Date
Dec. 3, 2024, 11:38 p.m.
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 66.436915] ================================================================== [ 66.437766] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 66.437766] [ 66.438597] Use-after-free read at 0x00000000cb1fbd26 (in kfence-#224): [ 66.440127] test_krealloc+0x51c/0x830 [ 66.440919] test_krealloc+0x458/0x830 [ 66.441545] kunit_try_run_case+0x14c/0x3d0 [ 66.442304] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.443093] kthread+0x24c/0x2d0 [ 66.443573] ret_from_fork+0x10/0x20 [ 66.444085] [ 66.444468] kfence-#224: 0x00000000cb1fbd26-0x0000000009cdc7f2, size=32, cache=kmalloc-32 [ 66.444468] [ 66.445569] allocated by task 326 on cpu 0 at 66.435820s (0.009740s ago): [ 66.446450] test_alloc+0x298/0x620 [ 66.447079] test_krealloc+0xc0/0x830 [ 66.447574] kunit_try_run_case+0x14c/0x3d0 [ 66.448315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.448974] kthread+0x24c/0x2d0 [ 66.449656] ret_from_fork+0x10/0x20 [ 66.450260] [ 66.450600] freed by task 326 on cpu 0 at 66.436253s (0.014337s ago): [ 66.451537] krealloc_noprof+0x148/0x360 [ 66.452137] test_krealloc+0x1dc/0x830 [ 66.452826] kunit_try_run_case+0x14c/0x3d0 [ 66.453344] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.454156] kthread+0x24c/0x2d0 [ 66.454687] ret_from_fork+0x10/0x20 [ 66.455235] [ 66.455592] CPU: 0 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 66.456788] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.457403] Hardware name: linux,dummy-virt (DT) [ 66.458127] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 66.271541] ================================================================== [ 66.272287] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 66.272287] [ 66.273350] Use-after-free read at 0x0000000043b0972c (in kfence-#222): [ 66.274198] test_memcache_typesafe_by_rcu+0x280/0x560 [ 66.274919] test_memcache_typesafe_by_rcu+0x260/0x560 [ 66.275824] kunit_try_run_case+0x14c/0x3d0 [ 66.276365] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.277212] kthread+0x24c/0x2d0 [ 66.277683] ret_from_fork+0x10/0x20 [ 66.278308] [ 66.278793] kfence-#222: 0x0000000043b0972c-0x000000006908a899, size=32, cache=test [ 66.278793] [ 66.279799] allocated by task 324 on cpu 1 at 66.227885s (0.051905s ago): [ 66.280808] test_alloc+0x22c/0x620 [ 66.281344] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 66.281998] kunit_try_run_case+0x14c/0x3d0 [ 66.282613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.283446] kthread+0x24c/0x2d0 [ 66.283902] ret_from_fork+0x10/0x20 [ 66.284584] [ 66.284971] freed by task 324 on cpu 1 at 66.228059s (0.056901s ago): [ 66.285733] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 66.286558] kunit_try_run_case+0x14c/0x3d0 [ 66.287141] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.287917] kthread+0x24c/0x2d0 [ 66.288555] ret_from_fork+0x10/0x20 [ 66.289168] [ 66.289629] CPU: 1 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 66.290848] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.291413] Hardware name: linux,dummy-virt (DT) [ 66.292112] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 46.912830] ================================================================== [ 46.914218] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 46.914218] [ 46.916615] Invalid read at 0x0000000015208d49: [ 46.917408] test_invalid_access+0xdc/0x1f0 [ 46.918085] kunit_try_run_case+0x14c/0x3d0 [ 46.918847] kunit_try_run_case+0x14c/0x3d0 [ 46.919966] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.921131] kthread+0x24c/0x2d0 [ 46.921602] ret_from_fork+0x10/0x20 [ 46.922244] [ 46.922646] CPU: 1 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 46.924990] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.926219] Hardware name: linux,dummy-virt (DT) [ 46.926790] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 33.025459] ================================================================== [ 33.026641] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 33.027961] Free of addr fff00000c58ff200 by task kunit_try_catch/224 [ 33.028984] [ 33.029504] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 33.030807] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.031835] Hardware name: linux,dummy-virt (DT) [ 33.032472] Call trace: [ 33.033155] show_stack+0x20/0x38 (C) [ 33.033759] dump_stack_lvl+0x8c/0xd0 [ 33.034203] print_report+0x118/0x5e0 [ 33.034881] kasan_report_invalid_free+0xb0/0xd8 [ 33.035996] check_slab_allocation+0xd4/0x108 [ 33.036592] __kasan_mempool_poison_object+0x78/0x150 [ 33.036950] mempool_free+0x28c/0x328 [ 33.037238] mempool_double_free_helper+0x150/0x2e0 [ 33.038099] mempool_kmalloc_double_free+0xb8/0x110 [ 33.039369] kunit_try_run_case+0x14c/0x3d0 [ 33.040372] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.041553] kthread+0x24c/0x2d0 [ 33.042356] ret_from_fork+0x10/0x20 [ 33.042974] [ 33.043278] Allocated by task 224: [ 33.044175] kasan_save_stack+0x3c/0x68 [ 33.045007] kasan_save_track+0x20/0x40 [ 33.045801] kasan_save_alloc_info+0x40/0x58 [ 33.046516] __kasan_mempool_unpoison_object+0x11c/0x180 [ 33.047362] remove_element+0x130/0x1f8 [ 33.048421] mempool_alloc_preallocated+0x58/0xc0 [ 33.049817] mempool_double_free_helper+0x94/0x2e0 [ 33.050212] mempool_kmalloc_double_free+0xb8/0x110 [ 33.051002] kunit_try_run_case+0x14c/0x3d0 [ 33.051985] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.052831] kthread+0x24c/0x2d0 [ 33.053548] ret_from_fork+0x10/0x20 [ 33.054115] [ 33.054485] Freed by task 224: [ 33.054913] kasan_save_stack+0x3c/0x68 [ 33.055785] kasan_save_track+0x20/0x40 [ 33.056422] kasan_save_free_info+0x4c/0x78 [ 33.057062] __kasan_mempool_poison_object+0xc0/0x150 [ 33.058458] mempool_free+0x28c/0x328 [ 33.058973] mempool_double_free_helper+0x100/0x2e0 [ 33.059751] mempool_kmalloc_double_free+0xb8/0x110 [ 33.060579] kunit_try_run_case+0x14c/0x3d0 [ 33.061117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.062235] kthread+0x24c/0x2d0 [ 33.062958] ret_from_fork+0x10/0x20 [ 33.063724] [ 33.064084] The buggy address belongs to the object at fff00000c58ff200 [ 33.064084] which belongs to the cache kmalloc-128 of size 128 [ 33.066022] The buggy address is located 0 bytes inside of [ 33.066022] 128-byte region [fff00000c58ff200, fff00000c58ff280) [ 33.068658] [ 33.069048] The buggy address belongs to the physical page: [ 33.069907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ff [ 33.071878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.072617] page_type: f5(slab) [ 33.073187] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.074058] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.075476] page dumped because: kasan: bad access detected [ 33.076494] [ 33.076867] Memory state around the buggy address: [ 33.077442] fff00000c58ff100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.078390] fff00000c58ff180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.079591] >fff00000c58ff200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.080865] ^ [ 33.081529] fff00000c58ff280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.082521] fff00000c58ff300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.083563] ================================================================== [ 33.093656] ================================================================== [ 33.094909] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 33.096132] Free of addr fff00000c65e0000 by task kunit_try_catch/226 [ 33.096850] [ 33.097316] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 33.098448] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.099006] Hardware name: linux,dummy-virt (DT) [ 33.099755] Call trace: [ 33.100100] show_stack+0x20/0x38 (C) [ 33.101020] dump_stack_lvl+0x8c/0xd0 [ 33.101679] print_report+0x118/0x5e0 [ 33.102454] kasan_report_invalid_free+0xb0/0xd8 [ 33.103148] __kasan_mempool_poison_object+0x14c/0x150 [ 33.104017] mempool_free+0x28c/0x328 [ 33.104519] mempool_double_free_helper+0x150/0x2e0 [ 33.105271] mempool_kmalloc_large_double_free+0xb8/0x110 [ 33.106008] kunit_try_run_case+0x14c/0x3d0 [ 33.106778] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.108080] kthread+0x24c/0x2d0 [ 33.108663] ret_from_fork+0x10/0x20 [ 33.109264] [ 33.109573] The buggy address belongs to the physical page: [ 33.110428] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065e0 [ 33.111500] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.112447] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.113678] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.115283] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.116290] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.117226] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.118134] head: 0bfffe0000000002 ffffc1ffc3197801 ffffffffffffffff 0000000000000000 [ 33.119311] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 33.120504] page dumped because: kasan: bad access detected [ 33.121263] [ 33.121640] Memory state around the buggy address: [ 33.122380] fff00000c65dff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.123548] fff00000c65dff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.124312] >fff00000c65e0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.124895] ^ [ 33.125234] fff00000c65e0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.125908] fff00000c65e0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.127389] ================================================================== [ 33.138743] ================================================================== [ 33.140514] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 33.141561] Free of addr fff00000c6620000 by task kunit_try_catch/228 [ 33.142837] [ 33.143468] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 33.144756] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.145286] Hardware name: linux,dummy-virt (DT) [ 33.145945] Call trace: [ 33.146354] show_stack+0x20/0x38 (C) [ 33.147060] dump_stack_lvl+0x8c/0xd0 [ 33.147644] print_report+0x118/0x5e0 [ 33.148307] kasan_report_invalid_free+0xb0/0xd8 [ 33.148905] __kasan_mempool_poison_pages+0xe0/0xe8 [ 33.150015] mempool_free+0x24c/0x328 [ 33.150701] mempool_double_free_helper+0x150/0x2e0 [ 33.151654] mempool_page_alloc_double_free+0xb4/0x110 [ 33.152385] kunit_try_run_case+0x14c/0x3d0 [ 33.152970] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.153754] kthread+0x24c/0x2d0 [ 33.154469] ret_from_fork+0x10/0x20 [ 33.155196] [ 33.155598] The buggy address belongs to the physical page: [ 33.156364] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106620 [ 33.157365] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.158231] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.159424] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.160873] page dumped because: kasan: bad access detected [ 33.161595] [ 33.161928] Memory state around the buggy address: [ 33.162608] fff00000c661ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.164110] fff00000c661ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.165273] >fff00000c6620000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.166134] ^ [ 33.166744] fff00000c6620080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.167671] fff00000c6620100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.168810] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 46.672251] ================================================================== [ 46.673086] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 46.673086] [ 46.674422] Corrupted memory at 0x000000003ba5c790 [ ! . . . . . . . . . . . . . . . ] (in kfence-#218): [ 46.676850] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 46.677777] kunit_try_run_case+0x14c/0x3d0 [ 46.678575] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.679498] kthread+0x24c/0x2d0 [ 46.680101] ret_from_fork+0x10/0x20 [ 46.680730] [ 46.681096] kfence-#218: 0x00000000afb3715d-0x0000000078bf3cd3, size=73, cache=kmalloc-96 [ 46.681096] [ 46.682305] allocated by task 314 on cpu 1 at 46.671857s (0.010439s ago): [ 46.683371] test_alloc+0x298/0x620 [ 46.684024] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 46.684794] kunit_try_run_case+0x14c/0x3d0 [ 46.685477] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.686264] kthread+0x24c/0x2d0 [ 46.686864] ret_from_fork+0x10/0x20 [ 46.687467] [ 46.687822] freed by task 314 on cpu 1 at 46.672076s (0.015736s ago): [ 46.688869] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 46.689739] kunit_try_run_case+0x14c/0x3d0 [ 46.690358] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.691097] kthread+0x24c/0x2d0 [ 46.691702] ret_from_fork+0x10/0x20 [ 46.692407] [ 46.692877] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 46.694158] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.694778] Hardware name: linux,dummy-virt (DT) [ 46.695497] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 46.256530] ================================================================== [ 46.257379] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 46.257379] [ 46.258673] Out-of-bounds read at 0x00000000c9c37757 (105B right of kfence-#214): [ 46.260017] test_kmalloc_aligned_oob_read+0x238/0x468 [ 46.260789] test_kmalloc_aligned_oob_read+0x100/0x468 [ 46.261435] kunit_try_run_case+0x14c/0x3d0 [ 46.262364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.263278] kthread+0x24c/0x2d0 [ 46.264188] ret_from_fork+0x10/0x20 [ 46.264916] [ 46.265738] kfence-#214: 0x000000000c26de26-0x000000009a5da260, size=73, cache=kmalloc-96 [ 46.265738] [ 46.267029] allocated by task 312 on cpu 1 at 46.256153s (0.010866s ago): [ 46.267952] test_alloc+0x298/0x620 [ 46.268606] test_kmalloc_aligned_oob_read+0x100/0x468 [ 46.269303] kunit_try_run_case+0x14c/0x3d0 [ 46.269893] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.270782] kthread+0x24c/0x2d0 [ 46.271233] ret_from_fork+0x10/0x20 [ 46.271829] [ 46.272244] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 46.273537] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.274149] Hardware name: linux,dummy-virt (DT) [ 46.274909] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[ 40.848042] ================================================================== [ 40.848985] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 40.848985] [ 40.849808] Corrupted memory at 0x00000000f43d9b27 [ ! ] (in kfence-#162): [ 40.851590] test_corruption+0x1d8/0x378 [ 40.852293] kunit_try_run_case+0x14c/0x3d0 [ 40.852881] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.853605] kthread+0x24c/0x2d0 [ 40.854081] ret_from_fork+0x10/0x20 [ 40.854735] [ 40.855088] kfence-#162: 0x000000008dc80d51-0x000000000b5d420c, size=32, cache=test [ 40.855088] [ 40.856153] allocated by task 302 on cpu 1 at 40.847797s (0.008346s ago): [ 40.857074] test_alloc+0x22c/0x620 [ 40.857633] test_corruption+0x198/0x378 [ 40.858272] kunit_try_run_case+0x14c/0x3d0 [ 40.858920] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.859678] kthread+0x24c/0x2d0 [ 40.860270] ret_from_fork+0x10/0x20 [ 40.861001] [ 40.861361] freed by task 302 on cpu 1 at 40.847889s (0.013462s ago): [ 40.862176] test_corruption+0x1d8/0x378 [ 40.862872] kunit_try_run_case+0x14c/0x3d0 [ 40.863494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.864251] kthread+0x24c/0x2d0 [ 40.864833] ret_from_fork+0x10/0x20 [ 40.865374] [ 40.865734] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 40.867099] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.867796] Hardware name: linux,dummy-virt (DT) [ 40.868415] ================================================================== [ 40.640316] ================================================================== [ 40.641146] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 40.641146] [ 40.641989] Corrupted memory at 0x00000000f8ac087e [ ! ] (in kfence-#160): [ 40.643828] test_corruption+0x284/0x378 [ 40.644602] kunit_try_run_case+0x14c/0x3d0 [ 40.645362] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.646134] kthread+0x24c/0x2d0 [ 40.646681] ret_from_fork+0x10/0x20 [ 40.647225] [ 40.647574] kfence-#160: 0x00000000a4f8051d-0x000000006ccf8bb6, size=32, cache=kmalloc-32 [ 40.647574] [ 40.648690] allocated by task 300 on cpu 0 at 40.639841s (0.008839s ago): [ 40.649634] test_alloc+0x298/0x620 [ 40.650293] test_corruption+0x198/0x378 [ 40.650886] kunit_try_run_case+0x14c/0x3d0 [ 40.651587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.652235] kthread+0x24c/0x2d0 [ 40.652879] ret_from_fork+0x10/0x20 [ 40.653456] [ 40.653803] freed by task 300 on cpu 0 at 40.640020s (0.013773s ago): [ 40.654686] test_corruption+0x284/0x378 [ 40.655232] kunit_try_run_case+0x14c/0x3d0 [ 40.655907] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.656625] kthread+0x24c/0x2d0 [ 40.657230] ret_from_fork+0x10/0x20 [ 40.657822] [ 40.658287] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 40.659507] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.660078] Hardware name: linux,dummy-virt (DT) [ 40.660767] ================================================================== [ 40.744176] ================================================================== [ 40.745112] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 40.745112] [ 40.745933] Corrupted memory at 0x00000000f7fb708c [ ! . . . . . . . . . . . . . . . ] (in kfence-#161): [ 40.748673] test_corruption+0x120/0x378 [ 40.749262] kunit_try_run_case+0x14c/0x3d0 [ 40.749999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.750865] kthread+0x24c/0x2d0 [ 40.751480] ret_from_fork+0x10/0x20 [ 40.751989] [ 40.752445] kfence-#161: 0x00000000ab3e9321-0x00000000648505f3, size=32, cache=test [ 40.752445] [ 40.753509] allocated by task 302 on cpu 1 at 40.743920s (0.009579s ago): [ 40.754441] test_alloc+0x22c/0x620 [ 40.755054] test_corruption+0xdc/0x378 [ 40.755661] kunit_try_run_case+0x14c/0x3d0 [ 40.756318] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.757135] kthread+0x24c/0x2d0 [ 40.757724] ret_from_fork+0x10/0x20 [ 40.758191] [ 40.758600] freed by task 302 on cpu 1 at 40.744021s (0.014570s ago): [ 40.759473] test_corruption+0x120/0x378 [ 40.760214] kunit_try_run_case+0x14c/0x3d0 [ 40.760835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.761637] kthread+0x24c/0x2d0 [ 40.762247] ret_from_fork+0x10/0x20 [ 40.762765] [ 40.763170] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 40.764368] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.765036] Hardware name: linux,dummy-virt (DT) [ 40.765699] ================================================================== [ 40.536082] ================================================================== [ 40.536988] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 40.536988] [ 40.537816] Corrupted memory at 0x00000000efe49d57 [ ! . . . . . . . . . . . . . . . ] (in kfence-#159): [ 40.540349] test_corruption+0x278/0x378 [ 40.540986] kunit_try_run_case+0x14c/0x3d0 [ 40.541697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.542489] kthread+0x24c/0x2d0 [ 40.543090] ret_from_fork+0x10/0x20 [ 40.543727] [ 40.544130] kfence-#159: 0x000000006c714b99-0x0000000092e78bd8, size=32, cache=kmalloc-32 [ 40.544130] [ 40.545374] allocated by task 300 on cpu 0 at 40.535755s (0.009610s ago): [ 40.546411] test_alloc+0x298/0x620 [ 40.547059] test_corruption+0xdc/0x378 [ 40.547763] kunit_try_run_case+0x14c/0x3d0 [ 40.548461] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.549261] kthread+0x24c/0x2d0 [ 40.549890] ret_from_fork+0x10/0x20 [ 40.550521] [ 40.550869] freed by task 300 on cpu 0 at 40.535921s (0.014939s ago): [ 40.551955] test_corruption+0x278/0x378 [ 40.552610] kunit_try_run_case+0x14c/0x3d0 [ 40.553287] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.554080] kthread+0x24c/0x2d0 [ 40.554689] ret_from_fork+0x10/0x20 [ 40.555287] [ 40.555751] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 40.556949] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.557368] Hardware name: linux,dummy-virt (DT) [ 40.557798] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 40.328041] ================================================================== [ 40.328886] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 40.328886] [ 40.329650] Invalid free of 0x0000000042149234 (in kfence-#157): [ 40.330553] test_invalid_addr_free+0x1ac/0x238 [ 40.331173] kunit_try_run_case+0x14c/0x3d0 [ 40.331806] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.332518] kthread+0x24c/0x2d0 [ 40.332974] ret_from_fork+0x10/0x20 [ 40.333704] [ 40.334093] kfence-#157: 0x000000009c249579-0x00000000dd24564c, size=32, cache=kmalloc-32 [ 40.334093] [ 40.335386] allocated by task 296 on cpu 0 at 40.327825s (0.007552s ago): [ 40.336351] test_alloc+0x298/0x620 [ 40.336919] test_invalid_addr_free+0xd4/0x238 [ 40.337594] kunit_try_run_case+0x14c/0x3d0 [ 40.338457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.339295] kthread+0x24c/0x2d0 [ 40.339808] ret_from_fork+0x10/0x20 [ 40.340397] [ 40.340845] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 40.342077] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.342846] Hardware name: linux,dummy-virt (DT) [ 40.343413] ================================================================== [ 40.432005] ================================================================== [ 40.433099] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 40.433099] [ 40.433922] Invalid free of 0x00000000b254b500 (in kfence-#158): [ 40.434866] test_invalid_addr_free+0xec/0x238 [ 40.435906] kunit_try_run_case+0x14c/0x3d0 [ 40.436436] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.437292] kthread+0x24c/0x2d0 [ 40.437755] ret_from_fork+0x10/0x20 [ 40.438428] [ 40.438767] kfence-#158: 0x00000000725c4297-0x0000000045d2c217, size=32, cache=test [ 40.438767] [ 40.439864] allocated by task 298 on cpu 1 at 40.431797s (0.008058s ago): [ 40.440804] test_alloc+0x22c/0x620 [ 40.441283] test_invalid_addr_free+0xd4/0x238 [ 40.442052] kunit_try_run_case+0x14c/0x3d0 [ 40.442627] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.443455] kthread+0x24c/0x2d0 [ 40.444055] ret_from_fork+0x10/0x20 [ 40.444617] [ 40.444972] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 40.446230] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.446895] Hardware name: linux,dummy-virt (DT) [ 40.447505] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[ 40.224235] ================================================================== [ 40.224999] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 40.224999] [ 40.225876] Invalid free of 0x00000000cc322a06 (in kfence-#156): [ 40.227443] test_double_free+0x100/0x238 [ 40.228185] kunit_try_run_case+0x14c/0x3d0 [ 40.228817] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.229746] kthread+0x24c/0x2d0 [ 40.230448] ret_from_fork+0x10/0x20 [ 40.230983] [ 40.231345] kfence-#156: 0x00000000cc322a06-0x000000004f9cfd72, size=32, cache=test [ 40.231345] [ 40.232837] allocated by task 294 on cpu 1 at 40.223835s (0.008990s ago): [ 40.233683] test_alloc+0x22c/0x620 [ 40.234214] test_double_free+0xd4/0x238 [ 40.234773] kunit_try_run_case+0x14c/0x3d0 [ 40.235697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.236421] kthread+0x24c/0x2d0 [ 40.236916] ret_from_fork+0x10/0x20 [ 40.237463] [ 40.237786] freed by task 294 on cpu 1 at 40.223937s (0.013838s ago): [ 40.238956] test_double_free+0xf0/0x238 [ 40.239589] kunit_try_run_case+0x14c/0x3d0 [ 40.240356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.241175] kthread+0x24c/0x2d0 [ 40.241710] ret_from_fork+0x10/0x20 [ 40.242419] [ 40.242706] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 40.244080] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.244712] Hardware name: linux,dummy-virt (DT) [ 40.245450] ================================================================== [ 40.120258] ================================================================== [ 40.121234] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 40.121234] [ 40.122634] Invalid free of 0x000000007a7a8d17 (in kfence-#155): [ 40.123979] test_double_free+0x1bc/0x238 [ 40.124642] kunit_try_run_case+0x14c/0x3d0 [ 40.125258] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.126054] kthread+0x24c/0x2d0 [ 40.126617] ret_from_fork+0x10/0x20 [ 40.127196] [ 40.127527] kfence-#155: 0x000000007a7a8d17-0x00000000d35f0b53, size=32, cache=kmalloc-32 [ 40.127527] [ 40.128686] allocated by task 292 on cpu 0 at 40.119804s (0.008873s ago): [ 40.129654] test_alloc+0x298/0x620 [ 40.130207] test_double_free+0xd4/0x238 [ 40.130854] kunit_try_run_case+0x14c/0x3d0 [ 40.131494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.132127] kthread+0x24c/0x2d0 [ 40.132720] ret_from_fork+0x10/0x20 [ 40.133238] [ 40.133646] freed by task 292 on cpu 0 at 40.119941s (0.013695s ago): [ 40.134562] test_double_free+0x1ac/0x238 [ 40.135133] kunit_try_run_case+0x14c/0x3d0 [ 40.135736] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.136565] kthread+0x24c/0x2d0 [ 40.137159] ret_from_fork+0x10/0x20 [ 40.137755] [ 40.138091] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 40.139401] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.140088] Hardware name: linux,dummy-virt (DT) [ 40.140795] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 39.704273] ================================================================== [ 39.705221] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 39.705221] [ 39.706375] Use-after-free read at 0x00000000f6f42316 (in kfence-#151): [ 39.707065] test_use_after_free_read+0x114/0x248 [ 39.708029] test_use_after_free_read+0x1c0/0x248 [ 39.708706] kunit_try_run_case+0x14c/0x3d0 [ 39.709424] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.710135] kthread+0x24c/0x2d0 [ 39.710664] ret_from_fork+0x10/0x20 [ 39.711193] [ 39.711566] kfence-#151: 0x00000000f6f42316-0x0000000070235cd7, size=32, cache=kmalloc-32 [ 39.711566] [ 39.712667] allocated by task 284 on cpu 0 at 39.703808s (0.008849s ago): [ 39.713655] test_alloc+0x298/0x620 [ 39.714288] test_use_after_free_read+0xd0/0x248 [ 39.714839] kunit_try_run_case+0x14c/0x3d0 [ 39.715581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.716233] kthread+0x24c/0x2d0 [ 39.716848] ret_from_fork+0x10/0x20 [ 39.717428] [ 39.717726] freed by task 284 on cpu 0 at 39.703927s (0.013789s ago): [ 39.718681] test_use_after_free_read+0x1c0/0x248 [ 39.719302] kunit_try_run_case+0x14c/0x3d0 [ 39.719950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.720722] kthread+0x24c/0x2d0 [ 39.721240] ret_from_fork+0x10/0x20 [ 39.721812] [ 39.722189] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 39.723404] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.724036] Hardware name: linux,dummy-virt (DT) [ 39.724758] ================================================================== [ 39.808255] ================================================================== [ 39.809137] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 39.809137] [ 39.810034] Use-after-free read at 0x0000000020178f0f (in kfence-#152): [ 39.810994] test_use_after_free_read+0x114/0x248 [ 39.811583] test_use_after_free_read+0xf0/0x248 [ 39.812479] kunit_try_run_case+0x14c/0x3d0 [ 39.813175] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.813854] kthread+0x24c/0x2d0 [ 39.814538] ret_from_fork+0x10/0x20 [ 39.815004] [ 39.815383] kfence-#152: 0x0000000020178f0f-0x000000009a3e87fb, size=32, cache=test [ 39.815383] [ 39.816558] allocated by task 286 on cpu 1 at 39.807823s (0.008726s ago): [ 39.817472] test_alloc+0x22c/0x620 [ 39.818161] test_use_after_free_read+0xd0/0x248 [ 39.818703] kunit_try_run_case+0x14c/0x3d0 [ 39.819444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.820188] kthread+0x24c/0x2d0 [ 39.820759] ret_from_fork+0x10/0x20 [ 39.821405] [ 39.821765] freed by task 286 on cpu 1 at 39.807927s (0.013827s ago): [ 39.822689] test_use_after_free_read+0xf0/0x248 [ 39.823321] kunit_try_run_case+0x14c/0x3d0 [ 39.824038] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.824709] kthread+0x24c/0x2d0 [ 39.825257] ret_from_fork+0x10/0x20 [ 39.825869] [ 39.826207] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 39.827479] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.828075] Hardware name: linux,dummy-virt (DT) [ 39.828687] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 31.506916] ================================================================== [ 31.508284] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 31.509420] Read of size 8 at addr fff00000c58b0840 by task kunit_try_catch/189 [ 31.510381] [ 31.510858] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.512345] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.512837] Hardware name: linux,dummy-virt (DT) [ 31.514353] Call trace: [ 31.514881] show_stack+0x20/0x38 (C) [ 31.515546] dump_stack_lvl+0x8c/0xd0 [ 31.516083] print_report+0x118/0x5e0 [ 31.516776] kasan_report+0xc8/0x118 [ 31.517283] __asan_report_load8_noabort+0x20/0x30 [ 31.518013] workqueue_uaf+0x480/0x4a8 [ 31.518668] kunit_try_run_case+0x14c/0x3d0 [ 31.519503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.520217] kthread+0x24c/0x2d0 [ 31.520747] ret_from_fork+0x10/0x20 [ 31.521297] [ 31.521601] Allocated by task 189: [ 31.522247] kasan_save_stack+0x3c/0x68 [ 31.522828] kasan_save_track+0x20/0x40 [ 31.523542] kasan_save_alloc_info+0x40/0x58 [ 31.524099] __kasan_kmalloc+0xd4/0xd8 [ 31.524712] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.525626] workqueue_uaf+0x13c/0x4a8 [ 31.526451] kunit_try_run_case+0x14c/0x3d0 [ 31.526934] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.527845] kthread+0x24c/0x2d0 [ 31.528603] ret_from_fork+0x10/0x20 [ 31.529221] [ 31.529669] Freed by task 10: [ 31.530542] kasan_save_stack+0x3c/0x68 [ 31.531139] kasan_save_track+0x20/0x40 [ 31.531913] kasan_save_free_info+0x4c/0x78 [ 31.532628] __kasan_slab_free+0x6c/0x98 [ 31.533196] kfree+0x114/0x3c8 [ 31.533734] workqueue_uaf_work+0x18/0x30 [ 31.534228] process_one_work+0x530/0xf98 [ 31.535015] worker_thread+0x614/0xf28 [ 31.536103] kthread+0x24c/0x2d0 [ 31.536624] ret_from_fork+0x10/0x20 [ 31.537216] [ 31.537527] Last potentially related work creation: [ 31.538162] kasan_save_stack+0x3c/0x68 [ 31.538881] kasan_record_aux_stack+0xb4/0xc8 [ 31.539682] __queue_work+0x65c/0xfd8 [ 31.540523] queue_work_on+0xbc/0xf8 [ 31.541030] workqueue_uaf+0x210/0x4a8 [ 31.541527] kunit_try_run_case+0x14c/0x3d0 [ 31.542226] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.542967] kthread+0x24c/0x2d0 [ 31.543441] ret_from_fork+0x10/0x20 [ 31.544001] [ 31.544594] The buggy address belongs to the object at fff00000c58b0840 [ 31.544594] which belongs to the cache kmalloc-32 of size 32 [ 31.546080] The buggy address is located 0 bytes inside of [ 31.546080] freed 32-byte region [fff00000c58b0840, fff00000c58b0860) [ 31.548465] [ 31.548832] The buggy address belongs to the physical page: [ 31.549527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058b0 [ 31.550521] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.551438] page_type: f5(slab) [ 31.551946] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 31.552876] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 31.553981] page dumped because: kasan: bad access detected [ 31.554719] [ 31.555040] Memory state around the buggy address: [ 31.555939] fff00000c58b0700: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 31.556688] fff00000c58b0780: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 31.557717] >fff00000c58b0800: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc [ 31.558539] ^ [ 31.559206] fff00000c58b0880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.560300] fff00000c58b0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.561172] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 31.419576] ================================================================== [ 31.420642] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 31.421629] Read of size 4 at addr fff00000c58b0740 by task swapper/0/0 [ 31.422737] [ 31.423083] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.424899] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.425475] Hardware name: linux,dummy-virt (DT) [ 31.426175] Call trace: [ 31.426714] show_stack+0x20/0x38 (C) [ 31.427493] dump_stack_lvl+0x8c/0xd0 [ 31.427800] print_report+0x118/0x5e0 [ 31.428092] kasan_report+0xc8/0x118 [ 31.428461] __asan_report_load4_noabort+0x20/0x30 [ 31.429578] rcu_uaf_reclaim+0x64/0x70 [ 31.430478] rcu_core+0x9f4/0x1e20 [ 31.431425] rcu_core_si+0x18/0x30 [ 31.432376] handle_softirqs+0x374/0xb20 [ 31.433237] __do_softirq+0x1c/0x28 [ 31.433772] ____do_softirq+0x18/0x30 [ 31.434313] call_on_irq_stack+0x24/0x58 [ 31.434941] do_softirq_own_stack+0x24/0x38 [ 31.435913] __irq_exit_rcu+0x1fc/0x318 [ 31.436788] irq_exit_rcu+0x1c/0x80 [ 31.437422] el1_interrupt+0x38/0x58 [ 31.438082] el1h_64_irq_handler+0x18/0x28 [ 31.438762] el1h_64_irq+0x6c/0x70 [ 31.439657] arch_local_irq_enable+0x4/0x8 (P) [ 31.441147] default_idle_call+0x6c/0x78 (L) [ 31.441849] do_idle+0x384/0x4e8 [ 31.442449] cpu_startup_entry+0x64/0x80 [ 31.443243] rest_init+0x160/0x188 [ 31.443833] start_kernel+0x308/0x3d0 [ 31.444143] __primary_switched+0x8c/0xa0 [ 31.444556] [ 31.445001] Allocated by task 187: [ 31.445913] kasan_save_stack+0x3c/0x68 [ 31.446627] kasan_save_track+0x20/0x40 [ 31.447279] kasan_save_alloc_info+0x40/0x58 [ 31.448066] __kasan_kmalloc+0xd4/0xd8 [ 31.448620] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.449343] rcu_uaf+0xb0/0x2d0 [ 31.449849] kunit_try_run_case+0x14c/0x3d0 [ 31.450495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.451475] kthread+0x24c/0x2d0 [ 31.451968] ret_from_fork+0x10/0x20 [ 31.452509] [ 31.452827] Freed by task 0: [ 31.453278] kasan_save_stack+0x3c/0x68 [ 31.453983] kasan_save_track+0x20/0x40 [ 31.454626] kasan_save_free_info+0x4c/0x78 [ 31.455572] __kasan_slab_free+0x6c/0x98 [ 31.456205] kfree+0x114/0x3c8 [ 31.456704] rcu_uaf_reclaim+0x28/0x70 [ 31.457233] rcu_core+0x9f4/0x1e20 [ 31.457683] rcu_core_si+0x18/0x30 [ 31.458127] handle_softirqs+0x374/0xb20 [ 31.458841] __do_softirq+0x1c/0x28 [ 31.460548] [ 31.460938] Last potentially related work creation: [ 31.461866] kasan_save_stack+0x3c/0x68 [ 31.462429] kasan_record_aux_stack+0xb4/0xc8 [ 31.463117] __call_rcu_common.constprop.0+0x74/0xa10 [ 31.463824] call_rcu+0x18/0x30 [ 31.464775] rcu_uaf+0x14c/0x2d0 [ 31.465320] kunit_try_run_case+0x14c/0x3d0 [ 31.465974] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.466762] kthread+0x24c/0x2d0 [ 31.467493] ret_from_fork+0x10/0x20 [ 31.468178] [ 31.468565] The buggy address belongs to the object at fff00000c58b0740 [ 31.468565] which belongs to the cache kmalloc-32 of size 32 [ 31.470017] The buggy address is located 0 bytes inside of [ 31.470017] freed 32-byte region [fff00000c58b0740, fff00000c58b0760) [ 31.471721] [ 31.472176] The buggy address belongs to the physical page: [ 31.472889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058b0 [ 31.473954] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.474933] page_type: f5(slab) [ 31.475798] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 31.476763] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 31.477682] page dumped because: kasan: bad access detected [ 31.478404] [ 31.478715] Memory state around the buggy address: [ 31.480012] fff00000c58b0600: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 31.481034] fff00000c58b0680: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc [ 31.481934] >fff00000c58b0700: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 31.483063] ^ [ 31.484390] fff00000c58b0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.485509] fff00000c58b0800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.486379] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 31.237461] ================================================================== [ 31.238723] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x600 [ 31.239395] Read of size 1 at addr fff00000c58f4400 by task kunit_try_catch/185 [ 31.240436] [ 31.240931] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.242294] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.243595] Hardware name: linux,dummy-virt (DT) [ 31.244224] Call trace: [ 31.244733] show_stack+0x20/0x38 (C) [ 31.245319] dump_stack_lvl+0x8c/0xd0 [ 31.245997] print_report+0x118/0x5e0 [ 31.246655] kasan_report+0xc8/0x118 [ 31.247479] __kasan_check_byte+0x54/0x70 [ 31.248093] ksize+0x30/0x88 [ 31.248700] ksize_uaf+0x168/0x600 [ 31.249187] kunit_try_run_case+0x14c/0x3d0 [ 31.249919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.250727] kthread+0x24c/0x2d0 [ 31.251563] ret_from_fork+0x10/0x20 [ 31.252149] [ 31.252464] Allocated by task 185: [ 31.252964] kasan_save_stack+0x3c/0x68 [ 31.253745] kasan_save_track+0x20/0x40 [ 31.254223] kasan_save_alloc_info+0x40/0x58 [ 31.255055] __kasan_kmalloc+0xd4/0xd8 [ 31.255572] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.256298] ksize_uaf+0xb8/0x600 [ 31.256798] kunit_try_run_case+0x14c/0x3d0 [ 31.257276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.257942] kthread+0x24c/0x2d0 [ 31.258564] ret_from_fork+0x10/0x20 [ 31.259849] [ 31.260267] Freed by task 185: [ 31.260677] kasan_save_stack+0x3c/0x68 [ 31.261366] kasan_save_track+0x20/0x40 [ 31.262036] kasan_save_free_info+0x4c/0x78 [ 31.262547] __kasan_slab_free+0x6c/0x98 [ 31.263545] kfree+0x114/0x3c8 [ 31.264085] ksize_uaf+0x11c/0x600 [ 31.264612] kunit_try_run_case+0x14c/0x3d0 [ 31.265109] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.265920] kthread+0x24c/0x2d0 [ 31.266383] ret_from_fork+0x10/0x20 [ 31.267253] [ 31.267682] The buggy address belongs to the object at fff00000c58f4400 [ 31.267682] which belongs to the cache kmalloc-128 of size 128 [ 31.269116] The buggy address is located 0 bytes inside of [ 31.269116] freed 128-byte region [fff00000c58f4400, fff00000c58f4480) [ 31.270597] [ 31.270906] The buggy address belongs to the physical page: [ 31.271953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058f4 [ 31.272936] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.273756] page_type: f5(slab) [ 31.274247] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.275371] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.276626] page dumped because: kasan: bad access detected [ 31.277320] [ 31.277709] Memory state around the buggy address: [ 31.278257] fff00000c58f4300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.279578] fff00000c58f4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.280340] >fff00000c58f4400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.281360] ^ [ 31.281814] fff00000c58f4480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.282672] fff00000c58f4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.283953] ================================================================== [ 31.336639] ================================================================== [ 31.337449] BUG: KASAN: slab-use-after-free in ksize_uaf+0x548/0x600 [ 31.338179] Read of size 1 at addr fff00000c58f4478 by task kunit_try_catch/185 [ 31.339062] [ 31.339868] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.341402] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.342115] Hardware name: linux,dummy-virt (DT) [ 31.342855] Call trace: [ 31.343411] show_stack+0x20/0x38 (C) [ 31.344000] dump_stack_lvl+0x8c/0xd0 [ 31.344618] print_report+0x118/0x5e0 [ 31.345112] kasan_report+0xc8/0x118 [ 31.346010] __asan_report_load1_noabort+0x20/0x30 [ 31.346700] ksize_uaf+0x548/0x600 [ 31.347591] kunit_try_run_case+0x14c/0x3d0 [ 31.348219] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.348973] kthread+0x24c/0x2d0 [ 31.349570] ret_from_fork+0x10/0x20 [ 31.350145] [ 31.350456] Allocated by task 185: [ 31.351112] kasan_save_stack+0x3c/0x68 [ 31.351895] kasan_save_track+0x20/0x40 [ 31.352359] kasan_save_alloc_info+0x40/0x58 [ 31.353007] __kasan_kmalloc+0xd4/0xd8 [ 31.353757] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.354321] ksize_uaf+0xb8/0x600 [ 31.354901] kunit_try_run_case+0x14c/0x3d0 [ 31.356353] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.357129] kthread+0x24c/0x2d0 [ 31.357653] ret_from_fork+0x10/0x20 [ 31.358307] [ 31.358603] Freed by task 185: [ 31.359579] kasan_save_stack+0x3c/0x68 [ 31.360041] kasan_save_track+0x20/0x40 [ 31.360640] kasan_save_free_info+0x4c/0x78 [ 31.361204] __kasan_slab_free+0x6c/0x98 [ 31.362396] kfree+0x114/0x3c8 [ 31.362908] ksize_uaf+0x11c/0x600 [ 31.363286] kunit_try_run_case+0x14c/0x3d0 [ 31.364647] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.365317] kthread+0x24c/0x2d0 [ 31.365873] ret_from_fork+0x10/0x20 [ 31.366354] [ 31.366681] The buggy address belongs to the object at fff00000c58f4400 [ 31.366681] which belongs to the cache kmalloc-128 of size 128 [ 31.369066] The buggy address is located 120 bytes inside of [ 31.369066] freed 128-byte region [fff00000c58f4400, fff00000c58f4480) [ 31.370628] [ 31.370996] The buggy address belongs to the physical page: [ 31.372142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058f4 [ 31.373264] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.374191] page_type: f5(slab) [ 31.374830] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.375799] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.376966] page dumped because: kasan: bad access detected [ 31.377754] [ 31.378217] Memory state around the buggy address: [ 31.378960] fff00000c58f4300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.380669] fff00000c58f4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.381642] >fff00000c58f4400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.382574] ^ [ 31.383596] fff00000c58f4480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.384722] fff00000c58f4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.385580] ================================================================== [ 31.285915] ================================================================== [ 31.286706] BUG: KASAN: slab-use-after-free in ksize_uaf+0x59c/0x600 [ 31.288454] Read of size 1 at addr fff00000c58f4400 by task kunit_try_catch/185 [ 31.289284] [ 31.290135] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.291493] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.291952] Hardware name: linux,dummy-virt (DT) [ 31.292554] Call trace: [ 31.293044] show_stack+0x20/0x38 (C) [ 31.293968] dump_stack_lvl+0x8c/0xd0 [ 31.294765] print_report+0x118/0x5e0 [ 31.295546] kasan_report+0xc8/0x118 [ 31.296099] __asan_report_load1_noabort+0x20/0x30 [ 31.296858] ksize_uaf+0x59c/0x600 [ 31.297514] kunit_try_run_case+0x14c/0x3d0 [ 31.298158] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.299118] kthread+0x24c/0x2d0 [ 31.299620] ret_from_fork+0x10/0x20 [ 31.300182] [ 31.300556] Allocated by task 185: [ 31.301069] kasan_save_stack+0x3c/0x68 [ 31.301859] kasan_save_track+0x20/0x40 [ 31.302419] kasan_save_alloc_info+0x40/0x58 [ 31.303199] __kasan_kmalloc+0xd4/0xd8 [ 31.303729] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.304424] ksize_uaf+0xb8/0x600 [ 31.304911] kunit_try_run_case+0x14c/0x3d0 [ 31.305960] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.306708] kthread+0x24c/0x2d0 [ 31.307284] ret_from_fork+0x10/0x20 [ 31.308663] [ 31.308998] Freed by task 185: [ 31.309408] kasan_save_stack+0x3c/0x68 [ 31.310029] kasan_save_track+0x20/0x40 [ 31.310800] kasan_save_free_info+0x4c/0x78 [ 31.311767] __kasan_slab_free+0x6c/0x98 [ 31.312448] kfree+0x114/0x3c8 [ 31.313016] ksize_uaf+0x11c/0x600 [ 31.313508] kunit_try_run_case+0x14c/0x3d0 [ 31.314237] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.315232] kthread+0x24c/0x2d0 [ 31.315756] ret_from_fork+0x10/0x20 [ 31.316303] [ 31.316655] The buggy address belongs to the object at fff00000c58f4400 [ 31.316655] which belongs to the cache kmalloc-128 of size 128 [ 31.318129] The buggy address is located 0 bytes inside of [ 31.318129] freed 128-byte region [fff00000c58f4400, fff00000c58f4480) [ 31.319824] [ 31.320124] The buggy address belongs to the physical page: [ 31.320791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058f4 [ 31.321730] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.322746] page_type: f5(slab) [ 31.323487] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.324475] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.325494] page dumped because: kasan: bad access detected [ 31.326188] [ 31.326540] Memory state around the buggy address: [ 31.327354] fff00000c58f4300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.328241] fff00000c58f4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.329120] >fff00000c58f4400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.330780] ^ [ 31.331420] fff00000c58f4480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.332464] fff00000c58f4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.333289] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 39.600000] ================================================================== [ 39.600982] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 39.600982] [ 39.602025] Out-of-bounds write at 0x00000000b430893a (1B left of kfence-#150): [ 39.603636] test_out_of_bounds_write+0x100/0x240 [ 39.604409] test_out_of_bounds_write+0xc8/0x240 [ 39.605170] kunit_try_run_case+0x14c/0x3d0 [ 39.605922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.606780] kthread+0x24c/0x2d0 [ 39.607448] ret_from_fork+0x10/0x20 [ 39.608041] [ 39.608429] kfence-#150: 0x00000000675a814f-0x000000006c286311, size=32, cache=test [ 39.608429] [ 39.609570] allocated by task 282 on cpu 1 at 39.599841s (0.009720s ago): [ 39.610574] test_alloc+0x22c/0x620 [ 39.611267] test_out_of_bounds_write+0xc8/0x240 [ 39.612038] kunit_try_run_case+0x14c/0x3d0 [ 39.612713] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.613550] kthread+0x24c/0x2d0 [ 39.614199] ret_from_fork+0x10/0x20 [ 39.614872] [ 39.615356] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 39.616630] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.617170] Hardware name: linux,dummy-virt (DT) [ 39.617723] ================================================================== [ 39.184161] ================================================================== [ 39.185038] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 39.185038] [ 39.186049] Out-of-bounds write at 0x00000000d6a0ff6f (1B left of kfence-#146): [ 39.187307] test_out_of_bounds_write+0x100/0x240 [ 39.188037] test_out_of_bounds_write+0xc8/0x240 [ 39.189227] kunit_try_run_case+0x14c/0x3d0 [ 39.189884] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.190585] kthread+0x24c/0x2d0 [ 39.191355] ret_from_fork+0x10/0x20 [ 39.192060] [ 39.192320] kfence-#146: 0x00000000d79599e0-0x0000000024d31bc5, size=32, cache=kmalloc-32 [ 39.192320] [ 39.193281] allocated by task 280 on cpu 0 at 39.183912s (0.009363s ago): [ 39.194089] test_alloc+0x298/0x620 [ 39.194635] test_out_of_bounds_write+0xc8/0x240 [ 39.195738] kunit_try_run_case+0x14c/0x3d0 [ 39.196218] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.196928] kthread+0x24c/0x2d0 [ 39.197454] ret_from_fork+0x10/0x20 [ 39.198037] [ 39.198403] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 39.200296] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.201517] Hardware name: linux,dummy-virt (DT) [ 39.202302] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 39.080010] ================================================================== [ 39.081110] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 39.081110] [ 39.082019] Out-of-bounds read at 0x00000000d50da0e4 (32B right of kfence-#145): [ 39.082982] test_out_of_bounds_read+0x1c8/0x3e0 [ 39.083640] test_out_of_bounds_read+0x198/0x3e0 [ 39.084498] kunit_try_run_case+0x14c/0x3d0 [ 39.085144] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.085747] kthread+0x24c/0x2d0 [ 39.086467] ret_from_fork+0x10/0x20 [ 39.087004] [ 39.087296] kfence-#145: 0x000000008d5b0c57-0x0000000057a9faed, size=32, cache=test [ 39.087296] [ 39.088585] allocated by task 278 on cpu 0 at 39.079856s (0.008718s ago): [ 39.089609] test_alloc+0x22c/0x620 [ 39.090155] test_out_of_bounds_read+0x198/0x3e0 [ 39.090977] kunit_try_run_case+0x14c/0x3d0 [ 39.091747] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.092449] kthread+0x24c/0x2d0 [ 39.092974] ret_from_fork+0x10/0x20 [ 39.093635] [ 39.093978] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 39.095218] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.095725] Hardware name: linux,dummy-virt (DT) [ 39.096464] ================================================================== [ 38.560167] ================================================================== [ 38.560872] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 38.560872] [ 38.561801] Out-of-bounds read at 0x0000000025ae99f5 (1B left of kfence-#140): [ 38.562745] test_out_of_bounds_read+0x114/0x3e0 [ 38.563664] test_out_of_bounds_read+0xdc/0x3e0 [ 38.564582] kunit_try_run_case+0x14c/0x3d0 [ 38.565372] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.566282] kthread+0x24c/0x2d0 [ 38.566898] ret_from_fork+0x10/0x20 [ 38.567541] [ 38.567901] kfence-#140: 0x00000000618f9781-0x0000000011c9c302, size=32, cache=test [ 38.567901] [ 38.569040] allocated by task 278 on cpu 0 at 38.559865s (0.009165s ago): [ 38.570259] test_alloc+0x22c/0x620 [ 38.570889] test_out_of_bounds_read+0xdc/0x3e0 [ 38.571614] kunit_try_run_case+0x14c/0x3d0 [ 38.572295] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.573081] kthread+0x24c/0x2d0 [ 38.573688] ret_from_fork+0x10/0x20 [ 38.574247] [ 38.574771] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 38.576043] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.576715] Hardware name: linux,dummy-virt (DT) [ 38.577531] ================================================================== [ 38.040120] ================================================================== [ 38.041053] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 38.041053] [ 38.042041] Out-of-bounds read at 0x000000000bb3ec74 (32B right of kfence-#135): [ 38.042864] test_out_of_bounds_read+0x1c8/0x3e0 [ 38.043697] test_out_of_bounds_read+0x198/0x3e0 [ 38.044384] kunit_try_run_case+0x14c/0x3d0 [ 38.045075] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.045942] kthread+0x24c/0x2d0 [ 38.046634] ret_from_fork+0x10/0x20 [ 38.047209] [ 38.047596] kfence-#135: 0x00000000b0e51e4b-0x0000000070e1fb8b, size=32, cache=kmalloc-32 [ 38.047596] [ 38.048741] allocated by task 276 on cpu 1 at 38.039848s (0.008884s ago): [ 38.049705] test_alloc+0x298/0x620 [ 38.050274] test_out_of_bounds_read+0x198/0x3e0 [ 38.051102] kunit_try_run_case+0x14c/0x3d0 [ 38.051705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.052537] kthread+0x24c/0x2d0 [ 38.053011] ret_from_fork+0x10/0x20 [ 38.053702] [ 38.054158] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 38.055277] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.055900] Hardware name: linux,dummy-virt (DT) [ 38.056598] ================================================================== [ 37.937021] ================================================================== [ 37.937878] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 37.937878] [ 37.939072] Out-of-bounds read at 0x000000007aaac358 (1B left of kfence-#134): [ 37.940064] test_out_of_bounds_read+0x114/0x3e0 [ 37.940695] test_out_of_bounds_read+0xdc/0x3e0 [ 37.941491] kunit_try_run_case+0x14c/0x3d0 [ 37.942224] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.943020] kthread+0x24c/0x2d0 [ 37.943540] ret_from_fork+0x10/0x20 [ 37.944028] [ 37.944507] kfence-#134: 0x00000000672bc3b4-0x0000000006402633, size=32, cache=kmalloc-32 [ 37.944507] [ 37.945711] allocated by task 276 on cpu 1 at 37.935774s (0.009928s ago): [ 37.946572] test_alloc+0x298/0x620 [ 37.947210] test_out_of_bounds_read+0xdc/0x3e0 [ 37.947854] kunit_try_run_case+0x14c/0x3d0 [ 37.948500] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.949290] kthread+0x24c/0x2d0 [ 37.949759] ret_from_fork+0x10/0x20 [ 37.950451] [ 37.950854] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 37.952006] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.952598] Hardware name: linux,dummy-virt (DT) [ 37.953243] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
[ 29.262603] ================================================================== [ 29.266051] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x224/0x490 [ 29.266051] [ 29.267220] Corrupted memory at 0x00000000803ef9c5 [ ! . . . . . . . . . . . . . . . ] (in kfence-#89): [ 29.271636] kmalloc_track_caller_oob_right+0x224/0x490 [ 29.273211] kunit_try_run_case+0x14c/0x3d0 [ 29.273959] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.274829] kthread+0x24c/0x2d0 [ 29.275297] ret_from_fork+0x10/0x20 [ 29.276017] [ 29.276857] kfence-#89: 0x00000000e7405ff1-0x00000000b962185a, size=120, cache=kmalloc-128 [ 29.276857] [ 29.278431] allocated by task 131 on cpu 0 at 29.260394s (0.017891s ago): [ 29.279540] kmalloc_track_caller_oob_right+0x184/0x490 [ 29.280378] kunit_try_run_case+0x14c/0x3d0 [ 29.281022] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.282638] kthread+0x24c/0x2d0 [ 29.283143] ret_from_fork+0x10/0x20 [ 29.284188] [ 29.284814] freed by task 131 on cpu 0 at 29.261808s (0.022828s ago): [ 29.285720] kmalloc_track_caller_oob_right+0x224/0x490 [ 29.286487] kunit_try_run_case+0x14c/0x3d0 [ 29.287878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.288568] kthread+0x24c/0x2d0 [ 29.289181] ret_from_fork+0x10/0x20 [ 29.289842] [ 29.290215] CPU: 0 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.292038] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.292850] Hardware name: linux,dummy-virt (DT) [ 29.293503] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 37.725115] ================================================================== [ 37.725996] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 37.727237] Write of size 121 at addr fff00000c594bf00 by task kunit_try_catch/274 [ 37.729497] [ 37.730164] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 37.731944] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.732234] Hardware name: linux,dummy-virt (DT) [ 37.733013] Call trace: [ 37.733511] show_stack+0x20/0x38 (C) [ 37.734342] dump_stack_lvl+0x8c/0xd0 [ 37.735095] print_report+0x118/0x5e0 [ 37.735821] kasan_report+0xc8/0x118 [ 37.736237] kasan_check_range+0x100/0x1a8 [ 37.736993] __kasan_check_write+0x20/0x30 [ 37.737820] strncpy_from_user+0x3c/0x2a0 [ 37.738647] copy_user_test_oob+0x5c0/0xec0 [ 37.739175] kunit_try_run_case+0x14c/0x3d0 [ 37.739808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.740610] kthread+0x24c/0x2d0 [ 37.741198] ret_from_fork+0x10/0x20 [ 37.741847] [ 37.742234] Allocated by task 274: [ 37.742828] kasan_save_stack+0x3c/0x68 [ 37.743518] kasan_save_track+0x20/0x40 [ 37.744063] kasan_save_alloc_info+0x40/0x58 [ 37.744658] __kasan_kmalloc+0xd4/0xd8 [ 37.745340] __kmalloc_noprof+0x188/0x4c8 [ 37.745954] kunit_kmalloc_array+0x34/0x88 [ 37.746564] copy_user_test_oob+0xac/0xec0 [ 37.747177] kunit_try_run_case+0x14c/0x3d0 [ 37.747841] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.748600] kthread+0x24c/0x2d0 [ 37.749120] ret_from_fork+0x10/0x20 [ 37.749710] [ 37.750133] The buggy address belongs to the object at fff00000c594bf00 [ 37.750133] which belongs to the cache kmalloc-128 of size 128 [ 37.751571] The buggy address is located 0 bytes inside of [ 37.751571] allocated 120-byte region [fff00000c594bf00, fff00000c594bf78) [ 37.752929] [ 37.753365] The buggy address belongs to the physical page: [ 37.754106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594b [ 37.755056] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.755945] page_type: f5(slab) [ 37.756420] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.757316] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.758321] page dumped because: kasan: bad access detected [ 37.759170] [ 37.759491] Memory state around the buggy address: [ 37.760139] fff00000c594be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.760981] fff00000c594be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.761959] >fff00000c594bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.762818] ^ [ 37.763807] fff00000c594bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.764704] fff00000c594c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.765524] ================================================================== [ 37.767670] ================================================================== [ 37.768558] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 37.769469] Write of size 1 at addr fff00000c594bf78 by task kunit_try_catch/274 [ 37.770280] [ 37.770742] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 37.771982] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.772619] Hardware name: linux,dummy-virt (DT) [ 37.773314] Call trace: [ 37.773797] show_stack+0x20/0x38 (C) [ 37.774301] dump_stack_lvl+0x8c/0xd0 [ 37.775019] print_report+0x118/0x5e0 [ 37.775607] kasan_report+0xc8/0x118 [ 37.776180] __asan_report_store1_noabort+0x20/0x30 [ 37.776958] strncpy_from_user+0x270/0x2a0 [ 37.777613] copy_user_test_oob+0x5c0/0xec0 [ 37.778256] kunit_try_run_case+0x14c/0x3d0 [ 37.778804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.779680] kthread+0x24c/0x2d0 [ 37.780224] ret_from_fork+0x10/0x20 [ 37.780841] [ 37.781169] Allocated by task 274: [ 37.781798] kasan_save_stack+0x3c/0x68 [ 37.782464] kasan_save_track+0x20/0x40 [ 37.783050] kasan_save_alloc_info+0x40/0x58 [ 37.783783] __kasan_kmalloc+0xd4/0xd8 [ 37.784377] __kmalloc_noprof+0x188/0x4c8 [ 37.784912] kunit_kmalloc_array+0x34/0x88 [ 37.785634] copy_user_test_oob+0xac/0xec0 [ 37.786250] kunit_try_run_case+0x14c/0x3d0 [ 37.786854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.787500] kthread+0x24c/0x2d0 [ 37.788147] ret_from_fork+0x10/0x20 [ 37.788653] [ 37.789059] The buggy address belongs to the object at fff00000c594bf00 [ 37.789059] which belongs to the cache kmalloc-128 of size 128 [ 37.790481] The buggy address is located 0 bytes to the right of [ 37.790481] allocated 120-byte region [fff00000c594bf00, fff00000c594bf78) [ 37.791904] [ 37.792246] The buggy address belongs to the physical page: [ 37.792930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594b [ 37.793961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.794933] page_type: f5(slab) [ 37.795413] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.796586] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.797434] page dumped because: kasan: bad access detected [ 37.798120] [ 37.798617] Memory state around the buggy address: [ 37.799220] fff00000c594be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.800040] fff00000c594be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.801049] >fff00000c594bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.801865] ^ [ 37.802875] fff00000c594bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.803891] fff00000c594c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.804794] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 37.532586] ================================================================== [ 37.533493] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0 [ 37.534134] Write of size 121 at addr fff00000c594bf00 by task kunit_try_catch/274 [ 37.535405] [ 37.535729] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 37.537050] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.537603] Hardware name: linux,dummy-virt (DT) [ 37.538203] Call trace: [ 37.538785] show_stack+0x20/0x38 (C) [ 37.539513] dump_stack_lvl+0x8c/0xd0 [ 37.540715] print_report+0x118/0x5e0 [ 37.541572] kasan_report+0xc8/0x118 [ 37.542151] kasan_check_range+0x100/0x1a8 [ 37.542836] __kasan_check_write+0x20/0x30 [ 37.543690] copy_user_test_oob+0x35c/0xec0 [ 37.544486] kunit_try_run_case+0x14c/0x3d0 [ 37.545174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.545952] kthread+0x24c/0x2d0 [ 37.546519] ret_from_fork+0x10/0x20 [ 37.547278] [ 37.548054] Allocated by task 274: [ 37.548470] kasan_save_stack+0x3c/0x68 [ 37.548968] kasan_save_track+0x20/0x40 [ 37.549665] kasan_save_alloc_info+0x40/0x58 [ 37.550309] __kasan_kmalloc+0xd4/0xd8 [ 37.550898] __kmalloc_noprof+0x188/0x4c8 [ 37.552074] kunit_kmalloc_array+0x34/0x88 [ 37.552738] copy_user_test_oob+0xac/0xec0 [ 37.553366] kunit_try_run_case+0x14c/0x3d0 [ 37.553986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.554786] kthread+0x24c/0x2d0 [ 37.555254] ret_from_fork+0x10/0x20 [ 37.555934] [ 37.556190] The buggy address belongs to the object at fff00000c594bf00 [ 37.556190] which belongs to the cache kmalloc-128 of size 128 [ 37.557907] The buggy address is located 0 bytes inside of [ 37.557907] allocated 120-byte region [fff00000c594bf00, fff00000c594bf78) [ 37.560917] [ 37.561231] The buggy address belongs to the physical page: [ 37.562053] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594b [ 37.562925] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.564042] page_type: f5(slab) [ 37.564809] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.566030] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.566684] page dumped because: kasan: bad access detected [ 37.567824] [ 37.568452] Memory state around the buggy address: [ 37.569245] fff00000c594be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.570219] fff00000c594be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.571446] >fff00000c594bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.572081] ^ [ 37.572959] fff00000c594bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.573955] fff00000c594c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.574921] ================================================================== [ 37.576677] ================================================================== [ 37.577397] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0 [ 37.578539] Read of size 121 at addr fff00000c594bf00 by task kunit_try_catch/274 [ 37.579606] [ 37.580014] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 37.581690] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.582426] Hardware name: linux,dummy-virt (DT) [ 37.583571] Call trace: [ 37.584120] show_stack+0x20/0x38 (C) [ 37.584944] dump_stack_lvl+0x8c/0xd0 [ 37.585658] print_report+0x118/0x5e0 [ 37.586314] kasan_report+0xc8/0x118 [ 37.587016] kasan_check_range+0x100/0x1a8 [ 37.588240] __kasan_check_read+0x20/0x30 [ 37.588899] copy_user_test_oob+0x3c8/0xec0 [ 37.589701] kunit_try_run_case+0x14c/0x3d0 [ 37.590388] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.591486] kthread+0x24c/0x2d0 [ 37.591797] ret_from_fork+0x10/0x20 [ 37.592094] [ 37.592262] Allocated by task 274: [ 37.592557] kasan_save_stack+0x3c/0x68 [ 37.592851] kasan_save_track+0x20/0x40 [ 37.593135] kasan_save_alloc_info+0x40/0x58 [ 37.594285] __kasan_kmalloc+0xd4/0xd8 [ 37.595232] __kmalloc_noprof+0x188/0x4c8 [ 37.597113] kunit_kmalloc_array+0x34/0x88 [ 37.598011] copy_user_test_oob+0xac/0xec0 [ 37.598875] kunit_try_run_case+0x14c/0x3d0 [ 37.599793] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.600689] kthread+0x24c/0x2d0 [ 37.601178] ret_from_fork+0x10/0x20 [ 37.601779] [ 37.602116] The buggy address belongs to the object at fff00000c594bf00 [ 37.602116] which belongs to the cache kmalloc-128 of size 128 [ 37.603492] The buggy address is located 0 bytes inside of [ 37.603492] allocated 120-byte region [fff00000c594bf00, fff00000c594bf78) [ 37.604918] [ 37.605220] The buggy address belongs to the physical page: [ 37.606112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594b [ 37.607037] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.607873] page_type: f5(slab) [ 37.608538] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.609734] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.611407] page dumped because: kasan: bad access detected [ 37.613469] [ 37.613824] Memory state around the buggy address: [ 37.614756] fff00000c594be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.616383] fff00000c594be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.617295] >fff00000c594bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.618450] ^ [ 37.620508] fff00000c594bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.621632] fff00000c594c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.622653] ================================================================== [ 37.625306] ================================================================== [ 37.626142] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0 [ 37.626863] Write of size 121 at addr fff00000c594bf00 by task kunit_try_catch/274 [ 37.629771] [ 37.630579] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 37.631604] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.632486] Hardware name: linux,dummy-virt (DT) [ 37.633277] Call trace: [ 37.633760] show_stack+0x20/0x38 (C) [ 37.634304] dump_stack_lvl+0x8c/0xd0 [ 37.635223] print_report+0x118/0x5e0 [ 37.636322] kasan_report+0xc8/0x118 [ 37.636779] kasan_check_range+0x100/0x1a8 [ 37.637268] __kasan_check_write+0x20/0x30 [ 37.638144] copy_user_test_oob+0x434/0xec0 [ 37.638840] kunit_try_run_case+0x14c/0x3d0 [ 37.639635] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.640473] kthread+0x24c/0x2d0 [ 37.641261] ret_from_fork+0x10/0x20 [ 37.642352] [ 37.642731] Allocated by task 274: [ 37.643364] kasan_save_stack+0x3c/0x68 [ 37.644056] kasan_save_track+0x20/0x40 [ 37.644706] kasan_save_alloc_info+0x40/0x58 [ 37.645351] __kasan_kmalloc+0xd4/0xd8 [ 37.646110] __kmalloc_noprof+0x188/0x4c8 [ 37.646605] kunit_kmalloc_array+0x34/0x88 [ 37.647219] copy_user_test_oob+0xac/0xec0 [ 37.648677] kunit_try_run_case+0x14c/0x3d0 [ 37.649403] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.650178] kthread+0x24c/0x2d0 [ 37.650668] ret_from_fork+0x10/0x20 [ 37.651839] [ 37.652177] The buggy address belongs to the object at fff00000c594bf00 [ 37.652177] which belongs to the cache kmalloc-128 of size 128 [ 37.654138] The buggy address is located 0 bytes inside of [ 37.654138] allocated 120-byte region [fff00000c594bf00, fff00000c594bf78) [ 37.656254] [ 37.656636] The buggy address belongs to the physical page: [ 37.657572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594b [ 37.658527] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.659736] page_type: f5(slab) [ 37.660253] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.661244] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.662801] page dumped because: kasan: bad access detected [ 37.663539] [ 37.664390] Memory state around the buggy address: [ 37.665063] fff00000c594be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.666111] fff00000c594be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.667073] >fff00000c594bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.668260] ^ [ 37.669647] fff00000c594bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.671643] fff00000c594c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.672634] ================================================================== [ 37.482800] ================================================================== [ 37.483692] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0 [ 37.484578] Read of size 121 at addr fff00000c594bf00 by task kunit_try_catch/274 [ 37.485604] [ 37.485951] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 37.487205] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.487722] Hardware name: linux,dummy-virt (DT) [ 37.488262] Call trace: [ 37.488879] show_stack+0x20/0x38 (C) [ 37.489569] dump_stack_lvl+0x8c/0xd0 [ 37.490230] print_report+0x118/0x5e0 [ 37.490933] kasan_report+0xc8/0x118 [ 37.491481] kasan_check_range+0x100/0x1a8 [ 37.492293] __kasan_check_read+0x20/0x30 [ 37.492921] copy_user_test_oob+0x728/0xec0 [ 37.493583] kunit_try_run_case+0x14c/0x3d0 [ 37.494431] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.495166] kthread+0x24c/0x2d0 [ 37.495813] ret_from_fork+0x10/0x20 [ 37.496541] [ 37.496877] Allocated by task 274: [ 37.497347] kasan_save_stack+0x3c/0x68 [ 37.498068] kasan_save_track+0x20/0x40 [ 37.498758] kasan_save_alloc_info+0x40/0x58 [ 37.499093] __kasan_kmalloc+0xd4/0xd8 [ 37.499487] __kmalloc_noprof+0x188/0x4c8 [ 37.500321] kunit_kmalloc_array+0x34/0x88 [ 37.500967] copy_user_test_oob+0xac/0xec0 [ 37.501589] kunit_try_run_case+0x14c/0x3d0 [ 37.502280] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.503073] kthread+0x24c/0x2d0 [ 37.503567] ret_from_fork+0x10/0x20 [ 37.504167] [ 37.504570] The buggy address belongs to the object at fff00000c594bf00 [ 37.504570] which belongs to the cache kmalloc-128 of size 128 [ 37.505966] The buggy address is located 0 bytes inside of [ 37.505966] allocated 120-byte region [fff00000c594bf00, fff00000c594bf78) [ 37.507312] [ 37.507616] The buggy address belongs to the physical page: [ 37.508436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594b [ 37.509399] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.510201] page_type: f5(slab) [ 37.510733] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.511684] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.512683] page dumped because: kasan: bad access detected [ 37.513470] [ 37.513824] Memory state around the buggy address: [ 37.514496] fff00000c594be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.515319] fff00000c594be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.516233] >fff00000c594bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.517169] ^ [ 37.518018] fff00000c594bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.518944] fff00000c594c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.519915] ================================================================== [ 37.435893] ================================================================== [ 37.437361] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0 [ 37.438088] Write of size 121 at addr fff00000c594bf00 by task kunit_try_catch/274 [ 37.439196] [ 37.439912] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 37.441272] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.441862] Hardware name: linux,dummy-virt (DT) [ 37.442510] Call trace: [ 37.442901] show_stack+0x20/0x38 (C) [ 37.443523] dump_stack_lvl+0x8c/0xd0 [ 37.444124] print_report+0x118/0x5e0 [ 37.444731] kasan_report+0xc8/0x118 [ 37.445245] kasan_check_range+0x100/0x1a8 [ 37.445969] __kasan_check_write+0x20/0x30 [ 37.446515] copy_user_test_oob+0x234/0xec0 [ 37.447356] kunit_try_run_case+0x14c/0x3d0 [ 37.448102] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.448976] kthread+0x24c/0x2d0 [ 37.449540] ret_from_fork+0x10/0x20 [ 37.450125] [ 37.450518] Allocated by task 274: [ 37.450977] kasan_save_stack+0x3c/0x68 [ 37.451688] kasan_save_track+0x20/0x40 [ 37.452276] kasan_save_alloc_info+0x40/0x58 [ 37.452911] __kasan_kmalloc+0xd4/0xd8 [ 37.453496] __kmalloc_noprof+0x188/0x4c8 [ 37.454055] kunit_kmalloc_array+0x34/0x88 [ 37.454738] copy_user_test_oob+0xac/0xec0 [ 37.455315] kunit_try_run_case+0x14c/0x3d0 [ 37.455987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.456751] kthread+0x24c/0x2d0 [ 37.457248] ret_from_fork+0x10/0x20 [ 37.457802] [ 37.458279] The buggy address belongs to the object at fff00000c594bf00 [ 37.458279] which belongs to the cache kmalloc-128 of size 128 [ 37.459659] The buggy address is located 0 bytes inside of [ 37.459659] allocated 120-byte region [fff00000c594bf00, fff00000c594bf78) [ 37.461037] [ 37.461409] The buggy address belongs to the physical page: [ 37.462188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594b [ 37.463060] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.463955] page_type: f5(slab) [ 37.464465] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.465594] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.466571] page dumped because: kasan: bad access detected [ 37.467191] [ 37.467638] Memory state around the buggy address: [ 37.468404] fff00000c594be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.469384] fff00000c594be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.470298] >fff00000c594bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.471120] ^ [ 37.472073] fff00000c594bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.472963] fff00000c594c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.473862] ================================================================== [ 37.674320] ================================================================== [ 37.676292] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0 [ 37.677262] Read of size 121 at addr fff00000c594bf00 by task kunit_try_catch/274 [ 37.678046] [ 37.678605] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 37.680672] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.681662] Hardware name: linux,dummy-virt (DT) [ 37.682670] Call trace: [ 37.683491] show_stack+0x20/0x38 (C) [ 37.684854] dump_stack_lvl+0x8c/0xd0 [ 37.685913] print_report+0x118/0x5e0 [ 37.686730] kasan_report+0xc8/0x118 [ 37.687448] kasan_check_range+0x100/0x1a8 [ 37.688169] __kasan_check_read+0x20/0x30 [ 37.689397] copy_user_test_oob+0x4a0/0xec0 [ 37.690084] kunit_try_run_case+0x14c/0x3d0 [ 37.690509] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.691688] kthread+0x24c/0x2d0 [ 37.692164] ret_from_fork+0x10/0x20 [ 37.692966] [ 37.693571] Allocated by task 274: [ 37.694233] kasan_save_stack+0x3c/0x68 [ 37.695415] kasan_save_track+0x20/0x40 [ 37.696047] kasan_save_alloc_info+0x40/0x58 [ 37.696669] __kasan_kmalloc+0xd4/0xd8 [ 37.697204] __kmalloc_noprof+0x188/0x4c8 [ 37.698303] kunit_kmalloc_array+0x34/0x88 [ 37.698895] copy_user_test_oob+0xac/0xec0 [ 37.699651] kunit_try_run_case+0x14c/0x3d0 [ 37.700252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.701090] kthread+0x24c/0x2d0 [ 37.701543] ret_from_fork+0x10/0x20 [ 37.701972] [ 37.702235] The buggy address belongs to the object at fff00000c594bf00 [ 37.702235] which belongs to the cache kmalloc-128 of size 128 [ 37.704871] The buggy address is located 0 bytes inside of [ 37.704871] allocated 120-byte region [fff00000c594bf00, fff00000c594bf78) [ 37.706460] [ 37.706858] The buggy address belongs to the physical page: [ 37.708253] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594b [ 37.709481] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.710316] page_type: f5(slab) [ 37.710826] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.712847] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.714011] page dumped because: kasan: bad access detected [ 37.714782] [ 37.715277] Memory state around the buggy address: [ 37.716079] fff00000c594be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.717038] fff00000c594be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.718095] >fff00000c594bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.719547] ^ [ 37.720898] fff00000c594bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.722173] fff00000c594c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.723177] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 37.359989] ================================================================== [ 37.361063] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 37.361968] Write of size 8 at addr fff00000c594be78 by task kunit_try_catch/270 [ 37.362861] [ 37.364272] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 37.365722] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.366276] Hardware name: linux,dummy-virt (DT) [ 37.367242] Call trace: [ 37.367692] show_stack+0x20/0x38 (C) [ 37.368391] dump_stack_lvl+0x8c/0xd0 [ 37.368933] print_report+0x118/0x5e0 [ 37.369546] kasan_report+0xc8/0x118 [ 37.370122] kasan_check_range+0x100/0x1a8 [ 37.370772] __kasan_check_write+0x20/0x30 [ 37.371739] copy_to_kernel_nofault+0x8c/0x250 [ 37.372401] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 37.373110] kunit_try_run_case+0x14c/0x3d0 [ 37.373785] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.374651] kthread+0x24c/0x2d0 [ 37.375445] ret_from_fork+0x10/0x20 [ 37.376018] [ 37.376428] Allocated by task 270: [ 37.376924] kasan_save_stack+0x3c/0x68 [ 37.377543] kasan_save_track+0x20/0x40 [ 37.378217] kasan_save_alloc_info+0x40/0x58 [ 37.378876] __kasan_kmalloc+0xd4/0xd8 [ 37.380430] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.381113] copy_to_kernel_nofault_oob+0xc8/0x418 [ 37.381878] kunit_try_run_case+0x14c/0x3d0 [ 37.382519] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.383374] kthread+0x24c/0x2d0 [ 37.384167] ret_from_fork+0x10/0x20 [ 37.384918] [ 37.385253] The buggy address belongs to the object at fff00000c594be00 [ 37.385253] which belongs to the cache kmalloc-128 of size 128 [ 37.386729] The buggy address is located 0 bytes to the right of [ 37.386729] allocated 120-byte region [fff00000c594be00, fff00000c594be78) [ 37.388799] [ 37.389145] The buggy address belongs to the physical page: [ 37.389944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594b [ 37.390934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.391936] page_type: f5(slab) [ 37.392614] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.393551] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.394515] page dumped because: kasan: bad access detected [ 37.395189] [ 37.395845] Memory state around the buggy address: [ 37.396790] fff00000c594bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 37.397785] fff00000c594bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.398719] >fff00000c594be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.399911] ^ [ 37.400984] fff00000c594be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.402148] fff00000c594bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.402823] ================================================================== [ 37.314807] ================================================================== [ 37.316901] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 37.317766] Read of size 8 at addr fff00000c594be78 by task kunit_try_catch/270 [ 37.318636] [ 37.319077] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 37.320633] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.321204] Hardware name: linux,dummy-virt (DT) [ 37.321848] Call trace: [ 37.322284] show_stack+0x20/0x38 (C) [ 37.322915] dump_stack_lvl+0x8c/0xd0 [ 37.323593] print_report+0x118/0x5e0 [ 37.324294] kasan_report+0xc8/0x118 [ 37.324832] __asan_report_load8_noabort+0x20/0x30 [ 37.325627] copy_to_kernel_nofault+0x204/0x250 [ 37.326355] copy_to_kernel_nofault_oob+0x158/0x418 [ 37.327159] kunit_try_run_case+0x14c/0x3d0 [ 37.327842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.328920] kthread+0x24c/0x2d0 [ 37.329429] ret_from_fork+0x10/0x20 [ 37.330029] [ 37.330399] Allocated by task 270: [ 37.330862] kasan_save_stack+0x3c/0x68 [ 37.331632] kasan_save_track+0x20/0x40 [ 37.332732] kasan_save_alloc_info+0x40/0x58 [ 37.333529] __kasan_kmalloc+0xd4/0xd8 [ 37.334293] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.335058] copy_to_kernel_nofault_oob+0xc8/0x418 [ 37.335980] kunit_try_run_case+0x14c/0x3d0 [ 37.336708] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.337647] kthread+0x24c/0x2d0 [ 37.338399] ret_from_fork+0x10/0x20 [ 37.338893] [ 37.339073] The buggy address belongs to the object at fff00000c594be00 [ 37.339073] which belongs to the cache kmalloc-128 of size 128 [ 37.340943] The buggy address is located 0 bytes to the right of [ 37.340943] allocated 120-byte region [fff00000c594be00, fff00000c594be78) [ 37.342593] [ 37.343056] The buggy address belongs to the physical page: [ 37.344164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594b [ 37.345054] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.345860] page_type: f5(slab) [ 37.346478] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.347533] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.348762] page dumped because: kasan: bad access detected [ 37.349622] [ 37.349941] Memory state around the buggy address: [ 37.350576] fff00000c594bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 37.351630] fff00000c594bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.353243] >fff00000c594be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.354659] ^ [ 37.356107] fff00000c594be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.357014] fff00000c594bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.358530] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 37.231063] ================================================================== [ 37.232264] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 37.233141] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/258 [ 37.234196] [ 37.234505] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 37.235816] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.236493] Hardware name: linux,dummy-virt (DT) [ 37.237222] Call trace: [ 37.238007] show_stack+0x20/0x38 (C) [ 37.238693] dump_stack_lvl+0x8c/0xd0 [ 37.239721] print_report+0x2fc/0x5e0 [ 37.240562] kasan_report+0xc8/0x118 [ 37.241239] __asan_report_load1_noabort+0x20/0x30 [ 37.242005] vmalloc_oob+0x51c/0x5d0 [ 37.242678] kunit_try_run_case+0x14c/0x3d0 [ 37.243425] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.244181] kthread+0x24c/0x2d0 [ 37.245137] ret_from_fork+0x10/0x20 [ 37.245770] [ 37.246094] The buggy address belongs to the virtual mapping at [ 37.246094] [ffff80008010b000, ffff80008010d000) created by: [ 37.246094] vmalloc_oob+0x98/0x5d0 [ 37.247906] [ 37.248243] The buggy address belongs to the physical page: [ 37.248983] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106321 [ 37.250288] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.251217] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 37.252628] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 37.253950] page dumped because: kasan: bad access detected [ 37.254728] [ 37.255066] Memory state around the buggy address: [ 37.255662] ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.256908] ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.257815] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 37.258845] ^ [ 37.259951] ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 37.260860] ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 37.261755] ================================================================== [ 37.197745] ================================================================== [ 37.199185] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 37.200432] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/258 [ 37.201053] [ 37.201436] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 37.202781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.203976] Hardware name: linux,dummy-virt (DT) [ 37.204653] Call trace: [ 37.205119] show_stack+0x20/0x38 (C) [ 37.205781] dump_stack_lvl+0x8c/0xd0 [ 37.206418] print_report+0x2fc/0x5e0 [ 37.206990] kasan_report+0xc8/0x118 [ 37.207814] __asan_report_load1_noabort+0x20/0x30 [ 37.209029] vmalloc_oob+0x578/0x5d0 [ 37.209651] kunit_try_run_case+0x14c/0x3d0 [ 37.210408] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.211368] kthread+0x24c/0x2d0 [ 37.212236] ret_from_fork+0x10/0x20 [ 37.212934] [ 37.213244] The buggy address belongs to the virtual mapping at [ 37.213244] [ffff80008010b000, ffff80008010d000) created by: [ 37.213244] vmalloc_oob+0x98/0x5d0 [ 37.214948] [ 37.215342] The buggy address belongs to the physical page: [ 37.216063] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106321 [ 37.217808] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.218516] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 37.219434] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 37.220631] page dumped because: kasan: bad access detected [ 37.221211] [ 37.221534] Memory state around the buggy address: [ 37.222170] ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.223139] ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.224464] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 37.225692] ^ [ 37.226709] ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 37.227944] ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 37.228857] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 35.024037] ================================================================== [ 35.025024] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 35.026081] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.027718] [ 35.028124] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.029251] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.029771] Hardware name: linux,dummy-virt (DT) [ 35.030402] Call trace: [ 35.030870] show_stack+0x20/0x38 (C) [ 35.031456] dump_stack_lvl+0x8c/0xd0 [ 35.032121] print_report+0x118/0x5e0 [ 35.032714] kasan_report+0xc8/0x118 [ 35.033184] kasan_check_range+0x100/0x1a8 [ 35.033937] __kasan_check_write+0x20/0x30 [ 35.034531] kasan_atomics_helper+0x4e4/0x4858 [ 35.035185] kasan_atomics+0x198/0x2e8 [ 35.035819] kunit_try_run_case+0x14c/0x3d0 [ 35.036503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.037272] kthread+0x24c/0x2d0 [ 35.037900] ret_from_fork+0x10/0x20 [ 35.038513] [ 35.038833] Allocated by task 254: [ 35.039302] kasan_save_stack+0x3c/0x68 [ 35.039866] kasan_save_track+0x20/0x40 [ 35.040530] kasan_save_alloc_info+0x40/0x58 [ 35.041103] __kasan_kmalloc+0xd4/0xd8 [ 35.041808] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.042490] kasan_atomics+0xb8/0x2e8 [ 35.043027] kunit_try_run_case+0x14c/0x3d0 [ 35.043670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.044400] kthread+0x24c/0x2d0 [ 35.044859] ret_from_fork+0x10/0x20 [ 35.045461] [ 35.045852] The buggy address belongs to the object at fff00000c594f180 [ 35.045852] which belongs to the cache kmalloc-64 of size 64 [ 35.047378] The buggy address is located 0 bytes to the right of [ 35.047378] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.048819] [ 35.049167] The buggy address belongs to the physical page: [ 35.049916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.050856] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.051687] page_type: f5(slab) [ 35.052246] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.053175] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.054132] page dumped because: kasan: bad access detected [ 35.054812] [ 35.055135] Memory state around the buggy address: [ 35.055807] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.056707] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.057563] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.058463] ^ [ 35.059192] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.060084] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.060964] ================================================================== [ 36.482177] ================================================================== [ 36.483515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 36.484102] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.485318] [ 36.485893] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.487246] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.488042] Hardware name: linux,dummy-virt (DT) [ 36.488735] Call trace: [ 36.489186] show_stack+0x20/0x38 (C) [ 36.489900] dump_stack_lvl+0x8c/0xd0 [ 36.490507] print_report+0x118/0x5e0 [ 36.491087] kasan_report+0xc8/0x118 [ 36.491735] kasan_check_range+0x100/0x1a8 [ 36.492431] __kasan_check_write+0x20/0x30 [ 36.493199] kasan_atomics_helper+0x126c/0x4858 [ 36.493952] kasan_atomics+0x198/0x2e8 [ 36.494586] kunit_try_run_case+0x14c/0x3d0 [ 36.495373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.496155] kthread+0x24c/0x2d0 [ 36.496732] ret_from_fork+0x10/0x20 [ 36.497400] [ 36.497742] Allocated by task 254: [ 36.498412] kasan_save_stack+0x3c/0x68 [ 36.499056] kasan_save_track+0x20/0x40 [ 36.499758] kasan_save_alloc_info+0x40/0x58 [ 36.500440] __kasan_kmalloc+0xd4/0xd8 [ 36.501074] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.501813] kasan_atomics+0xb8/0x2e8 [ 36.502437] kunit_try_run_case+0x14c/0x3d0 [ 36.503125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.503893] kthread+0x24c/0x2d0 [ 36.504467] ret_from_fork+0x10/0x20 [ 36.505169] [ 36.505573] The buggy address belongs to the object at fff00000c594f180 [ 36.505573] which belongs to the cache kmalloc-64 of size 64 [ 36.507053] The buggy address is located 0 bytes to the right of [ 36.507053] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.509004] [ 36.509400] The buggy address belongs to the physical page: [ 36.510081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.511411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.512430] page_type: f5(slab) [ 36.513135] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.514275] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.515380] page dumped because: kasan: bad access detected [ 36.516281] [ 36.516816] Memory state around the buggy address: [ 36.517611] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.518228] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.518819] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.519758] ^ [ 36.521228] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.522022] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.523145] ================================================================== [ 37.059861] ================================================================== [ 37.060792] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 37.062737] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 37.063849] [ 37.064388] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 37.065756] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.066489] Hardware name: linux,dummy-virt (DT) [ 37.067087] Call trace: [ 37.067759] show_stack+0x20/0x38 (C) [ 37.068470] dump_stack_lvl+0x8c/0xd0 [ 37.069243] print_report+0x118/0x5e0 [ 37.070031] kasan_report+0xc8/0x118 [ 37.070688] kasan_check_range+0x100/0x1a8 [ 37.071457] __kasan_check_write+0x20/0x30 [ 37.072180] kasan_atomics_helper+0x175c/0x4858 [ 37.073092] kasan_atomics+0x198/0x2e8 [ 37.073876] kunit_try_run_case+0x14c/0x3d0 [ 37.074657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.075530] kthread+0x24c/0x2d0 [ 37.076031] ret_from_fork+0x10/0x20 [ 37.076619] [ 37.076944] Allocated by task 254: [ 37.077869] kasan_save_stack+0x3c/0x68 [ 37.078471] kasan_save_track+0x20/0x40 [ 37.079200] kasan_save_alloc_info+0x40/0x58 [ 37.079779] __kasan_kmalloc+0xd4/0xd8 [ 37.080071] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.080451] kasan_atomics+0xb8/0x2e8 [ 37.081127] kunit_try_run_case+0x14c/0x3d0 [ 37.081876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.082797] kthread+0x24c/0x2d0 [ 37.083438] ret_from_fork+0x10/0x20 [ 37.084110] [ 37.084680] The buggy address belongs to the object at fff00000c594f180 [ 37.084680] which belongs to the cache kmalloc-64 of size 64 [ 37.086239] The buggy address is located 0 bytes to the right of [ 37.086239] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 37.087836] [ 37.088207] The buggy address belongs to the physical page: [ 37.088985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 37.090125] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.091017] page_type: f5(slab) [ 37.091604] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.092612] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.093580] page dumped because: kasan: bad access detected [ 37.094384] [ 37.094720] Memory state around the buggy address: [ 37.095447] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.096506] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.097448] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.098432] ^ [ 37.099162] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.100047] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.100963] ================================================================== [ 35.255634] ================================================================== [ 35.256414] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 35.257370] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.259180] [ 35.259541] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.260725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.261267] Hardware name: linux,dummy-virt (DT) [ 35.261924] Call trace: [ 35.262360] show_stack+0x20/0x38 (C) [ 35.262952] dump_stack_lvl+0x8c/0xd0 [ 35.263539] print_report+0x118/0x5e0 [ 35.264127] kasan_report+0xc8/0x118 [ 35.264755] kasan_check_range+0x100/0x1a8 [ 35.265439] __kasan_check_write+0x20/0x30 [ 35.266183] kasan_atomics_helper+0x760/0x4858 [ 35.266868] kasan_atomics+0x198/0x2e8 [ 35.267427] kunit_try_run_case+0x14c/0x3d0 [ 35.268063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.268794] kthread+0x24c/0x2d0 [ 35.269404] ret_from_fork+0x10/0x20 [ 35.270001] [ 35.270423] Allocated by task 254: [ 35.270867] kasan_save_stack+0x3c/0x68 [ 35.271597] kasan_save_track+0x20/0x40 [ 35.272136] kasan_save_alloc_info+0x40/0x58 [ 35.272805] __kasan_kmalloc+0xd4/0xd8 [ 35.273384] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.274043] kasan_atomics+0xb8/0x2e8 [ 35.274667] kunit_try_run_case+0x14c/0x3d0 [ 35.275243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.276130] kthread+0x24c/0x2d0 [ 35.276633] ret_from_fork+0x10/0x20 [ 35.277214] [ 35.277574] The buggy address belongs to the object at fff00000c594f180 [ 35.277574] which belongs to the cache kmalloc-64 of size 64 [ 35.278920] The buggy address is located 0 bytes to the right of [ 35.278920] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.280371] [ 35.280689] The buggy address belongs to the physical page: [ 35.281498] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.282392] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.283262] page_type: f5(slab) [ 35.283842] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.284847] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.285773] page dumped because: kasan: bad access detected [ 35.286470] [ 35.286789] Memory state around the buggy address: [ 35.287445] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.288320] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.289292] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.290143] ^ [ 35.290859] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.291752] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.292612] ================================================================== [ 34.783678] ================================================================== [ 34.784533] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 34.785348] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 34.786262] [ 34.786580] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.788078] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.788931] Hardware name: linux,dummy-virt (DT) [ 34.789756] Call trace: [ 34.790291] show_stack+0x20/0x38 (C) [ 34.790860] dump_stack_lvl+0x8c/0xd0 [ 34.791443] print_report+0x118/0x5e0 [ 34.792013] kasan_report+0xc8/0x118 [ 34.792650] __asan_report_load4_noabort+0x20/0x30 [ 34.793387] kasan_atomics_helper+0x40fc/0x4858 [ 34.794171] kasan_atomics+0x198/0x2e8 [ 34.794719] kunit_try_run_case+0x14c/0x3d0 [ 34.795308] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.796077] kthread+0x24c/0x2d0 [ 34.796761] ret_from_fork+0x10/0x20 [ 34.797258] [ 34.797639] Allocated by task 254: [ 34.798128] kasan_save_stack+0x3c/0x68 [ 34.798979] kasan_save_track+0x20/0x40 [ 34.799565] kasan_save_alloc_info+0x40/0x58 [ 34.800150] __kasan_kmalloc+0xd4/0xd8 [ 34.800700] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.801356] kasan_atomics+0xb8/0x2e8 [ 34.802095] kunit_try_run_case+0x14c/0x3d0 [ 34.802673] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.803364] kthread+0x24c/0x2d0 [ 34.803838] ret_from_fork+0x10/0x20 [ 34.804381] [ 34.804686] The buggy address belongs to the object at fff00000c594f180 [ 34.804686] which belongs to the cache kmalloc-64 of size 64 [ 34.806148] The buggy address is located 0 bytes to the right of [ 34.806148] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 34.807540] [ 34.807881] The buggy address belongs to the physical page: [ 34.808511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 34.809536] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.810388] page_type: f5(slab) [ 34.810883] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.811788] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.812693] page dumped because: kasan: bad access detected [ 34.813414] [ 34.813734] Memory state around the buggy address: [ 34.814493] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.815357] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.816251] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.817108] ^ [ 34.817737] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.818632] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.819454] ================================================================== [ 35.138676] ================================================================== [ 35.139839] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 35.141046] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.142126] [ 35.142506] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.143786] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.144465] Hardware name: linux,dummy-virt (DT) [ 35.144984] Call trace: [ 35.145490] show_stack+0x20/0x38 (C) [ 35.146078] dump_stack_lvl+0x8c/0xd0 [ 35.146739] print_report+0x118/0x5e0 [ 35.147407] kasan_report+0xc8/0x118 [ 35.148011] kasan_check_range+0x100/0x1a8 [ 35.148611] __kasan_check_write+0x20/0x30 [ 35.149252] kasan_atomics_helper+0x61c/0x4858 [ 35.149919] kasan_atomics+0x198/0x2e8 [ 35.150690] kunit_try_run_case+0x14c/0x3d0 [ 35.151309] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.152109] kthread+0x24c/0x2d0 [ 35.152633] ret_from_fork+0x10/0x20 [ 35.153225] [ 35.153601] Allocated by task 254: [ 35.154102] kasan_save_stack+0x3c/0x68 [ 35.154639] kasan_save_track+0x20/0x40 [ 35.155301] kasan_save_alloc_info+0x40/0x58 [ 35.155920] __kasan_kmalloc+0xd4/0xd8 [ 35.156570] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.157192] kasan_atomics+0xb8/0x2e8 [ 35.157799] kunit_try_run_case+0x14c/0x3d0 [ 35.158449] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.159073] kthread+0x24c/0x2d0 [ 35.159684] ret_from_fork+0x10/0x20 [ 35.160214] [ 35.160564] The buggy address belongs to the object at fff00000c594f180 [ 35.160564] which belongs to the cache kmalloc-64 of size 64 [ 35.161976] The buggy address is located 0 bytes to the right of [ 35.161976] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.163376] [ 35.163696] The buggy address belongs to the physical page: [ 35.164568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.165457] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.166449] page_type: f5(slab) [ 35.166926] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.167883] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.168794] page dumped because: kasan: bad access detected [ 35.169493] [ 35.169808] Memory state around the buggy address: [ 35.170438] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.171296] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.172208] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.173152] ^ [ 35.173850] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.174757] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.175623] ================================================================== [ 35.887924] ================================================================== [ 35.888666] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 35.889577] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.890655] [ 35.891015] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.892477] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.893085] Hardware name: linux,dummy-virt (DT) [ 35.893819] Call trace: [ 35.894356] show_stack+0x20/0x38 (C) [ 35.894952] dump_stack_lvl+0x8c/0xd0 [ 35.895506] print_report+0x118/0x5e0 [ 35.896122] kasan_report+0xc8/0x118 [ 35.896689] kasan_check_range+0x100/0x1a8 [ 35.897265] __kasan_check_write+0x20/0x30 [ 35.897910] kasan_atomics_helper+0xd3c/0x4858 [ 35.898459] kasan_atomics+0x198/0x2e8 [ 35.899208] kunit_try_run_case+0x14c/0x3d0 [ 35.899916] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.900829] kthread+0x24c/0x2d0 [ 35.901383] ret_from_fork+0x10/0x20 [ 35.901955] [ 35.902305] Allocated by task 254: [ 35.902730] kasan_save_stack+0x3c/0x68 [ 35.903436] kasan_save_track+0x20/0x40 [ 35.904095] kasan_save_alloc_info+0x40/0x58 [ 35.904772] __kasan_kmalloc+0xd4/0xd8 [ 35.905363] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.906027] kasan_atomics+0xb8/0x2e8 [ 35.906560] kunit_try_run_case+0x14c/0x3d0 [ 35.907279] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.908030] kthread+0x24c/0x2d0 [ 35.908546] ret_from_fork+0x10/0x20 [ 35.909074] [ 35.909429] The buggy address belongs to the object at fff00000c594f180 [ 35.909429] which belongs to the cache kmalloc-64 of size 64 [ 35.910865] The buggy address is located 0 bytes to the right of [ 35.910865] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.912289] [ 35.912605] The buggy address belongs to the physical page: [ 35.913431] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.914390] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.915248] page_type: f5(slab) [ 35.915843] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.916786] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.917724] page dumped because: kasan: bad access detected [ 35.918435] [ 35.918749] Memory state around the buggy address: [ 35.919390] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.920215] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.921101] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.921979] ^ [ 35.922636] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.923519] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.924303] ================================================================== [ 36.119499] ================================================================== [ 36.120352] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 36.121308] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.122728] [ 36.123095] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.124173] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.124945] Hardware name: linux,dummy-virt (DT) [ 36.125600] Call trace: [ 36.126053] show_stack+0x20/0x38 (C) [ 36.126671] dump_stack_lvl+0x8c/0xd0 [ 36.127171] print_report+0x118/0x5e0 [ 36.127959] kasan_report+0xc8/0x118 [ 36.128655] kasan_check_range+0x100/0x1a8 [ 36.129248] __kasan_check_write+0x20/0x30 [ 36.129901] kasan_atomics_helper+0xeb8/0x4858 [ 36.130600] kasan_atomics+0x198/0x2e8 [ 36.131173] kunit_try_run_case+0x14c/0x3d0 [ 36.131861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.132671] kthread+0x24c/0x2d0 [ 36.133174] ret_from_fork+0x10/0x20 [ 36.133816] [ 36.134132] Allocated by task 254: [ 36.134670] kasan_save_stack+0x3c/0x68 [ 36.135263] kasan_save_track+0x20/0x40 [ 36.135938] kasan_save_alloc_info+0x40/0x58 [ 36.136544] __kasan_kmalloc+0xd4/0xd8 [ 36.137186] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.137703] kasan_atomics+0xb8/0x2e8 [ 36.138376] kunit_try_run_case+0x14c/0x3d0 [ 36.139026] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.140015] kthread+0x24c/0x2d0 [ 36.140762] ret_from_fork+0x10/0x20 [ 36.141384] [ 36.141845] The buggy address belongs to the object at fff00000c594f180 [ 36.141845] which belongs to the cache kmalloc-64 of size 64 [ 36.143369] The buggy address is located 0 bytes to the right of [ 36.143369] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.144713] [ 36.145011] The buggy address belongs to the physical page: [ 36.145878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.146891] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.147750] page_type: f5(slab) [ 36.148654] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.149600] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.150576] page dumped because: kasan: bad access detected [ 36.151364] [ 36.151822] Memory state around the buggy address: [ 36.152496] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.153431] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.154443] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.155359] ^ [ 36.156086] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.157066] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.157930] ================================================================== [ 37.142408] ================================================================== [ 37.143406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 37.144231] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 37.145118] [ 37.145477] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 37.146842] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.147381] Hardware name: linux,dummy-virt (DT) [ 37.148046] Call trace: [ 37.148469] show_stack+0x20/0x38 (C) [ 37.149133] dump_stack_lvl+0x8c/0xd0 [ 37.149666] print_report+0x118/0x5e0 [ 37.150347] kasan_report+0xc8/0x118 [ 37.150916] kasan_check_range+0x100/0x1a8 [ 37.151551] __kasan_check_write+0x20/0x30 [ 37.152155] kasan_atomics_helper+0x17ec/0x4858 [ 37.152912] kasan_atomics+0x198/0x2e8 [ 37.153552] kunit_try_run_case+0x14c/0x3d0 [ 37.154163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.154976] kthread+0x24c/0x2d0 [ 37.155465] ret_from_fork+0x10/0x20 [ 37.156108] [ 37.156496] Allocated by task 254: [ 37.156981] kasan_save_stack+0x3c/0x68 [ 37.157680] kasan_save_track+0x20/0x40 [ 37.158255] kasan_save_alloc_info+0x40/0x58 [ 37.158883] __kasan_kmalloc+0xd4/0xd8 [ 37.159452] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.160065] kasan_atomics+0xb8/0x2e8 [ 37.160618] kunit_try_run_case+0x14c/0x3d0 [ 37.161295] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.162013] kthread+0x24c/0x2d0 [ 37.162478] ret_from_fork+0x10/0x20 [ 37.163180] [ 37.163548] The buggy address belongs to the object at fff00000c594f180 [ 37.163548] which belongs to the cache kmalloc-64 of size 64 [ 37.164945] The buggy address is located 0 bytes to the right of [ 37.164945] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 37.166377] [ 37.166801] The buggy address belongs to the physical page: [ 37.167515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 37.168430] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.169416] page_type: f5(slab) [ 37.169904] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.170780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.171809] page dumped because: kasan: bad access detected [ 37.172504] [ 37.172856] Memory state around the buggy address: [ 37.173559] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.174421] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.175347] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.176227] ^ [ 37.176964] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.177778] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.178713] ================================================================== [ 34.904169] ================================================================== [ 34.905002] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 34.906473] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 34.908209] [ 34.909131] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.910312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.910843] Hardware name: linux,dummy-virt (DT) [ 34.911513] Call trace: [ 34.911961] show_stack+0x20/0x38 (C) [ 34.912566] dump_stack_lvl+0x8c/0xd0 [ 34.913175] print_report+0x118/0x5e0 [ 34.913897] kasan_report+0xc8/0x118 [ 34.914457] kasan_check_range+0x100/0x1a8 [ 34.915130] __kasan_check_write+0x20/0x30 [ 34.915719] kasan_atomics_helper+0x3ac/0x4858 [ 34.916464] kasan_atomics+0x198/0x2e8 [ 34.917109] kunit_try_run_case+0x14c/0x3d0 [ 34.917779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.918598] kthread+0x24c/0x2d0 [ 34.919140] ret_from_fork+0x10/0x20 [ 34.919754] [ 34.920103] Allocated by task 254: [ 34.920722] kasan_save_stack+0x3c/0x68 [ 34.921236] kasan_save_track+0x20/0x40 [ 34.921933] kasan_save_alloc_info+0x40/0x58 [ 34.922596] __kasan_kmalloc+0xd4/0xd8 [ 34.923258] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.923875] kasan_atomics+0xb8/0x2e8 [ 34.924496] kunit_try_run_case+0x14c/0x3d0 [ 34.925203] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.925948] kthread+0x24c/0x2d0 [ 34.926567] ret_from_fork+0x10/0x20 [ 34.927153] [ 34.927572] The buggy address belongs to the object at fff00000c594f180 [ 34.927572] which belongs to the cache kmalloc-64 of size 64 [ 34.928923] The buggy address is located 0 bytes to the right of [ 34.928923] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 34.930384] [ 34.930694] The buggy address belongs to the physical page: [ 34.931377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 34.932284] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.933213] page_type: f5(slab) [ 34.933751] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.934719] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.935588] page dumped because: kasan: bad access detected [ 34.936197] [ 34.936574] Memory state around the buggy address: [ 34.937120] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.937997] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.938914] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.939829] ^ [ 34.940541] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.941357] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.942236] ================================================================== [ 36.322192] ================================================================== [ 36.323532] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 36.324620] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.326291] [ 36.326831] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.328120] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.328988] Hardware name: linux,dummy-virt (DT) [ 36.329638] Call trace: [ 36.330086] show_stack+0x20/0x38 (C) [ 36.330887] dump_stack_lvl+0x8c/0xd0 [ 36.331609] print_report+0x118/0x5e0 [ 36.332314] kasan_report+0xc8/0x118 [ 36.333023] kasan_check_range+0x100/0x1a8 [ 36.333764] __kasan_check_write+0x20/0x30 [ 36.334546] kasan_atomics_helper+0x10c0/0x4858 [ 36.335310] kasan_atomics+0x198/0x2e8 [ 36.336015] kunit_try_run_case+0x14c/0x3d0 [ 36.336801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.337639] kthread+0x24c/0x2d0 [ 36.338426] ret_from_fork+0x10/0x20 [ 36.339160] [ 36.339587] Allocated by task 254: [ 36.340112] kasan_save_stack+0x3c/0x68 [ 36.340840] kasan_save_track+0x20/0x40 [ 36.341497] kasan_save_alloc_info+0x40/0x58 [ 36.342155] __kasan_kmalloc+0xd4/0xd8 [ 36.342773] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.343515] kasan_atomics+0xb8/0x2e8 [ 36.344140] kunit_try_run_case+0x14c/0x3d0 [ 36.344875] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.345532] kthread+0x24c/0x2d0 [ 36.346017] ret_from_fork+0x10/0x20 [ 36.346525] [ 36.346865] The buggy address belongs to the object at fff00000c594f180 [ 36.346865] which belongs to the cache kmalloc-64 of size 64 [ 36.348125] The buggy address is located 0 bytes to the right of [ 36.348125] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.349575] [ 36.349930] The buggy address belongs to the physical page: [ 36.350762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.351691] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.352524] page_type: f5(slab) [ 36.353064] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.354115] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.355024] page dumped because: kasan: bad access detected [ 36.355834] [ 36.356153] Memory state around the buggy address: [ 36.356792] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.357666] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.358584] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.359421] ^ [ 36.360016] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.361140] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.362134] ================================================================== [ 36.850258] ================================================================== [ 36.851073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 36.852345] Read of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.853206] [ 36.853620] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.855344] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.856045] Hardware name: linux,dummy-virt (DT) [ 36.856740] Call trace: [ 36.857288] show_stack+0x20/0x38 (C) [ 36.858080] dump_stack_lvl+0x8c/0xd0 [ 36.858766] print_report+0x118/0x5e0 [ 36.859497] kasan_report+0xc8/0x118 [ 36.860070] __asan_report_load8_noabort+0x20/0x30 [ 36.861016] kasan_atomics_helper+0x3db0/0x4858 [ 36.861688] kasan_atomics+0x198/0x2e8 [ 36.862413] kunit_try_run_case+0x14c/0x3d0 [ 36.863068] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.863972] kthread+0x24c/0x2d0 [ 36.864649] ret_from_fork+0x10/0x20 [ 36.865344] [ 36.865776] Allocated by task 254: [ 36.866443] kasan_save_stack+0x3c/0x68 [ 36.867073] kasan_save_track+0x20/0x40 [ 36.867724] kasan_save_alloc_info+0x40/0x58 [ 36.868419] __kasan_kmalloc+0xd4/0xd8 [ 36.868962] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.869792] kasan_atomics+0xb8/0x2e8 [ 36.870459] kunit_try_run_case+0x14c/0x3d0 [ 36.871122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.872008] kthread+0x24c/0x2d0 [ 36.872732] ret_from_fork+0x10/0x20 [ 36.873359] [ 36.873845] The buggy address belongs to the object at fff00000c594f180 [ 36.873845] which belongs to the cache kmalloc-64 of size 64 [ 36.875319] The buggy address is located 0 bytes to the right of [ 36.875319] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.876742] [ 36.877023] The buggy address belongs to the physical page: [ 36.877727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.879016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.879914] page_type: f5(slab) [ 36.880472] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.881407] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.882473] page dumped because: kasan: bad access detected [ 36.883282] [ 36.883683] Memory state around the buggy address: [ 36.884438] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.885406] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.886431] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.887357] ^ [ 36.888018] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.889002] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.889909] ================================================================== [ 34.705810] ================================================================== [ 34.706633] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 34.707467] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 34.708321] [ 34.708763] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.710077] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.710720] Hardware name: linux,dummy-virt (DT) [ 34.711264] Call trace: [ 34.711821] show_stack+0x20/0x38 (C) [ 34.712439] dump_stack_lvl+0x8c/0xd0 [ 34.712948] print_report+0x118/0x5e0 [ 34.713636] kasan_report+0xc8/0x118 [ 34.714283] kasan_check_range+0x100/0x1a8 [ 34.714947] __kasan_check_write+0x20/0x30 [ 34.715583] kasan_atomics_helper+0x24c/0x4858 [ 34.716321] kasan_atomics+0x198/0x2e8 [ 34.716893] kunit_try_run_case+0x14c/0x3d0 [ 34.717560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.718392] kthread+0x24c/0x2d0 [ 34.718900] ret_from_fork+0x10/0x20 [ 34.719503] [ 34.719856] Allocated by task 254: [ 34.720415] kasan_save_stack+0x3c/0x68 [ 34.721018] kasan_save_track+0x20/0x40 [ 34.721596] kasan_save_alloc_info+0x40/0x58 [ 34.722234] __kasan_kmalloc+0xd4/0xd8 [ 34.722818] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.723383] kasan_atomics+0xb8/0x2e8 [ 34.724016] kunit_try_run_case+0x14c/0x3d0 [ 34.724684] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.725516] kthread+0x24c/0x2d0 [ 34.726036] ret_from_fork+0x10/0x20 [ 34.726636] [ 34.726956] The buggy address belongs to the object at fff00000c594f180 [ 34.726956] which belongs to the cache kmalloc-64 of size 64 [ 34.728378] The buggy address is located 0 bytes to the right of [ 34.728378] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 34.729748] [ 34.730045] The buggy address belongs to the physical page: [ 34.730801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 34.731742] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.732656] page_type: f5(slab) [ 34.733242] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.734213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.735126] page dumped because: kasan: bad access detected [ 34.735826] [ 34.736149] Memory state around the buggy address: [ 34.736802] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.737615] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.738494] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.739376] ^ [ 34.740016] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.740906] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.741824] ================================================================== [ 34.623642] ================================================================== [ 34.625094] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 34.626117] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 34.627433] [ 34.627760] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.628926] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.629672] Hardware name: linux,dummy-virt (DT) [ 34.630160] Call trace: [ 34.630532] show_stack+0x20/0x38 (C) [ 34.631192] dump_stack_lvl+0x8c/0xd0 [ 34.631920] print_report+0x118/0x5e0 [ 34.632707] kasan_report+0xc8/0x118 [ 34.633317] __asan_report_store4_noabort+0x20/0x30 [ 34.634091] kasan_atomics_helper+0x3f7c/0x4858 [ 34.634823] kasan_atomics+0x198/0x2e8 [ 34.635457] kunit_try_run_case+0x14c/0x3d0 [ 34.636178] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.637126] kthread+0x24c/0x2d0 [ 34.637650] ret_from_fork+0x10/0x20 [ 34.638278] [ 34.638873] Allocated by task 254: [ 34.639544] kasan_save_stack+0x3c/0x68 [ 34.640206] kasan_save_track+0x20/0x40 [ 34.640984] kasan_save_alloc_info+0x40/0x58 [ 34.641724] __kasan_kmalloc+0xd4/0xd8 [ 34.642556] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.643130] kasan_atomics+0xb8/0x2e8 [ 34.643723] kunit_try_run_case+0x14c/0x3d0 [ 34.644351] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.645174] kthread+0x24c/0x2d0 [ 34.645740] ret_from_fork+0x10/0x20 [ 34.646389] [ 34.646672] The buggy address belongs to the object at fff00000c594f180 [ 34.646672] which belongs to the cache kmalloc-64 of size 64 [ 34.648095] The buggy address is located 0 bytes to the right of [ 34.648095] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 34.649525] [ 34.649810] The buggy address belongs to the physical page: [ 34.650633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 34.651502] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.652422] page_type: f5(slab) [ 34.652929] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.653862] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.654888] page dumped because: kasan: bad access detected [ 34.655516] [ 34.655873] Memory state around the buggy address: [ 34.656543] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.657438] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.658346] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.659182] ^ [ 34.659848] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.660781] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.661753] ================================================================== [ 35.573235] ================================================================== [ 35.574142] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 35.575194] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.576193] [ 35.576742] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.578210] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.578814] Hardware name: linux,dummy-virt (DT) [ 35.579506] Call trace: [ 35.580075] show_stack+0x20/0x38 (C) [ 35.580742] dump_stack_lvl+0x8c/0xd0 [ 35.581389] print_report+0x118/0x5e0 [ 35.582046] kasan_report+0xc8/0x118 [ 35.582708] kasan_check_range+0x100/0x1a8 [ 35.583408] __kasan_check_write+0x20/0x30 [ 35.584061] kasan_atomics_helper+0xad4/0x4858 [ 35.584797] kasan_atomics+0x198/0x2e8 [ 35.585448] kunit_try_run_case+0x14c/0x3d0 [ 35.586150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.586944] kthread+0x24c/0x2d0 [ 35.587555] ret_from_fork+0x10/0x20 [ 35.588131] [ 35.588495] Allocated by task 254: [ 35.589145] kasan_save_stack+0x3c/0x68 [ 35.589914] kasan_save_track+0x20/0x40 [ 35.590528] kasan_save_alloc_info+0x40/0x58 [ 35.591260] __kasan_kmalloc+0xd4/0xd8 [ 35.591993] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.592751] kasan_atomics+0xb8/0x2e8 [ 35.593380] kunit_try_run_case+0x14c/0x3d0 [ 35.594058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.594865] kthread+0x24c/0x2d0 [ 35.595634] ret_from_fork+0x10/0x20 [ 35.596256] [ 35.596607] The buggy address belongs to the object at fff00000c594f180 [ 35.596607] which belongs to the cache kmalloc-64 of size 64 [ 35.598183] The buggy address is located 0 bytes to the right of [ 35.598183] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.599766] [ 35.600224] The buggy address belongs to the physical page: [ 35.601026] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.602061] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.603000] page_type: f5(slab) [ 35.603605] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.604634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.605495] page dumped because: kasan: bad access detected [ 35.606213] [ 35.606513] Memory state around the buggy address: [ 35.607149] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.608032] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.608823] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.609759] ^ [ 35.610413] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.611297] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.612166] ================================================================== [ 35.413019] ================================================================== [ 35.413856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 35.415376] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.416249] [ 35.416624] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.417856] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.418422] Hardware name: linux,dummy-virt (DT) [ 35.418995] Call trace: [ 35.419477] show_stack+0x20/0x38 (C) [ 35.420089] dump_stack_lvl+0x8c/0xd0 [ 35.420674] print_report+0x118/0x5e0 [ 35.421279] kasan_report+0xc8/0x118 [ 35.421976] kasan_check_range+0x100/0x1a8 [ 35.422703] __kasan_check_write+0x20/0x30 [ 35.423314] kasan_atomics_helper+0x934/0x4858 [ 35.424069] kasan_atomics+0x198/0x2e8 [ 35.424595] kunit_try_run_case+0x14c/0x3d0 [ 35.425316] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.426038] kthread+0x24c/0x2d0 [ 35.426682] ret_from_fork+0x10/0x20 [ 35.427235] [ 35.427592] Allocated by task 254: [ 35.428091] kasan_save_stack+0x3c/0x68 [ 35.428635] kasan_save_track+0x20/0x40 [ 35.429244] kasan_save_alloc_info+0x40/0x58 [ 35.429952] __kasan_kmalloc+0xd4/0xd8 [ 35.430549] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.431202] kasan_atomics+0xb8/0x2e8 [ 35.431732] kunit_try_run_case+0x14c/0x3d0 [ 35.432382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.433093] kthread+0x24c/0x2d0 [ 35.433580] ret_from_fork+0x10/0x20 [ 35.434198] [ 35.434655] The buggy address belongs to the object at fff00000c594f180 [ 35.434655] which belongs to the cache kmalloc-64 of size 64 [ 35.436152] The buggy address is located 0 bytes to the right of [ 35.436152] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.437713] [ 35.438011] The buggy address belongs to the physical page: [ 35.438603] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.439643] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.440521] page_type: f5(slab) [ 35.441094] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.442076] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.443047] page dumped because: kasan: bad access detected [ 35.443780] [ 35.444149] Memory state around the buggy address: [ 35.444791] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.445632] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.446463] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.447411] ^ [ 35.448032] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.448959] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.449803] ================================================================== [ 36.934447] ================================================================== [ 36.935919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 36.936882] Read of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.938501] [ 36.939015] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.940083] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.940951] Hardware name: linux,dummy-virt (DT) [ 36.941628] Call trace: [ 36.942294] show_stack+0x20/0x38 (C) [ 36.943182] dump_stack_lvl+0x8c/0xd0 [ 36.943633] print_report+0x118/0x5e0 [ 36.944386] kasan_report+0xc8/0x118 [ 36.944988] __asan_report_load8_noabort+0x20/0x30 [ 36.945754] kasan_atomics_helper+0x3df4/0x4858 [ 36.946513] kasan_atomics+0x198/0x2e8 [ 36.947235] kunit_try_run_case+0x14c/0x3d0 [ 36.947963] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.948719] kthread+0x24c/0x2d0 [ 36.949370] ret_from_fork+0x10/0x20 [ 36.950060] [ 36.950426] Allocated by task 254: [ 36.951104] kasan_save_stack+0x3c/0x68 [ 36.951824] kasan_save_track+0x20/0x40 [ 36.952484] kasan_save_alloc_info+0x40/0x58 [ 36.953153] __kasan_kmalloc+0xd4/0xd8 [ 36.953868] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.954608] kasan_atomics+0xb8/0x2e8 [ 36.955247] kunit_try_run_case+0x14c/0x3d0 [ 36.955909] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.956688] kthread+0x24c/0x2d0 [ 36.957268] ret_from_fork+0x10/0x20 [ 36.957905] [ 36.958264] The buggy address belongs to the object at fff00000c594f180 [ 36.958264] which belongs to the cache kmalloc-64 of size 64 [ 36.959812] The buggy address is located 0 bytes to the right of [ 36.959812] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.961310] [ 36.961750] The buggy address belongs to the physical page: [ 36.962569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.963579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.964485] page_type: f5(slab) [ 36.965065] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.966098] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.967078] page dumped because: kasan: bad access detected [ 36.967856] [ 36.968234] Memory state around the buggy address: [ 36.968977] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.969947] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.970908] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.971891] ^ [ 36.972676] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.973591] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.974547] ================================================================== [ 37.102775] ================================================================== [ 37.103819] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 37.104783] Read of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 37.105749] [ 37.106139] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 37.107429] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.108181] Hardware name: linux,dummy-virt (DT) [ 37.108940] Call trace: [ 37.109533] show_stack+0x20/0x38 (C) [ 37.110190] dump_stack_lvl+0x8c/0xd0 [ 37.110865] print_report+0x118/0x5e0 [ 37.111654] kasan_report+0xc8/0x118 [ 37.112433] __asan_report_load8_noabort+0x20/0x30 [ 37.113293] kasan_atomics_helper+0x3e20/0x4858 [ 37.114178] kasan_atomics+0x198/0x2e8 [ 37.114820] kunit_try_run_case+0x14c/0x3d0 [ 37.115617] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.116421] kthread+0x24c/0x2d0 [ 37.116913] ret_from_fork+0x10/0x20 [ 37.117590] [ 37.117900] Allocated by task 254: [ 37.118486] kasan_save_stack+0x3c/0x68 [ 37.119148] kasan_save_track+0x20/0x40 [ 37.119741] kasan_save_alloc_info+0x40/0x58 [ 37.120376] __kasan_kmalloc+0xd4/0xd8 [ 37.120943] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.121507] kasan_atomics+0xb8/0x2e8 [ 37.122168] kunit_try_run_case+0x14c/0x3d0 [ 37.122969] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.123743] kthread+0x24c/0x2d0 [ 37.124227] ret_from_fork+0x10/0x20 [ 37.124814] [ 37.125115] The buggy address belongs to the object at fff00000c594f180 [ 37.125115] which belongs to the cache kmalloc-64 of size 64 [ 37.126461] The buggy address is located 0 bytes to the right of [ 37.126461] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 37.127949] [ 37.128259] The buggy address belongs to the physical page: [ 37.129161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 37.130151] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.131088] page_type: f5(slab) [ 37.131786] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.132846] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.133811] page dumped because: kasan: bad access detected [ 37.134513] [ 37.134814] Memory state around the buggy address: [ 37.135477] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.136279] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.137414] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.138243] ^ [ 37.138791] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.139593] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.140315] ================================================================== [ 36.651369] ================================================================== [ 36.652242] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 36.653290] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.654143] [ 36.654521] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.655800] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.656379] Hardware name: linux,dummy-virt (DT) [ 36.656936] Call trace: [ 36.657447] show_stack+0x20/0x38 (C) [ 36.658128] dump_stack_lvl+0x8c/0xd0 [ 36.658803] print_report+0x118/0x5e0 [ 36.659313] kasan_report+0xc8/0x118 [ 36.659976] kasan_check_range+0x100/0x1a8 [ 36.660767] __kasan_check_write+0x20/0x30 [ 36.661400] kasan_atomics_helper+0x1414/0x4858 [ 36.662138] kasan_atomics+0x198/0x2e8 [ 36.662682] kunit_try_run_case+0x14c/0x3d0 [ 36.663401] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.664095] kthread+0x24c/0x2d0 [ 36.664715] ret_from_fork+0x10/0x20 [ 36.665280] [ 36.665617] Allocated by task 254: [ 36.666092] kasan_save_stack+0x3c/0x68 [ 36.666739] kasan_save_track+0x20/0x40 [ 36.667254] kasan_save_alloc_info+0x40/0x58 [ 36.667968] __kasan_kmalloc+0xd4/0xd8 [ 36.668476] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.669206] kasan_atomics+0xb8/0x2e8 [ 36.669782] kunit_try_run_case+0x14c/0x3d0 [ 36.670482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.671225] kthread+0x24c/0x2d0 [ 36.671802] ret_from_fork+0x10/0x20 [ 36.672359] [ 36.672668] The buggy address belongs to the object at fff00000c594f180 [ 36.672668] which belongs to the cache kmalloc-64 of size 64 [ 36.674098] The buggy address is located 0 bytes to the right of [ 36.674098] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.675513] [ 36.675834] The buggy address belongs to the physical page: [ 36.676612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.677614] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.678388] page_type: f5(slab) [ 36.678999] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.679960] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.680820] page dumped because: kasan: bad access detected [ 36.681500] [ 36.681856] Memory state around the buggy address: [ 36.682512] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.683378] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.684358] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.685200] ^ [ 36.685842] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.686841] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.687696] ================================================================== [ 36.893034] ================================================================== [ 36.894499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 36.895664] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.897048] [ 36.897433] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.898857] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.899634] Hardware name: linux,dummy-virt (DT) [ 36.900360] Call trace: [ 36.900965] show_stack+0x20/0x38 (C) [ 36.901776] dump_stack_lvl+0x8c/0xd0 [ 36.902602] print_report+0x118/0x5e0 [ 36.903401] kasan_report+0xc8/0x118 [ 36.903999] kasan_check_range+0x100/0x1a8 [ 36.904641] __kasan_check_write+0x20/0x30 [ 36.905165] kasan_atomics_helper+0x1644/0x4858 [ 36.905914] kasan_atomics+0x198/0x2e8 [ 36.906705] kunit_try_run_case+0x14c/0x3d0 [ 36.907529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.908363] kthread+0x24c/0x2d0 [ 36.908999] ret_from_fork+0x10/0x20 [ 36.909619] [ 36.909896] Allocated by task 254: [ 36.910426] kasan_save_stack+0x3c/0x68 [ 36.911068] kasan_save_track+0x20/0x40 [ 36.911650] kasan_save_alloc_info+0x40/0x58 [ 36.912383] __kasan_kmalloc+0xd4/0xd8 [ 36.912971] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.913625] kasan_atomics+0xb8/0x2e8 [ 36.914188] kunit_try_run_case+0x14c/0x3d0 [ 36.914870] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.915578] kthread+0x24c/0x2d0 [ 36.916101] ret_from_fork+0x10/0x20 [ 36.916669] [ 36.917015] The buggy address belongs to the object at fff00000c594f180 [ 36.917015] which belongs to the cache kmalloc-64 of size 64 [ 36.918522] The buggy address is located 0 bytes to the right of [ 36.918522] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.919930] [ 36.920237] The buggy address belongs to the physical page: [ 36.921075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.921994] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.922896] page_type: f5(slab) [ 36.923459] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.924520] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.925523] page dumped because: kasan: bad access detected [ 36.926217] [ 36.926561] Memory state around the buggy address: [ 36.927160] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.928048] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.929084] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.929973] ^ [ 36.930814] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.931727] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.932651] ================================================================== [ 36.238513] ================================================================== [ 36.239525] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 36.240359] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.241429] [ 36.241953] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.243267] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.244011] Hardware name: linux,dummy-virt (DT) [ 36.244849] Call trace: [ 36.245419] show_stack+0x20/0x38 (C) [ 36.246142] dump_stack_lvl+0x8c/0xd0 [ 36.246773] print_report+0x118/0x5e0 [ 36.247433] kasan_report+0xc8/0x118 [ 36.248080] kasan_check_range+0x100/0x1a8 [ 36.248775] __kasan_check_write+0x20/0x30 [ 36.249566] kasan_atomics_helper+0xff0/0x4858 [ 36.250278] kasan_atomics+0x198/0x2e8 [ 36.250939] kunit_try_run_case+0x14c/0x3d0 [ 36.251649] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.252478] kthread+0x24c/0x2d0 [ 36.253101] ret_from_fork+0x10/0x20 [ 36.253753] [ 36.254093] Allocated by task 254: [ 36.254679] kasan_save_stack+0x3c/0x68 [ 36.255343] kasan_save_track+0x20/0x40 [ 36.256013] kasan_save_alloc_info+0x40/0x58 [ 36.256736] __kasan_kmalloc+0xd4/0xd8 [ 36.257466] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.258122] kasan_atomics+0xb8/0x2e8 [ 36.258752] kunit_try_run_case+0x14c/0x3d0 [ 36.259476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.260267] kthread+0x24c/0x2d0 [ 36.260930] ret_from_fork+0x10/0x20 [ 36.261656] [ 36.262053] The buggy address belongs to the object at fff00000c594f180 [ 36.262053] which belongs to the cache kmalloc-64 of size 64 [ 36.263601] The buggy address is located 0 bytes to the right of [ 36.263601] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.265099] [ 36.265568] The buggy address belongs to the physical page: [ 36.266383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.267433] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.268297] page_type: f5(slab) [ 36.268902] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.269927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.270881] page dumped because: kasan: bad access detected [ 36.271649] [ 36.272000] Memory state around the buggy address: [ 36.272684] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.273725] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.274641] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.275655] ^ [ 36.276394] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.277320] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.278238] ================================================================== [ 34.744000] ================================================================== [ 34.745480] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 34.746861] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 34.747831] [ 34.748147] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.749492] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.750013] Hardware name: linux,dummy-virt (DT) [ 34.750667] Call trace: [ 34.751140] show_stack+0x20/0x38 (C) [ 34.751761] dump_stack_lvl+0x8c/0xd0 [ 34.752365] print_report+0x118/0x5e0 [ 34.753004] kasan_report+0xc8/0x118 [ 34.753579] kasan_check_range+0x100/0x1a8 [ 34.754233] __kasan_check_read+0x20/0x30 [ 34.754885] kasan_atomics_helper+0x2b0/0x4858 [ 34.755519] kasan_atomics+0x198/0x2e8 [ 34.756145] kunit_try_run_case+0x14c/0x3d0 [ 34.756819] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.757605] kthread+0x24c/0x2d0 [ 34.758169] ret_from_fork+0x10/0x20 [ 34.758797] [ 34.759076] Allocated by task 254: [ 34.759689] kasan_save_stack+0x3c/0x68 [ 34.760319] kasan_save_track+0x20/0x40 [ 34.760879] kasan_save_alloc_info+0x40/0x58 [ 34.761543] __kasan_kmalloc+0xd4/0xd8 [ 34.762223] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.762792] kasan_atomics+0xb8/0x2e8 [ 34.763451] kunit_try_run_case+0x14c/0x3d0 [ 34.764016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.764755] kthread+0x24c/0x2d0 [ 34.765317] ret_from_fork+0x10/0x20 [ 34.765922] [ 34.766283] The buggy address belongs to the object at fff00000c594f180 [ 34.766283] which belongs to the cache kmalloc-64 of size 64 [ 34.767660] The buggy address is located 0 bytes to the right of [ 34.767660] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 34.769047] [ 34.769426] The buggy address belongs to the physical page: [ 34.770099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 34.771044] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.771818] page_type: f5(slab) [ 34.772367] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.773293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.774255] page dumped because: kasan: bad access detected [ 34.774975] [ 34.775283] Memory state around the buggy address: [ 34.775894] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.776743] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.777606] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.778496] ^ [ 34.779152] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.780061] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.780903] ================================================================== [ 35.374665] ================================================================== [ 35.375272] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 35.376908] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.378045] [ 35.378529] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.379946] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.380472] Hardware name: linux,dummy-virt (DT) [ 35.381085] Call trace: [ 35.381664] show_stack+0x20/0x38 (C) [ 35.382193] dump_stack_lvl+0x8c/0xd0 [ 35.382878] print_report+0x118/0x5e0 [ 35.383538] kasan_report+0xc8/0x118 [ 35.384094] __asan_report_load4_noabort+0x20/0x30 [ 35.384783] kasan_atomics_helper+0x42d8/0x4858 [ 35.385449] kasan_atomics+0x198/0x2e8 [ 35.386086] kunit_try_run_case+0x14c/0x3d0 [ 35.386721] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.387518] kthread+0x24c/0x2d0 [ 35.388113] ret_from_fork+0x10/0x20 [ 35.388807] [ 35.389145] Allocated by task 254: [ 35.389773] kasan_save_stack+0x3c/0x68 [ 35.390415] kasan_save_track+0x20/0x40 [ 35.390968] kasan_save_alloc_info+0x40/0x58 [ 35.391705] __kasan_kmalloc+0xd4/0xd8 [ 35.392319] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.393091] kasan_atomics+0xb8/0x2e8 [ 35.393614] kunit_try_run_case+0x14c/0x3d0 [ 35.394316] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.395089] kthread+0x24c/0x2d0 [ 35.395690] ret_from_fork+0x10/0x20 [ 35.396247] [ 35.396575] The buggy address belongs to the object at fff00000c594f180 [ 35.396575] which belongs to the cache kmalloc-64 of size 64 [ 35.398007] The buggy address is located 0 bytes to the right of [ 35.398007] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.399440] [ 35.399752] The buggy address belongs to the physical page: [ 35.400437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.401523] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.402362] page_type: f5(slab) [ 35.402868] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.403804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.404751] page dumped because: kasan: bad access detected [ 35.405470] [ 35.405762] Memory state around the buggy address: [ 35.406433] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.407275] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.408132] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.409088] ^ [ 35.409744] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.410658] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.411538] ================================================================== [ 36.566133] ================================================================== [ 36.567413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 36.568424] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.569386] [ 36.569762] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.571085] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.571812] Hardware name: linux,dummy-virt (DT) [ 36.572566] Call trace: [ 36.573133] show_stack+0x20/0x38 (C) [ 36.573913] dump_stack_lvl+0x8c/0xd0 [ 36.574646] print_report+0x118/0x5e0 [ 36.575284] kasan_report+0xc8/0x118 [ 36.575947] kasan_check_range+0x100/0x1a8 [ 36.576653] __kasan_check_write+0x20/0x30 [ 36.577359] kasan_atomics_helper+0x1384/0x4858 [ 36.578092] kasan_atomics+0x198/0x2e8 [ 36.578756] kunit_try_run_case+0x14c/0x3d0 [ 36.579457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.580179] kthread+0x24c/0x2d0 [ 36.580897] ret_from_fork+0x10/0x20 [ 36.581564] [ 36.581938] Allocated by task 254: [ 36.582565] kasan_save_stack+0x3c/0x68 [ 36.583361] kasan_save_track+0x20/0x40 [ 36.583959] kasan_save_alloc_info+0x40/0x58 [ 36.584706] __kasan_kmalloc+0xd4/0xd8 [ 36.585367] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.586063] kasan_atomics+0xb8/0x2e8 [ 36.586746] kunit_try_run_case+0x14c/0x3d0 [ 36.587415] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.588217] kthread+0x24c/0x2d0 [ 36.588860] ret_from_fork+0x10/0x20 [ 36.589516] [ 36.589875] The buggy address belongs to the object at fff00000c594f180 [ 36.589875] which belongs to the cache kmalloc-64 of size 64 [ 36.591534] The buggy address is located 0 bytes to the right of [ 36.591534] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.592991] [ 36.593306] The buggy address belongs to the physical page: [ 36.594049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.595212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.596094] page_type: f5(slab) [ 36.596700] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.597700] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.598654] page dumped because: kasan: bad access detected [ 36.599424] [ 36.599757] Memory state around the buggy address: [ 36.600603] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.601611] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.602537] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.603425] ^ [ 36.604134] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.605074] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.606011] ================================================================== [ 35.062939] ================================================================== [ 35.063706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 35.064561] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.065434] [ 35.065820] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.066907] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.067575] Hardware name: linux,dummy-virt (DT) [ 35.068069] Call trace: [ 35.068554] show_stack+0x20/0x38 (C) [ 35.069201] dump_stack_lvl+0x8c/0xd0 [ 35.069850] print_report+0x118/0x5e0 [ 35.070435] kasan_report+0xc8/0x118 [ 35.071018] kasan_check_range+0x100/0x1a8 [ 35.071634] __kasan_check_write+0x20/0x30 [ 35.072300] kasan_atomics_helper+0x54c/0x4858 [ 35.073073] kasan_atomics+0x198/0x2e8 [ 35.073636] kunit_try_run_case+0x14c/0x3d0 [ 35.074304] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.075094] kthread+0x24c/0x2d0 [ 35.075702] ret_from_fork+0x10/0x20 [ 35.076274] [ 35.076639] Allocated by task 254: [ 35.077057] kasan_save_stack+0x3c/0x68 [ 35.077823] kasan_save_track+0x20/0x40 [ 35.078356] kasan_save_alloc_info+0x40/0x58 [ 35.079047] __kasan_kmalloc+0xd4/0xd8 [ 35.079565] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.080227] kasan_atomics+0xb8/0x2e8 [ 35.080807] kunit_try_run_case+0x14c/0x3d0 [ 35.081308] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.082220] kthread+0x24c/0x2d0 [ 35.082691] ret_from_fork+0x10/0x20 [ 35.083251] [ 35.083643] The buggy address belongs to the object at fff00000c594f180 [ 35.083643] which belongs to the cache kmalloc-64 of size 64 [ 35.084959] The buggy address is located 0 bytes to the right of [ 35.084959] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.086399] [ 35.086733] The buggy address belongs to the physical page: [ 35.087493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.088452] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.089351] page_type: f5(slab) [ 35.089882] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.090820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.091835] page dumped because: kasan: bad access detected [ 35.092508] [ 35.092827] Memory state around the buggy address: [ 35.093537] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.094397] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.095201] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.096120] ^ [ 35.096742] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.097660] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.098527] ================================================================== [ 35.216860] ================================================================== [ 35.217617] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 35.218694] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.219708] [ 35.220065] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.221361] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.221997] Hardware name: linux,dummy-virt (DT) [ 35.222684] Call trace: [ 35.223113] show_stack+0x20/0x38 (C) [ 35.223722] dump_stack_lvl+0x8c/0xd0 [ 35.224312] print_report+0x118/0x5e0 [ 35.224904] kasan_report+0xc8/0x118 [ 35.225596] kasan_check_range+0x100/0x1a8 [ 35.226270] __kasan_check_write+0x20/0x30 [ 35.227085] kasan_atomics_helper+0x6ec/0x4858 [ 35.227777] kasan_atomics+0x198/0x2e8 [ 35.228477] kunit_try_run_case+0x14c/0x3d0 [ 35.229002] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.229901] kthread+0x24c/0x2d0 [ 35.230520] ret_from_fork+0x10/0x20 [ 35.231097] [ 35.231433] Allocated by task 254: [ 35.231983] kasan_save_stack+0x3c/0x68 [ 35.232608] kasan_save_track+0x20/0x40 [ 35.233067] kasan_save_alloc_info+0x40/0x58 [ 35.233805] __kasan_kmalloc+0xd4/0xd8 [ 35.234322] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.235129] kasan_atomics+0xb8/0x2e8 [ 35.235699] kunit_try_run_case+0x14c/0x3d0 [ 35.236427] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.237078] kthread+0x24c/0x2d0 [ 35.237700] ret_from_fork+0x10/0x20 [ 35.238277] [ 35.238754] The buggy address belongs to the object at fff00000c594f180 [ 35.238754] which belongs to the cache kmalloc-64 of size 64 [ 35.240106] The buggy address is located 0 bytes to the right of [ 35.240106] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.241527] [ 35.241861] The buggy address belongs to the physical page: [ 35.242609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.243534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.244391] page_type: f5(slab) [ 35.244966] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.245964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.246854] page dumped because: kasan: bad access detected [ 35.247583] [ 35.247939] Memory state around the buggy address: [ 35.248610] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.249464] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.250284] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.251212] ^ [ 35.251850] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.252777] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.253654] ================================================================== [ 35.533108] ================================================================== [ 35.533796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 35.535573] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.536598] [ 35.536973] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.538188] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.538759] Hardware name: linux,dummy-virt (DT) [ 35.539349] Call trace: [ 35.539824] show_stack+0x20/0x38 (C) [ 35.540431] dump_stack_lvl+0x8c/0xd0 [ 35.541021] print_report+0x118/0x5e0 [ 35.541601] kasan_report+0xc8/0x118 [ 35.542237] kasan_check_range+0x100/0x1a8 [ 35.542805] __kasan_check_write+0x20/0x30 [ 35.543482] kasan_atomics_helper+0xa6c/0x4858 [ 35.544221] kasan_atomics+0x198/0x2e8 [ 35.544803] kunit_try_run_case+0x14c/0x3d0 [ 35.545459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.546218] kthread+0x24c/0x2d0 [ 35.546734] ret_from_fork+0x10/0x20 [ 35.547318] [ 35.547697] Allocated by task 254: [ 35.548227] kasan_save_stack+0x3c/0x68 [ 35.548817] kasan_save_track+0x20/0x40 [ 35.549402] kasan_save_alloc_info+0x40/0x58 [ 35.550048] __kasan_kmalloc+0xd4/0xd8 [ 35.550617] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.551234] kasan_atomics+0xb8/0x2e8 [ 35.551894] kunit_try_run_case+0x14c/0x3d0 [ 35.552467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.553286] kthread+0x24c/0x2d0 [ 35.554006] ret_from_fork+0x10/0x20 [ 35.554626] [ 35.555003] The buggy address belongs to the object at fff00000c594f180 [ 35.555003] which belongs to the cache kmalloc-64 of size 64 [ 35.556461] The buggy address is located 0 bytes to the right of [ 35.556461] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.558014] [ 35.558432] The buggy address belongs to the physical page: [ 35.559190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.560238] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.561104] page_type: f5(slab) [ 35.561647] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.562710] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.563673] page dumped because: kasan: bad access detected [ 35.564447] [ 35.564798] Memory state around the buggy address: [ 35.565548] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.566586] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.567518] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.568457] ^ [ 35.569151] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.570129] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.571012] ================================================================== [ 36.081268] ================================================================== [ 36.081928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 36.082976] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.084047] [ 36.084458] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.086288] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.087034] Hardware name: linux,dummy-virt (DT) [ 36.087748] Call trace: [ 36.088276] show_stack+0x20/0x38 (C) [ 36.088931] dump_stack_lvl+0x8c/0xd0 [ 36.089523] print_report+0x118/0x5e0 [ 36.090174] kasan_report+0xc8/0x118 [ 36.090751] __asan_report_store8_noabort+0x20/0x30 [ 36.091428] kasan_atomics_helper+0x3e5c/0x4858 [ 36.092052] kasan_atomics+0x198/0x2e8 [ 36.092700] kunit_try_run_case+0x14c/0x3d0 [ 36.093370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.094120] kthread+0x24c/0x2d0 [ 36.094733] ret_from_fork+0x10/0x20 [ 36.095341] [ 36.095716] Allocated by task 254: [ 36.096237] kasan_save_stack+0x3c/0x68 [ 36.096887] kasan_save_track+0x20/0x40 [ 36.097497] kasan_save_alloc_info+0x40/0x58 [ 36.098040] __kasan_kmalloc+0xd4/0xd8 [ 36.098684] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.099234] kasan_atomics+0xb8/0x2e8 [ 36.099943] kunit_try_run_case+0x14c/0x3d0 [ 36.100636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.101456] kthread+0x24c/0x2d0 [ 36.101978] ret_from_fork+0x10/0x20 [ 36.102455] [ 36.102817] The buggy address belongs to the object at fff00000c594f180 [ 36.102817] which belongs to the cache kmalloc-64 of size 64 [ 36.104297] The buggy address is located 0 bytes to the right of [ 36.104297] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.105724] [ 36.106071] The buggy address belongs to the physical page: [ 36.106739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.107945] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.108671] page_type: f5(slab) [ 36.109225] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.110088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.110997] page dumped because: kasan: bad access detected [ 36.111817] [ 36.112116] Memory state around the buggy address: [ 36.112718] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.113660] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.114479] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.115399] ^ [ 36.115982] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.116970] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.117890] ================================================================== [ 36.443584] ================================================================== [ 36.444439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 36.445248] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.446536] [ 36.446925] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.448311] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.448863] Hardware name: linux,dummy-virt (DT) [ 36.449429] Call trace: [ 36.449922] show_stack+0x20/0x38 (C) [ 36.450607] dump_stack_lvl+0x8c/0xd0 [ 36.451194] print_report+0x118/0x5e0 [ 36.451850] kasan_report+0xc8/0x118 [ 36.452448] kasan_check_range+0x100/0x1a8 [ 36.453028] __kasan_check_write+0x20/0x30 [ 36.453693] kasan_atomics_helper+0x11f8/0x4858 [ 36.454303] kasan_atomics+0x198/0x2e8 [ 36.454932] kunit_try_run_case+0x14c/0x3d0 [ 36.455663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.456520] kthread+0x24c/0x2d0 [ 36.457025] ret_from_fork+0x10/0x20 [ 36.457596] [ 36.457973] Allocated by task 254: [ 36.458508] kasan_save_stack+0x3c/0x68 [ 36.458987] kasan_save_track+0x20/0x40 [ 36.459665] kasan_save_alloc_info+0x40/0x58 [ 36.460356] __kasan_kmalloc+0xd4/0xd8 [ 36.461006] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.461620] kasan_atomics+0xb8/0x2e8 [ 36.462282] kunit_try_run_case+0x14c/0x3d0 [ 36.462967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.463758] kthread+0x24c/0x2d0 [ 36.464253] ret_from_fork+0x10/0x20 [ 36.464893] [ 36.465189] The buggy address belongs to the object at fff00000c594f180 [ 36.465189] which belongs to the cache kmalloc-64 of size 64 [ 36.466625] The buggy address is located 0 bytes to the right of [ 36.466625] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.468032] [ 36.468433] The buggy address belongs to the physical page: [ 36.469153] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.470093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.471127] page_type: f5(slab) [ 36.471674] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.472655] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.473555] page dumped because: kasan: bad access detected [ 36.474272] [ 36.474666] Memory state around the buggy address: [ 36.475535] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.476450] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.477314] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.478160] ^ [ 36.478836] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.479702] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.480533] ================================================================== [ 36.769172] ================================================================== [ 36.770616] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 36.771938] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.773016] [ 36.773495] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.774750] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.775319] Hardware name: linux,dummy-virt (DT) [ 36.776002] Call trace: [ 36.776532] show_stack+0x20/0x38 (C) [ 36.777074] dump_stack_lvl+0x8c/0xd0 [ 36.777731] print_report+0x118/0x5e0 [ 36.778304] kasan_report+0xc8/0x118 [ 36.778880] kasan_check_range+0x100/0x1a8 [ 36.779512] __kasan_check_write+0x20/0x30 [ 36.780216] kasan_atomics_helper+0x154c/0x4858 [ 36.780931] kasan_atomics+0x198/0x2e8 [ 36.781518] kunit_try_run_case+0x14c/0x3d0 [ 36.782204] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.782995] kthread+0x24c/0x2d0 [ 36.783594] ret_from_fork+0x10/0x20 [ 36.784200] [ 36.784615] Allocated by task 254: [ 36.785053] kasan_save_stack+0x3c/0x68 [ 36.785743] kasan_save_track+0x20/0x40 [ 36.786374] kasan_save_alloc_info+0x40/0x58 [ 36.787084] __kasan_kmalloc+0xd4/0xd8 [ 36.787602] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.788344] kasan_atomics+0xb8/0x2e8 [ 36.788812] kunit_try_run_case+0x14c/0x3d0 [ 36.789609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.790351] kthread+0x24c/0x2d0 [ 36.790866] ret_from_fork+0x10/0x20 [ 36.791476] [ 36.791776] The buggy address belongs to the object at fff00000c594f180 [ 36.791776] which belongs to the cache kmalloc-64 of size 64 [ 36.793163] The buggy address is located 0 bytes to the right of [ 36.793163] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.794645] [ 36.794961] The buggy address belongs to the physical page: [ 36.795709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.796669] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.797501] page_type: f5(slab) [ 36.797971] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.799013] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.799910] page dumped because: kasan: bad access detected [ 36.800575] [ 36.800907] Memory state around the buggy address: [ 36.801579] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.802363] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.803257] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.804122] ^ [ 36.804801] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.805715] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.806714] ================================================================== [ 37.018270] ================================================================== [ 37.018973] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 37.020626] Read of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 37.021752] [ 37.022287] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 37.023636] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.024248] Hardware name: linux,dummy-virt (DT) [ 37.024954] Call trace: [ 37.025554] show_stack+0x20/0x38 (C) [ 37.026209] dump_stack_lvl+0x8c/0xd0 [ 37.026900] print_report+0x118/0x5e0 [ 37.027537] kasan_report+0xc8/0x118 [ 37.028162] __asan_report_load8_noabort+0x20/0x30 [ 37.028892] kasan_atomics_helper+0x3e10/0x4858 [ 37.029631] kasan_atomics+0x198/0x2e8 [ 37.030260] kunit_try_run_case+0x14c/0x3d0 [ 37.031006] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.031823] kthread+0x24c/0x2d0 [ 37.032435] ret_from_fork+0x10/0x20 [ 37.033061] [ 37.033448] Allocated by task 254: [ 37.034080] kasan_save_stack+0x3c/0x68 [ 37.034806] kasan_save_track+0x20/0x40 [ 37.035588] kasan_save_alloc_info+0x40/0x58 [ 37.036263] __kasan_kmalloc+0xd4/0xd8 [ 37.036946] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.037671] kasan_atomics+0xb8/0x2e8 [ 37.038292] kunit_try_run_case+0x14c/0x3d0 [ 37.038974] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.039765] kthread+0x24c/0x2d0 [ 37.040500] ret_from_fork+0x10/0x20 [ 37.041104] [ 37.041457] The buggy address belongs to the object at fff00000c594f180 [ 37.041457] which belongs to the cache kmalloc-64 of size 64 [ 37.042997] The buggy address is located 0 bytes to the right of [ 37.042997] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 37.044492] [ 37.044902] The buggy address belongs to the physical page: [ 37.045678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 37.046796] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.047695] page_type: f5(slab) [ 37.048265] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.049297] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.050260] page dumped because: kasan: bad access detected [ 37.051044] [ 37.051560] Memory state around the buggy address: [ 37.052209] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.053177] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.054085] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.054999] ^ [ 37.055733] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.056667] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.057697] ================================================================== [ 34.862156] ================================================================== [ 34.863009] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 34.863975] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 34.865573] [ 34.865988] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.867452] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.867985] Hardware name: linux,dummy-virt (DT) [ 34.868748] Call trace: [ 34.869185] show_stack+0x20/0x38 (C) [ 34.869870] dump_stack_lvl+0x8c/0xd0 [ 34.870590] print_report+0x118/0x5e0 [ 34.871359] kasan_report+0xc8/0x118 [ 34.871971] __asan_report_store4_noabort+0x20/0x30 [ 34.872729] kasan_atomics_helper+0x3f94/0x4858 [ 34.873441] kasan_atomics+0x198/0x2e8 [ 34.874161] kunit_try_run_case+0x14c/0x3d0 [ 34.874807] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.875568] kthread+0x24c/0x2d0 [ 34.876106] ret_from_fork+0x10/0x20 [ 34.876781] [ 34.877119] Allocated by task 254: [ 34.877735] kasan_save_stack+0x3c/0x68 [ 34.878531] kasan_save_track+0x20/0x40 [ 34.879264] kasan_save_alloc_info+0x40/0x58 [ 34.879963] __kasan_kmalloc+0xd4/0xd8 [ 34.880623] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.881309] kasan_atomics+0xb8/0x2e8 [ 34.882019] kunit_try_run_case+0x14c/0x3d0 [ 34.882724] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.883597] kthread+0x24c/0x2d0 [ 34.884165] ret_from_fork+0x10/0x20 [ 34.884809] [ 34.885341] The buggy address belongs to the object at fff00000c594f180 [ 34.885341] which belongs to the cache kmalloc-64 of size 64 [ 34.886840] The buggy address is located 0 bytes to the right of [ 34.886840] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 34.888271] [ 34.888696] The buggy address belongs to the physical page: [ 34.889571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 34.890710] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.891605] page_type: f5(slab) [ 34.892209] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.893234] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.894218] page dumped because: kasan: bad access detected [ 34.895022] [ 34.895562] Memory state around the buggy address: [ 34.896301] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.897228] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.898180] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.899163] ^ [ 34.899855] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.901083] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.902044] ================================================================== [ 34.982941] ================================================================== [ 34.983861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 34.985746] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 34.987188] [ 34.987623] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.989178] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.989746] Hardware name: linux,dummy-virt (DT) [ 34.990348] Call trace: [ 34.990867] show_stack+0x20/0x38 (C) [ 34.991570] dump_stack_lvl+0x8c/0xd0 [ 34.992354] print_report+0x118/0x5e0 [ 34.993115] kasan_report+0xc8/0x118 [ 34.993690] kasan_check_range+0x100/0x1a8 [ 34.994297] __kasan_check_write+0x20/0x30 [ 34.995243] kasan_atomics_helper+0x47c/0x4858 [ 34.995946] kasan_atomics+0x198/0x2e8 [ 34.996525] kunit_try_run_case+0x14c/0x3d0 [ 34.996998] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.997816] kthread+0x24c/0x2d0 [ 34.998470] ret_from_fork+0x10/0x20 [ 34.998940] [ 34.999218] Allocated by task 254: [ 34.999818] kasan_save_stack+0x3c/0x68 [ 35.000450] kasan_save_track+0x20/0x40 [ 35.001042] kasan_save_alloc_info+0x40/0x58 [ 35.001670] __kasan_kmalloc+0xd4/0xd8 [ 35.002279] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.002957] kasan_atomics+0xb8/0x2e8 [ 35.003543] kunit_try_run_case+0x14c/0x3d0 [ 35.004162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.004837] kthread+0x24c/0x2d0 [ 35.005450] ret_from_fork+0x10/0x20 [ 35.005973] [ 35.006374] The buggy address belongs to the object at fff00000c594f180 [ 35.006374] which belongs to the cache kmalloc-64 of size 64 [ 35.007839] The buggy address is located 0 bytes to the right of [ 35.007839] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.009274] [ 35.009633] The buggy address belongs to the physical page: [ 35.010310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.011418] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.012302] page_type: f5(slab) [ 35.012816] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.013820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.014748] page dumped because: kasan: bad access detected [ 35.015437] [ 35.015667] Memory state around the buggy address: [ 35.016429] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.017267] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.018084] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.019035] ^ [ 35.019678] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.020634] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.021603] ================================================================== [ 35.844979] ================================================================== [ 35.845814] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 35.847556] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.848779] [ 35.849574] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.850996] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.851580] Hardware name: linux,dummy-virt (DT) [ 35.852398] Call trace: [ 35.852759] show_stack+0x20/0x38 (C) [ 35.853366] dump_stack_lvl+0x8c/0xd0 [ 35.854219] print_report+0x118/0x5e0 [ 35.854832] kasan_report+0xc8/0x118 [ 35.855530] __asan_report_load4_noabort+0x20/0x30 [ 35.856249] kasan_atomics_helper+0x3dd8/0x4858 [ 35.856941] kasan_atomics+0x198/0x2e8 [ 35.857552] kunit_try_run_case+0x14c/0x3d0 [ 35.858269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.859121] kthread+0x24c/0x2d0 [ 35.859713] ret_from_fork+0x10/0x20 [ 35.860355] [ 35.860763] Allocated by task 254: [ 35.861385] kasan_save_stack+0x3c/0x68 [ 35.862033] kasan_save_track+0x20/0x40 [ 35.863180] kasan_save_alloc_info+0x40/0x58 [ 35.863852] __kasan_kmalloc+0xd4/0xd8 [ 35.864803] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.865679] kasan_atomics+0xb8/0x2e8 [ 35.866266] kunit_try_run_case+0x14c/0x3d0 [ 35.867175] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.868062] kthread+0x24c/0x2d0 [ 35.868671] ret_from_fork+0x10/0x20 [ 35.869264] [ 35.869736] The buggy address belongs to the object at fff00000c594f180 [ 35.869736] which belongs to the cache kmalloc-64 of size 64 [ 35.871254] The buggy address is located 0 bytes to the right of [ 35.871254] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.872772] [ 35.873133] The buggy address belongs to the physical page: [ 35.874072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.875153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.876067] page_type: f5(slab) [ 35.876652] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.877717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.878669] page dumped because: kasan: bad access detected [ 35.879455] [ 35.879834] Memory state around the buggy address: [ 35.880526] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.881458] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.882398] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.883279] ^ [ 35.883994] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.885038] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.885959] ================================================================== [ 36.043366] ================================================================== [ 36.044539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 36.045172] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.045931] [ 36.046280] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.047396] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.047977] Hardware name: linux,dummy-virt (DT) [ 36.048732] Call trace: [ 36.049154] show_stack+0x20/0x38 (C) [ 36.049938] dump_stack_lvl+0x8c/0xd0 [ 36.050645] print_report+0x118/0x5e0 [ 36.051201] kasan_report+0xc8/0x118 [ 36.051804] kasan_check_range+0x100/0x1a8 [ 36.052460] __kasan_check_write+0x20/0x30 [ 36.053036] kasan_atomics_helper+0xe44/0x4858 [ 36.053775] kasan_atomics+0x198/0x2e8 [ 36.054407] kunit_try_run_case+0x14c/0x3d0 [ 36.055027] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.055797] kthread+0x24c/0x2d0 [ 36.056428] ret_from_fork+0x10/0x20 [ 36.057090] [ 36.057444] Allocated by task 254: [ 36.057888] kasan_save_stack+0x3c/0x68 [ 36.058534] kasan_save_track+0x20/0x40 [ 36.059102] kasan_save_alloc_info+0x40/0x58 [ 36.059820] __kasan_kmalloc+0xd4/0xd8 [ 36.060395] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.060962] kasan_atomics+0xb8/0x2e8 [ 36.061676] kunit_try_run_case+0x14c/0x3d0 [ 36.062307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.063061] kthread+0x24c/0x2d0 [ 36.063561] ret_from_fork+0x10/0x20 [ 36.064115] [ 36.064519] The buggy address belongs to the object at fff00000c594f180 [ 36.064519] which belongs to the cache kmalloc-64 of size 64 [ 36.065921] The buggy address is located 0 bytes to the right of [ 36.065921] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.067310] [ 36.067613] The buggy address belongs to the physical page: [ 36.068344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.069248] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.070168] page_type: f5(slab) [ 36.070705] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.071641] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.072589] page dumped because: kasan: bad access detected [ 36.073353] [ 36.073677] Memory state around the buggy address: [ 36.074355] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.075238] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.076026] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.076960] ^ [ 36.077589] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.078493] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.079370] ================================================================== [ 34.583862] ================================================================== [ 34.585662] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 34.586757] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 34.587396] [ 34.587715] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.588949] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.589532] Hardware name: linux,dummy-virt (DT) [ 34.590246] Call trace: [ 34.590680] show_stack+0x20/0x38 (C) [ 34.591389] dump_stack_lvl+0x8c/0xd0 [ 34.592024] print_report+0x118/0x5e0 [ 34.592714] kasan_report+0xc8/0x118 [ 34.593281] __asan_report_load4_noabort+0x20/0x30 [ 34.594191] kasan_atomics_helper+0x40a8/0x4858 [ 34.594877] kasan_atomics+0x198/0x2e8 [ 34.595424] kunit_try_run_case+0x14c/0x3d0 [ 34.596210] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.597002] kthread+0x24c/0x2d0 [ 34.597654] ret_from_fork+0x10/0x20 [ 34.598362] [ 34.598763] Allocated by task 254: [ 34.599241] kasan_save_stack+0x3c/0x68 [ 34.599819] kasan_save_track+0x20/0x40 [ 34.600414] kasan_save_alloc_info+0x40/0x58 [ 34.601008] __kasan_kmalloc+0xd4/0xd8 [ 34.601668] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.602365] kasan_atomics+0xb8/0x2e8 [ 34.602991] kunit_try_run_case+0x14c/0x3d0 [ 34.603628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.604366] kthread+0x24c/0x2d0 [ 34.604809] ret_from_fork+0x10/0x20 [ 34.605481] [ 34.605852] The buggy address belongs to the object at fff00000c594f180 [ 34.605852] which belongs to the cache kmalloc-64 of size 64 [ 34.607185] The buggy address is located 0 bytes to the right of [ 34.607185] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 34.608622] [ 34.608927] The buggy address belongs to the physical page: [ 34.609789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 34.610784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.611503] page_type: f5(slab) [ 34.612096] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.613086] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.614060] page dumped because: kasan: bad access detected [ 34.615011] [ 34.615535] Memory state around the buggy address: [ 34.616300] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.617262] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.618141] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.619063] ^ [ 34.619781] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.620730] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.621655] ================================================================== [ 35.725812] ================================================================== [ 35.726540] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 35.727475] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.728405] [ 35.728715] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.729957] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.730766] Hardware name: linux,dummy-virt (DT) [ 35.731499] Call trace: [ 35.731905] show_stack+0x20/0x38 (C) [ 35.732671] dump_stack_lvl+0x8c/0xd0 [ 35.733284] print_report+0x118/0x5e0 [ 35.734220] kasan_report+0xc8/0x118 [ 35.734901] kasan_check_range+0x100/0x1a8 [ 35.735792] __kasan_check_write+0x20/0x30 [ 35.736608] kasan_atomics_helper+0xc08/0x4858 [ 35.737427] kasan_atomics+0x198/0x2e8 [ 35.738210] kunit_try_run_case+0x14c/0x3d0 [ 35.738859] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.739822] kthread+0x24c/0x2d0 [ 35.740527] ret_from_fork+0x10/0x20 [ 35.741109] [ 35.741432] Allocated by task 254: [ 35.741940] kasan_save_stack+0x3c/0x68 [ 35.742551] kasan_save_track+0x20/0x40 [ 35.743138] kasan_save_alloc_info+0x40/0x58 [ 35.743752] __kasan_kmalloc+0xd4/0xd8 [ 35.744408] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.745035] kasan_atomics+0xb8/0x2e8 [ 35.745582] kunit_try_run_case+0x14c/0x3d0 [ 35.746248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.747035] kthread+0x24c/0x2d0 [ 35.747541] ret_from_fork+0x10/0x20 [ 35.748047] [ 35.748514] The buggy address belongs to the object at fff00000c594f180 [ 35.748514] which belongs to the cache kmalloc-64 of size 64 [ 35.749968] The buggy address is located 0 bytes to the right of [ 35.749968] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.751383] [ 35.751670] The buggy address belongs to the physical page: [ 35.752319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.753344] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.754176] page_type: f5(slab) [ 35.754727] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.755673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.756590] page dumped because: kasan: bad access detected [ 35.757310] [ 35.757640] Memory state around the buggy address: [ 35.758319] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.759217] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.760089] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.760964] ^ [ 35.761631] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.762580] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.763471] ================================================================== [ 35.806844] ================================================================== [ 35.807704] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 35.808596] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.809456] [ 35.809969] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.811155] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.811780] Hardware name: linux,dummy-virt (DT) [ 35.812557] Call trace: [ 35.812953] show_stack+0x20/0x38 (C) [ 35.813595] dump_stack_lvl+0x8c/0xd0 [ 35.814153] print_report+0x118/0x5e0 [ 35.814830] kasan_report+0xc8/0x118 [ 35.815521] kasan_check_range+0x100/0x1a8 [ 35.816079] __kasan_check_write+0x20/0x30 [ 35.816700] kasan_atomics_helper+0xca0/0x4858 [ 35.817293] kasan_atomics+0x198/0x2e8 [ 35.817749] kunit_try_run_case+0x14c/0x3d0 [ 35.818241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.818824] kthread+0x24c/0x2d0 [ 35.819401] ret_from_fork+0x10/0x20 [ 35.820122] [ 35.820534] Allocated by task 254: [ 35.821194] kasan_save_stack+0x3c/0x68 [ 35.821791] kasan_save_track+0x20/0x40 [ 35.822423] kasan_save_alloc_info+0x40/0x58 [ 35.822967] __kasan_kmalloc+0xd4/0xd8 [ 35.823713] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.824470] kasan_atomics+0xb8/0x2e8 [ 35.824928] kunit_try_run_case+0x14c/0x3d0 [ 35.825723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.826530] kthread+0x24c/0x2d0 [ 35.827077] ret_from_fork+0x10/0x20 [ 35.827630] [ 35.827988] The buggy address belongs to the object at fff00000c594f180 [ 35.827988] which belongs to the cache kmalloc-64 of size 64 [ 35.829434] The buggy address is located 0 bytes to the right of [ 35.829434] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.830866] [ 35.831194] The buggy address belongs to the physical page: [ 35.832151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.833040] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.833669] page_type: f5(slab) [ 35.834095] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.834853] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.836310] page dumped because: kasan: bad access detected [ 35.836985] [ 35.837372] Memory state around the buggy address: [ 35.837987] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.838900] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.839808] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.840643] ^ [ 35.841275] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.842196] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.843050] ================================================================== [ 36.403890] ================================================================== [ 36.404670] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 36.405956] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.406738] [ 36.407217] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.408514] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.409086] Hardware name: linux,dummy-virt (DT) [ 36.409821] Call trace: [ 36.410314] show_stack+0x20/0x38 (C) [ 36.410912] dump_stack_lvl+0x8c/0xd0 [ 36.411497] print_report+0x118/0x5e0 [ 36.412080] kasan_report+0xc8/0x118 [ 36.412770] kasan_check_range+0x100/0x1a8 [ 36.413344] __kasan_check_write+0x20/0x30 [ 36.414120] kasan_atomics_helper+0x1190/0x4858 [ 36.414868] kasan_atomics+0x198/0x2e8 [ 36.415528] kunit_try_run_case+0x14c/0x3d0 [ 36.416221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.416988] kthread+0x24c/0x2d0 [ 36.417627] ret_from_fork+0x10/0x20 [ 36.418236] [ 36.418610] Allocated by task 254: [ 36.419175] kasan_save_stack+0x3c/0x68 [ 36.419750] kasan_save_track+0x20/0x40 [ 36.420359] kasan_save_alloc_info+0x40/0x58 [ 36.420980] __kasan_kmalloc+0xd4/0xd8 [ 36.421543] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.422293] kasan_atomics+0xb8/0x2e8 [ 36.422811] kunit_try_run_case+0x14c/0x3d0 [ 36.423523] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.424227] kthread+0x24c/0x2d0 [ 36.424779] ret_from_fork+0x10/0x20 [ 36.425371] [ 36.425672] The buggy address belongs to the object at fff00000c594f180 [ 36.425672] which belongs to the cache kmalloc-64 of size 64 [ 36.427050] The buggy address is located 0 bytes to the right of [ 36.427050] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.428468] [ 36.428823] The buggy address belongs to the physical page: [ 36.429565] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.430559] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.431352] page_type: f5(slab) [ 36.431952] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.432834] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.433877] page dumped because: kasan: bad access detected [ 36.434567] [ 36.434939] Memory state around the buggy address: [ 36.435615] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.436462] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.437411] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.438392] ^ [ 36.438977] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.439906] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.440756] ================================================================== [ 34.663860] ================================================================== [ 34.664704] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 34.665513] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 34.666247] [ 34.666704] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.668861] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.669456] Hardware name: linux,dummy-virt (DT) [ 34.670057] Call trace: [ 34.670768] show_stack+0x20/0x38 (C) [ 34.671589] dump_stack_lvl+0x8c/0xd0 [ 34.672135] print_report+0x118/0x5e0 [ 34.672691] kasan_report+0xc8/0x118 [ 34.673227] kasan_check_range+0x100/0x1a8 [ 34.673869] __kasan_check_read+0x20/0x30 [ 34.674483] kasan_atomics_helper+0x1ec/0x4858 [ 34.675243] kasan_atomics+0x198/0x2e8 [ 34.675848] kunit_try_run_case+0x14c/0x3d0 [ 34.676447] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.677298] kthread+0x24c/0x2d0 [ 34.677876] ret_from_fork+0x10/0x20 [ 34.678389] [ 34.678740] Allocated by task 254: [ 34.679358] kasan_save_stack+0x3c/0x68 [ 34.679946] kasan_save_track+0x20/0x40 [ 34.680501] kasan_save_alloc_info+0x40/0x58 [ 34.681098] __kasan_kmalloc+0xd4/0xd8 [ 34.681795] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.682462] kasan_atomics+0xb8/0x2e8 [ 34.683077] kunit_try_run_case+0x14c/0x3d0 [ 34.683631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.684442] kthread+0x24c/0x2d0 [ 34.684945] ret_from_fork+0x10/0x20 [ 34.685459] [ 34.685917] The buggy address belongs to the object at fff00000c594f180 [ 34.685917] which belongs to the cache kmalloc-64 of size 64 [ 34.687339] The buggy address is located 0 bytes to the right of [ 34.687339] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 34.688766] [ 34.689117] The buggy address belongs to the physical page: [ 34.689865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 34.690878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.691681] page_type: f5(slab) [ 34.692139] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.693162] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.694088] page dumped because: kasan: bad access detected [ 34.694827] [ 34.695148] Memory state around the buggy address: [ 34.695749] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.696666] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.697552] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.698477] ^ [ 34.699063] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.699945] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.700809] ================================================================== [ 35.177764] ================================================================== [ 35.178792] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 35.179752] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.180547] [ 35.180962] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.182238] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.182721] Hardware name: linux,dummy-virt (DT) [ 35.183512] Call trace: [ 35.183894] show_stack+0x20/0x38 (C) [ 35.184685] dump_stack_lvl+0x8c/0xd0 [ 35.185493] print_report+0x118/0x5e0 [ 35.186139] kasan_report+0xc8/0x118 [ 35.186751] kasan_check_range+0x100/0x1a8 [ 35.187410] __kasan_check_write+0x20/0x30 [ 35.188082] kasan_atomics_helper+0x684/0x4858 [ 35.188751] kasan_atomics+0x198/0x2e8 [ 35.189366] kunit_try_run_case+0x14c/0x3d0 [ 35.190035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.190804] kthread+0x24c/0x2d0 [ 35.191490] ret_from_fork+0x10/0x20 [ 35.192046] [ 35.192420] Allocated by task 254: [ 35.192927] kasan_save_stack+0x3c/0x68 [ 35.193436] kasan_save_track+0x20/0x40 [ 35.194065] kasan_save_alloc_info+0x40/0x58 [ 35.194694] __kasan_kmalloc+0xd4/0xd8 [ 35.195227] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.195920] kasan_atomics+0xb8/0x2e8 [ 35.196516] kunit_try_run_case+0x14c/0x3d0 [ 35.197035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.197891] kthread+0x24c/0x2d0 [ 35.198419] ret_from_fork+0x10/0x20 [ 35.198928] [ 35.199354] The buggy address belongs to the object at fff00000c594f180 [ 35.199354] which belongs to the cache kmalloc-64 of size 64 [ 35.200775] The buggy address is located 0 bytes to the right of [ 35.200775] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.202121] [ 35.202474] The buggy address belongs to the physical page: [ 35.203117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.204143] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.204875] page_type: f5(slab) [ 35.205423] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.206346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.207288] page dumped because: kasan: bad access detected [ 35.208085] [ 35.208456] Memory state around the buggy address: [ 35.209148] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.210160] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.211106] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.212048] ^ [ 35.212895] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.213806] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.214810] ================================================================== [ 35.614004] ================================================================== [ 35.615896] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 35.616914] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.617855] [ 35.618241] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.619538] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.620204] Hardware name: linux,dummy-virt (DT) [ 35.620810] Call trace: [ 35.621225] show_stack+0x20/0x38 (C) [ 35.621856] dump_stack_lvl+0x8c/0xd0 [ 35.622443] print_report+0x118/0x5e0 [ 35.622952] kasan_report+0xc8/0x118 [ 35.623661] __asan_report_load4_noabort+0x20/0x30 [ 35.624353] kasan_atomics_helper+0x3dcc/0x4858 [ 35.625105] kasan_atomics+0x198/0x2e8 [ 35.625757] kunit_try_run_case+0x14c/0x3d0 [ 35.626476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.627285] kthread+0x24c/0x2d0 [ 35.627865] ret_from_fork+0x10/0x20 [ 35.628423] [ 35.628808] Allocated by task 254: [ 35.629282] kasan_save_stack+0x3c/0x68 [ 35.630017] kasan_save_track+0x20/0x40 [ 35.630528] kasan_save_alloc_info+0x40/0x58 [ 35.631217] __kasan_kmalloc+0xd4/0xd8 [ 35.631772] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.632423] kasan_atomics+0xb8/0x2e8 [ 35.632964] kunit_try_run_case+0x14c/0x3d0 [ 35.633605] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.634210] kthread+0x24c/0x2d0 [ 35.634812] ret_from_fork+0x10/0x20 [ 35.635421] [ 35.635768] The buggy address belongs to the object at fff00000c594f180 [ 35.635768] which belongs to the cache kmalloc-64 of size 64 [ 35.637250] The buggy address is located 0 bytes to the right of [ 35.637250] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.638618] [ 35.639081] The buggy address belongs to the physical page: [ 35.639792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.640886] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.641699] page_type: f5(slab) [ 35.642284] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.643164] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.644126] page dumped because: kasan: bad access detected [ 35.644796] [ 35.645102] Memory state around the buggy address: [ 35.645718] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.646526] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.646948] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.647381] ^ [ 35.647702] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.648118] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.648678] ================================================================== [ 36.279955] ================================================================== [ 36.280735] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 36.282257] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.283251] [ 36.283660] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.285068] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.285784] Hardware name: linux,dummy-virt (DT) [ 36.286634] Call trace: [ 36.287138] show_stack+0x20/0x38 (C) [ 36.287904] dump_stack_lvl+0x8c/0xd0 [ 36.288596] print_report+0x118/0x5e0 [ 36.289222] kasan_report+0xc8/0x118 [ 36.289879] kasan_check_range+0x100/0x1a8 [ 36.290572] __kasan_check_write+0x20/0x30 [ 36.291253] kasan_atomics_helper+0x1058/0x4858 [ 36.292048] kasan_atomics+0x198/0x2e8 [ 36.292704] kunit_try_run_case+0x14c/0x3d0 [ 36.293441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.294183] kthread+0x24c/0x2d0 [ 36.294853] ret_from_fork+0x10/0x20 [ 36.295490] [ 36.295968] Allocated by task 254: [ 36.296509] kasan_save_stack+0x3c/0x68 [ 36.297197] kasan_save_track+0x20/0x40 [ 36.297885] kasan_save_alloc_info+0x40/0x58 [ 36.298589] __kasan_kmalloc+0xd4/0xd8 [ 36.299213] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.299950] kasan_atomics+0xb8/0x2e8 [ 36.300533] kunit_try_run_case+0x14c/0x3d0 [ 36.301160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.301988] kthread+0x24c/0x2d0 [ 36.302604] ret_from_fork+0x10/0x20 [ 36.303265] [ 36.303653] The buggy address belongs to the object at fff00000c594f180 [ 36.303653] which belongs to the cache kmalloc-64 of size 64 [ 36.305099] The buggy address is located 0 bytes to the right of [ 36.305099] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.306699] [ 36.307205] The buggy address belongs to the physical page: [ 36.308029] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.309043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.309936] page_type: f5(slab) [ 36.310546] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.311545] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.312518] page dumped because: kasan: bad access detected [ 36.313316] [ 36.313795] Memory state around the buggy address: [ 36.314494] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.315581] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.316491] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.317396] ^ [ 36.318188] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.319084] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.320105] ================================================================== [ 35.689147] ================================================================== [ 35.689879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 35.690655] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.691679] [ 35.692003] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.693241] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.693791] Hardware name: linux,dummy-virt (DT) [ 35.694396] Call trace: [ 35.694891] show_stack+0x20/0x38 (C) [ 35.695408] dump_stack_lvl+0x8c/0xd0 [ 35.696087] print_report+0x118/0x5e0 [ 35.696668] kasan_report+0xc8/0x118 [ 35.697199] __asan_report_load4_noabort+0x20/0x30 [ 35.697917] kasan_atomics_helper+0x3dbc/0x4858 [ 35.698557] kasan_atomics+0x198/0x2e8 [ 35.699132] kunit_try_run_case+0x14c/0x3d0 [ 35.699803] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.700476] kthread+0x24c/0x2d0 [ 35.701095] ret_from_fork+0x10/0x20 [ 35.701713] [ 35.702089] Allocated by task 254: [ 35.702612] kasan_save_stack+0x3c/0x68 [ 35.703201] kasan_save_track+0x20/0x40 [ 35.703798] kasan_save_alloc_info+0x40/0x58 [ 35.704346] __kasan_kmalloc+0xd4/0xd8 [ 35.704940] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.705624] kasan_atomics+0xb8/0x2e8 [ 35.706178] kunit_try_run_case+0x14c/0x3d0 [ 35.706725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.707540] kthread+0x24c/0x2d0 [ 35.708013] ret_from_fork+0x10/0x20 [ 35.708693] [ 35.709057] The buggy address belongs to the object at fff00000c594f180 [ 35.709057] which belongs to the cache kmalloc-64 of size 64 [ 35.710498] The buggy address is located 0 bytes to the right of [ 35.710498] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.711953] [ 35.712257] The buggy address belongs to the physical page: [ 35.712997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.713977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.714804] page_type: f5(slab) [ 35.715373] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.716369] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.717305] page dumped because: kasan: bad access detected [ 35.718010] [ 35.718317] Memory state around the buggy address: [ 35.718882] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.719827] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.720703] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.721592] ^ [ 35.722144] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.723066] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.723941] ================================================================== [ 35.765266] ================================================================== [ 35.766357] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 35.767865] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.768943] [ 35.769344] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.770626] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.771498] Hardware name: linux,dummy-virt (DT) [ 35.772254] Call trace: [ 35.772877] show_stack+0x20/0x38 (C) [ 35.773661] dump_stack_lvl+0x8c/0xd0 [ 35.774222] print_report+0x118/0x5e0 [ 35.774870] kasan_report+0xc8/0x118 [ 35.775447] __asan_report_load4_noabort+0x20/0x30 [ 35.776346] kasan_atomics_helper+0x3de4/0x4858 [ 35.777139] kasan_atomics+0x198/0x2e8 [ 35.777723] kunit_try_run_case+0x14c/0x3d0 [ 35.778484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.779279] kthread+0x24c/0x2d0 [ 35.779881] ret_from_fork+0x10/0x20 [ 35.780544] [ 35.780859] Allocated by task 254: [ 35.781518] kasan_save_stack+0x3c/0x68 [ 35.782142] kasan_save_track+0x20/0x40 [ 35.782906] kasan_save_alloc_info+0x40/0x58 [ 35.783597] __kasan_kmalloc+0xd4/0xd8 [ 35.784305] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.784986] kasan_atomics+0xb8/0x2e8 [ 35.785597] kunit_try_run_case+0x14c/0x3d0 [ 35.786299] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.787079] kthread+0x24c/0x2d0 [ 35.787693] ret_from_fork+0x10/0x20 [ 35.788315] [ 35.788702] The buggy address belongs to the object at fff00000c594f180 [ 35.788702] which belongs to the cache kmalloc-64 of size 64 [ 35.790375] The buggy address is located 0 bytes to the right of [ 35.790375] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.791965] [ 35.792414] The buggy address belongs to the physical page: [ 35.793188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.794204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.795124] page_type: f5(slab) [ 35.795772] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.796772] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.797728] page dumped because: kasan: bad access detected [ 35.798569] [ 35.798902] Memory state around the buggy address: [ 35.799766] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.800843] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.801899] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.802776] ^ [ 35.803355] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.804050] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.804823] ================================================================== [ 36.730681] ================================================================== [ 36.731392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 36.732837] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.733808] [ 36.734213] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.735462] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.736034] Hardware name: linux,dummy-virt (DT) [ 36.736702] Call trace: [ 36.737174] show_stack+0x20/0x38 (C) [ 36.737788] dump_stack_lvl+0x8c/0xd0 [ 36.738409] print_report+0x118/0x5e0 [ 36.739000] kasan_report+0xc8/0x118 [ 36.739616] kasan_check_range+0x100/0x1a8 [ 36.740221] __kasan_check_write+0x20/0x30 [ 36.740877] kasan_atomics_helper+0x14e4/0x4858 [ 36.741463] kasan_atomics+0x198/0x2e8 [ 36.742117] kunit_try_run_case+0x14c/0x3d0 [ 36.742687] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.743568] kthread+0x24c/0x2d0 [ 36.744158] ret_from_fork+0x10/0x20 [ 36.744815] [ 36.745092] Allocated by task 254: [ 36.745714] kasan_save_stack+0x3c/0x68 [ 36.746322] kasan_save_track+0x20/0x40 [ 36.746873] kasan_save_alloc_info+0x40/0x58 [ 36.747497] __kasan_kmalloc+0xd4/0xd8 [ 36.748060] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.748831] kasan_atomics+0xb8/0x2e8 [ 36.749361] kunit_try_run_case+0x14c/0x3d0 [ 36.750083] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.750846] kthread+0x24c/0x2d0 [ 36.751388] ret_from_fork+0x10/0x20 [ 36.751982] [ 36.752279] The buggy address belongs to the object at fff00000c594f180 [ 36.752279] which belongs to the cache kmalloc-64 of size 64 [ 36.753664] The buggy address is located 0 bytes to the right of [ 36.753664] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.755167] [ 36.755534] The buggy address belongs to the physical page: [ 36.756155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.757217] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.758156] page_type: f5(slab) [ 36.758635] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.759643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.760640] page dumped because: kasan: bad access detected [ 36.761408] [ 36.761704] Memory state around the buggy address: [ 36.762270] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.763241] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.764097] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.764972] ^ [ 36.765619] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.766500] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.767415] ================================================================== [ 36.363842] ================================================================== [ 36.365703] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 36.366555] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.366981] [ 36.367661] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.369298] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.369821] Hardware name: linux,dummy-virt (DT) [ 36.370594] Call trace: [ 36.371043] show_stack+0x20/0x38 (C) [ 36.371662] dump_stack_lvl+0x8c/0xd0 [ 36.372175] print_report+0x118/0x5e0 [ 36.372878] kasan_report+0xc8/0x118 [ 36.373506] kasan_check_range+0x100/0x1a8 [ 36.374091] __kasan_check_write+0x20/0x30 [ 36.374847] kasan_atomics_helper+0x1128/0x4858 [ 36.375516] kasan_atomics+0x198/0x2e8 [ 36.376060] kunit_try_run_case+0x14c/0x3d0 [ 36.376725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.377526] kthread+0x24c/0x2d0 [ 36.378091] ret_from_fork+0x10/0x20 [ 36.378688] [ 36.379049] Allocated by task 254: [ 36.379625] kasan_save_stack+0x3c/0x68 [ 36.380147] kasan_save_track+0x20/0x40 [ 36.380763] kasan_save_alloc_info+0x40/0x58 [ 36.381401] __kasan_kmalloc+0xd4/0xd8 [ 36.381908] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.382597] kasan_atomics+0xb8/0x2e8 [ 36.383239] kunit_try_run_case+0x14c/0x3d0 [ 36.383947] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.384955] kthread+0x24c/0x2d0 [ 36.385622] ret_from_fork+0x10/0x20 [ 36.386151] [ 36.386532] The buggy address belongs to the object at fff00000c594f180 [ 36.386532] which belongs to the cache kmalloc-64 of size 64 [ 36.388130] The buggy address is located 0 bytes to the right of [ 36.388130] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.389599] [ 36.389930] The buggy address belongs to the physical page: [ 36.390756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.391677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.392598] page_type: f5(slab) [ 36.393034] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.394101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.394995] page dumped because: kasan: bad access detected [ 36.395857] [ 36.396295] Memory state around the buggy address: [ 36.396874] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.397782] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.398674] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.399591] ^ [ 36.400344] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.401196] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.402205] ================================================================== [ 36.808987] ================================================================== [ 36.809691] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 36.811250] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.812681] [ 36.813291] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.815188] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.815908] Hardware name: linux,dummy-virt (DT) [ 36.816489] Call trace: [ 36.816925] show_stack+0x20/0x38 (C) [ 36.817614] dump_stack_lvl+0x8c/0xd0 [ 36.818492] print_report+0x118/0x5e0 [ 36.819233] kasan_report+0xc8/0x118 [ 36.819776] kasan_check_range+0x100/0x1a8 [ 36.820405] __kasan_check_write+0x20/0x30 [ 36.821064] kasan_atomics_helper+0x15b4/0x4858 [ 36.821890] kasan_atomics+0x198/0x2e8 [ 36.822491] kunit_try_run_case+0x14c/0x3d0 [ 36.823081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.824003] kthread+0x24c/0x2d0 [ 36.824644] ret_from_fork+0x10/0x20 [ 36.825157] [ 36.825545] Allocated by task 254: [ 36.826123] kasan_save_stack+0x3c/0x68 [ 36.826720] kasan_save_track+0x20/0x40 [ 36.827279] kasan_save_alloc_info+0x40/0x58 [ 36.827949] __kasan_kmalloc+0xd4/0xd8 [ 36.828614] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.829234] kasan_atomics+0xb8/0x2e8 [ 36.829786] kunit_try_run_case+0x14c/0x3d0 [ 36.830437] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.831131] kthread+0x24c/0x2d0 [ 36.831594] ret_from_fork+0x10/0x20 [ 36.832188] [ 36.832559] The buggy address belongs to the object at fff00000c594f180 [ 36.832559] which belongs to the cache kmalloc-64 of size 64 [ 36.833890] The buggy address is located 0 bytes to the right of [ 36.833890] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.835394] [ 36.835676] The buggy address belongs to the physical page: [ 36.836492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.837665] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.839148] page_type: f5(slab) [ 36.839615] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.840644] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.841824] page dumped because: kasan: bad access detected [ 36.842689] [ 36.843244] Memory state around the buggy address: [ 36.843882] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.844795] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.845690] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.846464] ^ [ 36.847077] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.848100] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.848991] ================================================================== [ 35.451717] ================================================================== [ 35.452492] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 35.453366] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.454355] [ 35.454707] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.456255] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.457320] Hardware name: linux,dummy-virt (DT) [ 35.457970] Call trace: [ 35.458408] show_stack+0x20/0x38 (C) [ 35.458944] dump_stack_lvl+0x8c/0xd0 [ 35.459576] print_report+0x118/0x5e0 [ 35.460475] kasan_report+0xc8/0x118 [ 35.461169] kasan_check_range+0x100/0x1a8 [ 35.461952] __kasan_check_write+0x20/0x30 [ 35.462585] kasan_atomics_helper+0x99c/0x4858 [ 35.462922] kasan_atomics+0x198/0x2e8 [ 35.463215] kunit_try_run_case+0x14c/0x3d0 [ 35.464278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.465135] kthread+0x24c/0x2d0 [ 35.465849] ret_from_fork+0x10/0x20 [ 35.466676] [ 35.467079] Allocated by task 254: [ 35.467730] kasan_save_stack+0x3c/0x68 [ 35.468410] kasan_save_track+0x20/0x40 [ 35.469096] kasan_save_alloc_info+0x40/0x58 [ 35.469899] __kasan_kmalloc+0xd4/0xd8 [ 35.470482] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.471149] kasan_atomics+0xb8/0x2e8 [ 35.471762] kunit_try_run_case+0x14c/0x3d0 [ 35.472430] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.473208] kthread+0x24c/0x2d0 [ 35.473784] ret_from_fork+0x10/0x20 [ 35.474431] [ 35.474798] The buggy address belongs to the object at fff00000c594f180 [ 35.474798] which belongs to the cache kmalloc-64 of size 64 [ 35.476376] The buggy address is located 0 bytes to the right of [ 35.476376] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.477969] [ 35.478260] The buggy address belongs to the physical page: [ 35.479165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.480251] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.481166] page_type: f5(slab) [ 35.481741] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.482854] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.483906] page dumped because: kasan: bad access detected [ 35.484712] [ 35.485234] Memory state around the buggy address: [ 35.485810] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.486876] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.487747] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.488642] ^ [ 35.489263] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.490159] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.491213] ================================================================== [ 34.821604] ================================================================== [ 34.822348] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 34.823931] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 34.825863] [ 34.826510] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.827736] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.828279] Hardware name: linux,dummy-virt (DT) [ 34.829176] Call trace: [ 34.829779] show_stack+0x20/0x38 (C) [ 34.830530] dump_stack_lvl+0x8c/0xd0 [ 34.831088] print_report+0x118/0x5e0 [ 34.831870] kasan_report+0xc8/0x118 [ 34.832411] kasan_check_range+0x100/0x1a8 [ 34.833093] __kasan_check_write+0x20/0x30 [ 34.833736] kasan_atomics_helper+0x32c/0x4858 [ 34.834489] kasan_atomics+0x198/0x2e8 [ 34.834985] kunit_try_run_case+0x14c/0x3d0 [ 34.835762] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.836605] kthread+0x24c/0x2d0 [ 34.837129] ret_from_fork+0x10/0x20 [ 34.837718] [ 34.838073] Allocated by task 254: [ 34.838570] kasan_save_stack+0x3c/0x68 [ 34.839213] kasan_save_track+0x20/0x40 [ 34.839746] kasan_save_alloc_info+0x40/0x58 [ 34.840472] __kasan_kmalloc+0xd4/0xd8 [ 34.840947] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.841675] kasan_atomics+0xb8/0x2e8 [ 34.842261] kunit_try_run_case+0x14c/0x3d0 [ 34.842877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.843575] kthread+0x24c/0x2d0 [ 34.844182] ret_from_fork+0x10/0x20 [ 34.844781] [ 34.845077] The buggy address belongs to the object at fff00000c594f180 [ 34.845077] which belongs to the cache kmalloc-64 of size 64 [ 34.846606] The buggy address is located 0 bytes to the right of [ 34.846606] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 34.847999] [ 34.848345] The buggy address belongs to the physical page: [ 34.849039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 34.849988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.850834] page_type: f5(slab) [ 34.851298] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.852547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.853421] page dumped because: kasan: bad access detected [ 34.854088] [ 34.854441] Memory state around the buggy address: [ 34.855093] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.855958] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.856863] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.857700] ^ [ 34.858295] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.859235] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.860062] ================================================================== [ 35.100157] ================================================================== [ 35.100813] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 35.101968] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.102821] [ 35.103348] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.104571] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.105279] Hardware name: linux,dummy-virt (DT) [ 35.106061] Call trace: [ 35.106476] show_stack+0x20/0x38 (C) [ 35.107048] dump_stack_lvl+0x8c/0xd0 [ 35.107626] print_report+0x118/0x5e0 [ 35.108227] kasan_report+0xc8/0x118 [ 35.109097] kasan_check_range+0x100/0x1a8 [ 35.109703] __kasan_check_write+0x20/0x30 [ 35.110410] kasan_atomics_helper+0x5b4/0x4858 [ 35.111013] kasan_atomics+0x198/0x2e8 [ 35.111705] kunit_try_run_case+0x14c/0x3d0 [ 35.112368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.113042] kthread+0x24c/0x2d0 [ 35.113700] ret_from_fork+0x10/0x20 [ 35.114288] [ 35.114712] Allocated by task 254: [ 35.115259] kasan_save_stack+0x3c/0x68 [ 35.115843] kasan_save_track+0x20/0x40 [ 35.116387] kasan_save_alloc_info+0x40/0x58 [ 35.117018] __kasan_kmalloc+0xd4/0xd8 [ 35.117621] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.118177] kasan_atomics+0xb8/0x2e8 [ 35.118826] kunit_try_run_case+0x14c/0x3d0 [ 35.119462] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.120196] kthread+0x24c/0x2d0 [ 35.120805] ret_from_fork+0x10/0x20 [ 35.121367] [ 35.121656] The buggy address belongs to the object at fff00000c594f180 [ 35.121656] which belongs to the cache kmalloc-64 of size 64 [ 35.123135] The buggy address is located 0 bytes to the right of [ 35.123135] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.124486] [ 35.124791] The buggy address belongs to the physical page: [ 35.125628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.126540] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.127485] page_type: f5(slab) [ 35.127956] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.128995] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.129912] page dumped because: kasan: bad access detected [ 35.130668] [ 35.131007] Memory state around the buggy address: [ 35.131635] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.132462] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.133369] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.134211] ^ [ 35.134899] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.135803] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.136733] ================================================================== [ 36.607937] ================================================================== [ 36.608849] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 36.609780] Read of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.610776] [ 36.611178] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.612103] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.612515] Hardware name: linux,dummy-virt (DT) [ 36.612940] Call trace: [ 36.613233] show_stack+0x20/0x38 (C) [ 36.613689] dump_stack_lvl+0x8c/0xd0 [ 36.614620] print_report+0x118/0x5e0 [ 36.615494] kasan_report+0xc8/0x118 [ 36.616154] __asan_report_load8_noabort+0x20/0x30 [ 36.616920] kasan_atomics_helper+0x3f04/0x4858 [ 36.617397] kasan_atomics+0x198/0x2e8 [ 36.617798] kunit_try_run_case+0x14c/0x3d0 [ 36.619395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.620568] kthread+0x24c/0x2d0 [ 36.620974] ret_from_fork+0x10/0x20 [ 36.621940] [ 36.622966] Allocated by task 254: [ 36.623971] kasan_save_stack+0x3c/0x68 [ 36.624560] kasan_save_track+0x20/0x40 [ 36.625030] kasan_save_alloc_info+0x40/0x58 [ 36.625970] __kasan_kmalloc+0xd4/0xd8 [ 36.626611] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.627070] kasan_atomics+0xb8/0x2e8 [ 36.628165] kunit_try_run_case+0x14c/0x3d0 [ 36.629306] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.630030] kthread+0x24c/0x2d0 [ 36.630485] ret_from_fork+0x10/0x20 [ 36.630973] [ 36.631377] The buggy address belongs to the object at fff00000c594f180 [ 36.631377] which belongs to the cache kmalloc-64 of size 64 [ 36.632980] The buggy address is located 0 bytes to the right of [ 36.632980] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.634105] [ 36.634722] The buggy address belongs to the physical page: [ 36.635213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.637076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.639172] page_type: f5(slab) [ 36.640017] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.641506] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.642395] page dumped because: kasan: bad access detected [ 36.643033] [ 36.643442] Memory state around the buggy address: [ 36.644152] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.644955] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.645905] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.646789] ^ [ 36.647563] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.648381] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.649367] ================================================================== [ 35.650612] ================================================================== [ 35.651520] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 35.652438] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.653298] [ 35.653715] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.655140] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.655652] Hardware name: linux,dummy-virt (DT) [ 35.656502] Call trace: [ 35.656940] show_stack+0x20/0x38 (C) [ 35.657640] dump_stack_lvl+0x8c/0xd0 [ 35.658226] print_report+0x118/0x5e0 [ 35.658919] kasan_report+0xc8/0x118 [ 35.659536] kasan_check_range+0x100/0x1a8 [ 35.660187] __kasan_check_write+0x20/0x30 [ 35.660817] kasan_atomics_helper+0xb70/0x4858 [ 35.661374] kasan_atomics+0x198/0x2e8 [ 35.662037] kunit_try_run_case+0x14c/0x3d0 [ 35.662649] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.663517] kthread+0x24c/0x2d0 [ 35.664083] ret_from_fork+0x10/0x20 [ 35.664616] [ 35.664993] Allocated by task 254: [ 35.665571] kasan_save_stack+0x3c/0x68 [ 35.666061] kasan_save_track+0x20/0x40 [ 35.666833] kasan_save_alloc_info+0x40/0x58 [ 35.667342] __kasan_kmalloc+0xd4/0xd8 [ 35.668079] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.668704] kasan_atomics+0xb8/0x2e8 [ 35.669220] kunit_try_run_case+0x14c/0x3d0 [ 35.670013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.670630] kthread+0x24c/0x2d0 [ 35.671253] ret_from_fork+0x10/0x20 [ 35.671858] [ 35.672238] The buggy address belongs to the object at fff00000c594f180 [ 35.672238] which belongs to the cache kmalloc-64 of size 64 [ 35.673685] The buggy address is located 0 bytes to the right of [ 35.673685] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.675087] [ 35.675449] The buggy address belongs to the physical page: [ 35.676084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.677097] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.677965] page_type: f5(slab) [ 35.678464] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.679465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.680377] page dumped because: kasan: bad access detected [ 35.681042] [ 35.681379] Memory state around the buggy address: [ 35.682004] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.682904] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.683778] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.684707] ^ [ 35.685353] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.686237] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.687128] ================================================================== [ 35.964775] ================================================================== [ 35.965677] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 35.966267] Read of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.967196] [ 35.967525] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.968997] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.969659] Hardware name: linux,dummy-virt (DT) [ 35.970267] Call trace: [ 35.970700] show_stack+0x20/0x38 (C) [ 35.971316] dump_stack_lvl+0x8c/0xd0 [ 35.971837] print_report+0x118/0x5e0 [ 35.972508] kasan_report+0xc8/0x118 [ 35.973115] kasan_check_range+0x100/0x1a8 [ 35.973738] __kasan_check_read+0x20/0x30 [ 35.974297] kasan_atomics_helper+0xdd4/0x4858 [ 35.975020] kasan_atomics+0x198/0x2e8 [ 35.975594] kunit_try_run_case+0x14c/0x3d0 [ 35.976218] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.976982] kthread+0x24c/0x2d0 [ 35.977649] ret_from_fork+0x10/0x20 [ 35.978232] [ 35.978615] Allocated by task 254: [ 35.979152] kasan_save_stack+0x3c/0x68 [ 35.979898] kasan_save_track+0x20/0x40 [ 35.980494] kasan_save_alloc_info+0x40/0x58 [ 35.981237] __kasan_kmalloc+0xd4/0xd8 [ 35.981822] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.982565] kasan_atomics+0xb8/0x2e8 [ 35.983069] kunit_try_run_case+0x14c/0x3d0 [ 35.983779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.984492] kthread+0x24c/0x2d0 [ 35.985110] ret_from_fork+0x10/0x20 [ 35.985629] [ 35.986097] The buggy address belongs to the object at fff00000c594f180 [ 35.986097] which belongs to the cache kmalloc-64 of size 64 [ 35.987566] The buggy address is located 0 bytes to the right of [ 35.987566] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.988952] [ 35.989238] The buggy address belongs to the physical page: [ 35.990073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.990991] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.991839] page_type: f5(slab) [ 35.992410] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.993376] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.994289] page dumped because: kasan: bad access detected [ 35.995000] [ 35.995312] Memory state around the buggy address: [ 35.996006] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.996836] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.997774] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.998647] ^ [ 35.999278] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.000236] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.001188] ================================================================== [ 36.159798] ================================================================== [ 36.160553] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 36.161467] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.162253] [ 36.162702] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.163966] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.164686] Hardware name: linux,dummy-virt (DT) [ 36.165353] Call trace: [ 36.165736] show_stack+0x20/0x38 (C) [ 36.166473] dump_stack_lvl+0x8c/0xd0 [ 36.167147] print_report+0x118/0x5e0 [ 36.167832] kasan_report+0xc8/0x118 [ 36.168469] kasan_check_range+0x100/0x1a8 [ 36.169006] __kasan_check_write+0x20/0x30 [ 36.169745] kasan_atomics_helper+0xf20/0x4858 [ 36.170490] kasan_atomics+0x198/0x2e8 [ 36.170972] kunit_try_run_case+0x14c/0x3d0 [ 36.171713] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.172410] kthread+0x24c/0x2d0 [ 36.173119] ret_from_fork+0x10/0x20 [ 36.173675] [ 36.174039] Allocated by task 254: [ 36.174556] kasan_save_stack+0x3c/0x68 [ 36.175187] kasan_save_track+0x20/0x40 [ 36.175772] kasan_save_alloc_info+0x40/0x58 [ 36.176417] __kasan_kmalloc+0xd4/0xd8 [ 36.176967] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.177632] kasan_atomics+0xb8/0x2e8 [ 36.178184] kunit_try_run_case+0x14c/0x3d0 [ 36.178813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.179661] kthread+0x24c/0x2d0 [ 36.180154] ret_from_fork+0x10/0x20 [ 36.180742] [ 36.181022] The buggy address belongs to the object at fff00000c594f180 [ 36.181022] which belongs to the cache kmalloc-64 of size 64 [ 36.182509] The buggy address is located 0 bytes to the right of [ 36.182509] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.183866] [ 36.184209] The buggy address belongs to the physical page: [ 36.185033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.185985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.186907] page_type: f5(slab) [ 36.187418] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.188304] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.189393] page dumped because: kasan: bad access detected [ 36.190117] [ 36.190620] Memory state around the buggy address: [ 36.191286] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.192158] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.193075] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.193913] ^ [ 36.194614] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.195451] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.196407] ================================================================== [ 36.524707] ================================================================== [ 36.526394] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 36.527528] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.528894] [ 36.529385] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.530702] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.531271] Hardware name: linux,dummy-virt (DT) [ 36.531937] Call trace: [ 36.532433] show_stack+0x20/0x38 (C) [ 36.532995] dump_stack_lvl+0x8c/0xd0 [ 36.533757] print_report+0x118/0x5e0 [ 36.534454] kasan_report+0xc8/0x118 [ 36.535067] kasan_check_range+0x100/0x1a8 [ 36.535836] __kasan_check_write+0x20/0x30 [ 36.536443] kasan_atomics_helper+0x12d8/0x4858 [ 36.537262] kasan_atomics+0x198/0x2e8 [ 36.537968] kunit_try_run_case+0x14c/0x3d0 [ 36.538725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.539590] kthread+0x24c/0x2d0 [ 36.540238] ret_from_fork+0x10/0x20 [ 36.541018] [ 36.541362] Allocated by task 254: [ 36.541975] kasan_save_stack+0x3c/0x68 [ 36.542507] kasan_save_track+0x20/0x40 [ 36.543046] kasan_save_alloc_info+0x40/0x58 [ 36.543681] __kasan_kmalloc+0xd4/0xd8 [ 36.544143] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.544866] kasan_atomics+0xb8/0x2e8 [ 36.545433] kunit_try_run_case+0x14c/0x3d0 [ 36.546203] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.547219] kthread+0x24c/0x2d0 [ 36.547944] ret_from_fork+0x10/0x20 [ 36.548358] [ 36.548761] The buggy address belongs to the object at fff00000c594f180 [ 36.548761] which belongs to the cache kmalloc-64 of size 64 [ 36.550204] The buggy address is located 0 bytes to the right of [ 36.550204] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.551677] [ 36.551968] The buggy address belongs to the physical page: [ 36.552764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.553688] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.554472] page_type: f5(slab) [ 36.555032] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.556015] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.556980] page dumped because: kasan: bad access detected [ 36.557659] [ 36.558107] Memory state around the buggy address: [ 36.558848] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.559962] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.560982] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.561700] ^ [ 36.562035] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.562601] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.563696] ================================================================== [ 36.976557] ================================================================== [ 36.977433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 36.978273] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.979567] [ 36.980143] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.981594] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.982257] Hardware name: linux,dummy-virt (DT) [ 36.983062] Call trace: [ 36.983637] show_stack+0x20/0x38 (C) [ 36.984405] dump_stack_lvl+0x8c/0xd0 [ 36.985171] print_report+0x118/0x5e0 [ 36.985774] kasan_report+0xc8/0x118 [ 36.986525] kasan_check_range+0x100/0x1a8 [ 36.987207] __kasan_check_write+0x20/0x30 [ 36.987915] kasan_atomics_helper+0x16d0/0x4858 [ 36.988654] kasan_atomics+0x198/0x2e8 [ 36.989320] kunit_try_run_case+0x14c/0x3d0 [ 36.990047] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.990859] kthread+0x24c/0x2d0 [ 36.991489] ret_from_fork+0x10/0x20 [ 36.992122] [ 36.992460] Allocated by task 254: [ 36.993117] kasan_save_stack+0x3c/0x68 [ 36.993791] kasan_save_track+0x20/0x40 [ 36.994496] kasan_save_alloc_info+0x40/0x58 [ 36.995116] __kasan_kmalloc+0xd4/0xd8 [ 36.995900] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.996647] kasan_atomics+0xb8/0x2e8 [ 36.997247] kunit_try_run_case+0x14c/0x3d0 [ 36.997944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.998759] kthread+0x24c/0x2d0 [ 36.999372] ret_from_fork+0x10/0x20 [ 37.000029] [ 37.000385] The buggy address belongs to the object at fff00000c594f180 [ 37.000385] which belongs to the cache kmalloc-64 of size 64 [ 37.001920] The buggy address is located 0 bytes to the right of [ 37.001920] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 37.003402] [ 37.003932] The buggy address belongs to the physical page: [ 37.004713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 37.005763] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.006679] page_type: f5(slab) [ 37.007256] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.008273] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.009264] page dumped because: kasan: bad access detected [ 37.010045] [ 37.010560] Memory state around the buggy address: [ 37.011223] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.012192] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.013118] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.014052] ^ [ 37.014784] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.015753] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.016646] ================================================================== [ 35.294405] ================================================================== [ 35.295381] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 35.296419] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.297657] [ 35.298135] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.299556] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.300213] Hardware name: linux,dummy-virt (DT) [ 35.300845] Call trace: [ 35.301269] show_stack+0x20/0x38 (C) [ 35.301886] dump_stack_lvl+0x8c/0xd0 [ 35.302388] print_report+0x118/0x5e0 [ 35.303036] kasan_report+0xc8/0x118 [ 35.303553] kasan_check_range+0x100/0x1a8 [ 35.304266] __kasan_check_write+0x20/0x30 [ 35.304981] kasan_atomics_helper+0x7cc/0x4858 [ 35.305745] kasan_atomics+0x198/0x2e8 [ 35.306497] kunit_try_run_case+0x14c/0x3d0 [ 35.307109] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.307818] kthread+0x24c/0x2d0 [ 35.308563] ret_from_fork+0x10/0x20 [ 35.308977] [ 35.309431] Allocated by task 254: [ 35.309988] kasan_save_stack+0x3c/0x68 [ 35.310565] kasan_save_track+0x20/0x40 [ 35.311184] kasan_save_alloc_info+0x40/0x58 [ 35.311883] __kasan_kmalloc+0xd4/0xd8 [ 35.312552] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.313227] kasan_atomics+0xb8/0x2e8 [ 35.313775] kunit_try_run_case+0x14c/0x3d0 [ 35.314431] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.315099] kthread+0x24c/0x2d0 [ 35.315633] ret_from_fork+0x10/0x20 [ 35.316176] [ 35.316557] The buggy address belongs to the object at fff00000c594f180 [ 35.316557] which belongs to the cache kmalloc-64 of size 64 [ 35.318006] The buggy address is located 0 bytes to the right of [ 35.318006] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.319438] [ 35.319739] The buggy address belongs to the physical page: [ 35.320452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.321457] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.322349] page_type: f5(slab) [ 35.322928] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.323829] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.324830] page dumped because: kasan: bad access detected [ 35.325514] [ 35.325846] Memory state around the buggy address: [ 35.326481] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.327360] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.328272] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.329142] ^ [ 35.329901] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.330773] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.331670] ================================================================== [ 36.199843] ================================================================== [ 36.200729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 36.201483] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.202295] [ 36.202796] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.204253] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.204810] Hardware name: linux,dummy-virt (DT) [ 36.205417] Call trace: [ 36.205849] show_stack+0x20/0x38 (C) [ 36.207115] dump_stack_lvl+0x8c/0xd0 [ 36.207649] print_report+0x118/0x5e0 [ 36.208196] kasan_report+0xc8/0x118 [ 36.208713] kasan_check_range+0x100/0x1a8 [ 36.209397] __kasan_check_write+0x20/0x30 [ 36.210107] kasan_atomics_helper+0xf88/0x4858 [ 36.210839] kasan_atomics+0x198/0x2e8 [ 36.211439] kunit_try_run_case+0x14c/0x3d0 [ 36.212044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.212814] kthread+0x24c/0x2d0 [ 36.213377] ret_from_fork+0x10/0x20 [ 36.213991] [ 36.214322] Allocated by task 254: [ 36.214815] kasan_save_stack+0x3c/0x68 [ 36.215588] kasan_save_track+0x20/0x40 [ 36.216108] kasan_save_alloc_info+0x40/0x58 [ 36.216815] __kasan_kmalloc+0xd4/0xd8 [ 36.217390] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.218138] kasan_atomics+0xb8/0x2e8 [ 36.218729] kunit_try_run_case+0x14c/0x3d0 [ 36.219431] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.220127] kthread+0x24c/0x2d0 [ 36.220582] ret_from_fork+0x10/0x20 [ 36.221155] [ 36.221474] The buggy address belongs to the object at fff00000c594f180 [ 36.221474] which belongs to the cache kmalloc-64 of size 64 [ 36.222913] The buggy address is located 0 bytes to the right of [ 36.222913] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.224470] [ 36.224801] The buggy address belongs to the physical page: [ 36.225505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.226468] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.227273] page_type: f5(slab) [ 36.227887] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.228849] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.229851] page dumped because: kasan: bad access detected [ 36.230677] [ 36.230984] Memory state around the buggy address: [ 36.231541] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.232209] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.233149] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.234261] ^ [ 36.234881] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.235836] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.236709] ================================================================== [ 36.002739] ================================================================== [ 36.004253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 36.005413] Read of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.006356] [ 36.006835] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.008204] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.008737] Hardware name: linux,dummy-virt (DT) [ 36.009520] Call trace: [ 36.010072] show_stack+0x20/0x38 (C) [ 36.010819] dump_stack_lvl+0x8c/0xd0 [ 36.011428] print_report+0x118/0x5e0 [ 36.012064] kasan_report+0xc8/0x118 [ 36.012889] __asan_report_load8_noabort+0x20/0x30 [ 36.013705] kasan_atomics_helper+0x3f58/0x4858 [ 36.014358] kasan_atomics+0x198/0x2e8 [ 36.014919] kunit_try_run_case+0x14c/0x3d0 [ 36.015653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.016502] kthread+0x24c/0x2d0 [ 36.017184] ret_from_fork+0x10/0x20 [ 36.017825] [ 36.018200] Allocated by task 254: [ 36.018763] kasan_save_stack+0x3c/0x68 [ 36.019483] kasan_save_track+0x20/0x40 [ 36.020170] kasan_save_alloc_info+0x40/0x58 [ 36.020988] __kasan_kmalloc+0xd4/0xd8 [ 36.021552] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.022311] kasan_atomics+0xb8/0x2e8 [ 36.022889] kunit_try_run_case+0x14c/0x3d0 [ 36.023512] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.024189] kthread+0x24c/0x2d0 [ 36.024840] ret_from_fork+0x10/0x20 [ 36.025411] [ 36.025800] The buggy address belongs to the object at fff00000c594f180 [ 36.025800] which belongs to the cache kmalloc-64 of size 64 [ 36.027209] The buggy address is located 0 bytes to the right of [ 36.027209] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.028657] [ 36.028998] The buggy address belongs to the physical page: [ 36.029719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.030804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.031652] page_type: f5(slab) [ 36.032242] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.033196] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.034172] page dumped because: kasan: bad access detected [ 36.034859] [ 36.035209] Memory state around the buggy address: [ 36.035949] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.036757] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.037783] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.038783] ^ [ 36.039448] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.040321] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.041290] ================================================================== [ 36.689530] ================================================================== [ 36.690263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 36.692243] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.693194] [ 36.693948] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.695143] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.695725] Hardware name: linux,dummy-virt (DT) [ 36.696298] Call trace: [ 36.696794] show_stack+0x20/0x38 (C) [ 36.697396] dump_stack_lvl+0x8c/0xd0 [ 36.698107] print_report+0x118/0x5e0 [ 36.698618] kasan_report+0xc8/0x118 [ 36.699294] kasan_check_range+0x100/0x1a8 [ 36.699933] __kasan_check_write+0x20/0x30 [ 36.700576] kasan_atomics_helper+0x147c/0x4858 [ 36.701228] kasan_atomics+0x198/0x2e8 [ 36.701943] kunit_try_run_case+0x14c/0x3d0 [ 36.702558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.703359] kthread+0x24c/0x2d0 [ 36.703943] ret_from_fork+0x10/0x20 [ 36.704527] [ 36.704897] Allocated by task 254: [ 36.705432] kasan_save_stack+0x3c/0x68 [ 36.706055] kasan_save_track+0x20/0x40 [ 36.706646] kasan_save_alloc_info+0x40/0x58 [ 36.707254] __kasan_kmalloc+0xd4/0xd8 [ 36.707946] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.708499] kasan_atomics+0xb8/0x2e8 [ 36.709124] kunit_try_run_case+0x14c/0x3d0 [ 36.709707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.710555] kthread+0x24c/0x2d0 [ 36.711071] ret_from_fork+0x10/0x20 [ 36.711669] [ 36.712011] The buggy address belongs to the object at fff00000c594f180 [ 36.712011] which belongs to the cache kmalloc-64 of size 64 [ 36.713923] The buggy address is located 0 bytes to the right of [ 36.713923] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.715344] [ 36.715877] The buggy address belongs to the physical page: [ 36.716727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.717870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.718858] page_type: f5(slab) [ 36.719551] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.720679] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.721764] page dumped because: kasan: bad access detected [ 36.722629] [ 36.723101] Memory state around the buggy address: [ 36.723709] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.724778] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.725912] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.726726] ^ [ 36.727309] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.727987] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.729022] ================================================================== [ 35.926459] ================================================================== [ 35.927286] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 35.928179] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.929027] [ 35.929412] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.930595] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.931125] Hardware name: linux,dummy-virt (DT) [ 35.931711] Call trace: [ 35.932215] show_stack+0x20/0x38 (C) [ 35.932872] dump_stack_lvl+0x8c/0xd0 [ 35.933456] print_report+0x118/0x5e0 [ 35.934037] kasan_report+0xc8/0x118 [ 35.934637] __asan_report_load4_noabort+0x20/0x30 [ 35.935360] kasan_atomics_helper+0x3e04/0x4858 [ 35.935954] kasan_atomics+0x198/0x2e8 [ 35.936630] kunit_try_run_case+0x14c/0x3d0 [ 35.937343] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.938050] kthread+0x24c/0x2d0 [ 35.938701] ret_from_fork+0x10/0x20 [ 35.939224] [ 35.939603] Allocated by task 254: [ 35.940085] kasan_save_stack+0x3c/0x68 [ 35.940768] kasan_save_track+0x20/0x40 [ 35.941318] kasan_save_alloc_info+0x40/0x58 [ 35.942130] __kasan_kmalloc+0xd4/0xd8 [ 35.942694] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.943374] kasan_atomics+0xb8/0x2e8 [ 35.943906] kunit_try_run_case+0x14c/0x3d0 [ 35.944489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.945340] kthread+0x24c/0x2d0 [ 35.945858] ret_from_fork+0x10/0x20 [ 35.946511] [ 35.946920] The buggy address belongs to the object at fff00000c594f180 [ 35.946920] which belongs to the cache kmalloc-64 of size 64 [ 35.948245] The buggy address is located 0 bytes to the right of [ 35.948245] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.949664] [ 35.950045] The buggy address belongs to the physical page: [ 35.950778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.951772] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.952599] page_type: f5(slab) [ 35.953212] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.954185] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.955101] page dumped because: kasan: bad access detected [ 35.955743] [ 35.956055] Memory state around the buggy address: [ 35.956691] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.957614] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.958479] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.959310] ^ [ 35.959958] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.960864] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.961734] ================================================================== [ 34.945024] ================================================================== [ 34.945962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 34.946733] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 34.947706] [ 34.948166] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.949275] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.950070] Hardware name: linux,dummy-virt (DT) [ 34.950691] Call trace: [ 34.951027] show_stack+0x20/0x38 (C) [ 34.951708] dump_stack_lvl+0x8c/0xd0 [ 34.952393] print_report+0x118/0x5e0 [ 34.952951] kasan_report+0xc8/0x118 [ 34.953553] kasan_check_range+0x100/0x1a8 [ 34.954187] __kasan_check_write+0x20/0x30 [ 34.954912] kasan_atomics_helper+0x414/0x4858 [ 34.955458] kasan_atomics+0x198/0x2e8 [ 34.956154] kunit_try_run_case+0x14c/0x3d0 [ 34.956746] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.957528] kthread+0x24c/0x2d0 [ 34.958136] ret_from_fork+0x10/0x20 [ 34.958710] [ 34.959049] Allocated by task 254: [ 34.959519] kasan_save_stack+0x3c/0x68 [ 34.960131] kasan_save_track+0x20/0x40 [ 34.960805] kasan_save_alloc_info+0x40/0x58 [ 34.961407] __kasan_kmalloc+0xd4/0xd8 [ 34.962008] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.962635] kasan_atomics+0xb8/0x2e8 [ 34.963105] kunit_try_run_case+0x14c/0x3d0 [ 34.963809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.964455] kthread+0x24c/0x2d0 [ 34.965085] ret_from_fork+0x10/0x20 [ 34.965680] [ 34.965996] The buggy address belongs to the object at fff00000c594f180 [ 34.965996] which belongs to the cache kmalloc-64 of size 64 [ 34.967458] The buggy address is located 0 bytes to the right of [ 34.967458] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 34.968861] [ 34.969205] The buggy address belongs to the physical page: [ 34.970062] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 34.971009] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.971868] page_type: f5(slab) [ 34.972346] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.973197] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.974191] page dumped because: kasan: bad access detected [ 34.974808] [ 34.975146] Memory state around the buggy address: [ 34.975850] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.976675] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.977504] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.978410] ^ [ 34.979029] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.979962] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.980789] ================================================================== [ 35.334052] ================================================================== [ 35.334765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 35.336267] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.337808] [ 35.338123] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.339856] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.340562] Hardware name: linux,dummy-virt (DT) [ 35.341317] Call trace: [ 35.341746] show_stack+0x20/0x38 (C) [ 35.342485] dump_stack_lvl+0x8c/0xd0 [ 35.343099] print_report+0x118/0x5e0 [ 35.343581] kasan_report+0xc8/0x118 [ 35.344419] kasan_check_range+0x100/0x1a8 [ 35.345241] __kasan_check_write+0x20/0x30 [ 35.345872] kasan_atomics_helper+0x894/0x4858 [ 35.346505] kasan_atomics+0x198/0x2e8 [ 35.347097] kunit_try_run_case+0x14c/0x3d0 [ 35.347745] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.348441] kthread+0x24c/0x2d0 [ 35.349023] ret_from_fork+0x10/0x20 [ 35.349668] [ 35.350056] Allocated by task 254: [ 35.350641] kasan_save_stack+0x3c/0x68 [ 35.351152] kasan_save_track+0x20/0x40 [ 35.351870] kasan_save_alloc_info+0x40/0x58 [ 35.352535] __kasan_kmalloc+0xd4/0xd8 [ 35.353276] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.353892] kasan_atomics+0xb8/0x2e8 [ 35.354620] kunit_try_run_case+0x14c/0x3d0 [ 35.355154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.355995] kthread+0x24c/0x2d0 [ 35.356528] ret_from_fork+0x10/0x20 [ 35.357103] [ 35.357496] The buggy address belongs to the object at fff00000c594f180 [ 35.357496] which belongs to the cache kmalloc-64 of size 64 [ 35.358842] The buggy address is located 0 bytes to the right of [ 35.358842] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.360296] [ 35.360719] The buggy address belongs to the physical page: [ 35.361462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.362480] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.363295] page_type: f5(slab) [ 35.363942] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.364959] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.365863] page dumped because: kasan: bad access detected [ 35.366599] [ 35.366984] Memory state around the buggy address: [ 35.367744] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.368610] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.369480] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.370355] ^ [ 35.370938] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.371864] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.372794] ================================================================== [ 35.492815] ================================================================== [ 35.493821] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 35.494864] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.497020] [ 35.497553] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.498972] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.499646] Hardware name: linux,dummy-virt (DT) [ 35.500464] Call trace: [ 35.501065] show_stack+0x20/0x38 (C) [ 35.501869] dump_stack_lvl+0x8c/0xd0 [ 35.502531] print_report+0x118/0x5e0 [ 35.503043] kasan_report+0xc8/0x118 [ 35.503689] kasan_check_range+0x100/0x1a8 [ 35.504192] __kasan_check_write+0x20/0x30 [ 35.504903] kasan_atomics_helper+0xa04/0x4858 [ 35.505648] kasan_atomics+0x198/0x2e8 [ 35.506259] kunit_try_run_case+0x14c/0x3d0 [ 35.506847] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.507698] kthread+0x24c/0x2d0 [ 35.508211] ret_from_fork+0x10/0x20 [ 35.508837] [ 35.509167] Allocated by task 254: [ 35.509734] kasan_save_stack+0x3c/0x68 [ 35.510230] kasan_save_track+0x20/0x40 [ 35.510883] kasan_save_alloc_info+0x40/0x58 [ 35.511612] __kasan_kmalloc+0xd4/0xd8 [ 35.512136] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.512923] kasan_atomics+0xb8/0x2e8 [ 35.513496] kunit_try_run_case+0x14c/0x3d0 [ 35.514073] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.514867] kthread+0x24c/0x2d0 [ 35.515402] ret_from_fork+0x10/0x20 [ 35.515936] [ 35.516405] The buggy address belongs to the object at fff00000c594f180 [ 35.516405] which belongs to the cache kmalloc-64 of size 64 [ 35.517792] The buggy address is located 0 bytes to the right of [ 35.517792] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.519084] [ 35.519572] The buggy address belongs to the physical page: [ 35.520164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.521230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.522152] page_type: f5(slab) [ 35.522650] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.523653] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.524598] page dumped because: kasan: bad access detected [ 35.525279] [ 35.525622] Memory state around the buggy address: [ 35.526366] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.527129] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.528051] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.529000] ^ [ 35.529674] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.530528] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.531433] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 34.488423] ================================================================== [ 34.489444] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 34.490629] Read of size 8 at addr fff00000c5732788 by task kunit_try_catch/250 [ 34.491744] [ 34.492491] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.493885] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.494482] Hardware name: linux,dummy-virt (DT) [ 34.495134] Call trace: [ 34.495575] show_stack+0x20/0x38 (C) [ 34.496140] dump_stack_lvl+0x8c/0xd0 [ 34.496728] print_report+0x118/0x5e0 [ 34.497255] kasan_report+0xc8/0x118 [ 34.497786] __asan_report_load8_noabort+0x20/0x30 [ 34.498723] kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 34.499584] kasan_bitops_generic+0x11c/0x1c8 [ 34.500356] kunit_try_run_case+0x14c/0x3d0 [ 34.501169] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.501913] kthread+0x24c/0x2d0 [ 34.502448] ret_from_fork+0x10/0x20 [ 34.502969] [ 34.503300] Allocated by task 250: [ 34.504088] kasan_save_stack+0x3c/0x68 [ 34.504738] kasan_save_track+0x20/0x40 [ 34.505394] kasan_save_alloc_info+0x40/0x58 [ 34.506037] __kasan_kmalloc+0xd4/0xd8 [ 34.506623] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.507297] kasan_bitops_generic+0xa0/0x1c8 [ 34.507888] kunit_try_run_case+0x14c/0x3d0 [ 34.508566] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.509223] kthread+0x24c/0x2d0 [ 34.509824] ret_from_fork+0x10/0x20 [ 34.510469] [ 34.510816] The buggy address belongs to the object at fff00000c5732780 [ 34.510816] which belongs to the cache kmalloc-16 of size 16 [ 34.512160] The buggy address is located 8 bytes inside of [ 34.512160] allocated 9-byte region [fff00000c5732780, fff00000c5732789) [ 34.513506] [ 34.513943] The buggy address belongs to the physical page: [ 34.514649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 34.515604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.516464] page_type: f5(slab) [ 34.516944] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.517964] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.518836] page dumped because: kasan: bad access detected [ 34.519552] [ 34.519868] Memory state around the buggy address: [ 34.520525] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.521371] fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 34.522243] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.523171] ^ [ 34.523720] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.524754] fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.525754] ================================================================== [ 34.449859] ================================================================== [ 34.450733] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 34.451855] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250 [ 34.452866] [ 34.453197] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.454440] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.455073] Hardware name: linux,dummy-virt (DT) [ 34.455624] Call trace: [ 34.456085] show_stack+0x20/0x38 (C) [ 34.456686] dump_stack_lvl+0x8c/0xd0 [ 34.457377] print_report+0x118/0x5e0 [ 34.457901] kasan_report+0xc8/0x118 [ 34.458605] kasan_check_range+0x100/0x1a8 [ 34.459226] __kasan_check_write+0x20/0x30 [ 34.459937] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 34.460853] kasan_bitops_generic+0x11c/0x1c8 [ 34.461557] kunit_try_run_case+0x14c/0x3d0 [ 34.462234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.463008] kthread+0x24c/0x2d0 [ 34.463642] ret_from_fork+0x10/0x20 [ 34.464238] [ 34.464627] Allocated by task 250: [ 34.465121] kasan_save_stack+0x3c/0x68 [ 34.465655] kasan_save_track+0x20/0x40 [ 34.466288] kasan_save_alloc_info+0x40/0x58 [ 34.466998] __kasan_kmalloc+0xd4/0xd8 [ 34.467599] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.468271] kasan_bitops_generic+0xa0/0x1c8 [ 34.468878] kunit_try_run_case+0x14c/0x3d0 [ 34.469589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.470294] kthread+0x24c/0x2d0 [ 34.470808] ret_from_fork+0x10/0x20 [ 34.471347] [ 34.471808] The buggy address belongs to the object at fff00000c5732780 [ 34.471808] which belongs to the cache kmalloc-16 of size 16 [ 34.473227] The buggy address is located 8 bytes inside of [ 34.473227] allocated 9-byte region [fff00000c5732780, fff00000c5732789) [ 34.474573] [ 34.474904] The buggy address belongs to the physical page: [ 34.475601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 34.476569] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.477395] page_type: f5(slab) [ 34.477978] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.478877] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.479828] page dumped because: kasan: bad access detected [ 34.480597] [ 34.480925] Memory state around the buggy address: [ 34.481527] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.482566] fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 34.483442] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.484282] ^ [ 34.484917] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.485875] fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.486738] ================================================================== [ 34.527835] ================================================================== [ 34.529003] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 34.530670] Read of size 8 at addr fff00000c5732788 by task kunit_try_catch/250 [ 34.531572] [ 34.531987] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.533968] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.534261] Hardware name: linux,dummy-virt (DT) [ 34.534769] Call trace: [ 34.535289] show_stack+0x20/0x38 (C) [ 34.535914] dump_stack_lvl+0x8c/0xd0 [ 34.536631] print_report+0x118/0x5e0 [ 34.537410] kasan_report+0xc8/0x118 [ 34.538008] __asan_report_load8_noabort+0x20/0x30 [ 34.538820] kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 34.539702] kasan_bitops_generic+0x11c/0x1c8 [ 34.540463] kunit_try_run_case+0x14c/0x3d0 [ 34.541182] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.542221] kthread+0x24c/0x2d0 [ 34.542817] ret_from_fork+0x10/0x20 [ 34.543526] [ 34.543829] Allocated by task 250: [ 34.544488] kasan_save_stack+0x3c/0x68 [ 34.544967] kasan_save_track+0x20/0x40 [ 34.545601] kasan_save_alloc_info+0x40/0x58 [ 34.546289] __kasan_kmalloc+0xd4/0xd8 [ 34.546767] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.547667] kasan_bitops_generic+0xa0/0x1c8 [ 34.548473] kunit_try_run_case+0x14c/0x3d0 [ 34.549076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.549796] kthread+0x24c/0x2d0 [ 34.550417] ret_from_fork+0x10/0x20 [ 34.551033] [ 34.551450] The buggy address belongs to the object at fff00000c5732780 [ 34.551450] which belongs to the cache kmalloc-16 of size 16 [ 34.552778] The buggy address is located 8 bytes inside of [ 34.552778] allocated 9-byte region [fff00000c5732780, fff00000c5732789) [ 34.554105] [ 34.554491] The buggy address belongs to the physical page: [ 34.555303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 34.556279] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.557129] page_type: f5(slab) [ 34.557613] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.558578] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.559552] page dumped because: kasan: bad access detected [ 34.560243] [ 34.560563] Memory state around the buggy address: [ 34.561173] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.562070] fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 34.562977] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.563801] ^ [ 34.564376] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.565144] fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.566004] ================================================================== [ 34.253865] ================================================================== [ 34.254716] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 34.256158] Read of size 8 at addr fff00000c5732788 by task kunit_try_catch/250 [ 34.256974] [ 34.257404] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.258662] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.259190] Hardware name: linux,dummy-virt (DT) [ 34.259958] Call trace: [ 34.260374] show_stack+0x20/0x38 (C) [ 34.260908] dump_stack_lvl+0x8c/0xd0 [ 34.261531] print_report+0x118/0x5e0 [ 34.262212] kasan_report+0xc8/0x118 [ 34.262880] __asan_report_load8_noabort+0x20/0x30 [ 34.263616] kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 34.264354] kasan_bitops_generic+0x11c/0x1c8 [ 34.264975] kunit_try_run_case+0x14c/0x3d0 [ 34.265670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.266515] kthread+0x24c/0x2d0 [ 34.267111] ret_from_fork+0x10/0x20 [ 34.267725] [ 34.268101] Allocated by task 250: [ 34.268599] kasan_save_stack+0x3c/0x68 [ 34.269282] kasan_save_track+0x20/0x40 [ 34.269965] kasan_save_alloc_info+0x40/0x58 [ 34.270616] __kasan_kmalloc+0xd4/0xd8 [ 34.271251] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.271921] kasan_bitops_generic+0xa0/0x1c8 [ 34.272600] kunit_try_run_case+0x14c/0x3d0 [ 34.273232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.274017] kthread+0x24c/0x2d0 [ 34.274564] ret_from_fork+0x10/0x20 [ 34.275059] [ 34.275463] The buggy address belongs to the object at fff00000c5732780 [ 34.275463] which belongs to the cache kmalloc-16 of size 16 [ 34.276832] The buggy address is located 8 bytes inside of [ 34.276832] allocated 9-byte region [fff00000c5732780, fff00000c5732789) [ 34.278283] [ 34.278629] The buggy address belongs to the physical page: [ 34.279437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 34.280350] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.281238] page_type: f5(slab) [ 34.281740] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.282769] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.283764] page dumped because: kasan: bad access detected [ 34.284593] [ 34.284884] Memory state around the buggy address: [ 34.285529] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.286468] fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 34.287357] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.288205] ^ [ 34.288674] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.289593] fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.290574] ================================================================== [ 34.293601] ================================================================== [ 34.294646] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 34.296758] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250 [ 34.297320] [ 34.298067] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.299455] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.299977] Hardware name: linux,dummy-virt (DT) [ 34.300727] Call trace: [ 34.301075] show_stack+0x20/0x38 (C) [ 34.301847] dump_stack_lvl+0x8c/0xd0 [ 34.302433] print_report+0x118/0x5e0 [ 34.302998] kasan_report+0xc8/0x118 [ 34.303618] kasan_check_range+0x100/0x1a8 [ 34.304215] __kasan_check_write+0x20/0x30 [ 34.304868] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 34.305721] kasan_bitops_generic+0x11c/0x1c8 [ 34.306308] kunit_try_run_case+0x14c/0x3d0 [ 34.306961] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.307927] kthread+0x24c/0x2d0 [ 34.308463] ret_from_fork+0x10/0x20 [ 34.309115] [ 34.309571] Allocated by task 250: [ 34.310281] kasan_save_stack+0x3c/0x68 [ 34.310870] kasan_save_track+0x20/0x40 [ 34.311528] kasan_save_alloc_info+0x40/0x58 [ 34.312141] __kasan_kmalloc+0xd4/0xd8 [ 34.312700] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.313233] kasan_bitops_generic+0xa0/0x1c8 [ 34.313963] kunit_try_run_case+0x14c/0x3d0 [ 34.314549] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.315232] kthread+0x24c/0x2d0 [ 34.315747] ret_from_fork+0x10/0x20 [ 34.316301] [ 34.316608] The buggy address belongs to the object at fff00000c5732780 [ 34.316608] which belongs to the cache kmalloc-16 of size 16 [ 34.317996] The buggy address is located 8 bytes inside of [ 34.317996] allocated 9-byte region [fff00000c5732780, fff00000c5732789) [ 34.319406] [ 34.319735] The buggy address belongs to the physical page: [ 34.320510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 34.321527] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.322418] page_type: f5(slab) [ 34.322973] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.324346] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.325226] page dumped because: kasan: bad access detected [ 34.325933] [ 34.326243] Memory state around the buggy address: [ 34.326883] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.327827] fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 34.328691] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.329669] ^ [ 34.330187] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.331093] fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.332011] ================================================================== [ 34.333586] ================================================================== [ 34.334273] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 34.335514] Read of size 8 at addr fff00000c5732788 by task kunit_try_catch/250 [ 34.336417] [ 34.336777] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.338098] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.338698] Hardware name: linux,dummy-virt (DT) [ 34.339287] Call trace: [ 34.339851] show_stack+0x20/0x38 (C) [ 34.340436] dump_stack_lvl+0x8c/0xd0 [ 34.341140] print_report+0x118/0x5e0 [ 34.341732] kasan_report+0xc8/0x118 [ 34.342365] __asan_report_load8_noabort+0x20/0x30 [ 34.343223] kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 34.344104] kasan_bitops_generic+0x11c/0x1c8 [ 34.344751] kunit_try_run_case+0x14c/0x3d0 [ 34.345394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.346140] kthread+0x24c/0x2d0 [ 34.346669] ret_from_fork+0x10/0x20 [ 34.347207] [ 34.347696] Allocated by task 250: [ 34.348238] kasan_save_stack+0x3c/0x68 [ 34.348764] kasan_save_track+0x20/0x40 [ 34.349522] kasan_save_alloc_info+0x40/0x58 [ 34.350229] __kasan_kmalloc+0xd4/0xd8 [ 34.350915] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.351536] kasan_bitops_generic+0xa0/0x1c8 [ 34.352216] kunit_try_run_case+0x14c/0x3d0 [ 34.352814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.353609] kthread+0x24c/0x2d0 [ 34.354220] ret_from_fork+0x10/0x20 [ 34.354789] [ 34.355076] The buggy address belongs to the object at fff00000c5732780 [ 34.355076] which belongs to the cache kmalloc-16 of size 16 [ 34.356527] The buggy address is located 8 bytes inside of [ 34.356527] allocated 9-byte region [fff00000c5732780, fff00000c5732789) [ 34.357926] [ 34.358351] The buggy address belongs to the physical page: [ 34.359016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 34.360043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.360863] page_type: f5(slab) [ 34.361344] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.362359] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.363259] page dumped because: kasan: bad access detected [ 34.364024] [ 34.364396] Memory state around the buggy address: [ 34.365008] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.365996] fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 34.366822] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.367675] ^ [ 34.368205] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.369120] fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.370003] ================================================================== [ 34.410450] ================================================================== [ 34.411270] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 34.412225] Read of size 8 at addr fff00000c5732788 by task kunit_try_catch/250 [ 34.414170] [ 34.414513] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.416160] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.416734] Hardware name: linux,dummy-virt (DT) [ 34.417361] Call trace: [ 34.417813] show_stack+0x20/0x38 (C) [ 34.418469] dump_stack_lvl+0x8c/0xd0 [ 34.418946] print_report+0x118/0x5e0 [ 34.419690] kasan_report+0xc8/0x118 [ 34.420378] __asan_report_load8_noabort+0x20/0x30 [ 34.421007] kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 34.421808] kasan_bitops_generic+0x11c/0x1c8 [ 34.422508] kunit_try_run_case+0x14c/0x3d0 [ 34.423123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.423835] kthread+0x24c/0x2d0 [ 34.424526] ret_from_fork+0x10/0x20 [ 34.425168] [ 34.425534] Allocated by task 250: [ 34.426156] kasan_save_stack+0x3c/0x68 [ 34.426684] kasan_save_track+0x20/0x40 [ 34.427308] kasan_save_alloc_info+0x40/0x58 [ 34.427948] __kasan_kmalloc+0xd4/0xd8 [ 34.428544] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.429206] kasan_bitops_generic+0xa0/0x1c8 [ 34.429730] kunit_try_run_case+0x14c/0x3d0 [ 34.430452] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.431057] kthread+0x24c/0x2d0 [ 34.431667] ret_from_fork+0x10/0x20 [ 34.432394] [ 34.432707] The buggy address belongs to the object at fff00000c5732780 [ 34.432707] which belongs to the cache kmalloc-16 of size 16 [ 34.434186] The buggy address is located 8 bytes inside of [ 34.434186] allocated 9-byte region [fff00000c5732780, fff00000c5732789) [ 34.435615] [ 34.435901] The buggy address belongs to the physical page: [ 34.436728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 34.437633] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.438512] page_type: f5(slab) [ 34.439092] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.440030] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.441042] page dumped because: kasan: bad access detected [ 34.441805] [ 34.442160] Memory state around the buggy address: [ 34.442829] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.443677] fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 34.444604] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.445555] ^ [ 34.446052] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.446944] fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.447870] ================================================================== [ 34.215604] ================================================================== [ 34.216504] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 34.217437] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250 [ 34.218834] [ 34.219368] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.220565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.221100] Hardware name: linux,dummy-virt (DT) [ 34.221689] Call trace: [ 34.222160] show_stack+0x20/0x38 (C) [ 34.222736] dump_stack_lvl+0x8c/0xd0 [ 34.223285] print_report+0x118/0x5e0 [ 34.223938] kasan_report+0xc8/0x118 [ 34.224539] kasan_check_range+0x100/0x1a8 [ 34.225107] __kasan_check_write+0x20/0x30 [ 34.225805] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 34.226597] kasan_bitops_generic+0x11c/0x1c8 [ 34.227220] kunit_try_run_case+0x14c/0x3d0 [ 34.227934] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.228770] kthread+0x24c/0x2d0 [ 34.229362] ret_from_fork+0x10/0x20 [ 34.229994] [ 34.230379] Allocated by task 250: [ 34.230925] kasan_save_stack+0x3c/0x68 [ 34.231478] kasan_save_track+0x20/0x40 [ 34.232044] kasan_save_alloc_info+0x40/0x58 [ 34.232721] __kasan_kmalloc+0xd4/0xd8 [ 34.233285] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.233935] kasan_bitops_generic+0xa0/0x1c8 [ 34.234568] kunit_try_run_case+0x14c/0x3d0 [ 34.235154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.235824] kthread+0x24c/0x2d0 [ 34.236399] ret_from_fork+0x10/0x20 [ 34.236949] [ 34.237257] The buggy address belongs to the object at fff00000c5732780 [ 34.237257] which belongs to the cache kmalloc-16 of size 16 [ 34.238816] The buggy address is located 8 bytes inside of [ 34.238816] allocated 9-byte region [fff00000c5732780, fff00000c5732789) [ 34.240092] [ 34.240414] The buggy address belongs to the physical page: [ 34.241175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 34.242252] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.243028] page_type: f5(slab) [ 34.243661] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.244703] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.245703] page dumped because: kasan: bad access detected [ 34.246402] [ 34.246727] Memory state around the buggy address: [ 34.247348] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.248168] fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 34.249056] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.249987] ^ [ 34.250466] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.251361] fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.252231] ================================================================== [ 34.372222] ================================================================== [ 34.373049] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 34.374051] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250 [ 34.374905] [ 34.375269] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.376549] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.377101] Hardware name: linux,dummy-virt (DT) [ 34.377750] Call trace: [ 34.378239] show_stack+0x20/0x38 (C) [ 34.378796] dump_stack_lvl+0x8c/0xd0 [ 34.379464] print_report+0x118/0x5e0 [ 34.380034] kasan_report+0xc8/0x118 [ 34.380627] kasan_check_range+0x100/0x1a8 [ 34.381258] __kasan_check_write+0x20/0x30 [ 34.382007] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 34.382906] kasan_bitops_generic+0x11c/0x1c8 [ 34.383535] kunit_try_run_case+0x14c/0x3d0 [ 34.384121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.384896] kthread+0x24c/0x2d0 [ 34.385438] ret_from_fork+0x10/0x20 [ 34.386113] [ 34.386447] Allocated by task 250: [ 34.386969] kasan_save_stack+0x3c/0x68 [ 34.387695] kasan_save_track+0x20/0x40 [ 34.388119] kasan_save_alloc_info+0x40/0x58 [ 34.388867] __kasan_kmalloc+0xd4/0xd8 [ 34.389416] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.390164] kasan_bitops_generic+0xa0/0x1c8 [ 34.390720] kunit_try_run_case+0x14c/0x3d0 [ 34.391443] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.392104] kthread+0x24c/0x2d0 [ 34.392705] ret_from_fork+0x10/0x20 [ 34.393207] [ 34.393567] The buggy address belongs to the object at fff00000c5732780 [ 34.393567] which belongs to the cache kmalloc-16 of size 16 [ 34.394958] The buggy address is located 8 bytes inside of [ 34.394958] allocated 9-byte region [fff00000c5732780, fff00000c5732789) [ 34.396230] [ 34.396564] The buggy address belongs to the physical page: [ 34.397195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 34.398168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.399099] page_type: f5(slab) [ 34.399588] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.400613] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.401494] page dumped because: kasan: bad access detected [ 34.402253] [ 34.402588] Memory state around the buggy address: [ 34.403200] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.404096] fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 34.405005] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.405843] ^ [ 34.406359] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.407266] fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.408131] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 33.798524] ================================================================== [ 33.799213] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 33.800656] Read of size 8 at addr fff00000c5732788 by task kunit_try_catch/250 [ 33.802765] [ 33.804074] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 33.805553] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.806058] Hardware name: linux,dummy-virt (DT) [ 33.806811] Call trace: [ 33.807695] show_stack+0x20/0x38 (C) [ 33.808262] dump_stack_lvl+0x8c/0xd0 [ 33.808771] print_report+0x118/0x5e0 [ 33.810417] kasan_report+0xc8/0x118 [ 33.810908] __asan_report_load8_noabort+0x20/0x30 [ 33.811639] kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 33.812303] kasan_bitops_generic+0x110/0x1c8 [ 33.812929] kunit_try_run_case+0x14c/0x3d0 [ 33.813953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.814743] kthread+0x24c/0x2d0 [ 33.816118] ret_from_fork+0x10/0x20 [ 33.816781] [ 33.817157] Allocated by task 250: [ 33.817709] kasan_save_stack+0x3c/0x68 [ 33.818259] kasan_save_track+0x20/0x40 [ 33.819441] kasan_save_alloc_info+0x40/0x58 [ 33.820103] __kasan_kmalloc+0xd4/0xd8 [ 33.820649] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.821279] kasan_bitops_generic+0xa0/0x1c8 [ 33.821939] kunit_try_run_case+0x14c/0x3d0 [ 33.822587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.823848] kthread+0x24c/0x2d0 [ 33.824420] ret_from_fork+0x10/0x20 [ 33.824892] [ 33.825244] The buggy address belongs to the object at fff00000c5732780 [ 33.825244] which belongs to the cache kmalloc-16 of size 16 [ 33.827595] The buggy address is located 8 bytes inside of [ 33.827595] allocated 9-byte region [fff00000c5732780, fff00000c5732789) [ 33.828908] [ 33.829193] The buggy address belongs to the physical page: [ 33.830134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 33.831118] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.832445] page_type: f5(slab) [ 33.833149] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.834221] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.835352] page dumped because: kasan: bad access detected [ 33.836283] [ 33.836672] Memory state around the buggy address: [ 33.837290] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.838146] fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 33.839572] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.840903] ^ [ 33.841415] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.842244] fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.843075] ================================================================== [ 34.124449] ================================================================== [ 34.125086] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 34.125950] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250 [ 34.126895] [ 34.127226] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.128481] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.129185] Hardware name: linux,dummy-virt (DT) [ 34.130371] Call trace: [ 34.130781] show_stack+0x20/0x38 (C) [ 34.131318] dump_stack_lvl+0x8c/0xd0 [ 34.131987] print_report+0x118/0x5e0 [ 34.133243] kasan_report+0xc8/0x118 [ 34.133915] kasan_check_range+0x100/0x1a8 [ 34.134663] __kasan_check_write+0x20/0x30 [ 34.135759] kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 34.136536] kasan_bitops_generic+0x110/0x1c8 [ 34.137359] kunit_try_run_case+0x14c/0x3d0 [ 34.138080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.138806] kthread+0x24c/0x2d0 [ 34.140160] ret_from_fork+0x10/0x20 [ 34.140759] [ 34.141115] Allocated by task 250: [ 34.141701] kasan_save_stack+0x3c/0x68 [ 34.142174] kasan_save_track+0x20/0x40 [ 34.142894] kasan_save_alloc_info+0x40/0x58 [ 34.143608] __kasan_kmalloc+0xd4/0xd8 [ 34.144292] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.145744] kasan_bitops_generic+0xa0/0x1c8 [ 34.146366] kunit_try_run_case+0x14c/0x3d0 [ 34.146942] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.147742] kthread+0x24c/0x2d0 [ 34.148349] ret_from_fork+0x10/0x20 [ 34.148822] [ 34.149203] The buggy address belongs to the object at fff00000c5732780 [ 34.149203] which belongs to the cache kmalloc-16 of size 16 [ 34.150949] The buggy address is located 8 bytes inside of [ 34.150949] allocated 9-byte region [fff00000c5732780, fff00000c5732789) [ 34.152299] [ 34.154098] The buggy address belongs to the physical page: [ 34.155538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 34.156630] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.157681] page_type: f5(slab) [ 34.158208] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.159196] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.160072] page dumped because: kasan: bad access detected [ 34.162238] [ 34.162582] Memory state around the buggy address: [ 34.163239] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.164936] fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 34.165790] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.166828] ^ [ 34.168093] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.168915] fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.169878] ================================================================== [ 33.891382] ================================================================== [ 33.892192] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 33.894398] Read of size 8 at addr fff00000c5732788 by task kunit_try_catch/250 [ 33.895486] [ 33.895849] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 33.897033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.897804] Hardware name: linux,dummy-virt (DT) [ 33.898471] Call trace: [ 33.898879] show_stack+0x20/0x38 (C) [ 33.899653] dump_stack_lvl+0x8c/0xd0 [ 33.900343] print_report+0x118/0x5e0 [ 33.900804] kasan_report+0xc8/0x118 [ 33.902170] __asan_report_load8_noabort+0x20/0x30 [ 33.902822] kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 33.903932] kasan_bitops_generic+0x110/0x1c8 [ 33.904598] kunit_try_run_case+0x14c/0x3d0 [ 33.905234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.905947] kthread+0x24c/0x2d0 [ 33.906584] ret_from_fork+0x10/0x20 [ 33.908030] [ 33.908484] Allocated by task 250: [ 33.908750] kasan_save_stack+0x3c/0x68 [ 33.909049] kasan_save_track+0x20/0x40 [ 33.909359] kasan_save_alloc_info+0x40/0x58 [ 33.910702] __kasan_kmalloc+0xd4/0xd8 [ 33.911813] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.912408] kasan_bitops_generic+0xa0/0x1c8 [ 33.912727] kunit_try_run_case+0x14c/0x3d0 [ 33.913033] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.913498] kthread+0x24c/0x2d0 [ 33.914118] ret_from_fork+0x10/0x20 [ 33.915473] [ 33.915872] The buggy address belongs to the object at fff00000c5732780 [ 33.915872] which belongs to the cache kmalloc-16 of size 16 [ 33.917522] The buggy address is located 8 bytes inside of [ 33.917522] allocated 9-byte region [fff00000c5732780, fff00000c5732789) [ 33.919463] [ 33.919871] The buggy address belongs to the physical page: [ 33.920761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 33.922763] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.924172] page_type: f5(slab) [ 33.925593] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.926665] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.928002] page dumped because: kasan: bad access detected [ 33.928858] [ 33.929224] Memory state around the buggy address: [ 33.929909] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.930863] fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 33.931892] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.933109] ^ [ 33.933625] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.935362] fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.936557] ================================================================== [ 33.846763] ================================================================== [ 33.847815] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 33.848757] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250 [ 33.850168] [ 33.850717] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 33.851991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.852648] Hardware name: linux,dummy-virt (DT) [ 33.853269] Call trace: [ 33.854094] show_stack+0x20/0x38 (C) [ 33.854737] dump_stack_lvl+0x8c/0xd0 [ 33.855465] print_report+0x118/0x5e0 [ 33.856870] kasan_report+0xc8/0x118 [ 33.857388] kasan_check_range+0x100/0x1a8 [ 33.858059] __kasan_check_write+0x20/0x30 [ 33.858741] kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 33.860044] kasan_bitops_generic+0x110/0x1c8 [ 33.860711] kunit_try_run_case+0x14c/0x3d0 [ 33.861316] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.862167] kthread+0x24c/0x2d0 [ 33.862789] ret_from_fork+0x10/0x20 [ 33.863633] [ 33.864003] Allocated by task 250: [ 33.864510] kasan_save_stack+0x3c/0x68 [ 33.865070] kasan_save_track+0x20/0x40 [ 33.866168] kasan_save_alloc_info+0x40/0x58 [ 33.866818] __kasan_kmalloc+0xd4/0xd8 [ 33.868078] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.868884] kasan_bitops_generic+0xa0/0x1c8 [ 33.869658] kunit_try_run_case+0x14c/0x3d0 [ 33.870244] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.871043] kthread+0x24c/0x2d0 [ 33.871778] ret_from_fork+0x10/0x20 [ 33.872415] [ 33.872662] The buggy address belongs to the object at fff00000c5732780 [ 33.872662] which belongs to the cache kmalloc-16 of size 16 [ 33.874297] The buggy address is located 8 bytes inside of [ 33.874297] allocated 9-byte region [fff00000c5732780, fff00000c5732789) [ 33.876160] [ 33.876625] The buggy address belongs to the physical page: [ 33.877354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 33.878538] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.879766] page_type: f5(slab) [ 33.880362] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.881392] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.882276] page dumped because: kasan: bad access detected [ 33.882959] [ 33.884269] Memory state around the buggy address: [ 33.884803] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.885690] fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 33.886627] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.887742] ^ [ 33.888250] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.889213] fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.890118] ================================================================== [ 34.075793] ================================================================== [ 34.076422] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 34.077754] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250 [ 34.079182] [ 34.079928] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.081356] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.082001] Hardware name: linux,dummy-virt (DT) [ 34.082641] Call trace: [ 34.083021] show_stack+0x20/0x38 (C) [ 34.084073] dump_stack_lvl+0x8c/0xd0 [ 34.085219] print_report+0x118/0x5e0 [ 34.085786] kasan_report+0xc8/0x118 [ 34.086301] kasan_check_range+0x100/0x1a8 [ 34.087007] __kasan_check_write+0x20/0x30 [ 34.087645] kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 34.088684] kasan_bitops_generic+0x110/0x1c8 [ 34.089198] kunit_try_run_case+0x14c/0x3d0 [ 34.089936] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.090924] kthread+0x24c/0x2d0 [ 34.091945] ret_from_fork+0x10/0x20 [ 34.092600] [ 34.092923] Allocated by task 250: [ 34.093986] kasan_save_stack+0x3c/0x68 [ 34.094527] kasan_save_track+0x20/0x40 [ 34.095043] kasan_save_alloc_info+0x40/0x58 [ 34.095764] __kasan_kmalloc+0xd4/0xd8 [ 34.096242] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.097017] kasan_bitops_generic+0xa0/0x1c8 [ 34.097817] kunit_try_run_case+0x14c/0x3d0 [ 34.098517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.099268] kthread+0x24c/0x2d0 [ 34.099805] ret_from_fork+0x10/0x20 [ 34.100818] [ 34.101315] The buggy address belongs to the object at fff00000c5732780 [ 34.101315] which belongs to the cache kmalloc-16 of size 16 [ 34.102629] The buggy address is located 8 bytes inside of [ 34.102629] allocated 9-byte region [fff00000c5732780, fff00000c5732789) [ 34.105096] [ 34.106139] The buggy address belongs to the physical page: [ 34.108897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 34.110650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.111833] page_type: f5(slab) [ 34.112620] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.113566] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.114472] page dumped because: kasan: bad access detected [ 34.115125] [ 34.115919] Memory state around the buggy address: [ 34.116477] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.117292] fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 34.118684] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.119312] ^ [ 34.119888] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.120775] fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.121402] ================================================================== [ 33.754615] ================================================================== [ 33.756426] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 33.757977] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250 [ 33.759366] [ 33.759718] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 33.761068] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.761881] Hardware name: linux,dummy-virt (DT) [ 33.762468] Call trace: [ 33.762887] show_stack+0x20/0x38 (C) [ 33.763905] dump_stack_lvl+0x8c/0xd0 [ 33.764499] print_report+0x118/0x5e0 [ 33.765177] kasan_report+0xc8/0x118 [ 33.765670] kasan_check_range+0x100/0x1a8 [ 33.766436] __kasan_check_write+0x20/0x30 [ 33.767734] kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 33.768462] kasan_bitops_generic+0x110/0x1c8 [ 33.769127] kunit_try_run_case+0x14c/0x3d0 [ 33.769752] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.770543] kthread+0x24c/0x2d0 [ 33.771090] ret_from_fork+0x10/0x20 [ 33.772006] [ 33.772365] Allocated by task 250: [ 33.773110] kasan_save_stack+0x3c/0x68 [ 33.773818] kasan_save_track+0x20/0x40 [ 33.774562] kasan_save_alloc_info+0x40/0x58 [ 33.775146] __kasan_kmalloc+0xd4/0xd8 [ 33.775741] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.776413] kasan_bitops_generic+0xa0/0x1c8 [ 33.777016] kunit_try_run_case+0x14c/0x3d0 [ 33.777677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.778510] kthread+0x24c/0x2d0 [ 33.779062] ret_from_fork+0x10/0x20 [ 33.779573] [ 33.780018] The buggy address belongs to the object at fff00000c5732780 [ 33.780018] which belongs to the cache kmalloc-16 of size 16 [ 33.781426] The buggy address is located 8 bytes inside of [ 33.781426] allocated 9-byte region [fff00000c5732780, fff00000c5732789) [ 33.782866] [ 33.783583] The buggy address belongs to the physical page: [ 33.784271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 33.785258] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.786100] page_type: f5(slab) [ 33.786681] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.788448] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.789512] page dumped because: kasan: bad access detected [ 33.790158] [ 33.790522] Memory state around the buggy address: [ 33.791213] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.792036] fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 33.793371] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.794303] ^ [ 33.794846] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.796049] fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.796868] ================================================================== [ 34.032268] ================================================================== [ 34.032932] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 34.034187] Read of size 8 at addr fff00000c5732788 by task kunit_try_catch/250 [ 34.035347] [ 34.036623] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.038291] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.039185] Hardware name: linux,dummy-virt (DT) [ 34.039981] Call trace: [ 34.040576] show_stack+0x20/0x38 (C) [ 34.041229] dump_stack_lvl+0x8c/0xd0 [ 34.041876] print_report+0x118/0x5e0 [ 34.042437] kasan_report+0xc8/0x118 [ 34.043412] __asan_report_load8_noabort+0x20/0x30 [ 34.044159] kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 34.044892] kasan_bitops_generic+0x110/0x1c8 [ 34.045971] kunit_try_run_case+0x14c/0x3d0 [ 34.046623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.048007] kthread+0x24c/0x2d0 [ 34.048516] ret_from_fork+0x10/0x20 [ 34.049107] [ 34.049448] Allocated by task 250: [ 34.050118] kasan_save_stack+0x3c/0x68 [ 34.050696] kasan_save_track+0x20/0x40 [ 34.051458] kasan_save_alloc_info+0x40/0x58 [ 34.051886] __kasan_kmalloc+0xd4/0xd8 [ 34.053114] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.054165] kasan_bitops_generic+0xa0/0x1c8 [ 34.054809] kunit_try_run_case+0x14c/0x3d0 [ 34.055660] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.056587] kthread+0x24c/0x2d0 [ 34.056865] ret_from_fork+0x10/0x20 [ 34.057167] [ 34.057379] The buggy address belongs to the object at fff00000c5732780 [ 34.057379] which belongs to the cache kmalloc-16 of size 16 [ 34.058070] The buggy address is located 8 bytes inside of [ 34.058070] allocated 9-byte region [fff00000c5732780, fff00000c5732789) [ 34.058748] [ 34.058928] The buggy address belongs to the physical page: [ 34.060533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 34.061503] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.062147] page_type: f5(slab) [ 34.062820] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.064809] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.065678] page dumped because: kasan: bad access detected [ 34.066612] [ 34.067290] Memory state around the buggy address: [ 34.068590] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.069785] fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 34.070716] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.071858] ^ [ 34.072559] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.073293] fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.074172] ================================================================== [ 33.987497] ================================================================== [ 33.988440] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 33.989465] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250 [ 33.990460] [ 33.990874] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 33.992713] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.993400] Hardware name: linux,dummy-virt (DT) [ 33.994246] Call trace: [ 33.994763] show_stack+0x20/0x38 (C) [ 33.996080] dump_stack_lvl+0x8c/0xd0 [ 33.996640] print_report+0x118/0x5e0 [ 33.997358] kasan_report+0xc8/0x118 [ 33.997957] kasan_check_range+0x100/0x1a8 [ 33.998614] __kasan_check_write+0x20/0x30 [ 33.999317] kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 34.000091] kasan_bitops_generic+0x110/0x1c8 [ 34.000745] kunit_try_run_case+0x14c/0x3d0 [ 34.001728] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.002531] kthread+0x24c/0x2d0 [ 34.003790] ret_from_fork+0x10/0x20 [ 34.004353] [ 34.004651] Allocated by task 250: [ 34.005114] kasan_save_stack+0x3c/0x68 [ 34.005841] kasan_save_track+0x20/0x40 [ 34.006398] kasan_save_alloc_info+0x40/0x58 [ 34.007472] __kasan_kmalloc+0xd4/0xd8 [ 34.007987] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.008658] kasan_bitops_generic+0xa0/0x1c8 [ 34.009315] kunit_try_run_case+0x14c/0x3d0 [ 34.009946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.010646] kthread+0x24c/0x2d0 [ 34.011798] ret_from_fork+0x10/0x20 [ 34.012440] [ 34.012779] The buggy address belongs to the object at fff00000c5732780 [ 34.012779] which belongs to the cache kmalloc-16 of size 16 [ 34.014376] The buggy address is located 8 bytes inside of [ 34.014376] allocated 9-byte region [fff00000c5732780, fff00000c5732789) [ 34.015936] [ 34.016306] The buggy address belongs to the physical page: [ 34.017078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 34.018366] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.019291] page_type: f5(slab) [ 34.019800] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.021776] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.022935] page dumped because: kasan: bad access detected [ 34.023691] [ 34.024021] Memory state around the buggy address: [ 34.025275] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.026238] fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 34.027455] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.028358] ^ [ 34.028831] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.029586] fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.030538] ================================================================== [ 34.173887] ================================================================== [ 34.174734] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 34.175936] Read of size 8 at addr fff00000c5732788 by task kunit_try_catch/250 [ 34.176665] [ 34.177023] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.179322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.179901] Hardware name: linux,dummy-virt (DT) [ 34.180518] Call trace: [ 34.180994] show_stack+0x20/0x38 (C) [ 34.181689] dump_stack_lvl+0x8c/0xd0 [ 34.182179] print_report+0x118/0x5e0 [ 34.182885] kasan_report+0xc8/0x118 [ 34.183478] __asan_report_load8_noabort+0x20/0x30 [ 34.184185] kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 34.184925] kasan_bitops_generic+0x110/0x1c8 [ 34.185558] kunit_try_run_case+0x14c/0x3d0 [ 34.186231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.187138] kthread+0x24c/0x2d0 [ 34.187714] ret_from_fork+0x10/0x20 [ 34.188296] [ 34.188602] Allocated by task 250: [ 34.189173] kasan_save_stack+0x3c/0x68 [ 34.189784] kasan_save_track+0x20/0x40 [ 34.190587] kasan_save_alloc_info+0x40/0x58 [ 34.191251] __kasan_kmalloc+0xd4/0xd8 [ 34.192021] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.192661] kasan_bitops_generic+0xa0/0x1c8 [ 34.193347] kunit_try_run_case+0x14c/0x3d0 [ 34.193870] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.194686] kthread+0x24c/0x2d0 [ 34.195250] ret_from_fork+0x10/0x20 [ 34.195820] [ 34.196192] The buggy address belongs to the object at fff00000c5732780 [ 34.196192] which belongs to the cache kmalloc-16 of size 16 [ 34.197599] The buggy address is located 8 bytes inside of [ 34.197599] allocated 9-byte region [fff00000c5732780, fff00000c5732789) [ 34.199052] [ 34.199353] The buggy address belongs to the physical page: [ 34.200007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 34.201230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.202210] page_type: f5(slab) [ 34.202878] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.203777] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.204885] page dumped because: kasan: bad access detected [ 34.205887] [ 34.206420] Memory state around the buggy address: [ 34.207285] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.208526] fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 34.209537] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.210441] ^ [ 34.210931] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.211923] fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.212789] ================================================================== [ 33.938160] ================================================================== [ 33.938911] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 33.941175] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250 [ 33.942297] [ 33.942749] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 33.944955] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.945590] Hardware name: linux,dummy-virt (DT) [ 33.945982] Call trace: [ 33.946201] show_stack+0x20/0x38 (C) [ 33.946940] dump_stack_lvl+0x8c/0xd0 [ 33.947859] print_report+0x118/0x5e0 [ 33.948767] kasan_report+0xc8/0x118 [ 33.949561] kasan_check_range+0x100/0x1a8 [ 33.950429] __kasan_check_write+0x20/0x30 [ 33.951533] kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 33.952758] kasan_bitops_generic+0x110/0x1c8 [ 33.953363] kunit_try_run_case+0x14c/0x3d0 [ 33.954033] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.954873] kthread+0x24c/0x2d0 [ 33.955448] ret_from_fork+0x10/0x20 [ 33.956065] [ 33.956449] Allocated by task 250: [ 33.956955] kasan_save_stack+0x3c/0x68 [ 33.958509] kasan_save_track+0x20/0x40 [ 33.959002] kasan_save_alloc_info+0x40/0x58 [ 33.960030] __kasan_kmalloc+0xd4/0xd8 [ 33.960656] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.961294] kasan_bitops_generic+0xa0/0x1c8 [ 33.961943] kunit_try_run_case+0x14c/0x3d0 [ 33.962572] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.963578] kthread+0x24c/0x2d0 [ 33.964074] ret_from_fork+0x10/0x20 [ 33.964601] [ 33.965011] The buggy address belongs to the object at fff00000c5732780 [ 33.965011] which belongs to the cache kmalloc-16 of size 16 [ 33.967211] The buggy address is located 8 bytes inside of [ 33.967211] allocated 9-byte region [fff00000c5732780, fff00000c5732789) [ 33.968925] [ 33.969258] The buggy address belongs to the physical page: [ 33.970128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 33.970765] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.972616] page_type: f5(slab) [ 33.973568] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.974803] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.975945] page dumped because: kasan: bad access detected [ 33.976868] [ 33.977230] Memory state around the buggy address: [ 33.977961] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.979823] fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 33.980635] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.981590] ^ [ 33.982056] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.982871] fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.984180] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 31.187825] ================================================================== [ 31.188664] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750 [ 31.189682] Read of size 1 at addr fff00000c58f437f by task kunit_try_catch/183 [ 31.190558] [ 31.190863] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.192374] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.192911] Hardware name: linux,dummy-virt (DT) [ 31.193643] Call trace: [ 31.194043] show_stack+0x20/0x38 (C) [ 31.194692] dump_stack_lvl+0x8c/0xd0 [ 31.195476] print_report+0x118/0x5e0 [ 31.196184] kasan_report+0xc8/0x118 [ 31.196769] __asan_report_load1_noabort+0x20/0x30 [ 31.197438] ksize_unpoisons_memory+0x6a0/0x750 [ 31.198224] kunit_try_run_case+0x14c/0x3d0 [ 31.198859] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.199873] kthread+0x24c/0x2d0 [ 31.200396] ret_from_fork+0x10/0x20 [ 31.201008] [ 31.201321] Allocated by task 183: [ 31.202048] kasan_save_stack+0x3c/0x68 [ 31.202662] kasan_save_track+0x20/0x40 [ 31.203548] kasan_save_alloc_info+0x40/0x58 [ 31.204135] __kasan_kmalloc+0xd4/0xd8 [ 31.204819] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.205551] ksize_unpoisons_memory+0xc0/0x750 [ 31.206274] kunit_try_run_case+0x14c/0x3d0 [ 31.207594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.208256] kthread+0x24c/0x2d0 [ 31.208771] ret_from_fork+0x10/0x20 [ 31.209367] [ 31.209763] The buggy address belongs to the object at fff00000c58f4300 [ 31.209763] which belongs to the cache kmalloc-128 of size 128 [ 31.211459] The buggy address is located 12 bytes to the right of [ 31.211459] allocated 115-byte region [fff00000c58f4300, fff00000c58f4373) [ 31.212426] [ 31.212650] The buggy address belongs to the physical page: [ 31.213397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058f4 [ 31.214808] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.216003] page_type: f5(slab) [ 31.216455] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.217458] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.218342] page dumped because: kasan: bad access detected [ 31.218978] [ 31.219479] Memory state around the buggy address: [ 31.220475] fff00000c58f4200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.221430] fff00000c58f4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.222305] >fff00000c58f4300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.223605] ^ [ 31.224468] fff00000c58f4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.225306] fff00000c58f4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.226668] ================================================================== [ 31.144874] ================================================================== [ 31.146043] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750 [ 31.146875] Read of size 1 at addr fff00000c58f4378 by task kunit_try_catch/183 [ 31.147747] [ 31.148248] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.150044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.150587] Hardware name: linux,dummy-virt (DT) [ 31.151490] Call trace: [ 31.151859] show_stack+0x20/0x38 (C) [ 31.152483] dump_stack_lvl+0x8c/0xd0 [ 31.153102] print_report+0x118/0x5e0 [ 31.153629] kasan_report+0xc8/0x118 [ 31.154245] __asan_report_load1_noabort+0x20/0x30 [ 31.154892] ksize_unpoisons_memory+0x628/0x750 [ 31.155913] kunit_try_run_case+0x14c/0x3d0 [ 31.156497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.157220] kthread+0x24c/0x2d0 [ 31.157854] ret_from_fork+0x10/0x20 [ 31.158515] [ 31.158817] Allocated by task 183: [ 31.159657] kasan_save_stack+0x3c/0x68 [ 31.160423] kasan_save_track+0x20/0x40 [ 31.160977] kasan_save_alloc_info+0x40/0x58 [ 31.161562] __kasan_kmalloc+0xd4/0xd8 [ 31.162158] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.162738] ksize_unpoisons_memory+0xc0/0x750 [ 31.163990] kunit_try_run_case+0x14c/0x3d0 [ 31.164549] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.165253] kthread+0x24c/0x2d0 [ 31.166429] ret_from_fork+0x10/0x20 [ 31.166952] [ 31.167754] The buggy address belongs to the object at fff00000c58f4300 [ 31.167754] which belongs to the cache kmalloc-128 of size 128 [ 31.169097] The buggy address is located 5 bytes to the right of [ 31.169097] allocated 115-byte region [fff00000c58f4300, fff00000c58f4373) [ 31.170578] [ 31.171259] The buggy address belongs to the physical page: [ 31.171969] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058f4 [ 31.172862] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.173741] page_type: f5(slab) [ 31.174208] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.175295] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.176228] page dumped because: kasan: bad access detected [ 31.176935] [ 31.177240] Memory state around the buggy address: [ 31.178109] fff00000c58f4200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.179251] fff00000c58f4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.180194] >fff00000c58f4300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.180894] ^ [ 31.181807] fff00000c58f4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.182725] fff00000c58f4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.184132] ================================================================== [ 31.100020] ================================================================== [ 31.101199] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750 [ 31.102177] Read of size 1 at addr fff00000c58f4373 by task kunit_try_catch/183 [ 31.103160] [ 31.103670] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.105321] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.106009] Hardware name: linux,dummy-virt (DT) [ 31.106782] Call trace: [ 31.107603] show_stack+0x20/0x38 (C) [ 31.108244] dump_stack_lvl+0x8c/0xd0 [ 31.109026] print_report+0x118/0x5e0 [ 31.109719] kasan_report+0xc8/0x118 [ 31.110418] __asan_report_load1_noabort+0x20/0x30 [ 31.111546] ksize_unpoisons_memory+0x638/0x750 [ 31.112343] kunit_try_run_case+0x14c/0x3d0 [ 31.113073] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.113941] kthread+0x24c/0x2d0 [ 31.114609] ret_from_fork+0x10/0x20 [ 31.115539] [ 31.115841] Allocated by task 183: [ 31.116108] kasan_save_stack+0x3c/0x68 [ 31.116482] kasan_save_track+0x20/0x40 [ 31.117382] kasan_save_alloc_info+0x40/0x58 [ 31.118371] __kasan_kmalloc+0xd4/0xd8 [ 31.119415] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.119985] ksize_unpoisons_memory+0xc0/0x750 [ 31.120610] kunit_try_run_case+0x14c/0x3d0 [ 31.121305] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.122088] kthread+0x24c/0x2d0 [ 31.122399] ret_from_fork+0x10/0x20 [ 31.123691] [ 31.123982] The buggy address belongs to the object at fff00000c58f4300 [ 31.123982] which belongs to the cache kmalloc-128 of size 128 [ 31.125674] The buggy address is located 0 bytes to the right of [ 31.125674] allocated 115-byte region [fff00000c58f4300, fff00000c58f4373) [ 31.127569] [ 31.128229] The buggy address belongs to the physical page: [ 31.129052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058f4 [ 31.130156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.131206] page_type: f5(slab) [ 31.131652] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.132799] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.133716] page dumped because: kasan: bad access detected [ 31.134462] [ 31.134890] Memory state around the buggy address: [ 31.135918] fff00000c58f4200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.136915] fff00000c58f4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.137883] >fff00000c58f4300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.138810] ^ [ 31.139872] fff00000c58f4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.140758] fff00000c58f4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.142295] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 33.695446] ================================================================== [ 33.696609] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 33.697396] Read of size 1 at addr fff00000c5921b90 by task kunit_try_catch/248 [ 33.698142] [ 33.698666] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 33.700202] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.701105] Hardware name: linux,dummy-virt (DT) [ 33.701787] Call trace: [ 33.702276] show_stack+0x20/0x38 (C) [ 33.703277] dump_stack_lvl+0x8c/0xd0 [ 33.703851] print_report+0x118/0x5e0 [ 33.704515] kasan_report+0xc8/0x118 [ 33.705130] __asan_report_load1_noabort+0x20/0x30 [ 33.705892] strnlen+0x80/0x88 [ 33.706496] kasan_strings+0x364/0x8d8 [ 33.707412] kunit_try_run_case+0x14c/0x3d0 [ 33.708126] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.708937] kthread+0x24c/0x2d0 [ 33.709555] ret_from_fork+0x10/0x20 [ 33.710198] [ 33.710534] Allocated by task 248: [ 33.711191] kasan_save_stack+0x3c/0x68 [ 33.711958] kasan_save_track+0x20/0x40 [ 33.712518] kasan_save_alloc_info+0x40/0x58 [ 33.713318] __kasan_kmalloc+0xd4/0xd8 [ 33.713950] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.714671] kasan_strings+0xb0/0x8d8 [ 33.715478] kunit_try_run_case+0x14c/0x3d0 [ 33.716263] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.716949] kthread+0x24c/0x2d0 [ 33.717544] ret_from_fork+0x10/0x20 [ 33.718400] [ 33.718923] Freed by task 248: [ 33.719423] kasan_save_stack+0x3c/0x68 [ 33.720272] kasan_save_track+0x20/0x40 [ 33.720707] kasan_save_free_info+0x4c/0x78 [ 33.721149] __kasan_slab_free+0x6c/0x98 [ 33.721624] kfree+0x114/0x3c8 [ 33.722296] kasan_strings+0x124/0x8d8 [ 33.723013] kunit_try_run_case+0x14c/0x3d0 [ 33.723994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.724827] kthread+0x24c/0x2d0 [ 33.725300] ret_from_fork+0x10/0x20 [ 33.725817] [ 33.726114] The buggy address belongs to the object at fff00000c5921b80 [ 33.726114] which belongs to the cache kmalloc-32 of size 32 [ 33.727302] The buggy address is located 16 bytes inside of [ 33.727302] freed 32-byte region [fff00000c5921b80, fff00000c5921ba0) [ 33.729353] [ 33.729845] The buggy address belongs to the physical page: [ 33.730746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105921 [ 33.731861] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.732854] page_type: f5(slab) [ 33.733538] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 33.734664] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 33.735798] page dumped because: kasan: bad access detected [ 33.736624] [ 33.737009] Memory state around the buggy address: [ 33.737739] fff00000c5921a80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.738886] fff00000c5921b00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.739874] >fff00000c5921b80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.740891] ^ [ 33.741572] fff00000c5921c00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 33.742636] fff00000c5921c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.743592] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[ 33.644802] ================================================================== [ 33.645582] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 33.646386] Read of size 1 at addr fff00000c5921b90 by task kunit_try_catch/248 [ 33.647147] [ 33.647751] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 33.649023] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.649642] Hardware name: linux,dummy-virt (DT) [ 33.650317] Call trace: [ 33.650959] show_stack+0x20/0x38 (C) [ 33.651791] dump_stack_lvl+0x8c/0xd0 [ 33.652639] print_report+0x118/0x5e0 [ 33.653404] kasan_report+0xc8/0x118 [ 33.654185] __asan_report_load1_noabort+0x20/0x30 [ 33.654961] strlen+0xa8/0xb0 [ 33.655612] kasan_strings+0x304/0x8d8 [ 33.656319] kunit_try_run_case+0x14c/0x3d0 [ 33.657076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.658021] kthread+0x24c/0x2d0 [ 33.658725] ret_from_fork+0x10/0x20 [ 33.659473] [ 33.659900] Allocated by task 248: [ 33.660555] kasan_save_stack+0x3c/0x68 [ 33.661247] kasan_save_track+0x20/0x40 [ 33.661962] kasan_save_alloc_info+0x40/0x58 [ 33.662800] __kasan_kmalloc+0xd4/0xd8 [ 33.663590] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.664391] kasan_strings+0xb0/0x8d8 [ 33.665065] kunit_try_run_case+0x14c/0x3d0 [ 33.665841] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.666687] kthread+0x24c/0x2d0 [ 33.667344] ret_from_fork+0x10/0x20 [ 33.668054] [ 33.668525] Freed by task 248: [ 33.669162] kasan_save_stack+0x3c/0x68 [ 33.669925] kasan_save_track+0x20/0x40 [ 33.670655] kasan_save_free_info+0x4c/0x78 [ 33.671230] __kasan_slab_free+0x6c/0x98 [ 33.671805] kfree+0x114/0x3c8 [ 33.672572] kasan_strings+0x124/0x8d8 [ 33.673189] kunit_try_run_case+0x14c/0x3d0 [ 33.673910] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.674780] kthread+0x24c/0x2d0 [ 33.675316] ret_from_fork+0x10/0x20 [ 33.675856] [ 33.676221] The buggy address belongs to the object at fff00000c5921b80 [ 33.676221] which belongs to the cache kmalloc-32 of size 32 [ 33.677683] The buggy address is located 16 bytes inside of [ 33.677683] freed 32-byte region [fff00000c5921b80, fff00000c5921ba0) [ 33.679184] [ 33.679657] The buggy address belongs to the physical page: [ 33.680475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105921 [ 33.681551] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.682468] page_type: f5(slab) [ 33.683044] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 33.684120] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 33.685068] page dumped because: kasan: bad access detected [ 33.685891] [ 33.686230] Memory state around the buggy address: [ 33.686986] fff00000c5921a80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.688090] fff00000c5921b00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.688958] >fff00000c5921b80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.689941] ^ [ 33.690550] fff00000c5921c00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 33.691528] fff00000c5921c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.692447] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 33.595533] ================================================================== [ 33.596288] BUG: KASAN: slab-use-after-free in kasan_strings+0x838/0x8d8 [ 33.597216] Read of size 1 at addr fff00000c5921b90 by task kunit_try_catch/248 [ 33.598026] [ 33.598362] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 33.600408] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.601105] Hardware name: linux,dummy-virt (DT) [ 33.601608] Call trace: [ 33.601969] show_stack+0x20/0x38 (C) [ 33.603438] dump_stack_lvl+0x8c/0xd0 [ 33.604098] print_report+0x118/0x5e0 [ 33.604755] kasan_report+0xc8/0x118 [ 33.605435] __asan_report_load1_noabort+0x20/0x30 [ 33.606171] kasan_strings+0x838/0x8d8 [ 33.606826] kunit_try_run_case+0x14c/0x3d0 [ 33.607565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.608434] kthread+0x24c/0x2d0 [ 33.609049] ret_from_fork+0x10/0x20 [ 33.609742] [ 33.610095] Allocated by task 248: [ 33.610715] kasan_save_stack+0x3c/0x68 [ 33.611417] kasan_save_track+0x20/0x40 [ 33.612119] kasan_save_alloc_info+0x40/0x58 [ 33.612811] __kasan_kmalloc+0xd4/0xd8 [ 33.613456] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.614187] kasan_strings+0xb0/0x8d8 [ 33.614758] kunit_try_run_case+0x14c/0x3d0 [ 33.615547] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.616320] kthread+0x24c/0x2d0 [ 33.616910] ret_from_fork+0x10/0x20 [ 33.617570] [ 33.618049] Freed by task 248: [ 33.618586] kasan_save_stack+0x3c/0x68 [ 33.619304] kasan_save_track+0x20/0x40 [ 33.619986] kasan_save_free_info+0x4c/0x78 [ 33.620704] __kasan_slab_free+0x6c/0x98 [ 33.621373] kfree+0x114/0x3c8 [ 33.621934] kasan_strings+0x124/0x8d8 [ 33.622578] kunit_try_run_case+0x14c/0x3d0 [ 33.623280] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.624220] kthread+0x24c/0x2d0 [ 33.624826] ret_from_fork+0x10/0x20 [ 33.625514] [ 33.625860] The buggy address belongs to the object at fff00000c5921b80 [ 33.625860] which belongs to the cache kmalloc-32 of size 32 [ 33.627451] The buggy address is located 16 bytes inside of [ 33.627451] freed 32-byte region [fff00000c5921b80, fff00000c5921ba0) [ 33.629047] [ 33.629502] The buggy address belongs to the physical page: [ 33.630263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105921 [ 33.631472] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.632362] page_type: f5(slab) [ 33.632961] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 33.633993] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 33.634944] page dumped because: kasan: bad access detected [ 33.635745] [ 33.636234] Memory state around the buggy address: [ 33.636927] fff00000c5921a80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 33.637965] fff00000c5921b00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 33.638890] >fff00000c5921b80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.639786] ^ [ 33.640419] fff00000c5921c00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 33.641370] fff00000c5921c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.642308] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 33.541316] ================================================================== [ 33.543724] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 33.544992] Read of size 1 at addr fff00000c5921b90 by task kunit_try_catch/248 [ 33.545867] [ 33.546507] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 33.547844] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.548563] Hardware name: linux,dummy-virt (DT) [ 33.549245] Call trace: [ 33.549866] show_stack+0x20/0x38 (C) [ 33.550573] dump_stack_lvl+0x8c/0xd0 [ 33.551791] print_report+0x118/0x5e0 [ 33.552571] kasan_report+0xc8/0x118 [ 33.553163] __asan_report_load1_noabort+0x20/0x30 [ 33.553897] strcmp+0xc0/0xc8 [ 33.554508] kasan_strings+0x228/0x8d8 [ 33.555186] kunit_try_run_case+0x14c/0x3d0 [ 33.556085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.556933] kthread+0x24c/0x2d0 [ 33.557643] ret_from_fork+0x10/0x20 [ 33.558316] [ 33.558684] Allocated by task 248: [ 33.559962] kasan_save_stack+0x3c/0x68 [ 33.561161] kasan_save_track+0x20/0x40 [ 33.561708] kasan_save_alloc_info+0x40/0x58 [ 33.562269] __kasan_kmalloc+0xd4/0xd8 [ 33.562883] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.563906] kasan_strings+0xb0/0x8d8 [ 33.564747] kunit_try_run_case+0x14c/0x3d0 [ 33.565361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.566061] kthread+0x24c/0x2d0 [ 33.566552] ret_from_fork+0x10/0x20 [ 33.567046] [ 33.567500] Freed by task 248: [ 33.568032] kasan_save_stack+0x3c/0x68 [ 33.568909] kasan_save_track+0x20/0x40 [ 33.569493] kasan_save_free_info+0x4c/0x78 [ 33.570170] __kasan_slab_free+0x6c/0x98 [ 33.570755] kfree+0x114/0x3c8 [ 33.571643] kasan_strings+0x124/0x8d8 [ 33.572160] kunit_try_run_case+0x14c/0x3d0 [ 33.572765] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.573584] kthread+0x24c/0x2d0 [ 33.574053] ret_from_fork+0x10/0x20 [ 33.574687] [ 33.575298] The buggy address belongs to the object at fff00000c5921b80 [ 33.575298] which belongs to the cache kmalloc-32 of size 32 [ 33.576699] The buggy address is located 16 bytes inside of [ 33.576699] freed 32-byte region [fff00000c5921b80, fff00000c5921ba0) [ 33.578201] [ 33.578525] The buggy address belongs to the physical page: [ 33.579974] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105921 [ 33.580972] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.582360] page_type: f5(slab) [ 33.582885] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 33.584278] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 33.585271] page dumped because: kasan: bad access detected [ 33.585946] [ 33.586286] Memory state around the buggy address: [ 33.586899] fff00000c5921a80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 33.588027] fff00000c5921b00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 33.588928] >fff00000c5921b80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.589783] ^ [ 33.590311] fff00000c5921c00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 33.591852] fff00000c5921c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.592855] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 33.484047] ================================================================== [ 33.485219] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 33.486098] Read of size 1 at addr fff00000c5921ad8 by task kunit_try_catch/246 [ 33.486997] [ 33.487575] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 33.488444] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.489132] Hardware name: linux,dummy-virt (DT) [ 33.489706] Call trace: [ 33.490205] show_stack+0x20/0x38 (C) [ 33.490876] dump_stack_lvl+0x8c/0xd0 [ 33.491907] print_report+0x118/0x5e0 [ 33.492393] kasan_report+0xc8/0x118 [ 33.493138] __asan_report_load1_noabort+0x20/0x30 [ 33.493893] memcmp+0x198/0x1d8 [ 33.494375] kasan_memcmp+0x16c/0x300 [ 33.495493] kunit_try_run_case+0x14c/0x3d0 [ 33.496587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.497440] kthread+0x24c/0x2d0 [ 33.498167] ret_from_fork+0x10/0x20 [ 33.498952] [ 33.499825] Allocated by task 246: [ 33.500249] kasan_save_stack+0x3c/0x68 [ 33.500802] kasan_save_track+0x20/0x40 [ 33.501408] kasan_save_alloc_info+0x40/0x58 [ 33.502124] __kasan_kmalloc+0xd4/0xd8 [ 33.502771] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.503739] kasan_memcmp+0xbc/0x300 [ 33.504567] kunit_try_run_case+0x14c/0x3d0 [ 33.505374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.506174] kthread+0x24c/0x2d0 [ 33.506837] ret_from_fork+0x10/0x20 [ 33.507717] [ 33.508039] The buggy address belongs to the object at fff00000c5921ac0 [ 33.508039] which belongs to the cache kmalloc-32 of size 32 [ 33.509528] The buggy address is located 0 bytes to the right of [ 33.509528] allocated 24-byte region [fff00000c5921ac0, fff00000c5921ad8) [ 33.510953] [ 33.511363] The buggy address belongs to the physical page: [ 33.512029] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105921 [ 33.513352] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.514214] page_type: f5(slab) [ 33.514728] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 33.515915] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 33.516860] page dumped because: kasan: bad access detected [ 33.517497] [ 33.517874] Memory state around the buggy address: [ 33.518574] fff00000c5921980: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc [ 33.519712] fff00000c5921a00: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc [ 33.520750] >fff00000c5921a80: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 33.521777] ^ [ 33.522573] fff00000c5921b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.523611] fff00000c5921b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.524632] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 33.427807] ================================================================== [ 33.429104] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2e4/0x348 [ 33.430088] Read of size 1 at addr ffff800080a97bea by task kunit_try_catch/242 [ 33.431474] [ 33.431955] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 33.433415] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.434400] Hardware name: linux,dummy-virt (DT) [ 33.435723] Call trace: [ 33.436104] show_stack+0x20/0x38 (C) [ 33.436670] dump_stack_lvl+0x8c/0xd0 [ 33.437345] print_report+0x2fc/0x5e0 [ 33.437957] kasan_report+0xc8/0x118 [ 33.438588] __asan_report_load1_noabort+0x20/0x30 [ 33.439280] kasan_alloca_oob_right+0x2e4/0x348 [ 33.440310] kunit_try_run_case+0x14c/0x3d0 [ 33.440942] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.442027] kthread+0x24c/0x2d0 [ 33.442716] ret_from_fork+0x10/0x20 [ 33.443453] [ 33.443849] The buggy address belongs to stack of task kunit_try_catch/242 [ 33.445129] [ 33.445512] The buggy address belongs to the virtual mapping at [ 33.445512] [ffff800080a90000, ffff800080a99000) created by: [ 33.445512] kernel_clone+0x140/0x788 [ 33.447389] [ 33.447751] The buggy address belongs to the physical page: [ 33.448450] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 33.449455] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.450617] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.452059] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.453224] page dumped because: kasan: bad access detected [ 33.454027] [ 33.454389] Memory state around the buggy address: [ 33.455973] ffff800080a97a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.456787] ffff800080a97b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.457613] >ffff800080a97b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 33.458596] ^ [ 33.459823] ffff800080a97c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 [ 33.461006] ffff800080a97c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 [ 33.461874] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 33.383761] ================================================================== [ 33.385051] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 33.385982] Read of size 1 at addr ffff800080a57bdf by task kunit_try_catch/240 [ 33.387515] [ 33.387807] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 33.389297] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.389961] Hardware name: linux,dummy-virt (DT) [ 33.390753] Call trace: [ 33.391635] show_stack+0x20/0x38 (C) [ 33.392111] dump_stack_lvl+0x8c/0xd0 [ 33.393009] print_report+0x2fc/0x5e0 [ 33.393998] kasan_report+0xc8/0x118 [ 33.394821] __asan_report_load1_noabort+0x20/0x30 [ 33.395933] kasan_alloca_oob_left+0x2b8/0x310 [ 33.396662] kunit_try_run_case+0x14c/0x3d0 [ 33.397374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.398174] kthread+0x24c/0x2d0 [ 33.398759] ret_from_fork+0x10/0x20 [ 33.399492] [ 33.399824] The buggy address belongs to stack of task kunit_try_catch/240 [ 33.400791] [ 33.401266] The buggy address belongs to the virtual mapping at [ 33.401266] [ffff800080a50000, ffff800080a59000) created by: [ 33.401266] kernel_clone+0x140/0x788 [ 33.402927] [ 33.403643] The buggy address belongs to the physical page: [ 33.404505] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105935 [ 33.405574] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.406803] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.407909] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.408574] page dumped because: kasan: bad access detected [ 33.409538] [ 33.410043] Memory state around the buggy address: [ 33.410824] ffff800080a57a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.412105] ffff800080a57b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.413005] >ffff800080a57b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 33.413819] ^ [ 33.414582] ffff800080a57c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 [ 33.416171] ffff800080a57c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 [ 33.416996] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 33.333663] ================================================================== [ 33.335240] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x230/0x268 [ 33.337309] Read of size 1 at addr ffff800080a67cba by task kunit_try_catch/238 [ 33.338190] [ 33.338638] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 33.340199] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.340799] Hardware name: linux,dummy-virt (DT) [ 33.341652] Call trace: [ 33.342289] show_stack+0x20/0x38 (C) [ 33.343343] dump_stack_lvl+0x8c/0xd0 [ 33.343971] print_report+0x2fc/0x5e0 [ 33.344584] kasan_report+0xc8/0x118 [ 33.345142] __asan_report_load1_noabort+0x20/0x30 [ 33.345721] kasan_stack_oob+0x230/0x268 [ 33.346502] kunit_try_run_case+0x14c/0x3d0 [ 33.347158] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.348221] kthread+0x24c/0x2d0 [ 33.348979] ret_from_fork+0x10/0x20 [ 33.349616] [ 33.350088] The buggy address belongs to stack of task kunit_try_catch/238 [ 33.351353] and is located at offset 138 in frame: [ 33.351990] kasan_stack_oob+0x0/0x268 [ 33.352853] [ 33.353268] This frame has 4 objects: [ 33.353917] [48, 49) '__assertion' [ 33.354063] [64, 72) 'array' [ 33.354572] [96, 112) '__assertion' [ 33.355075] [128, 138) 'stack_array' [ 33.356789] [ 33.357605] The buggy address belongs to the virtual mapping at [ 33.357605] [ffff800080a60000, ffff800080a69000) created by: [ 33.357605] kernel_clone+0x140/0x788 [ 33.359354] [ 33.359794] The buggy address belongs to the physical page: [ 33.360885] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942 [ 33.361992] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.362839] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.363992] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.364911] page dumped because: kasan: bad access detected [ 33.365620] [ 33.365971] Memory state around the buggy address: [ 33.366593] ffff800080a67b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.367862] ffff800080a67c00: 00 00 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 [ 33.368923] >ffff800080a67c80: f2 f2 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 [ 33.369924] ^ [ 33.370596] ffff800080a67d00: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 [ 33.371759] ffff800080a67d80: f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 [ 33.372745] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 33.283750] ================================================================== [ 33.285358] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 33.286212] Read of size 1 at addr ffffa03e924b202d by task kunit_try_catch/234 [ 33.287719] [ 33.288202] CPU: 0 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 33.289520] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.290066] Hardware name: linux,dummy-virt (DT) [ 33.290960] Call trace: [ 33.291761] show_stack+0x20/0x38 (C) [ 33.292513] dump_stack_lvl+0x8c/0xd0 [ 33.293194] print_report+0x2fc/0x5e0 [ 33.293950] kasan_report+0xc8/0x118 [ 33.294537] __asan_report_load1_noabort+0x20/0x30 [ 33.295533] kasan_global_oob_right+0x230/0x270 [ 33.296218] kunit_try_run_case+0x14c/0x3d0 [ 33.296894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.297742] kthread+0x24c/0x2d0 [ 33.298339] ret_from_fork+0x10/0x20 [ 33.299055] [ 33.299758] The buggy address belongs to the variable: [ 33.300369] global_array+0xd/0x40 [ 33.300959] [ 33.301382] The buggy address belongs to the virtual mapping at [ 33.301382] [ffffa03e90810000, ffffa03e92561000) created by: [ 33.301382] paging_init+0x668/0x7c8 [ 33.303204] [ 33.304282] The buggy address belongs to the physical page: [ 33.304947] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x478b2 [ 33.306107] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 33.307476] raw: 03fffe0000002000 ffffc1ffc01e2c88 ffffc1ffc01e2c88 0000000000000000 [ 33.308897] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.309997] page dumped because: kasan: bad access detected [ 33.311023] [ 33.311619] Memory state around the buggy address: [ 33.312434] ffffa03e924b1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.312854] ffffa03e924b1f80: 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9 f9 [ 33.313265] >ffffa03e924b2000: f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 [ 33.314084] ^ [ 33.314694] ffffa03e924b2080: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 [ 33.315427] ffffa03e924b2100: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.316430] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 33.178739] ================================================================== [ 33.180512] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 33.181184] Free of addr fff00000c58ffb01 by task kunit_try_catch/230 [ 33.182348] [ 33.183414] CPU: 1 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 33.185375] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.186008] Hardware name: linux,dummy-virt (DT) [ 33.186595] Call trace: [ 33.186991] show_stack+0x20/0x38 (C) [ 33.187839] dump_stack_lvl+0x8c/0xd0 [ 33.188464] print_report+0x118/0x5e0 [ 33.189432] kasan_report_invalid_free+0xb0/0xd8 [ 33.190145] check_slab_allocation+0xfc/0x108 [ 33.191385] __kasan_mempool_poison_object+0x78/0x150 [ 33.192298] mempool_free+0x28c/0x328 [ 33.193029] mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 33.193941] mempool_kmalloc_invalid_free+0xb8/0x110 [ 33.194786] kunit_try_run_case+0x14c/0x3d0 [ 33.195762] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.196965] kthread+0x24c/0x2d0 [ 33.197495] ret_from_fork+0x10/0x20 [ 33.198024] [ 33.198296] Allocated by task 230: [ 33.198729] kasan_save_stack+0x3c/0x68 [ 33.199892] kasan_save_track+0x20/0x40 [ 33.200714] kasan_save_alloc_info+0x40/0x58 [ 33.201365] __kasan_mempool_unpoison_object+0x11c/0x180 [ 33.202100] remove_element+0x130/0x1f8 [ 33.202794] mempool_alloc_preallocated+0x58/0xc0 [ 33.203970] mempool_kmalloc_invalid_free_helper+0x94/0x2a0 [ 33.205206] mempool_kmalloc_invalid_free+0xb8/0x110 [ 33.205875] kunit_try_run_case+0x14c/0x3d0 [ 33.206461] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.207509] kthread+0x24c/0x2d0 [ 33.207916] ret_from_fork+0x10/0x20 [ 33.208513] [ 33.208851] The buggy address belongs to the object at fff00000c58ffb00 [ 33.208851] which belongs to the cache kmalloc-128 of size 128 [ 33.210460] The buggy address is located 1 bytes inside of [ 33.210460] 128-byte region [fff00000c58ffb00, fff00000c58ffb80) [ 33.212424] [ 33.212895] The buggy address belongs to the physical page: [ 33.213749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ff [ 33.214847] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.215685] page_type: f5(slab) [ 33.216189] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.217778] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.218647] page dumped because: kasan: bad access detected [ 33.219259] [ 33.219857] Memory state around the buggy address: [ 33.221304] fff00000c58ffa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.222179] fff00000c58ffa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.223375] >fff00000c58ffb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.224310] ^ [ 33.225261] fff00000c58ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.226412] fff00000c58ffc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.227461] ================================================================== [ 33.238187] ================================================================== [ 33.239663] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 33.241120] Free of addr fff00000c6620001 by task kunit_try_catch/232 [ 33.242108] [ 33.242499] CPU: 0 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 33.243987] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.244540] Hardware name: linux,dummy-virt (DT) [ 33.245126] Call trace: [ 33.245590] show_stack+0x20/0x38 (C) [ 33.246219] dump_stack_lvl+0x8c/0xd0 [ 33.246797] print_report+0x118/0x5e0 [ 33.247500] kasan_report_invalid_free+0xb0/0xd8 [ 33.248169] __kasan_mempool_poison_object+0xfc/0x150 [ 33.249190] mempool_free+0x28c/0x328 [ 33.249762] mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 33.250605] mempool_kmalloc_large_invalid_free+0xb8/0x110 [ 33.251621] kunit_try_run_case+0x14c/0x3d0 [ 33.252202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.253012] kthread+0x24c/0x2d0 [ 33.253507] ret_from_fork+0x10/0x20 [ 33.254106] [ 33.254511] The buggy address belongs to the physical page: [ 33.255217] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106620 [ 33.256535] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.257453] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.258392] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.259510] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.260437] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.261503] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.262476] head: 0bfffe0000000002 ffffc1ffc3198801 ffffffffffffffff 0000000000000000 [ 33.263909] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 33.264853] page dumped because: kasan: bad access detected [ 33.265569] [ 33.265902] Memory state around the buggy address: [ 33.266661] fff00000c661ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.267822] fff00000c661ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.268587] >fff00000c6620000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.269599] ^ [ 33.270068] fff00000c6620080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.270908] fff00000c6620100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.271936] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 32.986809] ================================================================== [ 32.988402] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 32.989160] Read of size 1 at addr fff00000c6564000 by task kunit_try_catch/222 [ 32.989936] [ 32.990349] CPU: 1 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 32.992613] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.993015] Hardware name: linux,dummy-virt (DT) [ 32.994069] Call trace: [ 32.994652] show_stack+0x20/0x38 (C) [ 32.995605] dump_stack_lvl+0x8c/0xd0 [ 32.996086] print_report+0x118/0x5e0 [ 32.996539] kasan_report+0xc8/0x118 [ 32.996979] __asan_report_load1_noabort+0x20/0x30 [ 32.997401] mempool_uaf_helper+0x314/0x340 [ 32.998456] mempool_page_alloc_uaf+0xb8/0x118 [ 32.999457] kunit_try_run_case+0x14c/0x3d0 [ 33.000047] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.000748] kthread+0x24c/0x2d0 [ 33.001458] ret_from_fork+0x10/0x20 [ 33.002105] [ 33.002467] The buggy address belongs to the physical page: [ 33.003349] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106564 [ 33.004315] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.005192] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.006217] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.006750] page dumped because: kasan: bad access detected [ 33.007217] [ 33.008132] Memory state around the buggy address: [ 33.008818] fff00000c6563f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.009759] fff00000c6563f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.010681] >fff00000c6564000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.011559] ^ [ 33.012067] fff00000c6564080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.012923] fff00000c6564100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.014102] ================================================================== [ 32.857413] ================================================================== [ 32.858649] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 32.859552] Read of size 1 at addr fff00000c6564000 by task kunit_try_catch/218 [ 32.860465] [ 32.860956] CPU: 1 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 32.862165] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.863575] Hardware name: linux,dummy-virt (DT) [ 32.864242] Call trace: [ 32.864762] show_stack+0x20/0x38 (C) [ 32.865775] dump_stack_lvl+0x8c/0xd0 [ 32.866365] print_report+0x118/0x5e0 [ 32.866986] kasan_report+0xc8/0x118 [ 32.868158] __asan_report_load1_noabort+0x20/0x30 [ 32.868855] mempool_uaf_helper+0x314/0x340 [ 32.869452] mempool_kmalloc_large_uaf+0xbc/0x118 [ 32.870156] kunit_try_run_case+0x14c/0x3d0 [ 32.870885] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.872175] kthread+0x24c/0x2d0 [ 32.872770] ret_from_fork+0x10/0x20 [ 32.873506] [ 32.873875] The buggy address belongs to the physical page: [ 32.874647] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106564 [ 32.876050] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.877390] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.878411] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.879567] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.880799] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.881885] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.882940] head: 0bfffe0000000002 ffffc1ffc3195901 ffffffffffffffff 0000000000000000 [ 32.883900] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 32.884763] page dumped because: kasan: bad access detected [ 32.885269] [ 32.885537] Memory state around the buggy address: [ 32.886471] fff00000c6563f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.887579] fff00000c6563f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.888429] >fff00000c6564000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.889280] ^ [ 32.889968] fff00000c6564080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.890816] fff00000c6564100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.892421] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 32.908120] ================================================================== [ 32.909748] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 32.910767] Read of size 1 at addr fff00000c5945240 by task kunit_try_catch/220 [ 32.912358] [ 32.912801] CPU: 1 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 32.914043] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.914717] Hardware name: linux,dummy-virt (DT) [ 32.915601] Call trace: [ 32.916607] show_stack+0x20/0x38 (C) [ 32.917135] dump_stack_lvl+0x8c/0xd0 [ 32.917677] print_report+0x118/0x5e0 [ 32.918286] kasan_report+0xc8/0x118 [ 32.918804] __asan_report_load1_noabort+0x20/0x30 [ 32.919756] mempool_uaf_helper+0x314/0x340 [ 32.920782] mempool_slab_uaf+0xb8/0x110 [ 32.921493] kunit_try_run_case+0x14c/0x3d0 [ 32.922041] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.923074] kthread+0x24c/0x2d0 [ 32.924004] ret_from_fork+0x10/0x20 [ 32.924783] [ 32.925060] Allocated by task 220: [ 32.925751] kasan_save_stack+0x3c/0x68 [ 32.926208] kasan_save_track+0x20/0x40 [ 32.927076] kasan_save_alloc_info+0x40/0x58 [ 32.927999] __kasan_mempool_unpoison_object+0xbc/0x180 [ 32.928890] remove_element+0x16c/0x1f8 [ 32.929970] mempool_alloc_preallocated+0x58/0xc0 [ 32.930855] mempool_uaf_helper+0xa4/0x340 [ 32.931783] mempool_slab_uaf+0xb8/0x110 [ 32.932922] kunit_try_run_case+0x14c/0x3d0 [ 32.933864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.934646] kthread+0x24c/0x2d0 [ 32.935691] ret_from_fork+0x10/0x20 [ 32.936225] [ 32.936586] Freed by task 220: [ 32.937107] kasan_save_stack+0x3c/0x68 [ 32.937996] kasan_save_track+0x20/0x40 [ 32.938642] kasan_save_free_info+0x4c/0x78 [ 32.939737] __kasan_mempool_poison_object+0xc0/0x150 [ 32.941050] mempool_free+0x28c/0x328 [ 32.941868] mempool_uaf_helper+0x104/0x340 [ 32.942674] mempool_slab_uaf+0xb8/0x110 [ 32.943713] kunit_try_run_case+0x14c/0x3d0 [ 32.944468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.945271] kthread+0x24c/0x2d0 [ 32.945872] ret_from_fork+0x10/0x20 [ 32.946425] [ 32.946787] The buggy address belongs to the object at fff00000c5945240 [ 32.946787] which belongs to the cache test_cache of size 123 [ 32.949068] The buggy address is located 0 bytes inside of [ 32.949068] freed 123-byte region [fff00000c5945240, fff00000c59452bb) [ 32.951263] [ 32.951827] The buggy address belongs to the physical page: [ 32.952490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105945 [ 32.953443] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.954271] page_type: f5(slab) [ 32.954854] raw: 0bfffe0000000000 fff00000c56f9a00 dead000000000122 0000000000000000 [ 32.956497] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 32.957402] page dumped because: kasan: bad access detected [ 32.958060] [ 32.958598] Memory state around the buggy address: [ 32.959486] fff00000c5945100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.960428] fff00000c5945180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.961257] >fff00000c5945200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 32.962138] ^ [ 32.962793] fff00000c5945280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.963898] fff00000c5945300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.964691] ================================================================== [ 32.794447] ================================================================== [ 32.795647] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 32.796575] Read of size 1 at addr fff00000c5912b00 by task kunit_try_catch/216 [ 32.797421] [ 32.797759] CPU: 1 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 32.799648] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.800621] Hardware name: linux,dummy-virt (DT) [ 32.801210] Call trace: [ 32.801652] show_stack+0x20/0x38 (C) [ 32.802938] dump_stack_lvl+0x8c/0xd0 [ 32.803482] print_report+0x118/0x5e0 [ 32.803929] kasan_report+0xc8/0x118 [ 32.804622] __asan_report_load1_noabort+0x20/0x30 [ 32.806225] mempool_uaf_helper+0x314/0x340 [ 32.807523] mempool_kmalloc_uaf+0xbc/0x118 [ 32.808108] kunit_try_run_case+0x14c/0x3d0 [ 32.808735] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.809592] kthread+0x24c/0x2d0 [ 32.810175] ret_from_fork+0x10/0x20 [ 32.810811] [ 32.811173] Allocated by task 216: [ 32.811645] kasan_save_stack+0x3c/0x68 [ 32.812394] kasan_save_track+0x20/0x40 [ 32.813083] kasan_save_alloc_info+0x40/0x58 [ 32.814252] __kasan_mempool_unpoison_object+0x11c/0x180 [ 32.815430] remove_element+0x130/0x1f8 [ 32.815991] mempool_alloc_preallocated+0x58/0xc0 [ 32.816646] mempool_uaf_helper+0xa4/0x340 [ 32.817224] mempool_kmalloc_uaf+0xbc/0x118 [ 32.817818] kunit_try_run_case+0x14c/0x3d0 [ 32.818474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.819660] kthread+0x24c/0x2d0 [ 32.820136] ret_from_fork+0x10/0x20 [ 32.820777] [ 32.821064] Freed by task 216: [ 32.821554] kasan_save_stack+0x3c/0x68 [ 32.822157] kasan_save_track+0x20/0x40 [ 32.822799] kasan_save_free_info+0x4c/0x78 [ 32.823735] __kasan_mempool_poison_object+0xc0/0x150 [ 32.824407] mempool_free+0x28c/0x328 [ 32.825015] mempool_uaf_helper+0x104/0x340 [ 32.825860] mempool_kmalloc_uaf+0xbc/0x118 [ 32.826296] kunit_try_run_case+0x14c/0x3d0 [ 32.827228] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.828115] kthread+0x24c/0x2d0 [ 32.828799] ret_from_fork+0x10/0x20 [ 32.829525] [ 32.829841] The buggy address belongs to the object at fff00000c5912b00 [ 32.829841] which belongs to the cache kmalloc-128 of size 128 [ 32.831934] The buggy address is located 0 bytes inside of [ 32.831934] freed 128-byte region [fff00000c5912b00, fff00000c5912b80) [ 32.832764] [ 32.832943] The buggy address belongs to the physical page: [ 32.833281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105912 [ 32.834066] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.834748] page_type: f5(slab) [ 32.835841] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.836932] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.838125] page dumped because: kasan: bad access detected [ 32.839264] [ 32.839710] Memory state around the buggy address: [ 32.840864] fff00000c5912a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.841694] fff00000c5912a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.842571] >fff00000c5912b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.843701] ^ [ 32.844381] fff00000c5912b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.845387] fff00000c5912c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.846252] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 32.681482] ================================================================== [ 32.682698] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.683931] Read of size 1 at addr fff00000c6566001 by task kunit_try_catch/212 [ 32.685792] [ 32.686305] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 32.687960] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.688451] Hardware name: linux,dummy-virt (DT) [ 32.689061] Call trace: [ 32.689473] show_stack+0x20/0x38 (C) [ 32.690284] dump_stack_lvl+0x8c/0xd0 [ 32.691090] print_report+0x118/0x5e0 [ 32.691831] kasan_report+0xc8/0x118 [ 32.693102] __asan_report_load1_noabort+0x20/0x30 [ 32.693636] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.693988] mempool_kmalloc_large_oob_right+0xbc/0x118 [ 32.694382] kunit_try_run_case+0x14c/0x3d0 [ 32.696475] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.697300] kthread+0x24c/0x2d0 [ 32.698048] ret_from_fork+0x10/0x20 [ 32.698720] [ 32.699059] The buggy address belongs to the physical page: [ 32.700542] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106564 [ 32.702021] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.702631] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.704131] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.705231] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.706238] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.707796] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.709502] head: 0bfffe0000000002 ffffc1ffc3195901 ffffffffffffffff 0000000000000000 [ 32.710057] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 32.710598] page dumped because: kasan: bad access detected [ 32.712229] [ 32.712789] Memory state around the buggy address: [ 32.713610] fff00000c6565f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.714542] fff00000c6565f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.716372] >fff00000c6566000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.717383] ^ [ 32.717888] fff00000c6566080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.719027] fff00000c6566100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.720119] ================================================================== [ 32.625144] ================================================================== [ 32.626690] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.628156] Read of size 1 at addr fff00000c590f073 by task kunit_try_catch/210 [ 32.629785] [ 32.630098] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 32.631983] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.633318] Hardware name: linux,dummy-virt (DT) [ 32.634255] Call trace: [ 32.634778] show_stack+0x20/0x38 (C) [ 32.635634] dump_stack_lvl+0x8c/0xd0 [ 32.636559] print_report+0x118/0x5e0 [ 32.637102] kasan_report+0xc8/0x118 [ 32.637703] __asan_report_load1_noabort+0x20/0x30 [ 32.638424] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.639484] mempool_kmalloc_oob_right+0xbc/0x118 [ 32.640150] kunit_try_run_case+0x14c/0x3d0 [ 32.640800] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.641518] kthread+0x24c/0x2d0 [ 32.642101] ret_from_fork+0x10/0x20 [ 32.642686] [ 32.642958] Allocated by task 210: [ 32.644017] kasan_save_stack+0x3c/0x68 [ 32.644874] kasan_save_track+0x20/0x40 [ 32.645529] kasan_save_alloc_info+0x40/0x58 [ 32.646347] __kasan_mempool_unpoison_object+0x11c/0x180 [ 32.647190] remove_element+0x130/0x1f8 [ 32.648177] mempool_alloc_preallocated+0x58/0xc0 [ 32.648809] mempool_oob_right_helper+0x98/0x2f0 [ 32.649524] mempool_kmalloc_oob_right+0xbc/0x118 [ 32.650247] kunit_try_run_case+0x14c/0x3d0 [ 32.650956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.651858] kthread+0x24c/0x2d0 [ 32.652666] ret_from_fork+0x10/0x20 [ 32.653269] [ 32.653841] The buggy address belongs to the object at fff00000c590f000 [ 32.653841] which belongs to the cache kmalloc-128 of size 128 [ 32.655950] The buggy address is located 0 bytes to the right of [ 32.655950] allocated 115-byte region [fff00000c590f000, fff00000c590f073) [ 32.657252] [ 32.657658] The buggy address belongs to the physical page: [ 32.658412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10590f [ 32.659439] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.660120] page_type: f5(slab) [ 32.660820] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.661990] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.663236] page dumped because: kasan: bad access detected [ 32.663940] [ 32.664257] Memory state around the buggy address: [ 32.664968] fff00000c590ef00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.665853] fff00000c590ef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.666633] >fff00000c590f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.667661] ^ [ 32.668485] fff00000c590f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.669427] fff00000c590f100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.670194] ================================================================== [ 32.734121] ================================================================== [ 32.735570] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.736843] Read of size 1 at addr fff00000c591e2bb by task kunit_try_catch/214 [ 32.737969] [ 32.738285] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 32.739499] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.740095] Hardware name: linux,dummy-virt (DT) [ 32.740615] Call trace: [ 32.741085] show_stack+0x20/0x38 (C) [ 32.741927] dump_stack_lvl+0x8c/0xd0 [ 32.742534] print_report+0x118/0x5e0 [ 32.743499] kasan_report+0xc8/0x118 [ 32.744037] __asan_report_load1_noabort+0x20/0x30 [ 32.744798] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.745488] mempool_slab_oob_right+0xb8/0x110 [ 32.746253] kunit_try_run_case+0x14c/0x3d0 [ 32.747247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.747989] kthread+0x24c/0x2d0 [ 32.748528] ret_from_fork+0x10/0x20 [ 32.749182] [ 32.749492] Allocated by task 214: [ 32.750122] kasan_save_stack+0x3c/0x68 [ 32.750701] kasan_save_track+0x20/0x40 [ 32.751675] kasan_save_alloc_info+0x40/0x58 [ 32.752292] __kasan_mempool_unpoison_object+0xbc/0x180 [ 32.753074] remove_element+0x16c/0x1f8 [ 32.753679] mempool_alloc_preallocated+0x58/0xc0 [ 32.754423] mempool_oob_right_helper+0x98/0x2f0 [ 32.755410] mempool_slab_oob_right+0xb8/0x110 [ 32.756030] kunit_try_run_case+0x14c/0x3d0 [ 32.756660] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.757898] kthread+0x24c/0x2d0 [ 32.758680] ret_from_fork+0x10/0x20 [ 32.759201] [ 32.759551] The buggy address belongs to the object at fff00000c591e240 [ 32.759551] which belongs to the cache test_cache of size 123 [ 32.761374] The buggy address is located 0 bytes to the right of [ 32.761374] allocated 123-byte region [fff00000c591e240, fff00000c591e2bb) [ 32.762848] [ 32.763427] The buggy address belongs to the physical page: [ 32.764189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591e [ 32.765208] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.766179] page_type: f5(slab) [ 32.766693] raw: 0bfffe0000000000 fff00000c59073c0 dead000000000122 0000000000000000 [ 32.767913] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 32.768835] page dumped because: kasan: bad access detected [ 32.769688] [ 32.770013] Memory state around the buggy address: [ 32.770847] fff00000c591e180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.771981] fff00000c591e200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 32.772845] >fff00000c591e280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 32.773735] ^ [ 32.774461] fff00000c591e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.776064] fff00000c591e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.777040] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 32.003779] ================================================================== [ 32.005139] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x17c/0x2f8 [ 32.006085] Read of size 1 at addr fff00000c5907140 by task kunit_try_catch/204 [ 32.007092] [ 32.007491] CPU: 0 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 32.008739] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.009424] Hardware name: linux,dummy-virt (DT) [ 32.010034] Call trace: [ 32.010504] show_stack+0x20/0x38 (C) [ 32.011097] dump_stack_lvl+0x8c/0xd0 [ 32.011657] print_report+0x118/0x5e0 [ 32.012308] kasan_report+0xc8/0x118 [ 32.012863] __kasan_check_byte+0x54/0x70 [ 32.013492] kmem_cache_destroy+0x34/0x218 [ 32.014086] kmem_cache_double_destroy+0x17c/0x2f8 [ 32.014705] kunit_try_run_case+0x14c/0x3d0 [ 32.015342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.016169] kthread+0x24c/0x2d0 [ 32.016774] ret_from_fork+0x10/0x20 [ 32.017368] [ 32.017705] Allocated by task 204: [ 32.018249] kasan_save_stack+0x3c/0x68 [ 32.018842] kasan_save_track+0x20/0x40 [ 32.019414] kasan_save_alloc_info+0x40/0x58 [ 32.020018] __kasan_slab_alloc+0xa8/0xb0 [ 32.020665] kmem_cache_alloc_noprof+0x108/0x398 [ 32.021214] __kmem_cache_create_args+0x18c/0x2b0 [ 32.021981] kmem_cache_double_destroy+0xc8/0x2f8 [ 32.022628] kunit_try_run_case+0x14c/0x3d0 [ 32.023140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.023990] kthread+0x24c/0x2d0 [ 32.024435] ret_from_fork+0x10/0x20 [ 32.024997] [ 32.025351] Freed by task 204: [ 32.025855] kasan_save_stack+0x3c/0x68 [ 32.026484] kasan_save_track+0x20/0x40 [ 32.026998] kasan_save_free_info+0x4c/0x78 [ 32.027757] __kasan_slab_free+0x6c/0x98 [ 32.028356] kmem_cache_free+0x118/0x470 [ 32.028952] slab_kmem_cache_release+0x38/0x50 [ 32.029594] kmem_cache_release+0x1c/0x30 [ 32.030169] kobject_put+0x17c/0x430 [ 32.030876] sysfs_slab_release+0x1c/0x30 [ 32.031385] kmem_cache_destroy+0x118/0x218 [ 32.032026] kmem_cache_double_destroy+0x130/0x2f8 [ 32.032581] kunit_try_run_case+0x14c/0x3d0 [ 32.033251] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.033858] kthread+0x24c/0x2d0 [ 32.034460] ret_from_fork+0x10/0x20 [ 32.034986] [ 32.035426] The buggy address belongs to the object at fff00000c5907140 [ 32.035426] which belongs to the cache kmem_cache of size 208 [ 32.036832] The buggy address is located 0 bytes inside of [ 32.036832] freed 208-byte region [fff00000c5907140, fff00000c5907210) [ 32.038152] [ 32.038458] The buggy address belongs to the physical page: [ 32.039159] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105907 [ 32.040114] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.040863] page_type: f5(slab) [ 32.041475] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 32.042381] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 32.043267] page dumped because: kasan: bad access detected [ 32.043899] [ 32.044244] Memory state around the buggy address: [ 32.044821] fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.045818] fff00000c5907080: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 32.046843] >fff00000c5907100: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 32.047668] ^ [ 32.048367] fff00000c5907180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.049247] fff00000c5907200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.050187] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 31.872408] ================================================================== [ 31.873678] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x390/0x468 [ 31.874807] Read of size 1 at addr fff00000c5917000 by task kunit_try_catch/202 [ 31.875987] [ 31.876591] CPU: 1 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.878053] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.878748] Hardware name: linux,dummy-virt (DT) [ 31.879439] Call trace: [ 31.879863] show_stack+0x20/0x38 (C) [ 31.880839] dump_stack_lvl+0x8c/0xd0 [ 31.881473] print_report+0x118/0x5e0 [ 31.882200] kasan_report+0xc8/0x118 [ 31.882904] __asan_report_load1_noabort+0x20/0x30 [ 31.883992] kmem_cache_rcu_uaf+0x390/0x468 [ 31.884702] kunit_try_run_case+0x14c/0x3d0 [ 31.885515] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.886399] kthread+0x24c/0x2d0 [ 31.886953] ret_from_fork+0x10/0x20 [ 31.887832] [ 31.888470] Allocated by task 202: [ 31.888986] kasan_save_stack+0x3c/0x68 [ 31.889559] kasan_save_track+0x20/0x40 [ 31.890159] kasan_save_alloc_info+0x40/0x58 [ 31.890768] __kasan_slab_alloc+0xa8/0xb0 [ 31.891887] kmem_cache_alloc_noprof+0x108/0x398 [ 31.892380] kmem_cache_rcu_uaf+0x12c/0x468 [ 31.893476] kunit_try_run_case+0x14c/0x3d0 [ 31.894269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.895007] kthread+0x24c/0x2d0 [ 31.895641] ret_from_fork+0x10/0x20 [ 31.896622] [ 31.897048] Freed by task 0: [ 31.897646] kasan_save_stack+0x3c/0x68 [ 31.898488] kasan_save_track+0x20/0x40 [ 31.899443] kasan_save_free_info+0x4c/0x78 [ 31.900094] __kasan_slab_free+0x6c/0x98 [ 31.900660] slab_free_after_rcu_debug+0xd4/0x2f8 [ 31.901279] rcu_core+0x9f4/0x1e20 [ 31.901944] rcu_core_si+0x18/0x30 [ 31.902748] handle_softirqs+0x374/0xb20 [ 31.903851] __do_softirq+0x1c/0x28 [ 31.904623] [ 31.905072] Last potentially related work creation: [ 31.905894] kasan_save_stack+0x3c/0x68 [ 31.906637] kasan_record_aux_stack+0xb4/0xc8 [ 31.907475] kmem_cache_free+0x28c/0x470 [ 31.908364] kmem_cache_rcu_uaf+0x16c/0x468 [ 31.909172] kunit_try_run_case+0x14c/0x3d0 [ 31.909901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.911356] kthread+0x24c/0x2d0 [ 31.911911] ret_from_fork+0x10/0x20 [ 31.912358] [ 31.912742] The buggy address belongs to the object at fff00000c5917000 [ 31.912742] which belongs to the cache test_cache of size 200 [ 31.914555] The buggy address is located 0 bytes inside of [ 31.914555] freed 200-byte region [fff00000c5917000, fff00000c59170c8) [ 31.916440] [ 31.917008] The buggy address belongs to the physical page: [ 31.917762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105917 [ 31.918744] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.919895] page_type: f5(slab) [ 31.920395] raw: 0bfffe0000000000 fff00000c56f9780 dead000000000122 0000000000000000 [ 31.921416] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 31.922436] page dumped because: kasan: bad access detected [ 31.923090] [ 31.923442] Memory state around the buggy address: [ 31.924449] fff00000c5916f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.925435] fff00000c5916f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.926283] >fff00000c5917000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.927522] ^ [ 31.928026] fff00000c5917080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 31.929105] fff00000c5917100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.930012] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 31.747822] ================================================================== [ 31.749175] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3b8 [ 31.749905] Free of addr fff00000c5915001 by task kunit_try_catch/200 [ 31.750716] [ 31.751164] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.752896] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.753505] Hardware name: linux,dummy-virt (DT) [ 31.754301] Call trace: [ 31.754762] show_stack+0x20/0x38 (C) [ 31.755745] dump_stack_lvl+0x8c/0xd0 [ 31.756383] print_report+0x118/0x5e0 [ 31.756942] kasan_report_invalid_free+0xb0/0xd8 [ 31.757632] check_slab_allocation+0xfc/0x108 [ 31.758365] __kasan_slab_pre_free+0x2c/0x48 [ 31.759364] kmem_cache_free+0xf0/0x470 [ 31.759947] kmem_cache_invalid_free+0x184/0x3b8 [ 31.760655] kunit_try_run_case+0x14c/0x3d0 [ 31.761273] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.762099] kthread+0x24c/0x2d0 [ 31.762573] ret_from_fork+0x10/0x20 [ 31.763594] [ 31.763887] Allocated by task 200: [ 31.764386] kasan_save_stack+0x3c/0x68 [ 31.764976] kasan_save_track+0x20/0x40 [ 31.765614] kasan_save_alloc_info+0x40/0x58 [ 31.766253] __kasan_slab_alloc+0xa8/0xb0 [ 31.766970] kmem_cache_alloc_noprof+0x108/0x398 [ 31.768044] kmem_cache_invalid_free+0x12c/0x3b8 [ 31.768630] kunit_try_run_case+0x14c/0x3d0 [ 31.769400] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.770133] kthread+0x24c/0x2d0 [ 31.770678] ret_from_fork+0x10/0x20 [ 31.771614] [ 31.771945] The buggy address belongs to the object at fff00000c5915000 [ 31.771945] which belongs to the cache test_cache of size 200 [ 31.773270] The buggy address is located 1 bytes inside of [ 31.773270] 200-byte region [fff00000c5915000, fff00000c59150c8) [ 31.774593] [ 31.774886] The buggy address belongs to the physical page: [ 31.775572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105915 [ 31.776592] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.777657] page_type: f5(slab) [ 31.778556] raw: 0bfffe0000000000 fff00000c56f9640 dead000000000122 0000000000000000 [ 31.779576] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 31.780755] page dumped because: kasan: bad access detected [ 31.781302] [ 31.781688] Memory state around the buggy address: [ 31.782424] fff00000c5914f00: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc [ 31.783493] fff00000c5914f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.784370] >fff00000c5915000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.785229] ^ [ 31.785902] fff00000c5915080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 31.786812] fff00000c5915100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.787929] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 31.674275] ================================================================== [ 31.674984] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 31.676560] Free of addr fff00000c5905000 by task kunit_try_catch/198 [ 31.677430] [ 31.677799] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.679592] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.680190] Hardware name: linux,dummy-virt (DT) [ 31.681321] Call trace: [ 31.681954] show_stack+0x20/0x38 (C) [ 31.682642] dump_stack_lvl+0x8c/0xd0 [ 31.683432] print_report+0x118/0x5e0 [ 31.684159] kasan_report_invalid_free+0xb0/0xd8 [ 31.685011] check_slab_allocation+0xd4/0x108 [ 31.685371] __kasan_slab_pre_free+0x2c/0x48 [ 31.686049] kmem_cache_free+0xf0/0x470 [ 31.686862] kmem_cache_double_free+0x190/0x3c8 [ 31.687617] kunit_try_run_case+0x14c/0x3d0 [ 31.688180] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.689108] kthread+0x24c/0x2d0 [ 31.689661] ret_from_fork+0x10/0x20 [ 31.690225] [ 31.690584] Allocated by task 198: [ 31.691005] kasan_save_stack+0x3c/0x68 [ 31.691590] kasan_save_track+0x20/0x40 [ 31.692162] kasan_save_alloc_info+0x40/0x58 [ 31.693201] __kasan_slab_alloc+0xa8/0xb0 [ 31.693769] kmem_cache_alloc_noprof+0x108/0x398 [ 31.694497] kmem_cache_double_free+0x12c/0x3c8 [ 31.695031] kunit_try_run_case+0x14c/0x3d0 [ 31.696146] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.697309] kthread+0x24c/0x2d0 [ 31.698219] ret_from_fork+0x10/0x20 [ 31.698887] [ 31.699713] Freed by task 198: [ 31.700442] kasan_save_stack+0x3c/0x68 [ 31.701172] kasan_save_track+0x20/0x40 [ 31.701803] kasan_save_free_info+0x4c/0x78 [ 31.702496] __kasan_slab_free+0x6c/0x98 [ 31.703487] kmem_cache_free+0x118/0x470 [ 31.704425] kmem_cache_double_free+0x140/0x3c8 [ 31.705162] kunit_try_run_case+0x14c/0x3d0 [ 31.705913] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.706707] kthread+0x24c/0x2d0 [ 31.707289] ret_from_fork+0x10/0x20 [ 31.707905] [ 31.708202] The buggy address belongs to the object at fff00000c5905000 [ 31.708202] which belongs to the cache test_cache of size 200 [ 31.709980] The buggy address is located 0 bytes inside of [ 31.709980] 200-byte region [fff00000c5905000, fff00000c59050c8) [ 31.711838] [ 31.712183] The buggy address belongs to the physical page: [ 31.713058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105905 [ 31.714114] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.715407] page_type: f5(slab) [ 31.716027] raw: 0bfffe0000000000 fff00000c5907000 dead000000000122 0000000000000000 [ 31.717293] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 31.718645] page dumped because: kasan: bad access detected [ 31.719884] [ 31.720286] Memory state around the buggy address: [ 31.721467] fff00000c5904f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.722649] fff00000c5904f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.723088] >fff00000c5905000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.724124] ^ [ 31.724583] fff00000c5905080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 31.725596] fff00000c5905100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.726596] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 31.591556] ================================================================== [ 31.593348] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x33c/0x428 [ 31.594184] Read of size 1 at addr fff00000c59070c8 by task kunit_try_catch/196 [ 31.596253] [ 31.596663] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.597785] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.598270] Hardware name: linux,dummy-virt (DT) [ 31.599151] Call trace: [ 31.599868] show_stack+0x20/0x38 (C) [ 31.600438] dump_stack_lvl+0x8c/0xd0 [ 31.601010] print_report+0x118/0x5e0 [ 31.601551] kasan_report+0xc8/0x118 [ 31.602191] __asan_report_load1_noabort+0x20/0x30 [ 31.602890] kmem_cache_oob+0x33c/0x428 [ 31.603864] kunit_try_run_case+0x14c/0x3d0 [ 31.604520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.605421] kthread+0x24c/0x2d0 [ 31.605976] ret_from_fork+0x10/0x20 [ 31.606633] [ 31.606917] Allocated by task 196: [ 31.607509] kasan_save_stack+0x3c/0x68 [ 31.608090] kasan_save_track+0x20/0x40 [ 31.608744] kasan_save_alloc_info+0x40/0x58 [ 31.609700] __kasan_slab_alloc+0xa8/0xb0 [ 31.610345] kmem_cache_alloc_noprof+0x108/0x398 [ 31.610879] kmem_cache_oob+0x12c/0x428 [ 31.611664] kunit_try_run_case+0x14c/0x3d0 [ 31.612797] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.613919] kthread+0x24c/0x2d0 [ 31.614446] ret_from_fork+0x10/0x20 [ 31.615092] [ 31.615444] The buggy address belongs to the object at fff00000c5907000 [ 31.615444] which belongs to the cache test_cache of size 200 [ 31.616703] The buggy address is located 0 bytes to the right of [ 31.616703] allocated 200-byte region [fff00000c5907000, fff00000c59070c8) [ 31.618839] [ 31.619592] The buggy address belongs to the physical page: [ 31.620381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105907 [ 31.621653] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.622721] page_type: f5(slab) [ 31.623431] raw: 0bfffe0000000000 fff00000c0ffddc0 dead000000000122 0000000000000000 [ 31.624321] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 31.625707] page dumped because: kasan: bad access detected [ 31.626500] [ 31.627033] Memory state around the buggy address: [ 31.627977] fff00000c5906f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.629031] fff00000c5907000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.629972] >fff00000c5907080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 31.630782] ^ [ 31.632523] fff00000c5907100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.633572] fff00000c5907180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.634707] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[ 31.040265] ================================================================== [ 31.041188] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 31.042006] Free of addr fff00000c63183a0 by task kunit_try_catch/181 [ 31.042809] [ 31.043311] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.044864] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.045558] Hardware name: linux,dummy-virt (DT) [ 31.046569] Call trace: [ 31.047240] show_stack+0x20/0x38 (C) [ 31.047791] dump_stack_lvl+0x8c/0xd0 [ 31.048318] print_report+0x118/0x5e0 [ 31.048979] kasan_report_invalid_free+0xb0/0xd8 [ 31.049753] check_slab_allocation+0xd4/0x108 [ 31.050416] __kasan_slab_pre_free+0x2c/0x48 [ 31.051370] kfree+0xe8/0x3c8 [ 31.051831] kfree_sensitive+0x3c/0xb0 [ 31.052493] kmalloc_double_kzfree+0x168/0x308 [ 31.053171] kunit_try_run_case+0x14c/0x3d0 [ 31.053838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.054506] kthread+0x24c/0x2d0 [ 31.055572] ret_from_fork+0x10/0x20 [ 31.056205] [ 31.056529] Allocated by task 181: [ 31.057131] kasan_save_stack+0x3c/0x68 [ 31.057739] kasan_save_track+0x20/0x40 [ 31.058430] kasan_save_alloc_info+0x40/0x58 [ 31.059414] __kasan_kmalloc+0xd4/0xd8 [ 31.060429] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.061150] kmalloc_double_kzfree+0xb8/0x308 [ 31.061743] kunit_try_run_case+0x14c/0x3d0 [ 31.062379] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.063484] kthread+0x24c/0x2d0 [ 31.064029] ret_from_fork+0x10/0x20 [ 31.064849] [ 31.065133] Freed by task 181: [ 31.065846] kasan_save_stack+0x3c/0x68 [ 31.066651] kasan_save_track+0x20/0x40 [ 31.067604] kasan_save_free_info+0x4c/0x78 [ 31.068216] __kasan_slab_free+0x6c/0x98 [ 31.068692] kfree+0x114/0x3c8 [ 31.069471] kfree_sensitive+0x80/0xb0 [ 31.070089] kmalloc_double_kzfree+0x11c/0x308 [ 31.070792] kunit_try_run_case+0x14c/0x3d0 [ 31.071759] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.072444] kthread+0x24c/0x2d0 [ 31.073037] ret_from_fork+0x10/0x20 [ 31.073627] [ 31.074018] The buggy address belongs to the object at fff00000c63183a0 [ 31.074018] which belongs to the cache kmalloc-16 of size 16 [ 31.075841] The buggy address is located 0 bytes inside of [ 31.075841] 16-byte region [fff00000c63183a0, fff00000c63183b0) [ 31.077185] [ 31.077562] The buggy address belongs to the physical page: [ 31.078371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106318 [ 31.079874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.080742] page_type: f5(slab) [ 31.081195] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 31.082774] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.083678] page dumped because: kasan: bad access detected [ 31.084024] [ 31.084190] Memory state around the buggy address: [ 31.084827] fff00000c6318280: fa fb fc fc fa fb fc fc 00 02 fc fc 00 02 fc fc [ 31.085571] fff00000c6318300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.086626] >fff00000c6318380: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 31.087682] ^ [ 31.088388] fff00000c6318400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.089262] fff00000c6318480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.090482] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 30.987439] ================================================================== [ 30.989166] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 30.990064] Read of size 1 at addr fff00000c63183a0 by task kunit_try_catch/181 [ 30.992012] [ 30.992303] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.993851] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.994625] Hardware name: linux,dummy-virt (DT) [ 30.995508] Call trace: [ 30.995885] show_stack+0x20/0x38 (C) [ 30.996656] dump_stack_lvl+0x8c/0xd0 [ 30.997465] print_report+0x118/0x5e0 [ 30.998184] kasan_report+0xc8/0x118 [ 30.998821] __kasan_check_byte+0x54/0x70 [ 30.999728] kfree_sensitive+0x30/0xb0 [ 31.000364] kmalloc_double_kzfree+0x168/0x308 [ 31.001025] kunit_try_run_case+0x14c/0x3d0 [ 31.001760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.002582] kthread+0x24c/0x2d0 [ 31.003462] ret_from_fork+0x10/0x20 [ 31.003957] [ 31.004262] Allocated by task 181: [ 31.004756] kasan_save_stack+0x3c/0x68 [ 31.005425] kasan_save_track+0x20/0x40 [ 31.006002] kasan_save_alloc_info+0x40/0x58 [ 31.006590] __kasan_kmalloc+0xd4/0xd8 [ 31.007536] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.008167] kmalloc_double_kzfree+0xb8/0x308 [ 31.008849] kunit_try_run_case+0x14c/0x3d0 [ 31.009764] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.010517] kthread+0x24c/0x2d0 [ 31.011019] ret_from_fork+0x10/0x20 [ 31.012138] [ 31.012435] Freed by task 181: [ 31.013107] kasan_save_stack+0x3c/0x68 [ 31.013959] kasan_save_track+0x20/0x40 [ 31.014534] kasan_save_free_info+0x4c/0x78 [ 31.015174] __kasan_slab_free+0x6c/0x98 [ 31.015807] kfree+0x114/0x3c8 [ 31.016657] kfree_sensitive+0x80/0xb0 [ 31.017296] kmalloc_double_kzfree+0x11c/0x308 [ 31.017912] kunit_try_run_case+0x14c/0x3d0 [ 31.018526] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.019447] kthread+0x24c/0x2d0 [ 31.020041] ret_from_fork+0x10/0x20 [ 31.020666] [ 31.020968] The buggy address belongs to the object at fff00000c63183a0 [ 31.020968] which belongs to the cache kmalloc-16 of size 16 [ 31.022647] The buggy address is located 0 bytes inside of [ 31.022647] freed 16-byte region [fff00000c63183a0, fff00000c63183b0) [ 31.024295] [ 31.024650] The buggy address belongs to the physical page: [ 31.025581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106318 [ 31.026604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.027835] page_type: f5(slab) [ 31.028601] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 31.029536] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.030617] page dumped because: kasan: bad access detected [ 31.031300] [ 31.031595] Memory state around the buggy address: [ 31.032272] fff00000c6318280: fa fb fc fc fa fb fc fc 00 02 fc fc 00 02 fc fc [ 31.033601] fff00000c6318300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.034481] >fff00000c6318380: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 31.035533] ^ [ 31.036107] fff00000c6318400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.037008] fff00000c6318480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.037721] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 30.848512] ================================================================== [ 30.849869] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 30.850914] Write of size 33 at addr fff00000c590c280 by task kunit_try_catch/175 [ 30.853300] [ 30.853626] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.855656] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.856672] Hardware name: linux,dummy-virt (DT) [ 30.857432] Call trace: [ 30.857856] show_stack+0x20/0x38 (C) [ 30.858555] dump_stack_lvl+0x8c/0xd0 [ 30.859164] print_report+0x118/0x5e0 [ 30.859827] kasan_report+0xc8/0x118 [ 30.860499] kasan_check_range+0x100/0x1a8 [ 30.861183] __asan_memset+0x34/0x78 [ 30.862159] kmalloc_uaf_memset+0x170/0x310 [ 30.862713] kunit_try_run_case+0x14c/0x3d0 [ 30.863778] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.865210] kthread+0x24c/0x2d0 [ 30.865899] ret_from_fork+0x10/0x20 [ 30.866466] [ 30.866785] Allocated by task 175: [ 30.868211] kasan_save_stack+0x3c/0x68 [ 30.869133] kasan_save_track+0x20/0x40 [ 30.869943] kasan_save_alloc_info+0x40/0x58 [ 30.870650] __kasan_kmalloc+0xd4/0xd8 [ 30.871578] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.872650] kmalloc_uaf_memset+0xb8/0x310 [ 30.873271] kunit_try_run_case+0x14c/0x3d0 [ 30.874226] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.875212] kthread+0x24c/0x2d0 [ 30.875714] ret_from_fork+0x10/0x20 [ 30.877000] [ 30.877562] Freed by task 175: [ 30.878044] kasan_save_stack+0x3c/0x68 [ 30.878615] kasan_save_track+0x20/0x40 [ 30.879863] kasan_save_free_info+0x4c/0x78 [ 30.880413] __kasan_slab_free+0x6c/0x98 [ 30.881244] kfree+0x114/0x3c8 [ 30.881911] kmalloc_uaf_memset+0x11c/0x310 [ 30.882690] kunit_try_run_case+0x14c/0x3d0 [ 30.883558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.884555] kthread+0x24c/0x2d0 [ 30.885233] ret_from_fork+0x10/0x20 [ 30.885673] [ 30.885925] The buggy address belongs to the object at fff00000c590c280 [ 30.885925] which belongs to the cache kmalloc-64 of size 64 [ 30.886836] The buggy address is located 0 bytes inside of [ 30.886836] freed 64-byte region [fff00000c590c280, fff00000c590c2c0) [ 30.889298] [ 30.889713] The buggy address belongs to the physical page: [ 30.890404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10590c [ 30.891812] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.893198] page_type: f5(slab) [ 30.894257] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.894930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.896771] page dumped because: kasan: bad access detected [ 30.897552] [ 30.897921] Memory state around the buggy address: [ 30.898727] fff00000c590c180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.899744] fff00000c590c200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.901381] >fff00000c590c280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.902865] ^ [ 30.903553] fff00000c590c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.904297] fff00000c590c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.905138] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 30.729667] ================================================================== [ 30.730901] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e8 [ 30.731810] Read of size 64 at addr fff00000c590c104 by task kunit_try_catch/171 [ 30.733177] [ 30.734113] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.735752] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.736364] Hardware name: linux,dummy-virt (DT) [ 30.736958] Call trace: [ 30.737299] show_stack+0x20/0x38 (C) [ 30.738178] dump_stack_lvl+0x8c/0xd0 [ 30.738875] print_report+0x118/0x5e0 [ 30.740175] kasan_report+0xc8/0x118 [ 30.740754] kasan_check_range+0x100/0x1a8 [ 30.741353] __asan_memmove+0x3c/0x98 [ 30.742018] kmalloc_memmove_invalid_size+0x154/0x2e8 [ 30.743251] kunit_try_run_case+0x14c/0x3d0 [ 30.743895] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.744655] kthread+0x24c/0x2d0 [ 30.745153] ret_from_fork+0x10/0x20 [ 30.745838] [ 30.746123] Allocated by task 171: [ 30.746656] kasan_save_stack+0x3c/0x68 [ 30.748030] kasan_save_track+0x20/0x40 [ 30.748718] kasan_save_alloc_info+0x40/0x58 [ 30.749362] __kasan_kmalloc+0xd4/0xd8 [ 30.749998] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.750859] kmalloc_memmove_invalid_size+0xb0/0x2e8 [ 30.751842] kunit_try_run_case+0x14c/0x3d0 [ 30.752417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.753278] kthread+0x24c/0x2d0 [ 30.753809] ret_from_fork+0x10/0x20 [ 30.754461] [ 30.754806] The buggy address belongs to the object at fff00000c590c100 [ 30.754806] which belongs to the cache kmalloc-64 of size 64 [ 30.756803] The buggy address is located 4 bytes inside of [ 30.756803] allocated 64-byte region [fff00000c590c100, fff00000c590c140) [ 30.758014] [ 30.758392] The buggy address belongs to the physical page: [ 30.759070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10590c [ 30.760078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.760890] page_type: f5(slab) [ 30.761772] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.762696] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.763795] page dumped because: kasan: bad access detected [ 30.764470] [ 30.764763] Memory state around the buggy address: [ 30.765469] fff00000c590c000: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 30.767865] fff00000c590c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.768778] >fff00000c590c100: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.769738] ^ [ 30.770303] fff00000c590c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.772316] fff00000c590c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.773104] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 30.676982] ================================================================== [ 30.678278] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 30.679118] Read of size 18446744073709551614 at addr fff00000c634df84 by task kunit_try_catch/169 [ 30.681159] [ 30.681483] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.682596] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.683617] Hardware name: linux,dummy-virt (DT) [ 30.684530] Call trace: [ 30.684990] show_stack+0x20/0x38 (C) [ 30.685671] dump_stack_lvl+0x8c/0xd0 [ 30.686314] print_report+0x118/0x5e0 [ 30.687454] kasan_report+0xc8/0x118 [ 30.688050] kasan_check_range+0x100/0x1a8 [ 30.688675] __asan_memmove+0x3c/0x98 [ 30.689274] kmalloc_memmove_negative_size+0x154/0x2e0 [ 30.690060] kunit_try_run_case+0x14c/0x3d0 [ 30.690675] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.691886] kthread+0x24c/0x2d0 [ 30.692429] ret_from_fork+0x10/0x20 [ 30.693048] [ 30.693473] Allocated by task 169: [ 30.693979] kasan_save_stack+0x3c/0x68 [ 30.694596] kasan_save_track+0x20/0x40 [ 30.695244] kasan_save_alloc_info+0x40/0x58 [ 30.695879] __kasan_kmalloc+0xd4/0xd8 [ 30.696468] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.697176] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 30.698280] kunit_try_run_case+0x14c/0x3d0 [ 30.699358] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.700248] kthread+0x24c/0x2d0 [ 30.700753] ret_from_fork+0x10/0x20 [ 30.701286] [ 30.701702] The buggy address belongs to the object at fff00000c634df80 [ 30.701702] which belongs to the cache kmalloc-64 of size 64 [ 30.703580] The buggy address is located 4 bytes inside of [ 30.703580] 64-byte region [fff00000c634df80, fff00000c634dfc0) [ 30.704814] [ 30.705135] The buggy address belongs to the physical page: [ 30.706049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10634d [ 30.706950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.708611] page_type: f5(slab) [ 30.709189] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.710210] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.711190] page dumped because: kasan: bad access detected [ 30.711821] [ 30.712180] Memory state around the buggy address: [ 30.712839] fff00000c634de80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.714361] fff00000c634df00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.715254] >fff00000c634df80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.716113] ^ [ 30.716627] fff00000c634e000: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 30.718295] fff00000c634e080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 30.719039] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset
[ 30.464501] ================================================================== [ 30.465637] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 30.466495] Write of size 2 at addr fff00000c58d3877 by task kunit_try_catch/161 [ 30.467226] [ 30.467648] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.468886] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.470153] Hardware name: linux,dummy-virt (DT) [ 30.471435] Call trace: [ 30.472193] show_stack+0x20/0x38 (C) [ 30.473615] dump_stack_lvl+0x8c/0xd0 [ 30.474509] print_report+0x118/0x5e0 [ 30.475423] kasan_report+0xc8/0x118 [ 30.476416] kasan_check_range+0x100/0x1a8 [ 30.477343] __asan_memset+0x34/0x78 [ 30.477953] kmalloc_oob_memset_2+0x150/0x2f8 [ 30.478682] kunit_try_run_case+0x14c/0x3d0 [ 30.479813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.480919] kthread+0x24c/0x2d0 [ 30.481355] ret_from_fork+0x10/0x20 [ 30.481797] [ 30.482238] Allocated by task 161: [ 30.482781] kasan_save_stack+0x3c/0x68 [ 30.483295] kasan_save_track+0x20/0x40 [ 30.484096] kasan_save_alloc_info+0x40/0x58 [ 30.484836] __kasan_kmalloc+0xd4/0xd8 [ 30.485482] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.486423] kmalloc_oob_memset_2+0xb0/0x2f8 [ 30.487753] kunit_try_run_case+0x14c/0x3d0 [ 30.488977] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.489606] kthread+0x24c/0x2d0 [ 30.490495] ret_from_fork+0x10/0x20 [ 30.491156] [ 30.491510] The buggy address belongs to the object at fff00000c58d3800 [ 30.491510] which belongs to the cache kmalloc-128 of size 128 [ 30.493592] The buggy address is located 119 bytes inside of [ 30.493592] allocated 120-byte region [fff00000c58d3800, fff00000c58d3878) [ 30.494898] [ 30.495740] The buggy address belongs to the physical page: [ 30.496404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d3 [ 30.497904] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.498915] page_type: f5(slab) [ 30.499713] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.500902] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.501963] page dumped because: kasan: bad access detected [ 30.502774] [ 30.503412] Memory state around the buggy address: [ 30.504191] fff00000c58d3700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 30.505386] fff00000c58d3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.506495] >fff00000c58d3800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.508099] ^ [ 30.509063] fff00000c58d3880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.509797] fff00000c58d3900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.511209] ================================================================== [ 30.521596] ================================================================== [ 30.522676] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 30.523608] Write of size 4 at addr fff00000c58d3975 by task kunit_try_catch/163 [ 30.524698] [ 30.525136] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.526789] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.527412] Hardware name: linux,dummy-virt (DT) [ 30.527991] Call trace: [ 30.528482] show_stack+0x20/0x38 (C) [ 30.529105] dump_stack_lvl+0x8c/0xd0 [ 30.529862] print_report+0x118/0x5e0 [ 30.530397] kasan_report+0xc8/0x118 [ 30.531111] kasan_check_range+0x100/0x1a8 [ 30.531893] __asan_memset+0x34/0x78 [ 30.532622] kmalloc_oob_memset_4+0x150/0x300 [ 30.533247] kunit_try_run_case+0x14c/0x3d0 [ 30.534640] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.535417] kthread+0x24c/0x2d0 [ 30.535971] ret_from_fork+0x10/0x20 [ 30.536552] [ 30.536975] Allocated by task 163: [ 30.537452] kasan_save_stack+0x3c/0x68 [ 30.538122] kasan_save_track+0x20/0x40 [ 30.538751] kasan_save_alloc_info+0x40/0x58 [ 30.540119] __kasan_kmalloc+0xd4/0xd8 [ 30.540704] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.541380] kmalloc_oob_memset_4+0xb0/0x300 [ 30.541930] kunit_try_run_case+0x14c/0x3d0 [ 30.542603] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.543633] kthread+0x24c/0x2d0 [ 30.544412] ret_from_fork+0x10/0x20 [ 30.544990] [ 30.545311] The buggy address belongs to the object at fff00000c58d3900 [ 30.545311] which belongs to the cache kmalloc-128 of size 128 [ 30.546756] The buggy address is located 117 bytes inside of [ 30.546756] allocated 120-byte region [fff00000c58d3900, fff00000c58d3978) [ 30.549746] [ 30.550176] The buggy address belongs to the physical page: [ 30.550882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d3 [ 30.552644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.553498] page_type: f5(slab) [ 30.554160] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.555281] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.556228] page dumped because: kasan: bad access detected [ 30.557343] [ 30.557745] Memory state around the buggy address: [ 30.558491] fff00000c58d3800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.559639] fff00000c58d3880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.560947] >fff00000c58d3900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.561738] ^ [ 30.562478] fff00000c58d3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.563872] fff00000c58d3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.564992] ================================================================== [ 30.574914] ================================================================== [ 30.576739] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 30.577761] Write of size 8 at addr fff00000c58d3a71 by task kunit_try_catch/165 [ 30.578725] [ 30.579503] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.580721] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.581513] Hardware name: linux,dummy-virt (DT) [ 30.582234] Call trace: [ 30.582643] show_stack+0x20/0x38 (C) [ 30.583294] dump_stack_lvl+0x8c/0xd0 [ 30.584145] print_report+0x118/0x5e0 [ 30.585094] kasan_report+0xc8/0x118 [ 30.585588] kasan_check_range+0x100/0x1a8 [ 30.586309] __asan_memset+0x34/0x78 [ 30.587039] kmalloc_oob_memset_8+0x150/0x2f8 [ 30.588118] kunit_try_run_case+0x14c/0x3d0 [ 30.588939] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.589764] kthread+0x24c/0x2d0 [ 30.590417] ret_from_fork+0x10/0x20 [ 30.591574] [ 30.591848] Allocated by task 165: [ 30.592492] kasan_save_stack+0x3c/0x68 [ 30.593216] kasan_save_track+0x20/0x40 [ 30.593932] kasan_save_alloc_info+0x40/0x58 [ 30.594491] __kasan_kmalloc+0xd4/0xd8 [ 30.595724] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.596550] kmalloc_oob_memset_8+0xb0/0x2f8 [ 30.597198] kunit_try_run_case+0x14c/0x3d0 [ 30.597894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.598556] kthread+0x24c/0x2d0 [ 30.599457] ret_from_fork+0x10/0x20 [ 30.599860] [ 30.600198] The buggy address belongs to the object at fff00000c58d3a00 [ 30.600198] which belongs to the cache kmalloc-128 of size 128 [ 30.602241] The buggy address is located 113 bytes inside of [ 30.602241] allocated 120-byte region [fff00000c58d3a00, fff00000c58d3a78) [ 30.604285] [ 30.604721] The buggy address belongs to the physical page: [ 30.605687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d3 [ 30.606864] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.607825] page_type: f5(slab) [ 30.608289] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.609451] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.610537] page dumped because: kasan: bad access detected [ 30.611343] [ 30.611601] Memory state around the buggy address: [ 30.612289] fff00000c58d3900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.613346] fff00000c58d3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.614180] >fff00000c58d3a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.615504] ^ [ 30.616361] fff00000c58d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.617435] fff00000c58d3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.618303] ================================================================== [ 30.628503] ================================================================== [ 30.629696] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 30.630585] Write of size 16 at addr fff00000c58d3b69 by task kunit_try_catch/167 [ 30.631362] [ 30.631738] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.632813] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.633558] Hardware name: linux,dummy-virt (DT) [ 30.634440] Call trace: [ 30.634804] show_stack+0x20/0x38 (C) [ 30.635502] dump_stack_lvl+0x8c/0xd0 [ 30.636171] print_report+0x118/0x5e0 [ 30.636893] kasan_report+0xc8/0x118 [ 30.637470] kasan_check_range+0x100/0x1a8 [ 30.638102] __asan_memset+0x34/0x78 [ 30.638790] kmalloc_oob_memset_16+0x150/0x2f8 [ 30.639440] kunit_try_run_case+0x14c/0x3d0 [ 30.640139] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.640927] kthread+0x24c/0x2d0 [ 30.641581] ret_from_fork+0x10/0x20 [ 30.642200] [ 30.642508] Allocated by task 167: [ 30.643068] kasan_save_stack+0x3c/0x68 [ 30.643791] kasan_save_track+0x20/0x40 [ 30.644405] kasan_save_alloc_info+0x40/0x58 [ 30.644975] __kasan_kmalloc+0xd4/0xd8 [ 30.645517] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.646216] kmalloc_oob_memset_16+0xb0/0x2f8 [ 30.646840] kunit_try_run_case+0x14c/0x3d0 [ 30.647451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.648176] kthread+0x24c/0x2d0 [ 30.648634] ret_from_fork+0x10/0x20 [ 30.649225] [ 30.649588] The buggy address belongs to the object at fff00000c58d3b00 [ 30.649588] which belongs to the cache kmalloc-128 of size 128 [ 30.651036] The buggy address is located 105 bytes inside of [ 30.651036] allocated 120-byte region [fff00000c58d3b00, fff00000c58d3b78) [ 30.652431] [ 30.652745] The buggy address belongs to the physical page: [ 30.653585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d3 [ 30.654525] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.655366] page_type: f5(slab) [ 30.655985] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.656853] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.657926] page dumped because: kasan: bad access detected [ 30.658559] [ 30.658889] Memory state around the buggy address: [ 30.659580] fff00000c58d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.660460] fff00000c58d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.661264] >fff00000c58d3b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.662150] ^ [ 30.663023] fff00000c58d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.663968] fff00000c58d3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.664912] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 30.409160] ================================================================== [ 30.410312] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 30.411076] Write of size 128 at addr fff00000c58e8400 by task kunit_try_catch/159 [ 30.411985] [ 30.412317] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.414922] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.415986] Hardware name: linux,dummy-virt (DT) [ 30.416607] Call trace: [ 30.417032] show_stack+0x20/0x38 (C) [ 30.417634] dump_stack_lvl+0x8c/0xd0 [ 30.418231] print_report+0x118/0x5e0 [ 30.419022] kasan_report+0xc8/0x118 [ 30.419967] kasan_check_range+0x100/0x1a8 [ 30.420596] __asan_memset+0x34/0x78 [ 30.421123] kmalloc_oob_in_memset+0x144/0x2d0 [ 30.421771] kunit_try_run_case+0x14c/0x3d0 [ 30.422697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.424063] kthread+0x24c/0x2d0 [ 30.424632] ret_from_fork+0x10/0x20 [ 30.425181] [ 30.425911] Allocated by task 159: [ 30.426444] kasan_save_stack+0x3c/0x68 [ 30.427026] kasan_save_track+0x20/0x40 [ 30.427628] kasan_save_alloc_info+0x40/0x58 [ 30.428257] __kasan_kmalloc+0xd4/0xd8 [ 30.428834] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.429486] kmalloc_oob_in_memset+0xb0/0x2d0 [ 30.430092] kunit_try_run_case+0x14c/0x3d0 [ 30.431181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.432201] kthread+0x24c/0x2d0 [ 30.433439] ret_from_fork+0x10/0x20 [ 30.433961] [ 30.434278] The buggy address belongs to the object at fff00000c58e8400 [ 30.434278] which belongs to the cache kmalloc-128 of size 128 [ 30.435998] The buggy address is located 0 bytes inside of [ 30.435998] allocated 120-byte region [fff00000c58e8400, fff00000c58e8478) [ 30.437860] [ 30.438464] The buggy address belongs to the physical page: [ 30.439605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058e8 [ 30.440609] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.441409] page_type: f5(slab) [ 30.441859] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.442889] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.443812] page dumped because: kasan: bad access detected [ 30.444556] [ 30.444912] Memory state around the buggy address: [ 30.445918] fff00000c58e8300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.446785] fff00000c58e8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.447986] >fff00000c58e8400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.448830] ^ [ 30.449705] fff00000c58e8480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.450600] fff00000c58e8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.452063] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 30.351994] ================================================================== [ 30.353151] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 30.353958] Read of size 16 at addr fff00000c5732760 by task kunit_try_catch/157 [ 30.354976] [ 30.355494] CPU: 1 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.356974] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.357515] Hardware name: linux,dummy-virt (DT) [ 30.358135] Call trace: [ 30.358947] show_stack+0x20/0x38 (C) [ 30.359700] dump_stack_lvl+0x8c/0xd0 [ 30.360283] print_report+0x118/0x5e0 [ 30.360938] kasan_report+0xc8/0x118 [ 30.361484] __asan_report_load16_noabort+0x20/0x30 [ 30.362093] kmalloc_uaf_16+0x3bc/0x438 [ 30.362760] kunit_try_run_case+0x14c/0x3d0 [ 30.363651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.364388] kthread+0x24c/0x2d0 [ 30.364978] ret_from_fork+0x10/0x20 [ 30.365503] [ 30.365873] Allocated by task 157: [ 30.366341] kasan_save_stack+0x3c/0x68 [ 30.367294] kasan_save_track+0x20/0x40 [ 30.367974] kasan_save_alloc_info+0x40/0x58 [ 30.368603] __kasan_kmalloc+0xd4/0xd8 [ 30.369127] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.369812] kmalloc_uaf_16+0x140/0x438 [ 30.370487] kunit_try_run_case+0x14c/0x3d0 [ 30.371247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.371928] kthread+0x24c/0x2d0 [ 30.372493] ret_from_fork+0x10/0x20 [ 30.373143] [ 30.373512] Freed by task 157: [ 30.373965] kasan_save_stack+0x3c/0x68 [ 30.374623] kasan_save_track+0x20/0x40 [ 30.376243] kasan_save_free_info+0x4c/0x78 [ 30.376811] __kasan_slab_free+0x6c/0x98 [ 30.377479] kfree+0x114/0x3c8 [ 30.377944] kmalloc_uaf_16+0x190/0x438 [ 30.378689] kunit_try_run_case+0x14c/0x3d0 [ 30.379446] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.380279] kthread+0x24c/0x2d0 [ 30.381163] ret_from_fork+0x10/0x20 [ 30.381667] [ 30.382025] The buggy address belongs to the object at fff00000c5732760 [ 30.382025] which belongs to the cache kmalloc-16 of size 16 [ 30.383679] The buggy address is located 0 bytes inside of [ 30.383679] freed 16-byte region [fff00000c5732760, fff00000c5732770) [ 30.385057] [ 30.385384] The buggy address belongs to the physical page: [ 30.386203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732 [ 30.387434] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.388305] page_type: f5(slab) [ 30.388776] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 30.389787] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.390732] page dumped because: kasan: bad access detected [ 30.391686] [ 30.391983] Memory state around the buggy address: [ 30.392736] fff00000c5732600: 00 02 fc fc 00 05 fc fc fa fb fc fc 00 02 fc fc [ 30.393570] fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.394455] >fff00000c5732700: fa fb fc fc 00 04 fc fc 00 00 fc fc fa fb fc fc [ 30.395686] ^ [ 30.396554] fff00000c5732780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.397625] fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.399361] ================================================================== [ 30.918257] ================================================================== [ 30.919968] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 30.920895] Read of size 1 at addr fff00000c642e3a8 by task kunit_try_catch/177 [ 30.921978] [ 30.922381] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.923787] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.924735] Hardware name: linux,dummy-virt (DT) [ 30.925552] Call trace: [ 30.926064] show_stack+0x20/0x38 (C) [ 30.926822] dump_stack_lvl+0x8c/0xd0 [ 30.927649] print_report+0x118/0x5e0 [ 30.928545] kasan_report+0xc8/0x118 [ 30.929126] __asan_report_load1_noabort+0x20/0x30 [ 30.929983] kmalloc_uaf2+0x3f4/0x468 [ 30.930550] kunit_try_run_case+0x14c/0x3d0 [ 30.931665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.932492] kthread+0x24c/0x2d0 [ 30.933053] ret_from_fork+0x10/0x20 [ 30.933755] [ 30.934182] Allocated by task 177: [ 30.934773] kasan_save_stack+0x3c/0x68 [ 30.936104] kasan_save_track+0x20/0x40 [ 30.936694] kasan_save_alloc_info+0x40/0x58 [ 30.937273] __kasan_kmalloc+0xd4/0xd8 [ 30.937809] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.938892] kmalloc_uaf2+0xc4/0x468 [ 30.939316] kunit_try_run_case+0x14c/0x3d0 [ 30.940385] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.941599] kthread+0x24c/0x2d0 [ 30.942471] ret_from_fork+0x10/0x20 [ 30.942963] [ 30.943502] Freed by task 177: [ 30.944237] kasan_save_stack+0x3c/0x68 [ 30.944959] kasan_save_track+0x20/0x40 [ 30.945600] kasan_save_free_info+0x4c/0x78 [ 30.946206] __kasan_slab_free+0x6c/0x98 [ 30.946910] kfree+0x114/0x3c8 [ 30.947448] kmalloc_uaf2+0x134/0x468 [ 30.948172] kunit_try_run_case+0x14c/0x3d0 [ 30.948850] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.949768] kthread+0x24c/0x2d0 [ 30.950408] ret_from_fork+0x10/0x20 [ 30.951115] [ 30.951388] The buggy address belongs to the object at fff00000c642e380 [ 30.951388] which belongs to the cache kmalloc-64 of size 64 [ 30.953134] The buggy address is located 40 bytes inside of [ 30.953134] freed 64-byte region [fff00000c642e380, fff00000c642e3c0) [ 30.954638] [ 30.955459] The buggy address belongs to the physical page: [ 30.955960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10642e [ 30.957093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.958053] page_type: f5(slab) [ 30.958693] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.959735] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.960690] page dumped because: kasan: bad access detected [ 30.961587] [ 30.962129] Memory state around the buggy address: [ 30.962875] fff00000c642e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.963890] fff00000c642e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.964904] >fff00000c642e380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.965899] ^ [ 30.966712] fff00000c642e400: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 30.967886] fff00000c642e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.968870] ================================================================== [ 30.785979] ================================================================== [ 30.787445] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 30.789576] Read of size 1 at addr fff00000c6318388 by task kunit_try_catch/173 [ 30.790487] [ 30.790800] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.793208] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.793869] Hardware name: linux,dummy-virt (DT) [ 30.794434] Call trace: [ 30.794895] show_stack+0x20/0x38 (C) [ 30.795945] dump_stack_lvl+0x8c/0xd0 [ 30.796618] print_report+0x118/0x5e0 [ 30.797351] kasan_report+0xc8/0x118 [ 30.798045] __asan_report_load1_noabort+0x20/0x30 [ 30.798927] kmalloc_uaf+0x300/0x338 [ 30.799841] kunit_try_run_case+0x14c/0x3d0 [ 30.800657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.801413] kthread+0x24c/0x2d0 [ 30.801960] ret_from_fork+0x10/0x20 [ 30.803584] [ 30.804520] Allocated by task 173: [ 30.805428] kasan_save_stack+0x3c/0x68 [ 30.805991] kasan_save_track+0x20/0x40 [ 30.806602] kasan_save_alloc_info+0x40/0x58 [ 30.807308] __kasan_kmalloc+0xd4/0xd8 [ 30.808424] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.808900] kmalloc_uaf+0xb8/0x338 [ 30.809298] kunit_try_run_case+0x14c/0x3d0 [ 30.810129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.811433] kthread+0x24c/0x2d0 [ 30.812045] ret_from_fork+0x10/0x20 [ 30.812729] [ 30.813071] Freed by task 173: [ 30.813591] kasan_save_stack+0x3c/0x68 [ 30.814201] kasan_save_track+0x20/0x40 [ 30.814978] kasan_save_free_info+0x4c/0x78 [ 30.815765] __kasan_slab_free+0x6c/0x98 [ 30.816198] kfree+0x114/0x3c8 [ 30.816949] kmalloc_uaf+0x11c/0x338 [ 30.817970] kunit_try_run_case+0x14c/0x3d0 [ 30.818597] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.819438] kthread+0x24c/0x2d0 [ 30.820208] ret_from_fork+0x10/0x20 [ 30.820833] [ 30.821131] The buggy address belongs to the object at fff00000c6318380 [ 30.821131] which belongs to the cache kmalloc-16 of size 16 [ 30.822688] The buggy address is located 8 bytes inside of [ 30.822688] freed 16-byte region [fff00000c6318380, fff00000c6318390) [ 30.825072] [ 30.825580] The buggy address belongs to the physical page: [ 30.826384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106318 [ 30.827178] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.828826] page_type: f5(slab) [ 30.829224] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 30.829760] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.830222] page dumped because: kasan: bad access detected [ 30.830797] [ 30.831146] Memory state around the buggy address: [ 30.832545] fff00000c6318280: fa fb fc fc fa fb fc fc 00 02 fc fc 00 02 fc fc [ 30.833236] fff00000c6318300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.834281] >fff00000c6318380: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.835771] ^ [ 30.836315] fff00000c6318400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.837213] fff00000c6318480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.838427] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob
[ 30.298633] ================================================================== [ 30.299895] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 30.300511] Write of size 16 at addr fff00000c6318340 by task kunit_try_catch/155 [ 30.302216] [ 30.302773] CPU: 0 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.304437] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.305431] Hardware name: linux,dummy-virt (DT) [ 30.306245] Call trace: [ 30.306723] show_stack+0x20/0x38 (C) [ 30.307687] dump_stack_lvl+0x8c/0xd0 [ 30.308198] print_report+0x118/0x5e0 [ 30.308779] kasan_report+0xc8/0x118 [ 30.309309] __asan_report_store16_noabort+0x20/0x30 [ 30.309980] kmalloc_oob_16+0x3a0/0x3f8 [ 30.310744] kunit_try_run_case+0x14c/0x3d0 [ 30.311626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.312740] kthread+0x24c/0x2d0 [ 30.313388] ret_from_fork+0x10/0x20 [ 30.314041] [ 30.314513] Allocated by task 155: [ 30.315140] kasan_save_stack+0x3c/0x68 [ 30.315780] kasan_save_track+0x20/0x40 [ 30.316804] kasan_save_alloc_info+0x40/0x58 [ 30.317516] __kasan_kmalloc+0xd4/0xd8 [ 30.318117] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.318846] kmalloc_oob_16+0xb4/0x3f8 [ 30.319559] kunit_try_run_case+0x14c/0x3d0 [ 30.320175] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.321422] kthread+0x24c/0x2d0 [ 30.321887] ret_from_fork+0x10/0x20 [ 30.322371] [ 30.322696] The buggy address belongs to the object at fff00000c6318340 [ 30.322696] which belongs to the cache kmalloc-16 of size 16 [ 30.324276] The buggy address is located 0 bytes inside of [ 30.324276] allocated 13-byte region [fff00000c6318340, fff00000c631834d) [ 30.325997] [ 30.326444] The buggy address belongs to the physical page: [ 30.327543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106318 [ 30.328611] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.329733] page_type: f5(slab) [ 30.330315] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 30.331650] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.332505] page dumped because: kasan: bad access detected [ 30.333418] [ 30.333883] Memory state around the buggy address: [ 30.334522] fff00000c6318200: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.336058] fff00000c6318280: fa fb fc fc fa fb fc fc 00 02 fc fc 00 02 fc fc [ 30.336894] >fff00000c6318300: fa fb fc fc fa fb fc fc 00 05 fc fc 00 00 fc fc [ 30.337931] ^ [ 30.338726] fff00000c6318380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.339882] fff00000c6318400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.340904] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 30.187707] ================================================================== [ 30.189169] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 30.189998] Read of size 1 at addr fff00000c1b68c00 by task kunit_try_catch/153 [ 30.190754] [ 30.191111] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.193546] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.194306] Hardware name: linux,dummy-virt (DT) [ 30.194861] Call trace: [ 30.195347] show_stack+0x20/0x38 (C) [ 30.195955] dump_stack_lvl+0x8c/0xd0 [ 30.196615] print_report+0x118/0x5e0 [ 30.197195] kasan_report+0xc8/0x118 [ 30.197741] __kasan_check_byte+0x54/0x70 [ 30.198252] krealloc_noprof+0x44/0x360 [ 30.198944] krealloc_uaf+0x180/0x520 [ 30.199603] kunit_try_run_case+0x14c/0x3d0 [ 30.200301] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.201111] kthread+0x24c/0x2d0 [ 30.201638] ret_from_fork+0x10/0x20 [ 30.202265] [ 30.202624] Allocated by task 153: [ 30.203096] kasan_save_stack+0x3c/0x68 [ 30.203762] kasan_save_track+0x20/0x40 [ 30.204297] kasan_save_alloc_info+0x40/0x58 [ 30.204998] __kasan_kmalloc+0xd4/0xd8 [ 30.205501] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.206221] krealloc_uaf+0xc8/0x520 [ 30.206694] kunit_try_run_case+0x14c/0x3d0 [ 30.207397] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.208048] kthread+0x24c/0x2d0 [ 30.208726] ret_from_fork+0x10/0x20 [ 30.209273] [ 30.209580] Freed by task 153: [ 30.210057] kasan_save_stack+0x3c/0x68 [ 30.210704] kasan_save_track+0x20/0x40 [ 30.211398] kasan_save_free_info+0x4c/0x78 [ 30.212008] __kasan_slab_free+0x6c/0x98 [ 30.212620] kfree+0x114/0x3c8 [ 30.213051] krealloc_uaf+0x12c/0x520 [ 30.213690] kunit_try_run_case+0x14c/0x3d0 [ 30.214287] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.215041] kthread+0x24c/0x2d0 [ 30.215515] ret_from_fork+0x10/0x20 [ 30.216158] [ 30.216530] The buggy address belongs to the object at fff00000c1b68c00 [ 30.216530] which belongs to the cache kmalloc-256 of size 256 [ 30.218196] The buggy address is located 0 bytes inside of [ 30.218196] freed 256-byte region [fff00000c1b68c00, fff00000c1b68d00) [ 30.219552] [ 30.219830] The buggy address belongs to the physical page: [ 30.220602] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b68 [ 30.221568] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.222560] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.223453] page_type: f5(slab) [ 30.223926] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.224803] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.225817] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.226852] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.227788] head: 0bfffe0000000001 ffffc1ffc306da01 ffffffffffffffff 0000000000000000 [ 30.228771] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 30.229670] page dumped because: kasan: bad access detected [ 30.230310] [ 30.230689] Memory state around the buggy address: [ 30.231413] fff00000c1b68b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.232202] fff00000c1b68b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.233037] >fff00000c1b68c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.234143] ^ [ 30.234808] fff00000c1b68c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.235853] fff00000c1b68d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.236804] ================================================================== [ 30.239465] ================================================================== [ 30.240381] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 30.241802] Read of size 1 at addr fff00000c1b68c00 by task kunit_try_catch/153 [ 30.242616] [ 30.243577] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.245110] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.245669] Hardware name: linux,dummy-virt (DT) [ 30.246319] Call trace: [ 30.246723] show_stack+0x20/0x38 (C) [ 30.247827] dump_stack_lvl+0x8c/0xd0 [ 30.248353] print_report+0x118/0x5e0 [ 30.248998] kasan_report+0xc8/0x118 [ 30.249568] __asan_report_load1_noabort+0x20/0x30 [ 30.250241] krealloc_uaf+0x4c8/0x520 [ 30.250889] kunit_try_run_case+0x14c/0x3d0 [ 30.251488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.252369] kthread+0x24c/0x2d0 [ 30.252913] ret_from_fork+0x10/0x20 [ 30.253521] [ 30.253835] Allocated by task 153: [ 30.254266] kasan_save_stack+0x3c/0x68 [ 30.254976] kasan_save_track+0x20/0x40 [ 30.255647] kasan_save_alloc_info+0x40/0x58 [ 30.256268] __kasan_kmalloc+0xd4/0xd8 [ 30.256833] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.257445] krealloc_uaf+0xc8/0x520 [ 30.257999] kunit_try_run_case+0x14c/0x3d0 [ 30.258759] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.260191] kthread+0x24c/0x2d0 [ 30.260605] ret_from_fork+0x10/0x20 [ 30.261020] [ 30.261196] Freed by task 153: [ 30.261964] kasan_save_stack+0x3c/0x68 [ 30.262647] kasan_save_track+0x20/0x40 [ 30.263126] kasan_save_free_info+0x4c/0x78 [ 30.264078] __kasan_slab_free+0x6c/0x98 [ 30.264776] kfree+0x114/0x3c8 [ 30.265408] krealloc_uaf+0x12c/0x520 [ 30.266066] kunit_try_run_case+0x14c/0x3d0 [ 30.266831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.267554] kthread+0x24c/0x2d0 [ 30.268050] ret_from_fork+0x10/0x20 [ 30.268649] [ 30.268936] The buggy address belongs to the object at fff00000c1b68c00 [ 30.268936] which belongs to the cache kmalloc-256 of size 256 [ 30.270496] The buggy address is located 0 bytes inside of [ 30.270496] freed 256-byte region [fff00000c1b68c00, fff00000c1b68d00) [ 30.271856] [ 30.272160] The buggy address belongs to the physical page: [ 30.272859] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b68 [ 30.273754] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.274806] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.275602] page_type: f5(slab) [ 30.276283] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.277487] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.278403] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.279319] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.280245] head: 0bfffe0000000001 ffffc1ffc306da01 ffffffffffffffff 0000000000000000 [ 30.281226] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 30.282273] page dumped because: kasan: bad access detected [ 30.283196] [ 30.283672] Memory state around the buggy address: [ 30.284500] fff00000c1b68b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.285345] fff00000c1b68b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.286180] >fff00000c1b68c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.286817] ^ [ 30.287204] fff00000c1b68c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.287922] fff00000c1b68d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.288781] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 30.102312] ================================================================== [ 30.103165] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 30.103999] Write of size 1 at addr fff00000c65520ea by task kunit_try_catch/151 [ 30.104849] [ 30.105378] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.106735] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.107763] Hardware name: linux,dummy-virt (DT) [ 30.109348] Call trace: [ 30.109739] show_stack+0x20/0x38 (C) [ 30.110348] dump_stack_lvl+0x8c/0xd0 [ 30.111152] print_report+0x118/0x5e0 [ 30.111893] kasan_report+0xc8/0x118 [ 30.112547] __asan_report_store1_noabort+0x20/0x30 [ 30.113189] krealloc_less_oob_helper+0xae4/0xc50 [ 30.113916] krealloc_large_less_oob+0x20/0x38 [ 30.114673] kunit_try_run_case+0x14c/0x3d0 [ 30.115486] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.116446] kthread+0x24c/0x2d0 [ 30.117189] ret_from_fork+0x10/0x20 [ 30.118157] [ 30.118679] The buggy address belongs to the physical page: [ 30.120104] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106550 [ 30.121427] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.122594] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.123891] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.125034] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.126167] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.127425] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.128443] head: 0bfffe0000000002 ffffc1ffc3195401 ffffffffffffffff 0000000000000000 [ 30.129410] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.130473] page dumped because: kasan: bad access detected [ 30.131315] [ 30.131834] Memory state around the buggy address: [ 30.132306] fff00000c6551f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.133816] fff00000c6552000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.134252] >fff00000c6552080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.135657] ^ [ 30.136713] fff00000c6552100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.137667] fff00000c6552180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.138705] ================================================================== [ 29.757363] ================================================================== [ 29.758213] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 29.759210] Write of size 1 at addr fff00000c09752da by task kunit_try_catch/147 [ 29.760531] [ 29.760822] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.762011] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.762907] Hardware name: linux,dummy-virt (DT) [ 29.763745] Call trace: [ 29.764317] show_stack+0x20/0x38 (C) [ 29.765129] dump_stack_lvl+0x8c/0xd0 [ 29.765935] print_report+0x118/0x5e0 [ 29.766714] kasan_report+0xc8/0x118 [ 29.767510] __asan_report_store1_noabort+0x20/0x30 [ 29.768406] krealloc_less_oob_helper+0xa80/0xc50 [ 29.769271] krealloc_less_oob+0x20/0x38 [ 29.770047] kunit_try_run_case+0x14c/0x3d0 [ 29.770891] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.771860] kthread+0x24c/0x2d0 [ 29.772384] ret_from_fork+0x10/0x20 [ 29.772936] [ 29.773246] Allocated by task 147: [ 29.773765] kasan_save_stack+0x3c/0x68 [ 29.774393] kasan_save_track+0x20/0x40 [ 29.775406] kasan_save_alloc_info+0x40/0x58 [ 29.776051] __kasan_krealloc+0x118/0x178 [ 29.776944] krealloc_noprof+0x128/0x360 [ 29.777600] krealloc_less_oob_helper+0x168/0xc50 [ 29.778529] krealloc_less_oob+0x20/0x38 [ 29.779254] kunit_try_run_case+0x14c/0x3d0 [ 29.779902] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.780952] kthread+0x24c/0x2d0 [ 29.781704] ret_from_fork+0x10/0x20 [ 29.782404] [ 29.782959] The buggy address belongs to the object at fff00000c0975200 [ 29.782959] which belongs to the cache kmalloc-256 of size 256 [ 29.784612] The buggy address is located 17 bytes to the right of [ 29.784612] allocated 201-byte region [fff00000c0975200, fff00000c09752c9) [ 29.786578] [ 29.787068] The buggy address belongs to the physical page: [ 29.787972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100974 [ 29.789006] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.790106] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.791169] page_type: f5(slab) [ 29.791748] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.792851] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.793814] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.794836] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.795831] head: 0bfffe0000000001 ffffc1ffc3025d01 ffffffffffffffff 0000000000000000 [ 29.796831] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 29.797814] page dumped because: kasan: bad access detected [ 29.798593] [ 29.798927] Memory state around the buggy address: [ 29.799706] fff00000c0975180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.800675] fff00000c0975200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.801615] >fff00000c0975280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 29.802576] ^ [ 29.803368] fff00000c0975300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.804414] fff00000c0975380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.805305] ================================================================== [ 29.702514] ================================================================== [ 29.703112] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 29.704165] Write of size 1 at addr fff00000c09752d0 by task kunit_try_catch/147 [ 29.705174] [ 29.705669] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.707212] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.708392] Hardware name: linux,dummy-virt (DT) [ 29.709407] Call trace: [ 29.710432] show_stack+0x20/0x38 (C) [ 29.711249] dump_stack_lvl+0x8c/0xd0 [ 29.712113] print_report+0x118/0x5e0 [ 29.712712] kasan_report+0xc8/0x118 [ 29.713221] __asan_report_store1_noabort+0x20/0x30 [ 29.713942] krealloc_less_oob_helper+0xb9c/0xc50 [ 29.714682] krealloc_less_oob+0x20/0x38 [ 29.715398] kunit_try_run_case+0x14c/0x3d0 [ 29.716815] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.717191] kthread+0x24c/0x2d0 [ 29.717841] ret_from_fork+0x10/0x20 [ 29.718378] [ 29.718770] Allocated by task 147: [ 29.719859] kasan_save_stack+0x3c/0x68 [ 29.720431] kasan_save_track+0x20/0x40 [ 29.721072] kasan_save_alloc_info+0x40/0x58 [ 29.721774] __kasan_krealloc+0x118/0x178 [ 29.722375] krealloc_noprof+0x128/0x360 [ 29.722998] krealloc_less_oob_helper+0x168/0xc50 [ 29.724163] krealloc_less_oob+0x20/0x38 [ 29.724688] kunit_try_run_case+0x14c/0x3d0 [ 29.725585] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.726493] kthread+0x24c/0x2d0 [ 29.727145] ret_from_fork+0x10/0x20 [ 29.727994] [ 29.728362] The buggy address belongs to the object at fff00000c0975200 [ 29.728362] which belongs to the cache kmalloc-256 of size 256 [ 29.729821] The buggy address is located 7 bytes to the right of [ 29.729821] allocated 201-byte region [fff00000c0975200, fff00000c09752c9) [ 29.731393] [ 29.732068] The buggy address belongs to the physical page: [ 29.732922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100974 [ 29.733969] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.735238] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.736195] page_type: f5(slab) [ 29.736705] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.737811] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.738941] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.740372] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.741531] head: 0bfffe0000000001 ffffc1ffc3025d01 ffffffffffffffff 0000000000000000 [ 29.742727] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 29.744098] page dumped because: kasan: bad access detected [ 29.745103] [ 29.745437] Memory state around the buggy address: [ 29.745984] fff00000c0975180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.746882] fff00000c0975200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.748484] >fff00000c0975280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 29.749719] ^ [ 29.750386] fff00000c0975300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.752202] fff00000c0975380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.753894] ================================================================== [ 29.646498] ================================================================== [ 29.647733] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 29.649605] Write of size 1 at addr fff00000c09752c9 by task kunit_try_catch/147 [ 29.650548] [ 29.650845] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.652198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.653109] Hardware name: linux,dummy-virt (DT) [ 29.653715] Call trace: [ 29.654160] show_stack+0x20/0x38 (C) [ 29.654899] dump_stack_lvl+0x8c/0xd0 [ 29.655482] print_report+0x118/0x5e0 [ 29.656096] kasan_report+0xc8/0x118 [ 29.656655] __asan_report_store1_noabort+0x20/0x30 [ 29.657252] krealloc_less_oob_helper+0xa48/0xc50 [ 29.658909] krealloc_less_oob+0x20/0x38 [ 29.660183] kunit_try_run_case+0x14c/0x3d0 [ 29.661637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.662807] kthread+0x24c/0x2d0 [ 29.663448] ret_from_fork+0x10/0x20 [ 29.664671] [ 29.664927] Allocated by task 147: [ 29.665243] kasan_save_stack+0x3c/0x68 [ 29.665786] kasan_save_track+0x20/0x40 [ 29.666956] kasan_save_alloc_info+0x40/0x58 [ 29.667723] __kasan_krealloc+0x118/0x178 [ 29.668297] krealloc_noprof+0x128/0x360 [ 29.668775] krealloc_less_oob_helper+0x168/0xc50 [ 29.669568] krealloc_less_oob+0x20/0x38 [ 29.670052] kunit_try_run_case+0x14c/0x3d0 [ 29.670756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.671806] kthread+0x24c/0x2d0 [ 29.672233] ret_from_fork+0x10/0x20 [ 29.673833] [ 29.674092] The buggy address belongs to the object at fff00000c0975200 [ 29.674092] which belongs to the cache kmalloc-256 of size 256 [ 29.675994] The buggy address is located 0 bytes to the right of [ 29.675994] allocated 201-byte region [fff00000c0975200, fff00000c09752c9) [ 29.678178] [ 29.678505] The buggy address belongs to the physical page: [ 29.679283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100974 [ 29.680399] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.681387] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.682223] page_type: f5(slab) [ 29.683104] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.684097] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.685472] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.686298] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.687355] head: 0bfffe0000000001 ffffc1ffc3025d01 ffffffffffffffff 0000000000000000 [ 29.688346] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 29.689261] page dumped because: kasan: bad access detected [ 29.690195] [ 29.690695] Memory state around the buggy address: [ 29.692157] fff00000c0975180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.694029] fff00000c0975200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.695959] >fff00000c0975280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 29.697700] ^ [ 29.698564] fff00000c0975300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.699917] fff00000c0975380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.700855] ================================================================== [ 30.066437] ================================================================== [ 30.067304] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 30.068523] Write of size 1 at addr fff00000c65520da by task kunit_try_catch/151 [ 30.069353] [ 30.069814] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.071072] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.072381] Hardware name: linux,dummy-virt (DT) [ 30.072997] Call trace: [ 30.073432] show_stack+0x20/0x38 (C) [ 30.074138] dump_stack_lvl+0x8c/0xd0 [ 30.075708] print_report+0x118/0x5e0 [ 30.076784] kasan_report+0xc8/0x118 [ 30.077112] __asan_report_store1_noabort+0x20/0x30 [ 30.077575] krealloc_less_oob_helper+0xa80/0xc50 [ 30.078631] krealloc_large_less_oob+0x20/0x38 [ 30.079402] kunit_try_run_case+0x14c/0x3d0 [ 30.080234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.081005] kthread+0x24c/0x2d0 [ 30.081939] ret_from_fork+0x10/0x20 [ 30.082421] [ 30.082700] The buggy address belongs to the physical page: [ 30.084165] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106550 [ 30.085104] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.085971] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.086915] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.087859] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.088806] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.090001] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.090875] head: 0bfffe0000000002 ffffc1ffc3195401 ffffffffffffffff 0000000000000000 [ 30.092181] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.093392] page dumped because: kasan: bad access detected [ 30.093994] [ 30.094363] Memory state around the buggy address: [ 30.094941] fff00000c6551f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.095877] fff00000c6552000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.096783] >fff00000c6552080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.098361] ^ [ 30.099081] fff00000c6552100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.099739] fff00000c6552180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.100894] ================================================================== [ 29.989973] ================================================================== [ 29.991671] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 29.992869] Write of size 1 at addr fff00000c65520c9 by task kunit_try_catch/151 [ 29.994232] [ 29.994601] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.996017] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.996320] Hardware name: linux,dummy-virt (DT) [ 29.996937] Call trace: [ 29.997360] show_stack+0x20/0x38 (C) [ 29.997888] dump_stack_lvl+0x8c/0xd0 [ 29.998631] print_report+0x118/0x5e0 [ 29.999717] kasan_report+0xc8/0x118 [ 30.000801] __asan_report_store1_noabort+0x20/0x30 [ 30.001514] krealloc_less_oob_helper+0xa48/0xc50 [ 30.002156] krealloc_large_less_oob+0x20/0x38 [ 30.002854] kunit_try_run_case+0x14c/0x3d0 [ 30.003629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.004436] kthread+0x24c/0x2d0 [ 30.005171] ret_from_fork+0x10/0x20 [ 30.005972] [ 30.006278] The buggy address belongs to the physical page: [ 30.007316] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106550 [ 30.008955] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.009499] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.010726] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.012171] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.013204] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.014216] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.015207] head: 0bfffe0000000002 ffffc1ffc3195401 ffffffffffffffff 0000000000000000 [ 30.016531] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.017468] page dumped because: kasan: bad access detected [ 30.018203] [ 30.018559] Memory state around the buggy address: [ 30.019420] fff00000c6551f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.020601] fff00000c6552000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.021178] >fff00000c6552080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.022072] ^ [ 30.023021] fff00000c6552100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.024202] fff00000c6552180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.025137] ================================================================== [ 29.809682] ================================================================== [ 29.810530] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 29.811607] Write of size 1 at addr fff00000c09752ea by task kunit_try_catch/147 [ 29.812708] [ 29.813048] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.814461] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.815136] Hardware name: linux,dummy-virt (DT) [ 29.815733] Call trace: [ 29.815958] show_stack+0x20/0x38 (C) [ 29.816257] dump_stack_lvl+0x8c/0xd0 [ 29.816896] print_report+0x118/0x5e0 [ 29.817572] kasan_report+0xc8/0x118 [ 29.818374] __asan_report_store1_noabort+0x20/0x30 [ 29.819262] krealloc_less_oob_helper+0xae4/0xc50 [ 29.820185] krealloc_less_oob+0x20/0x38 [ 29.821213] kunit_try_run_case+0x14c/0x3d0 [ 29.821690] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.822259] kthread+0x24c/0x2d0 [ 29.822893] ret_from_fork+0x10/0x20 [ 29.823836] [ 29.824243] Allocated by task 147: [ 29.824906] kasan_save_stack+0x3c/0x68 [ 29.825575] kasan_save_track+0x20/0x40 [ 29.826279] kasan_save_alloc_info+0x40/0x58 [ 29.827004] __kasan_krealloc+0x118/0x178 [ 29.827693] krealloc_noprof+0x128/0x360 [ 29.828481] krealloc_less_oob_helper+0x168/0xc50 [ 29.829105] krealloc_less_oob+0x20/0x38 [ 29.829682] kunit_try_run_case+0x14c/0x3d0 [ 29.830371] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.831085] kthread+0x24c/0x2d0 [ 29.831664] ret_from_fork+0x10/0x20 [ 29.832203] [ 29.832585] The buggy address belongs to the object at fff00000c0975200 [ 29.832585] which belongs to the cache kmalloc-256 of size 256 [ 29.834038] The buggy address is located 33 bytes to the right of [ 29.834038] allocated 201-byte region [fff00000c0975200, fff00000c09752c9) [ 29.835642] [ 29.836089] The buggy address belongs to the physical page: [ 29.836870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100974 [ 29.837974] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.838928] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.839816] page_type: f5(slab) [ 29.840429] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.841435] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.842484] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.843502] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.844283] head: 0bfffe0000000001 ffffc1ffc3025d01 ffffffffffffffff 0000000000000000 [ 29.845272] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 29.846244] page dumped because: kasan: bad access detected [ 29.847004] [ 29.847402] Memory state around the buggy address: [ 29.848129] fff00000c0975180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.849096] fff00000c0975200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.850027] >fff00000c0975280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 29.850959] ^ [ 29.851819] fff00000c0975300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.852783] fff00000c0975380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.853691] ================================================================== [ 29.855723] ================================================================== [ 29.856607] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 29.857579] Write of size 1 at addr fff00000c09752eb by task kunit_try_catch/147 [ 29.858643] [ 29.859177] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.861246] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.861895] Hardware name: linux,dummy-virt (DT) [ 29.862685] Call trace: [ 29.863101] show_stack+0x20/0x38 (C) [ 29.863876] dump_stack_lvl+0x8c/0xd0 [ 29.864531] print_report+0x118/0x5e0 [ 29.865151] kasan_report+0xc8/0x118 [ 29.865752] __asan_report_store1_noabort+0x20/0x30 [ 29.866529] krealloc_less_oob_helper+0xa58/0xc50 [ 29.867389] krealloc_less_oob+0x20/0x38 [ 29.868040] kunit_try_run_case+0x14c/0x3d0 [ 29.868805] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.869604] kthread+0x24c/0x2d0 [ 29.870253] ret_from_fork+0x10/0x20 [ 29.870936] [ 29.871210] Allocated by task 147: [ 29.871800] kasan_save_stack+0x3c/0x68 [ 29.872394] kasan_save_track+0x20/0x40 [ 29.872890] kasan_save_alloc_info+0x40/0x58 [ 29.873629] __kasan_krealloc+0x118/0x178 [ 29.874344] krealloc_noprof+0x128/0x360 [ 29.875017] krealloc_less_oob_helper+0x168/0xc50 [ 29.875746] krealloc_less_oob+0x20/0x38 [ 29.876385] kunit_try_run_case+0x14c/0x3d0 [ 29.877075] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.877931] kthread+0x24c/0x2d0 [ 29.878559] ret_from_fork+0x10/0x20 [ 29.879141] [ 29.879489] The buggy address belongs to the object at fff00000c0975200 [ 29.879489] which belongs to the cache kmalloc-256 of size 256 [ 29.880949] The buggy address is located 34 bytes to the right of [ 29.880949] allocated 201-byte region [fff00000c0975200, fff00000c09752c9) [ 29.882524] [ 29.883018] The buggy address belongs to the physical page: [ 29.883793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100974 [ 29.884876] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.885849] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.886771] page_type: f5(slab) [ 29.887322] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.888387] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.889392] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.890392] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.891355] head: 0bfffe0000000001 ffffc1ffc3025d01 ffffffffffffffff 0000000000000000 [ 29.892345] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 29.893292] page dumped because: kasan: bad access detected [ 29.894074] [ 29.894429] Memory state around the buggy address: [ 29.895168] fff00000c0975180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.896179] fff00000c0975200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.897051] >fff00000c0975280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 29.897969] ^ [ 29.898863] fff00000c0975300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.899888] fff00000c0975380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.900846] ================================================================== [ 30.140666] ================================================================== [ 30.141972] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 30.142829] Write of size 1 at addr fff00000c65520eb by task kunit_try_catch/151 [ 30.144241] [ 30.144664] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.145867] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.146572] Hardware name: linux,dummy-virt (DT) [ 30.147627] Call trace: [ 30.147989] show_stack+0x20/0x38 (C) [ 30.149273] dump_stack_lvl+0x8c/0xd0 [ 30.149884] print_report+0x118/0x5e0 [ 30.150451] kasan_report+0xc8/0x118 [ 30.150974] __asan_report_store1_noabort+0x20/0x30 [ 30.152033] krealloc_less_oob_helper+0xa58/0xc50 [ 30.152716] krealloc_large_less_oob+0x20/0x38 [ 30.153424] kunit_try_run_case+0x14c/0x3d0 [ 30.154104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.154823] kthread+0x24c/0x2d0 [ 30.156161] ret_from_fork+0x10/0x20 [ 30.156767] [ 30.157089] The buggy address belongs to the physical page: [ 30.157877] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106550 [ 30.158823] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.160197] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.161237] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.162263] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.163342] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.164733] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.165682] head: 0bfffe0000000002 ffffc1ffc3195401 ffffffffffffffff 0000000000000000 [ 30.166674] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.168149] page dumped because: kasan: bad access detected [ 30.168767] [ 30.169080] Memory state around the buggy address: [ 30.169616] fff00000c6551f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.170655] fff00000c6552000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.171948] >fff00000c6552080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.172986] ^ [ 30.173794] fff00000c6552100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.174860] fff00000c6552180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.176281] ================================================================== [ 30.026775] ================================================================== [ 30.028311] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 30.030817] Write of size 1 at addr fff00000c65520d0 by task kunit_try_catch/151 [ 30.032048] [ 30.032470] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.034444] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.035783] Hardware name: linux,dummy-virt (DT) [ 30.036912] Call trace: [ 30.037227] show_stack+0x20/0x38 (C) [ 30.038063] dump_stack_lvl+0x8c/0xd0 [ 30.038894] print_report+0x118/0x5e0 [ 30.039589] kasan_report+0xc8/0x118 [ 30.040307] __asan_report_store1_noabort+0x20/0x30 [ 30.041169] krealloc_less_oob_helper+0xb9c/0xc50 [ 30.041949] krealloc_large_less_oob+0x20/0x38 [ 30.042740] kunit_try_run_case+0x14c/0x3d0 [ 30.043491] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.044438] kthread+0x24c/0x2d0 [ 30.045129] ret_from_fork+0x10/0x20 [ 30.045589] [ 30.045981] The buggy address belongs to the physical page: [ 30.046832] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106550 [ 30.047855] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.049127] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.050094] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.051134] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.052149] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.053284] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.054349] head: 0bfffe0000000002 ffffc1ffc3195401 ffffffffffffffff 0000000000000000 [ 30.055261] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.056730] page dumped because: kasan: bad access detected [ 30.057123] [ 30.057289] Memory state around the buggy address: [ 30.058417] fff00000c6551f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.059198] fff00000c6552000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.060301] >fff00000c6552080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.061197] ^ [ 30.061936] fff00000c6552100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.062800] fff00000c6552180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.064483] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 29.536187] ================================================================== [ 29.537229] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680 [ 29.538044] Write of size 1 at addr fff00000c09750eb by task kunit_try_catch/145 [ 29.539005] [ 29.539544] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.540881] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.541286] Hardware name: linux,dummy-virt (DT) [ 29.542112] Call trace: [ 29.542463] show_stack+0x20/0x38 (C) [ 29.543982] dump_stack_lvl+0x8c/0xd0 [ 29.544687] print_report+0x118/0x5e0 [ 29.545318] kasan_report+0xc8/0x118 [ 29.545891] __asan_report_store1_noabort+0x20/0x30 [ 29.546637] krealloc_more_oob_helper+0x614/0x680 [ 29.547379] krealloc_more_oob+0x20/0x38 [ 29.548111] kunit_try_run_case+0x14c/0x3d0 [ 29.549548] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.550259] kthread+0x24c/0x2d0 [ 29.550826] ret_from_fork+0x10/0x20 [ 29.551586] [ 29.551875] Allocated by task 145: [ 29.552469] kasan_save_stack+0x3c/0x68 [ 29.553176] kasan_save_track+0x20/0x40 [ 29.553913] kasan_save_alloc_info+0x40/0x58 [ 29.554491] __kasan_krealloc+0x118/0x178 [ 29.555138] krealloc_noprof+0x128/0x360 [ 29.555704] krealloc_more_oob_helper+0x168/0x680 [ 29.556890] krealloc_more_oob+0x20/0x38 [ 29.557594] kunit_try_run_case+0x14c/0x3d0 [ 29.558261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.559494] kthread+0x24c/0x2d0 [ 29.559767] ret_from_fork+0x10/0x20 [ 29.560040] [ 29.560208] The buggy address belongs to the object at fff00000c0975000 [ 29.560208] which belongs to the cache kmalloc-256 of size 256 [ 29.562227] The buggy address is located 0 bytes to the right of [ 29.562227] allocated 235-byte region [fff00000c0975000, fff00000c09750eb) [ 29.564485] [ 29.565153] The buggy address belongs to the physical page: [ 29.565903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100974 [ 29.567006] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.568471] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.569594] page_type: f5(slab) [ 29.570066] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.570923] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.572441] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.573866] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.574893] head: 0bfffe0000000001 ffffc1ffc3025d01 ffffffffffffffff 0000000000000000 [ 29.576479] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 29.577494] page dumped because: kasan: bad access detected [ 29.578318] [ 29.578845] Memory state around the buggy address: [ 29.580310] fff00000c0974f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.581440] fff00000c0975000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.582637] >fff00000c0975080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 29.583661] ^ [ 29.584464] fff00000c0975100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.585302] fff00000c0975180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.586793] ================================================================== [ 29.949089] ================================================================== [ 29.949695] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680 [ 29.950900] Write of size 1 at addr fff00000c62c60f0 by task kunit_try_catch/149 [ 29.951880] [ 29.952219] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.953469] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.953981] Hardware name: linux,dummy-virt (DT) [ 29.954574] Call trace: [ 29.955053] show_stack+0x20/0x38 (C) [ 29.955633] dump_stack_lvl+0x8c/0xd0 [ 29.956285] print_report+0x118/0x5e0 [ 29.956817] kasan_report+0xc8/0x118 [ 29.957503] __asan_report_store1_noabort+0x20/0x30 [ 29.958178] krealloc_more_oob_helper+0x5c8/0x680 [ 29.959214] krealloc_large_more_oob+0x20/0x38 [ 29.960022] kunit_try_run_case+0x14c/0x3d0 [ 29.960692] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.961579] kthread+0x24c/0x2d0 [ 29.962275] ret_from_fork+0x10/0x20 [ 29.962847] [ 29.963150] The buggy address belongs to the physical page: [ 29.963938] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062c4 [ 29.964898] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.965944] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.966840] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.967779] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.968713] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.969649] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.970583] head: 0bfffe0000000002 ffffc1ffc318b101 ffffffffffffffff 0000000000000000 [ 29.971531] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 29.972397] page dumped because: kasan: bad access detected [ 29.973054] [ 29.973376] Memory state around the buggy address: [ 29.973998] fff00000c62c5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.974884] fff00000c62c6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.975814] >fff00000c62c6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 29.976670] ^ [ 29.977538] fff00000c62c6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.978344] fff00000c62c6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.979268] ================================================================== [ 29.911441] ================================================================== [ 29.913061] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680 [ 29.914007] Write of size 1 at addr fff00000c62c60eb by task kunit_try_catch/149 [ 29.915096] [ 29.916025] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.917797] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.918378] Hardware name: linux,dummy-virt (DT) [ 29.918931] Call trace: [ 29.919680] show_stack+0x20/0x38 (C) [ 29.920219] dump_stack_lvl+0x8c/0xd0 [ 29.920930] print_report+0x118/0x5e0 [ 29.921624] kasan_report+0xc8/0x118 [ 29.922133] __asan_report_store1_noabort+0x20/0x30 [ 29.922852] krealloc_more_oob_helper+0x614/0x680 [ 29.923850] krealloc_large_more_oob+0x20/0x38 [ 29.924547] kunit_try_run_case+0x14c/0x3d0 [ 29.925249] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.926187] kthread+0x24c/0x2d0 [ 29.926888] ret_from_fork+0x10/0x20 [ 29.927730] [ 29.928079] The buggy address belongs to the physical page: [ 29.928852] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062c4 [ 29.929742] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.930714] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.931822] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.933035] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.933982] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.934938] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.936892] head: 0bfffe0000000002 ffffc1ffc318b101 ffffffffffffffff 0000000000000000 [ 29.938005] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 29.938909] page dumped because: kasan: bad access detected [ 29.939834] [ 29.940463] Memory state around the buggy address: [ 29.941127] fff00000c62c5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.942260] fff00000c62c6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.943303] >fff00000c62c6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 29.944363] ^ [ 29.945375] fff00000c62c6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.946465] fff00000c62c6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.947508] ================================================================== [ 29.589099] ================================================================== [ 29.589759] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680 [ 29.590569] Write of size 1 at addr fff00000c09750f0 by task kunit_try_catch/145 [ 29.592007] [ 29.592397] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.593605] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.594195] Hardware name: linux,dummy-virt (DT) [ 29.594836] Call trace: [ 29.595560] show_stack+0x20/0x38 (C) [ 29.596177] dump_stack_lvl+0x8c/0xd0 [ 29.596860] print_report+0x118/0x5e0 [ 29.597767] kasan_report+0xc8/0x118 [ 29.598218] __asan_report_store1_noabort+0x20/0x30 [ 29.598743] krealloc_more_oob_helper+0x5c8/0x680 [ 29.600023] krealloc_more_oob+0x20/0x38 [ 29.600644] kunit_try_run_case+0x14c/0x3d0 [ 29.601211] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.602083] kthread+0x24c/0x2d0 [ 29.602702] ret_from_fork+0x10/0x20 [ 29.603510] [ 29.604121] Allocated by task 145: [ 29.604515] kasan_save_stack+0x3c/0x68 [ 29.604959] kasan_save_track+0x20/0x40 [ 29.605874] kasan_save_alloc_info+0x40/0x58 [ 29.606643] __kasan_krealloc+0x118/0x178 [ 29.607521] krealloc_noprof+0x128/0x360 [ 29.608477] krealloc_more_oob_helper+0x168/0x680 [ 29.609381] krealloc_more_oob+0x20/0x38 [ 29.610146] kunit_try_run_case+0x14c/0x3d0 [ 29.610780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.611839] kthread+0x24c/0x2d0 [ 29.612229] ret_from_fork+0x10/0x20 [ 29.612979] [ 29.613381] The buggy address belongs to the object at fff00000c0975000 [ 29.613381] which belongs to the cache kmalloc-256 of size 256 [ 29.614279] The buggy address is located 5 bytes to the right of [ 29.614279] allocated 235-byte region [fff00000c0975000, fff00000c09750eb) [ 29.615244] [ 29.615989] The buggy address belongs to the physical page: [ 29.616939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100974 [ 29.617956] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.618830] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.620573] page_type: f5(slab) [ 29.620942] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.621433] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.622642] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.623933] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.624931] head: 0bfffe0000000001 ffffc1ffc3025d01 ffffffffffffffff 0000000000000000 [ 29.625945] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 29.626775] page dumped because: kasan: bad access detected [ 29.627228] [ 29.627637] Memory state around the buggy address: [ 29.628658] fff00000c0974f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.630028] fff00000c0975000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.631532] >fff00000c0975080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 29.632431] ^ [ 29.633393] fff00000c0975100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.634208] fff00000c0975180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.635188] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 29.497863] ================================================================== [ 29.499847] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 29.500600] Read of size 1 at addr fff00000c6540000 by task kunit_try_catch/143 [ 29.501661] [ 29.502208] CPU: 0 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.503981] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.504623] Hardware name: linux,dummy-virt (DT) [ 29.505512] Call trace: [ 29.506000] show_stack+0x20/0x38 (C) [ 29.506636] dump_stack_lvl+0x8c/0xd0 [ 29.507657] print_report+0x118/0x5e0 [ 29.508245] kasan_report+0xc8/0x118 [ 29.508774] __asan_report_load1_noabort+0x20/0x30 [ 29.509485] page_alloc_uaf+0x328/0x350 [ 29.510128] kunit_try_run_case+0x14c/0x3d0 [ 29.510785] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.511537] kthread+0x24c/0x2d0 [ 29.512093] ret_from_fork+0x10/0x20 [ 29.512789] [ 29.513165] The buggy address belongs to the physical page: [ 29.513977] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106540 [ 29.514952] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.516153] page_type: f0(buddy) [ 29.516658] raw: 0bfffe0000000000 fff00000ff6151b0 fff00000ff6151b0 0000000000000000 [ 29.517672] raw: 0000000000000000 0000000000000006 00000000f0000000 0000000000000000 [ 29.518598] page dumped because: kasan: bad access detected [ 29.519551] [ 29.519892] Memory state around the buggy address: [ 29.520442] fff00000c653ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.521319] fff00000c653ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.522249] >fff00000c6540000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.523318] ^ [ 29.523895] fff00000c6540080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.524798] fff00000c6540100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.525547] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[ 29.444262] ================================================================== [ 29.445516] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 29.446195] Free of addr fff00000c62c4001 by task kunit_try_catch/139 [ 29.446982] [ 29.447440] CPU: 0 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.448918] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.450149] Hardware name: linux,dummy-virt (DT) [ 29.450932] Call trace: [ 29.451698] show_stack+0x20/0x38 (C) [ 29.452280] dump_stack_lvl+0x8c/0xd0 [ 29.452906] print_report+0x118/0x5e0 [ 29.453612] kasan_report_invalid_free+0xb0/0xd8 [ 29.454263] __kasan_kfree_large+0x5c/0xa8 [ 29.454918] free_large_kmalloc+0x58/0x140 [ 29.455559] kfree+0x270/0x3c8 [ 29.456177] kmalloc_large_invalid_free+0x108/0x270 [ 29.456913] kunit_try_run_case+0x14c/0x3d0 [ 29.457952] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.458505] kthread+0x24c/0x2d0 [ 29.459028] ret_from_fork+0x10/0x20 [ 29.459571] [ 29.460000] The buggy address belongs to the physical page: [ 29.460712] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062c4 [ 29.461905] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.462803] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.463765] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.465160] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.466727] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.468374] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.469427] head: 0bfffe0000000002 ffffc1ffc318b101 ffffffffffffffff 0000000000000000 [ 29.470859] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 29.472000] page dumped because: kasan: bad access detected [ 29.472506] [ 29.472680] Memory state around the buggy address: [ 29.472990] fff00000c62c3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.473489] fff00000c62c3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.475346] >fff00000c62c4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.476883] ^ [ 29.477468] fff00000c62c4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.478520] fff00000c62c4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.479584] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 29.407777] ================================================================== [ 29.409154] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 29.409863] Read of size 1 at addr fff00000c6428000 by task kunit_try_catch/137 [ 29.410949] [ 29.411620] CPU: 1 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.412848] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.413902] Hardware name: linux,dummy-virt (DT) [ 29.414526] Call trace: [ 29.415271] show_stack+0x20/0x38 (C) [ 29.415901] dump_stack_lvl+0x8c/0xd0 [ 29.416543] print_report+0x118/0x5e0 [ 29.417078] kasan_report+0xc8/0x118 [ 29.417690] __asan_report_load1_noabort+0x20/0x30 [ 29.418418] kmalloc_large_uaf+0x2cc/0x2f8 [ 29.419253] kunit_try_run_case+0x14c/0x3d0 [ 29.419888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.420748] kthread+0x24c/0x2d0 [ 29.421247] ret_from_fork+0x10/0x20 [ 29.421928] [ 29.422202] The buggy address belongs to the physical page: [ 29.422994] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106428 [ 29.424049] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.424899] raw: 0bfffe0000000000 fff00000da50bf80 fff00000da50bf80 0000000000000000 [ 29.425931] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 29.426807] page dumped because: kasan: bad access detected [ 29.427629] [ 29.428087] Memory state around the buggy address: [ 29.428698] fff00000c6427f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.429543] fff00000c6427f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.430414] >fff00000c6428000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.431530] ^ [ 29.432124] fff00000c6428080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.433060] fff00000c6428100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.434278] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 29.361146] ================================================================== [ 29.362726] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 29.363992] Write of size 1 at addr fff00000c62c600a by task kunit_try_catch/135 [ 29.365954] [ 29.366402] CPU: 0 UID: 0 PID: 135 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.368201] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.368628] Hardware name: linux,dummy-virt (DT) [ 29.369890] Call trace: [ 29.370280] show_stack+0x20/0x38 (C) [ 29.370993] dump_stack_lvl+0x8c/0xd0 [ 29.372236] print_report+0x118/0x5e0 [ 29.372817] kasan_report+0xc8/0x118 [ 29.373488] __asan_report_store1_noabort+0x20/0x30 [ 29.374161] kmalloc_large_oob_right+0x278/0x2b8 [ 29.374960] kunit_try_run_case+0x14c/0x3d0 [ 29.375620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.376824] kthread+0x24c/0x2d0 [ 29.377302] ret_from_fork+0x10/0x20 [ 29.377869] [ 29.378266] The buggy address belongs to the physical page: [ 29.380016] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062c4 [ 29.380991] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.381894] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.382937] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.383879] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.385136] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.386148] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.387580] head: 0bfffe0000000002 ffffc1ffc318b101 ffffffffffffffff 0000000000000000 [ 29.388299] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 29.389241] page dumped because: kasan: bad access detected [ 29.389999] [ 29.390276] Memory state around the buggy address: [ 29.390997] fff00000c62c5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.392449] fff00000c62c5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.393197] >fff00000c62c6000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.394164] ^ [ 29.395075] fff00000c62c6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.395943] fff00000c62c6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.397195] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 29.303833] ================================================================== [ 29.305106] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 29.306048] Write of size 1 at addr fff00000c5f65f00 by task kunit_try_catch/133 [ 29.307070] [ 29.307409] CPU: 1 UID: 0 PID: 133 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.308822] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.309255] Hardware name: linux,dummy-virt (DT) [ 29.310890] Call trace: [ 29.311641] show_stack+0x20/0x38 (C) [ 29.312224] dump_stack_lvl+0x8c/0xd0 [ 29.312990] print_report+0x118/0x5e0 [ 29.313565] kasan_report+0xc8/0x118 [ 29.314230] __asan_report_store1_noabort+0x20/0x30 [ 29.314847] kmalloc_big_oob_right+0x2a4/0x2f0 [ 29.315725] kunit_try_run_case+0x14c/0x3d0 [ 29.316437] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.317233] kthread+0x24c/0x2d0 [ 29.317805] ret_from_fork+0x10/0x20 [ 29.318441] [ 29.318745] Allocated by task 133: [ 29.319625] kasan_save_stack+0x3c/0x68 [ 29.320195] kasan_save_track+0x20/0x40 [ 29.320762] kasan_save_alloc_info+0x40/0x58 [ 29.321429] __kasan_kmalloc+0xd4/0xd8 [ 29.321983] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.322685] kmalloc_big_oob_right+0xb8/0x2f0 [ 29.323641] kunit_try_run_case+0x14c/0x3d0 [ 29.324207] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.324972] kthread+0x24c/0x2d0 [ 29.325481] ret_from_fork+0x10/0x20 [ 29.326027] [ 29.326400] The buggy address belongs to the object at fff00000c5f64000 [ 29.326400] which belongs to the cache kmalloc-8k of size 8192 [ 29.328820] The buggy address is located 0 bytes to the right of [ 29.328820] allocated 7936-byte region [fff00000c5f64000, fff00000c5f65f00) [ 29.330898] [ 29.331368] The buggy address belongs to the physical page: [ 29.331983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f60 [ 29.333358] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.334241] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.335077] page_type: f5(slab) [ 29.335584] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 29.336741] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 29.337745] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 29.338818] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 29.340184] head: 0bfffe0000000003 ffffc1ffc317d801 ffffffffffffffff 0000000000000000 [ 29.341189] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000 [ 29.342171] page dumped because: kasan: bad access detected [ 29.343093] [ 29.343375] Memory state around the buggy address: [ 29.344153] fff00000c5f65e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.345013] fff00000c5f65e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.346313] >fff00000c5f65f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.347149] ^ [ 29.348184] fff00000c5f65f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.349585] fff00000c5f66000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.350447] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 29.216488] ================================================================== [ 29.217683] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x414/0x490 [ 29.218472] Write of size 1 at addr fff00000c646c978 by task kunit_try_catch/131 [ 29.219667] [ 29.220148] CPU: 0 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.221431] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.222506] Hardware name: linux,dummy-virt (DT) [ 29.222998] Call trace: [ 29.224157] show_stack+0x20/0x38 (C) [ 29.225001] dump_stack_lvl+0x8c/0xd0 [ 29.225730] print_report+0x118/0x5e0 [ 29.226411] kasan_report+0xc8/0x118 [ 29.227116] __asan_report_store1_noabort+0x20/0x30 [ 29.228034] kmalloc_track_caller_oob_right+0x414/0x490 [ 29.228760] kunit_try_run_case+0x14c/0x3d0 [ 29.229413] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.230151] kthread+0x24c/0x2d0 [ 29.230855] ret_from_fork+0x10/0x20 [ 29.231417] [ 29.231784] Allocated by task 131: [ 29.233023] kasan_save_stack+0x3c/0x68 [ 29.233944] kasan_save_track+0x20/0x40 [ 29.234773] kasan_save_alloc_info+0x40/0x58 [ 29.235805] __kasan_kmalloc+0xd4/0xd8 [ 29.236306] __kmalloc_node_track_caller_noprof+0x184/0x4b8 [ 29.237043] kmalloc_track_caller_oob_right+0xa8/0x490 [ 29.237734] kunit_try_run_case+0x14c/0x3d0 [ 29.238679] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.239550] kthread+0x24c/0x2d0 [ 29.239823] ret_from_fork+0x10/0x20 [ 29.240096] [ 29.240266] The buggy address belongs to the object at fff00000c646c900 [ 29.240266] which belongs to the cache kmalloc-128 of size 128 [ 29.243446] The buggy address is located 0 bytes to the right of [ 29.243446] allocated 120-byte region [fff00000c646c900, fff00000c646c978) [ 29.245533] [ 29.245879] The buggy address belongs to the physical page: [ 29.246558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10646c [ 29.247888] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.248831] page_type: f5(slab) [ 29.249267] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.250637] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.252134] page dumped because: kasan: bad access detected [ 29.252615] [ 29.252788] Memory state around the buggy address: [ 29.253098] fff00000c646c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 29.253540] fff00000c646c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.253974] >fff00000c646c900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.254456] ^ [ 29.255305] fff00000c646c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.256251] fff00000c646ca00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.257641] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 29.159038] ================================================================== [ 29.160127] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 29.161314] Read of size 1 at addr fff00000c640d000 by task kunit_try_catch/129 [ 29.162270] [ 29.162637] CPU: 1 UID: 0 PID: 129 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.164112] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.165266] Hardware name: linux,dummy-virt (DT) [ 29.165921] Call trace: [ 29.166342] show_stack+0x20/0x38 (C) [ 29.167015] dump_stack_lvl+0x8c/0xd0 [ 29.167710] print_report+0x118/0x5e0 [ 29.168261] kasan_report+0xc8/0x118 [ 29.168845] __asan_report_load1_noabort+0x20/0x30 [ 29.169522] kmalloc_node_oob_right+0x2f4/0x330 [ 29.170142] kunit_try_run_case+0x14c/0x3d0 [ 29.170832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.171541] kthread+0x24c/0x2d0 [ 29.172044] ret_from_fork+0x10/0x20 [ 29.172716] [ 29.173000] Allocated by task 129: [ 29.173814] kasan_save_stack+0x3c/0x68 [ 29.174537] kasan_save_track+0x20/0x40 [ 29.175133] kasan_save_alloc_info+0x40/0x58 [ 29.176111] __kasan_kmalloc+0xd4/0xd8 [ 29.176682] __kmalloc_cache_node_noprof+0x168/0x3d0 [ 29.177465] kmalloc_node_oob_right+0xbc/0x330 [ 29.178154] kunit_try_run_case+0x14c/0x3d0 [ 29.178855] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.179736] kthread+0x24c/0x2d0 [ 29.180239] ret_from_fork+0x10/0x20 [ 29.180814] [ 29.181873] The buggy address belongs to the object at fff00000c640c000 [ 29.181873] which belongs to the cache kmalloc-4k of size 4096 [ 29.183257] The buggy address is located 0 bytes to the right of [ 29.183257] allocated 4096-byte region [fff00000c640c000, fff00000c640d000) [ 29.184654] [ 29.184954] The buggy address belongs to the physical page: [ 29.186136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408 [ 29.187589] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.188487] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.189384] page_type: f5(slab) [ 29.189915] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 29.190754] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 29.192070] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 29.193097] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 29.194117] head: 0bfffe0000000003 ffffc1ffc3190201 ffffffffffffffff 0000000000000000 [ 29.195053] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000 [ 29.195981] page dumped because: kasan: bad access detected [ 29.196796] [ 29.197070] Memory state around the buggy address: [ 29.198101] fff00000c640cf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.198948] fff00000c640cf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.200828] >fff00000c640d000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.201858] ^ [ 29.202426] fff00000c640d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.203515] fff00000c640d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.204482] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 29.102668] ================================================================== [ 29.104114] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 29.104779] Read of size 1 at addr fff00000c631831f by task kunit_try_catch/127 [ 29.105561] [ 29.105938] CPU: 0 UID: 0 PID: 127 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.107257] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.107784] Hardware name: linux,dummy-virt (DT) [ 29.108455] Call trace: [ 29.108860] show_stack+0x20/0x38 (C) [ 29.109484] dump_stack_lvl+0x8c/0xd0 [ 29.110142] print_report+0x118/0x5e0 [ 29.110831] kasan_report+0xc8/0x118 [ 29.111495] __asan_report_load1_noabort+0x20/0x30 [ 29.112200] kmalloc_oob_left+0x2ec/0x320 [ 29.112773] kunit_try_run_case+0x14c/0x3d0 [ 29.113428] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.114233] kthread+0x24c/0x2d0 [ 29.114902] ret_from_fork+0x10/0x20 [ 29.115728] [ 29.116038] Allocated by task 28: [ 29.116430] kasan_save_stack+0x3c/0x68 [ 29.117031] kasan_save_track+0x20/0x40 [ 29.117916] kasan_save_alloc_info+0x40/0x58 [ 29.118602] __kasan_kmalloc+0xd4/0xd8 [ 29.119131] __kmalloc_node_track_caller_noprof+0x184/0x4b8 [ 29.120047] kstrdup+0x54/0xc8 [ 29.120706] devtmpfs_work_loop+0x384/0x590 [ 29.121360] devtmpfsd+0x50/0x58 [ 29.121896] kthread+0x24c/0x2d0 [ 29.122522] ret_from_fork+0x10/0x20 [ 29.123186] [ 29.123696] Freed by task 28: [ 29.124739] kasan_save_stack+0x3c/0x68 [ 29.125260] kasan_save_track+0x20/0x40 [ 29.125781] kasan_save_free_info+0x4c/0x78 [ 29.126591] __kasan_slab_free+0x6c/0x98 [ 29.127511] kfree+0x114/0x3c8 [ 29.128051] devtmpfs_work_loop+0x498/0x590 [ 29.128547] devtmpfsd+0x50/0x58 [ 29.129177] kthread+0x24c/0x2d0 [ 29.130044] ret_from_fork+0x10/0x20 [ 29.130694] [ 29.130979] The buggy address belongs to the object at fff00000c6318300 [ 29.130979] which belongs to the cache kmalloc-16 of size 16 [ 29.132225] The buggy address is located 15 bytes to the right of [ 29.132225] allocated 16-byte region [fff00000c6318300, fff00000c6318310) [ 29.134155] [ 29.134480] The buggy address belongs to the physical page: [ 29.135921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106318 [ 29.137097] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.138143] page_type: f5(slab) [ 29.139030] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 29.140508] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 29.141418] page dumped because: kasan: bad access detected [ 29.142091] [ 29.143009] Memory state around the buggy address: [ 29.143971] fff00000c6318200: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.144690] fff00000c6318280: fa fb fc fc fa fb fc fc 00 02 fc fc 00 02 fc fc [ 29.145376] >fff00000c6318300: fa fb fc fc 00 07 fc fc fc fc fc fc fc fc fc fc [ 29.146072] ^ [ 29.146544] fff00000c6318380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.148145] fff00000c6318400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.149228] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 29.006930] ================================================================== [ 29.007679] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 29.008569] Write of size 1 at addr fff00000c58bb178 by task kunit_try_catch/125 [ 29.009509] [ 29.010043] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.011206] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.012135] Hardware name: linux,dummy-virt (DT) [ 29.012922] Call trace: [ 29.013433] show_stack+0x20/0x38 (C) [ 29.014072] dump_stack_lvl+0x8c/0xd0 [ 29.014735] print_report+0x118/0x5e0 [ 29.015413] kasan_report+0xc8/0x118 [ 29.016258] __asan_report_store1_noabort+0x20/0x30 [ 29.016980] kmalloc_oob_right+0x538/0x660 [ 29.017665] kunit_try_run_case+0x14c/0x3d0 [ 29.018262] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.019452] kthread+0x24c/0x2d0 [ 29.020249] ret_from_fork+0x10/0x20 [ 29.020796] [ 29.021145] Allocated by task 125: [ 29.021630] kasan_save_stack+0x3c/0x68 [ 29.022274] kasan_save_track+0x20/0x40 [ 29.023204] kasan_save_alloc_info+0x40/0x58 [ 29.024120] __kasan_kmalloc+0xd4/0xd8 [ 29.024858] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.025431] kmalloc_oob_right+0xb0/0x660 [ 29.026088] kunit_try_run_case+0x14c/0x3d0 [ 29.026689] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.028120] kthread+0x24c/0x2d0 [ 29.028748] ret_from_fork+0x10/0x20 [ 29.029612] [ 29.029877] The buggy address belongs to the object at fff00000c58bb100 [ 29.029877] which belongs to the cache kmalloc-128 of size 128 [ 29.032145] The buggy address is located 5 bytes to the right of [ 29.032145] allocated 115-byte region [fff00000c58bb100, fff00000c58bb173) [ 29.033649] [ 29.033998] The buggy address belongs to the physical page: [ 29.035260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058bb [ 29.036784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.037612] page_type: f5(slab) [ 29.038102] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.039517] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.040707] page dumped because: kasan: bad access detected [ 29.041413] [ 29.041698] Memory state around the buggy address: [ 29.042321] fff00000c58bb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.043823] fff00000c58bb080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.044861] >fff00000c58bb100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.045869] ^ [ 29.046690] fff00000c58bb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.049099] fff00000c58bb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.050091] ================================================================== [ 29.053928] ================================================================== [ 29.055390] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 29.056252] Read of size 1 at addr fff00000c58bb180 by task kunit_try_catch/125 [ 29.057191] [ 29.057660] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.058967] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.059803] Hardware name: linux,dummy-virt (DT) [ 29.060468] Call trace: [ 29.061003] show_stack+0x20/0x38 (C) [ 29.061628] dump_stack_lvl+0x8c/0xd0 [ 29.062185] print_report+0x118/0x5e0 [ 29.062909] kasan_report+0xc8/0x118 [ 29.063627] __asan_report_load1_noabort+0x20/0x30 [ 29.064589] kmalloc_oob_right+0x5d0/0x660 [ 29.065199] kunit_try_run_case+0x14c/0x3d0 [ 29.065877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.066692] kthread+0x24c/0x2d0 [ 29.067377] ret_from_fork+0x10/0x20 [ 29.068143] [ 29.068319] Allocated by task 125: [ 29.068896] kasan_save_stack+0x3c/0x68 [ 29.069633] kasan_save_track+0x20/0x40 [ 29.070244] kasan_save_alloc_info+0x40/0x58 [ 29.070866] __kasan_kmalloc+0xd4/0xd8 [ 29.071560] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.072502] kmalloc_oob_right+0xb0/0x660 [ 29.073093] kunit_try_run_case+0x14c/0x3d0 [ 29.073884] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.074488] kthread+0x24c/0x2d0 [ 29.074967] ret_from_fork+0x10/0x20 [ 29.076099] [ 29.076368] The buggy address belongs to the object at fff00000c58bb100 [ 29.076368] which belongs to the cache kmalloc-128 of size 128 [ 29.077460] The buggy address is located 13 bytes to the right of [ 29.077460] allocated 115-byte region [fff00000c58bb100, fff00000c58bb173) [ 29.079291] [ 29.079746] The buggy address belongs to the physical page: [ 29.080452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058bb [ 29.081441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.082201] page_type: f5(slab) [ 29.082755] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.084132] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.085076] page dumped because: kasan: bad access detected [ 29.085586] [ 29.085842] Memory state around the buggy address: [ 29.086286] fff00000c58bb080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.086902] fff00000c58bb100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.087561] >fff00000c58bb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.088610] ^ [ 29.089043] fff00000c58bb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.090229] fff00000c58bb280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.091753] ================================================================== [ 28.954119] ================================================================== [ 28.955773] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 28.957919] Write of size 1 at addr fff00000c58bb173 by task kunit_try_catch/125 [ 28.958851] [ 28.960651] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G N 6.13.0-rc1-next-20241203 #1 [ 28.962137] Tainted: [N]=TEST [ 28.962668] Hardware name: linux,dummy-virt (DT) [ 28.963806] Call trace: [ 28.964676] show_stack+0x20/0x38 (C) [ 28.965612] dump_stack_lvl+0x8c/0xd0 [ 28.966242] print_report+0x118/0x5e0 [ 28.966849] kasan_report+0xc8/0x118 [ 28.967669] __asan_report_store1_noabort+0x20/0x30 [ 28.968423] kmalloc_oob_right+0x5a4/0x660 [ 28.969185] kunit_try_run_case+0x14c/0x3d0 [ 28.969816] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.970657] kthread+0x24c/0x2d0 [ 28.971244] ret_from_fork+0x10/0x20 [ 28.972066] [ 28.972555] Allocated by task 125: [ 28.973212] kasan_save_stack+0x3c/0x68 [ 28.973959] kasan_save_track+0x20/0x40 [ 28.974560] kasan_save_alloc_info+0x40/0x58 [ 28.975432] __kasan_kmalloc+0xd4/0xd8 [ 28.976344] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.977435] kmalloc_oob_right+0xb0/0x660 [ 28.978401] kunit_try_run_case+0x14c/0x3d0 [ 28.978974] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.980048] kthread+0x24c/0x2d0 [ 28.980453] ret_from_fork+0x10/0x20 [ 28.981314] [ 28.981871] The buggy address belongs to the object at fff00000c58bb100 [ 28.981871] which belongs to the cache kmalloc-128 of size 128 [ 28.982866] The buggy address is located 0 bytes to the right of [ 28.982866] allocated 115-byte region [fff00000c58bb100, fff00000c58bb173) [ 28.985648] [ 28.986224] The buggy address belongs to the physical page: [ 28.987630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058bb [ 28.988957] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.990207] page_type: f5(slab) [ 28.991395] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 28.992340] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.993369] page dumped because: kasan: bad access detected [ 28.994242] [ 28.994610] Memory state around the buggy address: [ 28.996065] fff00000c58bb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.997650] fff00000c58bb080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.998726] >fff00000c58bb100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 28.999893] ^ [ 29.001079] fff00000c58bb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.001951] fff00000c58bb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.003515] ==================================================================
Failure - log-parser-boot - internal-error-oops-oops-preempt-smp
KNOWN ISSUE - kunit_test_null_dereference internal oops on qemu-arm64 KUNIT KASAN
[ 147.105499] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP [ 147.106635] Modules linked in: [ 147.107480] CPU: 0 UID: 0 PID: 621 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 147.108939] Tainted: [B]=BAD_PAGE, [N]=TEST [ 147.109739] Hardware name: linux,dummy-virt (DT) [ 147.110529] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 147.111536] pc : kunit_test_null_dereference+0x70/0x170 [ 147.112311] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 147.113090] sp : ffff800083307dc0 [ 147.113649] x29: ffff800083307e20 x28: 0000000000000000 x27: 0000000000000000 [ 147.114936] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000c634d780 [ 147.115997] x23: ffffa03e8bfc2800 x22: ffffa03e8bfcb3c0 x21: fff00000c634d788 [ 147.117079] x20: 1ffff00010660fb8 x19: ffff8000800879f0 x18: 00000000eafefbbc [ 147.118147] x17: 0000000000000001 x16: 0000000000000100 x15: 0000000000000000 [ 147.119235] x14: 1ffe00001b49cb78 x13: 0000000000000000 x12: fffd8000193188b2 [ 147.120343] x11: 1ffe0000193188b1 x10: fffd8000193188b1 x9 : ffffa03e8bfc2888 [ 147.121490] x8 : ffff800083307cb8 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 147.122594] x5 : ffff700010660fb8 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 147.123653] x2 : dfff800000000000 x1 : fff00000c98c3cc0 x0 : ffff8000800879f0 [ 147.124830] Call trace: [ 147.125385] kunit_test_null_dereference+0x70/0x170 (P) [ 147.126092] kunit_generic_run_threadfn_adapter+0x88/0x100 (L) [ 147.126871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 147.127613] kthread+0x24c/0x2d0 [ 147.128179] ret_from_fork+0x10/0x20 [ 147.129178] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 147.130421] ---[ end trace 0000000000000000 ]---