Date
Nov. 28, 2024, 2:36 a.m.
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 33.000223] ================================================================== [ 33.001635] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 33.002453] Free of addr fff00000c406bc00 by task kunit_try_catch/223 [ 33.002984] [ 33.004488] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 33.006269] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.006698] Hardware name: linux,dummy-virt (DT) [ 33.007161] Call trace: [ 33.007484] show_stack+0x20/0x38 (C) [ 33.009095] dump_stack_lvl+0x8c/0xd0 [ 33.009698] print_report+0x118/0x5e0 [ 33.010425] kasan_report_invalid_free+0xb0/0xd8 [ 33.011235] check_slab_allocation+0xd4/0x108 [ 33.011976] __kasan_mempool_poison_object+0x78/0x150 [ 33.012778] mempool_free+0x28c/0x328 [ 33.013813] mempool_double_free_helper+0x150/0x2e0 [ 33.014744] mempool_kmalloc_double_free+0xb8/0x110 [ 33.015359] kunit_try_run_case+0x14c/0x3d0 [ 33.015965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.016630] kthread+0x24c/0x2d0 [ 33.017606] ret_from_fork+0x10/0x20 [ 33.018136] [ 33.018694] Allocated by task 223: [ 33.019143] kasan_save_stack+0x3c/0x68 [ 33.019927] kasan_save_track+0x20/0x40 [ 33.020663] kasan_save_alloc_info+0x40/0x58 [ 33.021538] __kasan_mempool_unpoison_object+0x11c/0x180 [ 33.022065] remove_element+0x130/0x1f8 [ 33.022685] mempool_alloc_preallocated+0x58/0xc0 [ 33.023617] mempool_double_free_helper+0x94/0x2e0 [ 33.024261] mempool_kmalloc_double_free+0xb8/0x110 [ 33.025276] kunit_try_run_case+0x14c/0x3d0 [ 33.026044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.026874] kthread+0x24c/0x2d0 [ 33.027371] ret_from_fork+0x10/0x20 [ 33.028157] [ 33.028658] Freed by task 223: [ 33.029131] kasan_save_stack+0x3c/0x68 [ 33.030070] kasan_save_track+0x20/0x40 [ 33.030535] kasan_save_free_info+0x4c/0x78 [ 33.031368] __kasan_mempool_poison_object+0xc0/0x150 [ 33.031979] mempool_free+0x28c/0x328 [ 33.032475] mempool_double_free_helper+0x100/0x2e0 [ 33.033216] mempool_kmalloc_double_free+0xb8/0x110 [ 33.034268] kunit_try_run_case+0x14c/0x3d0 [ 33.034949] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.035751] kthread+0x24c/0x2d0 [ 33.036299] ret_from_fork+0x10/0x20 [ 33.036922] [ 33.037247] The buggy address belongs to the object at fff00000c406bc00 [ 33.037247] which belongs to the cache kmalloc-128 of size 128 [ 33.038366] The buggy address is located 0 bytes inside of [ 33.038366] 128-byte region [fff00000c406bc00, fff00000c406bc80) [ 33.039566] [ 33.039913] The buggy address belongs to the physical page: [ 33.040508] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10406b [ 33.041695] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.042374] page_type: f5(slab) [ 33.042995] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.043842] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 33.045262] page dumped because: kasan: bad access detected [ 33.046701] [ 33.047067] Memory state around the buggy address: [ 33.047679] fff00000c406bb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.048795] fff00000c406bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.050016] >fff00000c406bc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.050932] ^ [ 33.051334] fff00000c406bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.052016] fff00000c406bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.052535] ================================================================== [ 33.064740] ================================================================== [ 33.066311] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 33.067213] Free of addr fff00000c6610000 by task kunit_try_catch/225 [ 33.067952] [ 33.068391] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 33.069784] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.070300] Hardware name: linux,dummy-virt (DT) [ 33.070873] Call trace: [ 33.071317] show_stack+0x20/0x38 (C) [ 33.071913] dump_stack_lvl+0x8c/0xd0 [ 33.072477] print_report+0x118/0x5e0 [ 33.072970] kasan_report_invalid_free+0xb0/0xd8 [ 33.073654] __kasan_mempool_poison_object+0x14c/0x150 [ 33.074351] mempool_free+0x28c/0x328 [ 33.074822] mempool_double_free_helper+0x150/0x2e0 [ 33.075766] mempool_kmalloc_large_double_free+0xb8/0x110 [ 33.076509] kunit_try_run_case+0x14c/0x3d0 [ 33.077399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.077750] kthread+0x24c/0x2d0 [ 33.077993] ret_from_fork+0x10/0x20 [ 33.078263] [ 33.078419] The buggy address belongs to the physical page: [ 33.078698] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106610 [ 33.079076] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.080599] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.081718] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.082479] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.083284] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.084061] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.084941] head: 0bfffe0000000002 ffffc1ffc3198401 ffffffffffffffff 0000000000000000 [ 33.085993] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 33.086781] page dumped because: kasan: bad access detected [ 33.087499] [ 33.087834] Memory state around the buggy address: [ 33.088390] fff00000c660ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.089430] fff00000c660ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.090193] >fff00000c6610000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.090921] ^ [ 33.091412] fff00000c6610080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.092135] fff00000c6610100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.092964] ================================================================== [ 33.104808] ================================================================== [ 33.105957] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 33.106737] Free of addr fff00000c6610000 by task kunit_try_catch/227 [ 33.108520] [ 33.109098] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 33.110279] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.110891] Hardware name: linux,dummy-virt (DT) [ 33.111530] Call trace: [ 33.112086] show_stack+0x20/0x38 (C) [ 33.112664] dump_stack_lvl+0x8c/0xd0 [ 33.113610] print_report+0x118/0x5e0 [ 33.114131] kasan_report_invalid_free+0xb0/0xd8 [ 33.114458] __kasan_mempool_poison_pages+0xe0/0xe8 [ 33.114757] mempool_free+0x24c/0x328 [ 33.115011] mempool_double_free_helper+0x150/0x2e0 [ 33.115671] mempool_page_alloc_double_free+0xb4/0x110 [ 33.116476] kunit_try_run_case+0x14c/0x3d0 [ 33.117315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.118209] kthread+0x24c/0x2d0 [ 33.118734] ret_from_fork+0x10/0x20 [ 33.119296] [ 33.119597] The buggy address belongs to the physical page: [ 33.120268] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106610 [ 33.121513] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.122221] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.123054] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.123869] page dumped because: kasan: bad access detected [ 33.124489] [ 33.124798] Memory state around the buggy address: [ 33.125348] fff00000c660ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.126691] fff00000c660ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.127301] >fff00000c6610000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.128160] ^ [ 33.128732] fff00000c6610080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.129898] fff00000c6610100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.130773] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 65.658886] ================================================================== [ 65.659619] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 65.659619] [ 65.660058] Use-after-free read at 0x0000000097358843 (in kfence-#200): [ 65.660580] test_krealloc+0x51c/0x830 [ 65.661337] test_krealloc+0x458/0x830 [ 65.661943] kunit_try_run_case+0x14c/0x3d0 [ 65.662597] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.663290] kthread+0x24c/0x2d0 [ 65.663881] ret_from_fork+0x10/0x20 [ 65.664605] [ 65.665030] kfence-#200: 0x0000000097358843-0x00000000fae0cf03, size=32, cache=kmalloc-32 [ 65.665030] [ 65.666359] allocated by task 325 on cpu 1 at 65.657749s (0.008599s ago): [ 65.667487] test_alloc+0x298/0x620 [ 65.668432] test_krealloc+0xc0/0x830 [ 65.669402] kunit_try_run_case+0x14c/0x3d0 [ 65.670104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.670779] kthread+0x24c/0x2d0 [ 65.671337] ret_from_fork+0x10/0x20 [ 65.671893] [ 65.672280] freed by task 325 on cpu 1 at 65.658230s (0.014032s ago): [ 65.673094] krealloc_noprof+0x148/0x360 [ 65.673641] test_krealloc+0x1dc/0x830 [ 65.674228] kunit_try_run_case+0x14c/0x3d0 [ 65.674730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.675459] kthread+0x24c/0x2d0 [ 65.675961] ret_from_fork+0x10/0x20 [ 65.676448] [ 65.676797] CPU: 1 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 65.677935] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.678498] Hardware name: linux,dummy-virt (DT) [ 65.679046] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 65.484896] ================================================================== [ 65.485700] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 65.485700] [ 65.486674] Use-after-free read at 0x00000000f6f9f80f (in kfence-#198): [ 65.487497] test_memcache_typesafe_by_rcu+0x280/0x560 [ 65.488188] test_memcache_typesafe_by_rcu+0x260/0x560 [ 65.488910] kunit_try_run_case+0x14c/0x3d0 [ 65.489550] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.490286] kthread+0x24c/0x2d0 [ 65.490835] ret_from_fork+0x10/0x20 [ 65.491353] [ 65.491705] kfence-#198: 0x00000000f6f9f80f-0x0000000002e68dcf, size=32, cache=test [ 65.491705] [ 65.492590] allocated by task 323 on cpu 0 at 65.451444s (0.041133s ago): [ 65.493402] test_alloc+0x22c/0x620 [ 65.493962] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 65.494524] kunit_try_run_case+0x14c/0x3d0 [ 65.495159] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.495881] kthread+0x24c/0x2d0 [ 65.496408] ret_from_fork+0x10/0x20 [ 65.496936] [ 65.497311] freed by task 323 on cpu 0 at 65.451650s (0.045649s ago): [ 65.498152] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 65.498683] kunit_try_run_case+0x14c/0x3d0 [ 65.499314] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.500026] kthread+0x24c/0x2d0 [ 65.500583] ret_from_fork+0x10/0x20 [ 65.501126] [ 65.501504] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 65.502455] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.503043] Hardware name: linux,dummy-virt (DT) [ 65.503538] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 45.090841] ================================================================== [ 45.091981] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 45.091981] [ 45.093581] Invalid read at 0x0000000015f0b645: [ 45.094474] test_invalid_access+0xdc/0x1f0 [ 45.095216] kunit_try_run_case+0x14c/0x3d0 [ 45.095932] kunit_try_run_case+0x14c/0x3d0 [ 45.096575] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.097936] kthread+0x24c/0x2d0 [ 45.098475] ret_from_fork+0x10/0x20 [ 45.099307] [ 45.099825] CPU: 1 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 45.101489] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.102067] Hardware name: linux,dummy-virt (DT) [ 45.102654] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 44.858324] ================================================================== [ 44.859094] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 44.859094] [ 44.859820] Corrupted memory at 0x0000000011e8e309 [ ! . . . . . . . . . . . . . . . ] (in kfence-#193): [ 44.862362] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 44.862988] kunit_try_run_case+0x14c/0x3d0 [ 44.863608] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.864296] kthread+0x24c/0x2d0 [ 44.864847] ret_from_fork+0x10/0x20 [ 44.865431] [ 44.865749] kfence-#193: 0x00000000f21ebe70-0x0000000027890038, size=73, cache=kmalloc-96 [ 44.865749] [ 44.866613] allocated by task 313 on cpu 0 at 44.857840s (0.008763s ago): [ 44.867472] test_alloc+0x298/0x620 [ 44.867979] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 44.868667] kunit_try_run_case+0x14c/0x3d0 [ 44.869221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.869932] kthread+0x24c/0x2d0 [ 44.870491] ret_from_fork+0x10/0x20 [ 44.870949] [ 44.871323] freed by task 313 on cpu 0 at 44.858082s (0.013230s ago): [ 44.872158] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 44.872806] kunit_try_run_case+0x14c/0x3d0 [ 44.873334] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.874056] kthread+0x24c/0x2d0 [ 44.874532] ret_from_fork+0x10/0x20 [ 44.875104] [ 44.875489] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 44.876536] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.877067] Hardware name: linux,dummy-virt (DT) [ 44.877646] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 44.754318] ================================================================== [ 44.755004] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 44.755004] [ 44.755901] Out-of-bounds read at 0x00000000da7779b9 (105B right of kfence-#192): [ 44.756778] test_kmalloc_aligned_oob_read+0x238/0x468 [ 44.757374] test_kmalloc_aligned_oob_read+0x100/0x468 [ 44.758104] kunit_try_run_case+0x14c/0x3d0 [ 44.758758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.759386] kthread+0x24c/0x2d0 [ 44.759945] ret_from_fork+0x10/0x20 [ 44.760554] [ 44.760909] kfence-#192: 0x0000000075269528-0x0000000030143b88, size=73, cache=kmalloc-96 [ 44.760909] [ 44.761853] allocated by task 311 on cpu 0 at 44.753849s (0.007993s ago): [ 44.762655] test_alloc+0x298/0x620 [ 44.763228] test_kmalloc_aligned_oob_read+0x100/0x468 [ 44.763933] kunit_try_run_case+0x14c/0x3d0 [ 44.764531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.765260] kthread+0x24c/0x2d0 [ 44.765697] ret_from_fork+0x10/0x20 [ 44.766269] [ 44.766620] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 44.767698] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.768206] Hardware name: linux,dummy-virt (DT) [ 44.768707] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[ 40.385969] ================================================================== [ 40.386827] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 40.386827] [ 40.387519] Corrupted memory at 0x00000000baef86a9 [ ! . . . . . . . . . . . . . . . ] (in kfence-#150): [ 40.390039] test_corruption+0x120/0x378 [ 40.390574] kunit_try_run_case+0x14c/0x3d0 [ 40.391209] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.391891] kthread+0x24c/0x2d0 [ 40.392463] ret_from_fork+0x10/0x20 [ 40.392997] [ 40.393312] kfence-#150: 0x00000000a07d50d6-0x0000000055df8dff, size=32, cache=test [ 40.393312] [ 40.394286] allocated by task 301 on cpu 0 at 40.385719s (0.008557s ago): [ 40.394941] test_alloc+0x22c/0x620 [ 40.395523] test_corruption+0xdc/0x378 [ 40.396102] kunit_try_run_case+0x14c/0x3d0 [ 40.396644] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.397377] kthread+0x24c/0x2d0 [ 40.397865] ret_from_fork+0x10/0x20 [ 40.398453] [ 40.398805] freed by task 301 on cpu 0 at 40.385815s (0.012979s ago): [ 40.399657] test_corruption+0x120/0x378 [ 40.400225] kunit_try_run_case+0x14c/0x3d0 [ 40.400838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.401576] kthread+0x24c/0x2d0 [ 40.402130] ret_from_fork+0x10/0x20 [ 40.402639] [ 40.403025] CPU: 0 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 40.404057] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.404595] Hardware name: linux,dummy-virt (DT) [ 40.405145] ================================================================== [ 39.970388] ================================================================== [ 39.971259] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 39.971259] [ 39.972057] Corrupted memory at 0x00000000a5aff81e [ ! . . . . . . . . . . . . . . . ] (in kfence-#146): [ 39.975801] test_corruption+0x278/0x378 [ 39.976342] kunit_try_run_case+0x14c/0x3d0 [ 39.976840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.977465] kthread+0x24c/0x2d0 [ 39.978062] ret_from_fork+0x10/0x20 [ 39.978649] [ 39.978999] kfence-#146: 0x00000000d5799c5c-0x00000000a70c4600, size=32, cache=kmalloc-32 [ 39.978999] [ 39.980007] allocated by task 299 on cpu 1 at 39.969845s (0.010151s ago): [ 39.980742] test_alloc+0x298/0x620 [ 39.981311] test_corruption+0xdc/0x378 [ 39.981800] kunit_try_run_case+0x14c/0x3d0 [ 39.982441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.983052] kthread+0x24c/0x2d0 [ 39.983601] ret_from_fork+0x10/0x20 [ 39.984167] [ 39.984529] freed by task 299 on cpu 1 at 39.970007s (0.014511s ago): [ 39.985234] test_corruption+0x278/0x378 [ 39.985797] kunit_try_run_case+0x14c/0x3d0 [ 39.986329] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.987038] kthread+0x24c/0x2d0 [ 39.987487] ret_from_fork+0x10/0x20 [ 39.988083] [ 39.988497] CPU: 1 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 39.989496] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.990054] Hardware name: linux,dummy-virt (DT) [ 39.990606] ================================================================== [ 40.282636] ================================================================== [ 40.283499] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 40.283499] [ 40.284235] Corrupted memory at 0x000000008b5aeb6a [ ! ] (in kfence-#149): [ 40.285441] test_corruption+0x284/0x378 [ 40.286055] kunit_try_run_case+0x14c/0x3d0 [ 40.286657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.287254] kthread+0x24c/0x2d0 [ 40.287842] ret_from_fork+0x10/0x20 [ 40.288431] [ 40.288788] kfence-#149: 0x000000002ab31c26-0x00000000f3b055e0, size=32, cache=kmalloc-32 [ 40.288788] [ 40.289719] allocated by task 299 on cpu 1 at 40.282039s (0.007669s ago): [ 40.290523] test_alloc+0x298/0x620 [ 40.291075] test_corruption+0x198/0x378 [ 40.291554] kunit_try_run_case+0x14c/0x3d0 [ 40.292189] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.292911] kthread+0x24c/0x2d0 [ 40.293397] ret_from_fork+0x10/0x20 [ 40.293902] [ 40.294263] freed by task 299 on cpu 1 at 40.282227s (0.012025s ago): [ 40.295056] test_corruption+0x284/0x378 [ 40.295651] kunit_try_run_case+0x14c/0x3d0 [ 40.296283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.296946] kthread+0x24c/0x2d0 [ 40.297509] ret_from_fork+0x10/0x20 [ 40.298103] [ 40.298495] CPU: 1 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 40.299420] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.299983] Hardware name: linux,dummy-virt (DT) [ 40.300623] ================================================================== [ 40.490056] ================================================================== [ 40.490887] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 40.490887] [ 40.491675] Corrupted memory at 0x000000000dd04787 [ ! ] (in kfence-#151): [ 40.492794] test_corruption+0x1d8/0x378 [ 40.493555] kunit_try_run_case+0x14c/0x3d0 [ 40.494278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.495063] kthread+0x24c/0x2d0 [ 40.495682] ret_from_fork+0x10/0x20 [ 40.496242] [ 40.496594] kfence-#151: 0x000000005a7c2094-0x00000000bd65774b, size=32, cache=test [ 40.496594] [ 40.497666] allocated by task 301 on cpu 0 at 40.489809s (0.007847s ago): [ 40.498612] test_alloc+0x22c/0x620 [ 40.499052] test_corruption+0x198/0x378 [ 40.499651] kunit_try_run_case+0x14c/0x3d0 [ 40.500230] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.500901] kthread+0x24c/0x2d0 [ 40.501387] ret_from_fork+0x10/0x20 [ 40.501945] [ 40.502316] freed by task 301 on cpu 0 at 40.489905s (0.012400s ago): [ 40.503167] test_corruption+0x1d8/0x378 [ 40.503695] kunit_try_run_case+0x14c/0x3d0 [ 40.504290] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.504892] kthread+0x24c/0x2d0 [ 40.505456] ret_from_fork+0x10/0x20 [ 40.505999] [ 40.506372] CPU: 0 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 40.507353] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.507950] Hardware name: linux,dummy-virt (DT) [ 40.508516] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 39.553980] ================================================================== [ 39.554688] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 39.554688] [ 39.555420] Invalid free of 0x00000000ad4e57f8 (in kfence-#142): [ 39.555964] test_invalid_addr_free+0x1ac/0x238 [ 39.556633] kunit_try_run_case+0x14c/0x3d0 [ 39.557240] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.557925] kthread+0x24c/0x2d0 [ 39.558479] ret_from_fork+0x10/0x20 [ 39.559051] [ 39.559442] kfence-#142: 0x000000007d27eb8b-0x000000002e445926, size=32, cache=kmalloc-32 [ 39.559442] [ 39.560342] allocated by task 295 on cpu 1 at 39.553728s (0.006603s ago): [ 39.561179] test_alloc+0x298/0x620 [ 39.561701] test_invalid_addr_free+0xd4/0x238 [ 39.562361] kunit_try_run_case+0x14c/0x3d0 [ 39.562865] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.563601] kthread+0x24c/0x2d0 [ 39.564044] ret_from_fork+0x10/0x20 [ 39.564643] [ 39.565038] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 39.566055] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.566553] Hardware name: linux,dummy-virt (DT) [ 39.567191] ================================================================== [ 39.658001] ================================================================== [ 39.658815] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 39.658815] [ 39.659614] Invalid free of 0x000000007eb2a3bb (in kfence-#143): [ 39.660400] test_invalid_addr_free+0xec/0x238 [ 39.661139] kunit_try_run_case+0x14c/0x3d0 [ 39.661789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.662658] kthread+0x24c/0x2d0 [ 39.663331] ret_from_fork+0x10/0x20 [ 39.664013] [ 39.664467] kfence-#143: 0x000000005054246f-0x00000000a8d711f6, size=32, cache=test [ 39.664467] [ 39.665713] allocated by task 297 on cpu 0 at 39.657795s (0.007906s ago): [ 39.666726] test_alloc+0x22c/0x620 [ 39.667290] test_invalid_addr_free+0xd4/0x238 [ 39.667968] kunit_try_run_case+0x14c/0x3d0 [ 39.668587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.669237] kthread+0x24c/0x2d0 [ 39.669693] ret_from_fork+0x10/0x20 [ 39.670248] [ 39.670679] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 39.671841] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.672510] Hardware name: linux,dummy-virt (DT) [ 39.673225] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[ 39.346400] ================================================================== [ 39.347091] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 39.347091] [ 39.347864] Invalid free of 0x0000000078e637e1 (in kfence-#140): [ 39.348668] test_double_free+0x1bc/0x238 [ 39.349834] kunit_try_run_case+0x14c/0x3d0 [ 39.350409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.351061] kthread+0x24c/0x2d0 [ 39.351563] ret_from_fork+0x10/0x20 [ 39.352151] [ 39.352507] kfence-#140: 0x0000000078e637e1-0x000000007f56d0a4, size=32, cache=kmalloc-32 [ 39.352507] [ 39.353439] allocated by task 291 on cpu 0 at 39.345851s (0.007578s ago): [ 39.354260] test_alloc+0x298/0x620 [ 39.354816] test_double_free+0xd4/0x238 [ 39.355369] kunit_try_run_case+0x14c/0x3d0 [ 39.356010] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.356748] kthread+0x24c/0x2d0 [ 39.357287] ret_from_fork+0x10/0x20 [ 39.357839] [ 39.358207] freed by task 291 on cpu 0 at 39.345974s (0.012221s ago): [ 39.358899] test_double_free+0x1ac/0x238 [ 39.359501] kunit_try_run_case+0x14c/0x3d0 [ 39.360038] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.360686] kthread+0x24c/0x2d0 [ 39.361248] ret_from_fork+0x10/0x20 [ 39.361816] [ 39.362208] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 39.363292] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.363806] Hardware name: linux,dummy-virt (DT) [ 39.364308] ================================================================== [ 39.450240] ================================================================== [ 39.450931] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 39.450931] [ 39.451716] Invalid free of 0x00000000b4af0662 (in kfence-#141): [ 39.453303] test_double_free+0x100/0x238 [ 39.453875] kunit_try_run_case+0x14c/0x3d0 [ 39.454759] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.455589] kthread+0x24c/0x2d0 [ 39.456258] ret_from_fork+0x10/0x20 [ 39.456809] [ 39.457380] kfence-#141: 0x00000000b4af0662-0x00000000e4e7b9ad, size=32, cache=test [ 39.457380] [ 39.458435] allocated by task 293 on cpu 1 at 39.449803s (0.008621s ago): [ 39.459582] test_alloc+0x22c/0x620 [ 39.460302] test_double_free+0xd4/0x238 [ 39.461015] kunit_try_run_case+0x14c/0x3d0 [ 39.461617] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.462564] kthread+0x24c/0x2d0 [ 39.463253] ret_from_fork+0x10/0x20 [ 39.463760] [ 39.464408] freed by task 293 on cpu 1 at 39.449906s (0.014495s ago): [ 39.465214] test_double_free+0xf0/0x238 [ 39.465608] kunit_try_run_case+0x14c/0x3d0 [ 39.466238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.466936] kthread+0x24c/0x2d0 [ 39.467415] ret_from_fork+0x10/0x20 [ 39.467927] [ 39.468337] CPU: 1 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 39.469362] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.469914] Hardware name: linux,dummy-virt (DT) [ 39.470459] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 38.930225] ================================================================== [ 38.931072] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 38.931072] [ 38.931898] Use-after-free read at 0x000000007af8a8e8 (in kfence-#136): [ 38.932782] test_use_after_free_read+0x114/0x248 [ 38.933546] test_use_after_free_read+0x1c0/0x248 [ 38.934270] kunit_try_run_case+0x14c/0x3d0 [ 38.934793] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.935132] kthread+0x24c/0x2d0 [ 38.935379] ret_from_fork+0x10/0x20 [ 38.935620] [ 38.935775] kfence-#136: 0x000000007af8a8e8-0x000000005d12a081, size=32, cache=kmalloc-32 [ 38.935775] [ 38.936390] allocated by task 283 on cpu 1 at 38.929737s (0.006643s ago): [ 38.937327] test_alloc+0x298/0x620 [ 38.937920] test_use_after_free_read+0xd0/0x248 [ 38.938648] kunit_try_run_case+0x14c/0x3d0 [ 38.939322] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.940146] kthread+0x24c/0x2d0 [ 38.940753] ret_from_fork+0x10/0x20 [ 38.941297] [ 38.941936] freed by task 283 on cpu 1 at 38.929861s (0.011880s ago): [ 38.942919] test_use_after_free_read+0x1c0/0x248 [ 38.943541] kunit_try_run_case+0x14c/0x3d0 [ 38.944128] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.944818] kthread+0x24c/0x2d0 [ 38.945330] ret_from_fork+0x10/0x20 [ 38.945824] [ 38.946234] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 38.947306] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.947912] Hardware name: linux,dummy-virt (DT) [ 38.948513] ================================================================== [ 39.034341] ================================================================== [ 39.035052] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 39.035052] [ 39.036017] Use-after-free read at 0x00000000f3582f11 (in kfence-#137): [ 39.036871] test_use_after_free_read+0x114/0x248 [ 39.037617] test_use_after_free_read+0xf0/0x248 [ 39.038196] kunit_try_run_case+0x14c/0x3d0 [ 39.038872] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.039546] kthread+0x24c/0x2d0 [ 39.040102] ret_from_fork+0x10/0x20 [ 39.040690] [ 39.041047] kfence-#137: 0x00000000f3582f11-0x000000004964f453, size=32, cache=test [ 39.041047] [ 39.042081] allocated by task 285 on cpu 1 at 39.033932s (0.008138s ago): [ 39.042888] test_alloc+0x22c/0x620 [ 39.043498] test_use_after_free_read+0xd0/0x248 [ 39.044137] kunit_try_run_case+0x14c/0x3d0 [ 39.044804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.045487] kthread+0x24c/0x2d0 [ 39.046056] ret_from_fork+0x10/0x20 [ 39.046602] [ 39.046961] freed by task 285 on cpu 1 at 39.034051s (0.012900s ago): [ 39.047884] test_use_after_free_read+0xf0/0x248 [ 39.048522] kunit_try_run_case+0x14c/0x3d0 [ 39.049192] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.049822] kthread+0x24c/0x2d0 [ 39.050409] ret_from_fork+0x10/0x20 [ 39.050918] [ 39.051361] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 39.052503] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.053024] Hardware name: linux,dummy-virt (DT) [ 39.053689] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 38.826060] ================================================================== [ 38.826898] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 38.826898] [ 38.827627] Out-of-bounds write at 0x000000003151f4bb (1B left of kfence-#135): [ 38.828504] test_out_of_bounds_write+0x100/0x240 [ 38.829174] test_out_of_bounds_write+0xc8/0x240 [ 38.829825] kunit_try_run_case+0x14c/0x3d0 [ 38.830481] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.831159] kthread+0x24c/0x2d0 [ 38.831636] ret_from_fork+0x10/0x20 [ 38.832226] [ 38.832577] kfence-#135: 0x0000000088e6d49b-0x0000000056e44f6e, size=32, cache=test [ 38.832577] [ 38.833612] allocated by task 281 on cpu 0 at 38.825882s (0.007718s ago): [ 38.834405] test_alloc+0x22c/0x620 [ 38.834964] test_out_of_bounds_write+0xc8/0x240 [ 38.835648] kunit_try_run_case+0x14c/0x3d0 [ 38.836297] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.836877] kthread+0x24c/0x2d0 [ 38.837435] ret_from_fork+0x10/0x20 [ 38.837957] [ 38.838366] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 38.839658] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.840324] Hardware name: linux,dummy-virt (DT) [ 38.841037] ================================================================== [ 38.618070] ================================================================== [ 38.618887] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 38.618887] [ 38.619643] Out-of-bounds write at 0x00000000801e5335 (1B left of kfence-#133): [ 38.620431] test_out_of_bounds_write+0x100/0x240 [ 38.621062] test_out_of_bounds_write+0xc8/0x240 [ 38.621611] kunit_try_run_case+0x14c/0x3d0 [ 38.622259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.622981] kthread+0x24c/0x2d0 [ 38.623550] ret_from_fork+0x10/0x20 [ 38.624075] [ 38.624445] kfence-#133: 0x000000008a3e7939-0x000000007302ac63, size=32, cache=kmalloc-32 [ 38.624445] [ 38.625525] allocated by task 279 on cpu 1 at 38.617786s (0.007728s ago): [ 38.626313] test_alloc+0x298/0x620 [ 38.626834] test_out_of_bounds_write+0xc8/0x240 [ 38.627460] kunit_try_run_case+0x14c/0x3d0 [ 38.628032] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.628773] kthread+0x24c/0x2d0 [ 38.629338] ret_from_fork+0x10/0x20 [ 38.629871] [ 38.630278] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 38.631271] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.631776] Hardware name: linux,dummy-virt (DT) [ 38.632424] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 38.098175] ================================================================== [ 38.098962] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 38.098962] [ 38.099833] Out-of-bounds read at 0x00000000c873d958 (1B left of kfence-#128): [ 38.100718] test_out_of_bounds_read+0x114/0x3e0 [ 38.101325] test_out_of_bounds_read+0xdc/0x3e0 [ 38.102040] kunit_try_run_case+0x14c/0x3d0 [ 38.102732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.103337] kthread+0x24c/0x2d0 [ 38.103925] ret_from_fork+0x10/0x20 [ 38.104601] [ 38.104977] kfence-#128: 0x0000000053c348f8-0x000000004c5c4abd, size=32, cache=test [ 38.104977] [ 38.105945] allocated by task 277 on cpu 0 at 38.097975s (0.007925s ago): [ 38.106910] test_alloc+0x22c/0x620 [ 38.107526] test_out_of_bounds_read+0xdc/0x3e0 [ 38.108200] kunit_try_run_case+0x14c/0x3d0 [ 38.108799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.109348] kthread+0x24c/0x2d0 [ 38.109895] ret_from_fork+0x10/0x20 [ 38.110480] [ 38.110860] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 38.111979] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.112444] Hardware name: linux,dummy-virt (DT) [ 38.113052] ================================================================== [ 37.682947] ================================================================== [ 37.683785] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 37.683785] [ 37.684721] Out-of-bounds read at 0x00000000cba0af09 (1B left of kfence-#124): [ 37.686214] test_out_of_bounds_read+0x114/0x3e0 [ 37.686897] test_out_of_bounds_read+0xdc/0x3e0 [ 37.687600] kunit_try_run_case+0x14c/0x3d0 [ 37.688337] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.688971] kthread+0x24c/0x2d0 [ 37.689569] ret_from_fork+0x10/0x20 [ 37.690198] [ 37.690977] kfence-#124: 0x00000000ad559932-0x000000009c8bba09, size=32, cache=kmalloc-32 [ 37.690977] [ 37.692284] allocated by task 275 on cpu 1 at 37.681696s (0.010440s ago): [ 37.693785] test_alloc+0x298/0x620 [ 37.694294] test_out_of_bounds_read+0xdc/0x3e0 [ 37.694947] kunit_try_run_case+0x14c/0x3d0 [ 37.695544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.696253] kthread+0x24c/0x2d0 [ 37.696796] ret_from_fork+0x10/0x20 [ 37.697570] [ 37.698074] CPU: 1 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 37.699175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.699713] Hardware name: linux,dummy-virt (DT) [ 37.700356] ================================================================== [ 37.786230] ================================================================== [ 37.786953] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 37.786953] [ 37.787832] Out-of-bounds read at 0x00000000eda49ade (32B right of kfence-#125): [ 37.788685] test_out_of_bounds_read+0x1c8/0x3e0 [ 37.789230] test_out_of_bounds_read+0x198/0x3e0 [ 37.789884] kunit_try_run_case+0x14c/0x3d0 [ 37.790445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.791158] kthread+0x24c/0x2d0 [ 37.791719] ret_from_fork+0x10/0x20 [ 37.792272] [ 37.792641] kfence-#125: 0x00000000904cf1b3-0x000000008480aa66, size=32, cache=kmalloc-32 [ 37.792641] [ 37.793690] allocated by task 275 on cpu 1 at 37.785765s (0.007914s ago): [ 37.794571] test_alloc+0x298/0x620 [ 37.795139] test_out_of_bounds_read+0x198/0x3e0 [ 37.795804] kunit_try_run_case+0x14c/0x3d0 [ 37.796406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.797034] kthread+0x24c/0x2d0 [ 37.797538] ret_from_fork+0x10/0x20 [ 37.798107] [ 37.798501] CPU: 1 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 37.799494] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.800069] Hardware name: linux,dummy-virt (DT) [ 37.800603] ================================================================== [ 38.305931] ================================================================== [ 38.306810] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 38.306810] [ 38.307644] Out-of-bounds read at 0x00000000aa410bad (32B right of kfence-#130): [ 38.308513] test_out_of_bounds_read+0x1c8/0x3e0 [ 38.309206] test_out_of_bounds_read+0x198/0x3e0 [ 38.309793] kunit_try_run_case+0x14c/0x3d0 [ 38.310333] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.311043] kthread+0x24c/0x2d0 [ 38.311627] ret_from_fork+0x10/0x20 [ 38.312201] [ 38.312561] kfence-#130: 0x00000000f9f9b5f5-0x00000000864333b8, size=32, cache=test [ 38.312561] [ 38.313508] allocated by task 277 on cpu 0 at 38.305774s (0.007723s ago): [ 38.314373] test_alloc+0x22c/0x620 [ 38.314865] test_out_of_bounds_read+0x198/0x3e0 [ 38.315479] kunit_try_run_case+0x14c/0x3d0 [ 38.316103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.316860] kthread+0x24c/0x2d0 [ 38.317336] ret_from_fork+0x10/0x20 [ 38.317885] [ 38.318284] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 38.319282] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.319766] Hardware name: linux,dummy-virt (DT) [ 38.320299] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 37.439091] ================================================================== [ 37.439834] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 37.440566] Write of size 1 at addr fff00000c6409278 by task kunit_try_catch/273 [ 37.441491] [ 37.441866] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 37.442967] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.443484] Hardware name: linux,dummy-virt (DT) [ 37.444017] Call trace: [ 37.444778] show_stack+0x20/0x38 (C) [ 37.445284] dump_stack_lvl+0x8c/0xd0 [ 37.445995] print_report+0x118/0x5e0 [ 37.446395] kasan_report+0xc8/0x118 [ 37.446910] __asan_report_store1_noabort+0x20/0x30 [ 37.447773] strncpy_from_user+0x270/0x2a0 [ 37.448412] copy_user_test_oob+0x5c0/0xec0 [ 37.449043] kunit_try_run_case+0x14c/0x3d0 [ 37.449747] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.450483] kthread+0x24c/0x2d0 [ 37.451038] ret_from_fork+0x10/0x20 [ 37.451640] [ 37.452015] Allocated by task 273: [ 37.452523] kasan_save_stack+0x3c/0x68 [ 37.453157] kasan_save_track+0x20/0x40 [ 37.453743] kasan_save_alloc_info+0x40/0x58 [ 37.454400] __kasan_kmalloc+0xd4/0xd8 [ 37.455017] __kmalloc_noprof+0x188/0x4c8 [ 37.455535] kunit_kmalloc_array+0x34/0x88 [ 37.456189] copy_user_test_oob+0xac/0xec0 [ 37.456803] kunit_try_run_case+0x14c/0x3d0 [ 37.457464] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.458238] kthread+0x24c/0x2d0 [ 37.458752] ret_from_fork+0x10/0x20 [ 37.459337] [ 37.459685] The buggy address belongs to the object at fff00000c6409200 [ 37.459685] which belongs to the cache kmalloc-128 of size 128 [ 37.460921] The buggy address is located 0 bytes to the right of [ 37.460921] allocated 120-byte region [fff00000c6409200, fff00000c6409278) [ 37.462262] [ 37.462555] The buggy address belongs to the physical page: [ 37.463267] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106409 [ 37.464140] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.464982] page_type: f5(slab) [ 37.465467] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.466376] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 37.467220] page dumped because: kasan: bad access detected [ 37.467907] [ 37.468271] Memory state around the buggy address: [ 37.468949] fff00000c6409100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.469782] fff00000c6409180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.470668] >fff00000c6409200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.471456] ^ [ 37.472312] fff00000c6409280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.473165] fff00000c6409300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.473944] ================================================================== [ 37.401672] ================================================================== [ 37.402317] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 37.403105] Write of size 121 at addr fff00000c6409200 by task kunit_try_catch/273 [ 37.404066] [ 37.404477] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 37.405621] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.406162] Hardware name: linux,dummy-virt (DT) [ 37.406823] Call trace: [ 37.407295] show_stack+0x20/0x38 (C) [ 37.407882] dump_stack_lvl+0x8c/0xd0 [ 37.408530] print_report+0x118/0x5e0 [ 37.409198] kasan_report+0xc8/0x118 [ 37.409829] kasan_check_range+0x100/0x1a8 [ 37.410410] __kasan_check_write+0x20/0x30 [ 37.411080] strncpy_from_user+0x3c/0x2a0 [ 37.411706] copy_user_test_oob+0x5c0/0xec0 [ 37.412361] kunit_try_run_case+0x14c/0x3d0 [ 37.412994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.413743] kthread+0x24c/0x2d0 [ 37.414347] ret_from_fork+0x10/0x20 [ 37.414936] [ 37.415274] Allocated by task 273: [ 37.415823] kasan_save_stack+0x3c/0x68 [ 37.416373] kasan_save_track+0x20/0x40 [ 37.416985] kasan_save_alloc_info+0x40/0x58 [ 37.417619] __kasan_kmalloc+0xd4/0xd8 [ 37.418250] __kmalloc_noprof+0x188/0x4c8 [ 37.418837] kunit_kmalloc_array+0x34/0x88 [ 37.419470] copy_user_test_oob+0xac/0xec0 [ 37.420067] kunit_try_run_case+0x14c/0x3d0 [ 37.420689] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.421425] kthread+0x24c/0x2d0 [ 37.421946] ret_from_fork+0x10/0x20 [ 37.422493] [ 37.422875] The buggy address belongs to the object at fff00000c6409200 [ 37.422875] which belongs to the cache kmalloc-128 of size 128 [ 37.424035] The buggy address is located 0 bytes inside of [ 37.424035] allocated 120-byte region [fff00000c6409200, fff00000c6409278) [ 37.425261] [ 37.425637] The buggy address belongs to the physical page: [ 37.426255] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106409 [ 37.427231] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.428036] page_type: f5(slab) [ 37.428574] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.429481] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 37.430324] page dumped because: kasan: bad access detected [ 37.430964] [ 37.431315] Memory state around the buggy address: [ 37.431945] fff00000c6409100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.432772] fff00000c6409180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.433613] >fff00000c6409200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.434426] ^ [ 37.435196] fff00000c6409280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.435939] fff00000c6409300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.436713] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 37.363728] ================================================================== [ 37.364429] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0 [ 37.365023] Read of size 121 at addr fff00000c6409200 by task kunit_try_catch/273 [ 37.365956] [ 37.366396] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 37.368217] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.368805] Hardware name: linux,dummy-virt (DT) [ 37.369300] Call trace: [ 37.369727] show_stack+0x20/0x38 (C) [ 37.370279] dump_stack_lvl+0x8c/0xd0 [ 37.370942] print_report+0x118/0x5e0 [ 37.371567] kasan_report+0xc8/0x118 [ 37.372147] kasan_check_range+0x100/0x1a8 [ 37.372762] __kasan_check_read+0x20/0x30 [ 37.373501] copy_user_test_oob+0x4a0/0xec0 [ 37.374165] kunit_try_run_case+0x14c/0x3d0 [ 37.374846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.375593] kthread+0x24c/0x2d0 [ 37.376187] ret_from_fork+0x10/0x20 [ 37.376830] [ 37.377172] Allocated by task 273: [ 37.377592] kasan_save_stack+0x3c/0x68 [ 37.378183] kasan_save_track+0x20/0x40 [ 37.378772] kasan_save_alloc_info+0x40/0x58 [ 37.379499] __kasan_kmalloc+0xd4/0xd8 [ 37.380084] __kmalloc_noprof+0x188/0x4c8 [ 37.380747] kunit_kmalloc_array+0x34/0x88 [ 37.381308] copy_user_test_oob+0xac/0xec0 [ 37.381956] kunit_try_run_case+0x14c/0x3d0 [ 37.382622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.383258] kthread+0x24c/0x2d0 [ 37.383826] ret_from_fork+0x10/0x20 [ 37.384438] [ 37.384749] The buggy address belongs to the object at fff00000c6409200 [ 37.384749] which belongs to the cache kmalloc-128 of size 128 [ 37.385995] The buggy address is located 0 bytes inside of [ 37.385995] allocated 120-byte region [fff00000c6409200, fff00000c6409278) [ 37.387257] [ 37.387640] The buggy address belongs to the physical page: [ 37.388330] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106409 [ 37.389230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.390033] page_type: f5(slab) [ 37.390532] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.391441] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 37.392269] page dumped because: kasan: bad access detected [ 37.392926] [ 37.393318] Memory state around the buggy address: [ 37.393913] fff00000c6409100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.394725] fff00000c6409180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.395577] >fff00000c6409200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.396391] ^ [ 37.397205] fff00000c6409280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.398030] fff00000c6409300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.398876] ================================================================== [ 37.326955] ================================================================== [ 37.327576] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0 [ 37.328440] Write of size 121 at addr fff00000c6409200 by task kunit_try_catch/273 [ 37.329399] [ 37.329814] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 37.330946] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.331576] Hardware name: linux,dummy-virt (DT) [ 37.332131] Call trace: [ 37.332571] show_stack+0x20/0x38 (C) [ 37.333193] dump_stack_lvl+0x8c/0xd0 [ 37.333885] print_report+0x118/0x5e0 [ 37.334498] kasan_report+0xc8/0x118 [ 37.335035] kasan_check_range+0x100/0x1a8 [ 37.335680] __kasan_check_write+0x20/0x30 [ 37.336605] copy_user_test_oob+0x434/0xec0 [ 37.337277] kunit_try_run_case+0x14c/0x3d0 [ 37.337982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.338724] kthread+0x24c/0x2d0 [ 37.339300] ret_from_fork+0x10/0x20 [ 37.339881] [ 37.340234] Allocated by task 273: [ 37.340789] kasan_save_stack+0x3c/0x68 [ 37.341341] kasan_save_track+0x20/0x40 [ 37.341856] kasan_save_alloc_info+0x40/0x58 [ 37.342515] __kasan_kmalloc+0xd4/0xd8 [ 37.343078] __kmalloc_noprof+0x188/0x4c8 [ 37.343723] kunit_kmalloc_array+0x34/0x88 [ 37.344271] copy_user_test_oob+0xac/0xec0 [ 37.344924] kunit_try_run_case+0x14c/0x3d0 [ 37.345525] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.346264] kthread+0x24c/0x2d0 [ 37.346775] ret_from_fork+0x10/0x20 [ 37.347384] [ 37.347759] The buggy address belongs to the object at fff00000c6409200 [ 37.347759] which belongs to the cache kmalloc-128 of size 128 [ 37.348984] The buggy address is located 0 bytes inside of [ 37.348984] allocated 120-byte region [fff00000c6409200, fff00000c6409278) [ 37.350316] [ 37.350655] The buggy address belongs to the physical page: [ 37.351372] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106409 [ 37.352316] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.353034] page_type: f5(slab) [ 37.353615] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.354499] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 37.355354] page dumped because: kasan: bad access detected [ 37.356009] [ 37.356393] Memory state around the buggy address: [ 37.356920] fff00000c6409100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.357845] fff00000c6409180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.358594] >fff00000c6409200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.359453] ^ [ 37.360259] fff00000c6409280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.361075] fff00000c6409300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.361876] ================================================================== [ 37.208218] ================================================================== [ 37.208967] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0 [ 37.209878] Read of size 121 at addr fff00000c6409200 by task kunit_try_catch/273 [ 37.210865] [ 37.211274] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 37.212597] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.213394] Hardware name: linux,dummy-virt (DT) [ 37.214139] Call trace: [ 37.214710] show_stack+0x20/0x38 (C) [ 37.215299] dump_stack_lvl+0x8c/0xd0 [ 37.215815] print_report+0x118/0x5e0 [ 37.216323] kasan_report+0xc8/0x118 [ 37.217021] kasan_check_range+0x100/0x1a8 [ 37.217840] __kasan_check_read+0x20/0x30 [ 37.218584] copy_user_test_oob+0x728/0xec0 [ 37.219228] kunit_try_run_case+0x14c/0x3d0 [ 37.219871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.220616] kthread+0x24c/0x2d0 [ 37.221512] ret_from_fork+0x10/0x20 [ 37.222035] [ 37.222268] Allocated by task 273: [ 37.222831] kasan_save_stack+0x3c/0x68 [ 37.223428] kasan_save_track+0x20/0x40 [ 37.224000] kasan_save_alloc_info+0x40/0x58 [ 37.224609] __kasan_kmalloc+0xd4/0xd8 [ 37.225640] __kmalloc_noprof+0x188/0x4c8 [ 37.226351] kunit_kmalloc_array+0x34/0x88 [ 37.226942] copy_user_test_oob+0xac/0xec0 [ 37.227363] kunit_try_run_case+0x14c/0x3d0 [ 37.228032] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.228820] kthread+0x24c/0x2d0 [ 37.229322] ret_from_fork+0x10/0x20 [ 37.229869] [ 37.230241] The buggy address belongs to the object at fff00000c6409200 [ 37.230241] which belongs to the cache kmalloc-128 of size 128 [ 37.231514] The buggy address is located 0 bytes inside of [ 37.231514] allocated 120-byte region [fff00000c6409200, fff00000c6409278) [ 37.232762] [ 37.233209] The buggy address belongs to the physical page: [ 37.233964] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106409 [ 37.234860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.235665] page_type: f5(slab) [ 37.236211] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.237040] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 37.237882] page dumped because: kasan: bad access detected [ 37.238634] [ 37.238977] Memory state around the buggy address: [ 37.239611] fff00000c6409100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.240501] fff00000c6409180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.241164] >fff00000c6409200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.242098] ^ [ 37.242999] fff00000c6409280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.243769] fff00000c6409300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.244654] ================================================================== [ 37.290408] ================================================================== [ 37.291071] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0 [ 37.291969] Read of size 121 at addr fff00000c6409200 by task kunit_try_catch/273 [ 37.292845] [ 37.293293] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 37.294376] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.294942] Hardware name: linux,dummy-virt (DT) [ 37.295679] Call trace: [ 37.296052] show_stack+0x20/0x38 (C) [ 37.296721] dump_stack_lvl+0x8c/0xd0 [ 37.297404] print_report+0x118/0x5e0 [ 37.298102] kasan_report+0xc8/0x118 [ 37.298661] kasan_check_range+0x100/0x1a8 [ 37.299348] __kasan_check_read+0x20/0x30 [ 37.300037] copy_user_test_oob+0x3c8/0xec0 [ 37.300665] kunit_try_run_case+0x14c/0x3d0 [ 37.301362] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.302022] kthread+0x24c/0x2d0 [ 37.302655] ret_from_fork+0x10/0x20 [ 37.303316] [ 37.303691] Allocated by task 273: [ 37.304173] kasan_save_stack+0x3c/0x68 [ 37.304801] kasan_save_track+0x20/0x40 [ 37.305377] kasan_save_alloc_info+0x40/0x58 [ 37.306051] __kasan_kmalloc+0xd4/0xd8 [ 37.306600] __kmalloc_noprof+0x188/0x4c8 [ 37.307244] kunit_kmalloc_array+0x34/0x88 [ 37.307854] copy_user_test_oob+0xac/0xec0 [ 37.308452] kunit_try_run_case+0x14c/0x3d0 [ 37.309087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.309791] kthread+0x24c/0x2d0 [ 37.310332] ret_from_fork+0x10/0x20 [ 37.310892] [ 37.311287] The buggy address belongs to the object at fff00000c6409200 [ 37.311287] which belongs to the cache kmalloc-128 of size 128 [ 37.312442] The buggy address is located 0 bytes inside of [ 37.312442] allocated 120-byte region [fff00000c6409200, fff00000c6409278) [ 37.313631] [ 37.314008] The buggy address belongs to the physical page: [ 37.314717] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106409 [ 37.315571] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.316385] page_type: f5(slab) [ 37.316832] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.317769] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 37.318598] page dumped because: kasan: bad access detected [ 37.319210] [ 37.319588] Memory state around the buggy address: [ 37.320229] fff00000c6409100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.320957] fff00000c6409180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.321840] >fff00000c6409200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.322643] ^ [ 37.323448] fff00000c6409280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.324269] fff00000c6409300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.325071] ================================================================== [ 37.156251] ================================================================== [ 37.157829] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0 [ 37.159155] Write of size 121 at addr fff00000c6409200 by task kunit_try_catch/273 [ 37.159945] [ 37.160338] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 37.161405] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.161927] Hardware name: linux,dummy-virt (DT) [ 37.162580] Call trace: [ 37.162967] show_stack+0x20/0x38 (C) [ 37.163466] dump_stack_lvl+0x8c/0xd0 [ 37.164069] print_report+0x118/0x5e0 [ 37.164696] kasan_report+0xc8/0x118 [ 37.165352] kasan_check_range+0x100/0x1a8 [ 37.166005] __kasan_check_write+0x20/0x30 [ 37.166672] copy_user_test_oob+0x234/0xec0 [ 37.167812] kunit_try_run_case+0x14c/0x3d0 [ 37.168352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.169200] kthread+0x24c/0x2d0 [ 37.169662] ret_from_fork+0x10/0x20 [ 37.170156] [ 37.170434] Allocated by task 273: [ 37.170749] kasan_save_stack+0x3c/0x68 [ 37.171016] kasan_save_track+0x20/0x40 [ 37.171611] kasan_save_alloc_info+0x40/0x58 [ 37.172307] __kasan_kmalloc+0xd4/0xd8 [ 37.172881] __kmalloc_noprof+0x188/0x4c8 [ 37.174565] kunit_kmalloc_array+0x34/0x88 [ 37.175421] copy_user_test_oob+0xac/0xec0 [ 37.176050] kunit_try_run_case+0x14c/0x3d0 [ 37.176815] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.177866] kthread+0x24c/0x2d0 [ 37.178309] ret_from_fork+0x10/0x20 [ 37.178872] [ 37.179234] The buggy address belongs to the object at fff00000c6409200 [ 37.179234] which belongs to the cache kmalloc-128 of size 128 [ 37.180916] The buggy address is located 0 bytes inside of [ 37.180916] allocated 120-byte region [fff00000c6409200, fff00000c6409278) [ 37.182918] [ 37.183311] The buggy address belongs to the physical page: [ 37.183935] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106409 [ 37.184821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.185841] page_type: f5(slab) [ 37.186991] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.188035] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 37.188924] page dumped because: kasan: bad access detected [ 37.189930] [ 37.190531] Memory state around the buggy address: [ 37.191201] fff00000c6409100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.192190] fff00000c6409180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.193437] >fff00000c6409200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.195174] ^ [ 37.195922] fff00000c6409280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.196677] fff00000c6409300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.197838] ================================================================== [ 37.253650] ================================================================== [ 37.254357] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0 [ 37.255151] Write of size 121 at addr fff00000c6409200 by task kunit_try_catch/273 [ 37.255958] [ 37.256327] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 37.257540] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.258058] Hardware name: linux,dummy-virt (DT) [ 37.258725] Call trace: [ 37.259174] show_stack+0x20/0x38 (C) [ 37.259766] dump_stack_lvl+0x8c/0xd0 [ 37.260427] print_report+0x118/0x5e0 [ 37.261022] kasan_report+0xc8/0x118 [ 37.261692] kasan_check_range+0x100/0x1a8 [ 37.262265] __kasan_check_write+0x20/0x30 [ 37.262967] copy_user_test_oob+0x35c/0xec0 [ 37.263573] kunit_try_run_case+0x14c/0x3d0 [ 37.264254] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.265066] kthread+0x24c/0x2d0 [ 37.265737] ret_from_fork+0x10/0x20 [ 37.266347] [ 37.266708] Allocated by task 273: [ 37.267270] kasan_save_stack+0x3c/0x68 [ 37.267863] kasan_save_track+0x20/0x40 [ 37.268493] kasan_save_alloc_info+0x40/0x58 [ 37.269195] __kasan_kmalloc+0xd4/0xd8 [ 37.269793] __kmalloc_noprof+0x188/0x4c8 [ 37.270451] kunit_kmalloc_array+0x34/0x88 [ 37.270975] copy_user_test_oob+0xac/0xec0 [ 37.271633] kunit_try_run_case+0x14c/0x3d0 [ 37.272271] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.273012] kthread+0x24c/0x2d0 [ 37.273575] ret_from_fork+0x10/0x20 [ 37.274145] [ 37.274483] The buggy address belongs to the object at fff00000c6409200 [ 37.274483] which belongs to the cache kmalloc-128 of size 128 [ 37.275684] The buggy address is located 0 bytes inside of [ 37.275684] allocated 120-byte region [fff00000c6409200, fff00000c6409278) [ 37.276862] [ 37.277299] The buggy address belongs to the physical page: [ 37.278011] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106409 [ 37.278893] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.279808] page_type: f5(slab) [ 37.280302] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.281231] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 37.282054] page dumped because: kasan: bad access detected [ 37.282788] [ 37.283133] Memory state around the buggy address: [ 37.283819] fff00000c6409100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.284673] fff00000c6409180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.285518] >fff00000c6409200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.286312] ^ [ 37.287062] fff00000c6409280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.287921] fff00000c6409300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.288735] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 37.090424] ================================================================== [ 37.091225] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 37.091778] Write of size 8 at addr fff00000c641f378 by task kunit_try_catch/269 [ 37.092629] [ 37.093006] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 37.094221] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.094803] Hardware name: linux,dummy-virt (DT) [ 37.095336] Call trace: [ 37.095766] show_stack+0x20/0x38 (C) [ 37.097339] dump_stack_lvl+0x8c/0xd0 [ 37.098247] print_report+0x118/0x5e0 [ 37.098816] kasan_report+0xc8/0x118 [ 37.099448] kasan_check_range+0x100/0x1a8 [ 37.100046] __kasan_check_write+0x20/0x30 [ 37.100745] copy_to_kernel_nofault+0x8c/0x250 [ 37.101484] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 37.102246] kunit_try_run_case+0x14c/0x3d0 [ 37.102931] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.103650] kthread+0x24c/0x2d0 [ 37.104265] ret_from_fork+0x10/0x20 [ 37.104851] [ 37.105198] Allocated by task 269: [ 37.105833] kasan_save_stack+0x3c/0x68 [ 37.106480] kasan_save_track+0x20/0x40 [ 37.107069] kasan_save_alloc_info+0x40/0x58 [ 37.107727] __kasan_kmalloc+0xd4/0xd8 [ 37.108359] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.108971] copy_to_kernel_nofault_oob+0xc8/0x418 [ 37.109738] kunit_try_run_case+0x14c/0x3d0 [ 37.110374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.111086] kthread+0x24c/0x2d0 [ 37.111685] ret_from_fork+0x10/0x20 [ 37.112260] [ 37.112636] The buggy address belongs to the object at fff00000c641f300 [ 37.112636] which belongs to the cache kmalloc-128 of size 128 [ 37.114041] The buggy address is located 0 bytes to the right of [ 37.114041] allocated 120-byte region [fff00000c641f300, fff00000c641f378) [ 37.115270] [ 37.115667] The buggy address belongs to the physical page: [ 37.116372] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10641f [ 37.117206] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.118104] page_type: f5(slab) [ 37.118701] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.119635] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 37.120584] page dumped because: kasan: bad access detected [ 37.121275] [ 37.121733] Memory state around the buggy address: [ 37.122308] fff00000c641f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.123272] fff00000c641f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.124079] >fff00000c641f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.124893] ^ [ 37.125757] fff00000c641f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.126610] fff00000c641f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.127447] ================================================================== [ 37.050060] ================================================================== [ 37.051159] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 37.051791] Read of size 8 at addr fff00000c641f378 by task kunit_try_catch/269 [ 37.052725] [ 37.053928] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 37.055286] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.055935] Hardware name: linux,dummy-virt (DT) [ 37.056741] Call trace: [ 37.057454] show_stack+0x20/0x38 (C) [ 37.058103] dump_stack_lvl+0x8c/0xd0 [ 37.058655] print_report+0x118/0x5e0 [ 37.059329] kasan_report+0xc8/0x118 [ 37.059957] __asan_report_load8_noabort+0x20/0x30 [ 37.060573] copy_to_kernel_nofault+0x204/0x250 [ 37.061487] copy_to_kernel_nofault_oob+0x158/0x418 [ 37.062347] kunit_try_run_case+0x14c/0x3d0 [ 37.062958] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.063585] kthread+0x24c/0x2d0 [ 37.064169] ret_from_fork+0x10/0x20 [ 37.064761] [ 37.065068] Allocated by task 269: [ 37.065936] kasan_save_stack+0x3c/0x68 [ 37.066536] kasan_save_track+0x20/0x40 [ 37.067071] kasan_save_alloc_info+0x40/0x58 [ 37.067706] __kasan_kmalloc+0xd4/0xd8 [ 37.068301] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.068896] copy_to_kernel_nofault_oob+0xc8/0x418 [ 37.070059] kunit_try_run_case+0x14c/0x3d0 [ 37.070559] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.071226] kthread+0x24c/0x2d0 [ 37.071770] ret_from_fork+0x10/0x20 [ 37.072354] [ 37.072700] The buggy address belongs to the object at fff00000c641f300 [ 37.072700] which belongs to the cache kmalloc-128 of size 128 [ 37.073866] The buggy address is located 0 bytes to the right of [ 37.073866] allocated 120-byte region [fff00000c641f300, fff00000c641f378) [ 37.075009] [ 37.075385] The buggy address belongs to the physical page: [ 37.076476] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10641f [ 37.077601] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.078377] page_type: f5(slab) [ 37.078799] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.079675] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 37.080446] page dumped because: kasan: bad access detected [ 37.081103] [ 37.081622] Memory state around the buggy address: [ 37.082347] fff00000c641f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 37.083107] fff00000c641f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.083850] >fff00000c641f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.084708] ^ [ 37.085917] fff00000c641f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.086698] fff00000c641f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.087536] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 29.732218] ================================================================== [ 29.733743] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 29.734338] Read of size 1 at addr fff00000c6570000 by task kunit_try_catch/142 [ 29.735498] [ 29.735812] CPU: 0 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 29.736677] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.737491] Hardware name: linux,dummy-virt (DT) [ 29.738192] Call trace: [ 29.738646] show_stack+0x20/0x38 (C) [ 29.739321] dump_stack_lvl+0x8c/0xd0 [ 29.739937] print_report+0x118/0x5e0 [ 29.740597] kasan_report+0xc8/0x118 [ 29.741340] __asan_report_load1_noabort+0x20/0x30 [ 29.742045] page_alloc_uaf+0x328/0x350 [ 29.742714] kunit_try_run_case+0x14c/0x3d0 [ 29.743426] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.744185] kthread+0x24c/0x2d0 [ 29.744671] ret_from_fork+0x10/0x20 [ 29.745406] [ 29.745757] The buggy address belongs to the physical page: [ 29.746769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106570 [ 29.747565] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.748308] page_type: f0(buddy) [ 29.748783] raw: 0bfffe0000000000 fff00000ff6150e0 fff00000ff6150e0 0000000000000000 [ 29.750109] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000 [ 29.750889] page dumped because: kasan: bad access detected [ 29.751562] [ 29.751938] Memory state around the buggy address: [ 29.752524] fff00000c656ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.753446] fff00000c656ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.754624] >fff00000c6570000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.755394] ^ [ 29.755914] fff00000c6570080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.756676] fff00000c6570100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.757808] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 36.938827] ================================================================== [ 36.940407] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 36.941235] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/257 [ 36.942968] [ 36.943597] CPU: 1 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.944786] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.946072] Hardware name: linux,dummy-virt (DT) [ 36.946703] Call trace: [ 36.947193] show_stack+0x20/0x38 (C) [ 36.947778] dump_stack_lvl+0x8c/0xd0 [ 36.948424] print_report+0x2fc/0x5e0 [ 36.949062] kasan_report+0xc8/0x118 [ 36.949651] __asan_report_load1_noabort+0x20/0x30 [ 36.950306] vmalloc_oob+0x578/0x5d0 [ 36.950810] kunit_try_run_case+0x14c/0x3d0 [ 36.951364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.952001] kthread+0x24c/0x2d0 [ 36.952616] ret_from_fork+0x10/0x20 [ 36.953157] [ 36.953526] The buggy address belongs to the virtual mapping at [ 36.953526] [ffff80008010b000, ffff80008010d000) created by: [ 36.953526] vmalloc_oob+0x98/0x5d0 [ 36.955746] [ 36.956157] The buggy address belongs to the physical page: [ 36.956805] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063de [ 36.958196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.958994] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 36.959914] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 36.960783] page dumped because: kasan: bad access detected [ 36.961954] [ 36.962256] Memory state around the buggy address: [ 36.962909] ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.963973] ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.964756] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 36.965961] ^ [ 36.966784] ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 36.967699] ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 36.968539] ================================================================== [ 36.971134] ================================================================== [ 36.971874] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 36.972710] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/257 [ 36.973996] [ 36.974410] CPU: 1 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.975528] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.976148] Hardware name: linux,dummy-virt (DT) [ 36.976688] Call trace: [ 36.977466] show_stack+0x20/0x38 (C) [ 36.978021] dump_stack_lvl+0x8c/0xd0 [ 36.978548] print_report+0x2fc/0x5e0 [ 36.978991] kasan_report+0xc8/0x118 [ 36.979383] __asan_report_load1_noabort+0x20/0x30 [ 36.980200] vmalloc_oob+0x51c/0x5d0 [ 36.980913] kunit_try_run_case+0x14c/0x3d0 [ 36.981903] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.982521] kthread+0x24c/0x2d0 [ 36.983182] ret_from_fork+0x10/0x20 [ 36.983868] [ 36.984395] The buggy address belongs to the virtual mapping at [ 36.984395] [ffff80008010b000, ffff80008010d000) created by: [ 36.984395] vmalloc_oob+0x98/0x5d0 [ 36.986654] [ 36.987012] The buggy address belongs to the physical page: [ 36.987686] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063de [ 36.988618] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.989388] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 36.990301] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 36.991189] page dumped because: kasan: bad access detected [ 36.991919] [ 36.992195] Memory state around the buggy address: [ 36.992908] ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.994303] ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.995269] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 36.995867] ^ [ 36.996752] ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 36.998027] ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 36.998852] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 35.494805] ================================================================== [ 35.495509] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 35.496351] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.496912] [ 35.497834] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.499173] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.499878] Hardware name: linux,dummy-virt (DT) [ 35.500657] Call trace: [ 35.501254] show_stack+0x20/0x38 (C) [ 35.501964] dump_stack_lvl+0x8c/0xd0 [ 35.502696] print_report+0x118/0x5e0 [ 35.503232] kasan_report+0xc8/0x118 [ 35.503774] kasan_check_range+0x100/0x1a8 [ 35.504355] __kasan_check_write+0x20/0x30 [ 35.504997] kasan_atomics_helper+0xad4/0x4858 [ 35.505571] kasan_atomics+0x198/0x2e8 [ 35.506182] kunit_try_run_case+0x14c/0x3d0 [ 35.506769] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.507523] kthread+0x24c/0x2d0 [ 35.508048] ret_from_fork+0x10/0x20 [ 35.508638] [ 35.508997] Allocated by task 253: [ 35.509533] kasan_save_stack+0x3c/0x68 [ 35.510014] kasan_save_track+0x20/0x40 [ 35.510617] kasan_save_alloc_info+0x40/0x58 [ 35.511229] __kasan_kmalloc+0xd4/0xd8 [ 35.511824] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.512486] kasan_atomics+0xb8/0x2e8 [ 35.513019] kunit_try_run_case+0x14c/0x3d0 [ 35.513661] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.514342] kthread+0x24c/0x2d0 [ 35.514831] ret_from_fork+0x10/0x20 [ 35.515380] [ 35.515682] The buggy address belongs to the object at fff00000c63df000 [ 35.515682] which belongs to the cache kmalloc-64 of size 64 [ 35.516906] The buggy address is located 0 bytes to the right of [ 35.516906] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.518099] [ 35.518426] The buggy address belongs to the physical page: [ 35.519046] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.519998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.520715] page_type: f5(slab) [ 35.521224] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.522047] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.522865] page dumped because: kasan: bad access detected [ 35.523404] [ 35.523749] Memory state around the buggy address: [ 35.524428] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.525141] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.526031] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.526806] ^ [ 35.527432] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.528169] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.529031] ================================================================== [ 35.564570] ================================================================== [ 35.565316] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 35.566061] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.566892] [ 35.567247] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.568361] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.568904] Hardware name: linux,dummy-virt (DT) [ 35.569527] Call trace: [ 35.569924] show_stack+0x20/0x38 (C) [ 35.571679] dump_stack_lvl+0x8c/0xd0 [ 35.572148] print_report+0x118/0x5e0 [ 35.573010] kasan_report+0xc8/0x118 [ 35.573556] kasan_check_range+0x100/0x1a8 [ 35.574103] __kasan_check_write+0x20/0x30 [ 35.574757] kasan_atomics_helper+0xb70/0x4858 [ 35.575357] kasan_atomics+0x198/0x2e8 [ 35.575965] kunit_try_run_case+0x14c/0x3d0 [ 35.576607] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.577218] kthread+0x24c/0x2d0 [ 35.577814] ret_from_fork+0x10/0x20 [ 35.578429] [ 35.578773] Allocated by task 253: [ 35.579279] kasan_save_stack+0x3c/0x68 [ 35.579827] kasan_save_track+0x20/0x40 [ 35.580319] kasan_save_alloc_info+0x40/0x58 [ 35.580951] __kasan_kmalloc+0xd4/0xd8 [ 35.581484] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.582156] kasan_atomics+0xb8/0x2e8 [ 35.582723] kunit_try_run_case+0x14c/0x3d0 [ 35.583281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.583924] kthread+0x24c/0x2d0 [ 35.584475] ret_from_fork+0x10/0x20 [ 35.585038] [ 35.585878] The buggy address belongs to the object at fff00000c63df000 [ 35.585878] which belongs to the cache kmalloc-64 of size 64 [ 35.587002] The buggy address is located 0 bytes to the right of [ 35.587002] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.588259] [ 35.588624] The buggy address belongs to the physical page: [ 35.589280] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.590243] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.591026] page_type: f5(slab) [ 35.591577] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.592453] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.593236] page dumped because: kasan: bad access detected [ 35.593918] [ 35.594265] Memory state around the buggy address: [ 35.594921] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.595701] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.596555] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.597379] ^ [ 35.598051] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.598817] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.599510] ================================================================== [ 35.278513] ================================================================== [ 35.279825] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 35.280715] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.281725] [ 35.282073] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.283054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.283639] Hardware name: linux,dummy-virt (DT) [ 35.284203] Call trace: [ 35.284609] show_stack+0x20/0x38 (C) [ 35.285166] dump_stack_lvl+0x8c/0xd0 [ 35.285785] print_report+0x118/0x5e0 [ 35.286402] kasan_report+0xc8/0x118 [ 35.286980] kasan_check_range+0x100/0x1a8 [ 35.287627] __kasan_check_write+0x20/0x30 [ 35.288240] kasan_atomics_helper+0x894/0x4858 [ 35.288913] kasan_atomics+0x198/0x2e8 [ 35.289534] kunit_try_run_case+0x14c/0x3d0 [ 35.290348] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.291071] kthread+0x24c/0x2d0 [ 35.291555] ret_from_fork+0x10/0x20 [ 35.292054] [ 35.292461] Allocated by task 253: [ 35.292985] kasan_save_stack+0x3c/0x68 [ 35.293685] kasan_save_track+0x20/0x40 [ 35.294355] kasan_save_alloc_info+0x40/0x58 [ 35.295038] __kasan_kmalloc+0xd4/0xd8 [ 35.295699] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.296434] kasan_atomics+0xb8/0x2e8 [ 35.297020] kunit_try_run_case+0x14c/0x3d0 [ 35.297742] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.298506] kthread+0x24c/0x2d0 [ 35.299103] ret_from_fork+0x10/0x20 [ 35.299726] [ 35.300144] The buggy address belongs to the object at fff00000c63df000 [ 35.300144] which belongs to the cache kmalloc-64 of size 64 [ 35.301433] The buggy address is located 0 bytes to the right of [ 35.301433] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.302801] [ 35.303201] The buggy address belongs to the physical page: [ 35.303857] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.304853] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.305691] page_type: f5(slab) [ 35.306267] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.307213] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.308133] page dumped because: kasan: bad access detected [ 35.308844] [ 35.309233] Memory state around the buggy address: [ 35.309891] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.310798] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.311659] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.312390] ^ [ 35.312919] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.313663] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.314588] ================================================================== [ 35.846720] ================================================================== [ 35.847523] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 35.849212] Read of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.850389] [ 35.850966] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.852195] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.852661] Hardware name: linux,dummy-virt (DT) [ 35.853230] Call trace: [ 35.853617] show_stack+0x20/0x38 (C) [ 35.854205] dump_stack_lvl+0x8c/0xd0 [ 35.854753] print_report+0x118/0x5e0 [ 35.855327] kasan_report+0xc8/0x118 [ 35.855921] kasan_check_range+0x100/0x1a8 [ 35.856507] __kasan_check_read+0x20/0x30 [ 35.857100] kasan_atomics_helper+0xdd4/0x4858 [ 35.857731] kasan_atomics+0x198/0x2e8 [ 35.858346] kunit_try_run_case+0x14c/0x3d0 [ 35.858921] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.859684] kthread+0x24c/0x2d0 [ 35.860225] ret_from_fork+0x10/0x20 [ 35.860768] [ 35.861107] Allocated by task 253: [ 35.861594] kasan_save_stack+0x3c/0x68 [ 35.862187] kasan_save_track+0x20/0x40 [ 35.862734] kasan_save_alloc_info+0x40/0x58 [ 35.863345] __kasan_kmalloc+0xd4/0xd8 [ 35.863934] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.864609] kasan_atomics+0xb8/0x2e8 [ 35.865107] kunit_try_run_case+0x14c/0x3d0 [ 35.865678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.866425] kthread+0x24c/0x2d0 [ 35.866858] ret_from_fork+0x10/0x20 [ 35.867437] [ 35.867804] The buggy address belongs to the object at fff00000c63df000 [ 35.867804] which belongs to the cache kmalloc-64 of size 64 [ 35.868873] The buggy address is located 0 bytes to the right of [ 35.868873] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.870130] [ 35.870493] The buggy address belongs to the physical page: [ 35.871137] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.872025] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.872859] page_type: f5(slab) [ 35.873346] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.874212] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.875056] page dumped because: kasan: bad access detected [ 35.875660] [ 35.876009] Memory state around the buggy address: [ 35.876587] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.877373] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.878196] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.878946] ^ [ 35.879525] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.880340] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.881041] ================================================================== [ 36.666244] ================================================================== [ 36.667105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 36.667907] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.668846] [ 36.669293] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.670465] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.671075] Hardware name: linux,dummy-virt (DT) [ 36.671756] Call trace: [ 36.672263] show_stack+0x20/0x38 (C) [ 36.672939] dump_stack_lvl+0x8c/0xd0 [ 36.673528] print_report+0x118/0x5e0 [ 36.674214] kasan_report+0xc8/0x118 [ 36.674842] kasan_check_range+0x100/0x1a8 [ 36.675525] __kasan_check_write+0x20/0x30 [ 36.676209] kasan_atomics_helper+0x1644/0x4858 [ 36.676923] kasan_atomics+0x198/0x2e8 [ 36.677595] kunit_try_run_case+0x14c/0x3d0 [ 36.678299] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.679086] kthread+0x24c/0x2d0 [ 36.679698] ret_from_fork+0x10/0x20 [ 36.680360] [ 36.680747] Allocated by task 253: [ 36.681300] kasan_save_stack+0x3c/0x68 [ 36.681941] kasan_save_track+0x20/0x40 [ 36.682533] kasan_save_alloc_info+0x40/0x58 [ 36.683225] __kasan_kmalloc+0xd4/0xd8 [ 36.683832] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.684500] kasan_atomics+0xb8/0x2e8 [ 36.685090] kunit_try_run_case+0x14c/0x3d0 [ 36.685741] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.686482] kthread+0x24c/0x2d0 [ 36.687034] ret_from_fork+0x10/0x20 [ 36.687619] [ 36.688023] The buggy address belongs to the object at fff00000c63df000 [ 36.688023] which belongs to the cache kmalloc-64 of size 64 [ 36.689245] The buggy address is located 0 bytes to the right of [ 36.689245] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.690565] [ 36.690885] The buggy address belongs to the physical page: [ 36.691610] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.692569] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.693399] page_type: f5(slab) [ 36.693932] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.694878] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.695769] page dumped because: kasan: bad access detected [ 36.696479] [ 36.696865] Memory state around the buggy address: [ 36.697562] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.698479] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.699292] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.700152] ^ [ 36.700803] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.701664] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.702468] ================================================================== [ 36.590889] ================================================================== [ 36.591559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 36.592415] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.594392] [ 36.594782] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.596138] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.596886] Hardware name: linux,dummy-virt (DT) [ 36.597448] Call trace: [ 36.597815] show_stack+0x20/0x38 (C) [ 36.598647] dump_stack_lvl+0x8c/0xd0 [ 36.599247] print_report+0x118/0x5e0 [ 36.600035] kasan_report+0xc8/0x118 [ 36.600608] kasan_check_range+0x100/0x1a8 [ 36.601457] __kasan_check_write+0x20/0x30 [ 36.602222] kasan_atomics_helper+0x15b4/0x4858 [ 36.603003] kasan_atomics+0x198/0x2e8 [ 36.603588] kunit_try_run_case+0x14c/0x3d0 [ 36.604445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.605317] kthread+0x24c/0x2d0 [ 36.606028] ret_from_fork+0x10/0x20 [ 36.606629] [ 36.607195] Allocated by task 253: [ 36.607819] kasan_save_stack+0x3c/0x68 [ 36.608564] kasan_save_track+0x20/0x40 [ 36.609098] kasan_save_alloc_info+0x40/0x58 [ 36.609944] __kasan_kmalloc+0xd4/0xd8 [ 36.610661] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.611432] kasan_atomics+0xb8/0x2e8 [ 36.611984] kunit_try_run_case+0x14c/0x3d0 [ 36.612769] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.613463] kthread+0x24c/0x2d0 [ 36.613958] ret_from_fork+0x10/0x20 [ 36.614569] [ 36.614903] The buggy address belongs to the object at fff00000c63df000 [ 36.614903] which belongs to the cache kmalloc-64 of size 64 [ 36.616151] The buggy address is located 0 bytes to the right of [ 36.616151] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.617410] [ 36.617770] The buggy address belongs to the physical page: [ 36.618414] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.619309] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.620094] page_type: f5(slab) [ 36.620694] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.621571] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.622428] page dumped because: kasan: bad access detected [ 36.623078] [ 36.623461] Memory state around the buggy address: [ 36.624082] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.624856] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.625789] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.626700] ^ [ 36.627252] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.628152] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.628933] ================================================================== [ 35.459642] ================================================================== [ 35.460446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 35.461096] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.462108] [ 35.462664] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.463709] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.464320] Hardware name: linux,dummy-virt (DT) [ 35.464904] Call trace: [ 35.465858] show_stack+0x20/0x38 (C) [ 35.466429] dump_stack_lvl+0x8c/0xd0 [ 35.467017] print_report+0x118/0x5e0 [ 35.467595] kasan_report+0xc8/0x118 [ 35.468096] kasan_check_range+0x100/0x1a8 [ 35.468643] __kasan_check_write+0x20/0x30 [ 35.469280] kasan_atomics_helper+0xa6c/0x4858 [ 35.469889] kasan_atomics+0x198/0x2e8 [ 35.470385] kunit_try_run_case+0x14c/0x3d0 [ 35.471031] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.471796] kthread+0x24c/0x2d0 [ 35.472380] ret_from_fork+0x10/0x20 [ 35.472924] [ 35.473285] Allocated by task 253: [ 35.473809] kasan_save_stack+0x3c/0x68 [ 35.474393] kasan_save_track+0x20/0x40 [ 35.474920] kasan_save_alloc_info+0x40/0x58 [ 35.475504] __kasan_kmalloc+0xd4/0xd8 [ 35.476013] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.476557] kasan_atomics+0xb8/0x2e8 [ 35.477147] kunit_try_run_case+0x14c/0x3d0 [ 35.477764] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.478367] kthread+0x24c/0x2d0 [ 35.478915] ret_from_fork+0x10/0x20 [ 35.479493] [ 35.479842] The buggy address belongs to the object at fff00000c63df000 [ 35.479842] which belongs to the cache kmalloc-64 of size 64 [ 35.480922] The buggy address is located 0 bytes to the right of [ 35.480922] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.482165] [ 35.482514] The buggy address belongs to the physical page: [ 35.483204] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.484131] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.484942] page_type: f5(slab) [ 35.485449] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.486228] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.486980] page dumped because: kasan: bad access detected [ 35.487695] [ 35.488009] Memory state around the buggy address: [ 35.488681] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.489487] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.490225] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.490959] ^ [ 35.491542] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.492287] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.493024] ================================================================== [ 35.742170] ================================================================== [ 35.742946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 35.743731] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.745554] [ 35.745989] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.746986] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.747598] Hardware name: linux,dummy-virt (DT) [ 35.748128] Call trace: [ 35.748564] show_stack+0x20/0x38 (C) [ 35.749161] dump_stack_lvl+0x8c/0xd0 [ 35.749769] print_report+0x118/0x5e0 [ 35.750392] kasan_report+0xc8/0x118 [ 35.750899] __asan_report_load4_noabort+0x20/0x30 [ 35.751604] kasan_atomics_helper+0x3dd8/0x4858 [ 35.752288] kasan_atomics+0x198/0x2e8 [ 35.752822] kunit_try_run_case+0x14c/0x3d0 [ 35.753459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.754211] kthread+0x24c/0x2d0 [ 35.754776] ret_from_fork+0x10/0x20 [ 35.755341] [ 35.755694] Allocated by task 253: [ 35.756193] kasan_save_stack+0x3c/0x68 [ 35.756678] kasan_save_track+0x20/0x40 [ 35.757261] kasan_save_alloc_info+0x40/0x58 [ 35.757940] __kasan_kmalloc+0xd4/0xd8 [ 35.758532] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.759212] kasan_atomics+0xb8/0x2e8 [ 35.759739] kunit_try_run_case+0x14c/0x3d0 [ 35.760408] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.761162] kthread+0x24c/0x2d0 [ 35.761607] ret_from_fork+0x10/0x20 [ 35.762194] [ 35.762501] The buggy address belongs to the object at fff00000c63df000 [ 35.762501] which belongs to the cache kmalloc-64 of size 64 [ 35.763700] The buggy address is located 0 bytes to the right of [ 35.763700] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.764812] [ 35.765186] The buggy address belongs to the physical page: [ 35.765860] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.766688] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.767356] page_type: f5(slab) [ 35.767911] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.768820] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.769618] page dumped because: kasan: bad access detected [ 35.770332] [ 35.770637] Memory state around the buggy address: [ 35.771156] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.771998] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.772777] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.773414] ^ [ 35.774057] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.774845] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.775649] ================================================================== [ 36.704511] ================================================================== [ 36.705300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 36.706316] Read of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.706898] [ 36.708088] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.709293] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.709743] Hardware name: linux,dummy-virt (DT) [ 36.710362] Call trace: [ 36.710733] show_stack+0x20/0x38 (C) [ 36.711304] dump_stack_lvl+0x8c/0xd0 [ 36.711846] print_report+0x118/0x5e0 [ 36.712426] kasan_report+0xc8/0x118 [ 36.712898] __asan_report_load8_noabort+0x20/0x30 [ 36.713722] kasan_atomics_helper+0x3df4/0x4858 [ 36.714377] kasan_atomics+0x198/0x2e8 [ 36.714968] kunit_try_run_case+0x14c/0x3d0 [ 36.715549] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.716250] kthread+0x24c/0x2d0 [ 36.716820] ret_from_fork+0x10/0x20 [ 36.717356] [ 36.717711] Allocated by task 253: [ 36.718237] kasan_save_stack+0x3c/0x68 [ 36.718820] kasan_save_track+0x20/0x40 [ 36.719330] kasan_save_alloc_info+0x40/0x58 [ 36.719974] __kasan_kmalloc+0xd4/0xd8 [ 36.720526] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.721095] kasan_atomics+0xb8/0x2e8 [ 36.721625] kunit_try_run_case+0x14c/0x3d0 [ 36.722131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.722873] kthread+0x24c/0x2d0 [ 36.723384] ret_from_fork+0x10/0x20 [ 36.723861] [ 36.724216] The buggy address belongs to the object at fff00000c63df000 [ 36.724216] which belongs to the cache kmalloc-64 of size 64 [ 36.725272] The buggy address is located 0 bytes to the right of [ 36.725272] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.726627] [ 36.726978] The buggy address belongs to the physical page: [ 36.727588] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.728341] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.729171] page_type: f5(slab) [ 36.729706] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.730641] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.731423] page dumped because: kasan: bad access detected [ 36.732076] [ 36.732872] Memory state around the buggy address: [ 36.733506] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.734475] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.735415] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.736335] ^ [ 36.736913] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.737677] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.738410] ================================================================== [ 36.230826] ================================================================== [ 36.231693] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 36.232535] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.233358] [ 36.233720] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.234624] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.235219] Hardware name: linux,dummy-virt (DT) [ 36.235831] Call trace: [ 36.236250] show_stack+0x20/0x38 (C) [ 36.236847] dump_stack_lvl+0x8c/0xd0 [ 36.237413] print_report+0x118/0x5e0 [ 36.238054] kasan_report+0xc8/0x118 [ 36.238649] kasan_check_range+0x100/0x1a8 [ 36.239323] __kasan_check_write+0x20/0x30 [ 36.239986] kasan_atomics_helper+0x1190/0x4858 [ 36.240621] kasan_atomics+0x198/0x2e8 [ 36.241238] kunit_try_run_case+0x14c/0x3d0 [ 36.241806] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.242463] kthread+0x24c/0x2d0 [ 36.243031] ret_from_fork+0x10/0x20 [ 36.243591] [ 36.243938] Allocated by task 253: [ 36.244462] kasan_save_stack+0x3c/0x68 [ 36.244997] kasan_save_track+0x20/0x40 [ 36.245539] kasan_save_alloc_info+0x40/0x58 [ 36.246088] __kasan_kmalloc+0xd4/0xd8 [ 36.246662] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.247228] kasan_atomics+0xb8/0x2e8 [ 36.247830] kunit_try_run_case+0x14c/0x3d0 [ 36.248464] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.249223] kthread+0x24c/0x2d0 [ 36.249763] ret_from_fork+0x10/0x20 [ 36.250256] [ 36.250607] The buggy address belongs to the object at fff00000c63df000 [ 36.250607] which belongs to the cache kmalloc-64 of size 64 [ 36.251625] The buggy address is located 0 bytes to the right of [ 36.251625] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.252950] [ 36.253324] The buggy address belongs to the physical page: [ 36.253945] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.254790] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.255621] page_type: f5(slab) [ 36.256040] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.256937] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.257706] page dumped because: kasan: bad access detected [ 36.258427] [ 36.258745] Memory state around the buggy address: [ 36.259300] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.260088] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.260968] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.261628] ^ [ 36.262297] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.263078] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.263891] ================================================================== [ 35.530817] ================================================================== [ 35.531551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 35.533645] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.534415] [ 35.534776] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.535837] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.536440] Hardware name: linux,dummy-virt (DT) [ 35.536993] Call trace: [ 35.537217] show_stack+0x20/0x38 (C) [ 35.537493] dump_stack_lvl+0x8c/0xd0 [ 35.537761] print_report+0x118/0x5e0 [ 35.538013] kasan_report+0xc8/0x118 [ 35.538280] __asan_report_load4_noabort+0x20/0x30 [ 35.538577] kasan_atomics_helper+0x3dcc/0x4858 [ 35.538857] kasan_atomics+0x198/0x2e8 [ 35.539110] kunit_try_run_case+0x14c/0x3d0 [ 35.539402] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.539712] kthread+0x24c/0x2d0 [ 35.539952] ret_from_fork+0x10/0x20 [ 35.540326] [ 35.540628] Allocated by task 253: [ 35.541033] kasan_save_stack+0x3c/0x68 [ 35.541589] kasan_save_track+0x20/0x40 [ 35.542213] kasan_save_alloc_info+0x40/0x58 [ 35.542908] __kasan_kmalloc+0xd4/0xd8 [ 35.543547] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.544256] kasan_atomics+0xb8/0x2e8 [ 35.544854] kunit_try_run_case+0x14c/0x3d0 [ 35.545560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.546241] kthread+0x24c/0x2d0 [ 35.546691] ret_from_fork+0x10/0x20 [ 35.547156] [ 35.547504] The buggy address belongs to the object at fff00000c63df000 [ 35.547504] which belongs to the cache kmalloc-64 of size 64 [ 35.548917] The buggy address is located 0 bytes to the right of [ 35.548917] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.550355] [ 35.550719] The buggy address belongs to the physical page: [ 35.551750] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.552806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.553660] page_type: f5(slab) [ 35.554149] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.555004] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.555866] page dumped because: kasan: bad access detected [ 35.556658] [ 35.556970] Memory state around the buggy address: [ 35.557578] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.558323] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.559134] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.560021] ^ [ 35.560690] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.561595] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.562332] ================================================================== [ 36.160875] ================================================================== [ 36.161619] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 36.162513] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.163373] [ 36.163668] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.164600] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.165256] Hardware name: linux,dummy-virt (DT) [ 36.165746] Call trace: [ 36.166226] show_stack+0x20/0x38 (C) [ 36.166840] dump_stack_lvl+0x8c/0xd0 [ 36.167380] print_report+0x118/0x5e0 [ 36.168021] kasan_report+0xc8/0x118 [ 36.168633] kasan_check_range+0x100/0x1a8 [ 36.169277] __kasan_check_write+0x20/0x30 [ 36.169914] kasan_atomics_helper+0x10c0/0x4858 [ 36.170676] kasan_atomics+0x198/0x2e8 [ 36.171193] kunit_try_run_case+0x14c/0x3d0 [ 36.171855] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.172647] kthread+0x24c/0x2d0 [ 36.173226] ret_from_fork+0x10/0x20 [ 36.173785] [ 36.174082] Allocated by task 253: [ 36.174662] kasan_save_stack+0x3c/0x68 [ 36.175261] kasan_save_track+0x20/0x40 [ 36.175858] kasan_save_alloc_info+0x40/0x58 [ 36.176496] __kasan_kmalloc+0xd4/0xd8 [ 36.177084] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.177640] kasan_atomics+0xb8/0x2e8 [ 36.178220] kunit_try_run_case+0x14c/0x3d0 [ 36.178834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.179568] kthread+0x24c/0x2d0 [ 36.180030] ret_from_fork+0x10/0x20 [ 36.180618] [ 36.180965] The buggy address belongs to the object at fff00000c63df000 [ 36.180965] which belongs to the cache kmalloc-64 of size 64 [ 36.181957] The buggy address is located 0 bytes to the right of [ 36.181957] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.183337] [ 36.183692] The buggy address belongs to the physical page: [ 36.184288] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.185205] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.185892] page_type: f5(slab) [ 36.186441] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.187268] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.187963] page dumped because: kasan: bad access detected [ 36.188671] [ 36.189008] Memory state around the buggy address: [ 36.189648] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.190457] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.191168] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.192000] ^ [ 36.192671] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.193452] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.194141] ================================================================== [ 36.844717] ================================================================== [ 36.845502] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 36.846522] Read of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.847412] [ 36.847864] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.849095] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.849756] Hardware name: linux,dummy-virt (DT) [ 36.850432] Call trace: [ 36.850928] show_stack+0x20/0x38 (C) [ 36.851597] dump_stack_lvl+0x8c/0xd0 [ 36.852247] print_report+0x118/0x5e0 [ 36.852922] kasan_report+0xc8/0x118 [ 36.853569] __asan_report_load8_noabort+0x20/0x30 [ 36.854313] kasan_atomics_helper+0x3e20/0x4858 [ 36.855016] kasan_atomics+0x198/0x2e8 [ 36.855655] kunit_try_run_case+0x14c/0x3d0 [ 36.856363] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.857142] kthread+0x24c/0x2d0 [ 36.857784] ret_from_fork+0x10/0x20 [ 36.858432] [ 36.858792] Allocated by task 253: [ 36.859403] kasan_save_stack+0x3c/0x68 [ 36.860049] kasan_save_track+0x20/0x40 [ 36.860694] kasan_save_alloc_info+0x40/0x58 [ 36.861367] __kasan_kmalloc+0xd4/0xd8 [ 36.861974] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.862653] kasan_atomics+0xb8/0x2e8 [ 36.863266] kunit_try_run_case+0x14c/0x3d0 [ 36.863978] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.864735] kthread+0x24c/0x2d0 [ 36.865302] ret_from_fork+0x10/0x20 [ 36.865770] [ 36.866077] The buggy address belongs to the object at fff00000c63df000 [ 36.866077] which belongs to the cache kmalloc-64 of size 64 [ 36.867225] The buggy address is located 0 bytes to the right of [ 36.867225] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.868732] [ 36.869093] The buggy address belongs to the physical page: [ 36.869746] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.870759] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.871656] page_type: f5(slab) [ 36.872293] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.873239] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.874164] page dumped because: kasan: bad access detected [ 36.874866] [ 36.875272] Memory state around the buggy address: [ 36.875916] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.876822] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.877672] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.878564] ^ [ 36.879218] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.880171] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.881006] ================================================================== [ 34.808196] ================================================================== [ 34.808893] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 34.809646] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 34.810538] [ 34.810927] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.813366] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.813851] Hardware name: linux,dummy-virt (DT) [ 34.814478] Call trace: [ 34.814915] show_stack+0x20/0x38 (C) [ 34.815445] dump_stack_lvl+0x8c/0xd0 [ 34.816040] print_report+0x118/0x5e0 [ 34.816663] kasan_report+0xc8/0x118 [ 34.817523] __asan_report_store4_noabort+0x20/0x30 [ 34.818147] kasan_atomics_helper+0x3f94/0x4858 [ 34.818716] kasan_atomics+0x198/0x2e8 [ 34.819775] kunit_try_run_case+0x14c/0x3d0 [ 34.820140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.820603] kthread+0x24c/0x2d0 [ 34.821197] ret_from_fork+0x10/0x20 [ 34.822224] [ 34.822619] Allocated by task 253: [ 34.823129] kasan_save_stack+0x3c/0x68 [ 34.823798] kasan_save_track+0x20/0x40 [ 34.824419] kasan_save_alloc_info+0x40/0x58 [ 34.825348] __kasan_kmalloc+0xd4/0xd8 [ 34.826263] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.826842] kasan_atomics+0xb8/0x2e8 [ 34.827356] kunit_try_run_case+0x14c/0x3d0 [ 34.827980] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.828831] kthread+0x24c/0x2d0 [ 34.829610] ret_from_fork+0x10/0x20 [ 34.830193] [ 34.830535] The buggy address belongs to the object at fff00000c63df000 [ 34.830535] which belongs to the cache kmalloc-64 of size 64 [ 34.831669] The buggy address is located 0 bytes to the right of [ 34.831669] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 34.832846] [ 34.833983] The buggy address belongs to the physical page: [ 34.834758] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 34.835579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.836299] page_type: f5(slab) [ 34.836827] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.838144] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.839076] page dumped because: kasan: bad access detected [ 34.839766] [ 34.840087] Memory state around the buggy address: [ 34.840742] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.842631] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.843434] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.844199] ^ [ 34.844735] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.845939] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.846639] ================================================================== [ 35.811652] ================================================================== [ 35.812454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 35.813249] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.814012] [ 35.814409] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.815367] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.815930] Hardware name: linux,dummy-virt (DT) [ 35.816531] Call trace: [ 35.816895] show_stack+0x20/0x38 (C) [ 35.817524] dump_stack_lvl+0x8c/0xd0 [ 35.818158] print_report+0x118/0x5e0 [ 35.818691] kasan_report+0xc8/0x118 [ 35.819431] __asan_report_load4_noabort+0x20/0x30 [ 35.820070] kasan_atomics_helper+0x3e04/0x4858 [ 35.820846] kasan_atomics+0x198/0x2e8 [ 35.821542] kunit_try_run_case+0x14c/0x3d0 [ 35.822270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.823077] kthread+0x24c/0x2d0 [ 35.823629] ret_from_fork+0x10/0x20 [ 35.824201] [ 35.824568] Allocated by task 253: [ 35.825147] kasan_save_stack+0x3c/0x68 [ 35.825703] kasan_save_track+0x20/0x40 [ 35.826368] kasan_save_alloc_info+0x40/0x58 [ 35.826948] __kasan_kmalloc+0xd4/0xd8 [ 35.827618] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.828262] kasan_atomics+0xb8/0x2e8 [ 35.828813] kunit_try_run_case+0x14c/0x3d0 [ 35.829492] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.830243] kthread+0x24c/0x2d0 [ 35.830775] ret_from_fork+0x10/0x20 [ 35.831295] [ 35.831678] The buggy address belongs to the object at fff00000c63df000 [ 35.831678] which belongs to the cache kmalloc-64 of size 64 [ 35.832897] The buggy address is located 0 bytes to the right of [ 35.832897] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.834179] [ 35.834561] The buggy address belongs to the physical page: [ 35.835149] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.836107] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.836901] page_type: f5(slab) [ 35.837511] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.838407] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.839095] page dumped because: kasan: bad access detected [ 35.839720] [ 35.840079] Memory state around the buggy address: [ 35.840615] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.841404] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.842167] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.842859] ^ [ 35.843519] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.844257] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.844950] ================================================================== [ 34.648131] ================================================================== [ 34.649240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 34.650003] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 34.650690] [ 34.651077] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.652366] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.652874] Hardware name: linux,dummy-virt (DT) [ 34.654338] Call trace: [ 34.654805] show_stack+0x20/0x38 (C) [ 34.655449] dump_stack_lvl+0x8c/0xd0 [ 34.656095] print_report+0x118/0x5e0 [ 34.656730] kasan_report+0xc8/0x118 [ 34.657659] kasan_check_range+0x100/0x1a8 [ 34.658278] __kasan_check_write+0x20/0x30 [ 34.658829] kasan_atomics_helper+0x24c/0x4858 [ 34.659391] kasan_atomics+0x198/0x2e8 [ 34.660032] kunit_try_run_case+0x14c/0x3d0 [ 34.660618] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.661466] kthread+0x24c/0x2d0 [ 34.661955] ret_from_fork+0x10/0x20 [ 34.662721] [ 34.663058] Allocated by task 253: [ 34.664263] kasan_save_stack+0x3c/0x68 [ 34.664762] kasan_save_track+0x20/0x40 [ 34.665694] kasan_save_alloc_info+0x40/0x58 [ 34.666278] __kasan_kmalloc+0xd4/0xd8 [ 34.666897] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.667535] kasan_atomics+0xb8/0x2e8 [ 34.668152] kunit_try_run_case+0x14c/0x3d0 [ 34.668774] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.670242] kthread+0x24c/0x2d0 [ 34.670798] ret_from_fork+0x10/0x20 [ 34.671410] [ 34.671786] The buggy address belongs to the object at fff00000c63df000 [ 34.671786] which belongs to the cache kmalloc-64 of size 64 [ 34.673076] The buggy address is located 0 bytes to the right of [ 34.673076] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 34.674672] [ 34.675052] The buggy address belongs to the physical page: [ 34.675747] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 34.676638] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.678366] page_type: f5(slab) [ 34.678874] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.679741] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.680630] page dumped because: kasan: bad access detected [ 34.681644] [ 34.681992] Memory state around the buggy address: [ 34.682791] fff00000c63def00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.683549] fff00000c63def80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.684367] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.685162] ^ [ 34.686393] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.687182] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.688294] ================================================================== [ 34.972140] ================================================================== [ 34.973018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 34.973892] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 34.975039] [ 34.975438] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.976720] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.977552] Hardware name: linux,dummy-virt (DT) [ 34.978106] Call trace: [ 34.978481] show_stack+0x20/0x38 (C) [ 34.978988] dump_stack_lvl+0x8c/0xd0 [ 34.979607] print_report+0x118/0x5e0 [ 34.980203] kasan_report+0xc8/0x118 [ 34.980747] kasan_check_range+0x100/0x1a8 [ 34.982271] __kasan_check_write+0x20/0x30 [ 34.982923] kasan_atomics_helper+0x4e4/0x4858 [ 34.983633] kasan_atomics+0x198/0x2e8 [ 34.984231] kunit_try_run_case+0x14c/0x3d0 [ 34.984870] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.985645] kthread+0x24c/0x2d0 [ 34.986554] ret_from_fork+0x10/0x20 [ 34.987167] [ 34.987535] Allocated by task 253: [ 34.987982] kasan_save_stack+0x3c/0x68 [ 34.988640] kasan_save_track+0x20/0x40 [ 34.989405] kasan_save_alloc_info+0x40/0x58 [ 34.990622] __kasan_kmalloc+0xd4/0xd8 [ 34.991181] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.991854] kasan_atomics+0xb8/0x2e8 [ 34.992461] kunit_try_run_case+0x14c/0x3d0 [ 34.992991] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.993967] kthread+0x24c/0x2d0 [ 34.994537] ret_from_fork+0x10/0x20 [ 34.995132] [ 34.995536] The buggy address belongs to the object at fff00000c63df000 [ 34.995536] which belongs to the cache kmalloc-64 of size 64 [ 34.996850] The buggy address is located 0 bytes to the right of [ 34.996850] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 34.998998] [ 34.999366] The buggy address belongs to the physical page: [ 35.000014] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.000852] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.002077] page_type: f5(slab) [ 35.002701] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.003651] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.004479] page dumped because: kasan: bad access detected [ 35.005286] [ 35.005670] Memory state around the buggy address: [ 35.006580] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.007407] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.008488] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.009685] ^ [ 35.010280] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.011004] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.011931] ================================================================== [ 36.630357] ================================================================== [ 36.631238] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 36.632180] Read of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.632828] [ 36.633216] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.634307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.634825] Hardware name: linux,dummy-virt (DT) [ 36.635334] Call trace: [ 36.635685] show_stack+0x20/0x38 (C) [ 36.636345] dump_stack_lvl+0x8c/0xd0 [ 36.637002] print_report+0x118/0x5e0 [ 36.637600] kasan_report+0xc8/0x118 [ 36.638264] __asan_report_load8_noabort+0x20/0x30 [ 36.638990] kasan_atomics_helper+0x3db0/0x4858 [ 36.639707] kasan_atomics+0x198/0x2e8 [ 36.640367] kunit_try_run_case+0x14c/0x3d0 [ 36.640955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.641690] kthread+0x24c/0x2d0 [ 36.642307] ret_from_fork+0x10/0x20 [ 36.642845] [ 36.643237] Allocated by task 253: [ 36.643717] kasan_save_stack+0x3c/0x68 [ 36.644334] kasan_save_track+0x20/0x40 [ 36.644932] kasan_save_alloc_info+0x40/0x58 [ 36.645614] __kasan_kmalloc+0xd4/0xd8 [ 36.646206] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.646889] kasan_atomics+0xb8/0x2e8 [ 36.647464] kunit_try_run_case+0x14c/0x3d0 [ 36.648131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.648804] kthread+0x24c/0x2d0 [ 36.649398] ret_from_fork+0x10/0x20 [ 36.649915] [ 36.650314] The buggy address belongs to the object at fff00000c63df000 [ 36.650314] which belongs to the cache kmalloc-64 of size 64 [ 36.651631] The buggy address is located 0 bytes to the right of [ 36.651631] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.652938] [ 36.653312] The buggy address belongs to the physical page: [ 36.653937] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.654766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.655567] page_type: f5(slab) [ 36.655990] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.657032] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.657972] page dumped because: kasan: bad access detected [ 36.658702] [ 36.659128] Memory state around the buggy address: [ 36.659683] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.660611] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.661470] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.662267] ^ [ 36.662870] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.663624] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.664541] ================================================================== [ 36.334827] ================================================================== [ 36.335547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 36.336201] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.337130] [ 36.337550] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.338605] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.339185] Hardware name: linux,dummy-virt (DT) [ 36.339748] Call trace: [ 36.340184] show_stack+0x20/0x38 (C) [ 36.340803] dump_stack_lvl+0x8c/0xd0 [ 36.341337] print_report+0x118/0x5e0 [ 36.341937] kasan_report+0xc8/0x118 [ 36.342508] kasan_check_range+0x100/0x1a8 [ 36.343027] __kasan_check_write+0x20/0x30 [ 36.343684] kasan_atomics_helper+0x12d8/0x4858 [ 36.344373] kasan_atomics+0x198/0x2e8 [ 36.345025] kunit_try_run_case+0x14c/0x3d0 [ 36.345653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.346401] kthread+0x24c/0x2d0 [ 36.346996] ret_from_fork+0x10/0x20 [ 36.347561] [ 36.347914] Allocated by task 253: [ 36.348460] kasan_save_stack+0x3c/0x68 [ 36.349039] kasan_save_track+0x20/0x40 [ 36.349842] kasan_save_alloc_info+0x40/0x58 [ 36.350354] __kasan_kmalloc+0xd4/0xd8 [ 36.350929] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.351562] kasan_atomics+0xb8/0x2e8 [ 36.352084] kunit_try_run_case+0x14c/0x3d0 [ 36.352656] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.353277] kthread+0x24c/0x2d0 [ 36.353816] ret_from_fork+0x10/0x20 [ 36.354391] [ 36.354721] The buggy address belongs to the object at fff00000c63df000 [ 36.354721] which belongs to the cache kmalloc-64 of size 64 [ 36.355854] The buggy address is located 0 bytes to the right of [ 36.355854] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.357043] [ 36.357401] The buggy address belongs to the physical page: [ 36.358131] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.358910] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.359730] page_type: f5(slab) [ 36.360293] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.361045] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.361929] page dumped because: kasan: bad access detected [ 36.362539] [ 36.362879] Memory state around the buggy address: [ 36.363475] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.364300] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.364968] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.365815] ^ [ 36.366345] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.367142] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.367972] ================================================================== [ 34.889715] ================================================================== [ 34.890361] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 34.891059] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 34.892698] [ 34.893159] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.894684] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.895074] Hardware name: linux,dummy-virt (DT) [ 34.895708] Call trace: [ 34.896194] show_stack+0x20/0x38 (C) [ 34.896791] dump_stack_lvl+0x8c/0xd0 [ 34.897841] print_report+0x118/0x5e0 [ 34.898853] kasan_report+0xc8/0x118 [ 34.899176] kasan_check_range+0x100/0x1a8 [ 34.899785] __kasan_check_write+0x20/0x30 [ 34.900392] kasan_atomics_helper+0x414/0x4858 [ 34.901015] kasan_atomics+0x198/0x2e8 [ 34.901580] kunit_try_run_case+0x14c/0x3d0 [ 34.902156] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.902846] kthread+0x24c/0x2d0 [ 34.903463] ret_from_fork+0x10/0x20 [ 34.904350] [ 34.904699] Allocated by task 253: [ 34.905279] kasan_save_stack+0x3c/0x68 [ 34.905779] kasan_save_track+0x20/0x40 [ 34.906775] kasan_save_alloc_info+0x40/0x58 [ 34.907792] __kasan_kmalloc+0xd4/0xd8 [ 34.908520] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.909595] kasan_atomics+0xb8/0x2e8 [ 34.910309] kunit_try_run_case+0x14c/0x3d0 [ 34.910922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.911816] kthread+0x24c/0x2d0 [ 34.912510] ret_from_fork+0x10/0x20 [ 34.913422] [ 34.914197] The buggy address belongs to the object at fff00000c63df000 [ 34.914197] which belongs to the cache kmalloc-64 of size 64 [ 34.915358] The buggy address is located 0 bytes to the right of [ 34.915358] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 34.917554] [ 34.917964] The buggy address belongs to the physical page: [ 34.918636] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 34.919497] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.920177] page_type: f5(slab) [ 34.920686] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.921620] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.923323] page dumped because: kasan: bad access detected [ 34.923922] [ 34.924287] Memory state around the buggy address: [ 34.924864] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.926149] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.926881] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.927639] ^ [ 34.928227] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.929436] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.930103] ================================================================== [ 35.388679] ================================================================== [ 35.389928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 35.390722] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.391521] [ 35.391860] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.392941] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.393526] Hardware name: linux,dummy-virt (DT) [ 35.394045] Call trace: [ 35.394504] show_stack+0x20/0x38 (C) [ 35.395140] dump_stack_lvl+0x8c/0xd0 [ 35.395755] print_report+0x118/0x5e0 [ 35.396273] kasan_report+0xc8/0x118 [ 35.396885] kasan_check_range+0x100/0x1a8 [ 35.397568] __kasan_check_write+0x20/0x30 [ 35.398172] kasan_atomics_helper+0x99c/0x4858 [ 35.398755] kasan_atomics+0x198/0x2e8 [ 35.399384] kunit_try_run_case+0x14c/0x3d0 [ 35.399958] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.400729] kthread+0x24c/0x2d0 [ 35.401238] ret_from_fork+0x10/0x20 [ 35.401801] [ 35.402097] Allocated by task 253: [ 35.402633] kasan_save_stack+0x3c/0x68 [ 35.403229] kasan_save_track+0x20/0x40 [ 35.403797] kasan_save_alloc_info+0x40/0x58 [ 35.404456] __kasan_kmalloc+0xd4/0xd8 [ 35.404980] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.405585] kasan_atomics+0xb8/0x2e8 [ 35.406181] kunit_try_run_case+0x14c/0x3d0 [ 35.406798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.407414] kthread+0x24c/0x2d0 [ 35.407985] ret_from_fork+0x10/0x20 [ 35.408565] [ 35.408909] The buggy address belongs to the object at fff00000c63df000 [ 35.408909] which belongs to the cache kmalloc-64 of size 64 [ 35.410097] The buggy address is located 0 bytes to the right of [ 35.410097] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.411188] [ 35.411538] The buggy address belongs to the physical page: [ 35.412233] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.413156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.413798] page_type: f5(slab) [ 35.414348] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.415165] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.416054] page dumped because: kasan: bad access detected [ 35.416584] [ 35.416929] Memory state around the buggy address: [ 35.417610] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.418387] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.419160] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.419988] ^ [ 35.420549] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.421407] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.422150] ================================================================== [ 36.369566] ================================================================== [ 36.370381] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 36.371317] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.372070] [ 36.372470] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.373600] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.374063] Hardware name: linux,dummy-virt (DT) [ 36.374681] Call trace: [ 36.375013] show_stack+0x20/0x38 (C) [ 36.375612] dump_stack_lvl+0x8c/0xd0 [ 36.376254] print_report+0x118/0x5e0 [ 36.376875] kasan_report+0xc8/0x118 [ 36.377519] kasan_check_range+0x100/0x1a8 [ 36.378094] __kasan_check_write+0x20/0x30 [ 36.378734] kasan_atomics_helper+0x1384/0x4858 [ 36.379381] kasan_atomics+0x198/0x2e8 [ 36.379985] kunit_try_run_case+0x14c/0x3d0 [ 36.380741] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.381795] kthread+0x24c/0x2d0 [ 36.382971] ret_from_fork+0x10/0x20 [ 36.383753] [ 36.384189] Allocated by task 253: [ 36.384651] kasan_save_stack+0x3c/0x68 [ 36.384922] kasan_save_track+0x20/0x40 [ 36.385252] kasan_save_alloc_info+0x40/0x58 [ 36.386093] __kasan_kmalloc+0xd4/0xd8 [ 36.386786] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.387550] kasan_atomics+0xb8/0x2e8 [ 36.388102] kunit_try_run_case+0x14c/0x3d0 [ 36.388734] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.389469] kthread+0x24c/0x2d0 [ 36.390031] ret_from_fork+0x10/0x20 [ 36.390522] [ 36.390872] The buggy address belongs to the object at fff00000c63df000 [ 36.390872] which belongs to the cache kmalloc-64 of size 64 [ 36.392096] The buggy address is located 0 bytes to the right of [ 36.392096] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.393390] [ 36.393743] The buggy address belongs to the physical page: [ 36.394466] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.395428] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.396213] page_type: f5(slab) [ 36.396757] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.397614] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.398359] page dumped because: kasan: bad access detected [ 36.399081] [ 36.399434] Memory state around the buggy address: [ 36.400043] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.400897] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.401758] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.402591] ^ [ 36.403211] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.404044] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.404844] ================================================================== [ 35.777546] ================================================================== [ 35.778155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 35.779008] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.779860] [ 35.780239] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.781161] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.781746] Hardware name: linux,dummy-virt (DT) [ 35.782394] Call trace: [ 35.782823] show_stack+0x20/0x38 (C) [ 35.783361] dump_stack_lvl+0x8c/0xd0 [ 35.783969] print_report+0x118/0x5e0 [ 35.784570] kasan_report+0xc8/0x118 [ 35.785076] kasan_check_range+0x100/0x1a8 [ 35.785738] __kasan_check_write+0x20/0x30 [ 35.786335] kasan_atomics_helper+0xd3c/0x4858 [ 35.786920] kasan_atomics+0x198/0x2e8 [ 35.787515] kunit_try_run_case+0x14c/0x3d0 [ 35.788417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.789126] kthread+0x24c/0x2d0 [ 35.789642] ret_from_fork+0x10/0x20 [ 35.790249] [ 35.790568] Allocated by task 253: [ 35.790972] kasan_save_stack+0x3c/0x68 [ 35.791572] kasan_save_track+0x20/0x40 [ 35.792098] kasan_save_alloc_info+0x40/0x58 [ 35.792732] __kasan_kmalloc+0xd4/0xd8 [ 35.793335] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.793980] kasan_atomics+0xb8/0x2e8 [ 35.794506] kunit_try_run_case+0x14c/0x3d0 [ 35.795060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.795808] kthread+0x24c/0x2d0 [ 35.796336] ret_from_fork+0x10/0x20 [ 35.796777] [ 35.797145] The buggy address belongs to the object at fff00000c63df000 [ 35.797145] which belongs to the cache kmalloc-64 of size 64 [ 35.798261] The buggy address is located 0 bytes to the right of [ 35.798261] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.799480] [ 35.799828] The buggy address belongs to the physical page: [ 35.800542] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.801332] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.802068] page_type: f5(slab) [ 35.802609] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.803402] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.804230] page dumped because: kasan: bad access detected [ 35.804870] [ 35.805224] Memory state around the buggy address: [ 35.805795] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.806572] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.807325] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.808155] ^ [ 35.808799] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.809520] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.810316] ================================================================== [ 35.423778] ================================================================== [ 35.424586] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 35.426596] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.427403] [ 35.427929] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.428972] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.429497] Hardware name: linux,dummy-virt (DT) [ 35.430003] Call trace: [ 35.430451] show_stack+0x20/0x38 (C) [ 35.430962] dump_stack_lvl+0x8c/0xd0 [ 35.431588] print_report+0x118/0x5e0 [ 35.432127] kasan_report+0xc8/0x118 [ 35.432729] kasan_check_range+0x100/0x1a8 [ 35.433264] __kasan_check_write+0x20/0x30 [ 35.433871] kasan_atomics_helper+0xa04/0x4858 [ 35.434553] kasan_atomics+0x198/0x2e8 [ 35.435182] kunit_try_run_case+0x14c/0x3d0 [ 35.435789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.436410] kthread+0x24c/0x2d0 [ 35.436980] ret_from_fork+0x10/0x20 [ 35.437623] [ 35.437953] Allocated by task 253: [ 35.438396] kasan_save_stack+0x3c/0x68 [ 35.438983] kasan_save_track+0x20/0x40 [ 35.439567] kasan_save_alloc_info+0x40/0x58 [ 35.440215] __kasan_kmalloc+0xd4/0xd8 [ 35.440724] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.441357] kasan_atomics+0xb8/0x2e8 [ 35.441927] kunit_try_run_case+0x14c/0x3d0 [ 35.442470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.443166] kthread+0x24c/0x2d0 [ 35.443709] ret_from_fork+0x10/0x20 [ 35.444190] [ 35.444549] The buggy address belongs to the object at fff00000c63df000 [ 35.444549] which belongs to the cache kmalloc-64 of size 64 [ 35.445656] The buggy address is located 0 bytes to the right of [ 35.445656] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.446811] [ 35.447175] The buggy address belongs to the physical page: [ 35.447877] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.448724] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.449550] page_type: f5(slab) [ 35.450076] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.450920] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.451653] page dumped because: kasan: bad access detected [ 35.452334] [ 35.452681] Memory state around the buggy address: [ 35.453277] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.454053] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.454820] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.455470] ^ [ 35.456135] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.456884] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.457655] ================================================================== [ 36.808021] ================================================================== [ 36.808879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 36.809804] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.810710] [ 36.811110] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.812107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.812590] Hardware name: linux,dummy-virt (DT) [ 36.813219] Call trace: [ 36.813564] show_stack+0x20/0x38 (C) [ 36.814251] dump_stack_lvl+0x8c/0xd0 [ 36.814901] print_report+0x118/0x5e0 [ 36.815515] kasan_report+0xc8/0x118 [ 36.816132] kasan_check_range+0x100/0x1a8 [ 36.816743] __kasan_check_write+0x20/0x30 [ 36.817448] kasan_atomics_helper+0x175c/0x4858 [ 36.818097] kasan_atomics+0x198/0x2e8 [ 36.818625] kunit_try_run_case+0x14c/0x3d0 [ 36.819276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.820038] kthread+0x24c/0x2d0 [ 36.820584] ret_from_fork+0x10/0x20 [ 36.821098] [ 36.821466] Allocated by task 253: [ 36.821997] kasan_save_stack+0x3c/0x68 [ 36.822525] kasan_save_track+0x20/0x40 [ 36.823051] kasan_save_alloc_info+0x40/0x58 [ 36.823681] __kasan_kmalloc+0xd4/0xd8 [ 36.824289] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.824934] kasan_atomics+0xb8/0x2e8 [ 36.825342] kunit_try_run_case+0x14c/0x3d0 [ 36.826316] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.826896] kthread+0x24c/0x2d0 [ 36.827306] ret_from_fork+0x10/0x20 [ 36.827700] [ 36.827938] The buggy address belongs to the object at fff00000c63df000 [ 36.827938] which belongs to the cache kmalloc-64 of size 64 [ 36.829702] The buggy address is located 0 bytes to the right of [ 36.829702] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.831065] [ 36.831486] The buggy address belongs to the physical page: [ 36.832324] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.833349] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.834026] page_type: f5(slab) [ 36.834472] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.835307] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.836090] page dumped because: kasan: bad access detected [ 36.836879] [ 36.837241] Memory state around the buggy address: [ 36.837993] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.838811] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.839735] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.840609] ^ [ 36.841311] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.842237] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.843056] ================================================================== [ 35.052137] ================================================================== [ 35.053429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 35.054226] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.055126] [ 35.055581] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.056760] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.057419] Hardware name: linux,dummy-virt (DT) [ 35.058174] Call trace: [ 35.058636] show_stack+0x20/0x38 (C) [ 35.059319] dump_stack_lvl+0x8c/0xd0 [ 35.060007] print_report+0x118/0x5e0 [ 35.060688] kasan_report+0xc8/0x118 [ 35.061334] kasan_check_range+0x100/0x1a8 [ 35.062064] __kasan_check_write+0x20/0x30 [ 35.062765] kasan_atomics_helper+0x5b4/0x4858 [ 35.063526] kasan_atomics+0x198/0x2e8 [ 35.064188] kunit_try_run_case+0x14c/0x3d0 [ 35.064925] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.065732] kthread+0x24c/0x2d0 [ 35.066377] ret_from_fork+0x10/0x20 [ 35.067029] [ 35.067440] Allocated by task 253: [ 35.067965] kasan_save_stack+0x3c/0x68 [ 35.068642] kasan_save_track+0x20/0x40 [ 35.069275] kasan_save_alloc_info+0x40/0x58 [ 35.069925] __kasan_kmalloc+0xd4/0xd8 [ 35.070614] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.071298] kasan_atomics+0xb8/0x2e8 [ 35.071889] kunit_try_run_case+0x14c/0x3d0 [ 35.072652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.073344] kthread+0x24c/0x2d0 [ 35.073919] ret_from_fork+0x10/0x20 [ 35.074481] [ 35.074877] The buggy address belongs to the object at fff00000c63df000 [ 35.074877] which belongs to the cache kmalloc-64 of size 64 [ 35.076214] The buggy address is located 0 bytes to the right of [ 35.076214] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.077579] [ 35.077962] The buggy address belongs to the physical page: [ 35.078711] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.079663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.080501] page_type: f5(slab) [ 35.081060] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.082010] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.082886] page dumped because: kasan: bad access detected [ 35.083495] [ 35.083804] Memory state around the buggy address: [ 35.084387] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.085102] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.085992] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.086902] ^ [ 35.087602] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.088547] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.089381] ================================================================== [ 35.202211] ================================================================== [ 35.203275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 35.203637] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.203983] [ 35.204187] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.206096] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.206548] Hardware name: linux,dummy-virt (DT) [ 35.207181] Call trace: [ 35.207642] show_stack+0x20/0x38 (C) [ 35.208217] dump_stack_lvl+0x8c/0xd0 [ 35.208785] print_report+0x118/0x5e0 [ 35.209373] kasan_report+0xc8/0x118 [ 35.209960] kasan_check_range+0x100/0x1a8 [ 35.210547] __kasan_check_write+0x20/0x30 [ 35.211202] kasan_atomics_helper+0x760/0x4858 [ 35.211826] kasan_atomics+0x198/0x2e8 [ 35.212414] kunit_try_run_case+0x14c/0x3d0 [ 35.212995] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.213748] kthread+0x24c/0x2d0 [ 35.214334] ret_from_fork+0x10/0x20 [ 35.214897] [ 35.215221] Allocated by task 253: [ 35.215750] kasan_save_stack+0x3c/0x68 [ 35.216305] kasan_save_track+0x20/0x40 [ 35.216902] kasan_save_alloc_info+0x40/0x58 [ 35.217575] __kasan_kmalloc+0xd4/0xd8 [ 35.218159] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.218725] kasan_atomics+0xb8/0x2e8 [ 35.219284] kunit_try_run_case+0x14c/0x3d0 [ 35.219797] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.220499] kthread+0x24c/0x2d0 [ 35.221023] ret_from_fork+0x10/0x20 [ 35.221552] [ 35.221848] The buggy address belongs to the object at fff00000c63df000 [ 35.221848] which belongs to the cache kmalloc-64 of size 64 [ 35.223059] The buggy address is located 0 bytes to the right of [ 35.223059] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.224263] [ 35.224576] The buggy address belongs to the physical page: [ 35.225246] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.226072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.226802] page_type: f5(slab) [ 35.227360] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.228076] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.228976] page dumped because: kasan: bad access detected [ 35.229637] [ 35.229953] Memory state around the buggy address: [ 35.230571] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.231374] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.232154] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.232911] ^ [ 35.233495] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.234267] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.234957] ================================================================== [ 36.091335] ================================================================== [ 36.092145] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 36.093019] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.093765] [ 36.094165] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.095163] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.095659] Hardware name: linux,dummy-virt (DT) [ 36.096222] Call trace: [ 36.096653] show_stack+0x20/0x38 (C) [ 36.097257] dump_stack_lvl+0x8c/0xd0 [ 36.097894] print_report+0x118/0x5e0 [ 36.098462] kasan_report+0xc8/0x118 [ 36.098969] kasan_check_range+0x100/0x1a8 [ 36.099634] __kasan_check_write+0x20/0x30 [ 36.100352] kasan_atomics_helper+0xff0/0x4858 [ 36.100960] kasan_atomics+0x198/0x2e8 [ 36.101573] kunit_try_run_case+0x14c/0x3d0 [ 36.102231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.102912] kthread+0x24c/0x2d0 [ 36.103401] ret_from_fork+0x10/0x20 [ 36.104004] [ 36.104366] Allocated by task 253: [ 36.104827] kasan_save_stack+0x3c/0x68 [ 36.105431] kasan_save_track+0x20/0x40 [ 36.105923] kasan_save_alloc_info+0x40/0x58 [ 36.106575] __kasan_kmalloc+0xd4/0xd8 [ 36.107162] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.107798] kasan_atomics+0xb8/0x2e8 [ 36.108396] kunit_try_run_case+0x14c/0x3d0 [ 36.109000] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.109710] kthread+0x24c/0x2d0 [ 36.110276] ret_from_fork+0x10/0x20 [ 36.110825] [ 36.111183] The buggy address belongs to the object at fff00000c63df000 [ 36.111183] which belongs to the cache kmalloc-64 of size 64 [ 36.112252] The buggy address is located 0 bytes to the right of [ 36.112252] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.113506] [ 36.113814] The buggy address belongs to the physical page: [ 36.114511] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.115294] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.116083] page_type: f5(slab) [ 36.116571] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.117527] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.118301] page dumped because: kasan: bad access detected [ 36.118927] [ 36.119297] Memory state around the buggy address: [ 36.119795] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.120625] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.121497] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.122214] ^ [ 36.122847] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.123578] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.124364] ================================================================== [ 34.604891] ================================================================== [ 34.605628] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 34.607129] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 34.608736] [ 34.609199] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.610614] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.611169] Hardware name: linux,dummy-virt (DT) [ 34.611780] Call trace: [ 34.612222] show_stack+0x20/0x38 (C) [ 34.612864] dump_stack_lvl+0x8c/0xd0 [ 34.614193] print_report+0x118/0x5e0 [ 34.614789] kasan_report+0xc8/0x118 [ 34.615448] kasan_check_range+0x100/0x1a8 [ 34.616094] __kasan_check_read+0x20/0x30 [ 34.616745] kasan_atomics_helper+0x1ec/0x4858 [ 34.617746] kasan_atomics+0x198/0x2e8 [ 34.618369] kunit_try_run_case+0x14c/0x3d0 [ 34.619003] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.619807] kthread+0x24c/0x2d0 [ 34.620298] ret_from_fork+0x10/0x20 [ 34.620893] [ 34.621256] Allocated by task 253: [ 34.622647] kasan_save_stack+0x3c/0x68 [ 34.623374] kasan_save_track+0x20/0x40 [ 34.623929] kasan_save_alloc_info+0x40/0x58 [ 34.624487] __kasan_kmalloc+0xd4/0xd8 [ 34.625635] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.626180] kasan_atomics+0xb8/0x2e8 [ 34.626902] kunit_try_run_case+0x14c/0x3d0 [ 34.627652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.628517] kthread+0x24c/0x2d0 [ 34.629280] ret_from_fork+0x10/0x20 [ 34.630069] [ 34.630406] The buggy address belongs to the object at fff00000c63df000 [ 34.630406] which belongs to the cache kmalloc-64 of size 64 [ 34.632108] The buggy address is located 0 bytes to the right of [ 34.632108] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 34.633940] [ 34.634306] The buggy address belongs to the physical page: [ 34.634845] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 34.635725] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.636557] page_type: f5(slab) [ 34.637303] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.638311] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.639139] page dumped because: kasan: bad access detected [ 34.639766] [ 34.640162] Memory state around the buggy address: [ 34.640814] fff00000c63def00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.641496] fff00000c63def80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.642256] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.642937] ^ [ 34.643871] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.644659] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.645602] ================================================================== [ 35.601368] ================================================================== [ 35.602039] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 35.602802] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.603648] [ 35.604056] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.605062] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.605710] Hardware name: linux,dummy-virt (DT) [ 35.606246] Call trace: [ 35.606749] show_stack+0x20/0x38 (C) [ 35.607375] dump_stack_lvl+0x8c/0xd0 [ 35.608047] print_report+0x118/0x5e0 [ 35.608659] kasan_report+0xc8/0x118 [ 35.609303] __asan_report_load4_noabort+0x20/0x30 [ 35.609945] kasan_atomics_helper+0x3dbc/0x4858 [ 35.610638] kasan_atomics+0x198/0x2e8 [ 35.611261] kunit_try_run_case+0x14c/0x3d0 [ 35.611937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.612680] kthread+0x24c/0x2d0 [ 35.613257] ret_from_fork+0x10/0x20 [ 35.613845] [ 35.614198] Allocated by task 253: [ 35.614762] kasan_save_stack+0x3c/0x68 [ 35.615349] kasan_save_track+0x20/0x40 [ 35.615973] kasan_save_alloc_info+0x40/0x58 [ 35.616580] __kasan_kmalloc+0xd4/0xd8 [ 35.617214] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.617841] kasan_atomics+0xb8/0x2e8 [ 35.618444] kunit_try_run_case+0x14c/0x3d0 [ 35.619049] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.619792] kthread+0x24c/0x2d0 [ 35.620353] ret_from_fork+0x10/0x20 [ 35.620922] [ 35.621308] The buggy address belongs to the object at fff00000c63df000 [ 35.621308] which belongs to the cache kmalloc-64 of size 64 [ 35.622506] The buggy address is located 0 bytes to the right of [ 35.622506] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.623819] [ 35.624237] The buggy address belongs to the physical page: [ 35.625059] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.625988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.626780] page_type: f5(slab) [ 35.627276] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.628222] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.629067] page dumped because: kasan: bad access detected [ 35.629735] [ 35.630096] Memory state around the buggy address: [ 35.630795] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.631557] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.632423] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.633230] ^ [ 35.633834] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.634661] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.635433] ================================================================== [ 36.300339] ================================================================== [ 36.301229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 36.302172] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.303050] [ 36.303433] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.304471] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.305033] Hardware name: linux,dummy-virt (DT) [ 36.305673] Call trace: [ 36.306094] show_stack+0x20/0x38 (C) [ 36.306712] dump_stack_lvl+0x8c/0xd0 [ 36.307223] print_report+0x118/0x5e0 [ 36.307858] kasan_report+0xc8/0x118 [ 36.308417] kasan_check_range+0x100/0x1a8 [ 36.308963] __kasan_check_write+0x20/0x30 [ 36.309617] kasan_atomics_helper+0x126c/0x4858 [ 36.310220] kasan_atomics+0x198/0x2e8 [ 36.310814] kunit_try_run_case+0x14c/0x3d0 [ 36.311477] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.312101] kthread+0x24c/0x2d0 [ 36.312691] ret_from_fork+0x10/0x20 [ 36.313280] [ 36.313630] Allocated by task 253: [ 36.314134] kasan_save_stack+0x3c/0x68 [ 36.314719] kasan_save_track+0x20/0x40 [ 36.315261] kasan_save_alloc_info+0x40/0x58 [ 36.315901] __kasan_kmalloc+0xd4/0xd8 [ 36.316499] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.317048] kasan_atomics+0xb8/0x2e8 [ 36.317668] kunit_try_run_case+0x14c/0x3d0 [ 36.318246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.318864] kthread+0x24c/0x2d0 [ 36.319413] ret_from_fork+0x10/0x20 [ 36.319971] [ 36.320301] The buggy address belongs to the object at fff00000c63df000 [ 36.320301] which belongs to the cache kmalloc-64 of size 64 [ 36.321544] The buggy address is located 0 bytes to the right of [ 36.321544] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.322728] [ 36.323077] The buggy address belongs to the physical page: [ 36.323597] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.324541] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.325263] page_type: f5(slab) [ 36.325775] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.326624] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.327450] page dumped because: kasan: bad access detected [ 36.328082] [ 36.328434] Memory state around the buggy address: [ 36.328983] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.329755] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.330524] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.331285] ^ [ 36.331885] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.332692] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.333441] ================================================================== [ 34.566759] ================================================================== [ 34.567569] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 34.568214] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 34.569000] [ 34.569404] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.570449] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.571018] Hardware name: linux,dummy-virt (DT) [ 34.572646] Call trace: [ 34.573402] show_stack+0x20/0x38 (C) [ 34.573937] dump_stack_lvl+0x8c/0xd0 [ 34.574560] print_report+0x118/0x5e0 [ 34.575050] kasan_report+0xc8/0x118 [ 34.575654] __asan_report_store4_noabort+0x20/0x30 [ 34.576330] kasan_atomics_helper+0x3f7c/0x4858 [ 34.577020] kasan_atomics+0x198/0x2e8 [ 34.577611] kunit_try_run_case+0x14c/0x3d0 [ 34.578255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.578895] kthread+0x24c/0x2d0 [ 34.579694] ret_from_fork+0x10/0x20 [ 34.580285] [ 34.580580] Allocated by task 253: [ 34.581843] kasan_save_stack+0x3c/0x68 [ 34.582479] kasan_save_track+0x20/0x40 [ 34.583144] kasan_save_alloc_info+0x40/0x58 [ 34.583442] __kasan_kmalloc+0xd4/0xd8 [ 34.583691] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.583961] kasan_atomics+0xb8/0x2e8 [ 34.584425] kunit_try_run_case+0x14c/0x3d0 [ 34.585768] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.586731] kthread+0x24c/0x2d0 [ 34.587288] ret_from_fork+0x10/0x20 [ 34.587882] [ 34.588258] The buggy address belongs to the object at fff00000c63df000 [ 34.588258] which belongs to the cache kmalloc-64 of size 64 [ 34.589908] The buggy address is located 0 bytes to the right of [ 34.589908] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 34.591373] [ 34.591897] The buggy address belongs to the physical page: [ 34.592698] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 34.593518] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.594331] page_type: f5(slab) [ 34.594870] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.595618] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.596493] page dumped because: kasan: bad access detected [ 34.597298] [ 34.597719] Memory state around the buggy address: [ 34.598302] fff00000c63def00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.599241] fff00000c63def80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.599945] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.600850] ^ [ 34.601516] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.602540] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.603368] ================================================================== [ 36.479005] ================================================================== [ 36.479661] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 36.480561] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.482202] [ 36.482620] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.483727] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.484360] Hardware name: linux,dummy-virt (DT) [ 36.484911] Call trace: [ 36.485392] show_stack+0x20/0x38 (C) [ 36.486071] dump_stack_lvl+0x8c/0xd0 [ 36.486678] print_report+0x118/0x5e0 [ 36.487328] kasan_report+0xc8/0x118 [ 36.487941] kasan_check_range+0x100/0x1a8 [ 36.488637] __kasan_check_write+0x20/0x30 [ 36.489238] kasan_atomics_helper+0x147c/0x4858 [ 36.489928] kasan_atomics+0x198/0x2e8 [ 36.490527] kunit_try_run_case+0x14c/0x3d0 [ 36.491192] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.491910] kthread+0x24c/0x2d0 [ 36.492504] ret_from_fork+0x10/0x20 [ 36.493092] [ 36.493527] Allocated by task 253: [ 36.494014] kasan_save_stack+0x3c/0x68 [ 36.494654] kasan_save_track+0x20/0x40 [ 36.495226] kasan_save_alloc_info+0x40/0x58 [ 36.495893] __kasan_kmalloc+0xd4/0xd8 [ 36.496400] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.497041] kasan_atomics+0xb8/0x2e8 [ 36.497637] kunit_try_run_case+0x14c/0x3d0 [ 36.498279] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.498878] kthread+0x24c/0x2d0 [ 36.499471] ret_from_fork+0x10/0x20 [ 36.500032] [ 36.500439] The buggy address belongs to the object at fff00000c63df000 [ 36.500439] which belongs to the cache kmalloc-64 of size 64 [ 36.501678] The buggy address is located 0 bytes to the right of [ 36.501678] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.502953] [ 36.503324] The buggy address belongs to the physical page: [ 36.503973] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.504965] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.505758] page_type: f5(slab) [ 36.506291] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.507191] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.508019] page dumped because: kasan: bad access detected [ 36.508689] [ 36.509071] Memory state around the buggy address: [ 36.509704] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.510474] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.511314] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.512110] ^ [ 36.512720] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.513570] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.514367] ================================================================== [ 34.768825] ================================================================== [ 34.770575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 34.771425] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 34.772289] [ 34.772646] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.773784] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.774771] Hardware name: linux,dummy-virt (DT) [ 34.775320] Call trace: [ 34.775742] show_stack+0x20/0x38 (C) [ 34.776340] dump_stack_lvl+0x8c/0xd0 [ 34.776949] print_report+0x118/0x5e0 [ 34.777862] kasan_report+0xc8/0x118 [ 34.778257] kasan_check_range+0x100/0x1a8 [ 34.778905] __kasan_check_write+0x20/0x30 [ 34.780053] kasan_atomics_helper+0x32c/0x4858 [ 34.780737] kasan_atomics+0x198/0x2e8 [ 34.781619] kunit_try_run_case+0x14c/0x3d0 [ 34.782033] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.782814] kthread+0x24c/0x2d0 [ 34.783395] ret_from_fork+0x10/0x20 [ 34.783979] [ 34.784356] Allocated by task 253: [ 34.784887] kasan_save_stack+0x3c/0x68 [ 34.785531] kasan_save_track+0x20/0x40 [ 34.786351] kasan_save_alloc_info+0x40/0x58 [ 34.786975] __kasan_kmalloc+0xd4/0xd8 [ 34.787558] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.788078] kasan_atomics+0xb8/0x2e8 [ 34.789343] kunit_try_run_case+0x14c/0x3d0 [ 34.789859] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.790207] kthread+0x24c/0x2d0 [ 34.790444] ret_from_fork+0x10/0x20 [ 34.790681] [ 34.790834] The buggy address belongs to the object at fff00000c63df000 [ 34.790834] which belongs to the cache kmalloc-64 of size 64 [ 34.792834] The buggy address is located 0 bytes to the right of [ 34.792834] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 34.794017] [ 34.795092] The buggy address belongs to the physical page: [ 34.795720] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 34.796534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.797639] page_type: f5(slab) [ 34.798091] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.799018] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.799875] page dumped because: kasan: bad access detected [ 34.800465] [ 34.800801] Memory state around the buggy address: [ 34.802022] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.802941] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.803636] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.804428] ^ [ 34.805077] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.806270] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.807030] ================================================================== [ 34.931313] ================================================================== [ 34.932094] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 34.932773] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 34.933855] [ 34.934798] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.935946] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.936998] Hardware name: linux,dummy-virt (DT) [ 34.937544] Call trace: [ 34.937880] show_stack+0x20/0x38 (C) [ 34.939021] dump_stack_lvl+0x8c/0xd0 [ 34.939544] print_report+0x118/0x5e0 [ 34.939992] kasan_report+0xc8/0x118 [ 34.940452] kasan_check_range+0x100/0x1a8 [ 34.941529] __kasan_check_write+0x20/0x30 [ 34.942405] kasan_atomics_helper+0x47c/0x4858 [ 34.943109] kasan_atomics+0x198/0x2e8 [ 34.943633] kunit_try_run_case+0x14c/0x3d0 [ 34.944447] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.945678] kthread+0x24c/0x2d0 [ 34.946141] ret_from_fork+0x10/0x20 [ 34.946868] [ 34.947196] Allocated by task 253: [ 34.947680] kasan_save_stack+0x3c/0x68 [ 34.948171] kasan_save_track+0x20/0x40 [ 34.948763] kasan_save_alloc_info+0x40/0x58 [ 34.949418] __kasan_kmalloc+0xd4/0xd8 [ 34.949867] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.950986] kasan_atomics+0xb8/0x2e8 [ 34.951402] kunit_try_run_case+0x14c/0x3d0 [ 34.951685] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.951983] kthread+0x24c/0x2d0 [ 34.952229] ret_from_fork+0x10/0x20 [ 34.952481] [ 34.952636] The buggy address belongs to the object at fff00000c63df000 [ 34.952636] which belongs to the cache kmalloc-64 of size 64 [ 34.955023] The buggy address is located 0 bytes to the right of [ 34.955023] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 34.956471] [ 34.956983] The buggy address belongs to the physical page: [ 34.957795] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 34.959181] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.960023] page_type: f5(slab) [ 34.960604] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.961432] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.962169] page dumped because: kasan: bad access detected [ 34.963073] [ 34.963398] Memory state around the buggy address: [ 34.963960] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.965200] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.966199] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.967401] ^ [ 34.968203] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.969386] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.970657] ================================================================== [ 35.015245] ================================================================== [ 35.015946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 35.016801] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.017552] [ 35.017927] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.019093] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.019652] Hardware name: linux,dummy-virt (DT) [ 35.020255] Call trace: [ 35.020612] show_stack+0x20/0x38 (C) [ 35.021296] dump_stack_lvl+0x8c/0xd0 [ 35.021956] print_report+0x118/0x5e0 [ 35.022620] kasan_report+0xc8/0x118 [ 35.023281] kasan_check_range+0x100/0x1a8 [ 35.023877] __kasan_check_write+0x20/0x30 [ 35.024572] kasan_atomics_helper+0x54c/0x4858 [ 35.025241] kasan_atomics+0x198/0x2e8 [ 35.025866] kunit_try_run_case+0x14c/0x3d0 [ 35.026495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.027255] kthread+0x24c/0x2d0 [ 35.027898] ret_from_fork+0x10/0x20 [ 35.028499] [ 35.028880] Allocated by task 253: [ 35.029385] kasan_save_stack+0x3c/0x68 [ 35.029985] kasan_save_track+0x20/0x40 [ 35.030653] kasan_save_alloc_info+0x40/0x58 [ 35.031338] __kasan_kmalloc+0xd4/0xd8 [ 35.031935] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.032644] kasan_atomics+0xb8/0x2e8 [ 35.033214] kunit_try_run_case+0x14c/0x3d0 [ 35.033808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.034584] kthread+0x24c/0x2d0 [ 35.035073] ret_from_fork+0x10/0x20 [ 35.035690] [ 35.036068] The buggy address belongs to the object at fff00000c63df000 [ 35.036068] which belongs to the cache kmalloc-64 of size 64 [ 35.037281] The buggy address is located 0 bytes to the right of [ 35.037281] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.038623] [ 35.039017] The buggy address belongs to the physical page: [ 35.039686] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.040530] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.041394] page_type: f5(slab) [ 35.041895] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.042834] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.043508] page dumped because: kasan: bad access detected [ 35.044375] [ 35.044878] Memory state around the buggy address: [ 35.045618] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.046357] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.047085] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.047922] ^ [ 35.048660] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.049540] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.050473] ================================================================== [ 35.951240] ================================================================== [ 35.952021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 35.952827] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.953973] [ 35.954322] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.956104] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.957062] Hardware name: linux,dummy-virt (DT) [ 35.957747] Call trace: [ 35.958158] show_stack+0x20/0x38 (C) [ 35.958767] dump_stack_lvl+0x8c/0xd0 [ 35.959373] print_report+0x118/0x5e0 [ 35.959925] kasan_report+0xc8/0x118 [ 35.960422] __asan_report_store8_noabort+0x20/0x30 [ 35.961106] kasan_atomics_helper+0x3e5c/0x4858 [ 35.961782] kasan_atomics+0x198/0x2e8 [ 35.962345] kunit_try_run_case+0x14c/0x3d0 [ 35.962893] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.963568] kthread+0x24c/0x2d0 [ 35.964145] ret_from_fork+0x10/0x20 [ 35.964732] [ 35.965086] Allocated by task 253: [ 35.965622] kasan_save_stack+0x3c/0x68 [ 35.966163] kasan_save_track+0x20/0x40 [ 35.966765] kasan_save_alloc_info+0x40/0x58 [ 35.967420] __kasan_kmalloc+0xd4/0xd8 [ 35.967973] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.968625] kasan_atomics+0xb8/0x2e8 [ 35.969104] kunit_try_run_case+0x14c/0x3d0 [ 35.969752] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.970438] kthread+0x24c/0x2d0 [ 35.970889] ret_from_fork+0x10/0x20 [ 35.971475] [ 35.971824] The buggy address belongs to the object at fff00000c63df000 [ 35.971824] which belongs to the cache kmalloc-64 of size 64 [ 35.972908] The buggy address is located 0 bytes to the right of [ 35.972908] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.974153] [ 35.974520] The buggy address belongs to the physical page: [ 35.975080] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.976168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.976872] page_type: f5(slab) [ 35.977363] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.978208] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.979025] page dumped because: kasan: bad access detected [ 35.979639] [ 35.979982] Memory state around the buggy address: [ 35.980542] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.981385] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.982100] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.982883] ^ [ 35.983542] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.984284] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.985089] ================================================================== [ 36.516532] ================================================================== [ 36.517183] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 36.518048] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.518903] [ 36.519275] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.520436] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.520921] Hardware name: linux,dummy-virt (DT) [ 36.521558] Call trace: [ 36.522029] show_stack+0x20/0x38 (C) [ 36.522609] dump_stack_lvl+0x8c/0xd0 [ 36.523292] print_report+0x118/0x5e0 [ 36.523874] kasan_report+0xc8/0x118 [ 36.524505] kasan_check_range+0x100/0x1a8 [ 36.525072] __kasan_check_write+0x20/0x30 [ 36.525773] kasan_atomics_helper+0x14e4/0x4858 [ 36.526471] kasan_atomics+0x198/0x2e8 [ 36.527140] kunit_try_run_case+0x14c/0x3d0 [ 36.527809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.528625] kthread+0x24c/0x2d0 [ 36.529188] ret_from_fork+0x10/0x20 [ 36.529829] [ 36.530130] Allocated by task 253: [ 36.530595] kasan_save_stack+0x3c/0x68 [ 36.531199] kasan_save_track+0x20/0x40 [ 36.531737] kasan_save_alloc_info+0x40/0x58 [ 36.532252] __kasan_kmalloc+0xd4/0xd8 [ 36.532836] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.533468] kasan_atomics+0xb8/0x2e8 [ 36.534038] kunit_try_run_case+0x14c/0x3d0 [ 36.534612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.535355] kthread+0x24c/0x2d0 [ 36.535895] ret_from_fork+0x10/0x20 [ 36.536455] [ 36.536802] The buggy address belongs to the object at fff00000c63df000 [ 36.536802] which belongs to the cache kmalloc-64 of size 64 [ 36.537952] The buggy address is located 0 bytes to the right of [ 36.537952] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.539037] [ 36.539408] The buggy address belongs to the physical page: [ 36.540092] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.540905] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.541682] page_type: f5(slab) [ 36.542155] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.542997] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.544097] page dumped because: kasan: bad access detected [ 36.544735] [ 36.545041] Memory state around the buggy address: [ 36.546008] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.546795] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.547568] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.548342] ^ [ 36.548918] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.549672] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.550490] ================================================================== [ 35.986621] ================================================================== [ 35.987409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 35.988045] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.988959] [ 35.989353] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.990314] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.990791] Hardware name: linux,dummy-virt (DT) [ 35.991425] Call trace: [ 35.991773] show_stack+0x20/0x38 (C) [ 35.992398] dump_stack_lvl+0x8c/0xd0 [ 35.993006] print_report+0x118/0x5e0 [ 35.993710] kasan_report+0xc8/0x118 [ 35.994315] kasan_check_range+0x100/0x1a8 [ 35.994837] __kasan_check_write+0x20/0x30 [ 35.995489] kasan_atomics_helper+0xeb8/0x4858 [ 35.996134] kasan_atomics+0x198/0x2e8 [ 35.996718] kunit_try_run_case+0x14c/0x3d0 [ 35.997258] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.998039] kthread+0x24c/0x2d0 [ 35.998559] ret_from_fork+0x10/0x20 [ 35.999186] [ 35.999544] Allocated by task 253: [ 36.000063] kasan_save_stack+0x3c/0x68 [ 36.000648] kasan_save_track+0x20/0x40 [ 36.001226] kasan_save_alloc_info+0x40/0x58 [ 36.001851] __kasan_kmalloc+0xd4/0xd8 [ 36.002395] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.003027] kasan_atomics+0xb8/0x2e8 [ 36.003548] kunit_try_run_case+0x14c/0x3d0 [ 36.004191] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.004938] kthread+0x24c/0x2d0 [ 36.005489] ret_from_fork+0x10/0x20 [ 36.006044] [ 36.006655] The buggy address belongs to the object at fff00000c63df000 [ 36.006655] which belongs to the cache kmalloc-64 of size 64 [ 36.007839] The buggy address is located 0 bytes to the right of [ 36.007839] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.009019] [ 36.009389] The buggy address belongs to the physical page: [ 36.009947] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.010836] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.011536] page_type: f5(slab) [ 36.012018] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.012886] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.013682] page dumped because: kasan: bad access detected [ 36.014206] [ 36.014559] Memory state around the buggy address: [ 36.015207] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.015969] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.016853] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.017561] ^ [ 36.018213] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.018926] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.019746] ================================================================== [ 36.774151] ================================================================== [ 36.774979] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 36.775686] Read of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.776449] [ 36.776813] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.777936] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.778420] Hardware name: linux,dummy-virt (DT) [ 36.779035] Call trace: [ 36.779488] show_stack+0x20/0x38 (C) [ 36.780047] dump_stack_lvl+0x8c/0xd0 [ 36.780664] print_report+0x118/0x5e0 [ 36.781273] kasan_report+0xc8/0x118 [ 36.781860] __asan_report_load8_noabort+0x20/0x30 [ 36.782501] kasan_atomics_helper+0x3e10/0x4858 [ 36.783156] kasan_atomics+0x198/0x2e8 [ 36.783719] kunit_try_run_case+0x14c/0x3d0 [ 36.784389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.785150] kthread+0x24c/0x2d0 [ 36.785639] ret_from_fork+0x10/0x20 [ 36.786251] [ 36.786561] Allocated by task 253: [ 36.787014] kasan_save_stack+0x3c/0x68 [ 36.787599] kasan_save_track+0x20/0x40 [ 36.788142] kasan_save_alloc_info+0x40/0x58 [ 36.788666] __kasan_kmalloc+0xd4/0xd8 [ 36.789267] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.789927] kasan_atomics+0xb8/0x2e8 [ 36.790483] kunit_try_run_case+0x14c/0x3d0 [ 36.791125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.791729] kthread+0x24c/0x2d0 [ 36.792308] ret_from_fork+0x10/0x20 [ 36.792794] [ 36.793162] The buggy address belongs to the object at fff00000c63df000 [ 36.793162] which belongs to the cache kmalloc-64 of size 64 [ 36.794287] The buggy address is located 0 bytes to the right of [ 36.794287] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.795551] [ 36.795897] The buggy address belongs to the physical page: [ 36.796509] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.797441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.798058] page_type: f5(slab) [ 36.798612] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.799513] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.800250] page dumped because: kasan: bad access detected [ 36.800957] [ 36.801316] Memory state around the buggy address: [ 36.801806] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.802665] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.803405] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.804182] ^ [ 36.804758] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.805536] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.806290] ================================================================== [ 34.526854] ================================================================== [ 34.527999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 34.528714] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 34.530509] [ 34.531205] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.532422] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.534174] Hardware name: linux,dummy-virt (DT) [ 34.534996] Call trace: [ 34.535533] show_stack+0x20/0x38 (C) [ 34.536180] dump_stack_lvl+0x8c/0xd0 [ 34.536736] print_report+0x118/0x5e0 [ 34.537314] kasan_report+0xc8/0x118 [ 34.537986] __asan_report_load4_noabort+0x20/0x30 [ 34.538526] kasan_atomics_helper+0x40a8/0x4858 [ 34.539052] kasan_atomics+0x198/0x2e8 [ 34.539782] kunit_try_run_case+0x14c/0x3d0 [ 34.540533] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.541336] kthread+0x24c/0x2d0 [ 34.541934] ret_from_fork+0x10/0x20 [ 34.542607] [ 34.542960] Allocated by task 253: [ 34.543459] kasan_save_stack+0x3c/0x68 [ 34.544123] kasan_save_track+0x20/0x40 [ 34.544663] kasan_save_alloc_info+0x40/0x58 [ 34.545330] __kasan_kmalloc+0xd4/0xd8 [ 34.545862] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.546522] kasan_atomics+0xb8/0x2e8 [ 34.547096] kunit_try_run_case+0x14c/0x3d0 [ 34.547899] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.548685] kthread+0x24c/0x2d0 [ 34.549321] ret_from_fork+0x10/0x20 [ 34.549925] [ 34.550598] The buggy address belongs to the object at fff00000c63df000 [ 34.550598] which belongs to the cache kmalloc-64 of size 64 [ 34.551797] The buggy address is located 0 bytes to the right of [ 34.551797] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 34.553055] [ 34.553480] The buggy address belongs to the physical page: [ 34.554367] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 34.555110] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.555944] page_type: f5(slab) [ 34.556527] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.557398] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.558272] page dumped because: kasan: bad access detected [ 34.558927] [ 34.559334] Memory state around the buggy address: [ 34.559858] fff00000c63def00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.560721] fff00000c63def80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.561779] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.562931] ^ [ 34.563432] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.564168] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.564994] ================================================================== [ 35.882552] ================================================================== [ 35.883341] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 35.884063] Read of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.884964] [ 35.885359] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.886403] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.886979] Hardware name: linux,dummy-virt (DT) [ 35.887590] Call trace: [ 35.888020] show_stack+0x20/0x38 (C) [ 35.888613] dump_stack_lvl+0x8c/0xd0 [ 35.889130] print_report+0x118/0x5e0 [ 35.889726] kasan_report+0xc8/0x118 [ 35.890268] __asan_report_load8_noabort+0x20/0x30 [ 35.890969] kasan_atomics_helper+0x3f58/0x4858 [ 35.891578] kasan_atomics+0x198/0x2e8 [ 35.892064] kunit_try_run_case+0x14c/0x3d0 [ 35.892717] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.893479] kthread+0x24c/0x2d0 [ 35.894054] ret_from_fork+0x10/0x20 [ 35.894664] [ 35.895003] Allocated by task 253: [ 35.895532] kasan_save_stack+0x3c/0x68 [ 35.896008] kasan_save_track+0x20/0x40 [ 35.896617] kasan_save_alloc_info+0x40/0x58 [ 35.897242] __kasan_kmalloc+0xd4/0xd8 [ 35.897863] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.898529] kasan_atomics+0xb8/0x2e8 [ 35.899126] kunit_try_run_case+0x14c/0x3d0 [ 35.899617] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.900380] kthread+0x24c/0x2d0 [ 35.900928] ret_from_fork+0x10/0x20 [ 35.901511] [ 35.901852] The buggy address belongs to the object at fff00000c63df000 [ 35.901852] which belongs to the cache kmalloc-64 of size 64 [ 35.903007] The buggy address is located 0 bytes to the right of [ 35.903007] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.904177] [ 35.904541] The buggy address belongs to the physical page: [ 35.905179] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.906137] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.906852] page_type: f5(slab) [ 35.907398] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.908189] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.909066] page dumped because: kasan: bad access detected [ 35.909666] [ 35.910022] Memory state around the buggy address: [ 35.910568] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.911403] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.912169] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.912891] ^ [ 35.913558] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.914292] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.915098] ================================================================== [ 35.638436] ================================================================== [ 35.639032] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 35.639693] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.640571] [ 35.640949] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.641840] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.642440] Hardware name: linux,dummy-virt (DT) [ 35.643062] Call trace: [ 35.643511] show_stack+0x20/0x38 (C) [ 35.644067] dump_stack_lvl+0x8c/0xd0 [ 35.644612] print_report+0x118/0x5e0 [ 35.645229] kasan_report+0xc8/0x118 [ 35.645816] kasan_check_range+0x100/0x1a8 [ 35.646428] __kasan_check_write+0x20/0x30 [ 35.647072] kasan_atomics_helper+0xc08/0x4858 [ 35.647778] kasan_atomics+0x198/0x2e8 [ 35.648361] kunit_try_run_case+0x14c/0x3d0 [ 35.648938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.649709] kthread+0x24c/0x2d0 [ 35.650288] ret_from_fork+0x10/0x20 [ 35.650889] [ 35.651211] Allocated by task 253: [ 35.651720] kasan_save_stack+0x3c/0x68 [ 35.652316] kasan_save_track+0x20/0x40 [ 35.653067] kasan_save_alloc_info+0x40/0x58 [ 35.653715] __kasan_kmalloc+0xd4/0xd8 [ 35.654253] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.654767] kasan_atomics+0xb8/0x2e8 [ 35.655367] kunit_try_run_case+0x14c/0x3d0 [ 35.655883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.656638] kthread+0x24c/0x2d0 [ 35.657183] ret_from_fork+0x10/0x20 [ 35.657756] [ 35.658071] The buggy address belongs to the object at fff00000c63df000 [ 35.658071] which belongs to the cache kmalloc-64 of size 64 [ 35.659191] The buggy address is located 0 bytes to the right of [ 35.659191] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.660362] [ 35.660721] The buggy address belongs to the physical page: [ 35.661297] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.662207] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.662973] page_type: f5(slab) [ 35.663470] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.664564] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.665379] page dumped because: kasan: bad access detected [ 35.665937] [ 35.666295] Memory state around the buggy address: [ 35.666923] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.667668] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.668538] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.669238] ^ [ 35.669881] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.670608] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.671310] ================================================================== [ 36.882856] ================================================================== [ 36.883475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 36.884410] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.885407] [ 36.885853] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.887011] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.887638] Hardware name: linux,dummy-virt (DT) [ 36.888296] Call trace: [ 36.888725] show_stack+0x20/0x38 (C) [ 36.889364] dump_stack_lvl+0x8c/0xd0 [ 36.890050] print_report+0x118/0x5e0 [ 36.890744] kasan_report+0xc8/0x118 [ 36.891415] kasan_check_range+0x100/0x1a8 [ 36.892142] __kasan_check_write+0x20/0x30 [ 36.892827] kasan_atomics_helper+0x17ec/0x4858 [ 36.893596] kasan_atomics+0x198/0x2e8 [ 36.894255] kunit_try_run_case+0x14c/0x3d0 [ 36.894982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.895756] kthread+0x24c/0x2d0 [ 36.896426] ret_from_fork+0x10/0x20 [ 36.897052] [ 36.897476] Allocated by task 253: [ 36.898016] kasan_save_stack+0x3c/0x68 [ 36.898660] kasan_save_track+0x20/0x40 [ 36.899328] kasan_save_alloc_info+0x40/0x58 [ 36.899974] __kasan_kmalloc+0xd4/0xd8 [ 36.900651] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.901349] kasan_atomics+0xb8/0x2e8 [ 36.901944] kunit_try_run_case+0x14c/0x3d0 [ 36.902646] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.903407] kthread+0x24c/0x2d0 [ 36.903969] ret_from_fork+0x10/0x20 [ 36.904636] [ 36.905007] The buggy address belongs to the object at fff00000c63df000 [ 36.905007] which belongs to the cache kmalloc-64 of size 64 [ 36.906333] The buggy address is located 0 bytes to the right of [ 36.906333] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.907666] [ 36.908020] The buggy address belongs to the physical page: [ 36.908786] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.909787] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.910551] page_type: f5(slab) [ 36.910983] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.911692] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.912623] page dumped because: kasan: bad access detected [ 36.913361] [ 36.913737] Memory state around the buggy address: [ 36.914329] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.915131] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.915976] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.916799] ^ [ 36.917413] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.918208] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.918990] ================================================================== [ 35.092134] ================================================================== [ 35.092857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 35.093996] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.095188] [ 35.095661] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.096815] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.097496] Hardware name: linux,dummy-virt (DT) [ 35.098090] Call trace: [ 35.098606] show_stack+0x20/0x38 (C) [ 35.099324] dump_stack_lvl+0x8c/0xd0 [ 35.099980] print_report+0x118/0x5e0 [ 35.100688] kasan_report+0xc8/0x118 [ 35.101347] kasan_check_range+0x100/0x1a8 [ 35.102032] __kasan_check_write+0x20/0x30 [ 35.102752] kasan_atomics_helper+0x61c/0x4858 [ 35.103395] kasan_atomics+0x198/0x2e8 [ 35.103955] kunit_try_run_case+0x14c/0x3d0 [ 35.104664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.105325] kthread+0x24c/0x2d0 [ 35.105945] ret_from_fork+0x10/0x20 [ 35.106601] [ 35.106961] Allocated by task 253: [ 35.107482] kasan_save_stack+0x3c/0x68 [ 35.108025] kasan_save_track+0x20/0x40 [ 35.108644] kasan_save_alloc_info+0x40/0x58 [ 35.109313] __kasan_kmalloc+0xd4/0xd8 [ 35.109888] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.110445] kasan_atomics+0xb8/0x2e8 [ 35.111064] kunit_try_run_case+0x14c/0x3d0 [ 35.111704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.112413] kthread+0x24c/0x2d0 [ 35.113000] ret_from_fork+0x10/0x20 [ 35.113534] [ 35.113915] The buggy address belongs to the object at fff00000c63df000 [ 35.113915] which belongs to the cache kmalloc-64 of size 64 [ 35.115163] The buggy address is located 0 bytes to the right of [ 35.115163] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.116447] [ 35.116809] The buggy address belongs to the physical page: [ 35.117467] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.118447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.119216] page_type: f5(slab) [ 35.119729] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.120653] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.121453] page dumped because: kasan: bad access detected [ 35.122170] [ 35.122504] Memory state around the buggy address: [ 35.123215] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.124138] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.124971] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.125811] ^ [ 35.126452] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.127202] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.127884] ================================================================== [ 36.551799] ================================================================== [ 36.553472] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 36.554183] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.555222] [ 36.555681] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.556882] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.557509] Hardware name: linux,dummy-virt (DT) [ 36.558057] Call trace: [ 36.558434] show_stack+0x20/0x38 (C) [ 36.558934] dump_stack_lvl+0x8c/0xd0 [ 36.559449] print_report+0x118/0x5e0 [ 36.560056] kasan_report+0xc8/0x118 [ 36.560813] kasan_check_range+0x100/0x1a8 [ 36.561526] __kasan_check_write+0x20/0x30 [ 36.562299] kasan_atomics_helper+0x154c/0x4858 [ 36.562996] kasan_atomics+0x198/0x2e8 [ 36.563652] kunit_try_run_case+0x14c/0x3d0 [ 36.564366] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.565163] kthread+0x24c/0x2d0 [ 36.565803] ret_from_fork+0x10/0x20 [ 36.566458] [ 36.566826] Allocated by task 253: [ 36.567446] kasan_save_stack+0x3c/0x68 [ 36.568021] kasan_save_track+0x20/0x40 [ 36.568680] kasan_save_alloc_info+0x40/0x58 [ 36.569361] __kasan_kmalloc+0xd4/0xd8 [ 36.570012] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.570701] kasan_atomics+0xb8/0x2e8 [ 36.571313] kunit_try_run_case+0x14c/0x3d0 [ 36.572021] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.572781] kthread+0x24c/0x2d0 [ 36.573359] ret_from_fork+0x10/0x20 [ 36.573955] [ 36.574381] The buggy address belongs to the object at fff00000c63df000 [ 36.574381] which belongs to the cache kmalloc-64 of size 64 [ 36.575625] The buggy address is located 0 bytes to the right of [ 36.575625] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.576986] [ 36.577415] The buggy address belongs to the physical page: [ 36.577985] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.578991] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.579844] page_type: f5(slab) [ 36.580413] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.581350] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.582255] page dumped because: kasan: bad access detected [ 36.582932] [ 36.583302] Memory state around the buggy address: [ 36.584001] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.584806] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.585734] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.586574] ^ [ 36.587216] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.588079] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.588911] ================================================================== [ 34.689589] ================================================================== [ 34.691059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 34.692012] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 34.693024] [ 34.693781] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.695301] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.695981] Hardware name: linux,dummy-virt (DT) [ 34.696823] Call trace: [ 34.697438] show_stack+0x20/0x38 (C) [ 34.698277] dump_stack_lvl+0x8c/0xd0 [ 34.698784] print_report+0x118/0x5e0 [ 34.699714] kasan_report+0xc8/0x118 [ 34.700342] kasan_check_range+0x100/0x1a8 [ 34.700970] __kasan_check_read+0x20/0x30 [ 34.701690] kasan_atomics_helper+0x2b0/0x4858 [ 34.702317] kasan_atomics+0x198/0x2e8 [ 34.702876] kunit_try_run_case+0x14c/0x3d0 [ 34.703802] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.704462] kthread+0x24c/0x2d0 [ 34.705552] ret_from_fork+0x10/0x20 [ 34.706094] [ 34.706463] Allocated by task 253: [ 34.707000] kasan_save_stack+0x3c/0x68 [ 34.707514] kasan_save_track+0x20/0x40 [ 34.708109] kasan_save_alloc_info+0x40/0x58 [ 34.708825] __kasan_kmalloc+0xd4/0xd8 [ 34.709828] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.710364] kasan_atomics+0xb8/0x2e8 [ 34.710939] kunit_try_run_case+0x14c/0x3d0 [ 34.711569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.712129] kthread+0x24c/0x2d0 [ 34.712667] ret_from_fork+0x10/0x20 [ 34.713672] [ 34.714038] The buggy address belongs to the object at fff00000c63df000 [ 34.714038] which belongs to the cache kmalloc-64 of size 64 [ 34.715054] The buggy address is located 0 bytes to the right of [ 34.715054] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 34.716143] [ 34.716505] The buggy address belongs to the physical page: [ 34.717549] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 34.718487] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.719091] page_type: f5(slab) [ 34.719651] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.720553] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.721714] page dumped because: kasan: bad access detected [ 34.722260] [ 34.722542] Memory state around the buggy address: [ 34.723081] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.723878] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.724677] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.725432] ^ [ 34.726553] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.727327] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.728099] ================================================================== [ 36.021829] ================================================================== [ 36.022472] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 36.023321] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.024074] [ 36.024420] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.025475] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.026030] Hardware name: linux,dummy-virt (DT) [ 36.026525] Call trace: [ 36.026949] show_stack+0x20/0x38 (C) [ 36.027600] dump_stack_lvl+0x8c/0xd0 [ 36.028096] print_report+0x118/0x5e0 [ 36.028727] kasan_report+0xc8/0x118 [ 36.029328] kasan_check_range+0x100/0x1a8 [ 36.029883] __kasan_check_write+0x20/0x30 [ 36.030535] kasan_atomics_helper+0xf20/0x4858 [ 36.031178] kasan_atomics+0x198/0x2e8 [ 36.031773] kunit_try_run_case+0x14c/0x3d0 [ 36.032421] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.033176] kthread+0x24c/0x2d0 [ 36.033747] ret_from_fork+0x10/0x20 [ 36.034269] [ 36.034618] Allocated by task 253: [ 36.035149] kasan_save_stack+0x3c/0x68 [ 36.035733] kasan_save_track+0x20/0x40 [ 36.036314] kasan_save_alloc_info+0x40/0x58 [ 36.036920] __kasan_kmalloc+0xd4/0xd8 [ 36.037560] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.038214] kasan_atomics+0xb8/0x2e8 [ 36.038710] kunit_try_run_case+0x14c/0x3d0 [ 36.039271] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.039990] kthread+0x24c/0x2d0 [ 36.040552] ret_from_fork+0x10/0x20 [ 36.041070] [ 36.041414] The buggy address belongs to the object at fff00000c63df000 [ 36.041414] which belongs to the cache kmalloc-64 of size 64 [ 36.042624] The buggy address is located 0 bytes to the right of [ 36.042624] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.043749] [ 36.044105] The buggy address belongs to the physical page: [ 36.044781] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.045594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.046403] page_type: f5(slab) [ 36.046867] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.047819] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.048602] page dumped because: kasan: bad access detected [ 36.049224] [ 36.049524] Memory state around the buggy address: [ 36.050172] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.050809] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.051675] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.052429] ^ [ 36.053001] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.053714] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.054504] ================================================================== [ 36.125771] ================================================================== [ 36.126475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 36.127144] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.127995] [ 36.128352] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.129514] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.129946] Hardware name: linux,dummy-virt (DT) [ 36.130592] Call trace: [ 36.131034] show_stack+0x20/0x38 (C) [ 36.132029] dump_stack_lvl+0x8c/0xd0 [ 36.132619] print_report+0x118/0x5e0 [ 36.133243] kasan_report+0xc8/0x118 [ 36.133847] kasan_check_range+0x100/0x1a8 [ 36.134403] __kasan_check_write+0x20/0x30 [ 36.135045] kasan_atomics_helper+0x1058/0x4858 [ 36.135720] kasan_atomics+0x198/0x2e8 [ 36.136353] kunit_try_run_case+0x14c/0x3d0 [ 36.136992] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.137748] kthread+0x24c/0x2d0 [ 36.138262] ret_from_fork+0x10/0x20 [ 36.138813] [ 36.139164] Allocated by task 253: [ 36.139685] kasan_save_stack+0x3c/0x68 [ 36.140296] kasan_save_track+0x20/0x40 [ 36.140826] kasan_save_alloc_info+0x40/0x58 [ 36.141357] __kasan_kmalloc+0xd4/0xd8 [ 36.141936] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.142567] kasan_atomics+0xb8/0x2e8 [ 36.143097] kunit_try_run_case+0x14c/0x3d0 [ 36.143727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.144453] kthread+0x24c/0x2d0 [ 36.144922] ret_from_fork+0x10/0x20 [ 36.145509] [ 36.145830] The buggy address belongs to the object at fff00000c63df000 [ 36.145830] which belongs to the cache kmalloc-64 of size 64 [ 36.147024] The buggy address is located 0 bytes to the right of [ 36.147024] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.148219] [ 36.148584] The buggy address belongs to the physical page: [ 36.149272] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.150128] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.150753] page_type: f5(slab) [ 36.151298] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.152137] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.153030] page dumped because: kasan: bad access detected [ 36.153631] [ 36.153974] Memory state around the buggy address: [ 36.154570] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.155353] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.156066] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.156849] ^ [ 36.157528] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.158215] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.159003] ================================================================== [ 36.739961] ================================================================== [ 36.740825] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 36.741685] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.742575] [ 36.742910] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.743942] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.744543] Hardware name: linux,dummy-virt (DT) [ 36.745032] Call trace: [ 36.745474] show_stack+0x20/0x38 (C) [ 36.746023] dump_stack_lvl+0x8c/0xd0 [ 36.746669] print_report+0x118/0x5e0 [ 36.747293] kasan_report+0xc8/0x118 [ 36.747885] kasan_check_range+0x100/0x1a8 [ 36.748496] __kasan_check_write+0x20/0x30 [ 36.749152] kasan_atomics_helper+0x16d0/0x4858 [ 36.749845] kasan_atomics+0x198/0x2e8 [ 36.750460] kunit_try_run_case+0x14c/0x3d0 [ 36.751125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.751741] kthread+0x24c/0x2d0 [ 36.752327] ret_from_fork+0x10/0x20 [ 36.752852] [ 36.753220] Allocated by task 253: [ 36.753714] kasan_save_stack+0x3c/0x68 [ 36.754321] kasan_save_track+0x20/0x40 [ 36.754897] kasan_save_alloc_info+0x40/0x58 [ 36.755490] __kasan_kmalloc+0xd4/0xd8 [ 36.755950] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.756621] kasan_atomics+0xb8/0x2e8 [ 36.757162] kunit_try_run_case+0x14c/0x3d0 [ 36.757794] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.758422] kthread+0x24c/0x2d0 [ 36.758966] ret_from_fork+0x10/0x20 [ 36.759539] [ 36.759884] The buggy address belongs to the object at fff00000c63df000 [ 36.759884] which belongs to the cache kmalloc-64 of size 64 [ 36.760947] The buggy address is located 0 bytes to the right of [ 36.760947] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.762187] [ 36.762543] The buggy address belongs to the physical page: [ 36.763238] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.764098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.764792] page_type: f5(slab) [ 36.765334] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.766169] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.766891] page dumped because: kasan: bad access detected [ 36.767579] [ 36.767930] Memory state around the buggy address: [ 36.768563] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.769335] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.770081] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.770822] ^ [ 36.771431] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.772163] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.772966] ================================================================== [ 35.916464] ================================================================== [ 35.917252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 35.918167] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.919050] [ 35.919458] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.920466] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.921028] Hardware name: linux,dummy-virt (DT) [ 35.921660] Call trace: [ 35.922073] show_stack+0x20/0x38 (C) [ 35.922691] dump_stack_lvl+0x8c/0xd0 [ 35.923328] print_report+0x118/0x5e0 [ 35.923916] kasan_report+0xc8/0x118 [ 35.924416] kasan_check_range+0x100/0x1a8 [ 35.925057] __kasan_check_write+0x20/0x30 [ 35.925658] kasan_atomics_helper+0xe44/0x4858 [ 35.926238] kasan_atomics+0x198/0x2e8 [ 35.926854] kunit_try_run_case+0x14c/0x3d0 [ 35.927551] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.928326] kthread+0x24c/0x2d0 [ 35.928802] ret_from_fork+0x10/0x20 [ 35.929414] [ 35.929761] Allocated by task 253: [ 35.930303] kasan_save_stack+0x3c/0x68 [ 35.930832] kasan_save_track+0x20/0x40 [ 35.931348] kasan_save_alloc_info+0x40/0x58 [ 35.931979] __kasan_kmalloc+0xd4/0xd8 [ 35.932577] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.933223] kasan_atomics+0xb8/0x2e8 [ 35.933710] kunit_try_run_case+0x14c/0x3d0 [ 35.934352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.934948] kthread+0x24c/0x2d0 [ 35.935505] ret_from_fork+0x10/0x20 [ 35.936014] [ 35.936384] The buggy address belongs to the object at fff00000c63df000 [ 35.936384] which belongs to the cache kmalloc-64 of size 64 [ 35.937524] The buggy address is located 0 bytes to the right of [ 35.937524] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.938696] [ 35.939048] The buggy address belongs to the physical page: [ 35.939625] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.940520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.941241] page_type: f5(slab) [ 35.941758] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.942668] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.943445] page dumped because: kasan: bad access detected [ 35.944045] [ 35.944428] Memory state around the buggy address: [ 35.945032] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.945828] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.946545] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.947321] ^ [ 35.948001] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.948717] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.949504] ================================================================== [ 36.406320] ================================================================== [ 36.406988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 36.407912] Read of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.408754] [ 36.409224] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.410260] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.410877] Hardware name: linux,dummy-virt (DT) [ 36.411437] Call trace: [ 36.411904] show_stack+0x20/0x38 (C) [ 36.412562] dump_stack_lvl+0x8c/0xd0 [ 36.413180] print_report+0x118/0x5e0 [ 36.413821] kasan_report+0xc8/0x118 [ 36.414449] __asan_report_load8_noabort+0x20/0x30 [ 36.415082] kasan_atomics_helper+0x3f04/0x4858 [ 36.415810] kasan_atomics+0x198/0x2e8 [ 36.416474] kunit_try_run_case+0x14c/0x3d0 [ 36.417009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.417944] kthread+0x24c/0x2d0 [ 36.418480] ret_from_fork+0x10/0x20 [ 36.418972] [ 36.419280] Allocated by task 253: [ 36.419733] kasan_save_stack+0x3c/0x68 [ 36.420408] kasan_save_track+0x20/0x40 [ 36.421359] kasan_save_alloc_info+0x40/0x58 [ 36.421961] __kasan_kmalloc+0xd4/0xd8 [ 36.422576] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.423241] kasan_atomics+0xb8/0x2e8 [ 36.423846] kunit_try_run_case+0x14c/0x3d0 [ 36.424462] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.425499] kthread+0x24c/0x2d0 [ 36.425849] ret_from_fork+0x10/0x20 [ 36.426499] [ 36.426856] The buggy address belongs to the object at fff00000c63df000 [ 36.426856] which belongs to the cache kmalloc-64 of size 64 [ 36.428129] The buggy address is located 0 bytes to the right of [ 36.428129] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.429388] [ 36.429787] The buggy address belongs to the physical page: [ 36.430539] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.431462] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.432441] page_type: f5(slab) [ 36.433093] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.433890] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.434648] page dumped because: kasan: bad access detected [ 36.435278] [ 36.435612] Memory state around the buggy address: [ 36.436312] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.437001] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.437930] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.438621] ^ [ 36.439326] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.440041] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.440898] ================================================================== [ 36.196302] ================================================================== [ 36.197132] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 36.198002] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.198711] [ 36.199093] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.200146] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.200686] Hardware name: linux,dummy-virt (DT) [ 36.201205] Call trace: [ 36.201635] show_stack+0x20/0x38 (C) [ 36.202255] dump_stack_lvl+0x8c/0xd0 [ 36.202818] print_report+0x118/0x5e0 [ 36.203384] kasan_report+0xc8/0x118 [ 36.203892] kasan_check_range+0x100/0x1a8 [ 36.204569] __kasan_check_write+0x20/0x30 [ 36.205230] kasan_atomics_helper+0x1128/0x4858 [ 36.205907] kasan_atomics+0x198/0x2e8 [ 36.206474] kunit_try_run_case+0x14c/0x3d0 [ 36.207049] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.207745] kthread+0x24c/0x2d0 [ 36.208321] ret_from_fork+0x10/0x20 [ 36.208888] [ 36.209254] Allocated by task 253: [ 36.209761] kasan_save_stack+0x3c/0x68 [ 36.210307] kasan_save_track+0x20/0x40 [ 36.210890] kasan_save_alloc_info+0x40/0x58 [ 36.211510] __kasan_kmalloc+0xd4/0xd8 [ 36.212086] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.212688] kasan_atomics+0xb8/0x2e8 [ 36.213225] kunit_try_run_case+0x14c/0x3d0 [ 36.213851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.214453] kthread+0x24c/0x2d0 [ 36.214998] ret_from_fork+0x10/0x20 [ 36.215499] [ 36.215851] The buggy address belongs to the object at fff00000c63df000 [ 36.215851] which belongs to the cache kmalloc-64 of size 64 [ 36.216913] The buggy address is located 0 bytes to the right of [ 36.216913] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.218270] [ 36.218630] The buggy address belongs to the physical page: [ 36.219183] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.220127] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.220873] page_type: f5(slab) [ 36.221330] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.222225] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.223083] page dumped because: kasan: bad access detected [ 36.223607] [ 36.223948] Memory state around the buggy address: [ 36.224677] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.225489] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.226351] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.227161] ^ [ 36.227748] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.228516] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.229194] ================================================================== [ 35.166342] ================================================================== [ 35.167191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 35.167887] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.168797] [ 35.169228] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.170128] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.170709] Hardware name: linux,dummy-virt (DT) [ 35.171345] Call trace: [ 35.171780] show_stack+0x20/0x38 (C) [ 35.172343] dump_stack_lvl+0x8c/0xd0 [ 35.172963] print_report+0x118/0x5e0 [ 35.173484] kasan_report+0xc8/0x118 [ 35.174074] kasan_check_range+0x100/0x1a8 [ 35.174697] __kasan_check_write+0x20/0x30 [ 35.175272] kasan_atomics_helper+0x6ec/0x4858 [ 35.175932] kasan_atomics+0x198/0x2e8 [ 35.176552] kunit_try_run_case+0x14c/0x3d0 [ 35.177174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.177830] kthread+0x24c/0x2d0 [ 35.178403] ret_from_fork+0x10/0x20 [ 35.179012] [ 35.179326] Allocated by task 253: [ 35.179833] kasan_save_stack+0x3c/0x68 [ 35.180449] kasan_save_track+0x20/0x40 [ 35.181033] kasan_save_alloc_info+0x40/0x58 [ 35.181689] __kasan_kmalloc+0xd4/0xd8 [ 35.182212] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.182859] kasan_atomics+0xb8/0x2e8 [ 35.183441] kunit_try_run_case+0x14c/0x3d0 [ 35.184007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.184632] kthread+0x24c/0x2d0 [ 35.185202] ret_from_fork+0x10/0x20 [ 35.185678] [ 35.186033] The buggy address belongs to the object at fff00000c63df000 [ 35.186033] which belongs to the cache kmalloc-64 of size 64 [ 35.187146] The buggy address is located 0 bytes to the right of [ 35.187146] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.188356] [ 35.188704] The buggy address belongs to the physical page: [ 35.189401] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.190201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.190963] page_type: f5(slab) [ 35.191503] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.192297] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.193194] page dumped because: kasan: bad access detected [ 35.193805] [ 35.194175] Memory state around the buggy address: [ 35.194733] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.195461] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.196299] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.196995] ^ [ 35.197681] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.198466] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.199156] ================================================================== [ 35.318392] ================================================================== [ 35.319289] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 35.319654] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.319990] [ 35.320201] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.321585] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.322083] Hardware name: linux,dummy-virt (DT) [ 35.322819] Call trace: [ 35.323319] show_stack+0x20/0x38 (C) [ 35.324036] dump_stack_lvl+0x8c/0xd0 [ 35.324779] print_report+0x118/0x5e0 [ 35.325716] kasan_report+0xc8/0x118 [ 35.326255] __asan_report_load4_noabort+0x20/0x30 [ 35.326985] kasan_atomics_helper+0x42d8/0x4858 [ 35.327684] kasan_atomics+0x198/0x2e8 [ 35.328298] kunit_try_run_case+0x14c/0x3d0 [ 35.328931] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.329625] kthread+0x24c/0x2d0 [ 35.330107] ret_from_fork+0x10/0x20 [ 35.330680] [ 35.331028] Allocated by task 253: [ 35.331541] kasan_save_stack+0x3c/0x68 [ 35.332028] kasan_save_track+0x20/0x40 [ 35.332634] kasan_save_alloc_info+0x40/0x58 [ 35.333155] __kasan_kmalloc+0xd4/0xd8 [ 35.333740] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.334345] kasan_atomics+0xb8/0x2e8 [ 35.334861] kunit_try_run_case+0x14c/0x3d0 [ 35.335432] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.336173] kthread+0x24c/0x2d0 [ 35.336634] ret_from_fork+0x10/0x20 [ 35.337220] [ 35.337529] The buggy address belongs to the object at fff00000c63df000 [ 35.337529] which belongs to the cache kmalloc-64 of size 64 [ 35.338730] The buggy address is located 0 bytes to the right of [ 35.338730] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.339985] [ 35.340354] The buggy address belongs to the physical page: [ 35.340954] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.341767] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.342554] page_type: f5(slab) [ 35.343051] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.343921] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.344722] page dumped because: kasan: bad access detected [ 35.345355] [ 35.345662] Memory state around the buggy address: [ 35.346190] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.347011] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.347822] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.348604] ^ [ 35.349260] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.349981] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.350732] ================================================================== [ 34.848735] ================================================================== [ 34.849627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 34.851035] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 34.852352] [ 34.852818] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.853782] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.854431] Hardware name: linux,dummy-virt (DT) [ 34.854908] Call trace: [ 34.855334] show_stack+0x20/0x38 (C) [ 34.855940] dump_stack_lvl+0x8c/0xd0 [ 34.857384] print_report+0x118/0x5e0 [ 34.857906] kasan_report+0xc8/0x118 [ 34.858866] kasan_check_range+0x100/0x1a8 [ 34.859604] __kasan_check_write+0x20/0x30 [ 34.860218] kasan_atomics_helper+0x3ac/0x4858 [ 34.860832] kasan_atomics+0x198/0x2e8 [ 34.861605] kunit_try_run_case+0x14c/0x3d0 [ 34.862218] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.862973] kthread+0x24c/0x2d0 [ 34.863757] ret_from_fork+0x10/0x20 [ 34.864259] [ 34.864607] Allocated by task 253: [ 34.866088] kasan_save_stack+0x3c/0x68 [ 34.866703] kasan_save_track+0x20/0x40 [ 34.867251] kasan_save_alloc_info+0x40/0x58 [ 34.867841] __kasan_kmalloc+0xd4/0xd8 [ 34.868437] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.869422] kasan_atomics+0xb8/0x2e8 [ 34.869909] kunit_try_run_case+0x14c/0x3d0 [ 34.870497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.871154] kthread+0x24c/0x2d0 [ 34.871688] ret_from_fork+0x10/0x20 [ 34.872217] [ 34.872576] The buggy address belongs to the object at fff00000c63df000 [ 34.872576] which belongs to the cache kmalloc-64 of size 64 [ 34.874561] The buggy address is located 0 bytes to the right of [ 34.874561] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 34.875808] [ 34.876177] The buggy address belongs to the physical page: [ 34.876707] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 34.878053] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.878802] page_type: f5(slab) [ 34.879302] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.880099] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.880929] page dumped because: kasan: bad access detected [ 34.881585] [ 34.881927] Memory state around the buggy address: [ 34.882564] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.883851] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.884769] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.885511] ^ [ 34.886168] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.886888] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.888051] ================================================================== [ 35.352426] ================================================================== [ 35.354021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 35.354869] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.355594] [ 35.355850] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.357707] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.358320] Hardware name: linux,dummy-virt (DT) [ 35.358936] Call trace: [ 35.359474] show_stack+0x20/0x38 (C) [ 35.360016] dump_stack_lvl+0x8c/0xd0 [ 35.360606] print_report+0x118/0x5e0 [ 35.361253] kasan_report+0xc8/0x118 [ 35.361828] kasan_check_range+0x100/0x1a8 [ 35.362559] __kasan_check_write+0x20/0x30 [ 35.363092] kasan_atomics_helper+0x934/0x4858 [ 35.363772] kasan_atomics+0x198/0x2e8 [ 35.364291] kunit_try_run_case+0x14c/0x3d0 [ 35.364937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.365611] kthread+0x24c/0x2d0 [ 35.366200] ret_from_fork+0x10/0x20 [ 35.366724] [ 35.367079] Allocated by task 253: [ 35.367654] kasan_save_stack+0x3c/0x68 [ 35.368150] kasan_save_track+0x20/0x40 [ 35.368733] kasan_save_alloc_info+0x40/0x58 [ 35.369292] __kasan_kmalloc+0xd4/0xd8 [ 35.369874] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.370441] kasan_atomics+0xb8/0x2e8 [ 35.370984] kunit_try_run_case+0x14c/0x3d0 [ 35.371537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.372282] kthread+0x24c/0x2d0 [ 35.372820] ret_from_fork+0x10/0x20 [ 35.373404] [ 35.373754] The buggy address belongs to the object at fff00000c63df000 [ 35.373754] which belongs to the cache kmalloc-64 of size 64 [ 35.374901] The buggy address is located 0 bytes to the right of [ 35.374901] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.376070] [ 35.376446] The buggy address belongs to the physical page: [ 35.377065] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.378004] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.378704] page_type: f5(slab) [ 35.379262] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.380077] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.380884] page dumped because: kasan: bad access detected [ 35.381483] [ 35.381837] Memory state around the buggy address: [ 35.382422] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.383292] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.384081] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.384898] ^ [ 35.385559] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.386280] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.387092] ================================================================== [ 35.707180] ================================================================== [ 35.708170] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 35.709023] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.709766] [ 35.710156] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.711133] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.711718] Hardware name: linux,dummy-virt (DT) [ 35.712335] Call trace: [ 35.712726] show_stack+0x20/0x38 (C) [ 35.713353] dump_stack_lvl+0x8c/0xd0 [ 35.713967] print_report+0x118/0x5e0 [ 35.714580] kasan_report+0xc8/0x118 [ 35.715165] kasan_check_range+0x100/0x1a8 [ 35.715807] __kasan_check_write+0x20/0x30 [ 35.716367] kasan_atomics_helper+0xca0/0x4858 [ 35.717027] kasan_atomics+0x198/0x2e8 [ 35.717620] kunit_try_run_case+0x14c/0x3d0 [ 35.718285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.719044] kthread+0x24c/0x2d0 [ 35.719580] ret_from_fork+0x10/0x20 [ 35.720150] [ 35.720495] Allocated by task 253: [ 35.721022] kasan_save_stack+0x3c/0x68 [ 35.721621] kasan_save_track+0x20/0x40 [ 35.722167] kasan_save_alloc_info+0x40/0x58 [ 35.722729] __kasan_kmalloc+0xd4/0xd8 [ 35.723324] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.723968] kasan_atomics+0xb8/0x2e8 [ 35.724489] kunit_try_run_case+0x14c/0x3d0 [ 35.725072] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.725704] kthread+0x24c/0x2d0 [ 35.726320] ret_from_fork+0x10/0x20 [ 35.726861] [ 35.727208] The buggy address belongs to the object at fff00000c63df000 [ 35.727208] which belongs to the cache kmalloc-64 of size 64 [ 35.728492] The buggy address is located 0 bytes to the right of [ 35.728492] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.729606] [ 35.729957] The buggy address belongs to the physical page: [ 35.730656] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.731612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.732271] page_type: f5(slab) [ 35.732801] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.733629] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.734478] page dumped because: kasan: bad access detected [ 35.735042] [ 35.735406] Memory state around the buggy address: [ 35.736039] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.736787] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.737531] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.738325] ^ [ 35.738954] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.739678] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.740466] ================================================================== [ 35.130595] ================================================================== [ 35.131803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 35.132554] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.133890] [ 35.134409] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.135154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.135597] Hardware name: linux,dummy-virt (DT) [ 35.136226] Call trace: [ 35.136639] show_stack+0x20/0x38 (C) [ 35.137141] dump_stack_lvl+0x8c/0xd0 [ 35.137784] print_report+0x118/0x5e0 [ 35.138367] kasan_report+0xc8/0x118 [ 35.138963] kasan_check_range+0x100/0x1a8 [ 35.139562] __kasan_check_write+0x20/0x30 [ 35.140095] kasan_atomics_helper+0x684/0x4858 [ 35.140776] kasan_atomics+0x198/0x2e8 [ 35.141372] kunit_try_run_case+0x14c/0x3d0 [ 35.141890] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.142662] kthread+0x24c/0x2d0 [ 35.143245] ret_from_fork+0x10/0x20 [ 35.143780] [ 35.144100] Allocated by task 253: [ 35.144599] kasan_save_stack+0x3c/0x68 [ 35.145130] kasan_save_track+0x20/0x40 [ 35.145715] kasan_save_alloc_info+0x40/0x58 [ 35.146241] __kasan_kmalloc+0xd4/0xd8 [ 35.146820] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.147426] kasan_atomics+0xb8/0x2e8 [ 35.147951] kunit_try_run_case+0x14c/0x3d0 [ 35.148598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.149177] kthread+0x24c/0x2d0 [ 35.149709] ret_from_fork+0x10/0x20 [ 35.150275] [ 35.150620] The buggy address belongs to the object at fff00000c63df000 [ 35.150620] which belongs to the cache kmalloc-64 of size 64 [ 35.151738] The buggy address is located 0 bytes to the right of [ 35.151738] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.152874] [ 35.153240] The buggy address belongs to the physical page: [ 35.153915] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.154741] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.155602] page_type: f5(slab) [ 35.156184] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.157047] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.157991] page dumped because: kasan: bad access detected [ 35.158611] [ 35.158987] Memory state around the buggy address: [ 35.159676] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.160430] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.161331] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.162054] ^ [ 35.162752] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.163525] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.164356] ================================================================== [ 35.672910] ================================================================== [ 35.674006] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 35.674918] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.675657] [ 35.676034] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.677059] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.677626] Hardware name: linux,dummy-virt (DT) [ 35.678159] Call trace: [ 35.678574] show_stack+0x20/0x38 (C) [ 35.679190] dump_stack_lvl+0x8c/0xd0 [ 35.679788] print_report+0x118/0x5e0 [ 35.680325] kasan_report+0xc8/0x118 [ 35.680908] __asan_report_load4_noabort+0x20/0x30 [ 35.681574] kasan_atomics_helper+0x3de4/0x4858 [ 35.682256] kasan_atomics+0x198/0x2e8 [ 35.682786] kunit_try_run_case+0x14c/0x3d0 [ 35.683448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.684127] kthread+0x24c/0x2d0 [ 35.684687] ret_from_fork+0x10/0x20 [ 35.685271] [ 35.685572] Allocated by task 253: [ 35.686091] kasan_save_stack+0x3c/0x68 [ 35.686622] kasan_save_track+0x20/0x40 [ 35.687224] kasan_save_alloc_info+0x40/0x58 [ 35.687755] __kasan_kmalloc+0xd4/0xd8 [ 35.688362] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.688957] kasan_atomics+0xb8/0x2e8 [ 35.689463] kunit_try_run_case+0x14c/0x3d0 [ 35.690081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.690776] kthread+0x24c/0x2d0 [ 35.691278] ret_from_fork+0x10/0x20 [ 35.691859] [ 35.692229] The buggy address belongs to the object at fff00000c63df000 [ 35.692229] which belongs to the cache kmalloc-64 of size 64 [ 35.693371] The buggy address is located 0 bytes to the right of [ 35.693371] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.694565] [ 35.694911] The buggy address belongs to the physical page: [ 35.695618] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.696460] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.697331] page_type: f5(slab) [ 35.697928] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.698816] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.699667] page dumped because: kasan: bad access detected [ 35.700343] [ 35.700649] Memory state around the buggy address: [ 35.701162] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.702005] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.702769] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.703473] ^ [ 35.704141] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.704892] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.705642] ================================================================== [ 35.238084] ================================================================== [ 35.238810] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 35.239552] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.240106] [ 35.240989] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.242283] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.242994] Hardware name: linux,dummy-virt (DT) [ 35.243710] Call trace: [ 35.244070] show_stack+0x20/0x38 (C) [ 35.244594] dump_stack_lvl+0x8c/0xd0 [ 35.245093] print_report+0x118/0x5e0 [ 35.246014] kasan_report+0xc8/0x118 [ 35.246768] kasan_check_range+0x100/0x1a8 [ 35.247517] __kasan_check_write+0x20/0x30 [ 35.248299] kasan_atomics_helper+0x7cc/0x4858 [ 35.249067] kasan_atomics+0x198/0x2e8 [ 35.249799] kunit_try_run_case+0x14c/0x3d0 [ 35.250570] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.251404] kthread+0x24c/0x2d0 [ 35.251883] ret_from_fork+0x10/0x20 [ 35.252713] [ 35.253207] Allocated by task 253: [ 35.253810] kasan_save_stack+0x3c/0x68 [ 35.254539] kasan_save_track+0x20/0x40 [ 35.255247] kasan_save_alloc_info+0x40/0x58 [ 35.255991] __kasan_kmalloc+0xd4/0xd8 [ 35.256700] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.257271] kasan_atomics+0xb8/0x2e8 [ 35.257713] kunit_try_run_case+0x14c/0x3d0 [ 35.258246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.258868] kthread+0x24c/0x2d0 [ 35.259854] ret_from_fork+0x10/0x20 [ 35.260603] [ 35.261100] The buggy address belongs to the object at fff00000c63df000 [ 35.261100] which belongs to the cache kmalloc-64 of size 64 [ 35.262579] The buggy address is located 0 bytes to the right of [ 35.262579] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.264096] [ 35.264646] The buggy address belongs to the physical page: [ 35.265402] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.266411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.267262] page_type: f5(slab) [ 35.267774] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.268855] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.269822] page dumped because: kasan: bad access detected [ 35.270624] [ 35.270942] Memory state around the buggy address: [ 35.271779] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.272723] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.273543] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.274461] ^ [ 35.275015] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.276034] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.276959] ================================================================== [ 36.056159] ================================================================== [ 36.056907] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 36.057851] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.058571] [ 36.058936] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.060063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.060678] Hardware name: linux,dummy-virt (DT) [ 36.061356] Call trace: [ 36.061784] show_stack+0x20/0x38 (C) [ 36.062408] dump_stack_lvl+0x8c/0xd0 [ 36.063005] print_report+0x118/0x5e0 [ 36.063602] kasan_report+0xc8/0x118 [ 36.064211] kasan_check_range+0x100/0x1a8 [ 36.064853] __kasan_check_write+0x20/0x30 [ 36.065508] kasan_atomics_helper+0xf88/0x4858 [ 36.066090] kasan_atomics+0x198/0x2e8 [ 36.066737] kunit_try_run_case+0x14c/0x3d0 [ 36.067315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.068033] kthread+0x24c/0x2d0 [ 36.068634] ret_from_fork+0x10/0x20 [ 36.069240] [ 36.069583] Allocated by task 253: [ 36.070087] kasan_save_stack+0x3c/0x68 [ 36.070708] kasan_save_track+0x20/0x40 [ 36.071269] kasan_save_alloc_info+0x40/0x58 [ 36.071896] __kasan_kmalloc+0xd4/0xd8 [ 36.072497] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.073087] kasan_atomics+0xb8/0x2e8 [ 36.073675] kunit_try_run_case+0x14c/0x3d0 [ 36.074274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.075009] kthread+0x24c/0x2d0 [ 36.075562] ret_from_fork+0x10/0x20 [ 36.076130] [ 36.076467] The buggy address belongs to the object at fff00000c63df000 [ 36.076467] which belongs to the cache kmalloc-64 of size 64 [ 36.077579] The buggy address is located 0 bytes to the right of [ 36.077579] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.078737] [ 36.079091] The buggy address belongs to the physical page: [ 36.079654] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.080550] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.081376] page_type: f5(slab) [ 36.081915] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.082730] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.083586] page dumped because: kasan: bad access detected [ 36.084318] [ 36.084667] Memory state around the buggy address: [ 36.085166] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.086031] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.086796] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.087600] ^ [ 36.088143] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.088965] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.089796] ================================================================== [ 36.265156] ================================================================== [ 36.265897] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 36.266758] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.267678] [ 36.268070] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.269064] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.269632] Hardware name: linux,dummy-virt (DT) [ 36.270213] Call trace: [ 36.270568] show_stack+0x20/0x38 (C) [ 36.271207] dump_stack_lvl+0x8c/0xd0 [ 36.271816] print_report+0x118/0x5e0 [ 36.272374] kasan_report+0xc8/0x118 [ 36.272994] kasan_check_range+0x100/0x1a8 [ 36.273562] __kasan_check_write+0x20/0x30 [ 36.274252] kasan_atomics_helper+0x11f8/0x4858 [ 36.274981] kasan_atomics+0x198/0x2e8 [ 36.275606] kunit_try_run_case+0x14c/0x3d0 [ 36.276171] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.276987] kthread+0x24c/0x2d0 [ 36.277631] ret_from_fork+0x10/0x20 [ 36.278295] [ 36.278631] Allocated by task 253: [ 36.279091] kasan_save_stack+0x3c/0x68 [ 36.279697] kasan_save_track+0x20/0x40 [ 36.280212] kasan_save_alloc_info+0x40/0x58 [ 36.280839] __kasan_kmalloc+0xd4/0xd8 [ 36.281445] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.282023] kasan_atomics+0xb8/0x2e8 [ 36.282580] kunit_try_run_case+0x14c/0x3d0 [ 36.283147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.283764] kthread+0x24c/0x2d0 [ 36.284331] ret_from_fork+0x10/0x20 [ 36.284913] [ 36.285277] The buggy address belongs to the object at fff00000c63df000 [ 36.285277] which belongs to the cache kmalloc-64 of size 64 [ 36.286351] The buggy address is located 0 bytes to the right of [ 36.286351] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.287726] [ 36.288026] The buggy address belongs to the physical page: [ 36.288740] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.289549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.290368] page_type: f5(slab) [ 36.290910] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.291796] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.292443] page dumped because: kasan: bad access detected [ 36.293154] [ 36.293495] Memory state around the buggy address: [ 36.294164] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.294831] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.295715] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.296561] ^ [ 36.297215] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.298011] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.298856] ================================================================== [ 34.729502] ================================================================== [ 34.730876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 34.731598] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 34.732469] [ 34.732870] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.734436] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.734996] Hardware name: linux,dummy-virt (DT) [ 34.735661] Call trace: [ 34.736109] show_stack+0x20/0x38 (C) [ 34.736702] dump_stack_lvl+0x8c/0xd0 [ 34.737664] print_report+0x118/0x5e0 [ 34.738153] kasan_report+0xc8/0x118 [ 34.738764] __asan_report_load4_noabort+0x20/0x30 [ 34.739893] kasan_atomics_helper+0x40fc/0x4858 [ 34.740375] kasan_atomics+0x198/0x2e8 [ 34.741474] kunit_try_run_case+0x14c/0x3d0 [ 34.742062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.742870] kthread+0x24c/0x2d0 [ 34.743486] ret_from_fork+0x10/0x20 [ 34.744135] [ 34.744472] Allocated by task 253: [ 34.745488] kasan_save_stack+0x3c/0x68 [ 34.745983] kasan_save_track+0x20/0x40 [ 34.746508] kasan_save_alloc_info+0x40/0x58 [ 34.747047] __kasan_kmalloc+0xd4/0xd8 [ 34.748091] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.748732] kasan_atomics+0xb8/0x2e8 [ 34.749790] kunit_try_run_case+0x14c/0x3d0 [ 34.750380] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.751166] kthread+0x24c/0x2d0 [ 34.751787] ret_from_fork+0x10/0x20 [ 34.752391] [ 34.752882] The buggy address belongs to the object at fff00000c63df000 [ 34.752882] which belongs to the cache kmalloc-64 of size 64 [ 34.754061] The buggy address is located 0 bytes to the right of [ 34.754061] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 34.755615] [ 34.756224] The buggy address belongs to the physical page: [ 34.757394] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 34.758354] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.758941] page_type: f5(slab) [ 34.759527] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.760392] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.761721] page dumped because: kasan: bad access detected [ 34.762737] [ 34.763142] Memory state around the buggy address: [ 34.763451] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.763802] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.764184] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.764782] ^ [ 34.765445] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.766663] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.767359] ================================================================== [ 36.442389] ================================================================== [ 36.442903] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 36.443854] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.444658] [ 36.444996] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.446311] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.446908] Hardware name: linux,dummy-virt (DT) [ 36.447559] Call trace: [ 36.447863] show_stack+0x20/0x38 (C) [ 36.448552] dump_stack_lvl+0x8c/0xd0 [ 36.449191] print_report+0x118/0x5e0 [ 36.449765] kasan_report+0xc8/0x118 [ 36.450406] kasan_check_range+0x100/0x1a8 [ 36.451051] __kasan_check_write+0x20/0x30 [ 36.451694] kasan_atomics_helper+0x1414/0x4858 [ 36.452381] kasan_atomics+0x198/0x2e8 [ 36.452988] kunit_try_run_case+0x14c/0x3d0 [ 36.453620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.454363] kthread+0x24c/0x2d0 [ 36.454974] ret_from_fork+0x10/0x20 [ 36.455578] [ 36.455966] Allocated by task 253: [ 36.456495] kasan_save_stack+0x3c/0x68 [ 36.457148] kasan_save_track+0x20/0x40 [ 36.457686] kasan_save_alloc_info+0x40/0x58 [ 36.458401] __kasan_kmalloc+0xd4/0xd8 [ 36.458944] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.459644] kasan_atomics+0xb8/0x2e8 [ 36.460223] kunit_try_run_case+0x14c/0x3d0 [ 36.460884] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.461584] kthread+0x24c/0x2d0 [ 36.462085] ret_from_fork+0x10/0x20 [ 36.462716] [ 36.463105] The buggy address belongs to the object at fff00000c63df000 [ 36.463105] which belongs to the cache kmalloc-64 of size 64 [ 36.464420] The buggy address is located 0 bytes to the right of [ 36.464420] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.465662] [ 36.466069] The buggy address belongs to the physical page: [ 36.466818] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.467710] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.468553] page_type: f5(slab) [ 36.469072] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.469992] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.470823] page dumped because: kasan: bad access detected [ 36.471497] [ 36.471852] Memory state around the buggy address: [ 36.472504] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.473364] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.474155] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.474968] ^ [ 36.475546] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.476422] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.477281] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 34.189910] ================================================================== [ 34.190665] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 34.191473] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249 [ 34.192712] [ 34.192994] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.194249] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.194932] Hardware name: linux,dummy-virt (DT) [ 34.195675] Call trace: [ 34.196283] show_stack+0x20/0x38 (C) [ 34.196970] dump_stack_lvl+0x8c/0xd0 [ 34.197566] print_report+0x118/0x5e0 [ 34.198109] kasan_report+0xc8/0x118 [ 34.198652] kasan_check_range+0x100/0x1a8 [ 34.199531] __kasan_check_write+0x20/0x30 [ 34.200095] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 34.200871] kasan_bitops_generic+0x11c/0x1c8 [ 34.201523] kunit_try_run_case+0x14c/0x3d0 [ 34.202081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.202854] kthread+0x24c/0x2d0 [ 34.203347] ret_from_fork+0x10/0x20 [ 34.203950] [ 34.204312] Allocated by task 249: [ 34.204748] kasan_save_stack+0x3c/0x68 [ 34.205355] kasan_save_track+0x20/0x40 [ 34.205899] kasan_save_alloc_info+0x40/0x58 [ 34.206444] __kasan_kmalloc+0xd4/0xd8 [ 34.207028] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.207557] kasan_bitops_generic+0xa0/0x1c8 [ 34.208187] kunit_try_run_case+0x14c/0x3d0 [ 34.208771] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.209451] kthread+0x24c/0x2d0 [ 34.209944] ret_from_fork+0x10/0x20 [ 34.210484] [ 34.210836] The buggy address belongs to the object at fff00000c4005ea0 [ 34.210836] which belongs to the cache kmalloc-16 of size 16 [ 34.211918] The buggy address is located 8 bytes inside of [ 34.211918] allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9) [ 34.213108] [ 34.213478] The buggy address belongs to the physical page: [ 34.214038] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 34.215000] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.215654] page_type: f5(slab) [ 34.216212] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.217143] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.217907] page dumped because: kasan: bad access detected [ 34.218558] [ 34.218875] Memory state around the buggy address: [ 34.219521] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 34.220260] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.221057] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.222016] ^ [ 34.222579] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.223290] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.224063] ================================================================== [ 34.260533] ================================================================== [ 34.261305] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 34.262163] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249 [ 34.262830] [ 34.263217] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.264272] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.264814] Hardware name: linux,dummy-virt (DT) [ 34.265309] Call trace: [ 34.265737] show_stack+0x20/0x38 (C) [ 34.266374] dump_stack_lvl+0x8c/0xd0 [ 34.266931] print_report+0x118/0x5e0 [ 34.267488] kasan_report+0xc8/0x118 [ 34.268070] kasan_check_range+0x100/0x1a8 [ 34.268707] __kasan_check_write+0x20/0x30 [ 34.269373] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 34.270139] kasan_bitops_generic+0x11c/0x1c8 [ 34.270690] kunit_try_run_case+0x14c/0x3d0 [ 34.271354] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.272065] kthread+0x24c/0x2d0 [ 34.272660] ret_from_fork+0x10/0x20 [ 34.273257] [ 34.273567] Allocated by task 249: [ 34.274094] kasan_save_stack+0x3c/0x68 [ 34.274695] kasan_save_track+0x20/0x40 [ 34.275268] kasan_save_alloc_info+0x40/0x58 [ 34.275776] __kasan_kmalloc+0xd4/0xd8 [ 34.276374] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.276941] kasan_bitops_generic+0xa0/0x1c8 [ 34.277500] kunit_try_run_case+0x14c/0x3d0 [ 34.278094] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.278816] kthread+0x24c/0x2d0 [ 34.279376] ret_from_fork+0x10/0x20 [ 34.279932] [ 34.280303] The buggy address belongs to the object at fff00000c4005ea0 [ 34.280303] which belongs to the cache kmalloc-16 of size 16 [ 34.281495] The buggy address is located 8 bytes inside of [ 34.281495] allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9) [ 34.282589] [ 34.282947] The buggy address belongs to the physical page: [ 34.283806] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 34.284616] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.285610] page_type: f5(slab) [ 34.286095] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.287026] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.287790] page dumped because: kasan: bad access detected [ 34.288507] [ 34.288847] Memory state around the buggy address: [ 34.289391] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 34.290229] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.291091] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.291787] ^ [ 34.292424] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.293125] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.293929] ================================================================== [ 34.296652] ================================================================== [ 34.297680] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 34.298528] Read of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249 [ 34.298906] [ 34.299083] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.299825] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.300367] Hardware name: linux,dummy-virt (DT) [ 34.300911] Call trace: [ 34.301416] show_stack+0x20/0x38 (C) [ 34.302037] dump_stack_lvl+0x8c/0xd0 [ 34.302758] print_report+0x118/0x5e0 [ 34.303423] kasan_report+0xc8/0x118 [ 34.304097] __asan_report_load8_noabort+0x20/0x30 [ 34.304859] kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 34.305703] kasan_bitops_generic+0x11c/0x1c8 [ 34.306008] kunit_try_run_case+0x14c/0x3d0 [ 34.306486] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.307278] kthread+0x24c/0x2d0 [ 34.307753] ret_from_fork+0x10/0x20 [ 34.308415] [ 34.308799] Allocated by task 249: [ 34.309320] kasan_save_stack+0x3c/0x68 [ 34.309958] kasan_save_track+0x20/0x40 [ 34.310555] kasan_save_alloc_info+0x40/0x58 [ 34.311248] __kasan_kmalloc+0xd4/0xd8 [ 34.311831] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.312485] kasan_bitops_generic+0xa0/0x1c8 [ 34.313137] kunit_try_run_case+0x14c/0x3d0 [ 34.313692] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.314356] kthread+0x24c/0x2d0 [ 34.314907] ret_from_fork+0x10/0x20 [ 34.315494] [ 34.315794] The buggy address belongs to the object at fff00000c4005ea0 [ 34.315794] which belongs to the cache kmalloc-16 of size 16 [ 34.316945] The buggy address is located 8 bytes inside of [ 34.316945] allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9) [ 34.318104] [ 34.318460] The buggy address belongs to the physical page: [ 34.319159] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 34.320075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.320773] page_type: f5(slab) [ 34.321309] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.322085] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.322985] page dumped because: kasan: bad access detected [ 34.323647] [ 34.324004] Memory state around the buggy address: [ 34.324654] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 34.325340] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.326203] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.326822] ^ [ 34.327457] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.328229] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.328997] ================================================================== [ 34.473439] ================================================================== [ 34.474588] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 34.475470] Read of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249 [ 34.476481] [ 34.477385] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.478737] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.479319] Hardware name: linux,dummy-virt (DT) [ 34.479882] Call trace: [ 34.480289] show_stack+0x20/0x38 (C) [ 34.480798] dump_stack_lvl+0x8c/0xd0 [ 34.481424] print_report+0x118/0x5e0 [ 34.481945] kasan_report+0xc8/0x118 [ 34.482544] __asan_report_load8_noabort+0x20/0x30 [ 34.483174] kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 34.483828] kasan_bitops_generic+0x11c/0x1c8 [ 34.484498] kunit_try_run_case+0x14c/0x3d0 [ 34.485146] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.485991] kthread+0x24c/0x2d0 [ 34.486565] ret_from_fork+0x10/0x20 [ 34.486845] [ 34.487000] Allocated by task 249: [ 34.487322] kasan_save_stack+0x3c/0x68 [ 34.487917] kasan_save_track+0x20/0x40 [ 34.488441] kasan_save_alloc_info+0x40/0x58 [ 34.489087] __kasan_kmalloc+0xd4/0xd8 [ 34.489689] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.490333] kasan_bitops_generic+0xa0/0x1c8 [ 34.490823] kunit_try_run_case+0x14c/0x3d0 [ 34.491453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.492194] kthread+0x24c/0x2d0 [ 34.492745] ret_from_fork+0x10/0x20 [ 34.493239] [ 34.493574] The buggy address belongs to the object at fff00000c4005ea0 [ 34.493574] which belongs to the cache kmalloc-16 of size 16 [ 34.494750] The buggy address is located 8 bytes inside of [ 34.494750] allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9) [ 34.495834] [ 34.496198] The buggy address belongs to the physical page: [ 34.496865] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 34.497790] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.498513] page_type: f5(slab) [ 34.499049] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.499817] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.500698] page dumped because: kasan: bad access detected [ 34.501411] [ 34.501751] Memory state around the buggy address: [ 34.502257] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 34.503444] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.504590] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.505389] ^ [ 34.505907] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.507130] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.507899] ================================================================== [ 34.366136] ================================================================== [ 34.366944] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 34.367706] Read of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249 [ 34.368525] [ 34.368904] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.369927] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.370480] Hardware name: linux,dummy-virt (DT) [ 34.371101] Call trace: [ 34.371546] show_stack+0x20/0x38 (C) [ 34.372149] dump_stack_lvl+0x8c/0xd0 [ 34.372698] print_report+0x118/0x5e0 [ 34.373207] kasan_report+0xc8/0x118 [ 34.373793] __asan_report_load8_noabort+0x20/0x30 [ 34.374449] kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 34.375276] kasan_bitops_generic+0x11c/0x1c8 [ 34.375919] kunit_try_run_case+0x14c/0x3d0 [ 34.376546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.377290] kthread+0x24c/0x2d0 [ 34.377813] ret_from_fork+0x10/0x20 [ 34.378372] [ 34.378708] Allocated by task 249: [ 34.379139] kasan_save_stack+0x3c/0x68 [ 34.379741] kasan_save_track+0x20/0x40 [ 34.380296] kasan_save_alloc_info+0x40/0x58 [ 34.380852] __kasan_kmalloc+0xd4/0xd8 [ 34.381446] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.381968] kasan_bitops_generic+0xa0/0x1c8 [ 34.382614] kunit_try_run_case+0x14c/0x3d0 [ 34.383229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.383970] kthread+0x24c/0x2d0 [ 34.384528] ret_from_fork+0x10/0x20 [ 34.385041] [ 34.385373] The buggy address belongs to the object at fff00000c4005ea0 [ 34.385373] which belongs to the cache kmalloc-16 of size 16 [ 34.386614] The buggy address is located 8 bytes inside of [ 34.386614] allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9) [ 34.387750] [ 34.388109] The buggy address belongs to the physical page: [ 34.388669] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 34.389561] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.390353] page_type: f5(slab) [ 34.390887] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.391605] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.392565] page dumped because: kasan: bad access detected [ 34.393396] [ 34.393905] Memory state around the buggy address: [ 34.394485] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 34.395475] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.396432] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.397359] ^ [ 34.398106] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.399053] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.400006] ================================================================== [ 34.225640] ================================================================== [ 34.226414] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 34.227737] Read of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249 [ 34.228603] [ 34.228977] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.230231] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.230579] Hardware name: linux,dummy-virt (DT) [ 34.230945] Call trace: [ 34.232211] show_stack+0x20/0x38 (C) [ 34.233026] dump_stack_lvl+0x8c/0xd0 [ 34.233632] print_report+0x118/0x5e0 [ 34.234223] kasan_report+0xc8/0x118 [ 34.234799] __asan_report_load8_noabort+0x20/0x30 [ 34.235442] kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 34.236187] kasan_bitops_generic+0x11c/0x1c8 [ 34.236778] kunit_try_run_case+0x14c/0x3d0 [ 34.237368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.238105] kthread+0x24c/0x2d0 [ 34.238627] ret_from_fork+0x10/0x20 [ 34.239190] [ 34.239513] Allocated by task 249: [ 34.239995] kasan_save_stack+0x3c/0x68 [ 34.240611] kasan_save_track+0x20/0x40 [ 34.241168] kasan_save_alloc_info+0x40/0x58 [ 34.241808] __kasan_kmalloc+0xd4/0xd8 [ 34.242405] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.243049] kasan_bitops_generic+0xa0/0x1c8 [ 34.243608] kunit_try_run_case+0x14c/0x3d0 [ 34.244234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.244880] kthread+0x24c/0x2d0 [ 34.245444] ret_from_fork+0x10/0x20 [ 34.245897] [ 34.246257] The buggy address belongs to the object at fff00000c4005ea0 [ 34.246257] which belongs to the cache kmalloc-16 of size 16 [ 34.247260] The buggy address is located 8 bytes inside of [ 34.247260] allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9) [ 34.248559] [ 34.248911] The buggy address belongs to the physical page: [ 34.249466] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 34.250390] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.251061] page_type: f5(slab) [ 34.251585] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.252427] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.253199] page dumped because: kasan: bad access detected [ 34.253878] [ 34.254246] Memory state around the buggy address: [ 34.254822] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 34.255621] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.256363] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.257076] ^ [ 34.257681] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.258407] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.259198] ================================================================== [ 34.402042] ================================================================== [ 34.402927] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 34.404368] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249 [ 34.406332] [ 34.406679] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.407621] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.408749] Hardware name: linux,dummy-virt (DT) [ 34.409622] Call trace: [ 34.410183] show_stack+0x20/0x38 (C) [ 34.410857] dump_stack_lvl+0x8c/0xd0 [ 34.411463] print_report+0x118/0x5e0 [ 34.412062] kasan_report+0xc8/0x118 [ 34.412667] kasan_check_range+0x100/0x1a8 [ 34.413253] __kasan_check_write+0x20/0x30 [ 34.413875] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 34.414647] kasan_bitops_generic+0x11c/0x1c8 [ 34.415239] kunit_try_run_case+0x14c/0x3d0 [ 34.415796] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.416591] kthread+0x24c/0x2d0 [ 34.417162] ret_from_fork+0x10/0x20 [ 34.417836] [ 34.418236] Allocated by task 249: [ 34.418865] kasan_save_stack+0x3c/0x68 [ 34.419535] kasan_save_track+0x20/0x40 [ 34.420179] kasan_save_alloc_info+0x40/0x58 [ 34.420844] __kasan_kmalloc+0xd4/0xd8 [ 34.421351] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.421712] kasan_bitops_generic+0xa0/0x1c8 [ 34.421980] kunit_try_run_case+0x14c/0x3d0 [ 34.422398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.423194] kthread+0x24c/0x2d0 [ 34.423806] ret_from_fork+0x10/0x20 [ 34.424432] [ 34.424809] The buggy address belongs to the object at fff00000c4005ea0 [ 34.424809] which belongs to the cache kmalloc-16 of size 16 [ 34.426036] The buggy address is located 8 bytes inside of [ 34.426036] allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9) [ 34.427274] [ 34.427607] The buggy address belongs to the physical page: [ 34.428244] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 34.429087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.429780] page_type: f5(slab) [ 34.430224] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.431162] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.432060] page dumped because: kasan: bad access detected [ 34.432763] [ 34.433077] Memory state around the buggy address: [ 34.433572] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 34.434423] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.435161] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.435907] ^ [ 34.436563] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.437381] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.438227] ================================================================== [ 34.439640] ================================================================== [ 34.440385] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 34.441284] Read of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249 [ 34.442165] [ 34.442556] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.443615] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.444095] Hardware name: linux,dummy-virt (DT) [ 34.444723] Call trace: [ 34.445166] show_stack+0x20/0x38 (C) [ 34.445755] dump_stack_lvl+0x8c/0xd0 [ 34.446301] print_report+0x118/0x5e0 [ 34.446878] kasan_report+0xc8/0x118 [ 34.447390] __asan_report_load8_noabort+0x20/0x30 [ 34.448059] kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 34.448880] kasan_bitops_generic+0x11c/0x1c8 [ 34.449413] kunit_try_run_case+0x14c/0x3d0 [ 34.450062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.450831] kthread+0x24c/0x2d0 [ 34.451344] ret_from_fork+0x10/0x20 [ 34.451935] [ 34.452311] Allocated by task 249: [ 34.452723] kasan_save_stack+0x3c/0x68 [ 34.453326] kasan_save_track+0x20/0x40 [ 34.453826] kasan_save_alloc_info+0x40/0x58 [ 34.454468] __kasan_kmalloc+0xd4/0xd8 [ 34.454983] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.455660] kasan_bitops_generic+0xa0/0x1c8 [ 34.456294] kunit_try_run_case+0x14c/0x3d0 [ 34.456837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.457549] kthread+0x24c/0x2d0 [ 34.458106] ret_from_fork+0x10/0x20 [ 34.458675] [ 34.459005] The buggy address belongs to the object at fff00000c4005ea0 [ 34.459005] which belongs to the cache kmalloc-16 of size 16 [ 34.460270] The buggy address is located 8 bytes inside of [ 34.460270] allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9) [ 34.461245] [ 34.461594] The buggy address belongs to the physical page: [ 34.462293] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 34.463196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.463974] page_type: f5(slab) [ 34.464517] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.465336] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.466181] page dumped because: kasan: bad access detected [ 34.466715] [ 34.467066] Memory state around the buggy address: [ 34.467697] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 34.468434] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.469239] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.469891] ^ [ 34.470524] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.471282] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.471999] ================================================================== [ 34.330381] ================================================================== [ 34.331108] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 34.332482] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249 [ 34.333344] [ 34.333726] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.334812] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.335291] Hardware name: linux,dummy-virt (DT) [ 34.335905] Call trace: [ 34.336327] show_stack+0x20/0x38 (C) [ 34.336882] dump_stack_lvl+0x8c/0xd0 [ 34.337509] print_report+0x118/0x5e0 [ 34.338129] kasan_report+0xc8/0x118 [ 34.338725] kasan_check_range+0x100/0x1a8 [ 34.339340] __kasan_check_write+0x20/0x30 [ 34.339973] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 34.340733] kasan_bitops_generic+0x11c/0x1c8 [ 34.341316] kunit_try_run_case+0x14c/0x3d0 [ 34.341966] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.342657] kthread+0x24c/0x2d0 [ 34.343212] ret_from_fork+0x10/0x20 [ 34.343706] [ 34.344061] Allocated by task 249: [ 34.344608] kasan_save_stack+0x3c/0x68 [ 34.345155] kasan_save_track+0x20/0x40 [ 34.345721] kasan_save_alloc_info+0x40/0x58 [ 34.346299] __kasan_kmalloc+0xd4/0xd8 [ 34.346854] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.347519] kasan_bitops_generic+0xa0/0x1c8 [ 34.348155] kunit_try_run_case+0x14c/0x3d0 [ 34.348729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.349347] kthread+0x24c/0x2d0 [ 34.349888] ret_from_fork+0x10/0x20 [ 34.350461] [ 34.350793] The buggy address belongs to the object at fff00000c4005ea0 [ 34.350793] which belongs to the cache kmalloc-16 of size 16 [ 34.351928] The buggy address is located 8 bytes inside of [ 34.351928] allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9) [ 34.353194] [ 34.353535] The buggy address belongs to the physical page: [ 34.354141] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 34.355014] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.355660] page_type: f5(slab) [ 34.356216] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.357108] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.358006] page dumped because: kasan: bad access detected [ 34.358650] [ 34.358999] Memory state around the buggy address: [ 34.359627] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 34.360434] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.361213] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.361980] ^ [ 34.362620] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.363314] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.364168] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 33.995981] ================================================================== [ 33.996747] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 33.997608] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249 [ 33.998463] [ 33.998856] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 33.999975] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.000537] Hardware name: linux,dummy-virt (DT) [ 34.001157] Call trace: [ 34.001616] show_stack+0x20/0x38 (C) [ 34.002272] dump_stack_lvl+0x8c/0xd0 [ 34.002835] print_report+0x118/0x5e0 [ 34.003342] kasan_report+0xc8/0x118 [ 34.003826] kasan_check_range+0x100/0x1a8 [ 34.004390] __kasan_check_write+0x20/0x30 [ 34.004930] kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 34.005759] kasan_bitops_generic+0x110/0x1c8 [ 34.006470] kunit_try_run_case+0x14c/0x3d0 [ 34.007173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.007927] kthread+0x24c/0x2d0 [ 34.008544] ret_from_fork+0x10/0x20 [ 34.009106] [ 34.009502] Allocated by task 249: [ 34.010008] kasan_save_stack+0x3c/0x68 [ 34.010641] kasan_save_track+0x20/0x40 [ 34.011174] kasan_save_alloc_info+0x40/0x58 [ 34.011837] __kasan_kmalloc+0xd4/0xd8 [ 34.012482] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.013331] kasan_bitops_generic+0xa0/0x1c8 [ 34.014071] kunit_try_run_case+0x14c/0x3d0 [ 34.014687] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.015581] kthread+0x24c/0x2d0 [ 34.016267] ret_from_fork+0x10/0x20 [ 34.016809] [ 34.017467] The buggy address belongs to the object at fff00000c4005ea0 [ 34.017467] which belongs to the cache kmalloc-16 of size 16 [ 34.018573] The buggy address is located 8 bytes inside of [ 34.018573] allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9) [ 34.019474] [ 34.019834] The buggy address belongs to the physical page: [ 34.020548] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 34.021551] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.022340] page_type: f5(slab) [ 34.022915] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.023781] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.024643] page dumped because: kasan: bad access detected [ 34.025324] [ 34.025659] Memory state around the buggy address: [ 34.026329] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 34.027133] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.027989] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.028780] ^ [ 34.029357] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.030197] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.030989] ================================================================== [ 33.804395] ================================================================== [ 33.805618] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 33.806587] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249 [ 33.807490] [ 33.807830] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 33.808718] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.809330] Hardware name: linux,dummy-virt (DT) [ 33.810082] Call trace: [ 33.810661] show_stack+0x20/0x38 (C) [ 33.811354] dump_stack_lvl+0x8c/0xd0 [ 33.812052] print_report+0x118/0x5e0 [ 33.812755] kasan_report+0xc8/0x118 [ 33.813413] kasan_check_range+0x100/0x1a8 [ 33.814092] __kasan_check_write+0x20/0x30 [ 33.814789] kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 33.815546] kasan_bitops_generic+0x110/0x1c8 [ 33.816248] kunit_try_run_case+0x14c/0x3d0 [ 33.816940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.817746] kthread+0x24c/0x2d0 [ 33.818263] ret_from_fork+0x10/0x20 [ 33.818830] [ 33.819228] Allocated by task 249: [ 33.819779] kasan_save_stack+0x3c/0x68 [ 33.820422] kasan_save_track+0x20/0x40 [ 33.820981] kasan_save_alloc_info+0x40/0x58 [ 33.821606] __kasan_kmalloc+0xd4/0xd8 [ 33.822158] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.822841] kasan_bitops_generic+0xa0/0x1c8 [ 33.823453] kunit_try_run_case+0x14c/0x3d0 [ 33.824100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.824840] kthread+0x24c/0x2d0 [ 33.825420] ret_from_fork+0x10/0x20 [ 33.826015] [ 33.826360] The buggy address belongs to the object at fff00000c4005ea0 [ 33.826360] which belongs to the cache kmalloc-16 of size 16 [ 33.827649] The buggy address is located 8 bytes inside of [ 33.827649] allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9) [ 33.828867] [ 33.829353] The buggy address belongs to the physical page: [ 33.830303] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 33.831361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.832320] page_type: f5(slab) [ 33.833003] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.834017] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 33.834973] page dumped because: kasan: bad access detected [ 33.835550] [ 33.835785] Memory state around the buggy address: [ 33.836302] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 33.837008] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.837782] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 33.838703] ^ [ 33.839385] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.840269] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.840963] ================================================================== [ 33.842915] ================================================================== [ 33.843897] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 33.844528] Read of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249 [ 33.845210] [ 33.846848] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 33.848078] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.848787] Hardware name: linux,dummy-virt (DT) [ 33.849543] Call trace: [ 33.850123] show_stack+0x20/0x38 (C) [ 33.850821] dump_stack_lvl+0x8c/0xd0 [ 33.851546] print_report+0x118/0x5e0 [ 33.852264] kasan_report+0xc8/0x118 [ 33.852819] __asan_report_load8_noabort+0x20/0x30 [ 33.853720] kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 33.854564] kasan_bitops_generic+0x110/0x1c8 [ 33.855334] kunit_try_run_case+0x14c/0x3d0 [ 33.855936] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.856590] kthread+0x24c/0x2d0 [ 33.857058] ret_from_fork+0x10/0x20 [ 33.858007] [ 33.858467] Allocated by task 249: [ 33.858935] kasan_save_stack+0x3c/0x68 [ 33.859443] kasan_save_track+0x20/0x40 [ 33.859945] kasan_save_alloc_info+0x40/0x58 [ 33.860510] __kasan_kmalloc+0xd4/0xd8 [ 33.861015] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.861619] kasan_bitops_generic+0xa0/0x1c8 [ 33.862536] kunit_try_run_case+0x14c/0x3d0 [ 33.863166] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.863815] kthread+0x24c/0x2d0 [ 33.864326] ret_from_fork+0x10/0x20 [ 33.864822] [ 33.865199] The buggy address belongs to the object at fff00000c4005ea0 [ 33.865199] which belongs to the cache kmalloc-16 of size 16 [ 33.866346] The buggy address is located 8 bytes inside of [ 33.866346] allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9) [ 33.867488] [ 33.867839] The buggy address belongs to the physical page: [ 33.868485] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 33.869324] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.870089] page_type: f5(slab) [ 33.870648] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.871561] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 33.872436] page dumped because: kasan: bad access detected [ 33.873015] [ 33.873377] Memory state around the buggy address: [ 33.873986] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 33.874767] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.875460] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 33.876304] ^ [ 33.876867] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.877601] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.878396] ================================================================== [ 33.882576] ================================================================== [ 33.883324] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 33.884079] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249 [ 33.885024] [ 33.885414] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 33.886441] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.886951] Hardware name: linux,dummy-virt (DT) [ 33.887570] Call trace: [ 33.888101] show_stack+0x20/0x38 (C) [ 33.888722] dump_stack_lvl+0x8c/0xd0 [ 33.889316] print_report+0x118/0x5e0 [ 33.889948] kasan_report+0xc8/0x118 [ 33.890526] kasan_check_range+0x100/0x1a8 [ 33.891191] __kasan_check_write+0x20/0x30 [ 33.891821] kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 33.892537] kasan_bitops_generic+0x110/0x1c8 [ 33.893154] kunit_try_run_case+0x14c/0x3d0 [ 33.893757] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.894493] kthread+0x24c/0x2d0 [ 33.895070] ret_from_fork+0x10/0x20 [ 33.895650] [ 33.896035] Allocated by task 249: [ 33.896559] kasan_save_stack+0x3c/0x68 [ 33.897208] kasan_save_track+0x20/0x40 [ 33.897778] kasan_save_alloc_info+0x40/0x58 [ 33.898457] __kasan_kmalloc+0xd4/0xd8 [ 33.899012] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.899701] kasan_bitops_generic+0xa0/0x1c8 [ 33.900251] kunit_try_run_case+0x14c/0x3d0 [ 33.900918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.901610] kthread+0x24c/0x2d0 [ 33.902185] ret_from_fork+0x10/0x20 [ 33.902769] [ 33.903136] The buggy address belongs to the object at fff00000c4005ea0 [ 33.903136] which belongs to the cache kmalloc-16 of size 16 [ 33.904389] The buggy address is located 8 bytes inside of [ 33.904389] allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9) [ 33.905604] [ 33.906013] The buggy address belongs to the physical page: [ 33.906604] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 33.907601] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.908353] page_type: f5(slab) [ 33.908903] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.909779] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 33.910622] page dumped because: kasan: bad access detected [ 33.911304] [ 33.911640] Memory state around the buggy address: [ 33.912327] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 33.913066] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.913920] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 33.914739] ^ [ 33.915484] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.916221] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.917067] ================================================================== [ 34.032728] ================================================================== [ 34.033418] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 34.034401] Read of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249 [ 34.035258] [ 34.035622] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.036788] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.037344] Hardware name: linux,dummy-virt (DT) [ 34.037960] Call trace: [ 34.038449] show_stack+0x20/0x38 (C) [ 34.039008] dump_stack_lvl+0x8c/0xd0 [ 34.039665] print_report+0x118/0x5e0 [ 34.040214] kasan_report+0xc8/0x118 [ 34.040848] __asan_report_load8_noabort+0x20/0x30 [ 34.041599] kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 34.042346] kasan_bitops_generic+0x110/0x1c8 [ 34.043004] kunit_try_run_case+0x14c/0x3d0 [ 34.043637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.044404] kthread+0x24c/0x2d0 [ 34.044953] ret_from_fork+0x10/0x20 [ 34.045522] [ 34.045910] Allocated by task 249: [ 34.046451] kasan_save_stack+0x3c/0x68 [ 34.047084] kasan_save_track+0x20/0x40 [ 34.047684] kasan_save_alloc_info+0x40/0x58 [ 34.048448] __kasan_kmalloc+0xd4/0xd8 [ 34.049204] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.049944] kasan_bitops_generic+0xa0/0x1c8 [ 34.050656] kunit_try_run_case+0x14c/0x3d0 [ 34.051377] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.052050] kthread+0x24c/0x2d0 [ 34.052546] ret_from_fork+0x10/0x20 [ 34.053025] [ 34.053614] The buggy address belongs to the object at fff00000c4005ea0 [ 34.053614] which belongs to the cache kmalloc-16 of size 16 [ 34.054685] The buggy address is located 8 bytes inside of [ 34.054685] allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9) [ 34.055678] [ 34.056028] The buggy address belongs to the physical page: [ 34.056712] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 34.057605] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.058360] page_type: f5(slab) [ 34.058901] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.059755] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.060546] page dumped because: kasan: bad access detected [ 34.061255] [ 34.061549] Memory state around the buggy address: [ 34.062164] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 34.062992] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.063771] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.064500] ^ [ 34.065069] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.065817] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.066540] ================================================================== [ 34.068292] ================================================================== [ 34.069181] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 34.070242] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249 [ 34.071142] [ 34.071642] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.072887] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.073748] Hardware name: linux,dummy-virt (DT) [ 34.074372] Call trace: [ 34.074824] show_stack+0x20/0x38 (C) [ 34.075529] dump_stack_lvl+0x8c/0xd0 [ 34.076576] print_report+0x118/0x5e0 [ 34.077273] kasan_report+0xc8/0x118 [ 34.077982] kasan_check_range+0x100/0x1a8 [ 34.078717] __kasan_check_write+0x20/0x30 [ 34.079289] kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 34.079962] kasan_bitops_generic+0x110/0x1c8 [ 34.080563] kunit_try_run_case+0x14c/0x3d0 [ 34.081649] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.082272] kthread+0x24c/0x2d0 [ 34.082972] ret_from_fork+0x10/0x20 [ 34.083699] [ 34.084180] Allocated by task 249: [ 34.084808] kasan_save_stack+0x3c/0x68 [ 34.085545] kasan_save_track+0x20/0x40 [ 34.086261] kasan_save_alloc_info+0x40/0x58 [ 34.086985] __kasan_kmalloc+0xd4/0xd8 [ 34.087669] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.088431] kasan_bitops_generic+0xa0/0x1c8 [ 34.089197] kunit_try_run_case+0x14c/0x3d0 [ 34.089900] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.090558] kthread+0x24c/0x2d0 [ 34.091012] ret_from_fork+0x10/0x20 [ 34.091504] [ 34.091814] The buggy address belongs to the object at fff00000c4005ea0 [ 34.091814] which belongs to the cache kmalloc-16 of size 16 [ 34.093374] The buggy address is located 8 bytes inside of [ 34.093374] allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9) [ 34.094847] [ 34.095360] The buggy address belongs to the physical page: [ 34.096100] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 34.097150] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.098044] page_type: f5(slab) [ 34.098731] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.099749] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.100728] page dumped because: kasan: bad access detected [ 34.101549] [ 34.101867] Memory state around the buggy address: [ 34.102447] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 34.103546] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.104447] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.105234] ^ [ 34.105855] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.106632] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.107343] ================================================================== [ 34.146822] ================================================================== [ 34.147576] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 34.149151] Read of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249 [ 34.149928] [ 34.150286] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.151511] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.152159] Hardware name: linux,dummy-virt (DT) [ 34.152898] Call trace: [ 34.153471] show_stack+0x20/0x38 (C) [ 34.154193] dump_stack_lvl+0x8c/0xd0 [ 34.154893] print_report+0x118/0x5e0 [ 34.155575] kasan_report+0xc8/0x118 [ 34.156085] __asan_report_load8_noabort+0x20/0x30 [ 34.156735] kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 34.157405] kasan_bitops_generic+0x110/0x1c8 [ 34.157972] kunit_try_run_case+0x14c/0x3d0 [ 34.159220] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.160049] kthread+0x24c/0x2d0 [ 34.160729] ret_from_fork+0x10/0x20 [ 34.161446] [ 34.161911] Allocated by task 249: [ 34.162383] kasan_save_stack+0x3c/0x68 [ 34.163172] kasan_save_track+0x20/0x40 [ 34.163881] kasan_save_alloc_info+0x40/0x58 [ 34.164645] __kasan_kmalloc+0xd4/0xd8 [ 34.165345] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.166073] kasan_bitops_generic+0xa0/0x1c8 [ 34.166814] kunit_try_run_case+0x14c/0x3d0 [ 34.167607] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.168463] kthread+0x24c/0x2d0 [ 34.168922] ret_from_fork+0x10/0x20 [ 34.169688] [ 34.170190] The buggy address belongs to the object at fff00000c4005ea0 [ 34.170190] which belongs to the cache kmalloc-16 of size 16 [ 34.171450] The buggy address is located 8 bytes inside of [ 34.171450] allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9) [ 34.172620] [ 34.172934] The buggy address belongs to the physical page: [ 34.174013] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 34.175035] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.175942] page_type: f5(slab) [ 34.176623] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.177602] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.178587] page dumped because: kasan: bad access detected [ 34.179391] [ 34.179877] Memory state around the buggy address: [ 34.180416] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 34.181454] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.182363] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.183313] ^ [ 34.184048] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.184826] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.185795] ================================================================== [ 34.108706] ================================================================== [ 34.109650] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 34.111211] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249 [ 34.112163] [ 34.112575] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.113755] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.114463] Hardware name: linux,dummy-virt (DT) [ 34.115054] Call trace: [ 34.115425] show_stack+0x20/0x38 (C) [ 34.116017] dump_stack_lvl+0x8c/0xd0 [ 34.116697] print_report+0x118/0x5e0 [ 34.117349] kasan_report+0xc8/0x118 [ 34.117939] kasan_check_range+0x100/0x1a8 [ 34.118566] __kasan_check_write+0x20/0x30 [ 34.119249] kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 34.119972] kasan_bitops_generic+0x110/0x1c8 [ 34.120610] kunit_try_run_case+0x14c/0x3d0 [ 34.121296] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.122029] kthread+0x24c/0x2d0 [ 34.122607] ret_from_fork+0x10/0x20 [ 34.123198] [ 34.123537] Allocated by task 249: [ 34.124108] kasan_save_stack+0x3c/0x68 [ 34.124735] kasan_save_track+0x20/0x40 [ 34.125266] kasan_save_alloc_info+0x40/0x58 [ 34.125930] __kasan_kmalloc+0xd4/0xd8 [ 34.126546] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.127251] kasan_bitops_generic+0xa0/0x1c8 [ 34.127849] kunit_try_run_case+0x14c/0x3d0 [ 34.128521] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.129175] kthread+0x24c/0x2d0 [ 34.129748] ret_from_fork+0x10/0x20 [ 34.130315] [ 34.130701] The buggy address belongs to the object at fff00000c4005ea0 [ 34.130701] which belongs to the cache kmalloc-16 of size 16 [ 34.131892] The buggy address is located 8 bytes inside of [ 34.131892] allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9) [ 34.133109] [ 34.133477] The buggy address belongs to the physical page: [ 34.134057] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 34.135040] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.135797] page_type: f5(slab) [ 34.136342] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.137238] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 34.138065] page dumped because: kasan: bad access detected [ 34.138722] [ 34.139064] Memory state around the buggy address: [ 34.139750] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 34.140537] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.141408] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.142227] ^ [ 34.142815] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.143679] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.144677] ================================================================== [ 33.919537] ================================================================== [ 33.920528] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 33.921446] Read of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249 [ 33.922739] [ 33.923189] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 33.924427] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.924974] Hardware name: linux,dummy-virt (DT) [ 33.925556] Call trace: [ 33.925986] show_stack+0x20/0x38 (C) [ 33.926619] dump_stack_lvl+0x8c/0xd0 [ 33.927232] print_report+0x118/0x5e0 [ 33.927812] kasan_report+0xc8/0x118 [ 33.928417] __asan_report_load8_noabort+0x20/0x30 [ 33.929140] kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 33.929856] kasan_bitops_generic+0x110/0x1c8 [ 33.930528] kunit_try_run_case+0x14c/0x3d0 [ 33.931167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.931914] kthread+0x24c/0x2d0 [ 33.932490] ret_from_fork+0x10/0x20 [ 33.933073] [ 33.933428] Allocated by task 249: [ 33.933991] kasan_save_stack+0x3c/0x68 [ 33.934513] kasan_save_track+0x20/0x40 [ 33.935156] kasan_save_alloc_info+0x40/0x58 [ 33.935788] __kasan_kmalloc+0xd4/0xd8 [ 33.936397] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.937047] kasan_bitops_generic+0xa0/0x1c8 [ 33.937656] kunit_try_run_case+0x14c/0x3d0 [ 33.938304] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.939022] kthread+0x24c/0x2d0 [ 33.939527] ret_from_fork+0x10/0x20 [ 33.940066] [ 33.940468] The buggy address belongs to the object at fff00000c4005ea0 [ 33.940468] which belongs to the cache kmalloc-16 of size 16 [ 33.941672] The buggy address is located 8 bytes inside of [ 33.941672] allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9) [ 33.942909] [ 33.943287] The buggy address belongs to the physical page: [ 33.943965] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 33.944933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.945718] page_type: f5(slab) [ 33.946226] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.947100] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 33.947905] page dumped because: kasan: bad access detected [ 33.948568] [ 33.948952] Memory state around the buggy address: [ 33.949575] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 33.950442] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.951275] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 33.952065] ^ [ 33.952667] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.953513] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.954309] ================================================================== [ 33.957312] ================================================================== [ 33.958039] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 33.959420] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249 [ 33.960069] [ 33.960507] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 33.961957] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.962681] Hardware name: linux,dummy-virt (DT) [ 33.963422] Call trace: [ 33.963801] show_stack+0x20/0x38 (C) [ 33.964384] dump_stack_lvl+0x8c/0xd0 [ 33.964937] print_report+0x118/0x5e0 [ 33.965848] kasan_report+0xc8/0x118 [ 33.966553] kasan_check_range+0x100/0x1a8 [ 33.967310] __kasan_check_write+0x20/0x30 [ 33.968050] kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 33.968892] kasan_bitops_generic+0x110/0x1c8 [ 33.969629] kunit_try_run_case+0x14c/0x3d0 [ 33.970387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.971238] kthread+0x24c/0x2d0 [ 33.971914] ret_from_fork+0x10/0x20 [ 33.972589] [ 33.972928] Allocated by task 249: [ 33.973412] kasan_save_stack+0x3c/0x68 [ 33.973919] kasan_save_track+0x20/0x40 [ 33.975040] kasan_save_alloc_info+0x40/0x58 [ 33.975598] __kasan_kmalloc+0xd4/0xd8 [ 33.976188] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.976788] kasan_bitops_generic+0xa0/0x1c8 [ 33.977418] kunit_try_run_case+0x14c/0x3d0 [ 33.977988] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.978622] kthread+0x24c/0x2d0 [ 33.979153] ret_from_fork+0x10/0x20 [ 33.979612] [ 33.979967] The buggy address belongs to the object at fff00000c4005ea0 [ 33.979967] which belongs to the cache kmalloc-16 of size 16 [ 33.981189] The buggy address is located 8 bytes inside of [ 33.981189] allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9) [ 33.982385] [ 33.982779] The buggy address belongs to the physical page: [ 33.983474] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 33.984419] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.985093] page_type: f5(slab) [ 33.985646] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.986620] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 33.987489] page dumped because: kasan: bad access detected [ 33.988184] [ 33.988567] Memory state around the buggy address: [ 33.989094] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 33.990002] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.990784] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 33.991592] ^ [ 33.992215] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.993039] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.993835] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 33.749770] ================================================================== [ 33.750506] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 33.751314] Read of size 1 at addr fff00000c4081c10 by task kunit_try_catch/247 [ 33.751677] [ 33.751847] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 33.752895] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.754619] Hardware name: linux,dummy-virt (DT) [ 33.755373] Call trace: [ 33.755865] show_stack+0x20/0x38 (C) [ 33.756550] dump_stack_lvl+0x8c/0xd0 [ 33.757335] print_report+0x118/0x5e0 [ 33.757940] kasan_report+0xc8/0x118 [ 33.758511] __asan_report_load1_noabort+0x20/0x30 [ 33.759225] strnlen+0x80/0x88 [ 33.759777] kasan_strings+0x380/0x8f8 [ 33.760419] kunit_try_run_case+0x14c/0x3d0 [ 33.761157] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.762051] kthread+0x24c/0x2d0 [ 33.762624] ret_from_fork+0x10/0x20 [ 33.763232] [ 33.763618] Allocated by task 247: [ 33.764083] kasan_save_stack+0x3c/0x68 [ 33.764733] kasan_save_track+0x20/0x40 [ 33.765524] kasan_save_alloc_info+0x40/0x58 [ 33.766165] __kasan_kmalloc+0xd4/0xd8 [ 33.766734] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.767395] kasan_strings+0xb4/0x8f8 [ 33.767958] kunit_try_run_case+0x14c/0x3d0 [ 33.768600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.769629] kthread+0x24c/0x2d0 [ 33.770046] ret_from_fork+0x10/0x20 [ 33.770486] [ 33.770722] Freed by task 247: [ 33.771079] kasan_save_stack+0x3c/0x68 [ 33.771676] kasan_save_track+0x20/0x40 [ 33.772491] kasan_save_free_info+0x4c/0x78 [ 33.773690] __kasan_slab_free+0x6c/0x98 [ 33.774405] kfree+0x114/0x3c8 [ 33.774919] kasan_strings+0x128/0x8f8 [ 33.775512] kunit_try_run_case+0x14c/0x3d0 [ 33.776221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.776936] kthread+0x24c/0x2d0 [ 33.777721] ret_from_fork+0x10/0x20 [ 33.778212] [ 33.778565] The buggy address belongs to the object at fff00000c4081c00 [ 33.778565] which belongs to the cache kmalloc-32 of size 32 [ 33.779796] The buggy address is located 16 bytes inside of [ 33.779796] freed 32-byte region [fff00000c4081c00, fff00000c4081c20) [ 33.781320] [ 33.781663] The buggy address belongs to the physical page: [ 33.782417] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104081 [ 33.783303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.784036] page_type: f5(slab) [ 33.784579] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 33.785740] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 33.786598] page dumped because: kasan: bad access detected [ 33.787240] [ 33.787654] Memory state around the buggy address: [ 33.788266] fff00000c4081b00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 33.789263] fff00000c4081b80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 33.789975] >fff00000c4081c00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.790831] ^ [ 33.791383] fff00000c4081c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.792386] fff00000c4081d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.793338] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[ 33.703072] ================================================================== [ 33.703800] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 33.704556] Read of size 1 at addr fff00000c4081c10 by task kunit_try_catch/247 [ 33.705717] [ 33.706060] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 33.707072] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.707667] Hardware name: linux,dummy-virt (DT) [ 33.708294] Call trace: [ 33.708707] show_stack+0x20/0x38 (C) [ 33.709588] dump_stack_lvl+0x8c/0xd0 [ 33.710223] print_report+0x118/0x5e0 [ 33.710818] kasan_report+0xc8/0x118 [ 33.711423] __asan_report_load1_noabort+0x20/0x30 [ 33.712088] strlen+0xa8/0xb0 [ 33.712653] kasan_strings+0x320/0x8f8 [ 33.713473] kunit_try_run_case+0x14c/0x3d0 [ 33.714029] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.714835] kthread+0x24c/0x2d0 [ 33.715385] ret_from_fork+0x10/0x20 [ 33.715890] [ 33.716214] Allocated by task 247: [ 33.716686] kasan_save_stack+0x3c/0x68 [ 33.717845] kasan_save_track+0x20/0x40 [ 33.718506] kasan_save_alloc_info+0x40/0x58 [ 33.719212] __kasan_kmalloc+0xd4/0xd8 [ 33.719688] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.720302] kasan_strings+0xb4/0x8f8 [ 33.720778] kunit_try_run_case+0x14c/0x3d0 [ 33.721291] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.721976] kthread+0x24c/0x2d0 [ 33.723622] ret_from_fork+0x10/0x20 [ 33.724251] [ 33.724638] Freed by task 247: [ 33.725543] kasan_save_stack+0x3c/0x68 [ 33.726206] kasan_save_track+0x20/0x40 [ 33.726844] kasan_save_free_info+0x4c/0x78 [ 33.727464] __kasan_slab_free+0x6c/0x98 [ 33.728108] kfree+0x114/0x3c8 [ 33.728682] kasan_strings+0x128/0x8f8 [ 33.729697] kunit_try_run_case+0x14c/0x3d0 [ 33.730247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.731058] kthread+0x24c/0x2d0 [ 33.731581] ret_from_fork+0x10/0x20 [ 33.732289] [ 33.732736] The buggy address belongs to the object at fff00000c4081c00 [ 33.732736] which belongs to the cache kmalloc-32 of size 32 [ 33.734170] The buggy address is located 16 bytes inside of [ 33.734170] freed 32-byte region [fff00000c4081c00, fff00000c4081c20) [ 33.735420] [ 33.735845] The buggy address belongs to the physical page: [ 33.736585] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104081 [ 33.737779] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.738491] page_type: f5(slab) [ 33.738918] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 33.739677] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 33.740640] page dumped because: kasan: bad access detected [ 33.741646] [ 33.741998] Memory state around the buggy address: [ 33.743085] fff00000c4081b00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 33.744236] fff00000c4081b80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 33.745334] >fff00000c4081c00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.746141] ^ [ 33.746685] fff00000c4081c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.747482] fff00000c4081d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.748391] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 33.658537] ================================================================== [ 33.659315] BUG: KASAN: slab-use-after-free in kasan_strings+0x858/0x8f8 [ 33.660088] Read of size 1 at addr fff00000c4081c10 by task kunit_try_catch/247 [ 33.660857] [ 33.661398] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 33.662425] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.662923] Hardware name: linux,dummy-virt (DT) [ 33.663575] Call trace: [ 33.663930] show_stack+0x20/0x38 (C) [ 33.664601] dump_stack_lvl+0x8c/0xd0 [ 33.665504] print_report+0x118/0x5e0 [ 33.666105] kasan_report+0xc8/0x118 [ 33.666666] __asan_report_load1_noabort+0x20/0x30 [ 33.667413] kasan_strings+0x858/0x8f8 [ 33.668043] kunit_try_run_case+0x14c/0x3d0 [ 33.668718] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.669710] kthread+0x24c/0x2d0 [ 33.670299] ret_from_fork+0x10/0x20 [ 33.670908] [ 33.671252] Allocated by task 247: [ 33.671810] kasan_save_stack+0x3c/0x68 [ 33.672416] kasan_save_track+0x20/0x40 [ 33.673278] kasan_save_alloc_info+0x40/0x58 [ 33.673854] __kasan_kmalloc+0xd4/0xd8 [ 33.674444] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.675068] kasan_strings+0xb4/0x8f8 [ 33.675673] kunit_try_run_case+0x14c/0x3d0 [ 33.676265] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.677831] kthread+0x24c/0x2d0 [ 33.678204] ret_from_fork+0x10/0x20 [ 33.678926] [ 33.679296] Freed by task 247: [ 33.679723] kasan_save_stack+0x3c/0x68 [ 33.680363] kasan_save_track+0x20/0x40 [ 33.680964] kasan_save_free_info+0x4c/0x78 [ 33.681538] __kasan_slab_free+0x6c/0x98 [ 33.682098] kfree+0x114/0x3c8 [ 33.682840] kasan_strings+0x128/0x8f8 [ 33.683459] kunit_try_run_case+0x14c/0x3d0 [ 33.684133] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.684802] kthread+0x24c/0x2d0 [ 33.685530] ret_from_fork+0x10/0x20 [ 33.686099] [ 33.686496] The buggy address belongs to the object at fff00000c4081c00 [ 33.686496] which belongs to the cache kmalloc-32 of size 32 [ 33.687724] The buggy address is located 16 bytes inside of [ 33.687724] freed 32-byte region [fff00000c4081c00, fff00000c4081c20) [ 33.689234] [ 33.689589] The buggy address belongs to the physical page: [ 33.690216] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104081 [ 33.691175] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.691954] page_type: f5(slab) [ 33.692441] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 33.693404] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 33.694417] page dumped because: kasan: bad access detected [ 33.695065] [ 33.695448] Memory state around the buggy address: [ 33.696046] fff00000c4081b00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 33.697159] fff00000c4081b80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 33.697967] >fff00000c4081c00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.699392] ^ [ 33.699949] fff00000c4081c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.700693] fff00000c4081d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.701497] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 33.611457] ================================================================== [ 33.612751] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 33.613678] Read of size 1 at addr fff00000c4081c10 by task kunit_try_catch/247 [ 33.615461] [ 33.615837] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 33.617432] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.617951] Hardware name: linux,dummy-virt (DT) [ 33.618592] Call trace: [ 33.619009] show_stack+0x20/0x38 (C) [ 33.619609] dump_stack_lvl+0x8c/0xd0 [ 33.620260] print_report+0x118/0x5e0 [ 33.620861] kasan_report+0xc8/0x118 [ 33.621723] __asan_report_load1_noabort+0x20/0x30 [ 33.622239] strcmp+0xc0/0xc8 [ 33.622829] kasan_strings+0x248/0x8f8 [ 33.623403] kunit_try_run_case+0x14c/0x3d0 [ 33.624099] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.624853] kthread+0x24c/0x2d0 [ 33.625459] ret_from_fork+0x10/0x20 [ 33.626241] [ 33.626630] Allocated by task 247: [ 33.627159] kasan_save_stack+0x3c/0x68 [ 33.627809] kasan_save_track+0x20/0x40 [ 33.628458] kasan_save_alloc_info+0x40/0x58 [ 33.629093] __kasan_kmalloc+0xd4/0xd8 [ 33.629891] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.630520] kasan_strings+0xb4/0x8f8 [ 33.631090] kunit_try_run_case+0x14c/0x3d0 [ 33.631735] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.632466] kthread+0x24c/0x2d0 [ 33.633295] ret_from_fork+0x10/0x20 [ 33.633854] [ 33.634171] Freed by task 247: [ 33.634664] kasan_save_stack+0x3c/0x68 [ 33.635750] kasan_save_track+0x20/0x40 [ 33.636406] kasan_save_free_info+0x4c/0x78 [ 33.636924] __kasan_slab_free+0x6c/0x98 [ 33.637509] kfree+0x114/0x3c8 [ 33.637908] kasan_strings+0x128/0x8f8 [ 33.638676] kunit_try_run_case+0x14c/0x3d0 [ 33.639438] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.640083] kthread+0x24c/0x2d0 [ 33.640542] ret_from_fork+0x10/0x20 [ 33.641343] [ 33.641714] The buggy address belongs to the object at fff00000c4081c00 [ 33.641714] which belongs to the cache kmalloc-32 of size 32 [ 33.642873] The buggy address is located 16 bytes inside of [ 33.642873] freed 32-byte region [fff00000c4081c00, fff00000c4081c20) [ 33.643997] [ 33.644436] The buggy address belongs to the physical page: [ 33.645447] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104081 [ 33.646309] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.647087] page_type: f5(slab) [ 33.647600] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 33.648536] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 33.649510] page dumped because: kasan: bad access detected [ 33.650180] [ 33.650559] Memory state around the buggy address: [ 33.651110] fff00000c4081b00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 33.651940] fff00000c4081b80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 33.652745] >fff00000c4081c00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.654272] ^ [ 33.654866] fff00000c4081c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.655660] fff00000c4081d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.656447] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strrchr
[ 33.563934] ================================================================== [ 33.564637] BUG: KASAN: slab-use-after-free in strrchr+0x6c/0x78 [ 33.565694] Read of size 1 at addr fff00000c4081c10 by task kunit_try_catch/247 [ 33.566698] [ 33.567372] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 33.568764] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.569591] Hardware name: linux,dummy-virt (DT) [ 33.570306] Call trace: [ 33.570735] show_stack+0x20/0x38 (C) [ 33.571271] dump_stack_lvl+0x8c/0xd0 [ 33.571910] print_report+0x118/0x5e0 [ 33.572506] kasan_report+0xc8/0x118 [ 33.573359] __asan_report_load1_noabort+0x20/0x30 [ 33.574029] strrchr+0x6c/0x78 [ 33.574613] kasan_strings+0x1e0/0x8f8 [ 33.575234] kunit_try_run_case+0x14c/0x3d0 [ 33.575919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.576679] kthread+0x24c/0x2d0 [ 33.577410] ret_from_fork+0x10/0x20 [ 33.577971] [ 33.578340] Allocated by task 247: [ 33.578870] kasan_save_stack+0x3c/0x68 [ 33.579469] kasan_save_track+0x20/0x40 [ 33.580046] kasan_save_alloc_info+0x40/0x58 [ 33.580749] __kasan_kmalloc+0xd4/0xd8 [ 33.582128] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.582749] kasan_strings+0xb4/0x8f8 [ 33.583353] kunit_try_run_case+0x14c/0x3d0 [ 33.583916] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.584694] kthread+0x24c/0x2d0 [ 33.585543] ret_from_fork+0x10/0x20 [ 33.586104] [ 33.586463] Freed by task 247: [ 33.586909] kasan_save_stack+0x3c/0x68 [ 33.587448] kasan_save_track+0x20/0x40 [ 33.587951] kasan_save_free_info+0x4c/0x78 [ 33.588638] __kasan_slab_free+0x6c/0x98 [ 33.589267] kfree+0x114/0x3c8 [ 33.590151] kasan_strings+0x128/0x8f8 [ 33.590737] kunit_try_run_case+0x14c/0x3d0 [ 33.591367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.592149] kthread+0x24c/0x2d0 [ 33.592646] ret_from_fork+0x10/0x20 [ 33.593530] [ 33.593914] The buggy address belongs to the object at fff00000c4081c00 [ 33.593914] which belongs to the cache kmalloc-32 of size 32 [ 33.595130] The buggy address is located 16 bytes inside of [ 33.595130] freed 32-byte region [fff00000c4081c00, fff00000c4081c20) [ 33.596293] [ 33.596640] The buggy address belongs to the physical page: [ 33.597696] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104081 [ 33.598556] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.599426] page_type: f5(slab) [ 33.599954] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 33.600831] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 33.602438] page dumped because: kasan: bad access detected [ 33.603151] [ 33.603533] Memory state around the buggy address: [ 33.604210] fff00000c4081b00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 33.605015] fff00000c4081b80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 33.605873] >fff00000c4081c00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.606858] ^ [ 33.607319] fff00000c4081c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.607997] fff00000c4081d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.608846] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strchr
[ 33.515448] ================================================================== [ 33.516470] BUG: KASAN: slab-use-after-free in strchr+0xcc/0xd8 [ 33.517497] Read of size 1 at addr fff00000c4081c10 by task kunit_try_catch/247 [ 33.518860] [ 33.519204] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 33.520662] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.521318] Hardware name: linux,dummy-virt (DT) [ 33.521598] Call trace: [ 33.521783] show_stack+0x20/0x38 (C) [ 33.522052] dump_stack_lvl+0x8c/0xd0 [ 33.522341] print_report+0x118/0x5e0 [ 33.522602] kasan_report+0xc8/0x118 [ 33.522857] __asan_report_load1_noabort+0x20/0x30 [ 33.523234] strchr+0xcc/0xd8 [ 33.524919] kasan_strings+0x180/0x8f8 [ 33.526164] kunit_try_run_case+0x14c/0x3d0 [ 33.526825] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.527603] kthread+0x24c/0x2d0 [ 33.527876] ret_from_fork+0x10/0x20 [ 33.528180] [ 33.528608] Allocated by task 247: [ 33.529450] kasan_save_stack+0x3c/0x68 [ 33.530418] kasan_save_track+0x20/0x40 [ 33.531138] kasan_save_alloc_info+0x40/0x58 [ 33.531868] __kasan_kmalloc+0xd4/0xd8 [ 33.532578] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.533483] kasan_strings+0xb4/0x8f8 [ 33.534057] kunit_try_run_case+0x14c/0x3d0 [ 33.534601] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.535565] kthread+0x24c/0x2d0 [ 33.536183] ret_from_fork+0x10/0x20 [ 33.536727] [ 33.537090] Freed by task 247: [ 33.537588] kasan_save_stack+0x3c/0x68 [ 33.538759] kasan_save_track+0x20/0x40 [ 33.539263] kasan_save_free_info+0x4c/0x78 [ 33.539784] __kasan_slab_free+0x6c/0x98 [ 33.540926] kfree+0x114/0x3c8 [ 33.541621] kasan_strings+0x128/0x8f8 [ 33.542316] kunit_try_run_case+0x14c/0x3d0 [ 33.542943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.543659] kthread+0x24c/0x2d0 [ 33.544191] ret_from_fork+0x10/0x20 [ 33.544783] [ 33.545260] The buggy address belongs to the object at fff00000c4081c00 [ 33.545260] which belongs to the cache kmalloc-32 of size 32 [ 33.546373] The buggy address is located 16 bytes inside of [ 33.546373] freed 32-byte region [fff00000c4081c00, fff00000c4081c20) [ 33.547490] [ 33.547879] The buggy address belongs to the physical page: [ 33.548620] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104081 [ 33.549717] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.550626] page_type: f5(slab) [ 33.551163] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 33.552068] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 33.552928] page dumped because: kasan: bad access detected [ 33.553746] [ 33.554049] Memory state around the buggy address: [ 33.554682] fff00000c4081b00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 33.555540] fff00000c4081b80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 33.556419] >fff00000c4081c00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.557258] ^ [ 33.558751] fff00000c4081c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.559669] fff00000c4081d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.560613] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 33.466372] ================================================================== [ 33.467461] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 33.468172] Read of size 1 at addr fff00000c4081ad8 by task kunit_try_catch/245 [ 33.469219] [ 33.469566] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 33.470816] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.471456] Hardware name: linux,dummy-virt (DT) [ 33.472147] Call trace: [ 33.472604] show_stack+0x20/0x38 (C) [ 33.473437] dump_stack_lvl+0x8c/0xd0 [ 33.473934] print_report+0x118/0x5e0 [ 33.474548] kasan_report+0xc8/0x118 [ 33.475052] __asan_report_load1_noabort+0x20/0x30 [ 33.475760] memcmp+0x198/0x1d8 [ 33.476299] kasan_memcmp+0x16c/0x300 [ 33.476842] kunit_try_run_case+0x14c/0x3d0 [ 33.477558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.478246] kthread+0x24c/0x2d0 [ 33.478737] ret_from_fork+0x10/0x20 [ 33.479541] [ 33.480099] Allocated by task 245: [ 33.480659] kasan_save_stack+0x3c/0x68 [ 33.481665] kasan_save_track+0x20/0x40 [ 33.482264] kasan_save_alloc_info+0x40/0x58 [ 33.482845] __kasan_kmalloc+0xd4/0xd8 [ 33.483140] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.483814] kasan_memcmp+0xbc/0x300 [ 33.484499] kunit_try_run_case+0x14c/0x3d0 [ 33.485089] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.486051] kthread+0x24c/0x2d0 [ 33.486591] ret_from_fork+0x10/0x20 [ 33.487180] [ 33.487545] The buggy address belongs to the object at fff00000c4081ac0 [ 33.487545] which belongs to the cache kmalloc-32 of size 32 [ 33.488671] The buggy address is located 0 bytes to the right of [ 33.488671] allocated 24-byte region [fff00000c4081ac0, fff00000c4081ad8) [ 33.490715] [ 33.490994] The buggy address belongs to the physical page: [ 33.491505] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104081 [ 33.492633] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.493806] page_type: f5(slab) [ 33.494533] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 33.495673] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 33.496505] page dumped because: kasan: bad access detected [ 33.497191] [ 33.497574] Memory state around the buggy address: [ 33.498219] fff00000c4081980: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 33.499181] fff00000c4081a00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 33.500154] >fff00000c4081a80: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 33.501287] ^ [ 33.501945] fff00000c4081b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.502762] fff00000c4081b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.503546] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memchr
[ 33.415296] ================================================================== [ 33.416409] BUG: KASAN: slab-out-of-bounds in memchr+0x78/0x88 [ 33.417070] Read of size 1 at addr fff00000c4081998 by task kunit_try_catch/243 [ 33.418562] [ 33.418958] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 33.420537] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.421014] Hardware name: linux,dummy-virt (DT) [ 33.421949] Call trace: [ 33.422549] show_stack+0x20/0x38 (C) [ 33.423297] dump_stack_lvl+0x8c/0xd0 [ 33.423999] print_report+0x118/0x5e0 [ 33.424733] kasan_report+0xc8/0x118 [ 33.425508] __asan_report_load1_noabort+0x20/0x30 [ 33.426329] memchr+0x78/0x88 [ 33.426999] kasan_memchr+0x148/0x2d8 [ 33.427707] kunit_try_run_case+0x14c/0x3d0 [ 33.428282] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.428900] kthread+0x24c/0x2d0 [ 33.429849] ret_from_fork+0x10/0x20 [ 33.430592] [ 33.431097] Allocated by task 243: [ 33.431793] kasan_save_stack+0x3c/0x68 [ 33.432531] kasan_save_track+0x20/0x40 [ 33.433431] kasan_save_alloc_info+0x40/0x58 [ 33.434211] __kasan_kmalloc+0xd4/0xd8 [ 33.434939] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.435693] kasan_memchr+0xb0/0x2d8 [ 33.436435] kunit_try_run_case+0x14c/0x3d0 [ 33.437233] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.437799] kthread+0x24c/0x2d0 [ 33.438224] ret_from_fork+0x10/0x20 [ 33.438934] [ 33.439484] The buggy address belongs to the object at fff00000c4081980 [ 33.439484] which belongs to the cache kmalloc-32 of size 32 [ 33.440585] The buggy address is located 0 bytes to the right of [ 33.440585] allocated 24-byte region [fff00000c4081980, fff00000c4081998) [ 33.442514] [ 33.443021] The buggy address belongs to the physical page: [ 33.443824] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104081 [ 33.444884] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.445964] page_type: f5(slab) [ 33.446390] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 33.446779] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 33.447181] page dumped because: kasan: bad access detected [ 33.447709] [ 33.447997] Memory state around the buggy address: [ 33.448517] fff00000c4081880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.449588] fff00000c4081900: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 33.450396] >fff00000c4081980: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.451091] ^ [ 33.451693] fff00000c4081a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.452469] fff00000c4081a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.453558] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 33.373912] ================================================================== [ 33.375026] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2e4/0x348 [ 33.375912] Read of size 1 at addr ffff800080b67bea by task kunit_try_catch/241 [ 33.376580] [ 33.376989] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 33.378256] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.378818] Hardware name: linux,dummy-virt (DT) [ 33.379458] Call trace: [ 33.379877] show_stack+0x20/0x38 (C) [ 33.380741] dump_stack_lvl+0x8c/0xd0 [ 33.382142] print_report+0x2fc/0x5e0 [ 33.382675] kasan_report+0xc8/0x118 [ 33.383270] __asan_report_load1_noabort+0x20/0x30 [ 33.383940] kasan_alloca_oob_right+0x2e4/0x348 [ 33.384631] kunit_try_run_case+0x14c/0x3d0 [ 33.385226] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.385804] kthread+0x24c/0x2d0 [ 33.386573] ret_from_fork+0x10/0x20 [ 33.387343] [ 33.387852] The buggy address belongs to stack of task kunit_try_catch/241 [ 33.388647] [ 33.389869] The buggy address belongs to the virtual mapping at [ 33.389869] [ffff800080b60000, ffff800080b69000) created by: [ 33.389869] kernel_clone+0x140/0x788 [ 33.391172] [ 33.391521] The buggy address belongs to the physical page: [ 33.392074] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106387 [ 33.393409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.394231] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.395073] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.395882] page dumped because: kasan: bad access detected [ 33.396505] [ 33.396845] Memory state around the buggy address: [ 33.398333] ffff800080b67a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.399130] ffff800080b67b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.399901] >ffff800080b67b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 33.400628] ^ [ 33.401778] ffff800080b67c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 [ 33.402541] ffff800080b67c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 [ 33.403289] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 33.332959] ================================================================== [ 33.334388] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 33.335308] Read of size 1 at addr ffff800080b47bdf by task kunit_try_catch/239 [ 33.336225] [ 33.336626] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 33.338174] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.338665] Hardware name: linux,dummy-virt (DT) [ 33.339330] Call trace: [ 33.339750] show_stack+0x20/0x38 (C) [ 33.340410] dump_stack_lvl+0x8c/0xd0 [ 33.341063] print_report+0x2fc/0x5e0 [ 33.341949] kasan_report+0xc8/0x118 [ 33.342596] __asan_report_load1_noabort+0x20/0x30 [ 33.343295] kasan_alloca_oob_left+0x2b8/0x310 [ 33.343927] kunit_try_run_case+0x14c/0x3d0 [ 33.344548] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.345360] kthread+0x24c/0x2d0 [ 33.346170] ret_from_fork+0x10/0x20 [ 33.346749] [ 33.347150] The buggy address belongs to stack of task kunit_try_catch/239 [ 33.347921] [ 33.348349] The buggy address belongs to the virtual mapping at [ 33.348349] [ffff800080b40000, ffff800080b49000) created by: [ 33.348349] kernel_clone+0x140/0x788 [ 33.350177] [ 33.350434] The buggy address belongs to the physical page: [ 33.350979] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10404d [ 33.352101] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.353223] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.354130] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.355221] page dumped because: kasan: bad access detected [ 33.355951] [ 33.356215] Memory state around the buggy address: [ 33.356720] ffff800080b47a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.358352] ffff800080b47b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.359163] >ffff800080b47b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 33.360012] ^ [ 33.360590] ffff800080b47c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 [ 33.361233] ffff800080b47c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 [ 33.362335] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 33.286339] ================================================================== [ 33.287649] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x230/0x268 [ 33.288506] Read of size 1 at addr ffff800080b47cba by task kunit_try_catch/237 [ 33.289078] [ 33.289436] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 33.290628] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.291104] Hardware name: linux,dummy-virt (DT) [ 33.291957] Call trace: [ 33.293180] show_stack+0x20/0x38 (C) [ 33.294076] dump_stack_lvl+0x8c/0xd0 [ 33.294627] print_report+0x2fc/0x5e0 [ 33.295207] kasan_report+0xc8/0x118 [ 33.295801] __asan_report_load1_noabort+0x20/0x30 [ 33.296458] kasan_stack_oob+0x230/0x268 [ 33.297177] kunit_try_run_case+0x14c/0x3d0 [ 33.298554] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.299328] kthread+0x24c/0x2d0 [ 33.299859] ret_from_fork+0x10/0x20 [ 33.300525] [ 33.301047] The buggy address belongs to stack of task kunit_try_catch/237 [ 33.302301] and is located at offset 138 in frame: [ 33.302847] kasan_stack_oob+0x0/0x268 [ 33.303662] [ 33.304049] This frame has 4 objects: [ 33.304626] [48, 49) '__assertion' [ 33.304836] [64, 72) 'array' [ 33.305556] [96, 112) '__assertion' [ 33.306002] [128, 138) 'stack_array' [ 33.306484] [ 33.307770] The buggy address belongs to the virtual mapping at [ 33.307770] [ffff800080b40000, ffff800080b49000) created by: [ 33.307770] kernel_clone+0x140/0x788 [ 33.309596] [ 33.309971] The buggy address belongs to the physical page: [ 33.310682] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10404d [ 33.311676] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.312650] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.313751] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.315264] page dumped because: kasan: bad access detected [ 33.315895] [ 33.316299] Memory state around the buggy address: [ 33.316938] ffff800080b47b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.317833] ffff800080b47c00: 00 00 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 [ 33.319076] >ffff800080b47c80: f2 f2 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 [ 33.319972] ^ [ 33.320687] ffff800080b47d00: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 [ 33.322304] ffff800080b47d80: f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 [ 33.323075] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 33.238857] ================================================================== [ 33.239931] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 33.240766] Read of size 1 at addr ffffaee4804da06d by task kunit_try_catch/233 [ 33.242026] [ 33.242436] CPU: 1 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 33.243994] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.244676] Hardware name: linux,dummy-virt (DT) [ 33.245246] Call trace: [ 33.245674] show_stack+0x20/0x38 (C) [ 33.246204] dump_stack_lvl+0x8c/0xd0 [ 33.246695] print_report+0x2fc/0x5e0 [ 33.247162] kasan_report+0xc8/0x118 [ 33.247742] __asan_report_load1_noabort+0x20/0x30 [ 33.248577] kasan_global_oob_right+0x230/0x270 [ 33.249704] kunit_try_run_case+0x14c/0x3d0 [ 33.250421] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.251066] kthread+0x24c/0x2d0 [ 33.251617] ret_from_fork+0x10/0x20 [ 33.252309] [ 33.252798] The buggy address belongs to the variable: [ 33.253551] global_array+0xd/0x40 [ 33.254028] [ 33.254516] The buggy address belongs to the virtual mapping at [ 33.254516] [ffffaee47e820000, ffffaee480591000) created by: [ 33.254516] paging_init+0x668/0x7c8 [ 33.256198] [ 33.256874] The buggy address belongs to the physical page: [ 33.257907] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x478da [ 33.258936] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 33.259911] raw: 03fffe0000002000 ffffc1ffc01e3688 ffffc1ffc01e3688 0000000000000000 [ 33.260737] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.262304] page dumped because: kasan: bad access detected [ 33.262931] [ 33.263288] Memory state around the buggy address: [ 33.263937] ffffaee4804d9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.264701] ffffaee4804d9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.265799] >ffffaee4804da000: 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 [ 33.266566] ^ [ 33.267303] ffffaee4804da080: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 [ 33.268090] ffffaee4804da100: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 [ 33.268897] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 33.196044] ================================================================== [ 33.197103] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 33.197880] Free of addr fff00000c653c001 by task kunit_try_catch/231 [ 33.199692] [ 33.200067] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 33.201067] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.201567] Hardware name: linux,dummy-virt (DT) [ 33.202040] Call trace: [ 33.202863] show_stack+0x20/0x38 (C) [ 33.203365] dump_stack_lvl+0x8c/0xd0 [ 33.203967] print_report+0x118/0x5e0 [ 33.204574] kasan_report_invalid_free+0xb0/0xd8 [ 33.205984] __kasan_mempool_poison_object+0xfc/0x150 [ 33.206592] mempool_free+0x28c/0x328 [ 33.207176] mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 33.207877] mempool_kmalloc_large_invalid_free+0xb8/0x110 [ 33.208594] kunit_try_run_case+0x14c/0x3d0 [ 33.209271] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.209914] kthread+0x24c/0x2d0 [ 33.210487] ret_from_fork+0x10/0x20 [ 33.211018] [ 33.211810] The buggy address belongs to the physical page: [ 33.212437] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653c [ 33.214141] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.214939] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.215732] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.216559] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.217694] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.218522] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.219545] head: 0bfffe0000000002 ffffc1ffc3194f01 ffffffffffffffff 0000000000000000 [ 33.220421] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 33.221197] page dumped because: kasan: bad access detected [ 33.221800] [ 33.222150] Memory state around the buggy address: [ 33.222730] fff00000c653bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.223981] fff00000c653bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.224783] >fff00000c653c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.225568] ^ [ 33.226027] fff00000c653c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.227289] fff00000c653c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.228071] ================================================================== [ 33.142041] ================================================================== [ 33.143199] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 33.144002] Free of addr fff00000c6362501 by task kunit_try_catch/229 [ 33.144622] [ 33.145060] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 33.146306] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.147407] Hardware name: linux,dummy-virt (DT) [ 33.147958] Call trace: [ 33.148378] show_stack+0x20/0x38 (C) [ 33.149092] dump_stack_lvl+0x8c/0xd0 [ 33.149660] print_report+0x118/0x5e0 [ 33.150561] kasan_report_invalid_free+0xb0/0xd8 [ 33.151413] check_slab_allocation+0xfc/0x108 [ 33.152141] __kasan_mempool_poison_object+0x78/0x150 [ 33.152955] mempool_free+0x28c/0x328 [ 33.153479] mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 33.155010] mempool_kmalloc_invalid_free+0xb8/0x110 [ 33.155695] kunit_try_run_case+0x14c/0x3d0 [ 33.156317] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.157012] kthread+0x24c/0x2d0 [ 33.157772] ret_from_fork+0x10/0x20 [ 33.159485] [ 33.159859] Allocated by task 229: [ 33.160387] kasan_save_stack+0x3c/0x68 [ 33.160989] kasan_save_track+0x20/0x40 [ 33.161874] kasan_save_alloc_info+0x40/0x58 [ 33.162424] __kasan_mempool_unpoison_object+0x11c/0x180 [ 33.163511] remove_element+0x130/0x1f8 [ 33.163947] mempool_alloc_preallocated+0x58/0xc0 [ 33.164878] mempool_kmalloc_invalid_free_helper+0x94/0x2a0 [ 33.165592] mempool_kmalloc_invalid_free+0xb8/0x110 [ 33.166641] kunit_try_run_case+0x14c/0x3d0 [ 33.167217] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.168149] kthread+0x24c/0x2d0 [ 33.168820] ret_from_fork+0x10/0x20 [ 33.169428] [ 33.170104] The buggy address belongs to the object at fff00000c6362500 [ 33.170104] which belongs to the cache kmalloc-128 of size 128 [ 33.171484] The buggy address is located 1 bytes inside of [ 33.171484] 128-byte region [fff00000c6362500, fff00000c6362580) [ 33.173283] [ 33.173566] The buggy address belongs to the physical page: [ 33.174031] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106362 [ 33.175182] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.175831] page_type: f5(slab) [ 33.176374] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.177239] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 33.178069] page dumped because: kasan: bad access detected [ 33.178739] [ 33.179057] Memory state around the buggy address: [ 33.180405] fff00000c6362400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.181215] fff00000c6362480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.181900] >fff00000c6362500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.183171] ^ [ 33.183616] fff00000c6362580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.184478] fff00000c6362600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.185917] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 32.851785] ================================================================== [ 32.852750] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 32.853811] Read of size 1 at addr fff00000c660c000 by task kunit_try_catch/217 [ 32.854617] [ 32.854999] CPU: 1 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 32.856777] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.857360] Hardware name: linux,dummy-virt (DT) [ 32.858004] Call trace: [ 32.858688] show_stack+0x20/0x38 (C) [ 32.859522] dump_stack_lvl+0x8c/0xd0 [ 32.860077] print_report+0x118/0x5e0 [ 32.860745] kasan_report+0xc8/0x118 [ 32.861604] __asan_report_load1_noabort+0x20/0x30 [ 32.862144] mempool_uaf_helper+0x314/0x340 [ 32.862852] mempool_kmalloc_large_uaf+0xbc/0x118 [ 32.863451] kunit_try_run_case+0x14c/0x3d0 [ 32.864188] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.865041] kthread+0x24c/0x2d0 [ 32.865540] ret_from_fork+0x10/0x20 [ 32.866311] [ 32.866627] The buggy address belongs to the physical page: [ 32.867227] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10660c [ 32.868031] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.868882] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.869699] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.870566] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.871655] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.872687] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.873887] head: 0bfffe0000000002 ffffc1ffc3198301 ffffffffffffffff 0000000000000000 [ 32.874975] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 32.875803] page dumped because: kasan: bad access detected [ 32.876706] [ 32.877287] Memory state around the buggy address: [ 32.878197] fff00000c660bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.878938] fff00000c660bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.879695] >fff00000c660c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.880782] ^ [ 32.882049] fff00000c660c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.882987] fff00000c660c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.883749] ================================================================== [ 32.967177] ================================================================== [ 32.967960] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 32.968762] Read of size 1 at addr fff00000c6610000 by task kunit_try_catch/221 [ 32.969439] [ 32.969803] CPU: 1 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 32.970928] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.971445] Hardware name: linux,dummy-virt (DT) [ 32.972024] Call trace: [ 32.972467] show_stack+0x20/0x38 (C) [ 32.973064] dump_stack_lvl+0x8c/0xd0 [ 32.973575] print_report+0x118/0x5e0 [ 32.974177] kasan_report+0xc8/0x118 [ 32.974753] __asan_report_load1_noabort+0x20/0x30 [ 32.975365] mempool_uaf_helper+0x314/0x340 [ 32.975944] mempool_page_alloc_uaf+0xb8/0x118 [ 32.976616] kunit_try_run_case+0x14c/0x3d0 [ 32.977256] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.977980] kthread+0x24c/0x2d0 [ 32.978545] ret_from_fork+0x10/0x20 [ 32.979058] [ 32.979407] The buggy address belongs to the physical page: [ 32.980063] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106610 [ 32.980997] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.981798] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.982595] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.983432] page dumped because: kasan: bad access detected [ 32.984032] [ 32.984353] Memory state around the buggy address: [ 32.984932] fff00000c660ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.985707] fff00000c660ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.986456] >fff00000c6610000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.987179] ^ [ 32.987621] fff00000c6610080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.988489] fff00000c6610100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.989148] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 32.896223] ================================================================== [ 32.897677] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 32.898760] Read of size 1 at addr fff00000c407e240 by task kunit_try_catch/219 [ 32.899167] [ 32.899487] CPU: 0 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 32.900521] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.901160] Hardware name: linux,dummy-virt (DT) [ 32.902098] Call trace: [ 32.902529] show_stack+0x20/0x38 (C) [ 32.903218] dump_stack_lvl+0x8c/0xd0 [ 32.903827] print_report+0x118/0x5e0 [ 32.904444] kasan_report+0xc8/0x118 [ 32.905298] __asan_report_load1_noabort+0x20/0x30 [ 32.905909] mempool_uaf_helper+0x314/0x340 [ 32.906572] mempool_slab_uaf+0xb8/0x110 [ 32.907169] kunit_try_run_case+0x14c/0x3d0 [ 32.907810] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.908515] kthread+0x24c/0x2d0 [ 32.909133] ret_from_fork+0x10/0x20 [ 32.909883] [ 32.910248] Allocated by task 219: [ 32.910832] kasan_save_stack+0x3c/0x68 [ 32.911436] kasan_save_track+0x20/0x40 [ 32.912023] kasan_save_alloc_info+0x40/0x58 [ 32.912619] __kasan_mempool_unpoison_object+0xbc/0x180 [ 32.913619] remove_element+0x16c/0x1f8 [ 32.914318] mempool_alloc_preallocated+0x58/0xc0 [ 32.914934] mempool_uaf_helper+0xa4/0x340 [ 32.915747] mempool_slab_uaf+0xb8/0x110 [ 32.916255] kunit_try_run_case+0x14c/0x3d0 [ 32.916771] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.918703] kthread+0x24c/0x2d0 [ 32.919267] ret_from_fork+0x10/0x20 [ 32.919821] [ 32.920412] Freed by task 219: [ 32.920890] kasan_save_stack+0x3c/0x68 [ 32.921759] kasan_save_track+0x20/0x40 [ 32.922302] kasan_save_free_info+0x4c/0x78 [ 32.922819] __kasan_mempool_poison_object+0xc0/0x150 [ 32.923633] mempool_free+0x28c/0x328 [ 32.924040] mempool_uaf_helper+0x104/0x340 [ 32.924751] mempool_slab_uaf+0xb8/0x110 [ 32.925677] kunit_try_run_case+0x14c/0x3d0 [ 32.926393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.927199] kthread+0x24c/0x2d0 [ 32.927789] ret_from_fork+0x10/0x20 [ 32.928403] [ 32.928845] The buggy address belongs to the object at fff00000c407e240 [ 32.928845] which belongs to the cache test_cache of size 123 [ 32.930487] The buggy address is located 0 bytes inside of [ 32.930487] freed 123-byte region [fff00000c407e240, fff00000c407e2bb) [ 32.931729] [ 32.932137] The buggy address belongs to the physical page: [ 32.932876] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10407e [ 32.933853] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.934616] page_type: f5(slab) [ 32.935180] raw: 0bfffe0000000000 fff00000c5b9f8c0 dead000000000122 0000000000000000 [ 32.936005] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000 [ 32.936844] page dumped because: kasan: bad access detected [ 32.938019] [ 32.938310] Memory state around the buggy address: [ 32.938940] fff00000c407e100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.939707] fff00000c407e180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.941253] >fff00000c407e200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 32.942330] ^ [ 32.942900] fff00000c407e280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.943641] fff00000c407e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.944657] ================================================================== [ 32.795024] ================================================================== [ 32.796287] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 32.797147] Read of size 1 at addr fff00000c406b300 by task kunit_try_catch/215 [ 32.797888] [ 32.798282] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 32.799401] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.799964] Hardware name: linux,dummy-virt (DT) [ 32.800609] Call trace: [ 32.801235] show_stack+0x20/0x38 (C) [ 32.801838] dump_stack_lvl+0x8c/0xd0 [ 32.802346] print_report+0x118/0x5e0 [ 32.802923] kasan_report+0xc8/0x118 [ 32.803521] __asan_report_load1_noabort+0x20/0x30 [ 32.804162] mempool_uaf_helper+0x314/0x340 [ 32.804802] mempool_kmalloc_uaf+0xbc/0x118 [ 32.805646] kunit_try_run_case+0x14c/0x3d0 [ 32.806319] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.807051] kthread+0x24c/0x2d0 [ 32.807616] ret_from_fork+0x10/0x20 [ 32.808196] [ 32.808513] Allocated by task 215: [ 32.809639] kasan_save_stack+0x3c/0x68 [ 32.810161] kasan_save_track+0x20/0x40 [ 32.810700] kasan_save_alloc_info+0x40/0x58 [ 32.811363] __kasan_mempool_unpoison_object+0x11c/0x180 [ 32.812028] remove_element+0x130/0x1f8 [ 32.812651] mempool_alloc_preallocated+0x58/0xc0 [ 32.813591] mempool_uaf_helper+0xa4/0x340 [ 32.814008] mempool_kmalloc_uaf+0xbc/0x118 [ 32.814638] kunit_try_run_case+0x14c/0x3d0 [ 32.815314] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.815929] kthread+0x24c/0x2d0 [ 32.816513] ret_from_fork+0x10/0x20 [ 32.817232] [ 32.817827] Freed by task 215: [ 32.818181] kasan_save_stack+0x3c/0x68 [ 32.818604] kasan_save_track+0x20/0x40 [ 32.819025] kasan_save_free_info+0x4c/0x78 [ 32.819766] __kasan_mempool_poison_object+0xc0/0x150 [ 32.820994] mempool_free+0x28c/0x328 [ 32.821455] mempool_uaf_helper+0x104/0x340 [ 32.822050] mempool_kmalloc_uaf+0xbc/0x118 [ 32.822608] kunit_try_run_case+0x14c/0x3d0 [ 32.823247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.823991] kthread+0x24c/0x2d0 [ 32.824504] ret_from_fork+0x10/0x20 [ 32.824970] [ 32.825330] The buggy address belongs to the object at fff00000c406b300 [ 32.825330] which belongs to the cache kmalloc-128 of size 128 [ 32.826474] The buggy address is located 0 bytes inside of [ 32.826474] freed 128-byte region [fff00000c406b300, fff00000c406b380) [ 32.827641] [ 32.827977] The buggy address belongs to the physical page: [ 32.828689] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10406b [ 32.829510] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.830210] page_type: f5(slab) [ 32.830729] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.831579] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 32.832434] page dumped because: kasan: bad access detected [ 32.833077] [ 32.833434] Memory state around the buggy address: [ 32.834056] fff00000c406b200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.834778] fff00000c406b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.835575] >fff00000c406b300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.836386] ^ [ 32.836895] fff00000c406b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.837683] fff00000c406b400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.838463] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 32.635884] ================================================================== [ 32.636913] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.638289] Read of size 1 at addr fff00000c6347a73 by task kunit_try_catch/209 [ 32.639453] [ 32.639950] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 32.641467] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.641966] Hardware name: linux,dummy-virt (DT) [ 32.642566] Call trace: [ 32.642893] show_stack+0x20/0x38 (C) [ 32.643491] dump_stack_lvl+0x8c/0xd0 [ 32.644156] print_report+0x118/0x5e0 [ 32.644773] kasan_report+0xc8/0x118 [ 32.645432] __asan_report_load1_noabort+0x20/0x30 [ 32.646187] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.646881] mempool_kmalloc_oob_right+0xbc/0x118 [ 32.647652] kunit_try_run_case+0x14c/0x3d0 [ 32.648379] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.649333] kthread+0x24c/0x2d0 [ 32.650131] ret_from_fork+0x10/0x20 [ 32.650724] [ 32.651038] Allocated by task 209: [ 32.651464] kasan_save_stack+0x3c/0x68 [ 32.652036] kasan_save_track+0x20/0x40 [ 32.652828] kasan_save_alloc_info+0x40/0x58 [ 32.653805] __kasan_mempool_unpoison_object+0x11c/0x180 [ 32.654427] remove_element+0x130/0x1f8 [ 32.654942] mempool_alloc_preallocated+0x58/0xc0 [ 32.655540] mempool_oob_right_helper+0x98/0x2f0 [ 32.656153] mempool_kmalloc_oob_right+0xbc/0x118 [ 32.656794] kunit_try_run_case+0x14c/0x3d0 [ 32.657458] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.658062] kthread+0x24c/0x2d0 [ 32.658595] ret_from_fork+0x10/0x20 [ 32.659038] [ 32.660151] The buggy address belongs to the object at fff00000c6347a00 [ 32.660151] which belongs to the cache kmalloc-128 of size 128 [ 32.661381] The buggy address is located 0 bytes to the right of [ 32.661381] allocated 115-byte region [fff00000c6347a00, fff00000c6347a73) [ 32.662582] [ 32.662932] The buggy address belongs to the physical page: [ 32.663525] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106347 [ 32.664579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.666130] page_type: f5(slab) [ 32.666644] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.667435] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 32.668634] page dumped because: kasan: bad access detected [ 32.669256] [ 32.669953] Memory state around the buggy address: [ 32.670654] fff00000c6347900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.671555] fff00000c6347980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.672332] >fff00000c6347a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.673162] ^ [ 32.674299] fff00000c6347a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.674946] fff00000c6347b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.675846] ================================================================== [ 32.688263] ================================================================== [ 32.689764] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.690728] Read of size 1 at addr fff00000c653a001 by task kunit_try_catch/211 [ 32.692011] [ 32.692408] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 32.693544] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.694220] Hardware name: linux,dummy-virt (DT) [ 32.694796] Call trace: [ 32.695268] show_stack+0x20/0x38 (C) [ 32.695875] dump_stack_lvl+0x8c/0xd0 [ 32.696549] print_report+0x118/0x5e0 [ 32.697404] kasan_report+0xc8/0x118 [ 32.697900] __asan_report_load1_noabort+0x20/0x30 [ 32.698442] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.698955] mempool_kmalloc_large_oob_right+0xbc/0x118 [ 32.699526] kunit_try_run_case+0x14c/0x3d0 [ 32.700392] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.701330] kthread+0x24c/0x2d0 [ 32.701721] ret_from_fork+0x10/0x20 [ 32.702180] [ 32.702415] The buggy address belongs to the physical page: [ 32.702957] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106538 [ 32.704483] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.705678] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.706604] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.707484] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.708358] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.709302] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.710489] head: 0bfffe0000000002 ffffc1ffc3194e01 ffffffffffffffff 0000000000000000 [ 32.711361] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 32.712715] page dumped because: kasan: bad access detected [ 32.713905] [ 32.714306] Memory state around the buggy address: [ 32.715034] fff00000c6539f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.715777] fff00000c6539f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.716547] >fff00000c653a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.717392] ^ [ 32.717902] fff00000c653a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.718615] fff00000c653a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.719446] ================================================================== [ 32.735493] ================================================================== [ 32.736544] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.737248] Read of size 1 at addr fff00000c638c2bb by task kunit_try_catch/213 [ 32.737991] [ 32.738389] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 32.739365] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.740130] Hardware name: linux,dummy-virt (DT) [ 32.740792] Call trace: [ 32.741444] show_stack+0x20/0x38 (C) [ 32.741911] dump_stack_lvl+0x8c/0xd0 [ 32.742429] print_report+0x118/0x5e0 [ 32.743006] kasan_report+0xc8/0x118 [ 32.743514] __asan_report_load1_noabort+0x20/0x30 [ 32.744164] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.744726] mempool_slab_oob_right+0xb8/0x110 [ 32.745784] kunit_try_run_case+0x14c/0x3d0 [ 32.746527] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.747178] kthread+0x24c/0x2d0 [ 32.747761] ret_from_fork+0x10/0x20 [ 32.748377] [ 32.748660] Allocated by task 213: [ 32.749274] kasan_save_stack+0x3c/0x68 [ 32.750150] kasan_save_track+0x20/0x40 [ 32.750744] kasan_save_alloc_info+0x40/0x58 [ 32.751388] __kasan_mempool_unpoison_object+0xbc/0x180 [ 32.752072] remove_element+0x16c/0x1f8 [ 32.752655] mempool_alloc_preallocated+0x58/0xc0 [ 32.753417] mempool_oob_right_helper+0x98/0x2f0 [ 32.754372] mempool_slab_oob_right+0xb8/0x110 [ 32.755165] kunit_try_run_case+0x14c/0x3d0 [ 32.755870] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.756759] kthread+0x24c/0x2d0 [ 32.757502] ret_from_fork+0x10/0x20 [ 32.757894] [ 32.758238] The buggy address belongs to the object at fff00000c638c240 [ 32.758238] which belongs to the cache test_cache of size 123 [ 32.759284] The buggy address is located 0 bytes to the right of [ 32.759284] allocated 123-byte region [fff00000c638c240, fff00000c638c2bb) [ 32.760601] [ 32.760950] The buggy address belongs to the physical page: [ 32.761622] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638c [ 32.762744] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.763597] page_type: f5(slab) [ 32.764152] raw: 0bfffe0000000000 fff00000c5b9f780 dead000000000122 0000000000000000 [ 32.764970] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000 [ 32.765926] page dumped because: kasan: bad access detected [ 32.766601] [ 32.766916] Memory state around the buggy address: [ 32.767519] fff00000c638c180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.768309] fff00000c638c200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 32.769219] >fff00000c638c280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 32.770237] ^ [ 32.770994] fff00000c638c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.771785] fff00000c638c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.772542] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 32.013788] ================================================================== [ 32.014685] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x17c/0x2f8 [ 32.015481] Read of size 1 at addr fff00000c5b7b500 by task kunit_try_catch/203 [ 32.016338] [ 32.016708] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 32.018565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.019093] Hardware name: linux,dummy-virt (DT) [ 32.019639] Call trace: [ 32.019989] show_stack+0x20/0x38 (C) [ 32.020563] dump_stack_lvl+0x8c/0xd0 [ 32.021535] print_report+0x118/0x5e0 [ 32.022405] kasan_report+0xc8/0x118 [ 32.022868] __kasan_check_byte+0x54/0x70 [ 32.023560] kmem_cache_destroy+0x34/0x218 [ 32.024161] kmem_cache_double_destroy+0x17c/0x2f8 [ 32.024834] kunit_try_run_case+0x14c/0x3d0 [ 32.025709] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.027092] kthread+0x24c/0x2d0 [ 32.027752] ret_from_fork+0x10/0x20 [ 32.028382] [ 32.028756] Allocated by task 203: [ 32.029293] kasan_save_stack+0x3c/0x68 [ 32.030224] kasan_save_track+0x20/0x40 [ 32.031197] kasan_save_alloc_info+0x40/0x58 [ 32.031910] __kasan_slab_alloc+0xa8/0xb0 [ 32.032655] kmem_cache_alloc_noprof+0x108/0x398 [ 32.034209] __kmem_cache_create_args+0x18c/0x2b0 [ 32.034809] kmem_cache_double_destroy+0xc8/0x2f8 [ 32.035416] kunit_try_run_case+0x14c/0x3d0 [ 32.035929] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.036645] kthread+0x24c/0x2d0 [ 32.037086] ret_from_fork+0x10/0x20 [ 32.038197] [ 32.038697] Freed by task 203: [ 32.039101] kasan_save_stack+0x3c/0x68 [ 32.039938] kasan_save_track+0x20/0x40 [ 32.040485] kasan_save_free_info+0x4c/0x78 [ 32.041660] __kasan_slab_free+0x6c/0x98 [ 32.042632] kmem_cache_free+0x118/0x470 [ 32.043238] slab_kmem_cache_release+0x38/0x50 [ 32.043760] kmem_cache_release+0x1c/0x30 [ 32.044427] kobject_put+0x17c/0x430 [ 32.045717] sysfs_slab_release+0x1c/0x30 [ 32.046319] kmem_cache_destroy+0x118/0x218 [ 32.046839] kmem_cache_double_destroy+0x130/0x2f8 [ 32.047431] kunit_try_run_case+0x14c/0x3d0 [ 32.048019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.048674] kthread+0x24c/0x2d0 [ 32.049481] ret_from_fork+0x10/0x20 [ 32.050015] [ 32.050339] The buggy address belongs to the object at fff00000c5b7b500 [ 32.050339] which belongs to the cache kmem_cache of size 208 [ 32.051858] The buggy address is located 0 bytes inside of [ 32.051858] freed 208-byte region [fff00000c5b7b500, fff00000c5b7b5d0) [ 32.053977] [ 32.054278] The buggy address belongs to the physical page: [ 32.055042] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7b [ 32.055987] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.056890] page_type: f5(slab) [ 32.058092] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 32.059043] raw: 0000000000000000 00000000800c000c 00000001f5000000 0000000000000000 [ 32.059922] page dumped because: kasan: bad access detected [ 32.060555] [ 32.060847] Memory state around the buggy address: [ 32.061495] fff00000c5b7b400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.062155] fff00000c5b7b480: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.063016] >fff00000c5b7b500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.064234] ^ [ 32.064706] fff00000c5b7b580: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 32.066326] fff00000c5b7b600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.067075] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 31.894024] ================================================================== [ 31.894936] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x390/0x468 [ 31.895771] Read of size 1 at addr fff00000c4074000 by task kunit_try_catch/201 [ 31.896421] [ 31.896790] CPU: 1 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 31.897704] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.898457] Hardware name: linux,dummy-virt (DT) [ 31.899037] Call trace: [ 31.899464] show_stack+0x20/0x38 (C) [ 31.899935] dump_stack_lvl+0x8c/0xd0 [ 31.900531] print_report+0x118/0x5e0 [ 31.901161] kasan_report+0xc8/0x118 [ 31.902169] __asan_report_load1_noabort+0x20/0x30 [ 31.902847] kmem_cache_rcu_uaf+0x390/0x468 [ 31.903384] kunit_try_run_case+0x14c/0x3d0 [ 31.903983] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.904663] kthread+0x24c/0x2d0 [ 31.905289] ret_from_fork+0x10/0x20 [ 31.905877] [ 31.906192] Allocated by task 201: [ 31.906684] kasan_save_stack+0x3c/0x68 [ 31.907235] kasan_save_track+0x20/0x40 [ 31.907816] kasan_save_alloc_info+0x40/0x58 [ 31.908428] __kasan_slab_alloc+0xa8/0xb0 [ 31.909047] kmem_cache_alloc_noprof+0x108/0x398 [ 31.909743] kmem_cache_rcu_uaf+0x12c/0x468 [ 31.910437] kunit_try_run_case+0x14c/0x3d0 [ 31.910993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.911646] kthread+0x24c/0x2d0 [ 31.912199] ret_from_fork+0x10/0x20 [ 31.912692] [ 31.913328] Freed by task 0: [ 31.913778] kasan_save_stack+0x3c/0x68 [ 31.914344] kasan_save_track+0x20/0x40 [ 31.914813] kasan_save_free_info+0x4c/0x78 [ 31.915446] __kasan_slab_free+0x6c/0x98 [ 31.915982] slab_free_after_rcu_debug+0xd4/0x2f8 [ 31.916577] rcu_core+0x9f4/0x1e20 [ 31.917735] rcu_core_si+0x18/0x30 [ 31.918269] handle_softirqs+0x374/0xb20 [ 31.918793] __do_softirq+0x1c/0x28 [ 31.919251] [ 31.919601] Last potentially related work creation: [ 31.920228] kasan_save_stack+0x3c/0x68 [ 31.920822] __kasan_record_aux_stack+0xbc/0xe8 [ 31.921647] kasan_record_aux_stack_noalloc+0x14/0x20 [ 31.922247] kmem_cache_free+0x28c/0x470 [ 31.922830] kmem_cache_rcu_uaf+0x16c/0x468 [ 31.923483] kunit_try_run_case+0x14c/0x3d0 [ 31.924104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.924774] kthread+0x24c/0x2d0 [ 31.925596] ret_from_fork+0x10/0x20 [ 31.926125] [ 31.926474] The buggy address belongs to the object at fff00000c4074000 [ 31.926474] which belongs to the cache test_cache of size 200 [ 31.927543] The buggy address is located 0 bytes inside of [ 31.927543] freed 200-byte region [fff00000c4074000, fff00000c40740c8) [ 31.928696] [ 31.929352] The buggy address belongs to the physical page: [ 31.929997] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104074 [ 31.930940] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.931670] page_type: f5(slab) [ 31.932232] raw: 0bfffe0000000000 fff00000c5b7b3c0 dead000000000122 0000000000000000 [ 31.933441] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000 [ 31.934148] page dumped because: kasan: bad access detected [ 31.934832] [ 31.935159] Memory state around the buggy address: [ 31.935778] fff00000c4073f00: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc [ 31.936533] fff00000c4073f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.937350] >fff00000c4074000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.938488] ^ [ 31.938859] fff00000c4074080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 31.939699] fff00000c4074100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.940400] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 31.768833] ================================================================== [ 31.769891] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3b8 [ 31.770622] Free of addr fff00000c406f001 by task kunit_try_catch/199 [ 31.771270] [ 31.771672] CPU: 0 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 31.772870] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.773705] Hardware name: linux,dummy-virt (DT) [ 31.774366] Call trace: [ 31.774822] show_stack+0x20/0x38 (C) [ 31.775437] dump_stack_lvl+0x8c/0xd0 [ 31.776047] print_report+0x118/0x5e0 [ 31.776711] kasan_report_invalid_free+0xb0/0xd8 [ 31.777612] check_slab_allocation+0xfc/0x108 [ 31.778239] __kasan_slab_pre_free+0x2c/0x48 [ 31.778883] kmem_cache_free+0xf0/0x470 [ 31.779453] kmem_cache_invalid_free+0x184/0x3b8 [ 31.780029] kunit_try_run_case+0x14c/0x3d0 [ 31.780632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.781353] kthread+0x24c/0x2d0 [ 31.782129] ret_from_fork+0x10/0x20 [ 31.782649] [ 31.782960] Allocated by task 199: [ 31.783432] kasan_save_stack+0x3c/0x68 [ 31.783969] kasan_save_track+0x20/0x40 [ 31.784470] kasan_save_alloc_info+0x40/0x58 [ 31.785008] __kasan_slab_alloc+0xa8/0xb0 [ 31.785671] kmem_cache_alloc_noprof+0x108/0x398 [ 31.786352] kmem_cache_invalid_free+0x12c/0x3b8 [ 31.787024] kunit_try_run_case+0x14c/0x3d0 [ 31.787699] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.788468] kthread+0x24c/0x2d0 [ 31.788972] ret_from_fork+0x10/0x20 [ 31.789748] [ 31.790493] The buggy address belongs to the object at fff00000c406f000 [ 31.790493] which belongs to the cache test_cache of size 200 [ 31.791498] The buggy address is located 1 bytes inside of [ 31.791498] 200-byte region [fff00000c406f000, fff00000c406f0c8) [ 31.792692] [ 31.793069] The buggy address belongs to the physical page: [ 31.794193] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10406f [ 31.795072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.795847] page_type: f5(slab) [ 31.796364] raw: 0bfffe0000000000 fff00000ffeca000 dead000000000122 0000000000000000 [ 31.797250] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000 [ 31.798133] page dumped because: kasan: bad access detected [ 31.798847] [ 31.799210] Memory state around the buggy address: [ 31.799886] fff00000c406ef00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.800676] fff00000c406ef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.801881] >fff00000c406f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.802668] ^ [ 31.803202] fff00000c406f080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 31.803955] fff00000c406f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.804636] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 31.702659] ================================================================== [ 31.703454] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 31.704244] Free of addr fff00000c4074000 by task kunit_try_catch/197 [ 31.704984] [ 31.705506] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 31.707158] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.707773] Hardware name: linux,dummy-virt (DT) [ 31.708411] Call trace: [ 31.708876] show_stack+0x20/0x38 (C) [ 31.709841] dump_stack_lvl+0x8c/0xd0 [ 31.710433] print_report+0x118/0x5e0 [ 31.711004] kasan_report_invalid_free+0xb0/0xd8 [ 31.711668] check_slab_allocation+0xd4/0x108 [ 31.712304] __kasan_slab_pre_free+0x2c/0x48 [ 31.713041] kmem_cache_free+0xf0/0x470 [ 31.713840] kmem_cache_double_free+0x190/0x3c8 [ 31.714574] kunit_try_run_case+0x14c/0x3d0 [ 31.715140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.715794] kthread+0x24c/0x2d0 [ 31.716254] ret_from_fork+0x10/0x20 [ 31.716848] [ 31.717214] Allocated by task 197: [ 31.717609] kasan_save_stack+0x3c/0x68 [ 31.718239] kasan_save_track+0x20/0x40 [ 31.718742] kasan_save_alloc_info+0x40/0x58 [ 31.719381] __kasan_slab_alloc+0xa8/0xb0 [ 31.719944] kmem_cache_alloc_noprof+0x108/0x398 [ 31.720488] kmem_cache_double_free+0x12c/0x3c8 [ 31.721626] kunit_try_run_case+0x14c/0x3d0 [ 31.722245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.722882] kthread+0x24c/0x2d0 [ 31.723384] ret_from_fork+0x10/0x20 [ 31.723839] [ 31.724204] Freed by task 197: [ 31.724671] kasan_save_stack+0x3c/0x68 [ 31.725662] kasan_save_track+0x20/0x40 [ 31.726255] kasan_save_free_info+0x4c/0x78 [ 31.726802] __kasan_slab_free+0x6c/0x98 [ 31.727324] kmem_cache_free+0x118/0x470 [ 31.727878] kmem_cache_double_free+0x140/0x3c8 [ 31.728403] kunit_try_run_case+0x14c/0x3d0 [ 31.729366] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.730004] kthread+0x24c/0x2d0 [ 31.730464] ret_from_fork+0x10/0x20 [ 31.730994] [ 31.731367] The buggy address belongs to the object at fff00000c4074000 [ 31.731367] which belongs to the cache test_cache of size 200 [ 31.732510] The buggy address is located 0 bytes inside of [ 31.732510] 200-byte region [fff00000c4074000, fff00000c40740c8) [ 31.733897] [ 31.734244] The buggy address belongs to the physical page: [ 31.734861] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104074 [ 31.735842] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.736673] page_type: f5(slab) [ 31.737634] raw: 0bfffe0000000000 fff00000c5b7b280 dead000000000122 0000000000000000 [ 31.738445] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000 [ 31.739234] page dumped because: kasan: bad access detected [ 31.739806] [ 31.740166] Memory state around the buggy address: [ 31.740799] fff00000c4073f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.741969] fff00000c4073f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.742742] >fff00000c4074000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.743501] ^ [ 31.744009] fff00000c4074080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 31.744771] fff00000c4074100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.745904] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 31.623439] ================================================================== [ 31.624401] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x33c/0x428 [ 31.625229] Read of size 1 at addr fff00000c40660c8 by task kunit_try_catch/195 [ 31.625924] [ 31.626317] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 31.627369] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.627823] Hardware name: linux,dummy-virt (DT) [ 31.628458] Call trace: [ 31.628865] show_stack+0x20/0x38 (C) [ 31.630570] dump_stack_lvl+0x8c/0xd0 [ 31.631069] print_report+0x118/0x5e0 [ 31.631682] kasan_report+0xc8/0x118 [ 31.632244] __asan_report_load1_noabort+0x20/0x30 [ 31.632885] kmem_cache_oob+0x33c/0x428 [ 31.633878] kunit_try_run_case+0x14c/0x3d0 [ 31.634463] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.635209] kthread+0x24c/0x2d0 [ 31.635737] ret_from_fork+0x10/0x20 [ 31.636307] [ 31.636597] Allocated by task 195: [ 31.638032] kasan_save_stack+0x3c/0x68 [ 31.638503] kasan_save_track+0x20/0x40 [ 31.639059] kasan_save_alloc_info+0x40/0x58 [ 31.639661] __kasan_slab_alloc+0xa8/0xb0 [ 31.640241] kmem_cache_alloc_noprof+0x108/0x398 [ 31.640784] kmem_cache_oob+0x12c/0x428 [ 31.641820] kunit_try_run_case+0x14c/0x3d0 [ 31.642447] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.643184] kthread+0x24c/0x2d0 [ 31.643689] ret_from_fork+0x10/0x20 [ 31.644159] [ 31.644513] The buggy address belongs to the object at fff00000c4066000 [ 31.644513] which belongs to the cache test_cache of size 200 [ 31.646049] The buggy address is located 0 bytes to the right of [ 31.646049] allocated 200-byte region [fff00000c4066000, fff00000c40660c8) [ 31.647416] [ 31.647768] The buggy address belongs to the physical page: [ 31.648393] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104066 [ 31.649194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.649994] page_type: f5(slab) [ 31.650847] raw: 0bfffe0000000000 fff00000c5b7b140 dead000000000122 0000000000000000 [ 31.651765] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000 [ 31.652608] page dumped because: kasan: bad access detected [ 31.653994] [ 31.654319] Memory state around the buggy address: [ 31.655059] fff00000c4065f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.656020] fff00000c4066000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.656940] >fff00000c4066080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 31.658005] ^ [ 31.658840] fff00000c4066100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.659591] fff00000c4066180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.660602] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 31.542980] ================================================================== [ 31.543918] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 31.545564] Read of size 8 at addr fff00000c63af680 by task kunit_try_catch/188 [ 31.546442] [ 31.546810] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 31.548039] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.548509] Hardware name: linux,dummy-virt (DT) [ 31.549679] Call trace: [ 31.550221] show_stack+0x20/0x38 (C) [ 31.550827] dump_stack_lvl+0x8c/0xd0 [ 31.551433] print_report+0x118/0x5e0 [ 31.552043] kasan_report+0xc8/0x118 [ 31.552665] __asan_report_load8_noabort+0x20/0x30 [ 31.553371] workqueue_uaf+0x480/0x4a8 [ 31.554153] kunit_try_run_case+0x14c/0x3d0 [ 31.554794] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.555565] kthread+0x24c/0x2d0 [ 31.556104] ret_from_fork+0x10/0x20 [ 31.556727] [ 31.557347] Allocated by task 188: [ 31.557824] kasan_save_stack+0x3c/0x68 [ 31.558433] kasan_save_track+0x20/0x40 [ 31.558985] kasan_save_alloc_info+0x40/0x58 [ 31.559508] __kasan_kmalloc+0xd4/0xd8 [ 31.560084] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.560651] workqueue_uaf+0x13c/0x4a8 [ 31.561565] kunit_try_run_case+0x14c/0x3d0 [ 31.562236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.562807] kthread+0x24c/0x2d0 [ 31.563351] ret_from_fork+0x10/0x20 [ 31.563867] [ 31.564210] Freed by task 8: [ 31.564614] kasan_save_stack+0x3c/0x68 [ 31.565552] kasan_save_track+0x20/0x40 [ 31.566232] kasan_save_free_info+0x4c/0x78 [ 31.567095] __kasan_slab_free+0x6c/0x98 [ 31.567602] kfree+0x114/0x3c8 [ 31.568070] workqueue_uaf_work+0x18/0x30 [ 31.568627] process_one_work+0x530/0xf98 [ 31.569237] worker_thread+0x614/0xf28 [ 31.570185] kthread+0x24c/0x2d0 [ 31.570809] ret_from_fork+0x10/0x20 [ 31.571497] [ 31.571839] Last potentially related work creation: [ 31.572415] kasan_save_stack+0x3c/0x68 [ 31.572907] __kasan_record_aux_stack+0xbc/0xe8 [ 31.573756] kasan_record_aux_stack_noalloc+0x14/0x20 [ 31.574643] __queue_work+0x65c/0xfd8 [ 31.575342] queue_work_on+0xbc/0xf8 [ 31.575835] workqueue_uaf+0x210/0x4a8 [ 31.576351] kunit_try_run_case+0x14c/0x3d0 [ 31.576978] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.577685] kthread+0x24c/0x2d0 [ 31.578162] ret_from_fork+0x10/0x20 [ 31.578644] [ 31.578979] The buggy address belongs to the object at fff00000c63af680 [ 31.578979] which belongs to the cache kmalloc-32 of size 32 [ 31.580613] The buggy address is located 0 bytes inside of [ 31.580613] freed 32-byte region [fff00000c63af680, fff00000c63af6a0) [ 31.582218] [ 31.582564] The buggy address belongs to the physical page: [ 31.583169] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063af [ 31.584101] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.584861] page_type: f5(slab) [ 31.585812] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 31.586628] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 31.587437] page dumped because: kasan: bad access detected [ 31.587986] [ 31.588343] Memory state around the buggy address: [ 31.589380] fff00000c63af580: 00 00 00 fc fc fc fc fc 00 00 03 fc fc fc fc fc [ 31.590203] fff00000c63af600: 00 00 07 fc fc fc fc fc 00 00 00 07 fc fc fc fc [ 31.590953] >fff00000c63af680: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 31.591784] ^ [ 31.592244] fff00000c63af700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.593603] fff00000c63af780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.594266] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 31.457446] ================================================================== [ 31.458657] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 31.459490] Read of size 4 at addr fff00000c405e4c0 by task swapper/1/0 [ 31.460146] [ 31.460580] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B N 6.12.0-next-20241128 #1 [ 31.462288] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.462829] Hardware name: linux,dummy-virt (DT) [ 31.463431] Call trace: [ 31.463827] show_stack+0x20/0x38 (C) [ 31.464439] dump_stack_lvl+0x8c/0xd0 [ 31.465012] print_report+0x118/0x5e0 [ 31.465619] kasan_report+0xc8/0x118 [ 31.466580] __asan_report_load4_noabort+0x20/0x30 [ 31.467327] rcu_uaf_reclaim+0x64/0x70 [ 31.467956] rcu_core+0x9f4/0x1e20 [ 31.468474] rcu_core_si+0x18/0x30 [ 31.469062] handle_softirqs+0x374/0xb20 [ 31.470289] __do_softirq+0x1c/0x28 [ 31.470891] ____do_softirq+0x18/0x30 [ 31.471439] call_on_irq_stack+0x24/0x58 [ 31.472094] do_softirq_own_stack+0x24/0x38 [ 31.472669] __irq_exit_rcu+0x1fc/0x318 [ 31.473321] irq_exit_rcu+0x1c/0x80 [ 31.473873] el1_interrupt+0x38/0x58 [ 31.474912] el1h_64_irq_handler+0x18/0x28 [ 31.475532] el1h_64_irq+0x6c/0x70 [ 31.476370] arch_local_irq_enable+0x4/0x8 (P) [ 31.477070] default_idle_call+0x6c/0x78 (L) [ 31.477649] do_idle+0x384/0x4e8 [ 31.478270] cpu_startup_entry+0x64/0x80 [ 31.479399] secondary_start_kernel+0x288/0x340 [ 31.480139] __secondary_switched+0xc0/0xc8 [ 31.480804] [ 31.481589] Allocated by task 186: [ 31.482091] kasan_save_stack+0x3c/0x68 [ 31.482744] kasan_save_track+0x20/0x40 [ 31.483252] kasan_save_alloc_info+0x40/0x58 [ 31.483823] __kasan_kmalloc+0xd4/0xd8 [ 31.484392] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.485053] rcu_uaf+0xb0/0x2d0 [ 31.485527] kunit_try_run_case+0x14c/0x3d0 [ 31.486085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.487329] kthread+0x24c/0x2d0 [ 31.487891] ret_from_fork+0x10/0x20 [ 31.488504] [ 31.488861] Freed by task 0: [ 31.489816] kasan_save_stack+0x3c/0x68 [ 31.490444] kasan_save_track+0x20/0x40 [ 31.490960] kasan_save_free_info+0x4c/0x78 [ 31.491699] __kasan_slab_free+0x6c/0x98 [ 31.492238] kfree+0x114/0x3c8 [ 31.492762] rcu_uaf_reclaim+0x28/0x70 [ 31.493767] rcu_core+0x9f4/0x1e20 [ 31.494248] rcu_core_si+0x18/0x30 [ 31.494835] handle_softirqs+0x374/0xb20 [ 31.495490] __do_softirq+0x1c/0x28 [ 31.496077] [ 31.496486] Last potentially related work creation: [ 31.497240] kasan_save_stack+0x3c/0x68 [ 31.498057] __kasan_record_aux_stack+0xbc/0xe8 [ 31.498996] kasan_record_aux_stack_noalloc+0x14/0x20 [ 31.499767] __call_rcu_common.constprop.0+0x74/0xa10 [ 31.500465] call_rcu+0x18/0x30 [ 31.501720] rcu_uaf+0x14c/0x2d0 [ 31.502227] kunit_try_run_case+0x14c/0x3d0 [ 31.502854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.503494] kthread+0x24c/0x2d0 [ 31.504078] ret_from_fork+0x10/0x20 [ 31.504719] [ 31.505394] The buggy address belongs to the object at fff00000c405e4c0 [ 31.505394] which belongs to the cache kmalloc-32 of size 32 [ 31.506752] The buggy address is located 0 bytes inside of [ 31.506752] freed 32-byte region [fff00000c405e4c0, fff00000c405e4e0) [ 31.507878] [ 31.508236] The buggy address belongs to the physical page: [ 31.509152] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10405e [ 31.510722] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.511569] page_type: f5(slab) [ 31.512198] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 31.513222] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 31.514229] page dumped because: kasan: bad access detected [ 31.515161] [ 31.515485] Memory state around the buggy address: [ 31.516173] fff00000c405e380: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 31.516955] fff00000c405e400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 31.517748] >fff00000c405e480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 31.518468] ^ [ 31.519263] fff00000c405e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.520237] fff00000c405e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.520917] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 31.293651] ================================================================== [ 31.294744] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x600 [ 31.295427] Read of size 1 at addr fff00000c403f400 by task kunit_try_catch/184 [ 31.296682] [ 31.297760] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 31.298737] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.299281] Hardware name: linux,dummy-virt (DT) [ 31.300102] Call trace: [ 31.300695] show_stack+0x20/0x38 (C) [ 31.301606] dump_stack_lvl+0x8c/0xd0 [ 31.302232] print_report+0x118/0x5e0 [ 31.303010] kasan_report+0xc8/0x118 [ 31.303728] __kasan_check_byte+0x54/0x70 [ 31.304457] ksize+0x30/0x88 [ 31.304956] ksize_uaf+0x168/0x600 [ 31.305819] kunit_try_run_case+0x14c/0x3d0 [ 31.306589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.307462] kthread+0x24c/0x2d0 [ 31.308180] ret_from_fork+0x10/0x20 [ 31.308906] [ 31.309551] Allocated by task 184: [ 31.310221] kasan_save_stack+0x3c/0x68 [ 31.310954] kasan_save_track+0x20/0x40 [ 31.311650] kasan_save_alloc_info+0x40/0x58 [ 31.312381] __kasan_kmalloc+0xd4/0xd8 [ 31.312881] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.313468] ksize_uaf+0xb8/0x600 [ 31.313921] kunit_try_run_case+0x14c/0x3d0 [ 31.315042] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.315700] kthread+0x24c/0x2d0 [ 31.316147] ret_from_fork+0x10/0x20 [ 31.316708] [ 31.316989] Freed by task 184: [ 31.317937] kasan_save_stack+0x3c/0x68 [ 31.318479] kasan_save_track+0x20/0x40 [ 31.319050] kasan_save_free_info+0x4c/0x78 [ 31.319593] __kasan_slab_free+0x6c/0x98 [ 31.320195] kfree+0x114/0x3c8 [ 31.320713] ksize_uaf+0x11c/0x600 [ 31.321467] kunit_try_run_case+0x14c/0x3d0 [ 31.322061] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.322733] kthread+0x24c/0x2d0 [ 31.323284] ret_from_fork+0x10/0x20 [ 31.323811] [ 31.324172] The buggy address belongs to the object at fff00000c403f400 [ 31.324172] which belongs to the cache kmalloc-128 of size 128 [ 31.325533] The buggy address is located 0 bytes inside of [ 31.325533] freed 128-byte region [fff00000c403f400, fff00000c403f480) [ 31.326693] [ 31.327034] The buggy address belongs to the physical page: [ 31.327608] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10403f [ 31.328397] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.329459] page_type: f5(slab) [ 31.329989] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.330745] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 31.331626] page dumped because: kasan: bad access detected [ 31.332229] [ 31.332575] Memory state around the buggy address: [ 31.333441] fff00000c403f300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.334241] fff00000c403f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.335032] >fff00000c403f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.335746] ^ [ 31.336269] fff00000c403f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.337262] fff00000c403f500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.338069] ================================================================== [ 31.341407] ================================================================== [ 31.342270] BUG: KASAN: slab-use-after-free in ksize_uaf+0x59c/0x600 [ 31.343011] Read of size 1 at addr fff00000c403f400 by task kunit_try_catch/184 [ 31.344025] [ 31.344373] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 31.345836] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.346412] Hardware name: linux,dummy-virt (DT) [ 31.346975] Call trace: [ 31.347332] show_stack+0x20/0x38 (C) [ 31.347929] dump_stack_lvl+0x8c/0xd0 [ 31.348445] print_report+0x118/0x5e0 [ 31.349420] kasan_report+0xc8/0x118 [ 31.350076] __asan_report_load1_noabort+0x20/0x30 [ 31.350776] ksize_uaf+0x59c/0x600 [ 31.351353] kunit_try_run_case+0x14c/0x3d0 [ 31.351968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.352729] kthread+0x24c/0x2d0 [ 31.353586] ret_from_fork+0x10/0x20 [ 31.354162] [ 31.354403] Allocated by task 184: [ 31.354950] kasan_save_stack+0x3c/0x68 [ 31.355538] kasan_save_track+0x20/0x40 [ 31.356033] kasan_save_alloc_info+0x40/0x58 [ 31.356575] __kasan_kmalloc+0xd4/0xd8 [ 31.357392] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.358030] ksize_uaf+0xb8/0x600 [ 31.358562] kunit_try_run_case+0x14c/0x3d0 [ 31.359184] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.359838] kthread+0x24c/0x2d0 [ 31.360397] ret_from_fork+0x10/0x20 [ 31.360938] [ 31.361766] Freed by task 184: [ 31.362290] kasan_save_stack+0x3c/0x68 [ 31.362777] kasan_save_track+0x20/0x40 [ 31.363365] kasan_save_free_info+0x4c/0x78 [ 31.363905] __kasan_slab_free+0x6c/0x98 [ 31.364455] kfree+0x114/0x3c8 [ 31.364903] ksize_uaf+0x11c/0x600 [ 31.365666] kunit_try_run_case+0x14c/0x3d0 [ 31.366293] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.366920] kthread+0x24c/0x2d0 [ 31.368049] ret_from_fork+0x10/0x20 [ 31.368578] [ 31.368911] The buggy address belongs to the object at fff00000c403f400 [ 31.368911] which belongs to the cache kmalloc-128 of size 128 [ 31.370233] The buggy address is located 0 bytes inside of [ 31.370233] freed 128-byte region [fff00000c403f400, fff00000c403f480) [ 31.371361] [ 31.371699] The buggy address belongs to the physical page: [ 31.372398] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10403f [ 31.373518] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.374324] page_type: f5(slab) [ 31.374842] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.375650] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 31.376439] page dumped because: kasan: bad access detected [ 31.377335] [ 31.377789] Memory state around the buggy address: [ 31.378362] fff00000c403f300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.379222] fff00000c403f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.380139] >fff00000c403f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.381023] ^ [ 31.381592] fff00000c403f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.382652] fff00000c403f500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.383405] ================================================================== [ 31.386460] ================================================================== [ 31.387161] BUG: KASAN: slab-use-after-free in ksize_uaf+0x548/0x600 [ 31.388057] Read of size 1 at addr fff00000c403f478 by task kunit_try_catch/184 [ 31.388647] [ 31.389556] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 31.390632] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.391180] Hardware name: linux,dummy-virt (DT) [ 31.391730] Call trace: [ 31.392078] show_stack+0x20/0x38 (C) [ 31.392598] dump_stack_lvl+0x8c/0xd0 [ 31.393403] print_report+0x118/0x5e0 [ 31.393964] kasan_report+0xc8/0x118 [ 31.394642] __asan_report_load1_noabort+0x20/0x30 [ 31.395395] ksize_uaf+0x548/0x600 [ 31.395927] kunit_try_run_case+0x14c/0x3d0 [ 31.396617] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.397611] kthread+0x24c/0x2d0 [ 31.398171] ret_from_fork+0x10/0x20 [ 31.398736] [ 31.399134] Allocated by task 184: [ 31.399670] kasan_save_stack+0x3c/0x68 [ 31.400233] kasan_save_track+0x20/0x40 [ 31.400847] kasan_save_alloc_info+0x40/0x58 [ 31.401746] __kasan_kmalloc+0xd4/0xd8 [ 31.402307] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.402927] ksize_uaf+0xb8/0x600 [ 31.403451] kunit_try_run_case+0x14c/0x3d0 [ 31.403999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.404765] kthread+0x24c/0x2d0 [ 31.405561] ret_from_fork+0x10/0x20 [ 31.406103] [ 31.406497] Freed by task 184: [ 31.407014] kasan_save_stack+0x3c/0x68 [ 31.407548] kasan_save_track+0x20/0x40 [ 31.408177] kasan_save_free_info+0x4c/0x78 [ 31.408769] __kasan_slab_free+0x6c/0x98 [ 31.410437] kfree+0x114/0x3c8 [ 31.411223] ksize_uaf+0x11c/0x600 [ 31.411761] kunit_try_run_case+0x14c/0x3d0 [ 31.412433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.413074] kthread+0x24c/0x2d0 [ 31.413823] ret_from_fork+0x10/0x20 [ 31.414508] [ 31.414849] The buggy address belongs to the object at fff00000c403f400 [ 31.414849] which belongs to the cache kmalloc-128 of size 128 [ 31.416134] The buggy address is located 120 bytes inside of [ 31.416134] freed 128-byte region [fff00000c403f400, fff00000c403f480) [ 31.417721] [ 31.418071] The buggy address belongs to the physical page: [ 31.418808] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10403f [ 31.419714] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.420567] page_type: f5(slab) [ 31.421063] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.422294] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 31.423071] page dumped because: kasan: bad access detected [ 31.423793] [ 31.424190] Memory state around the buggy address: [ 31.424831] fff00000c403f300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.425838] fff00000c403f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.426722] >fff00000c403f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.427482] ^ [ 31.428393] fff00000c403f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.429721] fff00000c403f500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.430463] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 31.201411] ================================================================== [ 31.202007] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750 [ 31.202876] Read of size 1 at addr fff00000c403f378 by task kunit_try_catch/182 [ 31.203742] [ 31.204143] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 31.205222] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.205826] Hardware name: linux,dummy-virt (DT) [ 31.206529] Call trace: [ 31.207038] show_stack+0x20/0x38 (C) [ 31.207674] dump_stack_lvl+0x8c/0xd0 [ 31.208341] print_report+0x118/0x5e0 [ 31.208970] kasan_report+0xc8/0x118 [ 31.209619] __asan_report_load1_noabort+0x20/0x30 [ 31.210316] ksize_unpoisons_memory+0x628/0x750 [ 31.211023] kunit_try_run_case+0x14c/0x3d0 [ 31.211668] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.212466] kthread+0x24c/0x2d0 [ 31.213316] ret_from_fork+0x10/0x20 [ 31.213801] [ 31.214194] Allocated by task 182: [ 31.214709] kasan_save_stack+0x3c/0x68 [ 31.215289] kasan_save_track+0x20/0x40 [ 31.215868] kasan_save_alloc_info+0x40/0x58 [ 31.216510] __kasan_kmalloc+0xd4/0xd8 [ 31.217389] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.218175] ksize_unpoisons_memory+0xc0/0x750 [ 31.218737] kunit_try_run_case+0x14c/0x3d0 [ 31.219303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.219949] kthread+0x24c/0x2d0 [ 31.220503] ret_from_fork+0x10/0x20 [ 31.221081] [ 31.221844] The buggy address belongs to the object at fff00000c403f300 [ 31.221844] which belongs to the cache kmalloc-128 of size 128 [ 31.222750] The buggy address is located 5 bytes to the right of [ 31.222750] allocated 115-byte region [fff00000c403f300, fff00000c403f373) [ 31.224103] [ 31.224477] The buggy address belongs to the physical page: [ 31.225108] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10403f [ 31.226194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.226970] page_type: f5(slab) [ 31.227456] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.228366] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 31.229371] page dumped because: kasan: bad access detected [ 31.230074] [ 31.230445] Memory state around the buggy address: [ 31.231144] fff00000c403f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 31.232033] fff00000c403f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.232818] >fff00000c403f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.233935] ^ [ 31.234722] fff00000c403f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.235757] fff00000c403f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.236744] ================================================================== [ 31.238597] ================================================================== [ 31.239686] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750 [ 31.240470] Read of size 1 at addr fff00000c403f37f by task kunit_try_catch/182 [ 31.241822] [ 31.242158] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 31.244719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.245994] Hardware name: linux,dummy-virt (DT) [ 31.246916] Call trace: [ 31.247311] show_stack+0x20/0x38 (C) [ 31.247834] dump_stack_lvl+0x8c/0xd0 [ 31.248704] print_report+0x118/0x5e0 [ 31.249950] kasan_report+0xc8/0x118 [ 31.252135] __asan_report_load1_noabort+0x20/0x30 [ 31.253504] ksize_unpoisons_memory+0x6a0/0x750 [ 31.254018] kunit_try_run_case+0x14c/0x3d0 [ 31.255653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.256735] kthread+0x24c/0x2d0 [ 31.258178] ret_from_fork+0x10/0x20 [ 31.258583] [ 31.258814] Allocated by task 182: [ 31.259166] kasan_save_stack+0x3c/0x68 [ 31.259605] kasan_save_track+0x20/0x40 [ 31.261068] kasan_save_alloc_info+0x40/0x58 [ 31.261789] __kasan_kmalloc+0xd4/0xd8 [ 31.263130] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.264184] ksize_unpoisons_memory+0xc0/0x750 [ 31.264743] kunit_try_run_case+0x14c/0x3d0 [ 31.265537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.266190] kthread+0x24c/0x2d0 [ 31.266724] ret_from_fork+0x10/0x20 [ 31.267367] [ 31.267736] The buggy address belongs to the object at fff00000c403f300 [ 31.267736] which belongs to the cache kmalloc-128 of size 128 [ 31.268895] The buggy address is located 12 bytes to the right of [ 31.268895] allocated 115-byte region [fff00000c403f300, fff00000c403f373) [ 31.270424] [ 31.270715] The buggy address belongs to the physical page: [ 31.271405] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10403f [ 31.272295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.273259] page_type: f5(slab) [ 31.273791] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.274595] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 31.275507] page dumped because: kasan: bad access detected [ 31.276099] [ 31.276465] Memory state around the buggy address: [ 31.277358] fff00000c403f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 31.278132] fff00000c403f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.278984] >fff00000c403f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.279667] ^ [ 31.280501] fff00000c403f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.281327] fff00000c403f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.282042] ================================================================== [ 31.160436] ================================================================== [ 31.161793] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750 [ 31.162607] Read of size 1 at addr fff00000c403f373 by task kunit_try_catch/182 [ 31.163372] [ 31.163795] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 31.165285] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.165872] Hardware name: linux,dummy-virt (DT) [ 31.166426] Call trace: [ 31.166887] show_stack+0x20/0x38 (C) [ 31.167514] dump_stack_lvl+0x8c/0xd0 [ 31.168167] print_report+0x118/0x5e0 [ 31.168747] kasan_report+0xc8/0x118 [ 31.169560] __asan_report_load1_noabort+0x20/0x30 [ 31.170259] ksize_unpoisons_memory+0x638/0x750 [ 31.170906] kunit_try_run_case+0x14c/0x3d0 [ 31.171555] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.172332] kthread+0x24c/0x2d0 [ 31.172874] ret_from_fork+0x10/0x20 [ 31.173685] [ 31.174067] Allocated by task 182: [ 31.174563] kasan_save_stack+0x3c/0x68 [ 31.174973] kasan_save_track+0x20/0x40 [ 31.175696] kasan_save_alloc_info+0x40/0x58 [ 31.176378] __kasan_kmalloc+0xd4/0xd8 [ 31.176904] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.177792] ksize_unpoisons_memory+0xc0/0x750 [ 31.178412] kunit_try_run_case+0x14c/0x3d0 [ 31.179005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.179753] kthread+0x24c/0x2d0 [ 31.180287] ret_from_fork+0x10/0x20 [ 31.180803] [ 31.182277] The buggy address belongs to the object at fff00000c403f300 [ 31.182277] which belongs to the cache kmalloc-128 of size 128 [ 31.183483] The buggy address is located 0 bytes to the right of [ 31.183483] allocated 115-byte region [fff00000c403f300, fff00000c403f373) [ 31.184751] [ 31.185175] The buggy address belongs to the physical page: [ 31.185735] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10403f [ 31.186898] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.187765] page_type: f5(slab) [ 31.188545] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.189598] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 31.190498] page dumped because: kasan: bad access detected [ 31.191165] [ 31.191535] Memory state around the buggy address: [ 31.192144] fff00000c403f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 31.192933] fff00000c403f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.194097] >fff00000c403f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.195039] ^ [ 31.195804] fff00000c403f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.196833] fff00000c403f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.197919] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[ 31.104338] ================================================================== [ 31.105217] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 31.105948] Free of addr fff00000c5d76c80 by task kunit_try_catch/180 [ 31.106561] [ 31.106931] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 31.108256] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.108818] Hardware name: linux,dummy-virt (DT) [ 31.109610] Call trace: [ 31.110030] show_stack+0x20/0x38 (C) [ 31.110561] dump_stack_lvl+0x8c/0xd0 [ 31.111193] print_report+0x118/0x5e0 [ 31.111684] kasan_report_invalid_free+0xb0/0xd8 [ 31.112382] check_slab_allocation+0xd4/0x108 [ 31.113200] __kasan_slab_pre_free+0x2c/0x48 [ 31.113842] kfree+0xe8/0x3c8 [ 31.114387] kfree_sensitive+0x3c/0xb0 [ 31.114982] kmalloc_double_kzfree+0x168/0x308 [ 31.115645] kunit_try_run_case+0x14c/0x3d0 [ 31.116271] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.117274] kthread+0x24c/0x2d0 [ 31.117772] ret_from_fork+0x10/0x20 [ 31.118330] [ 31.118641] Allocated by task 180: [ 31.119164] kasan_save_stack+0x3c/0x68 [ 31.119670] kasan_save_track+0x20/0x40 [ 31.120251] kasan_save_alloc_info+0x40/0x58 [ 31.120748] __kasan_kmalloc+0xd4/0xd8 [ 31.122194] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.123218] kmalloc_double_kzfree+0xb8/0x308 [ 31.123962] kunit_try_run_case+0x14c/0x3d0 [ 31.124538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.125658] kthread+0x24c/0x2d0 [ 31.125909] ret_from_fork+0x10/0x20 [ 31.126181] [ 31.126461] Freed by task 180: [ 31.126955] kasan_save_stack+0x3c/0x68 [ 31.127589] kasan_save_track+0x20/0x40 [ 31.128050] kasan_save_free_info+0x4c/0x78 [ 31.128728] __kasan_slab_free+0x6c/0x98 [ 31.129570] kfree+0x114/0x3c8 [ 31.130085] kfree_sensitive+0x80/0xb0 [ 31.130597] kmalloc_double_kzfree+0x11c/0x308 [ 31.131380] kunit_try_run_case+0x14c/0x3d0 [ 31.132027] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.132682] kthread+0x24c/0x2d0 [ 31.133467] ret_from_fork+0x10/0x20 [ 31.134042] [ 31.134435] The buggy address belongs to the object at fff00000c5d76c80 [ 31.134435] which belongs to the cache kmalloc-16 of size 16 [ 31.135661] The buggy address is located 0 bytes inside of [ 31.135661] 16-byte region [fff00000c5d76c80, fff00000c5d76c90) [ 31.136790] [ 31.137223] The buggy address belongs to the physical page: [ 31.138212] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d76 [ 31.139145] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.139925] page_type: f5(slab) [ 31.140461] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 31.141597] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 31.142334] page dumped because: kasan: bad access detected [ 31.142893] [ 31.143289] Memory state around the buggy address: [ 31.143907] fff00000c5d76b80: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 31.144803] fff00000c5d76c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.145854] >fff00000c5d76c80: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.146723] ^ [ 31.147424] fff00000c5d76d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.148382] fff00000c5d76d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.149547] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 31.058715] ================================================================== [ 31.060028] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 31.060755] Read of size 1 at addr fff00000c5d76c80 by task kunit_try_catch/180 [ 31.061927] [ 31.062306] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 31.063285] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.063980] Hardware name: linux,dummy-virt (DT) [ 31.064460] Call trace: [ 31.064806] show_stack+0x20/0x38 (C) [ 31.065574] dump_stack_lvl+0x8c/0xd0 [ 31.066276] print_report+0x118/0x5e0 [ 31.066937] kasan_report+0xc8/0x118 [ 31.067497] __kasan_check_byte+0x54/0x70 [ 31.068210] kfree_sensitive+0x30/0xb0 [ 31.068863] kmalloc_double_kzfree+0x168/0x308 [ 31.069654] kunit_try_run_case+0x14c/0x3d0 [ 31.070336] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.071106] kthread+0x24c/0x2d0 [ 31.071753] ret_from_fork+0x10/0x20 [ 31.072268] [ 31.072615] Allocated by task 180: [ 31.073127] kasan_save_stack+0x3c/0x68 [ 31.073635] kasan_save_track+0x20/0x40 [ 31.074145] kasan_save_alloc_info+0x40/0x58 [ 31.074764] __kasan_kmalloc+0xd4/0xd8 [ 31.075326] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.075890] kmalloc_double_kzfree+0xb8/0x308 [ 31.076607] kunit_try_run_case+0x14c/0x3d0 [ 31.077474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.078132] kthread+0x24c/0x2d0 [ 31.078664] ret_from_fork+0x10/0x20 [ 31.079214] [ 31.079530] Freed by task 180: [ 31.079914] kasan_save_stack+0x3c/0x68 [ 31.080506] kasan_save_track+0x20/0x40 [ 31.081914] kasan_save_free_info+0x4c/0x78 [ 31.082431] __kasan_slab_free+0x6c/0x98 [ 31.083011] kfree+0x114/0x3c8 [ 31.083528] kfree_sensitive+0x80/0xb0 [ 31.084059] kmalloc_double_kzfree+0x11c/0x308 [ 31.084943] kunit_try_run_case+0x14c/0x3d0 [ 31.085505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.086047] kthread+0x24c/0x2d0 [ 31.086851] ret_from_fork+0x10/0x20 [ 31.087315] [ 31.087688] The buggy address belongs to the object at fff00000c5d76c80 [ 31.087688] which belongs to the cache kmalloc-16 of size 16 [ 31.088855] The buggy address is located 0 bytes inside of [ 31.088855] freed 16-byte region [fff00000c5d76c80, fff00000c5d76c90) [ 31.090254] [ 31.090595] The buggy address belongs to the physical page: [ 31.091281] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d76 [ 31.092073] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.092810] page_type: f5(slab) [ 31.093545] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 31.094390] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 31.095185] page dumped because: kasan: bad access detected [ 31.095801] [ 31.096157] Memory state around the buggy address: [ 31.096682] fff00000c5d76b80: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 31.097795] fff00000c5d76c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.098557] >fff00000c5d76c80: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.099525] ^ [ 31.100021] fff00000c5d76d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.100871] fff00000c5d76d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.102452] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob
[ 30.440351] ================================================================== [ 30.441531] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 30.442301] Write of size 16 at addr fff00000c4005e20 by task kunit_try_catch/154 [ 30.442673] [ 30.442844] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 30.443468] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.443879] Hardware name: linux,dummy-virt (DT) [ 30.444367] Call trace: [ 30.444691] show_stack+0x20/0x38 (C) [ 30.445173] dump_stack_lvl+0x8c/0xd0 [ 30.445793] print_report+0x118/0x5e0 [ 30.446428] kasan_report+0xc8/0x118 [ 30.447043] __asan_report_store16_noabort+0x20/0x30 [ 30.447798] kmalloc_oob_16+0x3a0/0x3f8 [ 30.448454] kunit_try_run_case+0x14c/0x3d0 [ 30.449143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.449843] kthread+0x24c/0x2d0 [ 30.450337] ret_from_fork+0x10/0x20 [ 30.450868] [ 30.451208] Allocated by task 154: [ 30.451606] kasan_save_stack+0x3c/0x68 [ 30.452202] kasan_save_track+0x20/0x40 [ 30.452728] kasan_save_alloc_info+0x40/0x58 [ 30.453276] __kasan_kmalloc+0xd4/0xd8 [ 30.453751] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.454247] kmalloc_oob_16+0xb4/0x3f8 [ 30.454683] kunit_try_run_case+0x14c/0x3d0 [ 30.455164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.455688] kthread+0x24c/0x2d0 [ 30.456103] ret_from_fork+0x10/0x20 [ 30.456557] [ 30.456841] The buggy address belongs to the object at fff00000c4005e20 [ 30.456841] which belongs to the cache kmalloc-16 of size 16 [ 30.457747] The buggy address is located 0 bytes inside of [ 30.457747] allocated 13-byte region [fff00000c4005e20, fff00000c4005e2d) [ 30.459144] [ 30.459479] The buggy address belongs to the physical page: [ 30.460213] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 30.461044] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.461828] page_type: f5(slab) [ 30.462331] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 30.463228] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 30.464045] page dumped because: kasan: bad access detected [ 30.464694] [ 30.465050] Memory state around the buggy address: [ 30.465628] fff00000c4005d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.466435] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 30.467270] >fff00000c4005e00: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc [ 30.468100] ^ [ 30.468670] fff00000c4005e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.469494] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.470293] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 30.939734] ================================================================== [ 30.940767] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 30.941566] Write of size 33 at addr fff00000c63ae900 by task kunit_try_catch/174 [ 30.942422] [ 30.942828] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 30.944429] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.945088] Hardware name: linux,dummy-virt (DT) [ 30.945710] Call trace: [ 30.946264] show_stack+0x20/0x38 (C) [ 30.946936] dump_stack_lvl+0x8c/0xd0 [ 30.947610] print_report+0x118/0x5e0 [ 30.948218] kasan_report+0xc8/0x118 [ 30.948758] kasan_check_range+0x100/0x1a8 [ 30.949694] __asan_memset+0x34/0x78 [ 30.950273] kmalloc_uaf_memset+0x170/0x310 [ 30.950920] kunit_try_run_case+0x14c/0x3d0 [ 30.951486] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.952161] kthread+0x24c/0x2d0 [ 30.952754] ret_from_fork+0x10/0x20 [ 30.953810] [ 30.954270] Allocated by task 174: [ 30.954837] kasan_save_stack+0x3c/0x68 [ 30.955476] kasan_save_track+0x20/0x40 [ 30.956085] kasan_save_alloc_info+0x40/0x58 [ 30.956757] __kasan_kmalloc+0xd4/0xd8 [ 30.957376] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.958372] kmalloc_uaf_memset+0xb8/0x310 [ 30.959129] kunit_try_run_case+0x14c/0x3d0 [ 30.959676] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.960355] kthread+0x24c/0x2d0 [ 30.960896] ret_from_fork+0x10/0x20 [ 30.961956] [ 30.962485] Freed by task 174: [ 30.963089] kasan_save_stack+0x3c/0x68 [ 30.963614] kasan_save_track+0x20/0x40 [ 30.964536] kasan_save_free_info+0x4c/0x78 [ 30.965052] __kasan_slab_free+0x6c/0x98 [ 30.965826] kfree+0x114/0x3c8 [ 30.966536] kmalloc_uaf_memset+0x11c/0x310 [ 30.967063] kunit_try_run_case+0x14c/0x3d0 [ 30.967881] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.968723] kthread+0x24c/0x2d0 [ 30.969715] ret_from_fork+0x10/0x20 [ 30.970423] [ 30.970767] The buggy address belongs to the object at fff00000c63ae900 [ 30.970767] which belongs to the cache kmalloc-64 of size 64 [ 30.972237] The buggy address is located 0 bytes inside of [ 30.972237] freed 64-byte region [fff00000c63ae900, fff00000c63ae940) [ 30.973946] [ 30.974311] The buggy address belongs to the physical page: [ 30.974903] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ae [ 30.975759] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.976816] page_type: f5(slab) [ 30.977647] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.978493] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.979234] page dumped because: kasan: bad access detected [ 30.979905] [ 30.980251] Memory state around the buggy address: [ 30.980886] fff00000c63ae800: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.981705] fff00000c63ae880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.982654] >fff00000c63ae900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.983643] ^ [ 30.983879] fff00000c63ae980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.984677] fff00000c63aea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.985811] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 30.830888] ================================================================== [ 30.832014] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e8 [ 30.832869] Read of size 64 at addr fff00000c6352a04 by task kunit_try_catch/170 [ 30.834496] [ 30.834972] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 30.835875] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.836152] Hardware name: linux,dummy-virt (DT) [ 30.836668] Call trace: [ 30.837183] show_stack+0x20/0x38 (C) [ 30.838300] dump_stack_lvl+0x8c/0xd0 [ 30.838921] print_report+0x118/0x5e0 [ 30.839496] kasan_report+0xc8/0x118 [ 30.840174] kasan_check_range+0x100/0x1a8 [ 30.840764] __asan_memmove+0x3c/0x98 [ 30.841863] kmalloc_memmove_invalid_size+0x154/0x2e8 [ 30.842670] kunit_try_run_case+0x14c/0x3d0 [ 30.843387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.844173] kthread+0x24c/0x2d0 [ 30.844826] ret_from_fork+0x10/0x20 [ 30.845647] [ 30.846506] Allocated by task 170: [ 30.846916] kasan_save_stack+0x3c/0x68 [ 30.847464] kasan_save_track+0x20/0x40 [ 30.847974] kasan_save_alloc_info+0x40/0x58 [ 30.848625] __kasan_kmalloc+0xd4/0xd8 [ 30.849313] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.849813] kmalloc_memmove_invalid_size+0xb0/0x2e8 [ 30.850555] kunit_try_run_case+0x14c/0x3d0 [ 30.851236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.851972] kthread+0x24c/0x2d0 [ 30.852449] ret_from_fork+0x10/0x20 [ 30.853004] [ 30.853887] The buggy address belongs to the object at fff00000c6352a00 [ 30.853887] which belongs to the cache kmalloc-64 of size 64 [ 30.855860] The buggy address is located 4 bytes inside of [ 30.855860] allocated 64-byte region [fff00000c6352a00, fff00000c6352a40) [ 30.857757] [ 30.858032] The buggy address belongs to the physical page: [ 30.858727] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106352 [ 30.859582] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.860448] page_type: f5(slab) [ 30.861062] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.862018] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.862707] page dumped because: kasan: bad access detected [ 30.863447] [ 30.863884] Memory state around the buggy address: [ 30.864561] fff00000c6352900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.865471] fff00000c6352980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.866836] >fff00000c6352a00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.867388] ^ [ 30.867698] fff00000c6352a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.868043] fff00000c6352b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.868989] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 30.778607] ================================================================== [ 30.779685] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 30.780451] Read of size 18446744073709551614 at addr fff00000c6352984 by task kunit_try_catch/168 [ 30.781901] [ 30.782261] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 30.783151] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.783671] Hardware name: linux,dummy-virt (DT) [ 30.784252] Call trace: [ 30.784707] show_stack+0x20/0x38 (C) [ 30.785557] dump_stack_lvl+0x8c/0xd0 [ 30.786185] print_report+0x118/0x5e0 [ 30.787041] kasan_report+0xc8/0x118 [ 30.787906] kasan_check_range+0x100/0x1a8 [ 30.788585] __asan_memmove+0x3c/0x98 [ 30.789169] kmalloc_memmove_negative_size+0x154/0x2e0 [ 30.790208] kunit_try_run_case+0x14c/0x3d0 [ 30.790898] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.791671] kthread+0x24c/0x2d0 [ 30.792233] ret_from_fork+0x10/0x20 [ 30.792836] [ 30.793221] Allocated by task 168: [ 30.793735] kasan_save_stack+0x3c/0x68 [ 30.794272] kasan_save_track+0x20/0x40 [ 30.795407] kasan_save_alloc_info+0x40/0x58 [ 30.795997] __kasan_kmalloc+0xd4/0xd8 [ 30.796680] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.797420] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 30.798445] kunit_try_run_case+0x14c/0x3d0 [ 30.799133] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.799967] kthread+0x24c/0x2d0 [ 30.800461] ret_from_fork+0x10/0x20 [ 30.800937] [ 30.801260] The buggy address belongs to the object at fff00000c6352980 [ 30.801260] which belongs to the cache kmalloc-64 of size 64 [ 30.802928] The buggy address is located 4 bytes inside of [ 30.802928] 64-byte region [fff00000c6352980, fff00000c63529c0) [ 30.804938] [ 30.805295] The buggy address belongs to the physical page: [ 30.806492] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106352 [ 30.807502] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.808442] page_type: f5(slab) [ 30.809304] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.810007] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.810814] page dumped because: kasan: bad access detected [ 30.812210] [ 30.812578] Memory state around the buggy address: [ 30.813771] fff00000c6352880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.814524] fff00000c6352900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.815463] >fff00000c6352980: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.816187] ^ [ 30.816665] fff00000c6352a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.817700] fff00000c6352a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.818652] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset
[ 30.580329] ================================================================== [ 30.581923] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 30.582620] Write of size 2 at addr fff00000c5b58b77 by task kunit_try_catch/160 [ 30.583402] [ 30.583776] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 30.584803] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.585339] Hardware name: linux,dummy-virt (DT) [ 30.585945] Call trace: [ 30.586384] show_stack+0x20/0x38 (C) [ 30.586887] dump_stack_lvl+0x8c/0xd0 [ 30.587570] print_report+0x118/0x5e0 [ 30.588176] kasan_report+0xc8/0x118 [ 30.588710] kasan_check_range+0x100/0x1a8 [ 30.589591] __asan_memset+0x34/0x78 [ 30.590167] kmalloc_oob_memset_2+0x150/0x2f8 [ 30.590704] kunit_try_run_case+0x14c/0x3d0 [ 30.591364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.592095] kthread+0x24c/0x2d0 [ 30.592628] ret_from_fork+0x10/0x20 [ 30.593503] [ 30.593837] Allocated by task 160: [ 30.594352] kasan_save_stack+0x3c/0x68 [ 30.594858] kasan_save_track+0x20/0x40 [ 30.595437] kasan_save_alloc_info+0x40/0x58 [ 30.595917] __kasan_kmalloc+0xd4/0xd8 [ 30.596504] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.597471] kmalloc_oob_memset_2+0xb0/0x2f8 [ 30.597908] kunit_try_run_case+0x14c/0x3d0 [ 30.598542] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.599164] kthread+0x24c/0x2d0 [ 30.599700] ret_from_fork+0x10/0x20 [ 30.600198] [ 30.600550] The buggy address belongs to the object at fff00000c5b58b00 [ 30.600550] which belongs to the cache kmalloc-128 of size 128 [ 30.602003] The buggy address is located 119 bytes inside of [ 30.602003] allocated 120-byte region [fff00000c5b58b00, fff00000c5b58b78) [ 30.603193] [ 30.603511] The buggy address belongs to the physical page: [ 30.604200] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b58 [ 30.605237] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.606049] page_type: f5(slab) [ 30.606582] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.607300] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.608214] page dumped because: kasan: bad access detected [ 30.608848] [ 30.609439] Memory state around the buggy address: [ 30.610004] fff00000c5b58a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 30.610826] fff00000c5b58a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.611598] >fff00000c5b58b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.612430] ^ [ 30.613348] fff00000c5b58b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.614145] fff00000c5b58c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.614837] ================================================================== [ 30.628646] ================================================================== [ 30.630318] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 30.631011] Write of size 4 at addr fff00000c638e775 by task kunit_try_catch/162 [ 30.631809] [ 30.632168] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 30.633073] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.634134] Hardware name: linux,dummy-virt (DT) [ 30.634711] Call trace: [ 30.635157] show_stack+0x20/0x38 (C) [ 30.635738] dump_stack_lvl+0x8c/0xd0 [ 30.636280] print_report+0x118/0x5e0 [ 30.636870] kasan_report+0xc8/0x118 [ 30.637492] kasan_check_range+0x100/0x1a8 [ 30.638077] __asan_memset+0x34/0x78 [ 30.639233] kmalloc_oob_memset_4+0x150/0x300 [ 30.639795] kunit_try_run_case+0x14c/0x3d0 [ 30.640390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.641296] kthread+0x24c/0x2d0 [ 30.642087] ret_from_fork+0x10/0x20 [ 30.642612] [ 30.642954] Allocated by task 162: [ 30.643486] kasan_save_stack+0x3c/0x68 [ 30.644071] kasan_save_track+0x20/0x40 [ 30.644564] kasan_save_alloc_info+0x40/0x58 [ 30.645457] __kasan_kmalloc+0xd4/0xd8 [ 30.645955] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.646489] kmalloc_oob_memset_4+0xb0/0x300 [ 30.647108] kunit_try_run_case+0x14c/0x3d0 [ 30.648387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.648990] kthread+0x24c/0x2d0 [ 30.649701] ret_from_fork+0x10/0x20 [ 30.650435] [ 30.650778] The buggy address belongs to the object at fff00000c638e700 [ 30.650778] which belongs to the cache kmalloc-128 of size 128 [ 30.651870] The buggy address is located 117 bytes inside of [ 30.651870] allocated 120-byte region [fff00000c638e700, fff00000c638e778) [ 30.653018] [ 30.653343] The buggy address belongs to the physical page: [ 30.654007] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638e [ 30.654941] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.656411] page_type: f5(slab) [ 30.657133] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.658066] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.659100] page dumped because: kasan: bad access detected [ 30.659782] [ 30.660411] Memory state around the buggy address: [ 30.661544] fff00000c638e600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 30.662158] fff00000c638e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.662854] >fff00000c638e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.663841] ^ [ 30.664769] fff00000c638e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.665736] fff00000c638e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.666480] ================================================================== [ 30.677708] ================================================================== [ 30.678866] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 30.679724] Write of size 8 at addr fff00000c638e971 by task kunit_try_catch/164 [ 30.680561] [ 30.681013] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 30.682066] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.682538] Hardware name: linux,dummy-virt (DT) [ 30.683039] Call trace: [ 30.683982] show_stack+0x20/0x38 (C) [ 30.684549] dump_stack_lvl+0x8c/0xd0 [ 30.685044] print_report+0x118/0x5e0 [ 30.685594] kasan_report+0xc8/0x118 [ 30.686086] kasan_check_range+0x100/0x1a8 [ 30.687249] __asan_memset+0x34/0x78 [ 30.687938] kmalloc_oob_memset_8+0x150/0x2f8 [ 30.688680] kunit_try_run_case+0x14c/0x3d0 [ 30.689653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.690442] kthread+0x24c/0x2d0 [ 30.691091] ret_from_fork+0x10/0x20 [ 30.691743] [ 30.692127] Allocated by task 164: [ 30.692700] kasan_save_stack+0x3c/0x68 [ 30.693528] kasan_save_track+0x20/0x40 [ 30.694412] kasan_save_alloc_info+0x40/0x58 [ 30.695086] __kasan_kmalloc+0xd4/0xd8 [ 30.695692] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.696409] kmalloc_oob_memset_8+0xb0/0x2f8 [ 30.697032] kunit_try_run_case+0x14c/0x3d0 [ 30.697600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.698612] kthread+0x24c/0x2d0 [ 30.699263] ret_from_fork+0x10/0x20 [ 30.699877] [ 30.700319] The buggy address belongs to the object at fff00000c638e900 [ 30.700319] which belongs to the cache kmalloc-128 of size 128 [ 30.701995] The buggy address is located 113 bytes inside of [ 30.701995] allocated 120-byte region [fff00000c638e900, fff00000c638e978) [ 30.703338] [ 30.703753] The buggy address belongs to the physical page: [ 30.704538] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638e [ 30.705556] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.706626] page_type: f5(slab) [ 30.707166] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.708082] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.708957] page dumped because: kasan: bad access detected [ 30.709946] [ 30.710272] Memory state around the buggy address: [ 30.710824] fff00000c638e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 30.711628] fff00000c638e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.712347] >fff00000c638e900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.713509] ^ [ 30.714386] fff00000c638e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.715233] fff00000c638ea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.716045] ================================================================== [ 30.728475] ================================================================== [ 30.729513] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 30.730646] Write of size 16 at addr fff00000c638ea69 by task kunit_try_catch/166 [ 30.731531] [ 30.732504] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 30.734110] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.734855] Hardware name: linux,dummy-virt (DT) [ 30.735619] Call trace: [ 30.736226] show_stack+0x20/0x38 (C) [ 30.736956] dump_stack_lvl+0x8c/0xd0 [ 30.738063] print_report+0x118/0x5e0 [ 30.738610] kasan_report+0xc8/0x118 [ 30.739270] kasan_check_range+0x100/0x1a8 [ 30.739880] __asan_memset+0x34/0x78 [ 30.740489] kmalloc_oob_memset_16+0x150/0x2f8 [ 30.741156] kunit_try_run_case+0x14c/0x3d0 [ 30.741890] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.742675] kthread+0x24c/0x2d0 [ 30.743248] ret_from_fork+0x10/0x20 [ 30.743866] [ 30.744216] Allocated by task 166: [ 30.744642] kasan_save_stack+0x3c/0x68 [ 30.745343] kasan_save_track+0x20/0x40 [ 30.746107] kasan_save_alloc_info+0x40/0x58 [ 30.746730] __kasan_kmalloc+0xd4/0xd8 [ 30.747309] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.747979] kmalloc_oob_memset_16+0xb0/0x2f8 [ 30.748915] kunit_try_run_case+0x14c/0x3d0 [ 30.749915] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.750692] kthread+0x24c/0x2d0 [ 30.751279] ret_from_fork+0x10/0x20 [ 30.751869] [ 30.752222] The buggy address belongs to the object at fff00000c638ea00 [ 30.752222] which belongs to the cache kmalloc-128 of size 128 [ 30.754196] The buggy address is located 105 bytes inside of [ 30.754196] allocated 120-byte region [fff00000c638ea00, fff00000c638ea78) [ 30.755266] [ 30.755616] The buggy address belongs to the physical page: [ 30.756224] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638e [ 30.757184] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.757984] page_type: f5(slab) [ 30.758564] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.759416] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.760258] page dumped because: kasan: bad access detected [ 30.761551] [ 30.762230] Memory state around the buggy address: [ 30.762741] fff00000c638e900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.763431] fff00000c638e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.764107] >fff00000c638ea00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.765374] ^ [ 30.766250] fff00000c638ea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.767066] fff00000c638eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.767960] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 30.532156] ================================================================== [ 30.533147] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 30.533914] Write of size 128 at addr fff00000c638e400 by task kunit_try_catch/158 [ 30.535417] [ 30.535762] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 30.536575] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.537516] Hardware name: linux,dummy-virt (DT) [ 30.538153] Call trace: [ 30.538507] show_stack+0x20/0x38 (C) [ 30.539090] dump_stack_lvl+0x8c/0xd0 [ 30.539652] print_report+0x118/0x5e0 [ 30.540185] kasan_report+0xc8/0x118 [ 30.540773] kasan_check_range+0x100/0x1a8 [ 30.541820] __asan_memset+0x34/0x78 [ 30.542360] kmalloc_oob_in_memset+0x144/0x2d0 [ 30.542913] kunit_try_run_case+0x14c/0x3d0 [ 30.543494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.544187] kthread+0x24c/0x2d0 [ 30.544771] ret_from_fork+0x10/0x20 [ 30.545477] [ 30.545822] Allocated by task 158: [ 30.546237] kasan_save_stack+0x3c/0x68 [ 30.546741] kasan_save_track+0x20/0x40 [ 30.547668] kasan_save_alloc_info+0x40/0x58 [ 30.548226] __kasan_kmalloc+0xd4/0xd8 [ 30.548897] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.549906] kmalloc_oob_in_memset+0xb0/0x2d0 [ 30.550566] kunit_try_run_case+0x14c/0x3d0 [ 30.551219] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.551938] kthread+0x24c/0x2d0 [ 30.552518] ret_from_fork+0x10/0x20 [ 30.553241] [ 30.554016] The buggy address belongs to the object at fff00000c638e400 [ 30.554016] which belongs to the cache kmalloc-128 of size 128 [ 30.555044] The buggy address is located 0 bytes inside of [ 30.555044] allocated 120-byte region [fff00000c638e400, fff00000c638e478) [ 30.555867] [ 30.556336] The buggy address belongs to the physical page: [ 30.556800] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638e [ 30.557441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.559191] page_type: f5(slab) [ 30.559628] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.560408] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.561716] page dumped because: kasan: bad access detected [ 30.562569] [ 30.563072] Memory state around the buggy address: [ 30.563806] fff00000c638e300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 30.564760] fff00000c638e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.565942] >fff00000c638e400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.566635] ^ [ 30.567306] fff00000c638e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.568153] fff00000c638e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.569357] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 30.880714] ================================================================== [ 30.882148] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 30.883498] Read of size 1 at addr fff00000c5d76c68 by task kunit_try_catch/172 [ 30.884706] [ 30.885251] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 30.886521] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.887066] Hardware name: linux,dummy-virt (DT) [ 30.887603] Call trace: [ 30.887973] show_stack+0x20/0x38 (C) [ 30.888603] dump_stack_lvl+0x8c/0xd0 [ 30.889388] print_report+0x118/0x5e0 [ 30.889987] kasan_report+0xc8/0x118 [ 30.890541] __asan_report_load1_noabort+0x20/0x30 [ 30.891103] kmalloc_uaf+0x300/0x338 [ 30.892189] kunit_try_run_case+0x14c/0x3d0 [ 30.892813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.893481] kthread+0x24c/0x2d0 [ 30.894035] ret_from_fork+0x10/0x20 [ 30.895144] [ 30.895477] Allocated by task 172: [ 30.895979] kasan_save_stack+0x3c/0x68 [ 30.896489] kasan_save_track+0x20/0x40 [ 30.897828] kasan_save_alloc_info+0x40/0x58 [ 30.898303] __kasan_kmalloc+0xd4/0xd8 [ 30.898872] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.899490] kmalloc_uaf+0xb8/0x338 [ 30.899976] kunit_try_run_case+0x14c/0x3d0 [ 30.900531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.901832] kthread+0x24c/0x2d0 [ 30.902389] ret_from_fork+0x10/0x20 [ 30.902869] [ 30.903215] Freed by task 172: [ 30.903678] kasan_save_stack+0x3c/0x68 [ 30.904158] kasan_save_track+0x20/0x40 [ 30.904748] kasan_save_free_info+0x4c/0x78 [ 30.905745] __kasan_slab_free+0x6c/0x98 [ 30.906424] kfree+0x114/0x3c8 [ 30.907152] kmalloc_uaf+0x11c/0x338 [ 30.907759] kunit_try_run_case+0x14c/0x3d0 [ 30.908430] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.909492] kthread+0x24c/0x2d0 [ 30.909993] ret_from_fork+0x10/0x20 [ 30.910731] [ 30.911128] The buggy address belongs to the object at fff00000c5d76c60 [ 30.911128] which belongs to the cache kmalloc-16 of size 16 [ 30.912344] The buggy address is located 8 bytes inside of [ 30.912344] freed 16-byte region [fff00000c5d76c60, fff00000c5d76c70) [ 30.913814] [ 30.914705] The buggy address belongs to the physical page: [ 30.915403] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d76 [ 30.916347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.917092] page_type: f5(slab) [ 30.917683] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 30.918530] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 30.919451] page dumped because: kasan: bad access detected [ 30.920207] [ 30.920692] Memory state around the buggy address: [ 30.921997] fff00000c5d76b00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 05 fc fc [ 30.922885] fff00000c5d76b80: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 30.923901] >fff00000c5d76c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.924701] ^ [ 30.926338] fff00000c5d76c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.927063] fff00000c5d76d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.927828] ================================================================== [ 30.996249] ================================================================== [ 30.997730] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 30.998692] Read of size 1 at addr fff00000c63aea28 by task kunit_try_catch/176 [ 30.999548] [ 31.000626] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 31.002299] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.002928] Hardware name: linux,dummy-virt (DT) [ 31.003291] Call trace: [ 31.004011] show_stack+0x20/0x38 (C) [ 31.004470] dump_stack_lvl+0x8c/0xd0 [ 31.005450] print_report+0x118/0x5e0 [ 31.006048] kasan_report+0xc8/0x118 [ 31.006685] __asan_report_load1_noabort+0x20/0x30 [ 31.007311] kmalloc_uaf2+0x3f4/0x468 [ 31.007961] kunit_try_run_case+0x14c/0x3d0 [ 31.008572] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.009329] kthread+0x24c/0x2d0 [ 31.009850] ret_from_fork+0x10/0x20 [ 31.010443] [ 31.010789] Allocated by task 176: [ 31.011352] kasan_save_stack+0x3c/0x68 [ 31.012140] kasan_save_track+0x20/0x40 [ 31.012765] kasan_save_alloc_info+0x40/0x58 [ 31.013657] __kasan_kmalloc+0xd4/0xd8 [ 31.014388] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.015027] kmalloc_uaf2+0xc4/0x468 [ 31.015585] kunit_try_run_case+0x14c/0x3d0 [ 31.016199] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.017338] kthread+0x24c/0x2d0 [ 31.017834] ret_from_fork+0x10/0x20 [ 31.018407] [ 31.018786] Freed by task 176: [ 31.019282] kasan_save_stack+0x3c/0x68 [ 31.019812] kasan_save_track+0x20/0x40 [ 31.020438] kasan_save_free_info+0x4c/0x78 [ 31.021427] __kasan_slab_free+0x6c/0x98 [ 31.021923] kfree+0x114/0x3c8 [ 31.022460] kmalloc_uaf2+0x134/0x468 [ 31.023060] kunit_try_run_case+0x14c/0x3d0 [ 31.023700] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.024399] kthread+0x24c/0x2d0 [ 31.025240] ret_from_fork+0x10/0x20 [ 31.025801] [ 31.026402] The buggy address belongs to the object at fff00000c63aea00 [ 31.026402] which belongs to the cache kmalloc-64 of size 64 [ 31.027627] The buggy address is located 40 bytes inside of [ 31.027627] freed 64-byte region [fff00000c63aea00, fff00000c63aea40) [ 31.028790] [ 31.029652] The buggy address belongs to the physical page: [ 31.030324] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ae [ 31.031257] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.032037] page_type: f5(slab) [ 31.032528] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 31.033490] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.034660] page dumped because: kasan: bad access detected [ 31.035321] [ 31.035690] Memory state around the buggy address: [ 31.036242] fff00000c63ae900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.037517] fff00000c63ae980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.038364] >fff00000c63aea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.039125] ^ [ 31.039706] fff00000c63aea80: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 31.040540] fff00000c63aeb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.041534] ================================================================== [ 30.482610] ================================================================== [ 30.483934] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 30.484842] Read of size 16 at addr fff00000c4005e80 by task kunit_try_catch/156 [ 30.485563] [ 30.485910] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 30.488800] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.489425] Hardware name: linux,dummy-virt (DT) [ 30.489951] Call trace: [ 30.490396] show_stack+0x20/0x38 (C) [ 30.490930] dump_stack_lvl+0x8c/0xd0 [ 30.491442] print_report+0x118/0x5e0 [ 30.492037] kasan_report+0xc8/0x118 [ 30.492641] __asan_report_load16_noabort+0x20/0x30 [ 30.493351] kmalloc_uaf_16+0x3bc/0x438 [ 30.493929] kunit_try_run_case+0x14c/0x3d0 [ 30.494569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.495241] kthread+0x24c/0x2d0 [ 30.495746] ret_from_fork+0x10/0x20 [ 30.496346] [ 30.496683] Allocated by task 156: [ 30.497207] kasan_save_stack+0x3c/0x68 [ 30.497819] kasan_save_track+0x20/0x40 [ 30.498319] kasan_save_alloc_info+0x40/0x58 [ 30.498932] __kasan_kmalloc+0xd4/0xd8 [ 30.499461] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.499991] kmalloc_uaf_16+0x140/0x438 [ 30.500585] kunit_try_run_case+0x14c/0x3d0 [ 30.501104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.501815] kthread+0x24c/0x2d0 [ 30.502344] ret_from_fork+0x10/0x20 [ 30.502844] [ 30.503205] Freed by task 156: [ 30.503673] kasan_save_stack+0x3c/0x68 [ 30.504256] kasan_save_track+0x20/0x40 [ 30.504846] kasan_save_free_info+0x4c/0x78 [ 30.505462] __kasan_slab_free+0x6c/0x98 [ 30.505928] kfree+0x114/0x3c8 [ 30.506455] kmalloc_uaf_16+0x190/0x438 [ 30.507035] kunit_try_run_case+0x14c/0x3d0 [ 30.507667] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.508395] kthread+0x24c/0x2d0 [ 30.508868] ret_from_fork+0x10/0x20 [ 30.509437] [ 30.509787] The buggy address belongs to the object at fff00000c4005e80 [ 30.509787] which belongs to the cache kmalloc-16 of size 16 [ 30.510866] The buggy address is located 0 bytes inside of [ 30.510866] freed 16-byte region [fff00000c4005e80, fff00000c4005e90) [ 30.512013] [ 30.512380] The buggy address belongs to the physical page: [ 30.513056] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 30.513852] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.514601] page_type: f5(slab) [ 30.515077] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 30.515838] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 30.516696] page dumped because: kasan: bad access detected [ 30.517417] [ 30.517759] Memory state around the buggy address: [ 30.518396] fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 30.518997] fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc [ 30.519855] >fff00000c4005e80: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.520667] ^ [ 30.521101] fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.521926] fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.522662] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 30.338874] ================================================================== [ 30.340000] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 30.340716] Read of size 1 at addr fff00000c1de8000 by task kunit_try_catch/152 [ 30.342252] [ 30.342636] CPU: 1 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 30.343826] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.344436] Hardware name: linux,dummy-virt (DT) [ 30.345163] Call trace: [ 30.345593] show_stack+0x20/0x38 (C) [ 30.346345] dump_stack_lvl+0x8c/0xd0 [ 30.346953] print_report+0x118/0x5e0 [ 30.347644] kasan_report+0xc8/0x118 [ 30.348330] __kasan_check_byte+0x54/0x70 [ 30.349104] krealloc_noprof+0x44/0x360 [ 30.349720] krealloc_uaf+0x180/0x520 [ 30.350359] kunit_try_run_case+0x14c/0x3d0 [ 30.350979] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.351839] kthread+0x24c/0x2d0 [ 30.352523] ret_from_fork+0x10/0x20 [ 30.353385] [ 30.353789] Allocated by task 152: [ 30.354414] kasan_save_stack+0x3c/0x68 [ 30.355081] kasan_save_track+0x20/0x40 [ 30.355762] kasan_save_alloc_info+0x40/0x58 [ 30.356313] __kasan_kmalloc+0xd4/0xd8 [ 30.356790] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.357783] krealloc_uaf+0xc8/0x520 [ 30.358192] kunit_try_run_case+0x14c/0x3d0 [ 30.358629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.359182] kthread+0x24c/0x2d0 [ 30.359724] ret_from_fork+0x10/0x20 [ 30.360989] [ 30.361343] Freed by task 152: [ 30.362195] kasan_save_stack+0x3c/0x68 [ 30.362878] kasan_save_track+0x20/0x40 [ 30.363533] kasan_save_free_info+0x4c/0x78 [ 30.364173] __kasan_slab_free+0x6c/0x98 [ 30.364711] kfree+0x114/0x3c8 [ 30.364949] krealloc_uaf+0x12c/0x520 [ 30.365294] kunit_try_run_case+0x14c/0x3d0 [ 30.366405] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.367130] kthread+0x24c/0x2d0 [ 30.367536] ret_from_fork+0x10/0x20 [ 30.367993] [ 30.368524] The buggy address belongs to the object at fff00000c1de8000 [ 30.368524] which belongs to the cache kmalloc-256 of size 256 [ 30.369825] The buggy address is located 0 bytes inside of [ 30.369825] freed 256-byte region [fff00000c1de8000, fff00000c1de8100) [ 30.370872] [ 30.371187] The buggy address belongs to the physical page: [ 30.371789] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101de8 [ 30.372968] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.373938] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.374638] page_type: f5(slab) [ 30.375023] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.375609] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.376285] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.377210] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.378156] head: 0bfffe0000000001 ffffc1ffc3077a01 ffffffffffffffff 0000000000000000 [ 30.378941] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 30.379819] page dumped because: kasan: bad access detected [ 30.380536] [ 30.380700] Memory state around the buggy address: [ 30.380960] fff00000c1de7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.381480] fff00000c1de7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.382078] >fff00000c1de8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.382665] ^ [ 30.383049] fff00000c1de8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.383655] fff00000c1de8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.384257] ================================================================== [ 30.387094] ================================================================== [ 30.387802] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 30.388657] Read of size 1 at addr fff00000c1de8000 by task kunit_try_catch/152 [ 30.389336] [ 30.389654] CPU: 1 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 30.390473] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.390887] Hardware name: linux,dummy-virt (DT) [ 30.391353] Call trace: [ 30.391683] show_stack+0x20/0x38 (C) [ 30.392164] dump_stack_lvl+0x8c/0xd0 [ 30.392804] print_report+0x118/0x5e0 [ 30.393457] kasan_report+0xc8/0x118 [ 30.394160] __asan_report_load1_noabort+0x20/0x30 [ 30.394965] krealloc_uaf+0x4c8/0x520 [ 30.395530] kunit_try_run_case+0x14c/0x3d0 [ 30.396078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.396435] kthread+0x24c/0x2d0 [ 30.396678] ret_from_fork+0x10/0x20 [ 30.396926] [ 30.397072] Allocated by task 152: [ 30.397421] kasan_save_stack+0x3c/0x68 [ 30.397959] kasan_save_track+0x20/0x40 [ 30.398638] kasan_save_alloc_info+0x40/0x58 [ 30.399328] __kasan_kmalloc+0xd4/0xd8 [ 30.400090] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.400845] krealloc_uaf+0xc8/0x520 [ 30.401455] kunit_try_run_case+0x14c/0x3d0 [ 30.402240] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.402972] kthread+0x24c/0x2d0 [ 30.403545] ret_from_fork+0x10/0x20 [ 30.404183] [ 30.404594] Freed by task 152: [ 30.405135] kasan_save_stack+0x3c/0x68 [ 30.405765] kasan_save_track+0x20/0x40 [ 30.406373] kasan_save_free_info+0x4c/0x78 [ 30.407003] __kasan_slab_free+0x6c/0x98 [ 30.407692] kfree+0x114/0x3c8 [ 30.408222] krealloc_uaf+0x12c/0x520 [ 30.408826] kunit_try_run_case+0x14c/0x3d0 [ 30.409505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.410241] kthread+0x24c/0x2d0 [ 30.410776] ret_from_fork+0x10/0x20 [ 30.411405] [ 30.411864] The buggy address belongs to the object at fff00000c1de8000 [ 30.411864] which belongs to the cache kmalloc-256 of size 256 [ 30.413299] The buggy address is located 0 bytes inside of [ 30.413299] freed 256-byte region [fff00000c1de8000, fff00000c1de8100) [ 30.414224] [ 30.414505] The buggy address belongs to the physical page: [ 30.414986] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101de8 [ 30.415736] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.416668] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.417615] page_type: f5(slab) [ 30.418267] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.418647] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.419009] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.419564] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.420222] head: 0bfffe0000000001 ffffc1ffc3077a01 ffffffffffffffff 0000000000000000 [ 30.420866] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 30.421504] page dumped because: kasan: bad access detected [ 30.422268] [ 30.422614] Memory state around the buggy address: [ 30.423215] fff00000c1de7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.423817] fff00000c1de7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.424595] >fff00000c1de8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.425354] ^ [ 30.425764] fff00000c1de8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.426579] fff00000c1de8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.427295] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 30.267985] ================================================================== [ 30.268828] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 30.269652] Write of size 1 at addr fff00000c64e60ea by task kunit_try_catch/150 [ 30.270398] [ 30.270751] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 30.272266] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.272817] Hardware name: linux,dummy-virt (DT) [ 30.273409] Call trace: [ 30.273818] show_stack+0x20/0x38 (C) [ 30.274646] dump_stack_lvl+0x8c/0xd0 [ 30.275262] print_report+0x118/0x5e0 [ 30.275792] kasan_report+0xc8/0x118 [ 30.276390] __asan_report_store1_noabort+0x20/0x30 [ 30.277335] krealloc_less_oob_helper+0xae4/0xc50 [ 30.278033] krealloc_large_less_oob+0x20/0x38 [ 30.278616] kunit_try_run_case+0x14c/0x3d0 [ 30.279259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.279948] kthread+0x24c/0x2d0 [ 30.280522] ret_from_fork+0x10/0x20 [ 30.281294] [ 30.281533] The buggy address belongs to the physical page: [ 30.282217] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064e4 [ 30.282938] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.283825] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.284586] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.285706] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.286519] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.287340] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.288194] head: 0bfffe0000000002 ffffc1ffc3193901 ffffffffffffffff 0000000000000000 [ 30.289819] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.290550] page dumped because: kasan: bad access detected [ 30.291130] [ 30.291464] Memory state around the buggy address: [ 30.292032] fff00000c64e5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.292817] fff00000c64e6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.293856] >fff00000c64e6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.294589] ^ [ 30.295279] fff00000c64e6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.296068] fff00000c64e6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.296872] ================================================================== [ 30.238560] ================================================================== [ 30.239209] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 30.240024] Write of size 1 at addr fff00000c64e60da by task kunit_try_catch/150 [ 30.240880] [ 30.241522] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 30.242786] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.243406] Hardware name: linux,dummy-virt (DT) [ 30.243941] Call trace: [ 30.244383] show_stack+0x20/0x38 (C) [ 30.244977] dump_stack_lvl+0x8c/0xd0 [ 30.245835] print_report+0x118/0x5e0 [ 30.246431] kasan_report+0xc8/0x118 [ 30.246927] __asan_report_store1_noabort+0x20/0x30 [ 30.247661] krealloc_less_oob_helper+0xa80/0xc50 [ 30.248238] krealloc_large_less_oob+0x20/0x38 [ 30.248886] kunit_try_run_case+0x14c/0x3d0 [ 30.249792] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.250492] kthread+0x24c/0x2d0 [ 30.251027] ret_from_fork+0x10/0x20 [ 30.251567] [ 30.251878] The buggy address belongs to the physical page: [ 30.252445] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064e4 [ 30.253631] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.254381] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.255241] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.256047] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.256895] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.258544] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.258931] head: 0bfffe0000000002 ffffc1ffc3193901 ffffffffffffffff 0000000000000000 [ 30.259314] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.259663] page dumped because: kasan: bad access detected [ 30.259937] [ 30.260081] Memory state around the buggy address: [ 30.261226] fff00000c64e5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.262267] fff00000c64e6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.263005] >fff00000c64e6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.263834] ^ [ 30.264515] fff00000c64e6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.265615] fff00000c64e6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.266376] ================================================================== [ 29.915466] ================================================================== [ 29.916089] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 29.918603] Write of size 1 at addr fff00000c1de7ed0 by task kunit_try_catch/146 [ 29.919324] [ 29.919651] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 29.920680] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.922418] Hardware name: linux,dummy-virt (DT) [ 29.923029] Call trace: [ 29.923381] show_stack+0x20/0x38 (C) [ 29.923956] dump_stack_lvl+0x8c/0xd0 [ 29.924502] print_report+0x118/0x5e0 [ 29.925272] kasan_report+0xc8/0x118 [ 29.925761] __asan_report_store1_noabort+0x20/0x30 [ 29.926460] krealloc_less_oob_helper+0xb9c/0xc50 [ 29.927068] krealloc_less_oob+0x20/0x38 [ 29.927744] kunit_try_run_case+0x14c/0x3d0 [ 29.928257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.929280] kthread+0x24c/0x2d0 [ 29.929837] ret_from_fork+0x10/0x20 [ 29.930390] [ 29.930714] Allocated by task 146: [ 29.931237] kasan_save_stack+0x3c/0x68 [ 29.931729] kasan_save_track+0x20/0x40 [ 29.932337] kasan_save_alloc_info+0x40/0x58 [ 29.932874] __kasan_krealloc+0x118/0x178 [ 29.934374] krealloc_noprof+0x128/0x360 [ 29.934903] krealloc_less_oob_helper+0x168/0xc50 [ 29.935521] krealloc_less_oob+0x20/0x38 [ 29.936034] kunit_try_run_case+0x14c/0x3d0 [ 29.937206] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.937869] kthread+0x24c/0x2d0 [ 29.938340] ret_from_fork+0x10/0x20 [ 29.938882] [ 29.939243] The buggy address belongs to the object at fff00000c1de7e00 [ 29.939243] which belongs to the cache kmalloc-256 of size 256 [ 29.940375] The buggy address is located 7 bytes to the right of [ 29.940375] allocated 201-byte region [fff00000c1de7e00, fff00000c1de7ec9) [ 29.941819] [ 29.942171] The buggy address belongs to the physical page: [ 29.942801] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101de6 [ 29.943646] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.944463] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.945558] page_type: f5(slab) [ 29.946002] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.946799] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 29.947587] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.948431] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 29.949472] head: 0bfffe0000000001 ffffc1ffc3077981 ffffffffffffffff 0000000000000000 [ 29.950277] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 29.951068] page dumped because: kasan: bad access detected [ 29.951763] [ 29.952096] Memory state around the buggy address: [ 29.952683] fff00000c1de7d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.953867] fff00000c1de7e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.954834] >fff00000c1de7e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 29.955567] ^ [ 29.956188] fff00000c1de7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.956797] fff00000c1de7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.957965] ================================================================== [ 30.002764] ================================================================== [ 30.003546] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 30.004138] Write of size 1 at addr fff00000c1de7eea by task kunit_try_catch/146 [ 30.004848] [ 30.005513] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 30.006576] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.007170] Hardware name: linux,dummy-virt (DT) [ 30.007768] Call trace: [ 30.008196] show_stack+0x20/0x38 (C) [ 30.008785] dump_stack_lvl+0x8c/0xd0 [ 30.009549] print_report+0x118/0x5e0 [ 30.010148] kasan_report+0xc8/0x118 [ 30.010714] __asan_report_store1_noabort+0x20/0x30 [ 30.011384] krealloc_less_oob_helper+0xae4/0xc50 [ 30.012031] krealloc_less_oob+0x20/0x38 [ 30.012636] kunit_try_run_case+0x14c/0x3d0 [ 30.013544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.014273] kthread+0x24c/0x2d0 [ 30.014723] ret_from_fork+0x10/0x20 [ 30.015312] [ 30.015657] Allocated by task 146: [ 30.016152] kasan_save_stack+0x3c/0x68 [ 30.016739] kasan_save_track+0x20/0x40 [ 30.017525] kasan_save_alloc_info+0x40/0x58 [ 30.018139] __kasan_krealloc+0x118/0x178 [ 30.018626] krealloc_noprof+0x128/0x360 [ 30.019214] krealloc_less_oob_helper+0x168/0xc50 [ 30.019759] krealloc_less_oob+0x20/0x38 [ 30.020358] kunit_try_run_case+0x14c/0x3d0 [ 30.021587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.022234] kthread+0x24c/0x2d0 [ 30.022759] ret_from_fork+0x10/0x20 [ 30.023281] [ 30.023629] The buggy address belongs to the object at fff00000c1de7e00 [ 30.023629] which belongs to the cache kmalloc-256 of size 256 [ 30.024730] The buggy address is located 33 bytes to the right of [ 30.024730] allocated 201-byte region [fff00000c1de7e00, fff00000c1de7ec9) [ 30.026183] [ 30.026523] The buggy address belongs to the physical page: [ 30.027209] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101de6 [ 30.028025] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.028847] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.029890] page_type: f5(slab) [ 30.030401] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.031130] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.032012] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.032791] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.033979] head: 0bfffe0000000001 ffffc1ffc3077981 ffffffffffffffff 0000000000000000 [ 30.034803] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 30.035579] page dumped because: kasan: bad access detected [ 30.036200] [ 30.036547] Memory state around the buggy address: [ 30.037342] fff00000c1de7d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.038147] fff00000c1de7e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.038920] >fff00000c1de7e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.039687] ^ [ 30.040370] fff00000c1de7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.042057] fff00000c1de7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.042710] ================================================================== [ 30.044310] ================================================================== [ 30.045048] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 30.045938] Write of size 1 at addr fff00000c1de7eeb by task kunit_try_catch/146 [ 30.046792] [ 30.047474] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 30.048606] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.049343] Hardware name: linux,dummy-virt (DT) [ 30.049946] Call trace: [ 30.050346] show_stack+0x20/0x38 (C) [ 30.050866] dump_stack_lvl+0x8c/0xd0 [ 30.051416] print_report+0x118/0x5e0 [ 30.052006] kasan_report+0xc8/0x118 [ 30.052562] __asan_report_store1_noabort+0x20/0x30 [ 30.053546] krealloc_less_oob_helper+0xa58/0xc50 [ 30.054218] krealloc_less_oob+0x20/0x38 [ 30.054821] kunit_try_run_case+0x14c/0x3d0 [ 30.055391] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.056069] kthread+0x24c/0x2d0 [ 30.056641] ret_from_fork+0x10/0x20 [ 30.057531] [ 30.057869] Allocated by task 146: [ 30.058286] kasan_save_stack+0x3c/0x68 [ 30.058869] kasan_save_track+0x20/0x40 [ 30.059419] kasan_save_alloc_info+0x40/0x58 [ 30.060049] __kasan_krealloc+0x118/0x178 [ 30.060661] krealloc_noprof+0x128/0x360 [ 30.061881] krealloc_less_oob_helper+0x168/0xc50 [ 30.062965] krealloc_less_oob+0x20/0x38 [ 30.063429] kunit_try_run_case+0x14c/0x3d0 [ 30.064036] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.064758] kthread+0x24c/0x2d0 [ 30.065545] ret_from_fork+0x10/0x20 [ 30.066082] [ 30.066488] The buggy address belongs to the object at fff00000c1de7e00 [ 30.066488] which belongs to the cache kmalloc-256 of size 256 [ 30.068054] The buggy address is located 34 bytes to the right of [ 30.068054] allocated 201-byte region [fff00000c1de7e00, fff00000c1de7ec9) [ 30.069991] [ 30.070485] The buggy address belongs to the physical page: [ 30.070997] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101de6 [ 30.071766] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.072545] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.073606] page_type: f5(slab) [ 30.074363] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.074742] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.075103] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.075931] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 30.076706] head: 0bfffe0000000001 ffffc1ffc3077981 ffffffffffffffff 0000000000000000 [ 30.077904] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 30.078744] page dumped because: kasan: bad access detected [ 30.079381] [ 30.079754] Memory state around the buggy address: [ 30.080335] fff00000c1de7d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.081970] fff00000c1de7e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.082730] >fff00000c1de7e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.083572] ^ [ 30.084331] fff00000c1de7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.085295] fff00000c1de7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.086190] ================================================================== [ 30.298289] ================================================================== [ 30.298805] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 30.299643] Write of size 1 at addr fff00000c64e60eb by task kunit_try_catch/150 [ 30.300337] [ 30.300655] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 30.303198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.303838] Hardware name: linux,dummy-virt (DT) [ 30.304391] Call trace: [ 30.304740] show_stack+0x20/0x38 (C) [ 30.305448] dump_stack_lvl+0x8c/0xd0 [ 30.306076] print_report+0x118/0x5e0 [ 30.306715] kasan_report+0xc8/0x118 [ 30.307274] __asan_report_store1_noabort+0x20/0x30 [ 30.307913] krealloc_less_oob_helper+0xa58/0xc50 [ 30.308635] krealloc_large_less_oob+0x20/0x38 [ 30.309729] kunit_try_run_case+0x14c/0x3d0 [ 30.310296] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.310943] kthread+0x24c/0x2d0 [ 30.311487] ret_from_fork+0x10/0x20 [ 30.312103] [ 30.312497] The buggy address belongs to the physical page: [ 30.313040] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064e4 [ 30.314211] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.314954] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.315890] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.316761] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.317868] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.318778] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.319553] head: 0bfffe0000000002 ffffc1ffc3193901 ffffffffffffffff 0000000000000000 [ 30.320391] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.321263] page dumped because: kasan: bad access detected [ 30.322397] [ 30.322877] Memory state around the buggy address: [ 30.323584] fff00000c64e5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.324405] fff00000c64e6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.325378] >fff00000c64e6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.326170] ^ [ 30.326808] fff00000c64e6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.328091] fff00000c64e6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.328960] ================================================================== [ 30.173671] ================================================================== [ 30.174719] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 30.175762] Write of size 1 at addr fff00000c64e60c9 by task kunit_try_catch/150 [ 30.176851] [ 30.177641] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 30.178833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.179321] Hardware name: linux,dummy-virt (DT) [ 30.179975] Call trace: [ 30.180416] show_stack+0x20/0x38 (C) [ 30.181010] dump_stack_lvl+0x8c/0xd0 [ 30.181651] print_report+0x118/0x5e0 [ 30.182240] kasan_report+0xc8/0x118 [ 30.182748] __asan_report_store1_noabort+0x20/0x30 [ 30.183628] krealloc_less_oob_helper+0xa48/0xc50 [ 30.184273] krealloc_large_less_oob+0x20/0x38 [ 30.185161] kunit_try_run_case+0x14c/0x3d0 [ 30.185797] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.186555] kthread+0x24c/0x2d0 [ 30.187169] ret_from_fork+0x10/0x20 [ 30.187743] [ 30.187912] The buggy address belongs to the physical page: [ 30.188308] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064e4 [ 30.189726] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.190456] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.191211] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.192075] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.192899] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.193763] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.194660] head: 0bfffe0000000002 ffffc1ffc3193901 ffffffffffffffff 0000000000000000 [ 30.195453] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.196291] page dumped because: kasan: bad access detected [ 30.196893] [ 30.197252] Memory state around the buggy address: [ 30.197874] fff00000c64e5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.198517] fff00000c64e6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.199369] >fff00000c64e6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.200050] ^ [ 30.200781] fff00000c64e6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.201516] fff00000c64e6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.202859] ================================================================== [ 29.959568] ================================================================== [ 29.960249] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 29.960847] Write of size 1 at addr fff00000c1de7eda by task kunit_try_catch/146 [ 29.961863] [ 29.962247] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 29.963432] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.964510] Hardware name: linux,dummy-virt (DT) [ 29.965328] Call trace: [ 29.965692] show_stack+0x20/0x38 (C) [ 29.966177] dump_stack_lvl+0x8c/0xd0 [ 29.966778] print_report+0x118/0x5e0 [ 29.967489] kasan_report+0xc8/0x118 [ 29.968042] __asan_report_store1_noabort+0x20/0x30 [ 29.968681] krealloc_less_oob_helper+0xa80/0xc50 [ 29.969300] krealloc_less_oob+0x20/0x38 [ 29.969896] kunit_try_run_case+0x14c/0x3d0 [ 29.970479] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.971456] kthread+0x24c/0x2d0 [ 29.971960] ret_from_fork+0x10/0x20 [ 29.972567] [ 29.972862] Allocated by task 146: [ 29.973621] kasan_save_stack+0x3c/0x68 [ 29.974169] kasan_save_track+0x20/0x40 [ 29.974695] kasan_save_alloc_info+0x40/0x58 [ 29.975344] __kasan_krealloc+0x118/0x178 [ 29.975924] krealloc_noprof+0x128/0x360 [ 29.976455] krealloc_less_oob_helper+0x168/0xc50 [ 29.977372] krealloc_less_oob+0x20/0x38 [ 29.977931] kunit_try_run_case+0x14c/0x3d0 [ 29.978504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.979079] kthread+0x24c/0x2d0 [ 29.979631] ret_from_fork+0x10/0x20 [ 29.980180] [ 29.980488] The buggy address belongs to the object at fff00000c1de7e00 [ 29.980488] which belongs to the cache kmalloc-256 of size 256 [ 29.982752] The buggy address is located 17 bytes to the right of [ 29.982752] allocated 201-byte region [fff00000c1de7e00, fff00000c1de7ec9) [ 29.983986] [ 29.984345] The buggy address belongs to the physical page: [ 29.984874] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101de6 [ 29.985860] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.986942] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.987702] page_type: f5(slab) [ 29.988226] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.989265] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 29.990171] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.990989] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 29.991809] head: 0bfffe0000000001 ffffc1ffc3077981 ffffffffffffffff 0000000000000000 [ 29.992632] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 29.993636] page dumped because: kasan: bad access detected [ 29.994238] [ 29.994565] Memory state around the buggy address: [ 29.995056] fff00000c1de7d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.995914] fff00000c1de7e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.996636] >fff00000c1de7e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 29.997796] ^ [ 29.998504] fff00000c1de7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.999255] fff00000c1de7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.000061] ================================================================== [ 30.204946] ================================================================== [ 30.206349] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 30.207309] Write of size 1 at addr fff00000c64e60d0 by task kunit_try_catch/150 [ 30.208082] [ 30.208443] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 30.209878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.210730] Hardware name: linux,dummy-virt (DT) [ 30.211383] Call trace: [ 30.211697] show_stack+0x20/0x38 (C) [ 30.212171] dump_stack_lvl+0x8c/0xd0 [ 30.212710] print_report+0x118/0x5e0 [ 30.213856] kasan_report+0xc8/0x118 [ 30.214476] __asan_report_store1_noabort+0x20/0x30 [ 30.215195] krealloc_less_oob_helper+0xb9c/0xc50 [ 30.215758] krealloc_large_less_oob+0x20/0x38 [ 30.216373] kunit_try_run_case+0x14c/0x3d0 [ 30.217015] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.217689] kthread+0x24c/0x2d0 [ 30.218515] ret_from_fork+0x10/0x20 [ 30.219072] [ 30.219383] The buggy address belongs to the physical page: [ 30.219989] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064e4 [ 30.220855] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.222303] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.223052] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.223864] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.225007] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.225876] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.226981] head: 0bfffe0000000002 ffffc1ffc3193901 ffffffffffffffff 0000000000000000 [ 30.227846] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.228591] page dumped because: kasan: bad access detected [ 30.229545] [ 30.229854] Memory state around the buggy address: [ 30.230412] fff00000c64e5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.231109] fff00000c64e6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.231959] >fff00000c64e6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.232677] ^ [ 30.233685] fff00000c64e6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.234374] fff00000c64e6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.235134] ================================================================== [ 29.871834] ================================================================== [ 29.872911] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 29.874089] Write of size 1 at addr fff00000c1de7ec9 by task kunit_try_catch/146 [ 29.874902] [ 29.875329] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 29.876380] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.876950] Hardware name: linux,dummy-virt (DT) [ 29.877643] Call trace: [ 29.878058] show_stack+0x20/0x38 (C) [ 29.878633] dump_stack_lvl+0x8c/0xd0 [ 29.879277] print_report+0x118/0x5e0 [ 29.879883] kasan_report+0xc8/0x118 [ 29.880403] __asan_report_store1_noabort+0x20/0x30 [ 29.881451] krealloc_less_oob_helper+0xa48/0xc50 [ 29.882080] krealloc_less_oob+0x20/0x38 [ 29.882654] kunit_try_run_case+0x14c/0x3d0 [ 29.883285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.883956] kthread+0x24c/0x2d0 [ 29.884543] ret_from_fork+0x10/0x20 [ 29.885304] [ 29.885742] Allocated by task 146: [ 29.886281] kasan_save_stack+0x3c/0x68 [ 29.886827] kasan_save_track+0x20/0x40 [ 29.887325] kasan_save_alloc_info+0x40/0x58 [ 29.887981] __kasan_krealloc+0x118/0x178 [ 29.888489] krealloc_noprof+0x128/0x360 [ 29.889073] krealloc_less_oob_helper+0x168/0xc50 [ 29.889688] krealloc_less_oob+0x20/0x38 [ 29.890463] kunit_try_run_case+0x14c/0x3d0 [ 29.891047] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.891670] kthread+0x24c/0x2d0 [ 29.892095] ret_from_fork+0x10/0x20 [ 29.893149] [ 29.893789] The buggy address belongs to the object at fff00000c1de7e00 [ 29.893789] which belongs to the cache kmalloc-256 of size 256 [ 29.895130] The buggy address is located 0 bytes to the right of [ 29.895130] allocated 201-byte region [fff00000c1de7e00, fff00000c1de7ec9) [ 29.896656] [ 29.896917] The buggy address belongs to the physical page: [ 29.897906] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101de6 [ 29.898697] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.899821] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.900767] page_type: f5(slab) [ 29.901191] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.902301] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 29.903110] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.903891] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 29.904723] head: 0bfffe0000000001 ffffc1ffc3077981 ffffffffffffffff 0000000000000000 [ 29.905935] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 29.906674] page dumped because: kasan: bad access detected [ 29.907671] [ 29.907949] Memory state around the buggy address: [ 29.908594] fff00000c1de7d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.909293] fff00000c1de7e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.910177] >fff00000c1de7e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 29.911077] ^ [ 29.911688] fff00000c1de7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.912579] fff00000c1de7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.913761] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 29.814799] ================================================================== [ 29.816550] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680 [ 29.817426] Write of size 1 at addr fff00000c61a20f0 by task kunit_try_catch/144 [ 29.818256] [ 29.818683] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 29.819942] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.820613] Hardware name: linux,dummy-virt (DT) [ 29.821157] Call trace: [ 29.821545] show_stack+0x20/0x38 (C) [ 29.822031] dump_stack_lvl+0x8c/0xd0 [ 29.822650] print_report+0x118/0x5e0 [ 29.823176] kasan_report+0xc8/0x118 [ 29.823771] __asan_report_store1_noabort+0x20/0x30 [ 29.824746] krealloc_more_oob_helper+0x5c8/0x680 [ 29.826052] krealloc_more_oob+0x20/0x38 [ 29.826649] kunit_try_run_case+0x14c/0x3d0 [ 29.827292] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.827967] kthread+0x24c/0x2d0 [ 29.828583] ret_from_fork+0x10/0x20 [ 29.829511] [ 29.829856] Allocated by task 144: [ 29.830344] kasan_save_stack+0x3c/0x68 [ 29.830968] kasan_save_track+0x20/0x40 [ 29.831559] kasan_save_alloc_info+0x40/0x58 [ 29.832181] __kasan_krealloc+0x118/0x178 [ 29.832703] krealloc_noprof+0x128/0x360 [ 29.833369] krealloc_more_oob_helper+0x168/0x680 [ 29.834764] krealloc_more_oob+0x20/0x38 [ 29.835494] kunit_try_run_case+0x14c/0x3d0 [ 29.836231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.837107] kthread+0x24c/0x2d0 [ 29.837835] ret_from_fork+0x10/0x20 [ 29.838302] [ 29.838607] The buggy address belongs to the object at fff00000c61a2000 [ 29.838607] which belongs to the cache kmalloc-256 of size 256 [ 29.840312] The buggy address is located 5 bytes to the right of [ 29.840312] allocated 235-byte region [fff00000c61a2000, fff00000c61a20eb) [ 29.841994] [ 29.842402] The buggy address belongs to the physical page: [ 29.843657] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061a2 [ 29.844719] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.845731] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.846739] page_type: f5(slab) [ 29.847217] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.848103] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 29.849795] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.850569] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 29.851448] head: 0bfffe0000000001 ffffc1ffc3186881 ffffffffffffffff 0000000000000000 [ 29.852327] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 29.853192] page dumped because: kasan: bad access detected [ 29.854204] [ 29.854564] Memory state around the buggy address: [ 29.855191] fff00000c61a1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.855917] fff00000c61a2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.856819] >fff00000c61a2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 29.858299] ^ [ 29.859054] fff00000c61a2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.859862] fff00000c61a2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.860665] ================================================================== [ 29.768598] ================================================================== [ 29.770253] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680 [ 29.771161] Write of size 1 at addr fff00000c61a20eb by task kunit_try_catch/144 [ 29.771901] [ 29.772362] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 29.773692] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.774720] Hardware name: linux,dummy-virt (DT) [ 29.775367] Call trace: [ 29.775685] show_stack+0x20/0x38 (C) [ 29.776140] dump_stack_lvl+0x8c/0xd0 [ 29.776665] print_report+0x118/0x5e0 [ 29.777458] kasan_report+0xc8/0x118 [ 29.778720] __asan_report_store1_noabort+0x20/0x30 [ 29.779468] krealloc_more_oob_helper+0x614/0x680 [ 29.780091] krealloc_more_oob+0x20/0x38 [ 29.780629] kunit_try_run_case+0x14c/0x3d0 [ 29.781558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.782263] kthread+0x24c/0x2d0 [ 29.782824] ret_from_fork+0x10/0x20 [ 29.783369] [ 29.783746] Allocated by task 144: [ 29.784316] kasan_save_stack+0x3c/0x68 [ 29.784888] kasan_save_track+0x20/0x40 [ 29.786212] kasan_save_alloc_info+0x40/0x58 [ 29.786833] __kasan_krealloc+0x118/0x178 [ 29.787465] krealloc_noprof+0x128/0x360 [ 29.788026] krealloc_more_oob_helper+0x168/0x680 [ 29.788731] krealloc_more_oob+0x20/0x38 [ 29.789281] kunit_try_run_case+0x14c/0x3d0 [ 29.790310] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.790938] kthread+0x24c/0x2d0 [ 29.791524] ret_from_fork+0x10/0x20 [ 29.792086] [ 29.792491] The buggy address belongs to the object at fff00000c61a2000 [ 29.792491] which belongs to the cache kmalloc-256 of size 256 [ 29.794473] The buggy address is located 0 bytes to the right of [ 29.794473] allocated 235-byte region [fff00000c61a2000, fff00000c61a20eb) [ 29.795787] [ 29.796175] The buggy address belongs to the physical page: [ 29.796763] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061a2 [ 29.797670] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.798928] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.799759] page_type: f5(slab) [ 29.800332] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.801387] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 29.802157] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.802928] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 29.804190] head: 0bfffe0000000001 ffffc1ffc3186881 ffffffffffffffff 0000000000000000 [ 29.804877] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 29.806056] page dumped because: kasan: bad access detected [ 29.806698] [ 29.807034] Memory state around the buggy address: [ 29.807526] fff00000c61a1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.808394] fff00000c61a2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.809102] >fff00000c61a2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 29.810066] ^ [ 29.810778] fff00000c61a2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.811943] fff00000c61a2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.812828] ================================================================== [ 30.096251] ================================================================== [ 30.097650] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680 [ 30.098555] Write of size 1 at addr fff00000c65260eb by task kunit_try_catch/148 [ 30.099180] [ 30.099562] CPU: 0 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 30.100606] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.102009] Hardware name: linux,dummy-virt (DT) [ 30.102658] Call trace: [ 30.103188] show_stack+0x20/0x38 (C) [ 30.103867] dump_stack_lvl+0x8c/0xd0 [ 30.104596] print_report+0x118/0x5e0 [ 30.105315] kasan_report+0xc8/0x118 [ 30.106096] __asan_report_store1_noabort+0x20/0x30 [ 30.106759] krealloc_more_oob_helper+0x614/0x680 [ 30.107374] krealloc_large_more_oob+0x20/0x38 [ 30.107938] kunit_try_run_case+0x14c/0x3d0 [ 30.108454] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.109276] kthread+0x24c/0x2d0 [ 30.110524] ret_from_fork+0x10/0x20 [ 30.111232] [ 30.111618] The buggy address belongs to the physical page: [ 30.112324] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106524 [ 30.113153] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.114354] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.115219] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.116053] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.117263] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.117947] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.118753] head: 0bfffe0000000002 ffffc1ffc3194901 ffffffffffffffff 0000000000000000 [ 30.119511] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.120813] page dumped because: kasan: bad access detected [ 30.121905] [ 30.122279] Memory state around the buggy address: [ 30.122993] fff00000c6525f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.123646] fff00000c6526000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.124000] >fff00000c6526080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 30.124608] ^ [ 30.125509] fff00000c6526100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.126197] fff00000c6526180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.127689] ================================================================== [ 30.130476] ================================================================== [ 30.131051] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680 [ 30.131922] Write of size 1 at addr fff00000c65260f0 by task kunit_try_catch/148 [ 30.132830] [ 30.133902] CPU: 0 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 30.136032] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.136597] Hardware name: linux,dummy-virt (DT) [ 30.137574] Call trace: [ 30.138017] show_stack+0x20/0x38 (C) [ 30.138615] dump_stack_lvl+0x8c/0xd0 [ 30.139475] print_report+0x118/0x5e0 [ 30.140352] kasan_report+0xc8/0x118 [ 30.140846] __asan_report_store1_noabort+0x20/0x30 [ 30.141551] krealloc_more_oob_helper+0x5c8/0x680 [ 30.142551] krealloc_large_more_oob+0x20/0x38 [ 30.143199] kunit_try_run_case+0x14c/0x3d0 [ 30.143814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.144550] kthread+0x24c/0x2d0 [ 30.145157] ret_from_fork+0x10/0x20 [ 30.146453] [ 30.146842] The buggy address belongs to the physical page: [ 30.147453] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106524 [ 30.148424] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.149625] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.150546] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.151284] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.152006] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.153625] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.154863] head: 0bfffe0000000002 ffffc1ffc3194901 ffffffffffffffff 0000000000000000 [ 30.155832] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.156738] page dumped because: kasan: bad access detected [ 30.157819] [ 30.158152] Memory state around the buggy address: [ 30.158792] fff00000c6525f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.159410] fff00000c6526000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.160244] >fff00000c6526080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 30.161193] ^ [ 30.162224] fff00000c6526100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.163354] fff00000c6526180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.164224] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[ 29.682770] ================================================================== [ 29.684004] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 29.684665] Free of addr fff00000c64e0001 by task kunit_try_catch/138 [ 29.685950] [ 29.686222] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 29.687275] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.687871] Hardware name: linux,dummy-virt (DT) [ 29.688392] Call trace: [ 29.688851] show_stack+0x20/0x38 (C) [ 29.689779] dump_stack_lvl+0x8c/0xd0 [ 29.690422] print_report+0x118/0x5e0 [ 29.691019] kasan_report_invalid_free+0xb0/0xd8 [ 29.691687] __kasan_kfree_large+0x5c/0xa8 [ 29.692375] free_large_kmalloc+0x58/0x140 [ 29.693041] kfree+0x270/0x3c8 [ 29.693563] kmalloc_large_invalid_free+0x108/0x270 [ 29.694214] kunit_try_run_case+0x14c/0x3d0 [ 29.694805] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.695709] kthread+0x24c/0x2d0 [ 29.696272] ret_from_fork+0x10/0x20 [ 29.696968] [ 29.697511] The buggy address belongs to the physical page: [ 29.698090] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064e0 [ 29.699038] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.699885] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.700758] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.701850] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.702744] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.703545] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.704687] head: 0bfffe0000000002 ffffc1ffc3193801 ffffffffffffffff 0000000000000000 [ 29.705773] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 29.706404] page dumped because: kasan: bad access detected [ 29.707021] [ 29.707869] Memory state around the buggy address: [ 29.708551] fff00000c64dff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.709733] fff00000c64dff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.710547] >fff00000c64e0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.711339] ^ [ 29.711823] fff00000c64e0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.712632] fff00000c64e0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.713710] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 29.646739] ================================================================== [ 29.647944] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 29.648530] Read of size 1 at addr fff00000c6520000 by task kunit_try_catch/136 [ 29.648881] [ 29.649703] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 29.651564] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.652258] Hardware name: linux,dummy-virt (DT) [ 29.652787] Call trace: [ 29.653954] show_stack+0x20/0x38 (C) [ 29.654563] dump_stack_lvl+0x8c/0xd0 [ 29.655156] print_report+0x118/0x5e0 [ 29.655754] kasan_report+0xc8/0x118 [ 29.656351] __asan_report_load1_noabort+0x20/0x30 [ 29.657040] kmalloc_large_uaf+0x2cc/0x2f8 [ 29.657555] kunit_try_run_case+0x14c/0x3d0 [ 29.658094] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.658854] kthread+0x24c/0x2d0 [ 29.660199] ret_from_fork+0x10/0x20 [ 29.660814] [ 29.661524] The buggy address belongs to the physical page: [ 29.662189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106520 [ 29.663093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.663910] raw: 0bfffe0000000000 ffffc1ffc3194908 fff00000da4e3f80 0000000000000000 [ 29.664820] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 29.666001] page dumped because: kasan: bad access detected [ 29.666747] [ 29.667408] Memory state around the buggy address: [ 29.668247] fff00000c651ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.669140] fff00000c651ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.670104] >fff00000c6520000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.671144] ^ [ 29.671683] fff00000c6520080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.672475] fff00000c6520100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.673512] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 29.606831] ================================================================== [ 29.607954] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 29.608803] Write of size 1 at addr fff00000c64e200a by task kunit_try_catch/134 [ 29.609526] [ 29.609877] CPU: 1 UID: 0 PID: 134 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 29.610872] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.611439] Hardware name: linux,dummy-virt (DT) [ 29.611936] Call trace: [ 29.612855] show_stack+0x20/0x38 (C) [ 29.613730] dump_stack_lvl+0x8c/0xd0 [ 29.614276] print_report+0x118/0x5e0 [ 29.614867] kasan_report+0xc8/0x118 [ 29.615435] __asan_report_store1_noabort+0x20/0x30 [ 29.616052] kmalloc_large_oob_right+0x278/0x2b8 [ 29.616703] kunit_try_run_case+0x14c/0x3d0 [ 29.617561] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.618242] kthread+0x24c/0x2d0 [ 29.618709] ret_from_fork+0x10/0x20 [ 29.619300] [ 29.619682] The buggy address belongs to the physical page: [ 29.620318] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064e0 [ 29.621476] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.622391] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.623103] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.624024] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.624888] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.625740] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.626644] head: 0bfffe0000000002 ffffc1ffc3193801 ffffffffffffffff 0000000000000000 [ 29.627732] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 29.628583] page dumped because: kasan: bad access detected [ 29.630250] [ 29.630580] Memory state around the buggy address: [ 29.631265] fff00000c64e1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.632061] fff00000c64e1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.632914] >fff00000c64e2000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.633959] ^ [ 29.634408] fff00000c64e2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.635291] fff00000c64e2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.636037] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 29.552343] ================================================================== [ 29.553786] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 29.555310] Write of size 1 at addr fff00000c6519f00 by task kunit_try_catch/132 [ 29.556701] [ 29.557222] CPU: 0 UID: 0 PID: 132 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 29.558716] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.559199] Hardware name: linux,dummy-virt (DT) [ 29.559874] Call trace: [ 29.560331] show_stack+0x20/0x38 (C) [ 29.560956] dump_stack_lvl+0x8c/0xd0 [ 29.562426] print_report+0x118/0x5e0 [ 29.562945] kasan_report+0xc8/0x118 [ 29.563448] __asan_report_store1_noabort+0x20/0x30 [ 29.564069] kmalloc_big_oob_right+0x2a4/0x2f0 [ 29.564667] kunit_try_run_case+0x14c/0x3d0 [ 29.565696] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.566425] kthread+0x24c/0x2d0 [ 29.566889] ret_from_fork+0x10/0x20 [ 29.567398] [ 29.567717] Allocated by task 132: [ 29.568207] kasan_save_stack+0x3c/0x68 [ 29.568735] kasan_save_track+0x20/0x40 [ 29.569232] kasan_save_alloc_info+0x40/0x58 [ 29.570491] __kasan_kmalloc+0xd4/0xd8 [ 29.571561] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.572350] kmalloc_big_oob_right+0xb8/0x2f0 [ 29.573160] kunit_try_run_case+0x14c/0x3d0 [ 29.574144] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.574733] kthread+0x24c/0x2d0 [ 29.575276] ret_from_fork+0x10/0x20 [ 29.575757] [ 29.576097] The buggy address belongs to the object at fff00000c6518000 [ 29.576097] which belongs to the cache kmalloc-8k of size 8192 [ 29.577403] The buggy address is located 0 bytes to the right of [ 29.577403] allocated 7936-byte region [fff00000c6518000, fff00000c6519f00) [ 29.579002] [ 29.579435] The buggy address belongs to the physical page: [ 29.580243] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106518 [ 29.581066] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.581874] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.583389] page_type: f5(slab) [ 29.584017] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 29.585036] raw: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000 [ 29.585832] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 29.586632] head: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000 [ 29.588200] head: 0bfffe0000000003 ffffc1ffc3194601 ffffffffffffffff 0000000000000000 [ 29.589363] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000 [ 29.590153] page dumped because: kasan: bad access detected [ 29.590750] [ 29.591082] Memory state around the buggy address: [ 29.591581] fff00000c6519e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.592431] fff00000c6519e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.593321] >fff00000c6519f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.593991] ^ [ 29.594433] fff00000c6519f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.596038] fff00000c651a000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.596645] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 29.466061] ================================================================== [ 29.467220] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x414/0x490 [ 29.468079] Write of size 1 at addr fff00000c402fb78 by task kunit_try_catch/130 [ 29.468818] [ 29.469661] CPU: 1 UID: 0 PID: 130 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 29.470689] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.471209] Hardware name: linux,dummy-virt (DT) [ 29.471821] Call trace: [ 29.472235] show_stack+0x20/0x38 (C) [ 29.472741] dump_stack_lvl+0x8c/0xd0 [ 29.473583] print_report+0x118/0x5e0 [ 29.474332] kasan_report+0xc8/0x118 [ 29.475015] __asan_report_store1_noabort+0x20/0x30 [ 29.475597] kmalloc_track_caller_oob_right+0x414/0x490 [ 29.476224] kunit_try_run_case+0x14c/0x3d0 [ 29.476853] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.477732] kthread+0x24c/0x2d0 [ 29.478296] ret_from_fork+0x10/0x20 [ 29.478878] [ 29.479214] Allocated by task 130: [ 29.479727] kasan_save_stack+0x3c/0x68 [ 29.480201] kasan_save_track+0x20/0x40 [ 29.480785] kasan_save_alloc_info+0x40/0x58 [ 29.481370] __kasan_kmalloc+0xd4/0xd8 [ 29.482228] __kmalloc_node_track_caller_noprof+0x184/0x4b8 [ 29.482957] kmalloc_track_caller_oob_right+0xa8/0x490 [ 29.483588] kunit_try_run_case+0x14c/0x3d0 [ 29.484212] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.484854] kthread+0x24c/0x2d0 [ 29.485437] ret_from_fork+0x10/0x20 [ 29.486169] [ 29.486480] The buggy address belongs to the object at fff00000c402fb00 [ 29.486480] which belongs to the cache kmalloc-128 of size 128 [ 29.487600] The buggy address is located 0 bytes to the right of [ 29.487600] allocated 120-byte region [fff00000c402fb00, fff00000c402fb78) [ 29.488816] [ 29.489128] The buggy address belongs to the physical page: [ 29.490041] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10402f [ 29.490968] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.492362] page_type: f5(slab) [ 29.492986] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.494009] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 29.494954] page dumped because: kasan: bad access detected [ 29.495685] [ 29.496074] Memory state around the buggy address: [ 29.496784] fff00000c402fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 29.498041] fff00000c402fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.498930] >fff00000c402fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.499730] ^ [ 29.500543] fff00000c402fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.501612] fff00000c402fc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.502334] ================================================================== [ 29.504789] ================================================================== [ 29.505650] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x420/0x490 [ 29.506361] Write of size 1 at addr fff00000c402fc78 by task kunit_try_catch/130 [ 29.507535] [ 29.507943] CPU: 1 UID: 0 PID: 130 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 29.509411] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.509994] Hardware name: linux,dummy-virt (DT) [ 29.510664] Call trace: [ 29.511144] show_stack+0x20/0x38 (C) [ 29.511619] dump_stack_lvl+0x8c/0xd0 [ 29.512224] print_report+0x118/0x5e0 [ 29.512816] kasan_report+0xc8/0x118 [ 29.513638] __asan_report_store1_noabort+0x20/0x30 [ 29.514275] kmalloc_track_caller_oob_right+0x420/0x490 [ 29.514982] kunit_try_run_case+0x14c/0x3d0 [ 29.515506] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.516255] kthread+0x24c/0x2d0 [ 29.516819] ret_from_fork+0x10/0x20 [ 29.517625] [ 29.517902] Allocated by task 130: [ 29.518402] kasan_save_stack+0x3c/0x68 [ 29.518972] kasan_save_track+0x20/0x40 [ 29.519563] kasan_save_alloc_info+0x40/0x58 [ 29.520067] __kasan_kmalloc+0xd4/0xd8 [ 29.520664] __kmalloc_node_track_caller_noprof+0x184/0x4b8 [ 29.521605] kmalloc_track_caller_oob_right+0x184/0x490 [ 29.522244] kunit_try_run_case+0x14c/0x3d0 [ 29.522852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.523518] kthread+0x24c/0x2d0 [ 29.524051] ret_from_fork+0x10/0x20 [ 29.524623] [ 29.525655] The buggy address belongs to the object at fff00000c402fc00 [ 29.525655] which belongs to the cache kmalloc-128 of size 128 [ 29.527243] The buggy address is located 0 bytes to the right of [ 29.527243] allocated 120-byte region [fff00000c402fc00, fff00000c402fc78) [ 29.528966] [ 29.529531] The buggy address belongs to the physical page: [ 29.530158] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10402f [ 29.530958] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.531671] page_type: f5(slab) [ 29.532215] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.533142] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 29.534159] page dumped because: kasan: bad access detected [ 29.534739] [ 29.535077] Memory state around the buggy address: [ 29.535706] fff00000c402fb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.536489] fff00000c402fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.537465] >fff00000c402fc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.538274] ^ [ 29.539070] fff00000c402fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.540209] fff00000c402fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.541133] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 29.412841] ================================================================== [ 29.414296] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 29.415130] Read of size 1 at addr fff00000c6453000 by task kunit_try_catch/128 [ 29.415956] [ 29.416369] CPU: 0 UID: 0 PID: 128 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 29.417912] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.418435] Hardware name: linux,dummy-virt (DT) [ 29.419178] Call trace: [ 29.419600] show_stack+0x20/0x38 (C) [ 29.420161] dump_stack_lvl+0x8c/0xd0 [ 29.420812] print_report+0x118/0x5e0 [ 29.421474] kasan_report+0xc8/0x118 [ 29.422407] __asan_report_load1_noabort+0x20/0x30 [ 29.423052] kmalloc_node_oob_right+0x2f4/0x330 [ 29.423704] kunit_try_run_case+0x14c/0x3d0 [ 29.424384] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.425083] kthread+0x24c/0x2d0 [ 29.425973] ret_from_fork+0x10/0x20 [ 29.426545] [ 29.426919] Allocated by task 128: [ 29.427472] kasan_save_stack+0x3c/0x68 [ 29.427973] kasan_save_track+0x20/0x40 [ 29.428612] kasan_save_alloc_info+0x40/0x58 [ 29.429696] __kasan_kmalloc+0xd4/0xd8 [ 29.430189] __kmalloc_cache_node_noprof+0x168/0x3d0 [ 29.430718] kmalloc_node_oob_right+0xbc/0x330 [ 29.431207] kunit_try_run_case+0x14c/0x3d0 [ 29.431670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.432254] kthread+0x24c/0x2d0 [ 29.433647] ret_from_fork+0x10/0x20 [ 29.434156] [ 29.434461] The buggy address belongs to the object at fff00000c6452000 [ 29.434461] which belongs to the cache kmalloc-4k of size 4096 [ 29.435742] The buggy address is located 0 bytes to the right of [ 29.435742] allocated 4096-byte region [fff00000c6452000, fff00000c6453000) [ 29.437081] [ 29.437814] The buggy address belongs to the physical page: [ 29.438450] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106450 [ 29.439495] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.440414] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.441169] page_type: f5(slab) [ 29.442037] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 29.442940] raw: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000 [ 29.443953] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 29.444756] head: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000 [ 29.446043] head: 0bfffe0000000003 ffffc1ffc3191401 ffffffffffffffff 0000000000000000 [ 29.447057] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000 [ 29.448050] page dumped because: kasan: bad access detected [ 29.448843] [ 29.449182] Memory state around the buggy address: [ 29.450198] fff00000c6452f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.450890] fff00000c6452f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.451578] >fff00000c6453000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.452686] ^ [ 29.453097] fff00000c6453080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.454363] fff00000c6453100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.455305] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 29.358462] ================================================================== [ 29.359563] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 29.360328] Read of size 1 at addr fff00000c4005dff by task kunit_try_catch/126 [ 29.360961] [ 29.361380] CPU: 1 UID: 0 PID: 126 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 29.362801] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.363505] Hardware name: linux,dummy-virt (DT) [ 29.364261] Call trace: [ 29.364839] show_stack+0x20/0x38 (C) [ 29.365586] dump_stack_lvl+0x8c/0xd0 [ 29.366362] print_report+0x118/0x5e0 [ 29.367065] kasan_report+0xc8/0x118 [ 29.367790] __asan_report_load1_noabort+0x20/0x30 [ 29.368596] kmalloc_oob_left+0x2ec/0x320 [ 29.369503] kunit_try_run_case+0x14c/0x3d0 [ 29.370267] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.371105] kthread+0x24c/0x2d0 [ 29.371580] ret_from_fork+0x10/0x20 [ 29.372072] [ 29.372395] Allocated by task 28: [ 29.372842] kasan_save_stack+0x3c/0x68 [ 29.373944] kasan_save_track+0x20/0x40 [ 29.374662] kasan_save_alloc_info+0x40/0x58 [ 29.375409] __kasan_kmalloc+0xd4/0xd8 [ 29.376073] __kmalloc_node_track_caller_noprof+0x184/0x4b8 [ 29.376945] kstrdup+0x54/0xc8 [ 29.377638] devtmpfs_work_loop+0x384/0x590 [ 29.378191] devtmpfsd+0x50/0x58 [ 29.378633] kthread+0x24c/0x2d0 [ 29.379065] ret_from_fork+0x10/0x20 [ 29.380094] [ 29.380683] Freed by task 28: [ 29.381807] kasan_save_stack+0x3c/0x68 [ 29.382272] kasan_save_track+0x20/0x40 [ 29.382849] kasan_save_free_info+0x4c/0x78 [ 29.383425] __kasan_slab_free+0x6c/0x98 [ 29.384022] kfree+0x114/0x3c8 [ 29.384693] devtmpfs_work_loop+0x498/0x590 [ 29.385421] devtmpfsd+0x50/0x58 [ 29.385922] kthread+0x24c/0x2d0 [ 29.386490] ret_from_fork+0x10/0x20 [ 29.387136] [ 29.387485] The buggy address belongs to the object at fff00000c4005de0 [ 29.387485] which belongs to the cache kmalloc-16 of size 16 [ 29.388750] The buggy address is located 15 bytes to the right of [ 29.388750] allocated 16-byte region [fff00000c4005de0, fff00000c4005df0) [ 29.389987] [ 29.390382] The buggy address belongs to the physical page: [ 29.391041] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005 [ 29.391962] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.392718] page_type: f5(slab) [ 29.393287] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 29.394139] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 29.395142] page dumped because: kasan: bad access detected [ 29.395880] [ 29.396292] Memory state around the buggy address: [ 29.396979] fff00000c4005c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.397716] fff00000c4005d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.398467] >fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 29.399208] ^ [ 29.400070] fff00000c4005e00: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.400833] fff00000c4005e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.401669] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 29.224178] ================================================================== [ 29.225632] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 29.227641] Write of size 1 at addr fff00000c402f973 by task kunit_try_catch/124 [ 29.228612] [ 29.230546] CPU: 1 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G N 6.12.0-next-20241128 #1 [ 29.231806] Tainted: [N]=TEST [ 29.232226] Hardware name: linux,dummy-virt (DT) [ 29.233586] Call trace: [ 29.234431] show_stack+0x20/0x38 (C) [ 29.235306] dump_stack_lvl+0x8c/0xd0 [ 29.235822] print_report+0x118/0x5e0 [ 29.236523] kasan_report+0xc8/0x118 [ 29.237409] __asan_report_store1_noabort+0x20/0x30 [ 29.238217] kmalloc_oob_right+0x5a4/0x660 [ 29.238931] kunit_try_run_case+0x14c/0x3d0 [ 29.239686] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.240365] kthread+0x24c/0x2d0 [ 29.240841] ret_from_fork+0x10/0x20 [ 29.242257] [ 29.242686] Allocated by task 124: [ 29.243373] kasan_save_stack+0x3c/0x68 [ 29.243939] kasan_save_track+0x20/0x40 [ 29.244802] kasan_save_alloc_info+0x40/0x58 [ 29.245600] __kasan_kmalloc+0xd4/0xd8 [ 29.246307] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.247041] kmalloc_oob_right+0xb0/0x660 [ 29.247776] kunit_try_run_case+0x14c/0x3d0 [ 29.248510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.249372] kthread+0x24c/0x2d0 [ 29.249818] ret_from_fork+0x10/0x20 [ 29.250366] [ 29.250757] The buggy address belongs to the object at fff00000c402f900 [ 29.250757] which belongs to the cache kmalloc-128 of size 128 [ 29.252652] The buggy address is located 0 bytes to the right of [ 29.252652] allocated 115-byte region [fff00000c402f900, fff00000c402f973) [ 29.253993] [ 29.254556] The buggy address belongs to the physical page: [ 29.255587] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10402f [ 29.256675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.258126] page_type: f5(slab) [ 29.259245] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.260028] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 29.261069] page dumped because: kasan: bad access detected [ 29.261927] [ 29.262282] Memory state around the buggy address: [ 29.263354] fff00000c402f800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 29.264158] fff00000c402f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.265012] >fff00000c402f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.265767] ^ [ 29.266777] fff00000c402f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.267628] fff00000c402fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.268498] ================================================================== [ 29.309859] ================================================================== [ 29.311523] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 29.312479] Read of size 1 at addr fff00000c402f980 by task kunit_try_catch/124 [ 29.313925] [ 29.314204] CPU: 1 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 29.315162] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.315769] Hardware name: linux,dummy-virt (DT) [ 29.316350] Call trace: [ 29.316631] show_stack+0x20/0x38 (C) [ 29.317748] dump_stack_lvl+0x8c/0xd0 [ 29.318420] print_report+0x118/0x5e0 [ 29.319136] kasan_report+0xc8/0x118 [ 29.319734] __asan_report_load1_noabort+0x20/0x30 [ 29.320316] kmalloc_oob_right+0x5d0/0x660 [ 29.320927] kunit_try_run_case+0x14c/0x3d0 [ 29.321845] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.322457] kthread+0x24c/0x2d0 [ 29.323004] ret_from_fork+0x10/0x20 [ 29.323556] [ 29.323875] Allocated by task 124: [ 29.324342] kasan_save_stack+0x3c/0x68 [ 29.324914] kasan_save_track+0x20/0x40 [ 29.325467] kasan_save_alloc_info+0x40/0x58 [ 29.326381] __kasan_kmalloc+0xd4/0xd8 [ 29.326995] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.327571] kmalloc_oob_right+0xb0/0x660 [ 29.328063] kunit_try_run_case+0x14c/0x3d0 [ 29.328697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.330381] kthread+0x24c/0x2d0 [ 29.330869] ret_from_fork+0x10/0x20 [ 29.331609] [ 29.332133] The buggy address belongs to the object at fff00000c402f900 [ 29.332133] which belongs to the cache kmalloc-128 of size 128 [ 29.334035] The buggy address is located 13 bytes to the right of [ 29.334035] allocated 115-byte region [fff00000c402f900, fff00000c402f973) [ 29.335366] [ 29.335845] The buggy address belongs to the physical page: [ 29.336509] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10402f [ 29.337607] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.337982] page_type: f5(slab) [ 29.338307] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.339565] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 29.340535] page dumped because: kasan: bad access detected [ 29.341467] [ 29.341948] Memory state around the buggy address: [ 29.342709] fff00000c402f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.343671] fff00000c402f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.344637] >fff00000c402f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.345737] ^ [ 29.346203] fff00000c402fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.346933] fff00000c402fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.348074] ================================================================== [ 29.273570] ================================================================== [ 29.274192] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 29.274854] Write of size 1 at addr fff00000c402f978 by task kunit_try_catch/124 [ 29.275547] [ 29.275790] CPU: 1 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 29.277755] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.278298] Hardware name: linux,dummy-virt (DT) [ 29.278885] Call trace: [ 29.279391] show_stack+0x20/0x38 (C) [ 29.280049] dump_stack_lvl+0x8c/0xd0 [ 29.280762] print_report+0x118/0x5e0 [ 29.281391] kasan_report+0xc8/0x118 [ 29.282020] __asan_report_store1_noabort+0x20/0x30 [ 29.282688] kmalloc_oob_right+0x538/0x660 [ 29.283278] kunit_try_run_case+0x14c/0x3d0 [ 29.283876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.284608] kthread+0x24c/0x2d0 [ 29.285396] ret_from_fork+0x10/0x20 [ 29.285926] [ 29.286317] Allocated by task 124: [ 29.286856] kasan_save_stack+0x3c/0x68 [ 29.287441] kasan_save_track+0x20/0x40 [ 29.288028] kasan_save_alloc_info+0x40/0x58 [ 29.288637] __kasan_kmalloc+0xd4/0xd8 [ 29.289431] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.289989] kmalloc_oob_right+0xb0/0x660 [ 29.290563] kunit_try_run_case+0x14c/0x3d0 [ 29.291176] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.291715] kthread+0x24c/0x2d0 [ 29.292252] ret_from_fork+0x10/0x20 [ 29.292804] [ 29.293398] The buggy address belongs to the object at fff00000c402f900 [ 29.293398] which belongs to the cache kmalloc-128 of size 128 [ 29.294536] The buggy address is located 5 bytes to the right of [ 29.294536] allocated 115-byte region [fff00000c402f900, fff00000c402f973) [ 29.295654] [ 29.295983] The buggy address belongs to the physical page: [ 29.296676] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10402f [ 29.298196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.298938] page_type: f5(slab) [ 29.299470] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.300374] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 29.301178] page dumped because: kasan: bad access detected [ 29.302097] [ 29.302455] Memory state around the buggy address: [ 29.302968] fff00000c402f800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 29.303738] fff00000c402f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.304532] >fff00000c402f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.305614] ^ [ 29.306412] fff00000c402f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.307582] fff00000c402fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.308264] ==================================================================
Failure - log-parser-boot - internal-error-oops-oops-preempt-smp
KNOWN ISSUE - kunit_test_null_dereference internal oops on qemu-arm64 KUNIT KASAN
[ 142.172491] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP [ 142.173503] Modules linked in: [ 142.174378] CPU: 1 UID: 0 PID: 620 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 142.175298] Tainted: [B]=BAD_PAGE, [N]=TEST [ 142.175800] Hardware name: linux,dummy-virt (DT) [ 142.176426] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 142.177127] pc : kunit_test_null_dereference+0x70/0x170 [ 142.177690] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 142.178244] sp : ffff8000834d7dc0 [ 142.178678] x29: ffff8000834d7e20 x28: 0000000000000000 x27: 0000000000000000 [ 142.179833] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000c6327d00 [ 142.180655] x23: ffffaee479fca390 x22: ffffaee479fd2f50 x21: fff00000c6327d08 [ 142.181149] x20: 1ffff0001069afb8 x19: ffff8000800879f0 x18: 00000000c61e90ca [ 142.181934] x17: 0000000000000001 x16: fff00000da501ca0 x15: fff00000ff615b48 [ 142.182860] x14: 000000002d0d0c63 x13: 1ffe00001815db04 x12: fffd8000198ca62a [ 142.183721] x11: 1ffe0000198ca629 x10: fffd8000198ca629 x9 : ffffaee479fca418 [ 142.184387] x8 : ffff8000834d7cb8 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 142.185192] x5 : ffff70001069afb8 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 142.186026] x2 : dfff800000000000 x1 : fff00000cc652880 x0 : ffff8000800879f0 [ 142.186893] Call trace: [ 142.187300] kunit_test_null_dereference+0x70/0x170 (P) [ 142.187828] kunit_generic_run_threadfn_adapter+0x88/0x100 (L) [ 142.188395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 142.188932] kthread+0x24c/0x2d0 [ 142.189425] ret_from_fork+0x10/0x20 [ 142.190384] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 142.191411] ---[ end trace 0000000000000000 ]---