Date
Nov. 26, 2024, 6:09 a.m.
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 32.291052] ================================================================== [ 32.292132] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 32.292952] Read of size 8 at addr fff00000c5e26fc0 by task kunit_try_catch/189 [ 32.294001] [ 32.294402] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 32.295716] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.296340] Hardware name: linux,dummy-virt (DT) [ 32.296982] Call trace: [ 32.297435] show_stack+0x20/0x38 (C) [ 32.298805] dump_stack_lvl+0x8c/0xd0 [ 32.299516] print_report+0x118/0x5e0 [ 32.300186] kasan_report+0xc8/0x118 [ 32.300826] __asan_report_load8_noabort+0x20/0x30 [ 32.301556] workqueue_uaf+0x480/0x4a8 [ 32.302575] kunit_try_run_case+0x14c/0x3d0 [ 32.303340] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.304249] kthread+0x24c/0x2d0 [ 32.305065] ret_from_fork+0x10/0x20 [ 32.305831] [ 32.306462] Allocated by task 189: [ 32.307047] kasan_save_stack+0x3c/0x68 [ 32.307609] kasan_save_track+0x20/0x40 [ 32.308320] kasan_save_alloc_info+0x40/0x58 [ 32.309063] __kasan_kmalloc+0xd4/0xd8 [ 32.309927] __kmalloc_cache_noprof+0x15c/0x3c8 [ 32.310522] workqueue_uaf+0x13c/0x4a8 [ 32.311306] kunit_try_run_case+0x14c/0x3d0 [ 32.312024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.312889] kthread+0x24c/0x2d0 [ 32.313476] ret_from_fork+0x10/0x20 [ 32.314276] [ 32.314992] Freed by task 73: [ 32.315684] kasan_save_stack+0x3c/0x68 [ 32.316336] kasan_save_track+0x20/0x40 [ 32.316847] kasan_save_free_info+0x4c/0x78 [ 32.317422] __kasan_slab_free+0x6c/0x98 [ 32.318493] kfree+0x114/0x3d0 [ 32.319083] workqueue_uaf_work+0x18/0x30 [ 32.319678] process_one_work+0x530/0xfa8 [ 32.320366] worker_thread+0x614/0xf28 [ 32.320989] kthread+0x24c/0x2d0 [ 32.321567] ret_from_fork+0x10/0x20 [ 32.322666] [ 32.323069] Last potentially related work creation: [ 32.323696] kasan_save_stack+0x3c/0x68 [ 32.324316] __kasan_record_aux_stack+0xbc/0xe8 [ 32.325003] kasan_record_aux_stack_noalloc+0x14/0x20 [ 32.326249] __queue_work+0x654/0xfe0 [ 32.326776] queue_work_on+0xbc/0xf8 [ 32.327409] workqueue_uaf+0x210/0x4a8 [ 32.328043] kunit_try_run_case+0x14c/0x3d0 [ 32.328756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.329599] kthread+0x24c/0x2d0 [ 32.330241] ret_from_fork+0x10/0x20 [ 32.331415] [ 32.331821] The buggy address belongs to the object at fff00000c5e26fc0 [ 32.331821] which belongs to the cache kmalloc-32 of size 32 [ 32.333159] The buggy address is located 0 bytes inside of [ 32.333159] freed 32-byte region [fff00000c5e26fc0, fff00000c5e26fe0) [ 32.334499] [ 32.334851] The buggy address belongs to the physical page: [ 32.336076] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e26 [ 32.337040] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.338393] page_type: f5(slab) [ 32.338884] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 32.339896] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 32.340800] page dumped because: kasan: bad access detected [ 32.341494] [ 32.342326] Memory state around the buggy address: [ 32.342909] fff00000c5e26e80: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.343796] fff00000c5e26f00: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 32.344660] >fff00000c5e26f80: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc [ 32.345513] ^ [ 32.346680] fff00000c5e27000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.347616] fff00000c5e27080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.348506] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 32.202362] ================================================================== [ 32.203482] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 32.204229] Read of size 4 at addr fff00000c5e26e40 by task swapper/1/0 [ 32.204994] [ 32.205386] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B N 6.12.0-next-20241126 #1 [ 32.206417] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.207065] Hardware name: linux,dummy-virt (DT) [ 32.207982] Call trace: [ 32.208376] show_stack+0x20/0x38 (C) [ 32.209015] dump_stack_lvl+0x8c/0xd0 [ 32.209626] print_report+0x118/0x5e0 [ 32.210451] kasan_report+0xc8/0x118 [ 32.211099] __asan_report_load4_noabort+0x20/0x30 [ 32.211859] rcu_uaf_reclaim+0x64/0x70 [ 32.212374] rcu_core+0xa54/0x1df8 [ 32.213005] rcu_core_si+0x18/0x30 [ 32.213551] handle_softirqs+0x374/0xb20 [ 32.214209] __do_softirq+0x1c/0x28 [ 32.214977] ____do_softirq+0x18/0x30 [ 32.215639] call_on_irq_stack+0x24/0x58 [ 32.216294] do_softirq_own_stack+0x24/0x38 [ 32.217007] __irq_exit_rcu+0x1fc/0x318 [ 32.217602] irq_exit_rcu+0x1c/0x80 [ 32.218454] el1_interrupt+0x38/0x58 [ 32.219084] el1h_64_irq_handler+0x18/0x28 [ 32.219769] el1h_64_irq+0x6c/0x70 [ 32.220455] arch_local_irq_enable+0x4/0x8 (P) [ 32.221148] default_idle_call+0x6c/0x78 (L) [ 32.221841] do_idle+0x384/0x4e8 [ 32.222599] cpu_startup_entry+0x68/0x80 [ 32.223229] secondary_start_kernel+0x288/0x340 [ 32.223918] __secondary_switched+0xc0/0xc8 [ 32.224496] [ 32.224883] Allocated by task 187: [ 32.225441] kasan_save_stack+0x3c/0x68 [ 32.226218] kasan_save_track+0x20/0x40 [ 32.227511] kasan_save_alloc_info+0x40/0x58 [ 32.228218] __kasan_kmalloc+0xd4/0xd8 [ 32.228742] __kmalloc_cache_noprof+0x15c/0x3c8 [ 32.229347] rcu_uaf+0xb0/0x2d0 [ 32.230211] kunit_try_run_case+0x14c/0x3d0 [ 32.231023] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.231786] kthread+0x24c/0x2d0 [ 32.232337] ret_from_fork+0x10/0x20 [ 32.232967] [ 32.233326] Freed by task 0: [ 32.234335] kasan_save_stack+0x3c/0x68 [ 32.234946] kasan_save_track+0x20/0x40 [ 32.235474] kasan_save_free_info+0x4c/0x78 [ 32.236057] __kasan_slab_free+0x6c/0x98 [ 32.237210] kfree+0x114/0x3d0 [ 32.238118] rcu_uaf_reclaim+0x28/0x70 [ 32.238650] rcu_core+0xa54/0x1df8 [ 32.239446] rcu_core_si+0x18/0x30 [ 32.240243] handle_softirqs+0x374/0xb20 [ 32.241056] __do_softirq+0x1c/0x28 [ 32.241567] [ 32.242417] Last potentially related work creation: [ 32.243197] kasan_save_stack+0x3c/0x68 [ 32.243718] __kasan_record_aux_stack+0xbc/0xe8 [ 32.244420] kasan_record_aux_stack_noalloc+0x14/0x20 [ 32.245130] __call_rcu_common.constprop.0+0x74/0xa18 [ 32.246047] call_rcu+0x18/0x30 [ 32.246583] rcu_uaf+0x14c/0x2d0 [ 32.247099] kunit_try_run_case+0x14c/0x3d0 [ 32.248195] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.249323] kthread+0x24c/0x2d0 [ 32.249837] ret_from_fork+0x10/0x20 [ 32.250563] [ 32.251316] The buggy address belongs to the object at fff00000c5e26e40 [ 32.251316] which belongs to the cache kmalloc-32 of size 32 [ 32.252654] The buggy address is located 0 bytes inside of [ 32.252654] freed 32-byte region [fff00000c5e26e40, fff00000c5e26e60) [ 32.254144] [ 32.254634] The buggy address belongs to the physical page: [ 32.255470] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e26 [ 32.256462] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.257403] page_type: f5(slab) [ 32.258208] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 32.258920] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 32.259940] page dumped because: kasan: bad access detected [ 32.260726] [ 32.261096] Memory state around the buggy address: [ 32.261668] fff00000c5e26d00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.262801] fff00000c5e26d80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.263726] >fff00000c5e26e00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.264520] ^ [ 32.265328] fff00000c5e26e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.266768] fff00000c5e26f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.267838] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 32.021508] ================================================================== [ 32.023192] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x600 [ 32.023912] Read of size 1 at addr fff00000c5e72800 by task kunit_try_catch/185 [ 32.024863] [ 32.025296] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 32.026746] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.027348] Hardware name: linux,dummy-virt (DT) [ 32.028328] Call trace: [ 32.028737] show_stack+0x20/0x38 (C) [ 32.029489] dump_stack_lvl+0x8c/0xd0 [ 32.030568] print_report+0x118/0x5e0 [ 32.031071] kasan_report+0xc8/0x118 [ 32.031711] __kasan_check_byte+0x54/0x70 [ 32.032347] ksize+0x30/0x88 [ 32.032931] ksize_uaf+0x168/0x600 [ 32.033560] kunit_try_run_case+0x14c/0x3d0 [ 32.034689] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.035385] kthread+0x24c/0x2d0 [ 32.035967] ret_from_fork+0x10/0x20 [ 32.036567] [ 32.036907] Allocated by task 185: [ 32.037349] kasan_save_stack+0x3c/0x68 [ 32.038421] kasan_save_track+0x20/0x40 [ 32.039059] kasan_save_alloc_info+0x40/0x58 [ 32.039647] __kasan_kmalloc+0xd4/0xd8 [ 32.040264] __kmalloc_cache_noprof+0x15c/0x3c8 [ 32.040849] ksize_uaf+0xb8/0x600 [ 32.041430] kunit_try_run_case+0x14c/0x3d0 [ 32.042514] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.043217] kthread+0x24c/0x2d0 [ 32.043750] ret_from_fork+0x10/0x20 [ 32.044300] [ 32.044684] Freed by task 185: [ 32.045187] kasan_save_stack+0x3c/0x68 [ 32.046248] kasan_save_track+0x20/0x40 [ 32.046780] kasan_save_free_info+0x4c/0x78 [ 32.047435] __kasan_slab_free+0x6c/0x98 [ 32.048388] kfree+0x114/0x3d0 [ 32.048875] ksize_uaf+0x11c/0x600 [ 32.049395] kunit_try_run_case+0x14c/0x3d0 [ 32.050556] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.051250] kthread+0x24c/0x2d0 [ 32.051749] ret_from_fork+0x10/0x20 [ 32.052271] [ 32.053057] The buggy address belongs to the object at fff00000c5e72800 [ 32.053057] which belongs to the cache kmalloc-128 of size 128 [ 32.054807] The buggy address is located 0 bytes inside of [ 32.054807] freed 128-byte region [fff00000c5e72800, fff00000c5e72880) [ 32.056012] [ 32.056387] The buggy address belongs to the physical page: [ 32.056941] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e72 [ 32.058394] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.059239] page_type: f5(slab) [ 32.059753] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.060616] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 32.061544] page dumped because: kasan: bad access detected [ 32.062322] [ 32.063105] Memory state around the buggy address: [ 32.063776] fff00000c5e72700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 32.064618] fff00000c5e72780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.065424] >fff00000c5e72800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.066753] ^ [ 32.067294] fff00000c5e72880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.068115] fff00000c5e72900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.068895] ================================================================== [ 32.127164] ================================================================== [ 32.128057] BUG: KASAN: slab-use-after-free in ksize_uaf+0x548/0x600 [ 32.128695] Read of size 1 at addr fff00000c5e72878 by task kunit_try_catch/185 [ 32.129763] [ 32.130163] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 32.132108] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.132638] Hardware name: linux,dummy-virt (DT) [ 32.133283] Call trace: [ 32.133821] show_stack+0x20/0x38 (C) [ 32.134422] dump_stack_lvl+0x8c/0xd0 [ 32.135128] print_report+0x118/0x5e0 [ 32.135889] kasan_report+0xc8/0x118 [ 32.136595] __asan_report_load1_noabort+0x20/0x30 [ 32.137405] ksize_uaf+0x548/0x600 [ 32.138153] kunit_try_run_case+0x14c/0x3d0 [ 32.139148] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.139862] kthread+0x24c/0x2d0 [ 32.140786] ret_from_fork+0x10/0x20 [ 32.141494] [ 32.142212] Allocated by task 185: [ 32.143325] kasan_save_stack+0x3c/0x68 [ 32.144142] kasan_save_track+0x20/0x40 [ 32.144792] kasan_save_alloc_info+0x40/0x58 [ 32.145487] __kasan_kmalloc+0xd4/0xd8 [ 32.146582] __kmalloc_cache_noprof+0x15c/0x3c8 [ 32.147100] ksize_uaf+0xb8/0x600 [ 32.147691] kunit_try_run_case+0x14c/0x3d0 [ 32.148364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.149203] kthread+0x24c/0x2d0 [ 32.149868] ret_from_fork+0x10/0x20 [ 32.150948] [ 32.151284] Freed by task 185: [ 32.151824] kasan_save_stack+0x3c/0x68 [ 32.152423] kasan_save_track+0x20/0x40 [ 32.153072] kasan_save_free_info+0x4c/0x78 [ 32.154140] __kasan_slab_free+0x6c/0x98 [ 32.155003] kfree+0x114/0x3d0 [ 32.155435] ksize_uaf+0x11c/0x600 [ 32.155876] kunit_try_run_case+0x14c/0x3d0 [ 32.156843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.157580] kthread+0x24c/0x2d0 [ 32.158065] ret_from_fork+0x10/0x20 [ 32.159079] [ 32.159601] The buggy address belongs to the object at fff00000c5e72800 [ 32.159601] which belongs to the cache kmalloc-128 of size 128 [ 32.161249] The buggy address is located 120 bytes inside of [ 32.161249] freed 128-byte region [fff00000c5e72800, fff00000c5e72880) [ 32.163491] [ 32.163823] The buggy address belongs to the physical page: [ 32.164612] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e72 [ 32.165643] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.166872] page_type: f5(slab) [ 32.167495] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.168578] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 32.169487] page dumped because: kasan: bad access detected [ 32.170110] [ 32.170479] Memory state around the buggy address: [ 32.171187] fff00000c5e72700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.172509] fff00000c5e72780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.174086] >fff00000c5e72800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.175148] ^ [ 32.175961] fff00000c5e72880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.176824] fff00000c5e72900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.178028] ================================================================== [ 32.073268] ================================================================== [ 32.074169] BUG: KASAN: slab-use-after-free in ksize_uaf+0x59c/0x600 [ 32.074861] Read of size 1 at addr fff00000c5e72800 by task kunit_try_catch/185 [ 32.076942] [ 32.077329] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 32.078598] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.079685] Hardware name: linux,dummy-virt (DT) [ 32.080634] Call trace: [ 32.081131] show_stack+0x20/0x38 (C) [ 32.082502] dump_stack_lvl+0x8c/0xd0 [ 32.083452] print_report+0x118/0x5e0 [ 32.084110] kasan_report+0xc8/0x118 [ 32.084740] __asan_report_load1_noabort+0x20/0x30 [ 32.085519] ksize_uaf+0x59c/0x600 [ 32.086518] kunit_try_run_case+0x14c/0x3d0 [ 32.087252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.088108] kthread+0x24c/0x2d0 [ 32.088807] ret_from_fork+0x10/0x20 [ 32.089355] [ 32.089736] Allocated by task 185: [ 32.090294] kasan_save_stack+0x3c/0x68 [ 32.090796] kasan_save_track+0x20/0x40 [ 32.091425] kasan_save_alloc_info+0x40/0x58 [ 32.092915] __kasan_kmalloc+0xd4/0xd8 [ 32.093290] __kmalloc_cache_noprof+0x15c/0x3c8 [ 32.094006] ksize_uaf+0xb8/0x600 [ 32.094458] kunit_try_run_case+0x14c/0x3d0 [ 32.095599] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.096375] kthread+0x24c/0x2d0 [ 32.096977] ret_from_fork+0x10/0x20 [ 32.097487] [ 32.098687] Freed by task 185: [ 32.099340] kasan_save_stack+0x3c/0x68 [ 32.099870] kasan_save_track+0x20/0x40 [ 32.100506] kasan_save_free_info+0x4c/0x78 [ 32.101136] __kasan_slab_free+0x6c/0x98 [ 32.102062] kfree+0x114/0x3d0 [ 32.102675] ksize_uaf+0x11c/0x600 [ 32.103265] kunit_try_run_case+0x14c/0x3d0 [ 32.103923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.104607] kthread+0x24c/0x2d0 [ 32.105181] ret_from_fork+0x10/0x20 [ 32.106553] [ 32.106918] The buggy address belongs to the object at fff00000c5e72800 [ 32.106918] which belongs to the cache kmalloc-128 of size 128 [ 32.108600] The buggy address is located 0 bytes inside of [ 32.108600] freed 128-byte region [fff00000c5e72800, fff00000c5e72880) [ 32.110338] [ 32.110777] The buggy address belongs to the physical page: [ 32.111465] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e72 [ 32.112692] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.113436] page_type: f5(slab) [ 32.113987] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.115490] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 32.116370] page dumped because: kasan: bad access detected [ 32.117264] [ 32.117743] Memory state around the buggy address: [ 32.118625] fff00000c5e72700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.119937] fff00000c5e72780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.120815] >fff00000c5e72800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.121641] ^ [ 32.122294] fff00000c5e72880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.123243] fff00000c5e72900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.124713] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 31.930372] ================================================================== [ 31.931263] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750 [ 31.932274] Read of size 1 at addr fff00000c5e99178 by task kunit_try_catch/183 [ 31.932992] [ 31.933311] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.934975] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.935511] Hardware name: linux,dummy-virt (DT) [ 31.936197] Call trace: [ 31.936694] show_stack+0x20/0x38 (C) [ 31.937353] dump_stack_lvl+0x8c/0xd0 [ 31.938287] print_report+0x118/0x5e0 [ 31.938852] kasan_report+0xc8/0x118 [ 31.939506] __asan_report_load1_noabort+0x20/0x30 [ 31.940187] ksize_unpoisons_memory+0x628/0x750 [ 31.940887] kunit_try_run_case+0x14c/0x3d0 [ 31.941496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.942569] kthread+0x24c/0x2d0 [ 31.943037] ret_from_fork+0x10/0x20 [ 31.943669] [ 31.944039] Allocated by task 183: [ 31.944486] kasan_save_stack+0x3c/0x68 [ 31.945135] kasan_save_track+0x20/0x40 [ 31.946014] kasan_save_alloc_info+0x40/0x58 [ 31.946638] __kasan_kmalloc+0xd4/0xd8 [ 31.947259] __kmalloc_cache_noprof+0x15c/0x3c8 [ 31.948275] ksize_unpoisons_memory+0xc0/0x750 [ 31.949136] kunit_try_run_case+0x14c/0x3d0 [ 31.949984] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.951138] kthread+0x24c/0x2d0 [ 31.952188] ret_from_fork+0x10/0x20 [ 31.952832] [ 31.953254] The buggy address belongs to the object at fff00000c5e99100 [ 31.953254] which belongs to the cache kmalloc-128 of size 128 [ 31.954877] The buggy address is located 5 bytes to the right of [ 31.954877] allocated 115-byte region [fff00000c5e99100, fff00000c5e99173) [ 31.956377] [ 31.956828] The buggy address belongs to the physical page: [ 31.957462] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e99 [ 31.958863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.959665] page_type: f5(slab) [ 31.960225] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.961027] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 31.961946] page dumped because: kasan: bad access detected [ 31.962637] [ 31.963171] Memory state around the buggy address: [ 31.964012] fff00000c5e99000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 31.964992] fff00000c5e99080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.966138] >fff00000c5e99100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.966889] ^ [ 31.967437] fff00000c5e99180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.968192] fff00000c5e99200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.969051] ================================================================== [ 31.888836] ================================================================== [ 31.889930] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750 [ 31.890791] Read of size 1 at addr fff00000c5e99173 by task kunit_try_catch/183 [ 31.891620] [ 31.892246] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.893393] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.894958] Hardware name: linux,dummy-virt (DT) [ 31.895547] Call trace: [ 31.895997] show_stack+0x20/0x38 (C) [ 31.896558] dump_stack_lvl+0x8c/0xd0 [ 31.897173] print_report+0x118/0x5e0 [ 31.898125] kasan_report+0xc8/0x118 [ 31.898761] __asan_report_load1_noabort+0x20/0x30 [ 31.899467] ksize_unpoisons_memory+0x638/0x750 [ 31.900139] kunit_try_run_case+0x14c/0x3d0 [ 31.900789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.901544] kthread+0x24c/0x2d0 [ 31.902423] ret_from_fork+0x10/0x20 [ 31.903078] [ 31.903389] Allocated by task 183: [ 31.903963] kasan_save_stack+0x3c/0x68 [ 31.904519] kasan_save_track+0x20/0x40 [ 31.905171] kasan_save_alloc_info+0x40/0x58 [ 31.906145] __kasan_kmalloc+0xd4/0xd8 [ 31.906748] __kmalloc_cache_noprof+0x15c/0x3c8 [ 31.907329] ksize_unpoisons_memory+0xc0/0x750 [ 31.908026] kunit_try_run_case+0x14c/0x3d0 [ 31.908700] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.909507] kthread+0x24c/0x2d0 [ 31.910562] ret_from_fork+0x10/0x20 [ 31.911113] [ 31.911479] The buggy address belongs to the object at fff00000c5e99100 [ 31.911479] which belongs to the cache kmalloc-128 of size 128 [ 31.912752] The buggy address is located 0 bytes to the right of [ 31.912752] allocated 115-byte region [fff00000c5e99100, fff00000c5e99173) [ 31.914356] [ 31.914752] The buggy address belongs to the physical page: [ 31.915416] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e99 [ 31.916367] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.917294] page_type: f5(slab) [ 31.918193] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.919042] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 31.920053] page dumped because: kasan: bad access detected [ 31.920727] [ 31.921134] Memory state around the buggy address: [ 31.922134] fff00000c5e99000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 31.923043] fff00000c5e99080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.923890] >fff00000c5e99100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.924775] ^ [ 31.925949] fff00000c5e99180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.926765] fff00000c5e99200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.927603] ================================================================== [ 31.971222] ================================================================== [ 31.971862] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750 [ 31.972797] Read of size 1 at addr fff00000c5e9917f by task kunit_try_catch/183 [ 31.973648] [ 31.974257] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.975357] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.975899] Hardware name: linux,dummy-virt (DT) [ 31.976674] Call trace: [ 31.977073] show_stack+0x20/0x38 (C) [ 31.978018] dump_stack_lvl+0x8c/0xd0 [ 31.978584] print_report+0x118/0x5e0 [ 31.979239] kasan_report+0xc8/0x118 [ 31.979880] __asan_report_load1_noabort+0x20/0x30 [ 31.980504] ksize_unpoisons_memory+0x6a0/0x750 [ 31.981317] kunit_try_run_case+0x14c/0x3d0 [ 31.982287] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.983127] kthread+0x24c/0x2d0 [ 31.983766] ret_from_fork+0x10/0x20 [ 31.984349] [ 31.984741] Allocated by task 183: [ 31.985317] kasan_save_stack+0x3c/0x68 [ 31.986298] kasan_save_track+0x20/0x40 [ 31.986965] kasan_save_alloc_info+0x40/0x58 [ 31.987617] __kasan_kmalloc+0xd4/0xd8 [ 31.988285] __kmalloc_cache_noprof+0x15c/0x3c8 [ 31.989005] ksize_unpoisons_memory+0xc0/0x750 [ 31.990149] kunit_try_run_case+0x14c/0x3d0 [ 31.991040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.991737] kthread+0x24c/0x2d0 [ 31.992312] ret_from_fork+0x10/0x20 [ 31.993077] [ 31.993470] The buggy address belongs to the object at fff00000c5e99100 [ 31.993470] which belongs to the cache kmalloc-128 of size 128 [ 31.995097] The buggy address is located 12 bytes to the right of [ 31.995097] allocated 115-byte region [fff00000c5e99100, fff00000c5e99173) [ 31.996477] [ 31.996873] The buggy address belongs to the physical page: [ 31.997509] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e99 [ 31.998867] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.999741] page_type: f5(slab) [ 32.000208] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.001227] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 32.002473] page dumped because: kasan: bad access detected [ 32.003239] [ 32.003666] Memory state around the buggy address: [ 32.004248] fff00000c5e99000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 32.005235] fff00000c5e99080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.006163] >fff00000c5e99100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.007232] ^ [ 32.008087] fff00000c5e99180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.009025] fff00000c5e99200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.010224] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 67.575677] ================================================================== [ 67.576465] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 67.576465] [ 67.577336] Use-after-free read at 0x00000000128cef03 (in kfence-#219): [ 67.578500] test_krealloc+0x51c/0x830 [ 67.579055] test_krealloc+0x458/0x830 [ 67.579749] kunit_try_run_case+0x14c/0x3d0 [ 67.580464] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.581287] kthread+0x24c/0x2d0 [ 67.581915] ret_from_fork+0x10/0x20 [ 67.582618] [ 67.583009] kfence-#219: 0x00000000128cef03-0x000000006592606b, size=32, cache=kmalloc-32 [ 67.583009] [ 67.584031] allocated by task 326 on cpu 0 at 67.574415s (0.009603s ago): [ 67.585071] test_alloc+0x298/0x620 [ 67.585680] test_krealloc+0xc0/0x830 [ 67.586224] kunit_try_run_case+0x14c/0x3d0 [ 67.586947] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.587721] kthread+0x24c/0x2d0 [ 67.588278] ret_from_fork+0x10/0x20 [ 67.588849] [ 67.589272] freed by task 326 on cpu 0 at 67.574997s (0.014263s ago): [ 67.590157] krealloc_noprof+0x148/0x360 [ 67.590842] test_krealloc+0x1dc/0x830 [ 67.591504] kunit_try_run_case+0x14c/0x3d0 [ 67.592156] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.592957] kthread+0x24c/0x2d0 [ 67.593449] ret_from_fork+0x10/0x20 [ 67.594069] [ 67.594427] CPU: 0 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 67.595574] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.596199] Hardware name: linux,dummy-virt (DT) [ 67.596896] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 67.381990] ================================================================== [ 67.382753] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 67.382753] [ 67.383800] Use-after-free read at 0x0000000099a0a5e3 (in kfence-#217): [ 67.384762] test_memcache_typesafe_by_rcu+0x280/0x560 [ 67.385589] test_memcache_typesafe_by_rcu+0x260/0x560 [ 67.386468] kunit_try_run_case+0x14c/0x3d0 [ 67.387072] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.387909] kthread+0x24c/0x2d0 [ 67.388489] ret_from_fork+0x10/0x20 [ 67.389030] [ 67.389482] kfence-#217: 0x0000000099a0a5e3-0x00000000543993aa, size=32, cache=test [ 67.389482] [ 67.390546] allocated by task 324 on cpu 0 at 67.371512s (0.019002s ago): [ 67.391558] test_alloc+0x22c/0x620 [ 67.392203] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 67.393012] kunit_try_run_case+0x14c/0x3d0 [ 67.393741] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.394416] kthread+0x24c/0x2d0 [ 67.395055] ret_from_fork+0x10/0x20 [ 67.395698] [ 67.396069] freed by task 324 on cpu 0 at 67.371705s (0.024353s ago): [ 67.396965] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 67.397746] kunit_try_run_case+0x14c/0x3d0 [ 67.398385] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.399220] kthread+0x24c/0x2d0 [ 67.399782] ret_from_fork+0x10/0x20 [ 67.400449] [ 67.400892] CPU: 0 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 67.402083] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.402631] Hardware name: linux,dummy-virt (DT) [ 67.403363] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 47.427597] ================================================================== [ 47.428909] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 47.428909] [ 47.431012] Invalid read at 0x00000000dd8d9b8b: [ 47.431840] test_invalid_access+0xdc/0x1f0 [ 47.432664] kunit_try_run_case+0x14c/0x3d0 [ 47.433542] kunit_try_run_case+0x14c/0x3d0 [ 47.434913] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.435812] kthread+0x24c/0x2d0 [ 47.436624] ret_from_fork+0x10/0x20 [ 47.437496] [ 47.438606] CPU: 1 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 47.440152] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.440940] Hardware name: linux,dummy-virt (DT) [ 47.441717] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 47.186918] ================================================================== [ 47.187755] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 47.187755] [ 47.188730] Corrupted memory at 0x0000000009adc881 [ ! . . . . . . . . . . . . . . . ] (in kfence-#212): [ 47.191472] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 47.191940] kunit_try_run_case+0x14c/0x3d0 [ 47.192237] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.192601] kthread+0x24c/0x2d0 [ 47.193101] ret_from_fork+0x10/0x20 [ 47.193793] [ 47.194161] kfence-#212: 0x000000003674e3da-0x000000006cf92d23, size=73, cache=kmalloc-96 [ 47.194161] [ 47.195235] allocated by task 314 on cpu 0 at 47.186383s (0.008841s ago): [ 47.196102] test_alloc+0x298/0x620 [ 47.196633] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 47.197178] kunit_try_run_case+0x14c/0x3d0 [ 47.197879] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.198701] kthread+0x24c/0x2d0 [ 47.199270] ret_from_fork+0x10/0x20 [ 47.199900] [ 47.200296] freed by task 314 on cpu 0 at 47.186665s (0.013619s ago): [ 47.201231] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 47.201897] kunit_try_run_case+0x14c/0x3d0 [ 47.202598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.203173] kthread+0x24c/0x2d0 [ 47.203777] ret_from_fork+0x10/0x20 [ 47.204412] [ 47.204821] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 47.206078] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.206710] Hardware name: linux,dummy-virt (DT) [ 47.207271] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 46.562983] ================================================================== [ 46.563873] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 46.563873] [ 46.564901] Out-of-bounds read at 0x000000007336a263 (105B right of kfence-#206): [ 46.565805] test_kmalloc_aligned_oob_read+0x238/0x468 [ 46.566461] test_kmalloc_aligned_oob_read+0x100/0x468 [ 46.567276] kunit_try_run_case+0x14c/0x3d0 [ 46.567957] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.568786] kthread+0x24c/0x2d0 [ 46.569372] ret_from_fork+0x10/0x20 [ 46.569921] [ 46.570301] kfence-#206: 0x00000000a31be06a-0x00000000e3cc76c4, size=73, cache=kmalloc-96 [ 46.570301] [ 46.571279] allocated by task 312 on cpu 1 at 46.562481s (0.008787s ago): [ 46.572496] test_alloc+0x298/0x620 [ 46.573097] test_kmalloc_aligned_oob_read+0x100/0x468 [ 46.573818] kunit_try_run_case+0x14c/0x3d0 [ 46.574488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.575611] kthread+0x24c/0x2d0 [ 46.576189] ret_from_fork+0x10/0x20 [ 46.576923] [ 46.577351] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 46.578397] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.578905] Hardware name: linux,dummy-virt (DT) [ 46.579574] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[ 41.986587] ================================================================== [ 41.987440] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 41.987440] [ 41.988279] Corrupted memory at 0x00000000b60b1ce3 [ ! ] (in kfence-#162): [ 41.989478] test_corruption+0x1d8/0x378 [ 41.990176] kunit_try_run_case+0x14c/0x3d0 [ 41.990759] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.991575] kthread+0x24c/0x2d0 [ 41.992174] ret_from_fork+0x10/0x20 [ 41.992741] [ 41.993130] kfence-#162: 0x00000000ee010ae0-0x00000000fabec4f4, size=32, cache=test [ 41.993130] [ 41.994113] allocated by task 302 on cpu 0 at 41.986315s (0.007788s ago): [ 41.994994] test_alloc+0x22c/0x620 [ 41.995483] test_corruption+0x198/0x378 [ 41.996140] kunit_try_run_case+0x14c/0x3d0 [ 41.996804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.997559] kthread+0x24c/0x2d0 [ 41.998144] ret_from_fork+0x10/0x20 [ 41.998772] [ 41.999157] freed by task 302 on cpu 0 at 41.986404s (0.012741s ago): [ 42.000029] test_corruption+0x1d8/0x378 [ 42.000647] kunit_try_run_case+0x14c/0x3d0 [ 42.001154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.001961] kthread+0x24c/0x2d0 [ 42.002557] ret_from_fork+0x10/0x20 [ 42.003105] [ 42.003492] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 42.004758] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.005356] Hardware name: linux,dummy-virt (DT) [ 42.006057] ================================================================== [ 41.466893] ================================================================== [ 41.467456] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 41.467456] [ 41.468289] Corrupted memory at 0x000000002c8464b1 [ ! . . . . . . . . . . . . . . . ] (in kfence-#157): [ 41.472190] test_corruption+0x278/0x378 [ 41.472858] kunit_try_run_case+0x14c/0x3d0 [ 41.473513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.474294] kthread+0x24c/0x2d0 [ 41.474896] ret_from_fork+0x10/0x20 [ 41.475499] [ 41.475950] kfence-#157: 0x000000000606291a-0x00000000c88feb54, size=32, cache=kmalloc-32 [ 41.475950] [ 41.476989] allocated by task 300 on cpu 0 at 41.466342s (0.010635s ago): [ 41.477924] test_alloc+0x298/0x620 [ 41.478585] test_corruption+0xdc/0x378 [ 41.479240] kunit_try_run_case+0x14c/0x3d0 [ 41.479845] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.480681] kthread+0x24c/0x2d0 [ 41.481296] ret_from_fork+0x10/0x20 [ 41.481912] [ 41.482309] freed by task 300 on cpu 0 at 41.466507s (0.015791s ago): [ 41.483299] test_corruption+0x278/0x378 [ 41.483962] kunit_try_run_case+0x14c/0x3d0 [ 41.484695] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.485471] kthread+0x24c/0x2d0 [ 41.485954] ret_from_fork+0x10/0x20 [ 41.486664] [ 41.487121] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 41.488422] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.489007] Hardware name: linux,dummy-virt (DT) [ 41.489741] ================================================================== [ 41.674647] ================================================================== [ 41.675396] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 41.675396] [ 41.676218] Corrupted memory at 0x0000000073f8a72c [ ! . . . . . . . . . . . . . . . ] (in kfence-#159): [ 41.678890] test_corruption+0x120/0x378 [ 41.679467] kunit_try_run_case+0x14c/0x3d0 [ 41.680179] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.680883] kthread+0x24c/0x2d0 [ 41.681448] ret_from_fork+0x10/0x20 [ 41.681961] [ 41.682347] kfence-#159: 0x000000007222e0e2-0x00000000715f0f1d, size=32, cache=test [ 41.682347] [ 41.683348] allocated by task 302 on cpu 0 at 41.674368s (0.008969s ago): [ 41.684190] test_alloc+0x22c/0x620 [ 41.684749] test_corruption+0xdc/0x378 [ 41.685334] kunit_try_run_case+0x14c/0x3d0 [ 41.685965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.686762] kthread+0x24c/0x2d0 [ 41.687241] ret_from_fork+0x10/0x20 [ 41.687866] [ 41.688212] freed by task 302 on cpu 0 at 41.674457s (0.013745s ago): [ 41.689141] test_corruption+0x120/0x378 [ 41.689765] kunit_try_run_case+0x14c/0x3d0 [ 41.690357] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.690980] kthread+0x24c/0x2d0 [ 41.691576] ret_from_fork+0x10/0x20 [ 41.692068] [ 41.692451] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 41.693709] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.694318] Hardware name: linux,dummy-virt (DT) [ 41.695000] ================================================================== [ 41.572370] ================================================================== [ 41.573253] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 41.573253] [ 41.573993] Corrupted memory at 0x000000001b25f17e [ ! ] (in kfence-#158): [ 41.575193] test_corruption+0x284/0x378 [ 41.575948] kunit_try_run_case+0x14c/0x3d0 [ 41.576705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.577546] kthread+0x24c/0x2d0 [ 41.578184] ret_from_fork+0x10/0x20 [ 41.578840] [ 41.579259] kfence-#158: 0x0000000076d1adfc-0x000000001eac2ac8, size=32, cache=kmalloc-32 [ 41.579259] [ 41.580363] allocated by task 300 on cpu 0 at 41.571872s (0.008480s ago): [ 41.581106] test_alloc+0x298/0x620 [ 41.581585] test_corruption+0x198/0x378 [ 41.582051] kunit_try_run_case+0x14c/0x3d0 [ 41.582780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.583595] kthread+0x24c/0x2d0 [ 41.584197] ret_from_fork+0x10/0x20 [ 41.584858] [ 41.585305] freed by task 300 on cpu 0 at 41.572022s (0.013272s ago): [ 41.586279] test_corruption+0x284/0x378 [ 41.586946] kunit_try_run_case+0x14c/0x3d0 [ 41.587680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.588345] kthread+0x24c/0x2d0 [ 41.588977] ret_from_fork+0x10/0x20 [ 41.589550] [ 41.590009] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 41.591182] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.591854] Hardware name: linux,dummy-virt (DT) [ 41.592507] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 41.154551] ================================================================== [ 41.155333] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 41.155333] [ 41.156381] Invalid free of 0x00000000c8c39cf8 (in kfence-#154): [ 41.157229] test_invalid_addr_free+0xec/0x238 [ 41.158337] kunit_try_run_case+0x14c/0x3d0 [ 41.158969] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.159667] kthread+0x24c/0x2d0 [ 41.160272] ret_from_fork+0x10/0x20 [ 41.160933] [ 41.161340] kfence-#154: 0x0000000083af2e1f-0x00000000d65ddd59, size=32, cache=test [ 41.161340] [ 41.162413] allocated by task 298 on cpu 0 at 41.154347s (0.008055s ago): [ 41.163343] test_alloc+0x22c/0x620 [ 41.163966] test_invalid_addr_free+0xd4/0x238 [ 41.164676] kunit_try_run_case+0x14c/0x3d0 [ 41.165277] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.165999] kthread+0x24c/0x2d0 [ 41.166609] ret_from_fork+0x10/0x20 [ 41.167212] [ 41.167655] CPU: 0 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 41.168753] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.169297] Hardware name: linux,dummy-virt (DT) [ 41.169998] ================================================================== [ 41.050484] ================================================================== [ 41.051273] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 41.051273] [ 41.052120] Invalid free of 0x0000000008804196 (in kfence-#153): [ 41.052950] test_invalid_addr_free+0x1ac/0x238 [ 41.053636] kunit_try_run_case+0x14c/0x3d0 [ 41.054222] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.054879] kthread+0x24c/0x2d0 [ 41.055467] ret_from_fork+0x10/0x20 [ 41.056144] [ 41.056563] kfence-#153: 0x000000008254bcc0-0x00000000feda542f, size=32, cache=kmalloc-32 [ 41.056563] [ 41.057599] allocated by task 296 on cpu 1 at 41.050274s (0.007313s ago): [ 41.058550] test_alloc+0x298/0x620 [ 41.059097] test_invalid_addr_free+0xd4/0x238 [ 41.059732] kunit_try_run_case+0x14c/0x3d0 [ 41.060422] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.061232] kthread+0x24c/0x2d0 [ 41.061743] ret_from_fork+0x10/0x20 [ 41.062362] [ 41.062742] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 41.063882] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.064428] Hardware name: linux,dummy-virt (DT) [ 41.065140] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[ 40.842978] ================================================================== [ 40.843857] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 40.843857] [ 40.844625] Invalid free of 0x000000000143a3fb (in kfence-#151): [ 40.845446] test_double_free+0x1bc/0x238 [ 40.845967] kunit_try_run_case+0x14c/0x3d0 [ 40.846668] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.847432] kthread+0x24c/0x2d0 [ 40.848081] ret_from_fork+0x10/0x20 [ 40.848740] [ 40.849052] kfence-#151: 0x000000000143a3fb-0x000000008e8030b2, size=32, cache=kmalloc-32 [ 40.849052] [ 40.850180] allocated by task 292 on cpu 0 at 40.842370s (0.007798s ago): [ 40.851163] test_alloc+0x298/0x620 [ 40.851676] test_double_free+0xd4/0x238 [ 40.852337] kunit_try_run_case+0x14c/0x3d0 [ 40.852915] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.853679] kthread+0x24c/0x2d0 [ 40.854206] ret_from_fork+0x10/0x20 [ 40.854843] [ 40.855219] freed by task 292 on cpu 0 at 40.842496s (0.012711s ago): [ 40.856050] test_double_free+0x1ac/0x238 [ 40.856732] kunit_try_run_case+0x14c/0x3d0 [ 40.857393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.858133] kthread+0x24c/0x2d0 [ 40.858740] ret_from_fork+0x10/0x20 [ 40.859355] [ 40.859759] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 40.860968] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.861617] Hardware name: linux,dummy-virt (DT) [ 40.862134] ================================================================== [ 40.946699] ================================================================== [ 40.947431] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 40.947431] [ 40.948210] Invalid free of 0x00000000ab3df3e0 (in kfence-#152): [ 40.948955] test_double_free+0x100/0x238 [ 40.949595] kunit_try_run_case+0x14c/0x3d0 [ 40.950287] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.951038] kthread+0x24c/0x2d0 [ 40.951639] ret_from_fork+0x10/0x20 [ 40.952154] [ 40.952564] kfence-#152: 0x00000000ab3df3e0-0x000000008cb938fa, size=32, cache=test [ 40.952564] [ 40.953613] allocated by task 294 on cpu 0 at 40.946358s (0.007244s ago): [ 40.954556] test_alloc+0x22c/0x620 [ 40.955154] test_double_free+0xd4/0x238 [ 40.955821] kunit_try_run_case+0x14c/0x3d0 [ 40.956361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.957170] kthread+0x24c/0x2d0 [ 40.957699] ret_from_fork+0x10/0x20 [ 40.958309] [ 40.958691] freed by task 294 on cpu 0 at 40.946456s (0.012224s ago): [ 40.959608] test_double_free+0xf0/0x238 [ 40.960271] kunit_try_run_case+0x14c/0x3d0 [ 40.960796] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.961607] kthread+0x24c/0x2d0 [ 40.962061] ret_from_fork+0x10/0x20 [ 40.962691] [ 40.963101] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 40.964214] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.964855] Hardware name: linux,dummy-virt (DT) [ 40.965495] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 40.530810] ================================================================== [ 40.531645] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 40.531645] [ 40.532433] Use-after-free read at 0x000000008b0bd4af (in kfence-#148): [ 40.533276] test_use_after_free_read+0x114/0x248 [ 40.534368] test_use_after_free_read+0xf0/0x248 [ 40.534931] kunit_try_run_case+0x14c/0x3d0 [ 40.535634] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.536301] kthread+0x24c/0x2d0 [ 40.536913] ret_from_fork+0x10/0x20 [ 40.537473] [ 40.537811] kfence-#148: 0x000000008b0bd4af-0x000000006d9513e4, size=32, cache=test [ 40.537811] [ 40.538806] allocated by task 286 on cpu 1 at 40.530422s (0.008372s ago): [ 40.539689] test_alloc+0x22c/0x620 [ 40.540301] test_use_after_free_read+0xd0/0x248 [ 40.541044] kunit_try_run_case+0x14c/0x3d0 [ 40.541666] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.542284] kthread+0x24c/0x2d0 [ 40.542880] ret_from_fork+0x10/0x20 [ 40.543428] [ 40.543825] freed by task 286 on cpu 1 at 40.530557s (0.013257s ago): [ 40.544773] test_use_after_free_read+0xf0/0x248 [ 40.545484] kunit_try_run_case+0x14c/0x3d0 [ 40.546186] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.546873] kthread+0x24c/0x2d0 [ 40.547446] ret_from_fork+0x10/0x20 [ 40.548078] [ 40.548505] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 40.549561] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.550197] Hardware name: linux,dummy-virt (DT) [ 40.550776] ================================================================== [ 40.426978] ================================================================== [ 40.427883] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 40.427883] [ 40.428794] Use-after-free read at 0x000000003d7bdae2 (in kfence-#147): [ 40.429658] test_use_after_free_read+0x114/0x248 [ 40.430315] test_use_after_free_read+0x1c0/0x248 [ 40.431008] kunit_try_run_case+0x14c/0x3d0 [ 40.431713] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.432449] kthread+0x24c/0x2d0 [ 40.433064] ret_from_fork+0x10/0x20 [ 40.433612] [ 40.433999] kfence-#147: 0x000000003d7bdae2-0x0000000050a744d0, size=32, cache=kmalloc-32 [ 40.433999] [ 40.435022] allocated by task 284 on cpu 0 at 40.426469s (0.008541s ago): [ 40.435835] test_alloc+0x298/0x620 [ 40.436449] test_use_after_free_read+0xd0/0x248 [ 40.437191] kunit_try_run_case+0x14c/0x3d0 [ 40.437859] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.438617] kthread+0x24c/0x2d0 [ 40.439232] ret_from_fork+0x10/0x20 [ 40.439869] [ 40.440471] freed by task 284 on cpu 0 at 40.426635s (0.013631s ago): [ 40.441503] test_use_after_free_read+0x1c0/0x248 [ 40.442181] kunit_try_run_case+0x14c/0x3d0 [ 40.442869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.443572] kthread+0x24c/0x2d0 [ 40.444158] ret_from_fork+0x10/0x20 [ 40.444837] [ 40.445262] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 40.446379] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.446900] Hardware name: linux,dummy-virt (DT) [ 40.447600] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 40.114838] ================================================================== [ 40.115908] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 40.115908] [ 40.116907] Out-of-bounds write at 0x000000000b80381b (1B left of kfence-#144): [ 40.118052] test_out_of_bounds_write+0x100/0x240 [ 40.118827] test_out_of_bounds_write+0xc8/0x240 [ 40.119621] kunit_try_run_case+0x14c/0x3d0 [ 40.120392] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.121288] kthread+0x24c/0x2d0 [ 40.121993] ret_from_fork+0x10/0x20 [ 40.122702] [ 40.122964] kfence-#144: 0x000000000d003ecb-0x0000000003cfdcc6, size=32, cache=kmalloc-32 [ 40.122964] [ 40.124049] allocated by task 280 on cpu 0 at 40.114557s (0.009480s ago): [ 40.125031] test_alloc+0x298/0x620 [ 40.125572] test_out_of_bounds_write+0xc8/0x240 [ 40.126275] kunit_try_run_case+0x14c/0x3d0 [ 40.126843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.127636] kthread+0x24c/0x2d0 [ 40.128110] ret_from_fork+0x10/0x20 [ 40.128756] [ 40.129170] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 40.130134] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.130788] Hardware name: linux,dummy-virt (DT) [ 40.131481] ================================================================== [ 40.322815] ================================================================== [ 40.323773] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 40.323773] [ 40.324731] Out-of-bounds write at 0x000000001f3c44b5 (1B left of kfence-#146): [ 40.325459] test_out_of_bounds_write+0x100/0x240 [ 40.326332] test_out_of_bounds_write+0xc8/0x240 [ 40.327151] kunit_try_run_case+0x14c/0x3d0 [ 40.327982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.328875] kthread+0x24c/0x2d0 [ 40.329644] ret_from_fork+0x10/0x20 [ 40.330213] [ 40.330581] kfence-#146: 0x0000000003942c9a-0x000000008b74aa0a, size=32, cache=test [ 40.330581] [ 40.331521] allocated by task 282 on cpu 0 at 40.322640s (0.008869s ago): [ 40.332476] test_alloc+0x22c/0x620 [ 40.332969] test_out_of_bounds_write+0xc8/0x240 [ 40.333687] kunit_try_run_case+0x14c/0x3d0 [ 40.334362] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.335177] kthread+0x24c/0x2d0 [ 40.335790] ret_from_fork+0x10/0x20 [ 40.336423] [ 40.336827] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 40.337884] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.338452] Hardware name: linux,dummy-virt (DT) [ 40.338987] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 39.490910] ================================================================== [ 39.491775] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 39.491775] [ 39.492652] Out-of-bounds read at 0x0000000051c4866b (32B right of kfence-#138): [ 39.493575] test_out_of_bounds_read+0x1c8/0x3e0 [ 39.494163] test_out_of_bounds_read+0x198/0x3e0 [ 39.494894] kunit_try_run_case+0x14c/0x3d0 [ 39.495596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.496295] kthread+0x24c/0x2d0 [ 39.496883] ret_from_fork+0x10/0x20 [ 39.497430] [ 39.497825] kfence-#138: 0x00000000ee69e38b-0x00000000486e3628, size=32, cache=kmalloc-32 [ 39.497825] [ 39.498919] allocated by task 276 on cpu 0 at 39.490447s (0.008461s ago): [ 39.499884] test_alloc+0x298/0x620 [ 39.500462] test_out_of_bounds_read+0x198/0x3e0 [ 39.501111] kunit_try_run_case+0x14c/0x3d0 [ 39.501813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.502620] kthread+0x24c/0x2d0 [ 39.503148] ret_from_fork+0x10/0x20 [ 39.503784] [ 39.504199] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 39.505337] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.505992] Hardware name: linux,dummy-virt (DT) [ 39.506693] ================================================================== [ 39.698720] ================================================================== [ 39.699712] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 39.699712] [ 39.700586] Out-of-bounds read at 0x000000000481efbc (32B right of kfence-#140): [ 39.701519] test_out_of_bounds_read+0x1c8/0x3e0 [ 39.702239] test_out_of_bounds_read+0x198/0x3e0 [ 39.702936] kunit_try_run_case+0x14c/0x3d0 [ 39.703643] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.704402] kthread+0x24c/0x2d0 [ 39.705009] ret_from_fork+0x10/0x20 [ 39.705673] [ 39.706070] kfence-#140: 0x000000000cc9b0bd-0x00000000c33fc6f0, size=32, cache=test [ 39.706070] [ 39.707288] allocated by task 278 on cpu 1 at 39.698553s (0.008724s ago): [ 39.708179] test_alloc+0x22c/0x620 [ 39.708727] test_out_of_bounds_read+0x198/0x3e0 [ 39.709374] kunit_try_run_case+0x14c/0x3d0 [ 39.709930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.710730] kthread+0x24c/0x2d0 [ 39.711270] ret_from_fork+0x10/0x20 [ 39.711776] [ 39.712190] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 39.713434] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.714068] Hardware name: linux,dummy-virt (DT) [ 39.714733] ================================================================== [ 39.594812] ================================================================== [ 39.595661] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 39.595661] [ 39.596912] Out-of-bounds read at 0x0000000029d18e1d (1B left of kfence-#139): [ 39.598086] test_out_of_bounds_read+0x114/0x3e0 [ 39.598760] test_out_of_bounds_read+0xdc/0x3e0 [ 39.599305] kunit_try_run_case+0x14c/0x3d0 [ 39.600214] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.601013] kthread+0x24c/0x2d0 [ 39.601811] ret_from_fork+0x10/0x20 [ 39.602510] [ 39.602977] kfence-#139: 0x00000000efebe175-0x00000000928b796a, size=32, cache=test [ 39.602977] [ 39.604219] allocated by task 278 on cpu 1 at 39.594622s (0.009585s ago): [ 39.605198] test_alloc+0x22c/0x620 [ 39.605890] test_out_of_bounds_read+0xdc/0x3e0 [ 39.606674] kunit_try_run_case+0x14c/0x3d0 [ 39.607427] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.608209] kthread+0x24c/0x2d0 [ 39.608838] ret_from_fork+0x10/0x20 [ 39.609462] [ 39.610031] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 39.611206] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.611921] Hardware name: linux,dummy-virt (DT) [ 39.612575] ================================================================== [ 38.867766] ================================================================== [ 38.868677] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 38.868677] [ 38.869866] Out-of-bounds read at 0x000000000011e4e6 (1B left of kfence-#132): [ 38.871279] test_out_of_bounds_read+0x114/0x3e0 [ 38.872041] test_out_of_bounds_read+0xdc/0x3e0 [ 38.872642] kunit_try_run_case+0x14c/0x3d0 [ 38.873325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.874001] kthread+0x24c/0x2d0 [ 38.874636] ret_from_fork+0x10/0x20 [ 38.875272] [ 38.876050] kfence-#132: 0x0000000094619c01-0x00000000f12b38e3, size=32, cache=kmalloc-32 [ 38.876050] [ 38.877397] allocated by task 276 on cpu 0 at 38.866416s (0.010840s ago): [ 38.879075] test_alloc+0x298/0x620 [ 38.879667] test_out_of_bounds_read+0xdc/0x3e0 [ 38.880297] kunit_try_run_case+0x14c/0x3d0 [ 38.880852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.881648] kthread+0x24c/0x2d0 [ 38.882184] ret_from_fork+0x10/0x20 [ 38.882877] [ 38.883393] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 38.884455] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.885100] Hardware name: linux,dummy-virt (DT) [ 38.885759] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 38.579969] ================================================================== [ 38.580794] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 38.582079] Write of size 121 at addr fff00000c5f1be00 by task kunit_try_catch/274 [ 38.582976] [ 38.583392] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 38.584704] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.585455] Hardware name: linux,dummy-virt (DT) [ 38.586091] Call trace: [ 38.586500] show_stack+0x20/0x38 (C) [ 38.587481] dump_stack_lvl+0x8c/0xd0 [ 38.588342] print_report+0x118/0x5e0 [ 38.588888] kasan_report+0xc8/0x118 [ 38.589456] kasan_check_range+0x100/0x1a8 [ 38.590212] __kasan_check_write+0x20/0x30 [ 38.590899] strncpy_from_user+0x3c/0x2a0 [ 38.591562] copy_user_test_oob+0x5c0/0xec0 [ 38.592230] kunit_try_run_case+0x14c/0x3d0 [ 38.592925] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.593708] kthread+0x24c/0x2d0 [ 38.594284] ret_from_fork+0x10/0x20 [ 38.594875] [ 38.595293] Allocated by task 274: [ 38.596010] kasan_save_stack+0x3c/0x68 [ 38.596729] kasan_save_track+0x20/0x40 [ 38.597417] kasan_save_alloc_info+0x40/0x58 [ 38.598074] __kasan_kmalloc+0xd4/0xd8 [ 38.598689] __kmalloc_noprof+0x188/0x4c8 [ 38.599294] kunit_kmalloc_array+0x34/0x88 [ 38.599940] copy_user_test_oob+0xac/0xec0 [ 38.600626] kunit_try_run_case+0x14c/0x3d0 [ 38.601227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.601964] kthread+0x24c/0x2d0 [ 38.602429] ret_from_fork+0x10/0x20 [ 38.603132] [ 38.603452] The buggy address belongs to the object at fff00000c5f1be00 [ 38.603452] which belongs to the cache kmalloc-128 of size 128 [ 38.604738] The buggy address is located 0 bytes inside of [ 38.604738] allocated 120-byte region [fff00000c5f1be00, fff00000c5f1be78) [ 38.606192] [ 38.606548] The buggy address belongs to the physical page: [ 38.607321] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f1b [ 38.608332] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.609282] page_type: f5(slab) [ 38.609939] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 38.610842] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 38.611660] page dumped because: kasan: bad access detected [ 38.612470] [ 38.612864] Memory state around the buggy address: [ 38.613487] fff00000c5f1bd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.614518] fff00000c5f1bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.615285] >fff00000c5f1be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 38.616220] ^ [ 38.617064] fff00000c5f1be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.617931] fff00000c5f1bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.618797] ================================================================== [ 38.620791] ================================================================== [ 38.622372] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 38.623205] Write of size 1 at addr fff00000c5f1be78 by task kunit_try_catch/274 [ 38.623929] [ 38.624317] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 38.625389] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.626374] Hardware name: linux,dummy-virt (DT) [ 38.627122] Call trace: [ 38.627603] show_stack+0x20/0x38 (C) [ 38.628183] dump_stack_lvl+0x8c/0xd0 [ 38.628855] print_report+0x118/0x5e0 [ 38.629381] kasan_report+0xc8/0x118 [ 38.630040] __asan_report_store1_noabort+0x20/0x30 [ 38.630684] strncpy_from_user+0x270/0x2a0 [ 38.631361] copy_user_test_oob+0x5c0/0xec0 [ 38.632004] kunit_try_run_case+0x14c/0x3d0 [ 38.632596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.633420] kthread+0x24c/0x2d0 [ 38.633980] ret_from_fork+0x10/0x20 [ 38.634637] [ 38.634996] Allocated by task 274: [ 38.635577] kasan_save_stack+0x3c/0x68 [ 38.636139] kasan_save_track+0x20/0x40 [ 38.636692] kasan_save_alloc_info+0x40/0x58 [ 38.637380] __kasan_kmalloc+0xd4/0xd8 [ 38.637871] __kmalloc_noprof+0x188/0x4c8 [ 38.638520] kunit_kmalloc_array+0x34/0x88 [ 38.639178] copy_user_test_oob+0xac/0xec0 [ 38.639854] kunit_try_run_case+0x14c/0x3d0 [ 38.640442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.641257] kthread+0x24c/0x2d0 [ 38.641832] ret_from_fork+0x10/0x20 [ 38.642441] [ 38.642791] The buggy address belongs to the object at fff00000c5f1be00 [ 38.642791] which belongs to the cache kmalloc-128 of size 128 [ 38.644072] The buggy address is located 0 bytes to the right of [ 38.644072] allocated 120-byte region [fff00000c5f1be00, fff00000c5f1be78) [ 38.645427] [ 38.645830] The buggy address belongs to the physical page: [ 38.646594] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f1b [ 38.647434] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.648262] page_type: f5(slab) [ 38.648861] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 38.649692] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 38.650570] page dumped because: kasan: bad access detected [ 38.651166] [ 38.651571] Memory state around the buggy address: [ 38.652270] fff00000c5f1bd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.653143] fff00000c5f1bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.654105] >fff00000c5f1be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 38.654998] ^ [ 38.655949] fff00000c5f1be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.656752] fff00000c5f1bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.657679] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 38.380597] ================================================================== [ 38.381344] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0 [ 38.382201] Read of size 121 at addr fff00000c5f1be00 by task kunit_try_catch/274 [ 38.383097] [ 38.383507] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 38.384485] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.385137] Hardware name: linux,dummy-virt (DT) [ 38.385823] Call trace: [ 38.386300] show_stack+0x20/0x38 (C) [ 38.386969] dump_stack_lvl+0x8c/0xd0 [ 38.387596] print_report+0x118/0x5e0 [ 38.388227] kasan_report+0xc8/0x118 [ 38.388896] kasan_check_range+0x100/0x1a8 [ 38.389632] __kasan_check_read+0x20/0x30 [ 38.390300] copy_user_test_oob+0x728/0xec0 [ 38.390855] kunit_try_run_case+0x14c/0x3d0 [ 38.391582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.392311] kthread+0x24c/0x2d0 [ 38.392952] ret_from_fork+0x10/0x20 [ 38.393622] [ 38.393992] Allocated by task 274: [ 38.394512] kasan_save_stack+0x3c/0x68 [ 38.395050] kasan_save_track+0x20/0x40 [ 38.395710] kasan_save_alloc_info+0x40/0x58 [ 38.396391] __kasan_kmalloc+0xd4/0xd8 [ 38.397004] __kmalloc_noprof+0x188/0x4c8 [ 38.397585] kunit_kmalloc_array+0x34/0x88 [ 38.398163] copy_user_test_oob+0xac/0xec0 [ 38.398830] kunit_try_run_case+0x14c/0x3d0 [ 38.399436] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.400223] kthread+0x24c/0x2d0 [ 38.400793] ret_from_fork+0x10/0x20 [ 38.401396] [ 38.401790] The buggy address belongs to the object at fff00000c5f1be00 [ 38.401790] which belongs to the cache kmalloc-128 of size 128 [ 38.403001] The buggy address is located 0 bytes inside of [ 38.403001] allocated 120-byte region [fff00000c5f1be00, fff00000c5f1be78) [ 38.404192] [ 38.404621] The buggy address belongs to the physical page: [ 38.405362] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f1b [ 38.406139] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.407043] page_type: f5(slab) [ 38.407655] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 38.408449] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 38.409459] page dumped because: kasan: bad access detected [ 38.410237] [ 38.410577] Memory state around the buggy address: [ 38.411268] fff00000c5f1bd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.412042] fff00000c5f1bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.413006] >fff00000c5f1be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 38.413802] ^ [ 38.414730] fff00000c5f1be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.415556] fff00000c5f1bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.416413] ================================================================== [ 38.329216] ================================================================== [ 38.330824] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0 [ 38.331634] Write of size 121 at addr fff00000c5f1be00 by task kunit_try_catch/274 [ 38.332545] [ 38.332969] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 38.334019] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.334701] Hardware name: linux,dummy-virt (DT) [ 38.335361] Call trace: [ 38.335852] show_stack+0x20/0x38 (C) [ 38.336547] dump_stack_lvl+0x8c/0xd0 [ 38.337227] print_report+0x118/0x5e0 [ 38.338374] kasan_report+0xc8/0x118 [ 38.339443] kasan_check_range+0x100/0x1a8 [ 38.340164] __kasan_check_write+0x20/0x30 [ 38.340884] copy_user_test_oob+0x234/0xec0 [ 38.341543] kunit_try_run_case+0x14c/0x3d0 [ 38.342191] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.342956] kthread+0x24c/0x2d0 [ 38.343855] ret_from_fork+0x10/0x20 [ 38.344488] [ 38.344846] Allocated by task 274: [ 38.345326] kasan_save_stack+0x3c/0x68 [ 38.345947] kasan_save_track+0x20/0x40 [ 38.346602] kasan_save_alloc_info+0x40/0x58 [ 38.348055] __kasan_kmalloc+0xd4/0xd8 [ 38.348787] __kmalloc_noprof+0x188/0x4c8 [ 38.349479] kunit_kmalloc_array+0x34/0x88 [ 38.350205] copy_user_test_oob+0xac/0xec0 [ 38.351193] kunit_try_run_case+0x14c/0x3d0 [ 38.351870] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.352619] kthread+0x24c/0x2d0 [ 38.353100] ret_from_fork+0x10/0x20 [ 38.354228] [ 38.354569] The buggy address belongs to the object at fff00000c5f1be00 [ 38.354569] which belongs to the cache kmalloc-128 of size 128 [ 38.355769] The buggy address is located 0 bytes inside of [ 38.355769] allocated 120-byte region [fff00000c5f1be00, fff00000c5f1be78) [ 38.357082] [ 38.357460] The buggy address belongs to the physical page: [ 38.358279] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f1b [ 38.359440] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.360794] page_type: f5(slab) [ 38.361178] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 38.362396] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 38.363571] page dumped because: kasan: bad access detected [ 38.364345] [ 38.364825] Memory state around the buggy address: [ 38.365736] fff00000c5f1bd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.366764] fff00000c5f1bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.367696] >fff00000c5f1be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 38.368586] ^ [ 38.369460] fff00000c5f1be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.370379] fff00000c5f1bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.371217] ================================================================== [ 38.425923] ================================================================== [ 38.426740] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0 [ 38.427621] Write of size 121 at addr fff00000c5f1be00 by task kunit_try_catch/274 [ 38.428275] [ 38.428687] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 38.429864] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.430411] Hardware name: linux,dummy-virt (DT) [ 38.431143] Call trace: [ 38.431622] show_stack+0x20/0x38 (C) [ 38.432282] dump_stack_lvl+0x8c/0xd0 [ 38.432944] print_report+0x118/0x5e0 [ 38.433510] kasan_report+0xc8/0x118 [ 38.434183] kasan_check_range+0x100/0x1a8 [ 38.434795] __kasan_check_write+0x20/0x30 [ 38.435490] copy_user_test_oob+0x35c/0xec0 [ 38.436206] kunit_try_run_case+0x14c/0x3d0 [ 38.436947] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.437734] kthread+0x24c/0x2d0 [ 38.438278] ret_from_fork+0x10/0x20 [ 38.438938] [ 38.439335] Allocated by task 274: [ 38.439818] kasan_save_stack+0x3c/0x68 [ 38.440451] kasan_save_track+0x20/0x40 [ 38.441020] kasan_save_alloc_info+0x40/0x58 [ 38.441711] __kasan_kmalloc+0xd4/0xd8 [ 38.442248] __kmalloc_noprof+0x188/0x4c8 [ 38.442901] kunit_kmalloc_array+0x34/0x88 [ 38.443583] copy_user_test_oob+0xac/0xec0 [ 38.444231] kunit_try_run_case+0x14c/0x3d0 [ 38.444880] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.445517] kthread+0x24c/0x2d0 [ 38.446109] ret_from_fork+0x10/0x20 [ 38.446732] [ 38.447116] The buggy address belongs to the object at fff00000c5f1be00 [ 38.447116] which belongs to the cache kmalloc-128 of size 128 [ 38.448327] The buggy address is located 0 bytes inside of [ 38.448327] allocated 120-byte region [fff00000c5f1be00, fff00000c5f1be78) [ 38.449803] [ 38.450168] The buggy address belongs to the physical page: [ 38.450944] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f1b [ 38.451821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.452677] page_type: f5(slab) [ 38.453221] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 38.453997] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 38.454976] page dumped because: kasan: bad access detected [ 38.455635] [ 38.455941] Memory state around the buggy address: [ 38.456675] fff00000c5f1bd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.457616] fff00000c5f1bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.458511] >fff00000c5f1be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 38.459388] ^ [ 38.460339] fff00000c5f1be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.461173] fff00000c5f1bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.462078] ================================================================== [ 38.542184] ================================================================== [ 38.542969] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0 [ 38.543704] Read of size 121 at addr fff00000c5f1be00 by task kunit_try_catch/274 [ 38.544565] [ 38.544949] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 38.546332] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.546984] Hardware name: linux,dummy-virt (DT) [ 38.547510] Call trace: [ 38.548005] show_stack+0x20/0x38 (C) [ 38.548677] dump_stack_lvl+0x8c/0xd0 [ 38.549247] print_report+0x118/0x5e0 [ 38.549936] kasan_report+0xc8/0x118 [ 38.550831] kasan_check_range+0x100/0x1a8 [ 38.551514] __kasan_check_read+0x20/0x30 [ 38.552116] copy_user_test_oob+0x4a0/0xec0 [ 38.552833] kunit_try_run_case+0x14c/0x3d0 [ 38.553458] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.554178] kthread+0x24c/0x2d0 [ 38.554765] ret_from_fork+0x10/0x20 [ 38.555408] [ 38.555814] Allocated by task 274: [ 38.556334] kasan_save_stack+0x3c/0x68 [ 38.556842] kasan_save_track+0x20/0x40 [ 38.557474] kasan_save_alloc_info+0x40/0x58 [ 38.558144] __kasan_kmalloc+0xd4/0xd8 [ 38.558669] __kmalloc_noprof+0x188/0x4c8 [ 38.559352] kunit_kmalloc_array+0x34/0x88 [ 38.560027] copy_user_test_oob+0xac/0xec0 [ 38.560636] kunit_try_run_case+0x14c/0x3d0 [ 38.561237] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.561992] kthread+0x24c/0x2d0 [ 38.562591] ret_from_fork+0x10/0x20 [ 38.563090] [ 38.563473] The buggy address belongs to the object at fff00000c5f1be00 [ 38.563473] which belongs to the cache kmalloc-128 of size 128 [ 38.564756] The buggy address is located 0 bytes inside of [ 38.564756] allocated 120-byte region [fff00000c5f1be00, fff00000c5f1be78) [ 38.565812] [ 38.566195] The buggy address belongs to the physical page: [ 38.566977] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f1b [ 38.567993] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.568756] page_type: f5(slab) [ 38.569368] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 38.570244] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 38.571142] page dumped because: kasan: bad access detected [ 38.571933] [ 38.572319] Memory state around the buggy address: [ 38.572944] fff00000c5f1bd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.573910] fff00000c5f1bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.574835] >fff00000c5f1be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 38.575602] ^ [ 38.576444] fff00000c5f1be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.577335] fff00000c5f1bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.578203] ================================================================== [ 38.464087] ================================================================== [ 38.464758] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0 [ 38.465750] Read of size 121 at addr fff00000c5f1be00 by task kunit_try_catch/274 [ 38.466629] [ 38.467042] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 38.468413] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.469004] Hardware name: linux,dummy-virt (DT) [ 38.469758] Call trace: [ 38.470231] show_stack+0x20/0x38 (C) [ 38.470844] dump_stack_lvl+0x8c/0xd0 [ 38.471501] print_report+0x118/0x5e0 [ 38.472124] kasan_report+0xc8/0x118 [ 38.472742] kasan_check_range+0x100/0x1a8 [ 38.473335] __kasan_check_read+0x20/0x30 [ 38.473912] copy_user_test_oob+0x3c8/0xec0 [ 38.474617] kunit_try_run_case+0x14c/0x3d0 [ 38.475324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.476150] kthread+0x24c/0x2d0 [ 38.476778] ret_from_fork+0x10/0x20 [ 38.477428] [ 38.477784] Allocated by task 274: [ 38.478277] kasan_save_stack+0x3c/0x68 [ 38.478931] kasan_save_track+0x20/0x40 [ 38.479493] kasan_save_alloc_info+0x40/0x58 [ 38.480193] __kasan_kmalloc+0xd4/0xd8 [ 38.480750] __kmalloc_noprof+0x188/0x4c8 [ 38.481278] kunit_kmalloc_array+0x34/0x88 [ 38.481955] copy_user_test_oob+0xac/0xec0 [ 38.482638] kunit_try_run_case+0x14c/0x3d0 [ 38.483300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.484074] kthread+0x24c/0x2d0 [ 38.484616] ret_from_fork+0x10/0x20 [ 38.485099] [ 38.485413] The buggy address belongs to the object at fff00000c5f1be00 [ 38.485413] which belongs to the cache kmalloc-128 of size 128 [ 38.486896] The buggy address is located 0 bytes inside of [ 38.486896] allocated 120-byte region [fff00000c5f1be00, fff00000c5f1be78) [ 38.488310] [ 38.489274] The buggy address belongs to the physical page: [ 38.490012] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f1b [ 38.490911] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.491805] page_type: f5(slab) [ 38.492429] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 38.493303] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 38.494278] page dumped because: kasan: bad access detected [ 38.495019] [ 38.495396] Memory state around the buggy address: [ 38.495934] fff00000c5f1bd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.496722] fff00000c5f1bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.497493] >fff00000c5f1be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 38.498297] ^ [ 38.499272] fff00000c5f1be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.500138] fff00000c5f1bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.500861] ================================================================== [ 38.502763] ================================================================== [ 38.503520] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0 [ 38.504287] Write of size 121 at addr fff00000c5f1be00 by task kunit_try_catch/274 [ 38.505218] [ 38.505653] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 38.506863] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.507490] Hardware name: linux,dummy-virt (DT) [ 38.508191] Call trace: [ 38.508609] show_stack+0x20/0x38 (C) [ 38.509289] dump_stack_lvl+0x8c/0xd0 [ 38.509912] print_report+0x118/0x5e0 [ 38.510501] kasan_report+0xc8/0x118 [ 38.511161] kasan_check_range+0x100/0x1a8 [ 38.511745] __kasan_check_write+0x20/0x30 [ 38.512453] copy_user_test_oob+0x434/0xec0 [ 38.513038] kunit_try_run_case+0x14c/0x3d0 [ 38.513770] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.514412] kthread+0x24c/0x2d0 [ 38.515037] ret_from_fork+0x10/0x20 [ 38.515716] [ 38.516104] Allocated by task 274: [ 38.516687] kasan_save_stack+0x3c/0x68 [ 38.517241] kasan_save_track+0x20/0x40 [ 38.517886] kasan_save_alloc_info+0x40/0x58 [ 38.518553] __kasan_kmalloc+0xd4/0xd8 [ 38.519185] __kmalloc_noprof+0x188/0x4c8 [ 38.520138] kunit_kmalloc_array+0x34/0x88 [ 38.520936] copy_user_test_oob+0xac/0xec0 [ 38.521589] kunit_try_run_case+0x14c/0x3d0 [ 38.522219] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.522932] kthread+0x24c/0x2d0 [ 38.523516] ret_from_fork+0x10/0x20 [ 38.524130] [ 38.524520] The buggy address belongs to the object at fff00000c5f1be00 [ 38.524520] which belongs to the cache kmalloc-128 of size 128 [ 38.525698] The buggy address is located 0 bytes inside of [ 38.525698] allocated 120-byte region [fff00000c5f1be00, fff00000c5f1be78) [ 38.526956] [ 38.527336] The buggy address belongs to the physical page: [ 38.528105] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f1b [ 38.528980] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.529857] page_type: f5(slab) [ 38.530352] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 38.531261] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 38.532091] page dumped because: kasan: bad access detected [ 38.532877] [ 38.533191] Memory state around the buggy address: [ 38.533860] fff00000c5f1bd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.534764] fff00000c5f1bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.535559] >fff00000c5f1be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 38.536382] ^ [ 38.537171] fff00000c5f1be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.538001] fff00000c5f1bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.538923] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 38.208399] ================================================================== [ 38.209788] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 38.210617] Read of size 8 at addr fff00000c5efa578 by task kunit_try_catch/270 [ 38.211387] [ 38.211853] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 38.213038] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.213552] Hardware name: linux,dummy-virt (DT) [ 38.214507] Call trace: [ 38.215052] show_stack+0x20/0x38 (C) [ 38.216149] dump_stack_lvl+0x8c/0xd0 [ 38.216845] print_report+0x118/0x5e0 [ 38.217787] kasan_report+0xc8/0x118 [ 38.218628] __asan_report_load8_noabort+0x20/0x30 [ 38.219347] copy_to_kernel_nofault+0x204/0x250 [ 38.220172] copy_to_kernel_nofault_oob+0x158/0x418 [ 38.220926] kunit_try_run_case+0x14c/0x3d0 [ 38.221569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.222358] kthread+0x24c/0x2d0 [ 38.222890] ret_from_fork+0x10/0x20 [ 38.223505] [ 38.223860] Allocated by task 270: [ 38.224435] kasan_save_stack+0x3c/0x68 [ 38.225007] kasan_save_track+0x20/0x40 [ 38.225941] kasan_save_alloc_info+0x40/0x58 [ 38.226515] __kasan_kmalloc+0xd4/0xd8 [ 38.227343] __kmalloc_cache_noprof+0x15c/0x3c8 [ 38.228114] copy_to_kernel_nofault_oob+0xc8/0x418 [ 38.228909] kunit_try_run_case+0x14c/0x3d0 [ 38.229569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.230699] kthread+0x24c/0x2d0 [ 38.231261] ret_from_fork+0x10/0x20 [ 38.231850] [ 38.232225] The buggy address belongs to the object at fff00000c5efa500 [ 38.232225] which belongs to the cache kmalloc-128 of size 128 [ 38.233596] The buggy address is located 0 bytes to the right of [ 38.233596] allocated 120-byte region [fff00000c5efa500, fff00000c5efa578) [ 38.235665] [ 38.236050] The buggy address belongs to the physical page: [ 38.236720] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105efa [ 38.237577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.238657] page_type: f5(slab) [ 38.239168] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 38.240049] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 38.241040] page dumped because: kasan: bad access detected [ 38.241996] [ 38.242401] Memory state around the buggy address: [ 38.242990] fff00000c5efa400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 38.243861] fff00000c5efa480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.244653] >fff00000c5efa500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 38.245598] ^ [ 38.246615] fff00000c5efa580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.247814] fff00000c5efa600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.248675] ================================================================== [ 38.250511] ================================================================== [ 38.251301] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 38.252250] Write of size 8 at addr fff00000c5efa578 by task kunit_try_catch/270 [ 38.254585] [ 38.255586] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 38.257470] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.258402] Hardware name: linux,dummy-virt (DT) [ 38.258929] Call trace: [ 38.259319] show_stack+0x20/0x38 (C) [ 38.260426] dump_stack_lvl+0x8c/0xd0 [ 38.261123] print_report+0x118/0x5e0 [ 38.262118] kasan_report+0xc8/0x118 [ 38.262841] kasan_check_range+0x100/0x1a8 [ 38.263653] __kasan_check_write+0x20/0x30 [ 38.264461] copy_to_kernel_nofault+0x8c/0x250 [ 38.265150] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 38.266149] kunit_try_run_case+0x14c/0x3d0 [ 38.266712] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.267357] kthread+0x24c/0x2d0 [ 38.267886] ret_from_fork+0x10/0x20 [ 38.268569] [ 38.268956] Allocated by task 270: [ 38.269617] kasan_save_stack+0x3c/0x68 [ 38.270287] kasan_save_track+0x20/0x40 [ 38.271028] kasan_save_alloc_info+0x40/0x58 [ 38.271689] __kasan_kmalloc+0xd4/0xd8 [ 38.272350] __kmalloc_cache_noprof+0x15c/0x3c8 [ 38.273106] copy_to_kernel_nofault_oob+0xc8/0x418 [ 38.273724] kunit_try_run_case+0x14c/0x3d0 [ 38.274448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.275303] kthread+0x24c/0x2d0 [ 38.275958] ret_from_fork+0x10/0x20 [ 38.276630] [ 38.277014] The buggy address belongs to the object at fff00000c5efa500 [ 38.277014] which belongs to the cache kmalloc-128 of size 128 [ 38.278563] The buggy address is located 0 bytes to the right of [ 38.278563] allocated 120-byte region [fff00000c5efa500, fff00000c5efa578) [ 38.279927] [ 38.280323] The buggy address belongs to the physical page: [ 38.280946] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105efa [ 38.281987] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.282900] page_type: f5(slab) [ 38.283356] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 38.284512] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 38.285342] page dumped because: kasan: bad access detected [ 38.286096] [ 38.286513] Memory state around the buggy address: [ 38.287119] fff00000c5efa400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.288070] fff00000c5efa480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.288774] >fff00000c5efa500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 38.289773] ^ [ 38.290689] fff00000c5efa580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.291661] fff00000c5efa600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.292594] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[ 30.276387] ================================================================== [ 30.278206] BUG: KASAN: invalid-free in kfree+0x278/0x3d0 [ 30.279167] Free of addr fff00000c64b4001 by task kunit_try_catch/139 [ 30.280046] [ 30.280545] CPU: 0 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.281818] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.282499] Hardware name: linux,dummy-virt (DT) [ 30.283219] Call trace: [ 30.283834] show_stack+0x20/0x38 (C) [ 30.284495] dump_stack_lvl+0x8c/0xd0 [ 30.285229] print_report+0x118/0x5e0 [ 30.286001] kasan_report_invalid_free+0xb0/0xd8 [ 30.286596] __kasan_kfree_large+0x5c/0xa8 [ 30.287271] free_large_kmalloc+0x58/0x140 [ 30.287998] kfree+0x278/0x3d0 [ 30.288636] kmalloc_large_invalid_free+0x108/0x270 [ 30.289338] kunit_try_run_case+0x14c/0x3d0 [ 30.290091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.290796] kthread+0x24c/0x2d0 [ 30.291427] ret_from_fork+0x10/0x20 [ 30.292097] [ 30.292515] The buggy address belongs to the physical page: [ 30.293169] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064b4 [ 30.294210] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.295063] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.296019] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.296980] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.297914] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.298846] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.299802] head: 0bfffe0000000002 ffffc1ffc3192d01 ffffffffffffffff 0000000000000000 [ 30.300741] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.301642] page dumped because: kasan: bad access detected [ 30.302337] [ 30.302760] Memory state around the buggy address: [ 30.303354] fff00000c64b3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.304335] fff00000c64b3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.305136] >fff00000c64b4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.306048] ^ [ 30.306604] fff00000c64b4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.307452] fff00000c64b4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.308371] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 38.127232] ================================================================== [ 38.127991] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 38.128793] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/258 [ 38.129601] [ 38.130044] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 38.131735] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.132273] Hardware name: linux,dummy-virt (DT) [ 38.132956] Call trace: [ 38.133335] show_stack+0x20/0x38 (C) [ 38.133977] dump_stack_lvl+0x8c/0xd0 [ 38.134595] print_report+0x2fc/0x5e0 [ 38.135505] kasan_report+0xc8/0x118 [ 38.136060] __asan_report_load1_noabort+0x20/0x30 [ 38.136844] vmalloc_oob+0x51c/0x5d0 [ 38.137476] kunit_try_run_case+0x14c/0x3d0 [ 38.138350] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.139156] kthread+0x24c/0x2d0 [ 38.139800] ret_from_fork+0x10/0x20 [ 38.140435] [ 38.140822] The buggy address belongs to the virtual mapping at [ 38.140822] [ffff80008010b000, ffff80008010d000) created by: [ 38.140822] vmalloc_oob+0x98/0x5d0 [ 38.142563] [ 38.142946] The buggy address belongs to the physical page: [ 38.143586] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f26 [ 38.144464] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.145383] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 38.146511] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 38.147438] page dumped because: kasan: bad access detected [ 38.148224] [ 38.148667] Memory state around the buggy address: [ 38.149357] ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.150863] ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.151848] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 38.152624] ^ [ 38.153664] ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 38.154599] ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 38.155421] ================================================================== [ 38.094795] ================================================================== [ 38.096339] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 38.097316] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/258 [ 38.098234] [ 38.099422] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 38.100909] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.101808] Hardware name: linux,dummy-virt (DT) [ 38.102666] Call trace: [ 38.103047] show_stack+0x20/0x38 (C) [ 38.103886] dump_stack_lvl+0x8c/0xd0 [ 38.104558] print_report+0x2fc/0x5e0 [ 38.105204] kasan_report+0xc8/0x118 [ 38.106096] __asan_report_load1_noabort+0x20/0x30 [ 38.106983] vmalloc_oob+0x578/0x5d0 [ 38.107624] kunit_try_run_case+0x14c/0x3d0 [ 38.107945] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.108288] kthread+0x24c/0x2d0 [ 38.108576] ret_from_fork+0x10/0x20 [ 38.109152] [ 38.109571] The buggy address belongs to the virtual mapping at [ 38.109571] [ffff80008010b000, ffff80008010d000) created by: [ 38.109571] vmalloc_oob+0x98/0x5d0 [ 38.111988] [ 38.112453] The buggy address belongs to the physical page: [ 38.112879] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f26 [ 38.113281] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.113850] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 38.115043] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 38.115828] page dumped because: kasan: bad access detected [ 38.116847] [ 38.117279] Memory state around the buggy address: [ 38.118019] ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.119270] ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.120246] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 38.121116] ^ [ 38.122318] ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 38.123227] ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 38.124122] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 36.417095] ================================================================== [ 36.418032] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 36.418925] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.419830] [ 36.420221] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.421501] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.421985] Hardware name: linux,dummy-virt (DT) [ 36.422677] Call trace: [ 36.423088] show_stack+0x20/0x38 (C) [ 36.423667] dump_stack_lvl+0x8c/0xd0 [ 36.424340] print_report+0x118/0x5e0 [ 36.424893] kasan_report+0xc8/0x118 [ 36.425544] kasan_check_range+0x100/0x1a8 [ 36.426138] __kasan_check_write+0x20/0x30 [ 36.426744] kasan_atomics_helper+0xa04/0x4858 [ 36.427468] kasan_atomics+0x198/0x2e8 [ 36.428082] kunit_try_run_case+0x14c/0x3d0 [ 36.428787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.429600] kthread+0x24c/0x2d0 [ 36.430208] ret_from_fork+0x10/0x20 [ 36.430803] [ 36.431178] Allocated by task 254: [ 36.431742] kasan_save_stack+0x3c/0x68 [ 36.432317] kasan_save_track+0x20/0x40 [ 36.432862] kasan_save_alloc_info+0x40/0x58 [ 36.433561] __kasan_kmalloc+0xd4/0xd8 [ 36.434182] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.434749] kasan_atomics+0xb8/0x2e8 [ 36.435370] kunit_try_run_case+0x14c/0x3d0 [ 36.436305] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.437011] kthread+0x24c/0x2d0 [ 36.437518] ret_from_fork+0x10/0x20 [ 36.438072] [ 36.438442] The buggy address belongs to the object at fff00000c5f10100 [ 36.438442] which belongs to the cache kmalloc-64 of size 64 [ 36.439621] The buggy address is located 0 bytes to the right of [ 36.439621] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.440970] [ 36.441356] The buggy address belongs to the physical page: [ 36.442010] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.442944] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.443744] page_type: f5(slab) [ 36.444333] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.445207] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.446029] page dumped because: kasan: bad access detected [ 36.446770] [ 36.447140] Memory state around the buggy address: [ 36.447853] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.448667] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.449568] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.450253] ^ [ 36.450967] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.451767] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.452660] ================================================================== [ 37.575032] ================================================================== [ 37.575720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 37.576592] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.577512] [ 37.577984] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.579030] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.579677] Hardware name: linux,dummy-virt (DT) [ 37.580207] Call trace: [ 37.580777] show_stack+0x20/0x38 (C) [ 37.581885] dump_stack_lvl+0x8c/0xd0 [ 37.582591] print_report+0x118/0x5e0 [ 37.583103] kasan_report+0xc8/0x118 [ 37.583769] kasan_check_range+0x100/0x1a8 [ 37.584376] __kasan_check_write+0x20/0x30 [ 37.585078] kasan_atomics_helper+0x1414/0x4858 [ 37.585738] kasan_atomics+0x198/0x2e8 [ 37.586374] kunit_try_run_case+0x14c/0x3d0 [ 37.586979] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.587802] kthread+0x24c/0x2d0 [ 37.588408] ret_from_fork+0x10/0x20 [ 37.588995] [ 37.589351] Allocated by task 254: [ 37.589938] kasan_save_stack+0x3c/0x68 [ 37.590469] kasan_save_track+0x20/0x40 [ 37.591135] kasan_save_alloc_info+0x40/0x58 [ 37.591749] __kasan_kmalloc+0xd4/0xd8 [ 37.592251] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.592975] kasan_atomics+0xb8/0x2e8 [ 37.593486] kunit_try_run_case+0x14c/0x3d0 [ 37.594170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.594843] kthread+0x24c/0x2d0 [ 37.595419] ret_from_fork+0x10/0x20 [ 37.595979] [ 37.596360] The buggy address belongs to the object at fff00000c5f10100 [ 37.596360] which belongs to the cache kmalloc-64 of size 64 [ 37.597556] The buggy address is located 0 bytes to the right of [ 37.597556] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.598895] [ 37.599314] The buggy address belongs to the physical page: [ 37.600306] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.601146] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.601979] page_type: f5(slab) [ 37.602571] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.603399] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.604286] page dumped because: kasan: bad access detected [ 37.605002] [ 37.605375] Memory state around the buggy address: [ 37.606037] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.606994] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.607741] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.608676] ^ [ 37.609295] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.610131] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.610955] ================================================================== [ 36.301031] ================================================================== [ 36.303034] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 36.303860] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.304687] [ 36.305087] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.306181] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.306819] Hardware name: linux,dummy-virt (DT) [ 36.307418] Call trace: [ 36.307853] show_stack+0x20/0x38 (C) [ 36.308425] dump_stack_lvl+0x8c/0xd0 [ 36.309123] print_report+0x118/0x5e0 [ 36.309718] kasan_report+0xc8/0x118 [ 36.310238] __asan_report_load4_noabort+0x20/0x30 [ 36.311014] kasan_atomics_helper+0x42d8/0x4858 [ 36.311758] kasan_atomics+0x198/0x2e8 [ 36.312338] kunit_try_run_case+0x14c/0x3d0 [ 36.313053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.313847] kthread+0x24c/0x2d0 [ 36.314365] ret_from_fork+0x10/0x20 [ 36.315022] [ 36.315339] Allocated by task 254: [ 36.315918] kasan_save_stack+0x3c/0x68 [ 36.316591] kasan_save_track+0x20/0x40 [ 36.317095] kasan_save_alloc_info+0x40/0x58 [ 36.317794] __kasan_kmalloc+0xd4/0xd8 [ 36.318416] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.318960] kasan_atomics+0xb8/0x2e8 [ 36.319640] kunit_try_run_case+0x14c/0x3d0 [ 36.320331] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.320988] kthread+0x24c/0x2d0 [ 36.321597] ret_from_fork+0x10/0x20 [ 36.322212] [ 36.322608] The buggy address belongs to the object at fff00000c5f10100 [ 36.322608] which belongs to the cache kmalloc-64 of size 64 [ 36.323893] The buggy address is located 0 bytes to the right of [ 36.323893] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.325171] [ 36.325573] The buggy address belongs to the physical page: [ 36.326259] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.327246] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.328112] page_type: f5(slab) [ 36.328707] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.329619] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.330461] page dumped because: kasan: bad access detected [ 36.331052] [ 36.331475] Memory state around the buggy address: [ 36.332147] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.332967] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.333832] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.334659] ^ [ 36.335256] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.336067] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.336932] ================================================================== [ 37.918835] ================================================================== [ 37.920195] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 37.921224] Read of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.923002] [ 37.923504] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.924805] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.925339] Hardware name: linux,dummy-virt (DT) [ 37.925920] Call trace: [ 37.926329] show_stack+0x20/0x38 (C) [ 37.926892] dump_stack_lvl+0x8c/0xd0 [ 37.927399] print_report+0x118/0x5e0 [ 37.928138] kasan_report+0xc8/0x118 [ 37.928841] __asan_report_load8_noabort+0x20/0x30 [ 37.929769] kasan_atomics_helper+0x3e10/0x4858 [ 37.930586] kasan_atomics+0x198/0x2e8 [ 37.931272] kunit_try_run_case+0x14c/0x3d0 [ 37.931971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.932841] kthread+0x24c/0x2d0 [ 37.933423] ret_from_fork+0x10/0x20 [ 37.934117] [ 37.934549] Allocated by task 254: [ 37.934985] kasan_save_stack+0x3c/0x68 [ 37.935686] kasan_save_track+0x20/0x40 [ 37.936300] kasan_save_alloc_info+0x40/0x58 [ 37.937059] __kasan_kmalloc+0xd4/0xd8 [ 37.937763] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.938429] kasan_atomics+0xb8/0x2e8 [ 37.939136] kunit_try_run_case+0x14c/0x3d0 [ 37.939874] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.940628] kthread+0x24c/0x2d0 [ 37.941184] ret_from_fork+0x10/0x20 [ 37.941861] [ 37.942278] The buggy address belongs to the object at fff00000c5f10100 [ 37.942278] which belongs to the cache kmalloc-64 of size 64 [ 37.943590] The buggy address is located 0 bytes to the right of [ 37.943590] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.945001] [ 37.945424] The buggy address belongs to the physical page: [ 37.946100] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.947115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.947998] page_type: f5(slab) [ 37.948514] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.949607] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.950455] page dumped because: kasan: bad access detected [ 37.951215] [ 37.951649] Memory state around the buggy address: [ 37.952362] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.953223] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.954199] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.955018] ^ [ 37.955754] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.956591] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.957559] ================================================================== [ 35.822962] ================================================================== [ 35.823788] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 35.824566] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 35.825497] [ 35.825956] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.826918] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.827556] Hardware name: linux,dummy-virt (DT) [ 35.828236] Call trace: [ 35.828698] show_stack+0x20/0x38 (C) [ 35.829276] dump_stack_lvl+0x8c/0xd0 [ 35.829943] print_report+0x118/0x5e0 [ 35.830555] kasan_report+0xc8/0x118 [ 35.831193] kasan_check_range+0x100/0x1a8 [ 35.832181] __kasan_check_write+0x20/0x30 [ 35.832507] kasan_atomics_helper+0x3ac/0x4858 [ 35.832834] kasan_atomics+0x198/0x2e8 [ 35.833103] kunit_try_run_case+0x14c/0x3d0 [ 35.833385] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.834612] kthread+0x24c/0x2d0 [ 35.835725] ret_from_fork+0x10/0x20 [ 35.836475] [ 35.836882] Allocated by task 254: [ 35.837841] kasan_save_stack+0x3c/0x68 [ 35.838866] kasan_save_track+0x20/0x40 [ 35.839668] kasan_save_alloc_info+0x40/0x58 [ 35.840290] __kasan_kmalloc+0xd4/0xd8 [ 35.840965] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.841658] kasan_atomics+0xb8/0x2e8 [ 35.842173] kunit_try_run_case+0x14c/0x3d0 [ 35.842775] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.843403] kthread+0x24c/0x2d0 [ 35.844013] ret_from_fork+0x10/0x20 [ 35.844669] [ 35.845043] The buggy address belongs to the object at fff00000c5f10100 [ 35.845043] which belongs to the cache kmalloc-64 of size 64 [ 35.846464] The buggy address is located 0 bytes to the right of [ 35.846464] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 35.847850] [ 35.848152] The buggy address belongs to the physical page: [ 35.848938] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 35.849786] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.850637] page_type: f5(slab) [ 35.851108] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.852177] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.853183] page dumped because: kasan: bad access detected [ 35.853895] [ 35.854277] Memory state around the buggy address: [ 35.854889] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.855866] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.856771] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.857726] ^ [ 35.858247] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.859209] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.860187] ================================================================== [ 36.966061] ================================================================== [ 36.966704] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 36.967669] Read of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.968679] [ 36.969079] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.970108] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.970784] Hardware name: linux,dummy-virt (DT) [ 36.971468] Call trace: [ 36.971964] show_stack+0x20/0x38 (C) [ 36.972637] dump_stack_lvl+0x8c/0xd0 [ 36.973271] print_report+0x118/0x5e0 [ 36.973809] kasan_report+0xc8/0x118 [ 36.974432] __asan_report_load8_noabort+0x20/0x30 [ 36.975128] kasan_atomics_helper+0x3f58/0x4858 [ 36.975738] kasan_atomics+0x198/0x2e8 [ 36.976397] kunit_try_run_case+0x14c/0x3d0 [ 36.976981] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.977717] kthread+0x24c/0x2d0 [ 36.978311] ret_from_fork+0x10/0x20 [ 36.978966] [ 36.979331] Allocated by task 254: [ 36.979917] kasan_save_stack+0x3c/0x68 [ 36.980583] kasan_save_track+0x20/0x40 [ 36.981219] kasan_save_alloc_info+0x40/0x58 [ 36.981880] __kasan_kmalloc+0xd4/0xd8 [ 36.982499] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.983181] kasan_atomics+0xb8/0x2e8 [ 36.983817] kunit_try_run_case+0x14c/0x3d0 [ 36.984388] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.985200] kthread+0x24c/0x2d0 [ 36.985809] ret_from_fork+0x10/0x20 [ 36.986316] [ 36.986708] The buggy address belongs to the object at fff00000c5f10100 [ 36.986708] which belongs to the cache kmalloc-64 of size 64 [ 36.987957] The buggy address is located 0 bytes to the right of [ 36.987957] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.989269] [ 36.989663] The buggy address belongs to the physical page: [ 36.990424] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.991235] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.992130] page_type: f5(slab) [ 36.992738] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.993611] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.994456] page dumped because: kasan: bad access detected [ 36.995247] [ 36.995652] Memory state around the buggy address: [ 36.996212] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.997150] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.997986] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.998834] ^ [ 36.999568] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.000413] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.001244] ================================================================== [ 38.036895] ================================================================== [ 38.038396] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 38.039194] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 38.041174] [ 38.041566] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 38.042701] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.043319] Hardware name: linux,dummy-virt (DT) [ 38.043946] Call trace: [ 38.044370] show_stack+0x20/0x38 (C) [ 38.044990] dump_stack_lvl+0x8c/0xd0 [ 38.045616] print_report+0x118/0x5e0 [ 38.046264] kasan_report+0xc8/0x118 [ 38.046798] kasan_check_range+0x100/0x1a8 [ 38.047486] __kasan_check_write+0x20/0x30 [ 38.048113] kasan_atomics_helper+0x17ec/0x4858 [ 38.048886] kasan_atomics+0x198/0x2e8 [ 38.049559] kunit_try_run_case+0x14c/0x3d0 [ 38.050268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.051003] kthread+0x24c/0x2d0 [ 38.051575] ret_from_fork+0x10/0x20 [ 38.052100] [ 38.052485] Allocated by task 254: [ 38.053066] kasan_save_stack+0x3c/0x68 [ 38.053720] kasan_save_track+0x20/0x40 [ 38.054283] kasan_save_alloc_info+0x40/0x58 [ 38.054842] __kasan_kmalloc+0xd4/0xd8 [ 38.055474] __kmalloc_cache_noprof+0x15c/0x3c8 [ 38.056103] kasan_atomics+0xb8/0x2e8 [ 38.056701] kunit_try_run_case+0x14c/0x3d0 [ 38.057366] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.058168] kthread+0x24c/0x2d0 [ 38.058713] ret_from_fork+0x10/0x20 [ 38.059309] [ 38.059705] The buggy address belongs to the object at fff00000c5f10100 [ 38.059705] which belongs to the cache kmalloc-64 of size 64 [ 38.060994] The buggy address is located 0 bytes to the right of [ 38.060994] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 38.062251] [ 38.062653] The buggy address belongs to the physical page: [ 38.063336] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 38.064375] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.065061] page_type: f5(slab) [ 38.065573] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.066581] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 38.067558] page dumped because: kasan: bad access detected [ 38.068292] [ 38.068682] Memory state around the buggy address: [ 38.069337] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 38.070167] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 38.071078] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.072020] ^ [ 38.072734] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.073551] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.074355] ================================================================== [ 37.880515] ================================================================== [ 37.881174] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 37.882778] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.883752] [ 37.884113] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.885095] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.885746] Hardware name: linux,dummy-virt (DT) [ 37.886411] Call trace: [ 37.886903] show_stack+0x20/0x38 (C) [ 37.887572] dump_stack_lvl+0x8c/0xd0 [ 37.888145] print_report+0x118/0x5e0 [ 37.888789] kasan_report+0xc8/0x118 [ 37.889317] kasan_check_range+0x100/0x1a8 [ 37.890008] __kasan_check_write+0x20/0x30 [ 37.890734] kasan_atomics_helper+0x16d0/0x4858 [ 37.891452] kasan_atomics+0x198/0x2e8 [ 37.892049] kunit_try_run_case+0x14c/0x3d0 [ 37.892793] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.893586] kthread+0x24c/0x2d0 [ 37.894189] ret_from_fork+0x10/0x20 [ 37.894864] [ 37.895191] Allocated by task 254: [ 37.895640] kasan_save_stack+0x3c/0x68 [ 37.896278] kasan_save_track+0x20/0x40 [ 37.896928] kasan_save_alloc_info+0x40/0x58 [ 37.897909] __kasan_kmalloc+0xd4/0xd8 [ 37.898543] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.899183] kasan_atomics+0xb8/0x2e8 [ 37.899730] kunit_try_run_case+0x14c/0x3d0 [ 37.900394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.901128] kthread+0x24c/0x2d0 [ 37.901715] ret_from_fork+0x10/0x20 [ 37.902213] [ 37.902544] The buggy address belongs to the object at fff00000c5f10100 [ 37.902544] which belongs to the cache kmalloc-64 of size 64 [ 37.903979] The buggy address is located 0 bytes to the right of [ 37.903979] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.905110] [ 37.905486] The buggy address belongs to the physical page: [ 37.906254] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.907285] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.907960] page_type: f5(slab) [ 37.908570] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.909496] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.910398] page dumped because: kasan: bad access detected [ 37.911126] [ 37.911501] Memory state around the buggy address: [ 37.912206] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.913054] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.913865] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.914663] ^ [ 37.915362] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.916172] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.917116] ================================================================== [ 36.454096] ================================================================== [ 36.454910] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 36.455767] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.456603] [ 36.456999] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.458138] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.458774] Hardware name: linux,dummy-virt (DT) [ 36.459332] Call trace: [ 36.459828] show_stack+0x20/0x38 (C) [ 36.460495] dump_stack_lvl+0x8c/0xd0 [ 36.461043] print_report+0x118/0x5e0 [ 36.461708] kasan_report+0xc8/0x118 [ 36.462348] kasan_check_range+0x100/0x1a8 [ 36.463076] __kasan_check_write+0x20/0x30 [ 36.463709] kasan_atomics_helper+0xa6c/0x4858 [ 36.464365] kasan_atomics+0x198/0x2e8 [ 36.465041] kunit_try_run_case+0x14c/0x3d0 [ 36.465678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.466494] kthread+0x24c/0x2d0 [ 36.468249] ret_from_fork+0x10/0x20 [ 36.469156] [ 36.469870] Allocated by task 254: [ 36.470895] kasan_save_stack+0x3c/0x68 [ 36.472273] kasan_save_track+0x20/0x40 [ 36.473185] kasan_save_alloc_info+0x40/0x58 [ 36.474279] __kasan_kmalloc+0xd4/0xd8 [ 36.475293] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.476014] kasan_atomics+0xb8/0x2e8 [ 36.476665] kunit_try_run_case+0x14c/0x3d0 [ 36.477238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.477970] kthread+0x24c/0x2d0 [ 36.478505] ret_from_fork+0x10/0x20 [ 36.479144] [ 36.479513] The buggy address belongs to the object at fff00000c5f10100 [ 36.479513] which belongs to the cache kmalloc-64 of size 64 [ 36.480609] The buggy address is located 0 bytes to the right of [ 36.480609] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.482064] [ 36.482384] The buggy address belongs to the physical page: [ 36.483069] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.484102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.484967] page_type: f5(slab) [ 36.485413] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.486383] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.487187] page dumped because: kasan: bad access detected [ 36.487916] [ 36.488220] Memory state around the buggy address: [ 36.488938] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.489883] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.490828] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.491715] ^ [ 36.492433] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.493305] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.494237] ================================================================== [ 35.699515] ================================================================== [ 35.700410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 35.701337] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 35.702833] [ 35.703149] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.703959] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.704627] Hardware name: linux,dummy-virt (DT) [ 35.705230] Call trace: [ 35.706192] show_stack+0x20/0x38 (C) [ 35.706825] dump_stack_lvl+0x8c/0xd0 [ 35.707670] print_report+0x118/0x5e0 [ 35.708232] kasan_report+0xc8/0x118 [ 35.708850] __asan_report_load4_noabort+0x20/0x30 [ 35.709567] kasan_atomics_helper+0x40fc/0x4858 [ 35.710201] kasan_atomics+0x198/0x2e8 [ 35.711155] kunit_try_run_case+0x14c/0x3d0 [ 35.711870] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.712582] kthread+0x24c/0x2d0 [ 35.713185] ret_from_fork+0x10/0x20 [ 35.714138] [ 35.714511] Allocated by task 254: [ 35.715026] kasan_save_stack+0x3c/0x68 [ 35.715518] kasan_save_track+0x20/0x40 [ 35.716178] kasan_save_alloc_info+0x40/0x58 [ 35.716841] __kasan_kmalloc+0xd4/0xd8 [ 35.717381] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.718361] kasan_atomics+0xb8/0x2e8 [ 35.719028] kunit_try_run_case+0x14c/0x3d0 [ 35.719667] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.720380] kthread+0x24c/0x2d0 [ 35.720921] ret_from_fork+0x10/0x20 [ 35.721562] [ 35.722761] The buggy address belongs to the object at fff00000c5f10100 [ 35.722761] which belongs to the cache kmalloc-64 of size 64 [ 35.724313] The buggy address is located 0 bytes to the right of [ 35.724313] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 35.725625] [ 35.726008] The buggy address belongs to the physical page: [ 35.726732] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 35.727448] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.728761] page_type: f5(slab) [ 35.729299] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.730591] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.731408] page dumped because: kasan: bad access detected [ 35.732111] [ 35.732490] Memory state around the buggy address: [ 35.733070] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.734313] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.735179] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.735947] ^ [ 35.736672] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.737493] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.738719] ================================================================== [ 37.233424] ================================================================== [ 37.234389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 37.235401] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.236335] [ 37.236757] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.237867] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.238334] Hardware name: linux,dummy-virt (DT) [ 37.239057] Call trace: [ 37.239432] show_stack+0x20/0x38 (C) [ 37.240108] dump_stack_lvl+0x8c/0xd0 [ 37.240714] print_report+0x118/0x5e0 [ 37.241359] kasan_report+0xc8/0x118 [ 37.241914] kasan_check_range+0x100/0x1a8 [ 37.242635] __kasan_check_write+0x20/0x30 [ 37.243206] kasan_atomics_helper+0x1058/0x4858 [ 37.243943] kasan_atomics+0x198/0x2e8 [ 37.244598] kunit_try_run_case+0x14c/0x3d0 [ 37.245288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.246055] kthread+0x24c/0x2d0 [ 37.246599] ret_from_fork+0x10/0x20 [ 37.247246] [ 37.247607] Allocated by task 254: [ 37.248174] kasan_save_stack+0x3c/0x68 [ 37.248781] kasan_save_track+0x20/0x40 [ 37.249359] kasan_save_alloc_info+0x40/0x58 [ 37.250052] __kasan_kmalloc+0xd4/0xd8 [ 37.250632] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.251198] kasan_atomics+0xb8/0x2e8 [ 37.251836] kunit_try_run_case+0x14c/0x3d0 [ 37.252516] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.253331] kthread+0x24c/0x2d0 [ 37.253813] ret_from_fork+0x10/0x20 [ 37.254424] [ 37.254815] The buggy address belongs to the object at fff00000c5f10100 [ 37.254815] which belongs to the cache kmalloc-64 of size 64 [ 37.256020] The buggy address is located 0 bytes to the right of [ 37.256020] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.257210] [ 37.257618] The buggy address belongs to the physical page: [ 37.258370] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.259284] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.260047] page_type: f5(slab) [ 37.260623] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.261547] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.262393] page dumped because: kasan: bad access detected [ 37.263064] [ 37.263432] Memory state around the buggy address: [ 37.264038] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.264980] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.266021] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.266848] ^ [ 37.267372] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.268137] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.268987] ================================================================== [ 37.308069] ================================================================== [ 37.308978] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 37.309830] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.310732] [ 37.311142] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.312232] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.312800] Hardware name: linux,dummy-virt (DT) [ 37.313424] Call trace: [ 37.313911] show_stack+0x20/0x38 (C) [ 37.314481] dump_stack_lvl+0x8c/0xd0 [ 37.315170] print_report+0x118/0x5e0 [ 37.315849] kasan_report+0xc8/0x118 [ 37.316425] kasan_check_range+0x100/0x1a8 [ 37.317135] __kasan_check_write+0x20/0x30 [ 37.317814] kasan_atomics_helper+0x1128/0x4858 [ 37.318464] kasan_atomics+0x198/0x2e8 [ 37.319088] kunit_try_run_case+0x14c/0x3d0 [ 37.319814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.320476] kthread+0x24c/0x2d0 [ 37.321099] ret_from_fork+0x10/0x20 [ 37.321679] [ 37.322055] Allocated by task 254: [ 37.322626] kasan_save_stack+0x3c/0x68 [ 37.323255] kasan_save_track+0x20/0x40 [ 37.323827] kasan_save_alloc_info+0x40/0x58 [ 37.324468] __kasan_kmalloc+0xd4/0xd8 [ 37.325119] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.325835] kasan_atomics+0xb8/0x2e8 [ 37.326382] kunit_try_run_case+0x14c/0x3d0 [ 37.327382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.328383] kthread+0x24c/0x2d0 [ 37.328914] ret_from_fork+0x10/0x20 [ 37.329469] [ 37.329864] The buggy address belongs to the object at fff00000c5f10100 [ 37.329864] which belongs to the cache kmalloc-64 of size 64 [ 37.331129] The buggy address is located 0 bytes to the right of [ 37.331129] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.332473] [ 37.332880] The buggy address belongs to the physical page: [ 37.333653] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.334476] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.335339] page_type: f5(slab) [ 37.335933] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.336752] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.337679] page dumped because: kasan: bad access detected [ 37.338327] [ 37.338726] Memory state around the buggy address: [ 37.339398] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.340280] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.341138] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.341844] ^ [ 37.342565] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.343447] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.344302] ================================================================== [ 36.062479] ================================================================== [ 36.064194] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 36.064977] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.066209] [ 36.066645] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.068040] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.068804] Hardware name: linux,dummy-virt (DT) [ 36.069426] Call trace: [ 36.069855] show_stack+0x20/0x38 (C) [ 36.070451] dump_stack_lvl+0x8c/0xd0 [ 36.070997] print_report+0x118/0x5e0 [ 36.071711] kasan_report+0xc8/0x118 [ 36.072384] kasan_check_range+0x100/0x1a8 [ 36.073131] __kasan_check_write+0x20/0x30 [ 36.073900] kasan_atomics_helper+0x61c/0x4858 [ 36.074632] kasan_atomics+0x198/0x2e8 [ 36.075324] kunit_try_run_case+0x14c/0x3d0 [ 36.076010] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.076829] kthread+0x24c/0x2d0 [ 36.077480] ret_from_fork+0x10/0x20 [ 36.078111] [ 36.078551] Allocated by task 254: [ 36.079088] kasan_save_stack+0x3c/0x68 [ 36.079809] kasan_save_track+0x20/0x40 [ 36.080349] kasan_save_alloc_info+0x40/0x58 [ 36.081077] __kasan_kmalloc+0xd4/0xd8 [ 36.081719] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.082416] kasan_atomics+0xb8/0x2e8 [ 36.082982] kunit_try_run_case+0x14c/0x3d0 [ 36.083719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.084422] kthread+0x24c/0x2d0 [ 36.085061] ret_from_fork+0x10/0x20 [ 36.085703] [ 36.086041] The buggy address belongs to the object at fff00000c5f10100 [ 36.086041] which belongs to the cache kmalloc-64 of size 64 [ 36.087336] The buggy address is located 0 bytes to the right of [ 36.087336] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.088755] [ 36.089198] The buggy address belongs to the physical page: [ 36.089978] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.090988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.091809] page_type: f5(slab) [ 36.092429] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.093343] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.094328] page dumped because: kasan: bad access detected [ 36.095011] [ 36.095427] Memory state around the buggy address: [ 36.096102] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.096897] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.097813] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.098679] ^ [ 36.099344] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.100206] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.101119] ================================================================== [ 36.850087] ================================================================== [ 36.851674] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 36.852505] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.853499] [ 36.854042] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.855219] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.855832] Hardware name: linux,dummy-virt (DT) [ 36.856583] Call trace: [ 36.857042] show_stack+0x20/0x38 (C) [ 36.857684] dump_stack_lvl+0x8c/0xd0 [ 36.858386] print_report+0x118/0x5e0 [ 36.858976] kasan_report+0xc8/0x118 [ 36.859697] kasan_check_range+0x100/0x1a8 [ 36.860405] __kasan_check_write+0x20/0x30 [ 36.861150] kasan_atomics_helper+0xd3c/0x4858 [ 36.861855] kasan_atomics+0x198/0x2e8 [ 36.862568] kunit_try_run_case+0x14c/0x3d0 [ 36.863239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.864089] kthread+0x24c/0x2d0 [ 36.864685] ret_from_fork+0x10/0x20 [ 36.865371] [ 36.865792] Allocated by task 254: [ 36.866216] kasan_save_stack+0x3c/0x68 [ 36.866910] kasan_save_track+0x20/0x40 [ 36.867493] kasan_save_alloc_info+0x40/0x58 [ 36.868210] __kasan_kmalloc+0xd4/0xd8 [ 36.868906] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.869599] kasan_atomics+0xb8/0x2e8 [ 36.870257] kunit_try_run_case+0x14c/0x3d0 [ 36.871040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.871898] kthread+0x24c/0x2d0 [ 36.872620] ret_from_fork+0x10/0x20 [ 36.873175] [ 36.873616] The buggy address belongs to the object at fff00000c5f10100 [ 36.873616] which belongs to the cache kmalloc-64 of size 64 [ 36.875214] The buggy address is located 0 bytes to the right of [ 36.875214] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.876098] [ 36.876291] The buggy address belongs to the physical page: [ 36.876672] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.877738] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.878661] page_type: f5(slab) [ 36.879261] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.880144] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.880975] page dumped because: kasan: bad access detected [ 36.881699] [ 36.882069] Memory state around the buggy address: [ 36.882781] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.883664] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.884561] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.885466] ^ [ 36.886082] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.886911] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.887769] ================================================================== [ 36.928565] ================================================================== [ 36.929412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 36.930359] Read of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.931095] [ 36.931507] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.932809] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.933434] Hardware name: linux,dummy-virt (DT) [ 36.934401] Call trace: [ 36.934822] show_stack+0x20/0x38 (C) [ 36.935425] dump_stack_lvl+0x8c/0xd0 [ 36.936043] print_report+0x118/0x5e0 [ 36.936719] kasan_report+0xc8/0x118 [ 36.937282] kasan_check_range+0x100/0x1a8 [ 36.937982] __kasan_check_read+0x20/0x30 [ 36.938693] kasan_atomics_helper+0xdd4/0x4858 [ 36.939309] kasan_atomics+0x198/0x2e8 [ 36.939985] kunit_try_run_case+0x14c/0x3d0 [ 36.940633] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.941289] kthread+0x24c/0x2d0 [ 36.941925] ret_from_fork+0x10/0x20 [ 36.942552] [ 36.942929] Allocated by task 254: [ 36.943492] kasan_save_stack+0x3c/0x68 [ 36.944068] kasan_save_track+0x20/0x40 [ 36.944726] kasan_save_alloc_info+0x40/0x58 [ 36.945302] __kasan_kmalloc+0xd4/0xd8 [ 36.945954] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.946484] kasan_atomics+0xb8/0x2e8 [ 36.947120] kunit_try_run_case+0x14c/0x3d0 [ 36.947814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.948508] kthread+0x24c/0x2d0 [ 36.949043] ret_from_fork+0x10/0x20 [ 36.949515] [ 36.949909] The buggy address belongs to the object at fff00000c5f10100 [ 36.949909] which belongs to the cache kmalloc-64 of size 64 [ 36.951342] The buggy address is located 0 bytes to the right of [ 36.951342] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.952742] [ 36.953124] The buggy address belongs to the physical page: [ 36.953682] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.954710] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.955392] page_type: f5(slab) [ 36.955982] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.956892] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.957791] page dumped because: kasan: bad access detected [ 36.958490] [ 36.958859] Memory state around the buggy address: [ 36.959377] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.960332] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.961033] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.961964] ^ [ 36.962682] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.963476] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.964241] ================================================================== [ 37.612323] ================================================================== [ 37.613168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 37.614011] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.614868] [ 37.615270] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.616400] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.617040] Hardware name: linux,dummy-virt (DT) [ 37.617644] Call trace: [ 37.618038] show_stack+0x20/0x38 (C) [ 37.618717] dump_stack_lvl+0x8c/0xd0 [ 37.619413] print_report+0x118/0x5e0 [ 37.620079] kasan_report+0xc8/0x118 [ 37.620766] kasan_check_range+0x100/0x1a8 [ 37.621382] __kasan_check_write+0x20/0x30 [ 37.622050] kasan_atomics_helper+0x147c/0x4858 [ 37.622722] kasan_atomics+0x198/0x2e8 [ 37.623310] kunit_try_run_case+0x14c/0x3d0 [ 37.623905] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.624756] kthread+0x24c/0x2d0 [ 37.625361] ret_from_fork+0x10/0x20 [ 37.625956] [ 37.626262] Allocated by task 254: [ 37.626850] kasan_save_stack+0x3c/0x68 [ 37.627493] kasan_save_track+0x20/0x40 [ 37.628150] kasan_save_alloc_info+0x40/0x58 [ 37.628797] __kasan_kmalloc+0xd4/0xd8 [ 37.629340] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.630751] kasan_atomics+0xb8/0x2e8 [ 37.631363] kunit_try_run_case+0x14c/0x3d0 [ 37.631946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.632715] kthread+0x24c/0x2d0 [ 37.633234] ret_from_fork+0x10/0x20 [ 37.633794] [ 37.634130] The buggy address belongs to the object at fff00000c5f10100 [ 37.634130] which belongs to the cache kmalloc-64 of size 64 [ 37.635352] The buggy address is located 0 bytes to the right of [ 37.635352] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.636645] [ 37.637031] The buggy address belongs to the physical page: [ 37.637710] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.638712] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.639589] page_type: f5(slab) [ 37.640169] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.641126] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.641854] page dumped because: kasan: bad access detected [ 37.642623] [ 37.642998] Memory state around the buggy address: [ 37.643567] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.644453] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.645159] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.646099] ^ [ 37.646770] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.647726] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.648445] ================================================================== [ 36.698151] ================================================================== [ 36.699229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 36.700002] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.701693] [ 36.702066] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.703296] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.703899] Hardware name: linux,dummy-virt (DT) [ 36.704670] Call trace: [ 36.705572] show_stack+0x20/0x38 (C) [ 36.706292] dump_stack_lvl+0x8c/0xd0 [ 36.706819] print_report+0x118/0x5e0 [ 36.707417] kasan_report+0xc8/0x118 [ 36.708026] kasan_check_range+0x100/0x1a8 [ 36.708676] __kasan_check_write+0x20/0x30 [ 36.709291] kasan_atomics_helper+0xc08/0x4858 [ 36.710032] kasan_atomics+0x198/0x2e8 [ 36.710650] kunit_try_run_case+0x14c/0x3d0 [ 36.711284] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.711954] kthread+0x24c/0x2d0 [ 36.712583] ret_from_fork+0x10/0x20 [ 36.713233] [ 36.713573] Allocated by task 254: [ 36.714134] kasan_save_stack+0x3c/0x68 [ 36.714728] kasan_save_track+0x20/0x40 [ 36.715358] kasan_save_alloc_info+0x40/0x58 [ 36.716062] __kasan_kmalloc+0xd4/0xd8 [ 36.716647] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.717424] kasan_atomics+0xb8/0x2e8 [ 36.718002] kunit_try_run_case+0x14c/0x3d0 [ 36.718735] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.719556] kthread+0x24c/0x2d0 [ 36.720139] ret_from_fork+0x10/0x20 [ 36.720748] [ 36.721060] The buggy address belongs to the object at fff00000c5f10100 [ 36.721060] which belongs to the cache kmalloc-64 of size 64 [ 36.722471] The buggy address is located 0 bytes to the right of [ 36.722471] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.723788] [ 36.724136] The buggy address belongs to the physical page: [ 36.724911] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.725897] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.726719] page_type: f5(slab) [ 36.727286] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.728222] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.729073] page dumped because: kasan: bad access detected [ 36.729844] [ 36.730187] Memory state around the buggy address: [ 36.730893] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.731700] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.732521] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.733343] ^ [ 36.734046] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.734852] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.735702] ================================================================== [ 36.495831] ================================================================== [ 36.496758] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 36.497493] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.498830] [ 36.499785] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.501077] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.501765] Hardware name: linux,dummy-virt (DT) [ 36.502309] Call trace: [ 36.502738] show_stack+0x20/0x38 (C) [ 36.503437] dump_stack_lvl+0x8c/0xd0 [ 36.504169] print_report+0x118/0x5e0 [ 36.504930] kasan_report+0xc8/0x118 [ 36.505624] kasan_check_range+0x100/0x1a8 [ 36.506287] __kasan_check_write+0x20/0x30 [ 36.507033] kasan_atomics_helper+0xad4/0x4858 [ 36.507752] kasan_atomics+0x198/0x2e8 [ 36.508341] kunit_try_run_case+0x14c/0x3d0 [ 36.509132] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.510159] kthread+0x24c/0x2d0 [ 36.510646] ret_from_fork+0x10/0x20 [ 36.511131] [ 36.511423] Allocated by task 254: [ 36.512558] kasan_save_stack+0x3c/0x68 [ 36.513196] kasan_save_track+0x20/0x40 [ 36.513867] kasan_save_alloc_info+0x40/0x58 [ 36.514561] __kasan_kmalloc+0xd4/0xd8 [ 36.515199] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.515914] kasan_atomics+0xb8/0x2e8 [ 36.516558] kunit_try_run_case+0x14c/0x3d0 [ 36.517229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.518027] kthread+0x24c/0x2d0 [ 36.518637] ret_from_fork+0x10/0x20 [ 36.519966] [ 36.520366] The buggy address belongs to the object at fff00000c5f10100 [ 36.520366] which belongs to the cache kmalloc-64 of size 64 [ 36.521354] The buggy address is located 0 bytes to the right of [ 36.521354] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.522869] [ 36.523248] The buggy address belongs to the physical page: [ 36.524038] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.524978] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.525752] page_type: f5(slab) [ 36.526320] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.527205] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.527933] page dumped because: kasan: bad access detected [ 36.528886] [ 36.529341] Memory state around the buggy address: [ 36.529867] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.530809] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.531625] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.532486] ^ [ 36.533109] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.533937] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.534706] ================================================================== [ 36.102465] ================================================================== [ 36.103278] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 36.104078] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.105092] [ 36.105497] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.106748] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.107416] Hardware name: linux,dummy-virt (DT) [ 36.107956] Call trace: [ 36.108488] show_stack+0x20/0x38 (C) [ 36.109233] dump_stack_lvl+0x8c/0xd0 [ 36.109957] print_report+0x118/0x5e0 [ 36.110661] kasan_report+0xc8/0x118 [ 36.111316] kasan_check_range+0x100/0x1a8 [ 36.112073] __kasan_check_write+0x20/0x30 [ 36.112718] kasan_atomics_helper+0x684/0x4858 [ 36.113542] kasan_atomics+0x198/0x2e8 [ 36.114135] kunit_try_run_case+0x14c/0x3d0 [ 36.114869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.115746] kthread+0x24c/0x2d0 [ 36.116320] ret_from_fork+0x10/0x20 [ 36.117026] [ 36.117405] Allocated by task 254: [ 36.117919] kasan_save_stack+0x3c/0x68 [ 36.118612] kasan_save_track+0x20/0x40 [ 36.119317] kasan_save_alloc_info+0x40/0x58 [ 36.119905] __kasan_kmalloc+0xd4/0xd8 [ 36.120592] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.121262] kasan_atomics+0xb8/0x2e8 [ 36.121941] kunit_try_run_case+0x14c/0x3d0 [ 36.122519] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.123352] kthread+0x24c/0x2d0 [ 36.123875] ret_from_fork+0x10/0x20 [ 36.124579] [ 36.124952] The buggy address belongs to the object at fff00000c5f10100 [ 36.124952] which belongs to the cache kmalloc-64 of size 64 [ 36.126061] The buggy address is located 0 bytes to the right of [ 36.126061] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.127378] [ 36.127805] The buggy address belongs to the physical page: [ 36.128514] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.129553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.130364] page_type: f5(slab) [ 36.130993] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.131920] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.132851] page dumped because: kasan: bad access detected [ 36.133572] [ 36.133921] Memory state around the buggy address: [ 36.134660] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.135556] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.136464] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.137310] ^ [ 36.137952] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.138866] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.139745] ================================================================== [ 36.737040] ================================================================== [ 36.738754] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 36.739463] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.740413] [ 36.740799] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.741914] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.742436] Hardware name: linux,dummy-virt (DT) [ 36.743001] Call trace: [ 36.743474] show_stack+0x20/0x38 (C) [ 36.744047] dump_stack_lvl+0x8c/0xd0 [ 36.744723] print_report+0x118/0x5e0 [ 36.745260] kasan_report+0xc8/0x118 [ 36.745905] __asan_report_load4_noabort+0x20/0x30 [ 36.746653] kasan_atomics_helper+0x3de4/0x4858 [ 36.747370] kasan_atomics+0x198/0x2e8 [ 36.748046] kunit_try_run_case+0x14c/0x3d0 [ 36.748651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.749487] kthread+0x24c/0x2d0 [ 36.749997] ret_from_fork+0x10/0x20 [ 36.750659] [ 36.751033] Allocated by task 254: [ 36.751548] kasan_save_stack+0x3c/0x68 [ 36.752149] kasan_save_track+0x20/0x40 [ 36.752677] kasan_save_alloc_info+0x40/0x58 [ 36.753372] __kasan_kmalloc+0xd4/0xd8 [ 36.753939] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.754663] kasan_atomics+0xb8/0x2e8 [ 36.755262] kunit_try_run_case+0x14c/0x3d0 [ 36.755836] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.756663] kthread+0x24c/0x2d0 [ 36.757121] ret_from_fork+0x10/0x20 [ 36.757760] [ 36.758139] The buggy address belongs to the object at fff00000c5f10100 [ 36.758139] which belongs to the cache kmalloc-64 of size 64 [ 36.759386] The buggy address is located 0 bytes to the right of [ 36.759386] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.760709] [ 36.761077] The buggy address belongs to the physical page: [ 36.761853] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.762706] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.763617] page_type: f5(slab) [ 36.764079] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.765109] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.765973] page dumped because: kasan: bad access detected [ 36.766692] [ 36.767056] Memory state around the buggy address: [ 36.767583] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.768518] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.769344] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.770184] ^ [ 36.770909] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.771719] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.772650] ================================================================== [ 37.194286] ================================================================== [ 37.195563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 37.196373] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.197061] [ 37.197477] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.198739] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.199245] Hardware name: linux,dummy-virt (DT) [ 37.199938] Call trace: [ 37.200423] show_stack+0x20/0x38 (C) [ 37.201031] dump_stack_lvl+0x8c/0xd0 [ 37.201714] print_report+0x118/0x5e0 [ 37.202248] kasan_report+0xc8/0x118 [ 37.202916] kasan_check_range+0x100/0x1a8 [ 37.203505] __kasan_check_write+0x20/0x30 [ 37.204218] kasan_atomics_helper+0xff0/0x4858 [ 37.204899] kasan_atomics+0x198/0x2e8 [ 37.205416] kunit_try_run_case+0x14c/0x3d0 [ 37.206131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.206964] kthread+0x24c/0x2d0 [ 37.207587] ret_from_fork+0x10/0x20 [ 37.208188] [ 37.208566] Allocated by task 254: [ 37.209072] kasan_save_stack+0x3c/0x68 [ 37.209724] kasan_save_track+0x20/0x40 [ 37.210242] kasan_save_alloc_info+0x40/0x58 [ 37.210938] __kasan_kmalloc+0xd4/0xd8 [ 37.211505] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.212096] kasan_atomics+0xb8/0x2e8 [ 37.212734] kunit_try_run_case+0x14c/0x3d0 [ 37.213351] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.214144] kthread+0x24c/0x2d0 [ 37.214739] ret_from_fork+0x10/0x20 [ 37.215322] [ 37.215659] The buggy address belongs to the object at fff00000c5f10100 [ 37.215659] which belongs to the cache kmalloc-64 of size 64 [ 37.216935] The buggy address is located 0 bytes to the right of [ 37.216935] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.218198] [ 37.218603] The buggy address belongs to the physical page: [ 37.219374] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.220277] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.221043] page_type: f5(slab) [ 37.221629] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.222360] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.223342] page dumped because: kasan: bad access detected [ 37.224062] [ 37.224457] Memory state around the buggy address: [ 37.225101] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.225953] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.226819] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.227621] ^ [ 37.228328] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.229190] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.230112] ================================================================== [ 37.422147] ================================================================== [ 37.422918] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 37.423668] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.424639] [ 37.425025] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.426237] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.426746] Hardware name: linux,dummy-virt (DT) [ 37.427423] Call trace: [ 37.427909] show_stack+0x20/0x38 (C) [ 37.428590] dump_stack_lvl+0x8c/0xd0 [ 37.429289] print_report+0x118/0x5e0 [ 37.429886] kasan_report+0xc8/0x118 [ 37.430458] kasan_check_range+0x100/0x1a8 [ 37.431170] __kasan_check_write+0x20/0x30 [ 37.431836] kasan_atomics_helper+0x126c/0x4858 [ 37.432400] kasan_atomics+0x198/0x2e8 [ 37.433087] kunit_try_run_case+0x14c/0x3d0 [ 37.433732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.434485] kthread+0x24c/0x2d0 [ 37.435120] ret_from_fork+0x10/0x20 [ 37.435653] [ 37.436026] Allocated by task 254: [ 37.436627] kasan_save_stack+0x3c/0x68 [ 37.437256] kasan_save_track+0x20/0x40 [ 37.437825] kasan_save_alloc_info+0x40/0x58 [ 37.438505] __kasan_kmalloc+0xd4/0xd8 [ 37.439161] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.439821] kasan_atomics+0xb8/0x2e8 [ 37.440361] kunit_try_run_case+0x14c/0x3d0 [ 37.441058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.441847] kthread+0x24c/0x2d0 [ 37.442419] ret_from_fork+0x10/0x20 [ 37.443037] [ 37.443382] The buggy address belongs to the object at fff00000c5f10100 [ 37.443382] which belongs to the cache kmalloc-64 of size 64 [ 37.444667] The buggy address is located 0 bytes to the right of [ 37.444667] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.446001] [ 37.446383] The buggy address belongs to the physical page: [ 37.447149] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.447986] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.448883] page_type: f5(slab) [ 37.449463] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.450385] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.451394] page dumped because: kasan: bad access detected [ 37.452062] [ 37.452517] Memory state around the buggy address: [ 37.453235] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.454124] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.455054] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.455943] ^ [ 37.456664] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.457396] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.458293] ================================================================== [ 36.023629] ================================================================== [ 36.024276] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 36.025496] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.027147] [ 36.027568] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.028708] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.029343] Hardware name: linux,dummy-virt (DT) [ 36.029983] Call trace: [ 36.030357] show_stack+0x20/0x38 (C) [ 36.031031] dump_stack_lvl+0x8c/0xd0 [ 36.031713] print_report+0x118/0x5e0 [ 36.032413] kasan_report+0xc8/0x118 [ 36.033011] kasan_check_range+0x100/0x1a8 [ 36.033717] __kasan_check_write+0x20/0x30 [ 36.034359] kasan_atomics_helper+0x5b4/0x4858 [ 36.035046] kasan_atomics+0x198/0x2e8 [ 36.035605] kunit_try_run_case+0x14c/0x3d0 [ 36.036321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.037099] kthread+0x24c/0x2d0 [ 36.037719] ret_from_fork+0x10/0x20 [ 36.038338] [ 36.038700] Allocated by task 254: [ 36.039234] kasan_save_stack+0x3c/0x68 [ 36.039890] kasan_save_track+0x20/0x40 [ 36.040455] kasan_save_alloc_info+0x40/0x58 [ 36.041151] __kasan_kmalloc+0xd4/0xd8 [ 36.041695] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.042387] kasan_atomics+0xb8/0x2e8 [ 36.043021] kunit_try_run_case+0x14c/0x3d0 [ 36.043708] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.044376] kthread+0x24c/0x2d0 [ 36.044974] ret_from_fork+0x10/0x20 [ 36.045548] [ 36.045920] The buggy address belongs to the object at fff00000c5f10100 [ 36.045920] which belongs to the cache kmalloc-64 of size 64 [ 36.047238] The buggy address is located 0 bytes to the right of [ 36.047238] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.048502] [ 36.048908] The buggy address belongs to the physical page: [ 36.049723] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.050615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.051382] page_type: f5(slab) [ 36.051891] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.052840] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.053680] page dumped because: kasan: bad access detected [ 36.054431] [ 36.054793] Memory state around the buggy address: [ 36.055422] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.056274] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.057113] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.057905] ^ [ 36.058588] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.059406] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.060213] ================================================================== [ 37.536827] ================================================================== [ 37.537641] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 37.538488] Read of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.540204] [ 37.540624] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.541505] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.542147] Hardware name: linux,dummy-virt (DT) [ 37.542834] Call trace: [ 37.543310] show_stack+0x20/0x38 (C) [ 37.543900] dump_stack_lvl+0x8c/0xd0 [ 37.544584] print_report+0x118/0x5e0 [ 37.545144] kasan_report+0xc8/0x118 [ 37.545712] __asan_report_load8_noabort+0x20/0x30 [ 37.546454] kasan_atomics_helper+0x3f04/0x4858 [ 37.547041] kasan_atomics+0x198/0x2e8 [ 37.547710] kunit_try_run_case+0x14c/0x3d0 [ 37.548349] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.549029] kthread+0x24c/0x2d0 [ 37.549655] ret_from_fork+0x10/0x20 [ 37.550250] [ 37.550634] Allocated by task 254: [ 37.551208] kasan_save_stack+0x3c/0x68 [ 37.551724] kasan_save_track+0x20/0x40 [ 37.552380] kasan_save_alloc_info+0x40/0x58 [ 37.552987] __kasan_kmalloc+0xd4/0xd8 [ 37.553638] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.554284] kasan_atomics+0xb8/0x2e8 [ 37.554875] kunit_try_run_case+0x14c/0x3d0 [ 37.555565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.556201] kthread+0x24c/0x2d0 [ 37.556823] ret_from_fork+0x10/0x20 [ 37.557395] [ 37.557795] The buggy address belongs to the object at fff00000c5f10100 [ 37.557795] which belongs to the cache kmalloc-64 of size 64 [ 37.558988] The buggy address is located 0 bytes to the right of [ 37.558988] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.560456] [ 37.560856] The buggy address belongs to the physical page: [ 37.561520] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.562488] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.563397] page_type: f5(slab) [ 37.563976] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.564756] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.565751] page dumped because: kasan: bad access detected [ 37.566514] [ 37.566914] Memory state around the buggy address: [ 37.567521] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.568369] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.569263] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.570091] ^ [ 37.570720] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.571668] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.572331] ================================================================== [ 37.498718] ================================================================== [ 37.500316] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 37.501133] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.502079] [ 37.502496] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.503669] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.504299] Hardware name: linux,dummy-virt (DT) [ 37.504921] Call trace: [ 37.505381] show_stack+0x20/0x38 (C) [ 37.505959] dump_stack_lvl+0x8c/0xd0 [ 37.506517] print_report+0x118/0x5e0 [ 37.507188] kasan_report+0xc8/0x118 [ 37.507841] kasan_check_range+0x100/0x1a8 [ 37.508576] __kasan_check_write+0x20/0x30 [ 37.509296] kasan_atomics_helper+0x1384/0x4858 [ 37.509913] kasan_atomics+0x198/0x2e8 [ 37.510582] kunit_try_run_case+0x14c/0x3d0 [ 37.511189] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.511974] kthread+0x24c/0x2d0 [ 37.512610] ret_from_fork+0x10/0x20 [ 37.513231] [ 37.513573] Allocated by task 254: [ 37.514138] kasan_save_stack+0x3c/0x68 [ 37.514786] kasan_save_track+0x20/0x40 [ 37.515401] kasan_save_alloc_info+0x40/0x58 [ 37.515966] __kasan_kmalloc+0xd4/0xd8 [ 37.516620] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.517316] kasan_atomics+0xb8/0x2e8 [ 37.517827] kunit_try_run_case+0x14c/0x3d0 [ 37.518472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.519313] kthread+0x24c/0x2d0 [ 37.519847] ret_from_fork+0x10/0x20 [ 37.520470] [ 37.520864] The buggy address belongs to the object at fff00000c5f10100 [ 37.520864] which belongs to the cache kmalloc-64 of size 64 [ 37.522042] The buggy address is located 0 bytes to the right of [ 37.522042] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.523370] [ 37.523766] The buggy address belongs to the physical page: [ 37.524549] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.525399] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.526210] page_type: f5(slab) [ 37.526700] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.527676] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.528615] page dumped because: kasan: bad access detected [ 37.529339] [ 37.529729] Memory state around the buggy address: [ 37.530297] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.531184] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.532036] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.532851] ^ [ 37.533441] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.534291] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.535134] ================================================================== [ 36.536926] ================================================================== [ 36.537797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 36.538955] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.539871] [ 36.540289] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.541564] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.542067] Hardware name: linux,dummy-virt (DT) [ 36.543425] Call trace: [ 36.543814] show_stack+0x20/0x38 (C) [ 36.544385] dump_stack_lvl+0x8c/0xd0 [ 36.544964] print_report+0x118/0x5e0 [ 36.545620] kasan_report+0xc8/0x118 [ 36.546134] __asan_report_load4_noabort+0x20/0x30 [ 36.546895] kasan_atomics_helper+0x3dcc/0x4858 [ 36.547508] kasan_atomics+0x198/0x2e8 [ 36.548138] kunit_try_run_case+0x14c/0x3d0 [ 36.548782] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.549559] kthread+0x24c/0x2d0 [ 36.550066] ret_from_fork+0x10/0x20 [ 36.550682] [ 36.551059] Allocated by task 254: [ 36.551570] kasan_save_stack+0x3c/0x68 [ 36.552218] kasan_save_track+0x20/0x40 [ 36.552798] kasan_save_alloc_info+0x40/0x58 [ 36.553488] __kasan_kmalloc+0xd4/0xd8 [ 36.554082] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.554801] kasan_atomics+0xb8/0x2e8 [ 36.555351] kunit_try_run_case+0x14c/0x3d0 [ 36.555915] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.556731] kthread+0x24c/0x2d0 [ 36.557317] ret_from_fork+0x10/0x20 [ 36.557954] [ 36.558333] The buggy address belongs to the object at fff00000c5f10100 [ 36.558333] which belongs to the cache kmalloc-64 of size 64 [ 36.559580] The buggy address is located 0 bytes to the right of [ 36.559580] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.560983] [ 36.561361] The buggy address belongs to the physical page: [ 36.562042] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.562919] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.563720] page_type: f5(slab) [ 36.564301] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.565127] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.565971] page dumped because: kasan: bad access detected [ 36.566736] [ 36.567113] Memory state around the buggy address: [ 36.567788] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.568614] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.569458] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.570287] ^ [ 36.570896] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.571755] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.572544] ================================================================== [ 37.999006] ================================================================== [ 38.000360] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 38.001021] Read of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 38.002129] [ 38.002511] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 38.003577] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.004036] Hardware name: linux,dummy-virt (DT) [ 38.004733] Call trace: [ 38.005199] show_stack+0x20/0x38 (C) [ 38.005859] dump_stack_lvl+0x8c/0xd0 [ 38.006542] print_report+0x118/0x5e0 [ 38.007186] kasan_report+0xc8/0x118 [ 38.007838] __asan_report_load8_noabort+0x20/0x30 [ 38.008507] kasan_atomics_helper+0x3e20/0x4858 [ 38.009148] kasan_atomics+0x198/0x2e8 [ 38.009671] kunit_try_run_case+0x14c/0x3d0 [ 38.010371] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.011195] kthread+0x24c/0x2d0 [ 38.011821] ret_from_fork+0x10/0x20 [ 38.012471] [ 38.012872] Allocated by task 254: [ 38.013413] kasan_save_stack+0x3c/0x68 [ 38.014082] kasan_save_track+0x20/0x40 [ 38.014731] kasan_save_alloc_info+0x40/0x58 [ 38.015278] __kasan_kmalloc+0xd4/0xd8 [ 38.015929] __kmalloc_cache_noprof+0x15c/0x3c8 [ 38.016671] kasan_atomics+0xb8/0x2e8 [ 38.017233] kunit_try_run_case+0x14c/0x3d0 [ 38.017833] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.018641] kthread+0x24c/0x2d0 [ 38.019143] ret_from_fork+0x10/0x20 [ 38.019645] [ 38.020013] The buggy address belongs to the object at fff00000c5f10100 [ 38.020013] which belongs to the cache kmalloc-64 of size 64 [ 38.021448] The buggy address is located 0 bytes to the right of [ 38.021448] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 38.022808] [ 38.023188] The buggy address belongs to the physical page: [ 38.023884] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 38.024937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.025758] page_type: f5(slab) [ 38.026264] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.027265] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 38.028063] page dumped because: kasan: bad access detected [ 38.028797] [ 38.029150] Memory state around the buggy address: [ 38.030158] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 38.031218] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 38.031960] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.032846] ^ [ 38.033554] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.034314] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.035163] ================================================================== [ 36.262120] ================================================================== [ 36.263367] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 36.264359] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.265000] [ 36.265903] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.267067] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.267751] Hardware name: linux,dummy-virt (DT) [ 36.268418] Call trace: [ 36.268942] show_stack+0x20/0x38 (C) [ 36.269622] dump_stack_lvl+0x8c/0xd0 [ 36.270323] print_report+0x118/0x5e0 [ 36.270954] kasan_report+0xc8/0x118 [ 36.271617] kasan_check_range+0x100/0x1a8 [ 36.272215] __kasan_check_write+0x20/0x30 [ 36.272976] kasan_atomics_helper+0x894/0x4858 [ 36.273626] kasan_atomics+0x198/0x2e8 [ 36.274314] kunit_try_run_case+0x14c/0x3d0 [ 36.275016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.275753] kthread+0x24c/0x2d0 [ 36.276364] ret_from_fork+0x10/0x20 [ 36.276988] [ 36.277412] Allocated by task 254: [ 36.277955] kasan_save_stack+0x3c/0x68 [ 36.278611] kasan_save_track+0x20/0x40 [ 36.279179] kasan_save_alloc_info+0x40/0x58 [ 36.279911] __kasan_kmalloc+0xd4/0xd8 [ 36.280506] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.281260] kasan_atomics+0xb8/0x2e8 [ 36.281861] kunit_try_run_case+0x14c/0x3d0 [ 36.282546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.283227] kthread+0x24c/0x2d0 [ 36.283851] ret_from_fork+0x10/0x20 [ 36.284544] [ 36.285008] The buggy address belongs to the object at fff00000c5f10100 [ 36.285008] which belongs to the cache kmalloc-64 of size 64 [ 36.286342] The buggy address is located 0 bytes to the right of [ 36.286342] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.287862] [ 36.288357] The buggy address belongs to the physical page: [ 36.289149] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.290385] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.290979] page_type: f5(slab) [ 36.291237] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.291739] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.292721] page dumped because: kasan: bad access detected [ 36.293413] [ 36.293813] Memory state around the buggy address: [ 36.294396] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.295252] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.296206] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.296960] ^ [ 36.297684] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.298516] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.299467] ================================================================== [ 37.804729] ================================================================== [ 37.805561] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 37.806753] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.808244] [ 37.808690] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.810303] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.810844] Hardware name: linux,dummy-virt (DT) [ 37.811450] Call trace: [ 37.811967] show_stack+0x20/0x38 (C) [ 37.812621] dump_stack_lvl+0x8c/0xd0 [ 37.813323] print_report+0x118/0x5e0 [ 37.813958] kasan_report+0xc8/0x118 [ 37.814600] kasan_check_range+0x100/0x1a8 [ 37.815323] __kasan_check_write+0x20/0x30 [ 37.815978] kasan_atomics_helper+0x1644/0x4858 [ 37.816767] kasan_atomics+0x198/0x2e8 [ 37.817369] kunit_try_run_case+0x14c/0x3d0 [ 37.818135] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.818936] kthread+0x24c/0x2d0 [ 37.819478] ret_from_fork+0x10/0x20 [ 37.820158] [ 37.820561] Allocated by task 254: [ 37.821117] kasan_save_stack+0x3c/0x68 [ 37.821716] kasan_save_track+0x20/0x40 [ 37.822199] kasan_save_alloc_info+0x40/0x58 [ 37.822880] __kasan_kmalloc+0xd4/0xd8 [ 37.823505] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.824169] kasan_atomics+0xb8/0x2e8 [ 37.824716] kunit_try_run_case+0x14c/0x3d0 [ 37.825390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.826196] kthread+0x24c/0x2d0 [ 37.826779] ret_from_fork+0x10/0x20 [ 37.827256] [ 37.827654] The buggy address belongs to the object at fff00000c5f10100 [ 37.827654] which belongs to the cache kmalloc-64 of size 64 [ 37.828930] The buggy address is located 0 bytes to the right of [ 37.828930] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.830441] [ 37.830795] The buggy address belongs to the physical page: [ 37.831466] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.832506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.833268] page_type: f5(slab) [ 37.833856] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.834636] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.835508] page dumped because: kasan: bad access detected [ 37.836295] [ 37.836682] Memory state around the buggy address: [ 37.837383] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.838260] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.839090] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.839969] ^ [ 37.840704] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.841439] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.842264] ================================================================== [ 36.377250] ================================================================== [ 36.378078] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 36.378894] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.379915] [ 36.380324] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.381260] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.381913] Hardware name: linux,dummy-virt (DT) [ 36.382619] Call trace: [ 36.383085] show_stack+0x20/0x38 (C) [ 36.383626] dump_stack_lvl+0x8c/0xd0 [ 36.384326] print_report+0x118/0x5e0 [ 36.384960] kasan_report+0xc8/0x118 [ 36.385657] kasan_check_range+0x100/0x1a8 [ 36.386258] __kasan_check_write+0x20/0x30 [ 36.386988] kasan_atomics_helper+0x99c/0x4858 [ 36.388111] kasan_atomics+0x198/0x2e8 [ 36.388798] kunit_try_run_case+0x14c/0x3d0 [ 36.389559] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.390270] kthread+0x24c/0x2d0 [ 36.390872] ret_from_fork+0x10/0x20 [ 36.391542] [ 36.391911] Allocated by task 254: [ 36.392440] kasan_save_stack+0x3c/0x68 [ 36.392989] kasan_save_track+0x20/0x40 [ 36.393621] kasan_save_alloc_info+0x40/0x58 [ 36.394298] __kasan_kmalloc+0xd4/0xd8 [ 36.394955] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.395625] kasan_atomics+0xb8/0x2e8 [ 36.396170] kunit_try_run_case+0x14c/0x3d0 [ 36.396735] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.397546] kthread+0x24c/0x2d0 [ 36.398132] ret_from_fork+0x10/0x20 [ 36.398744] [ 36.399153] The buggy address belongs to the object at fff00000c5f10100 [ 36.399153] which belongs to the cache kmalloc-64 of size 64 [ 36.400376] The buggy address is located 0 bytes to the right of [ 36.400376] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.401628] [ 36.402004] The buggy address belongs to the physical page: [ 36.402773] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.403663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.404470] page_type: f5(slab) [ 36.405438] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.406472] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.407246] page dumped because: kasan: bad access detected [ 36.408010] [ 36.408340] Memory state around the buggy address: [ 36.409037] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.409838] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.410704] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.411508] ^ [ 36.412242] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.413114] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.414049] ================================================================== [ 37.155991] ================================================================== [ 37.156900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 37.157706] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.159230] [ 37.159603] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.160812] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.161306] Hardware name: linux,dummy-virt (DT) [ 37.161997] Call trace: [ 37.162374] show_stack+0x20/0x38 (C) [ 37.163045] dump_stack_lvl+0x8c/0xd0 [ 37.163637] print_report+0x118/0x5e0 [ 37.164278] kasan_report+0xc8/0x118 [ 37.164933] kasan_check_range+0x100/0x1a8 [ 37.165576] __kasan_check_write+0x20/0x30 [ 37.166268] kasan_atomics_helper+0xf88/0x4858 [ 37.166963] kasan_atomics+0x198/0x2e8 [ 37.167463] kunit_try_run_case+0x14c/0x3d0 [ 37.168208] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.168910] kthread+0x24c/0x2d0 [ 37.169516] ret_from_fork+0x10/0x20 [ 37.170113] [ 37.170421] Allocated by task 254: [ 37.170994] kasan_save_stack+0x3c/0x68 [ 37.171645] kasan_save_track+0x20/0x40 [ 37.172283] kasan_save_alloc_info+0x40/0x58 [ 37.172874] __kasan_kmalloc+0xd4/0xd8 [ 37.173502] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.174159] kasan_atomics+0xb8/0x2e8 [ 37.174793] kunit_try_run_case+0x14c/0x3d0 [ 37.175438] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.176099] kthread+0x24c/0x2d0 [ 37.176718] ret_from_fork+0x10/0x20 [ 37.177224] [ 37.177623] The buggy address belongs to the object at fff00000c5f10100 [ 37.177623] which belongs to the cache kmalloc-64 of size 64 [ 37.178835] The buggy address is located 0 bytes to the right of [ 37.178835] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.180142] [ 37.180558] The buggy address belongs to the physical page: [ 37.181114] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.182148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.183216] page_type: f5(slab) [ 37.183832] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.184775] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.185702] page dumped because: kasan: bad access detected [ 37.186437] [ 37.186735] Memory state around the buggy address: [ 37.187421] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.188202] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.189096] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.189929] ^ [ 37.190511] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.191470] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.192315] ================================================================== [ 36.889376] ================================================================== [ 36.890056] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 36.891942] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.893667] [ 36.894085] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.895201] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.895848] Hardware name: linux,dummy-virt (DT) [ 36.896589] Call trace: [ 36.896997] show_stack+0x20/0x38 (C) [ 36.897702] dump_stack_lvl+0x8c/0xd0 [ 36.898332] print_report+0x118/0x5e0 [ 36.898940] kasan_report+0xc8/0x118 [ 36.899632] __asan_report_load4_noabort+0x20/0x30 [ 36.900382] kasan_atomics_helper+0x3e04/0x4858 [ 36.901106] kasan_atomics+0x198/0x2e8 [ 36.901752] kunit_try_run_case+0x14c/0x3d0 [ 36.902489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.903572] kthread+0x24c/0x2d0 [ 36.904141] ret_from_fork+0x10/0x20 [ 36.905021] [ 36.905356] Allocated by task 254: [ 36.906209] kasan_save_stack+0x3c/0x68 [ 36.906821] kasan_save_track+0x20/0x40 [ 36.907276] kasan_save_alloc_info+0x40/0x58 [ 36.907981] __kasan_kmalloc+0xd4/0xd8 [ 36.908576] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.909238] kasan_atomics+0xb8/0x2e8 [ 36.909890] kunit_try_run_case+0x14c/0x3d0 [ 36.910569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.911258] kthread+0x24c/0x2d0 [ 36.911858] ret_from_fork+0x10/0x20 [ 36.912394] [ 36.912793] The buggy address belongs to the object at fff00000c5f10100 [ 36.912793] which belongs to the cache kmalloc-64 of size 64 [ 36.913967] The buggy address is located 0 bytes to the right of [ 36.913967] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.915432] [ 36.915803] The buggy address belongs to the physical page: [ 36.916572] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.917606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.918474] page_type: f5(slab) [ 36.919076] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.919946] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.920925] page dumped because: kasan: bad access detected [ 36.921515] [ 36.921915] Memory state around the buggy address: [ 36.922572] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.923357] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.924237] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.925048] ^ [ 36.925765] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.926544] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.927360] ================================================================== [ 37.118030] ================================================================== [ 37.119353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 37.120570] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.121602] [ 37.121932] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.123211] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.123697] Hardware name: linux,dummy-virt (DT) [ 37.124374] Call trace: [ 37.124797] show_stack+0x20/0x38 (C) [ 37.125439] dump_stack_lvl+0x8c/0xd0 [ 37.126109] print_report+0x118/0x5e0 [ 37.126727] kasan_report+0xc8/0x118 [ 37.127367] kasan_check_range+0x100/0x1a8 [ 37.128014] __kasan_check_write+0x20/0x30 [ 37.128738] kasan_atomics_helper+0xf20/0x4858 [ 37.129377] kasan_atomics+0x198/0x2e8 [ 37.130049] kunit_try_run_case+0x14c/0x3d0 [ 37.130673] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.131471] kthread+0x24c/0x2d0 [ 37.132099] ret_from_fork+0x10/0x20 [ 37.132737] [ 37.133051] Allocated by task 254: [ 37.133584] kasan_save_stack+0x3c/0x68 [ 37.134151] kasan_save_track+0x20/0x40 [ 37.134724] kasan_save_alloc_info+0x40/0x58 [ 37.135233] __kasan_kmalloc+0xd4/0xd8 [ 37.135882] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.136600] kasan_atomics+0xb8/0x2e8 [ 37.137208] kunit_try_run_case+0x14c/0x3d0 [ 37.137802] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.138610] kthread+0x24c/0x2d0 [ 37.139178] ret_from_fork+0x10/0x20 [ 37.139768] [ 37.140135] The buggy address belongs to the object at fff00000c5f10100 [ 37.140135] which belongs to the cache kmalloc-64 of size 64 [ 37.141339] The buggy address is located 0 bytes to the right of [ 37.141339] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.142653] [ 37.143042] The buggy address belongs to the physical page: [ 37.143707] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.144668] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.145450] page_type: f5(slab) [ 37.145940] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.146953] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.147817] page dumped because: kasan: bad access detected [ 37.148603] [ 37.148924] Memory state around the buggy address: [ 37.149614] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.150629] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.151563] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.152347] ^ [ 37.153065] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.153896] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.154699] ================================================================== [ 37.270405] ================================================================== [ 37.271278] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 37.272556] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.273262] [ 37.273710] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.274962] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.275513] Hardware name: linux,dummy-virt (DT) [ 37.276203] Call trace: [ 37.276671] show_stack+0x20/0x38 (C) [ 37.277200] dump_stack_lvl+0x8c/0xd0 [ 37.277878] print_report+0x118/0x5e0 [ 37.278543] kasan_report+0xc8/0x118 [ 37.279228] kasan_check_range+0x100/0x1a8 [ 37.279814] __kasan_check_write+0x20/0x30 [ 37.280478] kasan_atomics_helper+0x10c0/0x4858 [ 37.281229] kasan_atomics+0x198/0x2e8 [ 37.281914] kunit_try_run_case+0x14c/0x3d0 [ 37.282621] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.283294] kthread+0x24c/0x2d0 [ 37.283912] ret_from_fork+0x10/0x20 [ 37.284466] [ 37.284866] Allocated by task 254: [ 37.285439] kasan_save_stack+0x3c/0x68 [ 37.286084] kasan_save_track+0x20/0x40 [ 37.286608] kasan_save_alloc_info+0x40/0x58 [ 37.287269] __kasan_kmalloc+0xd4/0xd8 [ 37.287909] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.288512] kasan_atomics+0xb8/0x2e8 [ 37.289180] kunit_try_run_case+0x14c/0x3d0 [ 37.289859] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.290490] kthread+0x24c/0x2d0 [ 37.291090] ret_from_fork+0x10/0x20 [ 37.291711] [ 37.292086] The buggy address belongs to the object at fff00000c5f10100 [ 37.292086] which belongs to the cache kmalloc-64 of size 64 [ 37.293320] The buggy address is located 0 bytes to the right of [ 37.293320] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.294590] [ 37.294974] The buggy address belongs to the physical page: [ 37.295747] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.296637] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.297394] page_type: f5(slab) [ 37.297989] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.298824] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.299730] page dumped because: kasan: bad access detected [ 37.300400] [ 37.300792] Memory state around the buggy address: [ 37.301375] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.302264] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.303207] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.304081] ^ [ 37.304768] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.305635] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.306494] ================================================================== [ 37.346383] ================================================================== [ 37.347100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 37.347958] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.348910] [ 37.349333] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.350315] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.351615] Hardware name: linux,dummy-virt (DT) [ 37.352306] Call trace: [ 37.352723] show_stack+0x20/0x38 (C) [ 37.353381] dump_stack_lvl+0x8c/0xd0 [ 37.353951] print_report+0x118/0x5e0 [ 37.354621] kasan_report+0xc8/0x118 [ 37.355273] kasan_check_range+0x100/0x1a8 [ 37.355904] __kasan_check_write+0x20/0x30 [ 37.356548] kasan_atomics_helper+0x1190/0x4858 [ 37.357278] kasan_atomics+0x198/0x2e8 [ 37.358218] kunit_try_run_case+0x14c/0x3d0 [ 37.358876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.359820] kthread+0x24c/0x2d0 [ 37.360318] ret_from_fork+0x10/0x20 [ 37.360901] [ 37.361274] Allocated by task 254: [ 37.361793] kasan_save_stack+0x3c/0x68 [ 37.362351] kasan_save_track+0x20/0x40 [ 37.363003] kasan_save_alloc_info+0x40/0x58 [ 37.363627] __kasan_kmalloc+0xd4/0xd8 [ 37.364134] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.364858] kasan_atomics+0xb8/0x2e8 [ 37.365441] kunit_try_run_case+0x14c/0x3d0 [ 37.365989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.366796] kthread+0x24c/0x2d0 [ 37.367337] ret_from_fork+0x10/0x20 [ 37.367952] [ 37.368336] The buggy address belongs to the object at fff00000c5f10100 [ 37.368336] which belongs to the cache kmalloc-64 of size 64 [ 37.369595] The buggy address is located 0 bytes to the right of [ 37.369595] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.370876] [ 37.371199] The buggy address belongs to the physical page: [ 37.371969] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.372906] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.373803] page_type: f5(slab) [ 37.374369] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.375272] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.376190] page dumped because: kasan: bad access detected [ 37.376951] [ 37.377327] Memory state around the buggy address: [ 37.377988] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.378780] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.379688] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.380581] ^ [ 37.381277] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.382052] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.383000] ================================================================== [ 35.943178] ================================================================== [ 35.943960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 35.944946] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 35.947571] [ 35.947909] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.949239] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.949949] Hardware name: linux,dummy-virt (DT) [ 35.950639] Call trace: [ 35.951126] show_stack+0x20/0x38 (C) [ 35.951879] dump_stack_lvl+0x8c/0xd0 [ 35.952905] print_report+0x118/0x5e0 [ 35.953596] kasan_report+0xc8/0x118 [ 35.954448] kasan_check_range+0x100/0x1a8 [ 35.955107] __kasan_check_write+0x20/0x30 [ 35.955961] kasan_atomics_helper+0x4e4/0x4858 [ 35.956622] kasan_atomics+0x198/0x2e8 [ 35.957160] kunit_try_run_case+0x14c/0x3d0 [ 35.957828] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.958793] kthread+0x24c/0x2d0 [ 35.959429] ret_from_fork+0x10/0x20 [ 35.960108] [ 35.960439] Allocated by task 254: [ 35.961023] kasan_save_stack+0x3c/0x68 [ 35.961885] kasan_save_track+0x20/0x40 [ 35.962549] kasan_save_alloc_info+0x40/0x58 [ 35.963200] __kasan_kmalloc+0xd4/0xd8 [ 35.963764] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.964410] kasan_atomics+0xb8/0x2e8 [ 35.965038] kunit_try_run_case+0x14c/0x3d0 [ 35.965883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.966647] kthread+0x24c/0x2d0 [ 35.967230] ret_from_fork+0x10/0x20 [ 35.968464] [ 35.968993] The buggy address belongs to the object at fff00000c5f10100 [ 35.968993] which belongs to the cache kmalloc-64 of size 64 [ 35.970711] The buggy address is located 0 bytes to the right of [ 35.970711] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 35.972153] [ 35.972574] The buggy address belongs to the physical page: [ 35.973359] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 35.974440] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.975444] page_type: f5(slab) [ 35.975969] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.976788] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.977680] page dumped because: kasan: bad access detected [ 35.978598] [ 35.978945] Memory state around the buggy address: [ 35.979610] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.980425] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.981152] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.982097] ^ [ 35.982735] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.983571] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.984370] ================================================================== [ 35.484035] ================================================================== [ 35.485410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 35.486564] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 35.487343] [ 35.487766] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.488781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.489408] Hardware name: linux,dummy-virt (DT) [ 35.490337] Call trace: [ 35.490783] show_stack+0x20/0x38 (C) [ 35.491437] dump_stack_lvl+0x8c/0xd0 [ 35.492116] print_report+0x118/0x5e0 [ 35.492730] kasan_report+0xc8/0x118 [ 35.493345] __asan_report_load4_noabort+0x20/0x30 [ 35.494663] kasan_atomics_helper+0x40a8/0x4858 [ 35.495312] kasan_atomics+0x198/0x2e8 [ 35.495910] kunit_try_run_case+0x14c/0x3d0 [ 35.496567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.497271] kthread+0x24c/0x2d0 [ 35.498224] ret_from_fork+0x10/0x20 [ 35.498909] [ 35.499286] Allocated by task 254: [ 35.499753] kasan_save_stack+0x3c/0x68 [ 35.500399] kasan_save_track+0x20/0x40 [ 35.500978] kasan_save_alloc_info+0x40/0x58 [ 35.502016] __kasan_kmalloc+0xd4/0xd8 [ 35.502542] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.503236] kasan_atomics+0xb8/0x2e8 [ 35.503880] kunit_try_run_case+0x14c/0x3d0 [ 35.504476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.505127] kthread+0x24c/0x2d0 [ 35.505940] ret_from_fork+0x10/0x20 [ 35.506576] [ 35.506944] The buggy address belongs to the object at fff00000c5f10100 [ 35.506944] which belongs to the cache kmalloc-64 of size 64 [ 35.508652] The buggy address is located 0 bytes to the right of [ 35.508652] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 35.510586] [ 35.511139] The buggy address belongs to the physical page: [ 35.511970] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 35.513042] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.513984] page_type: f5(slab) [ 35.514765] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.515713] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.516494] page dumped because: kasan: bad access detected [ 35.517268] [ 35.517641] Memory state around the buggy address: [ 35.518162] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.519100] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.519866] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.520832] ^ [ 35.521545] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.522796] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.523584] ================================================================== [ 36.811448] ================================================================== [ 36.812293] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 36.813169] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.814150] [ 36.814612] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.815591] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.816279] Hardware name: linux,dummy-virt (DT) [ 36.817005] Call trace: [ 36.817480] show_stack+0x20/0x38 (C) [ 36.818152] dump_stack_lvl+0x8c/0xd0 [ 36.818744] print_report+0x118/0x5e0 [ 36.819457] kasan_report+0xc8/0x118 [ 36.820011] __asan_report_load4_noabort+0x20/0x30 [ 36.820829] kasan_atomics_helper+0x3dd8/0x4858 [ 36.821508] kasan_atomics+0x198/0x2e8 [ 36.822176] kunit_try_run_case+0x14c/0x3d0 [ 36.822918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.823622] kthread+0x24c/0x2d0 [ 36.824277] ret_from_fork+0x10/0x20 [ 36.824912] [ 36.825330] Allocated by task 254: [ 36.825917] kasan_save_stack+0x3c/0x68 [ 36.826555] kasan_save_track+0x20/0x40 [ 36.827235] kasan_save_alloc_info+0x40/0x58 [ 36.827934] __kasan_kmalloc+0xd4/0xd8 [ 36.828488] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.829302] kasan_atomics+0xb8/0x2e8 [ 36.829976] kunit_try_run_case+0x14c/0x3d0 [ 36.830751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.831414] kthread+0x24c/0x2d0 [ 36.832051] ret_from_fork+0x10/0x20 [ 36.832706] [ 36.833025] The buggy address belongs to the object at fff00000c5f10100 [ 36.833025] which belongs to the cache kmalloc-64 of size 64 [ 36.834374] The buggy address is located 0 bytes to the right of [ 36.834374] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.835765] [ 36.836158] The buggy address belongs to the physical page: [ 36.836880] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.837882] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.838860] page_type: f5(slab) [ 36.839407] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.840422] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.841370] page dumped because: kasan: bad access detected [ 36.842202] [ 36.842615] Memory state around the buggy address: [ 36.843371] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.844327] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.845249] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.846177] ^ [ 36.846908] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.847833] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.848690] ================================================================== [ 35.525495] ================================================================== [ 35.527080] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 35.528326] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 35.529458] [ 35.529897] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.530970] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.531701] Hardware name: linux,dummy-virt (DT) [ 35.532365] Call trace: [ 35.532923] show_stack+0x20/0x38 (C) [ 35.533991] dump_stack_lvl+0x8c/0xd0 [ 35.534641] print_report+0x118/0x5e0 [ 35.535306] kasan_report+0xc8/0x118 [ 35.535973] __asan_report_store4_noabort+0x20/0x30 [ 35.536772] kasan_atomics_helper+0x3f7c/0x4858 [ 35.537501] kasan_atomics+0x198/0x2e8 [ 35.538440] kunit_try_run_case+0x14c/0x3d0 [ 35.539140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.539895] kthread+0x24c/0x2d0 [ 35.540572] ret_from_fork+0x10/0x20 [ 35.541178] [ 35.541511] Allocated by task 254: [ 35.542044] kasan_save_stack+0x3c/0x68 [ 35.542942] kasan_save_track+0x20/0x40 [ 35.543550] kasan_save_alloc_info+0x40/0x58 [ 35.544187] __kasan_kmalloc+0xd4/0xd8 [ 35.544891] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.546608] kasan_atomics+0xb8/0x2e8 [ 35.547114] kunit_try_run_case+0x14c/0x3d0 [ 35.547871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.548716] kthread+0x24c/0x2d0 [ 35.549309] ret_from_fork+0x10/0x20 [ 35.550199] [ 35.550503] The buggy address belongs to the object at fff00000c5f10100 [ 35.550503] which belongs to the cache kmalloc-64 of size 64 [ 35.551668] The buggy address is located 0 bytes to the right of [ 35.551668] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 35.553100] [ 35.553544] The buggy address belongs to the physical page: [ 35.554580] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 35.555417] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.556342] page_type: f5(slab) [ 35.556818] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.557975] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.559016] page dumped because: kasan: bad access detected [ 35.559720] [ 35.560084] Memory state around the buggy address: [ 35.560859] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.561906] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.562904] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.563766] ^ [ 35.564438] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.565338] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.566588] ================================================================== [ 36.221519] ================================================================== [ 36.222440] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 36.223663] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.224461] [ 36.224956] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.226301] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.226982] Hardware name: linux,dummy-virt (DT) [ 36.227519] Call trace: [ 36.228008] show_stack+0x20/0x38 (C) [ 36.228771] dump_stack_lvl+0x8c/0xd0 [ 36.229371] print_report+0x118/0x5e0 [ 36.230081] kasan_report+0xc8/0x118 [ 36.230774] kasan_check_range+0x100/0x1a8 [ 36.231501] __kasan_check_write+0x20/0x30 [ 36.232195] kasan_atomics_helper+0x7cc/0x4858 [ 36.233000] kasan_atomics+0x198/0x2e8 [ 36.233711] kunit_try_run_case+0x14c/0x3d0 [ 36.234454] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.235232] kthread+0x24c/0x2d0 [ 36.235910] ret_from_fork+0x10/0x20 [ 36.236625] [ 36.237037] Allocated by task 254: [ 36.237544] kasan_save_stack+0x3c/0x68 [ 36.238179] kasan_save_track+0x20/0x40 [ 36.238834] kasan_save_alloc_info+0x40/0x58 [ 36.239609] __kasan_kmalloc+0xd4/0xd8 [ 36.240217] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.240938] kasan_atomics+0xb8/0x2e8 [ 36.241551] kunit_try_run_case+0x14c/0x3d0 [ 36.242172] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.242997] kthread+0x24c/0x2d0 [ 36.243578] ret_from_fork+0x10/0x20 [ 36.244067] [ 36.244457] The buggy address belongs to the object at fff00000c5f10100 [ 36.244457] which belongs to the cache kmalloc-64 of size 64 [ 36.245765] The buggy address is located 0 bytes to the right of [ 36.245765] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.247138] [ 36.247509] The buggy address belongs to the physical page: [ 36.248299] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.249807] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.250484] page_type: f5(slab) [ 36.251152] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.252251] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.253344] page dumped because: kasan: bad access detected [ 36.254251] [ 36.254806] Memory state around the buggy address: [ 36.255482] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.256394] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.257297] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.258067] ^ [ 36.258696] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.259641] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.260395] ================================================================== [ 36.141219] ================================================================== [ 36.142034] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 36.142965] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.143969] [ 36.144420] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.145627] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.146173] Hardware name: linux,dummy-virt (DT) [ 36.146907] Call trace: [ 36.147324] show_stack+0x20/0x38 (C) [ 36.148013] dump_stack_lvl+0x8c/0xd0 [ 36.148739] print_report+0x118/0x5e0 [ 36.149380] kasan_report+0xc8/0x118 [ 36.150021] kasan_check_range+0x100/0x1a8 [ 36.150703] __kasan_check_write+0x20/0x30 [ 36.151442] kasan_atomics_helper+0x6ec/0x4858 [ 36.152215] kasan_atomics+0x198/0x2e8 [ 36.152920] kunit_try_run_case+0x14c/0x3d0 [ 36.153682] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.154348] kthread+0x24c/0x2d0 [ 36.155019] ret_from_fork+0x10/0x20 [ 36.155744] [ 36.156059] Allocated by task 254: [ 36.156673] kasan_save_stack+0x3c/0x68 [ 36.157389] kasan_save_track+0x20/0x40 [ 36.158072] kasan_save_alloc_info+0x40/0x58 [ 36.158749] __kasan_kmalloc+0xd4/0xd8 [ 36.159397] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.160124] kasan_atomics+0xb8/0x2e8 [ 36.160788] kunit_try_run_case+0x14c/0x3d0 [ 36.161497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.162205] kthread+0x24c/0x2d0 [ 36.162841] ret_from_fork+0x10/0x20 [ 36.163430] [ 36.163833] The buggy address belongs to the object at fff00000c5f10100 [ 36.163833] which belongs to the cache kmalloc-64 of size 64 [ 36.165196] The buggy address is located 0 bytes to the right of [ 36.165196] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.166561] [ 36.166952] The buggy address belongs to the physical page: [ 36.167739] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.168747] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.169614] page_type: f5(slab) [ 36.170212] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.171146] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.172079] page dumped because: kasan: bad access detected [ 36.172806] [ 36.173162] Memory state around the buggy address: [ 36.173873] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.174796] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.175680] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.176545] ^ [ 36.177194] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.178096] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.178956] ================================================================== [ 37.080502] ================================================================== [ 37.081313] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 37.082345] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.083226] [ 37.083687] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.084897] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.085446] Hardware name: linux,dummy-virt (DT) [ 37.086128] Call trace: [ 37.086698] show_stack+0x20/0x38 (C) [ 37.087401] dump_stack_lvl+0x8c/0xd0 [ 37.088007] print_report+0x118/0x5e0 [ 37.088699] kasan_report+0xc8/0x118 [ 37.089284] kasan_check_range+0x100/0x1a8 [ 37.089915] __kasan_check_write+0x20/0x30 [ 37.090456] kasan_atomics_helper+0xeb8/0x4858 [ 37.091190] kasan_atomics+0x198/0x2e8 [ 37.091856] kunit_try_run_case+0x14c/0x3d0 [ 37.092598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.093412] kthread+0x24c/0x2d0 [ 37.094050] ret_from_fork+0x10/0x20 [ 37.094663] [ 37.095009] Allocated by task 254: [ 37.095435] kasan_save_stack+0x3c/0x68 [ 37.096093] kasan_save_track+0x20/0x40 [ 37.096756] kasan_save_alloc_info+0x40/0x58 [ 37.097427] __kasan_kmalloc+0xd4/0xd8 [ 37.098017] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.098724] kasan_atomics+0xb8/0x2e8 [ 37.099205] kunit_try_run_case+0x14c/0x3d0 [ 37.099894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.100545] kthread+0x24c/0x2d0 [ 37.101067] ret_from_fork+0x10/0x20 [ 37.101692] [ 37.102060] The buggy address belongs to the object at fff00000c5f10100 [ 37.102060] which belongs to the cache kmalloc-64 of size 64 [ 37.103371] The buggy address is located 0 bytes to the right of [ 37.103371] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.104672] [ 37.105063] The buggy address belongs to the physical page: [ 37.105684] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.106707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.107608] page_type: f5(slab) [ 37.108193] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.109091] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.109945] page dumped because: kasan: bad access detected [ 37.110577] [ 37.110956] Memory state around the buggy address: [ 37.111669] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.112352] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.113289] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.114073] ^ [ 37.114671] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.115608] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.116450] ================================================================== [ 37.689468] ================================================================== [ 37.690702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 37.692393] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.693682] [ 37.694403] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.695635] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.696304] Hardware name: linux,dummy-virt (DT) [ 37.696914] Call trace: [ 37.697424] show_stack+0x20/0x38 (C) [ 37.698127] dump_stack_lvl+0x8c/0xd0 [ 37.698719] print_report+0x118/0x5e0 [ 37.699400] kasan_report+0xc8/0x118 [ 37.700003] kasan_check_range+0x100/0x1a8 [ 37.700754] __kasan_check_write+0x20/0x30 [ 37.701352] kasan_atomics_helper+0x154c/0x4858 [ 37.702157] kasan_atomics+0x198/0x2e8 [ 37.702780] kunit_try_run_case+0x14c/0x3d0 [ 37.703542] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.704242] kthread+0x24c/0x2d0 [ 37.704920] ret_from_fork+0x10/0x20 [ 37.705513] [ 37.705944] Allocated by task 254: [ 37.706445] kasan_save_stack+0x3c/0x68 [ 37.707127] kasan_save_track+0x20/0x40 [ 37.707761] kasan_save_alloc_info+0x40/0x58 [ 37.708374] __kasan_kmalloc+0xd4/0xd8 [ 37.709042] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.709699] kasan_atomics+0xb8/0x2e8 [ 37.710311] kunit_try_run_case+0x14c/0x3d0 [ 37.711033] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.711713] kthread+0x24c/0x2d0 [ 37.712337] ret_from_fork+0x10/0x20 [ 37.712937] [ 37.713333] The buggy address belongs to the object at fff00000c5f10100 [ 37.713333] which belongs to the cache kmalloc-64 of size 64 [ 37.714626] The buggy address is located 0 bytes to the right of [ 37.714626] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.716077] [ 37.716513] The buggy address belongs to the physical page: [ 37.717244] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.718158] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.718893] page_type: f5(slab) [ 37.719474] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.720414] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.721364] page dumped because: kasan: bad access detected [ 37.722019] [ 37.722434] Memory state around the buggy address: [ 37.723091] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.724058] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.724940] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.725805] ^ [ 37.726454] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.727346] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.728230] ================================================================== [ 35.740046] ================================================================== [ 35.740878] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 35.742723] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 35.743407] [ 35.743840] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.745103] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.745839] Hardware name: linux,dummy-virt (DT) [ 35.746547] Call trace: [ 35.747003] show_stack+0x20/0x38 (C) [ 35.747751] dump_stack_lvl+0x8c/0xd0 [ 35.748302] print_report+0x118/0x5e0 [ 35.749012] kasan_report+0xc8/0x118 [ 35.749939] kasan_check_range+0x100/0x1a8 [ 35.750652] __kasan_check_write+0x20/0x30 [ 35.751234] kasan_atomics_helper+0x32c/0x4858 [ 35.751965] kasan_atomics+0x198/0x2e8 [ 35.752612] kunit_try_run_case+0x14c/0x3d0 [ 35.753245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.754278] kthread+0x24c/0x2d0 [ 35.754802] ret_from_fork+0x10/0x20 [ 35.755444] [ 35.755830] Allocated by task 254: [ 35.756323] kasan_save_stack+0x3c/0x68 [ 35.756956] kasan_save_track+0x20/0x40 [ 35.757436] kasan_save_alloc_info+0x40/0x58 [ 35.758396] __kasan_kmalloc+0xd4/0xd8 [ 35.759033] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.759734] kasan_atomics+0xb8/0x2e8 [ 35.760306] kunit_try_run_case+0x14c/0x3d0 [ 35.761042] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.762192] kthread+0x24c/0x2d0 [ 35.762671] ret_from_fork+0x10/0x20 [ 35.763136] [ 35.763728] The buggy address belongs to the object at fff00000c5f10100 [ 35.763728] which belongs to the cache kmalloc-64 of size 64 [ 35.765278] The buggy address is located 0 bytes to the right of [ 35.765278] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 35.767065] [ 35.767452] The buggy address belongs to the physical page: [ 35.768297] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 35.769191] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.769903] page_type: f5(slab) [ 35.770544] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.771471] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.772379] page dumped because: kasan: bad access detected [ 35.773041] [ 35.773454] Memory state around the buggy address: [ 35.774255] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.775345] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.776199] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.777088] ^ [ 35.777807] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.778831] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.779898] ================================================================== [ 37.729926] ================================================================== [ 37.730874] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 37.731757] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.732600] [ 37.733046] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.734311] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.734849] Hardware name: linux,dummy-virt (DT) [ 37.735578] Call trace: [ 37.736032] show_stack+0x20/0x38 (C) [ 37.736761] dump_stack_lvl+0x8c/0xd0 [ 37.737392] print_report+0x118/0x5e0 [ 37.738071] kasan_report+0xc8/0x118 [ 37.738775] kasan_check_range+0x100/0x1a8 [ 37.739514] __kasan_check_write+0x20/0x30 [ 37.740436] kasan_atomics_helper+0x15b4/0x4858 [ 37.741327] kasan_atomics+0x198/0x2e8 [ 37.741934] kunit_try_run_case+0x14c/0x3d0 [ 37.742968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.743690] kthread+0x24c/0x2d0 [ 37.744209] ret_from_fork+0x10/0x20 [ 37.744808] [ 37.745188] Allocated by task 254: [ 37.745654] kasan_save_stack+0x3c/0x68 [ 37.746290] kasan_save_track+0x20/0x40 [ 37.746934] kasan_save_alloc_info+0x40/0x58 [ 37.747633] __kasan_kmalloc+0xd4/0xd8 [ 37.748186] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.748917] kasan_atomics+0xb8/0x2e8 [ 37.749439] kunit_try_run_case+0x14c/0x3d0 [ 37.750167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.750999] kthread+0x24c/0x2d0 [ 37.751612] ret_from_fork+0x10/0x20 [ 37.752249] [ 37.752674] The buggy address belongs to the object at fff00000c5f10100 [ 37.752674] which belongs to the cache kmalloc-64 of size 64 [ 37.753979] The buggy address is located 0 bytes to the right of [ 37.753979] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.755231] [ 37.755597] The buggy address belongs to the physical page: [ 37.756210] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.757176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.757947] page_type: f5(slab) [ 37.758467] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.759390] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.760263] page dumped because: kasan: bad access detected [ 37.760879] [ 37.761260] Memory state around the buggy address: [ 37.761970] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.762799] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.763514] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.764465] ^ [ 37.765038] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.765845] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.766636] ================================================================== [ 36.574003] ================================================================== [ 36.574729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 36.575520] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.576314] [ 36.576735] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.579769] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.580572] Hardware name: linux,dummy-virt (DT) [ 36.581126] Call trace: [ 36.581964] show_stack+0x20/0x38 (C) [ 36.582608] dump_stack_lvl+0x8c/0xd0 [ 36.583223] print_report+0x118/0x5e0 [ 36.583780] kasan_report+0xc8/0x118 [ 36.584335] kasan_check_range+0x100/0x1a8 [ 36.586274] __kasan_check_write+0x20/0x30 [ 36.588139] kasan_atomics_helper+0xb70/0x4858 [ 36.589785] kasan_atomics+0x198/0x2e8 [ 36.590678] kunit_try_run_case+0x14c/0x3d0 [ 36.592429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.594094] kthread+0x24c/0x2d0 [ 36.595499] ret_from_fork+0x10/0x20 [ 36.597064] [ 36.598090] Allocated by task 254: [ 36.599518] kasan_save_stack+0x3c/0x68 [ 36.600926] kasan_save_track+0x20/0x40 [ 36.601426] kasan_save_alloc_info+0x40/0x58 [ 36.603470] __kasan_kmalloc+0xd4/0xd8 [ 36.605027] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.606558] kasan_atomics+0xb8/0x2e8 [ 36.608109] kunit_try_run_case+0x14c/0x3d0 [ 36.609721] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.611489] kthread+0x24c/0x2d0 [ 36.612928] ret_from_fork+0x10/0x20 [ 36.613428] [ 36.613770] The buggy address belongs to the object at fff00000c5f10100 [ 36.613770] which belongs to the cache kmalloc-64 of size 64 [ 36.616588] The buggy address is located 0 bytes to the right of [ 36.616588] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.620036] [ 36.620888] The buggy address belongs to the physical page: [ 36.622834] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.624925] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.626949] page_type: f5(slab) [ 36.628415] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.630550] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.632698] page dumped because: kasan: bad access detected [ 36.634519] [ 36.635450] Memory state around the buggy address: [ 36.635999] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.638472] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.640174] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.642213] ^ [ 36.643792] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.645772] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.647746] ================================================================== [ 36.651640] ================================================================== [ 36.654800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 36.655472] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.656191] [ 36.658635] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.660465] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.661660] Hardware name: linux,dummy-virt (DT) [ 36.662176] Call trace: [ 36.663686] show_stack+0x20/0x38 (C) [ 36.665096] dump_stack_lvl+0x8c/0xd0 [ 36.666567] print_report+0x118/0x5e0 [ 36.667364] kasan_report+0xc8/0x118 [ 36.668222] __asan_report_load4_noabort+0x20/0x30 [ 36.669066] kasan_atomics_helper+0x3dbc/0x4858 [ 36.669758] kasan_atomics+0x198/0x2e8 [ 36.670410] kunit_try_run_case+0x14c/0x3d0 [ 36.671080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.671880] kthread+0x24c/0x2d0 [ 36.672389] ret_from_fork+0x10/0x20 [ 36.672923] [ 36.673228] Allocated by task 254: [ 36.673676] kasan_save_stack+0x3c/0x68 [ 36.674156] kasan_save_track+0x20/0x40 [ 36.674828] kasan_save_alloc_info+0x40/0x58 [ 36.675553] __kasan_kmalloc+0xd4/0xd8 [ 36.676178] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.676915] kasan_atomics+0xb8/0x2e8 [ 36.677575] kunit_try_run_case+0x14c/0x3d0 [ 36.678253] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.678839] kthread+0x24c/0x2d0 [ 36.679438] ret_from_fork+0x10/0x20 [ 36.680066] [ 36.680470] The buggy address belongs to the object at fff00000c5f10100 [ 36.680470] which belongs to the cache kmalloc-64 of size 64 [ 36.681494] The buggy address is located 0 bytes to the right of [ 36.681494] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.683044] [ 36.683430] The buggy address belongs to the physical page: [ 36.684181] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.684943] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.685834] page_type: f5(slab) [ 36.686414] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.687419] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.688810] page dumped because: kasan: bad access detected [ 36.690145] [ 36.690734] Memory state around the buggy address: [ 36.691564] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.692610] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.693406] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.694310] ^ [ 36.694950] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.695722] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.696573] ================================================================== [ 35.862695] ================================================================== [ 35.863967] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 35.865377] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 35.866621] [ 35.867030] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.868294] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.868865] Hardware name: linux,dummy-virt (DT) [ 35.869504] Call trace: [ 35.869997] show_stack+0x20/0x38 (C) [ 35.870620] dump_stack_lvl+0x8c/0xd0 [ 35.871152] print_report+0x118/0x5e0 [ 35.871823] kasan_report+0xc8/0x118 [ 35.872375] kasan_check_range+0x100/0x1a8 [ 35.873066] __kasan_check_write+0x20/0x30 [ 35.873780] kasan_atomics_helper+0x414/0x4858 [ 35.874496] kasan_atomics+0x198/0x2e8 [ 35.875056] kunit_try_run_case+0x14c/0x3d0 [ 35.875774] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.876620] kthread+0x24c/0x2d0 [ 35.877209] ret_from_fork+0x10/0x20 [ 35.877882] [ 35.878255] Allocated by task 254: [ 35.878811] kasan_save_stack+0x3c/0x68 [ 35.879479] kasan_save_track+0x20/0x40 [ 35.880115] kasan_save_alloc_info+0x40/0x58 [ 35.880769] __kasan_kmalloc+0xd4/0xd8 [ 35.881388] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.882004] kasan_atomics+0xb8/0x2e8 [ 35.882655] kunit_try_run_case+0x14c/0x3d0 [ 35.883183] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.884408] kthread+0x24c/0x2d0 [ 35.885141] ret_from_fork+0x10/0x20 [ 35.885849] [ 35.886262] The buggy address belongs to the object at fff00000c5f10100 [ 35.886262] which belongs to the cache kmalloc-64 of size 64 [ 35.887654] The buggy address is located 0 bytes to the right of [ 35.887654] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 35.889217] [ 35.889681] The buggy address belongs to the physical page: [ 35.890316] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 35.891409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.892297] page_type: f5(slab) [ 35.892882] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.893900] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.894862] page dumped because: kasan: bad access detected [ 35.895679] [ 35.896072] Memory state around the buggy address: [ 35.896870] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.897831] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.898764] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.899761] ^ [ 35.900474] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.901414] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.902358] ================================================================== [ 37.959057] ================================================================== [ 37.959974] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 37.961208] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.962271] [ 37.962704] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.964081] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.964726] Hardware name: linux,dummy-virt (DT) [ 37.965557] Call trace: [ 37.966194] show_stack+0x20/0x38 (C) [ 37.966959] dump_stack_lvl+0x8c/0xd0 [ 37.967752] print_report+0x118/0x5e0 [ 37.968385] kasan_report+0xc8/0x118 [ 37.969228] kasan_check_range+0x100/0x1a8 [ 37.969680] __kasan_check_write+0x20/0x30 [ 37.970367] kasan_atomics_helper+0x175c/0x4858 [ 37.971226] kasan_atomics+0x198/0x2e8 [ 37.971853] kunit_try_run_case+0x14c/0x3d0 [ 37.972613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.973406] kthread+0x24c/0x2d0 [ 37.974064] ret_from_fork+0x10/0x20 [ 37.974716] [ 37.975093] Allocated by task 254: [ 37.975729] kasan_save_stack+0x3c/0x68 [ 37.976304] kasan_save_track+0x20/0x40 [ 37.976997] kasan_save_alloc_info+0x40/0x58 [ 37.977737] __kasan_kmalloc+0xd4/0xd8 [ 37.978385] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.979174] kasan_atomics+0xb8/0x2e8 [ 37.979797] kunit_try_run_case+0x14c/0x3d0 [ 37.980409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.981248] kthread+0x24c/0x2d0 [ 37.981834] ret_from_fork+0x10/0x20 [ 37.982481] [ 37.982880] The buggy address belongs to the object at fff00000c5f10100 [ 37.982880] which belongs to the cache kmalloc-64 of size 64 [ 37.984212] The buggy address is located 0 bytes to the right of [ 37.984212] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.985605] [ 37.986026] The buggy address belongs to the physical page: [ 37.986652] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.987765] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.988486] page_type: f5(slab) [ 37.989111] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.989940] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.990996] page dumped because: kasan: bad access detected [ 37.991804] [ 37.992188] Memory state around the buggy address: [ 37.992721] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.993663] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.994448] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.995207] ^ [ 37.995933] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.996812] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.997698] ================================================================== [ 36.774802] ================================================================== [ 36.775747] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 36.776463] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.777406] [ 36.777843] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.779014] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.779658] Hardware name: linux,dummy-virt (DT) [ 36.780267] Call trace: [ 36.780664] show_stack+0x20/0x38 (C) [ 36.781313] dump_stack_lvl+0x8c/0xd0 [ 36.781985] print_report+0x118/0x5e0 [ 36.782483] kasan_report+0xc8/0x118 [ 36.783162] kasan_check_range+0x100/0x1a8 [ 36.783817] __kasan_check_write+0x20/0x30 [ 36.784499] kasan_atomics_helper+0xca0/0x4858 [ 36.785233] kasan_atomics+0x198/0x2e8 [ 36.785945] kunit_try_run_case+0x14c/0x3d0 [ 36.786518] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.787311] kthread+0x24c/0x2d0 [ 36.787903] ret_from_fork+0x10/0x20 [ 36.788493] [ 36.788888] Allocated by task 254: [ 36.789406] kasan_save_stack+0x3c/0x68 [ 36.789981] kasan_save_track+0x20/0x40 [ 36.790642] kasan_save_alloc_info+0x40/0x58 [ 36.791293] __kasan_kmalloc+0xd4/0xd8 [ 36.791942] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.792614] kasan_atomics+0xb8/0x2e8 [ 36.793172] kunit_try_run_case+0x14c/0x3d0 [ 36.793902] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.794631] kthread+0x24c/0x2d0 [ 36.795210] ret_from_fork+0x10/0x20 [ 36.795715] [ 36.796096] The buggy address belongs to the object at fff00000c5f10100 [ 36.796096] which belongs to the cache kmalloc-64 of size 64 [ 36.797287] The buggy address is located 0 bytes to the right of [ 36.797287] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.798645] [ 36.799024] The buggy address belongs to the physical page: [ 36.799778] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.800645] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.801437] page_type: f5(slab) [ 36.802031] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.803005] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.803841] page dumped because: kasan: bad access detected [ 36.804614] [ 36.804993] Memory state around the buggy address: [ 36.805696] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.806494] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.807264] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.808190] ^ [ 36.808825] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.809358] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.810040] ================================================================== [ 35.655480] ================================================================== [ 35.656402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 35.657176] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 35.658996] [ 35.659404] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.660499] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.661139] Hardware name: linux,dummy-virt (DT) [ 35.662204] Call trace: [ 35.662667] show_stack+0x20/0x38 (C) [ 35.663209] dump_stack_lvl+0x8c/0xd0 [ 35.663887] print_report+0x118/0x5e0 [ 35.664549] kasan_report+0xc8/0x118 [ 35.665082] kasan_check_range+0x100/0x1a8 [ 35.665785] __kasan_check_read+0x20/0x30 [ 35.666373] kasan_atomics_helper+0x2b0/0x4858 [ 35.667358] kasan_atomics+0x198/0x2e8 [ 35.667972] kunit_try_run_case+0x14c/0x3d0 [ 35.668626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.669275] kthread+0x24c/0x2d0 [ 35.670184] ret_from_fork+0x10/0x20 [ 35.670858] [ 35.671214] Allocated by task 254: [ 35.671808] kasan_save_stack+0x3c/0x68 [ 35.672412] kasan_save_track+0x20/0x40 [ 35.672969] kasan_save_alloc_info+0x40/0x58 [ 35.674732] __kasan_kmalloc+0xd4/0xd8 [ 35.675323] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.675913] kasan_atomics+0xb8/0x2e8 [ 35.676867] kunit_try_run_case+0x14c/0x3d0 [ 35.677447] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.678389] kthread+0x24c/0x2d0 [ 35.679170] ret_from_fork+0x10/0x20 [ 35.679917] [ 35.680341] The buggy address belongs to the object at fff00000c5f10100 [ 35.680341] which belongs to the cache kmalloc-64 of size 64 [ 35.681729] The buggy address is located 0 bytes to the right of [ 35.681729] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 35.683361] [ 35.683777] The buggy address belongs to the physical page: [ 35.684684] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 35.685962] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.686727] page_type: f5(slab) [ 35.687299] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.688127] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.689156] page dumped because: kasan: bad access detected [ 35.690146] [ 35.690510] Memory state around the buggy address: [ 35.691116] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.692036] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.692840] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.693987] ^ [ 35.694713] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.695514] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.696840] ================================================================== [ 37.843561] ================================================================== [ 37.844353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 37.844990] Read of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.845925] [ 37.846752] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.848031] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.848603] Hardware name: linux,dummy-virt (DT) [ 37.849271] Call trace: [ 37.849763] show_stack+0x20/0x38 (C) [ 37.850377] dump_stack_lvl+0x8c/0xd0 [ 37.851048] print_report+0x118/0x5e0 [ 37.851705] kasan_report+0xc8/0x118 [ 37.852265] __asan_report_load8_noabort+0x20/0x30 [ 37.853023] kasan_atomics_helper+0x3df4/0x4858 [ 37.853689] kasan_atomics+0x198/0x2e8 [ 37.854335] kunit_try_run_case+0x14c/0x3d0 [ 37.855037] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.855679] kthread+0x24c/0x2d0 [ 37.856277] ret_from_fork+0x10/0x20 [ 37.856931] [ 37.857273] Allocated by task 254: [ 37.857855] kasan_save_stack+0x3c/0x68 [ 37.858492] kasan_save_track+0x20/0x40 [ 37.859093] kasan_save_alloc_info+0x40/0x58 [ 37.859796] __kasan_kmalloc+0xd4/0xd8 [ 37.860368] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.861091] kasan_atomics+0xb8/0x2e8 [ 37.861742] kunit_try_run_case+0x14c/0x3d0 [ 37.862298] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.863105] kthread+0x24c/0x2d0 [ 37.863715] ret_from_fork+0x10/0x20 [ 37.864243] [ 37.864603] The buggy address belongs to the object at fff00000c5f10100 [ 37.864603] which belongs to the cache kmalloc-64 of size 64 [ 37.865892] The buggy address is located 0 bytes to the right of [ 37.865892] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.867238] [ 37.867579] The buggy address belongs to the physical page: [ 37.868346] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.869319] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.870059] page_type: f5(slab) [ 37.870650] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.871497] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.872389] page dumped because: kasan: bad access detected [ 37.872974] [ 37.873345] Memory state around the buggy address: [ 37.874037] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.874935] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.875771] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.876619] ^ [ 37.877315] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.878129] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.878958] ================================================================== [ 37.043863] ================================================================== [ 37.045328] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 37.046411] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.047102] [ 37.047515] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.048683] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.049232] Hardware name: linux,dummy-virt (DT) [ 37.049745] Call trace: [ 37.050211] show_stack+0x20/0x38 (C) [ 37.050842] dump_stack_lvl+0x8c/0xd0 [ 37.051492] print_report+0x118/0x5e0 [ 37.052008] kasan_report+0xc8/0x118 [ 37.052663] __asan_report_store8_noabort+0x20/0x30 [ 37.053378] kasan_atomics_helper+0x3e5c/0x4858 [ 37.054119] kasan_atomics+0x198/0x2e8 [ 37.054779] kunit_try_run_case+0x14c/0x3d0 [ 37.055336] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.056162] kthread+0x24c/0x2d0 [ 37.056758] ret_from_fork+0x10/0x20 [ 37.057336] [ 37.057728] Allocated by task 254: [ 37.058285] kasan_save_stack+0x3c/0x68 [ 37.058802] kasan_save_track+0x20/0x40 [ 37.059431] kasan_save_alloc_info+0x40/0x58 [ 37.060140] __kasan_kmalloc+0xd4/0xd8 [ 37.060661] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.061369] kasan_atomics+0xb8/0x2e8 [ 37.062000] kunit_try_run_case+0x14c/0x3d0 [ 37.062628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.063362] kthread+0x24c/0x2d0 [ 37.063874] ret_from_fork+0x10/0x20 [ 37.064495] [ 37.064836] The buggy address belongs to the object at fff00000c5f10100 [ 37.064836] which belongs to the cache kmalloc-64 of size 64 [ 37.066175] The buggy address is located 0 bytes to the right of [ 37.066175] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.067425] [ 37.067833] The buggy address belongs to the physical page: [ 37.068582] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.069482] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.070395] page_type: f5(slab) [ 37.070927] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.071763] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.072606] page dumped because: kasan: bad access detected [ 37.073338] [ 37.073732] Memory state around the buggy address: [ 37.074325] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.075200] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.076047] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.076919] ^ [ 37.077630] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.078414] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.079152] ================================================================== [ 37.002833] ================================================================== [ 37.003643] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 37.004337] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.005387] [ 37.005821] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.008012] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.008869] Hardware name: linux,dummy-virt (DT) [ 37.009590] Call trace: [ 37.010040] show_stack+0x20/0x38 (C) [ 37.010940] dump_stack_lvl+0x8c/0xd0 [ 37.011562] print_report+0x118/0x5e0 [ 37.012210] kasan_report+0xc8/0x118 [ 37.012815] kasan_check_range+0x100/0x1a8 [ 37.013519] __kasan_check_write+0x20/0x30 [ 37.014602] kasan_atomics_helper+0xe44/0x4858 [ 37.015267] kasan_atomics+0x198/0x2e8 [ 37.015935] kunit_try_run_case+0x14c/0x3d0 [ 37.016645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.017382] kthread+0x24c/0x2d0 [ 37.017904] ret_from_fork+0x10/0x20 [ 37.018875] [ 37.019163] Allocated by task 254: [ 37.019782] kasan_save_stack+0x3c/0x68 [ 37.020434] kasan_save_track+0x20/0x40 [ 37.021060] kasan_save_alloc_info+0x40/0x58 [ 37.021595] __kasan_kmalloc+0xd4/0xd8 [ 37.022217] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.022803] kasan_atomics+0xb8/0x2e8 [ 37.023408] kunit_try_run_case+0x14c/0x3d0 [ 37.024085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.024760] kthread+0x24c/0x2d0 [ 37.025333] ret_from_fork+0x10/0x20 [ 37.026141] [ 37.027072] The buggy address belongs to the object at fff00000c5f10100 [ 37.027072] which belongs to the cache kmalloc-64 of size 64 [ 37.029186] The buggy address is located 0 bytes to the right of [ 37.029186] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.030743] [ 37.030991] The buggy address belongs to the physical page: [ 37.031708] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.032753] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.033478] page_type: f5(slab) [ 37.034067] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.034978] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.035968] page dumped because: kasan: bad access detected [ 37.036625] [ 37.037006] Memory state around the buggy address: [ 37.037714] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.038491] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.039439] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.040211] ^ [ 37.040942] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.041889] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.042703] ================================================================== [ 35.904505] ================================================================== [ 35.905169] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 35.906121] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 35.907036] [ 35.907488] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.908621] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.909311] Hardware name: linux,dummy-virt (DT) [ 35.910063] Call trace: [ 35.910491] show_stack+0x20/0x38 (C) [ 35.911165] dump_stack_lvl+0x8c/0xd0 [ 35.911865] print_report+0x118/0x5e0 [ 35.912490] kasan_report+0xc8/0x118 [ 35.913192] kasan_check_range+0x100/0x1a8 [ 35.913835] __kasan_check_write+0x20/0x30 [ 35.914588] kasan_atomics_helper+0x47c/0x4858 [ 35.915211] kasan_atomics+0x198/0x2e8 [ 35.915929] kunit_try_run_case+0x14c/0x3d0 [ 35.916579] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.917388] kthread+0x24c/0x2d0 [ 35.918009] ret_from_fork+0x10/0x20 [ 35.918677] [ 35.919093] Allocated by task 254: [ 35.919607] kasan_save_stack+0x3c/0x68 [ 35.920288] kasan_save_track+0x20/0x40 [ 35.920884] kasan_save_alloc_info+0x40/0x58 [ 35.921558] __kasan_kmalloc+0xd4/0xd8 [ 35.922216] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.922831] kasan_atomics+0xb8/0x2e8 [ 35.923478] kunit_try_run_case+0x14c/0x3d0 [ 35.924140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.924938] kthread+0x24c/0x2d0 [ 35.925568] ret_from_fork+0x10/0x20 [ 35.926136] [ 35.926514] The buggy address belongs to the object at fff00000c5f10100 [ 35.926514] which belongs to the cache kmalloc-64 of size 64 [ 35.927802] The buggy address is located 0 bytes to the right of [ 35.927802] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 35.929237] [ 35.929674] The buggy address belongs to the physical page: [ 35.930393] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 35.931480] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.932373] page_type: f5(slab) [ 35.933001] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.933978] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.934954] page dumped because: kasan: bad access detected [ 35.935641] [ 35.936061] Memory state around the buggy address: [ 35.936727] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.937557] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.938501] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.939331] ^ [ 35.940028] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.940907] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.941802] ================================================================== [ 37.768216] ================================================================== [ 37.769083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 37.770791] Read of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.771666] [ 37.772142] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.773321] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.773617] Hardware name: linux,dummy-virt (DT) [ 37.773886] Call trace: [ 37.774078] show_stack+0x20/0x38 (C) [ 37.774346] dump_stack_lvl+0x8c/0xd0 [ 37.774720] print_report+0x118/0x5e0 [ 37.775653] kasan_report+0xc8/0x118 [ 37.776313] __asan_report_load8_noabort+0x20/0x30 [ 37.776983] kasan_atomics_helper+0x3db0/0x4858 [ 37.777556] kasan_atomics+0x198/0x2e8 [ 37.778207] kunit_try_run_case+0x14c/0x3d0 [ 37.778922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.779753] kthread+0x24c/0x2d0 [ 37.780380] ret_from_fork+0x10/0x20 [ 37.781036] [ 37.781405] Allocated by task 254: [ 37.782000] kasan_save_stack+0x3c/0x68 [ 37.782648] kasan_save_track+0x20/0x40 [ 37.783179] kasan_save_alloc_info+0x40/0x58 [ 37.783797] __kasan_kmalloc+0xd4/0xd8 [ 37.784432] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.785155] kasan_atomics+0xb8/0x2e8 [ 37.785792] kunit_try_run_case+0x14c/0x3d0 [ 37.786358] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.787162] kthread+0x24c/0x2d0 [ 37.787645] ret_from_fork+0x10/0x20 [ 37.788266] [ 37.788650] The buggy address belongs to the object at fff00000c5f10100 [ 37.788650] which belongs to the cache kmalloc-64 of size 64 [ 37.789889] The buggy address is located 0 bytes to the right of [ 37.789889] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.791077] [ 37.791463] The buggy address belongs to the physical page: [ 37.792244] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.793196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.794098] page_type: f5(slab) [ 37.794687] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.795451] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.796435] page dumped because: kasan: bad access detected [ 37.797104] [ 37.797479] Memory state around the buggy address: [ 37.798014] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.798889] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.799760] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.800616] ^ [ 37.801273] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.802162] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.803008] ================================================================== [ 35.611308] ================================================================== [ 35.612244] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 35.613170] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 35.614828] [ 35.615171] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.616889] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.617548] Hardware name: linux,dummy-virt (DT) [ 35.618446] Call trace: [ 35.619040] show_stack+0x20/0x38 (C) [ 35.619735] dump_stack_lvl+0x8c/0xd0 [ 35.620437] print_report+0x118/0x5e0 [ 35.621114] kasan_report+0xc8/0x118 [ 35.621850] kasan_check_range+0x100/0x1a8 [ 35.622724] __kasan_check_write+0x20/0x30 [ 35.623380] kasan_atomics_helper+0x24c/0x4858 [ 35.624158] kasan_atomics+0x198/0x2e8 [ 35.624828] kunit_try_run_case+0x14c/0x3d0 [ 35.625883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.626713] kthread+0x24c/0x2d0 [ 35.627190] ret_from_fork+0x10/0x20 [ 35.627850] [ 35.628191] Allocated by task 254: [ 35.628781] kasan_save_stack+0x3c/0x68 [ 35.629385] kasan_save_track+0x20/0x40 [ 35.630021] kasan_save_alloc_info+0x40/0x58 [ 35.631098] __kasan_kmalloc+0xd4/0xd8 [ 35.631731] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.632449] kasan_atomics+0xb8/0x2e8 [ 35.633131] kunit_try_run_case+0x14c/0x3d0 [ 35.633471] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.634375] kthread+0x24c/0x2d0 [ 35.635839] ret_from_fork+0x10/0x20 [ 35.636428] [ 35.636830] The buggy address belongs to the object at fff00000c5f10100 [ 35.636830] which belongs to the cache kmalloc-64 of size 64 [ 35.638447] The buggy address is located 0 bytes to the right of [ 35.638447] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 35.639685] [ 35.640116] The buggy address belongs to the physical page: [ 35.640975] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 35.642294] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.643214] page_type: f5(slab) [ 35.643604] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.644802] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.645654] page dumped because: kasan: bad access detected [ 35.646224] [ 35.646861] Memory state around the buggy address: [ 35.647576] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.648391] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.649280] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.650458] ^ [ 35.651047] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.651918] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.652817] ================================================================== [ 35.985927] ================================================================== [ 35.986840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 35.987666] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 35.988485] [ 35.988898] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.990045] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.990680] Hardware name: linux,dummy-virt (DT) [ 35.991190] Call trace: [ 35.991681] show_stack+0x20/0x38 (C) [ 35.992356] dump_stack_lvl+0x8c/0xd0 [ 35.992938] print_report+0x118/0x5e0 [ 35.993610] kasan_report+0xc8/0x118 [ 35.994246] kasan_check_range+0x100/0x1a8 [ 35.994807] __kasan_check_write+0x20/0x30 [ 35.995496] kasan_atomics_helper+0x54c/0x4858 [ 35.996243] kasan_atomics+0x198/0x2e8 [ 35.996803] kunit_try_run_case+0x14c/0x3d0 [ 35.997433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.998274] kthread+0x24c/0x2d0 [ 35.998904] ret_from_fork+0x10/0x20 [ 35.999619] [ 35.999996] Allocated by task 254: [ 36.000463] kasan_save_stack+0x3c/0x68 [ 36.001708] kasan_save_track+0x20/0x40 [ 36.002350] kasan_save_alloc_info+0x40/0x58 [ 36.002941] __kasan_kmalloc+0xd4/0xd8 [ 36.003588] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.004152] kasan_atomics+0xb8/0x2e8 [ 36.004784] kunit_try_run_case+0x14c/0x3d0 [ 36.005446] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.006206] kthread+0x24c/0x2d0 [ 36.006803] ret_from_fork+0x10/0x20 [ 36.007368] [ 36.007763] The buggy address belongs to the object at fff00000c5f10100 [ 36.007763] which belongs to the cache kmalloc-64 of size 64 [ 36.009061] The buggy address is located 0 bytes to the right of [ 36.009061] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.010360] [ 36.010730] The buggy address belongs to the physical page: [ 36.011449] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.012481] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.013385] page_type: f5(slab) [ 36.013918] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.014806] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.015632] page dumped because: kasan: bad access detected [ 36.016396] [ 36.016786] Memory state around the buggy address: [ 36.017341] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.018233] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.018898] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.019863] ^ [ 36.020593] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.021344] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.022222] ================================================================== [ 36.181374] ================================================================== [ 36.182156] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 36.183155] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.184140] [ 36.184514] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.185634] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.186265] Hardware name: linux,dummy-virt (DT) [ 36.187052] Call trace: [ 36.187546] show_stack+0x20/0x38 (C) [ 36.188212] dump_stack_lvl+0x8c/0xd0 [ 36.189099] print_report+0x118/0x5e0 [ 36.189785] kasan_report+0xc8/0x118 [ 36.190459] kasan_check_range+0x100/0x1a8 [ 36.191157] __kasan_check_write+0x20/0x30 [ 36.192017] kasan_atomics_helper+0x760/0x4858 [ 36.192848] kasan_atomics+0x198/0x2e8 [ 36.193870] kunit_try_run_case+0x14c/0x3d0 [ 36.194729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.195608] kthread+0x24c/0x2d0 [ 36.196132] ret_from_fork+0x10/0x20 [ 36.196974] [ 36.197291] Allocated by task 254: [ 36.197889] kasan_save_stack+0x3c/0x68 [ 36.198517] kasan_save_track+0x20/0x40 [ 36.199242] kasan_save_alloc_info+0x40/0x58 [ 36.199974] __kasan_kmalloc+0xd4/0xd8 [ 36.200618] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.201239] kasan_atomics+0xb8/0x2e8 [ 36.201899] kunit_try_run_case+0x14c/0x3d0 [ 36.202629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.203323] kthread+0x24c/0x2d0 [ 36.203948] ret_from_fork+0x10/0x20 [ 36.204596] [ 36.204976] The buggy address belongs to the object at fff00000c5f10100 [ 36.204976] which belongs to the cache kmalloc-64 of size 64 [ 36.206196] The buggy address is located 0 bytes to the right of [ 36.206196] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.207689] [ 36.208118] The buggy address belongs to the physical page: [ 36.208858] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.209995] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.210859] page_type: f5(slab) [ 36.211416] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.212376] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.213275] page dumped because: kasan: bad access detected [ 36.213905] [ 36.214319] Memory state around the buggy address: [ 36.215058] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.215876] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.216793] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.217722] ^ [ 36.218304] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.219261] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.220104] ================================================================== [ 37.384627] ================================================================== [ 37.385394] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 37.386272] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.387139] [ 37.387564] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.388678] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.389310] Hardware name: linux,dummy-virt (DT) [ 37.389955] Call trace: [ 37.390427] show_stack+0x20/0x38 (C) [ 37.391099] dump_stack_lvl+0x8c/0xd0 [ 37.391776] print_report+0x118/0x5e0 [ 37.392308] kasan_report+0xc8/0x118 [ 37.392972] kasan_check_range+0x100/0x1a8 [ 37.393576] __kasan_check_write+0x20/0x30 [ 37.394278] kasan_atomics_helper+0x11f8/0x4858 [ 37.395023] kasan_atomics+0x198/0x2e8 [ 37.395705] kunit_try_run_case+0x14c/0x3d0 [ 37.396246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.397094] kthread+0x24c/0x2d0 [ 37.397736] ret_from_fork+0x10/0x20 [ 37.398296] [ 37.398695] Allocated by task 254: [ 37.399288] kasan_save_stack+0x3c/0x68 [ 37.399796] kasan_save_track+0x20/0x40 [ 37.400438] kasan_save_alloc_info+0x40/0x58 [ 37.401019] __kasan_kmalloc+0xd4/0xd8 [ 37.401669] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.402212] kasan_atomics+0xb8/0x2e8 [ 37.402850] kunit_try_run_case+0x14c/0x3d0 [ 37.403516] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.404226] kthread+0x24c/0x2d0 [ 37.404833] ret_from_fork+0x10/0x20 [ 37.405398] [ 37.405788] The buggy address belongs to the object at fff00000c5f10100 [ 37.405788] which belongs to the cache kmalloc-64 of size 64 [ 37.407059] The buggy address is located 0 bytes to the right of [ 37.407059] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.408362] [ 37.408768] The buggy address belongs to the physical page: [ 37.409380] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.410318] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.411177] page_type: f5(slab) [ 37.411771] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.412643] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.413496] page dumped because: kasan: bad access detected [ 37.414273] [ 37.414637] Memory state around the buggy address: [ 37.415163] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.416050] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.416958] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.417819] ^ [ 37.418507] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.419357] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.420322] ================================================================== [ 37.650170] ================================================================== [ 37.650850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 37.651770] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.652577] [ 37.652973] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.654154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.654793] Hardware name: linux,dummy-virt (DT) [ 37.655463] Call trace: [ 37.655953] show_stack+0x20/0x38 (C) [ 37.656496] dump_stack_lvl+0x8c/0xd0 [ 37.657177] print_report+0x118/0x5e0 [ 37.657750] kasan_report+0xc8/0x118 [ 37.658390] kasan_check_range+0x100/0x1a8 [ 37.659144] __kasan_check_write+0x20/0x30 [ 37.659716] kasan_atomics_helper+0x14e4/0x4858 [ 37.660471] kasan_atomics+0x198/0x2e8 [ 37.661942] kunit_try_run_case+0x14c/0x3d0 [ 37.662725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.663615] kthread+0x24c/0x2d0 [ 37.664199] ret_from_fork+0x10/0x20 [ 37.664860] [ 37.665266] Allocated by task 254: [ 37.665768] kasan_save_stack+0x3c/0x68 [ 37.666440] kasan_save_track+0x20/0x40 [ 37.667143] kasan_save_alloc_info+0x40/0x58 [ 37.667888] __kasan_kmalloc+0xd4/0xd8 [ 37.668478] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.669118] kasan_atomics+0xb8/0x2e8 [ 37.669673] kunit_try_run_case+0x14c/0x3d0 [ 37.670390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.671187] kthread+0x24c/0x2d0 [ 37.671830] ret_from_fork+0x10/0x20 [ 37.672398] [ 37.672795] The buggy address belongs to the object at fff00000c5f10100 [ 37.672795] which belongs to the cache kmalloc-64 of size 64 [ 37.674112] The buggy address is located 0 bytes to the right of [ 37.674112] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.675479] [ 37.675924] The buggy address belongs to the physical page: [ 37.676621] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.677585] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.678347] page_type: f5(slab) [ 37.678953] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.679823] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.680805] page dumped because: kasan: bad access detected [ 37.681486] [ 37.681920] Memory state around the buggy address: [ 37.682591] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.683575] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.684371] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.685288] ^ [ 37.685942] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.686846] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.687712] ================================================================== [ 36.338609] ================================================================== [ 36.339746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 36.340461] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.341960] [ 36.342332] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.343664] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.344222] Hardware name: linux,dummy-virt (DT) [ 36.344890] Call trace: [ 36.345392] show_stack+0x20/0x38 (C) [ 36.346072] dump_stack_lvl+0x8c/0xd0 [ 36.346701] print_report+0x118/0x5e0 [ 36.347404] kasan_report+0xc8/0x118 [ 36.348048] kasan_check_range+0x100/0x1a8 [ 36.348797] __kasan_check_write+0x20/0x30 [ 36.349484] kasan_atomics_helper+0x934/0x4858 [ 36.350253] kasan_atomics+0x198/0x2e8 [ 36.350916] kunit_try_run_case+0x14c/0x3d0 [ 36.351444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.352330] kthread+0x24c/0x2d0 [ 36.352940] ret_from_fork+0x10/0x20 [ 36.353573] [ 36.353903] Allocated by task 254: [ 36.354405] kasan_save_stack+0x3c/0x68 [ 36.355011] kasan_save_track+0x20/0x40 [ 36.355584] kasan_save_alloc_info+0x40/0x58 [ 36.356174] __kasan_kmalloc+0xd4/0xd8 [ 36.356825] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.357353] kasan_atomics+0xb8/0x2e8 [ 36.357988] kunit_try_run_case+0x14c/0x3d0 [ 36.358683] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.359489] kthread+0x24c/0x2d0 [ 36.360081] ret_from_fork+0x10/0x20 [ 36.360649] [ 36.361030] The buggy address belongs to the object at fff00000c5f10100 [ 36.361030] which belongs to the cache kmalloc-64 of size 64 [ 36.362329] The buggy address is located 0 bytes to the right of [ 36.362329] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.363688] [ 36.364075] The buggy address belongs to the physical page: [ 36.364867] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.365759] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.366650] page_type: f5(slab) [ 36.367195] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.368168] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.368948] page dumped because: kasan: bad access detected [ 36.369770] [ 36.370147] Memory state around the buggy address: [ 36.370858] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.371707] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.372552] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.373357] ^ [ 36.374093] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.374910] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.375739] ================================================================== [ 35.568148] ================================================================== [ 35.569101] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 35.569926] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 35.570948] [ 35.571398] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.572732] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.573362] Hardware name: linux,dummy-virt (DT) [ 35.574331] Call trace: [ 35.574878] show_stack+0x20/0x38 (C) [ 35.575618] dump_stack_lvl+0x8c/0xd0 [ 35.576388] print_report+0x118/0x5e0 [ 35.577046] kasan_report+0xc8/0x118 [ 35.578160] kasan_check_range+0x100/0x1a8 [ 35.579009] __kasan_check_read+0x20/0x30 [ 35.579612] kasan_atomics_helper+0x1ec/0x4858 [ 35.580215] kasan_atomics+0x198/0x2e8 [ 35.580907] kunit_try_run_case+0x14c/0x3d0 [ 35.582003] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.582864] kthread+0x24c/0x2d0 [ 35.583378] ret_from_fork+0x10/0x20 [ 35.584030] [ 35.584404] Allocated by task 254: [ 35.584986] kasan_save_stack+0x3c/0x68 [ 35.585554] kasan_save_track+0x20/0x40 [ 35.586618] kasan_save_alloc_info+0x40/0x58 [ 35.588008] __kasan_kmalloc+0xd4/0xd8 [ 35.588625] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.589457] kasan_atomics+0xb8/0x2e8 [ 35.590335] kunit_try_run_case+0x14c/0x3d0 [ 35.590989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.591846] kthread+0x24c/0x2d0 [ 35.592432] ret_from_fork+0x10/0x20 [ 35.593095] [ 35.593521] The buggy address belongs to the object at fff00000c5f10100 [ 35.593521] which belongs to the cache kmalloc-64 of size 64 [ 35.595185] The buggy address is located 0 bytes to the right of [ 35.595185] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 35.596464] [ 35.597037] The buggy address belongs to the physical page: [ 35.598152] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 35.599120] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.600030] page_type: f5(slab) [ 35.600581] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.601401] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.602490] page dumped because: kasan: bad access detected [ 35.603129] [ 35.603502] Memory state around the buggy address: [ 35.604191] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.605026] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.606548] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.607331] ^ [ 35.608115] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.609071] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.609948] ================================================================== [ 37.460519] ================================================================== [ 37.461263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 37.462209] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.463056] [ 37.463465] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.464546] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.465218] Hardware name: linux,dummy-virt (DT) [ 37.466577] Call trace: [ 37.467016] show_stack+0x20/0x38 (C) [ 37.467592] dump_stack_lvl+0x8c/0xd0 [ 37.468262] print_report+0x118/0x5e0 [ 37.469221] kasan_report+0xc8/0x118 [ 37.469964] kasan_check_range+0x100/0x1a8 [ 37.470554] __kasan_check_write+0x20/0x30 [ 37.471202] kasan_atomics_helper+0x12d8/0x4858 [ 37.471919] kasan_atomics+0x198/0x2e8 [ 37.472643] kunit_try_run_case+0x14c/0x3d0 [ 37.473340] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.474128] kthread+0x24c/0x2d0 [ 37.474758] ret_from_fork+0x10/0x20 [ 37.475329] [ 37.475717] Allocated by task 254: [ 37.476293] kasan_save_stack+0x3c/0x68 [ 37.476874] kasan_save_track+0x20/0x40 [ 37.477419] kasan_save_alloc_info+0x40/0x58 [ 37.478118] __kasan_kmalloc+0xd4/0xd8 [ 37.478669] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.479397] kasan_atomics+0xb8/0x2e8 [ 37.479923] kunit_try_run_case+0x14c/0x3d0 [ 37.480613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.481306] kthread+0x24c/0x2d0 [ 37.481889] ret_from_fork+0x10/0x20 [ 37.482429] [ 37.482823] The buggy address belongs to the object at fff00000c5f10100 [ 37.482823] which belongs to the cache kmalloc-64 of size 64 [ 37.483952] The buggy address is located 0 bytes to the right of [ 37.483952] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.485342] [ 37.485746] The buggy address belongs to the physical page: [ 37.486358] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.487392] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.488118] page_type: f5(slab) [ 37.488706] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.489565] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.490547] page dumped because: kasan: bad access detected [ 37.491200] [ 37.491587] Memory state around the buggy address: [ 37.492206] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.492986] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.493950] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.494851] ^ [ 37.495583] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.496434] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.497258] ================================================================== [ 35.781222] ================================================================== [ 35.782457] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 35.784324] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 35.785392] [ 35.785894] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.787155] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.787861] Hardware name: linux,dummy-virt (DT) [ 35.788477] Call trace: [ 35.789090] show_stack+0x20/0x38 (C) [ 35.789895] dump_stack_lvl+0x8c/0xd0 [ 35.790820] print_report+0x118/0x5e0 [ 35.791575] kasan_report+0xc8/0x118 [ 35.792307] __asan_report_store4_noabort+0x20/0x30 [ 35.793002] kasan_atomics_helper+0x3f94/0x4858 [ 35.793693] kasan_atomics+0x198/0x2e8 [ 35.794253] kunit_try_run_case+0x14c/0x3d0 [ 35.795159] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.795838] kthread+0x24c/0x2d0 [ 35.796425] ret_from_fork+0x10/0x20 [ 35.797017] [ 35.797348] Allocated by task 254: [ 35.797941] kasan_save_stack+0x3c/0x68 [ 35.798455] kasan_save_track+0x20/0x40 [ 35.799150] kasan_save_alloc_info+0x40/0x58 [ 35.799773] __kasan_kmalloc+0xd4/0xd8 [ 35.800445] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.801485] kasan_atomics+0xb8/0x2e8 [ 35.802103] kunit_try_run_case+0x14c/0x3d0 [ 35.803134] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.804319] kthread+0x24c/0x2d0 [ 35.804956] ret_from_fork+0x10/0x20 [ 35.805355] [ 35.805788] The buggy address belongs to the object at fff00000c5f10100 [ 35.805788] which belongs to the cache kmalloc-64 of size 64 [ 35.807223] The buggy address is located 0 bytes to the right of [ 35.807223] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 35.808576] [ 35.808954] The buggy address belongs to the physical page: [ 35.809763] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 35.810972] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.811782] page_type: f5(slab) [ 35.812395] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.813439] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.814371] page dumped because: kasan: bad access detected [ 35.815193] [ 35.815618] Memory state around the buggy address: [ 35.816198] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.817169] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.817975] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.818914] ^ [ 35.819682] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.820500] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.821405] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 35.117252] ================================================================== [ 35.117975] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 35.119403] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250 [ 35.120657] [ 35.121083] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.122163] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.122435] Hardware name: linux,dummy-virt (DT) [ 35.122914] Call trace: [ 35.123431] show_stack+0x20/0x38 (C) [ 35.124201] dump_stack_lvl+0x8c/0xd0 [ 35.124959] print_report+0x118/0x5e0 [ 35.125681] kasan_report+0xc8/0x118 [ 35.126351] kasan_check_range+0x100/0x1a8 [ 35.127190] __kasan_check_write+0x20/0x30 [ 35.128067] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 35.128888] kasan_bitops_generic+0x11c/0x1c8 [ 35.129762] kunit_try_run_case+0x14c/0x3d0 [ 35.130598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.131298] kthread+0x24c/0x2d0 [ 35.131877] ret_from_fork+0x10/0x20 [ 35.132601] [ 35.132906] Allocated by task 250: [ 35.133385] kasan_save_stack+0x3c/0x68 [ 35.134053] kasan_save_track+0x20/0x40 [ 35.134706] kasan_save_alloc_info+0x40/0x58 [ 35.135357] __kasan_kmalloc+0xd4/0xd8 [ 35.135909] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.136579] kasan_bitops_generic+0xa0/0x1c8 [ 35.137198] kunit_try_run_case+0x14c/0x3d0 [ 35.137823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.138571] kthread+0x24c/0x2d0 [ 35.139125] ret_from_fork+0x10/0x20 [ 35.139787] [ 35.140175] The buggy address belongs to the object at fff00000c5e082a0 [ 35.140175] which belongs to the cache kmalloc-16 of size 16 [ 35.141170] The buggy address is located 8 bytes inside of [ 35.141170] allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9) [ 35.142489] [ 35.142893] The buggy address belongs to the physical page: [ 35.143638] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 35.144615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.145295] page_type: f5(slab) [ 35.145888] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.146785] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 35.147751] page dumped because: kasan: bad access detected [ 35.148394] [ 35.148791] Memory state around the buggy address: [ 35.149454] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.150307] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.151222] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 35.152097] ^ [ 35.152806] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.153611] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.154386] ================================================================== [ 35.238410] ================================================================== [ 35.239196] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 35.240159] Read of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250 [ 35.241021] [ 35.241410] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.242632] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.243262] Hardware name: linux,dummy-virt (DT) [ 35.243961] Call trace: [ 35.244341] show_stack+0x20/0x38 (C) [ 35.245069] dump_stack_lvl+0x8c/0xd0 [ 35.245720] print_report+0x118/0x5e0 [ 35.246400] kasan_report+0xc8/0x118 [ 35.246991] __asan_report_load8_noabort+0x20/0x30 [ 35.247791] kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 35.248758] kasan_bitops_generic+0x11c/0x1c8 [ 35.249508] kunit_try_run_case+0x14c/0x3d0 [ 35.250110] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.250985] kthread+0x24c/0x2d0 [ 35.251560] ret_from_fork+0x10/0x20 [ 35.252223] [ 35.252625] Allocated by task 250: [ 35.253240] kasan_save_stack+0x3c/0x68 [ 35.253869] kasan_save_track+0x20/0x40 [ 35.254510] kasan_save_alloc_info+0x40/0x58 [ 35.255251] __kasan_kmalloc+0xd4/0xd8 [ 35.255857] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.256618] kasan_bitops_generic+0xa0/0x1c8 [ 35.257229] kunit_try_run_case+0x14c/0x3d0 [ 35.257959] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.258658] kthread+0x24c/0x2d0 [ 35.259268] ret_from_fork+0x10/0x20 [ 35.259877] [ 35.260298] The buggy address belongs to the object at fff00000c5e082a0 [ 35.260298] which belongs to the cache kmalloc-16 of size 16 [ 35.261509] The buggy address is located 8 bytes inside of [ 35.261509] allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9) [ 35.262849] [ 35.263271] The buggy address belongs to the physical page: [ 35.264011] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 35.265032] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.265928] page_type: f5(slab) [ 35.266484] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.267638] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 35.268479] page dumped because: kasan: bad access detected [ 35.269248] [ 35.269678] Memory state around the buggy address: [ 35.270303] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.271161] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.272042] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 35.272962] ^ [ 35.273564] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.274447] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.275328] ================================================================== [ 35.428598] ================================================================== [ 35.429350] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 35.430397] Read of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250 [ 35.431698] [ 35.432058] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.433100] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.434165] Hardware name: linux,dummy-virt (DT) [ 35.434821] Call trace: [ 35.435194] show_stack+0x20/0x38 (C) [ 35.435848] dump_stack_lvl+0x8c/0xd0 [ 35.436435] print_report+0x118/0x5e0 [ 35.437406] kasan_report+0xc8/0x118 [ 35.437928] __asan_report_load8_noabort+0x20/0x30 [ 35.438701] kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 35.439365] kasan_bitops_generic+0x11c/0x1c8 [ 35.440088] kunit_try_run_case+0x14c/0x3d0 [ 35.440775] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.441403] kthread+0x24c/0x2d0 [ 35.442016] ret_from_fork+0x10/0x20 [ 35.442666] [ 35.442983] Allocated by task 250: [ 35.443564] kasan_save_stack+0x3c/0x68 [ 35.444174] kasan_save_track+0x20/0x40 [ 35.444773] kasan_save_alloc_info+0x40/0x58 [ 35.445462] __kasan_kmalloc+0xd4/0xd8 [ 35.446008] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.446677] kasan_bitops_generic+0xa0/0x1c8 [ 35.447271] kunit_try_run_case+0x14c/0x3d0 [ 35.447952] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.448683] kthread+0x24c/0x2d0 [ 35.449303] ret_from_fork+0x10/0x20 [ 35.449936] [ 35.450307] The buggy address belongs to the object at fff00000c5e082a0 [ 35.450307] which belongs to the cache kmalloc-16 of size 16 [ 35.451486] The buggy address is located 8 bytes inside of [ 35.451486] allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9) [ 35.452944] [ 35.453310] The buggy address belongs to the physical page: [ 35.453987] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 35.454802] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.455703] page_type: f5(slab) [ 35.456213] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.457164] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 35.458049] page dumped because: kasan: bad access detected [ 35.458766] [ 35.459124] Memory state around the buggy address: [ 35.459742] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.460698] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.461436] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 35.462305] ^ [ 35.462903] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.463723] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.464609] ================================================================== [ 35.196426] ================================================================== [ 35.197781] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 35.199102] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250 [ 35.199950] [ 35.200357] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.202622] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.203131] Hardware name: linux,dummy-virt (DT) [ 35.203816] Call trace: [ 35.204251] show_stack+0x20/0x38 (C) [ 35.204871] dump_stack_lvl+0x8c/0xd0 [ 35.205508] print_report+0x118/0x5e0 [ 35.206192] kasan_report+0xc8/0x118 [ 35.206846] kasan_check_range+0x100/0x1a8 [ 35.207447] __kasan_check_write+0x20/0x30 [ 35.208158] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 35.209051] kasan_bitops_generic+0x11c/0x1c8 [ 35.209694] kunit_try_run_case+0x14c/0x3d0 [ 35.210257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.211078] kthread+0x24c/0x2d0 [ 35.211704] ret_from_fork+0x10/0x20 [ 35.212243] [ 35.212653] Allocated by task 250: [ 35.213196] kasan_save_stack+0x3c/0x68 [ 35.213736] kasan_save_track+0x20/0x40 [ 35.214357] kasan_save_alloc_info+0x40/0x58 [ 35.214968] __kasan_kmalloc+0xd4/0xd8 [ 35.215568] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.216278] kasan_bitops_generic+0xa0/0x1c8 [ 35.216932] kunit_try_run_case+0x14c/0x3d0 [ 35.217511] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.218316] kthread+0x24c/0x2d0 [ 35.218861] ret_from_fork+0x10/0x20 [ 35.219468] [ 35.219856] The buggy address belongs to the object at fff00000c5e082a0 [ 35.219856] which belongs to the cache kmalloc-16 of size 16 [ 35.221130] The buggy address is located 8 bytes inside of [ 35.221130] allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9) [ 35.222651] [ 35.223114] The buggy address belongs to the physical page: [ 35.224017] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 35.225032] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.225900] page_type: f5(slab) [ 35.226492] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.227505] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 35.228479] page dumped because: kasan: bad access detected [ 35.229215] [ 35.229650] Memory state around the buggy address: [ 35.230391] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.231424] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.232333] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 35.233125] ^ [ 35.233861] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.234663] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.235681] ================================================================== [ 35.276980] ================================================================== [ 35.278135] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 35.279131] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250 [ 35.280165] [ 35.280851] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.282656] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.283225] Hardware name: linux,dummy-virt (DT) [ 35.283862] Call trace: [ 35.284289] show_stack+0x20/0x38 (C) [ 35.285079] dump_stack_lvl+0x8c/0xd0 [ 35.285651] print_report+0x118/0x5e0 [ 35.286232] kasan_report+0xc8/0x118 [ 35.286842] kasan_check_range+0x100/0x1a8 [ 35.287465] __kasan_check_write+0x20/0x30 [ 35.288104] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 35.288876] kasan_bitops_generic+0x11c/0x1c8 [ 35.289607] kunit_try_run_case+0x14c/0x3d0 [ 35.290229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.291062] kthread+0x24c/0x2d0 [ 35.291626] ret_from_fork+0x10/0x20 [ 35.292214] [ 35.292575] Allocated by task 250: [ 35.293143] kasan_save_stack+0x3c/0x68 [ 35.293744] kasan_save_track+0x20/0x40 [ 35.294379] kasan_save_alloc_info+0x40/0x58 [ 35.294996] __kasan_kmalloc+0xd4/0xd8 [ 35.295481] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.296214] kasan_bitops_generic+0xa0/0x1c8 [ 35.296763] kunit_try_run_case+0x14c/0x3d0 [ 35.297430] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.298075] kthread+0x24c/0x2d0 [ 35.298669] ret_from_fork+0x10/0x20 [ 35.299185] [ 35.299584] The buggy address belongs to the object at fff00000c5e082a0 [ 35.299584] which belongs to the cache kmalloc-16 of size 16 [ 35.300745] The buggy address is located 8 bytes inside of [ 35.300745] allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9) [ 35.302183] [ 35.302550] The buggy address belongs to the physical page: [ 35.303313] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 35.304173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.305053] page_type: f5(slab) [ 35.305651] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.306594] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 35.307391] page dumped because: kasan: bad access detected [ 35.308106] [ 35.308485] Memory state around the buggy address: [ 35.309119] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.310001] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.310895] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 35.311697] ^ [ 35.312376] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.313153] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.313981] ================================================================== [ 35.315457] ================================================================== [ 35.316132] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 35.317120] Read of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250 [ 35.318118] [ 35.318496] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.319593] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.320144] Hardware name: linux,dummy-virt (DT) [ 35.320770] Call trace: [ 35.321244] show_stack+0x20/0x38 (C) [ 35.321915] dump_stack_lvl+0x8c/0xd0 [ 35.322478] print_report+0x118/0x5e0 [ 35.323138] kasan_report+0xc8/0x118 [ 35.323726] __asan_report_load8_noabort+0x20/0x30 [ 35.324399] kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 35.325287] kasan_bitops_generic+0x11c/0x1c8 [ 35.326017] kunit_try_run_case+0x14c/0x3d0 [ 35.326718] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.327547] kthread+0x24c/0x2d0 [ 35.328140] ret_from_fork+0x10/0x20 [ 35.328803] [ 35.329163] Allocated by task 250: [ 35.329677] kasan_save_stack+0x3c/0x68 [ 35.330301] kasan_save_track+0x20/0x40 [ 35.330810] kasan_save_alloc_info+0x40/0x58 [ 35.331476] __kasan_kmalloc+0xd4/0xd8 [ 35.332157] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.332795] kasan_bitops_generic+0xa0/0x1c8 [ 35.333393] kunit_try_run_case+0x14c/0x3d0 [ 35.334096] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.334894] kthread+0x24c/0x2d0 [ 35.335483] ret_from_fork+0x10/0x20 [ 35.336120] [ 35.336448] The buggy address belongs to the object at fff00000c5e082a0 [ 35.336448] which belongs to the cache kmalloc-16 of size 16 [ 35.337643] The buggy address is located 8 bytes inside of [ 35.337643] allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9) [ 35.338952] [ 35.339273] The buggy address belongs to the physical page: [ 35.340056] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 35.341095] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.341898] page_type: f5(slab) [ 35.342433] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.343339] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 35.344323] page dumped because: kasan: bad access detected [ 35.344897] [ 35.345274] Memory state around the buggy address: [ 35.345995] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.346798] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.347726] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 35.348453] ^ [ 35.349175] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.350026] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.350778] ================================================================== [ 35.352073] ================================================================== [ 35.353661] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 35.354556] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250 [ 35.355443] [ 35.355806] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.356939] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.357577] Hardware name: linux,dummy-virt (DT) [ 35.358152] Call trace: [ 35.358646] show_stack+0x20/0x38 (C) [ 35.359289] dump_stack_lvl+0x8c/0xd0 [ 35.359887] print_report+0x118/0x5e0 [ 35.360555] kasan_report+0xc8/0x118 [ 35.361147] kasan_check_range+0x100/0x1a8 [ 35.361852] __kasan_check_write+0x20/0x30 [ 35.362394] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 35.363256] kasan_bitops_generic+0x11c/0x1c8 [ 35.363988] kunit_try_run_case+0x14c/0x3d0 [ 35.364565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.365381] kthread+0x24c/0x2d0 [ 35.365906] ret_from_fork+0x10/0x20 [ 35.366586] [ 35.366958] Allocated by task 250: [ 35.367544] kasan_save_stack+0x3c/0x68 [ 35.368189] kasan_save_track+0x20/0x40 [ 35.368718] kasan_save_alloc_info+0x40/0x58 [ 35.369390] __kasan_kmalloc+0xd4/0xd8 [ 35.369944] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.370662] kasan_bitops_generic+0xa0/0x1c8 [ 35.371249] kunit_try_run_case+0x14c/0x3d0 [ 35.371943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.372605] kthread+0x24c/0x2d0 [ 35.373181] ret_from_fork+0x10/0x20 [ 35.373769] [ 35.374136] The buggy address belongs to the object at fff00000c5e082a0 [ 35.374136] which belongs to the cache kmalloc-16 of size 16 [ 35.375371] The buggy address is located 8 bytes inside of [ 35.375371] allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9) [ 35.376597] [ 35.376990] The buggy address belongs to the physical page: [ 35.377611] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 35.378644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.379287] page_type: f5(slab) [ 35.379886] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.380901] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 35.381626] page dumped because: kasan: bad access detected [ 35.382380] [ 35.382775] Memory state around the buggy address: [ 35.383300] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.384240] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.384923] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 35.385850] ^ [ 35.386481] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.387450] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.388283] ================================================================== [ 35.390696] ================================================================== [ 35.391598] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 35.392516] Read of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250 [ 35.393269] [ 35.393668] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.394967] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.395587] Hardware name: linux,dummy-virt (DT) [ 35.396286] Call trace: [ 35.396754] show_stack+0x20/0x38 (C) [ 35.397396] dump_stack_lvl+0x8c/0xd0 [ 35.397922] print_report+0x118/0x5e0 [ 35.398579] kasan_report+0xc8/0x118 [ 35.399167] __asan_report_load8_noabort+0x20/0x30 [ 35.399830] kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 35.400723] kasan_bitops_generic+0x11c/0x1c8 [ 35.401405] kunit_try_run_case+0x14c/0x3d0 [ 35.402002] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.402830] kthread+0x24c/0x2d0 [ 35.403448] ret_from_fork+0x10/0x20 [ 35.404113] [ 35.404492] Allocated by task 250: [ 35.405048] kasan_save_stack+0x3c/0x68 [ 35.405666] kasan_save_track+0x20/0x40 [ 35.406313] kasan_save_alloc_info+0x40/0x58 [ 35.407010] __kasan_kmalloc+0xd4/0xd8 [ 35.407612] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.408229] kasan_bitops_generic+0xa0/0x1c8 [ 35.408941] kunit_try_run_case+0x14c/0x3d0 [ 35.409635] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.410335] kthread+0x24c/0x2d0 [ 35.410942] ret_from_fork+0x10/0x20 [ 35.411574] [ 35.411916] The buggy address belongs to the object at fff00000c5e082a0 [ 35.411916] which belongs to the cache kmalloc-16 of size 16 [ 35.413084] The buggy address is located 8 bytes inside of [ 35.413084] allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9) [ 35.414364] [ 35.414744] The buggy address belongs to the physical page: [ 35.415508] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 35.417043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.417839] page_type: f5(slab) [ 35.418400] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.419211] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 35.420062] page dumped because: kasan: bad access detected [ 35.420847] [ 35.421162] Memory state around the buggy address: [ 35.421821] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.422635] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.423474] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 35.424322] ^ [ 35.424847] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.425778] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.426624] ================================================================== [ 35.157714] ================================================================== [ 35.158773] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 35.159823] Read of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250 [ 35.160584] [ 35.161088] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.162485] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.163134] Hardware name: linux,dummy-virt (DT) [ 35.163848] Call trace: [ 35.165338] show_stack+0x20/0x38 (C) [ 35.165874] dump_stack_lvl+0x8c/0xd0 [ 35.166378] print_report+0x118/0x5e0 [ 35.167036] kasan_report+0xc8/0x118 [ 35.167615] __asan_report_load8_noabort+0x20/0x30 [ 35.168304] kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 35.169173] kasan_bitops_generic+0x11c/0x1c8 [ 35.169878] kunit_try_run_case+0x14c/0x3d0 [ 35.170478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.171160] kthread+0x24c/0x2d0 [ 35.171772] ret_from_fork+0x10/0x20 [ 35.172412] [ 35.172749] Allocated by task 250: [ 35.173310] kasan_save_stack+0x3c/0x68 [ 35.173966] kasan_save_track+0x20/0x40 [ 35.174562] kasan_save_alloc_info+0x40/0x58 [ 35.175091] __kasan_kmalloc+0xd4/0xd8 [ 35.175732] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.176441] kasan_bitops_generic+0xa0/0x1c8 [ 35.177058] kunit_try_run_case+0x14c/0x3d0 [ 35.177591] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.178375] kthread+0x24c/0x2d0 [ 35.178973] ret_from_fork+0x10/0x20 [ 35.179457] [ 35.179858] The buggy address belongs to the object at fff00000c5e082a0 [ 35.179858] which belongs to the cache kmalloc-16 of size 16 [ 35.181102] The buggy address is located 8 bytes inside of [ 35.181102] allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9) [ 35.182401] [ 35.182803] The buggy address belongs to the physical page: [ 35.183579] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 35.184412] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.185270] page_type: f5(slab) [ 35.185849] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.186721] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 35.187723] page dumped because: kasan: bad access detected [ 35.188486] [ 35.188845] Memory state around the buggy address: [ 35.189890] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.190773] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.191575] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 35.192387] ^ [ 35.193015] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.193957] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.194672] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 34.750583] ================================================================== [ 34.751343] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 34.752164] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250 [ 34.753041] [ 34.753450] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.754563] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.755108] Hardware name: linux,dummy-virt (DT) [ 34.757245] Call trace: [ 34.757716] show_stack+0x20/0x38 (C) [ 34.758602] dump_stack_lvl+0x8c/0xd0 [ 34.759180] print_report+0x118/0x5e0 [ 34.759856] kasan_report+0xc8/0x118 [ 34.760496] kasan_check_range+0x100/0x1a8 [ 34.761384] __kasan_check_write+0x20/0x30 [ 34.763031] kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 34.763761] kasan_bitops_generic+0x110/0x1c8 [ 34.764610] kunit_try_run_case+0x14c/0x3d0 [ 34.765257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.766024] kthread+0x24c/0x2d0 [ 34.766644] ret_from_fork+0x10/0x20 [ 34.767268] [ 34.768271] Allocated by task 250: [ 34.768864] kasan_save_stack+0x3c/0x68 [ 34.769435] kasan_save_track+0x20/0x40 [ 34.771081] kasan_save_alloc_info+0x40/0x58 [ 34.771634] __kasan_kmalloc+0xd4/0xd8 [ 34.772267] __kmalloc_cache_noprof+0x15c/0x3c8 [ 34.773042] kasan_bitops_generic+0xa0/0x1c8 [ 34.773859] kunit_try_run_case+0x14c/0x3d0 [ 34.774442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.775227] kthread+0x24c/0x2d0 [ 34.775773] ret_from_fork+0x10/0x20 [ 34.776273] [ 34.777194] The buggy address belongs to the object at fff00000c5e082a0 [ 34.777194] which belongs to the cache kmalloc-16 of size 16 [ 34.779069] The buggy address is located 8 bytes inside of [ 34.779069] allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9) [ 34.780012] [ 34.780236] The buggy address belongs to the physical page: [ 34.780594] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 34.781331] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.782845] page_type: f5(slab) [ 34.783429] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.784346] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.785274] page dumped because: kasan: bad access detected [ 34.786038] [ 34.786365] Memory state around the buggy address: [ 34.787916] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.789237] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.790088] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.791016] ^ [ 34.791717] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.792712] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.793705] ================================================================== [ 34.795596] ================================================================== [ 34.796306] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 34.797309] Read of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250 [ 34.799103] [ 34.799448] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.800671] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.801297] Hardware name: linux,dummy-virt (DT) [ 34.801918] Call trace: [ 34.803111] show_stack+0x20/0x38 (C) [ 34.803777] dump_stack_lvl+0x8c/0xd0 [ 34.804276] print_report+0x118/0x5e0 [ 34.804805] kasan_report+0xc8/0x118 [ 34.805456] __asan_report_load8_noabort+0x20/0x30 [ 34.806193] kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 34.807047] kasan_bitops_generic+0x110/0x1c8 [ 34.807799] kunit_try_run_case+0x14c/0x3d0 [ 34.808565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.809336] kthread+0x24c/0x2d0 [ 34.810188] ret_from_fork+0x10/0x20 [ 34.811732] [ 34.812546] Allocated by task 250: [ 34.813020] kasan_save_stack+0x3c/0x68 [ 34.813638] kasan_save_track+0x20/0x40 [ 34.814691] kasan_save_alloc_info+0x40/0x58 [ 34.815263] __kasan_kmalloc+0xd4/0xd8 [ 34.815958] __kmalloc_cache_noprof+0x15c/0x3c8 [ 34.816651] kasan_bitops_generic+0xa0/0x1c8 [ 34.817268] kunit_try_run_case+0x14c/0x3d0 [ 34.818091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.819026] kthread+0x24c/0x2d0 [ 34.819461] ret_from_fork+0x10/0x20 [ 34.820471] [ 34.820876] The buggy address belongs to the object at fff00000c5e082a0 [ 34.820876] which belongs to the cache kmalloc-16 of size 16 [ 34.822670] The buggy address is located 8 bytes inside of [ 34.822670] allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9) [ 34.823980] [ 34.824409] The buggy address belongs to the physical page: [ 34.825049] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 34.826594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.827204] page_type: f5(slab) [ 34.827787] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.828812] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.829905] page dumped because: kasan: bad access detected [ 34.830728] [ 34.831112] Memory state around the buggy address: [ 34.831831] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.833322] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.834644] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.835267] ^ [ 34.835982] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.837161] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.837952] ================================================================== [ 34.704954] ================================================================== [ 34.705678] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 34.707820] Read of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250 [ 34.708699] [ 34.709152] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.710825] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.711491] Hardware name: linux,dummy-virt (DT) [ 34.712225] Call trace: [ 34.712716] show_stack+0x20/0x38 (C) [ 34.713304] dump_stack_lvl+0x8c/0xd0 [ 34.714107] print_report+0x118/0x5e0 [ 34.714582] kasan_report+0xc8/0x118 [ 34.715045] __asan_report_load8_noabort+0x20/0x30 [ 34.716457] kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 34.717242] kasan_bitops_generic+0x110/0x1c8 [ 34.717971] kunit_try_run_case+0x14c/0x3d0 [ 34.718691] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.719591] kthread+0x24c/0x2d0 [ 34.720748] ret_from_fork+0x10/0x20 [ 34.721278] [ 34.721674] Allocated by task 250: [ 34.722244] kasan_save_stack+0x3c/0x68 [ 34.722921] kasan_save_track+0x20/0x40 [ 34.723467] kasan_save_alloc_info+0x40/0x58 [ 34.724163] __kasan_kmalloc+0xd4/0xd8 [ 34.725746] __kmalloc_cache_noprof+0x15c/0x3c8 [ 34.726364] kasan_bitops_generic+0xa0/0x1c8 [ 34.726950] kunit_try_run_case+0x14c/0x3d0 [ 34.728043] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.729164] kthread+0x24c/0x2d0 [ 34.730353] ret_from_fork+0x10/0x20 [ 34.730935] [ 34.731228] The buggy address belongs to the object at fff00000c5e082a0 [ 34.731228] which belongs to the cache kmalloc-16 of size 16 [ 34.732736] The buggy address is located 8 bytes inside of [ 34.732736] allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9) [ 34.733898] [ 34.734799] The buggy address belongs to the physical page: [ 34.735616] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 34.736731] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.737760] page_type: f5(slab) [ 34.738670] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.739685] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.740944] page dumped because: kasan: bad access detected [ 34.741261] [ 34.741423] Memory state around the buggy address: [ 34.741872] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.743215] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.744188] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.745215] ^ [ 34.746393] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.747922] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.748790] ================================================================== [ 34.890004] ================================================================== [ 34.890867] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 34.891784] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250 [ 34.893249] [ 34.894787] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.895870] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.896734] Hardware name: linux,dummy-virt (DT) [ 34.897413] Call trace: [ 34.898203] show_stack+0x20/0x38 (C) [ 34.898844] dump_stack_lvl+0x8c/0xd0 [ 34.899434] print_report+0x118/0x5e0 [ 34.900213] kasan_report+0xc8/0x118 [ 34.900839] kasan_check_range+0x100/0x1a8 [ 34.901483] __kasan_check_write+0x20/0x30 [ 34.902900] kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 34.903889] kasan_bitops_generic+0x110/0x1c8 [ 34.904626] kunit_try_run_case+0x14c/0x3d0 [ 34.905337] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.906410] kthread+0x24c/0x2d0 [ 34.907268] ret_from_fork+0x10/0x20 [ 34.907913] [ 34.908321] Allocated by task 250: [ 34.908858] kasan_save_stack+0x3c/0x68 [ 34.909491] kasan_save_track+0x20/0x40 [ 34.910092] kasan_save_alloc_info+0x40/0x58 [ 34.911777] __kasan_kmalloc+0xd4/0xd8 [ 34.912346] __kmalloc_cache_noprof+0x15c/0x3c8 [ 34.913090] kasan_bitops_generic+0xa0/0x1c8 [ 34.914366] kunit_try_run_case+0x14c/0x3d0 [ 34.915284] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.916175] kthread+0x24c/0x2d0 [ 34.916843] ret_from_fork+0x10/0x20 [ 34.917497] [ 34.917948] The buggy address belongs to the object at fff00000c5e082a0 [ 34.917948] which belongs to the cache kmalloc-16 of size 16 [ 34.919488] The buggy address is located 8 bytes inside of [ 34.919488] allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9) [ 34.921490] [ 34.921906] The buggy address belongs to the physical page: [ 34.922644] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 34.923835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.925099] page_type: f5(slab) [ 34.925924] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.927463] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.928558] page dumped because: kasan: bad access detected [ 34.929255] [ 34.929685] Memory state around the buggy address: [ 34.930337] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.931032] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.932389] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.933225] ^ [ 34.934072] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.934908] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.935797] ================================================================== [ 34.937736] ================================================================== [ 34.938663] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 34.940163] Read of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250 [ 34.941216] [ 34.941919] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.944050] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.944718] Hardware name: linux,dummy-virt (DT) [ 34.945264] Call trace: [ 34.945837] show_stack+0x20/0x38 (C) [ 34.946556] dump_stack_lvl+0x8c/0xd0 [ 34.947617] print_report+0x118/0x5e0 [ 34.948185] kasan_report+0xc8/0x118 [ 34.948894] __asan_report_load8_noabort+0x20/0x30 [ 34.949975] kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 34.951198] kasan_bitops_generic+0x110/0x1c8 [ 34.951910] kunit_try_run_case+0x14c/0x3d0 [ 34.952719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.953768] kthread+0x24c/0x2d0 [ 34.954513] ret_from_fork+0x10/0x20 [ 34.955120] [ 34.955556] Allocated by task 250: [ 34.956084] kasan_save_stack+0x3c/0x68 [ 34.956794] kasan_save_track+0x20/0x40 [ 34.957450] kasan_save_alloc_info+0x40/0x58 [ 34.958381] __kasan_kmalloc+0xd4/0xd8 [ 34.959096] __kmalloc_cache_noprof+0x15c/0x3c8 [ 34.960862] kasan_bitops_generic+0xa0/0x1c8 [ 34.961395] kunit_try_run_case+0x14c/0x3d0 [ 34.962412] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.963215] kthread+0x24c/0x2d0 [ 34.963798] ret_from_fork+0x10/0x20 [ 34.964423] [ 34.964866] The buggy address belongs to the object at fff00000c5e082a0 [ 34.964866] which belongs to the cache kmalloc-16 of size 16 [ 34.966325] The buggy address is located 8 bytes inside of [ 34.966325] allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9) [ 34.968135] [ 34.969033] The buggy address belongs to the physical page: [ 34.970111] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 34.971133] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.972050] page_type: f5(slab) [ 34.972618] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.973550] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.974347] page dumped because: kasan: bad access detected [ 34.975804] [ 34.976177] Memory state around the buggy address: [ 34.976903] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.978714] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.979444] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.980295] ^ [ 34.981022] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.982039] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.983045] ================================================================== [ 34.984377] ================================================================== [ 34.985304] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 34.986878] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250 [ 34.987517] [ 34.987908] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.988842] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.989479] Hardware name: linux,dummy-virt (DT) [ 34.990860] Call trace: [ 34.991431] show_stack+0x20/0x38 (C) [ 34.992234] dump_stack_lvl+0x8c/0xd0 [ 34.993088] print_report+0x118/0x5e0 [ 34.994104] kasan_report+0xc8/0x118 [ 34.995468] kasan_check_range+0x100/0x1a8 [ 34.996336] __kasan_check_write+0x20/0x30 [ 34.997064] kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 34.998309] kasan_bitops_generic+0x110/0x1c8 [ 34.999094] kunit_try_run_case+0x14c/0x3d0 [ 34.999836] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.000632] kthread+0x24c/0x2d0 [ 35.001159] ret_from_fork+0x10/0x20 [ 35.002779] [ 35.003134] Allocated by task 250: [ 35.003547] kasan_save_stack+0x3c/0x68 [ 35.004272] kasan_save_track+0x20/0x40 [ 35.004978] kasan_save_alloc_info+0x40/0x58 [ 35.005553] __kasan_kmalloc+0xd4/0xd8 [ 35.006178] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.007371] kasan_bitops_generic+0xa0/0x1c8 [ 35.008097] kunit_try_run_case+0x14c/0x3d0 [ 35.008710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.009594] kthread+0x24c/0x2d0 [ 35.010241] ret_from_fork+0x10/0x20 [ 35.010884] [ 35.011663] The buggy address belongs to the object at fff00000c5e082a0 [ 35.011663] which belongs to the cache kmalloc-16 of size 16 [ 35.013286] The buggy address is located 8 bytes inside of [ 35.013286] allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9) [ 35.014980] [ 35.015293] The buggy address belongs to the physical page: [ 35.016064] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 35.017134] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.018279] page_type: f5(slab) [ 35.018845] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.019750] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 35.021308] page dumped because: kasan: bad access detected [ 35.022691] [ 35.023060] Memory state around the buggy address: [ 35.023841] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.024880] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.025853] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 35.026461] ^ [ 35.027030] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.028318] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.029871] ================================================================== [ 35.031608] ================================================================== [ 35.032623] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 35.033712] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250 [ 35.034982] [ 35.035642] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.036590] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.037273] Hardware name: linux,dummy-virt (DT) [ 35.038044] Call trace: [ 35.038517] show_stack+0x20/0x38 (C) [ 35.039274] dump_stack_lvl+0x8c/0xd0 [ 35.039653] print_report+0x118/0x5e0 [ 35.040039] kasan_report+0xc8/0x118 [ 35.040727] kasan_check_range+0x100/0x1a8 [ 35.041506] __kasan_check_write+0x20/0x30 [ 35.042243] kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 35.043792] kasan_bitops_generic+0x110/0x1c8 [ 35.044415] kunit_try_run_case+0x14c/0x3d0 [ 35.045183] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.046334] kthread+0x24c/0x2d0 [ 35.046880] ret_from_fork+0x10/0x20 [ 35.047597] [ 35.047968] Allocated by task 250: [ 35.048491] kasan_save_stack+0x3c/0x68 [ 35.049173] kasan_save_track+0x20/0x40 [ 35.050478] kasan_save_alloc_info+0x40/0x58 [ 35.051089] __kasan_kmalloc+0xd4/0xd8 [ 35.051563] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.052277] kasan_bitops_generic+0xa0/0x1c8 [ 35.053364] kunit_try_run_case+0x14c/0x3d0 [ 35.054547] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.055440] kthread+0x24c/0x2d0 [ 35.055949] ret_from_fork+0x10/0x20 [ 35.056471] [ 35.056929] The buggy address belongs to the object at fff00000c5e082a0 [ 35.056929] which belongs to the cache kmalloc-16 of size 16 [ 35.058210] The buggy address is located 8 bytes inside of [ 35.058210] allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9) [ 35.060646] [ 35.061041] The buggy address belongs to the physical page: [ 35.062109] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 35.063209] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.064160] page_type: f5(slab) [ 35.064731] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.065680] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 35.067016] page dumped because: kasan: bad access detected [ 35.067796] [ 35.068173] Memory state around the buggy address: [ 35.068805] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.069734] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.070564] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 35.071325] ^ [ 35.072104] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.073015] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.073982] ================================================================== [ 35.076094] ================================================================== [ 35.078183] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 35.079275] Read of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250 [ 35.080704] [ 35.081115] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.082890] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.083440] Hardware name: linux,dummy-virt (DT) [ 35.084512] Call trace: [ 35.085240] show_stack+0x20/0x38 (C) [ 35.085866] dump_stack_lvl+0x8c/0xd0 [ 35.086635] print_report+0x118/0x5e0 [ 35.087392] kasan_report+0xc8/0x118 [ 35.088139] __asan_report_load8_noabort+0x20/0x30 [ 35.089083] kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 35.089885] kasan_bitops_generic+0x110/0x1c8 [ 35.090632] kunit_try_run_case+0x14c/0x3d0 [ 35.091309] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.092050] kthread+0x24c/0x2d0 [ 35.092600] ret_from_fork+0x10/0x20 [ 35.093176] [ 35.093572] Allocated by task 250: [ 35.094105] kasan_save_stack+0x3c/0x68 [ 35.094757] kasan_save_track+0x20/0x40 [ 35.095393] kasan_save_alloc_info+0x40/0x58 [ 35.096096] __kasan_kmalloc+0xd4/0xd8 [ 35.096695] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.097262] kasan_bitops_generic+0xa0/0x1c8 [ 35.097951] kunit_try_run_case+0x14c/0x3d0 [ 35.098628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.099396] kthread+0x24c/0x2d0 [ 35.099998] ret_from_fork+0x10/0x20 [ 35.100629] [ 35.101013] The buggy address belongs to the object at fff00000c5e082a0 [ 35.101013] which belongs to the cache kmalloc-16 of size 16 [ 35.102233] The buggy address is located 8 bytes inside of [ 35.102233] allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9) [ 35.103449] [ 35.103858] The buggy address belongs to the physical page: [ 35.104633] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 35.105415] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.106335] page_type: f5(slab) [ 35.106868] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.107790] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 35.108615] page dumped because: kasan: bad access detected [ 35.109354] [ 35.109758] Memory state around the buggy address: [ 35.110452] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.111159] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.112102] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 35.112915] ^ [ 35.113594] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.114391] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.115315] ================================================================== [ 34.840451] ================================================================== [ 34.841798] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 34.843016] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250 [ 34.843757] [ 34.844077] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.845267] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.846902] Hardware name: linux,dummy-virt (DT) [ 34.847727] Call trace: [ 34.848219] show_stack+0x20/0x38 (C) [ 34.848943] dump_stack_lvl+0x8c/0xd0 [ 34.849788] print_report+0x118/0x5e0 [ 34.850412] kasan_report+0xc8/0x118 [ 34.851080] kasan_check_range+0x100/0x1a8 [ 34.851772] __kasan_check_write+0x20/0x30 [ 34.852484] kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 34.853419] kasan_bitops_generic+0x110/0x1c8 [ 34.854628] kunit_try_run_case+0x14c/0x3d0 [ 34.855157] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.855931] kthread+0x24c/0x2d0 [ 34.856463] ret_from_fork+0x10/0x20 [ 34.857091] [ 34.857412] Allocated by task 250: [ 34.858567] kasan_save_stack+0x3c/0x68 [ 34.859202] kasan_save_track+0x20/0x40 [ 34.859794] kasan_save_alloc_info+0x40/0x58 [ 34.860421] __kasan_kmalloc+0xd4/0xd8 [ 34.861412] __kmalloc_cache_noprof+0x15c/0x3c8 [ 34.862457] kasan_bitops_generic+0xa0/0x1c8 [ 34.863450] kunit_try_run_case+0x14c/0x3d0 [ 34.864323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.865356] kthread+0x24c/0x2d0 [ 34.866381] ret_from_fork+0x10/0x20 [ 34.866938] [ 34.867316] The buggy address belongs to the object at fff00000c5e082a0 [ 34.867316] which belongs to the cache kmalloc-16 of size 16 [ 34.868593] The buggy address is located 8 bytes inside of [ 34.868593] allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9) [ 34.869862] [ 34.870671] The buggy address belongs to the physical page: [ 34.871613] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 34.872289] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.873025] page_type: f5(slab) [ 34.873624] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.875099] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.876007] page dumped because: kasan: bad access detected [ 34.876694] [ 34.877057] Memory state around the buggy address: [ 34.877766] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.878704] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.880449] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.881264] ^ [ 34.881904] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.882699] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.884158] ================================================================== [ 34.660042] ================================================================== [ 34.661140] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 34.662108] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250 [ 34.662703] [ 34.663121] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.664446] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.665934] Hardware name: linux,dummy-virt (DT) [ 34.666752] Call trace: [ 34.667349] show_stack+0x20/0x38 (C) [ 34.668085] dump_stack_lvl+0x8c/0xd0 [ 34.668861] print_report+0x118/0x5e0 [ 34.669619] kasan_report+0xc8/0x118 [ 34.670640] kasan_check_range+0x100/0x1a8 [ 34.671486] __kasan_check_write+0x20/0x30 [ 34.672035] kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 34.672916] kasan_bitops_generic+0x110/0x1c8 [ 34.673763] kunit_try_run_case+0x14c/0x3d0 [ 34.674950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.675801] kthread+0x24c/0x2d0 [ 34.676177] ret_from_fork+0x10/0x20 [ 34.676752] [ 34.677137] Allocated by task 250: [ 34.678189] kasan_save_stack+0x3c/0x68 [ 34.678746] kasan_save_track+0x20/0x40 [ 34.679326] kasan_save_alloc_info+0x40/0x58 [ 34.679947] __kasan_kmalloc+0xd4/0xd8 [ 34.680492] __kmalloc_cache_noprof+0x15c/0x3c8 [ 34.681141] kasan_bitops_generic+0xa0/0x1c8 [ 34.681708] kunit_try_run_case+0x14c/0x3d0 [ 34.682371] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.683292] kthread+0x24c/0x2d0 [ 34.683895] ret_from_fork+0x10/0x20 [ 34.684472] [ 34.686090] The buggy address belongs to the object at fff00000c5e082a0 [ 34.686090] which belongs to the cache kmalloc-16 of size 16 [ 34.687334] The buggy address is located 8 bytes inside of [ 34.687334] allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9) [ 34.688681] [ 34.689135] The buggy address belongs to the physical page: [ 34.690120] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 34.691163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.692323] page_type: f5(slab) [ 34.692971] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.694246] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.695375] page dumped because: kasan: bad access detected [ 34.696012] [ 34.696429] Memory state around the buggy address: [ 34.697169] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.698854] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.699686] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.700625] ^ [ 34.701346] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.702491] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.703339] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 34.606267] ================================================================== [ 34.607455] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 34.608235] Read of size 1 at addr fff00000c5ec1d10 by task kunit_try_catch/248 [ 34.608931] [ 34.609374] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.610667] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.611143] Hardware name: linux,dummy-virt (DT) [ 34.611835] Call trace: [ 34.612298] show_stack+0x20/0x38 (C) [ 34.612834] dump_stack_lvl+0x8c/0xd0 [ 34.613492] print_report+0x118/0x5e0 [ 34.614120] kasan_report+0xc8/0x118 [ 34.614666] __asan_report_load1_noabort+0x20/0x30 [ 34.615430] strnlen+0x80/0x88 [ 34.616011] kasan_strings+0x380/0x8f8 [ 34.616685] kunit_try_run_case+0x14c/0x3d0 [ 34.617346] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.618003] kthread+0x24c/0x2d0 [ 34.618624] ret_from_fork+0x10/0x20 [ 34.619284] [ 34.619685] Allocated by task 248: [ 34.620247] kasan_save_stack+0x3c/0x68 [ 34.620835] kasan_save_track+0x20/0x40 [ 34.621413] kasan_save_alloc_info+0x40/0x58 [ 34.622108] __kasan_kmalloc+0xd4/0xd8 [ 34.622750] __kmalloc_cache_noprof+0x15c/0x3c8 [ 34.623282] kasan_strings+0xb4/0x8f8 [ 34.623928] kunit_try_run_case+0x14c/0x3d0 [ 34.624583] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.625366] kthread+0x24c/0x2d0 [ 34.625841] ret_from_fork+0x10/0x20 [ 34.626450] [ 34.626844] Freed by task 248: [ 34.627316] kasan_save_stack+0x3c/0x68 [ 34.627855] kasan_save_track+0x20/0x40 [ 34.628503] kasan_save_free_info+0x4c/0x78 [ 34.629374] __kasan_slab_free+0x6c/0x98 [ 34.629897] kfree+0x114/0x3d0 [ 34.630456] kasan_strings+0x128/0x8f8 [ 34.631085] kunit_try_run_case+0x14c/0x3d0 [ 34.631776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.632500] kthread+0x24c/0x2d0 [ 34.633093] ret_from_fork+0x10/0x20 [ 34.633638] [ 34.634006] The buggy address belongs to the object at fff00000c5ec1d00 [ 34.634006] which belongs to the cache kmalloc-32 of size 32 [ 34.635272] The buggy address is located 16 bytes inside of [ 34.635272] freed 32-byte region [fff00000c5ec1d00, fff00000c5ec1d20) [ 34.636581] [ 34.636968] The buggy address belongs to the physical page: [ 34.637672] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ec1 [ 34.638627] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.639376] page_type: f5(slab) [ 34.639966] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 34.640934] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 34.641819] page dumped because: kasan: bad access detected [ 34.642513] [ 34.642903] Memory state around the buggy address: [ 34.643583] fff00000c5ec1c00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 34.644379] fff00000c5ec1c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 34.645252] >fff00000c5ec1d00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 34.646120] ^ [ 34.646738] fff00000c5ec1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.647498] fff00000c5ec1e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.648368] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[ 34.558907] ================================================================== [ 34.559605] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 34.560470] Read of size 1 at addr fff00000c5ec1d10 by task kunit_try_catch/248 [ 34.561430] [ 34.561823] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.562828] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.563447] Hardware name: linux,dummy-virt (DT) [ 34.564823] Call trace: [ 34.565263] show_stack+0x20/0x38 (C) [ 34.566170] dump_stack_lvl+0x8c/0xd0 [ 34.566851] print_report+0x118/0x5e0 [ 34.567498] kasan_report+0xc8/0x118 [ 34.568164] __asan_report_load1_noabort+0x20/0x30 [ 34.568899] strlen+0xa8/0xb0 [ 34.569517] kasan_strings+0x320/0x8f8 [ 34.570491] kunit_try_run_case+0x14c/0x3d0 [ 34.571188] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.571933] kthread+0x24c/0x2d0 [ 34.572491] ret_from_fork+0x10/0x20 [ 34.573028] [ 34.573397] Allocated by task 248: [ 34.574277] kasan_save_stack+0x3c/0x68 [ 34.574798] kasan_save_track+0x20/0x40 [ 34.575448] kasan_save_alloc_info+0x40/0x58 [ 34.576145] __kasan_kmalloc+0xd4/0xd8 [ 34.576798] __kmalloc_cache_noprof+0x15c/0x3c8 [ 34.577440] kasan_strings+0xb4/0x8f8 [ 34.578371] kunit_try_run_case+0x14c/0x3d0 [ 34.579041] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.579748] kthread+0x24c/0x2d0 [ 34.580347] ret_from_fork+0x10/0x20 [ 34.580981] [ 34.581329] Freed by task 248: [ 34.582917] kasan_save_stack+0x3c/0x68 [ 34.583442] kasan_save_track+0x20/0x40 [ 34.584090] kasan_save_free_info+0x4c/0x78 [ 34.584714] __kasan_slab_free+0x6c/0x98 [ 34.585221] kfree+0x114/0x3d0 [ 34.585792] kasan_strings+0x128/0x8f8 [ 34.586412] kunit_try_run_case+0x14c/0x3d0 [ 34.587015] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.587725] kthread+0x24c/0x2d0 [ 34.588318] ret_from_fork+0x10/0x20 [ 34.588948] [ 34.589356] The buggy address belongs to the object at fff00000c5ec1d00 [ 34.589356] which belongs to the cache kmalloc-32 of size 32 [ 34.590581] The buggy address is located 16 bytes inside of [ 34.590581] freed 32-byte region [fff00000c5ec1d00, fff00000c5ec1d20) [ 34.591810] [ 34.592169] The buggy address belongs to the physical page: [ 34.592935] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ec1 [ 34.593816] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.594715] page_type: f5(slab) [ 34.595183] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 34.596063] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 34.596938] page dumped because: kasan: bad access detected [ 34.597596] [ 34.597974] Memory state around the buggy address: [ 34.598656] fff00000c5ec1c00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 34.599481] fff00000c5ec1c80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 34.600320] >fff00000c5ec1d00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 34.601129] ^ [ 34.601752] fff00000c5ec1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.602608] fff00000c5ec1e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.603516] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 34.509790] ================================================================== [ 34.510660] BUG: KASAN: slab-use-after-free in kasan_strings+0x858/0x8f8 [ 34.511411] Read of size 1 at addr fff00000c5ec1d10 by task kunit_try_catch/248 [ 34.512064] [ 34.512484] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.514782] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.515489] Hardware name: linux,dummy-virt (DT) [ 34.516337] Call trace: [ 34.516771] show_stack+0x20/0x38 (C) [ 34.517311] dump_stack_lvl+0x8c/0xd0 [ 34.518302] print_report+0x118/0x5e0 [ 34.518942] kasan_report+0xc8/0x118 [ 34.519679] __asan_report_load1_noabort+0x20/0x30 [ 34.520416] kasan_strings+0x858/0x8f8 [ 34.521125] kunit_try_run_case+0x14c/0x3d0 [ 34.521778] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.522720] kthread+0x24c/0x2d0 [ 34.523278] ret_from_fork+0x10/0x20 [ 34.524194] [ 34.524602] Allocated by task 248: [ 34.525215] kasan_save_stack+0x3c/0x68 [ 34.526155] kasan_save_track+0x20/0x40 [ 34.526787] kasan_save_alloc_info+0x40/0x58 [ 34.527439] __kasan_kmalloc+0xd4/0xd8 [ 34.528037] __kmalloc_cache_noprof+0x15c/0x3c8 [ 34.528796] kasan_strings+0xb4/0x8f8 [ 34.529418] kunit_try_run_case+0x14c/0x3d0 [ 34.530868] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.531569] kthread+0x24c/0x2d0 [ 34.532088] ret_from_fork+0x10/0x20 [ 34.533040] [ 34.533393] Freed by task 248: [ 34.533964] kasan_save_stack+0x3c/0x68 [ 34.534845] kasan_save_track+0x20/0x40 [ 34.535498] kasan_save_free_info+0x4c/0x78 [ 34.536069] __kasan_slab_free+0x6c/0x98 [ 34.536687] kfree+0x114/0x3d0 [ 34.537244] kasan_strings+0x128/0x8f8 [ 34.538129] kunit_try_run_case+0x14c/0x3d0 [ 34.538742] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.539562] kthread+0x24c/0x2d0 [ 34.540159] ret_from_fork+0x10/0x20 [ 34.540832] [ 34.541216] The buggy address belongs to the object at fff00000c5ec1d00 [ 34.541216] which belongs to the cache kmalloc-32 of size 32 [ 34.542776] The buggy address is located 16 bytes inside of [ 34.542776] freed 32-byte region [fff00000c5ec1d00, fff00000c5ec1d20) [ 34.544089] [ 34.544428] The buggy address belongs to the physical page: [ 34.544996] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ec1 [ 34.546276] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.547027] page_type: f5(slab) [ 34.547612] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 34.548463] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 34.549392] page dumped because: kasan: bad access detected [ 34.550780] [ 34.551126] Memory state around the buggy address: [ 34.551821] fff00000c5ec1c00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 34.552511] fff00000c5ec1c80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 34.553630] >fff00000c5ec1d00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 34.554415] ^ [ 34.555327] fff00000c5ec1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.556117] fff00000c5ec1e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.557033] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 34.459407] ================================================================== [ 34.460897] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 34.461728] Read of size 1 at addr fff00000c5ec1d10 by task kunit_try_catch/248 [ 34.463756] [ 34.464340] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.465731] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.466308] Hardware name: linux,dummy-virt (DT) [ 34.466935] Call trace: [ 34.467388] show_stack+0x20/0x38 (C) [ 34.468021] dump_stack_lvl+0x8c/0xd0 [ 34.468649] print_report+0x118/0x5e0 [ 34.469332] kasan_report+0xc8/0x118 [ 34.470227] __asan_report_load1_noabort+0x20/0x30 [ 34.470871] strcmp+0xc0/0xc8 [ 34.471436] kasan_strings+0x248/0x8f8 [ 34.472045] kunit_try_run_case+0x14c/0x3d0 [ 34.472697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.473404] kthread+0x24c/0x2d0 [ 34.474155] ret_from_fork+0x10/0x20 [ 34.474848] [ 34.475230] Allocated by task 248: [ 34.475810] kasan_save_stack+0x3c/0x68 [ 34.476393] kasan_save_track+0x20/0x40 [ 34.477028] kasan_save_alloc_info+0x40/0x58 [ 34.477984] __kasan_kmalloc+0xd4/0xd8 [ 34.478587] __kmalloc_cache_noprof+0x15c/0x3c8 [ 34.479168] kasan_strings+0xb4/0x8f8 [ 34.479811] kunit_try_run_case+0x14c/0x3d0 [ 34.480497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.481187] kthread+0x24c/0x2d0 [ 34.482246] ret_from_fork+0x10/0x20 [ 34.482869] [ 34.483202] Freed by task 248: [ 34.483747] kasan_save_stack+0x3c/0x68 [ 34.484335] kasan_save_track+0x20/0x40 [ 34.485905] kasan_save_free_info+0x4c/0x78 [ 34.486600] __kasan_slab_free+0x6c/0x98 [ 34.487184] kfree+0x114/0x3d0 [ 34.487791] kasan_strings+0x128/0x8f8 [ 34.488321] kunit_try_run_case+0x14c/0x3d0 [ 34.489079] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.489995] kthread+0x24c/0x2d0 [ 34.490592] ret_from_fork+0x10/0x20 [ 34.490964] [ 34.491385] The buggy address belongs to the object at fff00000c5ec1d00 [ 34.491385] which belongs to the cache kmalloc-32 of size 32 [ 34.492735] The buggy address is located 16 bytes inside of [ 34.492735] freed 32-byte region [fff00000c5ec1d00, fff00000c5ec1d20) [ 34.494461] [ 34.494799] The buggy address belongs to the physical page: [ 34.495710] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ec1 [ 34.496869] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.497942] page_type: f5(slab) [ 34.498415] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 34.499376] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 34.500323] page dumped because: kasan: bad access detected [ 34.501023] [ 34.501439] Memory state around the buggy address: [ 34.502421] fff00000c5ec1c00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 34.503569] fff00000c5ec1c80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 34.504639] >fff00000c5ec1d00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 34.505568] ^ [ 34.506466] fff00000c5ec1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.507349] fff00000c5ec1e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.508274] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strrchr
[ 34.411563] ================================================================== [ 34.412320] BUG: KASAN: slab-use-after-free in strrchr+0x6c/0x78 [ 34.412997] Read of size 1 at addr fff00000c5ec1d10 by task kunit_try_catch/248 [ 34.413829] [ 34.414236] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.415646] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.416148] Hardware name: linux,dummy-virt (DT) [ 34.416855] Call trace: [ 34.417284] show_stack+0x20/0x38 (C) [ 34.418227] dump_stack_lvl+0x8c/0xd0 [ 34.418894] print_report+0x118/0x5e0 [ 34.419428] kasan_report+0xc8/0x118 [ 34.420081] __asan_report_load1_noabort+0x20/0x30 [ 34.420789] strrchr+0x6c/0x78 [ 34.421365] kasan_strings+0x1e0/0x8f8 [ 34.422281] kunit_try_run_case+0x14c/0x3d0 [ 34.422917] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.423556] kthread+0x24c/0x2d0 [ 34.424150] ret_from_fork+0x10/0x20 [ 34.424809] [ 34.425165] Allocated by task 248: [ 34.426045] kasan_save_stack+0x3c/0x68 [ 34.426627] kasan_save_track+0x20/0x40 [ 34.427268] kasan_save_alloc_info+0x40/0x58 [ 34.427976] __kasan_kmalloc+0xd4/0xd8 [ 34.428601] __kmalloc_cache_noprof+0x15c/0x3c8 [ 34.429246] kasan_strings+0xb4/0x8f8 [ 34.430102] kunit_try_run_case+0x14c/0x3d0 [ 34.430752] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.432455] kthread+0x24c/0x2d0 [ 34.433028] ret_from_fork+0x10/0x20 [ 34.433625] [ 34.434201] Freed by task 248: [ 34.434745] kasan_save_stack+0x3c/0x68 [ 34.435269] kasan_save_track+0x20/0x40 [ 34.436026] kasan_save_free_info+0x4c/0x78 [ 34.436658] __kasan_slab_free+0x6c/0x98 [ 34.437300] kfree+0x114/0x3d0 [ 34.438269] kasan_strings+0x128/0x8f8 [ 34.438778] kunit_try_run_case+0x14c/0x3d0 [ 34.439480] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.440151] kthread+0x24c/0x2d0 [ 34.440725] ret_from_fork+0x10/0x20 [ 34.441253] [ 34.441645] The buggy address belongs to the object at fff00000c5ec1d00 [ 34.441645] which belongs to the cache kmalloc-32 of size 32 [ 34.443137] The buggy address is located 16 bytes inside of [ 34.443137] freed 32-byte region [fff00000c5ec1d00, fff00000c5ec1d20) [ 34.444401] [ 34.444799] The buggy address belongs to the physical page: [ 34.445508] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ec1 [ 34.446907] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.447727] page_type: f5(slab) [ 34.448310] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 34.449180] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 34.450383] page dumped because: kasan: bad access detected [ 34.451000] [ 34.451374] Memory state around the buggy address: [ 34.452083] fff00000c5ec1c00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 34.453395] fff00000c5ec1c80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 34.454348] >fff00000c5ec1d00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 34.455234] ^ [ 34.456038] fff00000c5ec1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.456923] fff00000c5ec1e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.458052] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strchr
[ 34.362515] ================================================================== [ 34.363588] BUG: KASAN: slab-use-after-free in strchr+0xcc/0xd8 [ 34.364359] Read of size 1 at addr fff00000c5ec1d10 by task kunit_try_catch/248 [ 34.365098] [ 34.365497] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.366912] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.367833] Hardware name: linux,dummy-virt (DT) [ 34.368453] Call trace: [ 34.368938] show_stack+0x20/0x38 (C) [ 34.369614] dump_stack_lvl+0x8c/0xd0 [ 34.370567] print_report+0x118/0x5e0 [ 34.371118] kasan_report+0xc8/0x118 [ 34.371755] __asan_report_load1_noabort+0x20/0x30 [ 34.372403] strchr+0xcc/0xd8 [ 34.373011] kasan_strings+0x180/0x8f8 [ 34.373653] kunit_try_run_case+0x14c/0x3d0 [ 34.374322] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.375271] kthread+0x24c/0x2d0 [ 34.375777] ret_from_fork+0x10/0x20 [ 34.376440] [ 34.376826] Allocated by task 248: [ 34.377398] kasan_save_stack+0x3c/0x68 [ 34.378261] kasan_save_track+0x20/0x40 [ 34.378853] kasan_save_alloc_info+0x40/0x58 [ 34.379589] __kasan_kmalloc+0xd4/0xd8 [ 34.380164] __kmalloc_cache_noprof+0x15c/0x3c8 [ 34.380833] kasan_strings+0xb4/0x8f8 [ 34.381322] kunit_try_run_case+0x14c/0x3d0 [ 34.382552] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.383230] kthread+0x24c/0x2d0 [ 34.383826] ret_from_fork+0x10/0x20 [ 34.384400] [ 34.384737] Freed by task 248: [ 34.385275] kasan_save_stack+0x3c/0x68 [ 34.386003] kasan_save_track+0x20/0x40 [ 34.386645] kasan_save_free_info+0x4c/0x78 [ 34.387052] __kasan_slab_free+0x6c/0x98 [ 34.387831] kfree+0x114/0x3d0 [ 34.388414] kasan_strings+0x128/0x8f8 [ 34.389080] kunit_try_run_case+0x14c/0x3d0 [ 34.390451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.391282] kthread+0x24c/0x2d0 [ 34.391918] ret_from_fork+0x10/0x20 [ 34.392416] [ 34.392817] The buggy address belongs to the object at fff00000c5ec1d00 [ 34.392817] which belongs to the cache kmalloc-32 of size 32 [ 34.394589] The buggy address is located 16 bytes inside of [ 34.394589] freed 32-byte region [fff00000c5ec1d00, fff00000c5ec1d20) [ 34.395830] [ 34.396208] The buggy address belongs to the physical page: [ 34.396882] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ec1 [ 34.398005] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.398866] page_type: f5(slab) [ 34.399387] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 34.400398] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 34.401249] page dumped because: kasan: bad access detected [ 34.402224] [ 34.402611] Memory state around the buggy address: [ 34.403448] fff00000c5ec1c00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 34.404514] fff00000c5ec1c80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 34.405331] >fff00000c5ec1d00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 34.406362] ^ [ 34.406817] fff00000c5ec1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.407820] fff00000c5ec1e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.408765] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 34.311627] ================================================================== [ 34.312642] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 34.313440] Read of size 1 at addr fff00000c5ec1c58 by task kunit_try_catch/246 [ 34.314181] [ 34.314604] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.315691] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.316309] Hardware name: linux,dummy-virt (DT) [ 34.317002] Call trace: [ 34.317476] show_stack+0x20/0x38 (C) [ 34.319068] dump_stack_lvl+0x8c/0xd0 [ 34.319686] print_report+0x118/0x5e0 [ 34.320224] kasan_report+0xc8/0x118 [ 34.320895] __asan_report_load1_noabort+0x20/0x30 [ 34.321974] memcmp+0x198/0x1d8 [ 34.322560] kasan_memcmp+0x16c/0x300 [ 34.323188] kunit_try_run_case+0x14c/0x3d0 [ 34.323870] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.324498] kthread+0x24c/0x2d0 [ 34.325112] ret_from_fork+0x10/0x20 [ 34.326066] [ 34.326443] Allocated by task 246: [ 34.326970] kasan_save_stack+0x3c/0x68 [ 34.327514] kasan_save_track+0x20/0x40 [ 34.328180] kasan_save_alloc_info+0x40/0x58 [ 34.328737] __kasan_kmalloc+0xd4/0xd8 [ 34.329405] __kmalloc_cache_noprof+0x15c/0x3c8 [ 34.330394] kasan_memcmp+0xbc/0x300 [ 34.331027] kunit_try_run_case+0x14c/0x3d0 [ 34.331713] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.332412] kthread+0x24c/0x2d0 [ 34.332956] ret_from_fork+0x10/0x20 [ 34.333543] [ 34.334380] The buggy address belongs to the object at fff00000c5ec1c40 [ 34.334380] which belongs to the cache kmalloc-32 of size 32 [ 34.335549] The buggy address is located 0 bytes to the right of [ 34.335549] allocated 24-byte region [fff00000c5ec1c40, fff00000c5ec1c58) [ 34.336868] [ 34.337255] The buggy address belongs to the physical page: [ 34.338358] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ec1 [ 34.339387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.340137] page_type: f5(slab) [ 34.340741] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 34.341574] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 34.342771] page dumped because: kasan: bad access detected [ 34.343379] [ 34.343778] Memory state around the buggy address: [ 34.344451] fff00000c5ec1b00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 34.345215] fff00000c5ec1b80: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc [ 34.346438] >fff00000c5ec1c00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 34.347251] ^ [ 34.347931] fff00000c5ec1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.348840] fff00000c5ec1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.349905] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memchr
[ 34.258674] ================================================================== [ 34.259919] BUG: KASAN: slab-out-of-bounds in memchr+0x78/0x88 [ 34.260826] Read of size 1 at addr fff00000c5ec56d8 by task kunit_try_catch/244 [ 34.262267] [ 34.262716] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.264140] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.264815] Hardware name: linux,dummy-virt (DT) [ 34.265604] Call trace: [ 34.266018] show_stack+0x20/0x38 (C) [ 34.266714] dump_stack_lvl+0x8c/0xd0 [ 34.267768] print_report+0x118/0x5e0 [ 34.268493] kasan_report+0xc8/0x118 [ 34.269106] __asan_report_load1_noabort+0x20/0x30 [ 34.270150] memchr+0x78/0x88 [ 34.270709] kasan_memchr+0x148/0x2d8 [ 34.271285] kunit_try_run_case+0x14c/0x3d0 [ 34.272559] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.273252] kthread+0x24c/0x2d0 [ 34.274140] ret_from_fork+0x10/0x20 [ 34.274732] [ 34.275105] Allocated by task 244: [ 34.276029] kasan_save_stack+0x3c/0x68 [ 34.276666] kasan_save_track+0x20/0x40 [ 34.277245] kasan_save_alloc_info+0x40/0x58 [ 34.278544] __kasan_kmalloc+0xd4/0xd8 [ 34.279123] __kmalloc_cache_noprof+0x15c/0x3c8 [ 34.279945] kasan_memchr+0xb0/0x2d8 [ 34.280630] kunit_try_run_case+0x14c/0x3d0 [ 34.281457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.282577] kthread+0x24c/0x2d0 [ 34.283197] ret_from_fork+0x10/0x20 [ 34.283673] [ 34.284013] The buggy address belongs to the object at fff00000c5ec56c0 [ 34.284013] which belongs to the cache kmalloc-32 of size 32 [ 34.285192] The buggy address is located 0 bytes to the right of [ 34.285192] allocated 24-byte region [fff00000c5ec56c0, fff00000c5ec56d8) [ 34.287352] [ 34.287758] The buggy address belongs to the physical page: [ 34.288319] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ec5 [ 34.290025] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.290955] page_type: f5(slab) [ 34.291590] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 34.292378] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 34.293288] page dumped because: kasan: bad access detected [ 34.294756] [ 34.295097] Memory state around the buggy address: [ 34.295671] fff00000c5ec5580: 00 00 07 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 34.296861] fff00000c5ec5600: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 34.297990] >fff00000c5ec5680: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 34.298793] ^ [ 34.299587] fff00000c5ec5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.300505] fff00000c5ec5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.301382] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 34.216672] ================================================================== [ 34.217789] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2e4/0x348 [ 34.218665] Read of size 1 at addr ffff800080bb7bea by task kunit_try_catch/242 [ 34.219518] [ 34.220216] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.221341] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.222280] Hardware name: linux,dummy-virt (DT) [ 34.222905] Call trace: [ 34.223321] show_stack+0x20/0x38 (C) [ 34.223988] dump_stack_lvl+0x8c/0xd0 [ 34.224679] print_report+0x2fc/0x5e0 [ 34.225207] kasan_report+0xc8/0x118 [ 34.226163] __asan_report_load1_noabort+0x20/0x30 [ 34.226937] kasan_alloca_oob_right+0x2e4/0x348 [ 34.227562] kunit_try_run_case+0x14c/0x3d0 [ 34.228271] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.229103] kthread+0x24c/0x2d0 [ 34.229986] ret_from_fork+0x10/0x20 [ 34.230570] [ 34.230916] The buggy address belongs to stack of task kunit_try_catch/242 [ 34.231746] [ 34.232089] The buggy address belongs to the virtual mapping at [ 34.232089] [ffff800080bb0000, ffff800080bb9000) created by: [ 34.232089] kernel_clone+0x140/0x790 [ 34.233747] [ 34.234126] The buggy address belongs to the physical page: [ 34.235185] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105efa [ 34.236085] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.236984] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 34.238682] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.239592] page dumped because: kasan: bad access detected [ 34.240203] [ 34.241028] Memory state around the buggy address: [ 34.241806] ffff800080bb7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.242733] ffff800080bb7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.243595] >ffff800080bb7b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 34.244414] ^ [ 34.245304] ffff800080bb7c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 [ 34.246477] ffff800080bb7c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 [ 34.247262] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 34.173016] ================================================================== [ 34.174717] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 34.175811] Read of size 1 at addr ffff800080b77bdf by task kunit_try_catch/240 [ 34.177084] [ 34.177437] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.178760] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.179247] Hardware name: linux,dummy-virt (DT) [ 34.179935] Call trace: [ 34.180357] show_stack+0x20/0x38 (C) [ 34.180992] dump_stack_lvl+0x8c/0xd0 [ 34.181623] print_report+0x2fc/0x5e0 [ 34.182275] kasan_report+0xc8/0x118 [ 34.183089] __asan_report_load1_noabort+0x20/0x30 [ 34.183783] kasan_alloca_oob_left+0x2b8/0x310 [ 34.184448] kunit_try_run_case+0x14c/0x3d0 [ 34.185195] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.186231] kthread+0x24c/0x2d0 [ 34.186813] ret_from_fork+0x10/0x20 [ 34.187338] [ 34.187741] The buggy address belongs to stack of task kunit_try_catch/240 [ 34.188598] [ 34.189023] The buggy address belongs to the virtual mapping at [ 34.189023] [ffff800080b70000, ffff800080b79000) created by: [ 34.189023] kernel_clone+0x140/0x790 [ 34.190958] [ 34.191339] The buggy address belongs to the physical page: [ 34.191989] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ed0 [ 34.193032] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.194302] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 34.195178] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.196108] page dumped because: kasan: bad access detected [ 34.196837] [ 34.197215] Memory state around the buggy address: [ 34.198192] ffff800080b77a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.198976] ffff800080b77b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.199924] >ffff800080b77b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 34.200732] ^ [ 34.201788] ffff800080b77c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 [ 34.202632] ffff800080b77c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 [ 34.203432] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 34.122452] ================================================================== [ 34.124056] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x230/0x268 [ 34.124847] Read of size 1 at addr ffff800080b27cba by task kunit_try_catch/238 [ 34.125592] [ 34.127416] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.128606] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.129111] Hardware name: linux,dummy-virt (DT) [ 34.130038] Call trace: [ 34.130472] show_stack+0x20/0x38 (C) [ 34.131008] dump_stack_lvl+0x8c/0xd0 [ 34.131677] print_report+0x2fc/0x5e0 [ 34.132311] kasan_report+0xc8/0x118 [ 34.132827] __asan_report_load1_noabort+0x20/0x30 [ 34.133431] kasan_stack_oob+0x230/0x268 [ 34.134550] kunit_try_run_case+0x14c/0x3d0 [ 34.135348] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.136282] kthread+0x24c/0x2d0 [ 34.136995] ret_from_fork+0x10/0x20 [ 34.137658] [ 34.138403] The buggy address belongs to stack of task kunit_try_catch/238 [ 34.139377] and is located at offset 138 in frame: [ 34.140163] kasan_stack_oob+0x0/0x268 [ 34.141239] [ 34.141753] This frame has 4 objects: [ 34.142632] [48, 49) '__assertion' [ 34.142819] [64, 72) 'array' [ 34.143346] [96, 112) '__assertion' [ 34.144218] [128, 138) 'stack_array' [ 34.144903] [ 34.145784] The buggy address belongs to the virtual mapping at [ 34.145784] [ffff800080b20000, ffff800080b29000) created by: [ 34.145784] kernel_clone+0x140/0x790 [ 34.148400] [ 34.148817] The buggy address belongs to the physical page: [ 34.149633] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4 [ 34.150921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.152205] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 34.153319] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.154875] page dumped because: kasan: bad access detected [ 34.155696] [ 34.156121] Memory state around the buggy address: [ 34.156912] ffff800080b27b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.158107] ffff800080b27c00: 00 00 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 [ 34.159176] >ffff800080b27c80: f2 f2 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 [ 34.159600] ^ [ 34.160742] ffff800080b27d00: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 [ 34.161551] ffff800080b27d80: f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 [ 34.162351] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 34.071880] ================================================================== [ 34.073171] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 34.074461] Read of size 1 at addr ffffad7794cd906d by task kunit_try_catch/234 [ 34.075376] [ 34.075810] CPU: 0 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.077144] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.077648] Hardware name: linux,dummy-virt (DT) [ 34.078311] Call trace: [ 34.078778] show_stack+0x20/0x38 (C) [ 34.079376] dump_stack_lvl+0x8c/0xd0 [ 34.080313] print_report+0x2fc/0x5e0 [ 34.080888] kasan_report+0xc8/0x118 [ 34.081456] __asan_report_load1_noabort+0x20/0x30 [ 34.082436] kasan_global_oob_right+0x230/0x270 [ 34.083178] kunit_try_run_case+0x14c/0x3d0 [ 34.083807] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.084557] kthread+0x24c/0x2d0 [ 34.085152] ret_from_fork+0x10/0x20 [ 34.086097] [ 34.086566] The buggy address belongs to the variable: [ 34.087172] global_array+0xd/0x40 [ 34.087810] [ 34.088358] The buggy address belongs to the virtual mapping at [ 34.088358] [ffffad7793020000, ffffad7794d91000) created by: [ 34.088358] paging_init+0x668/0x7c8 [ 34.090341] [ 34.090990] The buggy address belongs to the physical page: [ 34.091760] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x478d9 [ 34.092625] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 34.094454] raw: 03fffe0000002000 ffffc1ffc01e3648 ffffc1ffc01e3648 0000000000000000 [ 34.095419] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.096271] page dumped because: kasan: bad access detected [ 34.097063] [ 34.097440] Memory state around the buggy address: [ 34.098231] ffffad7794cd8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.099473] ffffad7794cd8f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.100096] >ffffad7794cd9000: 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 [ 34.101029] ^ [ 34.101695] ffffad7794cd9080: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 [ 34.102596] ffffad7794cd9100: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 [ 34.103478] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 33.970863] ================================================================== [ 33.972154] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 33.973014] Free of addr fff00000c659b401 by task kunit_try_catch/230 [ 33.973640] [ 33.974035] CPU: 0 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 33.975822] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.976277] Hardware name: linux,dummy-virt (DT) [ 33.977245] Call trace: [ 33.977969] show_stack+0x20/0x38 (C) [ 33.978882] dump_stack_lvl+0x8c/0xd0 [ 33.979489] print_report+0x118/0x5e0 [ 33.980011] kasan_report_invalid_free+0xb0/0xd8 [ 33.980755] check_slab_allocation+0xfc/0x108 [ 33.981410] __kasan_mempool_poison_object+0x78/0x150 [ 33.982437] mempool_free+0x28c/0x328 [ 33.982987] mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 33.983669] mempool_kmalloc_invalid_free+0xb8/0x110 [ 33.984430] kunit_try_run_case+0x14c/0x3d0 [ 33.985075] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.986130] kthread+0x24c/0x2d0 [ 33.986692] ret_from_fork+0x10/0x20 [ 33.987331] [ 33.987718] Allocated by task 230: [ 33.988186] kasan_save_stack+0x3c/0x68 [ 33.988854] kasan_save_track+0x20/0x40 [ 33.989405] kasan_save_alloc_info+0x40/0x58 [ 33.990352] __kasan_mempool_unpoison_object+0x11c/0x180 [ 33.991153] remove_element+0x130/0x1f8 [ 33.992566] mempool_alloc_preallocated+0x58/0xc0 [ 33.993292] mempool_kmalloc_invalid_free_helper+0x94/0x2a0 [ 33.994009] mempool_kmalloc_invalid_free+0xb8/0x110 [ 33.994695] kunit_try_run_case+0x14c/0x3d0 [ 33.995249] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.996028] kthread+0x24c/0x2d0 [ 33.996481] ret_from_fork+0x10/0x20 [ 33.997116] [ 33.997478] The buggy address belongs to the object at fff00000c659b400 [ 33.997478] which belongs to the cache kmalloc-128 of size 128 [ 33.998713] The buggy address is located 1 bytes inside of [ 33.998713] 128-byte region [fff00000c659b400, fff00000c659b480) [ 34.000014] [ 34.000394] The buggy address belongs to the physical page: [ 34.001127] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659b [ 34.002038] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.002765] page_type: f5(slab) [ 34.003323] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.004225] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 34.005037] page dumped because: kasan: bad access detected [ 34.005783] [ 34.006150] Memory state around the buggy address: [ 34.006849] fff00000c659b300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.007660] fff00000c659b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.008622] >fff00000c659b400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.009505] ^ [ 34.010000] fff00000c659b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.010902] fff00000c659b500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.011721] ================================================================== [ 34.025011] ================================================================== [ 34.026102] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 34.027292] Free of addr fff00000c663c001 by task kunit_try_catch/232 [ 34.028129] [ 34.028497] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.031014] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.033462] Hardware name: linux,dummy-virt (DT) [ 34.034073] Call trace: [ 34.034454] show_stack+0x20/0x38 (C) [ 34.034979] dump_stack_lvl+0x8c/0xd0 [ 34.035473] print_report+0x118/0x5e0 [ 34.036671] kasan_report_invalid_free+0xb0/0xd8 [ 34.037394] __kasan_mempool_poison_object+0xfc/0x150 [ 34.038583] mempool_free+0x28c/0x328 [ 34.039108] mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 34.039939] mempool_kmalloc_large_invalid_free+0xb8/0x110 [ 34.040706] kunit_try_run_case+0x14c/0x3d0 [ 34.041327] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.042929] kthread+0x24c/0x2d0 [ 34.043402] ret_from_fork+0x10/0x20 [ 34.044047] [ 34.044436] The buggy address belongs to the physical page: [ 34.045138] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10663c [ 34.046461] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.047347] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.048221] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.049066] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.050793] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.051687] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.052577] head: 0bfffe0000000002 ffffc1ffc3198f01 ffffffffffffffff 0000000000000000 [ 34.053435] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 34.054742] page dumped because: kasan: bad access detected [ 34.055315] [ 34.055702] Memory state around the buggy address: [ 34.056377] fff00000c663bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.057310] fff00000c663bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.059057] >fff00000c663c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.059816] ^ [ 34.060368] fff00000c663c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.061183] fff00000c663c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.062491] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 33.814687] ================================================================== [ 33.816123] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 33.816861] Free of addr fff00000c5e7bc00 by task kunit_try_catch/224 [ 33.817566] [ 33.817970] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 33.820113] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.820759] Hardware name: linux,dummy-virt (DT) [ 33.821356] Call trace: [ 33.822061] show_stack+0x20/0x38 (C) [ 33.822663] dump_stack_lvl+0x8c/0xd0 [ 33.823248] print_report+0x118/0x5e0 [ 33.824374] kasan_report_invalid_free+0xb0/0xd8 [ 33.825117] check_slab_allocation+0xd4/0x108 [ 33.826149] __kasan_mempool_poison_object+0x78/0x150 [ 33.826831] mempool_free+0x28c/0x328 [ 33.827323] mempool_double_free_helper+0x150/0x2e0 [ 33.828081] mempool_kmalloc_double_free+0xb8/0x110 [ 33.828811] kunit_try_run_case+0x14c/0x3d0 [ 33.829513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.830372] kthread+0x24c/0x2d0 [ 33.831422] ret_from_fork+0x10/0x20 [ 33.832357] [ 33.832755] Allocated by task 224: [ 33.833301] kasan_save_stack+0x3c/0x68 [ 33.833895] kasan_save_track+0x20/0x40 [ 33.834509] kasan_save_alloc_info+0x40/0x58 [ 33.835622] __kasan_mempool_unpoison_object+0x11c/0x180 [ 33.836223] remove_element+0x130/0x1f8 [ 33.836864] mempool_alloc_preallocated+0x58/0xc0 [ 33.837490] mempool_double_free_helper+0x94/0x2e0 [ 33.838081] mempool_kmalloc_double_free+0xb8/0x110 [ 33.838987] kunit_try_run_case+0x14c/0x3d0 [ 33.840393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.841107] kthread+0x24c/0x2d0 [ 33.841594] ret_from_fork+0x10/0x20 [ 33.842609] [ 33.842956] Freed by task 224: [ 33.843427] kasan_save_stack+0x3c/0x68 [ 33.843953] kasan_save_track+0x20/0x40 [ 33.844487] kasan_save_free_info+0x4c/0x78 [ 33.845211] __kasan_mempool_poison_object+0xc0/0x150 [ 33.846268] mempool_free+0x28c/0x328 [ 33.847411] mempool_double_free_helper+0x100/0x2e0 [ 33.848616] mempool_kmalloc_double_free+0xb8/0x110 [ 33.849290] kunit_try_run_case+0x14c/0x3d0 [ 33.850112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.851205] kthread+0x24c/0x2d0 [ 33.851795] ret_from_fork+0x10/0x20 [ 33.852386] [ 33.852780] The buggy address belongs to the object at fff00000c5e7bc00 [ 33.852780] which belongs to the cache kmalloc-128 of size 128 [ 33.854318] The buggy address is located 0 bytes inside of [ 33.854318] 128-byte region [fff00000c5e7bc00, fff00000c5e7bc80) [ 33.856403] [ 33.856814] The buggy address belongs to the physical page: [ 33.857496] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e7b [ 33.858818] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.859737] page_type: f5(slab) [ 33.860321] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.861452] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 33.862610] page dumped because: kasan: bad access detected [ 33.863367] [ 33.863718] Memory state around the buggy address: [ 33.864403] fff00000c5e7bb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.865348] fff00000c5e7bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.866024] >fff00000c5e7bc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.867356] ^ [ 33.867764] fff00000c5e7bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.868850] fff00000c5e7bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.870001] ================================================================== [ 33.882966] ================================================================== [ 33.884217] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 33.885068] Free of addr fff00000c6630000 by task kunit_try_catch/226 [ 33.885991] [ 33.887430] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 33.888478] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.889084] Hardware name: linux,dummy-virt (DT) [ 33.889862] Call trace: [ 33.890246] show_stack+0x20/0x38 (C) [ 33.890896] dump_stack_lvl+0x8c/0xd0 [ 33.891715] print_report+0x118/0x5e0 [ 33.892307] kasan_report_invalid_free+0xb0/0xd8 [ 33.892978] __kasan_mempool_poison_object+0x14c/0x150 [ 33.893911] mempool_free+0x28c/0x328 [ 33.894446] mempool_double_free_helper+0x150/0x2e0 [ 33.895139] mempool_kmalloc_large_double_free+0xb8/0x110 [ 33.895859] kunit_try_run_case+0x14c/0x3d0 [ 33.896580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.897277] kthread+0x24c/0x2d0 [ 33.898268] ret_from_fork+0x10/0x20 [ 33.898866] [ 33.899229] The buggy address belongs to the physical page: [ 33.899849] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106630 [ 33.900829] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.901701] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.903051] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.904635] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.905612] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.906832] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.907760] head: 0bfffe0000000002 ffffc1ffc3198c01 ffffffffffffffff 0000000000000000 [ 33.908700] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 33.909503] page dumped because: kasan: bad access detected [ 33.910368] [ 33.910757] Memory state around the buggy address: [ 33.911285] fff00000c662ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.912502] fff00000c662ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.913373] >fff00000c6630000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.914447] ^ [ 33.914939] fff00000c6630080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.915855] fff00000c6630100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.916728] ================================================================== [ 33.929269] ================================================================== [ 33.930953] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 33.931989] Free of addr fff00000c6630000 by task kunit_try_catch/228 [ 33.932969] [ 33.933411] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 33.934781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.935620] Hardware name: linux,dummy-virt (DT) [ 33.936328] Call trace: [ 33.936853] show_stack+0x20/0x38 (C) [ 33.937508] dump_stack_lvl+0x8c/0xd0 [ 33.938376] print_report+0x118/0x5e0 [ 33.938979] kasan_report_invalid_free+0xb0/0xd8 [ 33.939654] __kasan_mempool_poison_pages+0xe0/0xe8 [ 33.940327] mempool_free+0x24c/0x328 [ 33.940953] mempool_double_free_helper+0x150/0x2e0 [ 33.941581] mempool_page_alloc_double_free+0xb4/0x110 [ 33.942743] kunit_try_run_case+0x14c/0x3d0 [ 33.943305] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.944097] kthread+0x24c/0x2d0 [ 33.944721] ret_from_fork+0x10/0x20 [ 33.945299] [ 33.945651] The buggy address belongs to the physical page: [ 33.946654] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106630 [ 33.947461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.948402] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.949254] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.950712] page dumped because: kasan: bad access detected [ 33.951916] [ 33.952313] Memory state around the buggy address: [ 33.953130] fff00000c662ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.954546] fff00000c662ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.955410] >fff00000c6630000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.956263] ^ [ 33.956761] fff00000c6630080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.957911] fff00000c6630100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.958887] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 33.654899] ================================================================== [ 33.656880] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 33.658092] Read of size 1 at addr fff00000c6588000 by task kunit_try_catch/218 [ 33.658998] [ 33.659443] CPU: 1 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 33.660549] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.661220] Hardware name: linux,dummy-virt (DT) [ 33.661919] Call trace: [ 33.662614] show_stack+0x20/0x38 (C) [ 33.663371] dump_stack_lvl+0x8c/0xd0 [ 33.664162] print_report+0x118/0x5e0 [ 33.664991] kasan_report+0xc8/0x118 [ 33.665870] __asan_report_load1_noabort+0x20/0x30 [ 33.666246] mempool_uaf_helper+0x314/0x340 [ 33.666553] mempool_kmalloc_large_uaf+0xbc/0x118 [ 33.666856] kunit_try_run_case+0x14c/0x3d0 [ 33.667142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.667463] kthread+0x24c/0x2d0 [ 33.668622] ret_from_fork+0x10/0x20 [ 33.669362] [ 33.670065] The buggy address belongs to the physical page: [ 33.671092] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106588 [ 33.672215] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.673324] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.674617] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.675597] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.676579] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.677419] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.678179] head: 0bfffe0000000002 ffffc1ffc3196201 ffffffffffffffff 0000000000000000 [ 33.679172] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 33.680643] page dumped because: kasan: bad access detected [ 33.681261] [ 33.681593] Memory state around the buggy address: [ 33.682277] fff00000c6587f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.683068] fff00000c6587f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.684236] >fff00000c6588000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.685009] ^ [ 33.685568] fff00000c6588080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.686700] fff00000c6588100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.687475] ================================================================== [ 33.774867] ================================================================== [ 33.776150] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 33.776770] Read of size 1 at addr fff00000c662c000 by task kunit_try_catch/222 [ 33.777704] [ 33.778040] CPU: 0 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 33.779239] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.779864] Hardware name: linux,dummy-virt (DT) [ 33.780486] Call trace: [ 33.780959] show_stack+0x20/0x38 (C) [ 33.781616] dump_stack_lvl+0x8c/0xd0 [ 33.782117] print_report+0x118/0x5e0 [ 33.782772] kasan_report+0xc8/0x118 [ 33.783388] __asan_report_load1_noabort+0x20/0x30 [ 33.784015] mempool_uaf_helper+0x314/0x340 [ 33.784693] mempool_page_alloc_uaf+0xb8/0x118 [ 33.785394] kunit_try_run_case+0x14c/0x3d0 [ 33.786019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.786730] kthread+0x24c/0x2d0 [ 33.787327] ret_from_fork+0x10/0x20 [ 33.787976] [ 33.788359] The buggy address belongs to the physical page: [ 33.789048] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662c [ 33.789952] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.790773] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.791752] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.792653] page dumped because: kasan: bad access detected [ 33.793263] [ 33.793649] Memory state around the buggy address: [ 33.794285] fff00000c662bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.795092] fff00000c662bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.795971] >fff00000c662c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.796764] ^ [ 33.797308] fff00000c662c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.798077] fff00000c662c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.798889] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 33.594707] ================================================================== [ 33.595828] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 33.596741] Read of size 1 at addr fff00000c5e7b400 by task kunit_try_catch/216 [ 33.597375] [ 33.598125] CPU: 1 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 33.599709] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.600431] Hardware name: linux,dummy-virt (DT) [ 33.601148] Call trace: [ 33.601868] show_stack+0x20/0x38 (C) [ 33.602295] dump_stack_lvl+0x8c/0xd0 [ 33.602974] print_report+0x118/0x5e0 [ 33.603515] kasan_report+0xc8/0x118 [ 33.604173] __asan_report_load1_noabort+0x20/0x30 [ 33.604841] mempool_uaf_helper+0x314/0x340 [ 33.605572] mempool_kmalloc_uaf+0xbc/0x118 [ 33.606484] kunit_try_run_case+0x14c/0x3d0 [ 33.607079] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.607912] kthread+0x24c/0x2d0 [ 33.608418] ret_from_fork+0x10/0x20 [ 33.609135] [ 33.609511] Allocated by task 216: [ 33.610466] kasan_save_stack+0x3c/0x68 [ 33.611241] kasan_save_track+0x20/0x40 [ 33.611832] kasan_save_alloc_info+0x40/0x58 [ 33.612498] __kasan_mempool_unpoison_object+0x11c/0x180 [ 33.613084] remove_element+0x130/0x1f8 [ 33.613770] mempool_alloc_preallocated+0x58/0xc0 [ 33.614696] mempool_uaf_helper+0xa4/0x340 [ 33.615681] mempool_kmalloc_uaf+0xbc/0x118 [ 33.616652] kunit_try_run_case+0x14c/0x3d0 [ 33.617252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.618381] kthread+0x24c/0x2d0 [ 33.618978] ret_from_fork+0x10/0x20 [ 33.619502] [ 33.620315] Freed by task 216: [ 33.620863] kasan_save_stack+0x3c/0x68 [ 33.621397] kasan_save_track+0x20/0x40 [ 33.622317] kasan_save_free_info+0x4c/0x78 [ 33.622728] __kasan_mempool_poison_object+0xc0/0x150 [ 33.623031] mempool_free+0x28c/0x328 [ 33.623272] mempool_uaf_helper+0x104/0x340 [ 33.623556] mempool_kmalloc_uaf+0xbc/0x118 [ 33.624070] kunit_try_run_case+0x14c/0x3d0 [ 33.624772] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.625514] kthread+0x24c/0x2d0 [ 33.626429] ret_from_fork+0x10/0x20 [ 33.627035] [ 33.627471] The buggy address belongs to the object at fff00000c5e7b400 [ 33.627471] which belongs to the cache kmalloc-128 of size 128 [ 33.628712] The buggy address is located 0 bytes inside of [ 33.628712] freed 128-byte region [fff00000c5e7b400, fff00000c5e7b480) [ 33.630589] [ 33.631041] The buggy address belongs to the physical page: [ 33.631954] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e7b [ 33.632990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.634421] page_type: f5(slab) [ 33.635278] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.636474] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 33.637509] page dumped because: kasan: bad access detected [ 33.638463] [ 33.638883] Memory state around the buggy address: [ 33.639515] fff00000c5e7b300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.640424] fff00000c5e7b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.641317] >fff00000c5e7b400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.642399] ^ [ 33.643170] fff00000c5e7b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.644036] fff00000c5e7b500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.644947] ================================================================== [ 33.701307] ================================================================== [ 33.702466] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 33.703407] Read of size 1 at addr fff00000c65a0240 by task kunit_try_catch/220 [ 33.705726] [ 33.706463] CPU: 0 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 33.707662] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.708138] Hardware name: linux,dummy-virt (DT) [ 33.709037] Call trace: [ 33.709640] show_stack+0x20/0x38 (C) [ 33.710221] dump_stack_lvl+0x8c/0xd0 [ 33.710818] print_report+0x118/0x5e0 [ 33.711735] kasan_report+0xc8/0x118 [ 33.712363] __asan_report_load1_noabort+0x20/0x30 [ 33.713762] mempool_uaf_helper+0x314/0x340 [ 33.714670] mempool_slab_uaf+0xb8/0x110 [ 33.715399] kunit_try_run_case+0x14c/0x3d0 [ 33.716094] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.716843] kthread+0x24c/0x2d0 [ 33.717434] ret_from_fork+0x10/0x20 [ 33.718158] [ 33.718908] Allocated by task 220: [ 33.719365] kasan_save_stack+0x3c/0x68 [ 33.720009] kasan_save_track+0x20/0x40 [ 33.720695] kasan_save_alloc_info+0x40/0x58 [ 33.721258] __kasan_mempool_unpoison_object+0xbc/0x180 [ 33.722060] remove_element+0x16c/0x1f8 [ 33.722682] mempool_alloc_preallocated+0x58/0xc0 [ 33.723641] mempool_uaf_helper+0xa4/0x340 [ 33.724246] mempool_slab_uaf+0xb8/0x110 [ 33.724908] kunit_try_run_case+0x14c/0x3d0 [ 33.726647] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.727430] kthread+0x24c/0x2d0 [ 33.728026] ret_from_fork+0x10/0x20 [ 33.728666] [ 33.729055] Freed by task 220: [ 33.729606] kasan_save_stack+0x3c/0x68 [ 33.730190] kasan_save_track+0x20/0x40 [ 33.730783] kasan_save_free_info+0x4c/0x78 [ 33.731442] __kasan_mempool_poison_object+0xc0/0x150 [ 33.732190] mempool_free+0x28c/0x328 [ 33.733162] mempool_uaf_helper+0x104/0x340 [ 33.734663] mempool_slab_uaf+0xb8/0x110 [ 33.735220] kunit_try_run_case+0x14c/0x3d0 [ 33.735902] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.736620] kthread+0x24c/0x2d0 [ 33.737106] ret_from_fork+0x10/0x20 [ 33.738089] [ 33.738466] The buggy address belongs to the object at fff00000c65a0240 [ 33.738466] which belongs to the cache test_cache of size 123 [ 33.739812] The buggy address is located 0 bytes inside of [ 33.739812] freed 123-byte region [fff00000c65a0240, fff00000c65a02bb) [ 33.740950] [ 33.741327] The buggy address belongs to the physical page: [ 33.743110] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a0 [ 33.744047] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.744796] page_type: f5(slab) [ 33.745355] raw: 0bfffe0000000000 fff00000c659c000 dead000000000122 0000000000000000 [ 33.746736] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000 [ 33.747576] page dumped because: kasan: bad access detected [ 33.748234] [ 33.748630] Memory state around the buggy address: [ 33.749279] fff00000c65a0100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.751078] fff00000c65a0180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.751885] >fff00000c65a0200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 33.752681] ^ [ 33.753414] fff00000c65a0280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.754713] fff00000c65a0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.755522] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 33.480956] ================================================================== [ 33.482496] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 33.483298] Read of size 1 at addr fff00000c662e001 by task kunit_try_catch/212 [ 33.484336] [ 33.484855] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 33.486971] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.487633] Hardware name: linux,dummy-virt (DT) [ 33.488194] Call trace: [ 33.488684] show_stack+0x20/0x38 (C) [ 33.489290] dump_stack_lvl+0x8c/0xd0 [ 33.489862] print_report+0x118/0x5e0 [ 33.490512] kasan_report+0xc8/0x118 [ 33.491163] __asan_report_load1_noabort+0x20/0x30 [ 33.492428] mempool_oob_right_helper+0x2ac/0x2f0 [ 33.493010] mempool_kmalloc_large_oob_right+0xbc/0x118 [ 33.493854] kunit_try_run_case+0x14c/0x3d0 [ 33.495003] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.495731] kthread+0x24c/0x2d0 [ 33.496300] ret_from_fork+0x10/0x20 [ 33.496898] [ 33.497273] The buggy address belongs to the physical page: [ 33.498922] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662c [ 33.499793] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.500728] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.502095] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.503029] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.503844] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.504771] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.506564] head: 0bfffe0000000002 ffffc1ffc3198b01 ffffffffffffffff 0000000000000000 [ 33.507396] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 33.508245] page dumped because: kasan: bad access detected [ 33.508866] [ 33.509236] Memory state around the buggy address: [ 33.510377] fff00000c662df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.511161] fff00000c662df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.512045] >fff00000c662e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.512819] ^ [ 33.513367] fff00000c662e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.515111] fff00000c662e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.515900] ================================================================== [ 33.528781] ================================================================== [ 33.530150] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 33.531232] Read of size 1 at addr fff00000c65992bb by task kunit_try_catch/214 [ 33.532038] [ 33.532446] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 33.533519] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.534958] Hardware name: linux,dummy-virt (DT) [ 33.535921] Call trace: [ 33.536365] show_stack+0x20/0x38 (C) [ 33.536931] dump_stack_lvl+0x8c/0xd0 [ 33.537607] print_report+0x118/0x5e0 [ 33.538263] kasan_report+0xc8/0x118 [ 33.538894] __asan_report_load1_noabort+0x20/0x30 [ 33.539505] mempool_oob_right_helper+0x2ac/0x2f0 [ 33.540360] mempool_slab_oob_right+0xb8/0x110 [ 33.541083] kunit_try_run_case+0x14c/0x3d0 [ 33.541780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.542418] kthread+0x24c/0x2d0 [ 33.543041] ret_from_fork+0x10/0x20 [ 33.544656] [ 33.544931] Allocated by task 214: [ 33.545404] kasan_save_stack+0x3c/0x68 [ 33.545972] kasan_save_track+0x20/0x40 [ 33.546996] kasan_save_alloc_info+0x40/0x58 [ 33.547622] __kasan_mempool_unpoison_object+0xbc/0x180 [ 33.548300] remove_element+0x16c/0x1f8 [ 33.548953] mempool_alloc_preallocated+0x58/0xc0 [ 33.550640] mempool_oob_right_helper+0x98/0x2f0 [ 33.551189] mempool_slab_oob_right+0xb8/0x110 [ 33.552055] kunit_try_run_case+0x14c/0x3d0 [ 33.552931] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.553976] kthread+0x24c/0x2d0 [ 33.554559] ret_from_fork+0x10/0x20 [ 33.555176] [ 33.555516] The buggy address belongs to the object at fff00000c6599240 [ 33.555516] which belongs to the cache test_cache of size 123 [ 33.557034] The buggy address is located 0 bytes to the right of [ 33.557034] allocated 123-byte region [fff00000c6599240, fff00000c65992bb) [ 33.558833] [ 33.559244] The buggy address belongs to the physical page: [ 33.559969] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106599 [ 33.560878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.562086] page_type: f5(slab) [ 33.562728] raw: 0bfffe0000000000 fff00000c46cadc0 dead000000000122 0000000000000000 [ 33.563649] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000 [ 33.564729] page dumped because: kasan: bad access detected [ 33.565388] [ 33.566289] Memory state around the buggy address: [ 33.566922] fff00000c6599180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.567599] fff00000c6599200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 33.568554] >fff00000c6599280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 33.569377] ^ [ 33.570074] fff00000c6599300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.571028] fff00000c6599380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.572370] ================================================================== [ 33.428291] ================================================================== [ 33.429544] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 33.430803] Read of size 1 at addr fff00000c5e99d73 by task kunit_try_catch/210 [ 33.431191] [ 33.431375] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 33.432343] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.432839] Hardware name: linux,dummy-virt (DT) [ 33.433516] Call trace: [ 33.433892] show_stack+0x20/0x38 (C) [ 33.435259] dump_stack_lvl+0x8c/0xd0 [ 33.435810] print_report+0x118/0x5e0 [ 33.436421] kasan_report+0xc8/0x118 [ 33.437039] __asan_report_load1_noabort+0x20/0x30 [ 33.437774] mempool_oob_right_helper+0x2ac/0x2f0 [ 33.439020] mempool_kmalloc_oob_right+0xbc/0x118 [ 33.439778] kunit_try_run_case+0x14c/0x3d0 [ 33.440415] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.441078] kthread+0x24c/0x2d0 [ 33.442019] ret_from_fork+0x10/0x20 [ 33.442604] [ 33.442971] Allocated by task 210: [ 33.443555] kasan_save_stack+0x3c/0x68 [ 33.444077] kasan_save_track+0x20/0x40 [ 33.444727] kasan_save_alloc_info+0x40/0x58 [ 33.445301] __kasan_mempool_unpoison_object+0x11c/0x180 [ 33.446359] remove_element+0x130/0x1f8 [ 33.447030] mempool_alloc_preallocated+0x58/0xc0 [ 33.447694] mempool_oob_right_helper+0x98/0x2f0 [ 33.448263] mempool_kmalloc_oob_right+0xbc/0x118 [ 33.449031] kunit_try_run_case+0x14c/0x3d0 [ 33.449794] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.451156] kthread+0x24c/0x2d0 [ 33.451870] ret_from_fork+0x10/0x20 [ 33.452458] [ 33.453032] The buggy address belongs to the object at fff00000c5e99d00 [ 33.453032] which belongs to the cache kmalloc-128 of size 128 [ 33.454221] The buggy address is located 0 bytes to the right of [ 33.454221] allocated 115-byte region [fff00000c5e99d00, fff00000c5e99d73) [ 33.455494] [ 33.455891] The buggy address belongs to the physical page: [ 33.456479] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e99 [ 33.457477] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.458226] page_type: f5(slab) [ 33.458805] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.459845] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 33.460665] page dumped because: kasan: bad access detected [ 33.461409] [ 33.461773] Memory state around the buggy address: [ 33.462379] fff00000c5e99c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.463219] fff00000c5e99c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.464071] >fff00000c5e99d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 33.464912] ^ [ 33.465691] fff00000c5e99d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.466450] fff00000c5e99e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 33.467279] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 32.798381] ================================================================== [ 32.799513] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x17c/0x2f8 [ 32.800466] Read of size 1 at addr fff00000c5d7eb40 by task kunit_try_catch/204 [ 32.801416] [ 32.802369] CPU: 1 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 32.803694] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.804368] Hardware name: linux,dummy-virt (DT) [ 32.804926] Call trace: [ 32.805387] show_stack+0x20/0x38 (C) [ 32.806483] dump_stack_lvl+0x8c/0xd0 [ 32.807060] print_report+0x118/0x5e0 [ 32.807666] kasan_report+0xc8/0x118 [ 32.808271] __kasan_check_byte+0x54/0x70 [ 32.808913] kmem_cache_destroy+0x34/0x218 [ 32.809505] kmem_cache_double_destroy+0x17c/0x2f8 [ 32.810312] kunit_try_run_case+0x14c/0x3d0 [ 32.810934] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.812091] kthread+0x24c/0x2d0 [ 32.812863] ret_from_fork+0x10/0x20 [ 32.813472] [ 32.814251] Allocated by task 204: [ 32.814770] kasan_save_stack+0x3c/0x68 [ 32.815351] kasan_save_track+0x20/0x40 [ 32.815964] kasan_save_alloc_info+0x40/0x58 [ 32.816548] __kasan_slab_alloc+0xa8/0xb0 [ 32.817187] kmem_cache_alloc_noprof+0x108/0x3a0 [ 32.818264] __kmem_cache_create_args+0x18c/0x2b0 [ 32.819013] kmem_cache_double_destroy+0xc8/0x2f8 [ 32.819683] kunit_try_run_case+0x14c/0x3d0 [ 32.820248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.820978] kthread+0x24c/0x2d0 [ 32.821547] ret_from_fork+0x10/0x20 [ 32.822168] [ 32.822467] Freed by task 204: [ 32.823422] kasan_save_stack+0x3c/0x68 [ 32.824034] kasan_save_track+0x20/0x40 [ 32.824683] kasan_save_free_info+0x4c/0x78 [ 32.825202] __kasan_slab_free+0x6c/0x98 [ 32.826287] kmem_cache_free+0x118/0x470 [ 32.826839] slab_kmem_cache_release+0x38/0x50 [ 32.827464] kmem_cache_release+0x1c/0x30 [ 32.828099] kobject_put+0x17c/0x430 [ 32.828734] sysfs_slab_release+0x1c/0x30 [ 32.829288] kmem_cache_destroy+0x118/0x218 [ 32.830408] kmem_cache_double_destroy+0x130/0x2f8 [ 32.831065] kunit_try_run_case+0x14c/0x3d0 [ 32.831606] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.832384] kthread+0x24c/0x2d0 [ 32.832964] ret_from_fork+0x10/0x20 [ 32.833505] [ 32.834321] The buggy address belongs to the object at fff00000c5d7eb40 [ 32.834321] which belongs to the cache kmem_cache of size 208 [ 32.835566] The buggy address is located 0 bytes inside of [ 32.835566] freed 208-byte region [fff00000c5d7eb40, fff00000c5d7ec10) [ 32.836700] [ 32.837070] The buggy address belongs to the physical page: [ 32.838314] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d7e [ 32.839383] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.840139] page_type: f5(slab) [ 32.840746] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 32.842073] raw: 0000000000000000 00000000800c000c 00000001f5000000 0000000000000000 [ 32.843092] page dumped because: kasan: bad access detected [ 32.843566] [ 32.843923] Memory state around the buggy address: [ 32.844642] fff00000c5d7ea00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.845422] fff00000c5d7ea80: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 32.846694] >fff00000c5d7eb00: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 32.847562] ^ [ 32.848303] fff00000c5d7eb80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.849128] fff00000c5d7ec00: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.850379] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 32.670794] ================================================================== [ 32.671970] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x390/0x468 [ 32.672632] Read of size 1 at addr fff00000c5ec1000 by task kunit_try_catch/202 [ 32.673547] [ 32.674750] CPU: 1 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 32.676227] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.676928] Hardware name: linux,dummy-virt (DT) [ 32.677681] Call trace: [ 32.678117] show_stack+0x20/0x38 (C) [ 32.679039] dump_stack_lvl+0x8c/0xd0 [ 32.679611] print_report+0x118/0x5e0 [ 32.680190] kasan_report+0xc8/0x118 [ 32.680804] __asan_report_load1_noabort+0x20/0x30 [ 32.681436] kmem_cache_rcu_uaf+0x390/0x468 [ 32.682576] kunit_try_run_case+0x14c/0x3d0 [ 32.683184] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.683851] kthread+0x24c/0x2d0 [ 32.684461] ret_from_fork+0x10/0x20 [ 32.685004] [ 32.685362] Allocated by task 202: [ 32.686304] kasan_save_stack+0x3c/0x68 [ 32.687165] kasan_save_track+0x20/0x40 [ 32.687674] kasan_save_alloc_info+0x40/0x58 [ 32.688355] __kasan_slab_alloc+0xa8/0xb0 [ 32.689012] kmem_cache_alloc_noprof+0x108/0x3a0 [ 32.689866] kmem_cache_rcu_uaf+0x12c/0x468 [ 32.690736] kunit_try_run_case+0x14c/0x3d0 [ 32.691877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.692732] kthread+0x24c/0x2d0 [ 32.693079] ret_from_fork+0x10/0x20 [ 32.693877] [ 32.694573] Freed by task 0: [ 32.695008] kasan_save_stack+0x3c/0x68 [ 32.695506] kasan_save_track+0x20/0x40 [ 32.696149] kasan_save_free_info+0x4c/0x78 [ 32.696809] __kasan_slab_free+0x6c/0x98 [ 32.697442] slab_free_after_rcu_debug+0xd4/0x2f8 [ 32.698878] rcu_core+0xa54/0x1df8 [ 32.699449] rcu_core_si+0x18/0x30 [ 32.699963] handle_softirqs+0x374/0xb20 [ 32.700667] __do_softirq+0x1c/0x28 [ 32.701646] [ 32.702249] Last potentially related work creation: [ 32.703295] kasan_save_stack+0x3c/0x68 [ 32.703912] __kasan_record_aux_stack+0xbc/0xe8 [ 32.704504] kasan_record_aux_stack_noalloc+0x14/0x20 [ 32.705266] kmem_cache_free+0x28c/0x470 [ 32.706469] kmem_cache_rcu_uaf+0x16c/0x468 [ 32.707058] kunit_try_run_case+0x14c/0x3d0 [ 32.707838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.708718] kthread+0x24c/0x2d0 [ 32.709340] ret_from_fork+0x10/0x20 [ 32.710214] [ 32.710685] The buggy address belongs to the object at fff00000c5ec1000 [ 32.710685] which belongs to the cache test_cache of size 200 [ 32.711957] The buggy address is located 0 bytes inside of [ 32.711957] freed 200-byte region [fff00000c5ec1000, fff00000c5ec10c8) [ 32.713116] [ 32.713547] The buggy address belongs to the physical page: [ 32.714660] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ec1 [ 32.716433] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.717277] page_type: f5(slab) [ 32.718371] raw: 0bfffe0000000000 fff00000c5d7ea00 dead000000000122 0000000000000000 [ 32.719191] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000 [ 32.720036] page dumped because: kasan: bad access detected [ 32.720666] [ 32.721030] Memory state around the buggy address: [ 32.721726] fff00000c5ec0f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.723407] fff00000c5ec0f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.724288] >fff00000c5ec1000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.725358] ^ [ 32.726135] fff00000c5ec1080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 32.727255] fff00000c5ec1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.728168] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 32.538881] ================================================================== [ 32.540119] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3b8 [ 32.540838] Free of addr fff00000c5e65001 by task kunit_try_catch/200 [ 32.541662] [ 32.542427] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 32.543682] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.544149] Hardware name: linux,dummy-virt (DT) [ 32.544921] Call trace: [ 32.545395] show_stack+0x20/0x38 (C) [ 32.546873] dump_stack_lvl+0x8c/0xd0 [ 32.547516] print_report+0x118/0x5e0 [ 32.548163] kasan_report_invalid_free+0xb0/0xd8 [ 32.549274] check_slab_allocation+0xfc/0x108 [ 32.550330] __kasan_slab_pre_free+0x2c/0x48 [ 32.551089] kmem_cache_free+0xf0/0x470 [ 32.551487] kmem_cache_invalid_free+0x184/0x3b8 [ 32.552371] kunit_try_run_case+0x14c/0x3d0 [ 32.553029] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.553856] kthread+0x24c/0x2d0 [ 32.554432] ret_from_fork+0x10/0x20 [ 32.555168] [ 32.555520] Allocated by task 200: [ 32.556270] kasan_save_stack+0x3c/0x68 [ 32.556905] kasan_save_track+0x20/0x40 [ 32.557574] kasan_save_alloc_info+0x40/0x58 [ 32.558294] __kasan_slab_alloc+0xa8/0xb0 [ 32.559595] kmem_cache_alloc_noprof+0x108/0x3a0 [ 32.560323] kmem_cache_invalid_free+0x12c/0x3b8 [ 32.561029] kunit_try_run_case+0x14c/0x3d0 [ 32.561785] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.562454] kthread+0x24c/0x2d0 [ 32.563092] ret_from_fork+0x10/0x20 [ 32.563774] [ 32.564139] The buggy address belongs to the object at fff00000c5e65000 [ 32.564139] which belongs to the cache test_cache of size 200 [ 32.565545] The buggy address is located 1 bytes inside of [ 32.565545] 200-byte region [fff00000c5e65000, fff00000c5e650c8) [ 32.566689] [ 32.567079] The buggy address belongs to the physical page: [ 32.568134] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e65 [ 32.569182] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.570342] page_type: f5(slab) [ 32.570907] raw: 0bfffe0000000000 fff00000c5d7e8c0 dead000000000122 0000000000000000 [ 32.571799] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000 [ 32.572747] page dumped because: kasan: bad access detected [ 32.573430] [ 32.574126] Memory state around the buggy address: [ 32.574790] fff00000c5e64f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.575681] fff00000c5e64f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.576593] >fff00000c5e65000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.577381] ^ [ 32.578283] fff00000c5e65080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 32.579765] fff00000c5e65100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.580576] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 32.467834] ================================================================== [ 32.468949] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 32.469946] Free of addr fff00000c5ea3000 by task kunit_try_catch/198 [ 32.470695] [ 32.471097] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 32.472658] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.473204] Hardware name: linux,dummy-virt (DT) [ 32.473827] Call trace: [ 32.474233] show_stack+0x20/0x38 (C) [ 32.475030] dump_stack_lvl+0x8c/0xd0 [ 32.475673] print_report+0x118/0x5e0 [ 32.476287] kasan_report_invalid_free+0xb0/0xd8 [ 32.477149] check_slab_allocation+0xd4/0x108 [ 32.477935] __kasan_slab_pre_free+0x2c/0x48 [ 32.478605] kmem_cache_free+0xf0/0x470 [ 32.479321] kmem_cache_double_free+0x190/0x3c8 [ 32.479957] kunit_try_run_case+0x14c/0x3d0 [ 32.480713] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.481441] kthread+0x24c/0x2d0 [ 32.481991] ret_from_fork+0x10/0x20 [ 32.482587] [ 32.482961] Allocated by task 198: [ 32.483601] kasan_save_stack+0x3c/0x68 [ 32.484266] kasan_save_track+0x20/0x40 [ 32.484942] kasan_save_alloc_info+0x40/0x58 [ 32.485712] __kasan_slab_alloc+0xa8/0xb0 [ 32.486373] kmem_cache_alloc_noprof+0x108/0x3a0 [ 32.487156] kmem_cache_double_free+0x12c/0x3c8 [ 32.487902] kunit_try_run_case+0x14c/0x3d0 [ 32.488693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.489371] kthread+0x24c/0x2d0 [ 32.489942] ret_from_fork+0x10/0x20 [ 32.490423] [ 32.490810] Freed by task 198: [ 32.491319] kasan_save_stack+0x3c/0x68 [ 32.491961] kasan_save_track+0x20/0x40 [ 32.492465] kasan_save_free_info+0x4c/0x78 [ 32.493159] __kasan_slab_free+0x6c/0x98 [ 32.493777] kmem_cache_free+0x118/0x470 [ 32.494408] kmem_cache_double_free+0x140/0x3c8 [ 32.495066] kunit_try_run_case+0x14c/0x3d0 [ 32.495672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.496446] kthread+0x24c/0x2d0 [ 32.497034] ret_from_fork+0x10/0x20 [ 32.497621] [ 32.497983] The buggy address belongs to the object at fff00000c5ea3000 [ 32.497983] which belongs to the cache test_cache of size 200 [ 32.499185] The buggy address is located 0 bytes inside of [ 32.499185] 200-byte region [fff00000c5ea3000, fff00000c5ea30c8) [ 32.500367] [ 32.500763] The buggy address belongs to the physical page: [ 32.501386] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ea3 [ 32.502420] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.503234] page_type: f5(slab) [ 32.503734] raw: 0bfffe0000000000 fff00000c5d7e780 dead000000000122 0000000000000000 [ 32.504734] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000 [ 32.505594] page dumped because: kasan: bad access detected [ 32.506246] [ 32.506638] Memory state around the buggy address: [ 32.507301] fff00000c5ea2f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.508116] fff00000c5ea2f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.509031] >fff00000c5ea3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.509903] ^ [ 32.510356] fff00000c5ea3080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 32.511758] fff00000c5ea3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.512802] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 32.381021] ================================================================== [ 32.382668] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x33c/0x428 [ 32.383370] Read of size 1 at addr fff00000c5e5a0c8 by task kunit_try_catch/196 [ 32.384313] [ 32.384772] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 32.385925] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.386617] Hardware name: linux,dummy-virt (DT) [ 32.387366] Call trace: [ 32.387903] show_stack+0x20/0x38 (C) [ 32.388633] dump_stack_lvl+0x8c/0xd0 [ 32.389375] print_report+0x118/0x5e0 [ 32.390312] kasan_report+0xc8/0x118 [ 32.390909] __asan_report_load1_noabort+0x20/0x30 [ 32.391724] kmem_cache_oob+0x33c/0x428 [ 32.392454] kunit_try_run_case+0x14c/0x3d0 [ 32.393285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.394388] kthread+0x24c/0x2d0 [ 32.394959] ret_from_fork+0x10/0x20 [ 32.395601] [ 32.395953] Allocated by task 196: [ 32.396512] kasan_save_stack+0x3c/0x68 [ 32.397203] kasan_save_track+0x20/0x40 [ 32.397858] kasan_save_alloc_info+0x40/0x58 [ 32.398555] __kasan_slab_alloc+0xa8/0xb0 [ 32.399977] kmem_cache_alloc_noprof+0x108/0x3a0 [ 32.400704] kmem_cache_oob+0x12c/0x428 [ 32.401284] kunit_try_run_case+0x14c/0x3d0 [ 32.402285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.403018] kthread+0x24c/0x2d0 [ 32.403617] ret_from_fork+0x10/0x20 [ 32.404272] [ 32.404598] The buggy address belongs to the object at fff00000c5e5a000 [ 32.404598] which belongs to the cache test_cache of size 200 [ 32.406321] The buggy address is located 0 bytes to the right of [ 32.406321] allocated 200-byte region [fff00000c5e5a000, fff00000c5e5a0c8) [ 32.407739] [ 32.408115] The buggy address belongs to the physical page: [ 32.408760] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e5a [ 32.409832] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.410953] page_type: f5(slab) [ 32.411483] raw: 0bfffe0000000000 fff00000c46cac80 dead000000000122 0000000000000000 [ 32.412446] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000 [ 32.413383] page dumped because: kasan: bad access detected [ 32.414324] [ 32.414764] Memory state around the buggy address: [ 32.415364] fff00000c5e59f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.416248] fff00000c5e5a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.417197] >fff00000c5e5a080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 32.418395] ^ [ 32.419046] fff00000c5e5a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.420544] fff00000c5e5a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.421360] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[ 31.823122] ================================================================== [ 31.824008] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 31.824870] Free of addr fff00000c56f3820 by task kunit_try_catch/181 [ 31.825476] [ 31.827015] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.828242] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.829045] Hardware name: linux,dummy-virt (DT) [ 31.830089] Call trace: [ 31.830544] show_stack+0x20/0x38 (C) [ 31.831208] dump_stack_lvl+0x8c/0xd0 [ 31.831869] print_report+0x118/0x5e0 [ 31.832418] kasan_report_invalid_free+0xb0/0xd8 [ 31.833164] check_slab_allocation+0xd4/0x108 [ 31.833832] __kasan_slab_pre_free+0x2c/0x48 [ 31.834421] kfree+0xe8/0x3d0 [ 31.835722] kfree_sensitive+0x3c/0xb0 [ 31.836355] kmalloc_double_kzfree+0x168/0x308 [ 31.837061] kunit_try_run_case+0x14c/0x3d0 [ 31.838199] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.839013] kthread+0x24c/0x2d0 [ 31.839627] ret_from_fork+0x10/0x20 [ 31.840191] [ 31.840582] Allocated by task 181: [ 31.841064] kasan_save_stack+0x3c/0x68 [ 31.841642] kasan_save_track+0x20/0x40 [ 31.842745] kasan_save_alloc_info+0x40/0x58 [ 31.843434] __kasan_kmalloc+0xd4/0xd8 [ 31.843915] __kmalloc_cache_noprof+0x15c/0x3c8 [ 31.844628] kmalloc_double_kzfree+0xb8/0x308 [ 31.845229] kunit_try_run_case+0x14c/0x3d0 [ 31.845982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.846694] kthread+0x24c/0x2d0 [ 31.847606] ret_from_fork+0x10/0x20 [ 31.848219] [ 31.848611] Freed by task 181: [ 31.849120] kasan_save_stack+0x3c/0x68 [ 31.850034] kasan_save_track+0x20/0x40 [ 31.850689] kasan_save_free_info+0x4c/0x78 [ 31.851356] __kasan_slab_free+0x6c/0x98 [ 31.852740] kfree+0x114/0x3d0 [ 31.853432] kfree_sensitive+0x80/0xb0 [ 31.854460] kmalloc_double_kzfree+0x11c/0x308 [ 31.855329] kunit_try_run_case+0x14c/0x3d0 [ 31.856154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.856915] kthread+0x24c/0x2d0 [ 31.857172] ret_from_fork+0x10/0x20 [ 31.857413] [ 31.857628] The buggy address belongs to the object at fff00000c56f3820 [ 31.857628] which belongs to the cache kmalloc-16 of size 16 [ 31.860111] The buggy address is located 0 bytes inside of [ 31.860111] 16-byte region [fff00000c56f3820, fff00000c56f3830) [ 31.861355] [ 31.861788] The buggy address belongs to the physical page: [ 31.862800] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f3 [ 31.863703] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.864372] page_type: f5(slab) [ 31.865115] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 31.866957] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 31.867771] page dumped because: kasan: bad access detected [ 31.868394] [ 31.868791] Memory state around the buggy address: [ 31.869480] fff00000c56f3700: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 31.870326] fff00000c56f3780: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 31.871176] >fff00000c56f3800: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 31.872513] ^ [ 31.873107] fff00000c56f3880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.874775] fff00000c56f3900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.875581] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 31.772015] ================================================================== [ 31.773614] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 31.774856] Read of size 1 at addr fff00000c56f3820 by task kunit_try_catch/181 [ 31.775619] [ 31.776016] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.777234] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.777703] Hardware name: linux,dummy-virt (DT) [ 31.778636] Call trace: [ 31.779083] show_stack+0x20/0x38 (C) [ 31.780125] dump_stack_lvl+0x8c/0xd0 [ 31.780801] print_report+0x118/0x5e0 [ 31.781433] kasan_report+0xc8/0x118 [ 31.782690] __kasan_check_byte+0x54/0x70 [ 31.783246] kfree_sensitive+0x30/0xb0 [ 31.783868] kmalloc_double_kzfree+0x168/0x308 [ 31.784567] kunit_try_run_case+0x14c/0x3d0 [ 31.785198] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.786651] kthread+0x24c/0x2d0 [ 31.786930] ret_from_fork+0x10/0x20 [ 31.787198] [ 31.787352] Allocated by task 181: [ 31.787890] kasan_save_stack+0x3c/0x68 [ 31.788415] kasan_save_track+0x20/0x40 [ 31.789087] kasan_save_alloc_info+0x40/0x58 [ 31.789656] __kasan_kmalloc+0xd4/0xd8 [ 31.790133] __kmalloc_cache_noprof+0x15c/0x3c8 [ 31.791623] kmalloc_double_kzfree+0xb8/0x308 [ 31.792355] kunit_try_run_case+0x14c/0x3d0 [ 31.793146] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.794202] kthread+0x24c/0x2d0 [ 31.794684] ret_from_fork+0x10/0x20 [ 31.795163] [ 31.795542] Freed by task 181: [ 31.795972] kasan_save_stack+0x3c/0x68 [ 31.796606] kasan_save_track+0x20/0x40 [ 31.797222] kasan_save_free_info+0x4c/0x78 [ 31.797915] __kasan_slab_free+0x6c/0x98 [ 31.798558] kfree+0x114/0x3d0 [ 31.799066] kfree_sensitive+0x80/0xb0 [ 31.799599] kmalloc_double_kzfree+0x11c/0x308 [ 31.800513] kunit_try_run_case+0x14c/0x3d0 [ 31.801056] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.802682] kthread+0x24c/0x2d0 [ 31.803156] ret_from_fork+0x10/0x20 [ 31.803780] [ 31.804145] The buggy address belongs to the object at fff00000c56f3820 [ 31.804145] which belongs to the cache kmalloc-16 of size 16 [ 31.805430] The buggy address is located 0 bytes inside of [ 31.805430] freed 16-byte region [fff00000c56f3820, fff00000c56f3830) [ 31.807056] [ 31.807427] The buggy address belongs to the physical page: [ 31.808101] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f3 [ 31.809386] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.811213] page_type: f5(slab) [ 31.811700] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 31.812652] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 31.813472] page dumped because: kasan: bad access detected [ 31.814241] [ 31.814598] Memory state around the buggy address: [ 31.815276] fff00000c56f3700: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 31.816051] fff00000c56f3780: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 31.817304] >fff00000c56f3800: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 31.819029] ^ [ 31.819492] fff00000c56f3880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.820427] fff00000c56f3900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.821101] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 31.645390] ================================================================== [ 31.646477] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 31.647473] Write of size 33 at addr fff00000c5e77200 by task kunit_try_catch/175 [ 31.648474] [ 31.649009] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.650182] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.651321] Hardware name: linux,dummy-virt (DT) [ 31.651957] Call trace: [ 31.652402] show_stack+0x20/0x38 (C) [ 31.652995] dump_stack_lvl+0x8c/0xd0 [ 31.653613] print_report+0x118/0x5e0 [ 31.654628] kasan_report+0xc8/0x118 [ 31.655291] kasan_check_range+0x100/0x1a8 [ 31.656078] __asan_memset+0x34/0x78 [ 31.656812] kmalloc_uaf_memset+0x170/0x310 [ 31.657463] kunit_try_run_case+0x14c/0x3d0 [ 31.658416] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.659344] kthread+0x24c/0x2d0 [ 31.659911] ret_from_fork+0x10/0x20 [ 31.660554] [ 31.660862] Allocated by task 175: [ 31.661463] kasan_save_stack+0x3c/0x68 [ 31.662521] kasan_save_track+0x20/0x40 [ 31.663413] kasan_save_alloc_info+0x40/0x58 [ 31.664149] __kasan_kmalloc+0xd4/0xd8 [ 31.664776] __kmalloc_cache_noprof+0x15c/0x3c8 [ 31.665458] kmalloc_uaf_memset+0xb8/0x310 [ 31.666338] kunit_try_run_case+0x14c/0x3d0 [ 31.667280] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.667938] kthread+0x24c/0x2d0 [ 31.668519] ret_from_fork+0x10/0x20 [ 31.669128] [ 31.669452] Freed by task 175: [ 31.670429] kasan_save_stack+0x3c/0x68 [ 31.671071] kasan_save_track+0x20/0x40 [ 31.671600] kasan_save_free_info+0x4c/0x78 [ 31.672231] __kasan_slab_free+0x6c/0x98 [ 31.672866] kfree+0x114/0x3d0 [ 31.673416] kmalloc_uaf_memset+0x11c/0x310 [ 31.674246] kunit_try_run_case+0x14c/0x3d0 [ 31.674948] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.675934] kthread+0x24c/0x2d0 [ 31.676514] ret_from_fork+0x10/0x20 [ 31.677105] [ 31.677456] The buggy address belongs to the object at fff00000c5e77200 [ 31.677456] which belongs to the cache kmalloc-64 of size 64 [ 31.679268] The buggy address is located 0 bytes inside of [ 31.679268] freed 64-byte region [fff00000c5e77200, fff00000c5e77240) [ 31.680424] [ 31.680818] The buggy address belongs to the physical page: [ 31.681548] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e77 [ 31.682825] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.683704] page_type: f5(slab) [ 31.684223] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 31.685236] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.686632] page dumped because: kasan: bad access detected [ 31.687276] [ 31.687631] Memory state around the buggy address: [ 31.688197] fff00000c5e77100: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 31.689009] fff00000c5e77180: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 31.689936] >fff00000c5e77200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.690718] ^ [ 31.691260] fff00000c5e77280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.692557] fff00000c5e77300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.693388] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 31.536362] ================================================================== [ 31.538091] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e8 [ 31.539069] Read of size 64 at addr fff00000c5e5ec84 by task kunit_try_catch/171 [ 31.539895] [ 31.540313] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.541625] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.542115] Hardware name: linux,dummy-virt (DT) [ 31.542678] Call trace: [ 31.543139] show_stack+0x20/0x38 (C) [ 31.543787] dump_stack_lvl+0x8c/0xd0 [ 31.544316] print_report+0x118/0x5e0 [ 31.544960] kasan_report+0xc8/0x118 [ 31.545573] kasan_check_range+0x100/0x1a8 [ 31.546101] __asan_memmove+0x3c/0x98 [ 31.546759] kmalloc_memmove_invalid_size+0x154/0x2e8 [ 31.547479] kunit_try_run_case+0x14c/0x3d0 [ 31.548101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.548976] kthread+0x24c/0x2d0 [ 31.549602] ret_from_fork+0x10/0x20 [ 31.550199] [ 31.550573] Allocated by task 171: [ 31.551125] kasan_save_stack+0x3c/0x68 [ 31.551771] kasan_save_track+0x20/0x40 [ 31.552289] kasan_save_alloc_info+0x40/0x58 [ 31.552976] __kasan_kmalloc+0xd4/0xd8 [ 31.553602] __kmalloc_cache_noprof+0x15c/0x3c8 [ 31.554174] kmalloc_memmove_invalid_size+0xb0/0x2e8 [ 31.554923] kunit_try_run_case+0x14c/0x3d0 [ 31.555560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.556277] kthread+0x24c/0x2d0 [ 31.556866] ret_from_fork+0x10/0x20 [ 31.557426] [ 31.557784] The buggy address belongs to the object at fff00000c5e5ec80 [ 31.557784] which belongs to the cache kmalloc-64 of size 64 [ 31.559090] The buggy address is located 4 bytes inside of [ 31.559090] allocated 64-byte region [fff00000c5e5ec80, fff00000c5e5ecc0) [ 31.560270] [ 31.560653] The buggy address belongs to the physical page: [ 31.561396] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e5e [ 31.562412] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.563181] page_type: f5(slab) [ 31.563703] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 31.564353] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.564999] page dumped because: kasan: bad access detected [ 31.565518] [ 31.565895] Memory state around the buggy address: [ 31.566622] fff00000c5e5eb80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 31.567439] fff00000c5e5ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.568322] >fff00000c5e5ec80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 31.569179] ^ [ 31.569818] fff00000c5e5ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.570499] fff00000c5e5ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.571467] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 31.483561] ================================================================== [ 31.484829] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 31.485483] Read of size 18446744073709551614 at addr fff00000c5e5ec04 by task kunit_try_catch/169 [ 31.487047] [ 31.487439] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.488786] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.489279] Hardware name: linux,dummy-virt (DT) [ 31.490018] Call trace: [ 31.490557] show_stack+0x20/0x38 (C) [ 31.491811] dump_stack_lvl+0x8c/0xd0 [ 31.492283] print_report+0x118/0x5e0 [ 31.493020] kasan_report+0xc8/0x118 [ 31.493795] kasan_check_range+0x100/0x1a8 [ 31.494849] __asan_memmove+0x3c/0x98 [ 31.495371] kmalloc_memmove_negative_size+0x154/0x2e0 [ 31.496124] kunit_try_run_case+0x14c/0x3d0 [ 31.496848] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.497617] kthread+0x24c/0x2d0 [ 31.498113] ret_from_fork+0x10/0x20 [ 31.498806] [ 31.499153] Allocated by task 169: [ 31.499712] kasan_save_stack+0x3c/0x68 [ 31.500391] kasan_save_track+0x20/0x40 [ 31.500999] kasan_save_alloc_info+0x40/0x58 [ 31.501618] __kasan_kmalloc+0xd4/0xd8 [ 31.502232] __kmalloc_cache_noprof+0x15c/0x3c8 [ 31.503689] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 31.504508] kunit_try_run_case+0x14c/0x3d0 [ 31.505321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.506520] kthread+0x24c/0x2d0 [ 31.507037] ret_from_fork+0x10/0x20 [ 31.507575] [ 31.507937] The buggy address belongs to the object at fff00000c5e5ec00 [ 31.507937] which belongs to the cache kmalloc-64 of size 64 [ 31.509554] The buggy address is located 4 bytes inside of [ 31.509554] 64-byte region [fff00000c5e5ec00, fff00000c5e5ec40) [ 31.510687] [ 31.511052] The buggy address belongs to the physical page: [ 31.512650] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e5e [ 31.513352] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.514491] page_type: f5(slab) [ 31.515119] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 31.515898] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.516718] page dumped because: kasan: bad access detected [ 31.518073] [ 31.518427] Memory state around the buggy address: [ 31.519156] fff00000c5e5eb00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 31.520747] fff00000c5e5eb80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 31.521556] >fff00000c5e5ec00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 31.522903] ^ [ 31.523401] fff00000c5e5ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.524276] fff00000c5e5ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.525076] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset
[ 31.327145] ================================================================== [ 31.328221] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 31.329119] Write of size 4 at addr fff00000c64d9d75 by task kunit_try_catch/163 [ 31.329849] [ 31.331027] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.332668] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.333388] Hardware name: linux,dummy-virt (DT) [ 31.334325] Call trace: [ 31.334771] show_stack+0x20/0x38 (C) [ 31.335354] dump_stack_lvl+0x8c/0xd0 [ 31.335872] print_report+0x118/0x5e0 [ 31.336509] kasan_report+0xc8/0x118 [ 31.337200] kasan_check_range+0x100/0x1a8 [ 31.337908] __asan_memset+0x34/0x78 [ 31.338768] kmalloc_oob_memset_4+0x150/0x300 [ 31.339422] kunit_try_run_case+0x14c/0x3d0 [ 31.340114] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.340994] kthread+0x24c/0x2d0 [ 31.341878] ret_from_fork+0x10/0x20 [ 31.342480] [ 31.342825] Allocated by task 163: [ 31.343277] kasan_save_stack+0x3c/0x68 [ 31.343913] kasan_save_track+0x20/0x40 [ 31.344558] kasan_save_alloc_info+0x40/0x58 [ 31.345149] __kasan_kmalloc+0xd4/0xd8 [ 31.345971] __kmalloc_cache_noprof+0x15c/0x3c8 [ 31.346634] kmalloc_oob_memset_4+0xb0/0x300 [ 31.348182] kunit_try_run_case+0x14c/0x3d0 [ 31.348806] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.349484] kthread+0x24c/0x2d0 [ 31.350486] ret_from_fork+0x10/0x20 [ 31.351015] [ 31.351348] The buggy address belongs to the object at fff00000c64d9d00 [ 31.351348] which belongs to the cache kmalloc-128 of size 128 [ 31.352740] The buggy address is located 117 bytes inside of [ 31.352740] allocated 120-byte region [fff00000c64d9d00, fff00000c64d9d78) [ 31.354587] [ 31.354955] The buggy address belongs to the physical page: [ 31.355673] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064d9 [ 31.356647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.357567] page_type: f5(slab) [ 31.358059] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.359477] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 31.360366] page dumped because: kasan: bad access detected [ 31.361057] [ 31.361451] Memory state around the buggy address: [ 31.362594] fff00000c64d9c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.363479] fff00000c64d9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.364225] >fff00000c64d9d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.365143] ^ [ 31.366150] fff00000c64d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.367615] fff00000c64d9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.368454] ================================================================== [ 31.379551] ================================================================== [ 31.380753] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 31.381516] Write of size 8 at addr fff00000c64d9e71 by task kunit_try_catch/165 [ 31.383079] [ 31.383434] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.384640] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.385396] Hardware name: linux,dummy-virt (DT) [ 31.385956] Call trace: [ 31.386451] show_stack+0x20/0x38 (C) [ 31.387085] dump_stack_lvl+0x8c/0xd0 [ 31.387785] print_report+0x118/0x5e0 [ 31.388389] kasan_report+0xc8/0x118 [ 31.389064] kasan_check_range+0x100/0x1a8 [ 31.389706] __asan_memset+0x34/0x78 [ 31.390271] kmalloc_oob_memset_8+0x150/0x2f8 [ 31.390871] kunit_try_run_case+0x14c/0x3d0 [ 31.391622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.392370] kthread+0x24c/0x2d0 [ 31.393001] ret_from_fork+0x10/0x20 [ 31.393580] [ 31.393980] Allocated by task 165: [ 31.394567] kasan_save_stack+0x3c/0x68 [ 31.395123] kasan_save_track+0x20/0x40 [ 31.395808] kasan_save_alloc_info+0x40/0x58 [ 31.396458] __kasan_kmalloc+0xd4/0xd8 [ 31.397052] __kmalloc_cache_noprof+0x15c/0x3c8 [ 31.397709] kmalloc_oob_memset_8+0xb0/0x2f8 [ 31.398401] kunit_try_run_case+0x14c/0x3d0 [ 31.399048] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.399873] kthread+0x24c/0x2d0 [ 31.400383] ret_from_fork+0x10/0x20 [ 31.401045] [ 31.401434] The buggy address belongs to the object at fff00000c64d9e00 [ 31.401434] which belongs to the cache kmalloc-128 of size 128 [ 31.402325] The buggy address is located 113 bytes inside of [ 31.402325] allocated 120-byte region [fff00000c64d9e00, fff00000c64d9e78) [ 31.403224] [ 31.403582] The buggy address belongs to the physical page: [ 31.404100] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064d9 [ 31.405194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.405808] page_type: f5(slab) [ 31.406211] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.406947] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 31.407954] page dumped because: kasan: bad access detected [ 31.408743] [ 31.409126] Memory state around the buggy address: [ 31.409633] fff00000c64d9d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.410566] fff00000c64d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.411484] >fff00000c64d9e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.412122] ^ [ 31.412882] fff00000c64d9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.413804] fff00000c64d9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.414562] ================================================================== [ 31.274961] ================================================================== [ 31.275946] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 31.276835] Write of size 2 at addr fff00000c5e27277 by task kunit_try_catch/161 [ 31.277678] [ 31.278367] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.280454] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.281043] Hardware name: linux,dummy-virt (DT) [ 31.281782] Call trace: [ 31.282144] show_stack+0x20/0x38 (C) [ 31.283509] dump_stack_lvl+0x8c/0xd0 [ 31.284174] print_report+0x118/0x5e0 [ 31.284861] kasan_report+0xc8/0x118 [ 31.285509] kasan_check_range+0x100/0x1a8 [ 31.286387] __asan_memset+0x34/0x78 [ 31.286993] kmalloc_oob_memset_2+0x150/0x2f8 [ 31.287634] kunit_try_run_case+0x14c/0x3d0 [ 31.288342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.289109] kthread+0x24c/0x2d0 [ 31.289677] ret_from_fork+0x10/0x20 [ 31.290924] [ 31.291267] Allocated by task 161: [ 31.291754] kasan_save_stack+0x3c/0x68 [ 31.292312] kasan_save_track+0x20/0x40 [ 31.292915] kasan_save_alloc_info+0x40/0x58 [ 31.293613] __kasan_kmalloc+0xd4/0xd8 [ 31.294218] __kmalloc_cache_noprof+0x15c/0x3c8 [ 31.294853] kmalloc_oob_memset_2+0xb0/0x2f8 [ 31.295517] kunit_try_run_case+0x14c/0x3d0 [ 31.296609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.297289] kthread+0x24c/0x2d0 [ 31.298267] ret_from_fork+0x10/0x20 [ 31.299092] [ 31.299594] The buggy address belongs to the object at fff00000c5e27200 [ 31.299594] which belongs to the cache kmalloc-128 of size 128 [ 31.300845] The buggy address is located 119 bytes inside of [ 31.300845] allocated 120-byte region [fff00000c5e27200, fff00000c5e27278) [ 31.302763] [ 31.303125] The buggy address belongs to the physical page: [ 31.303759] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e27 [ 31.304673] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.305417] page_type: f5(slab) [ 31.306485] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.307389] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 31.308181] page dumped because: kasan: bad access detected [ 31.308977] [ 31.309347] Memory state around the buggy address: [ 31.310291] fff00000c5e27100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 31.311027] fff00000c5e27180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.312165] >fff00000c5e27200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.312894] ^ [ 31.314031] fff00000c5e27280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.314697] fff00000c5e27300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.315609] ================================================================== [ 31.428687] ================================================================== [ 31.429915] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 31.430901] Write of size 16 at addr fff00000c5e27869 by task kunit_try_catch/167 [ 31.431935] [ 31.433300] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.434577] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.435607] Hardware name: linux,dummy-virt (DT) [ 31.436465] Call trace: [ 31.436890] show_stack+0x20/0x38 (C) [ 31.437589] dump_stack_lvl+0x8c/0xd0 [ 31.438449] print_report+0x118/0x5e0 [ 31.439332] kasan_report+0xc8/0x118 [ 31.439949] kasan_check_range+0x100/0x1a8 [ 31.440590] __asan_memset+0x34/0x78 [ 31.441244] kmalloc_oob_memset_16+0x150/0x2f8 [ 31.441922] kunit_try_run_case+0x14c/0x3d0 [ 31.442775] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.443468] kthread+0x24c/0x2d0 [ 31.443950] ret_from_fork+0x10/0x20 [ 31.444675] [ 31.445086] Allocated by task 167: [ 31.445610] kasan_save_stack+0x3c/0x68 [ 31.446719] kasan_save_track+0x20/0x40 [ 31.447677] kasan_save_alloc_info+0x40/0x58 [ 31.448290] __kasan_kmalloc+0xd4/0xd8 [ 31.448951] __kmalloc_cache_noprof+0x15c/0x3c8 [ 31.449656] kmalloc_oob_memset_16+0xb0/0x2f8 [ 31.450474] kunit_try_run_case+0x14c/0x3d0 [ 31.450963] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.451489] kthread+0x24c/0x2d0 [ 31.451930] ret_from_fork+0x10/0x20 [ 31.452378] [ 31.453827] The buggy address belongs to the object at fff00000c5e27800 [ 31.453827] which belongs to the cache kmalloc-128 of size 128 [ 31.455022] The buggy address is located 105 bytes inside of [ 31.455022] allocated 120-byte region [fff00000c5e27800, fff00000c5e27878) [ 31.456781] [ 31.457356] The buggy address belongs to the physical page: [ 31.458714] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e27 [ 31.460291] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.461469] page_type: f5(slab) [ 31.462666] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.463572] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 31.464550] page dumped because: kasan: bad access detected [ 31.465200] [ 31.465568] Memory state around the buggy address: [ 31.466844] fff00000c5e27700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 31.468201] fff00000c5e27780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.469085] >fff00000c5e27800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.470127] ^ [ 31.471247] fff00000c5e27880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.472305] fff00000c5e27900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.473131] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 31.223054] ================================================================== [ 31.224110] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 31.224955] Write of size 128 at addr fff00000c64d9c00 by task kunit_try_catch/159 [ 31.225685] [ 31.226073] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.227662] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.228131] Hardware name: linux,dummy-virt (DT) [ 31.228822] Call trace: [ 31.229240] show_stack+0x20/0x38 (C) [ 31.229961] dump_stack_lvl+0x8c/0xd0 [ 31.230634] print_report+0x118/0x5e0 [ 31.231160] kasan_report+0xc8/0x118 [ 31.232029] kasan_check_range+0x100/0x1a8 [ 31.232750] __asan_memset+0x34/0x78 [ 31.233379] kmalloc_oob_in_memset+0x144/0x2d0 [ 31.234591] kunit_try_run_case+0x14c/0x3d0 [ 31.235171] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.235896] kthread+0x24c/0x2d0 [ 31.236501] ret_from_fork+0x10/0x20 [ 31.237108] [ 31.237447] Allocated by task 159: [ 31.237913] kasan_save_stack+0x3c/0x68 [ 31.238799] kasan_save_track+0x20/0x40 [ 31.239427] kasan_save_alloc_info+0x40/0x58 [ 31.240103] __kasan_kmalloc+0xd4/0xd8 [ 31.240736] __kmalloc_cache_noprof+0x15c/0x3c8 [ 31.241348] kmalloc_oob_in_memset+0xb0/0x2d0 [ 31.242920] kunit_try_run_case+0x14c/0x3d0 [ 31.243596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.244404] kthread+0x24c/0x2d0 [ 31.244778] ret_from_fork+0x10/0x20 [ 31.245370] [ 31.245967] The buggy address belongs to the object at fff00000c64d9c00 [ 31.245967] which belongs to the cache kmalloc-128 of size 128 [ 31.247207] The buggy address is located 0 bytes inside of [ 31.247207] allocated 120-byte region [fff00000c64d9c00, fff00000c64d9c78) [ 31.248442] [ 31.248944] The buggy address belongs to the physical page: [ 31.250067] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064d9 [ 31.251250] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.252147] page_type: f5(slab) [ 31.252882] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.254164] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 31.255255] page dumped because: kasan: bad access detected [ 31.256172] [ 31.256774] Memory state around the buggy address: [ 31.257478] fff00000c64d9b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 31.258762] fff00000c64d9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.259870] >fff00000c64d9c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.260983] ^ [ 31.262011] fff00000c64d9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.263576] fff00000c64d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.264421] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 31.161585] ================================================================== [ 31.163316] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 31.164010] Read of size 16 at addr fff00000c5e08280 by task kunit_try_catch/157 [ 31.165087] [ 31.165559] CPU: 1 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.167652] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.168376] Hardware name: linux,dummy-virt (DT) [ 31.169039] Call trace: [ 31.169514] show_stack+0x20/0x38 (C) [ 31.170593] dump_stack_lvl+0x8c/0xd0 [ 31.171107] print_report+0x118/0x5e0 [ 31.171740] kasan_report+0xc8/0x118 [ 31.172323] __asan_report_load16_noabort+0x20/0x30 [ 31.173003] kmalloc_uaf_16+0x3bc/0x438 [ 31.173844] kunit_try_run_case+0x14c/0x3d0 [ 31.174477] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.175162] kthread+0x24c/0x2d0 [ 31.175971] ret_from_fork+0x10/0x20 [ 31.176516] [ 31.176899] Allocated by task 157: [ 31.177449] kasan_save_stack+0x3c/0x68 [ 31.178441] kasan_save_track+0x20/0x40 [ 31.179068] kasan_save_alloc_info+0x40/0x58 [ 31.179676] __kasan_kmalloc+0xd4/0xd8 [ 31.180200] __kmalloc_cache_noprof+0x15c/0x3c8 [ 31.180863] kmalloc_uaf_16+0x140/0x438 [ 31.181434] kunit_try_run_case+0x14c/0x3d0 [ 31.183053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.183774] kthread+0x24c/0x2d0 [ 31.184300] ret_from_fork+0x10/0x20 [ 31.185058] [ 31.185427] Freed by task 157: [ 31.186443] kasan_save_stack+0x3c/0x68 [ 31.187042] kasan_save_track+0x20/0x40 [ 31.187667] kasan_save_free_info+0x4c/0x78 [ 31.188285] __kasan_slab_free+0x6c/0x98 [ 31.188852] kfree+0x114/0x3d0 [ 31.189374] kmalloc_uaf_16+0x190/0x438 [ 31.190434] kunit_try_run_case+0x14c/0x3d0 [ 31.190997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.191784] kthread+0x24c/0x2d0 [ 31.192332] ret_from_fork+0x10/0x20 [ 31.192884] [ 31.193248] The buggy address belongs to the object at fff00000c5e08280 [ 31.193248] which belongs to the cache kmalloc-16 of size 16 [ 31.194938] The buggy address is located 0 bytes inside of [ 31.194938] freed 16-byte region [fff00000c5e08280, fff00000c5e08290) [ 31.196137] [ 31.196485] The buggy address belongs to the physical page: [ 31.197244] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 31.198450] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.199356] page_type: f5(slab) [ 31.199932] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 31.200845] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 31.202307] page dumped because: kasan: bad access detected [ 31.203193] [ 31.203817] Memory state around the buggy address: [ 31.204634] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.205548] fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc [ 31.206558] >fff00000c5e08280: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.207399] ^ [ 31.207950] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.208786] fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.210049] ================================================================== [ 31.706742] ================================================================== [ 31.707947] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 31.708747] Read of size 1 at addr fff00000c6597128 by task kunit_try_catch/177 [ 31.709357] [ 31.710424] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.711745] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.712331] Hardware name: linux,dummy-virt (DT) [ 31.712980] Call trace: [ 31.713409] show_stack+0x20/0x38 (C) [ 31.714358] dump_stack_lvl+0x8c/0xd0 [ 31.714971] print_report+0x118/0x5e0 [ 31.715601] kasan_report+0xc8/0x118 [ 31.716194] __asan_report_load1_noabort+0x20/0x30 [ 31.716944] kmalloc_uaf2+0x3f4/0x468 [ 31.717865] kunit_try_run_case+0x14c/0x3d0 [ 31.718574] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.719363] kthread+0x24c/0x2d0 [ 31.719972] ret_from_fork+0x10/0x20 [ 31.720568] [ 31.720971] Allocated by task 177: [ 31.721874] kasan_save_stack+0x3c/0x68 [ 31.722543] kasan_save_track+0x20/0x40 [ 31.723125] kasan_save_alloc_info+0x40/0x58 [ 31.723826] __kasan_kmalloc+0xd4/0xd8 [ 31.724405] __kmalloc_cache_noprof+0x15c/0x3c8 [ 31.725148] kmalloc_uaf2+0xc4/0x468 [ 31.725939] kunit_try_run_case+0x14c/0x3d0 [ 31.726521] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.727342] kthread+0x24c/0x2d0 [ 31.727933] ret_from_fork+0x10/0x20 [ 31.728599] [ 31.728990] Freed by task 177: [ 31.730418] kasan_save_stack+0x3c/0x68 [ 31.731040] kasan_save_track+0x20/0x40 [ 31.731492] kasan_save_free_info+0x4c/0x78 [ 31.732062] __kasan_slab_free+0x6c/0x98 [ 31.732728] kfree+0x114/0x3d0 [ 31.733205] kmalloc_uaf2+0x134/0x468 [ 31.733863] kunit_try_run_case+0x14c/0x3d0 [ 31.734458] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.735520] kthread+0x24c/0x2d0 [ 31.736015] ret_from_fork+0x10/0x20 [ 31.736651] [ 31.737026] The buggy address belongs to the object at fff00000c6597100 [ 31.737026] which belongs to the cache kmalloc-64 of size 64 [ 31.738469] The buggy address is located 40 bytes inside of [ 31.738469] freed 64-byte region [fff00000c6597100, fff00000c6597140) [ 31.739806] [ 31.740176] The buggy address belongs to the physical page: [ 31.740754] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106597 [ 31.742074] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.742816] page_type: f5(slab) [ 31.743375] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 31.744360] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.745283] page dumped because: kasan: bad access detected [ 31.746276] [ 31.746664] Memory state around the buggy address: [ 31.747167] fff00000c6597000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 31.748107] fff00000c6597080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 31.748863] >fff00000c6597100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.750277] ^ [ 31.751308] fff00000c6597180: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 31.752055] fff00000c6597200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.752823] ================================================================== [ 31.584451] ================================================================== [ 31.585652] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 31.586865] Read of size 1 at addr fff00000c56f3808 by task kunit_try_catch/173 [ 31.587630] [ 31.588049] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.590446] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.591043] Hardware name: linux,dummy-virt (DT) [ 31.591763] Call trace: [ 31.592281] show_stack+0x20/0x38 (C) [ 31.592882] dump_stack_lvl+0x8c/0xd0 [ 31.593565] print_report+0x118/0x5e0 [ 31.594214] kasan_report+0xc8/0x118 [ 31.595259] __asan_report_load1_noabort+0x20/0x30 [ 31.596432] kmalloc_uaf+0x300/0x338 [ 31.597001] kunit_try_run_case+0x14c/0x3d0 [ 31.598060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.598780] kthread+0x24c/0x2d0 [ 31.599291] ret_from_fork+0x10/0x20 [ 31.600086] [ 31.600494] Allocated by task 173: [ 31.601084] kasan_save_stack+0x3c/0x68 [ 31.601723] kasan_save_track+0x20/0x40 [ 31.602201] kasan_save_alloc_info+0x40/0x58 [ 31.603699] __kasan_kmalloc+0xd4/0xd8 [ 31.604378] __kmalloc_cache_noprof+0x15c/0x3c8 [ 31.605026] kmalloc_uaf+0xb8/0x338 [ 31.605634] kunit_try_run_case+0x14c/0x3d0 [ 31.606542] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.607540] kthread+0x24c/0x2d0 [ 31.608111] ret_from_fork+0x10/0x20 [ 31.608708] [ 31.609137] Freed by task 173: [ 31.610041] kasan_save_stack+0x3c/0x68 [ 31.611115] kasan_save_track+0x20/0x40 [ 31.611810] kasan_save_free_info+0x4c/0x78 [ 31.612444] __kasan_slab_free+0x6c/0x98 [ 31.613087] kfree+0x114/0x3d0 [ 31.614121] kmalloc_uaf+0x11c/0x338 [ 31.614746] kunit_try_run_case+0x14c/0x3d0 [ 31.615446] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.616179] kthread+0x24c/0x2d0 [ 31.616820] ret_from_fork+0x10/0x20 [ 31.617444] [ 31.617873] The buggy address belongs to the object at fff00000c56f3800 [ 31.617873] which belongs to the cache kmalloc-16 of size 16 [ 31.619118] The buggy address is located 8 bytes inside of [ 31.619118] freed 16-byte region [fff00000c56f3800, fff00000c56f3810) [ 31.620573] [ 31.621790] The buggy address belongs to the physical page: [ 31.622451] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f3 [ 31.623879] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.624242] page_type: f5(slab) [ 31.624503] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 31.625970] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 31.627112] page dumped because: kasan: bad access detected [ 31.627861] [ 31.628224] Memory state around the buggy address: [ 31.628874] fff00000c56f3700: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 31.629653] fff00000c56f3780: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 31.630871] >fff00000c56f3800: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.631621] ^ [ 31.632235] fff00000c56f3880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.633035] fff00000c56f3900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.634000] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob
[ 31.109179] ================================================================== [ 31.110406] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 31.111564] Write of size 16 at addr fff00000c5e08220 by task kunit_try_catch/155 [ 31.112506] [ 31.112965] CPU: 1 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.114751] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.115446] Hardware name: linux,dummy-virt (DT) [ 31.116218] Call trace: [ 31.116720] show_stack+0x20/0x38 (C) [ 31.117399] dump_stack_lvl+0x8c/0xd0 [ 31.118188] print_report+0x118/0x5e0 [ 31.119204] kasan_report+0xc8/0x118 [ 31.119869] __asan_report_store16_noabort+0x20/0x30 [ 31.120706] kmalloc_oob_16+0x3a0/0x3f8 [ 31.121377] kunit_try_run_case+0x14c/0x3d0 [ 31.122238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.123130] kthread+0x24c/0x2d0 [ 31.123681] ret_from_fork+0x10/0x20 [ 31.124387] [ 31.124852] Allocated by task 155: [ 31.125472] kasan_save_stack+0x3c/0x68 [ 31.126382] kasan_save_track+0x20/0x40 [ 31.127232] kasan_save_alloc_info+0x40/0x58 [ 31.127998] __kasan_kmalloc+0xd4/0xd8 [ 31.128638] __kmalloc_cache_noprof+0x15c/0x3c8 [ 31.129385] kmalloc_oob_16+0xb4/0x3f8 [ 31.129967] kunit_try_run_case+0x14c/0x3d0 [ 31.130984] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.131793] kthread+0x24c/0x2d0 [ 31.132460] ret_from_fork+0x10/0x20 [ 31.133067] [ 31.133570] The buggy address belongs to the object at fff00000c5e08220 [ 31.133570] which belongs to the cache kmalloc-16 of size 16 [ 31.135023] The buggy address is located 0 bytes inside of [ 31.135023] allocated 13-byte region [fff00000c5e08220, fff00000c5e0822d) [ 31.136166] [ 31.136641] The buggy address belongs to the physical page: [ 31.137407] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 31.138644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.139801] page_type: f5(slab) [ 31.140449] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 31.141503] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 31.142735] page dumped because: kasan: bad access detected [ 31.143406] [ 31.143846] Memory state around the buggy address: [ 31.144614] fff00000c5e08100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.145492] fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.146986] >fff00000c5e08200: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc [ 31.147886] ^ [ 31.148601] fff00000c5e08280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.149561] fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.151215] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 31.050377] ================================================================== [ 31.051063] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 31.051940] Read of size 1 at addr fff00000c47dfe00 by task kunit_try_catch/153 [ 31.052718] [ 31.053149] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.054218] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.054894] Hardware name: linux,dummy-virt (DT) [ 31.055561] Call trace: [ 31.056067] show_stack+0x20/0x38 (C) [ 31.056711] dump_stack_lvl+0x8c/0xd0 [ 31.057374] print_report+0x118/0x5e0 [ 31.057901] kasan_report+0xc8/0x118 [ 31.058517] __asan_report_load1_noabort+0x20/0x30 [ 31.059251] krealloc_uaf+0x4c8/0x520 [ 31.059932] kunit_try_run_case+0x14c/0x3d0 [ 31.060795] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.061567] kthread+0x24c/0x2d0 [ 31.062182] ret_from_fork+0x10/0x20 [ 31.062900] [ 31.063320] Allocated by task 153: [ 31.063934] kasan_save_stack+0x3c/0x68 [ 31.064549] kasan_save_track+0x20/0x40 [ 31.065211] kasan_save_alloc_info+0x40/0x58 [ 31.065836] __kasan_kmalloc+0xd4/0xd8 [ 31.066385] __kmalloc_cache_noprof+0x15c/0x3c8 [ 31.067122] krealloc_uaf+0xc8/0x520 [ 31.067807] kunit_try_run_case+0x14c/0x3d0 [ 31.068437] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.069182] kthread+0x24c/0x2d0 [ 31.069799] ret_from_fork+0x10/0x20 [ 31.070390] [ 31.070795] Freed by task 153: [ 31.071382] kasan_save_stack+0x3c/0x68 [ 31.072031] kasan_save_track+0x20/0x40 [ 31.072693] kasan_save_free_info+0x4c/0x78 [ 31.073390] __kasan_slab_free+0x6c/0x98 [ 31.073909] kfree+0x114/0x3d0 [ 31.074502] krealloc_uaf+0x12c/0x520 [ 31.075106] kunit_try_run_case+0x14c/0x3d0 [ 31.075783] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.076592] kthread+0x24c/0x2d0 [ 31.077084] ret_from_fork+0x10/0x20 [ 31.077787] [ 31.078136] The buggy address belongs to the object at fff00000c47dfe00 [ 31.078136] which belongs to the cache kmalloc-256 of size 256 [ 31.079450] The buggy address is located 0 bytes inside of [ 31.079450] freed 256-byte region [fff00000c47dfe00, fff00000c47dff00) [ 31.080839] [ 31.081236] The buggy address belongs to the physical page: [ 31.081930] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047de [ 31.082876] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.083839] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.084663] page_type: f5(slab) [ 31.085511] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.086413] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 31.087282] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.088462] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 31.089343] head: 0bfffe0000000001 ffffc1ffc311f781 ffffffffffffffff 0000000000000000 [ 31.090580] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 31.091558] page dumped because: kasan: bad access detected [ 31.092319] [ 31.092928] Memory state around the buggy address: [ 31.093437] fff00000c47dfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.094481] fff00000c47dfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.095558] >fff00000c47dfe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.096615] ^ [ 31.097139] fff00000c47dfe80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.098148] fff00000c47dff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.099167] ================================================================== [ 30.993512] ================================================================== [ 30.994895] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 30.995581] Read of size 1 at addr fff00000c47dfe00 by task kunit_try_catch/153 [ 30.996663] [ 30.997085] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.998221] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.998861] Hardware name: linux,dummy-virt (DT) [ 30.999513] Call trace: [ 30.999889] show_stack+0x20/0x38 (C) [ 31.001002] dump_stack_lvl+0x8c/0xd0 [ 31.001745] print_report+0x118/0x5e0 [ 31.002705] kasan_report+0xc8/0x118 [ 31.003518] __kasan_check_byte+0x54/0x70 [ 31.004352] krealloc_noprof+0x44/0x360 [ 31.005025] krealloc_uaf+0x180/0x520 [ 31.005759] kunit_try_run_case+0x14c/0x3d0 [ 31.006684] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.007607] kthread+0x24c/0x2d0 [ 31.008299] ret_from_fork+0x10/0x20 [ 31.008987] [ 31.009416] Allocated by task 153: [ 31.010306] kasan_save_stack+0x3c/0x68 [ 31.011019] kasan_save_track+0x20/0x40 [ 31.011586] kasan_save_alloc_info+0x40/0x58 [ 31.012330] __kasan_kmalloc+0xd4/0xd8 [ 31.012955] __kmalloc_cache_noprof+0x15c/0x3c8 [ 31.014595] krealloc_uaf+0xc8/0x520 [ 31.015180] kunit_try_run_case+0x14c/0x3d0 [ 31.015936] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.016697] kthread+0x24c/0x2d0 [ 31.016952] ret_from_fork+0x10/0x20 [ 31.017193] [ 31.017348] Freed by task 153: [ 31.018346] kasan_save_stack+0x3c/0x68 [ 31.018926] kasan_save_track+0x20/0x40 [ 31.019402] kasan_save_free_info+0x4c/0x78 [ 31.020085] __kasan_slab_free+0x6c/0x98 [ 31.020710] kfree+0x114/0x3d0 [ 31.021257] krealloc_uaf+0x12c/0x520 [ 31.021828] kunit_try_run_case+0x14c/0x3d0 [ 31.022699] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.023394] kthread+0x24c/0x2d0 [ 31.023985] ret_from_fork+0x10/0x20 [ 31.024748] [ 31.025135] The buggy address belongs to the object at fff00000c47dfe00 [ 31.025135] which belongs to the cache kmalloc-256 of size 256 [ 31.026931] The buggy address is located 0 bytes inside of [ 31.026931] freed 256-byte region [fff00000c47dfe00, fff00000c47dff00) [ 31.028196] [ 31.028631] The buggy address belongs to the physical page: [ 31.029235] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047de [ 31.030685] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.031574] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.032501] page_type: f5(slab) [ 31.032965] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.034236] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 31.035019] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.035932] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 31.037364] head: 0bfffe0000000001 ffffc1ffc311f781 ffffffffffffffff 0000000000000000 [ 31.038487] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 31.039702] page dumped because: kasan: bad access detected [ 31.040281] [ 31.040700] Memory state around the buggy address: [ 31.041418] fff00000c47dfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.042226] fff00000c47dfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.043107] >fff00000c47dfe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.044194] ^ [ 31.044852] fff00000c47dfe80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.046000] fff00000c47dff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.047092] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 30.631218] ================================================================== [ 30.631923] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 30.632296] Write of size 1 at addr fff00000c47dfcea by task kunit_try_catch/147 [ 30.633004] [ 30.633411] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.635807] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.636481] Hardware name: linux,dummy-virt (DT) [ 30.637193] Call trace: [ 30.637709] show_stack+0x20/0x38 (C) [ 30.638339] dump_stack_lvl+0x8c/0xd0 [ 30.640140] print_report+0x118/0x5e0 [ 30.641017] kasan_report+0xc8/0x118 [ 30.641806] __asan_report_store1_noabort+0x20/0x30 [ 30.642446] krealloc_less_oob_helper+0xae4/0xc50 [ 30.643114] krealloc_less_oob+0x20/0x38 [ 30.643821] kunit_try_run_case+0x14c/0x3d0 [ 30.644489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.645321] kthread+0x24c/0x2d0 [ 30.645898] ret_from_fork+0x10/0x20 [ 30.646584] [ 30.646954] Allocated by task 147: [ 30.647433] kasan_save_stack+0x3c/0x68 [ 30.648107] kasan_save_track+0x20/0x40 [ 30.648812] kasan_save_alloc_info+0x40/0x58 [ 30.649440] __kasan_krealloc+0x118/0x178 [ 30.650111] krealloc_noprof+0x128/0x360 [ 30.650788] krealloc_less_oob_helper+0x168/0xc50 [ 30.651416] krealloc_less_oob+0x20/0x38 [ 30.652104] kunit_try_run_case+0x14c/0x3d0 [ 30.652770] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.653603] kthread+0x24c/0x2d0 [ 30.654098] ret_from_fork+0x10/0x20 [ 30.654757] [ 30.655131] The buggy address belongs to the object at fff00000c47dfc00 [ 30.655131] which belongs to the cache kmalloc-256 of size 256 [ 30.656803] The buggy address is located 33 bytes to the right of [ 30.656803] allocated 201-byte region [fff00000c47dfc00, fff00000c47dfcc9) [ 30.658257] [ 30.658605] The buggy address belongs to the physical page: [ 30.659475] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047de [ 30.660605] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.661657] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.662660] page_type: f5(slab) [ 30.663145] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.664223] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.665142] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.666251] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.667342] head: 0bfffe0000000001 ffffc1ffc311f781 ffffffffffffffff 0000000000000000 [ 30.668002] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 30.668937] page dumped because: kasan: bad access detected [ 30.669604] [ 30.670010] Memory state around the buggy address: [ 30.670713] fff00000c47dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.671437] fff00000c47dfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.672398] >fff00000c47dfc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.673252] ^ [ 30.674074] fff00000c47dfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.674989] fff00000c47dfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.675789] ================================================================== [ 30.913460] ================================================================== [ 30.914761] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 30.916420] Write of size 1 at addr fff00000c64ba0ea by task kunit_try_catch/151 [ 30.917289] [ 30.917714] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.919262] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.919782] Hardware name: linux,dummy-virt (DT) [ 30.920447] Call trace: [ 30.920830] show_stack+0x20/0x38 (C) [ 30.921454] dump_stack_lvl+0x8c/0xd0 [ 30.922934] print_report+0x118/0x5e0 [ 30.923649] kasan_report+0xc8/0x118 [ 30.924063] __asan_report_store1_noabort+0x20/0x30 [ 30.924866] krealloc_less_oob_helper+0xae4/0xc50 [ 30.926116] krealloc_large_less_oob+0x20/0x38 [ 30.926779] kunit_try_run_case+0x14c/0x3d0 [ 30.927387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.928229] kthread+0x24c/0x2d0 [ 30.928767] ret_from_fork+0x10/0x20 [ 30.929440] [ 30.930113] The buggy address belongs to the physical page: [ 30.930680] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064b8 [ 30.932108] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.933113] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.934018] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.934959] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.936006] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.937006] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.937935] head: 0bfffe0000000002 ffffc1ffc3192e01 ffffffffffffffff 0000000000000000 [ 30.938841] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.939680] page dumped because: kasan: bad access detected [ 30.940466] [ 30.941516] Memory state around the buggy address: [ 30.942563] fff00000c64b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.943249] fff00000c64ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.944081] >fff00000c64ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.944947] ^ [ 30.946083] fff00000c64ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.946860] fff00000c64ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.948203] ================================================================== [ 30.949501] ================================================================== [ 30.950608] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 30.951255] Write of size 1 at addr fff00000c64ba0eb by task kunit_try_catch/151 [ 30.951950] [ 30.952347] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.953653] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.954135] Hardware name: linux,dummy-virt (DT) [ 30.954813] Call trace: [ 30.955279] show_stack+0x20/0x38 (C) [ 30.957221] dump_stack_lvl+0x8c/0xd0 [ 30.958093] print_report+0x118/0x5e0 [ 30.958721] kasan_report+0xc8/0x118 [ 30.959372] __asan_report_store1_noabort+0x20/0x30 [ 30.960183] krealloc_less_oob_helper+0xa58/0xc50 [ 30.961018] krealloc_large_less_oob+0x20/0x38 [ 30.961678] kunit_try_run_case+0x14c/0x3d0 [ 30.962302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.963252] kthread+0x24c/0x2d0 [ 30.964021] ret_from_fork+0x10/0x20 [ 30.964622] [ 30.965140] The buggy address belongs to the physical page: [ 30.966404] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064b8 [ 30.967576] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.968414] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.969249] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.970591] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.971847] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.972738] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.973636] head: 0bfffe0000000002 ffffc1ffc3192e01 ffffffffffffffff 0000000000000000 [ 30.974564] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.975394] page dumped because: kasan: bad access detected [ 30.976089] [ 30.976502] Memory state around the buggy address: [ 30.977213] fff00000c64b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.978360] fff00000c64ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.979898] >fff00000c64ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.980746] ^ [ 30.981565] fff00000c64ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.982346] fff00000c64ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.983210] ================================================================== [ 30.679382] ================================================================== [ 30.680145] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 30.681187] Write of size 1 at addr fff00000c47dfceb by task kunit_try_catch/147 [ 30.682386] [ 30.682776] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.684993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.685795] Hardware name: linux,dummy-virt (DT) [ 30.686616] Call trace: [ 30.687201] show_stack+0x20/0x38 (C) [ 30.687795] dump_stack_lvl+0x8c/0xd0 [ 30.688476] print_report+0x118/0x5e0 [ 30.689025] kasan_report+0xc8/0x118 [ 30.689661] __asan_report_store1_noabort+0x20/0x30 [ 30.690432] krealloc_less_oob_helper+0xa58/0xc50 [ 30.691068] krealloc_less_oob+0x20/0x38 [ 30.691727] kunit_try_run_case+0x14c/0x3d0 [ 30.692329] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.693180] kthread+0x24c/0x2d0 [ 30.693800] ret_from_fork+0x10/0x20 [ 30.694417] [ 30.694754] Allocated by task 147: [ 30.695394] kasan_save_stack+0x3c/0x68 [ 30.695934] kasan_save_track+0x20/0x40 [ 30.696620] kasan_save_alloc_info+0x40/0x58 [ 30.697233] __kasan_krealloc+0x118/0x178 [ 30.697926] krealloc_noprof+0x128/0x360 [ 30.698584] krealloc_less_oob_helper+0x168/0xc50 [ 30.699258] krealloc_less_oob+0x20/0x38 [ 30.699952] kunit_try_run_case+0x14c/0x3d0 [ 30.700645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.701356] kthread+0x24c/0x2d0 [ 30.701986] ret_from_fork+0x10/0x20 [ 30.702637] [ 30.703010] The buggy address belongs to the object at fff00000c47dfc00 [ 30.703010] which belongs to the cache kmalloc-256 of size 256 [ 30.704343] The buggy address is located 34 bytes to the right of [ 30.704343] allocated 201-byte region [fff00000c47dfc00, fff00000c47dfcc9) [ 30.705794] [ 30.706110] The buggy address belongs to the physical page: [ 30.706917] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047de [ 30.707814] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.708760] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.709658] page_type: f5(slab) [ 30.710219] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.711089] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.712005] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.712988] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.713902] head: 0bfffe0000000001 ffffc1ffc311f781 ffffffffffffffff 0000000000000000 [ 30.714827] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 30.715712] page dumped because: kasan: bad access detected [ 30.716398] [ 30.716797] Memory state around the buggy address: [ 30.717543] fff00000c47dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.718290] fff00000c47dfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.719254] >fff00000c47dfc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.720070] ^ [ 30.720917] fff00000c47dfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.721824] fff00000c47dfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.722665] ================================================================== [ 30.809304] ================================================================== [ 30.810651] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 30.811749] Write of size 1 at addr fff00000c64ba0c9 by task kunit_try_catch/151 [ 30.812834] [ 30.813283] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.814847] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.815393] Hardware name: linux,dummy-virt (DT) [ 30.816073] Call trace: [ 30.816575] show_stack+0x20/0x38 (C) [ 30.817105] dump_stack_lvl+0x8c/0xd0 [ 30.817676] print_report+0x118/0x5e0 [ 30.818300] kasan_report+0xc8/0x118 [ 30.818883] __asan_report_store1_noabort+0x20/0x30 [ 30.819557] krealloc_less_oob_helper+0xa48/0xc50 [ 30.820198] krealloc_large_less_oob+0x20/0x38 [ 30.820854] kunit_try_run_case+0x14c/0x3d0 [ 30.821483] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.822349] kthread+0x24c/0x2d0 [ 30.822827] ret_from_fork+0x10/0x20 [ 30.823450] [ 30.823836] The buggy address belongs to the physical page: [ 30.824438] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064b8 [ 30.825359] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.826138] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.827223] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.828117] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.828997] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.829934] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.830783] head: 0bfffe0000000002 ffffc1ffc3192e01 ffffffffffffffff 0000000000000000 [ 30.831983] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.832844] page dumped because: kasan: bad access detected [ 30.833485] [ 30.833892] Memory state around the buggy address: [ 30.834398] fff00000c64b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.835584] fff00000c64ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.836632] >fff00000c64ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.837481] ^ [ 30.838269] fff00000c64ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.839241] fff00000c64ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.839962] ================================================================== [ 30.480011] ================================================================== [ 30.481286] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 30.482130] Write of size 1 at addr fff00000c47dfcc9 by task kunit_try_catch/147 [ 30.483569] [ 30.483964] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.484903] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.485457] Hardware name: linux,dummy-virt (DT) [ 30.486012] Call trace: [ 30.486875] show_stack+0x20/0x38 (C) [ 30.487518] dump_stack_lvl+0x8c/0xd0 [ 30.488142] print_report+0x118/0x5e0 [ 30.488676] kasan_report+0xc8/0x118 [ 30.489284] __asan_report_store1_noabort+0x20/0x30 [ 30.490478] krealloc_less_oob_helper+0xa48/0xc50 [ 30.491239] krealloc_less_oob+0x20/0x38 [ 30.491770] kunit_try_run_case+0x14c/0x3d0 [ 30.492472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.493407] kthread+0x24c/0x2d0 [ 30.494444] ret_from_fork+0x10/0x20 [ 30.495119] [ 30.495484] Allocated by task 147: [ 30.495929] kasan_save_stack+0x3c/0x68 [ 30.496584] kasan_save_track+0x20/0x40 [ 30.497223] kasan_save_alloc_info+0x40/0x58 [ 30.497994] __kasan_krealloc+0x118/0x178 [ 30.498961] krealloc_noprof+0x128/0x360 [ 30.499506] krealloc_less_oob_helper+0x168/0xc50 [ 30.500175] krealloc_less_oob+0x20/0x38 [ 30.501421] kunit_try_run_case+0x14c/0x3d0 [ 30.501983] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.502775] kthread+0x24c/0x2d0 [ 30.503309] ret_from_fork+0x10/0x20 [ 30.504296] [ 30.504674] The buggy address belongs to the object at fff00000c47dfc00 [ 30.504674] which belongs to the cache kmalloc-256 of size 256 [ 30.506643] The buggy address is located 0 bytes to the right of [ 30.506643] allocated 201-byte region [fff00000c47dfc00, fff00000c47dfcc9) [ 30.507855] [ 30.508231] The buggy address belongs to the physical page: [ 30.508933] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047de [ 30.509819] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.511020] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.512007] page_type: f5(slab) [ 30.512507] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.513441] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.515002] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.515822] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.516759] head: 0bfffe0000000001 ffffc1ffc311f781 ffffffffffffffff 0000000000000000 [ 30.517624] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 30.518455] page dumped because: kasan: bad access detected [ 30.519545] [ 30.519910] Memory state around the buggy address: [ 30.520519] fff00000c47dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.521326] fff00000c47dfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.522842] >fff00000c47dfc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.523610] ^ [ 30.524322] fff00000c47dfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.525671] fff00000c47dfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.526436] ================================================================== [ 30.841546] ================================================================== [ 30.842709] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 30.843677] Write of size 1 at addr fff00000c64ba0d0 by task kunit_try_catch/151 [ 30.844940] [ 30.845341] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.846912] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.847399] Hardware name: linux,dummy-virt (DT) [ 30.848071] Call trace: [ 30.848431] show_stack+0x20/0x38 (C) [ 30.849006] dump_stack_lvl+0x8c/0xd0 [ 30.849717] print_report+0x118/0x5e0 [ 30.850717] kasan_report+0xc8/0x118 [ 30.851347] __asan_report_store1_noabort+0x20/0x30 [ 30.852710] krealloc_less_oob_helper+0xb9c/0xc50 [ 30.853924] krealloc_large_less_oob+0x20/0x38 [ 30.855016] kunit_try_run_case+0x14c/0x3d0 [ 30.855967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.857211] kthread+0x24c/0x2d0 [ 30.857832] ret_from_fork+0x10/0x20 [ 30.858387] [ 30.858810] The buggy address belongs to the physical page: [ 30.859652] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064b8 [ 30.860556] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.861353] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.862226] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.863291] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.864324] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.865240] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.866303] head: 0bfffe0000000002 ffffc1ffc3192e01 ffffffffffffffff 0000000000000000 [ 30.867720] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.868657] page dumped because: kasan: bad access detected [ 30.869594] [ 30.870221] Memory state around the buggy address: [ 30.871041] fff00000c64b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.871946] fff00000c64ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.872929] >fff00000c64ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.874287] ^ [ 30.875460] fff00000c64ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.876330] fff00000c64ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.878011] ================================================================== [ 30.528059] ================================================================== [ 30.528754] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 30.530001] Write of size 1 at addr fff00000c47dfcd0 by task kunit_try_catch/147 [ 30.530864] [ 30.531263] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.533371] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.534519] Hardware name: linux,dummy-virt (DT) [ 30.535195] Call trace: [ 30.535658] show_stack+0x20/0x38 (C) [ 30.536304] dump_stack_lvl+0x8c/0xd0 [ 30.536874] print_report+0x118/0x5e0 [ 30.537510] kasan_report+0xc8/0x118 [ 30.538870] __asan_report_store1_noabort+0x20/0x30 [ 30.539662] krealloc_less_oob_helper+0xb9c/0xc50 [ 30.540241] krealloc_less_oob+0x20/0x38 [ 30.540925] kunit_try_run_case+0x14c/0x3d0 [ 30.541544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.542327] kthread+0x24c/0x2d0 [ 30.543323] ret_from_fork+0x10/0x20 [ 30.543901] [ 30.544197] Allocated by task 147: [ 30.544745] kasan_save_stack+0x3c/0x68 [ 30.545367] kasan_save_track+0x20/0x40 [ 30.546840] kasan_save_alloc_info+0x40/0x58 [ 30.547397] __kasan_krealloc+0x118/0x178 [ 30.548065] krealloc_noprof+0x128/0x360 [ 30.548860] krealloc_less_oob_helper+0x168/0xc50 [ 30.549567] krealloc_less_oob+0x20/0x38 [ 30.550461] kunit_try_run_case+0x14c/0x3d0 [ 30.551010] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.551769] kthread+0x24c/0x2d0 [ 30.552286] ret_from_fork+0x10/0x20 [ 30.553072] [ 30.553420] The buggy address belongs to the object at fff00000c47dfc00 [ 30.553420] which belongs to the cache kmalloc-256 of size 256 [ 30.555487] The buggy address is located 7 bytes to the right of [ 30.555487] allocated 201-byte region [fff00000c47dfc00, fff00000c47dfcc9) [ 30.556908] [ 30.557281] The buggy address belongs to the physical page: [ 30.558344] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047de [ 30.559157] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.560114] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.560912] page_type: f5(slab) [ 30.561451] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.562878] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.563831] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.565016] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.566103] head: 0bfffe0000000001 ffffc1ffc311f781 ffffffffffffffff 0000000000000000 [ 30.567520] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 30.568381] page dumped because: kasan: bad access detected [ 30.569049] [ 30.569324] Memory state around the buggy address: [ 30.570411] fff00000c47dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.571291] fff00000c47dfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.572741] >fff00000c47dfc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.573520] ^ [ 30.574281] fff00000c47dfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.575574] fff00000c47dfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.576345] ================================================================== [ 30.879430] ================================================================== [ 30.880245] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 30.881497] Write of size 1 at addr fff00000c64ba0da by task kunit_try_catch/151 [ 30.883012] [ 30.883349] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.884447] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.885091] Hardware name: linux,dummy-virt (DT) [ 30.885663] Call trace: [ 30.886385] show_stack+0x20/0x38 (C) [ 30.887045] dump_stack_lvl+0x8c/0xd0 [ 30.887687] print_report+0x118/0x5e0 [ 30.888204] kasan_report+0xc8/0x118 [ 30.888929] __asan_report_store1_noabort+0x20/0x30 [ 30.889685] krealloc_less_oob_helper+0xa80/0xc50 [ 30.890662] krealloc_large_less_oob+0x20/0x38 [ 30.891260] kunit_try_run_case+0x14c/0x3d0 [ 30.891956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.893211] kthread+0x24c/0x2d0 [ 30.893780] ret_from_fork+0x10/0x20 [ 30.894276] [ 30.894664] The buggy address belongs to the physical page: [ 30.895354] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064b8 [ 30.896413] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.897170] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.898653] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.899574] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.900550] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.901408] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.902627] head: 0bfffe0000000002 ffffc1ffc3192e01 ffffffffffffffff 0000000000000000 [ 30.903502] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.904501] page dumped because: kasan: bad access detected [ 30.905178] [ 30.905559] Memory state around the buggy address: [ 30.906159] fff00000c64b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.907012] fff00000c64ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.908638] >fff00000c64ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.909396] ^ [ 30.910125] fff00000c64ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.911139] fff00000c64ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.911947] ================================================================== [ 30.579889] ================================================================== [ 30.580638] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 30.581377] Write of size 1 at addr fff00000c47dfcda by task kunit_try_catch/147 [ 30.582219] [ 30.582897] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.584369] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.585041] Hardware name: linux,dummy-virt (DT) [ 30.586150] Call trace: [ 30.586799] show_stack+0x20/0x38 (C) [ 30.587811] dump_stack_lvl+0x8c/0xd0 [ 30.588698] print_report+0x118/0x5e0 [ 30.589381] kasan_report+0xc8/0x118 [ 30.590252] __asan_report_store1_noabort+0x20/0x30 [ 30.591070] krealloc_less_oob_helper+0xa80/0xc50 [ 30.591693] krealloc_less_oob+0x20/0x38 [ 30.592386] kunit_try_run_case+0x14c/0x3d0 [ 30.593066] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.594019] kthread+0x24c/0x2d0 [ 30.594829] ret_from_fork+0x10/0x20 [ 30.595442] [ 30.595771] Allocated by task 147: [ 30.596335] kasan_save_stack+0x3c/0x68 [ 30.597497] kasan_save_track+0x20/0x40 [ 30.598327] kasan_save_alloc_info+0x40/0x58 [ 30.599200] __kasan_krealloc+0x118/0x178 [ 30.599821] krealloc_noprof+0x128/0x360 [ 30.600395] krealloc_less_oob_helper+0x168/0xc50 [ 30.601402] krealloc_less_oob+0x20/0x38 [ 30.602778] kunit_try_run_case+0x14c/0x3d0 [ 30.603635] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.604572] kthread+0x24c/0x2d0 [ 30.605268] ret_from_fork+0x10/0x20 [ 30.605972] [ 30.606497] The buggy address belongs to the object at fff00000c47dfc00 [ 30.606497] which belongs to the cache kmalloc-256 of size 256 [ 30.608082] The buggy address is located 17 bytes to the right of [ 30.608082] allocated 201-byte region [fff00000c47dfc00, fff00000c47dfcc9) [ 30.609440] [ 30.610212] The buggy address belongs to the physical page: [ 30.611698] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047de [ 30.612504] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.613355] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.614624] page_type: f5(slab) [ 30.615098] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.615962] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.616858] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.618016] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.618820] head: 0bfffe0000000001 ffffc1ffc311f781 ffffffffffffffff 0000000000000000 [ 30.620183] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 30.621032] page dumped because: kasan: bad access detected [ 30.621744] [ 30.622444] Memory state around the buggy address: [ 30.623271] fff00000c47dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.624127] fff00000c47dfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.624957] >fff00000c47dfc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.625832] ^ [ 30.626642] fff00000c47dfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.627346] fff00000c47dfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.628276] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 30.732905] ================================================================== [ 30.734511] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680 [ 30.735362] Write of size 1 at addr fff00000c65720eb by task kunit_try_catch/149 [ 30.736199] [ 30.736673] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.738140] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.739000] Hardware name: linux,dummy-virt (DT) [ 30.739636] Call trace: [ 30.740137] show_stack+0x20/0x38 (C) [ 30.740776] dump_stack_lvl+0x8c/0xd0 [ 30.741452] print_report+0x118/0x5e0 [ 30.742467] kasan_report+0xc8/0x118 [ 30.743145] __asan_report_store1_noabort+0x20/0x30 [ 30.743912] krealloc_more_oob_helper+0x614/0x680 [ 30.744606] krealloc_large_more_oob+0x20/0x38 [ 30.745296] kunit_try_run_case+0x14c/0x3d0 [ 30.746319] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.747117] kthread+0x24c/0x2d0 [ 30.747664] ret_from_fork+0x10/0x20 [ 30.748229] [ 30.749216] The buggy address belongs to the physical page: [ 30.749970] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106570 [ 30.751157] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.752135] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.753143] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.753565] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.754411] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.756012] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.757075] head: 0bfffe0000000002 ffffc1ffc3195c01 ffffffffffffffff 0000000000000000 [ 30.758054] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.759040] page dumped because: kasan: bad access detected [ 30.759843] [ 30.760185] Memory state around the buggy address: [ 30.760862] fff00000c6571f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.761801] fff00000c6572000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.762630] >fff00000c6572080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 30.763363] ^ [ 30.764130] fff00000c6572100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.765077] fff00000c6572180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.765792] ================================================================== [ 30.767693] ================================================================== [ 30.769369] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680 [ 30.771140] Write of size 1 at addr fff00000c65720f0 by task kunit_try_catch/149 [ 30.772493] [ 30.772864] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.773918] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.774542] Hardware name: linux,dummy-virt (DT) [ 30.775151] Call trace: [ 30.775515] show_stack+0x20/0x38 (C) [ 30.776162] dump_stack_lvl+0x8c/0xd0 [ 30.776763] print_report+0x118/0x5e0 [ 30.777400] kasan_report+0xc8/0x118 [ 30.778036] __asan_report_store1_noabort+0x20/0x30 [ 30.778779] krealloc_more_oob_helper+0x5c8/0x680 [ 30.779334] krealloc_large_more_oob+0x20/0x38 [ 30.780047] kunit_try_run_case+0x14c/0x3d0 [ 30.780722] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.781546] kthread+0x24c/0x2d0 [ 30.782129] ret_from_fork+0x10/0x20 [ 30.782695] [ 30.783065] The buggy address belongs to the physical page: [ 30.783731] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106570 [ 30.784719] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.785552] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.786424] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.787172] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.788201] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.789015] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.789956] head: 0bfffe0000000002 ffffc1ffc3195c01 ffffffffffffffff 0000000000000000 [ 30.790873] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.791729] page dumped because: kasan: bad access detected [ 30.792471] [ 30.792982] Memory state around the buggy address: [ 30.793668] fff00000c6571f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.794669] fff00000c6572000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.795459] >fff00000c6572080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 30.796300] ^ [ 30.797093] fff00000c6572100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.797993] fff00000c6572180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.798849] ================================================================== [ 30.368770] ================================================================== [ 30.370156] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680 [ 30.372059] Write of size 1 at addr fff00000c47dfaeb by task kunit_try_catch/145 [ 30.372773] [ 30.373218] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.375129] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.375702] Hardware name: linux,dummy-virt (DT) [ 30.376283] Call trace: [ 30.376795] show_stack+0x20/0x38 (C) [ 30.377434] dump_stack_lvl+0x8c/0xd0 [ 30.378353] print_report+0x118/0x5e0 [ 30.378955] kasan_report+0xc8/0x118 [ 30.379460] __asan_report_store1_noabort+0x20/0x30 [ 30.380101] krealloc_more_oob_helper+0x614/0x680 [ 30.380880] krealloc_more_oob+0x20/0x38 [ 30.381588] kunit_try_run_case+0x14c/0x3d0 [ 30.382541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.383240] kthread+0x24c/0x2d0 [ 30.383900] ret_from_fork+0x10/0x20 [ 30.384599] [ 30.384909] Allocated by task 145: [ 30.385511] kasan_save_stack+0x3c/0x68 [ 30.386800] kasan_save_track+0x20/0x40 [ 30.387453] kasan_save_alloc_info+0x40/0x58 [ 30.388550] __kasan_krealloc+0x118/0x178 [ 30.389178] krealloc_noprof+0x128/0x360 [ 30.389861] krealloc_more_oob_helper+0x168/0x680 [ 30.390778] krealloc_more_oob+0x20/0x38 [ 30.391393] kunit_try_run_case+0x14c/0x3d0 [ 30.392011] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.392714] kthread+0x24c/0x2d0 [ 30.393323] ret_from_fork+0x10/0x20 [ 30.394101] [ 30.394558] The buggy address belongs to the object at fff00000c47dfa00 [ 30.394558] which belongs to the cache kmalloc-256 of size 256 [ 30.395761] The buggy address is located 0 bytes to the right of [ 30.395761] allocated 235-byte region [fff00000c47dfa00, fff00000c47dfaeb) [ 30.398221] [ 30.398698] The buggy address belongs to the physical page: [ 30.399408] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047de [ 30.400462] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.401748] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.402856] page_type: f5(slab) [ 30.403558] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.404581] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.405463] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.406600] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.407492] head: 0bfffe0000000001 ffffc1ffc311f781 ffffffffffffffff 0000000000000000 [ 30.408407] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 30.409330] page dumped because: kasan: bad access detected [ 30.410264] [ 30.410638] Memory state around the buggy address: [ 30.411120] fff00000c47df980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.411941] fff00000c47dfa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.412708] >fff00000c47dfa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 30.413493] ^ [ 30.414275] fff00000c47dfb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.415595] fff00000c47dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.416664] ================================================================== [ 30.419087] ================================================================== [ 30.419996] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680 [ 30.420843] Write of size 1 at addr fff00000c47dfaf0 by task kunit_try_catch/145 [ 30.422818] [ 30.423213] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.424387] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.424948] Hardware name: linux,dummy-virt (DT) [ 30.425553] Call trace: [ 30.426076] show_stack+0x20/0x38 (C) [ 30.427055] dump_stack_lvl+0x8c/0xd0 [ 30.427963] print_report+0x118/0x5e0 [ 30.428671] kasan_report+0xc8/0x118 [ 30.429361] __asan_report_store1_noabort+0x20/0x30 [ 30.430165] krealloc_more_oob_helper+0x5c8/0x680 [ 30.431302] krealloc_more_oob+0x20/0x38 [ 30.431945] kunit_try_run_case+0x14c/0x3d0 [ 30.432460] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.433274] kthread+0x24c/0x2d0 [ 30.433973] ret_from_fork+0x10/0x20 [ 30.434633] [ 30.435006] Allocated by task 145: [ 30.436449] kasan_save_stack+0x3c/0x68 [ 30.437148] kasan_save_track+0x20/0x40 [ 30.437922] kasan_save_alloc_info+0x40/0x58 [ 30.438738] __kasan_krealloc+0x118/0x178 [ 30.439361] krealloc_noprof+0x128/0x360 [ 30.439865] krealloc_more_oob_helper+0x168/0x680 [ 30.440596] krealloc_more_oob+0x20/0x38 [ 30.441199] kunit_try_run_case+0x14c/0x3d0 [ 30.442468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.443468] kthread+0x24c/0x2d0 [ 30.444097] ret_from_fork+0x10/0x20 [ 30.444655] [ 30.444982] The buggy address belongs to the object at fff00000c47dfa00 [ 30.444982] which belongs to the cache kmalloc-256 of size 256 [ 30.446799] The buggy address is located 5 bytes to the right of [ 30.446799] allocated 235-byte region [fff00000c47dfa00, fff00000c47dfaeb) [ 30.448084] [ 30.448461] The buggy address belongs to the physical page: [ 30.449578] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047de [ 30.451176] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.452275] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.453149] page_type: f5(slab) [ 30.454083] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.455159] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.456072] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.456940] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.457976] head: 0bfffe0000000001 ffffc1ffc311f781 ffffffffffffffff 0000000000000000 [ 30.458930] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 30.459778] page dumped because: kasan: bad access detected [ 30.460491] [ 30.461657] Memory state around the buggy address: [ 30.462155] fff00000c47df980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.463286] fff00000c47dfa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.464144] >fff00000c47dfa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 30.465298] ^ [ 30.466513] fff00000c47dfb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.467363] fff00000c47dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.468139] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 30.329117] ================================================================== [ 30.330594] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 30.331348] Read of size 1 at addr fff00000c6560000 by task kunit_try_catch/143 [ 30.332896] [ 30.333230] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.335178] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.335883] Hardware name: linux,dummy-virt (DT) [ 30.336593] Call trace: [ 30.337068] show_stack+0x20/0x38 (C) [ 30.337731] dump_stack_lvl+0x8c/0xd0 [ 30.338356] print_report+0x118/0x5e0 [ 30.339118] kasan_report+0xc8/0x118 [ 30.339843] __asan_report_load1_noabort+0x20/0x30 [ 30.340514] page_alloc_uaf+0x328/0x350 [ 30.341317] kunit_try_run_case+0x14c/0x3d0 [ 30.342085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.343251] kthread+0x24c/0x2d0 [ 30.343932] ret_from_fork+0x10/0x20 [ 30.344562] [ 30.345053] The buggy address belongs to the physical page: [ 30.345952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106560 [ 30.346986] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.347793] page_type: f0(buddy) [ 30.348444] raw: 0bfffe0000000000 fff00000ff615148 fff00000ff615148 0000000000000000 [ 30.349479] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000 [ 30.350589] page dumped because: kasan: bad access detected [ 30.351100] [ 30.351336] Memory state around the buggy address: [ 30.352185] fff00000c655ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.353200] fff00000c655ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.354196] >fff00000c6560000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.355184] ^ [ 30.355817] fff00000c6560080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.356606] fff00000c6560100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.357371] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 30.234891] ================================================================== [ 30.236195] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 30.237086] Read of size 1 at addr fff00000c64b4000 by task kunit_try_catch/137 [ 30.238583] [ 30.239013] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.240111] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.240732] Hardware name: linux,dummy-virt (DT) [ 30.242180] Call trace: [ 30.242885] show_stack+0x20/0x38 (C) [ 30.243632] dump_stack_lvl+0x8c/0xd0 [ 30.244329] print_report+0x118/0x5e0 [ 30.245040] kasan_report+0xc8/0x118 [ 30.245715] __asan_report_load1_noabort+0x20/0x30 [ 30.246484] kmalloc_large_uaf+0x2cc/0x2f8 [ 30.247903] kunit_try_run_case+0x14c/0x3d0 [ 30.248506] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.249339] kthread+0x24c/0x2d0 [ 30.250103] ret_from_fork+0x10/0x20 [ 30.251134] [ 30.251549] The buggy address belongs to the physical page: [ 30.252165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064b4 [ 30.253227] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.254806] raw: 0bfffe0000000000 ffffc1ffc3192e08 fff00000da4e4f80 0000000000000000 [ 30.255784] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 30.256955] page dumped because: kasan: bad access detected [ 30.257876] [ 30.258287] Memory state around the buggy address: [ 30.259339] fff00000c64b3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.260328] fff00000c64b3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.261367] >fff00000c64b4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.262409] ^ [ 30.263725] fff00000c64b4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.264602] fff00000c64b4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.265481] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 30.191261] ================================================================== [ 30.192497] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 30.193279] Write of size 1 at addr fff00000c64b600a by task kunit_try_catch/135 [ 30.194956] [ 30.195583] CPU: 0 UID: 0 PID: 135 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.196468] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.197312] Hardware name: linux,dummy-virt (DT) [ 30.198073] Call trace: [ 30.198981] show_stack+0x20/0x38 (C) [ 30.199667] dump_stack_lvl+0x8c/0xd0 [ 30.200226] print_report+0x118/0x5e0 [ 30.201605] kasan_report+0xc8/0x118 [ 30.202932] __asan_report_store1_noabort+0x20/0x30 [ 30.203817] kmalloc_large_oob_right+0x278/0x2b8 [ 30.204428] kunit_try_run_case+0x14c/0x3d0 [ 30.205082] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.205860] kthread+0x24c/0x2d0 [ 30.206461] ret_from_fork+0x10/0x20 [ 30.207083] [ 30.207701] The buggy address belongs to the physical page: [ 30.208585] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064b4 [ 30.209515] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.210798] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.211654] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.212462] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.213304] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.214420] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.215574] head: 0bfffe0000000002 ffffc1ffc3192d01 ffffffffffffffff 0000000000000000 [ 30.216387] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.217068] page dumped because: kasan: bad access detected [ 30.217848] [ 30.218258] Memory state around the buggy address: [ 30.219540] fff00000c64b5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.220316] fff00000c64b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.221257] >fff00000c64b6000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.222611] ^ [ 30.223167] fff00000c64b6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.223993] fff00000c64b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.224922] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 30.135202] ================================================================== [ 30.136381] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 30.137168] Write of size 1 at addr fff00000c6531f00 by task kunit_try_catch/133 [ 30.138084] [ 30.138767] CPU: 1 UID: 0 PID: 133 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.139852] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.140511] Hardware name: linux,dummy-virt (DT) [ 30.141076] Call trace: [ 30.141625] show_stack+0x20/0x38 (C) [ 30.142293] dump_stack_lvl+0x8c/0xd0 [ 30.143108] print_report+0x118/0x5e0 [ 30.143811] kasan_report+0xc8/0x118 [ 30.144456] __asan_report_store1_noabort+0x20/0x30 [ 30.145297] kmalloc_big_oob_right+0x2a4/0x2f0 [ 30.146322] kunit_try_run_case+0x14c/0x3d0 [ 30.146969] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.147778] kthread+0x24c/0x2d0 [ 30.148358] ret_from_fork+0x10/0x20 [ 30.148972] [ 30.149385] Allocated by task 133: [ 30.150232] kasan_save_stack+0x3c/0x68 [ 30.150718] kasan_save_track+0x20/0x40 [ 30.151339] kasan_save_alloc_info+0x40/0x58 [ 30.152061] __kasan_kmalloc+0xd4/0xd8 [ 30.152732] __kmalloc_cache_noprof+0x15c/0x3c8 [ 30.153417] kmalloc_big_oob_right+0xb8/0x2f0 [ 30.154412] kunit_try_run_case+0x14c/0x3d0 [ 30.155044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.155780] kthread+0x24c/0x2d0 [ 30.156391] ret_from_fork+0x10/0x20 [ 30.156980] [ 30.157350] The buggy address belongs to the object at fff00000c6530000 [ 30.157350] which belongs to the cache kmalloc-8k of size 8192 [ 30.159236] The buggy address is located 0 bytes to the right of [ 30.159236] allocated 7936-byte region [fff00000c6530000, fff00000c6531f00) [ 30.160968] [ 30.161392] The buggy address belongs to the physical page: [ 30.162243] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106530 [ 30.163316] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.164400] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.165477] page_type: f5(slab) [ 30.166261] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 30.167366] raw: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000 [ 30.168174] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 30.169140] head: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000 [ 30.170018] head: 0bfffe0000000003 ffffc1ffc3194c01 ffffffffffffffff 0000000000000000 [ 30.170964] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000 [ 30.171871] page dumped because: kasan: bad access detected [ 30.172512] [ 30.172942] Memory state around the buggy address: [ 30.173577] fff00000c6531e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.174440] fff00000c6531e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.175364] >fff00000c6531f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.176259] ^ [ 30.176864] fff00000c6531f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.177674] fff00000c6532000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.178627] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 30.086841] ================================================================== [ 30.087901] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x420/0x490 [ 30.088797] Write of size 1 at addr fff00000c5e7d478 by task kunit_try_catch/131 [ 30.089414] [ 30.089867] CPU: 1 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.091092] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.091709] Hardware name: linux,dummy-virt (DT) [ 30.092197] Call trace: [ 30.092624] show_stack+0x20/0x38 (C) [ 30.093661] dump_stack_lvl+0x8c/0xd0 [ 30.094204] print_report+0x118/0x5e0 [ 30.094908] kasan_report+0xc8/0x118 [ 30.095633] __asan_report_store1_noabort+0x20/0x30 [ 30.096459] kmalloc_track_caller_oob_right+0x420/0x490 [ 30.097271] kunit_try_run_case+0x14c/0x3d0 [ 30.098012] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.098910] kthread+0x24c/0x2d0 [ 30.099631] ret_from_fork+0x10/0x20 [ 30.100223] [ 30.100653] Allocated by task 131: [ 30.101128] kasan_save_stack+0x3c/0x68 [ 30.101780] kasan_save_track+0x20/0x40 [ 30.102288] kasan_save_alloc_info+0x40/0x58 [ 30.102986] __kasan_kmalloc+0xd4/0xd8 [ 30.103630] __kmalloc_node_track_caller_noprof+0x184/0x4b8 [ 30.104330] kmalloc_track_caller_oob_right+0x184/0x490 [ 30.105058] kunit_try_run_case+0x14c/0x3d0 [ 30.105775] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.106462] kthread+0x24c/0x2d0 [ 30.107095] ret_from_fork+0x10/0x20 [ 30.107646] [ 30.108060] The buggy address belongs to the object at fff00000c5e7d400 [ 30.108060] which belongs to the cache kmalloc-128 of size 128 [ 30.109343] The buggy address is located 0 bytes to the right of [ 30.109343] allocated 120-byte region [fff00000c5e7d400, fff00000c5e7d478) [ 30.110768] [ 30.111115] The buggy address belongs to the physical page: [ 30.111908] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e7d [ 30.112839] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.113699] page_type: f5(slab) [ 30.114294] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.115190] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.116104] page dumped because: kasan: bad access detected [ 30.116823] [ 30.117190] Memory state around the buggy address: [ 30.117794] fff00000c5e7d300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.118771] fff00000c5e7d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.119547] >fff00000c5e7d400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.120477] ^ [ 30.121256] fff00000c5e7d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.122162] fff00000c5e7d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.123006] ================================================================== [ 30.047218] ================================================================== [ 30.048423] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x414/0x490 [ 30.049388] Write of size 1 at addr fff00000c5e7d378 by task kunit_try_catch/131 [ 30.050542] [ 30.050943] CPU: 1 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.052196] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.052793] Hardware name: linux,dummy-virt (DT) [ 30.053326] Call trace: [ 30.053798] show_stack+0x20/0x38 (C) [ 30.054334] dump_stack_lvl+0x8c/0xd0 [ 30.054969] print_report+0x118/0x5e0 [ 30.055610] kasan_report+0xc8/0x118 [ 30.056153] __asan_report_store1_noabort+0x20/0x30 [ 30.056888] kmalloc_track_caller_oob_right+0x414/0x490 [ 30.057589] kunit_try_run_case+0x14c/0x3d0 [ 30.058271] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.058986] kthread+0x24c/0x2d0 [ 30.059591] ret_from_fork+0x10/0x20 [ 30.060159] [ 30.060509] Allocated by task 131: [ 30.061083] kasan_save_stack+0x3c/0x68 [ 30.061603] kasan_save_track+0x20/0x40 [ 30.062221] kasan_save_alloc_info+0x40/0x58 [ 30.062807] __kasan_kmalloc+0xd4/0xd8 [ 30.063429] __kmalloc_node_track_caller_noprof+0x184/0x4b8 [ 30.064155] kmalloc_track_caller_oob_right+0xa8/0x490 [ 30.064917] kunit_try_run_case+0x14c/0x3d0 [ 30.065606] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.066310] kthread+0x24c/0x2d0 [ 30.066893] ret_from_fork+0x10/0x20 [ 30.067440] [ 30.067829] The buggy address belongs to the object at fff00000c5e7d300 [ 30.067829] which belongs to the cache kmalloc-128 of size 128 [ 30.069013] The buggy address is located 0 bytes to the right of [ 30.069013] allocated 120-byte region [fff00000c5e7d300, fff00000c5e7d378) [ 30.070347] [ 30.070739] The buggy address belongs to the physical page: [ 30.071476] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e7d [ 30.072347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.073036] page_type: f5(slab) [ 30.073622] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.074453] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.075751] page dumped because: kasan: bad access detected [ 30.076469] [ 30.076857] Memory state around the buggy address: [ 30.077598] fff00000c5e7d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 30.078267] fff00000c5e7d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.079821] >fff00000c5e7d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.080807] ^ [ 30.081841] fff00000c5e7d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.082608] fff00000c5e7d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.083401] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 29.991383] ================================================================== [ 29.992580] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 29.993433] Read of size 1 at addr fff00000c6483000 by task kunit_try_catch/129 [ 29.994737] [ 29.995142] CPU: 0 UID: 0 PID: 129 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 29.996393] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.996947] Hardware name: linux,dummy-virt (DT) [ 29.997550] Call trace: [ 29.997989] show_stack+0x20/0x38 (C) [ 29.998506] dump_stack_lvl+0x8c/0xd0 [ 29.999205] print_report+0x118/0x5e0 [ 30.000124] kasan_report+0xc8/0x118 [ 30.000763] __asan_report_load1_noabort+0x20/0x30 [ 30.001423] kmalloc_node_oob_right+0x2f4/0x330 [ 30.002340] kunit_try_run_case+0x14c/0x3d0 [ 30.002998] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.003804] kthread+0x24c/0x2d0 [ 30.004338] ret_from_fork+0x10/0x20 [ 30.004897] [ 30.005269] Allocated by task 129: [ 30.006126] kasan_save_stack+0x3c/0x68 [ 30.006774] kasan_save_track+0x20/0x40 [ 30.007372] kasan_save_alloc_info+0x40/0x58 [ 30.008058] __kasan_kmalloc+0xd4/0xd8 [ 30.008654] __kmalloc_cache_node_noprof+0x164/0x3d0 [ 30.009282] kmalloc_node_oob_right+0xbc/0x330 [ 30.011004] kunit_try_run_case+0x14c/0x3d0 [ 30.011612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.012292] kthread+0x24c/0x2d0 [ 30.012902] ret_from_fork+0x10/0x20 [ 30.013509] [ 30.014186] The buggy address belongs to the object at fff00000c6482000 [ 30.014186] which belongs to the cache kmalloc-4k of size 4096 [ 30.015382] The buggy address is located 0 bytes to the right of [ 30.015382] allocated 4096-byte region [fff00000c6482000, fff00000c6483000) [ 30.016628] [ 30.016997] The buggy address belongs to the physical page: [ 30.018112] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106480 [ 30.019345] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.020278] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.021131] page_type: f5(slab) [ 30.021923] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 30.022901] raw: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000 [ 30.023799] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 30.024637] head: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000 [ 30.025544] head: 0bfffe0000000003 ffffc1ffc3192001 ffffffffffffffff 0000000000000000 [ 30.026818] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000 [ 30.027646] page dumped because: kasan: bad access detected [ 30.028342] [ 30.028730] Memory state around the buggy address: [ 30.029401] fff00000c6482f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.031279] fff00000c6482f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.032063] >fff00000c6483000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.033014] ^ [ 30.033608] fff00000c6483080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.034669] fff00000c6483100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.035816] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 29.931058] ================================================================== [ 29.932311] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 29.933022] Read of size 1 at addr fff00000c5e081ff by task kunit_try_catch/127 [ 29.934594] [ 29.934923] CPU: 1 UID: 0 PID: 127 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 29.936429] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.937207] Hardware name: linux,dummy-virt (DT) [ 29.938232] Call trace: [ 29.938862] show_stack+0x20/0x38 (C) [ 29.939383] dump_stack_lvl+0x8c/0xd0 [ 29.940464] print_report+0x118/0x5e0 [ 29.941194] kasan_report+0xc8/0x118 [ 29.942143] __asan_report_load1_noabort+0x20/0x30 [ 29.942848] kmalloc_oob_left+0x2ec/0x320 [ 29.943332] kunit_try_run_case+0x14c/0x3d0 [ 29.944020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.944780] kthread+0x24c/0x2d0 [ 29.945372] ret_from_fork+0x10/0x20 [ 29.946363] [ 29.946690] Allocated by task 28: [ 29.947246] kasan_save_stack+0x3c/0x68 [ 29.947787] kasan_save_track+0x20/0x40 [ 29.948423] kasan_save_alloc_info+0x40/0x58 [ 29.949133] __kasan_kmalloc+0xd4/0xd8 [ 29.949632] __kmalloc_node_track_caller_noprof+0x184/0x4b8 [ 29.950758] kstrdup+0x54/0xc8 [ 29.951636] devtmpfs_work_loop+0x384/0x590 [ 29.952191] devtmpfsd+0x50/0x58 [ 29.952760] kthread+0x24c/0x2d0 [ 29.953263] ret_from_fork+0x10/0x20 [ 29.954113] [ 29.954441] Freed by task 28: [ 29.954887] kasan_save_stack+0x3c/0x68 [ 29.955516] kasan_save_track+0x20/0x40 [ 29.956599] kasan_save_free_info+0x4c/0x78 [ 29.957283] __kasan_slab_free+0x6c/0x98 [ 29.958171] kfree+0x114/0x3d0 [ 29.958660] devtmpfs_work_loop+0x498/0x590 [ 29.959242] devtmpfsd+0x50/0x58 [ 29.959839] kthread+0x24c/0x2d0 [ 29.960414] ret_from_fork+0x10/0x20 [ 29.961376] [ 29.962189] The buggy address belongs to the object at fff00000c5e081e0 [ 29.962189] which belongs to the cache kmalloc-16 of size 16 [ 29.963383] The buggy address is located 15 bytes to the right of [ 29.963383] allocated 16-byte region [fff00000c5e081e0, fff00000c5e081f0) [ 29.965511] [ 29.965845] The buggy address belongs to the physical page: [ 29.966591] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08 [ 29.967458] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.968606] page_type: f5(slab) [ 29.969192] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 29.970873] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 29.971680] page dumped because: kasan: bad access detected [ 29.972382] [ 29.972956] Memory state around the buggy address: [ 29.973581] fff00000c5e08080: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc [ 29.974881] fff00000c5e08100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.975802] >fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.976669] ^ [ 29.977559] fff00000c5e08200: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.979376] fff00000c5e08280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.980196] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 29.787485] ================================================================== [ 29.789023] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 29.791798] Write of size 1 at addr fff00000c64ec673 by task kunit_try_catch/125 [ 29.792648] [ 29.794687] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G N 6.12.0-next-20241126 #1 [ 29.796112] Tainted: [N]=TEST [ 29.796617] Hardware name: linux,dummy-virt (DT) [ 29.797781] Call trace: [ 29.798664] show_stack+0x20/0x38 (C) [ 29.799547] dump_stack_lvl+0x8c/0xd0 [ 29.800228] print_report+0x118/0x5e0 [ 29.800755] kasan_report+0xc8/0x118 [ 29.801371] __asan_report_store1_noabort+0x20/0x30 [ 29.802115] kmalloc_oob_right+0x5a4/0x660 [ 29.802795] kunit_try_run_case+0x14c/0x3d0 [ 29.803206] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.804019] kthread+0x24c/0x2d0 [ 29.804559] ret_from_fork+0x10/0x20 [ 29.805509] [ 29.806360] Allocated by task 125: [ 29.807238] kasan_save_stack+0x3c/0x68 [ 29.807924] kasan_save_track+0x20/0x40 [ 29.808445] kasan_save_alloc_info+0x40/0x58 [ 29.809170] __kasan_kmalloc+0xd4/0xd8 [ 29.809733] __kmalloc_cache_noprof+0x15c/0x3c8 [ 29.810440] kmalloc_oob_right+0xb0/0x660 [ 29.812002] kunit_try_run_case+0x14c/0x3d0 [ 29.812630] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.813300] kthread+0x24c/0x2d0 [ 29.814518] ret_from_fork+0x10/0x20 [ 29.815163] [ 29.815667] The buggy address belongs to the object at fff00000c64ec600 [ 29.815667] which belongs to the cache kmalloc-128 of size 128 [ 29.817080] The buggy address is located 0 bytes to the right of [ 29.817080] allocated 115-byte region [fff00000c64ec600, fff00000c64ec673) [ 29.818668] [ 29.819296] The buggy address belongs to the physical page: [ 29.820578] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064ec [ 29.822213] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.823498] page_type: f5(slab) [ 29.824694] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.825587] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 29.826992] page dumped because: kasan: bad access detected [ 29.827735] [ 29.828081] Memory state around the buggy address: [ 29.829350] fff00000c64ec500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.830357] fff00000c64ec580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.831583] >fff00000c64ec600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.832730] ^ [ 29.833809] fff00000c64ec680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.834977] fff00000c64ec700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.836099] ================================================================== [ 29.840499] ================================================================== [ 29.841259] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 29.842432] Write of size 1 at addr fff00000c64ec678 by task kunit_try_catch/125 [ 29.844063] [ 29.844480] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 29.846094] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.846763] Hardware name: linux,dummy-virt (DT) [ 29.847456] Call trace: [ 29.847942] show_stack+0x20/0x38 (C) [ 29.848602] dump_stack_lvl+0x8c/0xd0 [ 29.849220] print_report+0x118/0x5e0 [ 29.849997] kasan_report+0xc8/0x118 [ 29.850818] __asan_report_store1_noabort+0x20/0x30 [ 29.851466] kmalloc_oob_right+0x538/0x660 [ 29.851786] kunit_try_run_case+0x14c/0x3d0 [ 29.852212] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.853078] kthread+0x24c/0x2d0 [ 29.853698] ret_from_fork+0x10/0x20 [ 29.854289] [ 29.854912] Allocated by task 125: [ 29.855422] kasan_save_stack+0x3c/0x68 [ 29.855991] kasan_save_track+0x20/0x40 [ 29.856631] kasan_save_alloc_info+0x40/0x58 [ 29.857292] __kasan_kmalloc+0xd4/0xd8 [ 29.858213] __kmalloc_cache_noprof+0x15c/0x3c8 [ 29.858807] kmalloc_oob_right+0xb0/0x660 [ 29.859453] kunit_try_run_case+0x14c/0x3d0 [ 29.860122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.860925] kthread+0x24c/0x2d0 [ 29.861445] ret_from_fork+0x10/0x20 [ 29.862985] [ 29.863336] The buggy address belongs to the object at fff00000c64ec600 [ 29.863336] which belongs to the cache kmalloc-128 of size 128 [ 29.864845] The buggy address is located 5 bytes to the right of [ 29.864845] allocated 115-byte region [fff00000c64ec600, fff00000c64ec673) [ 29.866673] [ 29.867093] The buggy address belongs to the physical page: [ 29.867799] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064ec [ 29.868687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.869624] page_type: f5(slab) [ 29.870486] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.871558] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 29.872231] page dumped because: kasan: bad access detected [ 29.873135] [ 29.873311] Memory state around the buggy address: [ 29.873995] fff00000c64ec500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.874723] fff00000c64ec580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.875724] >fff00000c64ec600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.876663] ^ [ 29.877661] fff00000c64ec680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.878865] fff00000c64ec700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.879565] ================================================================== [ 29.880837] ================================================================== [ 29.881610] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 29.882307] Read of size 1 at addr fff00000c64ec680 by task kunit_try_catch/125 [ 29.883164] [ 29.883797] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 29.885175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.886394] Hardware name: linux,dummy-virt (DT) [ 29.887202] Call trace: [ 29.887634] show_stack+0x20/0x38 (C) [ 29.888299] dump_stack_lvl+0x8c/0xd0 [ 29.889018] print_report+0x118/0x5e0 [ 29.889891] kasan_report+0xc8/0x118 [ 29.890367] __asan_report_load1_noabort+0x20/0x30 [ 29.891156] kmalloc_oob_right+0x5d0/0x660 [ 29.891943] kunit_try_run_case+0x14c/0x3d0 [ 29.892696] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.893498] kthread+0x24c/0x2d0 [ 29.894354] ret_from_fork+0x10/0x20 [ 29.895024] [ 29.895397] Allocated by task 125: [ 29.895865] kasan_save_stack+0x3c/0x68 [ 29.896547] kasan_save_track+0x20/0x40 [ 29.897110] kasan_save_alloc_info+0x40/0x58 [ 29.898086] __kasan_kmalloc+0xd4/0xd8 [ 29.898646] __kmalloc_cache_noprof+0x15c/0x3c8 [ 29.899473] kmalloc_oob_right+0xb0/0x660 [ 29.900082] kunit_try_run_case+0x14c/0x3d0 [ 29.900731] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.901407] kthread+0x24c/0x2d0 [ 29.902485] ret_from_fork+0x10/0x20 [ 29.903226] [ 29.903574] The buggy address belongs to the object at fff00000c64ec600 [ 29.903574] which belongs to the cache kmalloc-128 of size 128 [ 29.905424] The buggy address is located 13 bytes to the right of [ 29.905424] allocated 115-byte region [fff00000c64ec600, fff00000c64ec673) [ 29.907245] [ 29.907590] The buggy address belongs to the physical page: [ 29.908315] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064ec [ 29.909355] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.910494] page_type: f5(slab) [ 29.910993] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.911983] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 29.912905] page dumped because: kasan: bad access detected [ 29.913577] [ 29.914257] Memory state around the buggy address: [ 29.914930] fff00000c64ec580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.915742] fff00000c64ec600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.916662] >fff00000c64ec680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.917463] ^ [ 29.918354] fff00000c64ec700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.919184] fff00000c64ec780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.920052] ==================================================================
Failure - log-parser-boot - internal-error-oops-oops-preempt-smp
KNOWN ISSUE - kunit_test_null_dereference internal oops on qemu-arm64 KUNIT KASAN
[ 149.429822] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP [ 149.431686] Modules linked in: [ 149.433036] CPU: 0 UID: 0 PID: 621 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 149.434487] Tainted: [B]=BAD_PAGE, [N]=TEST [ 149.434977] Hardware name: linux,dummy-virt (DT) [ 149.435813] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 149.436766] pc : kunit_test_null_dereference+0x70/0x170 [ 149.437495] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 149.438221] sp : ffff800083447dc0 [ 149.439112] x29: ffff800083447e20 x28: 0000000000000000 x27: 0000000000000000 [ 149.440404] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000c56f4b00 [ 149.441492] x23: ffffad778e7c9710 x22: ffffad778e7d22d0 x21: fff00000c56f4b08 [ 149.442811] x20: 1ffff00010688fb8 x19: ffff8000800879f0 x18: 00000000b7bd21cf [ 149.443911] x17: 0000000000000001 x16: fff00000da4e0ca0 x15: 0000000055307943 [ 149.444983] x14: 00000000d1144ba8 x13: 1ffe00001815db34 x12: fffd80001997911a [ 149.446288] x11: 1ffe000019979119 x10: fffd800019979119 x9 : ffffad778e7c9798 [ 149.447476] x8 : ffff800083447cb8 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 149.448607] x5 : ffff700010688fb8 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 149.449674] x2 : dfff800000000000 x1 : fff00000ccbc8000 x0 : ffff8000800879f0 [ 149.451566] Call trace: [ 149.452138] kunit_test_null_dereference+0x70/0x170 (P) [ 149.452673] kunit_generic_run_threadfn_adapter+0x88/0x100 (L) [ 149.453515] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 149.454741] kthread+0x24c/0x2d0 [ 149.455278] ret_from_fork+0x10/0x20 [ 149.456520] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 149.458016] ---[ end trace 0000000000000000 ]---