Date
Nov. 27, 2024, 3:37 a.m.
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 62.917829] ================================================================== [ 62.919134] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 62.919134] [ 62.920218] Invalid read at 0x00000000c820c669: [ 62.920965] test_invalid_access+0xdc/0x1f0 [ 62.923152] kunit_try_run_case+0x14c/0x3d0 [ 62.923980] kunit_try_run_case+0x14c/0x3d0 [ 62.924765] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.925904] kthread+0x24c/0x2d0 [ 62.926470] ret_from_fork+0x10/0x20 [ 62.927052] [ 62.927506] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 62.928697] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.929260] Hardware name: linux,dummy-virt (DT) [ 62.930010] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 56.861891] ================================================================== [ 56.862794] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 56.862794] [ 56.863666] Out-of-bounds write at 0x00000000b8fd362d (1B left of kfence-#160): [ 56.864087] test_out_of_bounds_write+0x100/0x240 [ 56.864700] test_out_of_bounds_write+0xc8/0x240 [ 56.865599] kunit_try_run_case+0x14c/0x3d0 [ 56.866422] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.867050] kthread+0x24c/0x2d0 [ 56.867636] ret_from_fork+0x10/0x20 [ 56.868122] [ 56.868441] kfence-#160: 0x00000000e07bf36e-0x000000005a55684e, size=32, cache=test [ 56.868441] [ 56.869475] allocated by task 282 on cpu 0 at 56.861731s (0.007734s ago): [ 56.870443] test_alloc+0x22c/0x620 [ 56.870940] test_out_of_bounds_write+0xc8/0x240 [ 56.871657] kunit_try_run_case+0x14c/0x3d0 [ 56.872264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.872956] kthread+0x24c/0x2d0 [ 56.873560] ret_from_fork+0x10/0x20 [ 56.874147] [ 56.874567] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 56.875765] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.876310] Hardware name: linux,dummy-virt (DT) [ 56.876891] ================================================================== [ 56.446186] ================================================================== [ 56.447095] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 56.447095] [ 56.448188] Out-of-bounds write at 0x000000007360a25c (1B left of kfence-#156): [ 56.449188] test_out_of_bounds_write+0x100/0x240 [ 56.450211] test_out_of_bounds_write+0xc8/0x240 [ 56.451039] kunit_try_run_case+0x14c/0x3d0 [ 56.451742] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.452601] kthread+0x24c/0x2d0 [ 56.453248] ret_from_fork+0x10/0x20 [ 56.453865] [ 56.454212] kfence-#156: 0x00000000d3e03450-0x00000000b08e18b8, size=32, cache=kmalloc-32 [ 56.454212] [ 56.455432] allocated by task 280 on cpu 0 at 56.445942s (0.009481s ago): [ 56.456569] test_alloc+0x298/0x620 [ 56.457271] test_out_of_bounds_write+0xc8/0x240 [ 56.458043] kunit_try_run_case+0x14c/0x3d0 [ 56.458809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.459625] kthread+0x24c/0x2d0 [ 56.460216] ret_from_fork+0x10/0x20 [ 56.460845] [ 56.461340] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 56.462610] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.463236] Hardware name: linux,dummy-virt (DT) [ 56.463847] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 81.826753] ================================================================== [ 81.827551] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 81.827551] [ 81.828524] Use-after-free read at 0x000000000df2877e (in kfence-#222): [ 81.829760] test_krealloc+0x51c/0x830 [ 81.830317] test_krealloc+0x458/0x830 [ 81.830876] kunit_try_run_case+0x14c/0x3d0 [ 81.831517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.832197] kthread+0x24c/0x2d0 [ 81.832711] ret_from_fork+0x10/0x20 [ 81.833326] [ 81.833695] kfence-#222: 0x000000000df2877e-0x0000000040be0bb2, size=32, cache=kmalloc-32 [ 81.833695] [ 81.834868] allocated by task 326 on cpu 1 at 81.825695s (0.009164s ago): [ 81.835761] test_alloc+0x298/0x620 [ 81.836279] test_krealloc+0xc0/0x830 [ 81.836991] kunit_try_run_case+0x14c/0x3d0 [ 81.837630] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.838426] kthread+0x24c/0x2d0 [ 81.838892] ret_from_fork+0x10/0x20 [ 81.839526] [ 81.839886] freed by task 326 on cpu 1 at 81.826086s (0.013789s ago): [ 81.840697] krealloc_noprof+0x148/0x360 [ 81.841381] test_krealloc+0x1dc/0x830 [ 81.841996] kunit_try_run_case+0x14c/0x3d0 [ 81.842547] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.843263] kthread+0x24c/0x2d0 [ 81.843735] ret_from_fork+0x10/0x20 [ 81.844313] [ 81.844670] CPU: 1 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 81.845874] Tainted: [B]=BAD_PAGE, [N]=TEST [ 81.846521] Hardware name: linux,dummy-virt (DT) [ 81.847121] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 81.638128] ================================================================== [ 81.638912] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 81.638912] [ 81.639953] Use-after-free read at 0x000000008dae3eb9 (in kfence-#220): [ 81.640660] test_memcache_typesafe_by_rcu+0x280/0x560 [ 81.641705] test_memcache_typesafe_by_rcu+0x260/0x560 [ 81.642658] kunit_try_run_case+0x14c/0x3d0 [ 81.643245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.643922] kthread+0x24c/0x2d0 [ 81.644538] ret_from_fork+0x10/0x20 [ 81.645234] [ 81.645572] kfence-#220: 0x000000008dae3eb9-0x000000000e24a4ee, size=32, cache=test [ 81.645572] [ 81.646562] allocated by task 324 on cpu 0 at 81.618968s (0.027584s ago): [ 81.647453] test_alloc+0x22c/0x620 [ 81.648171] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 81.649034] kunit_try_run_case+0x14c/0x3d0 [ 81.649629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.650355] kthread+0x24c/0x2d0 [ 81.651059] ret_from_fork+0x10/0x20 [ 81.651671] [ 81.652005] freed by task 324 on cpu 0 at 81.619139s (0.032857s ago): [ 81.652813] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 81.653656] kunit_try_run_case+0x14c/0x3d0 [ 81.654317] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.655035] kthread+0x24c/0x2d0 [ 81.655767] ret_from_fork+0x10/0x20 [ 81.656271] [ 81.656703] CPU: 0 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 81.657827] Tainted: [B]=BAD_PAGE, [N]=TEST [ 81.658401] Hardware name: linux,dummy-virt (DT) [ 81.659150] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 62.686045] ================================================================== [ 62.686900] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 62.686900] [ 62.687745] Corrupted memory at 0x00000000e92f4065 [ ! . . . . . . . . . . . . . . . ] (in kfence-#216): [ 62.690223] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 62.690907] kunit_try_run_case+0x14c/0x3d0 [ 62.691598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.692264] kthread+0x24c/0x2d0 [ 62.692947] ret_from_fork+0x10/0x20 [ 62.693447] [ 62.693805] kfence-#216: 0x00000000b7e75076-0x00000000ef61111f, size=73, cache=kmalloc-96 [ 62.693805] [ 62.694936] allocated by task 314 on cpu 1 at 62.685659s (0.009268s ago): [ 62.695813] test_alloc+0x298/0x620 [ 62.696428] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 62.697028] kunit_try_run_case+0x14c/0x3d0 [ 62.697703] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.698537] kthread+0x24c/0x2d0 [ 62.699000] ret_from_fork+0x10/0x20 [ 62.699618] [ 62.699918] freed by task 314 on cpu 1 at 62.685875s (0.014034s ago): [ 62.700860] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 62.701676] kunit_try_run_case+0x14c/0x3d0 [ 62.702262] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.703085] kthread+0x24c/0x2d0 [ 62.703551] ret_from_fork+0x10/0x20 [ 62.704180] [ 62.704559] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 62.705763] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.706336] Hardware name: linux,dummy-virt (DT) [ 62.707023] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 62.270626] ================================================================== [ 62.271400] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 62.271400] [ 62.272574] Out-of-bounds read at 0x000000009df81205 (105B right of kfence-#212): [ 62.273488] test_kmalloc_aligned_oob_read+0x238/0x468 [ 62.274489] test_kmalloc_aligned_oob_read+0x100/0x468 [ 62.275205] kunit_try_run_case+0x14c/0x3d0 [ 62.276579] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.277714] kthread+0x24c/0x2d0 [ 62.278388] ret_from_fork+0x10/0x20 [ 62.279017] [ 62.279484] kfence-#212: 0x000000003735abb6-0x0000000023f5a97b, size=73, cache=kmalloc-96 [ 62.279484] [ 62.280586] allocated by task 312 on cpu 0 at 62.270271s (0.010305s ago): [ 62.281874] test_alloc+0x298/0x620 [ 62.282641] test_kmalloc_aligned_oob_read+0x100/0x468 [ 62.283234] kunit_try_run_case+0x14c/0x3d0 [ 62.283990] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.284868] kthread+0x24c/0x2d0 [ 62.285533] ret_from_fork+0x10/0x20 [ 62.286163] [ 62.286577] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 62.287879] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.288446] Hardware name: linux,dummy-virt (DT) [ 62.288996] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[ 58.317962] ================================================================== [ 58.318891] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 58.318891] [ 58.319595] Corrupted memory at 0x0000000093590f96 [ ! . . . . . . . . . . . . . . . ] (in kfence-#174): [ 58.322212] test_corruption+0x120/0x378 [ 58.322980] kunit_try_run_case+0x14c/0x3d0 [ 58.323776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.324429] kthread+0x24c/0x2d0 [ 58.324981] ret_from_fork+0x10/0x20 [ 58.325521] [ 58.325816] kfence-#174: 0x00000000cc0f8d77-0x0000000098966412, size=32, cache=test [ 58.325816] [ 58.326804] allocated by task 302 on cpu 1 at 58.317728s (0.009066s ago): [ 58.327782] test_alloc+0x22c/0x620 [ 58.328281] test_corruption+0xdc/0x378 [ 58.329034] kunit_try_run_case+0x14c/0x3d0 [ 58.329726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.330344] kthread+0x24c/0x2d0 [ 58.330916] ret_from_fork+0x10/0x20 [ 58.331477] [ 58.331924] freed by task 302 on cpu 1 at 58.317817s (0.014099s ago): [ 58.332901] test_corruption+0x120/0x378 [ 58.333546] kunit_try_run_case+0x14c/0x3d0 [ 58.334100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.334862] kthread+0x24c/0x2d0 [ 58.335350] ret_from_fork+0x10/0x20 [ 58.335967] [ 58.336354] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 58.337499] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.338115] Hardware name: linux,dummy-virt (DT) [ 58.338654] ================================================================== [ 58.526026] ================================================================== [ 58.526893] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 58.526893] [ 58.527757] Corrupted memory at 0x0000000047a9992b [ ! ] (in kfence-#176): [ 58.528846] test_corruption+0x1d8/0x378 [ 58.529546] kunit_try_run_case+0x14c/0x3d0 [ 58.531717] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.532343] kthread+0x24c/0x2d0 [ 58.532712] ret_from_fork+0x10/0x20 [ 58.533097] [ 58.534035] kfence-#176: 0x00000000e388f115-0x00000000711e6e3d, size=32, cache=test [ 58.534035] [ 58.536312] allocated by task 302 on cpu 1 at 58.525795s (0.010504s ago): [ 58.537161] test_alloc+0x22c/0x620 [ 58.537549] test_corruption+0x198/0x378 [ 58.537957] kunit_try_run_case+0x14c/0x3d0 [ 58.539584] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.541483] kthread+0x24c/0x2d0 [ 58.542566] ret_from_fork+0x10/0x20 [ 58.543935] [ 58.544560] freed by task 302 on cpu 1 at 58.525886s (0.018664s ago): [ 58.546651] test_corruption+0x1d8/0x378 [ 58.547707] kunit_try_run_case+0x14c/0x3d0 [ 58.548472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.549468] kthread+0x24c/0x2d0 [ 58.550400] ret_from_fork+0x10/0x20 [ 58.551246] [ 58.551642] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 58.553124] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.553774] Hardware name: linux,dummy-virt (DT) [ 58.554435] ================================================================== [ 57.798146] ================================================================== [ 57.798997] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 57.798997] [ 57.799853] Corrupted memory at 0x000000007751a015 [ ! . . . . . . . . . . . . . . . ] (in kfence-#169): [ 57.803434] test_corruption+0x278/0x378 [ 57.804073] kunit_try_run_case+0x14c/0x3d0 [ 57.804646] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.805275] kthread+0x24c/0x2d0 [ 57.805831] ret_from_fork+0x10/0x20 [ 57.806542] [ 57.806960] kfence-#169: 0x0000000019aa0747-0x00000000e3cc0d9f, size=32, cache=kmalloc-32 [ 57.806960] [ 57.808226] allocated by task 300 on cpu 1 at 57.797711s (0.010507s ago): [ 57.809074] test_alloc+0x298/0x620 [ 57.809689] test_corruption+0xdc/0x378 [ 57.810203] kunit_try_run_case+0x14c/0x3d0 [ 57.811047] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.811913] kthread+0x24c/0x2d0 [ 57.812402] ret_from_fork+0x10/0x20 [ 57.812840] [ 57.813198] freed by task 300 on cpu 1 at 57.797859s (0.015330s ago): [ 57.814333] test_corruption+0x278/0x378 [ 57.815127] kunit_try_run_case+0x14c/0x3d0 [ 57.815653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.816333] kthread+0x24c/0x2d0 [ 57.816763] ret_from_fork+0x10/0x20 [ 57.817368] [ 57.817758] CPU: 1 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 57.818870] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.819484] Hardware name: linux,dummy-virt (DT) [ 57.820088] ================================================================== [ 57.902132] ================================================================== [ 57.902947] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 57.902947] [ 57.903856] Corrupted memory at 0x000000008f2d0cf5 [ ! ] (in kfence-#170): [ 57.905024] test_corruption+0x284/0x378 [ 57.905637] kunit_try_run_case+0x14c/0x3d0 [ 57.906218] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.906860] kthread+0x24c/0x2d0 [ 57.907436] ret_from_fork+0x10/0x20 [ 57.908057] [ 57.908368] kfence-#170: 0x00000000604ed725-0x00000000a98ab62a, size=32, cache=kmalloc-32 [ 57.908368] [ 57.909434] allocated by task 300 on cpu 1 at 57.901743s (0.007681s ago): [ 57.910433] test_alloc+0x298/0x620 [ 57.910955] test_corruption+0x198/0x378 [ 57.911567] kunit_try_run_case+0x14c/0x3d0 [ 57.912120] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.912988] kthread+0x24c/0x2d0 [ 57.913473] ret_from_fork+0x10/0x20 [ 57.914126] [ 57.914433] freed by task 300 on cpu 1 at 57.901867s (0.012557s ago): [ 57.915316] test_corruption+0x284/0x378 [ 57.915869] kunit_try_run_case+0x14c/0x3d0 [ 57.916453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.917258] kthread+0x24c/0x2d0 [ 57.917750] ret_from_fork+0x10/0x20 [ 57.918364] [ 57.918712] CPU: 1 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 57.919853] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.920462] Hardware name: linux,dummy-virt (DT) [ 57.921094] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 57.693827] ================================================================== [ 57.694618] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 57.694618] [ 57.695468] Invalid free of 0x00000000c60e739b (in kfence-#168): [ 57.696174] test_invalid_addr_free+0xec/0x238 [ 57.697059] kunit_try_run_case+0x14c/0x3d0 [ 57.697996] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.698664] kthread+0x24c/0x2d0 [ 57.699164] ret_from_fork+0x10/0x20 [ 57.699785] [ 57.700065] kfence-#168: 0x00000000bae47ff0-0x00000000cd90d9ed, size=32, cache=test [ 57.700065] [ 57.701352] allocated by task 298 on cpu 1 at 57.693672s (0.007671s ago): [ 57.702198] test_alloc+0x22c/0x620 [ 57.702745] test_invalid_addr_free+0xd4/0x238 [ 57.703515] kunit_try_run_case+0x14c/0x3d0 [ 57.704238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.704915] kthread+0x24c/0x2d0 [ 57.705521] ret_from_fork+0x10/0x20 [ 57.706011] [ 57.706423] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 57.707648] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.708171] Hardware name: linux,dummy-virt (DT) [ 57.708811] ================================================================== [ 57.590077] ================================================================== [ 57.590862] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 57.590862] [ 57.591876] Invalid free of 0x000000008712e942 (in kfence-#167): [ 57.592775] test_invalid_addr_free+0x1ac/0x238 [ 57.593421] kunit_try_run_case+0x14c/0x3d0 [ 57.594238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.594964] kthread+0x24c/0x2d0 [ 57.595631] ret_from_fork+0x10/0x20 [ 57.596394] [ 57.596730] kfence-#167: 0x0000000083b6f074-0x00000000b777f08a, size=32, cache=kmalloc-32 [ 57.596730] [ 57.597782] allocated by task 296 on cpu 1 at 57.589839s (0.007934s ago): [ 57.598708] test_alloc+0x298/0x620 [ 57.599406] test_invalid_addr_free+0xd4/0x238 [ 57.599948] kunit_try_run_case+0x14c/0x3d0 [ 57.600639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.601324] kthread+0x24c/0x2d0 [ 57.601906] ret_from_fork+0x10/0x20 [ 57.602482] [ 57.602832] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 57.603924] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.604581] Hardware name: linux,dummy-virt (DT) [ 57.605182] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[ 57.382250] ================================================================== [ 57.383163] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 57.383163] [ 57.383929] Invalid free of 0x000000002c0ba8a6 (in kfence-#165): [ 57.384592] test_double_free+0x1bc/0x238 [ 57.385346] kunit_try_run_case+0x14c/0x3d0 [ 57.386022] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.386762] kthread+0x24c/0x2d0 [ 57.387262] ret_from_fork+0x10/0x20 [ 57.387919] [ 57.388202] kfence-#165: 0x000000002c0ba8a6-0x0000000079dbae02, size=32, cache=kmalloc-32 [ 57.388202] [ 57.389439] allocated by task 292 on cpu 0 at 57.381764s (0.007665s ago): [ 57.390312] test_alloc+0x298/0x620 [ 57.390953] test_double_free+0xd4/0x238 [ 57.391592] kunit_try_run_case+0x14c/0x3d0 [ 57.392159] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.393016] kthread+0x24c/0x2d0 [ 57.393510] ret_from_fork+0x10/0x20 [ 57.394125] [ 57.394517] freed by task 292 on cpu 0 at 57.381882s (0.012624s ago): [ 57.395370] test_double_free+0x1ac/0x238 [ 57.395960] kunit_try_run_case+0x14c/0x3d0 [ 57.396468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.397318] kthread+0x24c/0x2d0 [ 57.397833] ret_from_fork+0x10/0x20 [ 57.398308] [ 57.398716] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 57.399938] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.400538] Hardware name: linux,dummy-virt (DT) [ 57.401170] ================================================================== [ 57.486109] ================================================================== [ 57.486910] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 57.486910] [ 57.487711] Invalid free of 0x0000000017d3286d (in kfence-#166): [ 57.488471] test_double_free+0x100/0x238 [ 57.489191] kunit_try_run_case+0x14c/0x3d0 [ 57.489721] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.490501] kthread+0x24c/0x2d0 [ 57.491019] ret_from_fork+0x10/0x20 [ 57.491530] [ 57.491983] kfence-#166: 0x0000000017d3286d-0x00000000c77d9e40, size=32, cache=test [ 57.491983] [ 57.492915] allocated by task 294 on cpu 1 at 57.485750s (0.007155s ago): [ 57.493887] test_alloc+0x22c/0x620 [ 57.494502] test_double_free+0xd4/0x238 [ 57.495267] kunit_try_run_case+0x14c/0x3d0 [ 57.495856] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.496686] kthread+0x24c/0x2d0 [ 57.497264] ret_from_fork+0x10/0x20 [ 57.497737] [ 57.498105] freed by task 294 on cpu 1 at 57.485842s (0.012254s ago): [ 57.498889] test_double_free+0xf0/0x238 [ 57.499603] kunit_try_run_case+0x14c/0x3d0 [ 57.500246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.500977] kthread+0x24c/0x2d0 [ 57.501484] ret_from_fork+0x10/0x20 [ 57.502105] [ 57.502499] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 57.503718] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.504370] Hardware name: linux,dummy-virt (DT) [ 57.504949] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 57.070094] ================================================================== [ 57.070881] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 57.070881] [ 57.071844] Use-after-free read at 0x0000000029a0ceb8 (in kfence-#162): [ 57.072746] test_use_after_free_read+0x114/0x248 [ 57.073467] test_use_after_free_read+0xf0/0x248 [ 57.074440] kunit_try_run_case+0x14c/0x3d0 [ 57.075268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.076079] kthread+0x24c/0x2d0 [ 57.076690] ret_from_fork+0x10/0x20 [ 57.077279] [ 57.077676] kfence-#162: 0x0000000029a0ceb8-0x000000002b8a4f78, size=32, cache=test [ 57.077676] [ 57.078856] allocated by task 286 on cpu 1 at 57.069811s (0.009036s ago): [ 57.079862] test_alloc+0x22c/0x620 [ 57.080494] test_use_after_free_read+0xd0/0x248 [ 57.081174] kunit_try_run_case+0x14c/0x3d0 [ 57.081831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.082599] kthread+0x24c/0x2d0 [ 57.083156] ret_from_fork+0x10/0x20 [ 57.083776] [ 57.084145] freed by task 286 on cpu 1 at 57.069894s (0.014243s ago): [ 57.085242] test_use_after_free_read+0xf0/0x248 [ 57.085993] kunit_try_run_case+0x14c/0x3d0 [ 57.086675] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.087475] kthread+0x24c/0x2d0 [ 57.088038] ret_from_fork+0x10/0x20 [ 57.088643] [ 57.089008] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 57.090358] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.090996] Hardware name: linux,dummy-virt (DT) [ 57.091666] ================================================================== [ 56.966348] ================================================================== [ 56.967122] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 56.967122] [ 56.968165] Use-after-free read at 0x000000002e3edaab (in kfence-#161): [ 56.969030] test_use_after_free_read+0x114/0x248 [ 56.969577] test_use_after_free_read+0x1c0/0x248 [ 56.970065] kunit_try_run_case+0x14c/0x3d0 [ 56.970594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.971360] kthread+0x24c/0x2d0 [ 56.971870] ret_from_fork+0x10/0x20 [ 56.972539] [ 56.972983] kfence-#161: 0x000000002e3edaab-0x00000000a1dd806b, size=32, cache=kmalloc-32 [ 56.972983] [ 56.974094] allocated by task 284 on cpu 1 at 56.965783s (0.008303s ago): [ 56.975120] test_alloc+0x298/0x620 [ 56.975680] test_use_after_free_read+0xd0/0x248 [ 56.976232] kunit_try_run_case+0x14c/0x3d0 [ 56.976979] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.977693] kthread+0x24c/0x2d0 [ 56.978198] ret_from_fork+0x10/0x20 [ 56.978797] [ 56.979404] freed by task 284 on cpu 1 at 56.965890s (0.013326s ago): [ 56.980322] test_use_after_free_read+0x1c0/0x248 [ 56.981034] kunit_try_run_case+0x14c/0x3d0 [ 56.981677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.982388] kthread+0x24c/0x2d0 [ 56.982888] ret_from_fork+0x10/0x20 [ 56.983553] [ 56.983943] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 56.985004] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.985611] Hardware name: linux,dummy-virt (DT) [ 56.986215] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 55.407122] ================================================================== [ 55.408087] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 55.408087] [ 55.409197] Out-of-bounds read at 0x000000004c79a626 (1B left of kfence-#146): [ 55.410733] test_out_of_bounds_read+0x114/0x3e0 [ 55.411510] test_out_of_bounds_read+0xdc/0x3e0 [ 55.412247] kunit_try_run_case+0x14c/0x3d0 [ 55.412965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.413808] kthread+0x24c/0x2d0 [ 55.414378] ret_from_fork+0x10/0x20 [ 55.414976] [ 55.415735] kfence-#146: 0x00000000bfd11f8e-0x00000000a69e739f, size=32, cache=kmalloc-32 [ 55.415735] [ 55.417230] allocated by task 276 on cpu 0 at 55.405860s (0.011199s ago): [ 55.418756] test_alloc+0x298/0x620 [ 55.419329] test_out_of_bounds_read+0xdc/0x3e0 [ 55.420027] kunit_try_run_case+0x14c/0x3d0 [ 55.420681] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.421463] kthread+0x24c/0x2d0 [ 55.422071] ret_from_fork+0x10/0x20 [ 55.422762] [ 55.423307] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 55.424456] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.425067] Hardware name: linux,dummy-virt (DT) [ 55.425761] ================================================================== [ 55.925980] ================================================================== [ 55.926926] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 55.926926] [ 55.927858] Out-of-bounds read at 0x000000000c4c437c (1B left of kfence-#151): [ 55.928617] test_out_of_bounds_read+0x114/0x3e0 [ 55.929480] test_out_of_bounds_read+0xdc/0x3e0 [ 55.930380] kunit_try_run_case+0x14c/0x3d0 [ 55.931237] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.931967] kthread+0x24c/0x2d0 [ 55.932424] ret_from_fork+0x10/0x20 [ 55.932959] [ 55.933349] kfence-#151: 0x0000000077289022-0x00000000023ddf0c, size=32, cache=test [ 55.933349] [ 55.934280] allocated by task 278 on cpu 1 at 55.925814s (0.008456s ago): [ 55.935547] test_alloc+0x22c/0x620 [ 55.936176] test_out_of_bounds_read+0xdc/0x3e0 [ 55.936762] kunit_try_run_case+0x14c/0x3d0 [ 55.937197] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.937887] kthread+0x24c/0x2d0 [ 55.938507] ret_from_fork+0x10/0x20 [ 55.939014] [ 55.939484] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 55.940747] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.941258] Hardware name: linux,dummy-virt (DT) [ 55.941880] ================================================================== [ 56.237819] ================================================================== [ 56.238819] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 56.238819] [ 56.239736] Out-of-bounds read at 0x000000008c164954 (32B right of kfence-#154): [ 56.240726] test_out_of_bounds_read+0x1c8/0x3e0 [ 56.241680] test_out_of_bounds_read+0x198/0x3e0 [ 56.242578] kunit_try_run_case+0x14c/0x3d0 [ 56.243311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.244077] kthread+0x24c/0x2d0 [ 56.244653] ret_from_fork+0x10/0x20 [ 56.245259] [ 56.245634] kfence-#154: 0x0000000073f884b6-0x00000000f56eee9b, size=32, cache=test [ 56.245634] [ 56.246810] allocated by task 278 on cpu 1 at 56.237677s (0.009124s ago): [ 56.247866] test_alloc+0x22c/0x620 [ 56.248576] test_out_of_bounds_read+0x198/0x3e0 [ 56.249235] kunit_try_run_case+0x14c/0x3d0 [ 56.249882] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.250772] kthread+0x24c/0x2d0 [ 56.251366] ret_from_fork+0x10/0x20 [ 56.251956] [ 56.252395] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 56.253635] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.254252] Hardware name: linux,dummy-virt (DT) [ 56.254913] ================================================================== [ 55.614156] ================================================================== [ 55.614987] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 55.614987] [ 55.615964] Out-of-bounds read at 0x000000003a0da0d1 (32B right of kfence-#148): [ 55.616711] test_out_of_bounds_read+0x1c8/0x3e0 [ 55.617759] test_out_of_bounds_read+0x198/0x3e0 [ 55.618551] kunit_try_run_case+0x14c/0x3d0 [ 55.619053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.619930] kthread+0x24c/0x2d0 [ 55.620607] ret_from_fork+0x10/0x20 [ 55.621080] [ 55.621531] kfence-#148: 0x000000007ce66532-0x0000000027d75871, size=32, cache=kmalloc-32 [ 55.621531] [ 55.622636] allocated by task 276 on cpu 0 at 55.613741s (0.008887s ago): [ 55.623555] test_alloc+0x298/0x620 [ 55.624129] test_out_of_bounds_read+0x198/0x3e0 [ 55.624682] kunit_try_run_case+0x14c/0x3d0 [ 55.625398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.626092] kthread+0x24c/0x2d0 [ 55.626608] ret_from_fork+0x10/0x20 [ 55.627196] [ 55.627578] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 55.628865] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.629430] Hardware name: linux,dummy-virt (DT) [ 55.629992] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 55.056139] ================================================================== [ 55.057012] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 55.057837] Write of size 1 at addr fff00000c61a5678 by task kunit_try_catch/274 [ 55.058905] [ 55.059357] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 55.060502] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.061149] Hardware name: linux,dummy-virt (DT) [ 55.061668] Call trace: [ 55.062281] show_stack+0x20/0x38 (C) [ 55.062832] dump_stack_lvl+0x8c/0xd0 [ 55.063410] print_report+0x118/0x5e0 [ 55.064068] kasan_report+0xc8/0x118 [ 55.064585] __asan_report_store1_noabort+0x20/0x30 [ 55.065435] strncpy_from_user+0x270/0x2a0 [ 55.066133] copy_user_test_oob+0x5c0/0xec0 [ 55.066784] kunit_try_run_case+0x14c/0x3d0 [ 55.067364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.068178] kthread+0x24c/0x2d0 [ 55.068687] ret_from_fork+0x10/0x20 [ 55.069321] [ 55.069637] Allocated by task 274: [ 55.070281] kasan_save_stack+0x3c/0x68 [ 55.071166] kasan_save_track+0x20/0x40 [ 55.071722] kasan_save_alloc_info+0x40/0x58 [ 55.072407] __kasan_kmalloc+0xd4/0xd8 [ 55.073048] __kmalloc_noprof+0x188/0x4c8 [ 55.073701] kunit_kmalloc_array+0x34/0x88 [ 55.074345] copy_user_test_oob+0xac/0xec0 [ 55.074969] kunit_try_run_case+0x14c/0x3d0 [ 55.075609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.076378] kthread+0x24c/0x2d0 [ 55.077007] ret_from_fork+0x10/0x20 [ 55.077605] [ 55.077948] The buggy address belongs to the object at fff00000c61a5600 [ 55.077948] which belongs to the cache kmalloc-128 of size 128 [ 55.079413] The buggy address is located 0 bytes to the right of [ 55.079413] allocated 120-byte region [fff00000c61a5600, fff00000c61a5678) [ 55.080922] [ 55.081375] The buggy address belongs to the physical page: [ 55.082043] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061a5 [ 55.083157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.084023] page_type: f5(slab) [ 55.084708] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 55.085667] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 55.086648] page dumped because: kasan: bad access detected [ 55.087413] [ 55.087773] Memory state around the buggy address: [ 55.088532] fff00000c61a5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 55.089541] fff00000c61a5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.090525] >fff00000c61a5600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 55.091375] ^ [ 55.092261] fff00000c61a5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.093258] fff00000c61a5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.094148] ================================================================== [ 55.015728] ================================================================== [ 55.016876] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 55.017599] Write of size 121 at addr fff00000c61a5600 by task kunit_try_catch/274 [ 55.018606] [ 55.018960] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 55.020218] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.020836] Hardware name: linux,dummy-virt (DT) [ 55.021635] Call trace: [ 55.022078] show_stack+0x20/0x38 (C) [ 55.022757] dump_stack_lvl+0x8c/0xd0 [ 55.023380] print_report+0x118/0x5e0 [ 55.024001] kasan_report+0xc8/0x118 [ 55.024581] kasan_check_range+0x100/0x1a8 [ 55.025168] __kasan_check_write+0x20/0x30 [ 55.025770] strncpy_from_user+0x3c/0x2a0 [ 55.026334] copy_user_test_oob+0x5c0/0xec0 [ 55.027071] kunit_try_run_case+0x14c/0x3d0 [ 55.027744] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.028508] kthread+0x24c/0x2d0 [ 55.029066] ret_from_fork+0x10/0x20 [ 55.029677] [ 55.030055] Allocated by task 274: [ 55.030676] kasan_save_stack+0x3c/0x68 [ 55.031323] kasan_save_track+0x20/0x40 [ 55.032001] kasan_save_alloc_info+0x40/0x58 [ 55.032742] __kasan_kmalloc+0xd4/0xd8 [ 55.033412] __kmalloc_noprof+0x188/0x4c8 [ 55.034058] kunit_kmalloc_array+0x34/0x88 [ 55.034723] copy_user_test_oob+0xac/0xec0 [ 55.035388] kunit_try_run_case+0x14c/0x3d0 [ 55.036024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.036762] kthread+0x24c/0x2d0 [ 55.037348] ret_from_fork+0x10/0x20 [ 55.037988] [ 55.038402] The buggy address belongs to the object at fff00000c61a5600 [ 55.038402] which belongs to the cache kmalloc-128 of size 128 [ 55.039893] The buggy address is located 0 bytes inside of [ 55.039893] allocated 120-byte region [fff00000c61a5600, fff00000c61a5678) [ 55.041447] [ 55.041863] The buggy address belongs to the physical page: [ 55.042587] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061a5 [ 55.043674] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.044515] page_type: f5(slab) [ 55.045050] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 55.046064] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 55.047093] page dumped because: kasan: bad access detected [ 55.047870] [ 55.048213] Memory state around the buggy address: [ 55.048930] fff00000c61a5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 55.049986] fff00000c61a5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.050930] >fff00000c61a5600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 55.051840] ^ [ 55.052702] fff00000c61a5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.053671] fff00000c61a5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.054533] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 54.767282] ================================================================== [ 54.768734] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0 [ 54.769635] Write of size 121 at addr fff00000c61a5600 by task kunit_try_catch/274 [ 54.771375] [ 54.771715] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 54.773043] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.774117] Hardware name: linux,dummy-virt (DT) [ 54.774732] Call trace: [ 54.775144] show_stack+0x20/0x38 (C) [ 54.775729] dump_stack_lvl+0x8c/0xd0 [ 54.776317] print_report+0x118/0x5e0 [ 54.776897] kasan_report+0xc8/0x118 [ 54.777791] kasan_check_range+0x100/0x1a8 [ 54.778407] __kasan_check_write+0x20/0x30 [ 54.779015] copy_user_test_oob+0x234/0xec0 [ 54.779617] kunit_try_run_case+0x14c/0x3d0 [ 54.780285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.780922] kthread+0x24c/0x2d0 [ 54.781900] ret_from_fork+0x10/0x20 [ 54.782509] [ 54.782827] Allocated by task 274: [ 54.783432] kasan_save_stack+0x3c/0x68 [ 54.784075] kasan_save_track+0x20/0x40 [ 54.784693] kasan_save_alloc_info+0x40/0x58 [ 54.785575] __kasan_kmalloc+0xd4/0xd8 [ 54.786155] __kmalloc_noprof+0x188/0x4c8 [ 54.786755] kunit_kmalloc_array+0x34/0x88 [ 54.787306] copy_user_test_oob+0xac/0xec0 [ 54.787854] kunit_try_run_case+0x14c/0x3d0 [ 54.788494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.789192] kthread+0x24c/0x2d0 [ 54.789825] ret_from_fork+0x10/0x20 [ 54.790322] [ 54.790710] The buggy address belongs to the object at fff00000c61a5600 [ 54.790710] which belongs to the cache kmalloc-128 of size 128 [ 54.792834] The buggy address is located 0 bytes inside of [ 54.792834] allocated 120-byte region [fff00000c61a5600, fff00000c61a5678) [ 54.794473] [ 54.794779] The buggy address belongs to the physical page: [ 54.795528] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061a5 [ 54.796491] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.797568] page_type: f5(slab) [ 54.798222] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 54.799159] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 54.800057] page dumped because: kasan: bad access detected [ 54.800713] [ 54.801021] Memory state around the buggy address: [ 54.802048] fff00000c61a5500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 54.802941] fff00000c61a5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.804081] >fff00000c61a5600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 54.804901] ^ [ 54.806479] fff00000c61a5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.807585] fff00000c61a5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.808544] ================================================================== [ 54.864802] ================================================================== [ 54.865897] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0 [ 54.867251] Write of size 121 at addr fff00000c61a5600 by task kunit_try_catch/274 [ 54.868482] [ 54.868803] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 54.870126] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.870702] Hardware name: linux,dummy-virt (DT) [ 54.871190] Call trace: [ 54.871582] show_stack+0x20/0x38 (C) [ 54.872156] dump_stack_lvl+0x8c/0xd0 [ 54.872822] print_report+0x118/0x5e0 [ 54.873421] kasan_report+0xc8/0x118 [ 54.873971] kasan_check_range+0x100/0x1a8 [ 54.874619] __kasan_check_write+0x20/0x30 [ 54.875227] copy_user_test_oob+0x35c/0xec0 [ 54.875784] kunit_try_run_case+0x14c/0x3d0 [ 54.876490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.877265] kthread+0x24c/0x2d0 [ 54.877733] ret_from_fork+0x10/0x20 [ 54.878390] [ 54.878763] Allocated by task 274: [ 54.879228] kasan_save_stack+0x3c/0x68 [ 54.879859] kasan_save_track+0x20/0x40 [ 54.880376] kasan_save_alloc_info+0x40/0x58 [ 54.881049] __kasan_kmalloc+0xd4/0xd8 [ 54.881698] __kmalloc_noprof+0x188/0x4c8 [ 54.882234] kunit_kmalloc_array+0x34/0x88 [ 54.882846] copy_user_test_oob+0xac/0xec0 [ 54.883404] kunit_try_run_case+0x14c/0x3d0 [ 54.884023] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.884627] kthread+0x24c/0x2d0 [ 54.885208] ret_from_fork+0x10/0x20 [ 54.885761] [ 54.886068] The buggy address belongs to the object at fff00000c61a5600 [ 54.886068] which belongs to the cache kmalloc-128 of size 128 [ 54.887426] The buggy address is located 0 bytes inside of [ 54.887426] allocated 120-byte region [fff00000c61a5600, fff00000c61a5678) [ 54.888767] [ 54.889084] The buggy address belongs to the physical page: [ 54.889973] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061a5 [ 54.890874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.891732] page_type: f5(slab) [ 54.892317] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 54.893177] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 54.894060] page dumped because: kasan: bad access detected [ 54.894742] [ 54.895132] Memory state around the buggy address: [ 54.895750] fff00000c61a5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 54.896732] fff00000c61a5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.897675] >fff00000c61a5600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 54.898558] ^ [ 54.899406] fff00000c61a5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.900171] fff00000c61a5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.900972] ================================================================== [ 54.816603] ================================================================== [ 54.817609] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0 [ 54.819244] Read of size 121 at addr fff00000c61a5600 by task kunit_try_catch/274 [ 54.820212] [ 54.820595] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 54.821903] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.822606] Hardware name: linux,dummy-virt (DT) [ 54.823254] Call trace: [ 54.823662] show_stack+0x20/0x38 (C) [ 54.824165] dump_stack_lvl+0x8c/0xd0 [ 54.824853] print_report+0x118/0x5e0 [ 54.825893] kasan_report+0xc8/0x118 [ 54.826511] kasan_check_range+0x100/0x1a8 [ 54.827115] __kasan_check_read+0x20/0x30 [ 54.827622] copy_user_test_oob+0x728/0xec0 [ 54.828128] kunit_try_run_case+0x14c/0x3d0 [ 54.828707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.829488] kthread+0x24c/0x2d0 [ 54.830132] ret_from_fork+0x10/0x20 [ 54.830694] [ 54.831003] Allocated by task 274: [ 54.831834] kasan_save_stack+0x3c/0x68 [ 54.832469] kasan_save_track+0x20/0x40 [ 54.833316] kasan_save_alloc_info+0x40/0x58 [ 54.833929] __kasan_kmalloc+0xd4/0xd8 [ 54.834462] __kmalloc_noprof+0x188/0x4c8 [ 54.835087] kunit_kmalloc_array+0x34/0x88 [ 54.835715] copy_user_test_oob+0xac/0xec0 [ 54.836393] kunit_try_run_case+0x14c/0x3d0 [ 54.836993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.838383] kthread+0x24c/0x2d0 [ 54.839087] ret_from_fork+0x10/0x20 [ 54.839599] [ 54.839916] The buggy address belongs to the object at fff00000c61a5600 [ 54.839916] which belongs to the cache kmalloc-128 of size 128 [ 54.841801] The buggy address is located 0 bytes inside of [ 54.841801] allocated 120-byte region [fff00000c61a5600, fff00000c61a5678) [ 54.843366] [ 54.843860] The buggy address belongs to the physical page: [ 54.844515] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061a5 [ 54.844974] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.846283] page_type: f5(slab) [ 54.846759] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 54.847676] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 54.848651] page dumped because: kasan: bad access detected [ 54.849450] [ 54.849873] Memory state around the buggy address: [ 54.850521] fff00000c61a5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 54.851417] fff00000c61a5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.852367] >fff00000c61a5600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 54.853391] ^ [ 54.854235] fff00000c61a5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.855050] fff00000c61a5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.855616] ================================================================== [ 54.902681] ================================================================== [ 54.903520] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0 [ 54.904167] Read of size 121 at addr fff00000c61a5600 by task kunit_try_catch/274 [ 54.905384] [ 54.906051] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 54.907233] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.907761] Hardware name: linux,dummy-virt (DT) [ 54.908368] Call trace: [ 54.908732] show_stack+0x20/0x38 (C) [ 54.909370] dump_stack_lvl+0x8c/0xd0 [ 54.909943] print_report+0x118/0x5e0 [ 54.910526] kasan_report+0xc8/0x118 [ 54.911076] kasan_check_range+0x100/0x1a8 [ 54.911673] __kasan_check_read+0x20/0x30 [ 54.912322] copy_user_test_oob+0x3c8/0xec0 [ 54.912931] kunit_try_run_case+0x14c/0x3d0 [ 54.913630] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.914415] kthread+0x24c/0x2d0 [ 54.914952] ret_from_fork+0x10/0x20 [ 54.915540] [ 54.915806] Allocated by task 274: [ 54.916286] kasan_save_stack+0x3c/0x68 [ 54.916920] kasan_save_track+0x20/0x40 [ 54.917479] kasan_save_alloc_info+0x40/0x58 [ 54.918158] __kasan_kmalloc+0xd4/0xd8 [ 54.918742] __kmalloc_noprof+0x188/0x4c8 [ 54.919347] kunit_kmalloc_array+0x34/0x88 [ 54.919871] copy_user_test_oob+0xac/0xec0 [ 54.920523] kunit_try_run_case+0x14c/0x3d0 [ 54.921109] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.921787] kthread+0x24c/0x2d0 [ 54.922269] ret_from_fork+0x10/0x20 [ 54.922893] [ 54.923188] The buggy address belongs to the object at fff00000c61a5600 [ 54.923188] which belongs to the cache kmalloc-128 of size 128 [ 54.924547] The buggy address is located 0 bytes inside of [ 54.924547] allocated 120-byte region [fff00000c61a5600, fff00000c61a5678) [ 54.925892] [ 54.926187] The buggy address belongs to the physical page: [ 54.926961] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061a5 [ 54.927815] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.928626] page_type: f5(slab) [ 54.929071] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 54.930104] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 54.930991] page dumped because: kasan: bad access detected [ 54.931732] [ 54.932053] Memory state around the buggy address: [ 54.932605] fff00000c61a5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 54.933516] fff00000c61a5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.934470] >fff00000c61a5600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 54.935230] ^ [ 54.936094] fff00000c61a5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.936947] fff00000c61a5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.937827] ================================================================== [ 54.939643] ================================================================== [ 54.940421] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0 [ 54.941221] Write of size 121 at addr fff00000c61a5600 by task kunit_try_catch/274 [ 54.942886] [ 54.943326] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 54.944447] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.945098] Hardware name: linux,dummy-virt (DT) [ 54.945751] Call trace: [ 54.946125] show_stack+0x20/0x38 (C) [ 54.946641] dump_stack_lvl+0x8c/0xd0 [ 54.947279] print_report+0x118/0x5e0 [ 54.947869] kasan_report+0xc8/0x118 [ 54.948433] kasan_check_range+0x100/0x1a8 [ 54.949065] __kasan_check_write+0x20/0x30 [ 54.949769] copy_user_test_oob+0x434/0xec0 [ 54.950420] kunit_try_run_case+0x14c/0x3d0 [ 54.951125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.951835] kthread+0x24c/0x2d0 [ 54.952366] ret_from_fork+0x10/0x20 [ 54.952981] [ 54.953342] Allocated by task 274: [ 54.953845] kasan_save_stack+0x3c/0x68 [ 54.954394] kasan_save_track+0x20/0x40 [ 54.954925] kasan_save_alloc_info+0x40/0x58 [ 54.955639] __kasan_kmalloc+0xd4/0xd8 [ 54.956215] __kmalloc_noprof+0x188/0x4c8 [ 54.956705] kunit_kmalloc_array+0x34/0x88 [ 54.957394] copy_user_test_oob+0xac/0xec0 [ 54.957997] kunit_try_run_case+0x14c/0x3d0 [ 54.958726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.959363] kthread+0x24c/0x2d0 [ 54.959906] ret_from_fork+0x10/0x20 [ 54.960418] [ 54.960840] The buggy address belongs to the object at fff00000c61a5600 [ 54.960840] which belongs to the cache kmalloc-128 of size 128 [ 54.962209] The buggy address is located 0 bytes inside of [ 54.962209] allocated 120-byte region [fff00000c61a5600, fff00000c61a5678) [ 54.963580] [ 54.963851] The buggy address belongs to the physical page: [ 54.964593] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061a5 [ 54.965520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.966382] page_type: f5(slab) [ 54.966890] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 54.967761] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 54.968783] page dumped because: kasan: bad access detected [ 54.969574] [ 54.969888] Memory state around the buggy address: [ 54.970530] fff00000c61a5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 54.971346] fff00000c61a5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.972270] >fff00000c61a5600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 54.973076] ^ [ 54.973894] fff00000c61a5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.974847] fff00000c61a5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.975802] ================================================================== [ 54.978785] ================================================================== [ 54.979554] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0 [ 54.980340] Read of size 121 at addr fff00000c61a5600 by task kunit_try_catch/274 [ 54.981087] [ 54.981572] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 54.982792] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.983368] Hardware name: linux,dummy-virt (DT) [ 54.983908] Call trace: [ 54.984411] show_stack+0x20/0x38 (C) [ 54.985068] dump_stack_lvl+0x8c/0xd0 [ 54.985739] print_report+0x118/0x5e0 [ 54.986276] kasan_report+0xc8/0x118 [ 54.987004] kasan_check_range+0x100/0x1a8 [ 54.987622] __kasan_check_read+0x20/0x30 [ 54.988322] copy_user_test_oob+0x4a0/0xec0 [ 54.989018] kunit_try_run_case+0x14c/0x3d0 [ 54.989672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.990396] kthread+0x24c/0x2d0 [ 54.991017] ret_from_fork+0x10/0x20 [ 54.991654] [ 54.991941] Allocated by task 274: [ 54.992500] kasan_save_stack+0x3c/0x68 [ 54.993131] kasan_save_track+0x20/0x40 [ 54.993686] kasan_save_alloc_info+0x40/0x58 [ 54.994269] __kasan_kmalloc+0xd4/0xd8 [ 54.994852] __kmalloc_noprof+0x188/0x4c8 [ 54.995350] kunit_kmalloc_array+0x34/0x88 [ 54.996005] copy_user_test_oob+0xac/0xec0 [ 54.996693] kunit_try_run_case+0x14c/0x3d0 [ 54.997283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.998027] kthread+0x24c/0x2d0 [ 54.998516] ret_from_fork+0x10/0x20 [ 54.999047] [ 54.999417] The buggy address belongs to the object at fff00000c61a5600 [ 54.999417] which belongs to the cache kmalloc-128 of size 128 [ 55.000844] The buggy address is located 0 bytes inside of [ 55.000844] allocated 120-byte region [fff00000c61a5600, fff00000c61a5678) [ 55.002212] [ 55.002618] The buggy address belongs to the physical page: [ 55.003279] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061a5 [ 55.004259] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.005054] page_type: f5(slab) [ 55.005591] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 55.006444] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 55.007477] page dumped because: kasan: bad access detected [ 55.008168] [ 55.008510] Memory state around the buggy address: [ 55.009120] fff00000c61a5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 55.009989] fff00000c61a5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.010891] >fff00000c61a5600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 55.011752] ^ [ 55.012621] fff00000c61a5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.013491] fff00000c61a5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.014341] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 54.699715] ================================================================== [ 54.700608] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 54.701889] Write of size 8 at addr fff00000c61a5378 by task kunit_try_catch/270 [ 54.703515] [ 54.704065] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 54.705072] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.705997] Hardware name: linux,dummy-virt (DT) [ 54.706850] Call trace: [ 54.707278] show_stack+0x20/0x38 (C) [ 54.708010] dump_stack_lvl+0x8c/0xd0 [ 54.708679] print_report+0x118/0x5e0 [ 54.709486] kasan_report+0xc8/0x118 [ 54.710344] kasan_check_range+0x100/0x1a8 [ 54.710977] __kasan_check_write+0x20/0x30 [ 54.711677] copy_to_kernel_nofault+0x8c/0x250 [ 54.712347] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 54.713010] kunit_try_run_case+0x14c/0x3d0 [ 54.713837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.714826] kthread+0x24c/0x2d0 [ 54.715124] ret_from_fork+0x10/0x20 [ 54.715437] [ 54.715611] Allocated by task 270: [ 54.715861] kasan_save_stack+0x3c/0x68 [ 54.716155] kasan_save_track+0x20/0x40 [ 54.716544] kasan_save_alloc_info+0x40/0x58 [ 54.717171] __kasan_kmalloc+0xd4/0xd8 [ 54.717789] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.718485] copy_to_kernel_nofault_oob+0xc8/0x418 [ 54.719144] kunit_try_run_case+0x14c/0x3d0 [ 54.719685] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.720246] kthread+0x24c/0x2d0 [ 54.721019] ret_from_fork+0x10/0x20 [ 54.721900] [ 54.722498] The buggy address belongs to the object at fff00000c61a5300 [ 54.722498] which belongs to the cache kmalloc-128 of size 128 [ 54.723876] The buggy address is located 0 bytes to the right of [ 54.723876] allocated 120-byte region [fff00000c61a5300, fff00000c61a5378) [ 54.725327] [ 54.725894] The buggy address belongs to the physical page: [ 54.727175] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061a5 [ 54.728272] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.729145] page_type: f5(slab) [ 54.729699] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 54.730727] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 54.731691] page dumped because: kasan: bad access detected [ 54.732606] [ 54.733061] Memory state around the buggy address: [ 54.733920] fff00000c61a5200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 54.734791] fff00000c61a5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.735707] >fff00000c61a5300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 54.736670] ^ [ 54.737641] fff00000c61a5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.739058] fff00000c61a5400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.739931] ================================================================== [ 54.654062] ================================================================== [ 54.655660] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 54.656394] Read of size 8 at addr fff00000c61a5378 by task kunit_try_catch/270 [ 54.657388] [ 54.657762] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 54.659330] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.659788] Hardware name: linux,dummy-virt (DT) [ 54.660464] Call trace: [ 54.660923] show_stack+0x20/0x38 (C) [ 54.661477] dump_stack_lvl+0x8c/0xd0 [ 54.662127] print_report+0x118/0x5e0 [ 54.662899] kasan_report+0xc8/0x118 [ 54.663428] __asan_report_load8_noabort+0x20/0x30 [ 54.664194] copy_to_kernel_nofault+0x204/0x250 [ 54.665216] copy_to_kernel_nofault_oob+0x158/0x418 [ 54.666411] kunit_try_run_case+0x14c/0x3d0 [ 54.667156] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.668216] kthread+0x24c/0x2d0 [ 54.668880] ret_from_fork+0x10/0x20 [ 54.669843] [ 54.670415] Allocated by task 270: [ 54.670952] kasan_save_stack+0x3c/0x68 [ 54.671633] kasan_save_track+0x20/0x40 [ 54.672163] kasan_save_alloc_info+0x40/0x58 [ 54.672890] __kasan_kmalloc+0xd4/0xd8 [ 54.673717] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.674573] copy_to_kernel_nofault_oob+0xc8/0x418 [ 54.675399] kunit_try_run_case+0x14c/0x3d0 [ 54.675978] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.677212] kthread+0x24c/0x2d0 [ 54.677943] ret_from_fork+0x10/0x20 [ 54.678676] [ 54.679691] The buggy address belongs to the object at fff00000c61a5300 [ 54.679691] which belongs to the cache kmalloc-128 of size 128 [ 54.681460] The buggy address is located 0 bytes to the right of [ 54.681460] allocated 120-byte region [fff00000c61a5300, fff00000c61a5378) [ 54.683187] [ 54.683521] The buggy address belongs to the physical page: [ 54.684309] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061a5 [ 54.685329] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.686213] page_type: f5(slab) [ 54.687053] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 54.687925] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 54.688751] page dumped because: kasan: bad access detected [ 54.689618] [ 54.690083] Memory state around the buggy address: [ 54.690984] fff00000c61a5200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 54.691964] fff00000c61a5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.692902] >fff00000c61a5300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 54.693831] ^ [ 54.695233] fff00000c61a5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.696122] fff00000c61a5400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.697196] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 54.573848] ================================================================== [ 54.575018] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 54.575880] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/258 [ 54.576836] [ 54.578186] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 54.579378] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.579912] Hardware name: linux,dummy-virt (DT) [ 54.580465] Call trace: [ 54.580951] show_stack+0x20/0x38 (C) [ 54.581595] dump_stack_lvl+0x8c/0xd0 [ 54.582100] print_report+0x2fc/0x5e0 [ 54.582757] kasan_report+0xc8/0x118 [ 54.583776] __asan_report_load1_noabort+0x20/0x30 [ 54.584393] vmalloc_oob+0x51c/0x5d0 [ 54.585036] kunit_try_run_case+0x14c/0x3d0 [ 54.586131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.586877] kthread+0x24c/0x2d0 [ 54.587631] ret_from_fork+0x10/0x20 [ 54.588135] [ 54.588522] The buggy address belongs to the virtual mapping at [ 54.588522] [ffff80008010b000, ffff80008010d000) created by: [ 54.588522] vmalloc_oob+0x98/0x5d0 [ 54.591127] [ 54.591456] The buggy address belongs to the physical page: [ 54.592044] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106125 [ 54.593183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.594550] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 54.595565] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 54.596417] page dumped because: kasan: bad access detected [ 54.597067] [ 54.597442] Memory state around the buggy address: [ 54.598167] ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 54.599464] ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 54.600910] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 54.602068] ^ [ 54.602853] ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 54.603621] ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 54.604631] ================================================================== [ 54.541649] ================================================================== [ 54.543186] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 54.544012] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/258 [ 54.544716] [ 54.545958] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 54.547480] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.548151] Hardware name: linux,dummy-virt (DT) [ 54.549117] Call trace: [ 54.549532] show_stack+0x20/0x38 (C) [ 54.550104] dump_stack_lvl+0x8c/0xd0 [ 54.550852] print_report+0x2fc/0x5e0 [ 54.551430] kasan_report+0xc8/0x118 [ 54.551984] __asan_report_load1_noabort+0x20/0x30 [ 54.552714] vmalloc_oob+0x578/0x5d0 [ 54.553441] kunit_try_run_case+0x14c/0x3d0 [ 54.554100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.554828] kthread+0x24c/0x2d0 [ 54.555575] ret_from_fork+0x10/0x20 [ 54.556068] [ 54.556370] The buggy address belongs to the virtual mapping at [ 54.556370] [ffff80008010b000, ffff80008010d000) created by: [ 54.556370] vmalloc_oob+0x98/0x5d0 [ 54.558111] [ 54.558517] The buggy address belongs to the physical page: [ 54.559755] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106125 [ 54.560934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.562081] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 54.563168] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 54.564064] page dumped because: kasan: bad access detected [ 54.564763] [ 54.565502] Memory state around the buggy address: [ 54.566148] ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 54.567111] ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 54.567964] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 54.568830] ^ [ 54.570026] ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 54.571740] ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 54.572543] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 53.374731] ================================================================== [ 53.375355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 53.376376] Read of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.377395] [ 53.377690] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.379194] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.379850] Hardware name: linux,dummy-virt (DT) [ 53.380494] Call trace: [ 53.380881] show_stack+0x20/0x38 (C) [ 53.381504] dump_stack_lvl+0x8c/0xd0 [ 53.382056] print_report+0x118/0x5e0 [ 53.382655] kasan_report+0xc8/0x118 [ 53.383195] kasan_check_range+0x100/0x1a8 [ 53.383721] __kasan_check_read+0x20/0x30 [ 53.384532] kasan_atomics_helper+0xdd4/0x4858 [ 53.385148] kasan_atomics+0x198/0x2e8 [ 53.385749] kunit_try_run_case+0x14c/0x3d0 [ 53.386257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.387068] kthread+0x24c/0x2d0 [ 53.387696] ret_from_fork+0x10/0x20 [ 53.388355] [ 53.388749] Allocated by task 254: [ 53.389228] kasan_save_stack+0x3c/0x68 [ 53.389885] kasan_save_track+0x20/0x40 [ 53.390426] kasan_save_alloc_info+0x40/0x58 [ 53.391060] __kasan_kmalloc+0xd4/0xd8 [ 53.391582] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.392263] kasan_atomics+0xb8/0x2e8 [ 53.392825] kunit_try_run_case+0x14c/0x3d0 [ 53.393412] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.394206] kthread+0x24c/0x2d0 [ 53.394740] ret_from_fork+0x10/0x20 [ 53.395276] [ 53.395636] The buggy address belongs to the object at fff00000c616b300 [ 53.395636] which belongs to the cache kmalloc-64 of size 64 [ 53.396926] The buggy address is located 0 bytes to the right of [ 53.396926] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.398335] [ 53.398669] The buggy address belongs to the physical page: [ 53.399350] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.400216] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.401160] page_type: f5(slab) [ 53.401657] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.402590] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.403487] page dumped because: kasan: bad access detected [ 53.404252] [ 53.404621] Memory state around the buggy address: [ 53.405188] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.406108] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.406935] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.407870] ^ [ 53.408501] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.409384] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.410249] ================================================================== [ 53.992960] ================================================================== [ 53.993785] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 53.994812] Read of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.995803] [ 53.996162] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.997535] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.998185] Hardware name: linux,dummy-virt (DT) [ 53.998994] Call trace: [ 53.999467] show_stack+0x20/0x38 (C) [ 54.000195] dump_stack_lvl+0x8c/0xd0 [ 54.000943] print_report+0x118/0x5e0 [ 54.001558] kasan_report+0xc8/0x118 [ 54.002155] __asan_report_load8_noabort+0x20/0x30 [ 54.002891] kasan_atomics_helper+0x3f04/0x4858 [ 54.003594] kasan_atomics+0x198/0x2e8 [ 54.004091] kunit_try_run_case+0x14c/0x3d0 [ 54.004764] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.005495] kthread+0x24c/0x2d0 [ 54.006116] ret_from_fork+0x10/0x20 [ 54.006784] [ 54.007170] Allocated by task 254: [ 54.007756] kasan_save_stack+0x3c/0x68 [ 54.008508] kasan_save_track+0x20/0x40 [ 54.009203] kasan_save_alloc_info+0x40/0x58 [ 54.009926] __kasan_kmalloc+0xd4/0xd8 [ 54.010555] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.011235] kasan_atomics+0xb8/0x2e8 [ 54.011948] kunit_try_run_case+0x14c/0x3d0 [ 54.012678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.013482] kthread+0x24c/0x2d0 [ 54.014126] ret_from_fork+0x10/0x20 [ 54.014704] [ 54.015117] The buggy address belongs to the object at fff00000c616b300 [ 54.015117] which belongs to the cache kmalloc-64 of size 64 [ 54.016721] The buggy address is located 0 bytes to the right of [ 54.016721] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 54.018117] [ 54.018606] The buggy address belongs to the physical page: [ 54.019423] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 54.020423] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.021239] page_type: f5(slab) [ 54.021792] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 54.022826] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 54.023833] page dumped because: kasan: bad access detected [ 54.024685] [ 54.025032] Memory state around the buggy address: [ 54.025746] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.026840] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.027744] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.028635] ^ [ 54.029371] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.030345] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.031222] ================================================================== [ 53.490893] ================================================================== [ 53.491969] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 53.492650] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.493708] [ 53.494000] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.495164] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.495924] Hardware name: linux,dummy-virt (DT) [ 53.496564] Call trace: [ 53.497014] show_stack+0x20/0x38 (C) [ 53.497656] dump_stack_lvl+0x8c/0xd0 [ 53.498206] print_report+0x118/0x5e0 [ 53.498750] kasan_report+0xc8/0x118 [ 53.499405] __asan_report_store8_noabort+0x20/0x30 [ 53.500068] kasan_atomics_helper+0x3e5c/0x4858 [ 53.500691] kasan_atomics+0x198/0x2e8 [ 53.501216] kunit_try_run_case+0x14c/0x3d0 [ 53.501886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.502588] kthread+0x24c/0x2d0 [ 53.503249] ret_from_fork+0x10/0x20 [ 53.503806] [ 53.504236] Allocated by task 254: [ 53.504735] kasan_save_stack+0x3c/0x68 [ 53.505217] kasan_save_track+0x20/0x40 [ 53.505882] kasan_save_alloc_info+0x40/0x58 [ 53.506520] __kasan_kmalloc+0xd4/0xd8 [ 53.507148] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.507835] kasan_atomics+0xb8/0x2e8 [ 53.508418] kunit_try_run_case+0x14c/0x3d0 [ 53.509033] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.509702] kthread+0x24c/0x2d0 [ 53.510376] ret_from_fork+0x10/0x20 [ 53.510970] [ 53.511286] The buggy address belongs to the object at fff00000c616b300 [ 53.511286] which belongs to the cache kmalloc-64 of size 64 [ 53.512463] The buggy address is located 0 bytes to the right of [ 53.512463] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.513930] [ 53.514226] The buggy address belongs to the physical page: [ 53.515046] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.516011] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.516783] page_type: f5(slab) [ 53.517387] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.518326] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.519242] page dumped because: kasan: bad access detected [ 53.519874] [ 53.520197] Memory state around the buggy address: [ 53.520840] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.521674] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.522548] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.523401] ^ [ 53.523956] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.524793] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.525699] ================================================================== [ 52.211062] ================================================================== [ 52.212042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 52.213000] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.214264] [ 52.214754] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.216372] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.216875] Hardware name: linux,dummy-virt (DT) [ 52.217702] Call trace: [ 52.218095] show_stack+0x20/0x38 (C) [ 52.218705] dump_stack_lvl+0x8c/0xd0 [ 52.219351] print_report+0x118/0x5e0 [ 52.219987] kasan_report+0xc8/0x118 [ 52.220635] __asan_report_load4_noabort+0x20/0x30 [ 52.221313] kasan_atomics_helper+0x40fc/0x4858 [ 52.221941] kasan_atomics+0x198/0x2e8 [ 52.222621] kunit_try_run_case+0x14c/0x3d0 [ 52.223225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.223991] kthread+0x24c/0x2d0 [ 52.224588] ret_from_fork+0x10/0x20 [ 52.225172] [ 52.225481] Allocated by task 254: [ 52.226048] kasan_save_stack+0x3c/0x68 [ 52.226757] kasan_save_track+0x20/0x40 [ 52.227345] kasan_save_alloc_info+0x40/0x58 [ 52.227890] __kasan_kmalloc+0xd4/0xd8 [ 52.228511] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.229329] kasan_atomics+0xb8/0x2e8 [ 52.229800] kunit_try_run_case+0x14c/0x3d0 [ 52.230508] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.231185] kthread+0x24c/0x2d0 [ 52.231854] ret_from_fork+0x10/0x20 [ 52.232761] [ 52.233771] The buggy address belongs to the object at fff00000c616b300 [ 52.233771] which belongs to the cache kmalloc-64 of size 64 [ 52.235235] The buggy address is located 0 bytes to the right of [ 52.235235] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.238613] [ 52.238871] The buggy address belongs to the physical page: [ 52.240258] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.242022] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.243873] page_type: f5(slab) [ 52.245078] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.245694] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.246371] page dumped because: kasan: bad access detected [ 52.247550] [ 52.247852] Memory state around the buggy address: [ 52.248499] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.249384] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.250219] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.251081] ^ [ 52.251889] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.252695] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.253659] ================================================================== [ 53.565005] ================================================================== [ 53.565856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 53.566734] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.567497] [ 53.567978] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.569096] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.569666] Hardware name: linux,dummy-virt (DT) [ 53.570352] Call trace: [ 53.570870] show_stack+0x20/0x38 (C) [ 53.571473] dump_stack_lvl+0x8c/0xd0 [ 53.572038] print_report+0x118/0x5e0 [ 53.572615] kasan_report+0xc8/0x118 [ 53.573201] kasan_check_range+0x100/0x1a8 [ 53.573823] __kasan_check_write+0x20/0x30 [ 53.574477] kasan_atomics_helper+0xf20/0x4858 [ 53.575061] kasan_atomics+0x198/0x2e8 [ 53.575767] kunit_try_run_case+0x14c/0x3d0 [ 53.576413] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.577220] kthread+0x24c/0x2d0 [ 53.577865] ret_from_fork+0x10/0x20 [ 53.578420] [ 53.578829] Allocated by task 254: [ 53.579330] kasan_save_stack+0x3c/0x68 [ 53.579929] kasan_save_track+0x20/0x40 [ 53.580512] kasan_save_alloc_info+0x40/0x58 [ 53.581143] __kasan_kmalloc+0xd4/0xd8 [ 53.581704] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.582357] kasan_atomics+0xb8/0x2e8 [ 53.582832] kunit_try_run_case+0x14c/0x3d0 [ 53.583529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.584230] kthread+0x24c/0x2d0 [ 53.584797] ret_from_fork+0x10/0x20 [ 53.585352] [ 53.585651] The buggy address belongs to the object at fff00000c616b300 [ 53.585651] which belongs to the cache kmalloc-64 of size 64 [ 53.586983] The buggy address is located 0 bytes to the right of [ 53.586983] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.588421] [ 53.588745] The buggy address belongs to the physical page: [ 53.589368] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.590138] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.591099] page_type: f5(slab) [ 53.591632] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.592700] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.593596] page dumped because: kasan: bad access detected [ 53.594175] [ 53.594561] Memory state around the buggy address: [ 53.595164] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.596139] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.597065] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.597915] ^ [ 53.598347] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.598904] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.600852] ================================================================== [ 54.034021] ================================================================== [ 54.034816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 54.035762] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 54.036572] [ 54.037015] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 54.038324] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.038982] Hardware name: linux,dummy-virt (DT) [ 54.039656] Call trace: [ 54.040150] show_stack+0x20/0x38 (C) [ 54.040818] dump_stack_lvl+0x8c/0xd0 [ 54.041488] print_report+0x118/0x5e0 [ 54.042102] kasan_report+0xc8/0x118 [ 54.042716] kasan_check_range+0x100/0x1a8 [ 54.043424] __kasan_check_write+0x20/0x30 [ 54.044100] kasan_atomics_helper+0x1414/0x4858 [ 54.044763] kasan_atomics+0x198/0x2e8 [ 54.045405] kunit_try_run_case+0x14c/0x3d0 [ 54.046094] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.046907] kthread+0x24c/0x2d0 [ 54.047550] ret_from_fork+0x10/0x20 [ 54.048016] [ 54.048557] Allocated by task 254: [ 54.049155] kasan_save_stack+0x3c/0x68 [ 54.049777] kasan_save_track+0x20/0x40 [ 54.050489] kasan_save_alloc_info+0x40/0x58 [ 54.051195] __kasan_kmalloc+0xd4/0xd8 [ 54.051872] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.052537] kasan_atomics+0xb8/0x2e8 [ 54.053096] kunit_try_run_case+0x14c/0x3d0 [ 54.053709] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.054483] kthread+0x24c/0x2d0 [ 54.055087] ret_from_fork+0x10/0x20 [ 54.055745] [ 54.056112] The buggy address belongs to the object at fff00000c616b300 [ 54.056112] which belongs to the cache kmalloc-64 of size 64 [ 54.057628] The buggy address is located 0 bytes to the right of [ 54.057628] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 54.059179] [ 54.059602] The buggy address belongs to the physical page: [ 54.060396] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 54.061466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.062394] page_type: f5(slab) [ 54.062961] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 54.063975] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 54.064925] page dumped because: kasan: bad access detected [ 54.065664] [ 54.065997] Memory state around the buggy address: [ 54.066742] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.067816] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.068698] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.069562] ^ [ 54.070240] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.071254] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.072141] ================================================================== [ 53.527355] ================================================================== [ 53.528089] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 53.529241] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.530128] [ 53.530522] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.531667] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.532247] Hardware name: linux,dummy-virt (DT) [ 53.532951] Call trace: [ 53.533348] show_stack+0x20/0x38 (C) [ 53.533962] dump_stack_lvl+0x8c/0xd0 [ 53.534490] print_report+0x118/0x5e0 [ 53.535118] kasan_report+0xc8/0x118 [ 53.535695] kasan_check_range+0x100/0x1a8 [ 53.536325] __kasan_check_write+0x20/0x30 [ 53.536887] kasan_atomics_helper+0xeb8/0x4858 [ 53.537594] kasan_atomics+0x198/0x2e8 [ 53.538090] kunit_try_run_case+0x14c/0x3d0 [ 53.538853] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.539623] kthread+0x24c/0x2d0 [ 53.540193] ret_from_fork+0x10/0x20 [ 53.540734] [ 53.541078] Allocated by task 254: [ 53.541583] kasan_save_stack+0x3c/0x68 [ 53.542105] kasan_save_track+0x20/0x40 [ 53.542727] kasan_save_alloc_info+0x40/0x58 [ 53.543441] __kasan_kmalloc+0xd4/0xd8 [ 53.543958] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.544610] kasan_atomics+0xb8/0x2e8 [ 53.545154] kunit_try_run_case+0x14c/0x3d0 [ 53.545764] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.546550] kthread+0x24c/0x2d0 [ 53.547005] ret_from_fork+0x10/0x20 [ 53.547555] [ 53.547909] The buggy address belongs to the object at fff00000c616b300 [ 53.547909] which belongs to the cache kmalloc-64 of size 64 [ 53.549206] The buggy address is located 0 bytes to the right of [ 53.549206] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.550612] [ 53.550891] The buggy address belongs to the physical page: [ 53.551610] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.552564] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.553322] page_type: f5(slab) [ 53.553869] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.554775] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.555832] page dumped because: kasan: bad access detected [ 53.556474] [ 53.556794] Memory state around the buggy address: [ 53.557399] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.558215] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.559067] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.559973] ^ [ 53.560615] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.561519] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.562367] ================================================================== [ 52.121977] ================================================================== [ 52.123216] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 52.124566] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.126498] [ 52.126783] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.128063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.128647] Hardware name: linux,dummy-virt (DT) [ 52.129412] Call trace: [ 52.129875] show_stack+0x20/0x38 (C) [ 52.130608] dump_stack_lvl+0x8c/0xd0 [ 52.131339] print_report+0x118/0x5e0 [ 52.132039] kasan_report+0xc8/0x118 [ 52.132733] kasan_check_range+0x100/0x1a8 [ 52.133459] __kasan_check_write+0x20/0x30 [ 52.134381] kasan_atomics_helper+0x24c/0x4858 [ 52.135117] kasan_atomics+0x198/0x2e8 [ 52.135648] kunit_try_run_case+0x14c/0x3d0 [ 52.136342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.137096] kthread+0x24c/0x2d0 [ 52.137952] ret_from_fork+0x10/0x20 [ 52.138499] [ 52.138850] Allocated by task 254: [ 52.139317] kasan_save_stack+0x3c/0x68 [ 52.139926] kasan_save_track+0x20/0x40 [ 52.140464] kasan_save_alloc_info+0x40/0x58 [ 52.141390] __kasan_kmalloc+0xd4/0xd8 [ 52.142100] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.142736] kasan_atomics+0xb8/0x2e8 [ 52.143288] kunit_try_run_case+0x14c/0x3d0 [ 52.143808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.144632] kthread+0x24c/0x2d0 [ 52.145072] ret_from_fork+0x10/0x20 [ 52.145894] [ 52.146249] The buggy address belongs to the object at fff00000c616b300 [ 52.146249] which belongs to the cache kmalloc-64 of size 64 [ 52.147602] The buggy address is located 0 bytes to the right of [ 52.147602] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.149070] [ 52.149533] The buggy address belongs to the physical page: [ 52.150217] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.151452] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.152410] page_type: f5(slab) [ 52.153040] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.154161] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.155082] page dumped because: kasan: bad access detected [ 52.155994] [ 52.156354] Memory state around the buggy address: [ 52.157033] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.158075] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.158926] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.159777] ^ [ 52.160540] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.161725] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.162676] ================================================================== [ 53.030985] ================================================================== [ 53.031769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 53.032556] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.033227] [ 53.033690] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.034951] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.035518] Hardware name: linux,dummy-virt (DT) [ 53.036095] Call trace: [ 53.036501] show_stack+0x20/0x38 (C) [ 53.036930] dump_stack_lvl+0x8c/0xd0 [ 53.037497] print_report+0x118/0x5e0 [ 53.037922] kasan_report+0xc8/0x118 [ 53.038356] __asan_report_load4_noabort+0x20/0x30 [ 53.038908] kasan_atomics_helper+0x3dcc/0x4858 [ 53.039444] kasan_atomics+0x198/0x2e8 [ 53.040136] kunit_try_run_case+0x14c/0x3d0 [ 53.040978] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.041568] kthread+0x24c/0x2d0 [ 53.042008] ret_from_fork+0x10/0x20 [ 53.042492] [ 53.042751] Allocated by task 254: [ 53.043140] kasan_save_stack+0x3c/0x68 [ 53.043616] kasan_save_track+0x20/0x40 [ 53.044385] kasan_save_alloc_info+0x40/0x58 [ 53.045068] __kasan_kmalloc+0xd4/0xd8 [ 53.045848] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.046690] kasan_atomics+0xb8/0x2e8 [ 53.047279] kunit_try_run_case+0x14c/0x3d0 [ 53.047778] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.048541] kthread+0x24c/0x2d0 [ 53.049182] ret_from_fork+0x10/0x20 [ 53.049836] [ 53.050223] The buggy address belongs to the object at fff00000c616b300 [ 53.050223] which belongs to the cache kmalloc-64 of size 64 [ 53.051341] The buggy address is located 0 bytes to the right of [ 53.051341] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.053034] [ 53.053508] The buggy address belongs to the physical page: [ 53.054175] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.055147] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.056085] page_type: f5(slab) [ 53.056687] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.057677] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.058388] page dumped because: kasan: bad access detected [ 53.059274] [ 53.059626] Memory state around the buggy address: [ 53.060455] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.061411] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.062470] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.063248] ^ [ 53.063909] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.064737] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.065681] ================================================================== [ 52.333628] ================================================================== [ 52.334450] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 52.335540] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.336482] [ 52.336776] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.337850] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.338521] Hardware name: linux,dummy-virt (DT) [ 52.339080] Call trace: [ 52.339509] show_stack+0x20/0x38 (C) [ 52.340133] dump_stack_lvl+0x8c/0xd0 [ 52.340668] print_report+0x118/0x5e0 [ 52.341352] kasan_report+0xc8/0x118 [ 52.341897] kasan_check_range+0x100/0x1a8 [ 52.342525] __kasan_check_write+0x20/0x30 [ 52.343130] kasan_atomics_helper+0x3ac/0x4858 [ 52.343887] kasan_atomics+0x198/0x2e8 [ 52.344634] kunit_try_run_case+0x14c/0x3d0 [ 52.345420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.346105] kthread+0x24c/0x2d0 [ 52.346795] ret_from_fork+0x10/0x20 [ 52.347381] [ 52.347721] Allocated by task 254: [ 52.348234] kasan_save_stack+0x3c/0x68 [ 52.348878] kasan_save_track+0x20/0x40 [ 52.349356] kasan_save_alloc_info+0x40/0x58 [ 52.350144] __kasan_kmalloc+0xd4/0xd8 [ 52.350749] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.351396] kasan_atomics+0xb8/0x2e8 [ 52.351952] kunit_try_run_case+0x14c/0x3d0 [ 52.352495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.353280] kthread+0x24c/0x2d0 [ 52.353848] ret_from_fork+0x10/0x20 [ 52.354357] [ 52.354756] The buggy address belongs to the object at fff00000c616b300 [ 52.354756] which belongs to the cache kmalloc-64 of size 64 [ 52.356087] The buggy address is located 0 bytes to the right of [ 52.356087] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.357497] [ 52.357786] The buggy address belongs to the physical page: [ 52.358426] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.359347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.360251] page_type: f5(slab) [ 52.360874] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.361781] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.362656] page dumped because: kasan: bad access detected [ 52.363368] [ 52.363665] Memory state around the buggy address: [ 52.364370] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.365249] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.366123] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.366991] ^ [ 52.367597] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.368455] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.369269] ================================================================== [ 51.994490] ================================================================== [ 51.995965] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 51.996977] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 51.998802] [ 51.999223] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.000431] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.001012] Hardware name: linux,dummy-virt (DT) [ 52.001759] Call trace: [ 52.002209] show_stack+0x20/0x38 (C) [ 52.002843] dump_stack_lvl+0x8c/0xd0 [ 52.003733] print_report+0x118/0x5e0 [ 52.004501] kasan_report+0xc8/0x118 [ 52.005282] __asan_report_load4_noabort+0x20/0x30 [ 52.006209] kasan_atomics_helper+0x40a8/0x4858 [ 52.006953] kasan_atomics+0x198/0x2e8 [ 52.007562] kunit_try_run_case+0x14c/0x3d0 [ 52.008184] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.008920] kthread+0x24c/0x2d0 [ 52.009717] ret_from_fork+0x10/0x20 [ 52.010415] [ 52.010706] Allocated by task 254: [ 52.011527] kasan_save_stack+0x3c/0x68 [ 52.012142] kasan_save_track+0x20/0x40 [ 52.012971] kasan_save_alloc_info+0x40/0x58 [ 52.013800] __kasan_kmalloc+0xd4/0xd8 [ 52.014447] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.015255] kasan_atomics+0xb8/0x2e8 [ 52.015816] kunit_try_run_case+0x14c/0x3d0 [ 52.016456] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.017088] kthread+0x24c/0x2d0 [ 52.017747] ret_from_fork+0x10/0x20 [ 52.018394] [ 52.018767] The buggy address belongs to the object at fff00000c616b300 [ 52.018767] which belongs to the cache kmalloc-64 of size 64 [ 52.020535] The buggy address is located 0 bytes to the right of [ 52.020535] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.022447] [ 52.022973] The buggy address belongs to the physical page: [ 52.023560] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.024480] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.025337] page_type: f5(slab) [ 52.026010] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.026976] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.027802] page dumped because: kasan: bad access detected [ 52.028536] [ 52.028879] Memory state around the buggy address: [ 52.029540] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.030264] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.031326] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.032121] ^ [ 52.032852] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.033832] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.034883] ================================================================== [ 53.105773] ================================================================== [ 53.106826] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 53.107768] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.108556] [ 53.108909] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.109992] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.110763] Hardware name: linux,dummy-virt (DT) [ 53.111430] Call trace: [ 53.111890] show_stack+0x20/0x38 (C) [ 53.112564] dump_stack_lvl+0x8c/0xd0 [ 53.113247] print_report+0x118/0x5e0 [ 53.113812] kasan_report+0xc8/0x118 [ 53.114479] __asan_report_load4_noabort+0x20/0x30 [ 53.115102] kasan_atomics_helper+0x3dbc/0x4858 [ 53.115823] kasan_atomics+0x198/0x2e8 [ 53.116375] kunit_try_run_case+0x14c/0x3d0 [ 53.117008] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.117735] kthread+0x24c/0x2d0 [ 53.118377] ret_from_fork+0x10/0x20 [ 53.118956] [ 53.119268] Allocated by task 254: [ 53.119843] kasan_save_stack+0x3c/0x68 [ 53.120518] kasan_save_track+0x20/0x40 [ 53.121156] kasan_save_alloc_info+0x40/0x58 [ 53.121764] __kasan_kmalloc+0xd4/0xd8 [ 53.122335] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.122895] kasan_atomics+0xb8/0x2e8 [ 53.123543] kunit_try_run_case+0x14c/0x3d0 [ 53.124150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.124889] kthread+0x24c/0x2d0 [ 53.125499] ret_from_fork+0x10/0x20 [ 53.126051] [ 53.126399] The buggy address belongs to the object at fff00000c616b300 [ 53.126399] which belongs to the cache kmalloc-64 of size 64 [ 53.127851] The buggy address is located 0 bytes to the right of [ 53.127851] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.129149] [ 53.129500] The buggy address belongs to the physical page: [ 53.130152] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.131040] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.131886] page_type: f5(slab) [ 53.132443] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.133380] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.134289] page dumped because: kasan: bad access detected [ 53.135015] [ 53.135388] Memory state around the buggy address: [ 53.135999] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.136841] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.137708] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.138658] ^ [ 53.139286] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.140130] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.141099] ================================================================== [ 52.682032] ================================================================== [ 52.683620] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 52.684706] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.685872] [ 52.686258] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.687681] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.688236] Hardware name: linux,dummy-virt (DT) [ 52.688787] Call trace: [ 52.689240] show_stack+0x20/0x38 (C) [ 52.689803] dump_stack_lvl+0x8c/0xd0 [ 52.690496] print_report+0x118/0x5e0 [ 52.691044] kasan_report+0xc8/0x118 [ 52.691705] kasan_check_range+0x100/0x1a8 [ 52.692491] __kasan_check_write+0x20/0x30 [ 52.693195] kasan_atomics_helper+0x760/0x4858 [ 52.693792] kasan_atomics+0x198/0x2e8 [ 52.694508] kunit_try_run_case+0x14c/0x3d0 [ 52.695137] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.695967] kthread+0x24c/0x2d0 [ 52.696546] ret_from_fork+0x10/0x20 [ 52.697142] [ 52.697527] Allocated by task 254: [ 52.698024] kasan_save_stack+0x3c/0x68 [ 52.698763] kasan_save_track+0x20/0x40 [ 52.699382] kasan_save_alloc_info+0x40/0x58 [ 52.699994] __kasan_kmalloc+0xd4/0xd8 [ 52.700495] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.701208] kasan_atomics+0xb8/0x2e8 [ 52.701710] kunit_try_run_case+0x14c/0x3d0 [ 52.702339] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.702975] kthread+0x24c/0x2d0 [ 52.703606] ret_from_fork+0x10/0x20 [ 52.704153] [ 52.704461] The buggy address belongs to the object at fff00000c616b300 [ 52.704461] which belongs to the cache kmalloc-64 of size 64 [ 52.705854] The buggy address is located 0 bytes to the right of [ 52.705854] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.707317] [ 52.707732] The buggy address belongs to the physical page: [ 52.708363] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.709396] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.710162] page_type: f5(slab) [ 52.710628] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.711592] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.712554] page dumped because: kasan: bad access detected [ 52.713335] [ 52.713682] Memory state around the buggy address: [ 52.714315] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.715147] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.716054] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.716983] ^ [ 52.717737] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.718685] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.719561] ================================================================== [ 53.257578] ================================================================== [ 53.258355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 53.259409] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.260430] [ 53.260802] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.262067] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.262584] Hardware name: linux,dummy-virt (DT) [ 53.263495] Call trace: [ 53.263930] show_stack+0x20/0x38 (C) [ 53.264683] dump_stack_lvl+0x8c/0xd0 [ 53.265347] print_report+0x118/0x5e0 [ 53.266055] kasan_report+0xc8/0x118 [ 53.266744] __asan_report_load4_noabort+0x20/0x30 [ 53.267476] kasan_atomics_helper+0x3dd8/0x4858 [ 53.268157] kasan_atomics+0x198/0x2e8 [ 53.268805] kunit_try_run_case+0x14c/0x3d0 [ 53.269618] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.270310] kthread+0x24c/0x2d0 [ 53.270899] ret_from_fork+0x10/0x20 [ 53.271655] [ 53.272053] Allocated by task 254: [ 53.272700] kasan_save_stack+0x3c/0x68 [ 53.273349] kasan_save_track+0x20/0x40 [ 53.274080] kasan_save_alloc_info+0x40/0x58 [ 53.274804] __kasan_kmalloc+0xd4/0xd8 [ 53.275558] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.276238] kasan_atomics+0xb8/0x2e8 [ 53.276911] kunit_try_run_case+0x14c/0x3d0 [ 53.277599] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.278383] kthread+0x24c/0x2d0 [ 53.278964] ret_from_fork+0x10/0x20 [ 53.279575] [ 53.279921] The buggy address belongs to the object at fff00000c616b300 [ 53.279921] which belongs to the cache kmalloc-64 of size 64 [ 53.281376] The buggy address is located 0 bytes to the right of [ 53.281376] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.282870] [ 53.283230] The buggy address belongs to the physical page: [ 53.283864] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.284784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.285658] page_type: f5(slab) [ 53.286142] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.287107] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.288205] page dumped because: kasan: bad access detected [ 53.289043] [ 53.289485] Memory state around the buggy address: [ 53.290245] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.291240] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.292240] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.293149] ^ [ 53.293905] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.295015] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.296003] ================================================================== [ 53.142637] ================================================================== [ 53.143406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 53.144343] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.145226] [ 53.145661] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.146844] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.147456] Hardware name: linux,dummy-virt (DT) [ 53.147984] Call trace: [ 53.148487] show_stack+0x20/0x38 (C) [ 53.149140] dump_stack_lvl+0x8c/0xd0 [ 53.149675] print_report+0x118/0x5e0 [ 53.150277] kasan_report+0xc8/0x118 [ 53.150893] kasan_check_range+0x100/0x1a8 [ 53.151513] __kasan_check_write+0x20/0x30 [ 53.152110] kasan_atomics_helper+0xc08/0x4858 [ 53.152741] kasan_atomics+0x198/0x2e8 [ 53.153402] kunit_try_run_case+0x14c/0x3d0 [ 53.154009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.154749] kthread+0x24c/0x2d0 [ 53.155361] ret_from_fork+0x10/0x20 [ 53.156005] [ 53.156308] Allocated by task 254: [ 53.156851] kasan_save_stack+0x3c/0x68 [ 53.157394] kasan_save_track+0x20/0x40 [ 53.157913] kasan_save_alloc_info+0x40/0x58 [ 53.158726] __kasan_kmalloc+0xd4/0xd8 [ 53.159443] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.160194] kasan_atomics+0xb8/0x2e8 [ 53.160746] kunit_try_run_case+0x14c/0x3d0 [ 53.161396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.162129] kthread+0x24c/0x2d0 [ 53.162735] ret_from_fork+0x10/0x20 [ 53.163245] [ 53.163559] The buggy address belongs to the object at fff00000c616b300 [ 53.163559] which belongs to the cache kmalloc-64 of size 64 [ 53.164996] The buggy address is located 0 bytes to the right of [ 53.164996] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.166349] [ 53.166693] The buggy address belongs to the physical page: [ 53.167541] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.168454] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.169226] page_type: f5(slab) [ 53.169711] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.170643] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.171520] page dumped because: kasan: bad access detected [ 53.172214] [ 53.172572] Memory state around the buggy address: [ 53.173169] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.174025] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.174947] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.175759] ^ [ 53.176385] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.177280] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.178160] ================================================================== [ 53.639959] ================================================================== [ 53.640872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 53.642013] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.642959] [ 53.643322] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.644276] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.644987] Hardware name: linux,dummy-virt (DT) [ 53.645620] Call trace: [ 53.646149] show_stack+0x20/0x38 (C) [ 53.646692] dump_stack_lvl+0x8c/0xd0 [ 53.647341] print_report+0x118/0x5e0 [ 53.648005] kasan_report+0xc8/0x118 [ 53.648615] kasan_check_range+0x100/0x1a8 [ 53.649348] __kasan_check_write+0x20/0x30 [ 53.649973] kasan_atomics_helper+0xff0/0x4858 [ 53.650667] kasan_atomics+0x198/0x2e8 [ 53.651221] kunit_try_run_case+0x14c/0x3d0 [ 53.651841] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.652564] kthread+0x24c/0x2d0 [ 53.653072] ret_from_fork+0x10/0x20 [ 53.653747] [ 53.654065] Allocated by task 254: [ 53.654594] kasan_save_stack+0x3c/0x68 [ 53.655181] kasan_save_track+0x20/0x40 [ 53.655706] kasan_save_alloc_info+0x40/0x58 [ 53.656408] __kasan_kmalloc+0xd4/0xd8 [ 53.656907] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.657655] kasan_atomics+0xb8/0x2e8 [ 53.658169] kunit_try_run_case+0x14c/0x3d0 [ 53.658829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.659432] kthread+0x24c/0x2d0 [ 53.660025] ret_from_fork+0x10/0x20 [ 53.660508] [ 53.660900] The buggy address belongs to the object at fff00000c616b300 [ 53.660900] which belongs to the cache kmalloc-64 of size 64 [ 53.662327] The buggy address is located 0 bytes to the right of [ 53.662327] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.663764] [ 53.664098] The buggy address belongs to the physical page: [ 53.664746] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.665713] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.666566] page_type: f5(slab) [ 53.667168] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.668077] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.669039] page dumped because: kasan: bad access detected [ 53.669743] [ 53.670069] Memory state around the buggy address: [ 53.670725] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.671687] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.672682] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.673597] ^ [ 53.674149] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.675024] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.675850] ================================================================== [ 52.077377] ================================================================== [ 52.079332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 52.079944] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.081247] [ 52.081709] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.082779] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.083193] Hardware name: linux,dummy-virt (DT) [ 52.084122] Call trace: [ 52.084708] show_stack+0x20/0x38 (C) [ 52.085422] dump_stack_lvl+0x8c/0xd0 [ 52.086267] print_report+0x118/0x5e0 [ 52.087019] kasan_report+0xc8/0x118 [ 52.087819] kasan_check_range+0x100/0x1a8 [ 52.088632] __kasan_check_read+0x20/0x30 [ 52.089467] kasan_atomics_helper+0x1ec/0x4858 [ 52.090163] kasan_atomics+0x198/0x2e8 [ 52.090924] kunit_try_run_case+0x14c/0x3d0 [ 52.091645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.092243] kthread+0x24c/0x2d0 [ 52.092895] ret_from_fork+0x10/0x20 [ 52.093655] [ 52.094052] Allocated by task 254: [ 52.094595] kasan_save_stack+0x3c/0x68 [ 52.095245] kasan_save_track+0x20/0x40 [ 52.096220] kasan_save_alloc_info+0x40/0x58 [ 52.096872] __kasan_kmalloc+0xd4/0xd8 [ 52.097691] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.098150] kasan_atomics+0xb8/0x2e8 [ 52.098920] kunit_try_run_case+0x14c/0x3d0 [ 52.099790] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.100623] kthread+0x24c/0x2d0 [ 52.101454] ret_from_fork+0x10/0x20 [ 52.102144] [ 52.102409] The buggy address belongs to the object at fff00000c616b300 [ 52.102409] which belongs to the cache kmalloc-64 of size 64 [ 52.104075] The buggy address is located 0 bytes to the right of [ 52.104075] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.106167] [ 52.106403] The buggy address belongs to the physical page: [ 52.107428] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.108361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.109262] page_type: f5(slab) [ 52.110157] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.111058] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.112000] page dumped because: kasan: bad access detected [ 52.112705] [ 52.112999] Memory state around the buggy address: [ 52.113729] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.114606] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.115458] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.116240] ^ [ 52.116968] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.117979] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.118831] ================================================================== [ 52.801951] ================================================================== [ 52.802702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 52.803946] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.805663] [ 52.806133] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.807681] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.808269] Hardware name: linux,dummy-virt (DT) [ 52.808829] Call trace: [ 52.809215] show_stack+0x20/0x38 (C) [ 52.809761] dump_stack_lvl+0x8c/0xd0 [ 52.810491] print_report+0x118/0x5e0 [ 52.811185] kasan_report+0xc8/0x118 [ 52.811913] __asan_report_load4_noabort+0x20/0x30 [ 52.812562] kasan_atomics_helper+0x42d8/0x4858 [ 52.813230] kasan_atomics+0x198/0x2e8 [ 52.813860] kunit_try_run_case+0x14c/0x3d0 [ 52.814481] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.815346] kthread+0x24c/0x2d0 [ 52.815853] ret_from_fork+0x10/0x20 [ 52.816465] [ 52.816753] Allocated by task 254: [ 52.817288] kasan_save_stack+0x3c/0x68 [ 52.817820] kasan_save_track+0x20/0x40 [ 52.818472] kasan_save_alloc_info+0x40/0x58 [ 52.819002] __kasan_kmalloc+0xd4/0xd8 [ 52.819677] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.820309] kasan_atomics+0xb8/0x2e8 [ 52.820976] kunit_try_run_case+0x14c/0x3d0 [ 52.821652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.822528] kthread+0x24c/0x2d0 [ 52.823002] ret_from_fork+0x10/0x20 [ 52.823625] [ 52.823947] The buggy address belongs to the object at fff00000c616b300 [ 52.823947] which belongs to the cache kmalloc-64 of size 64 [ 52.825394] The buggy address is located 0 bytes to the right of [ 52.825394] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.826755] [ 52.827052] The buggy address belongs to the physical page: [ 52.827835] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.828777] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.829632] page_type: f5(slab) [ 52.830136] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.831026] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.832022] page dumped because: kasan: bad access detected [ 52.832674] [ 52.833022] Memory state around the buggy address: [ 52.833615] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.834517] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.835497] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.836346] ^ [ 52.837379] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.838332] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.839332] ================================================================== [ 53.717558] ================================================================== [ 53.718399] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 53.719139] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.720191] [ 53.720588] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.721766] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.722426] Hardware name: linux,dummy-virt (DT) [ 53.722998] Call trace: [ 53.723472] show_stack+0x20/0x38 (C) [ 53.724041] dump_stack_lvl+0x8c/0xd0 [ 53.724634] print_report+0x118/0x5e0 [ 53.725177] kasan_report+0xc8/0x118 [ 53.725734] kasan_check_range+0x100/0x1a8 [ 53.726385] __kasan_check_write+0x20/0x30 [ 53.726963] kasan_atomics_helper+0x10c0/0x4858 [ 53.727655] kasan_atomics+0x198/0x2e8 [ 53.728149] kunit_try_run_case+0x14c/0x3d0 [ 53.728837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.729685] kthread+0x24c/0x2d0 [ 53.730248] ret_from_fork+0x10/0x20 [ 53.730858] [ 53.731164] Allocated by task 254: [ 53.731763] kasan_save_stack+0x3c/0x68 [ 53.732346] kasan_save_track+0x20/0x40 [ 53.732989] kasan_save_alloc_info+0x40/0x58 [ 53.733574] __kasan_kmalloc+0xd4/0xd8 [ 53.734191] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.734821] kasan_atomics+0xb8/0x2e8 [ 53.735358] kunit_try_run_case+0x14c/0x3d0 [ 53.735947] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.736793] kthread+0x24c/0x2d0 [ 53.737270] ret_from_fork+0x10/0x20 [ 53.737830] [ 53.738128] The buggy address belongs to the object at fff00000c616b300 [ 53.738128] which belongs to the cache kmalloc-64 of size 64 [ 53.739636] The buggy address is located 0 bytes to the right of [ 53.739636] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.741047] [ 53.741345] The buggy address belongs to the physical page: [ 53.742124] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.743022] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.743857] page_type: f5(slab) [ 53.744351] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.745189] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.746175] page dumped because: kasan: bad access detected [ 53.746899] [ 53.747229] Memory state around the buggy address: [ 53.747853] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.748691] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.749650] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.750520] ^ [ 53.751199] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.752015] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.752858] ================================================================== [ 54.187491] ================================================================== [ 54.188191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 54.188936] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 54.189979] [ 54.190326] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 54.191437] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.191972] Hardware name: linux,dummy-virt (DT) [ 54.192618] Call trace: [ 54.193081] show_stack+0x20/0x38 (C) [ 54.193596] dump_stack_lvl+0x8c/0xd0 [ 54.194236] print_report+0x118/0x5e0 [ 54.194739] kasan_report+0xc8/0x118 [ 54.195478] kasan_check_range+0x100/0x1a8 [ 54.196096] __kasan_check_write+0x20/0x30 [ 54.196675] kasan_atomics_helper+0x15b4/0x4858 [ 54.197442] kasan_atomics+0x198/0x2e8 [ 54.197947] kunit_try_run_case+0x14c/0x3d0 [ 54.198672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.199417] kthread+0x24c/0x2d0 [ 54.200077] ret_from_fork+0x10/0x20 [ 54.200560] [ 54.200921] Allocated by task 254: [ 54.201530] kasan_save_stack+0x3c/0x68 [ 54.202075] kasan_save_track+0x20/0x40 [ 54.202744] kasan_save_alloc_info+0x40/0x58 [ 54.203444] __kasan_kmalloc+0xd4/0xd8 [ 54.203911] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.204658] kasan_atomics+0xb8/0x2e8 [ 54.205108] kunit_try_run_case+0x14c/0x3d0 [ 54.205792] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.206421] kthread+0x24c/0x2d0 [ 54.207041] ret_from_fork+0x10/0x20 [ 54.207624] [ 54.208087] The buggy address belongs to the object at fff00000c616b300 [ 54.208087] which belongs to the cache kmalloc-64 of size 64 [ 54.209498] The buggy address is located 0 bytes to the right of [ 54.209498] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 54.210906] [ 54.211217] The buggy address belongs to the physical page: [ 54.211954] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 54.212838] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.213718] page_type: f5(slab) [ 54.214199] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 54.215068] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 54.215975] page dumped because: kasan: bad access detected [ 54.216786] [ 54.217094] Memory state around the buggy address: [ 54.217811] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.218668] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.219620] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.220431] ^ [ 54.221008] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.221879] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.222801] ================================================================== [ 52.918108] ================================================================== [ 52.918947] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 52.919742] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.920490] [ 52.920916] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.922350] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.922984] Hardware name: linux,dummy-virt (DT) [ 52.923640] Call trace: [ 52.923969] show_stack+0x20/0x38 (C) [ 52.924632] dump_stack_lvl+0x8c/0xd0 [ 52.925173] print_report+0x118/0x5e0 [ 52.925786] kasan_report+0xc8/0x118 [ 52.926351] kasan_check_range+0x100/0x1a8 [ 52.927050] __kasan_check_write+0x20/0x30 [ 52.927685] kasan_atomics_helper+0xa04/0x4858 [ 52.928279] kasan_atomics+0x198/0x2e8 [ 52.928984] kunit_try_run_case+0x14c/0x3d0 [ 52.929678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.930488] kthread+0x24c/0x2d0 [ 52.931038] ret_from_fork+0x10/0x20 [ 52.931607] [ 52.932036] Allocated by task 254: [ 52.932638] kasan_save_stack+0x3c/0x68 [ 52.933141] kasan_save_track+0x20/0x40 [ 52.933799] kasan_save_alloc_info+0x40/0x58 [ 52.934320] __kasan_kmalloc+0xd4/0xd8 [ 52.934943] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.935621] kasan_atomics+0xb8/0x2e8 [ 52.936130] kunit_try_run_case+0x14c/0x3d0 [ 52.936810] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.937489] kthread+0x24c/0x2d0 [ 52.938073] ret_from_fork+0x10/0x20 [ 52.938593] [ 52.939037] The buggy address belongs to the object at fff00000c616b300 [ 52.939037] which belongs to the cache kmalloc-64 of size 64 [ 52.940429] The buggy address is located 0 bytes to the right of [ 52.940429] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.941789] [ 52.942103] The buggy address belongs to the physical page: [ 52.942863] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.943739] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.944608] page_type: f5(slab) [ 52.945169] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.946148] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.947086] page dumped because: kasan: bad access detected [ 52.947722] [ 52.948058] Memory state around the buggy address: [ 52.948599] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.949553] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.950430] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.951384] ^ [ 52.952103] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.952929] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.953798] ================================================================== [ 52.993375] ================================================================== [ 52.994173] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 52.995762] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.996502] [ 52.996962] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.998093] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.998652] Hardware name: linux,dummy-virt (DT) [ 52.999255] Call trace: [ 52.999705] show_stack+0x20/0x38 (C) [ 53.000420] dump_stack_lvl+0x8c/0xd0 [ 53.000976] print_report+0x118/0x5e0 [ 53.001747] kasan_report+0xc8/0x118 [ 53.002354] kasan_check_range+0x100/0x1a8 [ 53.002909] __kasan_check_write+0x20/0x30 [ 53.003677] kasan_atomics_helper+0xad4/0x4858 [ 53.004334] kasan_atomics+0x198/0x2e8 [ 53.004863] kunit_try_run_case+0x14c/0x3d0 [ 53.005646] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.006506] kthread+0x24c/0x2d0 [ 53.007155] ret_from_fork+0x10/0x20 [ 53.007702] [ 53.008054] Allocated by task 254: [ 53.008689] kasan_save_stack+0x3c/0x68 [ 53.009249] kasan_save_track+0x20/0x40 [ 53.009752] kasan_save_alloc_info+0x40/0x58 [ 53.010482] __kasan_kmalloc+0xd4/0xd8 [ 53.011023] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.011713] kasan_atomics+0xb8/0x2e8 [ 53.012366] kunit_try_run_case+0x14c/0x3d0 [ 53.012933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.013621] kthread+0x24c/0x2d0 [ 53.014192] ret_from_fork+0x10/0x20 [ 53.014715] [ 53.015093] The buggy address belongs to the object at fff00000c616b300 [ 53.015093] which belongs to the cache kmalloc-64 of size 64 [ 53.016401] The buggy address is located 0 bytes to the right of [ 53.016401] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.017862] [ 53.018198] The buggy address belongs to the physical page: [ 53.018769] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.019810] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.020640] page_type: f5(slab) [ 53.021101] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.022062] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.023052] page dumped because: kasan: bad access detected [ 53.023856] [ 53.024149] Memory state around the buggy address: [ 53.024747] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.025584] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.026490] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.027307] ^ [ 53.027910] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.028784] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.029629] ================================================================== [ 53.677803] ================================================================== [ 53.678628] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 53.680142] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.681083] [ 53.681549] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.683312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.683953] Hardware name: linux,dummy-virt (DT) [ 53.684990] Call trace: [ 53.686124] show_stack+0x20/0x38 (C) [ 53.686813] dump_stack_lvl+0x8c/0xd0 [ 53.687438] print_report+0x118/0x5e0 [ 53.688066] kasan_report+0xc8/0x118 [ 53.688751] kasan_check_range+0x100/0x1a8 [ 53.689409] __kasan_check_write+0x20/0x30 [ 53.690006] kasan_atomics_helper+0x1058/0x4858 [ 53.690575] kasan_atomics+0x198/0x2e8 [ 53.691202] kunit_try_run_case+0x14c/0x3d0 [ 53.691903] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.692701] kthread+0x24c/0x2d0 [ 53.693259] ret_from_fork+0x10/0x20 [ 53.693849] [ 53.694204] Allocated by task 254: [ 53.694803] kasan_save_stack+0x3c/0x68 [ 53.695558] kasan_save_track+0x20/0x40 [ 53.696113] kasan_save_alloc_info+0x40/0x58 [ 53.696725] __kasan_kmalloc+0xd4/0xd8 [ 53.697328] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.697941] kasan_atomics+0xb8/0x2e8 [ 53.698482] kunit_try_run_case+0x14c/0x3d0 [ 53.699117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.699825] kthread+0x24c/0x2d0 [ 53.700390] ret_from_fork+0x10/0x20 [ 53.700884] [ 53.701328] The buggy address belongs to the object at fff00000c616b300 [ 53.701328] which belongs to the cache kmalloc-64 of size 64 [ 53.702643] The buggy address is located 0 bytes to the right of [ 53.702643] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.704037] [ 53.704360] The buggy address belongs to the physical page: [ 53.705114] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.706170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.707024] page_type: f5(slab) [ 53.707641] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.708549] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.709394] page dumped because: kasan: bad access detected [ 53.710133] [ 53.710529] Memory state around the buggy address: [ 53.711139] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.712012] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.712914] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.713793] ^ [ 53.714381] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.715320] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.716121] ================================================================== [ 53.216640] ================================================================== [ 53.218228] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 53.219396] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.220539] [ 53.220882] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.222070] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.222965] Hardware name: linux,dummy-virt (DT) [ 53.223564] Call trace: [ 53.224052] show_stack+0x20/0x38 (C) [ 53.224734] dump_stack_lvl+0x8c/0xd0 [ 53.225418] print_report+0x118/0x5e0 [ 53.226082] kasan_report+0xc8/0x118 [ 53.226718] kasan_check_range+0x100/0x1a8 [ 53.227421] __kasan_check_write+0x20/0x30 [ 53.228119] kasan_atomics_helper+0xca0/0x4858 [ 53.228886] kasan_atomics+0x198/0x2e8 [ 53.229582] kunit_try_run_case+0x14c/0x3d0 [ 53.230260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.231129] kthread+0x24c/0x2d0 [ 53.231821] ret_from_fork+0x10/0x20 [ 53.232457] [ 53.232789] Allocated by task 254: [ 53.233365] kasan_save_stack+0x3c/0x68 [ 53.234067] kasan_save_track+0x20/0x40 [ 53.234716] kasan_save_alloc_info+0x40/0x58 [ 53.235381] __kasan_kmalloc+0xd4/0xd8 [ 53.236108] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.236816] kasan_atomics+0xb8/0x2e8 [ 53.237436] kunit_try_run_case+0x14c/0x3d0 [ 53.238110] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.238872] kthread+0x24c/0x2d0 [ 53.239486] ret_from_fork+0x10/0x20 [ 53.240060] [ 53.240465] The buggy address belongs to the object at fff00000c616b300 [ 53.240465] which belongs to the cache kmalloc-64 of size 64 [ 53.241910] The buggy address is located 0 bytes to the right of [ 53.241910] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.243403] [ 53.243811] The buggy address belongs to the physical page: [ 53.244576] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.245588] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.246382] page_type: f5(slab) [ 53.246969] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.248006] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.248949] page dumped because: kasan: bad access detected [ 53.249727] [ 53.250123] Memory state around the buggy address: [ 53.250787] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.251818] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.252709] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.253597] ^ [ 53.254266] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.255169] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.256024] ================================================================== [ 53.754169] ================================================================== [ 53.755578] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 53.756382] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.757399] [ 53.757722] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.758934] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.759442] Hardware name: linux,dummy-virt (DT) [ 53.759950] Call trace: [ 53.760448] show_stack+0x20/0x38 (C) [ 53.761101] dump_stack_lvl+0x8c/0xd0 [ 53.761646] print_report+0x118/0x5e0 [ 53.762350] kasan_report+0xc8/0x118 [ 53.763050] kasan_check_range+0x100/0x1a8 [ 53.763798] __kasan_check_write+0x20/0x30 [ 53.764486] kasan_atomics_helper+0x1128/0x4858 [ 53.765251] kasan_atomics+0x198/0x2e8 [ 53.765804] kunit_try_run_case+0x14c/0x3d0 [ 53.766536] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.767247] kthread+0x24c/0x2d0 [ 53.767879] ret_from_fork+0x10/0x20 [ 53.768489] [ 53.768853] Allocated by task 254: [ 53.769373] kasan_save_stack+0x3c/0x68 [ 53.769932] kasan_save_track+0x20/0x40 [ 53.770516] kasan_save_alloc_info+0x40/0x58 [ 53.771227] __kasan_kmalloc+0xd4/0xd8 [ 53.771739] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.772485] kasan_atomics+0xb8/0x2e8 [ 53.773045] kunit_try_run_case+0x14c/0x3d0 [ 53.773658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.774437] kthread+0x24c/0x2d0 [ 53.774961] ret_from_fork+0x10/0x20 [ 53.775544] [ 53.775837] The buggy address belongs to the object at fff00000c616b300 [ 53.775837] which belongs to the cache kmalloc-64 of size 64 [ 53.777195] The buggy address is located 0 bytes to the right of [ 53.777195] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.778610] [ 53.778899] The buggy address belongs to the physical page: [ 53.779682] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.780522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.781422] page_type: f5(slab) [ 53.781874] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.782796] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.783779] page dumped because: kasan: bad access detected [ 53.784453] [ 53.784759] Memory state around the buggy address: [ 53.785419] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.786267] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.787030] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.787950] ^ [ 53.788642] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.789655] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.790768] ================================================================== [ 54.112535] ================================================================== [ 54.113769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 54.114341] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 54.115135] [ 54.115535] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 54.116588] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.117224] Hardware name: linux,dummy-virt (DT) [ 54.117778] Call trace: [ 54.118256] show_stack+0x20/0x38 (C) [ 54.118825] dump_stack_lvl+0x8c/0xd0 [ 54.119626] print_report+0x118/0x5e0 [ 54.120155] kasan_report+0xc8/0x118 [ 54.120748] kasan_check_range+0x100/0x1a8 [ 54.121395] __kasan_check_write+0x20/0x30 [ 54.122100] kasan_atomics_helper+0x14e4/0x4858 [ 54.122779] kasan_atomics+0x198/0x2e8 [ 54.123332] kunit_try_run_case+0x14c/0x3d0 [ 54.123996] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.124732] kthread+0x24c/0x2d0 [ 54.125316] ret_from_fork+0x10/0x20 [ 54.125939] [ 54.126271] Allocated by task 254: [ 54.126851] kasan_save_stack+0x3c/0x68 [ 54.127370] kasan_save_track+0x20/0x40 [ 54.127998] kasan_save_alloc_info+0x40/0x58 [ 54.128599] __kasan_kmalloc+0xd4/0xd8 [ 54.129056] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.129788] kasan_atomics+0xb8/0x2e8 [ 54.130266] kunit_try_run_case+0x14c/0x3d0 [ 54.130968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.131765] kthread+0x24c/0x2d0 [ 54.132390] ret_from_fork+0x10/0x20 [ 54.132899] [ 54.133333] The buggy address belongs to the object at fff00000c616b300 [ 54.133333] which belongs to the cache kmalloc-64 of size 64 [ 54.134708] The buggy address is located 0 bytes to the right of [ 54.134708] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 54.136152] [ 54.136496] The buggy address belongs to the physical page: [ 54.137283] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 54.138205] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.138947] page_type: f5(slab) [ 54.139508] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 54.140413] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 54.141337] page dumped because: kasan: bad access detected [ 54.142068] [ 54.142438] Memory state around the buggy address: [ 54.143087] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.143950] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.144802] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.145688] ^ [ 54.146285] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.147160] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.148092] ================================================================== [ 54.224042] ================================================================== [ 54.224765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 54.225778] Read of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 54.226615] [ 54.227064] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 54.228171] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.228627] Hardware name: linux,dummy-virt (DT) [ 54.229398] Call trace: [ 54.229783] show_stack+0x20/0x38 (C) [ 54.230469] dump_stack_lvl+0x8c/0xd0 [ 54.230982] print_report+0x118/0x5e0 [ 54.231640] kasan_report+0xc8/0x118 [ 54.232353] __asan_report_load8_noabort+0x20/0x30 [ 54.233098] kasan_atomics_helper+0x3db0/0x4858 [ 54.233773] kasan_atomics+0x198/0x2e8 [ 54.234338] kunit_try_run_case+0x14c/0x3d0 [ 54.234946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.235589] kthread+0x24c/0x2d0 [ 54.236205] ret_from_fork+0x10/0x20 [ 54.236841] [ 54.237200] Allocated by task 254: [ 54.237723] kasan_save_stack+0x3c/0x68 [ 54.238346] kasan_save_track+0x20/0x40 [ 54.238930] kasan_save_alloc_info+0x40/0x58 [ 54.239476] __kasan_kmalloc+0xd4/0xd8 [ 54.240133] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.240829] kasan_atomics+0xb8/0x2e8 [ 54.241565] kunit_try_run_case+0x14c/0x3d0 [ 54.242201] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.243118] kthread+0x24c/0x2d0 [ 54.243646] ret_from_fork+0x10/0x20 [ 54.244190] [ 54.244515] The buggy address belongs to the object at fff00000c616b300 [ 54.244515] which belongs to the cache kmalloc-64 of size 64 [ 54.245998] The buggy address is located 0 bytes to the right of [ 54.245998] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 54.247411] [ 54.247740] The buggy address belongs to the physical page: [ 54.248348] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 54.249353] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.250135] page_type: f5(slab) [ 54.250671] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 54.251554] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 54.252502] page dumped because: kasan: bad access detected [ 54.253252] [ 54.253586] Memory state around the buggy address: [ 54.254205] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.255057] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.255912] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.256826] ^ [ 54.257362] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.258180] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.259085] ================================================================== [ 54.335423] ================================================================== [ 54.336212] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 54.337756] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 54.339284] [ 54.339627] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 54.340478] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.340833] Hardware name: linux,dummy-virt (DT) [ 54.341211] Call trace: [ 54.341494] show_stack+0x20/0x38 (C) [ 54.341872] dump_stack_lvl+0x8c/0xd0 [ 54.342249] print_report+0x118/0x5e0 [ 54.342732] kasan_report+0xc8/0x118 [ 54.343182] kasan_check_range+0x100/0x1a8 [ 54.343786] __kasan_check_write+0x20/0x30 [ 54.344620] kasan_atomics_helper+0x16d0/0x4858 [ 54.345442] kasan_atomics+0x198/0x2e8 [ 54.345835] kunit_try_run_case+0x14c/0x3d0 [ 54.346243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.346747] kthread+0x24c/0x2d0 [ 54.347133] ret_from_fork+0x10/0x20 [ 54.347560] [ 54.347843] Allocated by task 254: [ 54.348323] kasan_save_stack+0x3c/0x68 [ 54.349175] kasan_save_track+0x20/0x40 [ 54.349811] kasan_save_alloc_info+0x40/0x58 [ 54.350715] __kasan_kmalloc+0xd4/0xd8 [ 54.351425] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.351994] kasan_atomics+0xb8/0x2e8 [ 54.352451] kunit_try_run_case+0x14c/0x3d0 [ 54.352912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.353455] kthread+0x24c/0x2d0 [ 54.354124] ret_from_fork+0x10/0x20 [ 54.354877] [ 54.355357] The buggy address belongs to the object at fff00000c616b300 [ 54.355357] which belongs to the cache kmalloc-64 of size 64 [ 54.356872] The buggy address is located 0 bytes to the right of [ 54.356872] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 54.358030] [ 54.358512] The buggy address belongs to the physical page: [ 54.359702] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 54.360645] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.361439] page_type: f5(slab) [ 54.361991] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 54.362904] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 54.363830] page dumped because: kasan: bad access detected [ 54.364601] [ 54.364909] Memory state around the buggy address: [ 54.365556] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.366473] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.367361] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.368258] ^ [ 54.368920] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.369741] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.370675] ================================================================== [ 53.875913] ================================================================== [ 53.877604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 53.878344] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.879356] [ 53.879725] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.880979] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.881660] Hardware name: linux,dummy-virt (DT) [ 53.882283] Call trace: [ 53.882674] show_stack+0x20/0x38 (C) [ 53.883282] dump_stack_lvl+0x8c/0xd0 [ 53.883940] print_report+0x118/0x5e0 [ 53.884537] kasan_report+0xc8/0x118 [ 53.885077] kasan_check_range+0x100/0x1a8 [ 53.885639] __kasan_check_write+0x20/0x30 [ 53.886438] kasan_atomics_helper+0x126c/0x4858 [ 53.887083] kasan_atomics+0x198/0x2e8 [ 53.887648] kunit_try_run_case+0x14c/0x3d0 [ 53.888249] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.888975] kthread+0x24c/0x2d0 [ 53.889600] ret_from_fork+0x10/0x20 [ 53.890235] [ 53.890580] Allocated by task 254: [ 53.891240] kasan_save_stack+0x3c/0x68 [ 53.891794] kasan_save_track+0x20/0x40 [ 53.892674] kasan_save_alloc_info+0x40/0x58 [ 53.893320] __kasan_kmalloc+0xd4/0xd8 [ 53.893947] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.894781] kasan_atomics+0xb8/0x2e8 [ 53.895521] kunit_try_run_case+0x14c/0x3d0 [ 53.896223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.897098] kthread+0x24c/0x2d0 [ 53.897691] ret_from_fork+0x10/0x20 [ 53.898217] [ 53.898763] The buggy address belongs to the object at fff00000c616b300 [ 53.898763] which belongs to the cache kmalloc-64 of size 64 [ 53.899959] The buggy address is located 0 bytes to the right of [ 53.899959] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.901074] [ 53.901410] The buggy address belongs to the physical page: [ 53.902064] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.902872] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.903851] page_type: f5(slab) [ 53.904575] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.905532] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.906407] page dumped because: kasan: bad access detected [ 53.907101] [ 53.907521] Memory state around the buggy address: [ 53.908103] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.908908] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.909807] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.910617] ^ [ 53.911260] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.912154] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.913066] ================================================================== [ 54.449976] ================================================================== [ 54.450860] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 54.451660] Read of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 54.452441] [ 54.452815] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 54.453973] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.454585] Hardware name: linux,dummy-virt (DT) [ 54.455308] Call trace: [ 54.455736] show_stack+0x20/0x38 (C) [ 54.456313] dump_stack_lvl+0x8c/0xd0 [ 54.456924] print_report+0x118/0x5e0 [ 54.457495] kasan_report+0xc8/0x118 [ 54.458022] __asan_report_load8_noabort+0x20/0x30 [ 54.458680] kasan_atomics_helper+0x3e20/0x4858 [ 54.459475] kasan_atomics+0x198/0x2e8 [ 54.460011] kunit_try_run_case+0x14c/0x3d0 [ 54.460634] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.461367] kthread+0x24c/0x2d0 [ 54.461971] ret_from_fork+0x10/0x20 [ 54.462495] [ 54.462836] Allocated by task 254: [ 54.463315] kasan_save_stack+0x3c/0x68 [ 54.463938] kasan_save_track+0x20/0x40 [ 54.464545] kasan_save_alloc_info+0x40/0x58 [ 54.465154] __kasan_kmalloc+0xd4/0xd8 [ 54.465698] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.466423] kasan_atomics+0xb8/0x2e8 [ 54.466923] kunit_try_run_case+0x14c/0x3d0 [ 54.467580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.468281] kthread+0x24c/0x2d0 [ 54.468912] ret_from_fork+0x10/0x20 [ 54.469398] [ 54.469788] The buggy address belongs to the object at fff00000c616b300 [ 54.469788] which belongs to the cache kmalloc-64 of size 64 [ 54.471237] The buggy address is located 0 bytes to the right of [ 54.471237] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 54.472581] [ 54.472952] The buggy address belongs to the physical page: [ 54.473692] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 54.474544] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.475482] page_type: f5(slab) [ 54.475968] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 54.476829] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 54.477800] page dumped because: kasan: bad access detected [ 54.478511] [ 54.478832] Memory state around the buggy address: [ 54.479455] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.480171] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.481086] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.481957] ^ [ 54.482636] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.483538] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.484441] ================================================================== [ 52.955000] ================================================================== [ 52.956070] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 52.956850] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.957731] [ 52.958276] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.959565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.960050] Hardware name: linux,dummy-virt (DT) [ 52.960633] Call trace: [ 52.961093] show_stack+0x20/0x38 (C) [ 52.961742] dump_stack_lvl+0x8c/0xd0 [ 52.962371] print_report+0x118/0x5e0 [ 52.962901] kasan_report+0xc8/0x118 [ 52.963641] kasan_check_range+0x100/0x1a8 [ 52.964225] __kasan_check_write+0x20/0x30 [ 52.964939] kasan_atomics_helper+0xa6c/0x4858 [ 52.965643] kasan_atomics+0x198/0x2e8 [ 52.966124] kunit_try_run_case+0x14c/0x3d0 [ 52.966918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.967695] kthread+0x24c/0x2d0 [ 52.968265] ret_from_fork+0x10/0x20 [ 52.968917] [ 52.969217] Allocated by task 254: [ 52.969865] kasan_save_stack+0x3c/0x68 [ 52.970447] kasan_save_track+0x20/0x40 [ 52.970970] kasan_save_alloc_info+0x40/0x58 [ 52.971713] __kasan_kmalloc+0xd4/0xd8 [ 52.972389] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.972960] kasan_atomics+0xb8/0x2e8 [ 52.973683] kunit_try_run_case+0x14c/0x3d0 [ 52.974346] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.975072] kthread+0x24c/0x2d0 [ 52.975586] ret_from_fork+0x10/0x20 [ 52.976083] [ 52.976420] The buggy address belongs to the object at fff00000c616b300 [ 52.976420] which belongs to the cache kmalloc-64 of size 64 [ 52.977876] The buggy address is located 0 bytes to the right of [ 52.977876] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.979239] [ 52.979658] The buggy address belongs to the physical page: [ 52.980396] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.981271] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.982041] page_type: f5(slab) [ 52.982559] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.983385] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.984383] page dumped because: kasan: bad access detected [ 52.985103] [ 52.985449] Memory state around the buggy address: [ 52.986041] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.986896] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.987750] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.988666] ^ [ 52.989227] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.990047] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.990952] ================================================================== [ 52.164836] ================================================================== [ 52.166203] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 52.166897] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.167850] [ 52.168138] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.169570] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.170081] Hardware name: linux,dummy-virt (DT) [ 52.171513] Call trace: [ 52.172111] show_stack+0x20/0x38 (C) [ 52.172818] dump_stack_lvl+0x8c/0xd0 [ 52.173407] print_report+0x118/0x5e0 [ 52.174252] kasan_report+0xc8/0x118 [ 52.174892] kasan_check_range+0x100/0x1a8 [ 52.175568] __kasan_check_read+0x20/0x30 [ 52.176238] kasan_atomics_helper+0x2b0/0x4858 [ 52.176948] kasan_atomics+0x198/0x2e8 [ 52.177795] kunit_try_run_case+0x14c/0x3d0 [ 52.178509] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.179341] kthread+0x24c/0x2d0 [ 52.179973] ret_from_fork+0x10/0x20 [ 52.180856] [ 52.181415] Allocated by task 254: [ 52.181934] kasan_save_stack+0x3c/0x68 [ 52.182510] kasan_save_track+0x20/0x40 [ 52.183234] kasan_save_alloc_info+0x40/0x58 [ 52.183770] __kasan_kmalloc+0xd4/0xd8 [ 52.184420] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.185096] kasan_atomics+0xb8/0x2e8 [ 52.185974] kunit_try_run_case+0x14c/0x3d0 [ 52.186667] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.187818] kthread+0x24c/0x2d0 [ 52.189061] ret_from_fork+0x10/0x20 [ 52.189669] [ 52.190177] The buggy address belongs to the object at fff00000c616b300 [ 52.190177] which belongs to the cache kmalloc-64 of size 64 [ 52.191880] The buggy address is located 0 bytes to the right of [ 52.191880] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.193823] [ 52.194122] The buggy address belongs to the physical page: [ 52.194968] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.196045] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.196873] page_type: f5(slab) [ 52.197500] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.198539] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.199771] page dumped because: kasan: bad access detected [ 52.200696] [ 52.201206] Memory state around the buggy address: [ 52.201776] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.202814] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.204127] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.204976] ^ [ 52.206054] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.207486] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.208750] ================================================================== [ 54.073584] ================================================================== [ 54.074220] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 54.075146] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 54.076353] [ 54.076799] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 54.078416] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.078898] Hardware name: linux,dummy-virt (DT) [ 54.079698] Call trace: [ 54.080264] show_stack+0x20/0x38 (C) [ 54.080923] dump_stack_lvl+0x8c/0xd0 [ 54.081558] print_report+0x118/0x5e0 [ 54.082181] kasan_report+0xc8/0x118 [ 54.082833] kasan_check_range+0x100/0x1a8 [ 54.083600] __kasan_check_write+0x20/0x30 [ 54.084346] kasan_atomics_helper+0x147c/0x4858 [ 54.085135] kasan_atomics+0x198/0x2e8 [ 54.085798] kunit_try_run_case+0x14c/0x3d0 [ 54.086513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.087314] kthread+0x24c/0x2d0 [ 54.087920] ret_from_fork+0x10/0x20 [ 54.088571] [ 54.089057] Allocated by task 254: [ 54.089603] kasan_save_stack+0x3c/0x68 [ 54.090189] kasan_save_track+0x20/0x40 [ 54.090865] kasan_save_alloc_info+0x40/0x58 [ 54.091636] __kasan_kmalloc+0xd4/0xd8 [ 54.092238] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.092910] kasan_atomics+0xb8/0x2e8 [ 54.093509] kunit_try_run_case+0x14c/0x3d0 [ 54.094221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.095117] kthread+0x24c/0x2d0 [ 54.095693] ret_from_fork+0x10/0x20 [ 54.096184] [ 54.096594] The buggy address belongs to the object at fff00000c616b300 [ 54.096594] which belongs to the cache kmalloc-64 of size 64 [ 54.097824] The buggy address is located 0 bytes to the right of [ 54.097824] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 54.099360] [ 54.099649] The buggy address belongs to the physical page: [ 54.100334] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 54.101288] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.102017] page_type: f5(slab) [ 54.102564] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 54.103546] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 54.104443] page dumped because: kasan: bad access detected [ 54.105150] [ 54.105507] Memory state around the buggy address: [ 54.106068] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.106968] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.107913] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.108821] ^ [ 54.109384] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.110258] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.111153] ================================================================== [ 53.793156] ================================================================== [ 53.794733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 53.795641] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.796445] [ 53.796868] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.797985] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.798959] Hardware name: linux,dummy-virt (DT) [ 53.799602] Call trace: [ 53.800010] show_stack+0x20/0x38 (C) [ 53.800886] dump_stack_lvl+0x8c/0xd0 [ 53.801487] print_report+0x118/0x5e0 [ 53.802009] kasan_report+0xc8/0x118 [ 53.802651] kasan_check_range+0x100/0x1a8 [ 53.803377] __kasan_check_write+0x20/0x30 [ 53.803970] kasan_atomics_helper+0x1190/0x4858 [ 53.804613] kasan_atomics+0x198/0x2e8 [ 53.805163] kunit_try_run_case+0x14c/0x3d0 [ 53.805819] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.806618] kthread+0x24c/0x2d0 [ 53.807262] ret_from_fork+0x10/0x20 [ 53.807867] [ 53.808245] Allocated by task 254: [ 53.808703] kasan_save_stack+0x3c/0x68 [ 53.809364] kasan_save_track+0x20/0x40 [ 53.809952] kasan_save_alloc_info+0x40/0x58 [ 53.810540] __kasan_kmalloc+0xd4/0xd8 [ 53.811153] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.811760] kasan_atomics+0xb8/0x2e8 [ 53.812313] kunit_try_run_case+0x14c/0x3d0 [ 53.812961] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.813601] kthread+0x24c/0x2d0 [ 53.814238] ret_from_fork+0x10/0x20 [ 53.814825] [ 53.815224] The buggy address belongs to the object at fff00000c616b300 [ 53.815224] which belongs to the cache kmalloc-64 of size 64 [ 53.816574] The buggy address is located 0 bytes to the right of [ 53.816574] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.817919] [ 53.818253] The buggy address belongs to the physical page: [ 53.818952] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.819903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.820633] page_type: f5(slab) [ 53.821194] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.822058] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.823050] page dumped because: kasan: bad access detected [ 53.823738] [ 53.824088] Memory state around the buggy address: [ 53.824743] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.826224] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.827081] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.827864] ^ [ 53.828800] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.829388] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.829943] ================================================================== [ 54.411076] ================================================================== [ 54.411988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 54.414065] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 54.415842] [ 54.416143] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 54.417540] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.418136] Hardware name: linux,dummy-virt (DT) [ 54.418754] Call trace: [ 54.419233] show_stack+0x20/0x38 (C) [ 54.420012] dump_stack_lvl+0x8c/0xd0 [ 54.420602] print_report+0x118/0x5e0 [ 54.421125] kasan_report+0xc8/0x118 [ 54.421756] kasan_check_range+0x100/0x1a8 [ 54.422365] __kasan_check_write+0x20/0x30 [ 54.423023] kasan_atomics_helper+0x175c/0x4858 [ 54.423773] kasan_atomics+0x198/0x2e8 [ 54.424355] kunit_try_run_case+0x14c/0x3d0 [ 54.424954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.425739] kthread+0x24c/0x2d0 [ 54.426397] ret_from_fork+0x10/0x20 [ 54.426974] [ 54.427356] Allocated by task 254: [ 54.427787] kasan_save_stack+0x3c/0x68 [ 54.428452] kasan_save_track+0x20/0x40 [ 54.428895] kasan_save_alloc_info+0x40/0x58 [ 54.429664] __kasan_kmalloc+0xd4/0xd8 [ 54.430213] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.430867] kasan_atomics+0xb8/0x2e8 [ 54.431420] kunit_try_run_case+0x14c/0x3d0 [ 54.431992] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.432697] kthread+0x24c/0x2d0 [ 54.433206] ret_from_fork+0x10/0x20 [ 54.433764] [ 54.434080] The buggy address belongs to the object at fff00000c616b300 [ 54.434080] which belongs to the cache kmalloc-64 of size 64 [ 54.435376] The buggy address is located 0 bytes to the right of [ 54.435376] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 54.436706] [ 54.437091] The buggy address belongs to the physical page: [ 54.437775] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 54.438814] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.439653] page_type: f5(slab) [ 54.440214] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 54.441120] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 54.441988] page dumped because: kasan: bad access detected [ 54.442721] [ 54.443054] Memory state around the buggy address: [ 54.443644] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.444557] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.445478] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.446321] ^ [ 54.446898] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.447814] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.448687] ================================================================== [ 52.408265] ================================================================== [ 52.409660] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 52.410394] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.411643] [ 52.412094] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.413537] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.414098] Hardware name: linux,dummy-virt (DT) [ 52.414786] Call trace: [ 52.415253] show_stack+0x20/0x38 (C) [ 52.415808] dump_stack_lvl+0x8c/0xd0 [ 52.416405] print_report+0x118/0x5e0 [ 52.416938] kasan_report+0xc8/0x118 [ 52.417489] kasan_check_range+0x100/0x1a8 [ 52.418121] __kasan_check_write+0x20/0x30 [ 52.418863] kasan_atomics_helper+0x47c/0x4858 [ 52.419426] kasan_atomics+0x198/0x2e8 [ 52.420086] kunit_try_run_case+0x14c/0x3d0 [ 52.420658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.421544] kthread+0x24c/0x2d0 [ 52.422104] ret_from_fork+0x10/0x20 [ 52.422764] [ 52.423114] Allocated by task 254: [ 52.423650] kasan_save_stack+0x3c/0x68 [ 52.424215] kasan_save_track+0x20/0x40 [ 52.424777] kasan_save_alloc_info+0x40/0x58 [ 52.425558] __kasan_kmalloc+0xd4/0xd8 [ 52.426061] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.426849] kasan_atomics+0xb8/0x2e8 [ 52.427371] kunit_try_run_case+0x14c/0x3d0 [ 52.428068] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.428802] kthread+0x24c/0x2d0 [ 52.429396] ret_from_fork+0x10/0x20 [ 52.429941] [ 52.430214] The buggy address belongs to the object at fff00000c616b300 [ 52.430214] which belongs to the cache kmalloc-64 of size 64 [ 52.431621] The buggy address is located 0 bytes to the right of [ 52.431621] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.433022] [ 52.433405] The buggy address belongs to the physical page: [ 52.434098] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.435014] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.435823] page_type: f5(slab) [ 52.436423] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.437412] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.438279] page dumped because: kasan: bad access detected [ 52.438938] [ 52.439273] Memory state around the buggy address: [ 52.439855] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.440788] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.441710] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.442613] ^ [ 52.443204] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.444099] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.445077] ================================================================== [ 52.878602] ================================================================== [ 52.880186] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 52.881081] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.882423] [ 52.882868] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.884137] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.884814] Hardware name: linux,dummy-virt (DT) [ 52.885387] Call trace: [ 52.885868] show_stack+0x20/0x38 (C) [ 52.886365] dump_stack_lvl+0x8c/0xd0 [ 52.887032] print_report+0x118/0x5e0 [ 52.887635] kasan_report+0xc8/0x118 [ 52.888163] kasan_check_range+0x100/0x1a8 [ 52.888887] __kasan_check_write+0x20/0x30 [ 52.889545] kasan_atomics_helper+0x99c/0x4858 [ 52.890328] kasan_atomics+0x198/0x2e8 [ 52.890855] kunit_try_run_case+0x14c/0x3d0 [ 52.891587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.892311] kthread+0x24c/0x2d0 [ 52.892948] ret_from_fork+0x10/0x20 [ 52.893468] [ 52.893823] Allocated by task 254: [ 52.894352] kasan_save_stack+0x3c/0x68 [ 52.894953] kasan_save_track+0x20/0x40 [ 52.895473] kasan_save_alloc_info+0x40/0x58 [ 52.896156] __kasan_kmalloc+0xd4/0xd8 [ 52.896745] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.897374] kasan_atomics+0xb8/0x2e8 [ 52.897871] kunit_try_run_case+0x14c/0x3d0 [ 52.898440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.899092] kthread+0x24c/0x2d0 [ 52.899731] ret_from_fork+0x10/0x20 [ 52.900183] [ 52.900614] The buggy address belongs to the object at fff00000c616b300 [ 52.900614] which belongs to the cache kmalloc-64 of size 64 [ 52.902044] The buggy address is located 0 bytes to the right of [ 52.902044] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.903415] [ 52.903790] The buggy address belongs to the physical page: [ 52.904484] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.905500] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.906196] page_type: f5(slab) [ 52.906810] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.907850] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.908642] page dumped because: kasan: bad access detected [ 52.909371] [ 52.909731] Memory state around the buggy address: [ 52.910326] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.911567] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.912484] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.913319] ^ [ 52.913889] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.914987] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.915780] ================================================================== [ 53.411482] ================================================================== [ 53.412668] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 53.413774] Read of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.414611] [ 53.415104] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.416349] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.416862] Hardware name: linux,dummy-virt (DT) [ 53.417557] Call trace: [ 53.417911] show_stack+0x20/0x38 (C) [ 53.418628] dump_stack_lvl+0x8c/0xd0 [ 53.419158] print_report+0x118/0x5e0 [ 53.419752] kasan_report+0xc8/0x118 [ 53.420331] __asan_report_load8_noabort+0x20/0x30 [ 53.421004] kasan_atomics_helper+0x3f58/0x4858 [ 53.421677] kasan_atomics+0x198/0x2e8 [ 53.422211] kunit_try_run_case+0x14c/0x3d0 [ 53.422851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.423621] kthread+0x24c/0x2d0 [ 53.424136] ret_from_fork+0x10/0x20 [ 53.424731] [ 53.425104] Allocated by task 254: [ 53.425664] kasan_save_stack+0x3c/0x68 [ 53.426149] kasan_save_track+0x20/0x40 [ 53.426831] kasan_save_alloc_info+0x40/0x58 [ 53.427445] __kasan_kmalloc+0xd4/0xd8 [ 53.427926] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.428657] kasan_atomics+0xb8/0x2e8 [ 53.429190] kunit_try_run_case+0x14c/0x3d0 [ 53.429805] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.430623] kthread+0x24c/0x2d0 [ 53.431124] ret_from_fork+0x10/0x20 [ 53.431611] [ 53.432028] The buggy address belongs to the object at fff00000c616b300 [ 53.432028] which belongs to the cache kmalloc-64 of size 64 [ 53.433332] The buggy address is located 0 bytes to the right of [ 53.433332] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.434703] [ 53.435014] The buggy address belongs to the physical page: [ 53.435590] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.436671] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.437427] page_type: f5(slab) [ 53.437960] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.438938] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.439871] page dumped because: kasan: bad access detected [ 53.440569] [ 53.441080] Memory state around the buggy address: [ 53.441782] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.442699] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.443524] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.444436] ^ [ 53.445209] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.446164] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.447048] ================================================================== [ 52.840920] ================================================================== [ 52.841731] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 52.842703] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.843548] [ 52.843968] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.845355] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.845913] Hardware name: linux,dummy-virt (DT) [ 52.846519] Call trace: [ 52.846945] show_stack+0x20/0x38 (C) [ 52.847611] dump_stack_lvl+0x8c/0xd0 [ 52.848128] print_report+0x118/0x5e0 [ 52.848778] kasan_report+0xc8/0x118 [ 52.849277] kasan_check_range+0x100/0x1a8 [ 52.849978] __kasan_check_write+0x20/0x30 [ 52.850647] kasan_atomics_helper+0x934/0x4858 [ 52.851353] kasan_atomics+0x198/0x2e8 [ 52.851915] kunit_try_run_case+0x14c/0x3d0 [ 52.852581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.853250] kthread+0x24c/0x2d0 [ 52.853883] ret_from_fork+0x10/0x20 [ 52.854506] [ 52.854845] Allocated by task 254: [ 52.855390] kasan_save_stack+0x3c/0x68 [ 52.855918] kasan_save_track+0x20/0x40 [ 52.856493] kasan_save_alloc_info+0x40/0x58 [ 52.857159] __kasan_kmalloc+0xd4/0xd8 [ 52.857693] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.858371] kasan_atomics+0xb8/0x2e8 [ 52.858916] kunit_try_run_case+0x14c/0x3d0 [ 52.859459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.860232] kthread+0x24c/0x2d0 [ 52.860885] ret_from_fork+0x10/0x20 [ 52.861458] [ 52.861790] The buggy address belongs to the object at fff00000c616b300 [ 52.861790] which belongs to the cache kmalloc-64 of size 64 [ 52.863172] The buggy address is located 0 bytes to the right of [ 52.863172] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.864537] [ 52.864860] The buggy address belongs to the physical page: [ 52.865557] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.866585] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.867488] page_type: f5(slab) [ 52.867934] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.869119] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.869892] page dumped because: kasan: bad access detected [ 52.870565] [ 52.871003] Memory state around the buggy address: [ 52.871730] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.872773] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.873648] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.874489] ^ [ 52.875167] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.876058] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.876894] ================================================================== [ 52.255354] ================================================================== [ 52.256117] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 52.257493] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.258245] [ 52.258753] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.259994] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.260567] Hardware name: linux,dummy-virt (DT) [ 52.261238] Call trace: [ 52.261622] show_stack+0x20/0x38 (C) [ 52.262278] dump_stack_lvl+0x8c/0xd0 [ 52.262881] print_report+0x118/0x5e0 [ 52.263643] kasan_report+0xc8/0x118 [ 52.264218] kasan_check_range+0x100/0x1a8 [ 52.264933] __kasan_check_write+0x20/0x30 [ 52.265594] kasan_atomics_helper+0x32c/0x4858 [ 52.266113] kasan_atomics+0x198/0x2e8 [ 52.266856] kunit_try_run_case+0x14c/0x3d0 [ 52.267546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.268355] kthread+0x24c/0x2d0 [ 52.268931] ret_from_fork+0x10/0x20 [ 52.269509] [ 52.269841] Allocated by task 254: [ 52.270385] kasan_save_stack+0x3c/0x68 [ 52.270853] kasan_save_track+0x20/0x40 [ 52.271519] kasan_save_alloc_info+0x40/0x58 [ 52.272036] __kasan_kmalloc+0xd4/0xd8 [ 52.272757] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.273422] kasan_atomics+0xb8/0x2e8 [ 52.274013] kunit_try_run_case+0x14c/0x3d0 [ 52.274602] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.275413] kthread+0x24c/0x2d0 [ 52.275915] ret_from_fork+0x10/0x20 [ 52.276535] [ 52.276851] The buggy address belongs to the object at fff00000c616b300 [ 52.276851] which belongs to the cache kmalloc-64 of size 64 [ 52.278224] The buggy address is located 0 bytes to the right of [ 52.278224] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.279750] [ 52.280045] The buggy address belongs to the physical page: [ 52.280838] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.281815] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.282586] page_type: f5(slab) [ 52.283188] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.284029] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.285012] page dumped because: kasan: bad access detected [ 52.285696] [ 52.286050] Memory state around the buggy address: [ 52.286654] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.287646] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.288500] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.289345] ^ [ 52.290074] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.290891] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.291721] ================================================================== [ 53.179959] ================================================================== [ 53.180653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 53.181824] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.182718] [ 53.183023] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.184158] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.184768] Hardware name: linux,dummy-virt (DT) [ 53.185505] Call trace: [ 53.185994] show_stack+0x20/0x38 (C) [ 53.186597] dump_stack_lvl+0x8c/0xd0 [ 53.187240] print_report+0x118/0x5e0 [ 53.187776] kasan_report+0xc8/0x118 [ 53.188310] __asan_report_load4_noabort+0x20/0x30 [ 53.188894] kasan_atomics_helper+0x3de4/0x4858 [ 53.189652] kasan_atomics+0x198/0x2e8 [ 53.190187] kunit_try_run_case+0x14c/0x3d0 [ 53.191121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.191818] kthread+0x24c/0x2d0 [ 53.192360] ret_from_fork+0x10/0x20 [ 53.192975] [ 53.193356] Allocated by task 254: [ 53.193758] kasan_save_stack+0x3c/0x68 [ 53.194468] kasan_save_track+0x20/0x40 [ 53.195020] kasan_save_alloc_info+0x40/0x58 [ 53.195658] __kasan_kmalloc+0xd4/0xd8 [ 53.196147] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.196868] kasan_atomics+0xb8/0x2e8 [ 53.197367] kunit_try_run_case+0x14c/0x3d0 [ 53.198099] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.198707] kthread+0x24c/0x2d0 [ 53.199340] ret_from_fork+0x10/0x20 [ 53.199891] [ 53.200322] The buggy address belongs to the object at fff00000c616b300 [ 53.200322] which belongs to the cache kmalloc-64 of size 64 [ 53.201715] The buggy address is located 0 bytes to the right of [ 53.201715] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.203135] [ 53.203490] The buggy address belongs to the physical page: [ 53.204215] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.205129] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.205855] page_type: f5(slab) [ 53.206410] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.207368] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.208283] page dumped because: kasan: bad access detected [ 53.209051] [ 53.209348] Memory state around the buggy address: [ 53.210015] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.210836] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.211648] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.212573] ^ [ 53.213165] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.214111] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.214966] ================================================================== [ 52.760897] ================================================================== [ 52.761800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 52.763094] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.764183] [ 52.764633] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.766269] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.766861] Hardware name: linux,dummy-virt (DT) [ 52.767518] Call trace: [ 52.768035] show_stack+0x20/0x38 (C) [ 52.768677] dump_stack_lvl+0x8c/0xd0 [ 52.769349] print_report+0x118/0x5e0 [ 52.769994] kasan_report+0xc8/0x118 [ 52.770622] kasan_check_range+0x100/0x1a8 [ 52.771309] __kasan_check_write+0x20/0x30 [ 52.771969] kasan_atomics_helper+0x894/0x4858 [ 52.772655] kasan_atomics+0x198/0x2e8 [ 52.773255] kunit_try_run_case+0x14c/0x3d0 [ 52.773956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.774777] kthread+0x24c/0x2d0 [ 52.775481] ret_from_fork+0x10/0x20 [ 52.776117] [ 52.776444] Allocated by task 254: [ 52.777065] kasan_save_stack+0x3c/0x68 [ 52.777664] kasan_save_track+0x20/0x40 [ 52.778402] kasan_save_alloc_info+0x40/0x58 [ 52.779078] __kasan_kmalloc+0xd4/0xd8 [ 52.779908] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.780330] kasan_atomics+0xb8/0x2e8 [ 52.780680] kunit_try_run_case+0x14c/0x3d0 [ 52.781062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.781528] kthread+0x24c/0x2d0 [ 52.781895] ret_from_fork+0x10/0x20 [ 52.782249] [ 52.783339] The buggy address belongs to the object at fff00000c616b300 [ 52.783339] which belongs to the cache kmalloc-64 of size 64 [ 52.786337] The buggy address is located 0 bytes to the right of [ 52.786337] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.787911] [ 52.788239] The buggy address belongs to the physical page: [ 52.788980] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.789831] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.790657] page_type: f5(slab) [ 52.791117] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.792101] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.793089] page dumped because: kasan: bad access detected [ 52.793775] [ 52.794085] Memory state around the buggy address: [ 52.794711] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.795619] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.796547] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.797333] ^ [ 52.797995] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.798838] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.799713] ================================================================== [ 53.914681] ================================================================== [ 53.915772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 53.916771] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.917528] [ 53.917903] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.919138] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.919710] Hardware name: linux,dummy-virt (DT) [ 53.920275] Call trace: [ 53.921171] show_stack+0x20/0x38 (C) [ 53.921736] dump_stack_lvl+0x8c/0xd0 [ 53.922429] print_report+0x118/0x5e0 [ 53.922971] kasan_report+0xc8/0x118 [ 53.923542] kasan_check_range+0x100/0x1a8 [ 53.924216] __kasan_check_write+0x20/0x30 [ 53.924863] kasan_atomics_helper+0x12d8/0x4858 [ 53.925529] kasan_atomics+0x198/0x2e8 [ 53.926111] kunit_try_run_case+0x14c/0x3d0 [ 53.926748] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.927547] kthread+0x24c/0x2d0 [ 53.928117] ret_from_fork+0x10/0x20 [ 53.928618] [ 53.928975] Allocated by task 254: [ 53.929630] kasan_save_stack+0x3c/0x68 [ 53.930164] kasan_save_track+0x20/0x40 [ 53.930727] kasan_save_alloc_info+0x40/0x58 [ 53.931425] __kasan_kmalloc+0xd4/0xd8 [ 53.931967] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.932593] kasan_atomics+0xb8/0x2e8 [ 53.933105] kunit_try_run_case+0x14c/0x3d0 [ 53.933772] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.934475] kthread+0x24c/0x2d0 [ 53.934954] ret_from_fork+0x10/0x20 [ 53.935628] [ 53.935986] The buggy address belongs to the object at fff00000c616b300 [ 53.935986] which belongs to the cache kmalloc-64 of size 64 [ 53.937371] The buggy address is located 0 bytes to the right of [ 53.937371] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.938841] [ 53.939177] The buggy address belongs to the physical page: [ 53.939883] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.940792] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.941703] page_type: f5(slab) [ 53.942170] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.943200] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.944182] page dumped because: kasan: bad access detected [ 53.944844] [ 53.945163] Memory state around the buggy address: [ 53.945761] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.946662] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.947549] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.948496] ^ [ 53.949073] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.949951] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.950840] ================================================================== [ 54.149963] ================================================================== [ 54.150741] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 54.151714] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 54.152777] [ 54.153105] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 54.154282] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.154913] Hardware name: linux,dummy-virt (DT) [ 54.155543] Call trace: [ 54.155970] show_stack+0x20/0x38 (C) [ 54.156493] dump_stack_lvl+0x8c/0xd0 [ 54.157154] print_report+0x118/0x5e0 [ 54.157728] kasan_report+0xc8/0x118 [ 54.158428] kasan_check_range+0x100/0x1a8 [ 54.159061] __kasan_check_write+0x20/0x30 [ 54.159763] kasan_atomics_helper+0x154c/0x4858 [ 54.160502] kasan_atomics+0x198/0x2e8 [ 54.161187] kunit_try_run_case+0x14c/0x3d0 [ 54.161760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.162567] kthread+0x24c/0x2d0 [ 54.163129] ret_from_fork+0x10/0x20 [ 54.163668] [ 54.164054] Allocated by task 254: [ 54.164587] kasan_save_stack+0x3c/0x68 [ 54.165110] kasan_save_track+0x20/0x40 [ 54.165697] kasan_save_alloc_info+0x40/0x58 [ 54.166419] __kasan_kmalloc+0xd4/0xd8 [ 54.166972] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.167748] kasan_atomics+0xb8/0x2e8 [ 54.168268] kunit_try_run_case+0x14c/0x3d0 [ 54.168950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.169648] kthread+0x24c/0x2d0 [ 54.170166] ret_from_fork+0x10/0x20 [ 54.170702] [ 54.171021] The buggy address belongs to the object at fff00000c616b300 [ 54.171021] which belongs to the cache kmalloc-64 of size 64 [ 54.172390] The buggy address is located 0 bytes to the right of [ 54.172390] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 54.173668] [ 54.174105] The buggy address belongs to the physical page: [ 54.174908] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 54.175826] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.176648] page_type: f5(slab) [ 54.177213] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 54.178126] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 54.179030] page dumped because: kasan: bad access detected [ 54.179694] [ 54.180028] Memory state around the buggy address: [ 54.180651] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.181500] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.182420] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.183231] ^ [ 54.183813] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.184678] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.185609] ================================================================== [ 52.446565] ================================================================== [ 52.447283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 52.448609] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.449876] [ 52.450215] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.451388] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.452019] Hardware name: linux,dummy-virt (DT) [ 52.452590] Call trace: [ 52.453038] show_stack+0x20/0x38 (C) [ 52.453621] dump_stack_lvl+0x8c/0xd0 [ 52.454176] print_report+0x118/0x5e0 [ 52.454816] kasan_report+0xc8/0x118 [ 52.455373] kasan_check_range+0x100/0x1a8 [ 52.456077] __kasan_check_write+0x20/0x30 [ 52.456714] kasan_atomics_helper+0x4e4/0x4858 [ 52.457539] kasan_atomics+0x198/0x2e8 [ 52.458204] kunit_try_run_case+0x14c/0x3d0 [ 52.458912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.459632] kthread+0x24c/0x2d0 [ 52.460186] ret_from_fork+0x10/0x20 [ 52.460896] [ 52.461204] Allocated by task 254: [ 52.461898] kasan_save_stack+0x3c/0x68 [ 52.462544] kasan_save_track+0x20/0x40 [ 52.463138] kasan_save_alloc_info+0x40/0x58 [ 52.463746] __kasan_kmalloc+0xd4/0xd8 [ 52.464445] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.465029] kasan_atomics+0xb8/0x2e8 [ 52.465704] kunit_try_run_case+0x14c/0x3d0 [ 52.466252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.467088] kthread+0x24c/0x2d0 [ 52.467650] ret_from_fork+0x10/0x20 [ 52.468151] [ 52.468547] The buggy address belongs to the object at fff00000c616b300 [ 52.468547] which belongs to the cache kmalloc-64 of size 64 [ 52.469835] The buggy address is located 0 bytes to the right of [ 52.469835] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.471316] [ 52.471610] The buggy address belongs to the physical page: [ 52.472309] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.473238] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.474051] page_type: f5(slab) [ 52.474621] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.475492] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.476541] page dumped because: kasan: bad access detected [ 52.477209] [ 52.477578] Memory state around the buggy address: [ 52.478208] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.479114] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.480080] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.480968] ^ [ 52.481614] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.482521] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.483428] ================================================================== [ 53.298429] ================================================================== [ 53.299208] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 53.300162] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.300886] [ 53.301594] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.302958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.303470] Hardware name: linux,dummy-virt (DT) [ 53.304189] Call trace: [ 53.304589] show_stack+0x20/0x38 (C) [ 53.305112] dump_stack_lvl+0x8c/0xd0 [ 53.305839] print_report+0x118/0x5e0 [ 53.306406] kasan_report+0xc8/0x118 [ 53.306983] kasan_check_range+0x100/0x1a8 [ 53.307604] __kasan_check_write+0x20/0x30 [ 53.308223] kasan_atomics_helper+0xd3c/0x4858 [ 53.308935] kasan_atomics+0x198/0x2e8 [ 53.309557] kunit_try_run_case+0x14c/0x3d0 [ 53.310143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.311003] kthread+0x24c/0x2d0 [ 53.311567] ret_from_fork+0x10/0x20 [ 53.312127] [ 53.312438] Allocated by task 254: [ 53.312992] kasan_save_stack+0x3c/0x68 [ 53.313647] kasan_save_track+0x20/0x40 [ 53.314228] kasan_save_alloc_info+0x40/0x58 [ 53.314845] __kasan_kmalloc+0xd4/0xd8 [ 53.315427] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.316039] kasan_atomics+0xb8/0x2e8 [ 53.316792] kunit_try_run_case+0x14c/0x3d0 [ 53.317457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.318213] kthread+0x24c/0x2d0 [ 53.318796] ret_from_fork+0x10/0x20 [ 53.319520] [ 53.319815] The buggy address belongs to the object at fff00000c616b300 [ 53.319815] which belongs to the cache kmalloc-64 of size 64 [ 53.320939] The buggy address is located 0 bytes to the right of [ 53.320939] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.322143] [ 53.322582] The buggy address belongs to the physical page: [ 53.323069] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.324276] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.324851] page_type: f5(slab) [ 53.325218] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.326013] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.326962] page dumped because: kasan: bad access detected [ 53.328030] [ 53.328375] Memory state around the buggy address: [ 53.329335] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.330169] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.330989] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.332202] ^ [ 53.333141] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.334083] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.334967] ================================================================== [ 52.370633] ================================================================== [ 52.371357] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 52.372480] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.373489] [ 52.373826] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.375181] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.375852] Hardware name: linux,dummy-virt (DT) [ 52.376469] Call trace: [ 52.376968] show_stack+0x20/0x38 (C) [ 52.377540] dump_stack_lvl+0x8c/0xd0 [ 52.378268] print_report+0x118/0x5e0 [ 52.378871] kasan_report+0xc8/0x118 [ 52.379521] kasan_check_range+0x100/0x1a8 [ 52.380276] __kasan_check_write+0x20/0x30 [ 52.380904] kasan_atomics_helper+0x414/0x4858 [ 52.381592] kasan_atomics+0x198/0x2e8 [ 52.382235] kunit_try_run_case+0x14c/0x3d0 [ 52.382883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.383584] kthread+0x24c/0x2d0 [ 52.384211] ret_from_fork+0x10/0x20 [ 52.384781] [ 52.385083] Allocated by task 254: [ 52.385667] kasan_save_stack+0x3c/0x68 [ 52.386277] kasan_save_track+0x20/0x40 [ 52.386798] kasan_save_alloc_info+0x40/0x58 [ 52.387501] __kasan_kmalloc+0xd4/0xd8 [ 52.388038] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.388643] kasan_atomics+0xb8/0x2e8 [ 52.389239] kunit_try_run_case+0x14c/0x3d0 [ 52.389853] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.390499] kthread+0x24c/0x2d0 [ 52.391135] ret_from_fork+0x10/0x20 [ 52.391673] [ 52.391996] The buggy address belongs to the object at fff00000c616b300 [ 52.391996] which belongs to the cache kmalloc-64 of size 64 [ 52.393287] The buggy address is located 0 bytes to the right of [ 52.393287] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.394792] [ 52.395110] The buggy address belongs to the physical page: [ 52.395806] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.396707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.397608] page_type: f5(slab) [ 52.398094] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.399154] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.400021] page dumped because: kasan: bad access detected [ 52.400686] [ 52.400995] Memory state around the buggy address: [ 52.401629] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.402448] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.403349] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.404174] ^ [ 52.404772] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.405677] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.406521] ================================================================== [ 53.448829] ================================================================== [ 53.449743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 53.451547] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.453257] [ 53.453680] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.454943] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.455556] Hardware name: linux,dummy-virt (DT) [ 53.456199] Call trace: [ 53.456881] show_stack+0x20/0x38 (C) [ 53.457502] dump_stack_lvl+0x8c/0xd0 [ 53.458216] print_report+0x118/0x5e0 [ 53.458910] kasan_report+0xc8/0x118 [ 53.459609] kasan_check_range+0x100/0x1a8 [ 53.460261] __kasan_check_write+0x20/0x30 [ 53.460928] kasan_atomics_helper+0xe44/0x4858 [ 53.461635] kasan_atomics+0x198/0x2e8 [ 53.462248] kunit_try_run_case+0x14c/0x3d0 [ 53.462945] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.463751] kthread+0x24c/0x2d0 [ 53.464379] ret_from_fork+0x10/0x20 [ 53.465043] [ 53.465444] Allocated by task 254: [ 53.465977] kasan_save_stack+0x3c/0x68 [ 53.466720] kasan_save_track+0x20/0x40 [ 53.467344] kasan_save_alloc_info+0x40/0x58 [ 53.467980] __kasan_kmalloc+0xd4/0xd8 [ 53.468702] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.469425] kasan_atomics+0xb8/0x2e8 [ 53.470034] kunit_try_run_case+0x14c/0x3d0 [ 53.470735] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.471597] kthread+0x24c/0x2d0 [ 53.472175] ret_from_fork+0x10/0x20 [ 53.472761] [ 53.473145] The buggy address belongs to the object at fff00000c616b300 [ 53.473145] which belongs to the cache kmalloc-64 of size 64 [ 53.474645] The buggy address is located 0 bytes to the right of [ 53.474645] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.476155] [ 53.476596] The buggy address belongs to the physical page: [ 53.477384] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.478395] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.479360] page_type: f5(slab) [ 53.479968] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.480957] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.481854] page dumped because: kasan: bad access detected [ 53.482607] [ 53.482947] Memory state around the buggy address: [ 53.483678] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.484698] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.485685] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.486718] ^ [ 53.487500] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.488289] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.489331] ================================================================== [ 53.602719] ================================================================== [ 53.603691] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 53.604645] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.605446] [ 53.605841] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.607123] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.607710] Hardware name: linux,dummy-virt (DT) [ 53.608366] Call trace: [ 53.608715] show_stack+0x20/0x38 (C) [ 53.609318] dump_stack_lvl+0x8c/0xd0 [ 53.610021] print_report+0x118/0x5e0 [ 53.610661] kasan_report+0xc8/0x118 [ 53.611165] kasan_check_range+0x100/0x1a8 [ 53.611931] __kasan_check_write+0x20/0x30 [ 53.612482] kasan_atomics_helper+0xf88/0x4858 [ 53.613346] kasan_atomics+0x198/0x2e8 [ 53.613821] kunit_try_run_case+0x14c/0x3d0 [ 53.614629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.615394] kthread+0x24c/0x2d0 [ 53.616029] ret_from_fork+0x10/0x20 [ 53.616567] [ 53.616949] Allocated by task 254: [ 53.617527] kasan_save_stack+0x3c/0x68 [ 53.618132] kasan_save_track+0x20/0x40 [ 53.618712] kasan_save_alloc_info+0x40/0x58 [ 53.619196] __kasan_kmalloc+0xd4/0xd8 [ 53.619846] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.620410] kasan_atomics+0xb8/0x2e8 [ 53.621024] kunit_try_run_case+0x14c/0x3d0 [ 53.621578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.622374] kthread+0x24c/0x2d0 [ 53.622935] ret_from_fork+0x10/0x20 [ 53.623408] [ 53.623856] The buggy address belongs to the object at fff00000c616b300 [ 53.623856] which belongs to the cache kmalloc-64 of size 64 [ 53.625376] The buggy address is located 0 bytes to the right of [ 53.625376] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.626786] [ 53.627064] The buggy address belongs to the physical page: [ 53.627703] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.628645] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.629549] page_type: f5(slab) [ 53.630026] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.630954] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.631845] page dumped because: kasan: bad access detected [ 53.632604] [ 53.632954] Memory state around the buggy address: [ 53.633621] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.634463] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.635364] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.636198] ^ [ 53.636776] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.637675] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.638634] ================================================================== [ 52.522426] ================================================================== [ 52.523536] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 52.524533] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.525542] [ 52.525955] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.527046] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.527373] Hardware name: linux,dummy-virt (DT) [ 52.528061] Call trace: [ 52.528660] show_stack+0x20/0x38 (C) [ 52.529205] dump_stack_lvl+0x8c/0xd0 [ 52.529842] print_report+0x118/0x5e0 [ 52.530480] kasan_report+0xc8/0x118 [ 52.531121] kasan_check_range+0x100/0x1a8 [ 52.531771] __kasan_check_write+0x20/0x30 [ 52.532520] kasan_atomics_helper+0x5b4/0x4858 [ 52.533262] kasan_atomics+0x198/0x2e8 [ 52.533914] kunit_try_run_case+0x14c/0x3d0 [ 52.534625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.535505] kthread+0x24c/0x2d0 [ 52.536136] ret_from_fork+0x10/0x20 [ 52.536760] [ 52.537088] Allocated by task 254: [ 52.537715] kasan_save_stack+0x3c/0x68 [ 52.538434] kasan_save_track+0x20/0x40 [ 52.539057] kasan_save_alloc_info+0x40/0x58 [ 52.539735] __kasan_kmalloc+0xd4/0xd8 [ 52.540360] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.541030] kasan_atomics+0xb8/0x2e8 [ 52.541657] kunit_try_run_case+0x14c/0x3d0 [ 52.542384] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.543157] kthread+0x24c/0x2d0 [ 52.543743] ret_from_fork+0x10/0x20 [ 52.544379] [ 52.544856] The buggy address belongs to the object at fff00000c616b300 [ 52.544856] which belongs to the cache kmalloc-64 of size 64 [ 52.546264] The buggy address is located 0 bytes to the right of [ 52.546264] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.547896] [ 52.548185] The buggy address belongs to the physical page: [ 52.548954] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.550020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.550882] page_type: f5(slab) [ 52.551430] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.552470] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.553435] page dumped because: kasan: bad access detected [ 52.554153] [ 52.554488] Memory state around the buggy address: [ 52.555205] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.556165] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.557051] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.557905] ^ [ 52.558570] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.559492] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.560424] ================================================================== [ 53.834230] ================================================================== [ 53.836904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 53.839170] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.841667] [ 53.841979] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.843130] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.843710] Hardware name: linux,dummy-virt (DT) [ 53.844289] Call trace: [ 53.844690] show_stack+0x20/0x38 (C) [ 53.845336] dump_stack_lvl+0x8c/0xd0 [ 53.845906] print_report+0x118/0x5e0 [ 53.846481] kasan_report+0xc8/0x118 [ 53.847019] kasan_check_range+0x100/0x1a8 [ 53.847582] __kasan_check_write+0x20/0x30 [ 53.848352] kasan_atomics_helper+0x11f8/0x4858 [ 53.849004] kasan_atomics+0x198/0x2e8 [ 53.849704] kunit_try_run_case+0x14c/0x3d0 [ 53.850338] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.851241] kthread+0x24c/0x2d0 [ 53.851926] ret_from_fork+0x10/0x20 [ 53.852480] [ 53.852776] Allocated by task 254: [ 53.853236] kasan_save_stack+0x3c/0x68 [ 53.853853] kasan_save_track+0x20/0x40 [ 53.854343] kasan_save_alloc_info+0x40/0x58 [ 53.854983] __kasan_kmalloc+0xd4/0xd8 [ 53.855689] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.856195] kasan_atomics+0xb8/0x2e8 [ 53.856834] kunit_try_run_case+0x14c/0x3d0 [ 53.857503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.858181] kthread+0x24c/0x2d0 [ 53.858744] ret_from_fork+0x10/0x20 [ 53.859263] [ 53.859579] The buggy address belongs to the object at fff00000c616b300 [ 53.859579] which belongs to the cache kmalloc-64 of size 64 [ 53.861061] The buggy address is located 0 bytes to the right of [ 53.861061] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.862476] [ 53.862792] The buggy address belongs to the physical page: [ 53.863485] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.864371] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.865225] page_type: f5(slab) [ 53.865666] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.866604] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.867536] page dumped because: kasan: bad access detected [ 53.868220] [ 53.868601] Memory state around the buggy address: [ 53.869265] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.870099] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.870920] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.871840] ^ [ 53.872593] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.873392] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.874279] ================================================================== [ 53.952560] ================================================================== [ 53.953249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 53.954003] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.955075] [ 53.955472] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.956565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.957337] Hardware name: linux,dummy-virt (DT) [ 53.957929] Call trace: [ 53.958357] show_stack+0x20/0x38 (C) [ 53.959031] dump_stack_lvl+0x8c/0xd0 [ 53.959687] print_report+0x118/0x5e0 [ 53.960401] kasan_report+0xc8/0x118 [ 53.961120] kasan_check_range+0x100/0x1a8 [ 53.961857] __kasan_check_write+0x20/0x30 [ 53.962619] kasan_atomics_helper+0x1384/0x4858 [ 53.963504] kasan_atomics+0x198/0x2e8 [ 53.964114] kunit_try_run_case+0x14c/0x3d0 [ 53.964772] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.965553] kthread+0x24c/0x2d0 [ 53.966233] ret_from_fork+0x10/0x20 [ 53.966958] [ 53.967320] Allocated by task 254: [ 53.967929] kasan_save_stack+0x3c/0x68 [ 53.968656] kasan_save_track+0x20/0x40 [ 53.969353] kasan_save_alloc_info+0x40/0x58 [ 53.970004] __kasan_kmalloc+0xd4/0xd8 [ 53.970646] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.971309] kasan_atomics+0xb8/0x2e8 [ 53.971994] kunit_try_run_case+0x14c/0x3d0 [ 53.972690] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.973468] kthread+0x24c/0x2d0 [ 53.974051] ret_from_fork+0x10/0x20 [ 53.974681] [ 53.975024] The buggy address belongs to the object at fff00000c616b300 [ 53.975024] which belongs to the cache kmalloc-64 of size 64 [ 53.976538] The buggy address is located 0 bytes to the right of [ 53.976538] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.978100] [ 53.978508] The buggy address belongs to the physical page: [ 53.979362] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.980368] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.981321] page_type: f5(slab) [ 53.981877] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.982879] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.983891] page dumped because: kasan: bad access detected [ 53.984631] [ 53.984969] Memory state around the buggy address: [ 53.985692] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.986711] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.987618] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.988523] ^ [ 53.989323] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.990255] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.991238] ================================================================== [ 52.721398] ================================================================== [ 52.722012] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 52.722971] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.723807] [ 52.724142] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.725574] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.726179] Hardware name: linux,dummy-virt (DT) [ 52.726857] Call trace: [ 52.727248] show_stack+0x20/0x38 (C) [ 52.727941] dump_stack_lvl+0x8c/0xd0 [ 52.728591] print_report+0x118/0x5e0 [ 52.729251] kasan_report+0xc8/0x118 [ 52.729893] kasan_check_range+0x100/0x1a8 [ 52.730598] __kasan_check_write+0x20/0x30 [ 52.731251] kasan_atomics_helper+0x7cc/0x4858 [ 52.731950] kasan_atomics+0x198/0x2e8 [ 52.732589] kunit_try_run_case+0x14c/0x3d0 [ 52.733272] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.734145] kthread+0x24c/0x2d0 [ 52.734827] ret_from_fork+0x10/0x20 [ 52.735522] [ 52.735932] Allocated by task 254: [ 52.736540] kasan_save_stack+0x3c/0x68 [ 52.737239] kasan_save_track+0x20/0x40 [ 52.737857] kasan_save_alloc_info+0x40/0x58 [ 52.738620] __kasan_kmalloc+0xd4/0xd8 [ 52.739210] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.739903] kasan_atomics+0xb8/0x2e8 [ 52.740495] kunit_try_run_case+0x14c/0x3d0 [ 52.741083] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.741822] kthread+0x24c/0x2d0 [ 52.742487] ret_from_fork+0x10/0x20 [ 52.743272] [ 52.743664] The buggy address belongs to the object at fff00000c616b300 [ 52.743664] which belongs to the cache kmalloc-64 of size 64 [ 52.745066] The buggy address is located 0 bytes to the right of [ 52.745066] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.746548] [ 52.747006] The buggy address belongs to the physical page: [ 52.747783] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.748771] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.749608] page_type: f5(slab) [ 52.750263] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.751236] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.752165] page dumped because: kasan: bad access detected [ 52.752888] [ 52.753245] Memory state around the buggy address: [ 52.753998] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.754890] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.755810] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.756680] ^ [ 52.757409] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.758280] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.759143] ================================================================== [ 52.562092] ================================================================== [ 52.562737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 52.563803] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.564611] [ 52.564994] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.566207] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.566839] Hardware name: linux,dummy-virt (DT) [ 52.567520] Call trace: [ 52.568029] show_stack+0x20/0x38 (C) [ 52.568539] dump_stack_lvl+0x8c/0xd0 [ 52.569184] print_report+0x118/0x5e0 [ 52.569827] kasan_report+0xc8/0x118 [ 52.570355] kasan_check_range+0x100/0x1a8 [ 52.571002] __kasan_check_write+0x20/0x30 [ 52.571664] kasan_atomics_helper+0x61c/0x4858 [ 52.572218] kasan_atomics+0x198/0x2e8 [ 52.572924] kunit_try_run_case+0x14c/0x3d0 [ 52.573557] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.574241] kthread+0x24c/0x2d0 [ 52.574886] ret_from_fork+0x10/0x20 [ 52.575522] [ 52.575869] Allocated by task 254: [ 52.576288] kasan_save_stack+0x3c/0x68 [ 52.576973] kasan_save_track+0x20/0x40 [ 52.577509] kasan_save_alloc_info+0x40/0x58 [ 52.578079] __kasan_kmalloc+0xd4/0xd8 [ 52.578702] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.579273] kasan_atomics+0xb8/0x2e8 [ 52.579887] kunit_try_run_case+0x14c/0x3d0 [ 52.580396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.581145] kthread+0x24c/0x2d0 [ 52.581678] ret_from_fork+0x10/0x20 [ 52.582313] [ 52.582651] The buggy address belongs to the object at fff00000c616b300 [ 52.582651] which belongs to the cache kmalloc-64 of size 64 [ 52.583990] The buggy address is located 0 bytes to the right of [ 52.583990] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.585657] [ 52.586377] The buggy address belongs to the physical page: [ 52.587103] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.588218] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.589215] page_type: f5(slab) [ 52.589677] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.590716] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.591749] page dumped because: kasan: bad access detected [ 52.592516] [ 52.592855] Memory state around the buggy address: [ 52.593626] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.594569] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.595522] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.596397] ^ [ 52.597086] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.597979] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.598993] ================================================================== [ 54.486040] ================================================================== [ 54.486779] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 54.487802] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 54.488932] [ 54.489712] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 54.490879] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.491813] Hardware name: linux,dummy-virt (DT) [ 54.492573] Call trace: [ 54.493055] show_stack+0x20/0x38 (C) [ 54.493647] dump_stack_lvl+0x8c/0xd0 [ 54.494208] print_report+0x118/0x5e0 [ 54.494853] kasan_report+0xc8/0x118 [ 54.495449] kasan_check_range+0x100/0x1a8 [ 54.496136] __kasan_check_write+0x20/0x30 [ 54.496713] kasan_atomics_helper+0x17ec/0x4858 [ 54.497460] kasan_atomics+0x198/0x2e8 [ 54.497991] kunit_try_run_case+0x14c/0x3d0 [ 54.498694] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.499526] kthread+0x24c/0x2d0 [ 54.500031] ret_from_fork+0x10/0x20 [ 54.500631] [ 54.501100] Allocated by task 254: [ 54.501659] kasan_save_stack+0x3c/0x68 [ 54.502174] kasan_save_track+0x20/0x40 [ 54.502956] kasan_save_alloc_info+0x40/0x58 [ 54.503606] __kasan_kmalloc+0xd4/0xd8 [ 54.504121] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.504920] kasan_atomics+0xb8/0x2e8 [ 54.505488] kunit_try_run_case+0x14c/0x3d0 [ 54.506053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.506705] kthread+0x24c/0x2d0 [ 54.507288] ret_from_fork+0x10/0x20 [ 54.507798] [ 54.508174] The buggy address belongs to the object at fff00000c616b300 [ 54.508174] which belongs to the cache kmalloc-64 of size 64 [ 54.509628] The buggy address is located 0 bytes to the right of [ 54.509628] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 54.511003] [ 54.511396] The buggy address belongs to the physical page: [ 54.512099] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 54.512996] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.514013] page_type: f5(slab) [ 54.514595] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 54.515605] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 54.516507] page dumped because: kasan: bad access detected [ 54.517264] [ 54.517610] Memory state around the buggy address: [ 54.518268] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.519110] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.519931] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.520797] ^ [ 54.521430] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.522316] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.523224] ================================================================== [ 54.260663] ================================================================== [ 54.262468] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 54.263247] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 54.264253] [ 54.264589] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 54.265788] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.266372] Hardware name: linux,dummy-virt (DT) [ 54.266972] Call trace: [ 54.267405] show_stack+0x20/0x38 (C) [ 54.268069] dump_stack_lvl+0x8c/0xd0 [ 54.268682] print_report+0x118/0x5e0 [ 54.269227] kasan_report+0xc8/0x118 [ 54.269782] kasan_check_range+0x100/0x1a8 [ 54.270419] __kasan_check_write+0x20/0x30 [ 54.271056] kasan_atomics_helper+0x1644/0x4858 [ 54.271732] kasan_atomics+0x198/0x2e8 [ 54.272345] kunit_try_run_case+0x14c/0x3d0 [ 54.272841] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.273616] kthread+0x24c/0x2d0 [ 54.274209] ret_from_fork+0x10/0x20 [ 54.274832] [ 54.275200] Allocated by task 254: [ 54.275656] kasan_save_stack+0x3c/0x68 [ 54.276315] kasan_save_track+0x20/0x40 [ 54.276881] kasan_save_alloc_info+0x40/0x58 [ 54.277384] __kasan_kmalloc+0xd4/0xd8 [ 54.277998] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.278623] kasan_atomics+0xb8/0x2e8 [ 54.279269] kunit_try_run_case+0x14c/0x3d0 [ 54.279923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.280570] kthread+0x24c/0x2d0 [ 54.281168] ret_from_fork+0x10/0x20 [ 54.281714] [ 54.281986] The buggy address belongs to the object at fff00000c616b300 [ 54.281986] which belongs to the cache kmalloc-64 of size 64 [ 54.283384] The buggy address is located 0 bytes to the right of [ 54.283384] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 54.284892] [ 54.285202] The buggy address belongs to the physical page: [ 54.286001] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 54.286895] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.287753] page_type: f5(slab) [ 54.288218] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 54.289207] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 54.290053] page dumped because: kasan: bad access detected [ 54.290624] [ 54.290984] Memory state around the buggy address: [ 54.291615] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.292569] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.293541] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.294437] ^ [ 54.295065] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.295925] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.296834] ================================================================== [ 52.295279] ================================================================== [ 52.296061] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 52.296850] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.297714] [ 52.298172] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.299244] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.300106] Hardware name: linux,dummy-virt (DT) [ 52.300654] Call trace: [ 52.301108] show_stack+0x20/0x38 (C) [ 52.301673] dump_stack_lvl+0x8c/0xd0 [ 52.302339] print_report+0x118/0x5e0 [ 52.302898] kasan_report+0xc8/0x118 [ 52.303461] __asan_report_store4_noabort+0x20/0x30 [ 52.304168] kasan_atomics_helper+0x3f94/0x4858 [ 52.305159] kasan_atomics+0x198/0x2e8 [ 52.305831] kunit_try_run_case+0x14c/0x3d0 [ 52.306616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.307468] kthread+0x24c/0x2d0 [ 52.308063] ret_from_fork+0x10/0x20 [ 52.308635] [ 52.309044] Allocated by task 254: [ 52.309607] kasan_save_stack+0x3c/0x68 [ 52.310365] kasan_save_track+0x20/0x40 [ 52.311021] kasan_save_alloc_info+0x40/0x58 [ 52.311808] __kasan_kmalloc+0xd4/0xd8 [ 52.312398] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.313099] kasan_atomics+0xb8/0x2e8 [ 52.313819] kunit_try_run_case+0x14c/0x3d0 [ 52.314481] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.315214] kthread+0x24c/0x2d0 [ 52.315843] ret_from_fork+0x10/0x20 [ 52.316462] [ 52.316794] The buggy address belongs to the object at fff00000c616b300 [ 52.316794] which belongs to the cache kmalloc-64 of size 64 [ 52.318314] The buggy address is located 0 bytes to the right of [ 52.318314] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.319726] [ 52.320076] The buggy address belongs to the physical page: [ 52.320813] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.321860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.322734] page_type: f5(slab) [ 52.323271] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.324264] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.325195] page dumped because: kasan: bad access detected [ 52.325959] [ 52.326532] Memory state around the buggy address: [ 52.327102] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.328001] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.328915] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.329719] ^ [ 52.330361] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.331110] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.332134] ================================================================== [ 52.600490] ================================================================== [ 52.602128] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 52.603170] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.604274] [ 52.604694] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.605826] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.606613] Hardware name: linux,dummy-virt (DT) [ 52.607280] Call trace: [ 52.607768] show_stack+0x20/0x38 (C) [ 52.608458] dump_stack_lvl+0x8c/0xd0 [ 52.609112] print_report+0x118/0x5e0 [ 52.609781] kasan_report+0xc8/0x118 [ 52.610365] kasan_check_range+0x100/0x1a8 [ 52.610997] __kasan_check_write+0x20/0x30 [ 52.611713] kasan_atomics_helper+0x684/0x4858 [ 52.612431] kasan_atomics+0x198/0x2e8 [ 52.613073] kunit_try_run_case+0x14c/0x3d0 [ 52.613835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.614733] kthread+0x24c/0x2d0 [ 52.615358] ret_from_fork+0x10/0x20 [ 52.615981] [ 52.616347] Allocated by task 254: [ 52.617039] kasan_save_stack+0x3c/0x68 [ 52.617695] kasan_save_track+0x20/0x40 [ 52.618347] kasan_save_alloc_info+0x40/0x58 [ 52.619026] __kasan_kmalloc+0xd4/0xd8 [ 52.619666] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.620346] kasan_atomics+0xb8/0x2e8 [ 52.620930] kunit_try_run_case+0x14c/0x3d0 [ 52.621587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.622373] kthread+0x24c/0x2d0 [ 52.623040] ret_from_fork+0x10/0x20 [ 52.623771] [ 52.624146] The buggy address belongs to the object at fff00000c616b300 [ 52.624146] which belongs to the cache kmalloc-64 of size 64 [ 52.625585] The buggy address is located 0 bytes to the right of [ 52.625585] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.627110] [ 52.627547] The buggy address belongs to the physical page: [ 52.628282] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.629470] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.630358] page_type: f5(slab) [ 52.630929] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.631967] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.632885] page dumped because: kasan: bad access detected [ 52.633668] [ 52.634000] Memory state around the buggy address: [ 52.634811] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.635639] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.636708] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.637624] ^ [ 52.638358] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.639251] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.640137] ================================================================== [ 52.642691] ================================================================== [ 52.643499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 52.644259] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.645238] [ 52.645595] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.646759] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.647287] Hardware name: linux,dummy-virt (DT) [ 52.647947] Call trace: [ 52.648475] show_stack+0x20/0x38 (C) [ 52.649018] dump_stack_lvl+0x8c/0xd0 [ 52.649830] print_report+0x118/0x5e0 [ 52.650521] kasan_report+0xc8/0x118 [ 52.651210] kasan_check_range+0x100/0x1a8 [ 52.651884] __kasan_check_write+0x20/0x30 [ 52.652588] kasan_atomics_helper+0x6ec/0x4858 [ 52.653218] kasan_atomics+0x198/0x2e8 [ 52.653865] kunit_try_run_case+0x14c/0x3d0 [ 52.654572] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.655350] kthread+0x24c/0x2d0 [ 52.655993] ret_from_fork+0x10/0x20 [ 52.656597] [ 52.656956] Allocated by task 254: [ 52.657610] kasan_save_stack+0x3c/0x68 [ 52.658287] kasan_save_track+0x20/0x40 [ 52.658892] kasan_save_alloc_info+0x40/0x58 [ 52.659656] __kasan_kmalloc+0xd4/0xd8 [ 52.660321] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.660992] kasan_atomics+0xb8/0x2e8 [ 52.661643] kunit_try_run_case+0x14c/0x3d0 [ 52.662283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.663103] kthread+0x24c/0x2d0 [ 52.663664] ret_from_fork+0x10/0x20 [ 52.664184] [ 52.664496] The buggy address belongs to the object at fff00000c616b300 [ 52.664496] which belongs to the cache kmalloc-64 of size 64 [ 52.665935] The buggy address is located 0 bytes to the right of [ 52.665935] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.667509] [ 52.668000] The buggy address belongs to the physical page: [ 52.668736] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.669803] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.670735] page_type: f5(slab) [ 52.671271] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.672289] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.673252] page dumped because: kasan: bad access detected [ 52.674051] [ 52.674469] Memory state around the buggy address: [ 52.675196] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.676124] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.677011] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.677926] ^ [ 52.678641] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.679636] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.680544] ================================================================== [ 52.484854] ================================================================== [ 52.485604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 52.486590] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.487504] [ 52.487882] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.488977] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.489568] Hardware name: linux,dummy-virt (DT) [ 52.490100] Call trace: [ 52.490599] show_stack+0x20/0x38 (C) [ 52.491117] dump_stack_lvl+0x8c/0xd0 [ 52.491780] print_report+0x118/0x5e0 [ 52.492361] kasan_report+0xc8/0x118 [ 52.492910] kasan_check_range+0x100/0x1a8 [ 52.493507] __kasan_check_write+0x20/0x30 [ 52.494082] kasan_atomics_helper+0x54c/0x4858 [ 52.494820] kasan_atomics+0x198/0x2e8 [ 52.495416] kunit_try_run_case+0x14c/0x3d0 [ 52.496089] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.496779] kthread+0x24c/0x2d0 [ 52.497417] ret_from_fork+0x10/0x20 [ 52.498005] [ 52.498314] Allocated by task 254: [ 52.498842] kasan_save_stack+0x3c/0x68 [ 52.499440] kasan_save_track+0x20/0x40 [ 52.500114] kasan_save_alloc_info+0x40/0x58 [ 52.500743] __kasan_kmalloc+0xd4/0xd8 [ 52.501284] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.501828] kasan_atomics+0xb8/0x2e8 [ 52.502444] kunit_try_run_case+0x14c/0x3d0 [ 52.503025] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.503760] kthread+0x24c/0x2d0 [ 52.504379] ret_from_fork+0x10/0x20 [ 52.504931] [ 52.505219] The buggy address belongs to the object at fff00000c616b300 [ 52.505219] which belongs to the cache kmalloc-64 of size 64 [ 52.506692] The buggy address is located 0 bytes to the right of [ 52.506692] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.507984] [ 52.508400] The buggy address belongs to the physical page: [ 52.509121] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.509928] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.510798] page_type: f5(slab) [ 52.511273] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.512458] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.513358] page dumped because: kasan: bad access detected [ 52.514016] [ 52.514320] Memory state around the buggy address: [ 52.514925] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.515808] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.516564] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.517497] ^ [ 52.518045] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.518948] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.519794] ================================================================== [ 52.036811] ================================================================== [ 52.038179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 52.038838] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.040352] [ 52.040648] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.042447] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.042856] Hardware name: linux,dummy-virt (DT) [ 52.043456] Call trace: [ 52.043928] show_stack+0x20/0x38 (C) [ 52.044532] dump_stack_lvl+0x8c/0xd0 [ 52.045377] print_report+0x118/0x5e0 [ 52.045910] kasan_report+0xc8/0x118 [ 52.046582] __asan_report_store4_noabort+0x20/0x30 [ 52.047242] kasan_atomics_helper+0x3f7c/0x4858 [ 52.047890] kasan_atomics+0x198/0x2e8 [ 52.048385] kunit_try_run_case+0x14c/0x3d0 [ 52.049288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.050034] kthread+0x24c/0x2d0 [ 52.050649] ret_from_fork+0x10/0x20 [ 52.051284] [ 52.051674] Allocated by task 254: [ 52.052287] kasan_save_stack+0x3c/0x68 [ 52.052846] kasan_save_track+0x20/0x40 [ 52.053792] kasan_save_alloc_info+0x40/0x58 [ 52.054360] __kasan_kmalloc+0xd4/0xd8 [ 52.054987] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.055662] kasan_atomics+0xb8/0x2e8 [ 52.056176] kunit_try_run_case+0x14c/0x3d0 [ 52.056838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.058132] kthread+0x24c/0x2d0 [ 52.058592] ret_from_fork+0x10/0x20 [ 52.059047] [ 52.059510] The buggy address belongs to the object at fff00000c616b300 [ 52.059510] which belongs to the cache kmalloc-64 of size 64 [ 52.060840] The buggy address is located 0 bytes to the right of [ 52.060840] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.062437] [ 52.062922] The buggy address belongs to the physical page: [ 52.063642] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.065327] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.066126] page_type: f5(slab) [ 52.066590] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.067593] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.068529] page dumped because: kasan: bad access detected [ 52.069199] [ 52.069900] Memory state around the buggy address: [ 52.070600] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.071603] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.072556] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.073597] ^ [ 52.074143] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.074997] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.075851] ================================================================== [ 53.336673] ================================================================== [ 53.338288] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 53.339564] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.340755] [ 53.341178] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.342366] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.342899] Hardware name: linux,dummy-virt (DT) [ 53.343570] Call trace: [ 53.343938] show_stack+0x20/0x38 (C) [ 53.344584] dump_stack_lvl+0x8c/0xd0 [ 53.345235] print_report+0x118/0x5e0 [ 53.345831] kasan_report+0xc8/0x118 [ 53.346388] __asan_report_load4_noabort+0x20/0x30 [ 53.347032] kasan_atomics_helper+0x3e04/0x4858 [ 53.347762] kasan_atomics+0x198/0x2e8 [ 53.348569] kunit_try_run_case+0x14c/0x3d0 [ 53.349158] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.349778] kthread+0x24c/0x2d0 [ 53.350501] ret_from_fork+0x10/0x20 [ 53.351069] [ 53.351466] Allocated by task 254: [ 53.351957] kasan_save_stack+0x3c/0x68 [ 53.352524] kasan_save_track+0x20/0x40 [ 53.353154] kasan_save_alloc_info+0x40/0x58 [ 53.353781] __kasan_kmalloc+0xd4/0xd8 [ 53.354271] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.355055] kasan_atomics+0xb8/0x2e8 [ 53.355618] kunit_try_run_case+0x14c/0x3d0 [ 53.356279] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.356992] kthread+0x24c/0x2d0 [ 53.357573] ret_from_fork+0x10/0x20 [ 53.358167] [ 53.358506] The buggy address belongs to the object at fff00000c616b300 [ 53.358506] which belongs to the cache kmalloc-64 of size 64 [ 53.359830] The buggy address is located 0 bytes to the right of [ 53.359830] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.361212] [ 53.361686] The buggy address belongs to the physical page: [ 53.362428] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.363386] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.364194] page_type: f5(slab) [ 53.364683] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.365571] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.366495] page dumped because: kasan: bad access detected [ 53.367080] [ 53.367452] Memory state around the buggy address: [ 53.368144] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.369000] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.369902] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.370764] ^ [ 53.371375] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.372245] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.373047] ================================================================== [ 54.298245] ================================================================== [ 54.299095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 54.299913] Read of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 54.300827] [ 54.301255] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 54.302463] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.303109] Hardware name: linux,dummy-virt (DT) [ 54.303776] Call trace: [ 54.304165] show_stack+0x20/0x38 (C) [ 54.304693] dump_stack_lvl+0x8c/0xd0 [ 54.305364] print_report+0x118/0x5e0 [ 54.305884] kasan_report+0xc8/0x118 [ 54.306607] __asan_report_load8_noabort+0x20/0x30 [ 54.307338] kasan_atomics_helper+0x3df4/0x4858 [ 54.308017] kasan_atomics+0x198/0x2e8 [ 54.308738] kunit_try_run_case+0x14c/0x3d0 [ 54.309315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.310229] kthread+0x24c/0x2d0 [ 54.310733] ret_from_fork+0x10/0x20 [ 54.311360] [ 54.311645] Allocated by task 254: [ 54.312080] kasan_save_stack+0x3c/0x68 [ 54.312762] kasan_save_track+0x20/0x40 [ 54.313363] kasan_save_alloc_info+0x40/0x58 [ 54.313996] __kasan_kmalloc+0xd4/0xd8 [ 54.314589] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.315127] kasan_atomics+0xb8/0x2e8 [ 54.315762] kunit_try_run_case+0x14c/0x3d0 [ 54.316473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.317119] kthread+0x24c/0x2d0 [ 54.317716] ret_from_fork+0x10/0x20 [ 54.318252] [ 54.318569] The buggy address belongs to the object at fff00000c616b300 [ 54.318569] which belongs to the cache kmalloc-64 of size 64 [ 54.319956] The buggy address is located 0 bytes to the right of [ 54.319956] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 54.321398] [ 54.321690] The buggy address belongs to the physical page: [ 54.322446] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 54.323516] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.324286] page_type: f5(slab) [ 54.324870] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 54.325783] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 54.326668] page dumped because: kasan: bad access detected [ 54.327470] [ 54.327978] Memory state around the buggy address: [ 54.328773] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.329613] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.330500] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.331494] ^ [ 54.332067] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.332885] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.333826] ================================================================== [ 54.372193] ================================================================== [ 54.373132] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 54.374265] Read of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 54.375392] [ 54.375776] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 54.377307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.377800] Hardware name: linux,dummy-virt (DT) [ 54.378717] Call trace: [ 54.379534] show_stack+0x20/0x38 (C) [ 54.380060] dump_stack_lvl+0x8c/0xd0 [ 54.380809] print_report+0x118/0x5e0 [ 54.381633] kasan_report+0xc8/0x118 [ 54.382240] __asan_report_load8_noabort+0x20/0x30 [ 54.383205] kasan_atomics_helper+0x3e10/0x4858 [ 54.383927] kasan_atomics+0x198/0x2e8 [ 54.384533] kunit_try_run_case+0x14c/0x3d0 [ 54.385361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.386196] kthread+0x24c/0x2d0 [ 54.386781] ret_from_fork+0x10/0x20 [ 54.387405] [ 54.387852] Allocated by task 254: [ 54.388354] kasan_save_stack+0x3c/0x68 [ 54.389057] kasan_save_track+0x20/0x40 [ 54.389660] kasan_save_alloc_info+0x40/0x58 [ 54.390176] __kasan_kmalloc+0xd4/0xd8 [ 54.390910] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.391590] kasan_atomics+0xb8/0x2e8 [ 54.392139] kunit_try_run_case+0x14c/0x3d0 [ 54.392637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.393445] kthread+0x24c/0x2d0 [ 54.393977] ret_from_fork+0x10/0x20 [ 54.394544] [ 54.394875] The buggy address belongs to the object at fff00000c616b300 [ 54.394875] which belongs to the cache kmalloc-64 of size 64 [ 54.396131] The buggy address is located 0 bytes to the right of [ 54.396131] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 54.397552] [ 54.397923] The buggy address belongs to the physical page: [ 54.398688] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 54.399612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.400425] page_type: f5(slab) [ 54.400977] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 54.401817] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 54.402800] page dumped because: kasan: bad access detected [ 54.403512] [ 54.403857] Memory state around the buggy address: [ 54.404544] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.405390] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.406176] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.407013] ^ [ 54.407736] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.408611] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.409433] ================================================================== [ 53.067869] ================================================================== [ 53.068725] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 53.069670] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.070660] [ 53.071041] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.071954] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.072656] Hardware name: linux,dummy-virt (DT) [ 53.073334] Call trace: [ 53.073760] show_stack+0x20/0x38 (C) [ 53.074250] dump_stack_lvl+0x8c/0xd0 [ 53.074807] print_report+0x118/0x5e0 [ 53.075584] kasan_report+0xc8/0x118 [ 53.076217] kasan_check_range+0x100/0x1a8 [ 53.076899] __kasan_check_write+0x20/0x30 [ 53.077427] kasan_atomics_helper+0xb70/0x4858 [ 53.078229] kasan_atomics+0x198/0x2e8 [ 53.078919] kunit_try_run_case+0x14c/0x3d0 [ 53.079578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.080485] kthread+0x24c/0x2d0 [ 53.081077] ret_from_fork+0x10/0x20 [ 53.081761] [ 53.082143] Allocated by task 254: [ 53.082761] kasan_save_stack+0x3c/0x68 [ 53.083446] kasan_save_track+0x20/0x40 [ 53.083950] kasan_save_alloc_info+0x40/0x58 [ 53.084489] __kasan_kmalloc+0xd4/0xd8 [ 53.084893] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.085463] kasan_atomics+0xb8/0x2e8 [ 53.086120] kunit_try_run_case+0x14c/0x3d0 [ 53.086601] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.087125] kthread+0x24c/0x2d0 [ 53.087580] ret_from_fork+0x10/0x20 [ 53.088016] [ 53.088458] The buggy address belongs to the object at fff00000c616b300 [ 53.088458] which belongs to the cache kmalloc-64 of size 64 [ 53.090216] The buggy address is located 0 bytes to the right of [ 53.090216] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.091620] [ 53.091901] The buggy address belongs to the physical page: [ 53.092932] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.093933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.094810] page_type: f5(slab) [ 53.095318] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.096185] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.097049] page dumped because: kasan: bad access detected [ 53.097839] [ 53.098083] Memory state around the buggy address: [ 53.098700] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.099842] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.100696] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.101558] ^ [ 53.102250] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.103107] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.104052] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 51.699999] ================================================================== [ 51.700594] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 51.701110] Write of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250 [ 51.702385] [ 51.702855] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 51.704346] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.704924] Hardware name: linux,dummy-virt (DT) [ 51.705515] Call trace: [ 51.705967] show_stack+0x20/0x38 (C) [ 51.706564] dump_stack_lvl+0x8c/0xd0 [ 51.707347] print_report+0x118/0x5e0 [ 51.708098] kasan_report+0xc8/0x118 [ 51.708886] kasan_check_range+0x100/0x1a8 [ 51.709640] __kasan_check_write+0x20/0x30 [ 51.710487] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 51.711518] kasan_bitops_generic+0x11c/0x1c8 [ 51.712262] kunit_try_run_case+0x14c/0x3d0 [ 51.712907] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.713635] kthread+0x24c/0x2d0 [ 51.714321] ret_from_fork+0x10/0x20 [ 51.714856] [ 51.715219] Allocated by task 250: [ 51.715805] kasan_save_stack+0x3c/0x68 [ 51.716374] kasan_save_track+0x20/0x40 [ 51.716858] kasan_save_alloc_info+0x40/0x58 [ 51.717596] __kasan_kmalloc+0xd4/0xd8 [ 51.718099] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.718857] kasan_bitops_generic+0xa0/0x1c8 [ 51.719462] kunit_try_run_case+0x14c/0x3d0 [ 51.720020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.720847] kthread+0x24c/0x2d0 [ 51.721399] ret_from_fork+0x10/0x20 [ 51.721910] [ 51.722334] The buggy address belongs to the object at fff00000c5f55320 [ 51.722334] which belongs to the cache kmalloc-16 of size 16 [ 51.723738] The buggy address is located 8 bytes inside of [ 51.723738] allocated 9-byte region [fff00000c5f55320, fff00000c5f55329) [ 51.725046] [ 51.725374] The buggy address belongs to the physical page: [ 51.726195] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55 [ 51.727264] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.728148] page_type: f5(slab) [ 51.728721] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 51.729733] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 51.730674] page dumped because: kasan: bad access detected [ 51.731430] [ 51.731741] Memory state around the buggy address: [ 51.732420] fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 51.733357] fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 51.734408] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 51.735339] ^ [ 51.735994] fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.737054] fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.738006] ================================================================== [ 51.739776] ================================================================== [ 51.741310] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 51.742206] Read of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250 [ 51.742985] [ 51.743369] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 51.744549] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.745259] Hardware name: linux,dummy-virt (DT) [ 51.745957] Call trace: [ 51.746417] show_stack+0x20/0x38 (C) [ 51.746998] dump_stack_lvl+0x8c/0xd0 [ 51.747538] print_report+0x118/0x5e0 [ 51.748008] kasan_report+0xc8/0x118 [ 51.748836] __asan_report_load8_noabort+0x20/0x30 [ 51.749700] kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 51.750555] kasan_bitops_generic+0x11c/0x1c8 [ 51.751263] kunit_try_run_case+0x14c/0x3d0 [ 51.752142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.752823] kthread+0x24c/0x2d0 [ 51.753368] ret_from_fork+0x10/0x20 [ 51.753865] [ 51.754177] Allocated by task 250: [ 51.754910] kasan_save_stack+0x3c/0x68 [ 51.755647] kasan_save_track+0x20/0x40 [ 51.756090] kasan_save_alloc_info+0x40/0x58 [ 51.756715] __kasan_kmalloc+0xd4/0xd8 [ 51.757320] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.757910] kasan_bitops_generic+0xa0/0x1c8 [ 51.758590] kunit_try_run_case+0x14c/0x3d0 [ 51.759177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.759968] kthread+0x24c/0x2d0 [ 51.760565] ret_from_fork+0x10/0x20 [ 51.761110] [ 51.761406] The buggy address belongs to the object at fff00000c5f55320 [ 51.761406] which belongs to the cache kmalloc-16 of size 16 [ 51.762805] The buggy address is located 8 bytes inside of [ 51.762805] allocated 9-byte region [fff00000c5f55320, fff00000c5f55329) [ 51.764001] [ 51.764379] The buggy address belongs to the physical page: [ 51.765120] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55 [ 51.765967] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.766698] page_type: f5(slab) [ 51.767260] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 51.768206] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 51.769138] page dumped because: kasan: bad access detected [ 51.769814] [ 51.770136] Memory state around the buggy address: [ 51.770691] fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 51.771630] fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 51.772504] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 51.773342] ^ [ 51.773913] fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.774783] fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.775649] ================================================================== [ 51.860713] ================================================================== [ 51.861521] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 51.862601] Write of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250 [ 51.863567] [ 51.864005] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 51.865360] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.865998] Hardware name: linux,dummy-virt (DT) [ 51.866763] Call trace: [ 51.867210] show_stack+0x20/0x38 (C) [ 51.867913] dump_stack_lvl+0x8c/0xd0 [ 51.868512] print_report+0x118/0x5e0 [ 51.869206] kasan_report+0xc8/0x118 [ 51.869874] kasan_check_range+0x100/0x1a8 [ 51.870592] __kasan_check_write+0x20/0x30 [ 51.871352] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 51.872247] kasan_bitops_generic+0x11c/0x1c8 [ 51.872949] kunit_try_run_case+0x14c/0x3d0 [ 51.873716] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.874586] kthread+0x24c/0x2d0 [ 51.875199] ret_from_fork+0x10/0x20 [ 51.875832] [ 51.876172] Allocated by task 250: [ 51.876785] kasan_save_stack+0x3c/0x68 [ 51.877409] kasan_save_track+0x20/0x40 [ 51.877924] kasan_save_alloc_info+0x40/0x58 [ 51.878671] __kasan_kmalloc+0xd4/0xd8 [ 51.879358] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.880006] kasan_bitops_generic+0xa0/0x1c8 [ 51.880725] kunit_try_run_case+0x14c/0x3d0 [ 51.881594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.882407] kthread+0x24c/0x2d0 [ 51.882949] ret_from_fork+0x10/0x20 [ 51.883541] [ 51.883937] The buggy address belongs to the object at fff00000c5f55320 [ 51.883937] which belongs to the cache kmalloc-16 of size 16 [ 51.885308] The buggy address is located 8 bytes inside of [ 51.885308] allocated 9-byte region [fff00000c5f55320, fff00000c5f55329) [ 51.886637] [ 51.886979] The buggy address belongs to the physical page: [ 51.887713] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55 [ 51.888684] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.889553] page_type: f5(slab) [ 51.890024] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 51.890948] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 51.891797] page dumped because: kasan: bad access detected [ 51.892540] [ 51.892890] Memory state around the buggy address: [ 51.893447] fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 51.894397] fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 51.895230] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 51.895996] ^ [ 51.896691] fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.897560] fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.898481] ================================================================== [ 51.900114] ================================================================== [ 51.900836] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 51.902185] Read of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250 [ 51.903144] [ 51.903475] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 51.904599] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.905230] Hardware name: linux,dummy-virt (DT) [ 51.905814] Call trace: [ 51.906308] show_stack+0x20/0x38 (C) [ 51.906836] dump_stack_lvl+0x8c/0xd0 [ 51.907429] print_report+0x118/0x5e0 [ 51.907960] kasan_report+0xc8/0x118 [ 51.908658] __asan_report_load8_noabort+0x20/0x30 [ 51.909353] kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 51.910109] kasan_bitops_generic+0x11c/0x1c8 [ 51.910669] kunit_try_run_case+0x14c/0x3d0 [ 51.911334] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.912080] kthread+0x24c/0x2d0 [ 51.912821] ret_from_fork+0x10/0x20 [ 51.913488] [ 51.913900] Allocated by task 250: [ 51.914424] kasan_save_stack+0x3c/0x68 [ 51.915178] kasan_save_track+0x20/0x40 [ 51.915832] kasan_save_alloc_info+0x40/0x58 [ 51.916529] __kasan_kmalloc+0xd4/0xd8 [ 51.917263] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.918014] kasan_bitops_generic+0xa0/0x1c8 [ 51.918703] kunit_try_run_case+0x14c/0x3d0 [ 51.919529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.920312] kthread+0x24c/0x2d0 [ 51.920985] ret_from_fork+0x10/0x20 [ 51.921615] [ 51.921956] The buggy address belongs to the object at fff00000c5f55320 [ 51.921956] which belongs to the cache kmalloc-16 of size 16 [ 51.923507] The buggy address is located 8 bytes inside of [ 51.923507] allocated 9-byte region [fff00000c5f55320, fff00000c5f55329) [ 51.924897] [ 51.925348] The buggy address belongs to the physical page: [ 51.926051] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55 [ 51.927125] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.927999] page_type: f5(slab) [ 51.928624] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 51.929608] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 51.930565] page dumped because: kasan: bad access detected [ 51.931357] [ 51.931689] Memory state around the buggy address: [ 51.932342] fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 51.933259] fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 51.934347] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 51.935244] ^ [ 51.935923] fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.936884] fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.937772] ================================================================== [ 51.662730] ================================================================== [ 51.663508] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 51.664694] Read of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250 [ 51.665820] [ 51.666175] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 51.667437] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.668000] Hardware name: linux,dummy-virt (DT) [ 51.668777] Call trace: [ 51.669164] show_stack+0x20/0x38 (C) [ 51.669783] dump_stack_lvl+0x8c/0xd0 [ 51.670428] print_report+0x118/0x5e0 [ 51.671002] kasan_report+0xc8/0x118 [ 51.671666] __asan_report_load8_noabort+0x20/0x30 [ 51.672320] kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 51.673206] kasan_bitops_generic+0x11c/0x1c8 [ 51.673761] kunit_try_run_case+0x14c/0x3d0 [ 51.674503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.675181] kthread+0x24c/0x2d0 [ 51.675775] ret_from_fork+0x10/0x20 [ 51.676404] [ 51.676704] Allocated by task 250: [ 51.677318] kasan_save_stack+0x3c/0x68 [ 51.677920] kasan_save_track+0x20/0x40 [ 51.678475] kasan_save_alloc_info+0x40/0x58 [ 51.679006] __kasan_kmalloc+0xd4/0xd8 [ 51.679589] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.680378] kasan_bitops_generic+0xa0/0x1c8 [ 51.680976] kunit_try_run_case+0x14c/0x3d0 [ 51.681674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.682353] kthread+0x24c/0x2d0 [ 51.682979] ret_from_fork+0x10/0x20 [ 51.683500] [ 51.683853] The buggy address belongs to the object at fff00000c5f55320 [ 51.683853] which belongs to the cache kmalloc-16 of size 16 [ 51.685212] The buggy address is located 8 bytes inside of [ 51.685212] allocated 9-byte region [fff00000c5f55320, fff00000c5f55329) [ 51.686484] [ 51.686874] The buggy address belongs to the physical page: [ 51.687449] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55 [ 51.688396] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.688944] page_type: f5(slab) [ 51.689429] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 51.690130] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 51.690980] page dumped because: kasan: bad access detected [ 51.691483] [ 51.691860] Memory state around the buggy address: [ 51.692357] fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 51.692931] fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 51.693738] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 51.694626] ^ [ 51.695240] fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.696600] fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.697371] ================================================================== [ 51.778564] ================================================================== [ 51.779348] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 51.780227] Write of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250 [ 51.780938] [ 51.781516] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 51.782918] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.783549] Hardware name: linux,dummy-virt (DT) [ 51.784211] Call trace: [ 51.784674] show_stack+0x20/0x38 (C) [ 51.785325] dump_stack_lvl+0x8c/0xd0 [ 51.785954] print_report+0x118/0x5e0 [ 51.786539] kasan_report+0xc8/0x118 [ 51.787105] kasan_check_range+0x100/0x1a8 [ 51.787833] __kasan_check_write+0x20/0x30 [ 51.788551] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 51.789439] kasan_bitops_generic+0x11c/0x1c8 [ 51.790238] kunit_try_run_case+0x14c/0x3d0 [ 51.791021] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.791939] kthread+0x24c/0x2d0 [ 51.792572] ret_from_fork+0x10/0x20 [ 51.793077] [ 51.793439] Allocated by task 250: [ 51.794152] kasan_save_stack+0x3c/0x68 [ 51.794799] kasan_save_track+0x20/0x40 [ 51.795536] kasan_save_alloc_info+0x40/0x58 [ 51.796134] __kasan_kmalloc+0xd4/0xd8 [ 51.796764] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.797542] kasan_bitops_generic+0xa0/0x1c8 [ 51.798220] kunit_try_run_case+0x14c/0x3d0 [ 51.798897] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.799681] kthread+0x24c/0x2d0 [ 51.800356] ret_from_fork+0x10/0x20 [ 51.800945] [ 51.801324] The buggy address belongs to the object at fff00000c5f55320 [ 51.801324] which belongs to the cache kmalloc-16 of size 16 [ 51.802799] The buggy address is located 8 bytes inside of [ 51.802799] allocated 9-byte region [fff00000c5f55320, fff00000c5f55329) [ 51.804375] [ 51.804795] The buggy address belongs to the physical page: [ 51.805503] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55 [ 51.806632] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.807471] page_type: f5(slab) [ 51.808071] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 51.809055] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 51.809997] page dumped because: kasan: bad access detected [ 51.810772] [ 51.811085] Memory state around the buggy address: [ 51.811703] fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 51.812732] fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 51.813614] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 51.814523] ^ [ 51.815331] fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.816384] fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.817406] ================================================================== [ 51.819787] ================================================================== [ 51.820844] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 51.822342] Read of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250 [ 51.823258] [ 51.823640] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 51.824934] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.825551] Hardware name: linux,dummy-virt (DT) [ 51.826192] Call trace: [ 51.826761] show_stack+0x20/0x38 (C) [ 51.827391] dump_stack_lvl+0x8c/0xd0 [ 51.828066] print_report+0x118/0x5e0 [ 51.828734] kasan_report+0xc8/0x118 [ 51.829354] __asan_report_load8_noabort+0x20/0x30 [ 51.830163] kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 51.831018] kasan_bitops_generic+0x11c/0x1c8 [ 51.831720] kunit_try_run_case+0x14c/0x3d0 [ 51.832449] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.833231] kthread+0x24c/0x2d0 [ 51.833824] ret_from_fork+0x10/0x20 [ 51.834545] [ 51.834925] Allocated by task 250: [ 51.835565] kasan_save_stack+0x3c/0x68 [ 51.836108] kasan_save_track+0x20/0x40 [ 51.836847] kasan_save_alloc_info+0x40/0x58 [ 51.837600] __kasan_kmalloc+0xd4/0xd8 [ 51.838240] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.839052] kasan_bitops_generic+0xa0/0x1c8 [ 51.839856] kunit_try_run_case+0x14c/0x3d0 [ 51.840586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.841413] kthread+0x24c/0x2d0 [ 51.842079] ret_from_fork+0x10/0x20 [ 51.842693] [ 51.843056] The buggy address belongs to the object at fff00000c5f55320 [ 51.843056] which belongs to the cache kmalloc-16 of size 16 [ 51.844498] The buggy address is located 8 bytes inside of [ 51.844498] allocated 9-byte region [fff00000c5f55320, fff00000c5f55329) [ 51.845960] [ 51.846403] The buggy address belongs to the physical page: [ 51.847169] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55 [ 51.848156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.848983] page_type: f5(slab) [ 51.849521] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 51.850543] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 51.851537] page dumped because: kasan: bad access detected [ 51.852408] [ 51.852940] Memory state around the buggy address: [ 51.853591] fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 51.854492] fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 51.855427] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 51.856267] ^ [ 51.856954] fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.857913] fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.858892] ================================================================== [ 51.624061] ================================================================== [ 51.624875] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 51.626132] Write of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250 [ 51.627244] [ 51.627624] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 51.629023] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.629626] Hardware name: linux,dummy-virt (DT) [ 51.630364] Call trace: [ 51.630861] show_stack+0x20/0x38 (C) [ 51.631421] dump_stack_lvl+0x8c/0xd0 [ 51.632041] print_report+0x118/0x5e0 [ 51.632662] kasan_report+0xc8/0x118 [ 51.633280] kasan_check_range+0x100/0x1a8 [ 51.634206] __kasan_check_write+0x20/0x30 [ 51.634800] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 51.635533] kasan_bitops_generic+0x11c/0x1c8 [ 51.636184] kunit_try_run_case+0x14c/0x3d0 [ 51.636905] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.637662] kthread+0x24c/0x2d0 [ 51.638247] ret_from_fork+0x10/0x20 [ 51.638870] [ 51.639230] Allocated by task 250: [ 51.639712] kasan_save_stack+0x3c/0x68 [ 51.640434] kasan_save_track+0x20/0x40 [ 51.641006] kasan_save_alloc_info+0x40/0x58 [ 51.641605] __kasan_kmalloc+0xd4/0xd8 [ 51.642093] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.642858] kasan_bitops_generic+0xa0/0x1c8 [ 51.643441] kunit_try_run_case+0x14c/0x3d0 [ 51.644095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.644801] kthread+0x24c/0x2d0 [ 51.645341] ret_from_fork+0x10/0x20 [ 51.645876] [ 51.646161] The buggy address belongs to the object at fff00000c5f55320 [ 51.646161] which belongs to the cache kmalloc-16 of size 16 [ 51.647642] The buggy address is located 8 bytes inside of [ 51.647642] allocated 9-byte region [fff00000c5f55320, fff00000c5f55329) [ 51.648948] [ 51.649247] The buggy address belongs to the physical page: [ 51.650024] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55 [ 51.650938] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.651858] page_type: f5(slab) [ 51.652288] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 51.653273] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 51.654213] page dumped because: kasan: bad access detected [ 51.654895] [ 51.655189] Memory state around the buggy address: [ 51.655782] fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 51.656584] fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 51.657465] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 51.658430] ^ [ 51.658959] fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.659878] fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.660839] ================================================================== [ 51.940036] ================================================================== [ 51.940698] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 51.942068] Read of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250 [ 51.942990] [ 51.943421] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 51.944728] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.945012] Hardware name: linux,dummy-virt (DT) [ 51.945781] Call trace: [ 51.946214] show_stack+0x20/0x38 (C) [ 51.946954] dump_stack_lvl+0x8c/0xd0 [ 51.947681] print_report+0x118/0x5e0 [ 51.948323] kasan_report+0xc8/0x118 [ 51.949009] __asan_report_load8_noabort+0x20/0x30 [ 51.949783] kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 51.950711] kasan_bitops_generic+0x11c/0x1c8 [ 51.951461] kunit_try_run_case+0x14c/0x3d0 [ 51.952148] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.952920] kthread+0x24c/0x2d0 [ 51.953594] ret_from_fork+0x10/0x20 [ 51.954275] [ 51.954646] Allocated by task 250: [ 51.955222] kasan_save_stack+0x3c/0x68 [ 51.955927] kasan_save_track+0x20/0x40 [ 51.956482] kasan_save_alloc_info+0x40/0x58 [ 51.956887] __kasan_kmalloc+0xd4/0xd8 [ 51.957279] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.957940] kasan_bitops_generic+0xa0/0x1c8 [ 51.958381] kunit_try_run_case+0x14c/0x3d0 [ 51.958798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.959267] kthread+0x24c/0x2d0 [ 51.960430] ret_from_fork+0x10/0x20 [ 51.961159] [ 51.961714] The buggy address belongs to the object at fff00000c5f55320 [ 51.961714] which belongs to the cache kmalloc-16 of size 16 [ 51.963353] The buggy address is located 8 bytes inside of [ 51.963353] allocated 9-byte region [fff00000c5f55320, fff00000c5f55329) [ 51.964926] [ 51.965348] The buggy address belongs to the physical page: [ 51.966178] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55 [ 51.967341] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.968272] page_type: f5(slab) [ 51.968811] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 51.969794] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 51.970749] page dumped because: kasan: bad access detected [ 51.971514] [ 51.971839] Memory state around the buggy address: [ 51.972497] fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 51.973557] fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 51.974563] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 51.975507] ^ [ 51.976196] fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.977087] fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.977972] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 51.346870] ================================================================== [ 51.347783] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 51.348693] Read of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250 [ 51.349646] [ 51.349972] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 51.351239] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.351891] Hardware name: linux,dummy-virt (DT) [ 51.352428] Call trace: [ 51.352963] show_stack+0x20/0x38 (C) [ 51.353506] dump_stack_lvl+0x8c/0xd0 [ 51.354167] print_report+0x118/0x5e0 [ 51.354781] kasan_report+0xc8/0x118 [ 51.355472] __asan_report_load8_noabort+0x20/0x30 [ 51.356503] kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 51.357691] kasan_bitops_generic+0x110/0x1c8 [ 51.358481] kunit_try_run_case+0x14c/0x3d0 [ 51.359029] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.359936] kthread+0x24c/0x2d0 [ 51.360612] ret_from_fork+0x10/0x20 [ 51.361135] [ 51.361461] Allocated by task 250: [ 51.361900] kasan_save_stack+0x3c/0x68 [ 51.362592] kasan_save_track+0x20/0x40 [ 51.363137] kasan_save_alloc_info+0x40/0x58 [ 51.363810] __kasan_kmalloc+0xd4/0xd8 [ 51.364271] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.365015] kasan_bitops_generic+0xa0/0x1c8 [ 51.365673] kunit_try_run_case+0x14c/0x3d0 [ 51.366352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.367028] kthread+0x24c/0x2d0 [ 51.367656] ret_from_fork+0x10/0x20 [ 51.368126] [ 51.368524] The buggy address belongs to the object at fff00000c5f55320 [ 51.368524] which belongs to the cache kmalloc-16 of size 16 [ 51.369915] The buggy address is located 8 bytes inside of [ 51.369915] allocated 9-byte region [fff00000c5f55320, fff00000c5f55329) [ 51.371307] [ 51.371638] The buggy address belongs to the physical page: [ 51.372311] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55 [ 51.373358] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.374134] page_type: f5(slab) [ 51.374640] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 51.375495] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 51.376484] page dumped because: kasan: bad access detected [ 51.377111] [ 51.377449] Memory state around the buggy address: [ 51.377990] fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 51.378947] fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 51.379753] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 51.380613] ^ [ 51.381151] fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.382048] fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.382943] ================================================================== [ 51.232184] ================================================================== [ 51.233400] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 51.234274] Write of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250 [ 51.235188] [ 51.235630] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 51.236790] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.237349] Hardware name: linux,dummy-virt (DT) [ 51.238146] Call trace: [ 51.238694] show_stack+0x20/0x38 (C) [ 51.239241] dump_stack_lvl+0x8c/0xd0 [ 51.239854] print_report+0x118/0x5e0 [ 51.240526] kasan_report+0xc8/0x118 [ 51.241085] kasan_check_range+0x100/0x1a8 [ 51.241764] __kasan_check_write+0x20/0x30 [ 51.242353] kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 51.243195] kasan_bitops_generic+0x110/0x1c8 [ 51.243901] kunit_try_run_case+0x14c/0x3d0 [ 51.244499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.245272] kthread+0x24c/0x2d0 [ 51.245895] ret_from_fork+0x10/0x20 [ 51.246581] [ 51.246904] Allocated by task 250: [ 51.247586] kasan_save_stack+0x3c/0x68 [ 51.248100] kasan_save_track+0x20/0x40 [ 51.248876] kasan_save_alloc_info+0x40/0x58 [ 51.249445] __kasan_kmalloc+0xd4/0xd8 [ 51.250064] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.250722] kasan_bitops_generic+0xa0/0x1c8 [ 51.251287] kunit_try_run_case+0x14c/0x3d0 [ 51.251953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.252619] kthread+0x24c/0x2d0 [ 51.253160] ret_from_fork+0x10/0x20 [ 51.253625] [ 51.254004] The buggy address belongs to the object at fff00000c5f55320 [ 51.254004] which belongs to the cache kmalloc-16 of size 16 [ 51.255512] The buggy address is located 8 bytes inside of [ 51.255512] allocated 9-byte region [fff00000c5f55320, fff00000c5f55329) [ 51.256945] [ 51.257243] The buggy address belongs to the physical page: [ 51.258030] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55 [ 51.258941] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.259821] page_type: f5(slab) [ 51.260416] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 51.261370] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 51.262364] page dumped because: kasan: bad access detected [ 51.263057] [ 51.263361] Memory state around the buggy address: [ 51.263970] fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 51.264864] fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 51.265698] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 51.266611] ^ [ 51.267216] fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.268109] fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.268982] ================================================================== [ 51.462428] ================================================================== [ 51.463187] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 51.464262] Read of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250 [ 51.466340] [ 51.466747] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 51.467983] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.468564] Hardware name: linux,dummy-virt (DT) [ 51.469132] Call trace: [ 51.469601] show_stack+0x20/0x38 (C) [ 51.470214] dump_stack_lvl+0x8c/0xd0 [ 51.470831] print_report+0x118/0x5e0 [ 51.471412] kasan_report+0xc8/0x118 [ 51.471967] __asan_report_load8_noabort+0x20/0x30 [ 51.472618] kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 51.473329] kasan_bitops_generic+0x110/0x1c8 [ 51.474005] kunit_try_run_case+0x14c/0x3d0 [ 51.474680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.475370] kthread+0x24c/0x2d0 [ 51.475983] ret_from_fork+0x10/0x20 [ 51.476547] [ 51.476926] Allocated by task 250: [ 51.477511] kasan_save_stack+0x3c/0x68 [ 51.478130] kasan_save_track+0x20/0x40 [ 51.478755] kasan_save_alloc_info+0x40/0x58 [ 51.479265] __kasan_kmalloc+0xd4/0xd8 [ 51.479905] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.480543] kasan_bitops_generic+0xa0/0x1c8 [ 51.481234] kunit_try_run_case+0x14c/0x3d0 [ 51.481855] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.482680] kthread+0x24c/0x2d0 [ 51.483236] ret_from_fork+0x10/0x20 [ 51.483850] [ 51.484161] The buggy address belongs to the object at fff00000c5f55320 [ 51.484161] which belongs to the cache kmalloc-16 of size 16 [ 51.485485] The buggy address is located 8 bytes inside of [ 51.485485] allocated 9-byte region [fff00000c5f55320, fff00000c5f55329) [ 51.486831] [ 51.487151] The buggy address belongs to the physical page: [ 51.487740] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55 [ 51.488857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.489758] page_type: f5(slab) [ 51.490330] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 51.491213] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 51.492191] page dumped because: kasan: bad access detected [ 51.492833] [ 51.493175] Memory state around the buggy address: [ 51.493755] fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 51.494632] fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 51.495475] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 51.496398] ^ [ 51.496968] fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.497887] fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.498765] ================================================================== [ 51.584032] ================================================================== [ 51.585445] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 51.586376] Read of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250 [ 51.587222] [ 51.588655] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 51.590127] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.590883] Hardware name: linux,dummy-virt (DT) [ 51.591514] Call trace: [ 51.591904] show_stack+0x20/0x38 (C) [ 51.592611] dump_stack_lvl+0x8c/0xd0 [ 51.593228] print_report+0x118/0x5e0 [ 51.593863] kasan_report+0xc8/0x118 [ 51.594471] __asan_report_load8_noabort+0x20/0x30 [ 51.595115] kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 51.595898] kasan_bitops_generic+0x110/0x1c8 [ 51.596595] kunit_try_run_case+0x14c/0x3d0 [ 51.597272] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.598055] kthread+0x24c/0x2d0 [ 51.598679] ret_from_fork+0x10/0x20 [ 51.599735] [ 51.599998] Allocated by task 250: [ 51.600851] kasan_save_stack+0x3c/0x68 [ 51.601503] kasan_save_track+0x20/0x40 [ 51.602043] kasan_save_alloc_info+0x40/0x58 [ 51.602490] __kasan_kmalloc+0xd4/0xd8 [ 51.603010] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.603597] kasan_bitops_generic+0xa0/0x1c8 [ 51.604098] kunit_try_run_case+0x14c/0x3d0 [ 51.604885] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.605595] kthread+0x24c/0x2d0 [ 51.606113] ret_from_fork+0x10/0x20 [ 51.606723] [ 51.607055] The buggy address belongs to the object at fff00000c5f55320 [ 51.607055] which belongs to the cache kmalloc-16 of size 16 [ 51.608539] The buggy address is located 8 bytes inside of [ 51.608539] allocated 9-byte region [fff00000c5f55320, fff00000c5f55329) [ 51.609843] [ 51.610133] The buggy address belongs to the physical page: [ 51.610929] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55 [ 51.611859] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.612630] page_type: f5(slab) [ 51.613177] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 51.614118] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 51.614890] page dumped because: kasan: bad access detected [ 51.615549] [ 51.615896] Memory state around the buggy address: [ 51.616527] fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 51.617461] fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 51.618388] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 51.619212] ^ [ 51.619893] fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.620711] fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.621670] ================================================================== [ 51.270566] ================================================================== [ 51.272236] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 51.273122] Read of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250 [ 51.274015] [ 51.274387] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 51.275542] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.276008] Hardware name: linux,dummy-virt (DT) [ 51.276682] Call trace: [ 51.277030] show_stack+0x20/0x38 (C) [ 51.277649] dump_stack_lvl+0x8c/0xd0 [ 51.278319] print_report+0x118/0x5e0 [ 51.278860] kasan_report+0xc8/0x118 [ 51.279393] __asan_report_load8_noabort+0x20/0x30 [ 51.280157] kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 51.280866] kasan_bitops_generic+0x110/0x1c8 [ 51.281452] kunit_try_run_case+0x14c/0x3d0 [ 51.282023] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.282876] kthread+0x24c/0x2d0 [ 51.283374] ret_from_fork+0x10/0x20 [ 51.283992] [ 51.284319] Allocated by task 250: [ 51.284824] kasan_save_stack+0x3c/0x68 [ 51.285523] kasan_save_track+0x20/0x40 [ 51.286160] kasan_save_alloc_info+0x40/0x58 [ 51.286795] __kasan_kmalloc+0xd4/0xd8 [ 51.287388] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.287889] kasan_bitops_generic+0xa0/0x1c8 [ 51.288594] kunit_try_run_case+0x14c/0x3d0 [ 51.289078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.289901] kthread+0x24c/0x2d0 [ 51.290469] ret_from_fork+0x10/0x20 [ 51.291081] [ 51.291470] The buggy address belongs to the object at fff00000c5f55320 [ 51.291470] which belongs to the cache kmalloc-16 of size 16 [ 51.292770] The buggy address is located 8 bytes inside of [ 51.292770] allocated 9-byte region [fff00000c5f55320, fff00000c5f55329) [ 51.294047] [ 51.294397] The buggy address belongs to the physical page: [ 51.295080] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55 [ 51.295971] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.296847] page_type: f5(slab) [ 51.297379] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 51.298236] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 51.299230] page dumped because: kasan: bad access detected [ 51.299950] [ 51.300253] Memory state around the buggy address: [ 51.300862] fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 51.301685] fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 51.302584] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 51.303479] ^ [ 51.304064] fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.304938] fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.305821] ================================================================== [ 51.422659] ================================================================== [ 51.423605] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 51.425283] Write of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250 [ 51.427066] [ 51.427390] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 51.428702] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.429544] Hardware name: linux,dummy-virt (DT) [ 51.430392] Call trace: [ 51.431232] show_stack+0x20/0x38 (C) [ 51.431822] dump_stack_lvl+0x8c/0xd0 [ 51.432541] print_report+0x118/0x5e0 [ 51.433119] kasan_report+0xc8/0x118 [ 51.433877] kasan_check_range+0x100/0x1a8 [ 51.434565] __kasan_check_write+0x20/0x30 [ 51.435154] kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 51.435876] kasan_bitops_generic+0x110/0x1c8 [ 51.436503] kunit_try_run_case+0x14c/0x3d0 [ 51.437080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.437832] kthread+0x24c/0x2d0 [ 51.438404] ret_from_fork+0x10/0x20 [ 51.439050] [ 51.439389] Allocated by task 250: [ 51.439868] kasan_save_stack+0x3c/0x68 [ 51.440423] kasan_save_track+0x20/0x40 [ 51.441039] kasan_save_alloc_info+0x40/0x58 [ 51.441660] __kasan_kmalloc+0xd4/0xd8 [ 51.442245] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.442875] kasan_bitops_generic+0xa0/0x1c8 [ 51.443504] kunit_try_run_case+0x14c/0x3d0 [ 51.444094] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.444820] kthread+0x24c/0x2d0 [ 51.445433] ret_from_fork+0x10/0x20 [ 51.445974] [ 51.446255] The buggy address belongs to the object at fff00000c5f55320 [ 51.446255] which belongs to the cache kmalloc-16 of size 16 [ 51.447766] The buggy address is located 8 bytes inside of [ 51.447766] allocated 9-byte region [fff00000c5f55320, fff00000c5f55329) [ 51.449092] [ 51.449407] The buggy address belongs to the physical page: [ 51.450051] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55 [ 51.451060] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.451852] page_type: f5(slab) [ 51.452352] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 51.453332] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 51.454226] page dumped because: kasan: bad access detected [ 51.454903] [ 51.455243] Memory state around the buggy address: [ 51.455832] fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 51.456725] fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 51.457582] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 51.458519] ^ [ 51.459075] fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.459989] fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.460877] ================================================================== [ 51.542818] ================================================================== [ 51.543578] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 51.544570] Write of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250 [ 51.545404] [ 51.545967] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 51.547453] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.548020] Hardware name: linux,dummy-virt (DT) [ 51.548673] Call trace: [ 51.549215] show_stack+0x20/0x38 (C) [ 51.549953] dump_stack_lvl+0x8c/0xd0 [ 51.550604] print_report+0x118/0x5e0 [ 51.551235] kasan_report+0xc8/0x118 [ 51.551872] kasan_check_range+0x100/0x1a8 [ 51.552549] __kasan_check_write+0x20/0x30 [ 51.553214] kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 51.553996] kasan_bitops_generic+0x110/0x1c8 [ 51.554710] kunit_try_run_case+0x14c/0x3d0 [ 51.555408] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.556187] kthread+0x24c/0x2d0 [ 51.556827] ret_from_fork+0x10/0x20 [ 51.557513] [ 51.557908] Allocated by task 250: [ 51.558478] kasan_save_stack+0x3c/0x68 [ 51.559188] kasan_save_track+0x20/0x40 [ 51.559831] kasan_save_alloc_info+0x40/0x58 [ 51.560564] __kasan_kmalloc+0xd4/0xd8 [ 51.561187] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.561925] kasan_bitops_generic+0xa0/0x1c8 [ 51.562697] kunit_try_run_case+0x14c/0x3d0 [ 51.563374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.564228] kthread+0x24c/0x2d0 [ 51.564932] ret_from_fork+0x10/0x20 [ 51.565561] [ 51.565905] The buggy address belongs to the object at fff00000c5f55320 [ 51.565905] which belongs to the cache kmalloc-16 of size 16 [ 51.567381] The buggy address is located 8 bytes inside of [ 51.567381] allocated 9-byte region [fff00000c5f55320, fff00000c5f55329) [ 51.568885] [ 51.569352] The buggy address belongs to the physical page: [ 51.570093] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55 [ 51.571163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.571992] page_type: f5(slab) [ 51.572536] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 51.573539] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 51.574568] page dumped because: kasan: bad access detected [ 51.575285] [ 51.575652] Memory state around the buggy address: [ 51.576379] fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 51.577407] fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 51.578521] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 51.579575] ^ [ 51.580091] fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.580997] fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.581794] ================================================================== [ 51.307538] ================================================================== [ 51.308145] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 51.310059] Write of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250 [ 51.310767] [ 51.311094] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 51.312375] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.313212] Hardware name: linux,dummy-virt (DT) [ 51.313776] Call trace: [ 51.314220] show_stack+0x20/0x38 (C) [ 51.314797] dump_stack_lvl+0x8c/0xd0 [ 51.315330] print_report+0x118/0x5e0 [ 51.315970] kasan_report+0xc8/0x118 [ 51.316567] kasan_check_range+0x100/0x1a8 [ 51.317093] __kasan_check_write+0x20/0x30 [ 51.317792] kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 51.318473] kasan_bitops_generic+0x110/0x1c8 [ 51.319218] kunit_try_run_case+0x14c/0x3d0 [ 51.319829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.320608] kthread+0x24c/0x2d0 [ 51.321144] ret_from_fork+0x10/0x20 [ 51.321785] [ 51.322080] Allocated by task 250: [ 51.322698] kasan_save_stack+0x3c/0x68 [ 51.323287] kasan_save_track+0x20/0x40 [ 51.323890] kasan_save_alloc_info+0x40/0x58 [ 51.324518] __kasan_kmalloc+0xd4/0xd8 [ 51.325078] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.325663] kasan_bitops_generic+0xa0/0x1c8 [ 51.326313] kunit_try_run_case+0x14c/0x3d0 [ 51.326888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.327631] kthread+0x24c/0x2d0 [ 51.328158] ret_from_fork+0x10/0x20 [ 51.328683] [ 51.329027] The buggy address belongs to the object at fff00000c5f55320 [ 51.329027] which belongs to the cache kmalloc-16 of size 16 [ 51.330514] The buggy address is located 8 bytes inside of [ 51.330514] allocated 9-byte region [fff00000c5f55320, fff00000c5f55329) [ 51.331834] [ 51.332157] The buggy address belongs to the physical page: [ 51.332786] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55 [ 51.333758] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.334611] page_type: f5(slab) [ 51.335189] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 51.336208] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 51.337120] page dumped because: kasan: bad access detected [ 51.337744] [ 51.338031] Memory state around the buggy address: [ 51.338779] fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 51.339686] fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 51.340526] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 51.341355] ^ [ 51.341965] fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.342805] fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.343671] ================================================================== [ 51.500423] ================================================================== [ 51.502243] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 51.503686] Write of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250 [ 51.504605] [ 51.504911] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 51.506218] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.507002] Hardware name: linux,dummy-virt (DT) [ 51.507733] Call trace: [ 51.508250] show_stack+0x20/0x38 (C) [ 51.508939] dump_stack_lvl+0x8c/0xd0 [ 51.509593] print_report+0x118/0x5e0 [ 51.510158] kasan_report+0xc8/0x118 [ 51.510905] kasan_check_range+0x100/0x1a8 [ 51.511635] __kasan_check_write+0x20/0x30 [ 51.512282] kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 51.513124] kasan_bitops_generic+0x110/0x1c8 [ 51.513890] kunit_try_run_case+0x14c/0x3d0 [ 51.514680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.515468] kthread+0x24c/0x2d0 [ 51.516071] ret_from_fork+0x10/0x20 [ 51.516682] [ 51.517030] Allocated by task 250: [ 51.517710] kasan_save_stack+0x3c/0x68 [ 51.518325] kasan_save_track+0x20/0x40 [ 51.518985] kasan_save_alloc_info+0x40/0x58 [ 51.519692] __kasan_kmalloc+0xd4/0xd8 [ 51.520399] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.521066] kasan_bitops_generic+0xa0/0x1c8 [ 51.521732] kunit_try_run_case+0x14c/0x3d0 [ 51.522412] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.523138] kthread+0x24c/0x2d0 [ 51.523691] ret_from_fork+0x10/0x20 [ 51.524362] [ 51.524775] The buggy address belongs to the object at fff00000c5f55320 [ 51.524775] which belongs to the cache kmalloc-16 of size 16 [ 51.526263] The buggy address is located 8 bytes inside of [ 51.526263] allocated 9-byte region [fff00000c5f55320, fff00000c5f55329) [ 51.527810] [ 51.528150] The buggy address belongs to the physical page: [ 51.528960] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55 [ 51.529995] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.530873] page_type: f5(slab) [ 51.531422] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 51.532428] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 51.533410] page dumped because: kasan: bad access detected [ 51.534158] [ 51.534632] Memory state around the buggy address: [ 51.535250] fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 51.536271] fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 51.537143] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 51.538030] ^ [ 51.538761] fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.539674] fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.540640] ================================================================== [ 51.385004] ================================================================== [ 51.385711] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 51.387047] Write of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250 [ 51.388123] [ 51.388450] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 51.389822] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.390268] Hardware name: linux,dummy-virt (DT) [ 51.390963] Call trace: [ 51.391383] show_stack+0x20/0x38 (C) [ 51.392093] dump_stack_lvl+0x8c/0xd0 [ 51.392872] print_report+0x118/0x5e0 [ 51.393430] kasan_report+0xc8/0x118 [ 51.394056] kasan_check_range+0x100/0x1a8 [ 51.394849] __kasan_check_write+0x20/0x30 [ 51.395418] kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 51.396146] kasan_bitops_generic+0x110/0x1c8 [ 51.396799] kunit_try_run_case+0x14c/0x3d0 [ 51.397389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.398140] kthread+0x24c/0x2d0 [ 51.398751] ret_from_fork+0x10/0x20 [ 51.399314] [ 51.399612] Allocated by task 250: [ 51.400146] kasan_save_stack+0x3c/0x68 [ 51.400787] kasan_save_track+0x20/0x40 [ 51.401417] kasan_save_alloc_info+0x40/0x58 [ 51.402016] __kasan_kmalloc+0xd4/0xd8 [ 51.402610] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.403175] kasan_bitops_generic+0xa0/0x1c8 [ 51.403856] kunit_try_run_case+0x14c/0x3d0 [ 51.404473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.405094] kthread+0x24c/0x2d0 [ 51.405710] ret_from_fork+0x10/0x20 [ 51.406251] [ 51.406662] The buggy address belongs to the object at fff00000c5f55320 [ 51.406662] which belongs to the cache kmalloc-16 of size 16 [ 51.407956] The buggy address is located 8 bytes inside of [ 51.407956] allocated 9-byte region [fff00000c5f55320, fff00000c5f55329) [ 51.409278] [ 51.409633] The buggy address belongs to the physical page: [ 51.410396] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55 [ 51.411233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.412095] page_type: f5(slab) [ 51.412701] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 51.413636] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 51.414593] page dumped because: kasan: bad access detected [ 51.415255] [ 51.415559] Memory state around the buggy address: [ 51.416130] fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 51.417040] fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 51.417802] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 51.418698] ^ [ 51.419307] fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.420185] fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.421106] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 51.167889] ================================================================== [ 51.170211] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 51.170728] Read of size 1 at addr fff00000c616c150 by task kunit_try_catch/248 [ 51.171268] [ 51.173981] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 51.175936] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.176723] Hardware name: linux,dummy-virt (DT) [ 51.177401] Call trace: [ 51.178037] show_stack+0x20/0x38 (C) [ 51.179338] dump_stack_lvl+0x8c/0xd0 [ 51.179922] print_report+0x118/0x5e0 [ 51.180523] kasan_report+0xc8/0x118 [ 51.181130] __asan_report_load1_noabort+0x20/0x30 [ 51.181826] strnlen+0x80/0x88 [ 51.182445] kasan_strings+0x380/0x8f8 [ 51.182993] kunit_try_run_case+0x14c/0x3d0 [ 51.184085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.184755] kthread+0x24c/0x2d0 [ 51.185649] ret_from_fork+0x10/0x20 [ 51.186211] [ 51.186594] Allocated by task 248: [ 51.187097] kasan_save_stack+0x3c/0x68 [ 51.187664] kasan_save_track+0x20/0x40 [ 51.188382] kasan_save_alloc_info+0x40/0x58 [ 51.189133] __kasan_kmalloc+0xd4/0xd8 [ 51.190133] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.190923] kasan_strings+0xb4/0x8f8 [ 51.191854] kunit_try_run_case+0x14c/0x3d0 [ 51.192387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.193352] kthread+0x24c/0x2d0 [ 51.193942] ret_from_fork+0x10/0x20 [ 51.194639] [ 51.195161] Freed by task 248: [ 51.195658] kasan_save_stack+0x3c/0x68 [ 51.196391] kasan_save_track+0x20/0x40 [ 51.197271] kasan_save_free_info+0x4c/0x78 [ 51.198525] __kasan_slab_free+0x6c/0x98 [ 51.199468] kfree+0x114/0x3c8 [ 51.199992] kasan_strings+0x128/0x8f8 [ 51.200499] kunit_try_run_case+0x14c/0x3d0 [ 51.200807] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.201558] kthread+0x24c/0x2d0 [ 51.202633] ret_from_fork+0x10/0x20 [ 51.203603] [ 51.203930] The buggy address belongs to the object at fff00000c616c140 [ 51.203930] which belongs to the cache kmalloc-32 of size 32 [ 51.205819] The buggy address is located 16 bytes inside of [ 51.205819] freed 32-byte region [fff00000c616c140, fff00000c616c160) [ 51.208163] [ 51.208636] The buggy address belongs to the physical page: [ 51.209391] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616c [ 51.210700] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.211464] page_type: f5(slab) [ 51.212284] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 51.213440] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 51.214264] page dumped because: kasan: bad access detected [ 51.215007] [ 51.215414] Memory state around the buggy address: [ 51.216095] fff00000c616c000: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 51.216842] fff00000c616c080: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 51.218183] >fff00000c616c100: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 51.219012] ^ [ 51.219766] fff00000c616c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.220672] fff00000c616c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.222108] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[ 51.111184] ================================================================== [ 51.111831] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 51.112999] Read of size 1 at addr fff00000c616c150 by task kunit_try_catch/248 [ 51.114790] [ 51.115073] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 51.116652] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.117601] Hardware name: linux,dummy-virt (DT) [ 51.118801] Call trace: [ 51.119349] show_stack+0x20/0x38 (C) [ 51.119855] dump_stack_lvl+0x8c/0xd0 [ 51.120466] print_report+0x118/0x5e0 [ 51.121091] kasan_report+0xc8/0x118 [ 51.121986] __asan_report_load1_noabort+0x20/0x30 [ 51.122774] strlen+0xa8/0xb0 [ 51.123388] kasan_strings+0x320/0x8f8 [ 51.124072] kunit_try_run_case+0x14c/0x3d0 [ 51.124834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.126006] kthread+0x24c/0x2d0 [ 51.126595] ret_from_fork+0x10/0x20 [ 51.127307] [ 51.127823] Allocated by task 248: [ 51.128417] kasan_save_stack+0x3c/0x68 [ 51.129084] kasan_save_track+0x20/0x40 [ 51.129625] kasan_save_alloc_info+0x40/0x58 [ 51.130331] __kasan_kmalloc+0xd4/0xd8 [ 51.130928] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.131975] kasan_strings+0xb4/0x8f8 [ 51.132469] kunit_try_run_case+0x14c/0x3d0 [ 51.133913] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.134649] kthread+0x24c/0x2d0 [ 51.135127] ret_from_fork+0x10/0x20 [ 51.135708] [ 51.136097] Freed by task 248: [ 51.136762] kasan_save_stack+0x3c/0x68 [ 51.138036] kasan_save_track+0x20/0x40 [ 51.139361] kasan_save_free_info+0x4c/0x78 [ 51.140319] __kasan_slab_free+0x6c/0x98 [ 51.140953] kfree+0x114/0x3c8 [ 51.141938] kasan_strings+0x128/0x8f8 [ 51.142744] kunit_try_run_case+0x14c/0x3d0 [ 51.143362] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.144076] kthread+0x24c/0x2d0 [ 51.144617] ret_from_fork+0x10/0x20 [ 51.145251] [ 51.145603] The buggy address belongs to the object at fff00000c616c140 [ 51.145603] which belongs to the cache kmalloc-32 of size 32 [ 51.147168] The buggy address is located 16 bytes inside of [ 51.147168] freed 32-byte region [fff00000c616c140, fff00000c616c160) [ 51.148571] [ 51.148864] The buggy address belongs to the physical page: [ 51.150283] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616c [ 51.151255] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.152180] page_type: f5(slab) [ 51.152844] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 51.154164] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 51.155108] page dumped because: kasan: bad access detected [ 51.155817] [ 51.156168] Memory state around the buggy address: [ 51.156868] fff00000c616c000: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 51.158022] fff00000c616c080: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 51.159817] >fff00000c616c100: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 51.160490] ^ [ 51.161895] fff00000c616c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.163773] fff00000c616c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.165209] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 51.058091] ================================================================== [ 51.058991] BUG: KASAN: slab-use-after-free in kasan_strings+0x858/0x8f8 [ 51.060075] Read of size 1 at addr fff00000c616c150 by task kunit_try_catch/248 [ 51.060971] [ 51.061731] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 51.063056] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.063731] Hardware name: linux,dummy-virt (DT) [ 51.064365] Call trace: [ 51.064904] show_stack+0x20/0x38 (C) [ 51.066241] dump_stack_lvl+0x8c/0xd0 [ 51.066849] print_report+0x118/0x5e0 [ 51.067474] kasan_report+0xc8/0x118 [ 51.068161] __asan_report_load1_noabort+0x20/0x30 [ 51.068974] kasan_strings+0x858/0x8f8 [ 51.069625] kunit_try_run_case+0x14c/0x3d0 [ 51.070698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.071501] kthread+0x24c/0x2d0 [ 51.072183] ret_from_fork+0x10/0x20 [ 51.072716] [ 51.072964] Allocated by task 248: [ 51.073829] kasan_save_stack+0x3c/0x68 [ 51.074489] kasan_save_track+0x20/0x40 [ 51.075213] kasan_save_alloc_info+0x40/0x58 [ 51.076573] __kasan_kmalloc+0xd4/0xd8 [ 51.077192] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.078047] kasan_strings+0xb4/0x8f8 [ 51.078673] kunit_try_run_case+0x14c/0x3d0 [ 51.079377] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.080225] kthread+0x24c/0x2d0 [ 51.080918] ret_from_fork+0x10/0x20 [ 51.081431] [ 51.081813] Freed by task 248: [ 51.082256] kasan_save_stack+0x3c/0x68 [ 51.082812] kasan_save_track+0x20/0x40 [ 51.083485] kasan_save_free_info+0x4c/0x78 [ 51.083960] __kasan_slab_free+0x6c/0x98 [ 51.085068] kfree+0x114/0x3c8 [ 51.086143] kasan_strings+0x128/0x8f8 [ 51.087155] kunit_try_run_case+0x14c/0x3d0 [ 51.087962] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.088774] kthread+0x24c/0x2d0 [ 51.089898] ret_from_fork+0x10/0x20 [ 51.090703] [ 51.091059] The buggy address belongs to the object at fff00000c616c140 [ 51.091059] which belongs to the cache kmalloc-32 of size 32 [ 51.092831] The buggy address is located 16 bytes inside of [ 51.092831] freed 32-byte region [fff00000c616c140, fff00000c616c160) [ 51.095256] [ 51.095541] The buggy address belongs to the physical page: [ 51.096416] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616c [ 51.097398] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.098322] page_type: f5(slab) [ 51.098815] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 51.100017] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 51.100979] page dumped because: kasan: bad access detected [ 51.102357] [ 51.102650] Memory state around the buggy address: [ 51.103664] fff00000c616c000: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 51.104531] fff00000c616c080: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 51.105829] >fff00000c616c100: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 51.106602] ^ [ 51.107287] fff00000c616c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.108119] fff00000c616c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.109077] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 51.006365] ================================================================== [ 51.007709] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 51.008496] Read of size 1 at addr fff00000c616c150 by task kunit_try_catch/248 [ 51.009534] [ 51.010384] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 51.011634] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.012782] Hardware name: linux,dummy-virt (DT) [ 51.013639] Call trace: [ 51.014221] show_stack+0x20/0x38 (C) [ 51.014868] dump_stack_lvl+0x8c/0xd0 [ 51.015432] print_report+0x118/0x5e0 [ 51.015974] kasan_report+0xc8/0x118 [ 51.016620] __asan_report_load1_noabort+0x20/0x30 [ 51.017754] strcmp+0xc0/0xc8 [ 51.018426] kasan_strings+0x248/0x8f8 [ 51.019020] kunit_try_run_case+0x14c/0x3d0 [ 51.019736] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.020538] kthread+0x24c/0x2d0 [ 51.021231] ret_from_fork+0x10/0x20 [ 51.021646] [ 51.021815] Allocated by task 248: [ 51.022067] kasan_save_stack+0x3c/0x68 [ 51.022379] kasan_save_track+0x20/0x40 [ 51.022675] kasan_save_alloc_info+0x40/0x58 [ 51.022974] __kasan_kmalloc+0xd4/0xd8 [ 51.023249] __kmalloc_cache_noprof+0x15c/0x3c0 [ 51.025143] kasan_strings+0xb4/0x8f8 [ 51.025895] kunit_try_run_case+0x14c/0x3d0 [ 51.026774] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.027331] kthread+0x24c/0x2d0 [ 51.028225] ret_from_fork+0x10/0x20 [ 51.029040] [ 51.029312] Freed by task 248: [ 51.029860] kasan_save_stack+0x3c/0x68 [ 51.030716] kasan_save_track+0x20/0x40 [ 51.031386] kasan_save_free_info+0x4c/0x78 [ 51.031973] __kasan_slab_free+0x6c/0x98 [ 51.032522] kfree+0x114/0x3c8 [ 51.033916] kasan_strings+0x128/0x8f8 [ 51.034490] kunit_try_run_case+0x14c/0x3d0 [ 51.035072] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.035806] kthread+0x24c/0x2d0 [ 51.036420] ret_from_fork+0x10/0x20 [ 51.037157] [ 51.037521] The buggy address belongs to the object at fff00000c616c140 [ 51.037521] which belongs to the cache kmalloc-32 of size 32 [ 51.039440] The buggy address is located 16 bytes inside of [ 51.039440] freed 32-byte region [fff00000c616c140, fff00000c616c160) [ 51.040893] [ 51.041386] The buggy address belongs to the physical page: [ 51.042772] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616c [ 51.043860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.044830] page_type: f5(slab) [ 51.045352] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 51.046624] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 51.047504] page dumped because: kasan: bad access detected [ 51.048214] [ 51.048619] Memory state around the buggy address: [ 51.049409] fff00000c616c000: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 51.050989] fff00000c616c080: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 51.052055] >fff00000c616c100: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 51.053028] ^ [ 51.053751] fff00000c616c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.054590] fff00000c616c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.055351] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strrchr
[ 50.953219] ================================================================== [ 50.955085] BUG: KASAN: slab-use-after-free in strrchr+0x6c/0x78 [ 50.955836] Read of size 1 at addr fff00000c616c150 by task kunit_try_catch/248 [ 50.956706] [ 50.957051] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 50.958262] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.959540] Hardware name: linux,dummy-virt (DT) [ 50.960187] Call trace: [ 50.960589] show_stack+0x20/0x38 (C) [ 50.961681] dump_stack_lvl+0x8c/0xd0 [ 50.962250] print_report+0x118/0x5e0 [ 50.962822] kasan_report+0xc8/0x118 [ 50.963650] __asan_report_load1_noabort+0x20/0x30 [ 50.964330] strrchr+0x6c/0x78 [ 50.964801] kasan_strings+0x1e0/0x8f8 [ 50.965603] kunit_try_run_case+0x14c/0x3d0 [ 50.966361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.967110] kthread+0x24c/0x2d0 [ 50.967877] ret_from_fork+0x10/0x20 [ 50.968526] [ 50.968917] Allocated by task 248: [ 50.969507] kasan_save_stack+0x3c/0x68 [ 50.970148] kasan_save_track+0x20/0x40 [ 50.970892] kasan_save_alloc_info+0x40/0x58 [ 50.972091] __kasan_kmalloc+0xd4/0xd8 [ 50.972660] __kmalloc_cache_noprof+0x15c/0x3c0 [ 50.973251] kasan_strings+0xb4/0x8f8 [ 50.973760] kunit_try_run_case+0x14c/0x3d0 [ 50.974860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.975532] kthread+0x24c/0x2d0 [ 50.976096] ret_from_fork+0x10/0x20 [ 50.976638] [ 50.976996] Freed by task 248: [ 50.977592] kasan_save_stack+0x3c/0x68 [ 50.978131] kasan_save_track+0x20/0x40 [ 50.978845] kasan_save_free_info+0x4c/0x78 [ 50.979862] __kasan_slab_free+0x6c/0x98 [ 50.980489] kfree+0x114/0x3c8 [ 50.981190] kasan_strings+0x128/0x8f8 [ 50.982213] kunit_try_run_case+0x14c/0x3d0 [ 50.983022] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.983748] kthread+0x24c/0x2d0 [ 50.984584] ret_from_fork+0x10/0x20 [ 50.985151] [ 50.985776] The buggy address belongs to the object at fff00000c616c140 [ 50.985776] which belongs to the cache kmalloc-32 of size 32 [ 50.987683] The buggy address is located 16 bytes inside of [ 50.987683] freed 32-byte region [fff00000c616c140, fff00000c616c160) [ 50.988988] [ 50.989669] The buggy address belongs to the physical page: [ 50.990321] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616c [ 50.991596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.992544] page_type: f5(slab) [ 50.993338] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 50.994866] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 50.995940] page dumped because: kasan: bad access detected [ 50.996856] [ 50.997222] Memory state around the buggy address: [ 50.998359] fff00000c616c000: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 50.999619] fff00000c616c080: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 51.000757] >fff00000c616c100: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 51.001798] ^ [ 51.002904] fff00000c616c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.003734] fff00000c616c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.004517] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strchr
[ 50.900709] ================================================================== [ 50.902844] BUG: KASAN: slab-use-after-free in strchr+0xcc/0xd8 [ 50.903649] Read of size 1 at addr fff00000c616c150 by task kunit_try_catch/248 [ 50.904463] [ 50.904924] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 50.906820] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.907593] Hardware name: linux,dummy-virt (DT) [ 50.908392] Call trace: [ 50.908938] show_stack+0x20/0x38 (C) [ 50.909515] dump_stack_lvl+0x8c/0xd0 [ 50.910852] print_report+0x118/0x5e0 [ 50.911982] kasan_report+0xc8/0x118 [ 50.912755] __asan_report_load1_noabort+0x20/0x30 [ 50.913552] strchr+0xcc/0xd8 [ 50.914524] kasan_strings+0x180/0x8f8 [ 50.915059] kunit_try_run_case+0x14c/0x3d0 [ 50.915723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.916502] kthread+0x24c/0x2d0 [ 50.917312] ret_from_fork+0x10/0x20 [ 50.918207] [ 50.918522] Allocated by task 248: [ 50.919063] kasan_save_stack+0x3c/0x68 [ 50.919694] kasan_save_track+0x20/0x40 [ 50.920517] kasan_save_alloc_info+0x40/0x58 [ 50.921245] __kasan_kmalloc+0xd4/0xd8 [ 50.921980] __kmalloc_cache_noprof+0x15c/0x3c0 [ 50.922638] kasan_strings+0xb4/0x8f8 [ 50.923284] kunit_try_run_case+0x14c/0x3d0 [ 50.923865] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.924666] kthread+0x24c/0x2d0 [ 50.925361] ret_from_fork+0x10/0x20 [ 50.925791] [ 50.926149] Freed by task 248: [ 50.926760] kasan_save_stack+0x3c/0x68 [ 50.928016] kasan_save_track+0x20/0x40 [ 50.928614] kasan_save_free_info+0x4c/0x78 [ 50.929184] __kasan_slab_free+0x6c/0x98 [ 50.929826] kfree+0x114/0x3c8 [ 50.930711] kasan_strings+0x128/0x8f8 [ 50.931258] kunit_try_run_case+0x14c/0x3d0 [ 50.931877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.932506] kthread+0x24c/0x2d0 [ 50.933559] ret_from_fork+0x10/0x20 [ 50.934004] [ 50.934377] The buggy address belongs to the object at fff00000c616c140 [ 50.934377] which belongs to the cache kmalloc-32 of size 32 [ 50.935859] The buggy address is located 16 bytes inside of [ 50.935859] freed 32-byte region [fff00000c616c140, fff00000c616c160) [ 50.938036] [ 50.938282] The buggy address belongs to the physical page: [ 50.939030] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616c [ 50.939915] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.940827] page_type: f5(slab) [ 50.942065] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 50.943014] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 50.943932] page dumped because: kasan: bad access detected [ 50.944617] [ 50.944904] Memory state around the buggy address: [ 50.945570] fff00000c616c000: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 50.946384] fff00000c616c080: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 50.947261] >fff00000c616c100: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 50.948533] ^ [ 50.949617] fff00000c616c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.950502] fff00000c616c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.951835] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 50.851899] ================================================================== [ 50.853002] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 50.853697] Read of size 1 at addr fff00000c616c018 by task kunit_try_catch/246 [ 50.855462] [ 50.855904] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 50.857235] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.857785] Hardware name: linux,dummy-virt (DT) [ 50.858668] Call trace: [ 50.859058] show_stack+0x20/0x38 (C) [ 50.859580] dump_stack_lvl+0x8c/0xd0 [ 50.860121] print_report+0x118/0x5e0 [ 50.860743] kasan_report+0xc8/0x118 [ 50.861691] __asan_report_load1_noabort+0x20/0x30 [ 50.862433] memcmp+0x198/0x1d8 [ 50.862988] kasan_memcmp+0x16c/0x300 [ 50.863791] kunit_try_run_case+0x14c/0x3d0 [ 50.864457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.865287] kthread+0x24c/0x2d0 [ 50.865833] ret_from_fork+0x10/0x20 [ 50.866425] [ 50.866798] Allocated by task 246: [ 50.867584] kasan_save_stack+0x3c/0x68 [ 50.868173] kasan_save_track+0x20/0x40 [ 50.868732] kasan_save_alloc_info+0x40/0x58 [ 50.869699] __kasan_kmalloc+0xd4/0xd8 [ 50.870248] __kmalloc_cache_noprof+0x15c/0x3c0 [ 50.870873] kasan_memcmp+0xbc/0x300 [ 50.871452] kunit_try_run_case+0x14c/0x3d0 [ 50.872071] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.872628] kthread+0x24c/0x2d0 [ 50.873115] ret_from_fork+0x10/0x20 [ 50.873744] [ 50.874100] The buggy address belongs to the object at fff00000c616c000 [ 50.874100] which belongs to the cache kmalloc-32 of size 32 [ 50.875896] The buggy address is located 0 bytes to the right of [ 50.875896] allocated 24-byte region [fff00000c616c000, fff00000c616c018) [ 50.877729] [ 50.878057] The buggy address belongs to the physical page: [ 50.878752] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616c [ 50.879732] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.880623] page_type: f5(slab) [ 50.881410] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 50.882352] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 50.883212] page dumped because: kasan: bad access detected [ 50.883940] [ 50.884225] Memory state around the buggy address: [ 50.884959] fff00000c616bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.886153] fff00000c616bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.887123] >fff00000c616c000: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.887984] ^ [ 50.888527] fff00000c616c080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.889696] fff00000c616c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.890562] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memchr
[ 50.802507] ================================================================== [ 50.803609] BUG: KASAN: slab-out-of-bounds in memchr+0x78/0x88 [ 50.804446] Read of size 1 at addr fff00000c613b298 by task kunit_try_catch/244 [ 50.805149] [ 50.805549] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 50.806778] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.807584] Hardware name: linux,dummy-virt (DT) [ 50.808243] Call trace: [ 50.808654] show_stack+0x20/0x38 (C) [ 50.809736] dump_stack_lvl+0x8c/0xd0 [ 50.810319] print_report+0x118/0x5e0 [ 50.810867] kasan_report+0xc8/0x118 [ 50.811394] __asan_report_load1_noabort+0x20/0x30 [ 50.812127] memchr+0x78/0x88 [ 50.812718] kasan_memchr+0x148/0x2d8 [ 50.813213] kunit_try_run_case+0x14c/0x3d0 [ 50.813946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.814704] kthread+0x24c/0x2d0 [ 50.815530] ret_from_fork+0x10/0x20 [ 50.816144] [ 50.816473] Allocated by task 244: [ 50.817025] kasan_save_stack+0x3c/0x68 [ 50.817898] kasan_save_track+0x20/0x40 [ 50.818580] kasan_save_alloc_info+0x40/0x58 [ 50.819121] __kasan_kmalloc+0xd4/0xd8 [ 50.819637] __kmalloc_cache_noprof+0x15c/0x3c0 [ 50.820342] kasan_memchr+0xb0/0x2d8 [ 50.820977] kunit_try_run_case+0x14c/0x3d0 [ 50.822084] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.822968] kthread+0x24c/0x2d0 [ 50.823742] ret_from_fork+0x10/0x20 [ 50.824547] [ 50.824926] The buggy address belongs to the object at fff00000c613b280 [ 50.824926] which belongs to the cache kmalloc-32 of size 32 [ 50.826781] The buggy address is located 0 bytes to the right of [ 50.826781] allocated 24-byte region [fff00000c613b280, fff00000c613b298) [ 50.828339] [ 50.828692] The buggy address belongs to the physical page: [ 50.829875] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613b [ 50.830873] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.831714] page_type: f5(slab) [ 50.832186] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 50.833377] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 50.834436] page dumped because: kasan: bad access detected [ 50.835270] [ 50.835610] Memory state around the buggy address: [ 50.836556] fff00000c613b180: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 50.837812] fff00000c613b200: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 50.838779] >fff00000c613b280: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.839637] ^ [ 50.840192] fff00000c613b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.841102] fff00000c613b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.842620] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 50.760680] ================================================================== [ 50.761837] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2e4/0x348 [ 50.762871] Read of size 1 at addr ffff800080a87bea by task kunit_try_catch/242 [ 50.764162] [ 50.764597] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 50.766286] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.766891] Hardware name: linux,dummy-virt (DT) [ 50.767535] Call trace: [ 50.768042] show_stack+0x20/0x38 (C) [ 50.768679] dump_stack_lvl+0x8c/0xd0 [ 50.769520] print_report+0x2fc/0x5e0 [ 50.770114] kasan_report+0xc8/0x118 [ 50.770710] __asan_report_load1_noabort+0x20/0x30 [ 50.771361] kasan_alloca_oob_right+0x2e4/0x348 [ 50.772059] kunit_try_run_case+0x14c/0x3d0 [ 50.772700] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.773546] kthread+0x24c/0x2d0 [ 50.774334] ret_from_fork+0x10/0x20 [ 50.774957] [ 50.775490] The buggy address belongs to stack of task kunit_try_catch/242 [ 50.776509] [ 50.776818] The buggy address belongs to the virtual mapping at [ 50.776818] [ffff800080a80000, ffff800080a89000) created by: [ 50.776818] kernel_clone+0x140/0x788 [ 50.779051] [ 50.779538] The buggy address belongs to the physical page: [ 50.780279] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106149 [ 50.781379] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.782163] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 50.783111] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 50.784461] page dumped because: kasan: bad access detected [ 50.785639] [ 50.786078] Memory state around the buggy address: [ 50.786693] ffff800080a87a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.787670] ffff800080a87b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.788645] >ffff800080a87b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 50.789720] ^ [ 50.790747] ffff800080a87c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 [ 50.791562] ffff800080a87c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 [ 50.792367] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 50.720637] ================================================================== [ 50.722105] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 50.723176] Read of size 1 at addr ffff800080a97bdf by task kunit_try_catch/240 [ 50.724542] [ 50.725222] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 50.726383] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.726913] Hardware name: linux,dummy-virt (DT) [ 50.727477] Call trace: [ 50.728022] show_stack+0x20/0x38 (C) [ 50.728760] dump_stack_lvl+0x8c/0xd0 [ 50.729578] print_report+0x2fc/0x5e0 [ 50.730014] kasan_report+0xc8/0x118 [ 50.730636] __asan_report_load1_noabort+0x20/0x30 [ 50.731334] kasan_alloca_oob_left+0x2b8/0x310 [ 50.731839] kunit_try_run_case+0x14c/0x3d0 [ 50.732557] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.733129] kthread+0x24c/0x2d0 [ 50.733767] ret_from_fork+0x10/0x20 [ 50.734369] [ 50.734795] The buggy address belongs to stack of task kunit_try_catch/240 [ 50.735998] [ 50.736338] The buggy address belongs to the virtual mapping at [ 50.736338] [ffff800080a90000, ffff800080a99000) created by: [ 50.736338] kernel_clone+0x140/0x788 [ 50.738806] [ 50.739091] The buggy address belongs to the physical page: [ 50.740037] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613c [ 50.741010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.742125] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 50.742980] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 50.743916] page dumped because: kasan: bad access detected [ 50.744612] [ 50.744931] Memory state around the buggy address: [ 50.745851] ffff800080a97a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.747287] ffff800080a97b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.748402] >ffff800080a97b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 50.749241] ^ [ 50.749999] ffff800080a97c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 [ 50.751161] ffff800080a97c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 [ 50.751989] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 50.672279] ================================================================== [ 50.674582] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x230/0x268 [ 50.675456] Read of size 1 at addr ffff800080a47cba by task kunit_try_catch/238 [ 50.676788] [ 50.677279] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 50.678710] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.679485] Hardware name: linux,dummy-virt (DT) [ 50.680176] Call trace: [ 50.680584] show_stack+0x20/0x38 (C) [ 50.681416] dump_stack_lvl+0x8c/0xd0 [ 50.681981] print_report+0x2fc/0x5e0 [ 50.682511] kasan_report+0xc8/0x118 [ 50.683097] __asan_report_load1_noabort+0x20/0x30 [ 50.683828] kasan_stack_oob+0x230/0x268 [ 50.684453] kunit_try_run_case+0x14c/0x3d0 [ 50.685362] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.686152] kthread+0x24c/0x2d0 [ 50.686719] ret_from_fork+0x10/0x20 [ 50.687350] [ 50.687739] The buggy address belongs to stack of task kunit_try_catch/238 [ 50.688730] and is located at offset 138 in frame: [ 50.689730] kasan_stack_oob+0x0/0x268 [ 50.690491] [ 50.690900] This frame has 4 objects: [ 50.691747] [48, 49) '__assertion' [ 50.691887] [64, 72) 'array' [ 50.692386] [96, 112) '__assertion' [ 50.692827] [128, 138) 'stack_array' [ 50.693488] [ 50.694117] The buggy address belongs to the virtual mapping at [ 50.694117] [ffff800080a40000, ffff800080a49000) created by: [ 50.694117] kernel_clone+0x140/0x788 [ 50.696322] [ 50.696883] The buggy address belongs to the physical page: [ 50.697897] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 50.698921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.700003] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 50.701003] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 50.701880] page dumped because: kasan: bad access detected [ 50.702863] [ 50.703356] Memory state around the buggy address: [ 50.704168] ffff800080a47b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.705236] ffff800080a47c00: 00 00 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 [ 50.706578] >ffff800080a47c80: f2 f2 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 [ 50.707527] ^ [ 50.708321] ffff800080a47d00: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 [ 50.709432] ffff800080a47d80: f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 [ 50.710412] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 50.616559] ================================================================== [ 50.618332] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 50.618983] Read of size 1 at addr ffffa1fda44d906d by task kunit_try_catch/234 [ 50.620093] [ 50.620551] CPU: 1 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 50.622470] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.623249] Hardware name: linux,dummy-virt (DT) [ 50.624075] Call trace: [ 50.624421] show_stack+0x20/0x38 (C) [ 50.625353] dump_stack_lvl+0x8c/0xd0 [ 50.626055] print_report+0x2fc/0x5e0 [ 50.626734] kasan_report+0xc8/0x118 [ 50.627351] __asan_report_load1_noabort+0x20/0x30 [ 50.628138] kasan_global_oob_right+0x230/0x270 [ 50.628847] kunit_try_run_case+0x14c/0x3d0 [ 50.630039] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.630820] kthread+0x24c/0x2d0 [ 50.631354] ret_from_fork+0x10/0x20 [ 50.631976] [ 50.632367] The buggy address belongs to the variable: [ 50.633181] global_array+0xd/0x40 [ 50.633934] [ 50.634738] The buggy address belongs to the virtual mapping at [ 50.634738] [ffffa1fda2820000, ffffa1fda4591000) created by: [ 50.634738] paging_init+0x668/0x7c8 [ 50.636065] [ 50.637480] The buggy address belongs to the physical page: [ 50.638815] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x478d9 [ 50.639470] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 50.640089] raw: 03fffe0000002000 ffffc1ffc01e3648 ffffc1ffc01e3648 0000000000000000 [ 50.642329] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 50.644267] page dumped because: kasan: bad access detected [ 50.645840] [ 50.646767] Memory state around the buggy address: [ 50.648159] ffffa1fda44d8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.650283] ffffa1fda44d8f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.651440] >ffffa1fda44d9000: 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 [ 50.652331] ^ [ 50.653161] ffffa1fda44d9080: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 [ 50.654274] ffffa1fda44d9100: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 [ 50.655219] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 50.518412] ================================================================== [ 50.519648] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 50.520503] Free of addr fff00000c615aa01 by task kunit_try_catch/230 [ 50.521206] [ 50.521967] CPU: 0 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 50.523171] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.523682] Hardware name: linux,dummy-virt (DT) [ 50.524369] Call trace: [ 50.524905] show_stack+0x20/0x38 (C) [ 50.525560] dump_stack_lvl+0x8c/0xd0 [ 50.526477] print_report+0x118/0x5e0 [ 50.527253] kasan_report_invalid_free+0xb0/0xd8 [ 50.527958] check_slab_allocation+0xfc/0x108 [ 50.528654] __kasan_mempool_poison_object+0x78/0x150 [ 50.530176] mempool_free+0x28c/0x328 [ 50.530782] mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 50.531514] mempool_kmalloc_invalid_free+0xb8/0x110 [ 50.532199] kunit_try_run_case+0x14c/0x3d0 [ 50.532813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.533718] kthread+0x24c/0x2d0 [ 50.534262] ret_from_fork+0x10/0x20 [ 50.534888] [ 50.535249] Allocated by task 230: [ 50.536707] kasan_save_stack+0x3c/0x68 [ 50.537122] kasan_save_track+0x20/0x40 [ 50.537807] kasan_save_alloc_info+0x40/0x58 [ 50.539071] __kasan_mempool_unpoison_object+0x11c/0x180 [ 50.539931] remove_element+0x130/0x1f8 [ 50.540663] mempool_alloc_preallocated+0x58/0xc0 [ 50.541697] mempool_kmalloc_invalid_free_helper+0x94/0x2a0 [ 50.542321] mempool_kmalloc_invalid_free+0xb8/0x110 [ 50.542912] kunit_try_run_case+0x14c/0x3d0 [ 50.543659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.544379] kthread+0x24c/0x2d0 [ 50.545026] ret_from_fork+0x10/0x20 [ 50.545932] [ 50.546477] The buggy address belongs to the object at fff00000c615aa00 [ 50.546477] which belongs to the cache kmalloc-128 of size 128 [ 50.548412] The buggy address is located 1 bytes inside of [ 50.548412] 128-byte region [fff00000c615aa00, fff00000c615aa80) [ 50.550394] [ 50.550652] The buggy address belongs to the physical page: [ 50.551663] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10615a [ 50.552586] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.553609] page_type: f5(slab) [ 50.554158] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 50.554957] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 50.556364] page dumped because: kasan: bad access detected [ 50.556913] [ 50.557239] Memory state around the buggy address: [ 50.558162] fff00000c615a900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 50.558876] fff00000c615a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.559698] >fff00000c615aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.560436] ^ [ 50.560992] fff00000c615aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.561934] fff00000c615ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.562916] ================================================================== [ 50.573913] ================================================================== [ 50.575104] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 50.576073] Free of addr fff00000c66e4001 by task kunit_try_catch/232 [ 50.576681] [ 50.577376] CPU: 0 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 50.578715] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.579418] Hardware name: linux,dummy-virt (DT) [ 50.580275] Call trace: [ 50.580694] show_stack+0x20/0x38 (C) [ 50.581585] dump_stack_lvl+0x8c/0xd0 [ 50.582566] print_report+0x118/0x5e0 [ 50.583434] kasan_report_invalid_free+0xb0/0xd8 [ 50.584211] __kasan_mempool_poison_object+0xfc/0x150 [ 50.585491] mempool_free+0x28c/0x328 [ 50.586254] mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 50.587186] mempool_kmalloc_large_invalid_free+0xb8/0x110 [ 50.587920] kunit_try_run_case+0x14c/0x3d0 [ 50.588583] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.589202] kthread+0x24c/0x2d0 [ 50.590024] ret_from_fork+0x10/0x20 [ 50.590518] [ 50.591454] The buggy address belongs to the physical page: [ 50.592192] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e4 [ 50.593166] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 50.594066] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 50.594922] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 50.596087] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 50.596968] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 50.597983] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 50.598600] head: 0bfffe0000000002 ffffc1ffc319b901 ffffffffffffffff 0000000000000000 [ 50.599039] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 50.599652] page dumped because: kasan: bad access detected [ 50.600255] [ 50.600572] Memory state around the buggy address: [ 50.601426] fff00000c66e3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.602992] fff00000c66e3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.603930] >fff00000c66e4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.604944] ^ [ 50.605335] fff00000c66e4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.606710] fff00000c66e4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.607528] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 50.372009] ================================================================== [ 50.372979] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 50.373640] Free of addr fff00000c615a300 by task kunit_try_catch/224 [ 50.374181] [ 50.375700] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 50.377099] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.377622] Hardware name: linux,dummy-virt (DT) [ 50.378074] Call trace: [ 50.378367] show_stack+0x20/0x38 (C) [ 50.379086] dump_stack_lvl+0x8c/0xd0 [ 50.381663] print_report+0x118/0x5e0 [ 50.382234] kasan_report_invalid_free+0xb0/0xd8 [ 50.382938] check_slab_allocation+0xd4/0x108 [ 50.383597] __kasan_mempool_poison_object+0x78/0x150 [ 50.384425] mempool_free+0x28c/0x328 [ 50.385015] mempool_double_free_helper+0x150/0x2e0 [ 50.385927] mempool_kmalloc_double_free+0xb8/0x110 [ 50.387176] kunit_try_run_case+0x14c/0x3d0 [ 50.388101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.388942] kthread+0x24c/0x2d0 [ 50.389856] ret_from_fork+0x10/0x20 [ 50.390405] [ 50.390775] Allocated by task 224: [ 50.391238] kasan_save_stack+0x3c/0x68 [ 50.391990] kasan_save_track+0x20/0x40 [ 50.392585] kasan_save_alloc_info+0x40/0x58 [ 50.393344] __kasan_mempool_unpoison_object+0x11c/0x180 [ 50.393976] remove_element+0x130/0x1f8 [ 50.394560] mempool_alloc_preallocated+0x58/0xc0 [ 50.395188] mempool_double_free_helper+0x94/0x2e0 [ 50.396010] mempool_kmalloc_double_free+0xb8/0x110 [ 50.396659] kunit_try_run_case+0x14c/0x3d0 [ 50.397536] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.398191] kthread+0x24c/0x2d0 [ 50.398827] ret_from_fork+0x10/0x20 [ 50.399283] [ 50.399924] Freed by task 224: [ 50.400421] kasan_save_stack+0x3c/0x68 [ 50.401402] kasan_save_track+0x20/0x40 [ 50.401947] kasan_save_free_info+0x4c/0x78 [ 50.402574] __kasan_mempool_poison_object+0xc0/0x150 [ 50.403328] mempool_free+0x28c/0x328 [ 50.403865] mempool_double_free_helper+0x100/0x2e0 [ 50.404573] mempool_kmalloc_double_free+0xb8/0x110 [ 50.405553] kunit_try_run_case+0x14c/0x3d0 [ 50.406100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.406817] kthread+0x24c/0x2d0 [ 50.407416] ret_from_fork+0x10/0x20 [ 50.408002] [ 50.408313] The buggy address belongs to the object at fff00000c615a300 [ 50.408313] which belongs to the cache kmalloc-128 of size 128 [ 50.410042] The buggy address is located 0 bytes inside of [ 50.410042] 128-byte region [fff00000c615a300, fff00000c615a380) [ 50.411339] [ 50.411632] The buggy address belongs to the physical page: [ 50.412353] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10615a [ 50.413582] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.414477] page_type: f5(slab) [ 50.414999] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 50.415960] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 50.416835] page dumped because: kasan: bad access detected [ 50.417687] [ 50.418039] Memory state around the buggy address: [ 50.418737] fff00000c615a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 50.419787] fff00000c615a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.420695] >fff00000c615a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 50.421849] ^ [ 50.422429] fff00000c615a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.423165] fff00000c615a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.424462] ================================================================== [ 50.435053] ================================================================== [ 50.436167] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 50.437048] Free of addr fff00000c66e4000 by task kunit_try_catch/226 [ 50.438523] [ 50.438930] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 50.440038] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.440682] Hardware name: linux,dummy-virt (DT) [ 50.441436] Call trace: [ 50.441803] show_stack+0x20/0x38 (C) [ 50.442362] dump_stack_lvl+0x8c/0xd0 [ 50.442896] print_report+0x118/0x5e0 [ 50.443834] kasan_report_invalid_free+0xb0/0xd8 [ 50.444526] __kasan_mempool_poison_object+0x14c/0x150 [ 50.445182] mempool_free+0x28c/0x328 [ 50.446093] mempool_double_free_helper+0x150/0x2e0 [ 50.446976] mempool_kmalloc_large_double_free+0xb8/0x110 [ 50.447651] kunit_try_run_case+0x14c/0x3d0 [ 50.448360] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.449037] kthread+0x24c/0x2d0 [ 50.449664] ret_from_fork+0x10/0x20 [ 50.450362] [ 50.450723] The buggy address belongs to the physical page: [ 50.451562] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e4 [ 50.452611] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 50.453781] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 50.454877] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 50.455567] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 50.456469] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 50.457327] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 50.458612] head: 0bfffe0000000002 ffffc1ffc319b901 ffffffffffffffff 0000000000000000 [ 50.459571] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 50.460622] page dumped because: kasan: bad access detected [ 50.461365] [ 50.462097] Memory state around the buggy address: [ 50.462924] fff00000c66e3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.463759] fff00000c66e3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.464569] >fff00000c66e4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.465828] ^ [ 50.466269] fff00000c66e4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.467163] fff00000c66e4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.468032] ================================================================== [ 50.476842] ================================================================== [ 50.478482] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 50.479846] Free of addr fff00000c6614000 by task kunit_try_catch/228 [ 50.481333] [ 50.482277] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 50.483886] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.484609] Hardware name: linux,dummy-virt (DT) [ 50.485505] Call trace: [ 50.486116] show_stack+0x20/0x38 (C) [ 50.486827] dump_stack_lvl+0x8c/0xd0 [ 50.487129] print_report+0x118/0x5e0 [ 50.487518] kasan_report_invalid_free+0xb0/0xd8 [ 50.488250] __kasan_mempool_poison_pages+0xe0/0xe8 [ 50.489074] mempool_free+0x24c/0x328 [ 50.489933] mempool_double_free_helper+0x150/0x2e0 [ 50.490717] mempool_page_alloc_double_free+0xb4/0x110 [ 50.491579] kunit_try_run_case+0x14c/0x3d0 [ 50.492284] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.493109] kthread+0x24c/0x2d0 [ 50.493652] ret_from_fork+0x10/0x20 [ 50.494526] [ 50.495077] The buggy address belongs to the physical page: [ 50.495855] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106614 [ 50.496746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.497911] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 50.499523] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 50.500632] page dumped because: kasan: bad access detected [ 50.501348] [ 50.502023] Memory state around the buggy address: [ 50.502599] fff00000c6613f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.503741] fff00000c6613f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.504676] >fff00000c6614000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.506011] ^ [ 50.506556] fff00000c6614080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.507439] fff00000c6614100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.508273] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 50.218410] ================================================================== [ 50.219617] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 50.220370] Read of size 1 at addr fff00000c66e0000 by task kunit_try_catch/218 [ 50.221308] [ 50.222233] CPU: 0 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 50.223423] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.223972] Hardware name: linux,dummy-virt (DT) [ 50.224771] Call trace: [ 50.225217] show_stack+0x20/0x38 (C) [ 50.225771] dump_stack_lvl+0x8c/0xd0 [ 50.226700] print_report+0x118/0x5e0 [ 50.227399] kasan_report+0xc8/0x118 [ 50.227962] __asan_report_load1_noabort+0x20/0x30 [ 50.228825] mempool_uaf_helper+0x314/0x340 [ 50.229903] mempool_kmalloc_large_uaf+0xbc/0x118 [ 50.230577] kunit_try_run_case+0x14c/0x3d0 [ 50.231170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.232003] kthread+0x24c/0x2d0 [ 50.232546] ret_from_fork+0x10/0x20 [ 50.233509] [ 50.233795] The buggy address belongs to the physical page: [ 50.234432] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e0 [ 50.235401] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 50.236281] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 50.237331] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 50.238211] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 50.239440] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 50.240387] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 50.241758] head: 0bfffe0000000002 ffffc1ffc319b801 ffffffffffffffff 0000000000000000 [ 50.242555] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 50.243417] page dumped because: kasan: bad access detected [ 50.244203] [ 50.244621] Memory state around the buggy address: [ 50.245709] fff00000c66dff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.246591] fff00000c66dff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.247515] >fff00000c66e0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.248468] ^ [ 50.248950] fff00000c66e0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.250069] fff00000c66e0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.251127] ================================================================== [ 50.332202] ================================================================== [ 50.333572] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 50.335484] Read of size 1 at addr fff00000c66e4000 by task kunit_try_catch/222 [ 50.336901] [ 50.337682] CPU: 0 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 50.338870] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.339602] Hardware name: linux,dummy-virt (DT) [ 50.340252] Call trace: [ 50.340715] show_stack+0x20/0x38 (C) [ 50.342129] dump_stack_lvl+0x8c/0xd0 [ 50.342667] print_report+0x118/0x5e0 [ 50.343168] kasan_report+0xc8/0x118 [ 50.343976] __asan_report_load1_noabort+0x20/0x30 [ 50.344598] mempool_uaf_helper+0x314/0x340 [ 50.345208] mempool_page_alloc_uaf+0xb8/0x118 [ 50.346269] kunit_try_run_case+0x14c/0x3d0 [ 50.347119] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.347733] kthread+0x24c/0x2d0 [ 50.348361] ret_from_fork+0x10/0x20 [ 50.349011] [ 50.349453] The buggy address belongs to the physical page: [ 50.350888] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e4 [ 50.352058] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.352956] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 50.354190] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 50.355106] page dumped because: kasan: bad access detected [ 50.355856] [ 50.356185] Memory state around the buggy address: [ 50.356834] fff00000c66e3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.358110] fff00000c66e3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.359128] >fff00000c66e4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.359895] ^ [ 50.360611] fff00000c66e4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.361794] fff00000c66e4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.362662] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 50.263976] ================================================================== [ 50.265713] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 50.266914] Read of size 1 at addr fff00000c6157240 by task kunit_try_catch/220 [ 50.268121] [ 50.268427] CPU: 1 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 50.270190] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.270955] Hardware name: linux,dummy-virt (DT) [ 50.271764] Call trace: [ 50.272178] show_stack+0x20/0x38 (C) [ 50.272759] dump_stack_lvl+0x8c/0xd0 [ 50.273755] print_report+0x118/0x5e0 [ 50.274341] kasan_report+0xc8/0x118 [ 50.274809] __asan_report_load1_noabort+0x20/0x30 [ 50.275487] mempool_uaf_helper+0x314/0x340 [ 50.276089] mempool_slab_uaf+0xb8/0x110 [ 50.276573] kunit_try_run_case+0x14c/0x3d0 [ 50.277242] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.277976] kthread+0x24c/0x2d0 [ 50.278904] ret_from_fork+0x10/0x20 [ 50.279423] [ 50.279760] Allocated by task 220: [ 50.280270] kasan_save_stack+0x3c/0x68 [ 50.280924] kasan_save_track+0x20/0x40 [ 50.282471] kasan_save_alloc_info+0x40/0x58 [ 50.283215] __kasan_mempool_unpoison_object+0xbc/0x180 [ 50.283876] remove_element+0x16c/0x1f8 [ 50.284721] mempool_alloc_preallocated+0x58/0xc0 [ 50.285330] mempool_uaf_helper+0xa4/0x340 [ 50.285921] mempool_slab_uaf+0xb8/0x110 [ 50.286425] kunit_try_run_case+0x14c/0x3d0 [ 50.287329] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.288138] kthread+0x24c/0x2d0 [ 50.288778] ret_from_fork+0x10/0x20 [ 50.289646] [ 50.289997] Freed by task 220: [ 50.290629] kasan_save_stack+0x3c/0x68 [ 50.291316] kasan_save_track+0x20/0x40 [ 50.291888] kasan_save_free_info+0x4c/0x78 [ 50.292525] __kasan_mempool_poison_object+0xc0/0x150 [ 50.293231] mempool_free+0x28c/0x328 [ 50.294141] mempool_uaf_helper+0x104/0x340 [ 50.294863] mempool_slab_uaf+0xb8/0x110 [ 50.295618] kunit_try_run_case+0x14c/0x3d0 [ 50.296405] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.297138] kthread+0x24c/0x2d0 [ 50.297711] ret_from_fork+0x10/0x20 [ 50.298318] [ 50.298744] The buggy address belongs to the object at fff00000c6157240 [ 50.298744] which belongs to the cache test_cache of size 123 [ 50.300186] The buggy address is located 0 bytes inside of [ 50.300186] freed 123-byte region [fff00000c6157240, fff00000c61572bb) [ 50.301517] [ 50.301846] The buggy address belongs to the physical page: [ 50.302520] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106157 [ 50.303534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.304587] page_type: f5(slab) [ 50.305699] raw: 0bfffe0000000000 fff00000c6181500 dead000000000122 0000000000000000 [ 50.307062] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000 [ 50.307903] page dumped because: kasan: bad access detected [ 50.308560] [ 50.308928] Memory state around the buggy address: [ 50.309988] fff00000c6157100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.310999] fff00000c6157180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 50.311982] >fff00000c6157200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 50.312853] ^ [ 50.313760] fff00000c6157280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 50.314675] fff00000c6157300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.315532] ================================================================== [ 50.154619] ================================================================== [ 50.155759] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 50.156549] Read of size 1 at addr fff00000c610ac00 by task kunit_try_catch/216 [ 50.157652] [ 50.158054] CPU: 0 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 50.159176] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.159772] Hardware name: linux,dummy-virt (DT) [ 50.160462] Call trace: [ 50.160854] show_stack+0x20/0x38 (C) [ 50.161694] dump_stack_lvl+0x8c/0xd0 [ 50.162321] print_report+0x118/0x5e0 [ 50.162815] kasan_report+0xc8/0x118 [ 50.163572] __asan_report_load1_noabort+0x20/0x30 [ 50.164202] mempool_uaf_helper+0x314/0x340 [ 50.164817] mempool_kmalloc_uaf+0xbc/0x118 [ 50.165844] kunit_try_run_case+0x14c/0x3d0 [ 50.167042] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.167806] kthread+0x24c/0x2d0 [ 50.168361] ret_from_fork+0x10/0x20 [ 50.169216] [ 50.169717] Allocated by task 216: [ 50.170175] kasan_save_stack+0x3c/0x68 [ 50.170743] kasan_save_track+0x20/0x40 [ 50.171382] kasan_save_alloc_info+0x40/0x58 [ 50.171998] __kasan_mempool_unpoison_object+0x11c/0x180 [ 50.172793] remove_element+0x130/0x1f8 [ 50.173692] mempool_alloc_preallocated+0x58/0xc0 [ 50.174631] mempool_uaf_helper+0xa4/0x340 [ 50.175184] mempool_kmalloc_uaf+0xbc/0x118 [ 50.175964] kunit_try_run_case+0x14c/0x3d0 [ 50.176492] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.177408] kthread+0x24c/0x2d0 [ 50.178274] ret_from_fork+0x10/0x20 [ 50.179096] [ 50.179386] Freed by task 216: [ 50.179854] kasan_save_stack+0x3c/0x68 [ 50.180607] kasan_save_track+0x20/0x40 [ 50.181527] kasan_save_free_info+0x4c/0x78 [ 50.182326] __kasan_mempool_poison_object+0xc0/0x150 [ 50.183259] mempool_free+0x28c/0x328 [ 50.183947] mempool_uaf_helper+0x104/0x340 [ 50.184645] mempool_kmalloc_uaf+0xbc/0x118 [ 50.185803] kunit_try_run_case+0x14c/0x3d0 [ 50.186404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.187268] kthread+0x24c/0x2d0 [ 50.187915] ret_from_fork+0x10/0x20 [ 50.188538] [ 50.188886] The buggy address belongs to the object at fff00000c610ac00 [ 50.188886] which belongs to the cache kmalloc-128 of size 128 [ 50.191063] The buggy address is located 0 bytes inside of [ 50.191063] freed 128-byte region [fff00000c610ac00, fff00000c610ac80) [ 50.192795] [ 50.193147] The buggy address belongs to the physical page: [ 50.194361] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10610a [ 50.195376] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.196270] page_type: f5(slab) [ 50.196840] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 50.198092] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 50.199534] page dumped because: kasan: bad access detected [ 50.200307] [ 50.200643] Memory state around the buggy address: [ 50.201542] fff00000c610ab00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 50.202737] fff00000c610ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.203715] >fff00000c610ac00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 50.204634] ^ [ 50.205655] fff00000c610ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.206711] fff00000c610ad00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.207844] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 50.046806] ================================================================== [ 50.048271] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 50.049471] Read of size 1 at addr fff00000c6612001 by task kunit_try_catch/212 [ 50.050724] [ 50.051114] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 50.052181] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.052718] Hardware name: linux,dummy-virt (DT) [ 50.053412] Call trace: [ 50.053780] show_stack+0x20/0x38 (C) [ 50.054340] dump_stack_lvl+0x8c/0xd0 [ 50.054913] print_report+0x118/0x5e0 [ 50.055483] kasan_report+0xc8/0x118 [ 50.056059] __asan_report_load1_noabort+0x20/0x30 [ 50.056916] mempool_oob_right_helper+0x2ac/0x2f0 [ 50.057951] mempool_kmalloc_large_oob_right+0xbc/0x118 [ 50.058825] kunit_try_run_case+0x14c/0x3d0 [ 50.059438] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.059805] kthread+0x24c/0x2d0 [ 50.060094] ret_from_fork+0x10/0x20 [ 50.060750] [ 50.061687] The buggy address belongs to the physical page: [ 50.062493] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106610 [ 50.063535] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 50.064419] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 50.065786] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 50.066718] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 50.067640] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 50.068543] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 50.069590] head: 0bfffe0000000002 ffffc1ffc3198401 ffffffffffffffff 0000000000000000 [ 50.070903] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 50.071792] page dumped because: kasan: bad access detected [ 50.072495] [ 50.072797] Memory state around the buggy address: [ 50.073641] fff00000c6611f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.074838] fff00000c6611f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.075981] >fff00000c6612000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 50.076896] ^ [ 50.077690] fff00000c6612080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 50.078646] fff00000c6612100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 50.079617] ================================================================== [ 50.091971] ================================================================== [ 50.093558] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 50.094766] Read of size 1 at addr fff00000c61042bb by task kunit_try_catch/214 [ 50.095565] [ 50.096053] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 50.097499] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.098020] Hardware name: linux,dummy-virt (DT) [ 50.098659] Call trace: [ 50.099072] show_stack+0x20/0x38 (C) [ 50.099637] dump_stack_lvl+0x8c/0xd0 [ 50.100354] print_report+0x118/0x5e0 [ 50.101001] kasan_report+0xc8/0x118 [ 50.101903] __asan_report_load1_noabort+0x20/0x30 [ 50.102539] mempool_oob_right_helper+0x2ac/0x2f0 [ 50.103422] mempool_slab_oob_right+0xb8/0x110 [ 50.104088] kunit_try_run_case+0x14c/0x3d0 [ 50.104705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.105628] kthread+0x24c/0x2d0 [ 50.106341] ret_from_fork+0x10/0x20 [ 50.106865] [ 50.107218] Allocated by task 214: [ 50.107717] kasan_save_stack+0x3c/0x68 [ 50.108232] kasan_save_track+0x20/0x40 [ 50.109008] kasan_save_alloc_info+0x40/0x58 [ 50.109558] __kasan_mempool_unpoison_object+0xbc/0x180 [ 50.110271] remove_element+0x16c/0x1f8 [ 50.111075] mempool_alloc_preallocated+0x58/0xc0 [ 50.111615] mempool_oob_right_helper+0x98/0x2f0 [ 50.112234] mempool_slab_oob_right+0xb8/0x110 [ 50.112765] kunit_try_run_case+0x14c/0x3d0 [ 50.113472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.115972] kthread+0x24c/0x2d0 [ 50.116407] ret_from_fork+0x10/0x20 [ 50.116794] [ 50.117038] The buggy address belongs to the object at fff00000c6104240 [ 50.117038] which belongs to the cache test_cache of size 123 [ 50.118700] The buggy address is located 0 bytes to the right of [ 50.118700] allocated 123-byte region [fff00000c6104240, fff00000c61042bb) [ 50.120181] [ 50.120601] The buggy address belongs to the physical page: [ 50.121835] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106104 [ 50.122926] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.123781] page_type: f5(slab) [ 50.124407] raw: 0bfffe0000000000 fff00000c61813c0 dead000000000122 0000000000000000 [ 50.125849] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000 [ 50.127063] page dumped because: kasan: bad access detected [ 50.127978] [ 50.128540] Memory state around the buggy address: [ 50.129380] fff00000c6104180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 50.130421] fff00000c6104200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 50.131266] >fff00000c6104280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 50.132233] ^ [ 50.132907] fff00000c6104300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.134023] fff00000c6104380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.134825] ================================================================== [ 49.990594] ================================================================== [ 49.991713] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 49.992492] Read of size 1 at addr fff00000c610a573 by task kunit_try_catch/210 [ 49.993813] [ 49.994167] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 49.995261] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.996725] Hardware name: linux,dummy-virt (DT) [ 49.997483] Call trace: [ 49.998009] show_stack+0x20/0x38 (C) [ 49.998567] dump_stack_lvl+0x8c/0xd0 [ 49.999276] print_report+0x118/0x5e0 [ 49.999813] kasan_report+0xc8/0x118 [ 50.000505] __asan_report_load1_noabort+0x20/0x30 [ 50.001264] mempool_oob_right_helper+0x2ac/0x2f0 [ 50.001856] mempool_kmalloc_oob_right+0xbc/0x118 [ 50.003340] kunit_try_run_case+0x14c/0x3d0 [ 50.004157] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.004949] kthread+0x24c/0x2d0 [ 50.005847] ret_from_fork+0x10/0x20 [ 50.006518] [ 50.006974] Allocated by task 210: [ 50.007543] kasan_save_stack+0x3c/0x68 [ 50.008152] kasan_save_track+0x20/0x40 [ 50.008721] kasan_save_alloc_info+0x40/0x58 [ 50.009618] __kasan_mempool_unpoison_object+0x11c/0x180 [ 50.010466] remove_element+0x130/0x1f8 [ 50.011207] mempool_alloc_preallocated+0x58/0xc0 [ 50.012000] mempool_oob_right_helper+0x98/0x2f0 [ 50.012804] mempool_kmalloc_oob_right+0xbc/0x118 [ 50.013958] kunit_try_run_case+0x14c/0x3d0 [ 50.015272] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.015995] kthread+0x24c/0x2d0 [ 50.016540] ret_from_fork+0x10/0x20 [ 50.017343] [ 50.017841] The buggy address belongs to the object at fff00000c610a500 [ 50.017841] which belongs to the cache kmalloc-128 of size 128 [ 50.019366] The buggy address is located 0 bytes to the right of [ 50.019366] allocated 115-byte region [fff00000c610a500, fff00000c610a573) [ 50.020931] [ 50.021827] The buggy address belongs to the physical page: [ 50.022700] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10610a [ 50.024363] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.025430] page_type: f5(slab) [ 50.025977] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 50.026965] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 50.027913] page dumped because: kasan: bad access detected [ 50.028834] [ 50.029232] Memory state around the buggy address: [ 50.029930] fff00000c610a400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 50.030847] fff00000c610a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.031733] >fff00000c610a500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 50.033359] ^ [ 50.034585] fff00000c610a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.035733] fff00000c610a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 50.036636] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 49.371259] ================================================================== [ 49.372588] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x17c/0x2f8 [ 49.373470] Read of size 1 at addr fff00000c571d780 by task kunit_try_catch/204 [ 49.375056] [ 49.375505] CPU: 0 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 49.376650] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.377466] Hardware name: linux,dummy-virt (DT) [ 49.378406] Call trace: [ 49.378748] show_stack+0x20/0x38 (C) [ 49.379227] dump_stack_lvl+0x8c/0xd0 [ 49.380280] print_report+0x118/0x5e0 [ 49.380770] kasan_report+0xc8/0x118 [ 49.381310] __kasan_check_byte+0x54/0x70 [ 49.382201] kmem_cache_destroy+0x34/0x218 [ 49.382784] kmem_cache_double_destroy+0x17c/0x2f8 [ 49.383507] kunit_try_run_case+0x14c/0x3d0 [ 49.384140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.384872] kthread+0x24c/0x2d0 [ 49.385538] ret_from_fork+0x10/0x20 [ 49.386123] [ 49.386501] Allocated by task 204: [ 49.386969] kasan_save_stack+0x3c/0x68 [ 49.388284] kasan_save_track+0x20/0x40 [ 49.388801] kasan_save_alloc_info+0x40/0x58 [ 49.389808] __kasan_slab_alloc+0xa8/0xb0 [ 49.390398] kmem_cache_alloc_noprof+0x108/0x398 [ 49.390986] __kmem_cache_create_args+0x18c/0x2b0 [ 49.391616] kmem_cache_double_destroy+0xc8/0x2f8 [ 49.392247] kunit_try_run_case+0x14c/0x3d0 [ 49.392898] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.393947] kthread+0x24c/0x2d0 [ 49.394561] ret_from_fork+0x10/0x20 [ 49.395370] [ 49.395702] Freed by task 204: [ 49.396144] kasan_save_stack+0x3c/0x68 [ 49.396760] kasan_save_track+0x20/0x40 [ 49.397476] kasan_save_free_info+0x4c/0x78 [ 49.398086] __kasan_slab_free+0x6c/0x98 [ 49.398918] kmem_cache_free+0x118/0x470 [ 49.399683] slab_kmem_cache_release+0x38/0x50 [ 49.400389] kmem_cache_release+0x1c/0x30 [ 49.400927] kobject_put+0x17c/0x430 [ 49.401482] sysfs_slab_release+0x1c/0x30 [ 49.402246] kmem_cache_destroy+0x118/0x218 [ 49.403601] kmem_cache_double_destroy+0x130/0x2f8 [ 49.404231] kunit_try_run_case+0x14c/0x3d0 [ 49.404978] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.406100] kthread+0x24c/0x2d0 [ 49.406855] ret_from_fork+0x10/0x20 [ 49.407336] [ 49.407654] The buggy address belongs to the object at fff00000c571d780 [ 49.407654] which belongs to the cache kmem_cache of size 208 [ 49.408791] The buggy address is located 0 bytes inside of [ 49.408791] freed 208-byte region [fff00000c571d780, fff00000c571d850) [ 49.410993] [ 49.411402] The buggy address belongs to the physical page: [ 49.412241] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10571d [ 49.413363] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.414439] page_type: f5(slab) [ 49.415001] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 49.416067] raw: 0000000000000000 00000000800c000c 00000001f5000000 0000000000000000 [ 49.417161] page dumped because: kasan: bad access detected [ 49.418483] [ 49.418758] Memory state around the buggy address: [ 49.419368] fff00000c571d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 49.420367] fff00000c571d700: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.421821] >fff00000c571d780: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.422794] ^ [ 49.423405] fff00000c571d800: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 49.424370] fff00000c571d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.425558] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 49.262595] ================================================================== [ 49.263822] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x390/0x468 [ 49.264484] Read of size 1 at addr fff00000c6176000 by task kunit_try_catch/202 [ 49.265396] [ 49.265769] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 49.266964] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.267582] Hardware name: linux,dummy-virt (DT) [ 49.268197] Call trace: [ 49.268576] show_stack+0x20/0x38 (C) [ 49.269237] dump_stack_lvl+0x8c/0xd0 [ 49.269730] print_report+0x118/0x5e0 [ 49.270388] kasan_report+0xc8/0x118 [ 49.270923] __asan_report_load1_noabort+0x20/0x30 [ 49.271656] kmem_cache_rcu_uaf+0x390/0x468 [ 49.272308] kunit_try_run_case+0x14c/0x3d0 [ 49.272861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.273707] kthread+0x24c/0x2d0 [ 49.274325] ret_from_fork+0x10/0x20 [ 49.274925] [ 49.275231] Allocated by task 202: [ 49.275836] kasan_save_stack+0x3c/0x68 [ 49.276369] kasan_save_track+0x20/0x40 [ 49.276955] kasan_save_alloc_info+0x40/0x58 [ 49.277588] __kasan_slab_alloc+0xa8/0xb0 [ 49.278141] kmem_cache_alloc_noprof+0x108/0x398 [ 49.278786] kmem_cache_rcu_uaf+0x12c/0x468 [ 49.279362] kunit_try_run_case+0x14c/0x3d0 [ 49.279950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.280720] kthread+0x24c/0x2d0 [ 49.281203] ret_from_fork+0x10/0x20 [ 49.281837] [ 49.282164] Freed by task 0: [ 49.282650] kasan_save_stack+0x3c/0x68 [ 49.283315] kasan_save_track+0x20/0x40 [ 49.283836] kasan_save_free_info+0x4c/0x78 [ 49.284367] __kasan_slab_free+0x6c/0x98 [ 49.284993] slab_free_after_rcu_debug+0xd4/0x2f8 [ 49.285756] rcu_core+0x9f4/0x1e20 [ 49.286360] rcu_core_si+0x18/0x30 [ 49.286900] handle_softirqs+0x374/0xb20 [ 49.287451] __do_softirq+0x1c/0x28 [ 49.287987] [ 49.288331] Last potentially related work creation: [ 49.289027] kasan_save_stack+0x3c/0x68 [ 49.289575] __kasan_record_aux_stack+0xbc/0xe8 [ 49.290426] kasan_record_aux_stack_noalloc+0x14/0x20 [ 49.290968] kmem_cache_free+0x28c/0x470 [ 49.291696] kmem_cache_rcu_uaf+0x16c/0x468 [ 49.292272] kunit_try_run_case+0x14c/0x3d0 [ 49.292883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.293532] kthread+0x24c/0x2d0 [ 49.294190] ret_from_fork+0x10/0x20 [ 49.294719] [ 49.295076] The buggy address belongs to the object at fff00000c6176000 [ 49.295076] which belongs to the cache test_cache of size 200 [ 49.296480] The buggy address is located 0 bytes inside of [ 49.296480] freed 200-byte region [fff00000c6176000, fff00000c61760c8) [ 49.297772] [ 49.298106] The buggy address belongs to the physical page: [ 49.298896] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106176 [ 49.299908] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.300728] page_type: f5(slab) [ 49.301255] raw: 0bfffe0000000000 fff00000c6181280 dead000000000122 0000000000000000 [ 49.302170] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000 [ 49.303055] page dumped because: kasan: bad access detected [ 49.303812] [ 49.304124] Memory state around the buggy address: [ 49.304701] fff00000c6175f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 49.305604] fff00000c6175f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 49.306452] >fff00000c6176000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.307249] ^ [ 49.307805] fff00000c6176080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 49.308631] fff00000c6176100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.309497] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 49.123569] ================================================================== [ 49.124758] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3b8 [ 49.125452] Free of addr fff00000c617a001 by task kunit_try_catch/200 [ 49.126996] [ 49.127317] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 49.128723] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.129422] Hardware name: linux,dummy-virt (DT) [ 49.130032] Call trace: [ 49.130775] show_stack+0x20/0x38 (C) [ 49.131384] dump_stack_lvl+0x8c/0xd0 [ 49.132095] print_report+0x118/0x5e0 [ 49.132626] kasan_report_invalid_free+0xb0/0xd8 [ 49.133473] check_slab_allocation+0xfc/0x108 [ 49.134268] __kasan_slab_pre_free+0x2c/0x48 [ 49.134819] kmem_cache_free+0xf0/0x470 [ 49.135457] kmem_cache_invalid_free+0x184/0x3b8 [ 49.136076] kunit_try_run_case+0x14c/0x3d0 [ 49.136802] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.137785] kthread+0x24c/0x2d0 [ 49.138317] ret_from_fork+0x10/0x20 [ 49.138934] [ 49.139205] Allocated by task 200: [ 49.139928] kasan_save_stack+0x3c/0x68 [ 49.140491] kasan_save_track+0x20/0x40 [ 49.141514] kasan_save_alloc_info+0x40/0x58 [ 49.142132] __kasan_slab_alloc+0xa8/0xb0 [ 49.142767] kmem_cache_alloc_noprof+0x108/0x398 [ 49.143404] kmem_cache_invalid_free+0x12c/0x3b8 [ 49.144083] kunit_try_run_case+0x14c/0x3d0 [ 49.144770] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.145807] kthread+0x24c/0x2d0 [ 49.146394] ret_from_fork+0x10/0x20 [ 49.147094] [ 49.147398] The buggy address belongs to the object at fff00000c617a000 [ 49.147398] which belongs to the cache test_cache of size 200 [ 49.148799] The buggy address is located 1 bytes inside of [ 49.148799] 200-byte region [fff00000c617a000, fff00000c617a0c8) [ 49.150358] [ 49.150696] The buggy address belongs to the physical page: [ 49.151397] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10617a [ 49.152382] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.154015] page_type: f5(slab) [ 49.154440] raw: 0bfffe0000000000 fff00000c6181140 dead000000000122 0000000000000000 [ 49.155495] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000 [ 49.156285] page dumped because: kasan: bad access detected [ 49.157028] [ 49.157328] Memory state around the buggy address: [ 49.158899] fff00000c6179f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 49.159754] fff00000c6179f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 49.160591] >fff00000c617a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 49.161779] ^ [ 49.162166] fff00000c617a080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 49.162965] fff00000c617a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.163902] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 49.043860] ================================================================== [ 49.045369] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 49.047393] Free of addr fff00000c617b000 by task kunit_try_catch/198 [ 49.048143] [ 49.048486] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 49.049811] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.050369] Hardware name: linux,dummy-virt (DT) [ 49.051135] Call trace: [ 49.051617] show_stack+0x20/0x38 (C) [ 49.052167] dump_stack_lvl+0x8c/0xd0 [ 49.052744] print_report+0x118/0x5e0 [ 49.053481] kasan_report_invalid_free+0xb0/0xd8 [ 49.054822] check_slab_allocation+0xd4/0x108 [ 49.055446] __kasan_slab_pre_free+0x2c/0x48 [ 49.055981] kmem_cache_free+0xf0/0x470 [ 49.056622] kmem_cache_double_free+0x190/0x3c8 [ 49.058103] kunit_try_run_case+0x14c/0x3d0 [ 49.058770] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.059504] kthread+0x24c/0x2d0 [ 49.060139] ret_from_fork+0x10/0x20 [ 49.060678] [ 49.061037] Allocated by task 198: [ 49.061520] kasan_save_stack+0x3c/0x68 [ 49.062012] kasan_save_track+0x20/0x40 [ 49.063347] kasan_save_alloc_info+0x40/0x58 [ 49.063863] __kasan_slab_alloc+0xa8/0xb0 [ 49.065033] kmem_cache_alloc_noprof+0x108/0x398 [ 49.065521] kmem_cache_double_free+0x12c/0x3c8 [ 49.065940] kunit_try_run_case+0x14c/0x3d0 [ 49.067449] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.069640] kthread+0x24c/0x2d0 [ 49.070851] ret_from_fork+0x10/0x20 [ 49.072845] [ 49.073616] Freed by task 198: [ 49.073945] kasan_save_stack+0x3c/0x68 [ 49.075331] kasan_save_track+0x20/0x40 [ 49.075751] kasan_save_free_info+0x4c/0x78 [ 49.076163] __kasan_slab_free+0x6c/0x98 [ 49.076587] kmem_cache_free+0x118/0x470 [ 49.076983] kmem_cache_double_free+0x140/0x3c8 [ 49.079272] kunit_try_run_case+0x14c/0x3d0 [ 49.080820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.082040] kthread+0x24c/0x2d0 [ 49.082833] ret_from_fork+0x10/0x20 [ 49.083230] [ 49.083952] The buggy address belongs to the object at fff00000c617b000 [ 49.083952] which belongs to the cache test_cache of size 200 [ 49.085832] The buggy address is located 0 bytes inside of [ 49.085832] 200-byte region [fff00000c617b000, fff00000c617b0c8) [ 49.087217] [ 49.087604] The buggy address belongs to the physical page: [ 49.088230] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10617b [ 49.089776] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.091126] page_type: f5(slab) [ 49.091667] raw: 0bfffe0000000000 fff00000c6181000 dead000000000122 0000000000000000 [ 49.092772] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000 [ 49.093821] page dumped because: kasan: bad access detected [ 49.094155] [ 49.094353] Memory state around the buggy address: [ 49.095581] fff00000c617af00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 49.096671] fff00000c617af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 49.097623] >fff00000c617b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.099644] ^ [ 49.100230] fff00000c617b080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 49.101283] fff00000c617b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.102598] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 48.959030] ================================================================== [ 48.960223] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x33c/0x428 [ 48.960988] Read of size 1 at addr fff00000c610a0c8 by task kunit_try_catch/196 [ 48.962969] [ 48.963511] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 48.964625] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.965162] Hardware name: linux,dummy-virt (DT) [ 48.966053] Call trace: [ 48.966508] show_stack+0x20/0x38 (C) [ 48.967122] dump_stack_lvl+0x8c/0xd0 [ 48.967599] print_report+0x118/0x5e0 [ 48.968225] kasan_report+0xc8/0x118 [ 48.968765] __asan_report_load1_noabort+0x20/0x30 [ 48.969886] kmem_cache_oob+0x33c/0x428 [ 48.970755] kunit_try_run_case+0x14c/0x3d0 [ 48.971373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.972107] kthread+0x24c/0x2d0 [ 48.972834] ret_from_fork+0x10/0x20 [ 48.973638] [ 48.974049] Allocated by task 196: [ 48.974580] kasan_save_stack+0x3c/0x68 [ 48.975148] kasan_save_track+0x20/0x40 [ 48.975694] kasan_save_alloc_info+0x40/0x58 [ 48.976482] __kasan_slab_alloc+0xa8/0xb0 [ 48.977003] kmem_cache_alloc_noprof+0x108/0x398 [ 48.978110] kmem_cache_oob+0x12c/0x428 [ 48.978866] kunit_try_run_case+0x14c/0x3d0 [ 48.979797] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.980613] kthread+0x24c/0x2d0 [ 48.981248] ret_from_fork+0x10/0x20 [ 48.982128] [ 48.982556] The buggy address belongs to the object at fff00000c610a000 [ 48.982556] which belongs to the cache test_cache of size 200 [ 48.984039] The buggy address is located 0 bytes to the right of [ 48.984039] allocated 200-byte region [fff00000c610a000, fff00000c610a0c8) [ 48.985977] [ 48.986804] The buggy address belongs to the physical page: [ 48.987598] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10610a [ 48.988571] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.989660] page_type: f5(slab) [ 48.990481] raw: 0bfffe0000000000 fff00000c1bf5dc0 dead000000000122 0000000000000000 [ 48.991420] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000 [ 48.992401] page dumped because: kasan: bad access detected [ 48.993284] [ 48.994134] Memory state around the buggy address: [ 48.994813] fff00000c6109f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 48.995722] fff00000c610a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 48.996668] >fff00000c610a080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 48.997898] ^ [ 48.998508] fff00000c610a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.999422] fff00000c610a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.000223] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 48.874754] ================================================================== [ 48.875819] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 48.876503] Read of size 8 at addr fff00000c615ddc0 by task kunit_try_catch/189 [ 48.877470] [ 48.877940] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 48.879127] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.879927] Hardware name: linux,dummy-virt (DT) [ 48.881365] Call trace: [ 48.882142] show_stack+0x20/0x38 (C) [ 48.882860] dump_stack_lvl+0x8c/0xd0 [ 48.883609] print_report+0x118/0x5e0 [ 48.884209] kasan_report+0xc8/0x118 [ 48.884845] __asan_report_load8_noabort+0x20/0x30 [ 48.885919] workqueue_uaf+0x480/0x4a8 [ 48.886448] kunit_try_run_case+0x14c/0x3d0 [ 48.887084] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.887841] kthread+0x24c/0x2d0 [ 48.888589] ret_from_fork+0x10/0x20 [ 48.889348] [ 48.889637] Allocated by task 189: [ 48.890260] kasan_save_stack+0x3c/0x68 [ 48.891632] kasan_save_track+0x20/0x40 [ 48.892186] kasan_save_alloc_info+0x40/0x58 [ 48.893077] __kasan_kmalloc+0xd4/0xd8 [ 48.893794] __kmalloc_cache_noprof+0x15c/0x3c0 [ 48.894618] workqueue_uaf+0x13c/0x4a8 [ 48.895208] kunit_try_run_case+0x14c/0x3d0 [ 48.895865] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.896692] kthread+0x24c/0x2d0 [ 48.897506] ret_from_fork+0x10/0x20 [ 48.897918] [ 48.898231] Freed by task 31: [ 48.898988] kasan_save_stack+0x3c/0x68 [ 48.899681] kasan_save_track+0x20/0x40 [ 48.899972] kasan_save_free_info+0x4c/0x78 [ 48.900264] __kasan_slab_free+0x6c/0x98 [ 48.901023] kfree+0x114/0x3c8 [ 48.902099] workqueue_uaf_work+0x18/0x30 [ 48.902765] process_one_work+0x530/0xf98 [ 48.903390] worker_thread+0x614/0xf28 [ 48.904103] kthread+0x24c/0x2d0 [ 48.904711] ret_from_fork+0x10/0x20 [ 48.905355] [ 48.905983] Last potentially related work creation: [ 48.906688] kasan_save_stack+0x3c/0x68 [ 48.907142] __kasan_record_aux_stack+0xbc/0xe8 [ 48.907808] kasan_record_aux_stack_noalloc+0x14/0x20 [ 48.908687] __queue_work+0x65c/0xfd8 [ 48.909181] queue_work_on+0xbc/0xf8 [ 48.910188] workqueue_uaf+0x210/0x4a8 [ 48.910842] kunit_try_run_case+0x14c/0x3d0 [ 48.911440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.912021] kthread+0x24c/0x2d0 [ 48.912622] ret_from_fork+0x10/0x20 [ 48.913210] [ 48.913990] The buggy address belongs to the object at fff00000c615ddc0 [ 48.913990] which belongs to the cache kmalloc-32 of size 32 [ 48.915284] The buggy address is located 0 bytes inside of [ 48.915284] freed 32-byte region [fff00000c615ddc0, fff00000c615dde0) [ 48.916713] [ 48.916996] The buggy address belongs to the physical page: [ 48.917554] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10615d [ 48.919024] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.919932] page_type: f5(slab) [ 48.920645] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 48.921721] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 48.923094] page dumped because: kasan: bad access detected [ 48.923811] [ 48.924060] Memory state around the buggy address: [ 48.924816] fff00000c615dc80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 48.926355] fff00000c615dd00: 00 00 00 fc fc fc fc fc 00 00 03 fc fc fc fc fc [ 48.927257] >fff00000c615dd80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 48.928046] ^ [ 48.928682] fff00000c615de00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.929981] fff00000c615de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.931006] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 48.789753] ================================================================== [ 48.791213] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 48.791929] Read of size 4 at addr fff00000c615dc80 by task swapper/1/0 [ 48.792669] [ 48.792991] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B N 6.12.0-next-20241127 #1 [ 48.794855] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.795473] Hardware name: linux,dummy-virt (DT) [ 48.796008] Call trace: [ 48.796425] show_stack+0x20/0x38 (C) [ 48.796953] dump_stack_lvl+0x8c/0xd0 [ 48.797995] print_report+0x118/0x5e0 [ 48.798704] kasan_report+0xc8/0x118 [ 48.799417] __asan_report_load4_noabort+0x20/0x30 [ 48.800033] rcu_uaf_reclaim+0x64/0x70 [ 48.800616] rcu_core+0x9f4/0x1e20 [ 48.801334] rcu_core_si+0x18/0x30 [ 48.801839] handle_softirqs+0x374/0xb20 [ 48.802477] __do_softirq+0x1c/0x28 [ 48.803051] ____do_softirq+0x18/0x30 [ 48.803569] call_on_irq_stack+0x24/0x58 [ 48.804232] do_softirq_own_stack+0x24/0x38 [ 48.805364] __irq_exit_rcu+0x1fc/0x318 [ 48.805769] irq_exit_rcu+0x1c/0x80 [ 48.806148] el1_interrupt+0x38/0x58 [ 48.806563] el1h_64_irq_handler+0x18/0x28 [ 48.806974] el1h_64_irq+0x6c/0x70 [ 48.808911] arch_local_irq_enable+0x4/0x8 (P) [ 48.809875] default_idle_call+0x6c/0x78 (L) [ 48.811392] do_idle+0x384/0x4e8 [ 48.812109] cpu_startup_entry+0x64/0x80 [ 48.812873] secondary_start_kernel+0x288/0x340 [ 48.813649] __secondary_switched+0xc0/0xc8 [ 48.814382] [ 48.814880] Allocated by task 187: [ 48.815731] kasan_save_stack+0x3c/0x68 [ 48.816285] kasan_save_track+0x20/0x40 [ 48.816990] kasan_save_alloc_info+0x40/0x58 [ 48.817780] __kasan_kmalloc+0xd4/0xd8 [ 48.818428] __kmalloc_cache_noprof+0x15c/0x3c0 [ 48.819273] rcu_uaf+0xb0/0x2d0 [ 48.819967] kunit_try_run_case+0x14c/0x3d0 [ 48.820825] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.821859] kthread+0x24c/0x2d0 [ 48.822537] ret_from_fork+0x10/0x20 [ 48.823194] [ 48.823545] Freed by task 0: [ 48.823967] kasan_save_stack+0x3c/0x68 [ 48.824561] kasan_save_track+0x20/0x40 [ 48.825526] kasan_save_free_info+0x4c/0x78 [ 48.826159] __kasan_slab_free+0x6c/0x98 [ 48.826877] kfree+0x114/0x3c8 [ 48.827511] rcu_uaf_reclaim+0x28/0x70 [ 48.828166] rcu_core+0x9f4/0x1e20 [ 48.828817] rcu_core_si+0x18/0x30 [ 48.829664] handle_softirqs+0x374/0xb20 [ 48.830508] __do_softirq+0x1c/0x28 [ 48.831015] [ 48.831348] Last potentially related work creation: [ 48.832180] kasan_save_stack+0x3c/0x68 [ 48.832975] __kasan_record_aux_stack+0xbc/0xe8 [ 48.833975] kasan_record_aux_stack_noalloc+0x14/0x20 [ 48.834838] __call_rcu_common.constprop.0+0x74/0xa10 [ 48.835695] call_rcu+0x18/0x30 [ 48.836178] rcu_uaf+0x14c/0x2d0 [ 48.836908] kunit_try_run_case+0x14c/0x3d0 [ 48.837780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.838476] kthread+0x24c/0x2d0 [ 48.838985] ret_from_fork+0x10/0x20 [ 48.839580] [ 48.839896] The buggy address belongs to the object at fff00000c615dc80 [ 48.839896] which belongs to the cache kmalloc-32 of size 32 [ 48.841664] The buggy address is located 0 bytes inside of [ 48.841664] freed 32-byte region [fff00000c615dc80, fff00000c615dca0) [ 48.843202] [ 48.843497] The buggy address belongs to the physical page: [ 48.844216] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10615d [ 48.845174] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.845970] page_type: f5(slab) [ 48.846569] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 48.847803] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 48.848684] page dumped because: kasan: bad access detected [ 48.849662] [ 48.849953] Memory state around the buggy address: [ 48.850634] fff00000c615db80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 48.851517] fff00000c615dc00: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 48.852453] >fff00000c615dc80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 48.853216] ^ [ 48.854419] fff00000c615dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.855595] fff00000c615dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.856405] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 48.668959] ================================================================== [ 48.670242] BUG: KASAN: slab-use-after-free in ksize_uaf+0x59c/0x600 [ 48.671150] Read of size 1 at addr fff00000c61b5500 by task kunit_try_catch/185 [ 48.671894] [ 48.672233] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 48.673905] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.674760] Hardware name: linux,dummy-virt (DT) [ 48.675268] Call trace: [ 48.675742] show_stack+0x20/0x38 (C) [ 48.676387] dump_stack_lvl+0x8c/0xd0 [ 48.676972] print_report+0x118/0x5e0 [ 48.678056] kasan_report+0xc8/0x118 [ 48.678720] __asan_report_load1_noabort+0x20/0x30 [ 48.679441] ksize_uaf+0x59c/0x600 [ 48.680071] kunit_try_run_case+0x14c/0x3d0 [ 48.680675] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.681769] kthread+0x24c/0x2d0 [ 48.682236] ret_from_fork+0x10/0x20 [ 48.683175] [ 48.683669] Allocated by task 185: [ 48.684370] kasan_save_stack+0x3c/0x68 [ 48.685072] kasan_save_track+0x20/0x40 [ 48.685848] kasan_save_alloc_info+0x40/0x58 [ 48.686449] __kasan_kmalloc+0xd4/0xd8 [ 48.687014] __kmalloc_cache_noprof+0x15c/0x3c0 [ 48.687738] ksize_uaf+0xb8/0x600 [ 48.688347] kunit_try_run_case+0x14c/0x3d0 [ 48.689031] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.690425] kthread+0x24c/0x2d0 [ 48.690984] ret_from_fork+0x10/0x20 [ 48.691599] [ 48.691887] Freed by task 185: [ 48.692493] kasan_save_stack+0x3c/0x68 [ 48.692950] kasan_save_track+0x20/0x40 [ 48.693882] kasan_save_free_info+0x4c/0x78 [ 48.694428] __kasan_slab_free+0x6c/0x98 [ 48.695072] kfree+0x114/0x3c8 [ 48.695603] ksize_uaf+0x11c/0x600 [ 48.696148] kunit_try_run_case+0x14c/0x3d0 [ 48.696792] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.697964] kthread+0x24c/0x2d0 [ 48.698499] ret_from_fork+0x10/0x20 [ 48.699436] [ 48.699722] The buggy address belongs to the object at fff00000c61b5500 [ 48.699722] which belongs to the cache kmalloc-128 of size 128 [ 48.701053] The buggy address is located 0 bytes inside of [ 48.701053] freed 128-byte region [fff00000c61b5500, fff00000c61b5580) [ 48.702987] [ 48.703255] The buggy address belongs to the physical page: [ 48.704068] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b5 [ 48.704976] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.705984] page_type: f5(slab) [ 48.706517] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 48.707804] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 48.709049] page dumped because: kasan: bad access detected [ 48.710068] [ 48.710616] Memory state around the buggy address: [ 48.711230] fff00000c61b5400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 48.712085] fff00000c61b5480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.712953] >fff00000c61b5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.714034] ^ [ 48.714492] fff00000c61b5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.715994] fff00000c61b5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.716782] ================================================================== [ 48.718553] ================================================================== [ 48.719276] BUG: KASAN: slab-use-after-free in ksize_uaf+0x548/0x600 [ 48.720759] Read of size 1 at addr fff00000c61b5578 by task kunit_try_catch/185 [ 48.722051] [ 48.722533] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 48.724410] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.724912] Hardware name: linux,dummy-virt (DT) [ 48.725988] Call trace: [ 48.726605] show_stack+0x20/0x38 (C) [ 48.727334] dump_stack_lvl+0x8c/0xd0 [ 48.728094] print_report+0x118/0x5e0 [ 48.728755] kasan_report+0xc8/0x118 [ 48.729409] __asan_report_load1_noabort+0x20/0x30 [ 48.730250] ksize_uaf+0x548/0x600 [ 48.731466] kunit_try_run_case+0x14c/0x3d0 [ 48.732081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.732785] kthread+0x24c/0x2d0 [ 48.733880] ret_from_fork+0x10/0x20 [ 48.734766] [ 48.735118] Allocated by task 185: [ 48.735591] kasan_save_stack+0x3c/0x68 [ 48.736108] kasan_save_track+0x20/0x40 [ 48.736661] kasan_save_alloc_info+0x40/0x58 [ 48.737679] __kasan_kmalloc+0xd4/0xd8 [ 48.738191] __kmalloc_cache_noprof+0x15c/0x3c0 [ 48.738863] ksize_uaf+0xb8/0x600 [ 48.739844] kunit_try_run_case+0x14c/0x3d0 [ 48.740470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.741179] kthread+0x24c/0x2d0 [ 48.741696] ret_from_fork+0x10/0x20 [ 48.742276] [ 48.742919] Freed by task 185: [ 48.743274] kasan_save_stack+0x3c/0x68 [ 48.743820] kasan_save_track+0x20/0x40 [ 48.744462] kasan_save_free_info+0x4c/0x78 [ 48.745499] __kasan_slab_free+0x6c/0x98 [ 48.745949] kfree+0x114/0x3c8 [ 48.746932] ksize_uaf+0x11c/0x600 [ 48.747509] kunit_try_run_case+0x14c/0x3d0 [ 48.748090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.748823] kthread+0x24c/0x2d0 [ 48.749930] ret_from_fork+0x10/0x20 [ 48.750466] [ 48.750823] The buggy address belongs to the object at fff00000c61b5500 [ 48.750823] which belongs to the cache kmalloc-128 of size 128 [ 48.752277] The buggy address is located 120 bytes inside of [ 48.752277] freed 128-byte region [fff00000c61b5500, fff00000c61b5580) [ 48.753343] [ 48.753629] The buggy address belongs to the physical page: [ 48.754288] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b5 [ 48.755233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.756760] page_type: f5(slab) [ 48.757471] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 48.758474] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 48.759371] page dumped because: kasan: bad access detected [ 48.760202] [ 48.760735] Memory state around the buggy address: [ 48.761669] fff00000c61b5400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 48.762771] fff00000c61b5480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.763643] >fff00000c61b5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.764587] ^ [ 48.765415] fff00000c61b5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.766674] fff00000c61b5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.767454] ================================================================== [ 48.617768] ================================================================== [ 48.619140] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x600 [ 48.619850] Read of size 1 at addr fff00000c61b5500 by task kunit_try_catch/185 [ 48.620930] [ 48.622044] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 48.622979] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.623587] Hardware name: linux,dummy-virt (DT) [ 48.624131] Call trace: [ 48.624699] show_stack+0x20/0x38 (C) [ 48.625677] dump_stack_lvl+0x8c/0xd0 [ 48.626843] print_report+0x118/0x5e0 [ 48.627465] kasan_report+0xc8/0x118 [ 48.628386] __kasan_check_byte+0x54/0x70 [ 48.628919] ksize+0x30/0x88 [ 48.629701] ksize_uaf+0x168/0x600 [ 48.630372] kunit_try_run_case+0x14c/0x3d0 [ 48.631046] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.631684] kthread+0x24c/0x2d0 [ 48.632339] ret_from_fork+0x10/0x20 [ 48.632972] [ 48.633734] Allocated by task 185: [ 48.634489] kasan_save_stack+0x3c/0x68 [ 48.635208] kasan_save_track+0x20/0x40 [ 48.635781] kasan_save_alloc_info+0x40/0x58 [ 48.636389] __kasan_kmalloc+0xd4/0xd8 [ 48.637030] __kmalloc_cache_noprof+0x15c/0x3c0 [ 48.638137] ksize_uaf+0xb8/0x600 [ 48.638813] kunit_try_run_case+0x14c/0x3d0 [ 48.639379] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.640165] kthread+0x24c/0x2d0 [ 48.640680] ret_from_fork+0x10/0x20 [ 48.641511] [ 48.641900] Freed by task 185: [ 48.642414] kasan_save_stack+0x3c/0x68 [ 48.642993] kasan_save_track+0x20/0x40 [ 48.643509] kasan_save_free_info+0x4c/0x78 [ 48.644189] __kasan_slab_free+0x6c/0x98 [ 48.644846] kfree+0x114/0x3c8 [ 48.645383] ksize_uaf+0x11c/0x600 [ 48.645981] kunit_try_run_case+0x14c/0x3d0 [ 48.646604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.647502] kthread+0x24c/0x2d0 [ 48.648064] ret_from_fork+0x10/0x20 [ 48.648733] [ 48.649249] The buggy address belongs to the object at fff00000c61b5500 [ 48.649249] which belongs to the cache kmalloc-128 of size 128 [ 48.650986] The buggy address is located 0 bytes inside of [ 48.650986] freed 128-byte region [fff00000c61b5500, fff00000c61b5580) [ 48.652243] [ 48.652570] The buggy address belongs to the physical page: [ 48.653587] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b5 [ 48.654550] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.655334] page_type: f5(slab) [ 48.655886] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 48.656715] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 48.658419] page dumped because: kasan: bad access detected [ 48.659517] [ 48.659833] Memory state around the buggy address: [ 48.660366] fff00000c61b5400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 48.661888] fff00000c61b5480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.662941] >fff00000c61b5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.663811] ^ [ 48.664456] fff00000c61b5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.666149] fff00000c61b5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.667590] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 48.568142] ================================================================== [ 48.569161] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750 [ 48.570280] Read of size 1 at addr fff00000c619d67f by task kunit_try_catch/183 [ 48.571683] [ 48.572049] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 48.573489] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.574099] Hardware name: linux,dummy-virt (DT) [ 48.574783] Call trace: [ 48.575186] show_stack+0x20/0x38 (C) [ 48.575835] dump_stack_lvl+0x8c/0xd0 [ 48.576547] print_report+0x118/0x5e0 [ 48.577226] kasan_report+0xc8/0x118 [ 48.577949] __asan_report_load1_noabort+0x20/0x30 [ 48.578768] ksize_unpoisons_memory+0x6a0/0x750 [ 48.579605] kunit_try_run_case+0x14c/0x3d0 [ 48.580286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.581239] kthread+0x24c/0x2d0 [ 48.581860] ret_from_fork+0x10/0x20 [ 48.582653] [ 48.582958] Allocated by task 183: [ 48.583671] kasan_save_stack+0x3c/0x68 [ 48.584213] kasan_save_track+0x20/0x40 [ 48.584938] kasan_save_alloc_info+0x40/0x58 [ 48.585769] __kasan_kmalloc+0xd4/0xd8 [ 48.586409] __kmalloc_cache_noprof+0x15c/0x3c0 [ 48.587076] ksize_unpoisons_memory+0xc0/0x750 [ 48.587780] kunit_try_run_case+0x14c/0x3d0 [ 48.588670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.589388] kthread+0x24c/0x2d0 [ 48.590054] ret_from_fork+0x10/0x20 [ 48.590812] [ 48.591246] The buggy address belongs to the object at fff00000c619d600 [ 48.591246] which belongs to the cache kmalloc-128 of size 128 [ 48.592663] The buggy address is located 12 bytes to the right of [ 48.592663] allocated 115-byte region [fff00000c619d600, fff00000c619d673) [ 48.594411] [ 48.594917] The buggy address belongs to the physical page: [ 48.595637] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10619d [ 48.596746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.598175] page_type: f5(slab) [ 48.598952] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 48.599947] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 48.600974] page dumped because: kasan: bad access detected [ 48.602092] [ 48.602502] Memory state around the buggy address: [ 48.603379] fff00000c619d500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.604406] fff00000c619d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.605709] >fff00000c619d600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 48.606906] ^ [ 48.607562] fff00000c619d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.608574] fff00000c619d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.609211] ================================================================== [ 48.483605] ================================================================== [ 48.484813] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750 [ 48.485805] Read of size 1 at addr fff00000c619d673 by task kunit_try_catch/183 [ 48.487125] [ 48.487434] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 48.488943] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.489654] Hardware name: linux,dummy-virt (DT) [ 48.490402] Call trace: [ 48.491169] show_stack+0x20/0x38 (C) [ 48.491916] dump_stack_lvl+0x8c/0xd0 [ 48.492575] print_report+0x118/0x5e0 [ 48.493315] kasan_report+0xc8/0x118 [ 48.494064] __asan_report_load1_noabort+0x20/0x30 [ 48.494985] ksize_unpoisons_memory+0x638/0x750 [ 48.495692] kunit_try_run_case+0x14c/0x3d0 [ 48.496402] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.497548] kthread+0x24c/0x2d0 [ 48.498110] ret_from_fork+0x10/0x20 [ 48.498913] [ 48.499233] Allocated by task 183: [ 48.499820] kasan_save_stack+0x3c/0x68 [ 48.500350] kasan_save_track+0x20/0x40 [ 48.500999] kasan_save_alloc_info+0x40/0x58 [ 48.501663] __kasan_kmalloc+0xd4/0xd8 [ 48.502362] __kmalloc_cache_noprof+0x15c/0x3c0 [ 48.503215] ksize_unpoisons_memory+0xc0/0x750 [ 48.503738] kunit_try_run_case+0x14c/0x3d0 [ 48.504827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.505952] kthread+0x24c/0x2d0 [ 48.506587] ret_from_fork+0x10/0x20 [ 48.507106] [ 48.507463] The buggy address belongs to the object at fff00000c619d600 [ 48.507463] which belongs to the cache kmalloc-128 of size 128 [ 48.508913] The buggy address is located 0 bytes to the right of [ 48.508913] allocated 115-byte region [fff00000c619d600, fff00000c619d673) [ 48.510545] [ 48.510821] The buggy address belongs to the physical page: [ 48.511502] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10619d [ 48.512649] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.513694] page_type: f5(slab) [ 48.514174] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 48.515086] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 48.515945] page dumped because: kasan: bad access detected [ 48.516748] [ 48.517013] Memory state around the buggy address: [ 48.517950] fff00000c619d500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 48.518774] fff00000c619d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.519713] >fff00000c619d600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 48.520487] ^ [ 48.521722] fff00000c619d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.522650] fff00000c619d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.523545] ================================================================== [ 48.526202] ================================================================== [ 48.527125] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750 [ 48.527896] Read of size 1 at addr fff00000c619d678 by task kunit_try_catch/183 [ 48.528762] [ 48.529112] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 48.530369] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.531004] Hardware name: linux,dummy-virt (DT) [ 48.531745] Call trace: [ 48.532120] show_stack+0x20/0x38 (C) [ 48.532651] dump_stack_lvl+0x8c/0xd0 [ 48.533452] print_report+0x118/0x5e0 [ 48.535485] kasan_report+0xc8/0x118 [ 48.535883] __asan_report_load1_noabort+0x20/0x30 [ 48.536414] ksize_unpoisons_memory+0x628/0x750 [ 48.537802] kunit_try_run_case+0x14c/0x3d0 [ 48.538921] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.539836] kthread+0x24c/0x2d0 [ 48.540427] ret_from_fork+0x10/0x20 [ 48.541229] [ 48.541629] Allocated by task 183: [ 48.542247] kasan_save_stack+0x3c/0x68 [ 48.542936] kasan_save_track+0x20/0x40 [ 48.543523] kasan_save_alloc_info+0x40/0x58 [ 48.544090] __kasan_kmalloc+0xd4/0xd8 [ 48.544533] __kmalloc_cache_noprof+0x15c/0x3c0 [ 48.545288] ksize_unpoisons_memory+0xc0/0x750 [ 48.546272] kunit_try_run_case+0x14c/0x3d0 [ 48.547804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.549125] kthread+0x24c/0x2d0 [ 48.550075] ret_from_fork+0x10/0x20 [ 48.550602] [ 48.550781] The buggy address belongs to the object at fff00000c619d600 [ 48.550781] which belongs to the cache kmalloc-128 of size 128 [ 48.551500] The buggy address is located 5 bytes to the right of [ 48.551500] allocated 115-byte region [fff00000c619d600, fff00000c619d673) [ 48.552833] [ 48.553339] The buggy address belongs to the physical page: [ 48.554108] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10619d [ 48.555113] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.556045] page_type: f5(slab) [ 48.556611] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 48.557728] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 48.558621] page dumped because: kasan: bad access detected [ 48.559439] [ 48.559778] Memory state around the buggy address: [ 48.560423] fff00000c619d500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.561244] fff00000c619d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.562108] >fff00000c619d600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 48.562960] ^ [ 48.564248] fff00000c619d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.565307] fff00000c619d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.566679] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[ 48.423115] ================================================================== [ 48.423791] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 48.424655] Free of addr fff00000c5f55300 by task kunit_try_catch/181 [ 48.425447] [ 48.425827] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 48.426944] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.427562] Hardware name: linux,dummy-virt (DT) [ 48.428443] Call trace: [ 48.428824] show_stack+0x20/0x38 (C) [ 48.429506] dump_stack_lvl+0x8c/0xd0 [ 48.430089] print_report+0x118/0x5e0 [ 48.431144] kasan_report_invalid_free+0xb0/0xd8 [ 48.431795] check_slab_allocation+0xd4/0x108 [ 48.432461] __kasan_slab_pre_free+0x2c/0x48 [ 48.433566] kfree+0xe8/0x3c8 [ 48.434197] kfree_sensitive+0x3c/0xb0 [ 48.434752] kmalloc_double_kzfree+0x168/0x308 [ 48.435664] kunit_try_run_case+0x14c/0x3d0 [ 48.436125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.437099] kthread+0x24c/0x2d0 [ 48.437675] ret_from_fork+0x10/0x20 [ 48.438240] [ 48.438635] Allocated by task 181: [ 48.439199] kasan_save_stack+0x3c/0x68 [ 48.439787] kasan_save_track+0x20/0x40 [ 48.440357] kasan_save_alloc_info+0x40/0x58 [ 48.441284] __kasan_kmalloc+0xd4/0xd8 [ 48.441844] __kmalloc_cache_noprof+0x15c/0x3c0 [ 48.442482] kmalloc_double_kzfree+0xb8/0x308 [ 48.443044] kunit_try_run_case+0x14c/0x3d0 [ 48.444373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.445563] kthread+0x24c/0x2d0 [ 48.446000] ret_from_fork+0x10/0x20 [ 48.446494] [ 48.446852] Freed by task 181: [ 48.447263] kasan_save_stack+0x3c/0x68 [ 48.447991] kasan_save_track+0x20/0x40 [ 48.448542] kasan_save_free_info+0x4c/0x78 [ 48.449205] __kasan_slab_free+0x6c/0x98 [ 48.449880] kfree+0x114/0x3c8 [ 48.450442] kfree_sensitive+0x80/0xb0 [ 48.451066] kmalloc_double_kzfree+0x11c/0x308 [ 48.452670] kunit_try_run_case+0x14c/0x3d0 [ 48.453006] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.454363] kthread+0x24c/0x2d0 [ 48.454792] ret_from_fork+0x10/0x20 [ 48.455540] [ 48.455948] The buggy address belongs to the object at fff00000c5f55300 [ 48.455948] which belongs to the cache kmalloc-16 of size 16 [ 48.457634] The buggy address is located 0 bytes inside of [ 48.457634] 16-byte region [fff00000c5f55300, fff00000c5f55310) [ 48.459352] [ 48.459799] The buggy address belongs to the physical page: [ 48.460750] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55 [ 48.461958] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.462749] page_type: f5(slab) [ 48.463390] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 48.464377] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 48.465380] page dumped because: kasan: bad access detected [ 48.466729] [ 48.467281] Memory state around the buggy address: [ 48.467966] fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 48.468908] fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 48.470196] >fff00000c5f55300: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.471125] ^ [ 48.471637] fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.472816] fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.473769] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 48.369793] ================================================================== [ 48.371561] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 48.372351] Read of size 1 at addr fff00000c5f55300 by task kunit_try_catch/181 [ 48.373020] [ 48.373768] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 48.375246] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.375799] Hardware name: linux,dummy-virt (DT) [ 48.376400] Call trace: [ 48.376767] show_stack+0x20/0x38 (C) [ 48.377627] dump_stack_lvl+0x8c/0xd0 [ 48.378179] print_report+0x118/0x5e0 [ 48.378836] kasan_report+0xc8/0x118 [ 48.379948] __kasan_check_byte+0x54/0x70 [ 48.380782] kfree_sensitive+0x30/0xb0 [ 48.381830] kmalloc_double_kzfree+0x168/0x308 [ 48.382508] kunit_try_run_case+0x14c/0x3d0 [ 48.383257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.384188] kthread+0x24c/0x2d0 [ 48.384793] ret_from_fork+0x10/0x20 [ 48.385494] [ 48.386491] Allocated by task 181: [ 48.387003] kasan_save_stack+0x3c/0x68 [ 48.387700] kasan_save_track+0x20/0x40 [ 48.388380] kasan_save_alloc_info+0x40/0x58 [ 48.389160] __kasan_kmalloc+0xd4/0xd8 [ 48.389915] __kmalloc_cache_noprof+0x15c/0x3c0 [ 48.390606] kmalloc_double_kzfree+0xb8/0x308 [ 48.391258] kunit_try_run_case+0x14c/0x3d0 [ 48.391917] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.392724] kthread+0x24c/0x2d0 [ 48.393427] ret_from_fork+0x10/0x20 [ 48.394664] [ 48.395019] Freed by task 181: [ 48.395645] kasan_save_stack+0x3c/0x68 [ 48.396259] kasan_save_track+0x20/0x40 [ 48.397012] kasan_save_free_info+0x4c/0x78 [ 48.398009] __kasan_slab_free+0x6c/0x98 [ 48.398601] kfree+0x114/0x3c8 [ 48.399113] kfree_sensitive+0x80/0xb0 [ 48.399999] kmalloc_double_kzfree+0x11c/0x308 [ 48.400881] kunit_try_run_case+0x14c/0x3d0 [ 48.401726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.402258] kthread+0x24c/0x2d0 [ 48.402885] ret_from_fork+0x10/0x20 [ 48.403635] [ 48.404154] The buggy address belongs to the object at fff00000c5f55300 [ 48.404154] which belongs to the cache kmalloc-16 of size 16 [ 48.405690] The buggy address is located 0 bytes inside of [ 48.405690] freed 16-byte region [fff00000c5f55300, fff00000c5f55310) [ 48.407216] [ 48.407636] The buggy address belongs to the physical page: [ 48.408421] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55 [ 48.409820] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.410667] page_type: f5(slab) [ 48.411391] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 48.412267] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 48.413638] page dumped because: kasan: bad access detected [ 48.414506] [ 48.414985] Memory state around the buggy address: [ 48.415812] fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 48.416668] fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 48.417597] >fff00000c5f55300: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.418511] ^ [ 48.419221] fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.420039] fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.421492] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 48.243918] ================================================================== [ 48.245548] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 48.246189] Write of size 33 at addr fff00000c616ad00 by task kunit_try_catch/175 [ 48.247790] [ 48.248268] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 48.250176] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.250837] Hardware name: linux,dummy-virt (DT) [ 48.251529] Call trace: [ 48.252098] show_stack+0x20/0x38 (C) [ 48.252795] dump_stack_lvl+0x8c/0xd0 [ 48.253641] print_report+0x118/0x5e0 [ 48.254664] kasan_report+0xc8/0x118 [ 48.255440] kasan_check_range+0x100/0x1a8 [ 48.256310] __asan_memset+0x34/0x78 [ 48.256857] kmalloc_uaf_memset+0x170/0x310 [ 48.257920] kunit_try_run_case+0x14c/0x3d0 [ 48.258697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.259375] kthread+0x24c/0x2d0 [ 48.259987] ret_from_fork+0x10/0x20 [ 48.260544] [ 48.260876] Allocated by task 175: [ 48.261748] kasan_save_stack+0x3c/0x68 [ 48.262379] kasan_save_track+0x20/0x40 [ 48.262934] kasan_save_alloc_info+0x40/0x58 [ 48.264226] __kasan_kmalloc+0xd4/0xd8 [ 48.264741] __kmalloc_cache_noprof+0x15c/0x3c0 [ 48.265916] kmalloc_uaf_memset+0xb8/0x310 [ 48.266523] kunit_try_run_case+0x14c/0x3d0 [ 48.267080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.267739] kthread+0x24c/0x2d0 [ 48.268314] ret_from_fork+0x10/0x20 [ 48.268797] [ 48.269132] Freed by task 175: [ 48.270213] kasan_save_stack+0x3c/0x68 [ 48.271044] kasan_save_track+0x20/0x40 [ 48.271588] kasan_save_free_info+0x4c/0x78 [ 48.272454] __kasan_slab_free+0x6c/0x98 [ 48.272863] kfree+0x114/0x3c8 [ 48.273965] kmalloc_uaf_memset+0x11c/0x310 [ 48.274605] kunit_try_run_case+0x14c/0x3d0 [ 48.275196] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.275849] kthread+0x24c/0x2d0 [ 48.276515] ret_from_fork+0x10/0x20 [ 48.277009] [ 48.277319] The buggy address belongs to the object at fff00000c616ad00 [ 48.277319] which belongs to the cache kmalloc-64 of size 64 [ 48.279615] The buggy address is located 0 bytes inside of [ 48.279615] freed 64-byte region [fff00000c616ad00, fff00000c616ad40) [ 48.280851] [ 48.281519] The buggy address belongs to the physical page: [ 48.282043] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616a [ 48.282953] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.283877] page_type: f5(slab) [ 48.284393] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 48.285406] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 48.286441] page dumped because: kasan: bad access detected [ 48.287259] [ 48.287584] Memory state around the buggy address: [ 48.288323] fff00000c616ac00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 48.289436] fff00000c616ac80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.290385] >fff00000c616ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.290806] ^ [ 48.291047] fff00000c616ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.291972] fff00000c616ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.292730] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 48.138541] ================================================================== [ 48.139763] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e8 [ 48.140490] Read of size 64 at addr fff00000c60d3484 by task kunit_try_catch/171 [ 48.141476] [ 48.141835] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 48.143008] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.143698] Hardware name: linux,dummy-virt (DT) [ 48.144266] Call trace: [ 48.145793] show_stack+0x20/0x38 (C) [ 48.146473] dump_stack_lvl+0x8c/0xd0 [ 48.146972] print_report+0x118/0x5e0 [ 48.147549] kasan_report+0xc8/0x118 [ 48.148153] kasan_check_range+0x100/0x1a8 [ 48.148776] __asan_memmove+0x3c/0x98 [ 48.149357] kmalloc_memmove_invalid_size+0x154/0x2e8 [ 48.150372] kunit_try_run_case+0x14c/0x3d0 [ 48.151600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.152481] kthread+0x24c/0x2d0 [ 48.152906] ret_from_fork+0x10/0x20 [ 48.153528] [ 48.153808] Allocated by task 171: [ 48.154398] kasan_save_stack+0x3c/0x68 [ 48.154925] kasan_save_track+0x20/0x40 [ 48.155591] kasan_save_alloc_info+0x40/0x58 [ 48.156665] __kasan_kmalloc+0xd4/0xd8 [ 48.157172] __kmalloc_cache_noprof+0x15c/0x3c0 [ 48.157819] kmalloc_memmove_invalid_size+0xb0/0x2e8 [ 48.158367] kunit_try_run_case+0x14c/0x3d0 [ 48.159098] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.160004] kthread+0x24c/0x2d0 [ 48.160603] ret_from_fork+0x10/0x20 [ 48.162062] [ 48.162469] The buggy address belongs to the object at fff00000c60d3480 [ 48.162469] which belongs to the cache kmalloc-64 of size 64 [ 48.164021] The buggy address is located 4 bytes inside of [ 48.164021] allocated 64-byte region [fff00000c60d3480, fff00000c60d34c0) [ 48.165866] [ 48.166151] The buggy address belongs to the physical page: [ 48.166924] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060d3 [ 48.167909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.168833] page_type: f5(slab) [ 48.169277] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 48.170620] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 48.171492] page dumped because: kasan: bad access detected [ 48.172136] [ 48.172452] Memory state around the buggy address: [ 48.173051] fff00000c60d3380: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 48.174352] fff00000c60d3400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.175194] >fff00000c60d3480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 48.176166] ^ [ 48.176763] fff00000c60d3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.177921] fff00000c60d3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.179039] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 48.086405] ================================================================== [ 48.087636] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 48.088528] Read of size 18446744073709551614 at addr fff00000c60d3304 by task kunit_try_catch/169 [ 48.090953] [ 48.091274] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 48.092471] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.092971] Hardware name: linux,dummy-virt (DT) [ 48.093584] Call trace: [ 48.093940] show_stack+0x20/0x38 (C) [ 48.094570] dump_stack_lvl+0x8c/0xd0 [ 48.095503] print_report+0x118/0x5e0 [ 48.096021] kasan_report+0xc8/0x118 [ 48.096642] kasan_check_range+0x100/0x1a8 [ 48.097805] __asan_memmove+0x3c/0x98 [ 48.098372] kmalloc_memmove_negative_size+0x154/0x2e0 [ 48.098991] kunit_try_run_case+0x14c/0x3d0 [ 48.099694] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.100408] kthread+0x24c/0x2d0 [ 48.101021] ret_from_fork+0x10/0x20 [ 48.101888] [ 48.102174] Allocated by task 169: [ 48.102703] kasan_save_stack+0x3c/0x68 [ 48.103342] kasan_save_track+0x20/0x40 [ 48.103873] kasan_save_alloc_info+0x40/0x58 [ 48.104439] __kasan_kmalloc+0xd4/0xd8 [ 48.105308] __kmalloc_cache_noprof+0x15c/0x3c0 [ 48.106011] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 48.106677] kunit_try_run_case+0x14c/0x3d0 [ 48.107267] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.108075] kthread+0x24c/0x2d0 [ 48.108691] ret_from_fork+0x10/0x20 [ 48.109620] [ 48.110275] The buggy address belongs to the object at fff00000c60d3300 [ 48.110275] which belongs to the cache kmalloc-64 of size 64 [ 48.112441] The buggy address is located 4 bytes inside of [ 48.112441] 64-byte region [fff00000c60d3300, fff00000c60d3340) [ 48.113794] [ 48.114558] The buggy address belongs to the physical page: [ 48.115247] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060d3 [ 48.116222] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.117207] page_type: f5(slab) [ 48.117692] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 48.118976] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 48.120121] page dumped because: kasan: bad access detected [ 48.121385] [ 48.121777] Memory state around the buggy address: [ 48.122566] fff00000c60d3200: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 48.123658] fff00000c60d3280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.124073] >fff00000c60d3300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 48.124592] ^ [ 48.125553] fff00000c60d3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.126722] fff00000c60d3400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.127817] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset
[ 47.982611] ================================================================== [ 47.983817] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 47.984431] Write of size 8 at addr fff00000c6189971 by task kunit_try_catch/165 [ 47.985027] [ 47.986445] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 47.988239] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.989735] Hardware name: linux,dummy-virt (DT) [ 47.990793] Call trace: [ 47.991137] show_stack+0x20/0x38 (C) [ 47.991758] dump_stack_lvl+0x8c/0xd0 [ 47.992397] print_report+0x118/0x5e0 [ 47.992932] kasan_report+0xc8/0x118 [ 47.993787] kasan_check_range+0x100/0x1a8 [ 47.994697] __asan_memset+0x34/0x78 [ 47.995502] kmalloc_oob_memset_8+0x150/0x2f8 [ 47.996457] kunit_try_run_case+0x14c/0x3d0 [ 47.997051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.997974] kthread+0x24c/0x2d0 [ 47.998375] ret_from_fork+0x10/0x20 [ 47.999444] [ 47.999776] Allocated by task 165: [ 48.000060] kasan_save_stack+0x3c/0x68 [ 48.000403] kasan_save_track+0x20/0x40 [ 48.002101] kasan_save_alloc_info+0x40/0x58 [ 48.002798] __kasan_kmalloc+0xd4/0xd8 [ 48.003366] __kmalloc_cache_noprof+0x15c/0x3c0 [ 48.004004] kmalloc_oob_memset_8+0xb0/0x2f8 [ 48.004570] kunit_try_run_case+0x14c/0x3d0 [ 48.005090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.006081] kthread+0x24c/0x2d0 [ 48.006480] ret_from_fork+0x10/0x20 [ 48.006825] [ 48.007034] The buggy address belongs to the object at fff00000c6189900 [ 48.007034] which belongs to the cache kmalloc-128 of size 128 [ 48.007848] The buggy address is located 113 bytes inside of [ 48.007848] allocated 120-byte region [fff00000c6189900, fff00000c6189978) [ 48.008739] [ 48.009012] The buggy address belongs to the physical page: [ 48.010064] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106189 [ 48.012491] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.014490] page_type: f5(slab) [ 48.014829] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 48.015407] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 48.017271] page dumped because: kasan: bad access detected [ 48.018682] [ 48.019326] Memory state around the buggy address: [ 48.020339] fff00000c6189800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 48.021666] fff00000c6189880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.022780] >fff00000c6189900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 48.023730] ^ [ 48.024315] fff00000c6189980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.024913] fff00000c6189a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.026860] ================================================================== [ 47.884213] ================================================================== [ 47.885747] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 47.886614] Write of size 2 at addr fff00000c6189577 by task kunit_try_catch/161 [ 47.887913] [ 47.888427] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 47.889856] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.890669] Hardware name: linux,dummy-virt (DT) [ 47.891162] Call trace: [ 47.891601] show_stack+0x20/0x38 (C) [ 47.892147] dump_stack_lvl+0x8c/0xd0 [ 47.892804] print_report+0x118/0x5e0 [ 47.893765] kasan_report+0xc8/0x118 [ 47.894532] kasan_check_range+0x100/0x1a8 [ 47.895133] __asan_memset+0x34/0x78 [ 47.895675] kmalloc_oob_memset_2+0x150/0x2f8 [ 47.896324] kunit_try_run_case+0x14c/0x3d0 [ 47.897007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.897905] kthread+0x24c/0x2d0 [ 47.898711] ret_from_fork+0x10/0x20 [ 47.899201] [ 47.899694] Allocated by task 161: [ 47.900170] kasan_save_stack+0x3c/0x68 [ 47.900946] kasan_save_track+0x20/0x40 [ 47.901900] kasan_save_alloc_info+0x40/0x58 [ 47.902655] __kasan_kmalloc+0xd4/0xd8 [ 47.903100] __kmalloc_cache_noprof+0x15c/0x3c0 [ 47.903689] kmalloc_oob_memset_2+0xb0/0x2f8 [ 47.904265] kunit_try_run_case+0x14c/0x3d0 [ 47.904887] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.905777] kthread+0x24c/0x2d0 [ 47.906336] ret_from_fork+0x10/0x20 [ 47.906898] [ 47.907261] The buggy address belongs to the object at fff00000c6189500 [ 47.907261] which belongs to the cache kmalloc-128 of size 128 [ 47.908578] The buggy address is located 119 bytes inside of [ 47.908578] allocated 120-byte region [fff00000c6189500, fff00000c6189578) [ 47.910164] [ 47.910501] The buggy address belongs to the physical page: [ 47.911233] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106189 [ 47.912221] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.913346] page_type: f5(slab) [ 47.913811] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 47.914739] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 47.916025] page dumped because: kasan: bad access detected [ 47.916758] [ 47.917112] Memory state around the buggy address: [ 47.917769] fff00000c6189400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.918635] fff00000c6189480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.919468] >fff00000c6189500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 47.920498] ^ [ 47.921552] fff00000c6189580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.922538] fff00000c6189600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.923394] ================================================================== [ 48.037880] ================================================================== [ 48.039490] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 48.040375] Write of size 16 at addr fff00000c60dcf69 by task kunit_try_catch/167 [ 48.041713] [ 48.042162] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 48.043399] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.044144] Hardware name: linux,dummy-virt (DT) [ 48.044981] Call trace: [ 48.045689] show_stack+0x20/0x38 (C) [ 48.046533] dump_stack_lvl+0x8c/0xd0 [ 48.047166] print_report+0x118/0x5e0 [ 48.047934] kasan_report+0xc8/0x118 [ 48.048467] kasan_check_range+0x100/0x1a8 [ 48.049097] __asan_memset+0x34/0x78 [ 48.049759] kmalloc_oob_memset_16+0x150/0x2f8 [ 48.050677] kunit_try_run_case+0x14c/0x3d0 [ 48.051389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.052168] kthread+0x24c/0x2d0 [ 48.052776] ret_from_fork+0x10/0x20 [ 48.053475] [ 48.054036] Allocated by task 167: [ 48.054602] kasan_save_stack+0x3c/0x68 [ 48.055270] kasan_save_track+0x20/0x40 [ 48.055817] kasan_save_alloc_info+0x40/0x58 [ 48.056508] __kasan_kmalloc+0xd4/0xd8 [ 48.057456] __kmalloc_cache_noprof+0x15c/0x3c0 [ 48.058123] kmalloc_oob_memset_16+0xb0/0x2f8 [ 48.058771] kunit_try_run_case+0x14c/0x3d0 [ 48.059437] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.060189] kthread+0x24c/0x2d0 [ 48.060859] ret_from_fork+0x10/0x20 [ 48.062042] [ 48.062498] The buggy address belongs to the object at fff00000c60dcf00 [ 48.062498] which belongs to the cache kmalloc-128 of size 128 [ 48.063729] The buggy address is located 105 bytes inside of [ 48.063729] allocated 120-byte region [fff00000c60dcf00, fff00000c60dcf78) [ 48.065184] [ 48.065474] The buggy address belongs to the physical page: [ 48.066342] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060dc [ 48.067269] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.068131] page_type: f5(slab) [ 48.068697] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 48.069933] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 48.070777] page dumped because: kasan: bad access detected [ 48.071424] [ 48.071754] Memory state around the buggy address: [ 48.072410] fff00000c60dce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 48.073240] fff00000c60dce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.074073] >fff00000c60dcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 48.075047] ^ [ 48.076163] fff00000c60dcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.077265] fff00000c60dd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 48.078192] ================================================================== [ 47.932317] ================================================================== [ 47.933607] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 47.934769] Write of size 4 at addr fff00000c60dcc75 by task kunit_try_catch/163 [ 47.935934] [ 47.936231] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 47.937650] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.938268] Hardware name: linux,dummy-virt (DT) [ 47.938918] Call trace: [ 47.939282] show_stack+0x20/0x38 (C) [ 47.940026] dump_stack_lvl+0x8c/0xd0 [ 47.940766] print_report+0x118/0x5e0 [ 47.941772] kasan_report+0xc8/0x118 [ 47.942659] kasan_check_range+0x100/0x1a8 [ 47.942973] __asan_memset+0x34/0x78 [ 47.943255] kmalloc_oob_memset_4+0x150/0x300 [ 47.943889] kunit_try_run_case+0x14c/0x3d0 [ 47.944823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.945864] kthread+0x24c/0x2d0 [ 47.946683] ret_from_fork+0x10/0x20 [ 47.947341] [ 47.947728] Allocated by task 163: [ 47.948394] kasan_save_stack+0x3c/0x68 [ 47.949060] kasan_save_track+0x20/0x40 [ 47.949973] kasan_save_alloc_info+0x40/0x58 [ 47.950663] __kasan_kmalloc+0xd4/0xd8 [ 47.951245] __kmalloc_cache_noprof+0x15c/0x3c0 [ 47.951948] kmalloc_oob_memset_4+0xb0/0x300 [ 47.952619] kunit_try_run_case+0x14c/0x3d0 [ 47.953288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.954328] kthread+0x24c/0x2d0 [ 47.955015] ret_from_fork+0x10/0x20 [ 47.955720] [ 47.956140] The buggy address belongs to the object at fff00000c60dcc00 [ 47.956140] which belongs to the cache kmalloc-128 of size 128 [ 47.958015] The buggy address is located 117 bytes inside of [ 47.958015] allocated 120-byte region [fff00000c60dcc00, fff00000c60dcc78) [ 47.959279] [ 47.959626] The buggy address belongs to the physical page: [ 47.960273] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060dc [ 47.961471] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.962386] page_type: f5(slab) [ 47.962891] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 47.963871] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 47.964785] page dumped because: kasan: bad access detected [ 47.965689] [ 47.966032] Memory state around the buggy address: [ 47.966691] fff00000c60dcb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 47.967628] fff00000c60dcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.968416] >fff00000c60dcc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 47.969250] ^ [ 47.970704] fff00000c60dcc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.971763] fff00000c60dcd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.972645] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 47.831753] ================================================================== [ 47.832917] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 47.834128] Write of size 128 at addr fff00000c6189400 by task kunit_try_catch/159 [ 47.834972] [ 47.836025] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 47.838080] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.838596] Hardware name: linux,dummy-virt (DT) [ 47.839133] Call trace: [ 47.839631] show_stack+0x20/0x38 (C) [ 47.840169] dump_stack_lvl+0x8c/0xd0 [ 47.840966] print_report+0x118/0x5e0 [ 47.841727] kasan_report+0xc8/0x118 [ 47.843098] kasan_check_range+0x100/0x1a8 [ 47.843630] __asan_memset+0x34/0x78 [ 47.844118] kmalloc_oob_in_memset+0x144/0x2d0 [ 47.844893] kunit_try_run_case+0x14c/0x3d0 [ 47.845563] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.846357] kthread+0x24c/0x2d0 [ 47.847041] ret_from_fork+0x10/0x20 [ 47.847955] [ 47.848284] Allocated by task 159: [ 47.848747] kasan_save_stack+0x3c/0x68 [ 47.849584] kasan_save_track+0x20/0x40 [ 47.850185] kasan_save_alloc_info+0x40/0x58 [ 47.850811] __kasan_kmalloc+0xd4/0xd8 [ 47.851725] __kmalloc_cache_noprof+0x15c/0x3c0 [ 47.852667] kmalloc_oob_in_memset+0xb0/0x2d0 [ 47.853705] kunit_try_run_case+0x14c/0x3d0 [ 47.854354] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.855041] kthread+0x24c/0x2d0 [ 47.855753] ret_from_fork+0x10/0x20 [ 47.856340] [ 47.856626] The buggy address belongs to the object at fff00000c6189400 [ 47.856626] which belongs to the cache kmalloc-128 of size 128 [ 47.858688] The buggy address is located 0 bytes inside of [ 47.858688] allocated 120-byte region [fff00000c6189400, fff00000c6189478) [ 47.860082] [ 47.860603] The buggy address belongs to the physical page: [ 47.861896] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106189 [ 47.863109] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.863923] page_type: f5(slab) [ 47.864387] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 47.865621] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 47.866681] page dumped because: kasan: bad access detected [ 47.867344] [ 47.867791] Memory state around the buggy address: [ 47.868829] fff00000c6189300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 47.870073] fff00000c6189380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.871030] >fff00000c6189400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 47.871700] ^ [ 47.872788] fff00000c6189480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.874449] fff00000c6189500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.875167] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 48.190367] ================================================================== [ 48.191581] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 48.192313] Read of size 1 at addr fff00000c40dc828 by task kunit_try_catch/173 [ 48.192995] [ 48.193367] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 48.195134] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.195708] Hardware name: linux,dummy-virt (DT) [ 48.196321] Call trace: [ 48.196866] show_stack+0x20/0x38 (C) [ 48.197478] dump_stack_lvl+0x8c/0xd0 [ 48.197949] print_report+0x118/0x5e0 [ 48.199012] kasan_report+0xc8/0x118 [ 48.199652] __asan_report_load1_noabort+0x20/0x30 [ 48.200383] kmalloc_uaf+0x300/0x338 [ 48.200947] kunit_try_run_case+0x14c/0x3d0 [ 48.201558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.202307] kthread+0x24c/0x2d0 [ 48.202934] ret_from_fork+0x10/0x20 [ 48.203740] [ 48.204042] Allocated by task 173: [ 48.204571] kasan_save_stack+0x3c/0x68 [ 48.205052] kasan_save_track+0x20/0x40 [ 48.206060] kasan_save_alloc_info+0x40/0x58 [ 48.206702] __kasan_kmalloc+0xd4/0xd8 [ 48.207247] __kmalloc_cache_noprof+0x15c/0x3c0 [ 48.207847] kmalloc_uaf+0xb8/0x338 [ 48.208439] kunit_try_run_case+0x14c/0x3d0 [ 48.208943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.210148] kthread+0x24c/0x2d0 [ 48.210699] ret_from_fork+0x10/0x20 [ 48.211251] [ 48.211587] Freed by task 173: [ 48.211999] kasan_save_stack+0x3c/0x68 [ 48.212617] kasan_save_track+0x20/0x40 [ 48.213079] kasan_save_free_info+0x4c/0x78 [ 48.214132] __kasan_slab_free+0x6c/0x98 [ 48.214706] kfree+0x114/0x3c8 [ 48.215271] kmalloc_uaf+0x11c/0x338 [ 48.215840] kunit_try_run_case+0x14c/0x3d0 [ 48.216442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.217378] kthread+0x24c/0x2d0 [ 48.217938] ret_from_fork+0x10/0x20 [ 48.218530] [ 48.218868] The buggy address belongs to the object at fff00000c40dc820 [ 48.218868] which belongs to the cache kmalloc-16 of size 16 [ 48.220397] The buggy address is located 8 bytes inside of [ 48.220397] freed 16-byte region [fff00000c40dc820, fff00000c40dc830) [ 48.222027] [ 48.222679] The buggy address belongs to the physical page: [ 48.223216] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1040dc [ 48.224280] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.225234] page_type: f5(slab) [ 48.225753] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 48.226738] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 48.227657] page dumped because: kasan: bad access detected [ 48.228344] [ 48.228762] Memory state around the buggy address: [ 48.229401] fff00000c40dc700: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc [ 48.230754] fff00000c40dc780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 48.231618] >fff00000c40dc800: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 48.232483] ^ [ 48.233363] fff00000c40dc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.234194] fff00000c40dc900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.235054] ================================================================== [ 48.302800] ================================================================== [ 48.304146] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 48.305362] Read of size 1 at addr fff00000c616ae28 by task kunit_try_catch/177 [ 48.306730] [ 48.307128] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 48.308546] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.309102] Hardware name: linux,dummy-virt (DT) [ 48.310525] Call trace: [ 48.310739] show_stack+0x20/0x38 (C) [ 48.311022] dump_stack_lvl+0x8c/0xd0 [ 48.311340] print_report+0x118/0x5e0 [ 48.311645] kasan_report+0xc8/0x118 [ 48.311918] __asan_report_load1_noabort+0x20/0x30 [ 48.312246] kmalloc_uaf2+0x3f4/0x468 [ 48.314181] kunit_try_run_case+0x14c/0x3d0 [ 48.315106] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.315899] kthread+0x24c/0x2d0 [ 48.316656] ret_from_fork+0x10/0x20 [ 48.317238] [ 48.317616] Allocated by task 177: [ 48.318024] kasan_save_stack+0x3c/0x68 [ 48.318684] kasan_save_track+0x20/0x40 [ 48.319593] kasan_save_alloc_info+0x40/0x58 [ 48.320176] __kasan_kmalloc+0xd4/0xd8 [ 48.320729] __kmalloc_cache_noprof+0x15c/0x3c0 [ 48.321504] kmalloc_uaf2+0xc4/0x468 [ 48.322013] kunit_try_run_case+0x14c/0x3d0 [ 48.323020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.324131] kthread+0x24c/0x2d0 [ 48.324623] ret_from_fork+0x10/0x20 [ 48.325183] [ 48.325534] Freed by task 177: [ 48.326035] kasan_save_stack+0x3c/0x68 [ 48.326610] kasan_save_track+0x20/0x40 [ 48.327125] kasan_save_free_info+0x4c/0x78 [ 48.327977] __kasan_slab_free+0x6c/0x98 [ 48.328586] kfree+0x114/0x3c8 [ 48.329796] kmalloc_uaf2+0x134/0x468 [ 48.330347] kunit_try_run_case+0x14c/0x3d0 [ 48.330935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.331646] kthread+0x24c/0x2d0 [ 48.332118] ret_from_fork+0x10/0x20 [ 48.332868] [ 48.333186] The buggy address belongs to the object at fff00000c616ae00 [ 48.333186] which belongs to the cache kmalloc-64 of size 64 [ 48.334976] The buggy address is located 40 bytes inside of [ 48.334976] freed 64-byte region [fff00000c616ae00, fff00000c616ae40) [ 48.336246] [ 48.336649] The buggy address belongs to the physical page: [ 48.338027] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616a [ 48.338968] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.339980] page_type: f5(slab) [ 48.340486] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 48.341488] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 48.342373] page dumped because: kasan: bad access detected [ 48.343056] [ 48.343654] Memory state around the buggy address: [ 48.344363] fff00000c616ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.345324] fff00000c616ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.346087] >fff00000c616ae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 48.348113] ^ [ 48.349073] fff00000c616ae80: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 48.350073] fff00000c616af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.351353] ================================================================== [ 47.775067] ================================================================== [ 47.776212] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 47.776842] Read of size 16 at addr fff00000c40dc800 by task kunit_try_catch/157 [ 47.778139] [ 47.778623] CPU: 1 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 47.779510] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.779946] Hardware name: linux,dummy-virt (DT) [ 47.780685] Call trace: [ 47.781143] show_stack+0x20/0x38 (C) [ 47.782258] dump_stack_lvl+0x8c/0xd0 [ 47.783388] print_report+0x118/0x5e0 [ 47.784202] kasan_report+0xc8/0x118 [ 47.784953] __asan_report_load16_noabort+0x20/0x30 [ 47.786212] kmalloc_uaf_16+0x3bc/0x438 [ 47.787069] kunit_try_run_case+0x14c/0x3d0 [ 47.787667] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.788588] kthread+0x24c/0x2d0 [ 47.789190] ret_from_fork+0x10/0x20 [ 47.790082] [ 47.790452] Allocated by task 157: [ 47.791054] kasan_save_stack+0x3c/0x68 [ 47.791829] kasan_save_track+0x20/0x40 [ 47.792481] kasan_save_alloc_info+0x40/0x58 [ 47.793264] __kasan_kmalloc+0xd4/0xd8 [ 47.793866] __kmalloc_cache_noprof+0x15c/0x3c0 [ 47.794573] kmalloc_uaf_16+0x140/0x438 [ 47.795253] kunit_try_run_case+0x14c/0x3d0 [ 47.795895] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.796652] kthread+0x24c/0x2d0 [ 47.797313] ret_from_fork+0x10/0x20 [ 47.797880] [ 47.798148] Freed by task 157: [ 47.798744] kasan_save_stack+0x3c/0x68 [ 47.799214] kasan_save_track+0x20/0x40 [ 47.800425] kasan_save_free_info+0x4c/0x78 [ 47.800980] __kasan_slab_free+0x6c/0x98 [ 47.801661] kfree+0x114/0x3c8 [ 47.802209] kmalloc_uaf_16+0x190/0x438 [ 47.802802] kunit_try_run_case+0x14c/0x3d0 [ 47.803625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.804399] kthread+0x24c/0x2d0 [ 47.804988] ret_from_fork+0x10/0x20 [ 47.805698] [ 47.806035] The buggy address belongs to the object at fff00000c40dc800 [ 47.806035] which belongs to the cache kmalloc-16 of size 16 [ 47.807576] The buggy address is located 0 bytes inside of [ 47.807576] freed 16-byte region [fff00000c40dc800, fff00000c40dc810) [ 47.808957] [ 47.809284] The buggy address belongs to the physical page: [ 47.810213] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1040dc [ 47.811037] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.811925] page_type: f5(slab) [ 47.812522] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 47.813676] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 47.814551] page dumped because: kasan: bad access detected [ 47.815204] [ 47.815567] Memory state around the buggy address: [ 47.816194] fff00000c40dc700: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc [ 47.816939] fff00000c40dc780: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc [ 47.818633] >fff00000c40dc800: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.819509] ^ [ 47.819959] fff00000c40dc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.820947] fff00000c40dc900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.821732] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob
[ 47.727702] ================================================================== [ 47.728730] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 47.729470] Write of size 16 at addr fff00000c40dc7a0 by task kunit_try_catch/155 [ 47.731327] [ 47.731762] CPU: 1 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 47.732898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.733690] Hardware name: linux,dummy-virt (DT) [ 47.734809] Call trace: [ 47.735351] show_stack+0x20/0x38 (C) [ 47.735869] dump_stack_lvl+0x8c/0xd0 [ 47.736430] print_report+0x118/0x5e0 [ 47.736972] kasan_report+0xc8/0x118 [ 47.737507] __asan_report_store16_noabort+0x20/0x30 [ 47.738585] kmalloc_oob_16+0x3a0/0x3f8 [ 47.739146] kunit_try_run_case+0x14c/0x3d0 [ 47.739779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.740518] kthread+0x24c/0x2d0 [ 47.741035] ret_from_fork+0x10/0x20 [ 47.741635] [ 47.741942] Allocated by task 155: [ 47.742601] kasan_save_stack+0x3c/0x68 [ 47.743228] kasan_save_track+0x20/0x40 [ 47.744017] kasan_save_alloc_info+0x40/0x58 [ 47.744633] __kasan_kmalloc+0xd4/0xd8 [ 47.745075] __kmalloc_cache_noprof+0x15c/0x3c0 [ 47.746054] kmalloc_oob_16+0xb4/0x3f8 [ 47.746600] kunit_try_run_case+0x14c/0x3d0 [ 47.747238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.747977] kthread+0x24c/0x2d0 [ 47.748520] ret_from_fork+0x10/0x20 [ 47.749380] [ 47.749733] The buggy address belongs to the object at fff00000c40dc7a0 [ 47.749733] which belongs to the cache kmalloc-16 of size 16 [ 47.751057] The buggy address is located 0 bytes inside of [ 47.751057] allocated 13-byte region [fff00000c40dc7a0, fff00000c40dc7ad) [ 47.752577] [ 47.752861] The buggy address belongs to the physical page: [ 47.753863] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1040dc [ 47.754883] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.755517] page_type: f5(slab) [ 47.756093] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 47.757331] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 47.758137] page dumped because: kasan: bad access detected [ 47.758828] [ 47.759169] Memory state around the buggy address: [ 47.759767] fff00000c40dc680: 00 00 fc fc 00 06 fc fc 00 06 fc fc fa fb fc fc [ 47.760589] fff00000c40dc700: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc [ 47.761684] >fff00000c40dc780: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc [ 47.762675] ^ [ 47.763225] fff00000c40dc800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.764176] fff00000c40dc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.765022] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 47.664656] ================================================================== [ 47.666031] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 47.667107] Read of size 1 at addr fff00000c4546400 by task kunit_try_catch/153 [ 47.668761] [ 47.669353] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 47.670530] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.671105] Hardware name: linux,dummy-virt (DT) [ 47.671707] Call trace: [ 47.672051] show_stack+0x20/0x38 (C) [ 47.672714] dump_stack_lvl+0x8c/0xd0 [ 47.673753] print_report+0x118/0x5e0 [ 47.674416] kasan_report+0xc8/0x118 [ 47.675021] __asan_report_load1_noabort+0x20/0x30 [ 47.675729] krealloc_uaf+0x4c8/0x520 [ 47.676338] kunit_try_run_case+0x14c/0x3d0 [ 47.676967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.677909] kthread+0x24c/0x2d0 [ 47.678816] ret_from_fork+0x10/0x20 [ 47.679456] [ 47.679789] Allocated by task 153: [ 47.680459] kasan_save_stack+0x3c/0x68 [ 47.680967] kasan_save_track+0x20/0x40 [ 47.681984] kasan_save_alloc_info+0x40/0x58 [ 47.682531] __kasan_kmalloc+0xd4/0xd8 [ 47.682989] __kmalloc_cache_noprof+0x15c/0x3c0 [ 47.683609] krealloc_uaf+0xc8/0x520 [ 47.684133] kunit_try_run_case+0x14c/0x3d0 [ 47.684663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.685859] kthread+0x24c/0x2d0 [ 47.686323] ret_from_fork+0x10/0x20 [ 47.687421] [ 47.687935] Freed by task 153: [ 47.688408] kasan_save_stack+0x3c/0x68 [ 47.688878] kasan_save_track+0x20/0x40 [ 47.690327] kasan_save_free_info+0x4c/0x78 [ 47.690914] __kasan_slab_free+0x6c/0x98 [ 47.691539] kfree+0x114/0x3c8 [ 47.692043] krealloc_uaf+0x12c/0x520 [ 47.692615] kunit_try_run_case+0x14c/0x3d0 [ 47.693225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.694058] kthread+0x24c/0x2d0 [ 47.695022] ret_from_fork+0x10/0x20 [ 47.695519] [ 47.695888] The buggy address belongs to the object at fff00000c4546400 [ 47.695888] which belongs to the cache kmalloc-256 of size 256 [ 47.697315] The buggy address is located 0 bytes inside of [ 47.697315] freed 256-byte region [fff00000c4546400, fff00000c4546500) [ 47.698885] [ 47.699190] The buggy address belongs to the physical page: [ 47.700032] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104546 [ 47.701345] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 47.702117] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 47.703134] page_type: f5(slab) [ 47.703658] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 47.704688] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 47.706347] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 47.707329] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 47.708310] head: 0bfffe0000000001 ffffc1ffc3115181 ffffffffffffffff 0000000000000000 [ 47.709505] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 47.710270] page dumped because: kasan: bad access detected [ 47.711255] [ 47.711802] Memory state around the buggy address: [ 47.712392] fff00000c4546300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.713189] fff00000c4546380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.714499] >fff00000c4546400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.715238] ^ [ 47.715781] fff00000c4546480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.716897] fff00000c4546500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.718073] ================================================================== [ 47.610625] ================================================================== [ 47.611859] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 47.612658] Read of size 1 at addr fff00000c4546400 by task kunit_try_catch/153 [ 47.613526] [ 47.613924] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 47.615130] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.616077] Hardware name: linux,dummy-virt (DT) [ 47.616750] Call trace: [ 47.617563] show_stack+0x20/0x38 (C) [ 47.618127] dump_stack_lvl+0x8c/0xd0 [ 47.618765] print_report+0x118/0x5e0 [ 47.619337] kasan_report+0xc8/0x118 [ 47.619894] __kasan_check_byte+0x54/0x70 [ 47.620512] krealloc_noprof+0x44/0x360 [ 47.621373] krealloc_uaf+0x180/0x520 [ 47.621925] kunit_try_run_case+0x14c/0x3d0 [ 47.622644] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.623486] kthread+0x24c/0x2d0 [ 47.624183] ret_from_fork+0x10/0x20 [ 47.624745] [ 47.625330] Allocated by task 153: [ 47.625807] kasan_save_stack+0x3c/0x68 [ 47.626412] kasan_save_track+0x20/0x40 [ 47.626992] kasan_save_alloc_info+0x40/0x58 [ 47.627594] __kasan_kmalloc+0xd4/0xd8 [ 47.628065] __kmalloc_cache_noprof+0x15c/0x3c0 [ 47.628827] krealloc_uaf+0xc8/0x520 [ 47.630350] kunit_try_run_case+0x14c/0x3d0 [ 47.631162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.631878] kthread+0x24c/0x2d0 [ 47.632454] ret_from_fork+0x10/0x20 [ 47.632841] [ 47.633253] Freed by task 153: [ 47.633810] kasan_save_stack+0x3c/0x68 [ 47.634329] kasan_save_track+0x20/0x40 [ 47.634889] kasan_save_free_info+0x4c/0x78 [ 47.635705] __kasan_slab_free+0x6c/0x98 [ 47.636220] kfree+0x114/0x3c8 [ 47.636744] krealloc_uaf+0x12c/0x520 [ 47.637451] kunit_try_run_case+0x14c/0x3d0 [ 47.638078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.638777] kthread+0x24c/0x2d0 [ 47.639377] ret_from_fork+0x10/0x20 [ 47.639878] [ 47.640332] The buggy address belongs to the object at fff00000c4546400 [ 47.640332] which belongs to the cache kmalloc-256 of size 256 [ 47.642057] The buggy address is located 0 bytes inside of [ 47.642057] freed 256-byte region [fff00000c4546400, fff00000c4546500) [ 47.643532] [ 47.643855] The buggy address belongs to the physical page: [ 47.644503] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104546 [ 47.645788] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 47.646732] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 47.647636] page_type: f5(slab) [ 47.648148] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 47.649080] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 47.650571] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 47.651443] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 47.652497] head: 0bfffe0000000001 ffffc1ffc3115181 ffffffffffffffff 0000000000000000 [ 47.653643] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 47.654751] page dumped because: kasan: bad access detected [ 47.655264] [ 47.655656] Memory state around the buggy address: [ 47.656247] fff00000c4546300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.657223] fff00000c4546380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.657957] >fff00000c4546400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.659277] ^ [ 47.659805] fff00000c4546480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.660650] fff00000c4546500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.661761] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 47.234330] ================================================================== [ 47.235174] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 47.237224] Write of size 1 at addr fff00000c45462ea by task kunit_try_catch/147 [ 47.238997] [ 47.239402] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 47.240601] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.241247] Hardware name: linux,dummy-virt (DT) [ 47.241882] Call trace: [ 47.242242] show_stack+0x20/0x38 (C) [ 47.243007] dump_stack_lvl+0x8c/0xd0 [ 47.243645] print_report+0x118/0x5e0 [ 47.244224] kasan_report+0xc8/0x118 [ 47.244839] __asan_report_store1_noabort+0x20/0x30 [ 47.245585] krealloc_less_oob_helper+0xae4/0xc50 [ 47.246355] krealloc_less_oob+0x20/0x38 [ 47.246989] kunit_try_run_case+0x14c/0x3d0 [ 47.247683] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.248487] kthread+0x24c/0x2d0 [ 47.249083] ret_from_fork+0x10/0x20 [ 47.249695] [ 47.250026] Allocated by task 147: [ 47.250584] kasan_save_stack+0x3c/0x68 [ 47.251264] kasan_save_track+0x20/0x40 [ 47.251943] kasan_save_alloc_info+0x40/0x58 [ 47.252587] __kasan_krealloc+0x118/0x178 [ 47.253229] krealloc_noprof+0x128/0x360 [ 47.253999] krealloc_less_oob_helper+0x168/0xc50 [ 47.254736] krealloc_less_oob+0x20/0x38 [ 47.255453] kunit_try_run_case+0x14c/0x3d0 [ 47.256205] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.256990] kthread+0x24c/0x2d0 [ 47.257716] ret_from_fork+0x10/0x20 [ 47.258379] [ 47.258772] The buggy address belongs to the object at fff00000c4546200 [ 47.258772] which belongs to the cache kmalloc-256 of size 256 [ 47.260222] The buggy address is located 33 bytes to the right of [ 47.260222] allocated 201-byte region [fff00000c4546200, fff00000c45462c9) [ 47.261625] [ 47.262070] The buggy address belongs to the physical page: [ 47.262861] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104546 [ 47.263895] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 47.264878] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 47.265778] page_type: f5(slab) [ 47.266343] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 47.267336] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 47.268361] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 47.269334] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 47.270436] head: 0bfffe0000000001 ffffc1ffc3115181 ffffffffffffffff 0000000000000000 [ 47.271414] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 47.272358] page dumped because: kasan: bad access detected [ 47.273090] [ 47.273429] Memory state around the buggy address: [ 47.274088] fff00000c4546180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.275066] fff00000c4546200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 47.275975] >fff00000c4546280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 47.276861] ^ [ 47.277750] fff00000c4546300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.278645] fff00000c4546380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.279548] ================================================================== [ 47.528186] ================================================================== [ 47.529366] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 47.530537] Write of size 1 at addr fff00000c65760ea by task kunit_try_catch/151 [ 47.531837] [ 47.532182] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 47.533547] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.534079] Hardware name: linux,dummy-virt (DT) [ 47.535983] Call trace: [ 47.537139] show_stack+0x20/0x38 (C) [ 47.538319] dump_stack_lvl+0x8c/0xd0 [ 47.539386] print_report+0x118/0x5e0 [ 47.539868] kasan_report+0xc8/0x118 [ 47.540884] __asan_report_store1_noabort+0x20/0x30 [ 47.542183] krealloc_less_oob_helper+0xae4/0xc50 [ 47.543444] krealloc_large_less_oob+0x20/0x38 [ 47.544424] kunit_try_run_case+0x14c/0x3d0 [ 47.545248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.546532] kthread+0x24c/0x2d0 [ 47.547205] ret_from_fork+0x10/0x20 [ 47.547777] [ 47.548104] The buggy address belongs to the physical page: [ 47.548796] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106574 [ 47.549602] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 47.551069] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 47.552457] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 47.553241] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 47.554383] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 47.555724] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 47.556422] head: 0bfffe0000000002 ffffc1ffc3195d01 ffffffffffffffff 0000000000000000 [ 47.557346] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 47.558177] page dumped because: kasan: bad access detected [ 47.558879] [ 47.559193] Memory state around the buggy address: [ 47.559979] fff00000c6575f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 47.560958] fff00000c6576000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 47.562061] >fff00000c6576080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 47.563105] ^ [ 47.564065] fff00000c6576100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 47.564898] fff00000c6576180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 47.565653] ================================================================== [ 47.192643] ================================================================== [ 47.193358] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 47.194094] Write of size 1 at addr fff00000c45462da by task kunit_try_catch/147 [ 47.194897] [ 47.195370] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 47.196514] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.197058] Hardware name: linux,dummy-virt (DT) [ 47.197746] Call trace: [ 47.198145] show_stack+0x20/0x38 (C) [ 47.198670] dump_stack_lvl+0x8c/0xd0 [ 47.199276] print_report+0x118/0x5e0 [ 47.199829] kasan_report+0xc8/0x118 [ 47.200437] __asan_report_store1_noabort+0x20/0x30 [ 47.201069] krealloc_less_oob_helper+0xa80/0xc50 [ 47.201715] krealloc_less_oob+0x20/0x38 [ 47.202224] kunit_try_run_case+0x14c/0x3d0 [ 47.202902] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.203528] kthread+0x24c/0x2d0 [ 47.204175] ret_from_fork+0x10/0x20 [ 47.204739] [ 47.205135] Allocated by task 147: [ 47.205689] kasan_save_stack+0x3c/0x68 [ 47.206183] kasan_save_track+0x20/0x40 [ 47.206871] kasan_save_alloc_info+0x40/0x58 [ 47.207542] __kasan_krealloc+0x118/0x178 [ 47.208080] krealloc_noprof+0x128/0x360 [ 47.208687] krealloc_less_oob_helper+0x168/0xc50 [ 47.209363] krealloc_less_oob+0x20/0x38 [ 47.209851] kunit_try_run_case+0x14c/0x3d0 [ 47.210507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.211211] kthread+0x24c/0x2d0 [ 47.211727] ret_from_fork+0x10/0x20 [ 47.212254] [ 47.212662] The buggy address belongs to the object at fff00000c4546200 [ 47.212662] which belongs to the cache kmalloc-256 of size 256 [ 47.214023] The buggy address is located 17 bytes to the right of [ 47.214023] allocated 201-byte region [fff00000c4546200, fff00000c45462c9) [ 47.215545] [ 47.215843] The buggy address belongs to the physical page: [ 47.216471] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104546 [ 47.217391] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 47.218251] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 47.219081] page_type: f5(slab) [ 47.219596] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 47.220517] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 47.221500] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 47.222767] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 47.223804] head: 0bfffe0000000001 ffffc1ffc3115181 ffffffffffffffff 0000000000000000 [ 47.224408] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 47.224967] page dumped because: kasan: bad access detected [ 47.226066] [ 47.226379] Memory state around the buggy address: [ 47.227165] fff00000c4546180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.228017] fff00000c4546200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 47.228993] >fff00000c4546280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 47.229757] ^ [ 47.230480] fff00000c4546300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.231473] fff00000c4546380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.232436] ================================================================== [ 47.567264] ================================================================== [ 47.568427] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 47.569176] Write of size 1 at addr fff00000c65760eb by task kunit_try_catch/151 [ 47.570044] [ 47.570502] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 47.572193] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.573408] Hardware name: linux,dummy-virt (DT) [ 47.574533] Call trace: [ 47.574923] show_stack+0x20/0x38 (C) [ 47.575617] dump_stack_lvl+0x8c/0xd0 [ 47.576104] print_report+0x118/0x5e0 [ 47.576775] kasan_report+0xc8/0x118 [ 47.577764] __asan_report_store1_noabort+0x20/0x30 [ 47.578515] krealloc_less_oob_helper+0xa58/0xc50 [ 47.579158] krealloc_large_less_oob+0x20/0x38 [ 47.579734] kunit_try_run_case+0x14c/0x3d0 [ 47.580412] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.581277] kthread+0x24c/0x2d0 [ 47.581824] ret_from_fork+0x10/0x20 [ 47.582369] [ 47.582709] The buggy address belongs to the physical page: [ 47.584152] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106574 [ 47.585140] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 47.586150] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 47.587050] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 47.588067] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 47.589066] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 47.590411] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 47.591463] head: 0bfffe0000000002 ffffc1ffc3195d01 ffffffffffffffff 0000000000000000 [ 47.592355] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 47.593412] page dumped because: kasan: bad access detected [ 47.594086] [ 47.594482] Memory state around the buggy address: [ 47.595127] fff00000c6575f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 47.596322] fff00000c6576000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 47.597582] >fff00000c6576080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 47.598225] ^ [ 47.598966] fff00000c6576100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 47.600168] fff00000c6576180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 47.600990] ================================================================== [ 47.095888] ================================================================== [ 47.098064] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 47.099235] Write of size 1 at addr fff00000c45462c9 by task kunit_try_catch/147 [ 47.100314] [ 47.100734] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 47.102725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.103415] Hardware name: linux,dummy-virt (DT) [ 47.104013] Call trace: [ 47.104431] show_stack+0x20/0x38 (C) [ 47.104927] dump_stack_lvl+0x8c/0xd0 [ 47.105422] print_report+0x118/0x5e0 [ 47.106233] kasan_report+0xc8/0x118 [ 47.107103] __asan_report_store1_noabort+0x20/0x30 [ 47.107809] krealloc_less_oob_helper+0xa48/0xc50 [ 47.108443] krealloc_less_oob+0x20/0x38 [ 47.109137] kunit_try_run_case+0x14c/0x3d0 [ 47.109829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.110674] kthread+0x24c/0x2d0 [ 47.111355] ret_from_fork+0x10/0x20 [ 47.111893] [ 47.112326] Allocated by task 147: [ 47.112843] kasan_save_stack+0x3c/0x68 [ 47.113878] kasan_save_track+0x20/0x40 [ 47.114590] kasan_save_alloc_info+0x40/0x58 [ 47.115734] __kasan_krealloc+0x118/0x178 [ 47.116383] krealloc_noprof+0x128/0x360 [ 47.117014] krealloc_less_oob_helper+0x168/0xc50 [ 47.118027] krealloc_less_oob+0x20/0x38 [ 47.118805] kunit_try_run_case+0x14c/0x3d0 [ 47.119474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.120435] kthread+0x24c/0x2d0 [ 47.121263] ret_from_fork+0x10/0x20 [ 47.122020] [ 47.122372] The buggy address belongs to the object at fff00000c4546200 [ 47.122372] which belongs to the cache kmalloc-256 of size 256 [ 47.123770] The buggy address is located 0 bytes to the right of [ 47.123770] allocated 201-byte region [fff00000c4546200, fff00000c45462c9) [ 47.125286] [ 47.125925] The buggy address belongs to the physical page: [ 47.126628] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104546 [ 47.127762] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 47.128673] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 47.129666] page_type: f5(slab) [ 47.130137] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 47.131204] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 47.132214] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 47.133262] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 47.134752] head: 0bfffe0000000001 ffffc1ffc3115181 ffffffffffffffff 0000000000000000 [ 47.135612] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 47.136542] page dumped because: kasan: bad access detected [ 47.137226] [ 47.137600] Memory state around the buggy address: [ 47.138248] fff00000c4546180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.139374] fff00000c4546200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 47.140186] >fff00000c4546280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 47.141179] ^ [ 47.141818] fff00000c4546300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.142817] fff00000c4546380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.143734] ================================================================== [ 47.447862] ================================================================== [ 47.449621] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 47.450678] Write of size 1 at addr fff00000c65760d0 by task kunit_try_catch/151 [ 47.451499] [ 47.451819] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 47.453003] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.453693] Hardware name: linux,dummy-virt (DT) [ 47.454757] Call trace: [ 47.455755] show_stack+0x20/0x38 (C) [ 47.456413] dump_stack_lvl+0x8c/0xd0 [ 47.456875] print_report+0x118/0x5e0 [ 47.457870] kasan_report+0xc8/0x118 [ 47.458477] __asan_report_store1_noabort+0x20/0x30 [ 47.459088] krealloc_less_oob_helper+0xb9c/0xc50 [ 47.459721] krealloc_large_less_oob+0x20/0x38 [ 47.460230] kunit_try_run_case+0x14c/0x3d0 [ 47.460950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.462568] kthread+0x24c/0x2d0 [ 47.463147] ret_from_fork+0x10/0x20 [ 47.463834] [ 47.464199] The buggy address belongs to the physical page: [ 47.464948] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106574 [ 47.466386] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 47.467562] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 47.468417] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 47.469422] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 47.470178] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 47.471044] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 47.472279] head: 0bfffe0000000002 ffffc1ffc3195d01 ffffffffffffffff 0000000000000000 [ 47.473487] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 47.474477] page dumped because: kasan: bad access detected [ 47.475163] [ 47.475648] Memory state around the buggy address: [ 47.476885] fff00000c6575f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 47.479310] fff00000c6576000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 47.479873] >fff00000c6576080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 47.480444] ^ [ 47.480916] fff00000c6576100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 47.483839] fff00000c6576180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 47.486146] ================================================================== [ 47.148402] ================================================================== [ 47.149180] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 47.150116] Write of size 1 at addr fff00000c45462d0 by task kunit_try_catch/147 [ 47.151561] [ 47.151964] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 47.153206] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.153786] Hardware name: linux,dummy-virt (DT) [ 47.154445] Call trace: [ 47.154834] show_stack+0x20/0x38 (C) [ 47.155377] dump_stack_lvl+0x8c/0xd0 [ 47.155902] print_report+0x118/0x5e0 [ 47.156482] kasan_report+0xc8/0x118 [ 47.157040] __asan_report_store1_noabort+0x20/0x30 [ 47.157713] krealloc_less_oob_helper+0xb9c/0xc50 [ 47.158405] krealloc_less_oob+0x20/0x38 [ 47.159008] kunit_try_run_case+0x14c/0x3d0 [ 47.159668] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.160326] kthread+0x24c/0x2d0 [ 47.160946] ret_from_fork+0x10/0x20 [ 47.161506] [ 47.161808] Allocated by task 147: [ 47.162341] kasan_save_stack+0x3c/0x68 [ 47.162936] kasan_save_track+0x20/0x40 [ 47.163473] kasan_save_alloc_info+0x40/0x58 [ 47.164095] __kasan_krealloc+0x118/0x178 [ 47.164829] krealloc_noprof+0x128/0x360 [ 47.165356] krealloc_less_oob_helper+0x168/0xc50 [ 47.166161] krealloc_less_oob+0x20/0x38 [ 47.166674] kunit_try_run_case+0x14c/0x3d0 [ 47.167347] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.168140] kthread+0x24c/0x2d0 [ 47.168798] ret_from_fork+0x10/0x20 [ 47.169268] [ 47.169637] The buggy address belongs to the object at fff00000c4546200 [ 47.169637] which belongs to the cache kmalloc-256 of size 256 [ 47.171038] The buggy address is located 7 bytes to the right of [ 47.171038] allocated 201-byte region [fff00000c4546200, fff00000c45462c9) [ 47.172421] [ 47.172718] The buggy address belongs to the physical page: [ 47.173369] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104546 [ 47.174257] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 47.175136] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 47.175990] page_type: f5(slab) [ 47.176474] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 47.177368] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 47.178357] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 47.179233] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 47.180137] head: 0bfffe0000000001 ffffc1ffc3115181 ffffffffffffffff 0000000000000000 [ 47.181066] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 47.181985] page dumped because: kasan: bad access detected [ 47.182641] [ 47.182942] Memory state around the buggy address: [ 47.183544] fff00000c4546180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.184485] fff00000c4546200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 47.185350] >fff00000c4546280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 47.186213] ^ [ 47.186954] fff00000c4546300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.188150] fff00000c4546380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.189009] ================================================================== [ 47.411330] ================================================================== [ 47.412577] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 47.413537] Write of size 1 at addr fff00000c65760c9 by task kunit_try_catch/151 [ 47.414850] [ 47.415173] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 47.416515] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.417189] Hardware name: linux,dummy-virt (DT) [ 47.417937] Call trace: [ 47.418731] show_stack+0x20/0x38 (C) [ 47.419251] dump_stack_lvl+0x8c/0xd0 [ 47.419857] print_report+0x118/0x5e0 [ 47.420490] kasan_report+0xc8/0x118 [ 47.421337] __asan_report_store1_noabort+0x20/0x30 [ 47.422444] krealloc_less_oob_helper+0xa48/0xc50 [ 47.423281] krealloc_large_less_oob+0x20/0x38 [ 47.424091] kunit_try_run_case+0x14c/0x3d0 [ 47.424735] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.425847] kthread+0x24c/0x2d0 [ 47.426553] ret_from_fork+0x10/0x20 [ 47.427156] [ 47.427572] The buggy address belongs to the physical page: [ 47.428233] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106574 [ 47.429285] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 47.430482] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 47.431386] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 47.432279] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 47.433767] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 47.434626] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 47.435625] head: 0bfffe0000000002 ffffc1ffc3195d01 ffffffffffffffff 0000000000000000 [ 47.436656] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 47.437682] page dumped because: kasan: bad access detected [ 47.438703] [ 47.438976] Memory state around the buggy address: [ 47.439656] fff00000c6575f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 47.440838] fff00000c6576000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 47.442053] >fff00000c6576080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 47.443105] ^ [ 47.443954] fff00000c6576100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 47.444900] fff00000c6576180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 47.445927] ================================================================== [ 47.281659] ================================================================== [ 47.282692] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 47.283867] Write of size 1 at addr fff00000c45462eb by task kunit_try_catch/147 [ 47.285183] [ 47.285736] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 47.286793] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.287069] Hardware name: linux,dummy-virt (DT) [ 47.287438] Call trace: [ 47.288027] show_stack+0x20/0x38 (C) [ 47.288861] dump_stack_lvl+0x8c/0xd0 [ 47.289417] print_report+0x118/0x5e0 [ 47.290149] kasan_report+0xc8/0x118 [ 47.290721] __asan_report_store1_noabort+0x20/0x30 [ 47.291062] krealloc_less_oob_helper+0xa58/0xc50 [ 47.291674] krealloc_less_oob+0x20/0x38 [ 47.292554] kunit_try_run_case+0x14c/0x3d0 [ 47.293052] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.293984] kthread+0x24c/0x2d0 [ 47.294672] ret_from_fork+0x10/0x20 [ 47.295123] [ 47.295449] Allocated by task 147: [ 47.295901] kasan_save_stack+0x3c/0x68 [ 47.296589] kasan_save_track+0x20/0x40 [ 47.297114] kasan_save_alloc_info+0x40/0x58 [ 47.297937] __kasan_krealloc+0x118/0x178 [ 47.298509] krealloc_noprof+0x128/0x360 [ 47.299006] krealloc_less_oob_helper+0x168/0xc50 [ 47.299820] krealloc_less_oob+0x20/0x38 [ 47.300386] kunit_try_run_case+0x14c/0x3d0 [ 47.301003] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.301933] kthread+0x24c/0x2d0 [ 47.302428] ret_from_fork+0x10/0x20 [ 47.303065] [ 47.303504] The buggy address belongs to the object at fff00000c4546200 [ 47.303504] which belongs to the cache kmalloc-256 of size 256 [ 47.305192] The buggy address is located 34 bytes to the right of [ 47.305192] allocated 201-byte region [fff00000c4546200, fff00000c45462c9) [ 47.306701] [ 47.307025] The buggy address belongs to the physical page: [ 47.308020] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104546 [ 47.308903] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 47.309681] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 47.310671] page_type: f5(slab) [ 47.311210] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 47.312202] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 47.313133] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 47.314044] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 47.315055] head: 0bfffe0000000001 ffffc1ffc3115181 ffffffffffffffff 0000000000000000 [ 47.316013] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 47.316971] page dumped because: kasan: bad access detected [ 47.317844] [ 47.318322] Memory state around the buggy address: [ 47.319034] fff00000c4546180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.319904] fff00000c4546200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 47.320746] >fff00000c4546280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 47.321602] ^ [ 47.322332] fff00000c4546300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.323101] fff00000c4546380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.323987] ================================================================== [ 47.491037] ================================================================== [ 47.491973] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 47.492980] Write of size 1 at addr fff00000c65760da by task kunit_try_catch/151 [ 47.494762] [ 47.495168] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 47.496530] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.497156] Hardware name: linux,dummy-virt (DT) [ 47.498122] Call trace: [ 47.498589] show_stack+0x20/0x38 (C) [ 47.499344] dump_stack_lvl+0x8c/0xd0 [ 47.499980] print_report+0x118/0x5e0 [ 47.500536] kasan_report+0xc8/0x118 [ 47.501934] __asan_report_store1_noabort+0x20/0x30 [ 47.502634] krealloc_less_oob_helper+0xa80/0xc50 [ 47.503255] krealloc_large_less_oob+0x20/0x38 [ 47.503906] kunit_try_run_case+0x14c/0x3d0 [ 47.504606] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.505549] kthread+0x24c/0x2d0 [ 47.506310] ret_from_fork+0x10/0x20 [ 47.507048] [ 47.507466] The buggy address belongs to the physical page: [ 47.508135] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106574 [ 47.509902] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 47.510872] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 47.511846] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 47.512810] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 47.514391] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 47.515332] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 47.516187] head: 0bfffe0000000002 ffffc1ffc3195d01 ffffffffffffffff 0000000000000000 [ 47.517214] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 47.518083] page dumped because: kasan: bad access detected [ 47.518869] [ 47.519809] Memory state around the buggy address: [ 47.520621] fff00000c6575f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 47.521542] fff00000c6576000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 47.522506] >fff00000c6576080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 47.523406] ^ [ 47.524189] fff00000c6576100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 47.525105] fff00000c6576180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 47.526225] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 47.370177] ================================================================== [ 47.371036] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680 [ 47.371709] Write of size 1 at addr fff00000c65fa0f0 by task kunit_try_catch/149 [ 47.372477] [ 47.372772] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 47.373957] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.374695] Hardware name: linux,dummy-virt (DT) [ 47.375417] Call trace: [ 47.375817] show_stack+0x20/0x38 (C) [ 47.376436] dump_stack_lvl+0x8c/0xd0 [ 47.376952] print_report+0x118/0x5e0 [ 47.377601] kasan_report+0xc8/0x118 [ 47.378328] __asan_report_store1_noabort+0x20/0x30 [ 47.379186] krealloc_more_oob_helper+0x5c8/0x680 [ 47.380004] krealloc_large_more_oob+0x20/0x38 [ 47.380705] kunit_try_run_case+0x14c/0x3d0 [ 47.381395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.382165] kthread+0x24c/0x2d0 [ 47.382784] ret_from_fork+0x10/0x20 [ 47.383343] [ 47.383687] The buggy address belongs to the physical page: [ 47.384541] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065f8 [ 47.385596] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 47.386571] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 47.387488] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 47.388436] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 47.389385] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 47.390329] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 47.391320] head: 0bfffe0000000002 ffffc1ffc3197e01 ffffffffffffffff 0000000000000000 [ 47.392250] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 47.393196] page dumped because: kasan: bad access detected [ 47.393958] [ 47.394414] Memory state around the buggy address: [ 47.395113] fff00000c65f9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 47.396048] fff00000c65fa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 47.397017] >fff00000c65fa080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 47.397887] ^ [ 47.398791] fff00000c65fa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 47.399802] fff00000c65fa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 47.400742] ================================================================== [ 47.039752] ================================================================== [ 47.040555] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680 [ 47.042209] Write of size 1 at addr fff00000c45460f0 by task kunit_try_catch/145 [ 47.043074] [ 47.043457] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 47.044506] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.045497] Hardware name: linux,dummy-virt (DT) [ 47.046162] Call trace: [ 47.046573] show_stack+0x20/0x38 (C) [ 47.047151] dump_stack_lvl+0x8c/0xd0 [ 47.047778] print_report+0x118/0x5e0 [ 47.048316] kasan_report+0xc8/0x118 [ 47.048869] __asan_report_store1_noabort+0x20/0x30 [ 47.049762] krealloc_more_oob_helper+0x5c8/0x680 [ 47.050453] krealloc_more_oob+0x20/0x38 [ 47.051012] kunit_try_run_case+0x14c/0x3d0 [ 47.051858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.052546] kthread+0x24c/0x2d0 [ 47.053155] ret_from_fork+0x10/0x20 [ 47.054013] [ 47.054254] Allocated by task 145: [ 47.055046] kasan_save_stack+0x3c/0x68 [ 47.055701] kasan_save_track+0x20/0x40 [ 47.056472] kasan_save_alloc_info+0x40/0x58 [ 47.057091] __kasan_krealloc+0x118/0x178 [ 47.057788] krealloc_noprof+0x128/0x360 [ 47.058445] krealloc_more_oob_helper+0x168/0x680 [ 47.059234] krealloc_more_oob+0x20/0x38 [ 47.059939] kunit_try_run_case+0x14c/0x3d0 [ 47.060685] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.061364] kthread+0x24c/0x2d0 [ 47.062606] ret_from_fork+0x10/0x20 [ 47.063091] [ 47.063386] The buggy address belongs to the object at fff00000c4546000 [ 47.063386] which belongs to the cache kmalloc-256 of size 256 [ 47.064981] The buggy address is located 5 bytes to the right of [ 47.064981] allocated 235-byte region [fff00000c4546000, fff00000c45460eb) [ 47.066749] [ 47.067092] The buggy address belongs to the physical page: [ 47.067942] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104546 [ 47.068951] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 47.070153] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 47.071113] page_type: f5(slab) [ 47.071579] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 47.072377] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 47.073499] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 47.074653] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 47.075747] head: 0bfffe0000000001 ffffc1ffc3115181 ffffffffffffffff 0000000000000000 [ 47.076824] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 47.078113] page dumped because: kasan: bad access detected [ 47.079004] [ 47.079614] Memory state around the buggy address: [ 47.080218] fff00000c4545f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.081109] fff00000c4546000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 47.082587] >fff00000c4546080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 47.083399] ^ [ 47.084261] fff00000c4546100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.084887] fff00000c4546180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.086203] ================================================================== [ 47.334063] ================================================================== [ 47.335501] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680 [ 47.336439] Write of size 1 at addr fff00000c65fa0eb by task kunit_try_catch/149 [ 47.337323] [ 47.338208] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 47.339441] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.339978] Hardware name: linux,dummy-virt (DT) [ 47.340723] Call trace: [ 47.341200] show_stack+0x20/0x38 (C) [ 47.342065] dump_stack_lvl+0x8c/0xd0 [ 47.342725] print_report+0x118/0x5e0 [ 47.343350] kasan_report+0xc8/0x118 [ 47.343955] __asan_report_store1_noabort+0x20/0x30 [ 47.344673] krealloc_more_oob_helper+0x614/0x680 [ 47.345780] krealloc_large_more_oob+0x20/0x38 [ 47.346453] kunit_try_run_case+0x14c/0x3d0 [ 47.347111] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.347904] kthread+0x24c/0x2d0 [ 47.348541] ret_from_fork+0x10/0x20 [ 47.349486] [ 47.349859] The buggy address belongs to the physical page: [ 47.350669] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065f8 [ 47.351663] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 47.352607] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 47.353903] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 47.355026] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 47.356104] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 47.357207] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 47.358674] head: 0bfffe0000000002 ffffc1ffc3197e01 ffffffffffffffff 0000000000000000 [ 47.360011] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 47.361249] page dumped because: kasan: bad access detected [ 47.361893] [ 47.362219] Memory state around the buggy address: [ 47.362820] fff00000c65f9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 47.363824] fff00000c65fa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 47.364719] >fff00000c65fa080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 47.365627] ^ [ 47.366537] fff00000c65fa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 47.367510] fff00000c65fa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 47.368428] ================================================================== [ 46.993659] ================================================================== [ 46.994790] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680 [ 46.995412] Write of size 1 at addr fff00000c45460eb by task kunit_try_catch/145 [ 46.996369] [ 46.996725] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 46.997858] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.998348] Hardware name: linux,dummy-virt (DT) [ 46.998913] Call trace: [ 46.999372] show_stack+0x20/0x38 (C) [ 47.000161] dump_stack_lvl+0x8c/0xd0 [ 47.000697] print_report+0x118/0x5e0 [ 47.001613] kasan_report+0xc8/0x118 [ 47.002195] __asan_report_store1_noabort+0x20/0x30 [ 47.002996] krealloc_more_oob_helper+0x614/0x680 [ 47.003833] krealloc_more_oob+0x20/0x38 [ 47.004392] kunit_try_run_case+0x14c/0x3d0 [ 47.005284] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.006091] kthread+0x24c/0x2d0 [ 47.006591] ret_from_fork+0x10/0x20 [ 47.007330] [ 47.007693] Allocated by task 145: [ 47.008186] kasan_save_stack+0x3c/0x68 [ 47.008820] kasan_save_track+0x20/0x40 [ 47.009692] kasan_save_alloc_info+0x40/0x58 [ 47.010420] __kasan_krealloc+0x118/0x178 [ 47.010905] krealloc_noprof+0x128/0x360 [ 47.011640] krealloc_more_oob_helper+0x168/0x680 [ 47.012470] krealloc_more_oob+0x20/0x38 [ 47.013809] kunit_try_run_case+0x14c/0x3d0 [ 47.014499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.015163] kthread+0x24c/0x2d0 [ 47.015697] ret_from_fork+0x10/0x20 [ 47.016234] [ 47.016936] The buggy address belongs to the object at fff00000c4546000 [ 47.016936] which belongs to the cache kmalloc-256 of size 256 [ 47.018544] The buggy address is located 0 bytes to the right of [ 47.018544] allocated 235-byte region [fff00000c4546000, fff00000c45460eb) [ 47.019884] [ 47.020169] The buggy address belongs to the physical page: [ 47.020938] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104546 [ 47.022279] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 47.023181] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 47.024052] page_type: f5(slab) [ 47.024602] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 47.025894] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 47.026943] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 47.027820] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 47.028764] head: 0bfffe0000000001 ffffc1ffc3115181 ffffffffffffffff 0000000000000000 [ 47.029970] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 47.030915] page dumped because: kasan: bad access detected [ 47.031503] [ 47.031841] Memory state around the buggy address: [ 47.032518] fff00000c4545f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.033972] fff00000c4546000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 47.034594] >fff00000c4546080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 47.035543] ^ [ 47.036344] fff00000c4546100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.037178] fff00000c4546180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.038075] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 46.952850] ================================================================== [ 46.954601] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 46.955363] Read of size 1 at addr fff00000c6630000 by task kunit_try_catch/143 [ 46.956230] [ 46.956696] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 46.957821] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.958554] Hardware name: linux,dummy-virt (DT) [ 46.959140] Call trace: [ 46.959503] show_stack+0x20/0x38 (C) [ 46.960036] dump_stack_lvl+0x8c/0xd0 [ 46.960654] print_report+0x118/0x5e0 [ 46.961533] kasan_report+0xc8/0x118 [ 46.961989] __asan_report_load1_noabort+0x20/0x30 [ 46.962775] page_alloc_uaf+0x328/0x350 [ 46.963382] kunit_try_run_case+0x14c/0x3d0 [ 46.963972] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.964715] kthread+0x24c/0x2d0 [ 46.965313] ret_from_fork+0x10/0x20 [ 46.966013] [ 46.966390] The buggy address belongs to the physical page: [ 46.967167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106630 [ 46.968124] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.969023] page_type: f0(buddy) [ 46.969497] raw: 0bfffe0000000000 fff00000ff6150e0 fff00000ff6150e0 0000000000000000 [ 46.970606] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000 [ 46.971873] page dumped because: kasan: bad access detected [ 46.972636] [ 46.973411] Memory state around the buggy address: [ 46.974013] fff00000c662ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 46.975067] fff00000c662ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 46.976032] >fff00000c6630000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 46.976925] ^ [ 46.977599] fff00000c6630080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 46.978583] fff00000c6630100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 46.979406] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[ 46.899686] ================================================================== [ 46.900942] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 46.902133] Free of addr fff00000c6574001 by task kunit_try_catch/139 [ 46.903123] [ 46.903525] CPU: 0 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 46.904779] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.905408] Hardware name: linux,dummy-virt (DT) [ 46.905954] Call trace: [ 46.906838] show_stack+0x20/0x38 (C) [ 46.907323] dump_stack_lvl+0x8c/0xd0 [ 46.907958] print_report+0x118/0x5e0 [ 46.908532] kasan_report_invalid_free+0xb0/0xd8 [ 46.909529] __kasan_kfree_large+0x5c/0xa8 [ 46.910120] free_large_kmalloc+0x58/0x140 [ 46.910702] kfree+0x270/0x3c8 [ 46.911192] kmalloc_large_invalid_free+0x108/0x270 [ 46.912466] kunit_try_run_case+0x14c/0x3d0 [ 46.913432] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.914119] kthread+0x24c/0x2d0 [ 46.914794] ret_from_fork+0x10/0x20 [ 46.915371] [ 46.915729] The buggy address belongs to the physical page: [ 46.916477] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106574 [ 46.917579] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 46.918502] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 46.919891] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 46.920956] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 46.921828] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 46.922986] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 46.924005] head: 0bfffe0000000002 ffffc1ffc3195d01 ffffffffffffffff 0000000000000000 [ 46.925205] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 46.926438] page dumped because: kasan: bad access detected [ 46.927251] [ 46.927588] Memory state around the buggy address: [ 46.928343] fff00000c6573f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.929157] fff00000c6573f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.930357] >fff00000c6574000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 46.931205] ^ [ 46.931673] fff00000c6574080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 46.932538] fff00000c6574100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 46.933802] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 46.860364] ================================================================== [ 46.862355] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 46.863344] Read of size 1 at addr fff00000c6570000 by task kunit_try_catch/137 [ 46.864387] [ 46.864941] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 46.866663] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.867137] Hardware name: linux,dummy-virt (DT) [ 46.867979] Call trace: [ 46.868387] show_stack+0x20/0x38 (C) [ 46.868918] dump_stack_lvl+0x8c/0xd0 [ 46.869804] print_report+0x118/0x5e0 [ 46.870339] kasan_report+0xc8/0x118 [ 46.870918] __asan_report_load1_noabort+0x20/0x30 [ 46.871887] kmalloc_large_uaf+0x2cc/0x2f8 [ 46.872479] kunit_try_run_case+0x14c/0x3d0 [ 46.873507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.874371] kthread+0x24c/0x2d0 [ 46.874910] ret_from_fork+0x10/0x20 [ 46.875469] [ 46.875751] The buggy address belongs to the physical page: [ 46.877084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106570 [ 46.877978] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.878832] raw: 0bfffe0000000000 ffffc1ffc3195d08 fff00000da4e3f80 0000000000000000 [ 46.880112] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 46.880990] page dumped because: kasan: bad access detected [ 46.882014] [ 46.882390] Memory state around the buggy address: [ 46.883031] fff00000c656ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.884421] fff00000c656ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.885357] >fff00000c6570000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 46.886117] ^ [ 46.886945] fff00000c6570080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 46.887826] fff00000c6570100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 46.888627] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 46.818408] ================================================================== [ 46.819645] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 46.820440] Write of size 1 at addr fff00000c65fa00a by task kunit_try_catch/135 [ 46.821214] [ 46.821768] CPU: 1 UID: 0 PID: 135 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 46.823116] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.823728] Hardware name: linux,dummy-virt (DT) [ 46.824419] Call trace: [ 46.824864] show_stack+0x20/0x38 (C) [ 46.825574] dump_stack_lvl+0x8c/0xd0 [ 46.826140] print_report+0x118/0x5e0 [ 46.826731] kasan_report+0xc8/0x118 [ 46.827261] __asan_report_store1_noabort+0x20/0x30 [ 46.828007] kmalloc_large_oob_right+0x278/0x2b8 [ 46.828717] kunit_try_run_case+0x14c/0x3d0 [ 46.829445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.830221] kthread+0x24c/0x2d0 [ 46.830852] ret_from_fork+0x10/0x20 [ 46.831465] [ 46.831844] The buggy address belongs to the physical page: [ 46.832675] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065f8 [ 46.833692] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 46.834634] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 46.835574] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 46.836586] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 46.837549] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 46.838526] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 46.839562] head: 0bfffe0000000002 ffffc1ffc3197e01 ffffffffffffffff 0000000000000000 [ 46.840533] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 46.841454] page dumped because: kasan: bad access detected [ 46.842183] [ 46.842531] Memory state around the buggy address: [ 46.843312] fff00000c65f9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 46.844203] fff00000c65f9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 46.845081] >fff00000c65fa000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 46.845970] ^ [ 46.846573] fff00000c65fa080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 46.847541] fff00000c65fa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 46.848406] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 46.766945] ================================================================== [ 46.768185] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 46.768981] Write of size 1 at addr fff00000c5d15f00 by task kunit_try_catch/133 [ 46.769685] [ 46.770062] CPU: 1 UID: 0 PID: 133 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 46.771395] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.772391] Hardware name: linux,dummy-virt (DT) [ 46.773223] Call trace: [ 46.773630] show_stack+0x20/0x38 (C) [ 46.774261] dump_stack_lvl+0x8c/0xd0 [ 46.775067] print_report+0x118/0x5e0 [ 46.775580] kasan_report+0xc8/0x118 [ 46.776231] __asan_report_store1_noabort+0x20/0x30 [ 46.776955] kmalloc_big_oob_right+0x2a4/0x2f0 [ 46.777679] kunit_try_run_case+0x14c/0x3d0 [ 46.778353] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.779134] kthread+0x24c/0x2d0 [ 46.779778] ret_from_fork+0x10/0x20 [ 46.780352] [ 46.780652] Allocated by task 133: [ 46.781098] kasan_save_stack+0x3c/0x68 [ 46.781795] kasan_save_track+0x20/0x40 [ 46.782364] kasan_save_alloc_info+0x40/0x58 [ 46.783078] __kasan_kmalloc+0xd4/0xd8 [ 46.783718] __kmalloc_cache_noprof+0x15c/0x3c0 [ 46.784340] kmalloc_big_oob_right+0xb8/0x2f0 [ 46.784977] kunit_try_run_case+0x14c/0x3d0 [ 46.785531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.786204] kthread+0x24c/0x2d0 [ 46.786844] ret_from_fork+0x10/0x20 [ 46.787457] [ 46.787829] The buggy address belongs to the object at fff00000c5d14000 [ 46.787829] which belongs to the cache kmalloc-8k of size 8192 [ 46.789263] The buggy address is located 0 bytes to the right of [ 46.789263] allocated 7936-byte region [fff00000c5d14000, fff00000c5d15f00) [ 46.790659] [ 46.790945] The buggy address belongs to the physical page: [ 46.791726] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d10 [ 46.792665] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 46.793544] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 46.794334] page_type: f5(slab) [ 46.794904] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 46.795864] raw: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000 [ 46.796696] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 46.797700] head: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000 [ 46.798683] head: 0bfffe0000000003 ffffc1ffc3174401 ffffffffffffffff 0000000000000000 [ 46.799572] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000 [ 46.800465] page dumped because: kasan: bad access detected [ 46.801187] [ 46.801515] Memory state around the buggy address: [ 46.802207] fff00000c5d15e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 46.803331] fff00000c5d15e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 46.804228] >fff00000c5d15f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.805195] ^ [ 46.805843] fff00000c5d15f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.806780] fff00000c5d16000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.807650] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 46.719802] ================================================================== [ 46.720584] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x420/0x490 [ 46.721525] Write of size 1 at addr fff00000c60dc478 by task kunit_try_catch/131 [ 46.722548] [ 46.722987] CPU: 1 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 46.724466] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.725377] Hardware name: linux,dummy-virt (DT) [ 46.726047] Call trace: [ 46.726531] show_stack+0x20/0x38 (C) [ 46.727058] dump_stack_lvl+0x8c/0xd0 [ 46.727697] print_report+0x118/0x5e0 [ 46.728344] kasan_report+0xc8/0x118 [ 46.728848] __asan_report_store1_noabort+0x20/0x30 [ 46.729821] kmalloc_track_caller_oob_right+0x420/0x490 [ 46.730522] kunit_try_run_case+0x14c/0x3d0 [ 46.731125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.732082] kthread+0x24c/0x2d0 [ 46.732711] ret_from_fork+0x10/0x20 [ 46.733527] [ 46.733876] Allocated by task 131: [ 46.734326] kasan_save_stack+0x3c/0x68 [ 46.734945] kasan_save_track+0x20/0x40 [ 46.735573] kasan_save_alloc_info+0x40/0x58 [ 46.736162] __kasan_kmalloc+0xd4/0xd8 [ 46.736680] __kmalloc_node_track_caller_noprof+0x184/0x4b8 [ 46.737461] kmalloc_track_caller_oob_right+0x184/0x490 [ 46.738095] kunit_try_run_case+0x14c/0x3d0 [ 46.738718] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.739852] kthread+0x24c/0x2d0 [ 46.740814] ret_from_fork+0x10/0x20 [ 46.741577] [ 46.741962] The buggy address belongs to the object at fff00000c60dc400 [ 46.741962] which belongs to the cache kmalloc-128 of size 128 [ 46.743270] The buggy address is located 0 bytes to the right of [ 46.743270] allocated 120-byte region [fff00000c60dc400, fff00000c60dc478) [ 46.744966] [ 46.745260] The buggy address belongs to the physical page: [ 46.746269] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060dc [ 46.747355] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.748129] page_type: f5(slab) [ 46.748630] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 46.749527] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 46.750262] page dumped because: kasan: bad access detected [ 46.751264] [ 46.751562] Memory state around the buggy address: [ 46.752184] fff00000c60dc300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 46.753283] fff00000c60dc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.754152] >fff00000c60dc400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 46.755007] ^ [ 46.755832] fff00000c60dc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.756652] fff00000c60dc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.757673] ================================================================== [ 46.678544] ================================================================== [ 46.679710] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x414/0x490 [ 46.680540] Write of size 1 at addr fff00000c60dc378 by task kunit_try_catch/131 [ 46.681945] [ 46.682261] CPU: 1 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 46.683406] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.683953] Hardware name: linux,dummy-virt (DT) [ 46.684947] Call trace: [ 46.685495] show_stack+0x20/0x38 (C) [ 46.686058] dump_stack_lvl+0x8c/0xd0 [ 46.686877] print_report+0x118/0x5e0 [ 46.687935] kasan_report+0xc8/0x118 [ 46.688681] __asan_report_store1_noabort+0x20/0x30 [ 46.689700] kmalloc_track_caller_oob_right+0x414/0x490 [ 46.690508] kunit_try_run_case+0x14c/0x3d0 [ 46.691167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.691920] kthread+0x24c/0x2d0 [ 46.692556] ret_from_fork+0x10/0x20 [ 46.693384] [ 46.693737] Allocated by task 131: [ 46.694327] kasan_save_stack+0x3c/0x68 [ 46.694955] kasan_save_track+0x20/0x40 [ 46.695599] kasan_save_alloc_info+0x40/0x58 [ 46.696256] __kasan_kmalloc+0xd4/0xd8 [ 46.696839] __kmalloc_node_track_caller_noprof+0x184/0x4b8 [ 46.697753] kmalloc_track_caller_oob_right+0xa8/0x490 [ 46.698674] kunit_try_run_case+0x14c/0x3d0 [ 46.699122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.699876] kthread+0x24c/0x2d0 [ 46.700438] ret_from_fork+0x10/0x20 [ 46.700960] [ 46.701268] The buggy address belongs to the object at fff00000c60dc300 [ 46.701268] which belongs to the cache kmalloc-128 of size 128 [ 46.702664] The buggy address is located 0 bytes to the right of [ 46.702664] allocated 120-byte region [fff00000c60dc300, fff00000c60dc378) [ 46.703974] [ 46.704289] The buggy address belongs to the physical page: [ 46.705073] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060dc [ 46.706285] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.707051] page_type: f5(slab) [ 46.707731] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 46.708647] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 46.709846] page dumped because: kasan: bad access detected [ 46.710588] [ 46.710904] Memory state around the buggy address: [ 46.711489] fff00000c60dc200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 46.712422] fff00000c60dc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.713574] >fff00000c60dc300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 46.714340] ^ [ 46.715230] fff00000c60dc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.716106] fff00000c60dc400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.717002] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 46.623327] ================================================================== [ 46.624670] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 46.625861] Read of size 1 at addr fff00000c642d000 by task kunit_try_catch/129 [ 46.627217] [ 46.628122] CPU: 1 UID: 0 PID: 129 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 46.630235] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.631521] Hardware name: linux,dummy-virt (DT) [ 46.631824] Call trace: [ 46.632026] show_stack+0x20/0x38 (C) [ 46.632340] dump_stack_lvl+0x8c/0xd0 [ 46.632962] print_report+0x118/0x5e0 [ 46.633859] kasan_report+0xc8/0x118 [ 46.634690] __asan_report_load1_noabort+0x20/0x30 [ 46.635462] kmalloc_node_oob_right+0x2f4/0x330 [ 46.636200] kunit_try_run_case+0x14c/0x3d0 [ 46.636996] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.638052] kthread+0x24c/0x2d0 [ 46.638785] ret_from_fork+0x10/0x20 [ 46.639396] [ 46.639809] Allocated by task 129: [ 46.640345] kasan_save_stack+0x3c/0x68 [ 46.640897] kasan_save_track+0x20/0x40 [ 46.641880] kasan_save_alloc_info+0x40/0x58 [ 46.642429] __kasan_kmalloc+0xd4/0xd8 [ 46.642972] __kmalloc_cache_node_noprof+0x168/0x3d0 [ 46.643724] kmalloc_node_oob_right+0xbc/0x330 [ 46.644353] kunit_try_run_case+0x14c/0x3d0 [ 46.644919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.645696] kthread+0x24c/0x2d0 [ 46.646233] ret_from_fork+0x10/0x20 [ 46.647246] [ 46.647605] The buggy address belongs to the object at fff00000c642c000 [ 46.647605] which belongs to the cache kmalloc-4k of size 4096 [ 46.649061] The buggy address is located 0 bytes to the right of [ 46.649061] allocated 4096-byte region [fff00000c642c000, fff00000c642d000) [ 46.650834] [ 46.651151] The buggy address belongs to the physical page: [ 46.651940] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106428 [ 46.653086] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 46.654273] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 46.655277] page_type: f5(slab) [ 46.655760] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 46.656739] raw: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000 [ 46.658215] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 46.659182] head: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000 [ 46.660170] head: 0bfffe0000000003 ffffc1ffc3190a01 ffffffffffffffff 0000000000000000 [ 46.661332] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000 [ 46.662471] page dumped because: kasan: bad access detected [ 46.663356] [ 46.663710] Memory state around the buggy address: [ 46.664173] fff00000c642cf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 46.664986] fff00000c642cf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 46.665975] >fff00000c642d000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.666829] ^ [ 46.667311] fff00000c642d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.668642] fff00000c642d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.669696] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 46.568927] ================================================================== [ 46.570516] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 46.571658] Read of size 1 at addr fff00000c40dc77f by task kunit_try_catch/127 [ 46.572403] [ 46.572828] CPU: 1 UID: 0 PID: 127 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 46.573855] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.574486] Hardware name: linux,dummy-virt (DT) [ 46.575008] Call trace: [ 46.575535] show_stack+0x20/0x38 (C) [ 46.576112] dump_stack_lvl+0x8c/0xd0 [ 46.577137] print_report+0x118/0x5e0 [ 46.577876] kasan_report+0xc8/0x118 [ 46.578510] __asan_report_load1_noabort+0x20/0x30 [ 46.579252] kmalloc_oob_left+0x2ec/0x320 [ 46.579836] kunit_try_run_case+0x14c/0x3d0 [ 46.580380] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.581467] kthread+0x24c/0x2d0 [ 46.582069] ret_from_fork+0x10/0x20 [ 46.582786] [ 46.583106] Allocated by task 28: [ 46.583590] kasan_save_stack+0x3c/0x68 [ 46.584093] kasan_save_track+0x20/0x40 [ 46.584686] kasan_save_alloc_info+0x40/0x58 [ 46.585424] __kasan_kmalloc+0xd4/0xd8 [ 46.586195] __kmalloc_node_track_caller_noprof+0x184/0x4b8 [ 46.587197] kstrdup+0x54/0xc8 [ 46.587671] devtmpfs_work_loop+0x384/0x590 [ 46.588236] devtmpfsd+0x50/0x58 [ 46.588812] kthread+0x24c/0x2d0 [ 46.589343] ret_from_fork+0x10/0x20 [ 46.589864] [ 46.590318] Freed by task 28: [ 46.590732] kasan_save_stack+0x3c/0x68 [ 46.591418] kasan_save_track+0x20/0x40 [ 46.591958] kasan_save_free_info+0x4c/0x78 [ 46.592945] __kasan_slab_free+0x6c/0x98 [ 46.593628] kfree+0x114/0x3c8 [ 46.594056] devtmpfs_work_loop+0x498/0x590 [ 46.595717] devtmpfsd+0x50/0x58 [ 46.596217] kthread+0x24c/0x2d0 [ 46.596854] ret_from_fork+0x10/0x20 [ 46.597936] [ 46.598255] The buggy address belongs to the object at fff00000c40dc760 [ 46.598255] which belongs to the cache kmalloc-16 of size 16 [ 46.599850] The buggy address is located 15 bytes to the right of [ 46.599850] allocated 16-byte region [fff00000c40dc760, fff00000c40dc770) [ 46.601895] [ 46.602415] The buggy address belongs to the physical page: [ 46.603202] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1040dc [ 46.604223] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.605044] page_type: f5(slab) [ 46.605620] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 46.606821] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 46.607644] page dumped because: kasan: bad access detected [ 46.608363] [ 46.608736] Memory state around the buggy address: [ 46.609561] fff00000c40dc600: 00 04 fc fc fa fb fc fc 00 02 fc fc 00 02 fc fc [ 46.610410] fff00000c40dc680: 00 00 fc fc 00 06 fc fc 00 06 fc fc fa fb fc fc [ 46.611281] >fff00000c40dc700: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc [ 46.612215] ^ [ 46.613488] fff00000c40dc780: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.614142] fff00000c40dc800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.615210] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 46.519172] ================================================================== [ 46.520065] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 46.520919] Read of size 1 at addr fff00000c60f1880 by task kunit_try_catch/125 [ 46.522589] [ 46.523050] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 46.524408] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.524934] Hardware name: linux,dummy-virt (DT) [ 46.525743] Call trace: [ 46.526214] show_stack+0x20/0x38 (C) [ 46.526713] dump_stack_lvl+0x8c/0xd0 [ 46.527168] print_report+0x118/0x5e0 [ 46.527793] kasan_report+0xc8/0x118 [ 46.528247] __asan_report_load1_noabort+0x20/0x30 [ 46.528999] kmalloc_oob_right+0x5d0/0x660 [ 46.529658] kunit_try_run_case+0x14c/0x3d0 [ 46.530319] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.531574] kthread+0x24c/0x2d0 [ 46.532142] ret_from_fork+0x10/0x20 [ 46.532814] [ 46.533430] Allocated by task 125: [ 46.534772] kasan_save_stack+0x3c/0x68 [ 46.535377] kasan_save_track+0x20/0x40 [ 46.535979] kasan_save_alloc_info+0x40/0x58 [ 46.536799] __kasan_kmalloc+0xd4/0xd8 [ 46.537443] __kmalloc_cache_noprof+0x15c/0x3c0 [ 46.538143] kmalloc_oob_right+0xb0/0x660 [ 46.538718] kunit_try_run_case+0x14c/0x3d0 [ 46.539547] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.540425] kthread+0x24c/0x2d0 [ 46.541000] ret_from_fork+0x10/0x20 [ 46.541511] [ 46.541925] The buggy address belongs to the object at fff00000c60f1800 [ 46.541925] which belongs to the cache kmalloc-128 of size 128 [ 46.543892] The buggy address is located 13 bytes to the right of [ 46.543892] allocated 115-byte region [fff00000c60f1800, fff00000c60f1873) [ 46.545154] [ 46.545539] The buggy address belongs to the physical page: [ 46.546543] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060f1 [ 46.547458] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.548494] page_type: f5(slab) [ 46.548938] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 46.550189] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 46.551716] page dumped because: kasan: bad access detected [ 46.552243] [ 46.552837] Memory state around the buggy address: [ 46.553860] fff00000c60f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.555228] fff00000c60f1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 46.556333] >fff00000c60f1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.557650] ^ [ 46.558019] fff00000c60f1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.559032] fff00000c60f1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.559811] ================================================================== [ 46.474735] ================================================================== [ 46.475501] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 46.476260] Write of size 1 at addr fff00000c60f1878 by task kunit_try_catch/125 [ 46.477008] [ 46.478001] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 46.479508] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.480055] Hardware name: linux,dummy-virt (DT) [ 46.480559] Call trace: [ 46.480979] show_stack+0x20/0x38 (C) [ 46.482318] dump_stack_lvl+0x8c/0xd0 [ 46.482907] print_report+0x118/0x5e0 [ 46.483556] kasan_report+0xc8/0x118 [ 46.483988] __asan_report_store1_noabort+0x20/0x30 [ 46.484375] kmalloc_oob_right+0x538/0x660 [ 46.484840] kunit_try_run_case+0x14c/0x3d0 [ 46.485458] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.486572] kthread+0x24c/0x2d0 [ 46.487010] ret_from_fork+0x10/0x20 [ 46.487936] [ 46.488393] Allocated by task 125: [ 46.488896] kasan_save_stack+0x3c/0x68 [ 46.489586] kasan_save_track+0x20/0x40 [ 46.490668] kasan_save_alloc_info+0x40/0x58 [ 46.491117] __kasan_kmalloc+0xd4/0xd8 [ 46.491768] __kmalloc_cache_noprof+0x15c/0x3c0 [ 46.492629] kmalloc_oob_right+0xb0/0x660 [ 46.493321] kunit_try_run_case+0x14c/0x3d0 [ 46.493952] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.495157] kthread+0x24c/0x2d0 [ 46.495789] ret_from_fork+0x10/0x20 [ 46.496513] [ 46.496745] The buggy address belongs to the object at fff00000c60f1800 [ 46.496745] which belongs to the cache kmalloc-128 of size 128 [ 46.498683] The buggy address is located 5 bytes to the right of [ 46.498683] allocated 115-byte region [fff00000c60f1800, fff00000c60f1873) [ 46.500143] [ 46.500438] The buggy address belongs to the physical page: [ 46.500909] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060f1 [ 46.502620] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.503403] page_type: f5(slab) [ 46.504067] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 46.504945] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 46.506281] page dumped because: kasan: bad access detected [ 46.507354] [ 46.507702] Memory state around the buggy address: [ 46.508247] fff00000c60f1700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 46.508957] fff00000c60f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.509918] >fff00000c60f1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 46.511316] ^ [ 46.512583] fff00000c60f1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.513106] fff00000c60f1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.515452] ================================================================== [ 46.424202] ================================================================== [ 46.426189] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 46.428256] Write of size 1 at addr fff00000c60f1873 by task kunit_try_catch/125 [ 46.428976] [ 46.430717] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G N 6.12.0-next-20241127 #1 [ 46.432107] Tainted: [N]=TEST [ 46.432573] Hardware name: linux,dummy-virt (DT) [ 46.433631] Call trace: [ 46.434574] show_stack+0x20/0x38 (C) [ 46.435238] dump_stack_lvl+0x8c/0xd0 [ 46.435836] print_report+0x118/0x5e0 [ 46.436432] kasan_report+0xc8/0x118 [ 46.436886] __asan_report_store1_noabort+0x20/0x30 [ 46.437694] kmalloc_oob_right+0x5a4/0x660 [ 46.438237] kunit_try_run_case+0x14c/0x3d0 [ 46.439268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.440178] kthread+0x24c/0x2d0 [ 46.440667] ret_from_fork+0x10/0x20 [ 46.441431] [ 46.441781] Allocated by task 125: [ 46.442429] kasan_save_stack+0x3c/0x68 [ 46.443380] kasan_save_track+0x20/0x40 [ 46.444087] kasan_save_alloc_info+0x40/0x58 [ 46.444573] __kasan_kmalloc+0xd4/0xd8 [ 46.445103] __kmalloc_cache_noprof+0x15c/0x3c0 [ 46.445667] kmalloc_oob_right+0xb0/0x660 [ 46.446439] kunit_try_run_case+0x14c/0x3d0 [ 46.447128] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.447749] kthread+0x24c/0x2d0 [ 46.448440] ret_from_fork+0x10/0x20 [ 46.448904] [ 46.449341] The buggy address belongs to the object at fff00000c60f1800 [ 46.449341] which belongs to the cache kmalloc-128 of size 128 [ 46.451475] The buggy address is located 0 bytes to the right of [ 46.451475] allocated 115-byte region [fff00000c60f1800, fff00000c60f1873) [ 46.452808] [ 46.453643] The buggy address belongs to the physical page: [ 46.454709] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060f1 [ 46.455575] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.456881] page_type: f5(slab) [ 46.458161] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 46.459647] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 46.460925] page dumped because: kasan: bad access detected [ 46.461913] [ 46.462395] Memory state around the buggy address: [ 46.463570] fff00000c60f1700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 46.464516] fff00000c60f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.465601] >fff00000c60f1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 46.467114] ^ [ 46.468177] fff00000c60f1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.469066] fff00000c60f1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.470025] ==================================================================
Failure - log-parser-boot - internal-error-oops-oops-preempt-smp
KNOWN ISSUE - kunit_test_null_dereference internal oops on qemu-arm64 KUNIT KASAN
[ 161.819265] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP [ 161.820363] Modules linked in: [ 161.821260] CPU: 0 UID: 0 PID: 621 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 161.822767] Tainted: [B]=BAD_PAGE, [N]=TEST [ 161.823236] Hardware name: linux,dummy-virt (DT) [ 161.823809] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 161.824928] pc : kunit_test_null_dereference+0x70/0x170 [ 161.826179] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 161.827084] sp : ffff800080fd7dc0 [ 161.827610] x29: ffff800080fd7e20 x28: 0000000000000000 x27: 0000000000000000 [ 161.828831] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000c4109f80 [ 161.830133] x23: ffffa1fd9dfc9cb0 x22: ffffa1fd9dfd2870 x21: fff00000c4109f88 [ 161.831225] x20: 1ffff000101fafb8 x19: ffff8000800879f0 x18: 0000000027d536b0 [ 161.832280] x17: 0000000000000000 x16: fff00000da4dfca0 x15: 00000000a3a21f61 [ 161.833805] x14: 00000000b156b5a6 x13: 1ffe00001815cb44 x12: fffd800018bd3b3a [ 161.834783] x11: 1ffe000018bd3b39 x10: fffd800018bd3b39 x9 : ffffa1fd9dfc9d38 [ 161.835885] x8 : ffff800080fd7cb8 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 161.836910] x5 : ffff7000101fafb8 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 161.838123] x2 : dfff800000000000 x1 : fff00000c5e9d100 x0 : ffff8000800879f0 [ 161.839269] Call trace: [ 161.839684] kunit_test_null_dereference+0x70/0x170 (P) [ 161.840414] kunit_generic_run_threadfn_adapter+0x88/0x100 (L) [ 161.841423] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 161.842555] kthread+0x24c/0x2d0 [ 161.843005] ret_from_fork+0x10/0x20 [ 161.843832] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 161.844729] ---[ end trace 0000000000000000 ]---