0 [ 70.901303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.901971] kthread+0x24c/0x2d0 [ 70.902503] ret_from_fork+0x10/0x20 [ 70.903004] [ 70.903359] CPU: 0 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 70.904317] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.904889] Hardware name: linux,dummy-virt (DT) [ 70.905345] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 37.348121] ================================================================== [ 37.348711] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750 [ 37.349400] Read of size 1 at addr fff00000c6564978 by task kunit_try_catch/183 [ 37.350274] [ 37.350687] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 37.352087] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.352658] Hardware name: linux,dummy-virt (DT) [ 37.355335] Call trace: [ 37.355758] show_stack+0x20/0x38 (C) [ 37.356418] dump_stack_lvl+0x8c/0xd0 [ 37.357061] print_report+0x118/0x5e0 [ 37.357717] kasan_report+0xc8/0x118 [ 37.358210] __asan_report_load1_noabort+0x20/0x30 [ 37.358909] ksize_unpoisons_memory+0x628/0x750 [ 37.359965] kunit_try_run_case+0x14c/0x3d0 [ 37.360623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.361473] kthread+0x24c/0x2d0 [ 37.361947] ret_from_fork+0x10/0x20 [ 37.362846] [ 37.363346] Allocated by task 183: [ 37.363784] kasan_save_stack+0x3c/0x68 [ 37.364406] kasan_save_track+0x20/0x40 [ 37.364988] kasan_save_alloc_info+0x40/0x58 [ 37.365961] __kasan_kmalloc+0xd4/0xd8 [ 37.366396] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.367392] ksize_unpoisons_memory+0xc0/0x750 [ 37.368572] kunit_try_run_case+0x14c/0x3d0 [ 37.369023] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.370291] kthread+0x24c/0x2d0 [ 37.371079] ret_from_fork+0x10/0x20 [ 37.371609] [ 37.371930] The buggy address belongs to the object at fff00000c6564900 [ 37.371930] which belongs to the cache kmalloc-128 of size 128 [ 37.373117] The buggy address is located 5 bytes to the right of [ 37.373117] allocated 115-byte region [fff00000c6564900, fff00000c6564973) [ 37.374593] [ 37.375224] The buggy address belongs to the physical page: [ 37.376076] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106564 [ 37.377590] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.378511] page_type: f5(slab) [ 37.379021] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.379924] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 37.380971] page dumped because: kasan: bad access detected [ 37.381953] [ 37.382254] Memory state around the buggy address: [ 37.382928] fff00000c6564800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 37.384496] fff00000c6564880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.385840] >fff00000c6564900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 37.386529] ^ [ 37.387318] fff00000c6564980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.388472] fff00000c6564a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.389226] ================================================================== [ 37.309947] ================================================================== [ 37.311053] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750 [ 37.311796] Read of size 1 at addr fff00000c6564973 by task kunit_try_catch/183 [ 37.312608] [ 37.312923] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 37.314507] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.315096] Hardware name: linux,dummy-virt (DT) [ 37.316422] Call trace: [ 37.317017] show_stack+0x20/0x38 (C) [ 37.317826] dump_stack_lvl+0x8c/0xd0 [ 37.318354] print_report+0x118/0x5e0 [ 37.318999] kasan_report+0xc8/0x118 [ 37.319671] __asan_report_load1_noabort+0x20/0x30 [ 37.320517] ksize_unpoisons_memory+0x638/0x750 [ 37.321300] kunit_try_run_case+0x14c/0x3d0 [ 37.321929] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.322723] kthread+0x24c/0x2d0 [ 37.323317] ret_from_fork+0x10/0x20 [ 37.323953] [ 37.324276] Allocated by task 183: [ 37.324788] kasan_save_stack+0x3c/0x68 [ 37.325321] kasan_save_track+0x20/0x40 [ 37.325907] kasan_save_alloc_info+0x40/0x58 [ 37.326530] __kasan_kmalloc+0xd4/0xd8 [ 37.327061] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.327616] ksize_unpoisons_memory+0xc0/0x750 [ 37.328266] kunit_try_run_case+0x14c/0x3d0 [ 37.328898] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.329557] kthread+0x24c/0x2d0 [ 37.330062] ret_from_fork+0x10/0x20 [ 37.330680] [ 37.331018] The buggy address belongs to the object at fff00000c6564900 [ 37.331018] which belongs to the cache kmalloc-128 of size 128 [ 37.332164] The buggy address is located 0 bytes to the right of [ 37.332164] allocated 115-byte region [fff00000c6564900, fff00000c6564973) [ 37.333345] [ 37.333644] The buggy address belongs to the physical page: [ 37.334184] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106564 [ 37.335077] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.335916] page_type: f5(slab) [ 37.336479] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.337468] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 37.338083] page dumped because: kasan: bad access detected [ 37.338814] [ 37.339150] Memory state around the buggy address: [ 37.339823] fff00000c6564800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 37.342738] fff00000c6564880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.343455] >fff00000c6564900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 37.344217] ^ [ 37.344910] fff00000c6564980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.345649] fff00000c6564a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.346551] ================================================================== [ 37.391840] ================================================================== [ 37.393225] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750 [ 37.394435] Read of size 1 at addr fff00000c656497f by task kunit_try_catch/183 [ 37.395357] [ 37.395756] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 37.397084] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.397995] Hardware name: linux,dummy-virt (DT) [ 37.398914] Call trace: [ 37.399461] show_stack+0x20/0x38 (C) [ 37.400162] dump_stack_lvl+0x8c/0xd0 [ 37.400712] print_report+0x118/0x5e0 [ 37.401253] kasan_report+0xc8/0x118 [ 37.401764] __asan_report_load1_noabort+0x20/0x30 [ 37.402438] ksize_unpoisons_memory+0x6a0/0x750 [ 37.403640] kunit_try_run_case+0x14c/0x3d0 [ 37.404155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.404965] kthread+0x24c/0x2d0 [ 37.406513] ret_from_fork+0x10/0x20 [ 37.407042] [ 37.407338] Allocated by task 183: [ 37.407859] kasan_save_stack+0x3c/0x68 [ 37.408327] kasan_save_track+0x20/0x40 [ 37.408922] kasan_save_alloc_info+0x40/0x58 [ 37.409949] __kasan_kmalloc+0xd4/0xd8 [ 37.410453] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.411074] ksize_unpoisons_memory+0xc0/0x750 [ 37.412026] kunit_try_run_case+0x14c/0x3d0 [ 37.412608] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.413889] kthread+0x24c/0x2d0 [ 37.414602] ret_from_fork+0x10/0x20 [ 37.414988] [ 37.415149] The buggy address belongs to the object at fff00000c6564900 [ 37.415149] which belongs to the cache kmalloc-128 of size 128 [ 37.415698] The buggy address is located 12 bytes to the right of [ 37.415698] allocated 115-byte region [fff00000c6564900, fff00000c6564973) [ 37.416254] [ 37.416409] The buggy address belongs to the physical page: [ 37.417099] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106564 [ 37.418695] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.419525] page_type: f5(slab) [ 37.420054] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.421016] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 37.423019] page dumped because: kasan: bad access detected [ 37.423851] [ 37.424132] Memory state around the buggy address: [ 37.424807] fff00000c6564800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 37.426090] fff00000c6564880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.426760] >fff00000c6564900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 37.427711] ^ [ 37.428461] fff00000c6564980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.429270] fff00000c6564a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.430210] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 70.705055] ================================================================== [ 70.705823] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 70.705823] [ 70.706720] Use-after-free read at 0x000000009bdae6a0 (in kfence-#244): [ 70.707566] test_memcache_typesafe_by_rcu+0x280/0x560 [ 70.708137] test_memcache_typesafe_by_rcu+0x260/0x560 [ 70.708878] kunit_try_run_case+0x14c/0x3d0 [ 70.709623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.710306] kthread+0x24c/0x2d0 [ 70.710883] ret_from_fork+0x10/0x20 [ 70.711521] [ 70.711871] kfence-#244: 0x000000009bdae6a0-0x0000000079884d65, size=32, cache=test [ 70.711871] [ 70.712841] allocated by task 324 on cpu 0 at 70.678753s (0.034077s ago): [ 70.713713] test_alloc+0x22c/0x620 [ 70.714160] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 70.714835] kunit_try_run_case+0x14c/0x3d0 [ 70.715374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.716097] kthread+0x24c/0x2d0 [ 70.716635] ret_from_fork+0x10/0x20 [ 70.717192] [ 70.717541] freed by task 324 on cpu 0 at 70.678894s (0.038635s ago): [ 70.718233] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 70.718935] kunit_try_run_case+0x14c/0x3d0 [ 70.719544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.720255] kthread+0x24c/0x2d0 [ 70.720757] ret_from_fork+0x10/0x20 [ 70.721319] [ 70.721717] CPU: 0 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 70.722812] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.723285] Hardware name: linux,dummy-virt (DT) [ 70.723895] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 52.724538] ================================================================== [ 52.726278] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 52.726278] [ 52.727211] Invalid read at 0x0000000087087db5: [ 52.728056] test_invalid_access+0xdc/0x1f0 [ 52.728833] kunit_try_run_case+0x14c/0x3d0 [ 52.730380] kunit_try_run_case+0x14c/0x3d0 [ 52.731001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.731817] kthread+0x24c/0x2d0 [ 52.732453] ret_from_fork+0x10/0x20 [ 52.733030] [ 52.734101] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 52.735328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.735894] Hardware name: linux,dummy-virt (DT) [ 52.736589] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 52.478734] ================================================================== [ 52.479489] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 52.479489] [ 52.480461] Corrupted memory at 0x00000000d8f90041 [ ! . . . . . . . . . . . . . . . ] (in kfence-#237): [ 52.482944] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 52.483546] kunit_try_run_case+0x14c/0x3d0 [ 52.484185] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.484871] kthread+0x24c/0x2d0 [ 52.485359] ret_from_fork+0x10/0x20 [ 52.485948] [ 52.486336] kfence-#237: 0x00000000e789e62f-0x000000005c3f15fc, size=73, cache=kmalloc-96 [ 52.486336] [ 52.487318] allocated by task 314 on cpu 0 at 52.478225s (0.009082s ago): [ 52.488136] test_alloc+0x298/0x620 [ 52.488706] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 52.489288] kunit_try_run_case+0x14c/0x3d0 [ 52.489818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.490546] kthread+0x24c/0x2d0 [ 52.491028] ret_from_fork+0x10/0x20 [ 52.491613] [ 52.491966] freed by task 314 on cpu 0 at 52.478492s (0.013463s ago): [ 52.492841] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 52.493464] kunit_try_run_case+0x14c/0x3d0 [ 52.494017] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.494661] kthread+0x24c/0x2d0 [ 52.495224] ret_from_fork+0x10/0x20 [ 52.495750] [ 52.496142] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 52.497195] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.497647] Hardware name: linux,dummy-virt (DT) [ 52.498255] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 52.375068] ================================================================== [ 52.375938] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 52.375938] [ 52.376984] Out-of-bounds read at 0x00000000f4831405 (105B right of kfence-#236): [ 52.377834] test_kmalloc_aligned_oob_read+0x238/0x468 [ 52.378418] test_kmalloc_aligned_oob_read+0x100/0x468 [ 52.379142] kunit_try_run_case+0x14c/0x3d0 [ 52.379805] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.380578] kthread+0x24c/0x2d0 [ 52.381109] ret_from_fork+0x10/0x20 [ 52.381766] [ 52.382080] kfence-#236: 0x0000000078055937-0x000000000f266a86, size=73, cache=kmalloc-96 [ 52.382080] [ 52.383123] allocated by task 312 on cpu 1 at 52.374562s (0.008550s ago): [ 52.384054] test_alloc+0x298/0x620 [ 52.384666] test_kmalloc_aligned_oob_read+0x100/0x468 [ 52.385438] kunit_try_run_case+0x14c/0x3d0 [ 52.386015] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.386766] kthread+0x24c/0x2d0 [ 52.387263] ret_from_fork+0x10/0x20 [ 52.387851] [ 52.388285] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 52.389358] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.389933] Hardware name: linux,dummy-virt (DT) [ 52.390546] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[ 46.862500] ================================================================== [ 46.863456] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 46.863456] [ 46.864873] Corrupted memory at 0x0000000024d0661b [ ! . . . . . . . . . . . . . . . ] (in kfence-#183): [ 46.867210] test_corruption+0x120/0x378 [ 46.867767] kunit_try_run_case+0x14c/0x3d0 [ 46.868332] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.868986] kthread+0x24c/0x2d0 [ 46.869990] ret_from_fork+0x10/0x20 [ 46.870467] [ 46.870956] kfence-#183: 0x000000000f9b6d3f-0x00000000410c48d0, size=32, cache=test [ 46.870956] [ 46.872067] allocated by task 302 on cpu 0 at 46.862188s (0.009868s ago): [ 46.873188] test_alloc+0x22c/0x620 [ 46.873679] test_corruption+0xdc/0x378 [ 46.874203] kunit_try_run_case+0x14c/0x3d0 [ 46.875044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.875884] kthread+0x24c/0x2d0 [ 46.876536] ret_from_fork+0x10/0x20 [ 46.877214] [ 46.877692] freed by task 302 on cpu 0 at 46.862309s (0.015375s ago): [ 46.878608] test_corruption+0x120/0x378 [ 46.879268] kunit_try_run_case+0x14c/0x3d0 [ 46.879832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.880901] kthread+0x24c/0x2d0 [ 46.881327] ret_from_fork+0x10/0x20 [ 46.882027] [ 46.882593] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 46.883768] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.884470] Hardware name: linux,dummy-virt (DT) [ 46.884990] ================================================================== [ 46.654736] ================================================================== [ 46.655612] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 46.655612] [ 46.656266] Corrupted memory at 0x000000007fc18f3b [ ! ] (in kfence-#181): [ 46.657529] test_corruption+0x284/0x378 [ 46.658172] kunit_try_run_case+0x14c/0x3d0 [ 46.658853] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.659665] kthread+0x24c/0x2d0 [ 46.660217] ret_from_fork+0x10/0x20 [ 46.660811] [ 46.661152] kfence-#181: 0x0000000094907e0c-0x00000000be35e98b, size=32, cache=kmalloc-32 [ 46.661152] [ 46.662237] allocated by task 300 on cpu 0 at 46.654210s (0.008016s ago): [ 46.663102] test_alloc+0x298/0x620 [ 46.663661] test_corruption+0x198/0x378 [ 46.664238] kunit_try_run_case+0x14c/0x3d0 [ 46.664789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.665567] kthread+0x24c/0x2d0 [ 46.666097] ret_from_fork+0x10/0x20 [ 46.666597] [ 46.666948] freed by task 300 on cpu 0 at 46.654379s (0.012557s ago): [ 46.667667] test_corruption+0x284/0x378 [ 46.668261] kunit_try_run_case+0x14c/0x3d0 [ 46.668886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.669612] kthread+0x24c/0x2d0 [ 46.670088] ret_from_fork+0x10/0x20 [ 46.670654] [ 46.671036] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 46.672186] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.672788] Hardware name: linux,dummy-virt (DT) [ 46.673376] ================================================================== [ 46.446612] ================================================================== [ 46.447351] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 46.447351] [ 46.448188] Corrupted memory at 0x0000000046c0e89f [ ! . . . . . . . . . . . . . . . ] (in kfence-#179): [ 46.450519] test_corruption+0x278/0x378 [ 46.450982] kunit_try_run_case+0x14c/0x3d0 [ 46.451617] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.452240] kthread+0x24c/0x2d0 [ 46.452799] ret_from_fork+0x10/0x20 [ 46.453316] [ 46.453647] kfence-#179: 0x0000000027c91dbc-0x00000000004a9dae, size=32, cache=kmalloc-32 [ 46.453647] [ 46.454566] allocated by task 300 on cpu 0 at 46.446236s (0.008317s ago): [ 46.455493] test_alloc+0x298/0x620 [ 46.455925] test_corruption+0xdc/0x378 [ 46.456526] kunit_try_run_case+0x14c/0x3d0 [ 46.457155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.457838] kthread+0x24c/0x2d0 [ 46.458308] ret_from_fork+0x10/0x20 [ 46.458888] [ 46.459240] freed by task 300 on cpu 0 at 46.446431s (0.012798s ago): [ 46.459989] test_corruption+0x278/0x378 [ 46.460605] kunit_try_run_case+0x14c/0x3d0 [ 46.461180] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.461822] kthread+0x24c/0x2d0 [ 46.462352] ret_from_fork+0x10/0x20 [ 46.462926] [ 46.463338] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 46.464247] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.464827] Hardware name: linux,dummy-virt (DT) [ 46.465512] ================================================================== [ 46.966487] ================================================================== [ 46.967331] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 46.967331] [ 46.968144] Corrupted memory at 0x00000000caca7fc0 [ ! ] (in kfence-#184): [ 46.970098] test_corruption+0x1d8/0x378 [ 46.970866] kunit_try_run_case+0x14c/0x3d0 [ 46.971628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.972463] kthread+0x24c/0x2d0 [ 46.973119] ret_from_fork+0x10/0x20 [ 46.973808] [ 46.974122] kfence-#184: 0x00000000b377c82a-0x000000003842af8f, size=32, cache=test [ 46.974122] [ 46.975023] allocated by task 302 on cpu 0 at 46.966204s (0.008807s ago): [ 46.976235] test_alloc+0x22c/0x620 [ 46.976746] test_corruption+0x198/0x378 [ 46.977227] kunit_try_run_case+0x14c/0x3d0 [ 46.977801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.978457] kthread+0x24c/0x2d0 [ 46.978942] ret_from_fork+0x10/0x20 [ 46.979508] [ 46.979845] freed by task 302 on cpu 0 at 46.966303s (0.013530s ago): [ 46.980547] test_corruption+0x1d8/0x378 [ 46.981124] kunit_try_run_case+0x14c/0x3d0 [ 46.981742] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.982398] kthread+0x24c/0x2d0 [ 46.982878] ret_from_fork+0x10/0x20 [ 46.983373] [ 46.983778] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 46.984828] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.985305] Hardware name: linux,dummy-virt (DT) [ 46.985891] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 46.342434] ================================================================== [ 46.343224] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 46.343224] [ 46.343776] Invalid free of 0x00000000d2b65336 (in kfence-#178): [ 46.344633] test_invalid_addr_free+0xec/0x238 [ 46.345872] kunit_try_run_case+0x14c/0x3d0 [ 46.346489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.347330] kthread+0x24c/0x2d0 [ 46.348013] ret_from_fork+0x10/0x20 [ 46.348571] [ 46.348893] kfence-#178: 0x000000006451f5b7-0x000000006b1b4f92, size=32, cache=test [ 46.348893] [ 46.350162] allocated by task 298 on cpu 1 at 46.342196s (0.007954s ago): [ 46.351267] test_alloc+0x22c/0x620 [ 46.351880] test_invalid_addr_free+0xd4/0x238 [ 46.352416] kunit_try_run_case+0x14c/0x3d0 [ 46.352966] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.353968] kthread+0x24c/0x2d0 [ 46.354579] ret_from_fork+0x10/0x20 [ 46.355100] [ 46.355627] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 46.356875] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.357600] Hardware name: linux,dummy-virt (DT) [ 46.358344] ================================================================== [ 46.238395] ================================================================== [ 46.239242] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 46.239242] [ 46.240053] Invalid free of 0x000000001f7b1fa4 (in kfence-#177): [ 46.240805] test_invalid_addr_free+0x1ac/0x238 [ 46.241386] kunit_try_run_case+0x14c/0x3d0 [ 46.241891] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.242507] kthread+0x24c/0x2d0 [ 46.243008] ret_from_fork+0x10/0x20 [ 46.243628] [ 46.244011] kfence-#177: 0x00000000d9f96522-0x000000007715870b, size=32, cache=kmalloc-32 [ 46.244011] [ 46.244962] allocated by task 296 on cpu 0 at 46.238141s (0.006810s ago): [ 46.245836] test_alloc+0x298/0x620 [ 46.246388] test_invalid_addr_free+0xd4/0x238 [ 46.246930] kunit_try_run_case+0x14c/0x3d0 [ 46.247407] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.248212] kthread+0x24c/0x2d0 [ 46.248811] ret_from_fork+0x10/0x20 [ 46.249403] [ 46.249815] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 46.251025] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.251585] Hardware name: linux,dummy-virt (DT) [ 46.252255] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[ 46.030755] ================================================================== [ 46.031612] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 46.031612] [ 46.032421] Invalid free of 0x00000000933b4eee (in kfence-#175): [ 46.033495] test_double_free+0x1bc/0x238 [ 46.034235] kunit_try_run_case+0x14c/0x3d0 [ 46.034818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.035658] kthread+0x24c/0x2d0 [ 46.036279] ret_from_fork+0x10/0x20 [ 46.036828] [ 46.037168] kfence-#175: 0x00000000933b4eee-0x00000000671ba236, size=32, cache=kmalloc-32 [ 46.037168] [ 46.038110] allocated by task 292 on cpu 1 at 46.030209s (0.007890s ago): [ 46.039036] test_alloc+0x298/0x620 [ 46.039597] test_double_free+0xd4/0x238 [ 46.040165] kunit_try_run_case+0x14c/0x3d0 [ 46.040851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.041524] kthread+0x24c/0x2d0 [ 46.042107] ret_from_fork+0x10/0x20 [ 46.042643] [ 46.042985] freed by task 292 on cpu 1 at 46.030371s (0.012603s ago): [ 46.043762] test_double_free+0x1ac/0x238 [ 46.044362] kunit_try_run_case+0x14c/0x3d0 [ 46.044889] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.045631] kthread+0x24c/0x2d0 [ 46.046166] ret_from_fork+0x10/0x20 [ 46.046662] [ 46.047062] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 46.048022] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.048620] Hardware name: linux,dummy-virt (DT) [ 46.049230] ================================================================== [ 46.134484] ================================================================== [ 46.135158] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 46.135158] [ 46.135887] Invalid free of 0x0000000039a3f95e (in kfence-#176): [ 46.136644] test_double_free+0x100/0x238 [ 46.137216] kunit_try_run_case+0x14c/0x3d0 [ 46.137776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.138408] kthread+0x24c/0x2d0 [ 46.138970] ret_from_fork+0x10/0x20 [ 46.139473] [ 46.139803] kfence-#176: 0x0000000039a3f95e-0x00000000d21f691c, size=32, cache=test [ 46.139803] [ 46.140845] allocated by task 294 on cpu 1 at 46.134109s (0.006724s ago): [ 46.141640] test_alloc+0x22c/0x620 [ 46.142184] test_double_free+0xd4/0x238 [ 46.142760] kunit_try_run_case+0x14c/0x3d0 [ 46.143313] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.143917] kthread+0x24c/0x2d0 [ 46.144491] ret_from_fork+0x10/0x20 [ 46.144966] [ 46.145315] freed by task 294 on cpu 1 at 46.134210s (0.011092s ago): [ 46.146131] test_double_free+0xf0/0x238 [ 46.146728] kunit_try_run_case+0x14c/0x3d0 [ 46.147264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.147991] kthread+0x24c/0x2d0 [ 46.148521] ret_from_fork+0x10/0x20 [ 46.148993] [ 46.149378] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 46.150525] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.151091] Hardware name: linux,dummy-virt (DT) [ 46.151582] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 45.614833] ================================================================== [ 45.615677] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 45.615677] [ 45.616554] Use-after-free read at 0x0000000039a5448e (in kfence-#171): [ 45.617703] test_use_after_free_read+0x114/0x248 [ 45.618328] test_use_after_free_read+0x1c0/0x248 [ 45.618871] kunit_try_run_case+0x14c/0x3d0 [ 45.619527] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.620253] kthread+0x24c/0x2d0 [ 45.620810] ret_from_fork+0x10/0x20 [ 45.621368] [ 45.621733] kfence-#171: 0x0000000039a5448e-0x00000000bc89df75, size=32, cache=kmalloc-32 [ 45.621733] [ 45.622540] allocated by task 284 on cpu 1 at 45.614263s (0.008265s ago): [ 45.623397] test_alloc+0x298/0x620 [ 45.623953] test_use_after_free_read+0xd0/0x248 [ 45.624515] kunit_try_run_case+0x14c/0x3d0 [ 45.625168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.625767] kthread+0x24c/0x2d0 [ 45.626302] ret_from_fork+0x10/0x20 [ 45.626897] [ 45.627198] freed by task 284 on cpu 1 at 45.614391s (0.012795s ago): [ 45.627959] test_use_after_free_read+0x1c0/0x248 [ 45.628637] kunit_try_run_case+0x14c/0x3d0 [ 45.629145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.629880] kthread+0x24c/0x2d0 [ 45.630413] ret_from_fork+0x10/0x20 [ 45.630939] [ 45.631333] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 45.632356] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.632877] Hardware name: linux,dummy-virt (DT) [ 45.633412] ================================================================== [ 45.718767] ================================================================== [ 45.719500] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 45.719500] [ 45.720396] Use-after-free read at 0x0000000022c28eab (in kfence-#172): [ 45.721260] test_use_after_free_read+0x114/0x248 [ 45.721862] test_use_after_free_read+0xf0/0x248 [ 45.722599] kunit_try_run_case+0x14c/0x3d0 [ 45.723278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.724053] kthread+0x24c/0x2d0 [ 45.724633] ret_from_fork+0x10/0x20 [ 45.725286] [ 45.725665] kfence-#172: 0x0000000022c28eab-0x00000000eb049ac8, size=32, cache=test [ 45.725665] [ 45.726658] allocated by task 286 on cpu 1 at 45.718370s (0.008275s ago): [ 45.727523] test_alloc+0x22c/0x620 [ 45.728074] test_use_after_free_read+0xd0/0x248 [ 45.728741] kunit_try_run_case+0x14c/0x3d0 [ 45.729386] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.730167] kthread+0x24c/0x2d0 [ 45.730727] ret_from_fork+0x10/0x20 [ 45.731323] [ 45.731687] freed by task 286 on cpu 1 at 45.718497s (0.013178s ago): [ 45.732661] test_use_after_free_read+0xf0/0x248 [ 45.733354] kunit_try_run_case+0x14c/0x3d0 [ 45.733896] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.734663] kthread+0x24c/0x2d0 [ 45.735207] ret_from_fork+0x10/0x20 [ 45.735772] [ 45.736200] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 45.737303] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.737923] Hardware name: linux,dummy-virt (DT) [ 45.738486] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 45.510398] ================================================================== [ 45.511298] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 45.511298] [ 45.512262] Out-of-bounds write at 0x00000000f35d4dd0 (1B left of kfence-#170): [ 45.513217] test_out_of_bounds_write+0x100/0x240 [ 45.513844] test_out_of_bounds_write+0xc8/0x240 [ 45.514541] kunit_try_run_case+0x14c/0x3d0 [ 45.515206] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.515973] kthread+0x24c/0x2d0 [ 45.516542] ret_from_fork+0x10/0x20 [ 45.517122] [ 45.517548] kfence-#170: 0x00000000100c786e-0x00000000ff793896, size=32, cache=test [ 45.517548] [ 45.518478] allocated by task 282 on cpu 0 at 45.510195s (0.008271s ago): [ 45.519458] test_alloc+0x22c/0x620 [ 45.519970] test_out_of_bounds_write+0xc8/0x240 [ 45.520614] kunit_try_run_case+0x14c/0x3d0 [ 45.521305] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.521920] kthread+0x24c/0x2d0 [ 45.522500] ret_from_fork+0x10/0x20 [ 45.523119] [ 45.523560] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 45.524638] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.525246] Hardware name: linux,dummy-virt (DT) [ 45.525811] ================================================================== [ 45.406489] ================================================================== [ 45.407333] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 45.407333] [ 45.408243] Out-of-bounds write at 0x0000000070cc7112 (1B left of kfence-#169): [ 45.409153] test_out_of_bounds_write+0x100/0x240 [ 45.409813] test_out_of_bounds_write+0xc8/0x240 [ 45.410519] kunit_try_run_case+0x14c/0x3d0 [ 45.411184] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.411917] kthread+0x24c/0x2d0 [ 45.412436] ret_from_fork+0x10/0x20 [ 45.413036] [ 45.413393] kfence-#169: 0x00000000680c45b2-0x00000000ab7c676f, size=32, cache=kmalloc-32 [ 45.413393] [ 45.414345] allocated by task 280 on cpu 1 at 45.406169s (0.008166s ago): [ 45.415274] test_alloc+0x298/0x620 [ 45.415880] test_out_of_bounds_write+0xc8/0x240 [ 45.416587] kunit_try_run_case+0x14c/0x3d0 [ 45.417199] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.417846] kthread+0x24c/0x2d0 [ 45.418421] ret_from_fork+0x10/0x20 [ 45.418991] [ 45.419399] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 45.420465] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.421041] Hardware name: linux,dummy-virt (DT) [ 45.421583] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 44.574371] ================================================================== [ 44.575155] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 44.575155] [ 44.575729] Out-of-bounds read at 0x000000004fbcac5b (1B left of kfence-#161): [ 44.576940] test_out_of_bounds_read+0x114/0x3e0 [ 44.577936] test_out_of_bounds_read+0xdc/0x3e0 [ 44.578535] kunit_try_run_case+0x14c/0x3d0 [ 44.579177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.579554] kthread+0x24c/0x2d0 [ 44.580360] ret_from_fork+0x10/0x20 [ 44.580815] [ 44.581052] kfence-#161: 0x000000009402a092-0x0000000011856bf9, size=32, cache=test [ 44.581052] [ 44.581904] allocated by task 278 on cpu 0 at 44.574175s (0.007723s ago): [ 44.583686] test_alloc+0x22c/0x620 [ 44.584340] test_out_of_bounds_read+0xdc/0x3e0 [ 44.584961] kunit_try_run_case+0x14c/0x3d0 [ 44.585546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.586248] kthread+0x24c/0x2d0 [ 44.586795] ret_from_fork+0x10/0x20 [ 44.587300] [ 44.587707] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 44.588727] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.589301] Hardware name: linux,dummy-virt (DT) [ 44.589870] ================================================================== [ 44.886366] ================================================================== [ 44.887525] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 44.887525] [ 44.888884] Out-of-bounds read at 0x0000000014404e7a (32B right of kfence-#164): [ 44.890347] test_out_of_bounds_read+0x1c8/0x3e0 [ 44.891064] test_out_of_bounds_read+0x198/0x3e0 [ 44.891694] kunit_try_run_case+0x14c/0x3d0 [ 44.892369] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.893125] kthread+0x24c/0x2d0 [ 44.893694] ret_from_fork+0x10/0x20 [ 44.894227] [ 44.894544] kfence-#164: 0x000000008b99714c-0x00000000911e87c4, size=32, cache=test [ 44.894544] [ 44.895363] allocated by task 278 on cpu 0 at 44.886198s (0.009153s ago): [ 44.896322] test_alloc+0x22c/0x620 [ 44.896838] test_out_of_bounds_read+0x198/0x3e0 [ 44.897570] kunit_try_run_case+0x14c/0x3d0 [ 44.898225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.898897] kthread+0x24c/0x2d0 [ 44.899471] ret_from_fork+0x10/0x20 [ 44.900040] [ 44.900427] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 44.901555] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.902077] Hardware name: linux,dummy-virt (DT) [ 44.902739] ================================================================== [ 44.366615] ================================================================== [ 44.367433] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 44.367433] [ 44.368291] Out-of-bounds read at 0x00000000c3b5d2e7 (32B right of kfence-#159): [ 44.369167] test_out_of_bounds_read+0x1c8/0x3e0 [ 44.369759] test_out_of_bounds_read+0x198/0x3e0 [ 44.370417] kunit_try_run_case+0x14c/0x3d0 [ 44.371065] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.371645] kthread+0x24c/0x2d0 [ 44.372177] ret_from_fork+0x10/0x20 [ 44.372792] [ 44.373148] kfence-#159: 0x0000000032848aa7-0x00000000d379d54b, size=32, cache=kmalloc-32 [ 44.373148] [ 44.374136] allocated by task 276 on cpu 1 at 44.366196s (0.007928s ago): [ 44.375005] test_alloc+0x298/0x620 [ 44.375577] test_out_of_bounds_read+0x198/0x3e0 [ 44.376238] kunit_try_run_case+0x14c/0x3d0 [ 44.376789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.377509] kthread+0x24c/0x2d0 [ 44.378048] ret_from_fork+0x10/0x20 [ 44.378600] [ 44.378927] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 44.380061] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.380643] Hardware name: linux,dummy-virt (DT) [ 44.381271] ================================================================== [ 44.159590] ================================================================== [ 44.160462] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 44.160462] [ 44.161552] Out-of-bounds read at 0x00000000ac7dac03 (1B left of kfence-#157): [ 44.162528] test_out_of_bounds_read+0x114/0x3e0 [ 44.163109] test_out_of_bounds_read+0xdc/0x3e0 [ 44.163767] kunit_try_run_case+0x14c/0x3d0 [ 44.164379] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.165184] kthread+0x24c/0x2d0 [ 44.165762] ret_from_fork+0x10/0x20 [ 44.166329] [ 44.166690] kfence-#157: 0x000000007274e0f3-0x0000000078ff0205, size=32, cache=kmalloc-32 [ 44.166690] [ 44.167648] allocated by task 276 on cpu 1 at 44.158241s (0.009395s ago): [ 44.168484] test_alloc+0x298/0x620 [ 44.169045] test_out_of_bounds_read+0xdc/0x3e0 [ 44.169723] kunit_try_run_case+0x14c/0x3d0 [ 44.170209] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.170951] kthread+0x24c/0x2d0 [ 44.171436] ret_from_fork+0x10/0x20 [ 44.172088] [ 44.172518] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 44.173495] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.174070] Hardware name: linux,dummy-virt (DT) [ 44.174711] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
[ 35.649048] ================================================================== [ 35.651349] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x224/0x490 [ 35.651349] [ 35.652504] Corrupted memory at 0x0000000043c762e1 [ ! . . . . . . . ] (in kfence-#112): [ 35.656694] kmalloc_track_caller_oob_right+0x224/0x490 [ 35.657640] kunit_try_run_case+0x14c/0x3d0 [ 35.658183] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.659203] kthread+0x24c/0x2d0 [ 35.659943] ret_from_fork+0x10/0x20 [ 35.660538] [ 35.661155] kfence-#112: 0x0000000036682ac1-0x000000005bdc357c, size=120, cache=kmalloc-128 [ 35.661155] [ 35.663000] allocated by task 131 on cpu 0 at 35.646050s (0.016442s ago): [ 35.664259] kmalloc_track_caller_oob_right+0x184/0x490 [ 35.664944] kunit_try_run_case+0x14c/0x3d0 [ 35.665728] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.666597] kthread+0x24c/0x2d0 [ 35.667034] ret_from_fork+0x10/0x20 [ 35.667628] [ 35.668079] freed by task 131 on cpu 0 at 35.648252s (0.019674s ago): [ 35.668932] kmalloc_track_caller_oob_right+0x224/0x490 [ 35.670037] kunit_try_run_case+0x14c/0x3d0 [ 35.670624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.671299] kthread+0x24c/0x2d0 [ 35.671959] ret_from_fork+0x10/0x20 [ 35.672684] [ 35.673161] CPU: 0 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 35.674873] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.675480] Hardware name: linux,dummy-virt (DT) [ 35.676129] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 43.779742] ================================================================== [ 43.780294] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 43.781183] Write of size 1 at addr fff00000c65d5278 by task kunit_try_catch/274 [ 43.782112] [ 43.782519] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 43.783686] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.784221] Hardware name: linux,dummy-virt (DT) [ 43.784843] Call trace: [ 43.785214] show_stack+0x20/0x38 (C) [ 43.785838] dump_stack_lvl+0x8c/0xd0 [ 43.786490] print_report+0x118/0x5e0 [ 43.787083] kasan_report+0xc8/0x118 [ 43.787700] __asan_report_store1_noabort+0x20/0x30 [ 43.788415] strncpy_from_user+0x270/0x2a0 [ 43.788997] copy_user_test_oob+0x5c0/0xec0 [ 43.789611] kunit_try_run_case+0x14c/0x3d0 [ 43.790126] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.790903] kthread+0x24c/0x2d0 [ 43.791477] ret_from_fork+0x10/0x20 [ 43.792056] [ 43.792376] Allocated by task 274: [ 43.792817] kasan_save_stack+0x3c/0x68 [ 43.793408] kasan_save_track+0x20/0x40 [ 43.794007] kasan_save_alloc_info+0x40/0x58 [ 43.794643] __kasan_kmalloc+0xd4/0xd8 [ 43.795134] __kmalloc_noprof+0x188/0x4c8 [ 43.795701] kunit_kmalloc_array+0x34/0x88 [ 43.796340] copy_user_test_oob+0xac/0xec0 [ 43.796949] kunit_try_run_case+0x14c/0x3d0 [ 43.797601] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.798238] kthread+0x24c/0x2d0 [ 43.798759] ret_from_fork+0x10/0x20 [ 43.799231] [ 43.799593] The buggy address belongs to the object at fff00000c65d5200 [ 43.799593] which belongs to the cache kmalloc-128 of size 128 [ 43.800833] The buggy address is located 0 bytes to the right of [ 43.800833] allocated 120-byte region [fff00000c65d5200, fff00000c65d5278) [ 43.801908] [ 43.802259] The buggy address belongs to the physical page: [ 43.802953] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d5 [ 43.803740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.804601] page_type: f5(slab) [ 43.805121] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 43.805942] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 43.806695] page dumped because: kasan: bad access detected [ 43.807389] [ 43.807726] Memory state around the buggy address: [ 43.808406] fff00000c65d5100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.809285] fff00000c65d5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.810156] >fff00000c65d5200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 43.811018] ^ [ 43.811752] fff00000c65d5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.812545] fff00000c65d5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.813288] ================================================================== [ 43.740244] ================================================================== [ 43.740905] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 43.742332] Write of size 121 at addr fff00000c65d5200 by task kunit_try_catch/274 [ 43.743594] [ 43.744341] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 43.745812] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.746436] Hardware name: linux,dummy-virt (DT) [ 43.747124] Call trace: [ 43.747531] show_stack+0x20/0x38 (C) [ 43.748190] dump_stack_lvl+0x8c/0xd0 [ 43.748901] print_report+0x118/0x5e0 [ 43.749407] kasan_report+0xc8/0x118 [ 43.749912] kasan_check_range+0x100/0x1a8 [ 43.750519] __kasan_check_write+0x20/0x30 [ 43.751080] strncpy_from_user+0x3c/0x2a0 [ 43.751801] copy_user_test_oob+0x5c0/0xec0 [ 43.752493] kunit_try_run_case+0x14c/0x3d0 [ 43.753182] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.753985] kthread+0x24c/0x2d0 [ 43.754612] ret_from_fork+0x10/0x20 [ 43.755185] [ 43.755542] Allocated by task 274: [ 43.756080] kasan_save_stack+0x3c/0x68 [ 43.756765] kasan_save_track+0x20/0x40 [ 43.757367] kasan_save_alloc_info+0x40/0x58 [ 43.758003] __kasan_kmalloc+0xd4/0xd8 [ 43.758558] __kmalloc_noprof+0x188/0x4c8 [ 43.759118] kunit_kmalloc_array+0x34/0x88 [ 43.759780] copy_user_test_oob+0xac/0xec0 [ 43.760410] kunit_try_run_case+0x14c/0x3d0 [ 43.760995] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.761813] kthread+0x24c/0x2d0 [ 43.762395] ret_from_fork+0x10/0x20 [ 43.762969] [ 43.763359] The buggy address belongs to the object at fff00000c65d5200 [ 43.763359] which belongs to the cache kmalloc-128 of size 128 [ 43.764618] The buggy address is located 0 bytes inside of [ 43.764618] allocated 120-byte region [fff00000c65d5200, fff00000c65d5278) [ 43.765784] [ 43.766209] The buggy address belongs to the physical page: [ 43.766940] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d5 [ 43.767824] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.768578] page_type: f5(slab) [ 43.769145] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 43.770034] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 43.770913] page dumped because: kasan: bad access detected [ 43.771523] [ 43.771899] Memory state around the buggy address: [ 43.772542] fff00000c65d5100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.773317] fff00000c65d5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.774113] >fff00000c65d5200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 43.774942] ^ [ 43.775802] fff00000c65d5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.776662] fff00000c65d5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.777425] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 43.587617] ================================================================== [ 43.588391] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0 [ 43.588999] Write of size 121 at addr fff00000c65d5200 by task kunit_try_catch/274 [ 43.589982] [ 43.590378] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 43.591294] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.591890] Hardware name: linux,dummy-virt (DT) [ 43.592537] Call trace: [ 43.592905] show_stack+0x20/0x38 (C) [ 43.593534] dump_stack_lvl+0x8c/0xd0 [ 43.594140] print_report+0x118/0x5e0 [ 43.594658] kasan_report+0xc8/0x118 [ 43.595323] kasan_check_range+0x100/0x1a8 [ 43.595996] __kasan_check_write+0x20/0x30 [ 43.596682] copy_user_test_oob+0x35c/0xec0 [ 43.597290] kunit_try_run_case+0x14c/0x3d0 [ 43.597985] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.598760] kthread+0x24c/0x2d0 [ 43.599320] ret_from_fork+0x10/0x20 [ 43.599865] [ 43.600211] Allocated by task 274: [ 43.600758] kasan_save_stack+0x3c/0x68 [ 43.601252] kasan_save_track+0x20/0x40 [ 43.601857] kasan_save_alloc_info+0x40/0x58 [ 43.602473] __kasan_kmalloc+0xd4/0xd8 [ 43.602914] __kmalloc_noprof+0x188/0x4c8 [ 43.603532] kunit_kmalloc_array+0x34/0x88 [ 43.604138] copy_user_test_oob+0xac/0xec0 [ 43.604786] kunit_try_run_case+0x14c/0x3d0 [ 43.605482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.606156] kthread+0x24c/0x2d0 [ 43.606643] ret_from_fork+0x10/0x20 [ 43.607114] [ 43.607474] The buggy address belongs to the object at fff00000c65d5200 [ 43.607474] which belongs to the cache kmalloc-128 of size 128 [ 43.608720] The buggy address is located 0 bytes inside of [ 43.608720] allocated 120-byte region [fff00000c65d5200, fff00000c65d5278) [ 43.609982] [ 43.610315] The buggy address belongs to the physical page: [ 43.611021] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d5 [ 43.611802] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.612640] page_type: f5(slab) [ 43.613146] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 43.613976] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 43.614775] page dumped because: kasan: bad access detected [ 43.615482] [ 43.615803] Memory state around the buggy address: [ 43.616461] fff00000c65d5100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.617238] fff00000c65d5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.618043] >fff00000c65d5200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 43.618826] ^ [ 43.619722] fff00000c65d5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.620504] fff00000c65d5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.621288] ================================================================== [ 43.488366] ================================================================== [ 43.489705] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0 [ 43.490872] Write of size 121 at addr fff00000c65d5200 by task kunit_try_catch/274 [ 43.491753] [ 43.492181] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 43.493580] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.494309] Hardware name: linux,dummy-virt (DT) [ 43.495675] Call trace: [ 43.496184] show_stack+0x20/0x38 (C) [ 43.496855] dump_stack_lvl+0x8c/0xd0 [ 43.497585] print_report+0x118/0x5e0 [ 43.498319] kasan_report+0xc8/0x118 [ 43.498917] kasan_check_range+0x100/0x1a8 [ 43.499600] __kasan_check_write+0x20/0x30 [ 43.500247] copy_user_test_oob+0x234/0xec0 [ 43.500823] kunit_try_run_case+0x14c/0x3d0 [ 43.501873] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.502781] kthread+0x24c/0x2d0 [ 43.503201] ret_from_fork+0x10/0x20 [ 43.503894] [ 43.504333] Allocated by task 274: [ 43.504983] kasan_save_stack+0x3c/0x68 [ 43.505938] kasan_save_track+0x20/0x40 [ 43.506640] kasan_save_alloc_info+0x40/0x58 [ 43.507304] __kasan_kmalloc+0xd4/0xd8 [ 43.507899] __kmalloc_noprof+0x188/0x4c8 [ 43.508531] kunit_kmalloc_array+0x34/0x88 [ 43.509150] copy_user_test_oob+0xac/0xec0 [ 43.510225] kunit_try_run_case+0x14c/0x3d0 [ 43.510833] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.511603] kthread+0x24c/0x2d0 [ 43.512343] ret_from_fork+0x10/0x20 [ 43.513040] [ 43.513745] The buggy address belongs to the object at fff00000c65d5200 [ 43.513745] which belongs to the cache kmalloc-128 of size 128 [ 43.515140] The buggy address is located 0 bytes inside of [ 43.515140] allocated 120-byte region [fff00000c65d5200, fff00000c65d5278) [ 43.516480] [ 43.516851] The buggy address belongs to the physical page: [ 43.517525] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d5 [ 43.518366] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.519822] page_type: f5(slab) [ 43.520946] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 43.522142] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 43.523276] page dumped because: kasan: bad access detected [ 43.523851] [ 43.524088] Memory state around the buggy address: [ 43.524625] fff00000c65d5100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 43.526179] fff00000c65d5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.527038] >fff00000c65d5200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 43.528472] ^ [ 43.529491] fff00000c65d5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.530684] fff00000c65d5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.531425] ================================================================== [ 43.540117] ================================================================== [ 43.540926] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0 [ 43.542267] Read of size 121 at addr fff00000c65d5200 by task kunit_try_catch/274 [ 43.543589] [ 43.543898] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 43.545171] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.546262] Hardware name: linux,dummy-virt (DT) [ 43.547208] Call trace: [ 43.547588] show_stack+0x20/0x38 (C) [ 43.548152] dump_stack_lvl+0x8c/0xd0 [ 43.548603] print_report+0x118/0x5e0 [ 43.549259] kasan_report+0xc8/0x118 [ 43.549936] kasan_check_range+0x100/0x1a8 [ 43.550561] __kasan_check_read+0x20/0x30 [ 43.551161] copy_user_test_oob+0x728/0xec0 [ 43.551882] kunit_try_run_case+0x14c/0x3d0 [ 43.552598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.553391] kthread+0x24c/0x2d0 [ 43.554032] ret_from_fork+0x10/0x20 [ 43.554656] [ 43.555040] Allocated by task 274: [ 43.555525] kasan_save_stack+0x3c/0x68 [ 43.556126] kasan_save_track+0x20/0x40 [ 43.556780] kasan_save_alloc_info+0x40/0x58 [ 43.557482] __kasan_kmalloc+0xd4/0xd8 [ 43.558067] __kmalloc_noprof+0x188/0x4c8 [ 43.558658] kunit_kmalloc_array+0x34/0x88 [ 43.559277] copy_user_test_oob+0xac/0xec0 [ 43.559929] kunit_try_run_case+0x14c/0x3d0 [ 43.560487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.561278] kthread+0x24c/0x2d0 [ 43.561876] ret_from_fork+0x10/0x20 [ 43.562519] [ 43.562900] The buggy address belongs to the object at fff00000c65d5200 [ 43.562900] which belongs to the cache kmalloc-128 of size 128 [ 43.564146] The buggy address is located 0 bytes inside of [ 43.564146] allocated 120-byte region [fff00000c65d5200, fff00000c65d5278) [ 43.565520] [ 43.565926] The buggy address belongs to the physical page: [ 43.566623] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d5 [ 43.567519] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.568298] page_type: f5(slab) [ 43.568917] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 43.569786] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 43.570757] page dumped because: kasan: bad access detected [ 43.571382] [ 43.571748] Memory state around the buggy address: [ 43.572334] fff00000c65d5100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.573111] fff00000c65d5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.573939] >fff00000c65d5200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 43.574621] ^ [ 43.575417] fff00000c65d5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.576179] fff00000c65d5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.577021] ================================================================== [ 43.623388] ================================================================== [ 43.624526] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0 [ 43.625146] Read of size 121 at addr fff00000c65d5200 by task kunit_try_catch/274 [ 43.626512] [ 43.626864] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 43.628382] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.629118] Hardware name: linux,dummy-virt (DT) [ 43.629916] Call trace: [ 43.630501] show_stack+0x20/0x38 (C) [ 43.631240] dump_stack_lvl+0x8c/0xd0 [ 43.631845] print_report+0x118/0x5e0 [ 43.632628] kasan_report+0xc8/0x118 [ 43.633337] kasan_check_range+0x100/0x1a8 [ 43.634125] __kasan_check_read+0x20/0x30 [ 43.634869] copy_user_test_oob+0x3c8/0xec0 [ 43.635716] kunit_try_run_case+0x14c/0x3d0 [ 43.636561] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.637472] kthread+0x24c/0x2d0 [ 43.638003] ret_from_fork+0x10/0x20 [ 43.638758] [ 43.639090] Allocated by task 274: [ 43.639598] kasan_save_stack+0x3c/0x68 [ 43.640237] kasan_save_track+0x20/0x40 [ 43.640840] kasan_save_alloc_info+0x40/0x58 [ 43.641418] __kasan_kmalloc+0xd4/0xd8 [ 43.642002] __kmalloc_noprof+0x188/0x4c8 [ 43.642652] kunit_kmalloc_array+0x34/0x88 [ 43.643306] copy_user_test_oob+0xac/0xec0 [ 43.643919] kunit_try_run_case+0x14c/0x3d0 [ 43.644546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.645140] kthread+0x24c/0x2d0 [ 43.645718] ret_from_fork+0x10/0x20 [ 43.646284] [ 43.646678] The buggy address belongs to the object at fff00000c65d5200 [ 43.646678] which belongs to the cache kmalloc-128 of size 128 [ 43.648024] The buggy address is located 0 bytes inside of [ 43.648024] allocated 120-byte region [fff00000c65d5200, fff00000c65d5278) [ 43.649372] [ 43.649737] The buggy address belongs to the physical page: [ 43.650370] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d5 [ 43.651422] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.652076] page_type: f5(slab) [ 43.652504] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 43.653665] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 43.654721] page dumped because: kasan: bad access detected [ 43.655549] [ 43.655938] Memory state around the buggy address: [ 43.656655] fff00000c65d5100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.657485] fff00000c65d5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.658301] >fff00000c65d5200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 43.659148] ^ [ 43.660005] fff00000c65d5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.660888] fff00000c65d5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.661732] ================================================================== [ 43.702615] ================================================================== [ 43.703584] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0 [ 43.704396] Read of size 121 at addr fff00000c65d5200 by task kunit_try_catch/274 [ 43.705209] [ 43.705684] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 43.706906] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.707530] Hardware name: linux,dummy-virt (DT) [ 43.708164] Call trace: [ 43.708615] show_stack+0x20/0x38 (C) [ 43.709302] dump_stack_lvl+0x8c/0xd0 [ 43.709891] print_report+0x118/0x5e0 [ 43.710481] kasan_report+0xc8/0x118 [ 43.711107] kasan_check_range+0x100/0x1a8 [ 43.711800] __kasan_check_read+0x20/0x30 [ 43.712420] copy_user_test_oob+0x4a0/0xec0 [ 43.713125] kunit_try_run_case+0x14c/0x3d0 [ 43.713874] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.714624] kthread+0x24c/0x2d0 [ 43.715076] ret_from_fork+0x10/0x20 [ 43.715594] [ 43.715893] Allocated by task 274: [ 43.716363] kasan_save_stack+0x3c/0x68 [ 43.716915] kasan_save_track+0x20/0x40 [ 43.717519] kasan_save_alloc_info+0x40/0x58 [ 43.718045] __kasan_kmalloc+0xd4/0xd8 [ 43.718709] __kmalloc_noprof+0x188/0x4c8 [ 43.719306] kunit_kmalloc_array+0x34/0x88 [ 43.719847] copy_user_test_oob+0xac/0xec0 [ 43.720495] kunit_try_run_case+0x14c/0x3d0 [ 43.721089] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.721886] kthread+0x24c/0x2d0 [ 43.722484] ret_from_fork+0x10/0x20 [ 43.723052] [ 43.723375] The buggy address belongs to the object at fff00000c65d5200 [ 43.723375] which belongs to the cache kmalloc-128 of size 128 [ 43.724635] The buggy address is located 0 bytes inside of [ 43.724635] allocated 120-byte region [fff00000c65d5200, fff00000c65d5278) [ 43.725840] [ 43.726184] The buggy address belongs to the physical page: [ 43.726897] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d5 [ 43.727835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.728605] page_type: f5(slab) [ 43.729185] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 43.730136] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 43.731025] page dumped because: kasan: bad access detected [ 43.731677] [ 43.732053] Memory state around the buggy address: [ 43.732697] fff00000c65d5100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.733611] fff00000c65d5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.734393] >fff00000c65d5200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 43.735248] ^ [ 43.736071] fff00000c65d5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.736943] fff00000c65d5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.737713] ================================================================== [ 43.663780] ================================================================== [ 43.664660] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0 [ 43.665070] Write of size 121 at addr fff00000c65d5200 by task kunit_try_catch/274 [ 43.665718] [ 43.666166] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 43.667379] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.667860] Hardware name: linux,dummy-virt (DT) [ 43.668333] Call trace: [ 43.669275] show_stack+0x20/0x38 (C) [ 43.670002] dump_stack_lvl+0x8c/0xd0 [ 43.670723] print_report+0x118/0x5e0 [ 43.671326] kasan_report+0xc8/0x118 [ 43.672130] kasan_check_range+0x100/0x1a8 [ 43.672914] __kasan_check_write+0x20/0x30 [ 43.673684] copy_user_test_oob+0x434/0xec0 [ 43.674296] kunit_try_run_case+0x14c/0x3d0 [ 43.675106] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.675986] kthread+0x24c/0x2d0 [ 43.676698] ret_from_fork+0x10/0x20 [ 43.677280] [ 43.677855] Allocated by task 274: [ 43.678482] kasan_save_stack+0x3c/0x68 [ 43.679067] kasan_save_track+0x20/0x40 [ 43.679579] kasan_save_alloc_info+0x40/0x58 [ 43.680107] __kasan_kmalloc+0xd4/0xd8 [ 43.681140] __kmalloc_noprof+0x188/0x4c8 [ 43.681647] kunit_kmalloc_array+0x34/0x88 [ 43.682480] copy_user_test_oob+0xac/0xec0 [ 43.683048] kunit_try_run_case+0x14c/0x3d0 [ 43.683594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.684371] kthread+0x24c/0x2d0 [ 43.684876] ret_from_fork+0x10/0x20 [ 43.685481] [ 43.685827] The buggy address belongs to the object at fff00000c65d5200 [ 43.685827] which belongs to the cache kmalloc-128 of size 128 [ 43.687074] The buggy address is located 0 bytes inside of [ 43.687074] allocated 120-byte region [fff00000c65d5200, fff00000c65d5278) [ 43.688334] [ 43.688778] The buggy address belongs to the physical page: [ 43.689423] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d5 [ 43.690257] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.691129] page_type: f5(slab) [ 43.691724] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 43.692684] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 43.693594] page dumped because: kasan: bad access detected [ 43.694239] [ 43.694636] Memory state around the buggy address: [ 43.695285] fff00000c65d5100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.696011] fff00000c65d5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.696656] >fff00000c65d5200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 43.697541] ^ [ 43.698326] fff00000c65d5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.699239] fff00000c65d5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.700115] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 43.252021] ================================================================== [ 43.253415] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 43.254901] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/258 [ 43.255777] [ 43.256099] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 43.257171] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.257991] Hardware name: linux,dummy-virt (DT) [ 43.258904] Call trace: [ 43.259338] show_stack+0x20/0x38 (C) [ 43.260028] dump_stack_lvl+0x8c/0xd0 [ 43.260672] print_report+0x2fc/0x5e0 [ 43.261586] kasan_report+0xc8/0x118 [ 43.262218] __asan_report_load1_noabort+0x20/0x30 [ 43.262835] vmalloc_oob+0x578/0x5d0 [ 43.263406] kunit_try_run_case+0x14c/0x3d0 [ 43.264068] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.264742] kthread+0x24c/0x2d0 [ 43.265521] ret_from_fork+0x10/0x20 [ 43.266309] [ 43.266657] The buggy address belongs to the virtual mapping at [ 43.266657] [ffff80008010b000, ffff80008010d000) created by: [ 43.266657] vmalloc_oob+0x98/0x5d0 [ 43.268089] [ 43.268420] The buggy address belongs to the physical page: [ 43.269112] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10655e [ 43.270056] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.271053] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 43.271775] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 43.272617] page dumped because: kasan: bad access detected [ 43.273188] [ 43.274189] Memory state around the buggy address: [ 43.274758] ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 43.275650] ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 43.276363] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 43.277065] ^ [ 43.278487] ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 43.279397] ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 43.280183] ================================================================== [ 43.283062] ================================================================== [ 43.283765] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 43.284878] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/258 [ 43.286522] [ 43.286942] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 43.288322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.289038] Hardware name: linux,dummy-virt (DT) [ 43.290188] Call trace: [ 43.290562] show_stack+0x20/0x38 (C) [ 43.291089] dump_stack_lvl+0x8c/0xd0 [ 43.291630] print_report+0x2fc/0x5e0 [ 43.292205] kasan_report+0xc8/0x118 [ 43.292745] __asan_report_load1_noabort+0x20/0x30 [ 43.293967] vmalloc_oob+0x51c/0x5d0 [ 43.294566] kunit_try_run_case+0x14c/0x3d0 [ 43.295454] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.296387] kthread+0x24c/0x2d0 [ 43.296942] ret_from_fork+0x10/0x20 [ 43.297899] [ 43.298485] The buggy address belongs to the virtual mapping at [ 43.298485] [ffff80008010b000, ffff80008010d000) created by: [ 43.298485] vmalloc_oob+0x98/0x5d0 [ 43.300063] [ 43.300328] The buggy address belongs to the physical page: [ 43.301128] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10655e [ 43.302627] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.303541] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 43.304574] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 43.305576] page dumped because: kasan: bad access detected [ 43.306137] [ 43.306392] Memory state around the buggy address: [ 43.307959] ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 43.308901] ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 43.310008] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 43.310829] ^ [ 43.311841] ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 43.312776] ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 43.313795] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 43.040889] ================================================================== [ 43.041680] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 43.042558] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 43.043219] [ 43.044870] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 43.046256] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.046796] Hardware name: linux,dummy-virt (DT) [ 43.047651] Call trace: [ 43.048209] show_stack+0x20/0x38 (C) [ 43.048815] dump_stack_lvl+0x8c/0xd0 [ 43.049651] print_report+0x118/0x5e0 [ 43.050433] kasan_report+0xc8/0x118 [ 43.051126] kasan_check_range+0x100/0x1a8 [ 43.051746] __kasan_check_write+0x20/0x30 [ 43.052300] kasan_atomics_helper+0x16d0/0x4858 [ 43.053257] kasan_atomics+0x198/0x2e8 [ 43.053972] kunit_try_run_case+0x14c/0x3d0 [ 43.054735] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.055611] kthread+0x24c/0x2d0 [ 43.056328] ret_from_fork+0x10/0x20 [ 43.056897] [ 43.057484] Allocated by task 254: [ 43.058102] kasan_save_stack+0x3c/0x68 [ 43.058821] kasan_save_track+0x20/0x40 [ 43.059364] kasan_save_alloc_info+0x40/0x58 [ 43.060205] __kasan_kmalloc+0xd4/0xd8 [ 43.060963] __kmalloc_cache_noprof+0x15c/0x3c8 [ 43.061602] kasan_atomics+0xb8/0x2e8 [ 43.062368] kunit_try_run_case+0x14c/0x3d0 [ 43.063120] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.063968] kthread+0x24c/0x2d0 [ 43.064652] ret_from_fork+0x10/0x20 [ 43.065150] [ 43.065728] The buggy address belongs to the object at fff00000c65bde00 [ 43.065728] which belongs to the cache kmalloc-64 of size 64 [ 43.067076] The buggy address is located 0 bytes to the right of [ 43.067076] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 43.068525] [ 43.069083] The buggy address belongs to the physical page: [ 43.069720] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 43.070718] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.071731] page_type: f5(slab) [ 43.072427] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 43.073476] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 43.074306] page dumped because: kasan: bad access detected [ 43.075160] [ 43.075671] Memory state around the buggy address: [ 43.076415] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.077271] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.078067] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 43.078895] ^ [ 43.079508] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.080335] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.081144] ================================================================== [ 42.595035] ================================================================== [ 42.595782] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 42.596662] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.597515] [ 42.597899] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.599068] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.599630] Hardware name: linux,dummy-virt (DT) [ 42.600246] Call trace: [ 42.600706] show_stack+0x20/0x38 (C) [ 42.601392] dump_stack_lvl+0x8c/0xd0 [ 42.602013] print_report+0x118/0x5e0 [ 42.602691] kasan_report+0xc8/0x118 [ 42.603321] kasan_check_range+0x100/0x1a8 [ 42.604049] __kasan_check_write+0x20/0x30 [ 42.604663] kasan_atomics_helper+0x126c/0x4858 [ 42.605486] kasan_atomics+0x198/0x2e8 [ 42.606163] kunit_try_run_case+0x14c/0x3d0 [ 42.606814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.607598] kthread+0x24c/0x2d0 [ 42.608194] ret_from_fork+0x10/0x20 [ 42.608814] [ 42.609143] Allocated by task 254: [ 42.609705] kasan_save_stack+0x3c/0x68 [ 42.610234] kasan_save_track+0x20/0x40 [ 42.610929] kasan_save_alloc_info+0x40/0x58 [ 42.611551] __kasan_kmalloc+0xd4/0xd8 [ 42.612164] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.612801] kasan_atomics+0xb8/0x2e8 [ 42.613396] kunit_try_run_case+0x14c/0x3d0 [ 42.614001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.614747] kthread+0x24c/0x2d0 [ 42.615397] ret_from_fork+0x10/0x20 [ 42.615927] [ 42.616322] The buggy address belongs to the object at fff00000c65bde00 [ 42.616322] which belongs to the cache kmalloc-64 of size 64 [ 42.617515] The buggy address is located 0 bytes to the right of [ 42.617515] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.618785] [ 42.619166] The buggy address belongs to the physical page: [ 42.619800] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.620746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.621604] page_type: f5(slab) [ 42.622178] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.623102] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.624007] page dumped because: kasan: bad access detected [ 42.624769] [ 42.625365] Memory state around the buggy address: [ 42.626080] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.626855] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.627709] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.628747] ^ [ 42.629622] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.630799] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.631881] ================================================================== [ 41.404222] ================================================================== [ 41.405093] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 41.406118] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.407549] [ 41.408071] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.409193] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.410040] Hardware name: linux,dummy-virt (DT) [ 41.410809] Call trace: [ 41.411383] show_stack+0x20/0x38 (C) [ 41.412145] dump_stack_lvl+0x8c/0xd0 [ 41.412891] print_report+0x118/0x5e0 [ 41.413683] kasan_report+0xc8/0x118 [ 41.414182] kasan_check_range+0x100/0x1a8 [ 41.414766] __kasan_check_write+0x20/0x30 [ 41.415317] kasan_atomics_helper+0x6ec/0x4858 [ 41.416398] kasan_atomics+0x198/0x2e8 [ 41.417151] kunit_try_run_case+0x14c/0x3d0 [ 41.417953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.418862] kthread+0x24c/0x2d0 [ 41.419560] ret_from_fork+0x10/0x20 [ 41.420297] [ 41.420639] Allocated by task 254: [ 41.421392] kasan_save_stack+0x3c/0x68 [ 41.422132] kasan_save_track+0x20/0x40 [ 41.422786] kasan_save_alloc_info+0x40/0x58 [ 41.423418] __kasan_kmalloc+0xd4/0xd8 [ 41.424263] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.425130] kasan_atomics+0xb8/0x2e8 [ 41.425845] kunit_try_run_case+0x14c/0x3d0 [ 41.426434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.427370] kthread+0x24c/0x2d0 [ 41.428087] ret_from_fork+0x10/0x20 [ 41.428857] [ 41.429192] The buggy address belongs to the object at fff00000c65bde00 [ 41.429192] which belongs to the cache kmalloc-64 of size 64 [ 41.430665] The buggy address is located 0 bytes to the right of [ 41.430665] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.432121] [ 41.432701] The buggy address belongs to the physical page: [ 41.433311] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.434123] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.434994] page_type: f5(slab) [ 41.435455] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.436370] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.437218] page dumped because: kasan: bad access detected [ 41.437828] [ 41.438159] Memory state around the buggy address: [ 41.438667] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.439545] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.440342] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.441113] ^ [ 41.441632] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.442491] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.443318] ================================================================== [ 42.145210] ================================================================== [ 42.146371] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 42.147285] Read of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.147924] [ 42.148320] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.149708] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.150435] Hardware name: linux,dummy-virt (DT) [ 42.151118] Call trace: [ 42.151579] show_stack+0x20/0x38 (C) [ 42.152265] dump_stack_lvl+0x8c/0xd0 [ 42.152911] print_report+0x118/0x5e0 [ 42.153534] kasan_report+0xc8/0x118 [ 42.154117] __asan_report_load8_noabort+0x20/0x30 [ 42.154804] kasan_atomics_helper+0x3f58/0x4858 [ 42.155398] kasan_atomics+0x198/0x2e8 [ 42.156043] kunit_try_run_case+0x14c/0x3d0 [ 42.156733] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.157495] kthread+0x24c/0x2d0 [ 42.158056] ret_from_fork+0x10/0x20 [ 42.158659] [ 42.159043] Allocated by task 254: [ 42.159547] kasan_save_stack+0x3c/0x68 [ 42.160203] kasan_save_track+0x20/0x40 [ 42.160836] kasan_save_alloc_info+0x40/0x58 [ 42.161519] __kasan_kmalloc+0xd4/0xd8 [ 42.162130] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.162838] kasan_atomics+0xb8/0x2e8 [ 42.163421] kunit_try_run_case+0x14c/0x3d0 [ 42.164073] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.164823] kthread+0x24c/0x2d0 [ 42.165404] ret_from_fork+0x10/0x20 [ 42.166046] [ 42.166419] The buggy address belongs to the object at fff00000c65bde00 [ 42.166419] which belongs to the cache kmalloc-64 of size 64 [ 42.167615] The buggy address is located 0 bytes to the right of [ 42.167615] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.168903] [ 42.169236] The buggy address belongs to the physical page: [ 42.169924] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.170937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.171702] page_type: f5(slab) [ 42.172306] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.173165] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.174102] page dumped because: kasan: bad access detected [ 42.174760] [ 42.175137] Memory state around the buggy address: [ 42.175776] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.176647] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.177520] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.178363] ^ [ 42.178950] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.179862] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.180651] ================================================================== [ 40.714682] ================================================================== [ 40.716377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 40.717185] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 40.719089] [ 40.719780] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.721092] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.721938] Hardware name: linux,dummy-virt (DT) [ 40.722687] Call trace: [ 40.723354] show_stack+0x20/0x38 (C) [ 40.724391] dump_stack_lvl+0x8c/0xd0 [ 40.724993] print_report+0x118/0x5e0 [ 40.725924] kasan_report+0xc8/0x118 [ 40.726562] __asan_report_load4_noabort+0x20/0x30 [ 40.727412] kasan_atomics_helper+0x40a8/0x4858 [ 40.728193] kasan_atomics+0x198/0x2e8 [ 40.728933] kunit_try_run_case+0x14c/0x3d0 [ 40.729785] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.730278] kthread+0x24c/0x2d0 [ 40.730705] ret_from_fork+0x10/0x20 [ 40.731224] [ 40.731682] Allocated by task 254: [ 40.732364] kasan_save_stack+0x3c/0x68 [ 40.733109] kasan_save_track+0x20/0x40 [ 40.733808] kasan_save_alloc_info+0x40/0x58 [ 40.734659] __kasan_kmalloc+0xd4/0xd8 [ 40.735503] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.736313] kasan_atomics+0xb8/0x2e8 [ 40.737025] kunit_try_run_case+0x14c/0x3d0 [ 40.737877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.739114] kthread+0x24c/0x2d0 [ 40.739605] ret_from_fork+0x10/0x20 [ 40.740538] [ 40.740948] The buggy address belongs to the object at fff00000c65bde00 [ 40.740948] which belongs to the cache kmalloc-64 of size 64 [ 40.743119] The buggy address is located 0 bytes to the right of [ 40.743119] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 40.744262] [ 40.744971] The buggy address belongs to the physical page: [ 40.745711] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 40.746792] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.747323] page_type: f5(slab) [ 40.747727] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 40.749156] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 40.750256] page dumped because: kasan: bad access detected [ 40.751110] [ 40.751646] Memory state around the buggy address: [ 40.752474] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.753735] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.754872] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 40.755801] ^ [ 40.756531] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.757899] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.759000] ================================================================== [ 41.592487] ================================================================== [ 41.593303] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 41.594203] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.594809] [ 41.595196] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.596142] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.596674] Hardware name: linux,dummy-virt (DT) [ 41.597137] Call trace: [ 41.597583] show_stack+0x20/0x38 (C) [ 41.598207] dump_stack_lvl+0x8c/0xd0 [ 41.598832] print_report+0x118/0x5e0 [ 41.599385] kasan_report+0xc8/0x118 [ 41.599908] kasan_check_range+0x100/0x1a8 [ 41.600558] __kasan_check_write+0x20/0x30 [ 41.601136] kasan_atomics_helper+0x934/0x4858 [ 41.601716] kasan_atomics+0x198/0x2e8 [ 41.602319] kunit_try_run_case+0x14c/0x3d0 [ 41.603009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.603709] kthread+0x24c/0x2d0 [ 41.604278] ret_from_fork+0x10/0x20 [ 41.604851] [ 41.605166] Allocated by task 254: [ 41.605705] kasan_save_stack+0x3c/0x68 [ 41.606209] kasan_save_track+0x20/0x40 [ 41.606809] kasan_save_alloc_info+0x40/0x58 [ 41.607409] __kasan_kmalloc+0xd4/0xd8 [ 41.607912] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.608599] kasan_atomics+0xb8/0x2e8 [ 41.609157] kunit_try_run_case+0x14c/0x3d0 [ 41.609760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.610510] kthread+0x24c/0x2d0 [ 41.611046] ret_from_fork+0x10/0x20 [ 41.611551] [ 41.611834] The buggy address belongs to the object at fff00000c65bde00 [ 41.611834] which belongs to the cache kmalloc-64 of size 64 [ 41.613162] The buggy address is located 0 bytes to the right of [ 41.613162] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.614355] [ 41.614728] The buggy address belongs to the physical page: [ 41.615381] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.616077] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.616912] page_type: f5(slab) [ 41.617476] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.618244] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.619093] page dumped because: kasan: bad access detected [ 41.619794] [ 41.620108] Memory state around the buggy address: [ 41.620769] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.621539] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.622345] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.623061] ^ [ 41.623651] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.624494] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.625109] ================================================================== [ 41.850831] ================================================================== [ 41.851571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 41.852357] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.853109] [ 41.853706] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.854781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.855296] Hardware name: linux,dummy-virt (DT) [ 41.856359] Call trace: [ 41.856940] show_stack+0x20/0x38 (C) [ 41.857685] dump_stack_lvl+0x8c/0xd0 [ 41.858394] print_report+0x118/0x5e0 [ 41.859087] kasan_report+0xc8/0x118 [ 41.859789] __asan_report_load4_noabort+0x20/0x30 [ 41.860612] kasan_atomics_helper+0x3dbc/0x4858 [ 41.861377] kasan_atomics+0x198/0x2e8 [ 41.862076] kunit_try_run_case+0x14c/0x3d0 [ 41.862654] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.863320] kthread+0x24c/0x2d0 [ 41.863838] ret_from_fork+0x10/0x20 [ 41.864347] [ 41.865219] Allocated by task 254: [ 41.865630] kasan_save_stack+0x3c/0x68 [ 41.866420] kasan_save_track+0x20/0x40 [ 41.866896] kasan_save_alloc_info+0x40/0x58 [ 41.867529] __kasan_kmalloc+0xd4/0xd8 [ 41.868015] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.868694] kasan_atomics+0xb8/0x2e8 [ 41.869238] kunit_try_run_case+0x14c/0x3d0 [ 41.869789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.870520] kthread+0x24c/0x2d0 [ 41.870959] ret_from_fork+0x10/0x20 [ 41.871538] [ 41.871892] The buggy address belongs to the object at fff00000c65bde00 [ 41.871892] which belongs to the cache kmalloc-64 of size 64 [ 41.873058] The buggy address is located 0 bytes to the right of [ 41.873058] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.874189] [ 41.874549] The buggy address belongs to the physical page: [ 41.875150] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.875974] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.876728] page_type: f5(slab) [ 41.877257] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.878059] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.878757] page dumped because: kasan: bad access detected [ 41.879460] [ 41.879806] Memory state around the buggy address: [ 41.880431] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.881213] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.882019] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.882775] ^ [ 41.883315] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.884519] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.885465] ================================================================== [ 42.896471] ================================================================== [ 42.897173] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 42.898244] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.899631] [ 42.900042] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.901226] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.901806] Hardware name: linux,dummy-virt (DT) [ 42.902354] Call trace: [ 42.902744] show_stack+0x20/0x38 (C) [ 42.903380] dump_stack_lvl+0x8c/0xd0 [ 42.903927] print_report+0x118/0x5e0 [ 42.904467] kasan_report+0xc8/0x118 [ 42.904939] kasan_check_range+0x100/0x1a8 [ 42.905550] __kasan_check_write+0x20/0x30 [ 42.906154] kasan_atomics_helper+0x15b4/0x4858 [ 42.906783] kasan_atomics+0x198/0x2e8 [ 42.907262] kunit_try_run_case+0x14c/0x3d0 [ 42.907973] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.908796] kthread+0x24c/0x2d0 [ 42.909371] ret_from_fork+0x10/0x20 [ 42.910072] [ 42.910453] Allocated by task 254: [ 42.911003] kasan_save_stack+0x3c/0x68 [ 42.911585] kasan_save_track+0x20/0x40 [ 42.912112] kasan_save_alloc_info+0x40/0x58 [ 42.912681] __kasan_kmalloc+0xd4/0xd8 [ 42.913292] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.913964] kasan_atomics+0xb8/0x2e8 [ 42.914428] kunit_try_run_case+0x14c/0x3d0 [ 42.915144] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.915829] kthread+0x24c/0x2d0 [ 42.916402] ret_from_fork+0x10/0x20 [ 42.916992] [ 42.917319] The buggy address belongs to the object at fff00000c65bde00 [ 42.917319] which belongs to the cache kmalloc-64 of size 64 [ 42.918588] The buggy address is located 0 bytes to the right of [ 42.918588] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.919866] [ 42.920248] The buggy address belongs to the physical page: [ 42.920962] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.921791] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.922569] page_type: f5(slab) [ 42.923044] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.923935] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.924786] page dumped because: kasan: bad access detected [ 42.925474] [ 42.925807] Memory state around the buggy address: [ 42.926354] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.927260] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.928126] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.928968] ^ [ 42.929617] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.930486] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.931306] ================================================================== [ 42.672694] ================================================================== [ 42.673416] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 42.674854] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.675622] [ 42.676035] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.677309] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.677898] Hardware name: linux,dummy-virt (DT) [ 42.678604] Call trace: [ 42.679078] show_stack+0x20/0x38 (C) [ 42.679768] dump_stack_lvl+0x8c/0xd0 [ 42.680389] print_report+0x118/0x5e0 [ 42.680982] kasan_report+0xc8/0x118 [ 42.681660] kasan_check_range+0x100/0x1a8 [ 42.682306] __kasan_check_write+0x20/0x30 [ 42.683023] kasan_atomics_helper+0x1384/0x4858 [ 42.683722] kasan_atomics+0x198/0x2e8 [ 42.684400] kunit_try_run_case+0x14c/0x3d0 [ 42.685038] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.685780] kthread+0x24c/0x2d0 [ 42.686349] ret_from_fork+0x10/0x20 [ 42.686943] [ 42.687322] Allocated by task 254: [ 42.687913] kasan_save_stack+0x3c/0x68 [ 42.688508] kasan_save_track+0x20/0x40 [ 42.689068] kasan_save_alloc_info+0x40/0x58 [ 42.689756] __kasan_kmalloc+0xd4/0xd8 [ 42.690327] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.691013] kasan_atomics+0xb8/0x2e8 [ 42.691526] kunit_try_run_case+0x14c/0x3d0 [ 42.692253] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.692999] kthread+0x24c/0x2d0 [ 42.693623] ret_from_fork+0x10/0x20 [ 42.694187] [ 42.694555] The buggy address belongs to the object at fff00000c65bde00 [ 42.694555] which belongs to the cache kmalloc-64 of size 64 [ 42.695992] The buggy address is located 0 bytes to the right of [ 42.695992] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.696851] [ 42.697023] The buggy address belongs to the physical page: [ 42.697306] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.698474] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.699146] page_type: f5(slab) [ 42.699755] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.700702] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.701633] page dumped because: kasan: bad access detected [ 42.702251] [ 42.702558] Memory state around the buggy address: [ 42.703118] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.703882] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.704593] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.705529] ^ [ 42.706221] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.707140] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.707949] ================================================================== [ 42.404202] ================================================================== [ 42.404945] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 42.405772] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.406589] [ 42.407017] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.408222] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.408751] Hardware name: linux,dummy-virt (DT) [ 42.409428] Call trace: [ 42.409908] show_stack+0x20/0x38 (C) [ 42.410533] dump_stack_lvl+0x8c/0xd0 [ 42.411220] print_report+0x118/0x5e0 [ 42.411844] kasan_report+0xc8/0x118 [ 42.412378] kasan_check_range+0x100/0x1a8 [ 42.412960] __kasan_check_write+0x20/0x30 [ 42.413635] kasan_atomics_helper+0x1058/0x4858 [ 42.414324] kasan_atomics+0x198/0x2e8 [ 42.414978] kunit_try_run_case+0x14c/0x3d0 [ 42.415710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.416477] kthread+0x24c/0x2d0 [ 42.417059] ret_from_fork+0x10/0x20 [ 42.417660] [ 42.418048] Allocated by task 254: [ 42.418619] kasan_save_stack+0x3c/0x68 [ 42.419168] kasan_save_track+0x20/0x40 [ 42.419800] kasan_save_alloc_info+0x40/0x58 [ 42.420424] __kasan_kmalloc+0xd4/0xd8 [ 42.421048] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.421712] kasan_atomics+0xb8/0x2e8 [ 42.422333] kunit_try_run_case+0x14c/0x3d0 [ 42.422960] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.423652] kthread+0x24c/0x2d0 [ 42.424172] ret_from_fork+0x10/0x20 [ 42.424802] [ 42.425190] The buggy address belongs to the object at fff00000c65bde00 [ 42.425190] which belongs to the cache kmalloc-64 of size 64 [ 42.426389] The buggy address is located 0 bytes to the right of [ 42.426389] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.427726] [ 42.428082] The buggy address belongs to the physical page: [ 42.428712] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.429690] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.430547] page_type: f5(slab) [ 42.431119] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.431996] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.432889] page dumped because: kasan: bad access detected [ 42.433551] [ 42.433931] Memory state around the buggy address: [ 42.434557] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.435422] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.436242] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.437078] ^ [ 42.437726] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.438532] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.439319] ================================================================== [ 41.482971] ================================================================== [ 41.484456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 41.485279] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.487013] [ 41.487580] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.488595] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.489123] Hardware name: linux,dummy-virt (DT) [ 41.489736] Call trace: [ 41.490159] show_stack+0x20/0x38 (C) [ 41.490786] dump_stack_lvl+0x8c/0xd0 [ 41.491370] print_report+0x118/0x5e0 [ 41.491931] kasan_report+0xc8/0x118 [ 41.492497] kasan_check_range+0x100/0x1a8 [ 41.493071] __kasan_check_write+0x20/0x30 [ 41.493586] kasan_atomics_helper+0x7cc/0x4858 [ 41.494257] kasan_atomics+0x198/0x2e8 [ 41.494869] kunit_try_run_case+0x14c/0x3d0 [ 41.495500] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.496163] kthread+0x24c/0x2d0 [ 41.496763] ret_from_fork+0x10/0x20 [ 41.497334] [ 41.497680] Allocated by task 254: [ 41.498219] kasan_save_stack+0x3c/0x68 [ 41.498828] kasan_save_track+0x20/0x40 [ 41.499286] kasan_save_alloc_info+0x40/0x58 [ 41.499911] __kasan_kmalloc+0xd4/0xd8 [ 41.500472] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.501060] kasan_atomics+0xb8/0x2e8 [ 41.501594] kunit_try_run_case+0x14c/0x3d0 [ 41.502210] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.502939] kthread+0x24c/0x2d0 [ 41.503471] ret_from_fork+0x10/0x20 [ 41.504006] [ 41.504369] The buggy address belongs to the object at fff00000c65bde00 [ 41.504369] which belongs to the cache kmalloc-64 of size 64 [ 41.505537] The buggy address is located 0 bytes to the right of [ 41.505537] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.506668] [ 41.507031] The buggy address belongs to the physical page: [ 41.507737] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.508565] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.509331] page_type: f5(slab) [ 41.509884] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.510682] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.511461] page dumped because: kasan: bad access detected [ 41.512077] [ 41.512456] Memory state around the buggy address: [ 41.513021] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.513822] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.514640] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.515303] ^ [ 41.515935] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.516829] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.517493] ================================================================== [ 41.163816] ================================================================== [ 41.164408] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 41.165114] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.167025] [ 41.167456] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.169044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.169835] Hardware name: linux,dummy-virt (DT) [ 41.171200] Call trace: [ 41.171650] show_stack+0x20/0x38 (C) [ 41.172219] dump_stack_lvl+0x8c/0xd0 [ 41.172749] print_report+0x118/0x5e0 [ 41.173695] kasan_report+0xc8/0x118 [ 41.174377] kasan_check_range+0x100/0x1a8 [ 41.175281] __kasan_check_write+0x20/0x30 [ 41.175966] kasan_atomics_helper+0x47c/0x4858 [ 41.176714] kasan_atomics+0x198/0x2e8 [ 41.177279] kunit_try_run_case+0x14c/0x3d0 [ 41.177958] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.179762] kthread+0x24c/0x2d0 [ 41.180515] ret_from_fork+0x10/0x20 [ 41.181036] [ 41.181743] Allocated by task 254: [ 41.182517] kasan_save_stack+0x3c/0x68 [ 41.183245] kasan_save_track+0x20/0x40 [ 41.183993] kasan_save_alloc_info+0x40/0x58 [ 41.184753] __kasan_kmalloc+0xd4/0xd8 [ 41.185589] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.186745] kasan_atomics+0xb8/0x2e8 [ 41.187193] kunit_try_run_case+0x14c/0x3d0 [ 41.187642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.188386] kthread+0x24c/0x2d0 [ 41.189016] ret_from_fork+0x10/0x20 [ 41.189623] [ 41.189975] The buggy address belongs to the object at fff00000c65bde00 [ 41.189975] which belongs to the cache kmalloc-64 of size 64 [ 41.191326] The buggy address is located 0 bytes to the right of [ 41.191326] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.193237] [ 41.193616] The buggy address belongs to the physical page: [ 41.194718] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.195600] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.196464] page_type: f5(slab) [ 41.197078] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.198289] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.199157] page dumped because: kasan: bad access detected [ 41.199817] [ 41.200181] Memory state around the buggy address: [ 41.200810] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.202572] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.203459] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.204252] ^ [ 41.204911] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.205653] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.206372] ================================================================== [ 41.924968] ================================================================== [ 41.925898] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 41.926906] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.928303] [ 41.928930] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.930226] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.930828] Hardware name: linux,dummy-virt (DT) [ 41.931220] Call trace: [ 41.931657] show_stack+0x20/0x38 (C) [ 41.932282] dump_stack_lvl+0x8c/0xd0 [ 41.932948] print_report+0x118/0x5e0 [ 41.933495] kasan_report+0xc8/0x118 [ 41.934012] __asan_report_load4_noabort+0x20/0x30 [ 41.934714] kasan_atomics_helper+0x3de4/0x4858 [ 41.935331] kasan_atomics+0x198/0x2e8 [ 41.935946] kunit_try_run_case+0x14c/0x3d0 [ 41.936550] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.937293] kthread+0x24c/0x2d0 [ 41.937753] ret_from_fork+0x10/0x20 [ 41.938345] [ 41.938703] Allocated by task 254: [ 41.939198] kasan_save_stack+0x3c/0x68 [ 41.939815] kasan_save_track+0x20/0x40 [ 41.940372] kasan_save_alloc_info+0x40/0x58 [ 41.940938] __kasan_kmalloc+0xd4/0xd8 [ 41.941545] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.942131] kasan_atomics+0xb8/0x2e8 [ 41.942730] kunit_try_run_case+0x14c/0x3d0 [ 41.943270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.944019] kthread+0x24c/0x2d0 [ 41.944587] ret_from_fork+0x10/0x20 [ 41.945175] [ 41.945535] The buggy address belongs to the object at fff00000c65bde00 [ 41.945535] which belongs to the cache kmalloc-64 of size 64 [ 41.946731] The buggy address is located 0 bytes to the right of [ 41.946731] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.947794] [ 41.948164] The buggy address belongs to the physical page: [ 41.948896] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.949797] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.950437] page_type: f5(slab) [ 41.950970] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.951894] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.952658] page dumped because: kasan: bad access detected [ 41.953365] [ 41.953727] Memory state around the buggy address: [ 41.954216] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.955134] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.955811] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.956685] ^ [ 41.957275] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.958133] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.958842] ================================================================== [ 42.859309] ================================================================== [ 42.860004] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 42.860876] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.861801] [ 42.862153] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.863326] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.863878] Hardware name: linux,dummy-virt (DT) [ 42.864554] Call trace: [ 42.865034] show_stack+0x20/0x38 (C) [ 42.865685] dump_stack_lvl+0x8c/0xd0 [ 42.866330] print_report+0x118/0x5e0 [ 42.866981] kasan_report+0xc8/0x118 [ 42.867633] kasan_check_range+0x100/0x1a8 [ 42.868226] __kasan_check_write+0x20/0x30 [ 42.868887] kasan_atomics_helper+0x154c/0x4858 [ 42.869544] kasan_atomics+0x198/0x2e8 [ 42.870124] kunit_try_run_case+0x14c/0x3d0 [ 42.870776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.871576] kthread+0x24c/0x2d0 [ 42.872117] ret_from_fork+0x10/0x20 [ 42.872788] [ 42.873146] Allocated by task 254: [ 42.873640] kasan_save_stack+0x3c/0x68 [ 42.874253] kasan_save_track+0x20/0x40 [ 42.874829] kasan_save_alloc_info+0x40/0x58 [ 42.875516] __kasan_kmalloc+0xd4/0xd8 [ 42.876051] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.876657] kasan_atomics+0xb8/0x2e8 [ 42.877272] kunit_try_run_case+0x14c/0x3d0 [ 42.877860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.878621] kthread+0x24c/0x2d0 [ 42.879190] ret_from_fork+0x10/0x20 [ 42.879743] [ 42.880096] The buggy address belongs to the object at fff00000c65bde00 [ 42.880096] which belongs to the cache kmalloc-64 of size 64 [ 42.881317] The buggy address is located 0 bytes to the right of [ 42.881317] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.882590] [ 42.882943] The buggy address belongs to the physical page: [ 42.883676] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.884563] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.885387] page_type: f5(slab) [ 42.885969] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.886796] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.887606] page dumped because: kasan: bad access detected [ 42.888188] [ 42.888560] Memory state around the buggy address: [ 42.889076] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.889913] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.890842] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.891578] ^ [ 42.892261] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.893072] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.893857] ================================================================== [ 42.516454] ================================================================== [ 42.517174] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 42.518089] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.518902] [ 42.519321] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.520371] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.520989] Hardware name: linux,dummy-virt (DT) [ 42.521651] Call trace: [ 42.522048] show_stack+0x20/0x38 (C) [ 42.522610] dump_stack_lvl+0x8c/0xd0 [ 42.523250] print_report+0x118/0x5e0 [ 42.523897] kasan_report+0xc8/0x118 [ 42.524512] kasan_check_range+0x100/0x1a8 [ 42.525044] __kasan_check_write+0x20/0x30 [ 42.525634] kasan_atomics_helper+0x1190/0x4858 [ 42.526276] kasan_atomics+0x198/0x2e8 [ 42.526927] kunit_try_run_case+0x14c/0x3d0 [ 42.527616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.528353] kthread+0x24c/0x2d0 [ 42.528917] ret_from_fork+0x10/0x20 [ 42.529571] [ 42.529931] Allocated by task 254: [ 42.530431] kasan_save_stack+0x3c/0x68 [ 42.531011] kasan_save_track+0x20/0x40 [ 42.531649] kasan_save_alloc_info+0x40/0x58 [ 42.532271] __kasan_kmalloc+0xd4/0xd8 [ 42.532886] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.533552] kasan_atomics+0xb8/0x2e8 [ 42.534151] kunit_try_run_case+0x14c/0x3d0 [ 42.534779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.535524] kthread+0x24c/0x2d0 [ 42.536015] ret_from_fork+0x10/0x20 [ 42.536629] [ 42.537010] The buggy address belongs to the object at fff00000c65bde00 [ 42.537010] which belongs to the cache kmalloc-64 of size 64 [ 42.538223] The buggy address is located 0 bytes to the right of [ 42.538223] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.539535] [ 42.539878] The buggy address belongs to the physical page: [ 42.540504] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.541433] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.542228] page_type: f5(slab) [ 42.542836] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.543927] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.544937] page dumped because: kasan: bad access detected [ 42.545788] [ 42.546283] Memory state around the buggy address: [ 42.547007] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.548023] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.548886] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.549834] ^ [ 42.550599] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.551556] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.552530] ================================================================== [ 41.444883] ================================================================== [ 41.445712] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 41.447040] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.447922] [ 41.448276] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.449372] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.449935] Hardware name: linux,dummy-virt (DT) [ 41.450501] Call trace: [ 41.450925] show_stack+0x20/0x38 (C) [ 41.451571] dump_stack_lvl+0x8c/0xd0 [ 41.452183] print_report+0x118/0x5e0 [ 41.452815] kasan_report+0xc8/0x118 [ 41.453390] kasan_check_range+0x100/0x1a8 [ 41.454005] __kasan_check_write+0x20/0x30 [ 41.454649] kasan_atomics_helper+0x760/0x4858 [ 41.455383] kasan_atomics+0x198/0x2e8 [ 41.456014] kunit_try_run_case+0x14c/0x3d0 [ 41.456639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.457294] kthread+0x24c/0x2d0 [ 41.457852] ret_from_fork+0x10/0x20 [ 41.458388] [ 41.458758] Allocated by task 254: [ 41.459198] kasan_save_stack+0x3c/0x68 [ 41.459794] kasan_save_track+0x20/0x40 [ 41.460352] kasan_save_alloc_info+0x40/0x58 [ 41.461006] __kasan_kmalloc+0xd4/0xd8 [ 41.461594] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.462243] kasan_atomics+0xb8/0x2e8 [ 41.462712] kunit_try_run_case+0x14c/0x3d0 [ 41.463326] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.464305] kthread+0x24c/0x2d0 [ 41.464766] ret_from_fork+0x10/0x20 [ 41.465236] [ 41.465646] The buggy address belongs to the object at fff00000c65bde00 [ 41.465646] which belongs to the cache kmalloc-64 of size 64 [ 41.467142] The buggy address is located 0 bytes to the right of [ 41.467142] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.468675] [ 41.469058] The buggy address belongs to the physical page: [ 41.469795] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.470762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.471614] page_type: f5(slab) [ 41.472051] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.472852] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.473644] page dumped because: kasan: bad access detected [ 41.474247] [ 41.474597] Memory state around the buggy address: [ 41.475256] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.476073] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.476964] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.477862] ^ [ 41.478492] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.479374] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.480175] ================================================================== [ 40.983038] ================================================================== [ 40.983773] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 40.985953] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 40.986568] [ 40.986874] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.988028] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.988603] Hardware name: linux,dummy-virt (DT) [ 40.989177] Call trace: [ 40.989588] show_stack+0x20/0x38 (C) [ 40.990645] dump_stack_lvl+0x8c/0xd0 [ 40.991288] print_report+0x118/0x5e0 [ 40.991792] kasan_report+0xc8/0x118 [ 40.992316] kasan_check_range+0x100/0x1a8 [ 40.992864] __kasan_check_write+0x20/0x30 [ 40.994680] kasan_atomics_helper+0x32c/0x4858 [ 40.995855] kasan_atomics+0x198/0x2e8 [ 40.996637] kunit_try_run_case+0x14c/0x3d0 [ 40.997579] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.998137] kthread+0x24c/0x2d0 [ 40.999579] ret_from_fork+0x10/0x20 [ 41.000470] [ 41.000837] Allocated by task 254: [ 41.001381] kasan_save_stack+0x3c/0x68 [ 41.002260] kasan_save_track+0x20/0x40 [ 41.002674] kasan_save_alloc_info+0x40/0x58 [ 41.003494] __kasan_kmalloc+0xd4/0xd8 [ 41.004023] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.005008] kasan_atomics+0xb8/0x2e8 [ 41.005836] kunit_try_run_case+0x14c/0x3d0 [ 41.007570] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.008437] kthread+0x24c/0x2d0 [ 41.008980] ret_from_fork+0x10/0x20 [ 41.010027] [ 41.010234] The buggy address belongs to the object at fff00000c65bde00 [ 41.010234] which belongs to the cache kmalloc-64 of size 64 [ 41.011496] The buggy address is located 0 bytes to the right of [ 41.011496] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.012746] [ 41.013088] The buggy address belongs to the physical page: [ 41.014111] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.015148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.016293] page_type: f5(slab) [ 41.017670] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.019149] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.020077] page dumped because: kasan: bad access detected [ 41.020792] [ 41.021143] Memory state around the buggy address: [ 41.022668] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.023033] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.023377] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.024031] ^ [ 41.025161] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.026509] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.027269] ================================================================== [ 41.960944] ================================================================== [ 41.961832] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 41.962631] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.963390] [ 41.963765] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.964750] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.965382] Hardware name: linux,dummy-virt (DT) [ 41.965928] Call trace: [ 41.966359] show_stack+0x20/0x38 (C) [ 41.967012] dump_stack_lvl+0x8c/0xd0 [ 41.967636] print_report+0x118/0x5e0 [ 41.968194] kasan_report+0xc8/0x118 [ 41.968720] kasan_check_range+0x100/0x1a8 [ 41.969374] __kasan_check_write+0x20/0x30 [ 41.969984] kasan_atomics_helper+0xca0/0x4858 [ 41.970676] kasan_atomics+0x198/0x2e8 [ 41.971281] kunit_try_run_case+0x14c/0x3d0 [ 41.971895] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.972611] kthread+0x24c/0x2d0 [ 41.973174] ret_from_fork+0x10/0x20 [ 41.973803] [ 41.974126] Allocated by task 254: [ 41.974616] kasan_save_stack+0x3c/0x68 [ 41.975252] kasan_save_track+0x20/0x40 [ 41.975748] kasan_save_alloc_info+0x40/0x58 [ 41.976382] __kasan_kmalloc+0xd4/0xd8 [ 41.976861] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.977518] kasan_atomics+0xb8/0x2e8 [ 41.978095] kunit_try_run_case+0x14c/0x3d0 [ 41.978680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.979410] kthread+0x24c/0x2d0 [ 41.979953] ret_from_fork+0x10/0x20 [ 41.980721] [ 41.981085] The buggy address belongs to the object at fff00000c65bde00 [ 41.981085] which belongs to the cache kmalloc-64 of size 64 [ 41.982070] The buggy address is located 0 bytes to the right of [ 41.982070] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.983197] [ 41.983558] The buggy address belongs to the physical page: [ 41.984228] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.985139] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.985872] page_type: f5(slab) [ 41.986412] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.987189] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.988059] page dumped because: kasan: bad access detected [ 41.988682] [ 41.989030] Memory state around the buggy address: [ 41.989657] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.990393] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.991236] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.991938] ^ [ 41.992564] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.993422] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.994094] ================================================================== [ 41.119030] ================================================================== [ 41.119743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 41.120707] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.122257] [ 41.122657] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.123672] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.124181] Hardware name: linux,dummy-virt (DT) [ 41.125707] Call trace: [ 41.126564] show_stack+0x20/0x38 (C) [ 41.127311] dump_stack_lvl+0x8c/0xd0 [ 41.127950] print_report+0x118/0x5e0 [ 41.128582] kasan_report+0xc8/0x118 [ 41.129133] kasan_check_range+0x100/0x1a8 [ 41.129738] __kasan_check_write+0x20/0x30 [ 41.130382] kasan_atomics_helper+0x414/0x4858 [ 41.130945] kasan_atomics+0x198/0x2e8 [ 41.132164] kunit_try_run_case+0x14c/0x3d0 [ 41.132663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.133641] kthread+0x24c/0x2d0 [ 41.134479] ret_from_fork+0x10/0x20 [ 41.135247] [ 41.135650] Allocated by task 254: [ 41.136204] kasan_save_stack+0x3c/0x68 [ 41.136850] kasan_save_track+0x20/0x40 [ 41.137635] kasan_save_alloc_info+0x40/0x58 [ 41.138603] __kasan_kmalloc+0xd4/0xd8 [ 41.139213] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.140396] kasan_atomics+0xb8/0x2e8 [ 41.140961] kunit_try_run_case+0x14c/0x3d0 [ 41.141761] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.142836] kthread+0x24c/0x2d0 [ 41.143638] ret_from_fork+0x10/0x20 [ 41.144420] [ 41.144909] The buggy address belongs to the object at fff00000c65bde00 [ 41.144909] which belongs to the cache kmalloc-64 of size 64 [ 41.146483] The buggy address is located 0 bytes to the right of [ 41.146483] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.148266] [ 41.148642] The buggy address belongs to the physical page: [ 41.149605] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.150486] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.151207] page_type: f5(slab) [ 41.152048] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.153120] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.154194] page dumped because: kasan: bad access detected [ 41.155055] [ 41.155322] Memory state around the buggy address: [ 41.156075] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.157481] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.158553] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.159306] ^ [ 41.159827] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.160714] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.161540] ================================================================== [ 43.006795] ================================================================== [ 43.007488] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 43.008335] Read of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 43.009138] [ 43.009519] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 43.010574] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.010999] Hardware name: linux,dummy-virt (DT) [ 43.011624] Call trace: [ 43.012009] show_stack+0x20/0x38 (C) [ 43.012632] dump_stack_lvl+0x8c/0xd0 [ 43.013242] print_report+0x118/0x5e0 [ 43.013859] kasan_report+0xc8/0x118 [ 43.014374] __asan_report_load8_noabort+0x20/0x30 [ 43.015079] kasan_atomics_helper+0x3df4/0x4858 [ 43.015653] kasan_atomics+0x198/0x2e8 [ 43.016251] kunit_try_run_case+0x14c/0x3d0 [ 43.016812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.017567] kthread+0x24c/0x2d0 [ 43.018021] ret_from_fork+0x10/0x20 [ 43.018649] [ 43.018999] Allocated by task 254: [ 43.019516] kasan_save_stack+0x3c/0x68 [ 43.020075] kasan_save_track+0x20/0x40 [ 43.020594] kasan_save_alloc_info+0x40/0x58 [ 43.021209] __kasan_kmalloc+0xd4/0xd8 [ 43.021732] __kmalloc_cache_noprof+0x15c/0x3c8 [ 43.022377] kasan_atomics+0xb8/0x2e8 [ 43.022917] kunit_try_run_case+0x14c/0x3d0 [ 43.023409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.024163] kthread+0x24c/0x2d0 [ 43.024639] ret_from_fork+0x10/0x20 [ 43.025245] [ 43.025613] The buggy address belongs to the object at fff00000c65bde00 [ 43.025613] which belongs to the cache kmalloc-64 of size 64 [ 43.026716] The buggy address is located 0 bytes to the right of [ 43.026716] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 43.027965] [ 43.028284] The buggy address belongs to the physical page: [ 43.028992] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 43.029743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.030581] page_type: f5(slab) [ 43.031113] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 43.031876] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 43.032676] page dumped because: kasan: bad access detected [ 43.033362] [ 43.033702] Memory state around the buggy address: [ 43.034262] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.035138] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.035860] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 43.036718] ^ [ 43.037217] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.038091] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.038792] ================================================================== [ 42.478546] ================================================================== [ 42.479680] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 42.480534] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.481094] [ 42.481400] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.482571] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.483218] Hardware name: linux,dummy-virt (DT) [ 42.483846] Call trace: [ 42.484329] show_stack+0x20/0x38 (C) [ 42.485009] dump_stack_lvl+0x8c/0xd0 [ 42.485677] print_report+0x118/0x5e0 [ 42.486279] kasan_report+0xc8/0x118 [ 42.486967] kasan_check_range+0x100/0x1a8 [ 42.487624] __kasan_check_write+0x20/0x30 [ 42.488181] kasan_atomics_helper+0x1128/0x4858 [ 42.488911] kasan_atomics+0x198/0x2e8 [ 42.489527] kunit_try_run_case+0x14c/0x3d0 [ 42.490221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.491008] kthread+0x24c/0x2d0 [ 42.491605] ret_from_fork+0x10/0x20 [ 42.492246] [ 42.492620] Allocated by task 254: [ 42.493180] kasan_save_stack+0x3c/0x68 [ 42.493779] kasan_save_track+0x20/0x40 [ 42.494298] kasan_save_alloc_info+0x40/0x58 [ 42.495081] __kasan_kmalloc+0xd4/0xd8 [ 42.495976] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.496603] kasan_atomics+0xb8/0x2e8 [ 42.496862] kunit_try_run_case+0x14c/0x3d0 [ 42.497121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.497410] kthread+0x24c/0x2d0 [ 42.497820] ret_from_fork+0x10/0x20 [ 42.498221] [ 42.499115] The buggy address belongs to the object at fff00000c65bde00 [ 42.499115] which belongs to the cache kmalloc-64 of size 64 [ 42.500657] The buggy address is located 0 bytes to the right of [ 42.500657] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.501969] [ 42.502326] The buggy address belongs to the physical page: [ 42.502922] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.503838] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.504639] page_type: f5(slab) [ 42.505246] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.506102] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.506988] page dumped because: kasan: bad access detected [ 42.507670] [ 42.508025] Memory state around the buggy address: [ 42.508717] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.509634] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.510489] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.511269] ^ [ 42.511891] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.512722] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.513507] ================================================================== [ 40.760319] ================================================================== [ 40.760940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 40.762423] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 40.763291] [ 40.763662] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.764901] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.766117] Hardware name: linux,dummy-virt (DT) [ 40.766701] Call trace: [ 40.767173] show_stack+0x20/0x38 (C) [ 40.767800] dump_stack_lvl+0x8c/0xd0 [ 40.768394] print_report+0x118/0x5e0 [ 40.768891] kasan_report+0xc8/0x118 [ 40.769790] __asan_report_store4_noabort+0x20/0x30 [ 40.770634] kasan_atomics_helper+0x3f7c/0x4858 [ 40.771138] kasan_atomics+0x198/0x2e8 [ 40.772144] kunit_try_run_case+0x14c/0x3d0 [ 40.772699] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.774237] kthread+0x24c/0x2d0 [ 40.774864] ret_from_fork+0x10/0x20 [ 40.775468] [ 40.775842] Allocated by task 254: [ 40.776366] kasan_save_stack+0x3c/0x68 [ 40.776979] kasan_save_track+0x20/0x40 [ 40.777623] kasan_save_alloc_info+0x40/0x58 [ 40.778741] __kasan_kmalloc+0xd4/0xd8 [ 40.779953] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.780537] kasan_atomics+0xb8/0x2e8 [ 40.781014] kunit_try_run_case+0x14c/0x3d0 [ 40.782029] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.782844] kthread+0x24c/0x2d0 [ 40.783516] ret_from_fork+0x10/0x20 [ 40.784200] [ 40.784726] The buggy address belongs to the object at fff00000c65bde00 [ 40.784726] which belongs to the cache kmalloc-64 of size 64 [ 40.786982] The buggy address is located 0 bytes to the right of [ 40.786982] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 40.788629] [ 40.788918] The buggy address belongs to the physical page: [ 40.790003] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 40.791010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.791991] page_type: f5(slab) [ 40.792703] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 40.794038] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 40.794957] page dumped because: kasan: bad access detected [ 40.795731] [ 40.796313] Memory state around the buggy address: [ 40.797148] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.798512] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.799521] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 40.800325] ^ [ 40.800955] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.801939] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.802705] ================================================================== [ 43.083055] ================================================================== [ 43.083767] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 43.084599] Read of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 43.086896] [ 43.087201] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 43.088255] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.088804] Hardware name: linux,dummy-virt (DT) [ 43.089331] Call trace: [ 43.089735] show_stack+0x20/0x38 (C) [ 43.090345] dump_stack_lvl+0x8c/0xd0 [ 43.090957] print_report+0x118/0x5e0 [ 43.091495] kasan_report+0xc8/0x118 [ 43.092078] __asan_report_load8_noabort+0x20/0x30 [ 43.092773] kasan_atomics_helper+0x3e10/0x4858 [ 43.093465] kasan_atomics+0x198/0x2e8 [ 43.094062] kunit_try_run_case+0x14c/0x3d0 [ 43.094684] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.095299] kthread+0x24c/0x2d0 [ 43.095882] ret_from_fork+0x10/0x20 [ 43.096419] [ 43.096778] Allocated by task 254: [ 43.097290] kasan_save_stack+0x3c/0x68 [ 43.097876] kasan_save_track+0x20/0x40 [ 43.098491] kasan_save_alloc_info+0x40/0x58 [ 43.099108] __kasan_kmalloc+0xd4/0xd8 [ 43.099660] __kmalloc_cache_noprof+0x15c/0x3c8 [ 43.100262] kasan_atomics+0xb8/0x2e8 [ 43.100843] kunit_try_run_case+0x14c/0x3d0 [ 43.101474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.102139] kthread+0x24c/0x2d0 [ 43.102580] ret_from_fork+0x10/0x20 [ 43.103152] [ 43.103504] The buggy address belongs to the object at fff00000c65bde00 [ 43.103504] which belongs to the cache kmalloc-64 of size 64 [ 43.104665] The buggy address is located 0 bytes to the right of [ 43.104665] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 43.105914] [ 43.106237] The buggy address belongs to the physical page: [ 43.106951] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 43.107871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.108572] page_type: f5(slab) [ 43.108996] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 43.109907] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 43.110810] page dumped because: kasan: bad access detected [ 43.111535] [ 43.111875] Memory state around the buggy address: [ 43.112463] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.113248] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.114034] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 43.114787] ^ [ 43.115338] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.116099] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.116784] ================================================================== [ 41.359590] ================================================================== [ 41.360631] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 41.362233] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.364083] [ 41.364639] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.365978] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.366551] Hardware name: linux,dummy-virt (DT) [ 41.367102] Call trace: [ 41.367472] show_stack+0x20/0x38 (C) [ 41.368000] dump_stack_lvl+0x8c/0xd0 [ 41.369277] print_report+0x118/0x5e0 [ 41.369821] kasan_report+0xc8/0x118 [ 41.370329] kasan_check_range+0x100/0x1a8 [ 41.370870] __kasan_check_write+0x20/0x30 [ 41.371397] kasan_atomics_helper+0x684/0x4858 [ 41.372605] kasan_atomics+0x198/0x2e8 [ 41.373197] kunit_try_run_case+0x14c/0x3d0 [ 41.373844] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.374872] kthread+0x24c/0x2d0 [ 41.375610] ret_from_fork+0x10/0x20 [ 41.376334] [ 41.376677] Allocated by task 254: [ 41.377471] kasan_save_stack+0x3c/0x68 [ 41.378041] kasan_save_track+0x20/0x40 [ 41.378847] kasan_save_alloc_info+0x40/0x58 [ 41.379615] __kasan_kmalloc+0xd4/0xd8 [ 41.380327] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.380964] kasan_atomics+0xb8/0x2e8 [ 41.381757] kunit_try_run_case+0x14c/0x3d0 [ 41.382557] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.383412] kthread+0x24c/0x2d0 [ 41.383930] ret_from_fork+0x10/0x20 [ 41.384745] [ 41.385260] The buggy address belongs to the object at fff00000c65bde00 [ 41.385260] which belongs to the cache kmalloc-64 of size 64 [ 41.386724] The buggy address is located 0 bytes to the right of [ 41.386724] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.388278] [ 41.388641] The buggy address belongs to the physical page: [ 41.389556] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.390595] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.391368] page_type: f5(slab) [ 41.392162] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.393216] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.394216] page dumped because: kasan: bad access detected [ 41.394989] [ 41.395337] Memory state around the buggy address: [ 41.396257] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.397102] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.398122] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.399085] ^ [ 41.399889] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.400867] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.401699] ================================================================== [ 42.440962] ================================================================== [ 42.441495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 42.442943] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.443889] [ 42.444328] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.445539] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.446104] Hardware name: linux,dummy-virt (DT) [ 42.446648] Call trace: [ 42.447148] show_stack+0x20/0x38 (C) [ 42.447863] dump_stack_lvl+0x8c/0xd0 [ 42.448468] print_report+0x118/0x5e0 [ 42.449118] kasan_report+0xc8/0x118 [ 42.449768] kasan_check_range+0x100/0x1a8 [ 42.450399] __kasan_check_write+0x20/0x30 [ 42.451075] kasan_atomics_helper+0x10c0/0x4858 [ 42.451736] kasan_atomics+0x198/0x2e8 [ 42.452419] kunit_try_run_case+0x14c/0x3d0 [ 42.453087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.453888] kthread+0x24c/0x2d0 [ 42.454400] ret_from_fork+0x10/0x20 [ 42.455015] [ 42.455395] Allocated by task 254: [ 42.455953] kasan_save_stack+0x3c/0x68 [ 42.456601] kasan_save_track+0x20/0x40 [ 42.457135] kasan_save_alloc_info+0x40/0x58 [ 42.457784] __kasan_kmalloc+0xd4/0xd8 [ 42.458309] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.459010] kasan_atomics+0xb8/0x2e8 [ 42.459499] kunit_try_run_case+0x14c/0x3d0 [ 42.460159] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.460863] kthread+0x24c/0x2d0 [ 42.461410] ret_from_fork+0x10/0x20 [ 42.461947] [ 42.462320] The buggy address belongs to the object at fff00000c65bde00 [ 42.462320] which belongs to the cache kmalloc-64 of size 64 [ 42.463591] The buggy address is located 0 bytes to the right of [ 42.463591] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.464943] [ 42.465306] The buggy address belongs to the physical page: [ 42.465897] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.466864] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.467642] page_type: f5(slab) [ 42.468152] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.469057] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.469932] page dumped because: kasan: bad access detected [ 42.470588] [ 42.470960] Memory state around the buggy address: [ 42.471654] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.472387] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.473238] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.473985] ^ [ 42.474603] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.475514] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.476301] ================================================================== [ 40.806077] ================================================================== [ 40.806900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 40.807636] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 40.808201] [ 40.808654] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.809810] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.810746] Hardware name: linux,dummy-virt (DT) [ 40.811225] Call trace: [ 40.812680] show_stack+0x20/0x38 (C) [ 40.813360] dump_stack_lvl+0x8c/0xd0 [ 40.814305] print_report+0x118/0x5e0 [ 40.815191] kasan_report+0xc8/0x118 [ 40.815760] kasan_check_range+0x100/0x1a8 [ 40.816435] __kasan_check_read+0x20/0x30 [ 40.817034] kasan_atomics_helper+0x1ec/0x4858 [ 40.817949] kasan_atomics+0x198/0x2e8 [ 40.818468] kunit_try_run_case+0x14c/0x3d0 [ 40.819336] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.820347] kthread+0x24c/0x2d0 [ 40.821093] ret_from_fork+0x10/0x20 [ 40.821900] [ 40.822247] Allocated by task 254: [ 40.823117] kasan_save_stack+0x3c/0x68 [ 40.823686] kasan_save_track+0x20/0x40 [ 40.824324] kasan_save_alloc_info+0x40/0x58 [ 40.824894] __kasan_kmalloc+0xd4/0xd8 [ 40.825809] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.826526] kasan_atomics+0xb8/0x2e8 [ 40.828006] kunit_try_run_case+0x14c/0x3d0 [ 40.828623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.828947] kthread+0x24c/0x2d0 [ 40.829173] ret_from_fork+0x10/0x20 [ 40.829615] [ 40.830028] The buggy address belongs to the object at fff00000c65bde00 [ 40.830028] which belongs to the cache kmalloc-64 of size 64 [ 40.831599] The buggy address is located 0 bytes to the right of [ 40.831599] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 40.832955] [ 40.833539] The buggy address belongs to the physical page: [ 40.834662] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 40.835364] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.836273] page_type: f5(slab) [ 40.836769] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 40.837807] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 40.838971] page dumped because: kasan: bad access detected [ 40.839285] [ 40.839436] Memory state around the buggy address: [ 40.840335] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.841198] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.842313] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 40.843528] ^ [ 40.844154] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.844898] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.846040] ================================================================== [ 42.367908] ================================================================== [ 42.368872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 42.369640] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.370435] [ 42.370847] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.371938] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.372540] Hardware name: linux,dummy-virt (DT) [ 42.373099] Call trace: [ 42.373507] show_stack+0x20/0x38 (C) [ 42.374134] dump_stack_lvl+0x8c/0xd0 [ 42.374664] print_report+0x118/0x5e0 [ 42.375263] kasan_report+0xc8/0x118 [ 42.375828] kasan_check_range+0x100/0x1a8 [ 42.376469] __kasan_check_write+0x20/0x30 [ 42.377109] kasan_atomics_helper+0xff0/0x4858 [ 42.377793] kasan_atomics+0x198/0x2e8 [ 42.378325] kunit_try_run_case+0x14c/0x3d0 [ 42.379053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.379837] kthread+0x24c/0x2d0 [ 42.380460] ret_from_fork+0x10/0x20 [ 42.381033] [ 42.381340] Allocated by task 254: [ 42.381881] kasan_save_stack+0x3c/0x68 [ 42.382430] kasan_save_track+0x20/0x40 [ 42.383000] kasan_save_alloc_info+0x40/0x58 [ 42.383643] __kasan_kmalloc+0xd4/0xd8 [ 42.384256] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.384926] kasan_atomics+0xb8/0x2e8 [ 42.385539] kunit_try_run_case+0x14c/0x3d0 [ 42.386172] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.386844] kthread+0x24c/0x2d0 [ 42.387372] ret_from_fork+0x10/0x20 [ 42.387980] [ 42.388350] The buggy address belongs to the object at fff00000c65bde00 [ 42.388350] which belongs to the cache kmalloc-64 of size 64 [ 42.389355] The buggy address is located 0 bytes to the right of [ 42.389355] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.390787] [ 42.391151] The buggy address belongs to the physical page: [ 42.391882] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.392690] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.393464] page_type: f5(slab) [ 42.394007] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.394966] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.395760] page dumped because: kasan: bad access detected [ 42.396476] [ 42.396820] Memory state around the buggy address: [ 42.397401] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.398251] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.398988] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.399860] ^ [ 42.400514] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.401358] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.402022] ================================================================== [ 42.635123] ================================================================== [ 42.635879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 42.636793] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.637682] [ 42.638148] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.639275] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.639882] Hardware name: linux,dummy-virt (DT) [ 42.640507] Call trace: [ 42.640988] show_stack+0x20/0x38 (C) [ 42.641665] dump_stack_lvl+0x8c/0xd0 [ 42.642318] print_report+0x118/0x5e0 [ 42.643001] kasan_report+0xc8/0x118 [ 42.643564] kasan_check_range+0x100/0x1a8 [ 42.644282] __kasan_check_write+0x20/0x30 [ 42.644914] kasan_atomics_helper+0x12d8/0x4858 [ 42.645586] kasan_atomics+0x198/0x2e8 [ 42.646247] kunit_try_run_case+0x14c/0x3d0 [ 42.646949] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.647672] kthread+0x24c/0x2d0 [ 42.648302] ret_from_fork+0x10/0x20 [ 42.648956] [ 42.649351] Allocated by task 254: [ 42.649941] kasan_save_stack+0x3c/0x68 [ 42.650500] kasan_save_track+0x20/0x40 [ 42.651151] kasan_save_alloc_info+0x40/0x58 [ 42.651752] __kasan_kmalloc+0xd4/0xd8 [ 42.652254] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.652834] kasan_atomics+0xb8/0x2e8 [ 42.653397] kunit_try_run_case+0x14c/0x3d0 [ 42.654071] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.654808] kthread+0x24c/0x2d0 [ 42.655364] ret_from_fork+0x10/0x20 [ 42.656041] [ 42.656357] The buggy address belongs to the object at fff00000c65bde00 [ 42.656357] which belongs to the cache kmalloc-64 of size 64 [ 42.657810] The buggy address is located 0 bytes to the right of [ 42.657810] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.659023] [ 42.659481] The buggy address belongs to the physical page: [ 42.660241] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.661160] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.661992] page_type: f5(slab) [ 42.662598] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.663416] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.664405] page dumped because: kasan: bad access detected [ 42.665061] [ 42.665467] Memory state around the buggy address: [ 42.666112] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.666893] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.667720] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.668555] ^ [ 42.669220] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.670059] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.670869] ================================================================== [ 42.106758] ================================================================== [ 42.107542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 42.108937] Read of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.109848] [ 42.110150] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.111101] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.112600] Hardware name: linux,dummy-virt (DT) [ 42.113329] Call trace: [ 42.113748] show_stack+0x20/0x38 (C) [ 42.114316] dump_stack_lvl+0x8c/0xd0 [ 42.114918] print_report+0x118/0x5e0 [ 42.115425] kasan_report+0xc8/0x118 [ 42.116048] kasan_check_range+0x100/0x1a8 [ 42.116740] __kasan_check_read+0x20/0x30 [ 42.117262] kasan_atomics_helper+0xdd4/0x4858 [ 42.117795] kasan_atomics+0x198/0x2e8 [ 42.118255] kunit_try_run_case+0x14c/0x3d0 [ 42.119306] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.120327] kthread+0x24c/0x2d0 [ 42.120805] ret_from_fork+0x10/0x20 [ 42.121402] [ 42.121741] Allocated by task 254: [ 42.122263] kasan_save_stack+0x3c/0x68 [ 42.122804] kasan_save_track+0x20/0x40 [ 42.123420] kasan_save_alloc_info+0x40/0x58 [ 42.124023] __kasan_kmalloc+0xd4/0xd8 [ 42.124609] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.125170] kasan_atomics+0xb8/0x2e8 [ 42.125660] kunit_try_run_case+0x14c/0x3d0 [ 42.126308] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.126987] kthread+0x24c/0x2d0 [ 42.127553] ret_from_fork+0x10/0x20 [ 42.128090] [ 42.128460] The buggy address belongs to the object at fff00000c65bde00 [ 42.128460] which belongs to the cache kmalloc-64 of size 64 [ 42.129503] The buggy address is located 0 bytes to the right of [ 42.129503] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.130855] [ 42.131205] The buggy address belongs to the physical page: [ 42.131808] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.132813] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.133429] page_type: f5(slab) [ 42.133967] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.134892] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.135787] page dumped because: kasan: bad access detected [ 42.136355] [ 42.136729] Memory state around the buggy address: [ 42.137373] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.138133] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.139006] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.139798] ^ [ 42.140360] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.141175] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.141867] ================================================================== [ 41.626952] ================================================================== [ 41.627714] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 41.628578] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.629358] [ 41.629723] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.630839] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.631411] Hardware name: linux,dummy-virt (DT) [ 41.632088] Call trace: [ 41.632467] show_stack+0x20/0x38 (C) [ 41.633097] dump_stack_lvl+0x8c/0xd0 [ 41.633737] print_report+0x118/0x5e0 [ 41.634223] kasan_report+0xc8/0x118 [ 41.634846] kasan_check_range+0x100/0x1a8 [ 41.635406] __kasan_check_write+0x20/0x30 [ 41.636107] kasan_atomics_helper+0x99c/0x4858 [ 41.636741] kasan_atomics+0x198/0x2e8 [ 41.637348] kunit_try_run_case+0x14c/0x3d0 [ 41.637959] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.638725] kthread+0x24c/0x2d0 [ 41.639196] ret_from_fork+0x10/0x20 [ 41.639819] [ 41.640173] Allocated by task 254: [ 41.640698] kasan_save_stack+0x3c/0x68 [ 41.641227] kasan_save_track+0x20/0x40 [ 41.641862] kasan_save_alloc_info+0x40/0x58 [ 41.642463] __kasan_kmalloc+0xd4/0xd8 [ 41.643043] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.643674] kasan_atomics+0xb8/0x2e8 [ 41.644254] kunit_try_run_case+0x14c/0x3d0 [ 41.644839] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.645496] kthread+0x24c/0x2d0 [ 41.646034] ret_from_fork+0x10/0x20 [ 41.646607] [ 41.646947] The buggy address belongs to the object at fff00000c65bde00 [ 41.646947] which belongs to the cache kmalloc-64 of size 64 [ 41.648051] The buggy address is located 0 bytes to the right of [ 41.648051] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.649357] [ 41.649721] The buggy address belongs to the physical page: [ 41.650336] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.651292] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.652043] page_type: f5(slab) [ 41.652521] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.653484] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.654331] page dumped because: kasan: bad access detected [ 41.655109] [ 41.655726] Memory state around the buggy address: [ 41.656419] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.657192] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.657987] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.658848] ^ [ 41.659469] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.660213] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.660921] ================================================================== [ 42.933120] ================================================================== [ 42.934961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 42.935802] Read of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.936750] [ 42.937144] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.938277] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.938904] Hardware name: linux,dummy-virt (DT) [ 42.939524] Call trace: [ 42.939894] show_stack+0x20/0x38 (C) [ 42.940396] dump_stack_lvl+0x8c/0xd0 [ 42.941037] print_report+0x118/0x5e0 [ 42.941603] kasan_report+0xc8/0x118 [ 42.942301] __asan_report_load8_noabort+0x20/0x30 [ 42.943049] kasan_atomics_helper+0x3db0/0x4858 [ 42.943803] kasan_atomics+0x198/0x2e8 [ 42.944472] kunit_try_run_case+0x14c/0x3d0 [ 42.945108] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.945915] kthread+0x24c/0x2d0 [ 42.946512] ret_from_fork+0x10/0x20 [ 42.947132] [ 42.947513] Allocated by task 254: [ 42.948075] kasan_save_stack+0x3c/0x68 [ 42.948670] kasan_save_track+0x20/0x40 [ 42.949322] kasan_save_alloc_info+0x40/0x58 [ 42.949989] __kasan_kmalloc+0xd4/0xd8 [ 42.950595] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.951262] kasan_atomics+0xb8/0x2e8 [ 42.951855] kunit_try_run_case+0x14c/0x3d0 [ 42.952513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.953270] kthread+0x24c/0x2d0 [ 42.953829] ret_from_fork+0x10/0x20 [ 42.954425] [ 42.954826] The buggy address belongs to the object at fff00000c65bde00 [ 42.954826] which belongs to the cache kmalloc-64 of size 64 [ 42.956215] The buggy address is located 0 bytes to the right of [ 42.956215] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.957611] [ 42.958033] The buggy address belongs to the physical page: [ 42.958722] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.959747] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.960459] page_type: f5(slab) [ 42.960879] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.961676] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.962511] page dumped because: kasan: bad access detected [ 42.963276] [ 42.963708] Memory state around the buggy address: [ 42.964377] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.965211] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.966062] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.966906] ^ [ 42.967542] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.968278] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.968998] ================================================================== [ 42.183525] ================================================================== [ 42.184264] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 42.185054] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.185742] [ 42.186227] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.187510] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.188053] Hardware name: linux,dummy-virt (DT) [ 42.188708] Call trace: [ 42.189217] show_stack+0x20/0x38 (C) [ 42.189927] dump_stack_lvl+0x8c/0xd0 [ 42.190631] print_report+0x118/0x5e0 [ 42.191380] kasan_report+0xc8/0x118 [ 42.192190] kasan_check_range+0x100/0x1a8 [ 42.192885] __kasan_check_write+0x20/0x30 [ 42.193188] kasan_atomics_helper+0xe44/0x4858 [ 42.193552] kasan_atomics+0x198/0x2e8 [ 42.194371] kunit_try_run_case+0x14c/0x3d0 [ 42.195076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.195840] kthread+0x24c/0x2d0 [ 42.196382] ret_from_fork+0x10/0x20 [ 42.197084] [ 42.197405] Allocated by task 254: [ 42.197903] kasan_save_stack+0x3c/0x68 [ 42.198422] kasan_save_track+0x20/0x40 [ 42.199048] kasan_save_alloc_info+0x40/0x58 [ 42.199650] __kasan_kmalloc+0xd4/0xd8 [ 42.200174] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.200864] kasan_atomics+0xb8/0x2e8 [ 42.201359] kunit_try_run_case+0x14c/0x3d0 [ 42.202025] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.202646] kthread+0x24c/0x2d0 [ 42.203192] ret_from_fork+0x10/0x20 [ 42.203807] [ 42.204162] The buggy address belongs to the object at fff00000c65bde00 [ 42.204162] which belongs to the cache kmalloc-64 of size 64 [ 42.205217] The buggy address is located 0 bytes to the right of [ 42.205217] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.206643] [ 42.207004] The buggy address belongs to the physical page: [ 42.207613] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.208568] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.209410] page_type: f5(slab) [ 42.209996] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.210938] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.211797] page dumped because: kasan: bad access detected [ 42.212460] [ 42.212800] Memory state around the buggy address: [ 42.213290] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.214138] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.215007] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.215772] ^ [ 42.216455] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.217193] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.218113] ================================================================== [ 41.208629] ================================================================== [ 41.209234] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 41.210312] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.212204] [ 41.212716] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.214163] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.214777] Hardware name: linux,dummy-virt (DT) [ 41.215544] Call trace: [ 41.216003] show_stack+0x20/0x38 (C) [ 41.216686] dump_stack_lvl+0x8c/0xd0 [ 41.217419] print_report+0x118/0x5e0 [ 41.217916] kasan_report+0xc8/0x118 [ 41.218566] kasan_check_range+0x100/0x1a8 [ 41.219209] __kasan_check_write+0x20/0x30 [ 41.219872] kasan_atomics_helper+0x4e4/0x4858 [ 41.220598] kasan_atomics+0x198/0x2e8 [ 41.221320] kunit_try_run_case+0x14c/0x3d0 [ 41.222032] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.222906] kthread+0x24c/0x2d0 [ 41.223494] ret_from_fork+0x10/0x20 [ 41.224056] [ 41.224343] Allocated by task 254: [ 41.224919] kasan_save_stack+0x3c/0x68 [ 41.225414] kasan_save_track+0x20/0x40 [ 41.226026] kasan_save_alloc_info+0x40/0x58 [ 41.226640] __kasan_kmalloc+0xd4/0xd8 [ 41.227101] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.227627] kasan_atomics+0xb8/0x2e8 [ 41.228204] kunit_try_run_case+0x14c/0x3d0 [ 41.228848] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.229630] kthread+0x24c/0x2d0 [ 41.230079] ret_from_fork+0x10/0x20 [ 41.230647] [ 41.230975] The buggy address belongs to the object at fff00000c65bde00 [ 41.230975] which belongs to the cache kmalloc-64 of size 64 [ 41.231964] The buggy address is located 0 bytes to the right of [ 41.231964] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.233124] [ 41.233557] The buggy address belongs to the physical page: [ 41.234265] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.235306] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.235986] page_type: f5(slab) [ 41.236537] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.237371] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.238277] page dumped because: kasan: bad access detected [ 41.238971] [ 41.239261] Memory state around the buggy address: [ 41.239887] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.240814] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.241490] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.242331] ^ [ 41.243027] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.243781] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.244601] ================================================================== [ 41.071888] ================================================================== [ 41.072716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 41.074328] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.075331] [ 41.075718] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.077566] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.078109] Hardware name: linux,dummy-virt (DT) [ 41.078978] Call trace: [ 41.079692] show_stack+0x20/0x38 (C) [ 41.080276] dump_stack_lvl+0x8c/0xd0 [ 41.080954] print_report+0x118/0x5e0 [ 41.082594] kasan_report+0xc8/0x118 [ 41.083133] kasan_check_range+0x100/0x1a8 [ 41.083749] __kasan_check_write+0x20/0x30 [ 41.084326] kasan_atomics_helper+0x3ac/0x4858 [ 41.084995] kasan_atomics+0x198/0x2e8 [ 41.086133] kunit_try_run_case+0x14c/0x3d0 [ 41.086761] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.087513] kthread+0x24c/0x2d0 [ 41.088225] ret_from_fork+0x10/0x20 [ 41.088940] [ 41.089376] Allocated by task 254: [ 41.090034] kasan_save_stack+0x3c/0x68 [ 41.090635] kasan_save_track+0x20/0x40 [ 41.091139] kasan_save_alloc_info+0x40/0x58 [ 41.092611] __kasan_kmalloc+0xd4/0xd8 [ 41.093118] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.093786] kasan_atomics+0xb8/0x2e8 [ 41.094615] kunit_try_run_case+0x14c/0x3d0 [ 41.095633] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.096479] kthread+0x24c/0x2d0 [ 41.097034] ret_from_fork+0x10/0x20 [ 41.097916] [ 41.098461] The buggy address belongs to the object at fff00000c65bde00 [ 41.098461] which belongs to the cache kmalloc-64 of size 64 [ 41.099899] The buggy address is located 0 bytes to the right of [ 41.099899] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.102408] [ 41.102715] The buggy address belongs to the physical page: [ 41.103573] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.104599] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.105559] page_type: f5(slab) [ 41.107171] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.108101] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.108952] page dumped because: kasan: bad access detected [ 41.109989] [ 41.110197] Memory state around the buggy address: [ 41.110494] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.111216] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.112831] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.113794] ^ [ 41.114639] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.115569] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.116109] ================================================================== [ 41.284590] ================================================================== [ 41.285400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 41.286356] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.287301] [ 41.287746] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.288803] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.289404] Hardware name: linux,dummy-virt (DT) [ 41.290064] Call trace: [ 41.290550] show_stack+0x20/0x38 (C) [ 41.291157] dump_stack_lvl+0x8c/0xd0 [ 41.291822] print_report+0x118/0x5e0 [ 41.292515] kasan_report+0xc8/0x118 [ 41.293104] kasan_check_range+0x100/0x1a8 [ 41.293795] __kasan_check_write+0x20/0x30 [ 41.294426] kasan_atomics_helper+0x5b4/0x4858 [ 41.295119] kasan_atomics+0x198/0x2e8 [ 41.295737] kunit_try_run_case+0x14c/0x3d0 [ 41.296392] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.297163] kthread+0x24c/0x2d0 [ 41.297782] ret_from_fork+0x10/0x20 [ 41.298350] [ 41.298750] Allocated by task 254: [ 41.299261] kasan_save_stack+0x3c/0x68 [ 41.299865] kasan_save_track+0x20/0x40 [ 41.300508] kasan_save_alloc_info+0x40/0x58 [ 41.301092] __kasan_kmalloc+0xd4/0xd8 [ 41.301718] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.302309] kasan_atomics+0xb8/0x2e8 [ 41.302910] kunit_try_run_case+0x14c/0x3d0 [ 41.303503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.304224] kthread+0x24c/0x2d0 [ 41.304868] ret_from_fork+0x10/0x20 [ 41.305465] [ 41.305838] The buggy address belongs to the object at fff00000c65bde00 [ 41.305838] which belongs to the cache kmalloc-64 of size 64 [ 41.307071] The buggy address is located 0 bytes to the right of [ 41.307071] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.308308] [ 41.308662] The buggy address belongs to the physical page: [ 41.309382] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.310277] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.311086] page_type: f5(slab) [ 41.311680] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.312566] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.313404] page dumped because: kasan: bad access detected [ 41.314067] [ 41.314413] Memory state around the buggy address: [ 41.315216] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.316010] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.316904] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.317713] ^ [ 41.318303] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.319141] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.319953] ================================================================== [ 40.936132] ================================================================== [ 40.936883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 40.937995] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 40.940143] [ 40.940695] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.942154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.942802] Hardware name: linux,dummy-virt (DT) [ 40.943385] Call trace: [ 40.943739] show_stack+0x20/0x38 (C) [ 40.944409] dump_stack_lvl+0x8c/0xd0 [ 40.945061] print_report+0x118/0x5e0 [ 40.946102] kasan_report+0xc8/0x118 [ 40.947483] __asan_report_load4_noabort+0x20/0x30 [ 40.948143] kasan_atomics_helper+0x40fc/0x4858 [ 40.948779] kasan_atomics+0x198/0x2e8 [ 40.949195] kunit_try_run_case+0x14c/0x3d0 [ 40.949725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.950223] kthread+0x24c/0x2d0 [ 40.951309] ret_from_fork+0x10/0x20 [ 40.951816] [ 40.952194] Allocated by task 254: [ 40.952757] kasan_save_stack+0x3c/0x68 [ 40.953679] kasan_save_track+0x20/0x40 [ 40.954304] kasan_save_alloc_info+0x40/0x58 [ 40.954986] __kasan_kmalloc+0xd4/0xd8 [ 40.955438] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.957903] kasan_atomics+0xb8/0x2e8 [ 40.958313] kunit_try_run_case+0x14c/0x3d0 [ 40.959027] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.959830] kthread+0x24c/0x2d0 [ 40.960672] ret_from_fork+0x10/0x20 [ 40.961453] [ 40.962195] The buggy address belongs to the object at fff00000c65bde00 [ 40.962195] which belongs to the cache kmalloc-64 of size 64 [ 40.964226] The buggy address is located 0 bytes to the right of [ 40.964226] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 40.965620] [ 40.965955] The buggy address belongs to the physical page: [ 40.967245] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 40.968096] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.968971] page_type: f5(slab) [ 40.969834] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 40.971621] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 40.972633] page dumped because: kasan: bad access detected [ 40.973744] [ 40.974020] Memory state around the buggy address: [ 40.974803] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.975734] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.976795] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 40.978700] ^ [ 40.979306] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.980091] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.980936] ================================================================== [ 42.971047] ================================================================== [ 42.971701] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 42.972636] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.973702] [ 42.974272] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.975361] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.976002] Hardware name: linux,dummy-virt (DT) [ 42.976585] Call trace: [ 42.976936] show_stack+0x20/0x38 (C) [ 42.977561] dump_stack_lvl+0x8c/0xd0 [ 42.978178] print_report+0x118/0x5e0 [ 42.978793] kasan_report+0xc8/0x118 [ 42.979487] kasan_check_range+0x100/0x1a8 [ 42.980098] __kasan_check_write+0x20/0x30 [ 42.980653] kasan_atomics_helper+0x1644/0x4858 [ 42.981210] kasan_atomics+0x198/0x2e8 [ 42.981747] kunit_try_run_case+0x14c/0x3d0 [ 42.982471] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.983275] kthread+0x24c/0x2d0 [ 42.983833] ret_from_fork+0x10/0x20 [ 42.984511] [ 42.984924] Allocated by task 254: [ 42.985526] kasan_save_stack+0x3c/0x68 [ 42.986149] kasan_save_track+0x20/0x40 [ 42.986805] kasan_save_alloc_info+0x40/0x58 [ 42.987356] __kasan_kmalloc+0xd4/0xd8 [ 42.988002] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.988544] kasan_atomics+0xb8/0x2e8 [ 42.988997] kunit_try_run_case+0x14c/0x3d0 [ 42.989624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.990241] kthread+0x24c/0x2d0 [ 42.990790] ret_from_fork+0x10/0x20 [ 42.991316] [ 42.991648] The buggy address belongs to the object at fff00000c65bde00 [ 42.991648] which belongs to the cache kmalloc-64 of size 64 [ 42.992858] The buggy address is located 0 bytes to the right of [ 42.992858] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.993996] [ 42.994336] The buggy address belongs to the physical page: [ 42.995083] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.995814] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.996647] page_type: f5(slab) [ 42.997170] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.998074] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.998812] page dumped because: kasan: bad access detected [ 42.999492] [ 42.999834] Memory state around the buggy address: [ 43.000465] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.001253] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.002016] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 43.002733] ^ [ 43.003370] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.004092] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.004986] ================================================================== [ 41.246722] ================================================================== [ 41.247598] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 41.248463] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.249393] [ 41.249786] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.250953] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.251527] Hardware name: linux,dummy-virt (DT) [ 41.252167] Call trace: [ 41.252633] show_stack+0x20/0x38 (C) [ 41.253370] dump_stack_lvl+0x8c/0xd0 [ 41.254075] print_report+0x118/0x5e0 [ 41.254590] kasan_report+0xc8/0x118 [ 41.255310] kasan_check_range+0x100/0x1a8 [ 41.256073] __kasan_check_write+0x20/0x30 [ 41.256808] kasan_atomics_helper+0x54c/0x4858 [ 41.257437] kasan_atomics+0x198/0x2e8 [ 41.258061] kunit_try_run_case+0x14c/0x3d0 [ 41.258775] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.259660] kthread+0x24c/0x2d0 [ 41.260114] ret_from_fork+0x10/0x20 [ 41.260829] [ 41.261294] Allocated by task 254: [ 41.261874] kasan_save_stack+0x3c/0x68 [ 41.262635] kasan_save_track+0x20/0x40 [ 41.263240] kasan_save_alloc_info+0x40/0x58 [ 41.263978] __kasan_kmalloc+0xd4/0xd8 [ 41.264518] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.265338] kasan_atomics+0xb8/0x2e8 [ 41.265971] kunit_try_run_case+0x14c/0x3d0 [ 41.266572] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.267286] kthread+0x24c/0x2d0 [ 41.267877] ret_from_fork+0x10/0x20 [ 41.268398] [ 41.268767] The buggy address belongs to the object at fff00000c65bde00 [ 41.268767] which belongs to the cache kmalloc-64 of size 64 [ 41.270006] The buggy address is located 0 bytes to the right of [ 41.270006] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.271364] [ 41.271728] The buggy address belongs to the physical page: [ 41.272495] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.273310] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.274070] page_type: f5(slab) [ 41.274624] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.275539] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.276382] page dumped because: kasan: bad access detected [ 41.277026] [ 41.277404] Memory state around the buggy address: [ 41.278023] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.278850] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.279634] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.280401] ^ [ 41.281046] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.281876] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.282693] ================================================================== [ 41.736888] ================================================================== [ 41.737808] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 41.738657] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.739373] [ 41.739955] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.741029] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.742202] Hardware name: linux,dummy-virt (DT) [ 41.742739] Call trace: [ 41.743323] show_stack+0x20/0x38 (C) [ 41.744087] dump_stack_lvl+0x8c/0xd0 [ 41.744834] print_report+0x118/0x5e0 [ 41.745592] kasan_report+0xc8/0x118 [ 41.746295] kasan_check_range+0x100/0x1a8 [ 41.747082] __kasan_check_write+0x20/0x30 [ 41.747817] kasan_atomics_helper+0xad4/0x4858 [ 41.748428] kasan_atomics+0x198/0x2e8 [ 41.749263] kunit_try_run_case+0x14c/0x3d0 [ 41.750045] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.750918] kthread+0x24c/0x2d0 [ 41.751622] ret_from_fork+0x10/0x20 [ 41.752362] [ 41.752852] Allocated by task 254: [ 41.753415] kasan_save_stack+0x3c/0x68 [ 41.754167] kasan_save_track+0x20/0x40 [ 41.754723] kasan_save_alloc_info+0x40/0x58 [ 41.755272] __kasan_kmalloc+0xd4/0xd8 [ 41.756026] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.756636] kasan_atomics+0xb8/0x2e8 [ 41.757142] kunit_try_run_case+0x14c/0x3d0 [ 41.757782] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.758462] kthread+0x24c/0x2d0 [ 41.758988] ret_from_fork+0x10/0x20 [ 41.759581] [ 41.759955] The buggy address belongs to the object at fff00000c65bde00 [ 41.759955] which belongs to the cache kmalloc-64 of size 64 [ 41.761221] The buggy address is located 0 bytes to the right of [ 41.761221] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.762566] [ 41.762889] The buggy address belongs to the physical page: [ 41.763629] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.764540] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.765310] page_type: f5(slab) [ 41.765899] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.766782] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.767630] page dumped because: kasan: bad access detected [ 41.768303] [ 41.768631] Memory state around the buggy address: [ 41.769303] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.770105] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.770969] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.771761] ^ [ 41.772407] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.773178] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.773999] ================================================================== [ 41.776198] ================================================================== [ 41.776961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 41.777817] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.778726] [ 41.779149] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.780172] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.780780] Hardware name: linux,dummy-virt (DT) [ 41.781308] Call trace: [ 41.781778] show_stack+0x20/0x38 (C) [ 41.782417] dump_stack_lvl+0x8c/0xd0 [ 41.783013] print_report+0x118/0x5e0 [ 41.783641] kasan_report+0xc8/0x118 [ 41.784267] __asan_report_load4_noabort+0x20/0x30 [ 41.784963] kasan_atomics_helper+0x3dcc/0x4858 [ 41.785642] kasan_atomics+0x198/0x2e8 [ 41.786211] kunit_try_run_case+0x14c/0x3d0 [ 41.786898] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.787688] kthread+0x24c/0x2d0 [ 41.788305] ret_from_fork+0x10/0x20 [ 41.788844] [ 41.789217] Allocated by task 254: [ 41.789786] kasan_save_stack+0x3c/0x68 [ 41.790360] kasan_save_track+0x20/0x40 [ 41.790974] kasan_save_alloc_info+0x40/0x58 [ 41.791657] __kasan_kmalloc+0xd4/0xd8 [ 41.792192] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.792890] kasan_atomics+0xb8/0x2e8 [ 41.793420] kunit_try_run_case+0x14c/0x3d0 [ 41.794095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.794761] kthread+0x24c/0x2d0 [ 41.795390] ret_from_fork+0x10/0x20 [ 41.795948] [ 41.796332] The buggy address belongs to the object at fff00000c65bde00 [ 41.796332] which belongs to the cache kmalloc-64 of size 64 [ 41.797549] The buggy address is located 0 bytes to the right of [ 41.797549] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.798786] [ 41.799133] The buggy address belongs to the physical page: [ 41.799867] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.800788] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.801620] page_type: f5(slab) [ 41.802120] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.802965] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.803799] page dumped because: kasan: bad access detected [ 41.804435] [ 41.804880] Memory state around the buggy address: [ 41.805482] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.806367] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.807139] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.807983] ^ [ 41.808604] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.809434] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.810233] ================================================================== [ 42.746700] ================================================================== [ 42.747540] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 42.748353] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.749043] [ 42.749482] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.750430] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.751010] Hardware name: linux,dummy-virt (DT) [ 42.751607] Call trace: [ 42.752033] show_stack+0x20/0x38 (C) [ 42.752681] dump_stack_lvl+0x8c/0xd0 [ 42.753224] print_report+0x118/0x5e0 [ 42.753843] kasan_report+0xc8/0x118 [ 42.754510] kasan_check_range+0x100/0x1a8 [ 42.755128] __kasan_check_write+0x20/0x30 [ 42.755707] kasan_atomics_helper+0x1414/0x4858 [ 42.756682] kasan_atomics+0x198/0x2e8 [ 42.757379] kunit_try_run_case+0x14c/0x3d0 [ 42.758133] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.759002] kthread+0x24c/0x2d0 [ 42.759710] ret_from_fork+0x10/0x20 [ 42.760462] [ 42.760962] Allocated by task 254: [ 42.761560] kasan_save_stack+0x3c/0x68 [ 42.762155] kasan_save_track+0x20/0x40 [ 42.762948] kasan_save_alloc_info+0x40/0x58 [ 42.763723] __kasan_kmalloc+0xd4/0xd8 [ 42.764209] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.765054] kasan_atomics+0xb8/0x2e8 [ 42.765770] kunit_try_run_case+0x14c/0x3d0 [ 42.766580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.767405] kthread+0x24c/0x2d0 [ 42.767944] ret_from_fork+0x10/0x20 [ 42.768426] [ 42.769108] The buggy address belongs to the object at fff00000c65bde00 [ 42.769108] which belongs to the cache kmalloc-64 of size 64 [ 42.769949] The buggy address is located 0 bytes to the right of [ 42.769949] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.770559] [ 42.770724] The buggy address belongs to the physical page: [ 42.771004] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.771381] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.772322] page_type: f5(slab) [ 42.773026] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.774190] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.775209] page dumped because: kasan: bad access detected [ 42.775985] [ 42.776471] Memory state around the buggy address: [ 42.777239] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.778041] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.778784] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.779416] ^ [ 42.780100] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.780989] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.781762] ================================================================== [ 41.812711] ================================================================== [ 41.813410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 41.815172] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.816760] [ 41.817552] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.818509] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.819005] Hardware name: linux,dummy-virt (DT) [ 41.819746] Call trace: [ 41.820150] show_stack+0x20/0x38 (C) [ 41.820886] dump_stack_lvl+0x8c/0xd0 [ 41.821569] print_report+0x118/0x5e0 [ 41.822205] kasan_report+0xc8/0x118 [ 41.822854] kasan_check_range+0x100/0x1a8 [ 41.823536] __kasan_check_write+0x20/0x30 [ 41.824209] kasan_atomics_helper+0xb70/0x4858 [ 41.824955] kasan_atomics+0x198/0x2e8 [ 41.825513] kunit_try_run_case+0x14c/0x3d0 [ 41.826232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.827097] kthread+0x24c/0x2d0 [ 41.827586] ret_from_fork+0x10/0x20 [ 41.828177] [ 41.828542] Allocated by task 254: [ 41.829096] kasan_save_stack+0x3c/0x68 [ 41.829609] kasan_save_track+0x20/0x40 [ 41.830231] kasan_save_alloc_info+0x40/0x58 [ 41.830920] __kasan_kmalloc+0xd4/0xd8 [ 41.831516] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.832163] kasan_atomics+0xb8/0x2e8 [ 41.832691] kunit_try_run_case+0x14c/0x3d0 [ 41.833316] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.833990] kthread+0x24c/0x2d0 [ 41.834559] ret_from_fork+0x10/0x20 [ 41.835203] [ 41.835547] The buggy address belongs to the object at fff00000c65bde00 [ 41.835547] which belongs to the cache kmalloc-64 of size 64 [ 41.836813] The buggy address is located 0 bytes to the right of [ 41.836813] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.838087] [ 41.838482] The buggy address belongs to the physical page: [ 41.839218] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.840141] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.840889] page_type: f5(slab) [ 41.841458] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.842350] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.843231] page dumped because: kasan: bad access detected [ 41.843864] [ 41.844254] Memory state around the buggy address: [ 41.845000] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.845754] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.846625] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.847419] ^ [ 41.848045] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.848964] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.849379] ================================================================== [ 41.519295] ================================================================== [ 41.520044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 41.521765] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.522504] [ 41.522780] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.524307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.524927] Hardware name: linux,dummy-virt (DT) [ 41.525499] Call trace: [ 41.525883] show_stack+0x20/0x38 (C) [ 41.526502] dump_stack_lvl+0x8c/0xd0 [ 41.527038] print_report+0x118/0x5e0 [ 41.527646] kasan_report+0xc8/0x118 [ 41.528214] kasan_check_range+0x100/0x1a8 [ 41.528870] __kasan_check_write+0x20/0x30 [ 41.529507] kasan_atomics_helper+0x894/0x4858 [ 41.530118] kasan_atomics+0x198/0x2e8 [ 41.530689] kunit_try_run_case+0x14c/0x3d0 [ 41.531278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.531988] kthread+0x24c/0x2d0 [ 41.532574] ret_from_fork+0x10/0x20 [ 41.533165] [ 41.533534] Allocated by task 254: [ 41.534051] kasan_save_stack+0x3c/0x68 [ 41.534532] kasan_save_track+0x20/0x40 [ 41.535171] kasan_save_alloc_info+0x40/0x58 [ 41.535722] __kasan_kmalloc+0xd4/0xd8 [ 41.536304] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.536935] kasan_atomics+0xb8/0x2e8 [ 41.537518] kunit_try_run_case+0x14c/0x3d0 [ 41.538087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.538671] kthread+0x24c/0x2d0 [ 41.539197] ret_from_fork+0x10/0x20 [ 41.539718] [ 41.540045] The buggy address belongs to the object at fff00000c65bde00 [ 41.540045] which belongs to the cache kmalloc-64 of size 64 [ 41.541233] The buggy address is located 0 bytes to the right of [ 41.541233] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.542417] [ 41.542761] The buggy address belongs to the physical page: [ 41.543455] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.544325] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.545072] page_type: f5(slab) [ 41.545630] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.546420] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.547299] page dumped because: kasan: bad access detected [ 41.547928] [ 41.548670] Memory state around the buggy address: [ 41.549177] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.549952] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.551065] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.552044] ^ [ 41.552594] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.553389] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.554119] ================================================================== [ 42.554522] ================================================================== [ 42.555179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 42.556790] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.557570] [ 42.558268] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.559386] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.560257] Hardware name: linux,dummy-virt (DT) [ 42.560856] Call trace: [ 42.561238] show_stack+0x20/0x38 (C) [ 42.562110] dump_stack_lvl+0x8c/0xd0 [ 42.562842] print_report+0x118/0x5e0 [ 42.563564] kasan_report+0xc8/0x118 [ 42.564320] kasan_check_range+0x100/0x1a8 [ 42.565031] __kasan_check_write+0x20/0x30 [ 42.565772] kasan_atomics_helper+0x11f8/0x4858 [ 42.566405] kasan_atomics+0x198/0x2e8 [ 42.566968] kunit_try_run_case+0x14c/0x3d0 [ 42.567840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.568575] kthread+0x24c/0x2d0 [ 42.569080] ret_from_fork+0x10/0x20 [ 42.569570] [ 42.569920] Allocated by task 254: [ 42.570472] kasan_save_stack+0x3c/0x68 [ 42.571077] kasan_save_track+0x20/0x40 [ 42.571738] kasan_save_alloc_info+0x40/0x58 [ 42.572359] __kasan_kmalloc+0xd4/0xd8 [ 42.573012] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.573682] kasan_atomics+0xb8/0x2e8 [ 42.574302] kunit_try_run_case+0x14c/0x3d0 [ 42.574965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.575737] kthread+0x24c/0x2d0 [ 42.576284] ret_from_fork+0x10/0x20 [ 42.576930] [ 42.577209] The buggy address belongs to the object at fff00000c65bde00 [ 42.577209] which belongs to the cache kmalloc-64 of size 64 [ 42.578359] The buggy address is located 0 bytes to the right of [ 42.578359] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.579736] [ 42.580085] The buggy address belongs to the physical page: [ 42.580865] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.581796] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.582639] page_type: f5(slab) [ 42.583217] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.584125] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.585061] page dumped because: kasan: bad access detected [ 42.585748] [ 42.586112] Memory state around the buggy address: [ 42.586822] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.587719] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.588592] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.589400] ^ [ 42.590026] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.590922] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.591750] ================================================================== [ 41.321903] ================================================================== [ 41.322683] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 41.323564] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.324411] [ 41.324914] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.326123] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.326741] Hardware name: linux,dummy-virt (DT) [ 41.327295] Call trace: [ 41.327766] show_stack+0x20/0x38 (C) [ 41.328360] dump_stack_lvl+0x8c/0xd0 [ 41.328993] print_report+0x118/0x5e0 [ 41.329675] kasan_report+0xc8/0x118 [ 41.330280] kasan_check_range+0x100/0x1a8 [ 41.330866] __kasan_check_write+0x20/0x30 [ 41.331566] kasan_atomics_helper+0x61c/0x4858 [ 41.332229] kasan_atomics+0x198/0x2e8 [ 41.332848] kunit_try_run_case+0x14c/0x3d0 [ 41.333535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.334335] kthread+0x24c/0x2d0 [ 41.334951] ret_from_fork+0x10/0x20 [ 41.335573] [ 41.335828] Allocated by task 254: [ 41.336658] kasan_save_stack+0x3c/0x68 [ 41.337274] kasan_save_track+0x20/0x40 [ 41.337758] kasan_save_alloc_info+0x40/0x58 [ 41.338414] __kasan_kmalloc+0xd4/0xd8 [ 41.338984] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.339688] kasan_atomics+0xb8/0x2e8 [ 41.340221] kunit_try_run_case+0x14c/0x3d0 [ 41.340904] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.341609] kthread+0x24c/0x2d0 [ 41.342178] ret_from_fork+0x10/0x20 [ 41.342714] [ 41.343095] The buggy address belongs to the object at fff00000c65bde00 [ 41.343095] which belongs to the cache kmalloc-64 of size 64 [ 41.344279] The buggy address is located 0 bytes to the right of [ 41.344279] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.345575] [ 41.345956] The buggy address belongs to the physical page: [ 41.346618] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.347584] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.348419] page_type: f5(slab) [ 41.348957] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.349854] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.350721] page dumped because: kasan: bad access detected [ 41.351341] [ 41.351741] Memory state around the buggy address: [ 41.352336] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.353177] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.354098] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.354986] ^ [ 41.355690] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.356400] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.357530] ================================================================== [ 40.847912] ================================================================== [ 40.848824] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 40.849492] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 40.851222] [ 40.851615] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.852817] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.854084] Hardware name: linux,dummy-virt (DT) [ 40.854678] Call trace: [ 40.855026] show_stack+0x20/0x38 (C) [ 40.855722] dump_stack_lvl+0x8c/0xd0 [ 40.856362] print_report+0x118/0x5e0 [ 40.857010] kasan_report+0xc8/0x118 [ 40.857814] kasan_check_range+0x100/0x1a8 [ 40.858622] __kasan_check_write+0x20/0x30 [ 40.859078] kasan_atomics_helper+0x24c/0x4858 [ 40.859668] kasan_atomics+0x198/0x2e8 [ 40.860399] kunit_try_run_case+0x14c/0x3d0 [ 40.861158] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.862201] kthread+0x24c/0x2d0 [ 40.862707] ret_from_fork+0x10/0x20 [ 40.863297] [ 40.863673] Allocated by task 254: [ 40.864248] kasan_save_stack+0x3c/0x68 [ 40.864885] kasan_save_track+0x20/0x40 [ 40.865814] kasan_save_alloc_info+0x40/0x58 [ 40.866544] __kasan_kmalloc+0xd4/0xd8 [ 40.866957] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.867507] kasan_atomics+0xb8/0x2e8 [ 40.868114] kunit_try_run_case+0x14c/0x3d0 [ 40.868808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.869621] kthread+0x24c/0x2d0 [ 40.870203] ret_from_fork+0x10/0x20 [ 40.871195] [ 40.871541] The buggy address belongs to the object at fff00000c65bde00 [ 40.871541] which belongs to the cache kmalloc-64 of size 64 [ 40.872954] The buggy address is located 0 bytes to the right of [ 40.872954] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 40.874612] [ 40.876186] The buggy address belongs to the physical page: [ 40.876783] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 40.878286] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.879233] page_type: f5(slab) [ 40.879935] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 40.881026] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 40.882046] page dumped because: kasan: bad access detected [ 40.882649] [ 40.882971] Memory state around the buggy address: [ 40.884310] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.885386] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.886501] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 40.887544] ^ [ 40.888576] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.889528] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.889938] ================================================================== [ 41.887021] ================================================================== [ 41.888209] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 41.889007] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.890401] [ 41.890703] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.891657] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.892100] Hardware name: linux,dummy-virt (DT) [ 41.893134] Call trace: [ 41.893647] show_stack+0x20/0x38 (C) [ 41.894329] dump_stack_lvl+0x8c/0xd0 [ 41.894919] print_report+0x118/0x5e0 [ 41.895569] kasan_report+0xc8/0x118 [ 41.896169] kasan_check_range+0x100/0x1a8 [ 41.896798] __kasan_check_write+0x20/0x30 [ 41.897466] kasan_atomics_helper+0xc08/0x4858 [ 41.898107] kasan_atomics+0x198/0x2e8 [ 41.898755] kunit_try_run_case+0x14c/0x3d0 [ 41.899394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.900090] kthread+0x24c/0x2d0 [ 41.900705] ret_from_fork+0x10/0x20 [ 41.901277] [ 41.901658] Allocated by task 254: [ 41.902179] kasan_save_stack+0x3c/0x68 [ 41.902713] kasan_save_track+0x20/0x40 [ 41.903340] kasan_save_alloc_info+0x40/0x58 [ 41.904020] __kasan_kmalloc+0xd4/0xd8 [ 41.904592] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.905257] kasan_atomics+0xb8/0x2e8 [ 41.905851] kunit_try_run_case+0x14c/0x3d0 [ 41.906425] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.907201] kthread+0x24c/0x2d0 [ 41.907787] ret_from_fork+0x10/0x20 [ 41.908408] [ 41.908774] The buggy address belongs to the object at fff00000c65bde00 [ 41.908774] which belongs to the cache kmalloc-64 of size 64 [ 41.909982] The buggy address is located 0 bytes to the right of [ 41.909982] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.911241] [ 41.911684] The buggy address belongs to the physical page: [ 41.912307] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.913302] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.914124] page_type: f5(slab) [ 41.914575] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.915314] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.916053] page dumped because: kasan: bad access detected [ 41.916657] [ 41.917010] Memory state around the buggy address: [ 41.917591] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.918510] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.919530] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.920508] ^ [ 41.921110] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.921859] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.922981] ================================================================== [ 41.995885] ================================================================== [ 41.997154] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 41.998216] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.999644] [ 42.000111] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.002094] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.002845] Hardware name: linux,dummy-virt (DT) [ 42.003616] Call trace: [ 42.004009] show_stack+0x20/0x38 (C) [ 42.004556] dump_stack_lvl+0x8c/0xd0 [ 42.005003] print_report+0x118/0x5e0 [ 42.006091] kasan_report+0xc8/0x118 [ 42.006607] __asan_report_load4_noabort+0x20/0x30 [ 42.007432] kasan_atomics_helper+0x3dd8/0x4858 [ 42.008274] kasan_atomics+0x198/0x2e8 [ 42.009009] kunit_try_run_case+0x14c/0x3d0 [ 42.009575] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.010249] kthread+0x24c/0x2d0 [ 42.010722] ret_from_fork+0x10/0x20 [ 42.011318] [ 42.011685] Allocated by task 254: [ 42.012154] kasan_save_stack+0x3c/0x68 [ 42.012704] kasan_save_track+0x20/0x40 [ 42.013288] kasan_save_alloc_info+0x40/0x58 [ 42.013902] __kasan_kmalloc+0xd4/0xd8 [ 42.014513] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.015125] kasan_atomics+0xb8/0x2e8 [ 42.015636] kunit_try_run_case+0x14c/0x3d0 [ 42.016275] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.017023] kthread+0x24c/0x2d0 [ 42.017549] ret_from_fork+0x10/0x20 [ 42.018119] [ 42.018484] The buggy address belongs to the object at fff00000c65bde00 [ 42.018484] which belongs to the cache kmalloc-64 of size 64 [ 42.019579] The buggy address is located 0 bytes to the right of [ 42.019579] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.020914] [ 42.021273] The buggy address belongs to the physical page: [ 42.021861] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.022810] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.023661] page_type: f5(slab) [ 42.024141] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.025409] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.026137] page dumped because: kasan: bad access detected [ 42.026823] [ 42.027173] Memory state around the buggy address: [ 42.027829] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.028598] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.029435] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.030278] ^ [ 42.030903] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.031741] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.032510] ================================================================== [ 43.196044] ================================================================== [ 43.197325] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 43.198213] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 43.199074] [ 43.199461] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 43.200670] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.201247] Hardware name: linux,dummy-virt (DT) [ 43.201855] Call trace: [ 43.202295] show_stack+0x20/0x38 (C) [ 43.202980] dump_stack_lvl+0x8c/0xd0 [ 43.203650] print_report+0x118/0x5e0 [ 43.204197] kasan_report+0xc8/0x118 [ 43.204932] kasan_check_range+0x100/0x1a8 [ 43.205590] __kasan_check_write+0x20/0x30 [ 43.206217] kasan_atomics_helper+0x17ec/0x4858 [ 43.206920] kasan_atomics+0x198/0x2e8 [ 43.207484] kunit_try_run_case+0x14c/0x3d0 [ 43.208138] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.208933] kthread+0x24c/0x2d0 [ 43.209535] ret_from_fork+0x10/0x20 [ 43.210165] [ 43.210566] Allocated by task 254: [ 43.211092] kasan_save_stack+0x3c/0x68 [ 43.211757] kasan_save_track+0x20/0x40 [ 43.212377] kasan_save_alloc_info+0x40/0x58 [ 43.213014] __kasan_kmalloc+0xd4/0xd8 [ 43.213551] __kmalloc_cache_noprof+0x15c/0x3c8 [ 43.214228] kasan_atomics+0xb8/0x2e8 [ 43.214824] kunit_try_run_case+0x14c/0x3d0 [ 43.215426] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.216189] kthread+0x24c/0x2d0 [ 43.216760] ret_from_fork+0x10/0x20 [ 43.217291] [ 43.217670] The buggy address belongs to the object at fff00000c65bde00 [ 43.217670] which belongs to the cache kmalloc-64 of size 64 [ 43.218963] The buggy address is located 0 bytes to the right of [ 43.218963] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 43.220267] [ 43.220622] The buggy address belongs to the physical page: [ 43.221284] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 43.222275] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.223004] page_type: f5(slab) [ 43.223586] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 43.224478] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 43.225229] page dumped because: kasan: bad access detected [ 43.225905] [ 43.226288] Memory state around the buggy address: [ 43.226949] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.227681] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.228570] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 43.229352] ^ [ 43.229958] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.230788] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.231606] ================================================================== [ 42.219850] ================================================================== [ 42.220681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 42.221771] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.222703] [ 42.223083] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.224194] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.224709] Hardware name: linux,dummy-virt (DT) [ 42.225353] Call trace: [ 42.225780] show_stack+0x20/0x38 (C) [ 42.226399] dump_stack_lvl+0x8c/0xd0 [ 42.227012] print_report+0x118/0x5e0 [ 42.227559] kasan_report+0xc8/0x118 [ 42.228167] __asan_report_store8_noabort+0x20/0x30 [ 42.228918] kasan_atomics_helper+0x3e5c/0x4858 [ 42.229563] kasan_atomics+0x198/0x2e8 [ 42.230073] kunit_try_run_case+0x14c/0x3d0 [ 42.230736] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.231415] kthread+0x24c/0x2d0 [ 42.231980] ret_from_fork+0x10/0x20 [ 42.232569] [ 42.232904] Allocated by task 254: [ 42.233455] kasan_save_stack+0x3c/0x68 [ 42.234062] kasan_save_track+0x20/0x40 [ 42.234658] kasan_save_alloc_info+0x40/0x58 [ 42.235295] __kasan_kmalloc+0xd4/0xd8 [ 42.235833] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.236493] kasan_atomics+0xb8/0x2e8 [ 42.237064] kunit_try_run_case+0x14c/0x3d0 [ 42.237620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.238355] kthread+0x24c/0x2d0 [ 42.238918] ret_from_fork+0x10/0x20 [ 42.239503] [ 42.239846] The buggy address belongs to the object at fff00000c65bde00 [ 42.239846] which belongs to the cache kmalloc-64 of size 64 [ 42.240992] The buggy address is located 0 bytes to the right of [ 42.240992] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.242146] [ 42.242532] The buggy address belongs to the physical page: [ 42.243220] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.244039] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.244872] page_type: f5(slab) [ 42.245404] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.246269] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.247192] page dumped because: kasan: bad access detected [ 42.247888] [ 42.248257] Memory state around the buggy address: [ 42.248940] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.249853] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.250613] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.251498] ^ [ 42.252186] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.253025] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.253797] ================================================================== [ 42.822665] ================================================================== [ 42.823401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 42.824196] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.825111] [ 42.825521] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.826591] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.827203] Hardware name: linux,dummy-virt (DT) [ 42.827880] Call trace: [ 42.828307] show_stack+0x20/0x38 (C) [ 42.828981] dump_stack_lvl+0x8c/0xd0 [ 42.829565] print_report+0x118/0x5e0 [ 42.830207] kasan_report+0xc8/0x118 [ 42.830861] kasan_check_range+0x100/0x1a8 [ 42.831438] __kasan_check_write+0x20/0x30 [ 42.832146] kasan_atomics_helper+0x14e4/0x4858 [ 42.832791] kasan_atomics+0x198/0x2e8 [ 42.833401] kunit_try_run_case+0x14c/0x3d0 [ 42.834077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.834882] kthread+0x24c/0x2d0 [ 42.835431] ret_from_fork+0x10/0x20 [ 42.836056] [ 42.836413] Allocated by task 254: [ 42.836980] kasan_save_stack+0x3c/0x68 [ 42.837534] kasan_save_track+0x20/0x40 [ 42.838151] kasan_save_alloc_info+0x40/0x58 [ 42.838795] __kasan_kmalloc+0xd4/0xd8 [ 42.839407] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.839987] kasan_atomics+0xb8/0x2e8 [ 42.840614] kunit_try_run_case+0x14c/0x3d0 [ 42.841202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.841953] kthread+0x24c/0x2d0 [ 42.842424] ret_from_fork+0x10/0x20 [ 42.843035] [ 42.843424] The buggy address belongs to the object at fff00000c65bde00 [ 42.843424] which belongs to the cache kmalloc-64 of size 64 [ 42.844698] The buggy address is located 0 bytes to the right of [ 42.844698] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.845995] [ 42.846343] The buggy address belongs to the physical page: [ 42.846993] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.847903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.848730] page_type: f5(slab) [ 42.849225] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.850155] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.851038] page dumped because: kasan: bad access detected [ 42.851687] [ 42.852071] Memory state around the buggy address: [ 42.852760] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.853506] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.854422] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.855221] ^ [ 42.855880] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.856787] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.857660] ================================================================== [ 41.662534] ================================================================== [ 41.663243] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 41.664104] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.665488] [ 41.665886] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.666847] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.667418] Hardware name: linux,dummy-virt (DT) [ 41.667960] Call trace: [ 41.668384] show_stack+0x20/0x38 (C) [ 41.669029] dump_stack_lvl+0x8c/0xd0 [ 41.669672] print_report+0x118/0x5e0 [ 41.670266] kasan_report+0xc8/0x118 [ 41.670881] kasan_check_range+0x100/0x1a8 [ 41.671507] __kasan_check_write+0x20/0x30 [ 41.672151] kasan_atomics_helper+0xa04/0x4858 [ 41.672841] kasan_atomics+0x198/0x2e8 [ 41.673345] kunit_try_run_case+0x14c/0x3d0 [ 41.674033] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.674816] kthread+0x24c/0x2d0 [ 41.675272] ret_from_fork+0x10/0x20 [ 41.675899] [ 41.676254] Allocated by task 254: [ 41.676787] kasan_save_stack+0x3c/0x68 [ 41.677314] kasan_save_track+0x20/0x40 [ 41.677909] kasan_save_alloc_info+0x40/0x58 [ 41.678396] __kasan_kmalloc+0xd4/0xd8 [ 41.678995] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.679684] kasan_atomics+0xb8/0x2e8 [ 41.680272] kunit_try_run_case+0x14c/0x3d0 [ 41.680918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.681484] kthread+0x24c/0x2d0 [ 41.682017] ret_from_fork+0x10/0x20 [ 41.682597] [ 41.682956] The buggy address belongs to the object at fff00000c65bde00 [ 41.682956] which belongs to the cache kmalloc-64 of size 64 [ 41.684102] The buggy address is located 0 bytes to the right of [ 41.684102] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.685236] [ 41.685607] The buggy address belongs to the physical page: [ 41.686191] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.687042] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.687664] page_type: f5(slab) [ 41.688201] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.689127] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.689879] page dumped because: kasan: bad access detected [ 41.690560] [ 41.690901] Memory state around the buggy address: [ 41.691407] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.692251] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.693063] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.693822] ^ [ 41.694489] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.695180] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.696037] ================================================================== [ 41.556168] ================================================================== [ 41.556908] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 41.558490] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.559331] [ 41.559626] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.560615] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.561321] Hardware name: linux,dummy-virt (DT) [ 41.561923] Call trace: [ 41.562244] show_stack+0x20/0x38 (C) [ 41.562713] dump_stack_lvl+0x8c/0xd0 [ 41.563162] print_report+0x118/0x5e0 [ 41.563603] kasan_report+0xc8/0x118 [ 41.564073] __asan_report_load4_noabort+0x20/0x30 [ 41.564903] kasan_atomics_helper+0x42d8/0x4858 [ 41.565610] kasan_atomics+0x198/0x2e8 [ 41.566190] kunit_try_run_case+0x14c/0x3d0 [ 41.567431] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.568322] kthread+0x24c/0x2d0 [ 41.568854] ret_from_fork+0x10/0x20 [ 41.569454] [ 41.569802] Allocated by task 254: [ 41.570295] kasan_save_stack+0x3c/0x68 [ 41.570912] kasan_save_track+0x20/0x40 [ 41.571476] kasan_save_alloc_info+0x40/0x58 [ 41.572013] __kasan_kmalloc+0xd4/0xd8 [ 41.572614] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.573179] kasan_atomics+0xb8/0x2e8 [ 41.573770] kunit_try_run_case+0x14c/0x3d0 [ 41.574275] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.574964] kthread+0x24c/0x2d0 [ 41.575434] ret_from_fork+0x10/0x20 [ 41.575957] [ 41.576314] The buggy address belongs to the object at fff00000c65bde00 [ 41.576314] which belongs to the cache kmalloc-64 of size 64 [ 41.577364] The buggy address is located 0 bytes to the right of [ 41.577364] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.578589] [ 41.578935] The buggy address belongs to the physical page: [ 41.579594] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.580388] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.581186] page_type: f5(slab) [ 41.581642] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.582559] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.583339] page dumped because: kasan: bad access detected [ 41.584044] [ 41.584405] Memory state around the buggy address: [ 41.584961] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.585806] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.586677] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.587395] ^ [ 41.588030] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.588766] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.589528] ================================================================== [ 42.072114] ================================================================== [ 42.072874] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 42.074721] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.075646] [ 42.075970] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.077044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.077522] Hardware name: linux,dummy-virt (DT) [ 42.078111] Call trace: [ 42.078524] show_stack+0x20/0x38 (C) [ 42.079102] dump_stack_lvl+0x8c/0xd0 [ 42.079681] print_report+0x118/0x5e0 [ 42.080255] kasan_report+0xc8/0x118 [ 42.080762] __asan_report_load4_noabort+0x20/0x30 [ 42.081435] kasan_atomics_helper+0x3e04/0x4858 [ 42.082037] kasan_atomics+0x198/0x2e8 [ 42.082576] kunit_try_run_case+0x14c/0x3d0 [ 42.083163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.083827] kthread+0x24c/0x2d0 [ 42.084408] ret_from_fork+0x10/0x20 [ 42.085062] [ 42.085413] Allocated by task 254: [ 42.085935] kasan_save_stack+0x3c/0x68 [ 42.086399] kasan_save_track+0x20/0x40 [ 42.086856] kasan_save_alloc_info+0x40/0x58 [ 42.087375] __kasan_kmalloc+0xd4/0xd8 [ 42.087778] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.088069] kasan_atomics+0xb8/0x2e8 [ 42.088324] kunit_try_run_case+0x14c/0x3d0 [ 42.088792] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.089357] kthread+0x24c/0x2d0 [ 42.090731] ret_from_fork+0x10/0x20 [ 42.091734] [ 42.092083] The buggy address belongs to the object at fff00000c65bde00 [ 42.092083] which belongs to the cache kmalloc-64 of size 64 [ 42.093208] The buggy address is located 0 bytes to the right of [ 42.093208] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.094349] [ 42.094716] The buggy address belongs to the physical page: [ 42.095344] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.096230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.096977] page_type: f5(slab) [ 42.097505] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.098304] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.099123] page dumped because: kasan: bad access detected [ 42.099730] [ 42.100077] Memory state around the buggy address: [ 42.100582] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.101433] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.102237] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.102967] ^ [ 42.103582] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.104454] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.105133] ================================================================== [ 41.029008] ================================================================== [ 41.030371] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 41.030963] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.031991] [ 41.032481] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.033862] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.034743] Hardware name: linux,dummy-virt (DT) [ 41.035334] Call trace: [ 41.035625] show_stack+0x20/0x38 (C) [ 41.036319] dump_stack_lvl+0x8c/0xd0 [ 41.036968] print_report+0x118/0x5e0 [ 41.037618] kasan_report+0xc8/0x118 [ 41.038949] __asan_report_store4_noabort+0x20/0x30 [ 41.039773] kasan_atomics_helper+0x3f94/0x4858 [ 41.040592] kasan_atomics+0x198/0x2e8 [ 41.041301] kunit_try_run_case+0x14c/0x3d0 [ 41.041997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.043167] kthread+0x24c/0x2d0 [ 41.043664] ret_from_fork+0x10/0x20 [ 41.044173] [ 41.044554] Allocated by task 254: [ 41.044972] kasan_save_stack+0x3c/0x68 [ 41.045871] kasan_save_track+0x20/0x40 [ 41.046525] kasan_save_alloc_info+0x40/0x58 [ 41.047749] __kasan_kmalloc+0xd4/0xd8 [ 41.048296] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.049059] kasan_atomics+0xb8/0x2e8 [ 41.049684] kunit_try_run_case+0x14c/0x3d0 [ 41.050339] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.051689] kthread+0x24c/0x2d0 [ 41.052155] ret_from_fork+0x10/0x20 [ 41.052733] [ 41.053052] The buggy address belongs to the object at fff00000c65bde00 [ 41.053052] which belongs to the cache kmalloc-64 of size 64 [ 41.054488] The buggy address is located 0 bytes to the right of [ 41.054488] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.056104] [ 41.056609] The buggy address belongs to the physical page: [ 41.057520] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.058677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.059642] page_type: f5(slab) [ 41.060124] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.060617] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.062298] page dumped because: kasan: bad access detected [ 41.063147] [ 41.063675] Memory state around the buggy address: [ 41.064257] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.065279] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.066306] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.067276] ^ [ 41.067854] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.068921] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.069841] ================================================================== [ 43.159167] ================================================================== [ 43.159784] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 43.160705] Read of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 43.161950] [ 43.162477] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 43.163704] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.164425] Hardware name: linux,dummy-virt (DT) [ 43.165140] Call trace: [ 43.165718] show_stack+0x20/0x38 (C) [ 43.166454] dump_stack_lvl+0x8c/0xd0 [ 43.166960] print_report+0x118/0x5e0 [ 43.167481] kasan_report+0xc8/0x118 [ 43.167984] __asan_report_load8_noabort+0x20/0x30 [ 43.168644] kasan_atomics_helper+0x3e20/0x4858 [ 43.169177] kasan_atomics+0x198/0x2e8 [ 43.170282] kunit_try_run_case+0x14c/0x3d0 [ 43.170899] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.171646] kthread+0x24c/0x2d0 [ 43.172281] ret_from_fork+0x10/0x20 [ 43.172848] [ 43.173254] Allocated by task 254: [ 43.173773] kasan_save_stack+0x3c/0x68 [ 43.174416] kasan_save_track+0x20/0x40 [ 43.175121] kasan_save_alloc_info+0x40/0x58 [ 43.175715] __kasan_kmalloc+0xd4/0xd8 [ 43.176208] __kmalloc_cache_noprof+0x15c/0x3c8 [ 43.176795] kasan_atomics+0xb8/0x2e8 [ 43.177264] kunit_try_run_case+0x14c/0x3d0 [ 43.177828] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.178411] kthread+0x24c/0x2d0 [ 43.179024] ret_from_fork+0x10/0x20 [ 43.179673] [ 43.180089] The buggy address belongs to the object at fff00000c65bde00 [ 43.180089] which belongs to the cache kmalloc-64 of size 64 [ 43.181501] The buggy address is located 0 bytes to the right of [ 43.181501] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 43.182715] [ 43.183193] The buggy address belongs to the physical page: [ 43.183977] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 43.184818] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.185696] page_type: f5(slab) [ 43.186273] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 43.187120] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 43.187929] page dumped because: kasan: bad access detected [ 43.188645] [ 43.189053] Memory state around the buggy address: [ 43.189622] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.190398] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.191151] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 43.191921] ^ [ 43.192517] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.193435] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.194302] ================================================================== [ 41.698342] ================================================================== [ 41.699122] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 41.699884] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.701477] [ 41.701763] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.702713] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.703155] Hardware name: linux,dummy-virt (DT) [ 41.704256] Call trace: [ 41.705009] show_stack+0x20/0x38 (C) [ 41.705531] dump_stack_lvl+0x8c/0xd0 [ 41.706135] print_report+0x118/0x5e0 [ 41.706727] kasan_report+0xc8/0x118 [ 41.707264] kasan_check_range+0x100/0x1a8 [ 41.707795] __kasan_check_write+0x20/0x30 [ 41.708381] kasan_atomics_helper+0xa6c/0x4858 [ 41.709064] kasan_atomics+0x198/0x2e8 [ 41.709643] kunit_try_run_case+0x14c/0x3d0 [ 41.710305] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.711027] kthread+0x24c/0x2d0 [ 41.711502] ret_from_fork+0x10/0x20 [ 41.712093] [ 41.712452] Allocated by task 254: [ 41.712922] kasan_save_stack+0x3c/0x68 [ 41.713528] kasan_save_track+0x20/0x40 [ 41.714064] kasan_save_alloc_info+0x40/0x58 [ 41.714649] __kasan_kmalloc+0xd4/0xd8 [ 41.715171] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.715837] kasan_atomics+0xb8/0x2e8 [ 41.716403] kunit_try_run_case+0x14c/0x3d0 [ 41.717026] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.718019] kthread+0x24c/0x2d0 [ 41.718766] ret_from_fork+0x10/0x20 [ 41.719217] [ 41.719581] The buggy address belongs to the object at fff00000c65bde00 [ 41.719581] which belongs to the cache kmalloc-64 of size 64 [ 41.721165] The buggy address is located 0 bytes to the right of [ 41.721165] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.722681] [ 41.723196] The buggy address belongs to the physical page: [ 41.723843] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.724726] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.725930] page_type: f5(slab) [ 41.726386] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.727429] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.728427] page dumped because: kasan: bad access detected [ 41.729247] [ 41.729742] Memory state around the buggy address: [ 41.730617] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.731303] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.732063] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.732788] ^ [ 41.733415] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.734245] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.734953] ================================================================== [ 42.294209] ================================================================== [ 42.295068] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 42.295968] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.296890] [ 42.297306] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.298971] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.299490] Hardware name: linux,dummy-virt (DT) [ 42.300107] Call trace: [ 42.300602] show_stack+0x20/0x38 (C) [ 42.301225] dump_stack_lvl+0x8c/0xd0 [ 42.301913] print_report+0x118/0x5e0 [ 42.302569] kasan_report+0xc8/0x118 [ 42.303241] kasan_check_range+0x100/0x1a8 [ 42.303930] __kasan_check_write+0x20/0x30 [ 42.304609] kasan_atomics_helper+0xf20/0x4858 [ 42.305354] kasan_atomics+0x198/0x2e8 [ 42.305912] kunit_try_run_case+0x14c/0x3d0 [ 42.306612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.307294] kthread+0x24c/0x2d0 [ 42.307824] ret_from_fork+0x10/0x20 [ 42.308432] [ 42.308838] Allocated by task 254: [ 42.309269] kasan_save_stack+0x3c/0x68 [ 42.309895] kasan_save_track+0x20/0x40 [ 42.310460] kasan_save_alloc_info+0x40/0x58 [ 42.311077] __kasan_kmalloc+0xd4/0xd8 [ 42.311648] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.312332] kasan_atomics+0xb8/0x2e8 [ 42.312869] kunit_try_run_case+0x14c/0x3d0 [ 42.313417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.314122] kthread+0x24c/0x2d0 [ 42.314655] ret_from_fork+0x10/0x20 [ 42.315260] [ 42.315633] The buggy address belongs to the object at fff00000c65bde00 [ 42.315633] which belongs to the cache kmalloc-64 of size 64 [ 42.316751] The buggy address is located 0 bytes to the right of [ 42.316751] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.317968] [ 42.318338] The buggy address belongs to the physical page: [ 42.319518] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.320369] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.321223] page_type: f5(slab) [ 42.321775] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.322556] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.323461] page dumped because: kasan: bad access detected [ 42.324079] [ 42.324434] Memory state around the buggy address: [ 42.325095] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.325877] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.326722] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.327568] ^ [ 42.328146] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.328927] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.329780] ================================================================== [ 42.711074] ================================================================== [ 42.711839] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 42.713628] Read of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.714754] [ 42.715145] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.716109] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.717092] Hardware name: linux,dummy-virt (DT) [ 42.717821] Call trace: [ 42.718206] show_stack+0x20/0x38 (C) [ 42.718789] dump_stack_lvl+0x8c/0xd0 [ 42.719337] print_report+0x118/0x5e0 [ 42.719906] kasan_report+0xc8/0x118 [ 42.720408] __asan_report_load8_noabort+0x20/0x30 [ 42.721105] kasan_atomics_helper+0x3f04/0x4858 [ 42.721735] kasan_atomics+0x198/0x2e8 [ 42.722281] kunit_try_run_case+0x14c/0x3d0 [ 42.722874] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.723563] kthread+0x24c/0x2d0 [ 42.724120] ret_from_fork+0x10/0x20 [ 42.724720] [ 42.725051] Allocated by task 254: [ 42.725580] kasan_save_stack+0x3c/0x68 [ 42.726125] kasan_save_track+0x20/0x40 [ 42.726749] kasan_save_alloc_info+0x40/0x58 [ 42.727369] __kasan_kmalloc+0xd4/0xd8 [ 42.727946] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.728644] kasan_atomics+0xb8/0x2e8 [ 42.729209] kunit_try_run_case+0x14c/0x3d0 [ 42.729823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.730467] kthread+0x24c/0x2d0 [ 42.730948] ret_from_fork+0x10/0x20 [ 42.731435] [ 42.731798] The buggy address belongs to the object at fff00000c65bde00 [ 42.731798] which belongs to the cache kmalloc-64 of size 64 [ 42.732999] The buggy address is located 0 bytes to the right of [ 42.732999] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.734146] [ 42.734510] The buggy address belongs to the physical page: [ 42.735244] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.736041] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.736875] page_type: f5(slab) [ 42.737314] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.738253] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.739000] page dumped because: kasan: bad access detected [ 42.739709] [ 42.740058] Memory state around the buggy address: [ 42.740624] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.741409] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.742104] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.742921] ^ [ 42.743571] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.744187] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.745000] ================================================================== [ 42.783964] ================================================================== [ 42.784823] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 42.785757] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.786533] [ 42.786965] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.788209] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.788809] Hardware name: linux,dummy-virt (DT) [ 42.789331] Call trace: [ 42.789808] show_stack+0x20/0x38 (C) [ 42.790496] dump_stack_lvl+0x8c/0xd0 [ 42.791093] print_report+0x118/0x5e0 [ 42.791745] kasan_report+0xc8/0x118 [ 42.792285] kasan_check_range+0x100/0x1a8 [ 42.792984] __kasan_check_write+0x20/0x30 [ 42.793661] kasan_atomics_helper+0x147c/0x4858 [ 42.794338] kasan_atomics+0x198/0x2e8 [ 42.794997] kunit_try_run_case+0x14c/0x3d0 [ 42.795558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.796386] kthread+0x24c/0x2d0 [ 42.796996] ret_from_fork+0x10/0x20 [ 42.797626] [ 42.798014] Allocated by task 254: [ 42.798606] kasan_save_stack+0x3c/0x68 [ 42.799190] kasan_save_track+0x20/0x40 [ 42.799752] kasan_save_alloc_info+0x40/0x58 [ 42.800468] __kasan_kmalloc+0xd4/0xd8 [ 42.801030] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.801753] kasan_atomics+0xb8/0x2e8 [ 42.802277] kunit_try_run_case+0x14c/0x3d0 [ 42.802957] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.803664] kthread+0x24c/0x2d0 [ 42.804237] ret_from_fork+0x10/0x20 [ 42.804779] [ 42.805208] The buggy address belongs to the object at fff00000c65bde00 [ 42.805208] which belongs to the cache kmalloc-64 of size 64 [ 42.806590] The buggy address is located 0 bytes to the right of [ 42.806590] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.807873] [ 42.808214] The buggy address belongs to the physical page: [ 42.808973] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.809792] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.810661] page_type: f5(slab) [ 42.811194] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.812077] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.812945] page dumped because: kasan: bad access detected [ 42.813652] [ 42.814034] Memory state around the buggy address: [ 42.814744] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.815589] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.816435] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.817249] ^ [ 42.817863] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.818716] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.819528] ================================================================== [ 42.331501] ================================================================== [ 42.332311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 42.333205] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.334636] [ 42.335070] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.336209] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.336730] Hardware name: linux,dummy-virt (DT) [ 42.337362] Call trace: [ 42.337831] show_stack+0x20/0x38 (C) [ 42.338455] dump_stack_lvl+0x8c/0xd0 [ 42.338985] print_report+0x118/0x5e0 [ 42.339599] kasan_report+0xc8/0x118 [ 42.340198] kasan_check_range+0x100/0x1a8 [ 42.340738] __kasan_check_write+0x20/0x30 [ 42.341378] kasan_atomics_helper+0xf88/0x4858 [ 42.342015] kasan_atomics+0x198/0x2e8 [ 42.342541] kunit_try_run_case+0x14c/0x3d0 [ 42.343196] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.343922] kthread+0x24c/0x2d0 [ 42.344415] ret_from_fork+0x10/0x20 [ 42.345097] [ 42.345425] Allocated by task 254: [ 42.345874] kasan_save_stack+0x3c/0x68 [ 42.346493] kasan_save_track+0x20/0x40 [ 42.347088] kasan_save_alloc_info+0x40/0x58 [ 42.347628] __kasan_kmalloc+0xd4/0xd8 [ 42.348209] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.348782] kasan_atomics+0xb8/0x2e8 [ 42.349349] kunit_try_run_case+0x14c/0x3d0 [ 42.349873] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.350628] kthread+0x24c/0x2d0 [ 42.351052] ret_from_fork+0x10/0x20 [ 42.351825] [ 42.352462] The buggy address belongs to the object at fff00000c65bde00 [ 42.352462] which belongs to the cache kmalloc-64 of size 64 [ 42.353830] The buggy address is located 0 bytes to the right of [ 42.353830] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.354423] [ 42.354855] The buggy address belongs to the physical page: [ 42.355659] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.356716] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.357590] page_type: f5(slab) [ 42.358094] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.359015] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.359387] page dumped because: kasan: bad access detected [ 42.359940] [ 42.360317] Memory state around the buggy address: [ 42.360994] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.361865] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.362852] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.363610] ^ [ 42.364303] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.365164] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.365889] ================================================================== [ 40.891106] ================================================================== [ 40.891904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 40.892673] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 40.893993] [ 40.894432] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.896165] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.897480] Hardware name: linux,dummy-virt (DT) [ 40.898065] Call trace: [ 40.898664] show_stack+0x20/0x38 (C) [ 40.899201] dump_stack_lvl+0x8c/0xd0 [ 40.899795] print_report+0x118/0x5e0 [ 40.900564] kasan_report+0xc8/0x118 [ 40.901193] kasan_check_range+0x100/0x1a8 [ 40.901937] __kasan_check_read+0x20/0x30 [ 40.902826] kasan_atomics_helper+0x2b0/0x4858 [ 40.903560] kasan_atomics+0x198/0x2e8 [ 40.904201] kunit_try_run_case+0x14c/0x3d0 [ 40.904880] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.905737] kthread+0x24c/0x2d0 [ 40.906536] ret_from_fork+0x10/0x20 [ 40.906959] [ 40.907203] Allocated by task 254: [ 40.907582] kasan_save_stack+0x3c/0x68 [ 40.908063] kasan_save_track+0x20/0x40 [ 40.908749] kasan_save_alloc_info+0x40/0x58 [ 40.909475] __kasan_kmalloc+0xd4/0xd8 [ 40.910124] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.910850] kasan_atomics+0xb8/0x2e8 [ 40.911360] kunit_try_run_case+0x14c/0x3d0 [ 40.912269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.913009] kthread+0x24c/0x2d0 [ 40.913858] ret_from_fork+0x10/0x20 [ 40.914652] [ 40.915171] The buggy address belongs to the object at fff00000c65bde00 [ 40.915171] which belongs to the cache kmalloc-64 of size 64 [ 40.916581] The buggy address is located 0 bytes to the right of [ 40.916581] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 40.918352] [ 40.919227] The buggy address belongs to the physical page: [ 40.920055] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 40.920969] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.922765] page_type: f5(slab) [ 40.923468] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 40.924149] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 40.925107] page dumped because: kasan: bad access detected [ 40.926363] [ 40.926753] Memory state around the buggy address: [ 40.927319] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.928076] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.929316] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 40.930544] ^ [ 40.931087] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.932854] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.933937] ================================================================== [ 42.034462] ================================================================== [ 42.035167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 42.035853] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.036428] [ 42.036825] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.038034] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.038721] Hardware name: linux,dummy-virt (DT) [ 42.039359] Call trace: [ 42.039847] show_stack+0x20/0x38 (C) [ 42.040522] dump_stack_lvl+0x8c/0xd0 [ 42.041177] print_report+0x118/0x5e0 [ 42.041820] kasan_report+0xc8/0x118 [ 42.042464] kasan_check_range+0x100/0x1a8 [ 42.043138] __kasan_check_write+0x20/0x30 [ 42.043771] kasan_atomics_helper+0xd3c/0x4858 [ 42.044499] kasan_atomics+0x198/0x2e8 [ 42.045025] kunit_try_run_case+0x14c/0x3d0 [ 42.045742] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.046439] kthread+0x24c/0x2d0 [ 42.047056] ret_from_fork+0x10/0x20 [ 42.047723] [ 42.048099] Allocated by task 254: [ 42.048583] kasan_save_stack+0x3c/0x68 [ 42.049202] kasan_save_track+0x20/0x40 [ 42.049835] kasan_save_alloc_info+0x40/0x58 [ 42.050414] __kasan_kmalloc+0xd4/0xd8 [ 42.050978] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.051603] kasan_atomics+0xb8/0x2e8 [ 42.052079] kunit_try_run_case+0x14c/0x3d0 [ 42.052919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.053723] kthread+0x24c/0x2d0 [ 42.054340] ret_from_fork+0x10/0x20 [ 42.054961] [ 42.055387] The buggy address belongs to the object at fff00000c65bde00 [ 42.055387] which belongs to the cache kmalloc-64 of size 64 [ 42.056830] The buggy address is located 0 bytes to the right of [ 42.056830] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.058114] [ 42.058414] The buggy address belongs to the physical page: [ 42.059092] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.059936] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.060795] page_type: f5(slab) [ 42.061380] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.062393] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.063354] page dumped because: kasan: bad access detected [ 42.064162] [ 42.064594] Memory state around the buggy address: [ 42.065216] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.065967] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.066830] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.067660] ^ [ 42.068253] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.069033] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.069817] ================================================================== [ 43.118614] ================================================================== [ 43.119361] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 43.120069] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 43.120779] [ 43.121036] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 43.123112] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.123673] Hardware name: linux,dummy-virt (DT) [ 43.124209] Call trace: [ 43.124667] show_stack+0x20/0x38 (C) [ 43.125279] dump_stack_lvl+0x8c/0xd0 [ 43.125885] print_report+0x118/0x5e0 [ 43.126514] kasan_report+0xc8/0x118 [ 43.127102] kasan_check_range+0x100/0x1a8 [ 43.127715] __kasan_check_write+0x20/0x30 [ 43.128306] kasan_atomics_helper+0x175c/0x4858 [ 43.128990] kasan_atomics+0x198/0x2e8 [ 43.129612] kunit_try_run_case+0x14c/0x3d0 [ 43.130254] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.130964] kthread+0x24c/0x2d0 [ 43.131536] ret_from_fork+0x10/0x20 [ 43.132106] [ 43.132425] Allocated by task 254: [ 43.132966] kasan_save_stack+0x3c/0x68 [ 43.133499] kasan_save_track+0x20/0x40 [ 43.134088] kasan_save_alloc_info+0x40/0x58 [ 43.134723] __kasan_kmalloc+0xd4/0xd8 [ 43.135212] __kmalloc_cache_noprof+0x15c/0x3c8 [ 43.135873] kasan_atomics+0xb8/0x2e8 [ 43.136378] kunit_try_run_case+0x14c/0x3d0 [ 43.136983] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.137720] kthread+0x24c/0x2d0 [ 43.138223] ret_from_fork+0x10/0x20 [ 43.139094] [ 43.139601] The buggy address belongs to the object at fff00000c65bde00 [ 43.139601] which belongs to the cache kmalloc-64 of size 64 [ 43.141147] The buggy address is located 0 bytes to the right of [ 43.141147] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 43.142589] [ 43.142916] The buggy address belongs to the physical page: [ 43.143810] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 43.144687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.145613] page_type: f5(slab) [ 43.146296] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 43.147325] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 43.148321] page dumped because: kasan: bad access detected [ 43.149135] [ 43.149460] Memory state around the buggy address: [ 43.150025] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.151121] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.152105] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 43.153056] ^ [ 43.153870] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.154847] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.155783] ================================================================== [ 42.257057] ================================================================== [ 42.258121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 42.259092] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.260026] [ 42.260521] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.261705] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.262326] Hardware name: linux,dummy-virt (DT) [ 42.262991] Call trace: [ 42.263499] show_stack+0x20/0x38 (C) [ 42.264178] dump_stack_lvl+0x8c/0xd0 [ 42.264818] print_report+0x118/0x5e0 [ 42.265531] kasan_report+0xc8/0x118 [ 42.266163] kasan_check_range+0x100/0x1a8 [ 42.266872] __kasan_check_write+0x20/0x30 [ 42.267539] kasan_atomics_helper+0xeb8/0x4858 [ 42.268225] kasan_atomics+0x198/0x2e8 [ 42.268861] kunit_try_run_case+0x14c/0x3d0 [ 42.269567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.270332] kthread+0x24c/0x2d0 [ 42.270932] ret_from_fork+0x10/0x20 [ 42.271517] [ 42.271902] Allocated by task 254: [ 42.272409] kasan_save_stack+0x3c/0x68 [ 42.273061] kasan_save_track+0x20/0x40 [ 42.273647] kasan_save_alloc_info+0x40/0x58 [ 42.274300] __kasan_kmalloc+0xd4/0xd8 [ 42.274947] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.275658] kasan_atomics+0xb8/0x2e8 [ 42.276271] kunit_try_run_case+0x14c/0x3d0 [ 42.276881] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.277628] kthread+0x24c/0x2d0 [ 42.278147] ret_from_fork+0x10/0x20 [ 42.278779] [ 42.279087] The buggy address belongs to the object at fff00000c65bde00 [ 42.279087] which belongs to the cache kmalloc-64 of size 64 [ 42.280081] The buggy address is located 0 bytes to the right of [ 42.280081] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.281430] [ 42.281822] The buggy address belongs to the physical page: [ 42.282403] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.283284] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.284136] page_type: f5(slab) [ 42.284738] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.285635] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.286371] page dumped because: kasan: bad access detected [ 42.287107] [ 42.287409] Memory state around the buggy address: [ 42.288042] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.288877] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.289683] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.290371] ^ [ 42.291026] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.291700] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.292558] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 40.404573] ================================================================== [ 40.406187] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 40.407183] Read of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250 [ 40.407952] [ 40.408355] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.410107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.410693] Hardware name: linux,dummy-virt (DT) [ 40.411331] Call trace: [ 40.411776] show_stack+0x20/0x38 (C) [ 40.412369] dump_stack_lvl+0x8c/0xd0 [ 40.412868] print_report+0x118/0x5e0 [ 40.413482] kasan_report+0xc8/0x118 [ 40.414057] __asan_report_load8_noabort+0x20/0x30 [ 40.414702] kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 40.415600] kasan_bitops_generic+0x11c/0x1c8 [ 40.416133] kunit_try_run_case+0x14c/0x3d0 [ 40.416814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.417485] kthread+0x24c/0x2d0 [ 40.418030] ret_from_fork+0x10/0x20 [ 40.418634] [ 40.418930] Allocated by task 250: [ 40.419421] kasan_save_stack+0x3c/0x68 [ 40.420025] kasan_save_track+0x20/0x40 [ 40.420586] kasan_save_alloc_info+0x40/0x58 [ 40.421131] __kasan_kmalloc+0xd4/0xd8 [ 40.421722] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.422347] kasan_bitops_generic+0xa0/0x1c8 [ 40.423082] kunit_try_run_case+0x14c/0x3d0 [ 40.423692] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.424407] kthread+0x24c/0x2d0 [ 40.424958] ret_from_fork+0x10/0x20 [ 40.425522] [ 40.425875] The buggy address belongs to the object at fff00000c1bb3c00 [ 40.425875] which belongs to the cache kmalloc-16 of size 16 [ 40.426973] The buggy address is located 8 bytes inside of [ 40.426973] allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09) [ 40.428160] [ 40.428532] The buggy address belongs to the physical page: [ 40.429162] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 40.429999] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.430793] page_type: f5(slab) [ 40.431291] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 40.432116] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 40.432901] page dumped because: kasan: bad access detected [ 40.433609] [ 40.433950] Memory state around the buggy address: [ 40.434510] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.435302] fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.436178] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.436970] ^ [ 40.437521] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.438251] fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.439106] ================================================================== [ 40.661116] ================================================================== [ 40.661814] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 40.662729] Read of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250 [ 40.664087] [ 40.664479] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.665400] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.666000] Hardware name: linux,dummy-virt (DT) [ 40.666621] Call trace: [ 40.666969] show_stack+0x20/0x38 (C) [ 40.667603] dump_stack_lvl+0x8c/0xd0 [ 40.668167] print_report+0x118/0x5e0 [ 40.668744] kasan_report+0xc8/0x118 [ 40.669236] __asan_report_load8_noabort+0x20/0x30 [ 40.669929] kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 40.670586] kasan_bitops_generic+0x11c/0x1c8 [ 40.671231] kunit_try_run_case+0x14c/0x3d0 [ 40.671831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.672592] kthread+0x24c/0x2d0 [ 40.673134] ret_from_fork+0x10/0x20 [ 40.673684] [ 40.674002] Allocated by task 250: [ 40.674554] kasan_save_stack+0x3c/0x68 [ 40.675093] kasan_save_track+0x20/0x40 [ 40.675635] kasan_save_alloc_info+0x40/0x58 [ 40.676289] __kasan_kmalloc+0xd4/0xd8 [ 40.676871] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.677494] kasan_bitops_generic+0xa0/0x1c8 [ 40.678096] kunit_try_run_case+0x14c/0x3d0 [ 40.678734] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.679462] kthread+0x24c/0x2d0 [ 40.679997] ret_from_fork+0x10/0x20 [ 40.680596] [ 40.680943] The buggy address belongs to the object at fff00000c1bb3c00 [ 40.680943] which belongs to the cache kmalloc-16 of size 16 [ 40.682023] The buggy address is located 8 bytes inside of [ 40.682023] allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09) [ 40.683331] [ 40.683706] The buggy address belongs to the physical page: [ 40.684272] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 40.685177] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.685977] page_type: f5(slab) [ 40.686514] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 40.687272] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 40.688162] page dumped because: kasan: bad access detected [ 40.688797] [ 40.689149] Memory state around the buggy address: [ 40.689687] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.690526] fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.691282] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.692027] ^ [ 40.692588] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.693316] fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.694083] ================================================================== [ 40.478582] ================================================================== [ 40.479367] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 40.481035] Read of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250 [ 40.481769] [ 40.482165] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.483314] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.484416] Hardware name: linux,dummy-virt (DT) [ 40.485234] Call trace: [ 40.485885] show_stack+0x20/0x38 (C) [ 40.486650] dump_stack_lvl+0x8c/0xd0 [ 40.487361] print_report+0x118/0x5e0 [ 40.488080] kasan_report+0xc8/0x118 [ 40.488799] __asan_report_load8_noabort+0x20/0x30 [ 40.489600] kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 40.490491] kasan_bitops_generic+0x11c/0x1c8 [ 40.491070] kunit_try_run_case+0x14c/0x3d0 [ 40.491653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.492313] kthread+0x24c/0x2d0 [ 40.492898] ret_from_fork+0x10/0x20 [ 40.493504] [ 40.493860] Allocated by task 250: [ 40.494350] kasan_save_stack+0x3c/0x68 [ 40.495020] kasan_save_track+0x20/0x40 [ 40.495560] kasan_save_alloc_info+0x40/0x58 [ 40.496101] __kasan_kmalloc+0xd4/0xd8 [ 40.496674] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.497208] kasan_bitops_generic+0xa0/0x1c8 [ 40.497848] kunit_try_run_case+0x14c/0x3d0 [ 40.498424] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.499046] kthread+0x24c/0x2d0 [ 40.499590] ret_from_fork+0x10/0x20 [ 40.500094] [ 40.500462] The buggy address belongs to the object at fff00000c1bb3c00 [ 40.500462] which belongs to the cache kmalloc-16 of size 16 [ 40.501576] The buggy address is located 8 bytes inside of [ 40.501576] allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09) [ 40.502792] [ 40.503154] The buggy address belongs to the physical page: [ 40.503696] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 40.504673] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.505369] page_type: f5(slab) [ 40.505915] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 40.506665] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 40.507559] page dumped because: kasan: bad access detected [ 40.508250] [ 40.508578] Memory state around the buggy address: [ 40.509215] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.509904] fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.510776] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.511425] ^ [ 40.511973] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.512709] fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.513562] ================================================================== [ 40.515869] ================================================================== [ 40.516697] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 40.517638] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250 [ 40.518533] [ 40.518920] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.519857] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.520436] Hardware name: linux,dummy-virt (DT) [ 40.521064] Call trace: [ 40.521524] show_stack+0x20/0x38 (C) [ 40.522028] dump_stack_lvl+0x8c/0xd0 [ 40.522652] print_report+0x118/0x5e0 [ 40.523199] kasan_report+0xc8/0x118 [ 40.523757] kasan_check_range+0x100/0x1a8 [ 40.524320] __kasan_check_write+0x20/0x30 [ 40.525032] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 40.525758] kasan_bitops_generic+0x11c/0x1c8 [ 40.526414] kunit_try_run_case+0x14c/0x3d0 [ 40.527074] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.527777] kthread+0x24c/0x2d0 [ 40.528364] ret_from_fork+0x10/0x20 [ 40.528995] [ 40.529341] Allocated by task 250: [ 40.529855] kasan_save_stack+0x3c/0x68 [ 40.530328] kasan_save_track+0x20/0x40 [ 40.530952] kasan_save_alloc_info+0x40/0x58 [ 40.531490] __kasan_kmalloc+0xd4/0xd8 [ 40.532059] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.532671] kasan_bitops_generic+0xa0/0x1c8 [ 40.533292] kunit_try_run_case+0x14c/0x3d0 [ 40.533844] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.534594] kthread+0x24c/0x2d0 [ 40.535191] ret_from_fork+0x10/0x20 [ 40.535769] [ 40.536072] The buggy address belongs to the object at fff00000c1bb3c00 [ 40.536072] which belongs to the cache kmalloc-16 of size 16 [ 40.537259] The buggy address is located 8 bytes inside of [ 40.537259] allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09) [ 40.539051] [ 40.539595] The buggy address belongs to the physical page: [ 40.540228] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 40.541096] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.541832] page_type: f5(slab) [ 40.542319] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 40.543094] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 40.543927] page dumped because: kasan: bad access detected [ 40.544580] [ 40.544953] Memory state around the buggy address: [ 40.545500] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.546308] fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.547086] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.547775] ^ [ 40.548327] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.549114] fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.549970] ================================================================== [ 40.588965] ================================================================== [ 40.590230] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 40.591327] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250 [ 40.592208] [ 40.592588] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.593650] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.594206] Hardware name: linux,dummy-virt (DT) [ 40.594842] Call trace: [ 40.595266] show_stack+0x20/0x38 (C) [ 40.595892] dump_stack_lvl+0x8c/0xd0 [ 40.596455] print_report+0x118/0x5e0 [ 40.597058] kasan_report+0xc8/0x118 [ 40.597652] kasan_check_range+0x100/0x1a8 [ 40.598287] __kasan_check_write+0x20/0x30 [ 40.598941] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 40.599718] kasan_bitops_generic+0x11c/0x1c8 [ 40.600371] kunit_try_run_case+0x14c/0x3d0 [ 40.601028] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.601710] kthread+0x24c/0x2d0 [ 40.602281] ret_from_fork+0x10/0x20 [ 40.602881] [ 40.603234] Allocated by task 250: [ 40.603757] kasan_save_stack+0x3c/0x68 [ 40.604361] kasan_save_track+0x20/0x40 [ 40.604912] kasan_save_alloc_info+0x40/0x58 [ 40.605497] __kasan_kmalloc+0xd4/0xd8 [ 40.606020] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.606661] kasan_bitops_generic+0xa0/0x1c8 [ 40.607183] kunit_try_run_case+0x14c/0x3d0 [ 40.607815] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.608474] kthread+0x24c/0x2d0 [ 40.608914] ret_from_fork+0x10/0x20 [ 40.609478] [ 40.609817] The buggy address belongs to the object at fff00000c1bb3c00 [ 40.609817] which belongs to the cache kmalloc-16 of size 16 [ 40.610866] The buggy address is located 8 bytes inside of [ 40.610866] allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09) [ 40.612049] [ 40.612407] The buggy address belongs to the physical page: [ 40.613043] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 40.613937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.614684] page_type: f5(slab) [ 40.615187] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 40.616046] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 40.616877] page dumped because: kasan: bad access detected [ 40.617529] [ 40.617869] Memory state around the buggy address: [ 40.618437] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.619296] fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.620113] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.620895] ^ [ 40.621330] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.622092] fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.622952] ================================================================== [ 40.442352] ================================================================== [ 40.443106] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 40.443991] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250 [ 40.444794] [ 40.445255] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.446574] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.447089] Hardware name: linux,dummy-virt (DT) [ 40.447651] Call trace: [ 40.448015] show_stack+0x20/0x38 (C) [ 40.448690] dump_stack_lvl+0x8c/0xd0 [ 40.449328] print_report+0x118/0x5e0 [ 40.449878] kasan_report+0xc8/0x118 [ 40.450511] kasan_check_range+0x100/0x1a8 [ 40.451056] __kasan_check_write+0x20/0x30 [ 40.451694] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 40.452454] kasan_bitops_generic+0x11c/0x1c8 [ 40.453108] kunit_try_run_case+0x14c/0x3d0 [ 40.453726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.454507] kthread+0x24c/0x2d0 [ 40.455121] ret_from_fork+0x10/0x20 [ 40.455729] [ 40.456054] Allocated by task 250: [ 40.456506] kasan_save_stack+0x3c/0x68 [ 40.457118] kasan_save_track+0x20/0x40 [ 40.457728] kasan_save_alloc_info+0x40/0x58 [ 40.458366] __kasan_kmalloc+0xd4/0xd8 [ 40.458921] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.459583] kasan_bitops_generic+0xa0/0x1c8 [ 40.460105] kunit_try_run_case+0x14c/0x3d0 [ 40.460766] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.461494] kthread+0x24c/0x2d0 [ 40.462027] ret_from_fork+0x10/0x20 [ 40.462582] [ 40.462928] The buggy address belongs to the object at fff00000c1bb3c00 [ 40.462928] which belongs to the cache kmalloc-16 of size 16 [ 40.464138] The buggy address is located 8 bytes inside of [ 40.464138] allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09) [ 40.465419] [ 40.465788] The buggy address belongs to the physical page: [ 40.466409] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 40.467263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.468086] page_type: f5(slab) [ 40.468642] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 40.469572] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 40.470425] page dumped because: kasan: bad access detected [ 40.471129] [ 40.471485] Memory state around the buggy address: [ 40.471996] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.472864] fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.473632] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.474360] ^ [ 40.475267] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.476215] fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.477187] ================================================================== [ 40.625185] ================================================================== [ 40.625919] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 40.626941] Read of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250 [ 40.627748] [ 40.628135] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.629268] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.629713] Hardware name: linux,dummy-virt (DT) [ 40.630327] Call trace: [ 40.630832] show_stack+0x20/0x38 (C) [ 40.631432] dump_stack_lvl+0x8c/0xd0 [ 40.631988] print_report+0x118/0x5e0 [ 40.632619] kasan_report+0xc8/0x118 [ 40.633204] __asan_report_load8_noabort+0x20/0x30 [ 40.633899] kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 40.634645] kasan_bitops_generic+0x11c/0x1c8 [ 40.635276] kunit_try_run_case+0x14c/0x3d0 [ 40.635852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.636577] kthread+0x24c/0x2d0 [ 40.637019] ret_from_fork+0x10/0x20 [ 40.637633] [ 40.637951] Allocated by task 250: [ 40.638511] kasan_save_stack+0x3c/0x68 [ 40.639011] kasan_save_track+0x20/0x40 [ 40.639631] kasan_save_alloc_info+0x40/0x58 [ 40.640266] __kasan_kmalloc+0xd4/0xd8 [ 40.640862] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.641546] kasan_bitops_generic+0xa0/0x1c8 [ 40.642095] kunit_try_run_case+0x14c/0x3d0 [ 40.642758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.643415] kthread+0x24c/0x2d0 [ 40.643975] ret_from_fork+0x10/0x20 [ 40.644561] [ 40.644900] The buggy address belongs to the object at fff00000c1bb3c00 [ 40.644900] which belongs to the cache kmalloc-16 of size 16 [ 40.646054] The buggy address is located 8 bytes inside of [ 40.646054] allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09) [ 40.647148] [ 40.647510] The buggy address belongs to the physical page: [ 40.648210] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 40.649119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.649831] page_type: f5(slab) [ 40.650236] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 40.651581] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 40.652399] page dumped because: kasan: bad access detected [ 40.652993] [ 40.653349] Memory state around the buggy address: [ 40.653950] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.654819] fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.655544] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.656394] ^ [ 40.656898] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.657644] fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.658461] ================================================================== [ 40.551825] ================================================================== [ 40.552624] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 40.554053] Read of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250 [ 40.555240] [ 40.555619] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.557455] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.557986] Hardware name: linux,dummy-virt (DT) [ 40.558571] Call trace: [ 40.558954] show_stack+0x20/0x38 (C) [ 40.559859] dump_stack_lvl+0x8c/0xd0 [ 40.560430] print_report+0x118/0x5e0 [ 40.561092] kasan_report+0xc8/0x118 [ 40.561723] __asan_report_load8_noabort+0x20/0x30 [ 40.562306] kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 40.563155] kasan_bitops_generic+0x11c/0x1c8 [ 40.563799] kunit_try_run_case+0x14c/0x3d0 [ 40.564434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.565118] kthread+0x24c/0x2d0 [ 40.565672] ret_from_fork+0x10/0x20 [ 40.566284] [ 40.566683] Allocated by task 250: [ 40.567173] kasan_save_stack+0x3c/0x68 [ 40.567723] kasan_save_track+0x20/0x40 [ 40.568339] kasan_save_alloc_info+0x40/0x58 [ 40.568917] __kasan_kmalloc+0xd4/0xd8 [ 40.569529] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.570143] kasan_bitops_generic+0xa0/0x1c8 [ 40.570817] kunit_try_run_case+0x14c/0x3d0 [ 40.571353] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.572102] kthread+0x24c/0x2d0 [ 40.572660] ret_from_fork+0x10/0x20 [ 40.573164] [ 40.573570] The buggy address belongs to the object at fff00000c1bb3c00 [ 40.573570] which belongs to the cache kmalloc-16 of size 16 [ 40.574797] The buggy address is located 8 bytes inside of [ 40.574797] allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09) [ 40.575992] [ 40.576377] The buggy address belongs to the physical page: [ 40.577127] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 40.577911] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.578792] page_type: f5(slab) [ 40.579306] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 40.580197] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 40.581056] page dumped because: kasan: bad access detected [ 40.581694] [ 40.582058] Memory state around the buggy address: [ 40.582750] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.583582] fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.584392] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.585113] ^ [ 40.585661] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.586469] fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.587223] ================================================================== [ 40.368789] ================================================================== [ 40.369621] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 40.370591] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250 [ 40.371336] [ 40.371740] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.372912] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.373390] Hardware name: linux,dummy-virt (DT) [ 40.374028] Call trace: [ 40.374475] show_stack+0x20/0x38 (C) [ 40.375124] dump_stack_lvl+0x8c/0xd0 [ 40.375703] print_report+0x118/0x5e0 [ 40.376315] kasan_report+0xc8/0x118 [ 40.376911] kasan_check_range+0x100/0x1a8 [ 40.377550] __kasan_check_write+0x20/0x30 [ 40.378173] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 40.378945] kasan_bitops_generic+0x11c/0x1c8 [ 40.379549] kunit_try_run_case+0x14c/0x3d0 [ 40.380167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.380819] kthread+0x24c/0x2d0 [ 40.381391] ret_from_fork+0x10/0x20 [ 40.382019] [ 40.382317] Allocated by task 250: [ 40.382858] kasan_save_stack+0x3c/0x68 [ 40.383345] kasan_save_track+0x20/0x40 [ 40.383949] kasan_save_alloc_info+0x40/0x58 [ 40.384578] __kasan_kmalloc+0xd4/0xd8 [ 40.385088] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.385755] kasan_bitops_generic+0xa0/0x1c8 [ 40.386381] kunit_try_run_case+0x14c/0x3d0 [ 40.386971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.387682] kthread+0x24c/0x2d0 [ 40.388222] ret_from_fork+0x10/0x20 [ 40.388806] [ 40.389111] The buggy address belongs to the object at fff00000c1bb3c00 [ 40.389111] which belongs to the cache kmalloc-16 of size 16 [ 40.390291] The buggy address is located 8 bytes inside of [ 40.390291] allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09) [ 40.391325] [ 40.391698] The buggy address belongs to the physical page: [ 40.392397] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 40.393314] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.394118] page_type: f5(slab) [ 40.394663] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 40.395634] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 40.396358] page dumped because: kasan: bad access detected [ 40.397073] [ 40.397415] Memory state around the buggy address: [ 40.397912] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.398796] fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.399543] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.400334] ^ [ 40.400888] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.401715] fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.402560] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 39.971611] ================================================================== [ 39.972854] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 39.974607] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250 [ 39.975891] [ 39.976228] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 39.977368] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.977922] Hardware name: linux,dummy-virt (DT) [ 39.978456] Call trace: [ 39.978887] show_stack+0x20/0x38 (C) [ 39.979865] dump_stack_lvl+0x8c/0xd0 [ 39.980477] print_report+0x118/0x5e0 [ 39.980992] kasan_report+0xc8/0x118 [ 39.981890] kasan_check_range+0x100/0x1a8 [ 39.982486] __kasan_check_write+0x20/0x30 [ 39.983076] kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 39.983895] kasan_bitops_generic+0x110/0x1c8 [ 39.984554] kunit_try_run_case+0x14c/0x3d0 [ 39.985123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.986229] kthread+0x24c/0x2d0 [ 39.986708] ret_from_fork+0x10/0x20 [ 39.987296] [ 39.987655] Allocated by task 250: [ 39.988181] kasan_save_stack+0x3c/0x68 [ 39.988717] kasan_save_track+0x20/0x40 [ 39.989285] kasan_save_alloc_info+0x40/0x58 [ 39.989927] __kasan_kmalloc+0xd4/0xd8 [ 39.990415] __kmalloc_cache_noprof+0x15c/0x3c8 [ 39.991083] kasan_bitops_generic+0xa0/0x1c8 [ 39.992184] kunit_try_run_case+0x14c/0x3d0 [ 39.992781] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.994037] kthread+0x24c/0x2d0 [ 39.994471] ret_from_fork+0x10/0x20 [ 39.994982] [ 39.995307] The buggy address belongs to the object at fff00000c1bb3c00 [ 39.995307] which belongs to the cache kmalloc-16 of size 16 [ 39.996202] The buggy address is located 8 bytes inside of [ 39.996202] allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09) [ 39.997671] [ 39.998283] The buggy address belongs to the physical page: [ 39.998920] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 39.999894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.000689] page_type: f5(slab) [ 40.001243] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 40.002153] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 40.003354] page dumped because: kasan: bad access detected [ 40.003990] [ 40.004318] Memory state around the buggy address: [ 40.004878] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.006228] fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.006993] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.007841] ^ [ 40.008323] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.009123] fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.010415] ================================================================== [ 40.012177] ================================================================== [ 40.013000] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 40.014045] Read of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250 [ 40.015805] [ 40.016120] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.016987] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.018130] Hardware name: linux,dummy-virt (DT) [ 40.018790] Call trace: [ 40.019307] show_stack+0x20/0x38 (C) [ 40.019968] dump_stack_lvl+0x8c/0xd0 [ 40.020767] print_report+0x118/0x5e0 [ 40.021157] kasan_report+0xc8/0x118 [ 40.021879] __asan_report_load8_noabort+0x20/0x30 [ 40.022839] kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 40.023637] kasan_bitops_generic+0x110/0x1c8 [ 40.024428] kunit_try_run_case+0x14c/0x3d0 [ 40.024956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.025691] kthread+0x24c/0x2d0 [ 40.026710] ret_from_fork+0x10/0x20 [ 40.027416] [ 40.027838] Allocated by task 250: [ 40.028358] kasan_save_stack+0x3c/0x68 [ 40.028994] kasan_save_track+0x20/0x40 [ 40.029513] kasan_save_alloc_info+0x40/0x58 [ 40.030391] __kasan_kmalloc+0xd4/0xd8 [ 40.031046] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.031748] kasan_bitops_generic+0xa0/0x1c8 [ 40.032354] kunit_try_run_case+0x14c/0x3d0 [ 40.032993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.034068] kthread+0x24c/0x2d0 [ 40.034540] ret_from_fork+0x10/0x20 [ 40.035071] [ 40.035431] The buggy address belongs to the object at fff00000c1bb3c00 [ 40.035431] which belongs to the cache kmalloc-16 of size 16 [ 40.037703] The buggy address is located 8 bytes inside of [ 40.037703] allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09) [ 40.038752] [ 40.039107] The buggy address belongs to the physical page: [ 40.039714] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 40.040599] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.041803] page_type: f5(slab) [ 40.042272] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 40.043046] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 40.043938] page dumped because: kasan: bad access detected [ 40.044640] [ 40.045009] Memory state around the buggy address: [ 40.046019] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.046793] fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.047599] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.048458] ^ [ 40.049014] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.049838] fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.050962] ================================================================== [ 40.258306] ================================================================== [ 40.258987] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 40.259803] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250 [ 40.260583] [ 40.260958] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.262483] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.263097] Hardware name: linux,dummy-virt (DT) [ 40.263769] Call trace: [ 40.264254] show_stack+0x20/0x38 (C) [ 40.264849] dump_stack_lvl+0x8c/0xd0 [ 40.265505] print_report+0x118/0x5e0 [ 40.266150] kasan_report+0xc8/0x118 [ 40.266787] kasan_check_range+0x100/0x1a8 [ 40.267478] __kasan_check_write+0x20/0x30 [ 40.268083] kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 40.268824] kasan_bitops_generic+0x110/0x1c8 [ 40.269433] kunit_try_run_case+0x14c/0x3d0 [ 40.270139] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.270963] kthread+0x24c/0x2d0 [ 40.271593] ret_from_fork+0x10/0x20 [ 40.272171] [ 40.272549] Allocated by task 250: [ 40.273154] kasan_save_stack+0x3c/0x68 [ 40.273774] kasan_save_track+0x20/0x40 [ 40.274289] kasan_save_alloc_info+0x40/0x58 [ 40.274908] __kasan_kmalloc+0xd4/0xd8 [ 40.275492] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.276041] kasan_bitops_generic+0xa0/0x1c8 [ 40.276682] kunit_try_run_case+0x14c/0x3d0 [ 40.277297] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.277933] kthread+0x24c/0x2d0 [ 40.278497] ret_from_fork+0x10/0x20 [ 40.279054] [ 40.279402] The buggy address belongs to the object at fff00000c1bb3c00 [ 40.279402] which belongs to the cache kmalloc-16 of size 16 [ 40.280606] The buggy address is located 8 bytes inside of [ 40.280606] allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09) [ 40.281761] [ 40.282111] The buggy address belongs to the physical page: [ 40.282837] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 40.283709] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.284402] page_type: f5(slab) [ 40.284843] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 40.285548] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 40.286462] page dumped because: kasan: bad access detected [ 40.287163] [ 40.287513] Memory state around the buggy address: [ 40.288144] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.288991] fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.289671] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.290513] ^ [ 40.291048] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.291920] fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.292794] ================================================================== [ 40.222149] ================================================================== [ 40.222918] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 40.223812] Read of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250 [ 40.224671] [ 40.225097] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.226497] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.226882] Hardware name: linux,dummy-virt (DT) [ 40.227286] Call trace: [ 40.227751] show_stack+0x20/0x38 (C) [ 40.228804] dump_stack_lvl+0x8c/0xd0 [ 40.229386] print_report+0x118/0x5e0 [ 40.230109] kasan_report+0xc8/0x118 [ 40.230693] __asan_report_load8_noabort+0x20/0x30 [ 40.231383] kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 40.232066] kasan_bitops_generic+0x110/0x1c8 [ 40.232709] kunit_try_run_case+0x14c/0x3d0 [ 40.233399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.234146] kthread+0x24c/0x2d0 [ 40.234617] ret_from_fork+0x10/0x20 [ 40.235308] [ 40.235623] Allocated by task 250: [ 40.235873] kasan_save_stack+0x3c/0x68 [ 40.236132] kasan_save_track+0x20/0x40 [ 40.236392] kasan_save_alloc_info+0x40/0x58 [ 40.236920] __kasan_kmalloc+0xd4/0xd8 [ 40.237582] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.238297] kasan_bitops_generic+0xa0/0x1c8 [ 40.238977] kunit_try_run_case+0x14c/0x3d0 [ 40.239672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.240379] kthread+0x24c/0x2d0 [ 40.241011] ret_from_fork+0x10/0x20 [ 40.241621] [ 40.241977] The buggy address belongs to the object at fff00000c1bb3c00 [ 40.241977] which belongs to the cache kmalloc-16 of size 16 [ 40.243244] The buggy address is located 8 bytes inside of [ 40.243244] allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09) [ 40.244562] [ 40.244904] The buggy address belongs to the physical page: [ 40.245553] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 40.246553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.247315] page_type: f5(slab) [ 40.247812] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 40.248807] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 40.249706] page dumped because: kasan: bad access detected [ 40.250350] [ 40.250680] Memory state around the buggy address: [ 40.251385] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.252190] fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.253022] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.253924] ^ [ 40.254455] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.255207] fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.256023] ================================================================== [ 40.294843] ================================================================== [ 40.295590] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 40.296362] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250 [ 40.298050] [ 40.298526] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.299989] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.300651] Hardware name: linux,dummy-virt (DT) [ 40.301196] Call trace: [ 40.301682] show_stack+0x20/0x38 (C) [ 40.302303] dump_stack_lvl+0x8c/0xd0 [ 40.302786] print_report+0x118/0x5e0 [ 40.303388] kasan_report+0xc8/0x118 [ 40.304008] kasan_check_range+0x100/0x1a8 [ 40.304667] __kasan_check_write+0x20/0x30 [ 40.305301] kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 40.306014] kasan_bitops_generic+0x110/0x1c8 [ 40.306703] kunit_try_run_case+0x14c/0x3d0 [ 40.307264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.308039] kthread+0x24c/0x2d0 [ 40.308597] ret_from_fork+0x10/0x20 [ 40.309091] [ 40.309431] Allocated by task 250: [ 40.309975] kasan_save_stack+0x3c/0x68 [ 40.310583] kasan_save_track+0x20/0x40 [ 40.311093] kasan_save_alloc_info+0x40/0x58 [ 40.311700] __kasan_kmalloc+0xd4/0xd8 [ 40.312175] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.312851] kasan_bitops_generic+0xa0/0x1c8 [ 40.313476] kunit_try_run_case+0x14c/0x3d0 [ 40.313990] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.314764] kthread+0x24c/0x2d0 [ 40.315324] ret_from_fork+0x10/0x20 [ 40.315814] [ 40.316164] The buggy address belongs to the object at fff00000c1bb3c00 [ 40.316164] which belongs to the cache kmalloc-16 of size 16 [ 40.317181] The buggy address is located 8 bytes inside of [ 40.317181] allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09) [ 40.318657] [ 40.318876] The buggy address belongs to the physical page: [ 40.319174] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 40.319687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.320509] page_type: f5(slab) [ 40.321344] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 40.322389] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 40.323427] page dumped because: kasan: bad access detected [ 40.324279] [ 40.324638] Memory state around the buggy address: [ 40.325416] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.326297] fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.327151] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.327984] ^ [ 40.328532] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.329376] fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.330181] ================================================================== [ 40.138340] ================================================================== [ 40.139178] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 40.140120] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250 [ 40.140996] [ 40.141419] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.142972] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.143693] Hardware name: linux,dummy-virt (DT) [ 40.144416] Call trace: [ 40.144884] show_stack+0x20/0x38 (C) [ 40.145696] dump_stack_lvl+0x8c/0xd0 [ 40.146614] print_report+0x118/0x5e0 [ 40.147284] kasan_report+0xc8/0x118 [ 40.147877] kasan_check_range+0x100/0x1a8 [ 40.148560] __kasan_check_write+0x20/0x30 [ 40.149422] kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 40.150144] kasan_bitops_generic+0x110/0x1c8 [ 40.150778] kunit_try_run_case+0x14c/0x3d0 [ 40.151399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.152362] kthread+0x24c/0x2d0 [ 40.152933] ret_from_fork+0x10/0x20 [ 40.153891] [ 40.154237] Allocated by task 250: [ 40.154899] kasan_save_stack+0x3c/0x68 [ 40.155457] kasan_save_track+0x20/0x40 [ 40.156084] kasan_save_alloc_info+0x40/0x58 [ 40.156740] __kasan_kmalloc+0xd4/0xd8 [ 40.157321] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.158267] kasan_bitops_generic+0xa0/0x1c8 [ 40.158890] kunit_try_run_case+0x14c/0x3d0 [ 40.159489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.160205] kthread+0x24c/0x2d0 [ 40.160817] ret_from_fork+0x10/0x20 [ 40.161723] [ 40.162354] The buggy address belongs to the object at fff00000c1bb3c00 [ 40.162354] which belongs to the cache kmalloc-16 of size 16 [ 40.164226] The buggy address is located 8 bytes inside of [ 40.164226] allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09) [ 40.166152] [ 40.166843] The buggy address belongs to the physical page: [ 40.167511] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 40.168378] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.169142] page_type: f5(slab) [ 40.169705] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 40.170380] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 40.171273] page dumped because: kasan: bad access detected [ 40.172152] [ 40.172518] Memory state around the buggy address: [ 40.173129] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.174351] fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.175255] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.176028] ^ [ 40.176566] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.177328] fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.178517] ================================================================== [ 40.332406] ================================================================== [ 40.333130] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 40.333874] Read of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250 [ 40.335821] [ 40.336488] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.337553] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.338079] Hardware name: linux,dummy-virt (DT) [ 40.338727] Call trace: [ 40.339157] show_stack+0x20/0x38 (C) [ 40.339728] dump_stack_lvl+0x8c/0xd0 [ 40.340383] print_report+0x118/0x5e0 [ 40.340965] kasan_report+0xc8/0x118 [ 40.341593] __asan_report_load8_noabort+0x20/0x30 [ 40.342207] kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 40.342983] kasan_bitops_generic+0x110/0x1c8 [ 40.343698] kunit_try_run_case+0x14c/0x3d0 [ 40.344250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.345069] kthread+0x24c/0x2d0 [ 40.345607] ret_from_fork+0x10/0x20 [ 40.346155] [ 40.346485] Allocated by task 250: [ 40.346954] kasan_save_stack+0x3c/0x68 [ 40.347576] kasan_save_track+0x20/0x40 [ 40.348174] kasan_save_alloc_info+0x40/0x58 [ 40.348805] __kasan_kmalloc+0xd4/0xd8 [ 40.349393] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.349956] kasan_bitops_generic+0xa0/0x1c8 [ 40.350595] kunit_try_run_case+0x14c/0x3d0 [ 40.351244] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.351920] kthread+0x24c/0x2d0 [ 40.352480] ret_from_fork+0x10/0x20 [ 40.353012] [ 40.353306] The buggy address belongs to the object at fff00000c1bb3c00 [ 40.353306] which belongs to the cache kmalloc-16 of size 16 [ 40.354464] The buggy address is located 8 bytes inside of [ 40.354464] allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09) [ 40.355595] [ 40.355951] The buggy address belongs to the physical page: [ 40.356657] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 40.357543] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.358381] page_type: f5(slab) [ 40.358928] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 40.359689] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 40.360625] page dumped because: kasan: bad access detected [ 40.361223] [ 40.361595] Memory state around the buggy address: [ 40.362087] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.362937] fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.363685] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.364490] ^ [ 40.364991] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.365787] fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.366507] ================================================================== [ 40.180999] ================================================================== [ 40.181779] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 40.182429] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250 [ 40.183739] [ 40.184126] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.185207] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.185828] Hardware name: linux,dummy-virt (DT) [ 40.186639] Call trace: [ 40.187043] show_stack+0x20/0x38 (C) [ 40.187737] dump_stack_lvl+0x8c/0xd0 [ 40.188372] print_report+0x118/0x5e0 [ 40.188982] kasan_report+0xc8/0x118 [ 40.189945] kasan_check_range+0x100/0x1a8 [ 40.190732] __kasan_check_write+0x20/0x30 [ 40.191356] kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 40.192222] kasan_bitops_generic+0x110/0x1c8 [ 40.192885] kunit_try_run_case+0x14c/0x3d0 [ 40.193894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.194670] kthread+0x24c/0x2d0 [ 40.195199] ret_from_fork+0x10/0x20 [ 40.195755] [ 40.196108] Allocated by task 250: [ 40.196671] kasan_save_stack+0x3c/0x68 [ 40.197218] kasan_save_track+0x20/0x40 [ 40.198111] kasan_save_alloc_info+0x40/0x58 [ 40.198695] __kasan_kmalloc+0xd4/0xd8 [ 40.199217] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.199821] kasan_bitops_generic+0xa0/0x1c8 [ 40.200479] kunit_try_run_case+0x14c/0x3d0 [ 40.201021] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.202231] kthread+0x24c/0x2d0 [ 40.203175] ret_from_fork+0x10/0x20 [ 40.203568] [ 40.203931] The buggy address belongs to the object at fff00000c1bb3c00 [ 40.203931] which belongs to the cache kmalloc-16 of size 16 [ 40.205256] The buggy address is located 8 bytes inside of [ 40.205256] allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09) [ 40.206420] [ 40.207162] The buggy address belongs to the physical page: [ 40.208086] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 40.209183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.210342] page_type: f5(slab) [ 40.210811] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 40.211677] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 40.212643] page dumped because: kasan: bad access detected [ 40.213393] [ 40.214278] Memory state around the buggy address: [ 40.214906] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.215836] fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.216715] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.217550] ^ [ 40.218014] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.218776] fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.219903] ================================================================== [ 40.096291] ================================================================== [ 40.096924] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 40.098829] Read of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250 [ 40.099649] [ 40.101456] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.102550] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.103259] Hardware name: linux,dummy-virt (DT) [ 40.104015] Call trace: [ 40.104645] show_stack+0x20/0x38 (C) [ 40.105423] dump_stack_lvl+0x8c/0xd0 [ 40.106352] print_report+0x118/0x5e0 [ 40.106884] kasan_report+0xc8/0x118 [ 40.107496] __asan_report_load8_noabort+0x20/0x30 [ 40.108118] kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 40.108895] kasan_bitops_generic+0x110/0x1c8 [ 40.109862] kunit_try_run_case+0x14c/0x3d0 [ 40.110482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.111180] kthread+0x24c/0x2d0 [ 40.111718] ret_from_fork+0x10/0x20 [ 40.112252] [ 40.112618] Allocated by task 250: [ 40.113150] kasan_save_stack+0x3c/0x68 [ 40.114050] kasan_save_track+0x20/0x40 [ 40.114608] kasan_save_alloc_info+0x40/0x58 [ 40.115248] __kasan_kmalloc+0xd4/0xd8 [ 40.115827] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.116422] kasan_bitops_generic+0xa0/0x1c8 [ 40.117004] kunit_try_run_case+0x14c/0x3d0 [ 40.118158] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.118727] kthread+0x24c/0x2d0 [ 40.119117] ret_from_fork+0x10/0x20 [ 40.119583] [ 40.119936] The buggy address belongs to the object at fff00000c1bb3c00 [ 40.119936] which belongs to the cache kmalloc-16 of size 16 [ 40.121555] The buggy address is located 8 bytes inside of [ 40.121555] allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09) [ 40.123227] [ 40.123600] The buggy address belongs to the physical page: [ 40.124297] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 40.125102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.125773] page_type: f5(slab) [ 40.127063] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 40.128016] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 40.128775] page dumped because: kasan: bad access detected [ 40.129538] [ 40.129845] Memory state around the buggy address: [ 40.130539] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.131358] fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.132565] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.133602] ^ [ 40.134254] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.135190] fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.135988] ================================================================== [ 40.054608] ================================================================== [ 40.055375] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 40.056366] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250 [ 40.057297] [ 40.058002] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.059158] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.059971] Hardware name: linux,dummy-virt (DT) [ 40.060513] Call trace: [ 40.060835] show_stack+0x20/0x38 (C) [ 40.062001] dump_stack_lvl+0x8c/0xd0 [ 40.062679] print_report+0x118/0x5e0 [ 40.063251] kasan_report+0xc8/0x118 [ 40.063721] kasan_check_range+0x100/0x1a8 [ 40.064453] __kasan_check_write+0x20/0x30 [ 40.065164] kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 40.066288] kasan_bitops_generic+0x110/0x1c8 [ 40.066973] kunit_try_run_case+0x14c/0x3d0 [ 40.067630] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.068392] kthread+0x24c/0x2d0 [ 40.068908] ret_from_fork+0x10/0x20 [ 40.069993] [ 40.070367] Allocated by task 250: [ 40.070896] kasan_save_stack+0x3c/0x68 [ 40.071523] kasan_save_track+0x20/0x40 [ 40.072114] kasan_save_alloc_info+0x40/0x58 [ 40.072701] __kasan_kmalloc+0xd4/0xd8 [ 40.073329] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.073991] kasan_bitops_generic+0xa0/0x1c8 [ 40.075036] kunit_try_run_case+0x14c/0x3d0 [ 40.075681] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.076392] kthread+0x24c/0x2d0 [ 40.076903] ret_from_fork+0x10/0x20 [ 40.077738] [ 40.078607] The buggy address belongs to the object at fff00000c1bb3c00 [ 40.078607] which belongs to the cache kmalloc-16 of size 16 [ 40.080241] The buggy address is located 8 bytes inside of [ 40.080241] allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09) [ 40.081873] [ 40.082308] The buggy address belongs to the physical page: [ 40.083197] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 40.084097] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.084796] page_type: f5(slab) [ 40.085482] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 40.086488] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 40.087304] page dumped because: kasan: bad access detected [ 40.087907] [ 40.088267] Memory state around the buggy address: [ 40.088933] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.090106] fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.091123] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.091939] ^ [ 40.092414] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.093319] fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.094398] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 39.919035] ================================================================== [ 39.919903] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 39.920569] Read of size 1 at addr fff00000c65a90d0 by task kunit_try_catch/248 [ 39.922502] [ 39.922803] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 39.923916] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.924630] Hardware name: linux,dummy-virt (DT) [ 39.925301] Call trace: [ 39.925751] show_stack+0x20/0x38 (C) [ 39.926365] dump_stack_lvl+0x8c/0xd0 [ 39.926962] print_report+0x118/0x5e0 [ 39.927565] kasan_report+0xc8/0x118 [ 39.928087] __asan_report_load1_noabort+0x20/0x30 [ 39.928820] strnlen+0x80/0x88 [ 39.929314] kasan_strings+0x380/0x8f8 [ 39.929850] kunit_try_run_case+0x14c/0x3d0 [ 39.930516] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.931227] kthread+0x24c/0x2d0 [ 39.931712] ret_from_fork+0x10/0x20 [ 39.932316] [ 39.932673] Allocated by task 248: [ 39.933214] kasan_save_stack+0x3c/0x68 [ 39.933789] kasan_save_track+0x20/0x40 [ 39.934284] kasan_save_alloc_info+0x40/0x58 [ 39.934965] __kasan_kmalloc+0xd4/0xd8 [ 39.935566] __kmalloc_cache_noprof+0x15c/0x3c8 [ 39.936212] kasan_strings+0xb4/0x8f8 [ 39.936728] kunit_try_run_case+0x14c/0x3d0 [ 39.937351] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.938037] kthread+0x24c/0x2d0 [ 39.938584] ret_from_fork+0x10/0x20 [ 39.939132] [ 39.939508] Freed by task 248: [ 39.939897] kasan_save_stack+0x3c/0x68 [ 39.940497] kasan_save_track+0x20/0x40 [ 39.941081] kasan_save_free_info+0x4c/0x78 [ 39.941633] __kasan_slab_free+0x6c/0x98 [ 39.942212] kfree+0x114/0x3d0 [ 39.942755] kasan_strings+0x128/0x8f8 [ 39.943320] kunit_try_run_case+0x14c/0x3d0 [ 39.943992] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.944856] kthread+0x24c/0x2d0 [ 39.945479] ret_from_fork+0x10/0x20 [ 39.945869] [ 39.946233] The buggy address belongs to the object at fff00000c65a90c0 [ 39.946233] which belongs to the cache kmalloc-32 of size 32 [ 39.947617] The buggy address is located 16 bytes inside of [ 39.947617] freed 32-byte region [fff00000c65a90c0, fff00000c65a90e0) [ 39.948943] [ 39.949376] The buggy address belongs to the physical page: [ 39.950158] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a9 [ 39.951145] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.951735] page_type: f5(slab) [ 39.952273] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 39.953248] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 39.954106] page dumped because: kasan: bad access detected [ 39.954943] [ 39.955224] Memory state around the buggy address: [ 39.955958] fff00000c65a8f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.956751] fff00000c65a9000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 39.957480] >fff00000c65a9080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 39.958332] ^ [ 39.958956] fff00000c65a9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.959813] fff00000c65a9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.960510] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[ 39.872415] ================================================================== [ 39.873201] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 39.873935] Read of size 1 at addr fff00000c65a90d0 by task kunit_try_catch/248 [ 39.874626] [ 39.874959] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 39.876020] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.876493] Hardware name: linux,dummy-virt (DT) [ 39.877106] Call trace: [ 39.877491] show_stack+0x20/0x38 (C) [ 39.878087] dump_stack_lvl+0x8c/0xd0 [ 39.878678] print_report+0x118/0x5e0 [ 39.879295] kasan_report+0xc8/0x118 [ 39.879826] __asan_report_load1_noabort+0x20/0x30 [ 39.880505] strlen+0xa8/0xb0 [ 39.881029] kasan_strings+0x320/0x8f8 [ 39.881808] kunit_try_run_case+0x14c/0x3d0 [ 39.882463] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.883201] kthread+0x24c/0x2d0 [ 39.883781] ret_from_fork+0x10/0x20 [ 39.884380] [ 39.884708] Allocated by task 248: [ 39.885146] kasan_save_stack+0x3c/0x68 [ 39.885757] kasan_save_track+0x20/0x40 [ 39.886253] kasan_save_alloc_info+0x40/0x58 [ 39.886848] __kasan_kmalloc+0xd4/0xd8 [ 39.887413] __kmalloc_cache_noprof+0x15c/0x3c8 [ 39.888323] kasan_strings+0xb4/0x8f8 [ 39.888900] kunit_try_run_case+0x14c/0x3d0 [ 39.889792] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.890525] kthread+0x24c/0x2d0 [ 39.891019] ret_from_fork+0x10/0x20 [ 39.891462] [ 39.891803] Freed by task 248: [ 39.892289] kasan_save_stack+0x3c/0x68 [ 39.892829] kasan_save_track+0x20/0x40 [ 39.894280] kasan_save_free_info+0x4c/0x78 [ 39.895383] __kasan_slab_free+0x6c/0x98 [ 39.895976] kfree+0x114/0x3d0 [ 39.896516] kasan_strings+0x128/0x8f8 [ 39.897047] kunit_try_run_case+0x14c/0x3d0 [ 39.897620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.898330] kthread+0x24c/0x2d0 [ 39.899063] ret_from_fork+0x10/0x20 [ 39.899658] [ 39.899974] The buggy address belongs to the object at fff00000c65a90c0 [ 39.899974] which belongs to the cache kmalloc-32 of size 32 [ 39.901213] The buggy address is located 16 bytes inside of [ 39.901213] freed 32-byte region [fff00000c65a90c0, fff00000c65a90e0) [ 39.902746] [ 39.903127] The buggy address belongs to the physical page: [ 39.903715] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a9 [ 39.904688] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.905505] page_type: f5(slab) [ 39.905912] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 39.906934] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 39.907717] page dumped because: kasan: bad access detected [ 39.908327] [ 39.908717] Memory state around the buggy address: [ 39.909390] fff00000c65a8f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.910489] fff00000c65a9000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 39.911479] >fff00000c65a9080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 39.912356] ^ [ 39.913136] fff00000c65a9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.914630] fff00000c65a9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.915741] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 39.827006] ================================================================== [ 39.827987] BUG: KASAN: slab-use-after-free in kasan_strings+0x858/0x8f8 [ 39.828795] Read of size 1 at addr fff00000c65a90d0 by task kunit_try_catch/248 [ 39.829938] [ 39.830304] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 39.831399] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.832038] Hardware name: linux,dummy-virt (DT) [ 39.832701] Call trace: [ 39.833175] show_stack+0x20/0x38 (C) [ 39.833870] dump_stack_lvl+0x8c/0xd0 [ 39.834565] print_report+0x118/0x5e0 [ 39.835259] kasan_report+0xc8/0x118 [ 39.835859] __asan_report_load1_noabort+0x20/0x30 [ 39.836550] kasan_strings+0x858/0x8f8 [ 39.837204] kunit_try_run_case+0x14c/0x3d0 [ 39.838176] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.838928] kthread+0x24c/0x2d0 [ 39.839511] ret_from_fork+0x10/0x20 [ 39.840085] [ 39.840472] Allocated by task 248: [ 39.841042] kasan_save_stack+0x3c/0x68 [ 39.841791] kasan_save_track+0x20/0x40 [ 39.842636] kasan_save_alloc_info+0x40/0x58 [ 39.843190] __kasan_kmalloc+0xd4/0xd8 [ 39.843780] __kmalloc_cache_noprof+0x15c/0x3c8 [ 39.844362] kasan_strings+0xb4/0x8f8 [ 39.844875] kunit_try_run_case+0x14c/0x3d0 [ 39.845955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.846474] kthread+0x24c/0x2d0 [ 39.846939] ret_from_fork+0x10/0x20 [ 39.847509] [ 39.847862] Freed by task 248: [ 39.848363] kasan_save_stack+0x3c/0x68 [ 39.848980] kasan_save_track+0x20/0x40 [ 39.849935] kasan_save_free_info+0x4c/0x78 [ 39.850567] __kasan_slab_free+0x6c/0x98 [ 39.851165] kfree+0x114/0x3d0 [ 39.851599] kasan_strings+0x128/0x8f8 [ 39.852170] kunit_try_run_case+0x14c/0x3d0 [ 39.852704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.853764] kthread+0x24c/0x2d0 [ 39.854262] ret_from_fork+0x10/0x20 [ 39.854737] [ 39.855072] The buggy address belongs to the object at fff00000c65a90c0 [ 39.855072] which belongs to the cache kmalloc-32 of size 32 [ 39.856339] The buggy address is located 16 bytes inside of [ 39.856339] freed 32-byte region [fff00000c65a90c0, fff00000c65a90e0) [ 39.857436] [ 39.857798] The buggy address belongs to the physical page: [ 39.858492] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a9 [ 39.859264] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.860395] page_type: f5(slab) [ 39.860925] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 39.862092] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 39.862886] page dumped because: kasan: bad access detected [ 39.863517] [ 39.863828] Memory state around the buggy address: [ 39.864463] fff00000c65a8f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.865102] fff00000c65a9000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 39.867063] >fff00000c65a9080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 39.868332] ^ [ 39.868931] fff00000c65a9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.869870] fff00000c65a9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.870681] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 39.780969] ================================================================== [ 39.781874] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 39.782925] Read of size 1 at addr fff00000c65a90d0 by task kunit_try_catch/248 [ 39.784557] [ 39.784935] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 39.786137] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.786690] Hardware name: linux,dummy-virt (DT) [ 39.787340] Call trace: [ 39.787935] show_stack+0x20/0x38 (C) [ 39.788467] dump_stack_lvl+0x8c/0xd0 [ 39.789121] print_report+0x118/0x5e0 [ 39.790078] kasan_report+0xc8/0x118 [ 39.790684] __asan_report_load1_noabort+0x20/0x30 [ 39.791398] strcmp+0xc0/0xc8 [ 39.791891] kasan_strings+0x248/0x8f8 [ 39.792537] kunit_try_run_case+0x14c/0x3d0 [ 39.793169] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.794204] kthread+0x24c/0x2d0 [ 39.794789] ret_from_fork+0x10/0x20 [ 39.795313] [ 39.795713] Allocated by task 248: [ 39.796290] kasan_save_stack+0x3c/0x68 [ 39.796889] kasan_save_track+0x20/0x40 [ 39.797867] kasan_save_alloc_info+0x40/0x58 [ 39.798435] __kasan_kmalloc+0xd4/0xd8 [ 39.799066] __kmalloc_cache_noprof+0x15c/0x3c8 [ 39.799677] kasan_strings+0xb4/0x8f8 [ 39.800286] kunit_try_run_case+0x14c/0x3d0 [ 39.800898] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.801899] kthread+0x24c/0x2d0 [ 39.802277] ret_from_fork+0x10/0x20 [ 39.802689] [ 39.803068] Freed by task 248: [ 39.803924] kasan_save_stack+0x3c/0x68 [ 39.804499] kasan_save_track+0x20/0x40 [ 39.805895] kasan_save_free_info+0x4c/0x78 [ 39.806533] __kasan_slab_free+0x6c/0x98 [ 39.807106] kfree+0x114/0x3d0 [ 39.807641] kasan_strings+0x128/0x8f8 [ 39.808221] kunit_try_run_case+0x14c/0x3d0 [ 39.808904] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.809882] kthread+0x24c/0x2d0 [ 39.810230] ret_from_fork+0x10/0x20 [ 39.810851] [ 39.811245] The buggy address belongs to the object at fff00000c65a90c0 [ 39.811245] which belongs to the cache kmalloc-32 of size 32 [ 39.812489] The buggy address is located 16 bytes inside of [ 39.812489] freed 32-byte region [fff00000c65a90c0, fff00000c65a90e0) [ 39.813828] [ 39.814167] The buggy address belongs to the physical page: [ 39.814852] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a9 [ 39.815863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.816538] page_type: f5(slab) [ 39.817070] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 39.818299] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 39.819102] page dumped because: kasan: bad access detected [ 39.819921] [ 39.820286] Memory state around the buggy address: [ 39.820875] fff00000c65a8f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.822194] fff00000c65a9000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 39.823368] >fff00000c65a9080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 39.823784] ^ [ 39.824088] fff00000c65a9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.824464] fff00000c65a9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.825165] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strrchr
[ 39.731603] ================================================================== [ 39.732366] BUG: KASAN: slab-use-after-free in strrchr+0x6c/0x78 [ 39.733187] Read of size 1 at addr fff00000c65a90d0 by task kunit_try_catch/248 [ 39.734816] [ 39.735139] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 39.736352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.736885] Hardware name: linux,dummy-virt (DT) [ 39.737166] Call trace: [ 39.738191] show_stack+0x20/0x38 (C) [ 39.738991] dump_stack_lvl+0x8c/0xd0 [ 39.739687] print_report+0x118/0x5e0 [ 39.740395] kasan_report+0xc8/0x118 [ 39.741130] __asan_report_load1_noabort+0x20/0x30 [ 39.742136] strrchr+0x6c/0x78 [ 39.742561] kasan_strings+0x1e0/0x8f8 [ 39.743100] kunit_try_run_case+0x14c/0x3d0 [ 39.744359] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.745070] kthread+0x24c/0x2d0 [ 39.745610] ret_from_fork+0x10/0x20 [ 39.746662] [ 39.746974] Allocated by task 248: [ 39.747433] kasan_save_stack+0x3c/0x68 [ 39.747948] kasan_save_track+0x20/0x40 [ 39.748502] kasan_save_alloc_info+0x40/0x58 [ 39.749023] __kasan_kmalloc+0xd4/0xd8 [ 39.749675] __kmalloc_cache_noprof+0x15c/0x3c8 [ 39.751163] kasan_strings+0xb4/0x8f8 [ 39.751861] kunit_try_run_case+0x14c/0x3d0 [ 39.752591] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.753555] kthread+0x24c/0x2d0 [ 39.754182] ret_from_fork+0x10/0x20 [ 39.754689] [ 39.755068] Freed by task 248: [ 39.755535] kasan_save_stack+0x3c/0x68 [ 39.756180] kasan_save_track+0x20/0x40 [ 39.756745] kasan_save_free_info+0x4c/0x78 [ 39.757518] __kasan_slab_free+0x6c/0x98 [ 39.758342] kfree+0x114/0x3d0 [ 39.758877] kasan_strings+0x128/0x8f8 [ 39.759473] kunit_try_run_case+0x14c/0x3d0 [ 39.760142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.760864] kthread+0x24c/0x2d0 [ 39.761643] ret_from_fork+0x10/0x20 [ 39.762396] [ 39.762904] The buggy address belongs to the object at fff00000c65a90c0 [ 39.762904] which belongs to the cache kmalloc-32 of size 32 [ 39.764318] The buggy address is located 16 bytes inside of [ 39.764318] freed 32-byte region [fff00000c65a90c0, fff00000c65a90e0) [ 39.766151] [ 39.766505] The buggy address belongs to the physical page: [ 39.767111] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a9 [ 39.768290] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.769156] page_type: f5(slab) [ 39.769681] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 39.770259] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 39.771014] page dumped because: kasan: bad access detected [ 39.771721] [ 39.772068] Memory state around the buggy address: [ 39.772771] fff00000c65a8f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.773851] fff00000c65a9000: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc [ 39.774946] >fff00000c65a9080: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 39.775840] ^ [ 39.776625] fff00000c65a9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.777817] fff00000c65a9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.778761] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strchr
[ 39.684719] ================================================================== [ 39.686405] BUG: KASAN: slab-use-after-free in strchr+0xcc/0xd8 [ 39.687249] Read of size 1 at addr fff00000c65a90d0 by task kunit_try_catch/248 [ 39.688288] [ 39.688716] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 39.690045] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.690552] Hardware name: linux,dummy-virt (DT) [ 39.691173] Call trace: [ 39.691543] show_stack+0x20/0x38 (C) [ 39.692161] dump_stack_lvl+0x8c/0xd0 [ 39.692740] print_report+0x118/0x5e0 [ 39.693264] kasan_report+0xc8/0x118 [ 39.693796] __asan_report_load1_noabort+0x20/0x30 [ 39.694500] strchr+0xcc/0xd8 [ 39.695038] kasan_strings+0x180/0x8f8 [ 39.695954] kunit_try_run_case+0x14c/0x3d0 [ 39.696581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.697202] kthread+0x24c/0x2d0 [ 39.698023] ret_from_fork+0x10/0x20 [ 39.698605] [ 39.698961] Allocated by task 248: [ 39.699456] kasan_save_stack+0x3c/0x68 [ 39.700048] kasan_save_track+0x20/0x40 [ 39.700565] kasan_save_alloc_info+0x40/0x58 [ 39.701186] __kasan_kmalloc+0xd4/0xd8 [ 39.702000] __kmalloc_cache_noprof+0x15c/0x3c8 [ 39.702664] kasan_strings+0xb4/0x8f8 [ 39.703178] kunit_try_run_case+0x14c/0x3d0 [ 39.703788] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.704401] kthread+0x24c/0x2d0 [ 39.704987] ret_from_fork+0x10/0x20 [ 39.705998] [ 39.706311] Freed by task 248: [ 39.706760] kasan_save_stack+0x3c/0x68 [ 39.707295] kasan_save_track+0x20/0x40 [ 39.707899] kasan_save_free_info+0x4c/0x78 [ 39.708547] __kasan_slab_free+0x6c/0x98 [ 39.709075] kfree+0x114/0x3d0 [ 39.710038] kasan_strings+0x128/0x8f8 [ 39.710655] kunit_try_run_case+0x14c/0x3d0 [ 39.711224] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.711803] kthread+0x24c/0x2d0 [ 39.712282] ret_from_fork+0x10/0x20 [ 39.712835] [ 39.713134] The buggy address belongs to the object at fff00000c65a90c0 [ 39.713134] which belongs to the cache kmalloc-32 of size 32 [ 39.714307] The buggy address is located 16 bytes inside of [ 39.714307] freed 32-byte region [fff00000c65a90c0, fff00000c65a90e0) [ 39.715993] [ 39.716317] The buggy address belongs to the physical page: [ 39.717022] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a9 [ 39.718488] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.719194] page_type: f5(slab) [ 39.719741] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 39.720641] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 39.721387] page dumped because: kasan: bad access detected [ 39.722276] [ 39.722633] Memory state around the buggy address: [ 39.723210] fff00000c65a8f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.724045] fff00000c65a9000: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 39.724961] >fff00000c65a9080: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 39.726373] ^ [ 39.727299] fff00000c65a9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.728320] fff00000c65a9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.729019] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 39.635006] ================================================================== [ 39.636480] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 39.637161] Read of size 1 at addr fff00000c65bf858 by task kunit_try_catch/246 [ 39.638593] [ 39.638976] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 39.639996] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.640662] Hardware name: linux,dummy-virt (DT) [ 39.641215] Call trace: [ 39.642009] show_stack+0x20/0x38 (C) [ 39.642639] dump_stack_lvl+0x8c/0xd0 [ 39.643205] print_report+0x118/0x5e0 [ 39.643846] kasan_report+0xc8/0x118 [ 39.644423] __asan_report_load1_noabort+0x20/0x30 [ 39.645074] memcmp+0x198/0x1d8 [ 39.645722] kasan_memcmp+0x16c/0x300 [ 39.646705] kunit_try_run_case+0x14c/0x3d0 [ 39.647332] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.647897] kthread+0x24c/0x2d0 [ 39.648306] ret_from_fork+0x10/0x20 [ 39.648990] [ 39.649674] Allocated by task 246: [ 39.650190] kasan_save_stack+0x3c/0x68 [ 39.650647] kasan_save_track+0x20/0x40 [ 39.651669] kasan_save_alloc_info+0x40/0x58 [ 39.652384] __kasan_kmalloc+0xd4/0xd8 [ 39.653020] __kmalloc_cache_noprof+0x15c/0x3c8 [ 39.653829] kasan_memcmp+0xbc/0x300 [ 39.654549] kunit_try_run_case+0x14c/0x3d0 [ 39.655304] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.656036] kthread+0x24c/0x2d0 [ 39.656385] ret_from_fork+0x10/0x20 [ 39.656793] [ 39.657224] The buggy address belongs to the object at fff00000c65bf840 [ 39.657224] which belongs to the cache kmalloc-32 of size 32 [ 39.659383] The buggy address is located 0 bytes to the right of [ 39.659383] allocated 24-byte region [fff00000c65bf840, fff00000c65bf858) [ 39.661037] [ 39.661580] The buggy address belongs to the physical page: [ 39.662573] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bf [ 39.663354] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.664228] page_type: f5(slab) [ 39.664702] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 39.666281] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 39.666941] page dumped because: kasan: bad access detected [ 39.667672] [ 39.668055] Memory state around the buggy address: [ 39.668633] fff00000c65bf700: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc [ 39.669373] fff00000c65bf780: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 39.670518] >fff00000c65bf800: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 39.671480] ^ [ 39.672154] fff00000c65bf880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.673164] fff00000c65bf900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.674246] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memchr
[ 39.582319] ================================================================== [ 39.583546] BUG: KASAN: slab-out-of-bounds in memchr+0x78/0x88 [ 39.584274] Read of size 1 at addr fff00000c65bf718 by task kunit_try_catch/244 [ 39.585466] [ 39.585837] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 39.587164] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.587636] Hardware name: linux,dummy-virt (DT) [ 39.588148] Call trace: [ 39.588607] show_stack+0x20/0x38 (C) [ 39.589168] dump_stack_lvl+0x8c/0xd0 [ 39.589838] print_report+0x118/0x5e0 [ 39.590420] kasan_report+0xc8/0x118 [ 39.590997] __asan_report_load1_noabort+0x20/0x30 [ 39.591897] memchr+0x78/0x88 [ 39.592426] kasan_memchr+0x148/0x2d8 [ 39.593072] kunit_try_run_case+0x14c/0x3d0 [ 39.594046] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.594669] kthread+0x24c/0x2d0 [ 39.595269] ret_from_fork+0x10/0x20 [ 39.595804] [ 39.596146] Allocated by task 244: [ 39.596689] kasan_save_stack+0x3c/0x68 [ 39.597274] kasan_save_track+0x20/0x40 [ 39.597780] kasan_save_alloc_info+0x40/0x58 [ 39.598401] __kasan_kmalloc+0xd4/0xd8 [ 39.599300] __kmalloc_cache_noprof+0x15c/0x3c8 [ 39.599884] kasan_memchr+0xb0/0x2d8 [ 39.600435] kunit_try_run_case+0x14c/0x3d0 [ 39.601522] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.602196] kthread+0x24c/0x2d0 [ 39.602681] ret_from_fork+0x10/0x20 [ 39.603248] [ 39.604080] The buggy address belongs to the object at fff00000c65bf700 [ 39.604080] which belongs to the cache kmalloc-32 of size 32 [ 39.605537] The buggy address is located 0 bytes to the right of [ 39.605537] allocated 24-byte region [fff00000c65bf700, fff00000c65bf718) [ 39.606794] [ 39.607163] The buggy address belongs to the physical page: [ 39.607780] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bf [ 39.608680] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.609878] page_type: f5(slab) [ 39.610772] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 39.611539] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 39.612409] page dumped because: kasan: bad access detected [ 39.613160] [ 39.613535] Memory state around the buggy address: [ 39.614259] fff00000c65bf600: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 39.614997] fff00000c65bf680: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 39.615972] >fff00000c65bf700: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.616828] ^ [ 39.617503] fff00000c65bf780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.618281] fff00000c65bf800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.619297] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 39.539131] ================================================================== [ 39.540552] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2e4/0x348 [ 39.541645] Read of size 1 at addr ffff8000809c7bea by task kunit_try_catch/242 [ 39.543438] [ 39.543905] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 39.545097] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.545677] Hardware name: linux,dummy-virt (DT) [ 39.546242] Call trace: [ 39.546691] show_stack+0x20/0x38 (C) [ 39.547268] dump_stack_lvl+0x8c/0xd0 [ 39.548278] print_report+0x2fc/0x5e0 [ 39.548884] kasan_report+0xc8/0x118 [ 39.549563] __asan_report_load1_noabort+0x20/0x30 [ 39.550428] kasan_alloca_oob_right+0x2e4/0x348 [ 39.551635] kunit_try_run_case+0x14c/0x3d0 [ 39.552376] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.553150] kthread+0x24c/0x2d0 [ 39.553743] ret_from_fork+0x10/0x20 [ 39.554397] [ 39.554767] The buggy address belongs to stack of task kunit_try_catch/242 [ 39.555582] [ 39.555894] The buggy address belongs to the virtual mapping at [ 39.555894] [ffff8000809c0000, ffff8000809c9000) created by: [ 39.555894] kernel_clone+0x140/0x790 [ 39.557908] [ 39.558256] The buggy address belongs to the physical page: [ 39.558923] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106589 [ 39.560491] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.561283] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 39.562499] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.563435] page dumped because: kasan: bad access detected [ 39.564096] [ 39.564487] Memory state around the buggy address: [ 39.565077] ffff8000809c7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.566183] ffff8000809c7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.567318] >ffff8000809c7b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 39.567992] ^ [ 39.568738] ffff8000809c7c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 [ 39.569641] ffff8000809c7c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 [ 39.570420] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 39.500345] ================================================================== [ 39.501653] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 39.502574] Read of size 1 at addr ffff800080ad7bdf by task kunit_try_catch/240 [ 39.503202] [ 39.503609] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 39.504766] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.505365] Hardware name: linux,dummy-virt (DT) [ 39.506396] Call trace: [ 39.506977] show_stack+0x20/0x38 (C) [ 39.507926] dump_stack_lvl+0x8c/0xd0 [ 39.508638] print_report+0x2fc/0x5e0 [ 39.509656] kasan_report+0xc8/0x118 [ 39.510211] __asan_report_load1_noabort+0x20/0x30 [ 39.510820] kasan_alloca_oob_left+0x2b8/0x310 [ 39.511361] kunit_try_run_case+0x14c/0x3d0 [ 39.512044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.512842] kthread+0x24c/0x2d0 [ 39.513373] ret_from_fork+0x10/0x20 [ 39.514158] [ 39.514524] The buggy address belongs to stack of task kunit_try_catch/240 [ 39.515327] [ 39.515761] The buggy address belongs to the virtual mapping at [ 39.515761] [ffff800080ad0000, ffff800080ad9000) created by: [ 39.515761] kernel_clone+0x140/0x790 [ 39.517163] [ 39.518062] The buggy address belongs to the physical page: [ 39.518766] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10655d [ 39.519587] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.520305] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 39.521193] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.522249] page dumped because: kasan: bad access detected [ 39.522883] [ 39.523220] Memory state around the buggy address: [ 39.523742] ffff800080ad7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.524583] ffff800080ad7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.525622] >ffff800080ad7b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 39.526245] ^ [ 39.527017] ffff800080ad7c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 [ 39.527806] ffff800080ad7c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 [ 39.528619] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 39.454783] ================================================================== [ 39.456158] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x230/0x268 [ 39.456821] Read of size 1 at addr ffff800080a87cba by task kunit_try_catch/238 [ 39.457498] [ 39.457863] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 39.459072] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.459548] Hardware name: linux,dummy-virt (DT) [ 39.460407] Call trace: [ 39.460854] show_stack+0x20/0x38 (C) [ 39.462199] dump_stack_lvl+0x8c/0xd0 [ 39.462746] print_report+0x2fc/0x5e0 [ 39.463408] kasan_report+0xc8/0x118 [ 39.464121] __asan_report_load1_noabort+0x20/0x30 [ 39.464963] kasan_stack_oob+0x230/0x268 [ 39.465699] kunit_try_run_case+0x14c/0x3d0 [ 39.466209] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.467087] kthread+0x24c/0x2d0 [ 39.467613] ret_from_fork+0x10/0x20 [ 39.468279] [ 39.468756] The buggy address belongs to stack of task kunit_try_catch/238 [ 39.469974] and is located at offset 138 in frame: [ 39.470539] kasan_stack_oob+0x0/0x268 [ 39.471327] [ 39.471702] This frame has 4 objects: [ 39.472416] [48, 49) '__assertion' [ 39.472612] [64, 72) 'array' [ 39.473075] [96, 112) '__assertion' [ 39.473840] [128, 138) 'stack_array' [ 39.474304] [ 39.475121] The buggy address belongs to the virtual mapping at [ 39.475121] [ffff800080a80000, ffff800080a89000) created by: [ 39.475121] kernel_clone+0x140/0x790 [ 39.476664] [ 39.476998] The buggy address belongs to the physical page: [ 39.478677] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10658c [ 39.479782] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.480754] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 39.482117] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.482908] page dumped because: kasan: bad access detected [ 39.483516] [ 39.483821] Memory state around the buggy address: [ 39.484393] ffff800080a87b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.485192] ffff800080a87c00: 00 00 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 [ 39.486287] >ffff800080a87c80: f2 f2 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 [ 39.487370] ^ [ 39.488170] ffff800080a87d00: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 [ 39.489135] ffff800080a87d80: f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 [ 39.490143] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 39.402406] ================================================================== [ 39.403752] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 39.404686] Read of size 1 at addr ffffa2dae98da06d by task kunit_try_catch/234 [ 39.405551] [ 39.406633] CPU: 1 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 39.407802] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.408376] Hardware name: linux,dummy-virt (DT) [ 39.409273] Call trace: [ 39.409723] show_stack+0x20/0x38 (C) [ 39.410894] dump_stack_lvl+0x8c/0xd0 [ 39.411566] print_report+0x2fc/0x5e0 [ 39.412148] kasan_report+0xc8/0x118 [ 39.412694] __asan_report_load1_noabort+0x20/0x30 [ 39.413633] kasan_global_oob_right+0x230/0x270 [ 39.414917] kunit_try_run_case+0x14c/0x3d0 [ 39.415605] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.416403] kthread+0x24c/0x2d0 [ 39.417052] ret_from_fork+0x10/0x20 [ 39.418132] [ 39.418579] The buggy address belongs to the variable: [ 39.419230] global_array+0xd/0x40 [ 39.419745] [ 39.420293] The buggy address belongs to the virtual mapping at [ 39.420293] [ffffa2dae7c20000, ffffa2dae9991000) created by: [ 39.420293] paging_init+0x668/0x7c8 [ 39.422017] [ 39.422691] The buggy address belongs to the physical page: [ 39.423372] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x478da [ 39.425055] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 39.426301] raw: 03fffe0000002000 ffffc1ffc01e3688 ffffc1ffc01e3688 0000000000000000 [ 39.427136] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.427936] page dumped because: kasan: bad access detected [ 39.428564] [ 39.428908] Memory state around the buggy address: [ 39.430195] ffffa2dae98d9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.430925] ffffa2dae98d9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.431746] >ffffa2dae98da000: 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 [ 39.432649] ^ [ 39.433884] ffffa2dae98da080: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 [ 39.434639] ffffa2dae98da100: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 [ 39.435402] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 39.298239] ================================================================== [ 39.299612] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 39.300350] Free of addr fff00000c65ba801 by task kunit_try_catch/230 [ 39.301226] [ 39.301780] CPU: 0 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 39.303571] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.304152] Hardware name: linux,dummy-virt (DT) [ 39.305351] Call trace: [ 39.305771] show_stack+0x20/0x38 (C) [ 39.306216] dump_stack_lvl+0x8c/0xd0 [ 39.306647] print_report+0x118/0x5e0 [ 39.307064] kasan_report_invalid_free+0xb0/0xd8 [ 39.308212] check_slab_allocation+0xfc/0x108 [ 39.311114] __kasan_mempool_poison_object+0x78/0x150 [ 39.311796] mempool_free+0x28c/0x328 [ 39.312341] mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 39.314705] mempool_kmalloc_invalid_free+0xb8/0x110 [ 39.315221] kunit_try_run_case+0x14c/0x3d0 [ 39.315705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.316265] kthread+0x24c/0x2d0 [ 39.319176] ret_from_fork+0x10/0x20 [ 39.319827] [ 39.320169] Allocated by task 230: [ 39.320951] kasan_save_stack+0x3c/0x68 [ 39.322133] kasan_save_track+0x20/0x40 [ 39.323162] kasan_save_alloc_info+0x40/0x58 [ 39.324269] __kasan_mempool_unpoison_object+0x11c/0x180 [ 39.324935] remove_element+0x130/0x1f8 [ 39.326676] mempool_alloc_preallocated+0x58/0xc0 [ 39.327332] mempool_kmalloc_invalid_free_helper+0x94/0x2a0 [ 39.328113] mempool_kmalloc_invalid_free+0xb8/0x110 [ 39.328895] kunit_try_run_case+0x14c/0x3d0 [ 39.329801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.330725] kthread+0x24c/0x2d0 [ 39.331177] ret_from_fork+0x10/0x20 [ 39.331638] [ 39.331916] The buggy address belongs to the object at fff00000c65ba800 [ 39.331916] which belongs to the cache kmalloc-128 of size 128 [ 39.333206] The buggy address is located 1 bytes inside of [ 39.333206] 128-byte region [fff00000c65ba800, fff00000c65ba880) [ 39.335097] [ 39.335432] The buggy address belongs to the physical page: [ 39.336056] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ba [ 39.336759] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.337985] page_type: f5(slab) [ 39.338833] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 39.339758] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 39.340576] page dumped because: kasan: bad access detected [ 39.341242] [ 39.341586] Memory state around the buggy address: [ 39.342049] fff00000c65ba700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 39.342925] fff00000c65ba780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.344350] >fff00000c65ba800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.345702] ^ [ 39.346186] fff00000c65ba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.346833] fff00000c65ba900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.347693] ================================================================== [ 39.359075] ================================================================== [ 39.360187] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 39.361046] Free of addr fff00000c6c18001 by task kunit_try_catch/232 [ 39.362284] [ 39.363118] CPU: 0 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 39.364075] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.364633] Hardware name: linux,dummy-virt (DT) [ 39.365484] Call trace: [ 39.365861] show_stack+0x20/0x38 (C) [ 39.366831] dump_stack_lvl+0x8c/0xd0 [ 39.367423] print_report+0x118/0x5e0 [ 39.368311] kasan_report_invalid_free+0xb0/0xd8 [ 39.369048] __kasan_mempool_poison_object+0xfc/0x150 [ 39.369613] mempool_free+0x28c/0x328 [ 39.370264] mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 39.371065] mempool_kmalloc_large_invalid_free+0xb8/0x110 [ 39.371927] kunit_try_run_case+0x14c/0x3d0 [ 39.372657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.373495] kthread+0x24c/0x2d0 [ 39.373996] ret_from_fork+0x10/0x20 [ 39.374536] [ 39.374929] The buggy address belongs to the physical page: [ 39.375619] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c18 [ 39.376342] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 39.377247] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 39.378052] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 39.378923] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.379783] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 39.380585] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.381383] head: 0bfffe0000000002 ffffc1ffc31b0601 ffffffffffffffff 0000000000000000 [ 39.382149] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 39.383011] page dumped because: kasan: bad access detected [ 39.383638] [ 39.383971] Memory state around the buggy address: [ 39.384594] fff00000c6c17f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.385413] fff00000c6c17f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.386156] >fff00000c6c18000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.386869] ^ [ 39.387374] fff00000c6c18080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.388182] fff00000c6c18100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.388804] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 39.259923] ================================================================== [ 39.260980] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 39.262887] Free of addr fff00000c6c18000 by task kunit_try_catch/228 [ 39.263552] [ 39.263934] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 39.265015] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.265622] Hardware name: linux,dummy-virt (DT) [ 39.266113] Call trace: [ 39.266822] show_stack+0x20/0x38 (C) [ 39.267516] dump_stack_lvl+0x8c/0xd0 [ 39.268054] print_report+0x118/0x5e0 [ 39.268707] kasan_report_invalid_free+0xb0/0xd8 [ 39.269376] __kasan_mempool_poison_pages+0xe0/0xe8 [ 39.270193] mempool_free+0x24c/0x328 [ 39.270704] mempool_double_free_helper+0x150/0x2e0 [ 39.271392] mempool_page_alloc_double_free+0xb4/0x110 [ 39.272111] kunit_try_run_case+0x14c/0x3d0 [ 39.272677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.273378] kthread+0x24c/0x2d0 [ 39.274017] ret_from_fork+0x10/0x20 [ 39.274663] [ 39.275333] The buggy address belongs to the physical page: [ 39.276302] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c18 [ 39.277156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.278083] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 39.279313] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.280501] page dumped because: kasan: bad access detected [ 39.281185] [ 39.281812] Memory state around the buggy address: [ 39.282730] fff00000c6c17f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.283617] fff00000c6c17f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.284395] >fff00000c6c18000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.285204] ^ [ 39.285916] fff00000c6c18080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.286538] fff00000c6c18100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.287078] ================================================================== [ 39.216934] ================================================================== [ 39.218660] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 39.219416] Free of addr fff00000c6c18000 by task kunit_try_catch/226 [ 39.220053] [ 39.220501] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 39.221725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.222278] Hardware name: linux,dummy-virt (DT) [ 39.222952] Call trace: [ 39.223684] show_stack+0x20/0x38 (C) [ 39.224166] dump_stack_lvl+0x8c/0xd0 [ 39.224754] print_report+0x118/0x5e0 [ 39.225396] kasan_report_invalid_free+0xb0/0xd8 [ 39.225987] __kasan_mempool_poison_object+0x14c/0x150 [ 39.226925] mempool_free+0x28c/0x328 [ 39.227499] mempool_double_free_helper+0x150/0x2e0 [ 39.228189] mempool_kmalloc_large_double_free+0xb8/0x110 [ 39.229425] kunit_try_run_case+0x14c/0x3d0 [ 39.230271] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.231103] kthread+0x24c/0x2d0 [ 39.231737] ret_from_fork+0x10/0x20 [ 39.232477] [ 39.232968] The buggy address belongs to the physical page: [ 39.233972] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c18 [ 39.234607] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 39.235389] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 39.236314] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 39.236984] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.238062] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 39.238899] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.239547] head: 0bfffe0000000002 ffffc1ffc31b0601 ffffffffffffffff 0000000000000000 [ 39.240472] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 39.241235] page dumped because: kasan: bad access detected [ 39.242187] [ 39.242546] Memory state around the buggy address: [ 39.243200] fff00000c6c17f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.243798] fff00000c6c17f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.244650] >fff00000c6c18000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.245418] ^ [ 39.246042] fff00000c6c18080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.246991] fff00000c6c18100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.247887] ================================================================== [ 39.156405] ================================================================== [ 39.157419] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 39.158241] Free of addr fff00000c6599a00 by task kunit_try_catch/224 [ 39.158917] [ 39.159263] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 39.161539] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.162365] Hardware name: linux,dummy-virt (DT) [ 39.163424] Call trace: [ 39.163817] show_stack+0x20/0x38 (C) [ 39.164369] dump_stack_lvl+0x8c/0xd0 [ 39.164948] print_report+0x118/0x5e0 [ 39.165581] kasan_report_invalid_free+0xb0/0xd8 [ 39.166494] check_slab_allocation+0xd4/0x108 [ 39.166891] __kasan_mempool_poison_object+0x78/0x150 [ 39.167600] mempool_free+0x28c/0x328 [ 39.168152] mempool_double_free_helper+0x150/0x2e0 [ 39.168845] mempool_kmalloc_double_free+0xb8/0x110 [ 39.169421] kunit_try_run_case+0x14c/0x3d0 [ 39.170092] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.170762] kthread+0x24c/0x2d0 [ 39.171256] ret_from_fork+0x10/0x20 [ 39.171825] [ 39.172164] Allocated by task 224: [ 39.172692] kasan_save_stack+0x3c/0x68 [ 39.173314] kasan_save_track+0x20/0x40 [ 39.174199] kasan_save_alloc_info+0x40/0x58 [ 39.174704] __kasan_mempool_unpoison_object+0x11c/0x180 [ 39.175465] remove_element+0x130/0x1f8 [ 39.176050] mempool_alloc_preallocated+0x58/0xc0 [ 39.176715] mempool_double_free_helper+0x94/0x2e0 [ 39.177319] mempool_kmalloc_double_free+0xb8/0x110 [ 39.177985] kunit_try_run_case+0x14c/0x3d0 [ 39.178507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.179223] kthread+0x24c/0x2d0 [ 39.179693] ret_from_fork+0x10/0x20 [ 39.180620] [ 39.181429] Freed by task 224: [ 39.181975] kasan_save_stack+0x3c/0x68 [ 39.182642] kasan_save_track+0x20/0x40 [ 39.183399] kasan_save_free_info+0x4c/0x78 [ 39.184057] __kasan_mempool_poison_object+0xc0/0x150 [ 39.184710] mempool_free+0x28c/0x328 [ 39.185275] mempool_double_free_helper+0x100/0x2e0 [ 39.185912] mempool_kmalloc_double_free+0xb8/0x110 [ 39.186511] kunit_try_run_case+0x14c/0x3d0 [ 39.187053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.188020] kthread+0x24c/0x2d0 [ 39.188610] ret_from_fork+0x10/0x20 [ 39.189117] [ 39.189476] The buggy address belongs to the object at fff00000c6599a00 [ 39.189476] which belongs to the cache kmalloc-128 of size 128 [ 39.191093] The buggy address is located 0 bytes inside of [ 39.191093] 128-byte region [fff00000c6599a00, fff00000c6599a80) [ 39.192232] [ 39.192603] The buggy address belongs to the physical page: [ 39.193566] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106599 [ 39.194426] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.195106] page_type: f5(slab) [ 39.195667] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 39.196510] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 39.197459] page dumped because: kasan: bad access detected [ 39.198203] [ 39.198539] Memory state around the buggy address: [ 39.199618] fff00000c6599900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 39.200706] fff00000c6599980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.201781] >fff00000c6599a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 39.202762] ^ [ 39.203341] fff00000c6599a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.204129] fff00000c6599b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.204928] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 39.002076] ================================================================== [ 39.003137] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 39.004299] Read of size 1 at addr fff00000c674c000 by task kunit_try_catch/218 [ 39.005008] [ 39.005318] CPU: 1 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 39.007754] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.008300] Hardware name: linux,dummy-virt (DT) [ 39.008857] Call trace: [ 39.009536] show_stack+0x20/0x38 (C) [ 39.010358] dump_stack_lvl+0x8c/0xd0 [ 39.010971] print_report+0x118/0x5e0 [ 39.011541] kasan_report+0xc8/0x118 [ 39.012714] __asan_report_load1_noabort+0x20/0x30 [ 39.013633] mempool_uaf_helper+0x314/0x340 [ 39.014517] mempool_kmalloc_large_uaf+0xbc/0x118 [ 39.015142] kunit_try_run_case+0x14c/0x3d0 [ 39.015744] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.016433] kthread+0x24c/0x2d0 [ 39.017007] ret_from_fork+0x10/0x20 [ 39.017965] [ 39.018228] The buggy address belongs to the physical page: [ 39.018695] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10674c [ 39.019378] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 39.020279] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 39.021094] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 39.022484] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.023253] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 39.024248] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.025261] head: 0bfffe0000000002 ffffc1ffc319d301 ffffffffffffffff 0000000000000000 [ 39.026350] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 39.027590] page dumped because: kasan: bad access detected [ 39.028501] [ 39.028822] Memory state around the buggy address: [ 39.029619] fff00000c674bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.030815] fff00000c674bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.031706] >fff00000c674c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.032706] ^ [ 39.033357] fff00000c674c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.034511] fff00000c674c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.035771] ================================================================== [ 39.119681] ================================================================== [ 39.120734] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 39.121521] Read of size 1 at addr fff00000c67f8000 by task kunit_try_catch/222 [ 39.122323] [ 39.122744] CPU: 1 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 39.124185] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.124777] Hardware name: linux,dummy-virt (DT) [ 39.126404] Call trace: [ 39.126818] show_stack+0x20/0x38 (C) [ 39.127420] dump_stack_lvl+0x8c/0xd0 [ 39.128034] print_report+0x118/0x5e0 [ 39.128660] kasan_report+0xc8/0x118 [ 39.129158] __asan_report_load1_noabort+0x20/0x30 [ 39.129850] mempool_uaf_helper+0x314/0x340 [ 39.130355] mempool_page_alloc_uaf+0xb8/0x118 [ 39.131014] kunit_try_run_case+0x14c/0x3d0 [ 39.131665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.132348] kthread+0x24c/0x2d0 [ 39.132856] ret_from_fork+0x10/0x20 [ 39.133324] [ 39.133689] The buggy address belongs to the physical page: [ 39.134368] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1067f8 [ 39.135187] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.136047] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 39.136896] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.137703] page dumped because: kasan: bad access detected [ 39.138237] [ 39.138586] Memory state around the buggy address: [ 39.139173] fff00000c67f7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.139954] fff00000c67f7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.140686] >fff00000c67f8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.141473] ^ [ 39.141952] fff00000c67f8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.142735] fff00000c67f8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.143553] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 38.946196] ================================================================== [ 38.947332] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 38.948232] Read of size 1 at addr fff00000c652ee00 by task kunit_try_catch/216 [ 38.948886] [ 38.949340] CPU: 0 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 38.950429] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.951089] Hardware name: linux,dummy-virt (DT) [ 38.951836] Call trace: [ 38.952372] show_stack+0x20/0x38 (C) [ 38.953025] dump_stack_lvl+0x8c/0xd0 [ 38.953624] print_report+0x118/0x5e0 [ 38.954206] kasan_report+0xc8/0x118 [ 38.954800] __asan_report_load1_noabort+0x20/0x30 [ 38.955433] mempool_uaf_helper+0x314/0x340 [ 38.956087] mempool_kmalloc_uaf+0xbc/0x118 [ 38.956717] kunit_try_run_case+0x14c/0x3d0 [ 38.957386] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.958117] kthread+0x24c/0x2d0 [ 38.958668] ret_from_fork+0x10/0x20 [ 38.959214] [ 38.959533] Allocated by task 216: [ 38.960049] kasan_save_stack+0x3c/0x68 [ 38.960645] kasan_save_track+0x20/0x40 [ 38.961234] kasan_save_alloc_info+0x40/0x58 [ 38.961900] __kasan_mempool_unpoison_object+0x11c/0x180 [ 38.962540] remove_element+0x130/0x1f8 [ 38.963154] mempool_alloc_preallocated+0x58/0xc0 [ 38.963759] mempool_uaf_helper+0xa4/0x340 [ 38.964389] mempool_kmalloc_uaf+0xbc/0x118 [ 38.964954] kunit_try_run_case+0x14c/0x3d0 [ 38.965617] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.966256] kthread+0x24c/0x2d0 [ 38.966826] ret_from_fork+0x10/0x20 [ 38.967322] [ 38.967706] Freed by task 216: [ 38.968210] kasan_save_stack+0x3c/0x68 [ 38.968757] kasan_save_track+0x20/0x40 [ 38.969368] kasan_save_free_info+0x4c/0x78 [ 38.969967] __kasan_mempool_poison_object+0xc0/0x150 [ 38.970689] mempool_free+0x28c/0x328 [ 38.971181] mempool_uaf_helper+0x104/0x340 [ 38.971827] mempool_kmalloc_uaf+0xbc/0x118 [ 38.972414] kunit_try_run_case+0x14c/0x3d0 [ 38.973023] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.973674] kthread+0x24c/0x2d0 [ 38.974233] ret_from_fork+0x10/0x20 [ 38.974760] [ 38.975085] The buggy address belongs to the object at fff00000c652ee00 [ 38.975085] which belongs to the cache kmalloc-128 of size 128 [ 38.976383] The buggy address is located 0 bytes inside of [ 38.976383] freed 128-byte region [fff00000c652ee00, fff00000c652ee80) [ 38.977617] [ 38.977975] The buggy address belongs to the physical page: [ 38.978701] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10652e [ 38.979628] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.980433] page_type: f5(slab) [ 38.980961] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 38.981863] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 38.982699] page dumped because: kasan: bad access detected [ 38.983325] [ 38.983692] Memory state around the buggy address: [ 38.984346] fff00000c652ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.985119] fff00000c652ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.985886] >fff00000c652ee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.986648] ^ [ 38.987101] fff00000c652ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.987919] fff00000c652ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.988806] ================================================================== [ 39.049087] ================================================================== [ 39.050278] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 39.051162] Read of size 1 at addr fff00000c1bed240 by task kunit_try_catch/220 [ 39.051997] [ 39.052384] CPU: 1 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 39.053652] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.055076] Hardware name: linux,dummy-virt (DT) [ 39.055571] Call trace: [ 39.055867] show_stack+0x20/0x38 (C) [ 39.056355] dump_stack_lvl+0x8c/0xd0 [ 39.057055] print_report+0x118/0x5e0 [ 39.057627] kasan_report+0xc8/0x118 [ 39.058106] __asan_report_load1_noabort+0x20/0x30 [ 39.058833] mempool_uaf_helper+0x314/0x340 [ 39.059467] mempool_slab_uaf+0xb8/0x110 [ 39.060019] kunit_try_run_case+0x14c/0x3d0 [ 39.060986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.061714] kthread+0x24c/0x2d0 [ 39.062190] ret_from_fork+0x10/0x20 [ 39.063110] [ 39.063409] Allocated by task 220: [ 39.064162] kasan_save_stack+0x3c/0x68 [ 39.064779] kasan_save_track+0x20/0x40 [ 39.065412] kasan_save_alloc_info+0x40/0x58 [ 39.066857] __kasan_mempool_unpoison_object+0xbc/0x180 [ 39.067556] remove_element+0x16c/0x1f8 [ 39.068134] mempool_alloc_preallocated+0x58/0xc0 [ 39.068796] mempool_uaf_helper+0xa4/0x340 [ 39.069313] mempool_slab_uaf+0xb8/0x110 [ 39.070226] kunit_try_run_case+0x14c/0x3d0 [ 39.070732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.071410] kthread+0x24c/0x2d0 [ 39.071849] ret_from_fork+0x10/0x20 [ 39.072847] [ 39.073194] Freed by task 220: [ 39.073769] kasan_save_stack+0x3c/0x68 [ 39.074421] kasan_save_track+0x20/0x40 [ 39.075042] kasan_save_free_info+0x4c/0x78 [ 39.075712] __kasan_mempool_poison_object+0xc0/0x150 [ 39.076548] mempool_free+0x28c/0x328 [ 39.077199] mempool_uaf_helper+0x104/0x340 [ 39.078247] mempool_slab_uaf+0xb8/0x110 [ 39.078977] kunit_try_run_case+0x14c/0x3d0 [ 39.079585] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.080319] kthread+0x24c/0x2d0 [ 39.081210] ret_from_fork+0x10/0x20 [ 39.081816] [ 39.082211] The buggy address belongs to the object at fff00000c1bed240 [ 39.082211] which belongs to the cache test_cache of size 123 [ 39.083506] The buggy address is located 0 bytes inside of [ 39.083506] freed 123-byte region [fff00000c1bed240, fff00000c1bed2bb) [ 39.084766] [ 39.085226] The buggy address belongs to the physical page: [ 39.086266] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bed [ 39.088052] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.088935] page_type: f5(slab) [ 39.089588] raw: 0bfffe0000000000 fff00000c59d3a00 dead000000000122 0000000000000000 [ 39.090609] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000 [ 39.091585] page dumped because: kasan: bad access detected [ 39.092181] [ 39.092489] Memory state around the buggy address: [ 39.093242] fff00000c1bed100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.094464] fff00000c1bed180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 39.095307] >fff00000c1bed200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 39.096588] ^ [ 39.097129] fff00000c1bed280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.097800] fff00000c1bed300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.098364] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 38.785156] ================================================================== [ 38.786373] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 38.788182] Read of size 1 at addr fff00000c1bf0f73 by task kunit_try_catch/210 [ 38.789454] [ 38.790505] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 38.792296] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.792858] Hardware name: linux,dummy-virt (DT) [ 38.793764] Call trace: [ 38.794305] show_stack+0x20/0x38 (C) [ 38.794984] dump_stack_lvl+0x8c/0xd0 [ 38.795513] print_report+0x118/0x5e0 [ 38.796149] kasan_report+0xc8/0x118 [ 38.796785] __asan_report_load1_noabort+0x20/0x30 [ 38.797508] mempool_oob_right_helper+0x2ac/0x2f0 [ 38.797989] mempool_kmalloc_oob_right+0xbc/0x118 [ 38.798663] kunit_try_run_case+0x14c/0x3d0 [ 38.799200] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.799970] kthread+0x24c/0x2d0 [ 38.800551] ret_from_fork+0x10/0x20 [ 38.801146] [ 38.801465] Allocated by task 210: [ 38.802192] kasan_save_stack+0x3c/0x68 [ 38.802723] kasan_save_track+0x20/0x40 [ 38.803171] kasan_save_alloc_info+0x40/0x58 [ 38.803795] __kasan_mempool_unpoison_object+0x11c/0x180 [ 38.804385] remove_element+0x130/0x1f8 [ 38.805016] mempool_alloc_preallocated+0x58/0xc0 [ 38.805541] mempool_oob_right_helper+0x98/0x2f0 [ 38.806551] mempool_kmalloc_oob_right+0xbc/0x118 [ 38.807198] kunit_try_run_case+0x14c/0x3d0 [ 38.807776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.808396] kthread+0x24c/0x2d0 [ 38.808938] ret_from_fork+0x10/0x20 [ 38.809675] [ 38.810057] The buggy address belongs to the object at fff00000c1bf0f00 [ 38.810057] which belongs to the cache kmalloc-128 of size 128 [ 38.811738] The buggy address is located 0 bytes to the right of [ 38.811738] allocated 115-byte region [fff00000c1bf0f00, fff00000c1bf0f73) [ 38.813039] [ 38.813586] The buggy address belongs to the physical page: [ 38.814578] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf0 [ 38.815577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.816257] page_type: f5(slab) [ 38.816795] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 38.817921] raw: 0000000000000000 0000000000100010 00000001f5000000 0000000000000000 [ 38.818684] page dumped because: kasan: bad access detected [ 38.819294] [ 38.820006] Memory state around the buggy address: [ 38.820527] fff00000c1bf0e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.821909] fff00000c1bf0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.822619] >fff00000c1bf0f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 38.823310] ^ [ 38.824084] fff00000c1bf0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.824876] fff00000c1bf1000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.826211] ================================================================== [ 38.885066] ================================================================== [ 38.886552] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 38.887648] Read of size 1 at addr fff00000c65cd2bb by task kunit_try_catch/214 [ 38.888795] [ 38.889200] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 38.890633] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.891216] Hardware name: linux,dummy-virt (DT) [ 38.891765] Call trace: [ 38.892193] show_stack+0x20/0x38 (C) [ 38.892795] dump_stack_lvl+0x8c/0xd0 [ 38.893675] print_report+0x118/0x5e0 [ 38.894139] kasan_report+0xc8/0x118 [ 38.894671] __asan_report_load1_noabort+0x20/0x30 [ 38.895335] mempool_oob_right_helper+0x2ac/0x2f0 [ 38.895946] mempool_slab_oob_right+0xb8/0x110 [ 38.896536] kunit_try_run_case+0x14c/0x3d0 [ 38.897098] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.898175] kthread+0x24c/0x2d0 [ 38.898657] ret_from_fork+0x10/0x20 [ 38.899239] [ 38.899702] Allocated by task 214: [ 38.900109] kasan_save_stack+0x3c/0x68 [ 38.900725] kasan_save_track+0x20/0x40 [ 38.901615] kasan_save_alloc_info+0x40/0x58 [ 38.902237] __kasan_mempool_unpoison_object+0xbc/0x180 [ 38.902829] remove_element+0x16c/0x1f8 [ 38.903410] mempool_alloc_preallocated+0x58/0xc0 [ 38.904022] mempool_oob_right_helper+0x98/0x2f0 [ 38.904683] mempool_slab_oob_right+0xb8/0x110 [ 38.905888] kunit_try_run_case+0x14c/0x3d0 [ 38.906412] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.907069] kthread+0x24c/0x2d0 [ 38.907564] ret_from_fork+0x10/0x20 [ 38.908091] [ 38.908435] The buggy address belongs to the object at fff00000c65cd240 [ 38.908435] which belongs to the cache test_cache of size 123 [ 38.909570] The buggy address is located 0 bytes to the right of [ 38.909570] allocated 123-byte region [fff00000c65cd240, fff00000c65cd2bb) [ 38.911405] [ 38.911788] The buggy address belongs to the physical page: [ 38.912602] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065cd [ 38.913986] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.914772] page_type: f5(slab) [ 38.915147] raw: 0bfffe0000000000 fff00000c652d3c0 dead000000000122 0000000000000000 [ 38.916058] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000 [ 38.916765] page dumped because: kasan: bad access detected [ 38.917479] [ 38.917820] Memory state around the buggy address: [ 38.918688] fff00000c65cd180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.919647] fff00000c65cd200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 38.920461] >fff00000c65cd280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 38.921231] ^ [ 38.921840] fff00000c65cd300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.922621] fff00000c65cd380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.923473] ================================================================== [ 38.839570] ================================================================== [ 38.840503] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 38.841293] Read of size 1 at addr fff00000c674e001 by task kunit_try_catch/212 [ 38.841868] [ 38.842187] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 38.843971] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.844586] Hardware name: linux,dummy-virt (DT) [ 38.845801] Call trace: [ 38.846266] show_stack+0x20/0x38 (C) [ 38.847237] dump_stack_lvl+0x8c/0xd0 [ 38.848175] print_report+0x118/0x5e0 [ 38.848845] kasan_report+0xc8/0x118 [ 38.849491] __asan_report_load1_noabort+0x20/0x30 [ 38.850248] mempool_oob_right_helper+0x2ac/0x2f0 [ 38.851037] mempool_kmalloc_large_oob_right+0xbc/0x118 [ 38.851763] kunit_try_run_case+0x14c/0x3d0 [ 38.852333] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.853030] kthread+0x24c/0x2d0 [ 38.853869] ret_from_fork+0x10/0x20 [ 38.854274] [ 38.854547] The buggy address belongs to the physical page: [ 38.855049] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10674c [ 38.855771] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 38.856667] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 38.857546] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.858757] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 38.859478] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.860389] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 38.861862] head: 0bfffe0000000002 ffffc1ffc319d301 ffffffffffffffff 0000000000000000 [ 38.862463] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 38.863058] page dumped because: kasan: bad access detected [ 38.863966] [ 38.864298] Memory state around the buggy address: [ 38.864929] fff00000c674df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.865757] fff00000c674df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.866851] >fff00000c674e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 38.867819] ^ [ 38.868511] fff00000c674e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 38.869558] fff00000c674e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 38.870605] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 38.160045] ================================================================== [ 38.160965] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x17c/0x2f8 [ 38.162818] Read of size 1 at addr fff00000c59d3780 by task kunit_try_catch/204 [ 38.163772] [ 38.164280] CPU: 1 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 38.165384] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.165822] Hardware name: linux,dummy-virt (DT) [ 38.166456] Call trace: [ 38.167007] show_stack+0x20/0x38 (C) [ 38.167779] dump_stack_lvl+0x8c/0xd0 [ 38.168494] print_report+0x118/0x5e0 [ 38.168985] kasan_report+0xc8/0x118 [ 38.169594] __kasan_check_byte+0x54/0x70 [ 38.170146] kmem_cache_destroy+0x34/0x218 [ 38.170768] kmem_cache_double_destroy+0x17c/0x2f8 [ 38.171389] kunit_try_run_case+0x14c/0x3d0 [ 38.171934] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.172712] kthread+0x24c/0x2d0 [ 38.173930] ret_from_fork+0x10/0x20 [ 38.174639] [ 38.174950] Allocated by task 204: [ 38.175480] kasan_save_stack+0x3c/0x68 [ 38.176057] kasan_save_track+0x20/0x40 [ 38.176913] kasan_save_alloc_info+0x40/0x58 [ 38.177499] __kasan_slab_alloc+0xa8/0xb0 [ 38.178025] kmem_cache_alloc_noprof+0x108/0x3a0 [ 38.179067] __kmem_cache_create_args+0x18c/0x2b0 [ 38.179732] kmem_cache_double_destroy+0xc8/0x2f8 [ 38.180369] kunit_try_run_case+0x14c/0x3d0 [ 38.181113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.182311] kthread+0x24c/0x2d0 [ 38.182722] ret_from_fork+0x10/0x20 [ 38.183178] [ 38.183545] Freed by task 204: [ 38.184024] kasan_save_stack+0x3c/0x68 [ 38.184619] kasan_save_track+0x20/0x40 [ 38.185183] kasan_save_free_info+0x4c/0x78 [ 38.186192] __kasan_slab_free+0x6c/0x98 [ 38.186786] kmem_cache_free+0x118/0x470 [ 38.187290] slab_kmem_cache_release+0x38/0x50 [ 38.188028] kmem_cache_release+0x1c/0x30 [ 38.188635] kobject_put+0x17c/0x430 [ 38.189192] sysfs_slab_release+0x1c/0x30 [ 38.190705] kmem_cache_destroy+0x118/0x218 [ 38.191217] kmem_cache_double_destroy+0x130/0x2f8 [ 38.191576] kunit_try_run_case+0x14c/0x3d0 [ 38.191837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.192128] kthread+0x24c/0x2d0 [ 38.192353] ret_from_fork+0x10/0x20 [ 38.192844] [ 38.193189] The buggy address belongs to the object at fff00000c59d3780 [ 38.193189] which belongs to the cache kmem_cache of size 208 [ 38.195114] The buggy address is located 0 bytes inside of [ 38.195114] freed 208-byte region [fff00000c59d3780, fff00000c59d3850) [ 38.196660] [ 38.197035] The buggy address belongs to the physical page: [ 38.198180] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d3 [ 38.198835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.199647] page_type: f5(slab) [ 38.200310] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 38.201171] raw: 0000000000000000 00000000800c000c 00000001f5000000 0000000000000000 [ 38.201950] page dumped because: kasan: bad access detected [ 38.203050] [ 38.203364] Memory state around the buggy address: [ 38.203898] fff00000c59d3680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.204726] fff00000c59d3700: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.205837] >fff00000c59d3780: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.207083] ^ [ 38.207618] fff00000c59d3800: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 38.208691] fff00000c59d3880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.209520] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 38.058115] ================================================================== [ 38.059118] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x390/0x468 [ 38.059913] Read of size 1 at addr fff00000c65c1000 by task kunit_try_catch/202 [ 38.060754] [ 38.061131] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 38.062654] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.063075] Hardware name: linux,dummy-virt (DT) [ 38.063657] Call trace: [ 38.064080] show_stack+0x20/0x38 (C) [ 38.064703] dump_stack_lvl+0x8c/0xd0 [ 38.065292] print_report+0x118/0x5e0 [ 38.066312] kasan_report+0xc8/0x118 [ 38.066884] __asan_report_load1_noabort+0x20/0x30 [ 38.067486] kmem_cache_rcu_uaf+0x390/0x468 [ 38.068101] kunit_try_run_case+0x14c/0x3d0 [ 38.068633] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.069554] kthread+0x24c/0x2d0 [ 38.070137] ret_from_fork+0x10/0x20 [ 38.070667] [ 38.070977] Allocated by task 202: [ 38.071482] kasan_save_stack+0x3c/0x68 [ 38.072050] kasan_save_track+0x20/0x40 [ 38.072631] kasan_save_alloc_info+0x40/0x58 [ 38.073226] __kasan_slab_alloc+0xa8/0xb0 [ 38.074100] kmem_cache_alloc_noprof+0x108/0x3a0 [ 38.075037] kmem_cache_rcu_uaf+0x12c/0x468 [ 38.075622] kunit_try_run_case+0x14c/0x3d0 [ 38.076194] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.076899] kthread+0x24c/0x2d0 [ 38.077782] ret_from_fork+0x10/0x20 [ 38.078515] [ 38.078866] Freed by task 0: [ 38.079285] kasan_save_stack+0x3c/0x68 [ 38.079884] kasan_save_track+0x20/0x40 [ 38.080566] kasan_save_free_info+0x4c/0x78 [ 38.081268] __kasan_slab_free+0x6c/0x98 [ 38.081920] slab_free_after_rcu_debug+0xd4/0x2f8 [ 38.082570] rcu_core+0xa54/0x1df8 [ 38.083560] rcu_core_si+0x18/0x30 [ 38.083957] handle_softirqs+0x374/0xb20 [ 38.084482] __do_softirq+0x1c/0x28 [ 38.085618] [ 38.085907] Last potentially related work creation: [ 38.086768] kasan_save_stack+0x3c/0x68 [ 38.087274] __kasan_record_aux_stack+0xbc/0xe8 [ 38.087932] kasan_record_aux_stack_noalloc+0x14/0x20 [ 38.088523] kmem_cache_free+0x28c/0x470 [ 38.089104] kmem_cache_rcu_uaf+0x16c/0x468 [ 38.089685] kunit_try_run_case+0x14c/0x3d0 [ 38.090301] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.091034] kthread+0x24c/0x2d0 [ 38.091848] ret_from_fork+0x10/0x20 [ 38.092432] [ 38.092784] The buggy address belongs to the object at fff00000c65c1000 [ 38.092784] which belongs to the cache test_cache of size 200 [ 38.094373] The buggy address is located 0 bytes inside of [ 38.094373] freed 200-byte region [fff00000c65c1000, fff00000c65c10c8) [ 38.095647] [ 38.095972] The buggy address belongs to the physical page: [ 38.096592] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c1 [ 38.097908] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.098775] page_type: f5(slab) [ 38.099248] raw: 0bfffe0000000000 fff00000c652d140 dead000000000122 0000000000000000 [ 38.100010] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000 [ 38.100879] page dumped because: kasan: bad access detected [ 38.102010] [ 38.102618] Memory state around the buggy address: [ 38.103052] fff00000c65c0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.103978] fff00000c65c0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.104747] >fff00000c65c1000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.106207] ^ [ 38.106804] fff00000c65c1080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 38.107161] fff00000c65c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.107576] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 37.936519] ================================================================== [ 37.937416] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3b8 [ 37.938844] Free of addr fff00000c65af001 by task kunit_try_catch/200 [ 37.940097] [ 37.940492] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 37.941694] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.942197] Hardware name: linux,dummy-virt (DT) [ 37.942755] Call trace: [ 37.943181] show_stack+0x20/0x38 (C) [ 37.943693] dump_stack_lvl+0x8c/0xd0 [ 37.944294] print_report+0x118/0x5e0 [ 37.944909] kasan_report_invalid_free+0xb0/0xd8 [ 37.945765] check_slab_allocation+0xfc/0x108 [ 37.946331] __kasan_slab_pre_free+0x2c/0x48 [ 37.946846] kmem_cache_free+0xf0/0x470 [ 37.947308] kmem_cache_invalid_free+0x184/0x3b8 [ 37.947970] kunit_try_run_case+0x14c/0x3d0 [ 37.948504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.949228] kthread+0x24c/0x2d0 [ 37.950154] ret_from_fork+0x10/0x20 [ 37.950695] [ 37.951033] Allocated by task 200: [ 37.951533] kasan_save_stack+0x3c/0x68 [ 37.952115] kasan_save_track+0x20/0x40 [ 37.952704] kasan_save_alloc_info+0x40/0x58 [ 37.953309] __kasan_slab_alloc+0xa8/0xb0 [ 37.954087] kmem_cache_alloc_noprof+0x108/0x3a0 [ 37.954672] kmem_cache_invalid_free+0x12c/0x3b8 [ 37.955223] kunit_try_run_case+0x14c/0x3d0 [ 37.955938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.956645] kthread+0x24c/0x2d0 [ 37.957137] ret_from_fork+0x10/0x20 [ 37.958285] [ 37.958578] The buggy address belongs to the object at fff00000c65af000 [ 37.958578] which belongs to the cache test_cache of size 200 [ 37.959843] The buggy address is located 1 bytes inside of [ 37.959843] 200-byte region [fff00000c65af000, fff00000c65af0c8) [ 37.961281] [ 37.961671] The buggy address belongs to the physical page: [ 37.962622] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065af [ 37.963438] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.964247] page_type: f5(slab) [ 37.964722] raw: 0bfffe0000000000 fff00000c59d3640 dead000000000122 0000000000000000 [ 37.965764] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000 [ 37.966830] page dumped because: kasan: bad access detected [ 37.967483] [ 37.967815] Memory state around the buggy address: [ 37.968452] fff00000c65aef00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.969213] fff00000c65aef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.970095] >fff00000c65af000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.970916] ^ [ 37.971361] fff00000c65af080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 37.972170] fff00000c65af100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.973077] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 37.863277] ================================================================== [ 37.863930] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 37.864293] Free of addr fff00000c652a000 by task kunit_try_catch/198 [ 37.864612] [ 37.864818] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 37.867014] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.867495] Hardware name: linux,dummy-virt (DT) [ 37.868099] Call trace: [ 37.868544] show_stack+0x20/0x38 (C) [ 37.869102] dump_stack_lvl+0x8c/0xd0 [ 37.870694] print_report+0x118/0x5e0 [ 37.871431] kasan_report_invalid_free+0xb0/0xd8 [ 37.872001] check_slab_allocation+0xd4/0x108 [ 37.872573] __kasan_slab_pre_free+0x2c/0x48 [ 37.873204] kmem_cache_free+0xf0/0x470 [ 37.873752] kmem_cache_double_free+0x190/0x3c8 [ 37.874376] kunit_try_run_case+0x14c/0x3d0 [ 37.874893] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.876112] kthread+0x24c/0x2d0 [ 37.876572] ret_from_fork+0x10/0x20 [ 37.877070] [ 37.877395] Allocated by task 198: [ 37.877894] kasan_save_stack+0x3c/0x68 [ 37.878340] kasan_save_track+0x20/0x40 [ 37.879628] kasan_save_alloc_info+0x40/0x58 [ 37.880165] __kasan_slab_alloc+0xa8/0xb0 [ 37.880744] kmem_cache_alloc_noprof+0x108/0x3a0 [ 37.881401] kmem_cache_double_free+0x12c/0x3c8 [ 37.882370] kunit_try_run_case+0x14c/0x3d0 [ 37.883106] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.883911] kthread+0x24c/0x2d0 [ 37.884625] ret_from_fork+0x10/0x20 [ 37.885178] [ 37.885917] Freed by task 198: [ 37.886399] kasan_save_stack+0x3c/0x68 [ 37.886945] kasan_save_track+0x20/0x40 [ 37.887406] kasan_save_free_info+0x4c/0x78 [ 37.888014] __kasan_slab_free+0x6c/0x98 [ 37.888520] kmem_cache_free+0x118/0x470 [ 37.889103] kmem_cache_double_free+0x140/0x3c8 [ 37.889755] kunit_try_run_case+0x14c/0x3d0 [ 37.890571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.891395] kthread+0x24c/0x2d0 [ 37.892403] ret_from_fork+0x10/0x20 [ 37.893045] [ 37.893712] The buggy address belongs to the object at fff00000c652a000 [ 37.893712] which belongs to the cache test_cache of size 200 [ 37.894861] The buggy address is located 0 bytes inside of [ 37.894861] 200-byte region [fff00000c652a000, fff00000c652a0c8) [ 37.895837] [ 37.896180] The buggy address belongs to the physical page: [ 37.896877] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10652a [ 37.898059] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.899021] page_type: f5(slab) [ 37.900108] raw: 0bfffe0000000000 fff00000c652d000 dead000000000122 0000000000000000 [ 37.901057] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000 [ 37.901802] page dumped because: kasan: bad access detected [ 37.902891] [ 37.903256] Memory state around the buggy address: [ 37.903821] fff00000c6529f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.904578] fff00000c6529f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.905539] >fff00000c652a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.906579] ^ [ 37.907263] fff00000c652a080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 37.908543] fff00000c652a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.909610] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 37.775874] ================================================================== [ 37.777892] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x33c/0x428 [ 37.778811] Read of size 1 at addr fff00000c65a40c8 by task kunit_try_catch/196 [ 37.779434] [ 37.779827] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 37.780975] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.782147] Hardware name: linux,dummy-virt (DT) [ 37.782692] Call trace: [ 37.783104] show_stack+0x20/0x38 (C) [ 37.783682] dump_stack_lvl+0x8c/0xd0 [ 37.784285] print_report+0x118/0x5e0 [ 37.784831] kasan_report+0xc8/0x118 [ 37.785751] __asan_report_load1_noabort+0x20/0x30 [ 37.786607] kmem_cache_oob+0x33c/0x428 [ 37.787124] kunit_try_run_case+0x14c/0x3d0 [ 37.787813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.788539] kthread+0x24c/0x2d0 [ 37.788973] ret_from_fork+0x10/0x20 [ 37.789491] [ 37.790033] Allocated by task 196: [ 37.790559] kasan_save_stack+0x3c/0x68 [ 37.791084] kasan_save_track+0x20/0x40 [ 37.791887] kasan_save_alloc_info+0x40/0x58 [ 37.792526] __kasan_slab_alloc+0xa8/0xb0 [ 37.793109] kmem_cache_alloc_noprof+0x108/0x3a0 [ 37.794213] kmem_cache_oob+0x12c/0x428 [ 37.794679] kunit_try_run_case+0x14c/0x3d0 [ 37.795274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.795934] kthread+0x24c/0x2d0 [ 37.796477] ret_from_fork+0x10/0x20 [ 37.797010] [ 37.797615] The buggy address belongs to the object at fff00000c65a4000 [ 37.797615] which belongs to the cache test_cache of size 200 [ 37.798490] The buggy address is located 0 bytes to the right of [ 37.798490] allocated 200-byte region [fff00000c65a4000, fff00000c65a40c8) [ 37.799835] [ 37.800192] The buggy address belongs to the physical page: [ 37.800904] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a4 [ 37.802373] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.803209] page_type: f5(slab) [ 37.803775] raw: 0bfffe0000000000 fff00000c1b21dc0 dead000000000122 0000000000000000 [ 37.804710] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000 [ 37.805544] page dumped because: kasan: bad access detected [ 37.806640] [ 37.807005] Memory state around the buggy address: [ 37.807506] fff00000c65a3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.808352] fff00000c65a4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.809176] >fff00000c65a4080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 37.810236] ^ [ 37.810926] fff00000c65a4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.811759] fff00000c65a4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.812584] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[ 37.254926] ================================================================== [ 37.256002] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 37.256771] Free of addr fff00000c5a3bf20 by task kunit_try_catch/181 [ 37.257419] [ 37.257783] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 37.259279] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.260138] Hardware name: linux,dummy-virt (DT) [ 37.260735] Call trace: [ 37.261095] show_stack+0x20/0x38 (C) [ 37.261685] dump_stack_lvl+0x8c/0xd0 [ 37.262293] print_report+0x118/0x5e0 [ 37.262892] kasan_report_invalid_free+0xb0/0xd8 [ 37.263521] check_slab_allocation+0xd4/0x108 [ 37.264100] __kasan_slab_pre_free+0x2c/0x48 [ 37.264715] kfree+0xe8/0x3d0 [ 37.265181] kfree_sensitive+0x3c/0xb0 [ 37.265838] kmalloc_double_kzfree+0x168/0x308 [ 37.266549] kunit_try_run_case+0x14c/0x3d0 [ 37.267222] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.267901] kthread+0x24c/0x2d0 [ 37.268618] ret_from_fork+0x10/0x20 [ 37.269090] [ 37.269424] Allocated by task 181: [ 37.269951] kasan_save_stack+0x3c/0x68 [ 37.270460] kasan_save_track+0x20/0x40 [ 37.271037] kasan_save_alloc_info+0x40/0x58 [ 37.271586] __kasan_kmalloc+0xd4/0xd8 [ 37.272194] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.272909] kmalloc_double_kzfree+0xb8/0x308 [ 37.273540] kunit_try_run_case+0x14c/0x3d0 [ 37.274097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.274812] kthread+0x24c/0x2d0 [ 37.275240] ret_from_fork+0x10/0x20 [ 37.275729] [ 37.276083] Freed by task 181: [ 37.276499] kasan_save_stack+0x3c/0x68 [ 37.277068] kasan_save_track+0x20/0x40 [ 37.277648] kasan_save_free_info+0x4c/0x78 [ 37.278160] __kasan_slab_free+0x6c/0x98 [ 37.278759] kfree+0x114/0x3d0 [ 37.279273] kfree_sensitive+0x80/0xb0 [ 37.279853] kmalloc_double_kzfree+0x11c/0x308 [ 37.280367] kunit_try_run_case+0x14c/0x3d0 [ 37.280997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.281663] kthread+0x24c/0x2d0 [ 37.282122] ret_from_fork+0x10/0x20 [ 37.282694] [ 37.283065] The buggy address belongs to the object at fff00000c5a3bf20 [ 37.283065] which belongs to the cache kmalloc-16 of size 16 [ 37.284257] The buggy address is located 0 bytes inside of [ 37.284257] 16-byte region [fff00000c5a3bf20, fff00000c5a3bf30) [ 37.285302] [ 37.285665] The buggy address belongs to the physical page: [ 37.286358] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a3b [ 37.287212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.287966] page_type: f5(slab) [ 37.288539] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 37.289324] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 37.290101] page dumped because: kasan: bad access detected [ 37.290814] [ 37.291150] Memory state around the buggy address: [ 37.291750] fff00000c5a3be00: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 37.292537] fff00000c5a3be80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 37.293248] >fff00000c5a3bf00: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 37.294089] ^ [ 37.294583] fff00000c5a3bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.295366] fff00000c5a3c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.296105] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 37.210800] ================================================================== [ 37.212269] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 37.213321] Read of size 1 at addr fff00000c5a3bf20 by task kunit_try_catch/181 [ 37.215004] [ 37.215381] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 37.216432] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.217016] Hardware name: linux,dummy-virt (DT) [ 37.217557] Call trace: [ 37.217970] show_stack+0x20/0x38 (C) [ 37.218614] dump_stack_lvl+0x8c/0xd0 [ 37.219152] print_report+0x118/0x5e0 [ 37.219766] kasan_report+0xc8/0x118 [ 37.220336] __kasan_check_byte+0x54/0x70 [ 37.220903] kfree_sensitive+0x30/0xb0 [ 37.221487] kmalloc_double_kzfree+0x168/0x308 [ 37.222078] kunit_try_run_case+0x14c/0x3d0 [ 37.222653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.223323] kthread+0x24c/0x2d0 [ 37.223891] ret_from_fork+0x10/0x20 [ 37.224489] [ 37.224780] Allocated by task 181: [ 37.225280] kasan_save_stack+0x3c/0x68 [ 37.225863] kasan_save_track+0x20/0x40 [ 37.226416] kasan_save_alloc_info+0x40/0x58 [ 37.226930] __kasan_kmalloc+0xd4/0xd8 [ 37.227505] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.228106] kmalloc_double_kzfree+0xb8/0x308 [ 37.228705] kunit_try_run_case+0x14c/0x3d0 [ 37.229318] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.229894] kthread+0x24c/0x2d0 [ 37.230406] ret_from_fork+0x10/0x20 [ 37.230942] [ 37.231276] Freed by task 181: [ 37.231754] kasan_save_stack+0x3c/0x68 [ 37.232285] kasan_save_track+0x20/0x40 [ 37.232800] kasan_save_free_info+0x4c/0x78 [ 37.233396] __kasan_slab_free+0x6c/0x98 [ 37.234001] kfree+0x114/0x3d0 [ 37.234534] kfree_sensitive+0x80/0xb0 [ 37.235093] kmalloc_double_kzfree+0x11c/0x308 [ 37.235565] kunit_try_run_case+0x14c/0x3d0 [ 37.235843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.236133] kthread+0x24c/0x2d0 [ 37.236360] ret_from_fork+0x10/0x20 [ 37.236969] [ 37.237255] The buggy address belongs to the object at fff00000c5a3bf20 [ 37.237255] which belongs to the cache kmalloc-16 of size 16 [ 37.238377] The buggy address is located 0 bytes inside of [ 37.238377] freed 16-byte region [fff00000c5a3bf20, fff00000c5a3bf30) [ 37.239283] [ 37.239590] The buggy address belongs to the physical page: [ 37.240289] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a3b [ 37.241222] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.242043] page_type: f5(slab) [ 37.242585] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 37.243505] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 37.244268] page dumped because: kasan: bad access detected [ 37.244894] [ 37.245231] Memory state around the buggy address: [ 37.245875] fff00000c5a3be00: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 37.246557] fff00000c5a3be80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 37.247404] >fff00000c5a3bf00: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 37.248254] ^ [ 37.248859] fff00000c5a3bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.249725] fff00000c5a3c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.250494] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 37.087831] ================================================================== [ 37.088758] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 37.090806] Write of size 33 at addr fff00000c659f680 by task kunit_try_catch/175 [ 37.091605] [ 37.091986] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 37.092971] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.093593] Hardware name: linux,dummy-virt (DT) [ 37.094183] Call trace: [ 37.095059] show_stack+0x20/0x38 (C) [ 37.095638] dump_stack_lvl+0x8c/0xd0 [ 37.096184] print_report+0x118/0x5e0 [ 37.096723] kasan_report+0xc8/0x118 [ 37.097813] kasan_check_range+0x100/0x1a8 [ 37.098320] __asan_memset+0x34/0x78 [ 37.098844] kmalloc_uaf_memset+0x170/0x310 [ 37.099364] kunit_try_run_case+0x14c/0x3d0 [ 37.100011] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.100681] kthread+0x24c/0x2d0 [ 37.101764] ret_from_fork+0x10/0x20 [ 37.102279] [ 37.102635] Allocated by task 175: [ 37.103049] kasan_save_stack+0x3c/0x68 [ 37.103376] kasan_save_track+0x20/0x40 [ 37.103811] kasan_save_alloc_info+0x40/0x58 [ 37.104396] __kasan_kmalloc+0xd4/0xd8 [ 37.104871] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.105544] kmalloc_uaf_memset+0xb8/0x310 [ 37.106135] kunit_try_run_case+0x14c/0x3d0 [ 37.106811] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.107534] kthread+0x24c/0x2d0 [ 37.108060] ret_from_fork+0x10/0x20 [ 37.109180] [ 37.109550] Freed by task 175: [ 37.109976] kasan_save_stack+0x3c/0x68 [ 37.110578] kasan_save_track+0x20/0x40 [ 37.111161] kasan_save_free_info+0x4c/0x78 [ 37.112196] __kasan_slab_free+0x6c/0x98 [ 37.112749] kfree+0x114/0x3d0 [ 37.113815] kmalloc_uaf_memset+0x11c/0x310 [ 37.114315] kunit_try_run_case+0x14c/0x3d0 [ 37.114933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.115574] kthread+0x24c/0x2d0 [ 37.116097] ret_from_fork+0x10/0x20 [ 37.116650] [ 37.116950] The buggy address belongs to the object at fff00000c659f680 [ 37.116950] which belongs to the cache kmalloc-64 of size 64 [ 37.118659] The buggy address is located 0 bytes inside of [ 37.118659] freed 64-byte region [fff00000c659f680, fff00000c659f6c0) [ 37.119775] [ 37.120117] The buggy address belongs to the physical page: [ 37.120774] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659f [ 37.122259] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.123012] page_type: f5(slab) [ 37.123478] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.124242] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.125004] page dumped because: kasan: bad access detected [ 37.126257] [ 37.126631] Memory state around the buggy address: [ 37.127244] fff00000c659f580: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.128482] fff00000c659f600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.129845] >fff00000c659f680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.130524] ^ [ 37.130955] fff00000c659f700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.131706] fff00000c659f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.132407] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 36.986006] ================================================================== [ 36.987419] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e8 [ 36.988183] Read of size 64 at addr fff00000c5bc9e84 by task kunit_try_catch/171 [ 36.989035] [ 36.989433] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 36.990375] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.990945] Hardware name: linux,dummy-virt (DT) [ 36.991767] Call trace: [ 36.992210] show_stack+0x20/0x38 (C) [ 36.994077] dump_stack_lvl+0x8c/0xd0 [ 36.994712] print_report+0x118/0x5e0 [ 36.995245] kasan_report+0xc8/0x118 [ 36.996045] kasan_check_range+0x100/0x1a8 [ 36.996592] __asan_memmove+0x3c/0x98 [ 36.997173] kmalloc_memmove_invalid_size+0x154/0x2e8 [ 36.998255] kunit_try_run_case+0x14c/0x3d0 [ 36.998827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.999554] kthread+0x24c/0x2d0 [ 37.000054] ret_from_fork+0x10/0x20 [ 37.000682] [ 37.001020] Allocated by task 171: [ 37.001815] kasan_save_stack+0x3c/0x68 [ 37.002394] kasan_save_track+0x20/0x40 [ 37.002970] kasan_save_alloc_info+0x40/0x58 [ 37.003594] __kasan_kmalloc+0xd4/0xd8 [ 37.004084] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.004727] kmalloc_memmove_invalid_size+0xb0/0x2e8 [ 37.005616] kunit_try_run_case+0x14c/0x3d0 [ 37.006249] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.006968] kthread+0x24c/0x2d0 [ 37.007476] ret_from_fork+0x10/0x20 [ 37.007946] [ 37.008294] The buggy address belongs to the object at fff00000c5bc9e80 [ 37.008294] which belongs to the cache kmalloc-64 of size 64 [ 37.010512] The buggy address is located 4 bytes inside of [ 37.010512] allocated 64-byte region [fff00000c5bc9e80, fff00000c5bc9ec0) [ 37.011622] [ 37.011968] The buggy address belongs to the physical page: [ 37.012642] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bc9 [ 37.013921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.014659] page_type: f5(slab) [ 37.015180] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.016011] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.016740] page dumped because: kasan: bad access detected [ 37.017716] [ 37.017985] Memory state around the buggy address: [ 37.018815] fff00000c5bc9d80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.019662] fff00000c5bc9e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.020325] >fff00000c5bc9e80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.020962] ^ [ 37.021766] fff00000c5bc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.022438] fff00000c5bc9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.023257] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 36.937136] ================================================================== [ 36.938253] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 36.939159] Read of size 18446744073709551614 at addr fff00000c5bc9e04 by task kunit_try_catch/169 [ 36.940333] [ 36.940748] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 36.942922] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.943517] Hardware name: linux,dummy-virt (DT) [ 36.944081] Call trace: [ 36.944564] show_stack+0x20/0x38 (C) [ 36.945148] dump_stack_lvl+0x8c/0xd0 [ 36.946109] print_report+0x118/0x5e0 [ 36.946758] kasan_report+0xc8/0x118 [ 36.947285] kasan_check_range+0x100/0x1a8 [ 36.947974] __asan_memmove+0x3c/0x98 [ 36.948589] kmalloc_memmove_negative_size+0x154/0x2e0 [ 36.949310] kunit_try_run_case+0x14c/0x3d0 [ 36.949950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.950936] kthread+0x24c/0x2d0 [ 36.951489] ret_from_fork+0x10/0x20 [ 36.952094] [ 36.952436] Allocated by task 169: [ 36.953006] kasan_save_stack+0x3c/0x68 [ 36.953887] kasan_save_track+0x20/0x40 [ 36.954412] kasan_save_alloc_info+0x40/0x58 [ 36.955004] __kasan_kmalloc+0xd4/0xd8 [ 36.955521] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.956146] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 36.956807] kunit_try_run_case+0x14c/0x3d0 [ 36.957775] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.958557] kthread+0x24c/0x2d0 [ 36.959248] ret_from_fork+0x10/0x20 [ 36.959613] [ 36.959949] The buggy address belongs to the object at fff00000c5bc9e00 [ 36.959949] which belongs to the cache kmalloc-64 of size 64 [ 36.961158] The buggy address is located 4 bytes inside of [ 36.961158] 64-byte region [fff00000c5bc9e00, fff00000c5bc9e40) [ 36.962691] [ 36.963037] The buggy address belongs to the physical page: [ 36.963719] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bc9 [ 36.964519] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.965296] page_type: f5(slab) [ 36.965773] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.967028] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.967888] page dumped because: kasan: bad access detected [ 36.968488] [ 36.968819] Memory state around the buggy address: [ 36.969667] fff00000c5bc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.970389] fff00000c5bc9d80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.971146] >fff00000c5bc9e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.972079] ^ [ 36.972529] fff00000c5bc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.973659] fff00000c5bc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.974368] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset
[ 36.833158] ================================================================== [ 36.834378] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 36.835051] Write of size 8 at addr fff00000c657f971 by task kunit_try_catch/165 [ 36.836221] [ 36.836667] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 36.838437] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.839115] Hardware name: linux,dummy-virt (DT) [ 36.839833] Call trace: [ 36.840261] show_stack+0x20/0x38 (C) [ 36.840805] dump_stack_lvl+0x8c/0xd0 [ 36.841388] print_report+0x118/0x5e0 [ 36.842343] kasan_report+0xc8/0x118 [ 36.842880] kasan_check_range+0x100/0x1a8 [ 36.843432] __asan_memset+0x34/0x78 [ 36.844328] kmalloc_oob_memset_8+0x150/0x2f8 [ 36.844866] kunit_try_run_case+0x14c/0x3d0 [ 36.845807] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.846659] kthread+0x24c/0x2d0 [ 36.847283] ret_from_fork+0x10/0x20 [ 36.847962] [ 36.848268] Allocated by task 165: [ 36.848773] kasan_save_stack+0x3c/0x68 [ 36.849613] kasan_save_track+0x20/0x40 [ 36.850176] kasan_save_alloc_info+0x40/0x58 [ 36.850686] __kasan_kmalloc+0xd4/0xd8 [ 36.851242] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.851993] kmalloc_oob_memset_8+0xb0/0x2f8 [ 36.852603] kunit_try_run_case+0x14c/0x3d0 [ 36.853862] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.854476] kthread+0x24c/0x2d0 [ 36.854976] ret_from_fork+0x10/0x20 [ 36.855530] [ 36.855849] The buggy address belongs to the object at fff00000c657f900 [ 36.855849] which belongs to the cache kmalloc-128 of size 128 [ 36.856960] The buggy address is located 113 bytes inside of [ 36.856960] allocated 120-byte region [fff00000c657f900, fff00000c657f978) [ 36.858165] [ 36.858518] The buggy address belongs to the physical page: [ 36.859153] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10657f [ 36.860501] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.861621] page_type: f5(slab) [ 36.862114] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 36.862911] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 36.863687] page dumped because: kasan: bad access detected [ 36.864353] [ 36.864702] Memory state around the buggy address: [ 36.865718] fff00000c657f800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 36.866430] fff00000c657f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.867216] >fff00000c657f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 36.867876] ^ [ 36.868739] fff00000c657f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.869742] fff00000c657fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.870552] ================================================================== [ 36.730905] ================================================================== [ 36.731847] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 36.732673] Write of size 2 at addr fff00000c6575a77 by task kunit_try_catch/161 [ 36.733322] [ 36.733992] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 36.735056] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.736747] Hardware name: linux,dummy-virt (DT) [ 36.737268] Call trace: [ 36.737797] show_stack+0x20/0x38 (C) [ 36.738414] dump_stack_lvl+0x8c/0xd0 [ 36.738983] print_report+0x118/0x5e0 [ 36.739822] kasan_report+0xc8/0x118 [ 36.740381] kasan_check_range+0x100/0x1a8 [ 36.741029] __asan_memset+0x34/0x78 [ 36.741955] kmalloc_oob_memset_2+0x150/0x2f8 [ 36.742505] kunit_try_run_case+0x14c/0x3d0 [ 36.743225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.744046] kthread+0x24c/0x2d0 [ 36.744688] ret_from_fork+0x10/0x20 [ 36.745463] [ 36.745880] Allocated by task 161: [ 36.746482] kasan_save_stack+0x3c/0x68 [ 36.747008] kasan_save_track+0x20/0x40 [ 36.747606] kasan_save_alloc_info+0x40/0x58 [ 36.748266] __kasan_kmalloc+0xd4/0xd8 [ 36.748915] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.749666] kmalloc_oob_memset_2+0xb0/0x2f8 [ 36.750537] kunit_try_run_case+0x14c/0x3d0 [ 36.751001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.751797] kthread+0x24c/0x2d0 [ 36.752264] ret_from_fork+0x10/0x20 [ 36.752818] [ 36.753162] The buggy address belongs to the object at fff00000c6575a00 [ 36.753162] which belongs to the cache kmalloc-128 of size 128 [ 36.755032] The buggy address is located 119 bytes inside of [ 36.755032] allocated 120-byte region [fff00000c6575a00, fff00000c6575a78) [ 36.756219] [ 36.756802] The buggy address belongs to the physical page: [ 36.757583] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106575 [ 36.758398] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.758951] page_type: f5(slab) [ 36.759512] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 36.760789] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 36.762211] page dumped because: kasan: bad access detected [ 36.763024] [ 36.763510] Memory state around the buggy address: [ 36.764039] fff00000c6575900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 36.764827] fff00000c6575980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.765756] >fff00000c6575a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 36.767010] ^ [ 36.767573] fff00000c6575a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.767990] fff00000c6575b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.768335] ================================================================== [ 36.884585] ================================================================== [ 36.885544] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 36.887665] Write of size 16 at addr fff00000c6575d69 by task kunit_try_catch/167 [ 36.889060] [ 36.889569] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 36.890819] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.891171] Hardware name: linux,dummy-virt (DT) [ 36.891779] Call trace: [ 36.892138] show_stack+0x20/0x38 (C) [ 36.892772] dump_stack_lvl+0x8c/0xd0 [ 36.893346] print_report+0x118/0x5e0 [ 36.894500] kasan_report+0xc8/0x118 [ 36.895101] kasan_check_range+0x100/0x1a8 [ 36.895704] __asan_memset+0x34/0x78 [ 36.896194] kmalloc_oob_memset_16+0x150/0x2f8 [ 36.897653] kunit_try_run_case+0x14c/0x3d0 [ 36.898390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.899174] kthread+0x24c/0x2d0 [ 36.899779] ret_from_fork+0x10/0x20 [ 36.900315] [ 36.900671] Allocated by task 167: [ 36.901122] kasan_save_stack+0x3c/0x68 [ 36.902075] kasan_save_track+0x20/0x40 [ 36.902485] kasan_save_alloc_info+0x40/0x58 [ 36.902904] __kasan_kmalloc+0xd4/0xd8 [ 36.903660] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.904502] kmalloc_oob_memset_16+0xb0/0x2f8 [ 36.905211] kunit_try_run_case+0x14c/0x3d0 [ 36.905819] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.906891] kthread+0x24c/0x2d0 [ 36.907402] ret_from_fork+0x10/0x20 [ 36.907968] [ 36.908309] The buggy address belongs to the object at fff00000c6575d00 [ 36.908309] which belongs to the cache kmalloc-128 of size 128 [ 36.910222] The buggy address is located 105 bytes inside of [ 36.910222] allocated 120-byte region [fff00000c6575d00, fff00000c6575d78) [ 36.911392] [ 36.911754] The buggy address belongs to the physical page: [ 36.912410] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106575 [ 36.914019] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.914809] page_type: f5(slab) [ 36.915365] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 36.916349] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 36.917346] page dumped because: kasan: bad access detected [ 36.917970] [ 36.918290] Memory state around the buggy address: [ 36.919230] fff00000c6575c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 36.920520] fff00000c6575c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.921077] >fff00000c6575d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 36.922167] ^ [ 36.923132] fff00000c6575d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.923874] fff00000c6575e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.924622] ================================================================== [ 36.780346] ================================================================== [ 36.781864] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 36.783373] Write of size 4 at addr fff00000c6575b75 by task kunit_try_catch/163 [ 36.784123] [ 36.784523] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 36.786118] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.786898] Hardware name: linux,dummy-virt (DT) [ 36.787676] Call trace: [ 36.788018] show_stack+0x20/0x38 (C) [ 36.788570] dump_stack_lvl+0x8c/0xd0 [ 36.789171] print_report+0x118/0x5e0 [ 36.790356] kasan_report+0xc8/0x118 [ 36.790932] kasan_check_range+0x100/0x1a8 [ 36.791476] __asan_memset+0x34/0x78 [ 36.791893] kmalloc_oob_memset_4+0x150/0x300 [ 36.792640] kunit_try_run_case+0x14c/0x3d0 [ 36.793688] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.794232] kthread+0x24c/0x2d0 [ 36.794829] ret_from_fork+0x10/0x20 [ 36.795500] [ 36.795902] Allocated by task 163: [ 36.796479] kasan_save_stack+0x3c/0x68 [ 36.797087] kasan_save_track+0x20/0x40 [ 36.797948] kasan_save_alloc_info+0x40/0x58 [ 36.798979] __kasan_kmalloc+0xd4/0xd8 [ 36.799880] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.800606] kmalloc_oob_memset_4+0xb0/0x300 [ 36.801380] kunit_try_run_case+0x14c/0x3d0 [ 36.802051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.802665] kthread+0x24c/0x2d0 [ 36.803254] ret_from_fork+0x10/0x20 [ 36.804069] [ 36.804400] The buggy address belongs to the object at fff00000c6575b00 [ 36.804400] which belongs to the cache kmalloc-128 of size 128 [ 36.805680] The buggy address is located 117 bytes inside of [ 36.805680] allocated 120-byte region [fff00000c6575b00, fff00000c6575b78) [ 36.807664] [ 36.808257] The buggy address belongs to the physical page: [ 36.808874] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106575 [ 36.810041] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.810714] page_type: f5(slab) [ 36.811180] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 36.812092] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 36.812911] page dumped because: kasan: bad access detected [ 36.813715] [ 36.813955] Memory state around the buggy address: [ 36.814481] fff00000c6575a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.815266] fff00000c6575a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.816422] >fff00000c6575b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 36.817161] ^ [ 36.818047] fff00000c6575b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.819207] fff00000c6575c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.820206] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 36.682876] ================================================================== [ 36.683712] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 36.684556] Write of size 128 at addr fff00000c657f400 by task kunit_try_catch/159 [ 36.685721] [ 36.686069] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 36.687026] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.687858] Hardware name: linux,dummy-virt (DT) [ 36.688339] Call trace: [ 36.688900] show_stack+0x20/0x38 (C) [ 36.689801] dump_stack_lvl+0x8c/0xd0 [ 36.690432] print_report+0x118/0x5e0 [ 36.691069] kasan_report+0xc8/0x118 [ 36.691570] kasan_check_range+0x100/0x1a8 [ 36.692213] __asan_memset+0x34/0x78 [ 36.692857] kmalloc_oob_in_memset+0x144/0x2d0 [ 36.693522] kunit_try_run_case+0x14c/0x3d0 [ 36.694504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.695261] kthread+0x24c/0x2d0 [ 36.695680] ret_from_fork+0x10/0x20 [ 36.696321] [ 36.696699] Allocated by task 159: [ 36.697180] kasan_save_stack+0x3c/0x68 [ 36.698279] kasan_save_track+0x20/0x40 [ 36.698854] kasan_save_alloc_info+0x40/0x58 [ 36.699428] __kasan_kmalloc+0xd4/0xd8 [ 36.699982] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.700600] kmalloc_oob_in_memset+0xb0/0x2d0 [ 36.701226] kunit_try_run_case+0x14c/0x3d0 [ 36.701968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.702565] kthread+0x24c/0x2d0 [ 36.703114] ret_from_fork+0x10/0x20 [ 36.703725] [ 36.704112] The buggy address belongs to the object at fff00000c657f400 [ 36.704112] which belongs to the cache kmalloc-128 of size 128 [ 36.705560] The buggy address is located 0 bytes inside of [ 36.705560] allocated 120-byte region [fff00000c657f400, fff00000c657f478) [ 36.706836] [ 36.707212] The buggy address belongs to the physical page: [ 36.708407] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10657f [ 36.709142] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.709912] page_type: f5(slab) [ 36.710635] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 36.711417] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 36.712191] page dumped because: kasan: bad access detected [ 36.712889] [ 36.713613] Memory state around the buggy address: [ 36.714212] fff00000c657f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 36.714928] fff00000c657f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.715666] >fff00000c657f400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 36.716413] ^ [ 36.717180] fff00000c657f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.718308] fff00000c657f500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.719044] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 36.628013] ================================================================== [ 36.628917] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 36.629821] Read of size 16 at addr fff00000c1bb3be0 by task kunit_try_catch/157 [ 36.631624] [ 36.631923] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 36.633009] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.633751] Hardware name: linux,dummy-virt (DT) [ 36.634311] Call trace: [ 36.635152] show_stack+0x20/0x38 (C) [ 36.635841] dump_stack_lvl+0x8c/0xd0 [ 36.636377] print_report+0x118/0x5e0 [ 36.636966] kasan_report+0xc8/0x118 [ 36.637826] __asan_report_load16_noabort+0x20/0x30 [ 36.638572] kmalloc_uaf_16+0x3bc/0x438 [ 36.639122] kunit_try_run_case+0x14c/0x3d0 [ 36.639851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.640436] kthread+0x24c/0x2d0 [ 36.641020] ret_from_fork+0x10/0x20 [ 36.641737] [ 36.642052] Allocated by task 157: [ 36.642583] kasan_save_stack+0x3c/0x68 [ 36.643155] kasan_save_track+0x20/0x40 [ 36.644016] kasan_save_alloc_info+0x40/0x58 [ 36.644640] __kasan_kmalloc+0xd4/0xd8 [ 36.645116] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.645818] kmalloc_uaf_16+0x140/0x438 [ 36.646866] kunit_try_run_case+0x14c/0x3d0 [ 36.647432] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.648075] kthread+0x24c/0x2d0 [ 36.648716] ret_from_fork+0x10/0x20 [ 36.649260] [ 36.649582] Freed by task 157: [ 36.650003] kasan_save_stack+0x3c/0x68 [ 36.651176] kasan_save_track+0x20/0x40 [ 36.651671] kasan_save_free_info+0x4c/0x78 [ 36.652284] __kasan_slab_free+0x6c/0x98 [ 36.652772] kfree+0x114/0x3d0 [ 36.653798] kmalloc_uaf_16+0x190/0x438 [ 36.654306] kunit_try_run_case+0x14c/0x3d0 [ 36.654776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.655497] kthread+0x24c/0x2d0 [ 36.656019] ret_from_fork+0x10/0x20 [ 36.656563] [ 36.656899] The buggy address belongs to the object at fff00000c1bb3be0 [ 36.656899] which belongs to the cache kmalloc-16 of size 16 [ 36.658426] The buggy address is located 0 bytes inside of [ 36.658426] freed 16-byte region [fff00000c1bb3be0, fff00000c1bb3bf0) [ 36.659593] [ 36.659892] The buggy address belongs to the physical page: [ 36.660609] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 36.661340] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.662085] page_type: f5(slab) [ 36.662560] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 36.663509] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 36.664420] page dumped because: kasan: bad access detected [ 36.664894] [ 36.665164] Memory state around the buggy address: [ 36.666212] fff00000c1bb3a80: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc [ 36.667090] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 36.667982] >fff00000c1bb3b80: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 36.668809] ^ [ 36.669553] fff00000c1bb3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.670912] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.671691] ================================================================== [ 37.146333] ================================================================== [ 37.147262] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 37.148246] Read of size 1 at addr fff00000c65920a8 by task kunit_try_catch/177 [ 37.149078] [ 37.149540] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 37.150777] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.151345] Hardware name: linux,dummy-virt (DT) [ 37.152120] Call trace: [ 37.152915] show_stack+0x20/0x38 (C) [ 37.153557] dump_stack_lvl+0x8c/0xd0 [ 37.154240] print_report+0x118/0x5e0 [ 37.154933] kasan_report+0xc8/0x118 [ 37.155606] __asan_report_load1_noabort+0x20/0x30 [ 37.156223] kmalloc_uaf2+0x3f4/0x468 [ 37.156726] kunit_try_run_case+0x14c/0x3d0 [ 37.157426] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.158296] kthread+0x24c/0x2d0 [ 37.158875] ret_from_fork+0x10/0x20 [ 37.159508] [ 37.159889] Allocated by task 177: [ 37.160389] kasan_save_stack+0x3c/0x68 [ 37.161038] kasan_save_track+0x20/0x40 [ 37.161882] kasan_save_alloc_info+0x40/0x58 [ 37.162465] __kasan_kmalloc+0xd4/0xd8 [ 37.163015] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.163617] kmalloc_uaf2+0xc4/0x468 [ 37.164208] kunit_try_run_case+0x14c/0x3d0 [ 37.164866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.165673] kthread+0x24c/0x2d0 [ 37.166136] ret_from_fork+0x10/0x20 [ 37.166908] [ 37.167267] Freed by task 177: [ 37.167798] kasan_save_stack+0x3c/0x68 [ 37.168401] kasan_save_track+0x20/0x40 [ 37.169004] kasan_save_free_info+0x4c/0x78 [ 37.169760] __kasan_slab_free+0x6c/0x98 [ 37.170471] kfree+0x114/0x3d0 [ 37.170955] kmalloc_uaf2+0x134/0x468 [ 37.171700] kunit_try_run_case+0x14c/0x3d0 [ 37.172103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.173455] kthread+0x24c/0x2d0 [ 37.174197] ret_from_fork+0x10/0x20 [ 37.174880] [ 37.175205] The buggy address belongs to the object at fff00000c6592080 [ 37.175205] which belongs to the cache kmalloc-64 of size 64 [ 37.176960] The buggy address is located 40 bytes inside of [ 37.176960] freed 64-byte region [fff00000c6592080, fff00000c65920c0) [ 37.178549] [ 37.179018] The buggy address belongs to the physical page: [ 37.179734] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106592 [ 37.180591] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.181526] page_type: f5(slab) [ 37.181976] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.182623] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.183541] page dumped because: kasan: bad access detected [ 37.184148] [ 37.184532] Memory state around the buggy address: [ 37.185096] fff00000c6591f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.186420] fff00000c6592000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.187070] >fff00000c6592080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.187816] ^ [ 37.188432] fff00000c6592100: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 37.189269] fff00000c6592180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.190295] ================================================================== [ 37.035536] ================================================================== [ 37.036717] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 37.037381] Read of size 1 at addr fff00000c5a3bf08 by task kunit_try_catch/173 [ 37.038923] [ 37.039353] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 37.040558] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.041080] Hardware name: linux,dummy-virt (DT) [ 37.041692] Call trace: [ 37.042136] show_stack+0x20/0x38 (C) [ 37.042707] dump_stack_lvl+0x8c/0xd0 [ 37.043287] print_report+0x118/0x5e0 [ 37.043922] kasan_report+0xc8/0x118 [ 37.044548] __asan_report_load1_noabort+0x20/0x30 [ 37.045431] kmalloc_uaf+0x300/0x338 [ 37.045913] kunit_try_run_case+0x14c/0x3d0 [ 37.046561] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.047201] kthread+0x24c/0x2d0 [ 37.047742] ret_from_fork+0x10/0x20 [ 37.048230] [ 37.048588] Allocated by task 173: [ 37.049072] kasan_save_stack+0x3c/0x68 [ 37.049967] kasan_save_track+0x20/0x40 [ 37.050920] kasan_save_alloc_info+0x40/0x58 [ 37.051384] __kasan_kmalloc+0xd4/0xd8 [ 37.051960] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.052608] kmalloc_uaf+0xb8/0x338 [ 37.053080] kunit_try_run_case+0x14c/0x3d0 [ 37.054117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.055054] kthread+0x24c/0x2d0 [ 37.055841] ret_from_fork+0x10/0x20 [ 37.056387] [ 37.056716] Freed by task 173: [ 37.058327] kasan_save_stack+0x3c/0x68 [ 37.058893] kasan_save_track+0x20/0x40 [ 37.059502] kasan_save_free_info+0x4c/0x78 [ 37.060202] __kasan_slab_free+0x6c/0x98 [ 37.060716] kfree+0x114/0x3d0 [ 37.060947] kmalloc_uaf+0x11c/0x338 [ 37.061171] kunit_try_run_case+0x14c/0x3d0 [ 37.061423] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.062094] kthread+0x24c/0x2d0 [ 37.062627] ret_from_fork+0x10/0x20 [ 37.063223] [ 37.063626] The buggy address belongs to the object at fff00000c5a3bf00 [ 37.063626] which belongs to the cache kmalloc-16 of size 16 [ 37.064777] The buggy address is located 8 bytes inside of [ 37.064777] freed 16-byte region [fff00000c5a3bf00, fff00000c5a3bf10) [ 37.065876] [ 37.066266] The buggy address belongs to the physical page: [ 37.066966] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a3b [ 37.067866] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.068684] page_type: f5(slab) [ 37.069216] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 37.070033] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 37.070870] page dumped because: kasan: bad access detected [ 37.071467] [ 37.071795] Memory state around the buggy address: [ 37.072322] fff00000c5a3be00: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 37.073175] fff00000c5a3be80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 37.073832] >fff00000c5a3bf00: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.074656] ^ [ 37.075153] fff00000c5a3bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.075924] fff00000c5a3c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.076617] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob
[ 36.579032] ================================================================== [ 36.580256] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 36.581118] Write of size 16 at addr fff00000c1bb3b80 by task kunit_try_catch/155 [ 36.582071] [ 36.582436] CPU: 0 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 36.584322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.584940] Hardware name: linux,dummy-virt (DT) [ 36.585614] Call trace: [ 36.586162] show_stack+0x20/0x38 (C) [ 36.587172] dump_stack_lvl+0x8c/0xd0 [ 36.587674] print_report+0x118/0x5e0 [ 36.587946] kasan_report+0xc8/0x118 [ 36.588186] __asan_report_store16_noabort+0x20/0x30 [ 36.588535] kmalloc_oob_16+0x3a0/0x3f8 [ 36.589051] kunit_try_run_case+0x14c/0x3d0 [ 36.590015] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.590771] kthread+0x24c/0x2d0 [ 36.591249] ret_from_fork+0x10/0x20 [ 36.591847] [ 36.592184] Allocated by task 155: [ 36.592755] kasan_save_stack+0x3c/0x68 [ 36.593283] kasan_save_track+0x20/0x40 [ 36.594287] kasan_save_alloc_info+0x40/0x58 [ 36.594974] __kasan_kmalloc+0xd4/0xd8 [ 36.595553] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.596175] kmalloc_oob_16+0xb4/0x3f8 [ 36.596758] kunit_try_run_case+0x14c/0x3d0 [ 36.597463] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.598478] kthread+0x24c/0x2d0 [ 36.598892] ret_from_fork+0x10/0x20 [ 36.599437] [ 36.599796] The buggy address belongs to the object at fff00000c1bb3b80 [ 36.599796] which belongs to the cache kmalloc-16 of size 16 [ 36.600894] The buggy address is located 0 bytes inside of [ 36.600894] allocated 13-byte region [fff00000c1bb3b80, fff00000c1bb3b8d) [ 36.602370] [ 36.603010] The buggy address belongs to the physical page: [ 36.603631] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 36.604225] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.605064] page_type: f5(slab) [ 36.605606] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 36.606964] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 36.607736] page dumped because: kasan: bad access detected [ 36.608320] [ 36.608944] Memory state around the buggy address: [ 36.609847] fff00000c1bb3a80: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc [ 36.610822] fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 36.611596] >fff00000c1bb3b80: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.612229] ^ [ 36.612785] fff00000c1bb3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.613849] fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.614671] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 36.462933] ================================================================== [ 36.463957] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 36.464720] Read of size 1 at addr fff00000c449b800 by task kunit_try_catch/153 [ 36.465480] [ 36.466984] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 36.468078] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.468534] Hardware name: linux,dummy-virt (DT) [ 36.469050] Call trace: [ 36.469956] show_stack+0x20/0x38 (C) [ 36.470583] dump_stack_lvl+0x8c/0xd0 [ 36.471117] print_report+0x118/0x5e0 [ 36.471715] kasan_report+0xc8/0x118 [ 36.472245] __kasan_check_byte+0x54/0x70 [ 36.472802] krealloc_noprof+0x44/0x360 [ 36.473411] krealloc_uaf+0x180/0x520 [ 36.473874] kunit_try_run_case+0x14c/0x3d0 [ 36.474807] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.475498] kthread+0x24c/0x2d0 [ 36.476044] ret_from_fork+0x10/0x20 [ 36.476651] [ 36.476948] Allocated by task 153: [ 36.477477] kasan_save_stack+0x3c/0x68 [ 36.477930] kasan_save_track+0x20/0x40 [ 36.479082] kasan_save_alloc_info+0x40/0x58 [ 36.479635] __kasan_kmalloc+0xd4/0xd8 [ 36.480193] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.480720] krealloc_uaf+0xc8/0x520 [ 36.481256] kunit_try_run_case+0x14c/0x3d0 [ 36.481901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.482515] kthread+0x24c/0x2d0 [ 36.483032] ret_from_fork+0x10/0x20 [ 36.483859] [ 36.484146] Freed by task 153: [ 36.484597] kasan_save_stack+0x3c/0x68 [ 36.485101] kasan_save_track+0x20/0x40 [ 36.486057] kasan_save_free_info+0x4c/0x78 [ 36.486651] __kasan_slab_free+0x6c/0x98 [ 36.487481] kfree+0x114/0x3d0 [ 36.488112] krealloc_uaf+0x12c/0x520 [ 36.488784] kunit_try_run_case+0x14c/0x3d0 [ 36.489512] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.490375] kthread+0x24c/0x2d0 [ 36.491061] ret_from_fork+0x10/0x20 [ 36.491646] [ 36.491989] The buggy address belongs to the object at fff00000c449b800 [ 36.491989] which belongs to the cache kmalloc-256 of size 256 [ 36.493676] The buggy address is located 0 bytes inside of [ 36.493676] freed 256-byte region [fff00000c449b800, fff00000c449b900) [ 36.495155] [ 36.495538] The buggy address belongs to the physical page: [ 36.496228] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10449a [ 36.497138] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.498095] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.499077] page_type: f5(slab) [ 36.499679] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 36.500642] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 36.501562] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 36.502844] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 36.503712] head: 0bfffe0000000001 ffffc1ffc3112681 ffffffffffffffff 0000000000000000 [ 36.504589] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 36.505661] page dumped because: kasan: bad access detected [ 36.506403] [ 36.506800] Memory state around the buggy address: [ 36.507419] fff00000c449b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.508295] fff00000c449b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.509097] >fff00000c449b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.509933] ^ [ 36.510825] fff00000c449b880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.511849] fff00000c449b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.512733] ================================================================== [ 36.515378] ================================================================== [ 36.516652] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 36.517612] Read of size 1 at addr fff00000c449b800 by task kunit_try_catch/153 [ 36.519290] [ 36.519610] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 36.520970] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.521646] Hardware name: linux,dummy-virt (DT) [ 36.522666] Call trace: [ 36.523255] show_stack+0x20/0x38 (C) [ 36.523805] dump_stack_lvl+0x8c/0xd0 [ 36.524550] print_report+0x118/0x5e0 [ 36.525151] kasan_report+0xc8/0x118 [ 36.526032] __asan_report_load1_noabort+0x20/0x30 [ 36.526692] krealloc_uaf+0x4c8/0x520 [ 36.527180] kunit_try_run_case+0x14c/0x3d0 [ 36.528064] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.528814] kthread+0x24c/0x2d0 [ 36.529842] ret_from_fork+0x10/0x20 [ 36.530322] [ 36.530588] Allocated by task 153: [ 36.530964] kasan_save_stack+0x3c/0x68 [ 36.531966] kasan_save_track+0x20/0x40 [ 36.532465] kasan_save_alloc_info+0x40/0x58 [ 36.533119] __kasan_kmalloc+0xd4/0xd8 [ 36.533774] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.534643] krealloc_uaf+0xc8/0x520 [ 36.535174] kunit_try_run_case+0x14c/0x3d0 [ 36.535760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.536563] kthread+0x24c/0x2d0 [ 36.537039] ret_from_fork+0x10/0x20 [ 36.537582] [ 36.538371] Freed by task 153: [ 36.539010] kasan_save_stack+0x3c/0x68 [ 36.539620] kasan_save_track+0x20/0x40 [ 36.540396] kasan_save_free_info+0x4c/0x78 [ 36.540955] __kasan_slab_free+0x6c/0x98 [ 36.541724] kfree+0x114/0x3d0 [ 36.542125] krealloc_uaf+0x12c/0x520 [ 36.543036] kunit_try_run_case+0x14c/0x3d0 [ 36.543782] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.544504] kthread+0x24c/0x2d0 [ 36.545000] ret_from_fork+0x10/0x20 [ 36.545568] [ 36.546223] The buggy address belongs to the object at fff00000c449b800 [ 36.546223] which belongs to the cache kmalloc-256 of size 256 [ 36.547369] The buggy address is located 0 bytes inside of [ 36.547369] freed 256-byte region [fff00000c449b800, fff00000c449b900) [ 36.549420] [ 36.549782] The buggy address belongs to the physical page: [ 36.550370] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10449a [ 36.551436] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.552577] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.553494] page_type: f5(slab) [ 36.554033] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 36.555408] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 36.556540] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 36.557662] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 36.558601] head: 0bfffe0000000001 ffffc1ffc3112681 ffffffffffffffff 0000000000000000 [ 36.559512] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 36.560393] page dumped because: kasan: bad access detected [ 36.561086] [ 36.561750] Memory state around the buggy address: [ 36.562313] fff00000c449b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.562992] fff00000c449b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.564609] >fff00000c449b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.565888] ^ [ 36.566382] fff00000c449b880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.567078] fff00000c449b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.567921] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 36.304907] ================================================================== [ 36.306034] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 36.307223] Write of size 1 at addr fff00000c67360c9 by task kunit_try_catch/151 [ 36.308804] [ 36.309735] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 36.310886] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.311598] Hardware name: linux,dummy-virt (DT) [ 36.312291] Call trace: [ 36.312676] show_stack+0x20/0x38 (C) [ 36.312957] dump_stack_lvl+0x8c/0xd0 [ 36.313222] print_report+0x118/0x5e0 [ 36.313989] kasan_report+0xc8/0x118 [ 36.314596] __asan_report_store1_noabort+0x20/0x30 [ 36.315386] krealloc_less_oob_helper+0xa48/0xc50 [ 36.316105] krealloc_large_less_oob+0x20/0x38 [ 36.316803] kunit_try_run_case+0x14c/0x3d0 [ 36.317340] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.318167] kthread+0x24c/0x2d0 [ 36.318716] ret_from_fork+0x10/0x20 [ 36.319406] [ 36.319816] The buggy address belongs to the physical page: [ 36.320575] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106734 [ 36.321551] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.322512] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.323409] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.324413] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 36.325177] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.326219] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 36.327361] head: 0bfffe0000000002 ffffc1ffc319cd01 ffffffffffffffff 0000000000000000 [ 36.328799] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 36.330191] page dumped because: kasan: bad access detected [ 36.330915] [ 36.331079] Memory state around the buggy address: [ 36.331337] fff00000c6735f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.332437] fff00000c6736000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.333239] >fff00000c6736080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 36.334229] ^ [ 36.334633] fff00000c6736100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.335384] fff00000c6736180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.336088] ================================================================== [ 36.007581] ================================================================== [ 36.008713] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 36.009504] Write of size 1 at addr fff00000c449b6c9 by task kunit_try_catch/147 [ 36.010350] [ 36.011302] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 36.012649] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.013252] Hardware name: linux,dummy-virt (DT) [ 36.014046] Call trace: [ 36.014412] show_stack+0x20/0x38 (C) [ 36.014979] dump_stack_lvl+0x8c/0xd0 [ 36.015911] print_report+0x118/0x5e0 [ 36.016460] kasan_report+0xc8/0x118 [ 36.017158] __asan_report_store1_noabort+0x20/0x30 [ 36.018089] krealloc_less_oob_helper+0xa48/0xc50 [ 36.018884] krealloc_less_oob+0x20/0x38 [ 36.019628] kunit_try_run_case+0x14c/0x3d0 [ 36.020293] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.021038] kthread+0x24c/0x2d0 [ 36.021820] ret_from_fork+0x10/0x20 [ 36.022561] [ 36.022905] Allocated by task 147: [ 36.023405] kasan_save_stack+0x3c/0x68 [ 36.024364] kasan_save_track+0x20/0x40 [ 36.025104] kasan_save_alloc_info+0x40/0x58 [ 36.025966] __kasan_krealloc+0x118/0x178 [ 36.026693] krealloc_noprof+0x128/0x360 [ 36.027417] krealloc_less_oob_helper+0x168/0xc50 [ 36.028202] krealloc_less_oob+0x20/0x38 [ 36.028915] kunit_try_run_case+0x14c/0x3d0 [ 36.029996] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.031119] kthread+0x24c/0x2d0 [ 36.031564] ret_from_fork+0x10/0x20 [ 36.031901] [ 36.032743] The buggy address belongs to the object at fff00000c449b600 [ 36.032743] which belongs to the cache kmalloc-256 of size 256 [ 36.034245] The buggy address is located 0 bytes to the right of [ 36.034245] allocated 201-byte region [fff00000c449b600, fff00000c449b6c9) [ 36.035432] [ 36.035807] The buggy address belongs to the physical page: [ 36.036437] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10449a [ 36.037368] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.038346] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.039224] page_type: f5(slab) [ 36.039687] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 36.040594] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 36.041498] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 36.042418] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 36.043251] head: 0bfffe0000000001 ffffc1ffc3112681 ffffffffffffffff 0000000000000000 [ 36.044101] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 36.044913] page dumped because: kasan: bad access detected [ 36.045837] [ 36.046207] Memory state around the buggy address: [ 36.046839] fff00000c449b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.047637] fff00000c449b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.048454] >fff00000c449b680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 36.049196] ^ [ 36.049948] fff00000c449b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.050989] fff00000c449b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.052390] ================================================================== [ 36.339582] ================================================================== [ 36.340399] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 36.341047] Write of size 1 at addr fff00000c67360d0 by task kunit_try_catch/151 [ 36.341922] [ 36.342268] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 36.343343] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.343856] Hardware name: linux,dummy-virt (DT) [ 36.344358] Call trace: [ 36.344792] show_stack+0x20/0x38 (C) [ 36.345276] dump_stack_lvl+0x8c/0xd0 [ 36.345882] print_report+0x118/0x5e0 [ 36.346425] kasan_report+0xc8/0x118 [ 36.347104] __asan_report_store1_noabort+0x20/0x30 [ 36.347798] krealloc_less_oob_helper+0xb9c/0xc50 [ 36.348345] krealloc_large_less_oob+0x20/0x38 [ 36.349006] kunit_try_run_case+0x14c/0x3d0 [ 36.349639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.350380] kthread+0x24c/0x2d0 [ 36.350944] ret_from_fork+0x10/0x20 [ 36.351517] [ 36.351860] The buggy address belongs to the physical page: [ 36.352417] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106734 [ 36.353311] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.354137] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.354930] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.355827] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 36.356670] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.357543] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 36.358389] head: 0bfffe0000000002 ffffc1ffc319cd01 ffffffffffffffff 0000000000000000 [ 36.359210] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 36.359993] page dumped because: kasan: bad access detected [ 36.360631] [ 36.360965] Memory state around the buggy address: [ 36.361538] fff00000c6735f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.362376] fff00000c6736000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.363091] >fff00000c6736080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 36.363912] ^ [ 36.364581] fff00000c6736100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.365385] fff00000c6736180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.366043] ================================================================== [ 36.368850] ================================================================== [ 36.369559] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 36.370384] Write of size 1 at addr fff00000c67360da by task kunit_try_catch/151 [ 36.371011] [ 36.371390] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 36.372551] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.373003] Hardware name: linux,dummy-virt (DT) [ 36.373618] Call trace: [ 36.374030] show_stack+0x20/0x38 (C) [ 36.374566] dump_stack_lvl+0x8c/0xd0 [ 36.375150] print_report+0x118/0x5e0 [ 36.375712] kasan_report+0xc8/0x118 [ 36.376284] __asan_report_store1_noabort+0x20/0x30 [ 36.376850] krealloc_less_oob_helper+0xa80/0xc50 [ 36.377537] krealloc_large_less_oob+0x20/0x38 [ 36.378181] kunit_try_run_case+0x14c/0x3d0 [ 36.378805] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.379482] kthread+0x24c/0x2d0 [ 36.379934] ret_from_fork+0x10/0x20 [ 36.380531] [ 36.380860] The buggy address belongs to the physical page: [ 36.381491] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106734 [ 36.382401] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.383178] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.384097] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.384817] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 36.385721] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.386560] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 36.387463] head: 0bfffe0000000002 ffffc1ffc319cd01 ffffffffffffffff 0000000000000000 [ 36.388216] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 36.389029] page dumped because: kasan: bad access detected [ 36.389592] [ 36.389927] Memory state around the buggy address: [ 36.390520] fff00000c6735f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.391273] fff00000c6736000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.391897] >fff00000c6736080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 36.392731] ^ [ 36.393333] fff00000c6736100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.394208] fff00000c6736180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.394915] ================================================================== [ 36.426334] ================================================================== [ 36.427071] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 36.427806] Write of size 1 at addr fff00000c67360eb by task kunit_try_catch/151 [ 36.428529] [ 36.428883] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 36.429902] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.430420] Hardware name: linux,dummy-virt (DT) [ 36.430986] Call trace: [ 36.431405] show_stack+0x20/0x38 (C) [ 36.431905] dump_stack_lvl+0x8c/0xd0 [ 36.432522] print_report+0x118/0x5e0 [ 36.433092] kasan_report+0xc8/0x118 [ 36.433688] __asan_report_store1_noabort+0x20/0x30 [ 36.434251] krealloc_less_oob_helper+0xa58/0xc50 [ 36.434874] krealloc_large_less_oob+0x20/0x38 [ 36.435502] kunit_try_run_case+0x14c/0x3d0 [ 36.436130] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.436778] kthread+0x24c/0x2d0 [ 36.437315] ret_from_fork+0x10/0x20 [ 36.437907] [ 36.438208] The buggy address belongs to the physical page: [ 36.438797] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106734 [ 36.439724] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.440524] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.441218] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.442120] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 36.442885] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.443658] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 36.444515] head: 0bfffe0000000002 ffffc1ffc319cd01 ffffffffffffffff 0000000000000000 [ 36.445276] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 36.446050] page dumped because: kasan: bad access detected [ 36.446688] [ 36.447026] Memory state around the buggy address: [ 36.447667] fff00000c6735f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.448387] fff00000c6736000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.449130] >fff00000c6736080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 36.449762] ^ [ 36.450547] fff00000c6736100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.451253] fff00000c6736180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.452052] ================================================================== [ 36.139849] ================================================================== [ 36.140901] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 36.141668] Write of size 1 at addr fff00000c449b6ea by task kunit_try_catch/147 [ 36.142524] [ 36.142900] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 36.144825] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.145502] Hardware name: linux,dummy-virt (DT) [ 36.146226] Call trace: [ 36.146789] show_stack+0x20/0x38 (C) [ 36.147509] dump_stack_lvl+0x8c/0xd0 [ 36.148205] print_report+0x118/0x5e0 [ 36.148914] kasan_report+0xc8/0x118 [ 36.149600] __asan_report_store1_noabort+0x20/0x30 [ 36.150358] krealloc_less_oob_helper+0xae4/0xc50 [ 36.150892] krealloc_less_oob+0x20/0x38 [ 36.151405] kunit_try_run_case+0x14c/0x3d0 [ 36.152035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.152772] kthread+0x24c/0x2d0 [ 36.153215] ret_from_fork+0x10/0x20 [ 36.153813] [ 36.154136] Allocated by task 147: [ 36.154635] kasan_save_stack+0x3c/0x68 [ 36.155254] kasan_save_track+0x20/0x40 [ 36.155823] kasan_save_alloc_info+0x40/0x58 [ 36.156423] __kasan_krealloc+0x118/0x178 [ 36.157027] krealloc_noprof+0x128/0x360 [ 36.157575] krealloc_less_oob_helper+0x168/0xc50 [ 36.158154] krealloc_less_oob+0x20/0x38 [ 36.158633] kunit_try_run_case+0x14c/0x3d0 [ 36.159239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.159819] kthread+0x24c/0x2d0 [ 36.160357] ret_from_fork+0x10/0x20 [ 36.160911] [ 36.161250] The buggy address belongs to the object at fff00000c449b600 [ 36.161250] which belongs to the cache kmalloc-256 of size 256 [ 36.162305] The buggy address is located 33 bytes to the right of [ 36.162305] allocated 201-byte region [fff00000c449b600, fff00000c449b6c9) [ 36.163525] [ 36.163860] The buggy address belongs to the physical page: [ 36.164569] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10449a [ 36.165457] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.166178] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.166988] page_type: f5(slab) [ 36.167428] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 36.168268] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 36.169037] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 36.169854] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 36.170745] head: 0bfffe0000000001 ffffc1ffc3112681 ffffffffffffffff 0000000000000000 [ 36.171546] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 36.172257] page dumped because: kasan: bad access detected [ 36.172924] [ 36.173263] Memory state around the buggy address: [ 36.173809] fff00000c449b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.174609] fff00000c449b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.175356] >fff00000c449b680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 36.176097] ^ [ 36.176890] fff00000c449b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.177600] fff00000c449b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.178416] ================================================================== [ 36.054004] ================================================================== [ 36.054690] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 36.055414] Write of size 1 at addr fff00000c449b6d0 by task kunit_try_catch/147 [ 36.057238] [ 36.057818] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 36.059533] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.060211] Hardware name: linux,dummy-virt (DT) [ 36.061149] Call trace: [ 36.061538] show_stack+0x20/0x38 (C) [ 36.062081] dump_stack_lvl+0x8c/0xd0 [ 36.062564] print_report+0x118/0x5e0 [ 36.063055] kasan_report+0xc8/0x118 [ 36.063656] __asan_report_store1_noabort+0x20/0x30 [ 36.064413] krealloc_less_oob_helper+0xb9c/0xc50 [ 36.065134] krealloc_less_oob+0x20/0x38 [ 36.065807] kunit_try_run_case+0x14c/0x3d0 [ 36.066365] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.067032] kthread+0x24c/0x2d0 [ 36.067577] ret_from_fork+0x10/0x20 [ 36.068088] [ 36.068435] Allocated by task 147: [ 36.068938] kasan_save_stack+0x3c/0x68 [ 36.069542] kasan_save_track+0x20/0x40 [ 36.070111] kasan_save_alloc_info+0x40/0x58 [ 36.070686] __kasan_krealloc+0x118/0x178 [ 36.071236] krealloc_noprof+0x128/0x360 [ 36.071834] krealloc_less_oob_helper+0x168/0xc50 [ 36.072494] krealloc_less_oob+0x20/0x38 [ 36.073010] kunit_try_run_case+0x14c/0x3d0 [ 36.073571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.074223] kthread+0x24c/0x2d0 [ 36.074709] ret_from_fork+0x10/0x20 [ 36.075166] [ 36.075507] The buggy address belongs to the object at fff00000c449b600 [ 36.075507] which belongs to the cache kmalloc-256 of size 256 [ 36.076666] The buggy address is located 7 bytes to the right of [ 36.076666] allocated 201-byte region [fff00000c449b600, fff00000c449b6c9) [ 36.077920] [ 36.078222] The buggy address belongs to the physical page: [ 36.078905] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10449a [ 36.079713] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.080592] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.081287] page_type: f5(slab) [ 36.081824] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 36.082670] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 36.083576] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 36.084305] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 36.085115] head: 0bfffe0000000001 ffffc1ffc3112681 ffffffffffffffff 0000000000000000 [ 36.085893] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 36.086698] page dumped because: kasan: bad access detected [ 36.087372] [ 36.087713] Memory state around the buggy address: [ 36.088272] fff00000c449b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.089009] fff00000c449b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.089723] >fff00000c449b680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 36.090535] ^ [ 36.091217] fff00000c449b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.092084] fff00000c449b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.092775] ================================================================== [ 36.096761] ================================================================== [ 36.097488] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 36.098245] Write of size 1 at addr fff00000c449b6da by task kunit_try_catch/147 [ 36.099002] [ 36.099373] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 36.100877] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.101716] Hardware name: linux,dummy-virt (DT) [ 36.102291] Call trace: [ 36.102657] show_stack+0x20/0x38 (C) [ 36.103212] dump_stack_lvl+0x8c/0xd0 [ 36.103759] print_report+0x118/0x5e0 [ 36.104260] kasan_report+0xc8/0x118 [ 36.104886] __asan_report_store1_noabort+0x20/0x30 [ 36.106041] krealloc_less_oob_helper+0xa80/0xc50 [ 36.106674] krealloc_less_oob+0x20/0x38 [ 36.107180] kunit_try_run_case+0x14c/0x3d0 [ 36.107835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.108557] kthread+0x24c/0x2d0 [ 36.109080] ret_from_fork+0x10/0x20 [ 36.109948] [ 36.110264] Allocated by task 147: [ 36.110819] kasan_save_stack+0x3c/0x68 [ 36.111418] kasan_save_track+0x20/0x40 [ 36.111938] kasan_save_alloc_info+0x40/0x58 [ 36.112587] __kasan_krealloc+0x118/0x178 [ 36.113160] krealloc_noprof+0x128/0x360 [ 36.113774] krealloc_less_oob_helper+0x168/0xc50 [ 36.114934] krealloc_less_oob+0x20/0x38 [ 36.115328] kunit_try_run_case+0x14c/0x3d0 [ 36.116300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.117101] kthread+0x24c/0x2d0 [ 36.117521] ret_from_fork+0x10/0x20 [ 36.118139] [ 36.118555] The buggy address belongs to the object at fff00000c449b600 [ 36.118555] which belongs to the cache kmalloc-256 of size 256 [ 36.119853] The buggy address is located 17 bytes to the right of [ 36.119853] allocated 201-byte region [fff00000c449b600, fff00000c449b6c9) [ 36.121212] [ 36.121684] The buggy address belongs to the physical page: [ 36.122318] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10449a [ 36.123035] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.123947] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.124868] page_type: f5(slab) [ 36.125342] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 36.126119] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 36.127024] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 36.127869] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 36.128677] head: 0bfffe0000000001 ffffc1ffc3112681 ffffffffffffffff 0000000000000000 [ 36.129561] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 36.130314] page dumped because: kasan: bad access detected [ 36.130919] [ 36.131258] Memory state around the buggy address: [ 36.131791] fff00000c449b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.132593] fff00000c449b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.133368] >fff00000c449b680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 36.134100] ^ [ 36.134787] fff00000c449b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.135550] fff00000c449b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.136296] ================================================================== [ 36.182322] ================================================================== [ 36.183552] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 36.184146] Write of size 1 at addr fff00000c449b6eb by task kunit_try_catch/147 [ 36.185053] [ 36.186118] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 36.187590] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.188273] Hardware name: linux,dummy-virt (DT) [ 36.188834] Call trace: [ 36.189206] show_stack+0x20/0x38 (C) [ 36.189823] dump_stack_lvl+0x8c/0xd0 [ 36.190397] print_report+0x118/0x5e0 [ 36.191027] kasan_report+0xc8/0x118 [ 36.191643] __asan_report_store1_noabort+0x20/0x30 [ 36.192250] krealloc_less_oob_helper+0xa58/0xc50 [ 36.192957] krealloc_less_oob+0x20/0x38 [ 36.193523] kunit_try_run_case+0x14c/0x3d0 [ 36.194182] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.194818] kthread+0x24c/0x2d0 [ 36.195388] ret_from_fork+0x10/0x20 [ 36.195962] [ 36.196344] Allocated by task 147: [ 36.196904] kasan_save_stack+0x3c/0x68 [ 36.197416] kasan_save_track+0x20/0x40 [ 36.198033] kasan_save_alloc_info+0x40/0x58 [ 36.198634] __kasan_krealloc+0x118/0x178 [ 36.199259] krealloc_noprof+0x128/0x360 [ 36.199805] krealloc_less_oob_helper+0x168/0xc50 [ 36.200551] krealloc_less_oob+0x20/0x38 [ 36.201090] kunit_try_run_case+0x14c/0x3d0 [ 36.201697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.202391] kthread+0x24c/0x2d0 [ 36.202935] ret_from_fork+0x10/0x20 [ 36.203462] [ 36.203840] The buggy address belongs to the object at fff00000c449b600 [ 36.203840] which belongs to the cache kmalloc-256 of size 256 [ 36.204980] The buggy address is located 34 bytes to the right of [ 36.204980] allocated 201-byte region [fff00000c449b600, fff00000c449b6c9) [ 36.206246] [ 36.206627] The buggy address belongs to the physical page: [ 36.207274] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10449a [ 36.208124] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.209019] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.209852] page_type: f5(slab) [ 36.210296] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 36.211181] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 36.212079] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 36.212957] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 36.213737] head: 0bfffe0000000001 ffffc1ffc3112681 ffffffffffffffff 0000000000000000 [ 36.214111] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 36.214477] page dumped because: kasan: bad access detected [ 36.215120] [ 36.215479] Memory state around the buggy address: [ 36.216398] fff00000c449b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.217162] fff00000c449b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.217590] >fff00000c449b680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 36.218530] ^ [ 36.219385] fff00000c449b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.220281] fff00000c449b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.221146] ================================================================== [ 36.396426] ================================================================== [ 36.397995] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 36.398855] Write of size 1 at addr fff00000c67360ea by task kunit_try_catch/151 [ 36.399709] [ 36.400070] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 36.402369] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.402847] Hardware name: linux,dummy-virt (DT) [ 36.403394] Call trace: [ 36.403825] show_stack+0x20/0x38 (C) [ 36.404374] dump_stack_lvl+0x8c/0xd0 [ 36.404897] print_report+0x118/0x5e0 [ 36.405410] kasan_report+0xc8/0x118 [ 36.405995] __asan_report_store1_noabort+0x20/0x30 [ 36.406680] krealloc_less_oob_helper+0xae4/0xc50 [ 36.407337] krealloc_large_less_oob+0x20/0x38 [ 36.408005] kunit_try_run_case+0x14c/0x3d0 [ 36.408655] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.409341] kthread+0x24c/0x2d0 [ 36.409836] ret_from_fork+0x10/0x20 [ 36.410354] [ 36.410687] The buggy address belongs to the physical page: [ 36.411354] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106734 [ 36.412159] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.412966] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.413769] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.414518] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 36.415301] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.416036] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 36.416901] head: 0bfffe0000000002 ffffc1ffc319cd01 ffffffffffffffff 0000000000000000 [ 36.417744] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 36.418606] page dumped because: kasan: bad access detected [ 36.419198] [ 36.419528] Memory state around the buggy address: [ 36.420002] fff00000c6735f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.420855] fff00000c6736000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.421599] >fff00000c6736080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 36.422307] ^ [ 36.423108] fff00000c6736100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.423811] fff00000c6736180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.424560] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 36.232513] ================================================================== [ 36.234292] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680 [ 36.235171] Write of size 1 at addr fff00000c64d60eb by task kunit_try_catch/149 [ 36.235911] [ 36.236291] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 36.238176] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.238601] Hardware name: linux,dummy-virt (DT) [ 36.239286] Call trace: [ 36.239819] show_stack+0x20/0x38 (C) [ 36.240483] dump_stack_lvl+0x8c/0xd0 [ 36.241102] print_report+0x118/0x5e0 [ 36.241792] kasan_report+0xc8/0x118 [ 36.242484] __asan_report_store1_noabort+0x20/0x30 [ 36.243005] krealloc_more_oob_helper+0x614/0x680 [ 36.243537] krealloc_large_more_oob+0x20/0x38 [ 36.244621] kunit_try_run_case+0x14c/0x3d0 [ 36.245465] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.246153] kthread+0x24c/0x2d0 [ 36.246674] ret_from_fork+0x10/0x20 [ 36.247277] [ 36.247647] The buggy address belongs to the physical page: [ 36.248263] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064d4 [ 36.249018] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.250113] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.250714] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.251288] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 36.252184] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.253657] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 36.254890] head: 0bfffe0000000002 ffffc1ffc3193501 ffffffffffffffff 0000000000000000 [ 36.255682] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 36.256673] page dumped because: kasan: bad access detected [ 36.257489] [ 36.257734] Memory state around the buggy address: [ 36.258426] fff00000c64d5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.259879] fff00000c64d6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.260731] >fff00000c64d6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 36.261610] ^ [ 36.262426] fff00000c64d6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.263146] fff00000c64d6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.264015] ================================================================== [ 35.906995] ================================================================== [ 35.908062] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680 [ 35.908981] Write of size 1 at addr fff00000c449b4eb by task kunit_try_catch/145 [ 35.910393] [ 35.910820] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 35.912068] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.912890] Hardware name: linux,dummy-virt (DT) [ 35.913930] Call trace: [ 35.914724] show_stack+0x20/0x38 (C) [ 35.915240] dump_stack_lvl+0x8c/0xd0 [ 35.915797] print_report+0x118/0x5e0 [ 35.916376] kasan_report+0xc8/0x118 [ 35.916962] __asan_report_store1_noabort+0x20/0x30 [ 35.918040] krealloc_more_oob_helper+0x614/0x680 [ 35.918697] krealloc_more_oob+0x20/0x38 [ 35.919168] kunit_try_run_case+0x14c/0x3d0 [ 35.919802] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.920472] kthread+0x24c/0x2d0 [ 35.920967] ret_from_fork+0x10/0x20 [ 35.921642] [ 35.921968] Allocated by task 145: [ 35.922387] kasan_save_stack+0x3c/0x68 [ 35.922988] kasan_save_track+0x20/0x40 [ 35.923461] kasan_save_alloc_info+0x40/0x58 [ 35.924085] __kasan_krealloc+0x118/0x178 [ 35.924682] krealloc_noprof+0x128/0x360 [ 35.925177] krealloc_more_oob_helper+0x168/0x680 [ 35.926794] krealloc_more_oob+0x20/0x38 [ 35.927333] kunit_try_run_case+0x14c/0x3d0 [ 35.927864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.928521] kthread+0x24c/0x2d0 [ 35.928993] ret_from_fork+0x10/0x20 [ 35.929536] [ 35.930112] The buggy address belongs to the object at fff00000c449b400 [ 35.930112] which belongs to the cache kmalloc-256 of size 256 [ 35.931513] The buggy address is located 0 bytes to the right of [ 35.931513] allocated 235-byte region [fff00000c449b400, fff00000c449b4eb) [ 35.932704] [ 35.933116] The buggy address belongs to the physical page: [ 35.934503] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10449a [ 35.935146] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 35.936891] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 35.937585] page_type: f5(slab) [ 35.938084] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 35.938980] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 35.939807] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 35.940635] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 35.941527] head: 0bfffe0000000001 ffffc1ffc3112681 ffffffffffffffff 0000000000000000 [ 35.942482] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 35.943231] page dumped because: kasan: bad access detected [ 35.944214] [ 35.944699] Memory state around the buggy address: [ 35.945765] fff00000c449b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.946767] fff00000c449b400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.947854] >fff00000c449b480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 35.948782] ^ [ 35.949691] fff00000c449b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.950523] fff00000c449b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.951180] ================================================================== [ 35.953922] ================================================================== [ 35.954532] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680 [ 35.955168] Write of size 1 at addr fff00000c449b4f0 by task kunit_try_catch/145 [ 35.956030] [ 35.956392] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 35.958254] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.958767] Hardware name: linux,dummy-virt (DT) [ 35.959237] Call trace: [ 35.959628] show_stack+0x20/0x38 (C) [ 35.960190] dump_stack_lvl+0x8c/0xd0 [ 35.960801] print_report+0x118/0x5e0 [ 35.961627] kasan_report+0xc8/0x118 [ 35.962109] __asan_report_store1_noabort+0x20/0x30 [ 35.962749] krealloc_more_oob_helper+0x5c8/0x680 [ 35.963258] krealloc_more_oob+0x20/0x38 [ 35.963865] kunit_try_run_case+0x14c/0x3d0 [ 35.964499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.965091] kthread+0x24c/0x2d0 [ 35.965938] ret_from_fork+0x10/0x20 [ 35.966524] [ 35.966826] Allocated by task 145: [ 35.967538] kasan_save_stack+0x3c/0x68 [ 35.968082] kasan_save_track+0x20/0x40 [ 35.968655] kasan_save_alloc_info+0x40/0x58 [ 35.969232] __kasan_krealloc+0x118/0x178 [ 35.969795] krealloc_noprof+0x128/0x360 [ 35.970371] krealloc_more_oob_helper+0x168/0x680 [ 35.971002] krealloc_more_oob+0x20/0x38 [ 35.971597] kunit_try_run_case+0x14c/0x3d0 [ 35.972076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.972765] kthread+0x24c/0x2d0 [ 35.973268] ret_from_fork+0x10/0x20 [ 35.974612] [ 35.974967] The buggy address belongs to the object at fff00000c449b400 [ 35.974967] which belongs to the cache kmalloc-256 of size 256 [ 35.976082] The buggy address is located 5 bytes to the right of [ 35.976082] allocated 235-byte region [fff00000c449b400, fff00000c449b4eb) [ 35.978244] [ 35.978601] The buggy address belongs to the physical page: [ 35.979210] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10449a [ 35.980463] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 35.981270] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 35.982352] page_type: f5(slab) [ 35.982830] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 35.983764] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 35.984635] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 35.985639] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 35.986475] head: 0bfffe0000000001 ffffc1ffc3112681 ffffffffffffffff 0000000000000000 [ 35.987284] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 35.988136] page dumped because: kasan: bad access detected [ 35.988821] [ 35.989103] Memory state around the buggy address: [ 35.990158] fff00000c449b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.990885] fff00000c449b400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.991689] >fff00000c449b480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 35.992475] ^ [ 35.993276] fff00000c449b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.994389] fff00000c449b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.995136] ================================================================== [ 36.265744] ================================================================== [ 36.266545] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680 [ 36.267507] Write of size 1 at addr fff00000c64d60f0 by task kunit_try_catch/149 [ 36.268231] [ 36.268588] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 36.269696] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.270258] Hardware name: linux,dummy-virt (DT) [ 36.270941] Call trace: [ 36.271366] show_stack+0x20/0x38 (C) [ 36.271815] dump_stack_lvl+0x8c/0xd0 [ 36.272412] print_report+0x118/0x5e0 [ 36.273050] kasan_report+0xc8/0x118 [ 36.273742] __asan_report_store1_noabort+0x20/0x30 [ 36.274491] krealloc_more_oob_helper+0x5c8/0x680 [ 36.275201] krealloc_large_more_oob+0x20/0x38 [ 36.275754] kunit_try_run_case+0x14c/0x3d0 [ 36.276456] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.277259] kthread+0x24c/0x2d0 [ 36.277913] ret_from_fork+0x10/0x20 [ 36.278530] [ 36.278782] The buggy address belongs to the physical page: [ 36.279217] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064d4 [ 36.280117] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.281065] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.282169] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.283042] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 36.283944] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.284860] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 36.285632] head: 0bfffe0000000002 ffffc1ffc3193501 ffffffffffffffff 0000000000000000 [ 36.286558] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 36.287206] page dumped because: kasan: bad access detected [ 36.288008] [ 36.288348] Memory state around the buggy address: [ 36.289022] fff00000c64d5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.289930] fff00000c64d6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.290753] >fff00000c64d6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 36.291535] ^ [ 36.292419] fff00000c64d6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.293113] fff00000c64d6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.294112] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 35.867518] ================================================================== [ 35.868827] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 35.869509] Read of size 1 at addr fff00000c6770000 by task kunit_try_catch/143 [ 35.871189] [ 35.871607] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 35.873024] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.874248] Hardware name: linux,dummy-virt (DT) [ 35.874841] Call trace: [ 35.875325] show_stack+0x20/0x38 (C) [ 35.875994] dump_stack_lvl+0x8c/0xd0 [ 35.876626] print_report+0x118/0x5e0 [ 35.877229] kasan_report+0xc8/0x118 [ 35.877782] __asan_report_load1_noabort+0x20/0x30 [ 35.878415] page_alloc_uaf+0x328/0x350 [ 35.879210] kunit_try_run_case+0x14c/0x3d0 [ 35.879951] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.880547] kthread+0x24c/0x2d0 [ 35.881060] ret_from_fork+0x10/0x20 [ 35.881649] [ 35.881973] The buggy address belongs to the physical page: [ 35.883123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106770 [ 35.884074] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.885487] page_type: f0(buddy) [ 35.886662] raw: 0bfffe0000000000 fff00000ff6150e0 fff00000ff6150e0 0000000000000000 [ 35.888098] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000 [ 35.889385] page dumped because: kasan: bad access detected [ 35.890177] [ 35.890428] Memory state around the buggy address: [ 35.890866] fff00000c676ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.892033] fff00000c676ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.893009] >fff00000c6770000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.894128] ^ [ 35.894619] fff00000c6770080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.895500] fff00000c6770100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.896273] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[ 35.816090] ================================================================== [ 35.817224] BUG: KASAN: invalid-free in kfree+0x278/0x3d0 [ 35.818372] Free of addr fff00000c6730001 by task kunit_try_catch/139 [ 35.819801] [ 35.820185] CPU: 1 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 35.821255] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.821987] Hardware name: linux,dummy-virt (DT) [ 35.822426] Call trace: [ 35.822833] show_stack+0x20/0x38 (C) [ 35.823430] dump_stack_lvl+0x8c/0xd0 [ 35.824043] print_report+0x118/0x5e0 [ 35.824594] kasan_report_invalid_free+0xb0/0xd8 [ 35.825216] __kasan_kfree_large+0x5c/0xa8 [ 35.825835] free_large_kmalloc+0x58/0x140 [ 35.826464] kfree+0x278/0x3d0 [ 35.827006] kmalloc_large_invalid_free+0x108/0x270 [ 35.827792] kunit_try_run_case+0x14c/0x3d0 [ 35.828466] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.829137] kthread+0x24c/0x2d0 [ 35.829887] ret_from_fork+0x10/0x20 [ 35.830487] [ 35.830820] The buggy address belongs to the physical page: [ 35.831344] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106730 [ 35.832282] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 35.833023] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 35.834242] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 35.835104] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 35.836118] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 35.836943] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 35.837739] head: 0bfffe0000000002 ffffc1ffc319cc01 ffffffffffffffff 0000000000000000 [ 35.838553] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 35.839312] page dumped because: kasan: bad access detected [ 35.840854] [ 35.841266] Memory state around the buggy address: [ 35.842132] fff00000c672ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.843147] fff00000c672ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.843979] >fff00000c6730000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.844848] ^ [ 35.845772] fff00000c6730080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.846521] fff00000c6730100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.847305] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 35.779585] ================================================================== [ 35.780804] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 35.781613] Read of size 1 at addr fff00000c64d0000 by task kunit_try_catch/137 [ 35.782209] [ 35.782859] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 35.784176] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.785103] Hardware name: linux,dummy-virt (DT) [ 35.786057] Call trace: [ 35.786371] show_stack+0x20/0x38 (C) [ 35.786854] dump_stack_lvl+0x8c/0xd0 [ 35.787268] print_report+0x118/0x5e0 [ 35.787649] kasan_report+0xc8/0x118 [ 35.789006] __asan_report_load1_noabort+0x20/0x30 [ 35.789660] kmalloc_large_uaf+0x2cc/0x2f8 [ 35.790519] kunit_try_run_case+0x14c/0x3d0 [ 35.791183] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.791719] kthread+0x24c/0x2d0 [ 35.792120] ret_from_fork+0x10/0x20 [ 35.792838] [ 35.793623] The buggy address belongs to the physical page: [ 35.794954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064d0 [ 35.796330] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.797113] raw: 0bfffe0000000000 ffffc1ffc3193508 fff00000da4e4f80 0000000000000000 [ 35.798216] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 35.799173] page dumped because: kasan: bad access detected [ 35.799876] [ 35.800201] Memory state around the buggy address: [ 35.801131] fff00000c64cff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.801876] fff00000c64cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.803266] >fff00000c64d0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.803886] ^ [ 35.804321] fff00000c64d0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.805047] fff00000c64d0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.805865] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 35.738825] ================================================================== [ 35.739782] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 35.740627] Write of size 1 at addr fff00000c673200a by task kunit_try_catch/135 [ 35.741331] [ 35.742438] CPU: 1 UID: 0 PID: 135 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 35.743398] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.743939] Hardware name: linux,dummy-virt (DT) [ 35.744581] Call trace: [ 35.745053] show_stack+0x20/0x38 (C) [ 35.745970] dump_stack_lvl+0x8c/0xd0 [ 35.746694] print_report+0x118/0x5e0 [ 35.747405] kasan_report+0xc8/0x118 [ 35.747973] __asan_report_store1_noabort+0x20/0x30 [ 35.748545] kmalloc_large_oob_right+0x278/0x2b8 [ 35.749691] kunit_try_run_case+0x14c/0x3d0 [ 35.750235] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.751013] kthread+0x24c/0x2d0 [ 35.751806] ret_from_fork+0x10/0x20 [ 35.752301] [ 35.752803] The buggy address belongs to the physical page: [ 35.753808] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106730 [ 35.754477] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 35.755208] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 35.756107] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 35.756907] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 35.757784] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 35.758593] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 35.759468] head: 0bfffe0000000002 ffffc1ffc319cc01 ffffffffffffffff 0000000000000000 [ 35.760319] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 35.761149] page dumped because: kasan: bad access detected [ 35.761875] [ 35.762107] Memory state around the buggy address: [ 35.763094] fff00000c6731f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.764483] fff00000c6731f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.765489] >fff00000c6732000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 35.766136] ^ [ 35.766670] fff00000c6732080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 35.767293] fff00000c6732100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 35.768129] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 35.688146] ================================================================== [ 35.689337] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 35.690548] Write of size 1 at addr fff00000c6729f00 by task kunit_try_catch/133 [ 35.691160] [ 35.691546] CPU: 1 UID: 0 PID: 133 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 35.692674] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.693229] Hardware name: linux,dummy-virt (DT) [ 35.693798] Call trace: [ 35.694211] show_stack+0x20/0x38 (C) [ 35.694854] dump_stack_lvl+0x8c/0xd0 [ 35.695423] print_report+0x118/0x5e0 [ 35.695910] kasan_report+0xc8/0x118 [ 35.696518] __asan_report_store1_noabort+0x20/0x30 [ 35.697203] kmalloc_big_oob_right+0x2a4/0x2f0 [ 35.697754] kunit_try_run_case+0x14c/0x3d0 [ 35.698638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.699293] kthread+0x24c/0x2d0 [ 35.699950] ret_from_fork+0x10/0x20 [ 35.700513] [ 35.700790] Allocated by task 133: [ 35.701641] kasan_save_stack+0x3c/0x68 [ 35.702199] kasan_save_track+0x20/0x40 [ 35.702746] kasan_save_alloc_info+0x40/0x58 [ 35.703304] __kasan_kmalloc+0xd4/0xd8 [ 35.703890] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.704534] kmalloc_big_oob_right+0xb8/0x2f0 [ 35.705182] kunit_try_run_case+0x14c/0x3d0 [ 35.706217] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.706818] kthread+0x24c/0x2d0 [ 35.707332] ret_from_fork+0x10/0x20 [ 35.707832] [ 35.708142] The buggy address belongs to the object at fff00000c6728000 [ 35.708142] which belongs to the cache kmalloc-8k of size 8192 [ 35.709342] The buggy address is located 0 bytes to the right of [ 35.709342] allocated 7936-byte region [fff00000c6728000, fff00000c6729f00) [ 35.711293] [ 35.711660] The buggy address belongs to the physical page: [ 35.712274] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106728 [ 35.713932] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 35.714591] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 35.715362] page_type: f5(slab) [ 35.716027] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 35.716681] raw: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000 [ 35.717533] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 35.718310] head: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000 [ 35.719104] head: 0bfffe0000000003 ffffc1ffc319ca01 ffffffffffffffff 0000000000000000 [ 35.719918] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000 [ 35.720692] page dumped because: kasan: bad access detected [ 35.721315] [ 35.721904] Memory state around the buggy address: [ 35.722469] fff00000c6729e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.723377] fff00000c6729e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.724140] >fff00000c6729f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.724988] ^ [ 35.725662] fff00000c6729f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.726392] fff00000c672a000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.727168] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 35.603762] ================================================================== [ 35.605480] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x414/0x490 [ 35.606399] Write of size 1 at addr fff00000c653a678 by task kunit_try_catch/131 [ 35.608097] [ 35.608504] CPU: 0 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 35.609894] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.610515] Hardware name: linux,dummy-virt (DT) [ 35.611023] Call trace: [ 35.611497] show_stack+0x20/0x38 (C) [ 35.612223] dump_stack_lvl+0x8c/0xd0 [ 35.612855] print_report+0x118/0x5e0 [ 35.613431] kasan_report+0xc8/0x118 [ 35.613993] __asan_report_store1_noabort+0x20/0x30 [ 35.614563] kmalloc_track_caller_oob_right+0x414/0x490 [ 35.615289] kunit_try_run_case+0x14c/0x3d0 [ 35.615938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.617506] kthread+0x24c/0x2d0 [ 35.618564] ret_from_fork+0x10/0x20 [ 35.619167] [ 35.619506] Allocated by task 131: [ 35.620050] kasan_save_stack+0x3c/0x68 [ 35.620702] kasan_save_track+0x20/0x40 [ 35.621383] kasan_save_alloc_info+0x40/0x58 [ 35.621944] __kasan_kmalloc+0xd4/0xd8 [ 35.622415] __kmalloc_node_track_caller_noprof+0x184/0x4b8 [ 35.623498] kmalloc_track_caller_oob_right+0xa8/0x490 [ 35.624982] kunit_try_run_case+0x14c/0x3d0 [ 35.625577] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.626093] kthread+0x24c/0x2d0 [ 35.626543] ret_from_fork+0x10/0x20 [ 35.627092] [ 35.627437] The buggy address belongs to the object at fff00000c653a600 [ 35.627437] which belongs to the cache kmalloc-128 of size 128 [ 35.628426] The buggy address is located 0 bytes to the right of [ 35.628426] allocated 120-byte region [fff00000c653a600, fff00000c653a678) [ 35.629567] [ 35.630232] The buggy address belongs to the physical page: [ 35.631273] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a [ 35.631967] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.633218] page_type: f5(slab) [ 35.633970] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.635072] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 35.635972] page dumped because: kasan: bad access detected [ 35.636686] [ 35.637017] Memory state around the buggy address: [ 35.637913] fff00000c653a500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 35.638954] fff00000c653a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.639863] >fff00000c653a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 35.640640] ^ [ 35.641744] fff00000c653a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.642472] fff00000c653a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.643307] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 35.550969] ================================================================== [ 35.552096] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 35.552978] Read of size 1 at addr fff00000c649d000 by task kunit_try_catch/129 [ 35.553899] [ 35.554285] CPU: 1 UID: 0 PID: 129 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 35.555677] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.556695] Hardware name: linux,dummy-virt (DT) [ 35.557195] Call trace: [ 35.558054] show_stack+0x20/0x38 (C) [ 35.558654] dump_stack_lvl+0x8c/0xd0 [ 35.559359] print_report+0x118/0x5e0 [ 35.559911] kasan_report+0xc8/0x118 [ 35.560489] __asan_report_load1_noabort+0x20/0x30 [ 35.561276] kmalloc_node_oob_right+0x2f4/0x330 [ 35.562459] kunit_try_run_case+0x14c/0x3d0 [ 35.562975] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.563615] kthread+0x24c/0x2d0 [ 35.564143] ret_from_fork+0x10/0x20 [ 35.564696] [ 35.564982] Allocated by task 129: [ 35.565807] kasan_save_stack+0x3c/0x68 [ 35.566474] kasan_save_track+0x20/0x40 [ 35.567006] kasan_save_alloc_info+0x40/0x58 [ 35.567632] __kasan_kmalloc+0xd4/0xd8 [ 35.568178] __kmalloc_cache_node_noprof+0x164/0x3d0 [ 35.568767] kmalloc_node_oob_right+0xbc/0x330 [ 35.569396] kunit_try_run_case+0x14c/0x3d0 [ 35.570380] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.571089] kthread+0x24c/0x2d0 [ 35.571578] ret_from_fork+0x10/0x20 [ 35.572041] [ 35.572388] The buggy address belongs to the object at fff00000c649c000 [ 35.572388] which belongs to the cache kmalloc-4k of size 4096 [ 35.573721] The buggy address is located 0 bytes to the right of [ 35.573721] allocated 4096-byte region [fff00000c649c000, fff00000c649d000) [ 35.575559] [ 35.575849] The buggy address belongs to the physical page: [ 35.576623] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106498 [ 35.578023] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 35.578769] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 35.579650] page_type: f5(slab) [ 35.580169] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 35.580927] raw: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000 [ 35.581995] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 35.583006] head: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000 [ 35.583838] head: 0bfffe0000000003 ffffc1ffc3192601 ffffffffffffffff 0000000000000000 [ 35.584614] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000 [ 35.585645] page dumped because: kasan: bad access detected [ 35.586313] [ 35.586760] Memory state around the buggy address: [ 35.587403] fff00000c649cf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.588408] fff00000c649cf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.589489] >fff00000c649d000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.590667] ^ [ 35.591236] fff00000c649d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.592124] fff00000c649d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.592987] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 35.492967] ================================================================== [ 35.494287] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 35.495897] Read of size 1 at addr fff00000c1bb3b5f by task kunit_try_catch/127 [ 35.496753] [ 35.497272] CPU: 0 UID: 0 PID: 127 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 35.498653] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.499152] Hardware name: linux,dummy-virt (DT) [ 35.499763] Call trace: [ 35.500283] show_stack+0x20/0x38 (C) [ 35.500893] dump_stack_lvl+0x8c/0xd0 [ 35.501428] print_report+0x118/0x5e0 [ 35.502026] kasan_report+0xc8/0x118 [ 35.502772] __asan_report_load1_noabort+0x20/0x30 [ 35.503243] kmalloc_oob_left+0x2ec/0x320 [ 35.503671] kunit_try_run_case+0x14c/0x3d0 [ 35.504184] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.504891] kthread+0x24c/0x2d0 [ 35.506031] ret_from_fork+0x10/0x20 [ 35.506613] [ 35.506956] Allocated by task 28: [ 35.507470] kasan_save_stack+0x3c/0x68 [ 35.508066] kasan_save_track+0x20/0x40 [ 35.508657] kasan_save_alloc_info+0x40/0x58 [ 35.510230] __kasan_kmalloc+0xd4/0xd8 [ 35.510779] __kmalloc_node_track_caller_noprof+0x184/0x4b8 [ 35.511502] kstrdup+0x54/0xc8 [ 35.511942] devtmpfs_work_loop+0x384/0x590 [ 35.512520] devtmpfsd+0x50/0x58 [ 35.513017] kthread+0x24c/0x2d0 [ 35.513590] ret_from_fork+0x10/0x20 [ 35.514428] [ 35.514805] Freed by task 28: [ 35.515312] kasan_save_stack+0x3c/0x68 [ 35.515860] kasan_save_track+0x20/0x40 [ 35.516776] kasan_save_free_info+0x4c/0x78 [ 35.517582] __kasan_slab_free+0x6c/0x98 [ 35.518159] kfree+0x114/0x3d0 [ 35.518647] devtmpfs_work_loop+0x498/0x590 [ 35.519165] devtmpfsd+0x50/0x58 [ 35.520371] kthread+0x24c/0x2d0 [ 35.521109] ret_from_fork+0x10/0x20 [ 35.522163] [ 35.522606] The buggy address belongs to the object at fff00000c1bb3b40 [ 35.522606] which belongs to the cache kmalloc-16 of size 16 [ 35.523802] The buggy address is located 15 bytes to the right of [ 35.523802] allocated 16-byte region [fff00000c1bb3b40, fff00000c1bb3b50) [ 35.524946] [ 35.525291] The buggy address belongs to the physical page: [ 35.526867] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3 [ 35.528143] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.528676] page_type: f5(slab) [ 35.529176] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.530395] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 35.531235] page dumped because: kasan: bad access detected [ 35.531809] [ 35.532119] Memory state around the buggy address: [ 35.532642] fff00000c1bb3a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.533501] fff00000c1bb3a80: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc [ 35.534268] >fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc 00 07 fc fc [ 35.535018] ^ [ 35.535955] fff00000c1bb3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.537161] fff00000c1bb3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.538261] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 35.359921] ================================================================== [ 35.361524] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 35.363675] Write of size 1 at addr fff00000c1bea573 by task kunit_try_catch/125 [ 35.364499] [ 35.366419] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G N 6.12.0-next-20241120 #1 [ 35.367784] Tainted: [N]=TEST [ 35.368255] Hardware name: linux,dummy-virt (DT) [ 35.369497] Call trace: [ 35.370295] show_stack+0x20/0x38 (C) [ 35.371148] dump_stack_lvl+0x8c/0xd0 [ 35.371705] print_report+0x118/0x5e0 [ 35.372339] kasan_report+0xc8/0x118 [ 35.372950] __asan_report_store1_noabort+0x20/0x30 [ 35.373888] kmalloc_oob_right+0x5a4/0x660 [ 35.374424] kunit_try_run_case+0x14c/0x3d0 [ 35.375068] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.375816] kthread+0x24c/0x2d0 [ 35.376371] ret_from_fork+0x10/0x20 [ 35.377462] [ 35.377892] Allocated by task 125: [ 35.378748] kasan_save_stack+0x3c/0x68 [ 35.379460] kasan_save_track+0x20/0x40 [ 35.379896] kasan_save_alloc_info+0x40/0x58 [ 35.380326] __kasan_kmalloc+0xd4/0xd8 [ 35.380775] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.381452] kmalloc_oob_right+0xb0/0x660 [ 35.382144] kunit_try_run_case+0x14c/0x3d0 [ 35.382771] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.383494] kthread+0x24c/0x2d0 [ 35.384023] ret_from_fork+0x10/0x20 [ 35.384805] [ 35.385389] The buggy address belongs to the object at fff00000c1bea500 [ 35.385389] which belongs to the cache kmalloc-128 of size 128 [ 35.387195] The buggy address is located 0 bytes to the right of [ 35.387195] allocated 115-byte region [fff00000c1bea500, fff00000c1bea573) [ 35.388531] [ 35.389173] The buggy address belongs to the physical page: [ 35.390656] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bea [ 35.391841] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.393079] page_type: f5(slab) [ 35.394575] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.395321] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 35.396311] page dumped because: kasan: bad access detected [ 35.396967] [ 35.397325] Memory state around the buggy address: [ 35.398430] fff00000c1bea400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 35.399312] fff00000c1bea480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.401657] >fff00000c1bea500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 35.402507] ^ [ 35.403385] fff00000c1bea580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.404112] fff00000c1bea600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.404943] ================================================================== [ 35.409275] ================================================================== [ 35.410088] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 35.410862] Write of size 1 at addr fff00000c1bea578 by task kunit_try_catch/125 [ 35.412724] [ 35.412979] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 35.414304] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.414750] Hardware name: linux,dummy-virt (DT) [ 35.415328] Call trace: [ 35.415766] show_stack+0x20/0x38 (C) [ 35.416383] dump_stack_lvl+0x8c/0xd0 [ 35.416917] print_report+0x118/0x5e0 [ 35.417841] kasan_report+0xc8/0x118 [ 35.418338] __asan_report_store1_noabort+0x20/0x30 [ 35.418974] kmalloc_oob_right+0x538/0x660 [ 35.419461] kunit_try_run_case+0x14c/0x3d0 [ 35.420064] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.420794] kthread+0x24c/0x2d0 [ 35.421287] ret_from_fork+0x10/0x20 [ 35.421805] [ 35.422118] Allocated by task 125: [ 35.422576] kasan_save_stack+0x3c/0x68 [ 35.423096] kasan_save_track+0x20/0x40 [ 35.424059] kasan_save_alloc_info+0x40/0x58 [ 35.424697] __kasan_kmalloc+0xd4/0xd8 [ 35.425135] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.426177] kmalloc_oob_right+0xb0/0x660 [ 35.426700] kunit_try_run_case+0x14c/0x3d0 [ 35.427261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.427901] kthread+0x24c/0x2d0 [ 35.428426] ret_from_fork+0x10/0x20 [ 35.428929] [ 35.429648] The buggy address belongs to the object at fff00000c1bea500 [ 35.429648] which belongs to the cache kmalloc-128 of size 128 [ 35.430847] The buggy address is located 5 bytes to the right of [ 35.430847] allocated 115-byte region [fff00000c1bea500, fff00000c1bea573) [ 35.432748] [ 35.433086] The buggy address belongs to the physical page: [ 35.433813] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bea [ 35.434701] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.435598] page_type: f5(slab) [ 35.435967] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.436894] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 35.437604] page dumped because: kasan: bad access detected [ 35.438276] [ 35.438644] Memory state around the buggy address: [ 35.439217] fff00000c1bea400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 35.440097] fff00000c1bea480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.440818] >fff00000c1bea500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 35.442000] ^ [ 35.442714] fff00000c1bea580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.443554] fff00000c1bea600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.444223] ================================================================== [ 35.447224] ================================================================== [ 35.447932] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 35.448648] Read of size 1 at addr fff00000c1bea580 by task kunit_try_catch/125 [ 35.449852] [ 35.450237] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 35.451480] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.452106] Hardware name: linux,dummy-virt (DT) [ 35.452817] Call trace: [ 35.453295] show_stack+0x20/0x38 (C) [ 35.454048] dump_stack_lvl+0x8c/0xd0 [ 35.454622] print_report+0x118/0x5e0 [ 35.455341] kasan_report+0xc8/0x118 [ 35.455978] __asan_report_load1_noabort+0x20/0x30 [ 35.456641] kmalloc_oob_right+0x5d0/0x660 [ 35.457181] kunit_try_run_case+0x14c/0x3d0 [ 35.458149] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.458806] kthread+0x24c/0x2d0 [ 35.459321] ret_from_fork+0x10/0x20 [ 35.459951] [ 35.460268] Allocated by task 125: [ 35.460928] kasan_save_stack+0x3c/0x68 [ 35.461813] kasan_save_track+0x20/0x40 [ 35.462411] kasan_save_alloc_info+0x40/0x58 [ 35.463077] __kasan_kmalloc+0xd4/0xd8 [ 35.463590] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.464209] kmalloc_oob_right+0xb0/0x660 [ 35.464605] kunit_try_run_case+0x14c/0x3d0 [ 35.465196] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.466122] kthread+0x24c/0x2d0 [ 35.466604] ret_from_fork+0x10/0x20 [ 35.467152] [ 35.467511] The buggy address belongs to the object at fff00000c1bea500 [ 35.467511] which belongs to the cache kmalloc-128 of size 128 [ 35.468655] The buggy address is located 13 bytes to the right of [ 35.468655] allocated 115-byte region [fff00000c1bea500, fff00000c1bea573) [ 35.469980] [ 35.470629] The buggy address belongs to the physical page: [ 35.471311] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bea [ 35.471930] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.472528] page_type: f5(slab) [ 35.473822] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.474600] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 35.475354] page dumped because: kasan: bad access detected [ 35.476037] [ 35.476371] Memory state around the buggy address: [ 35.476917] fff00000c1bea480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.478200] fff00000c1bea500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 35.479085] >fff00000c1bea580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.479714] ^ [ 35.480204] fff00000c1bea600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.481025] fff00000c1bea680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.482174] ==================================================================
Failure - log-parser-boot - internal-error-oops-oops-preempt-smp
KNOWN ISSUE - kunit_test_null_dereference internal oops on qemu-arm64 KUNIT KASAN
[ 147.389904] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP [ 147.390840] Modules linked in: [ 147.391685] CPU: 1 UID: 0 PID: 625 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 147.393177] Tainted: [B]=BAD_PAGE, [N]=TEST [ 147.393746] Hardware name: linux,dummy-virt (DT) [ 147.394348] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 147.396534] pc : kunit_test_null_dereference+0x70/0x170 [ 147.397510] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 147.398435] sp : ffff800083377dc0 [ 147.398960] x29: ffff800083377e20 x28: 0000000000000000 x27: 0000000000000000 [ 147.400198] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000cb1a4500 [ 147.400982] x23: ffffa2dae33c90f0 x22: ffffa2dae33d1cb0 x21: fff00000cb1a4508 [ 147.402357] x20: 1ffff0001066efb8 x19: ffff8000800879f0 x18: 000000005053a98d [ 147.403333] x17: 0000000000000001 x16: fff00000da502ca0 x15: fff00000ff615b48 [ 147.404397] x14: 0000000086343cdf x13: fff00000da502c98 x12: fffd80001980e8b2 [ 147.405437] x11: 1ffe00001980e8b1 x10: fffd80001980e8b1 x9 : ffffa2dae33c9178 [ 147.406572] x8 : ffff800083377cb8 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 147.407659] x5 : ffff70001066efb8 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 147.408674] x2 : dfff800000000000 x1 : fff00000cc073cc0 x0 : ffff8000800879f0 [ 147.409838] Call trace: [ 147.410215] kunit_test_null_dereference+0x70/0x170 (P) [ 147.411074] kunit_generic_run_threadfn_adapter+0x88/0x100 (L) [ 147.411723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 147.412035] kthread+0x24c/0x2d0 [ 147.412289] ret_from_fork+0x10/0x20 [ 147.413186] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 147.414849] ---[ end trace 0000000000000000 ]---