Date
Dec. 4, 2024, 3:07 p.m.
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 67.843518] ================================================================== [ 67.844370] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 67.844370] [ 67.845184] Use-after-free read at 0x0000000075c59714 (in kfence-#207): [ 67.845942] test_krealloc+0x51c/0x830 [ 67.846510] test_krealloc+0x458/0x830 [ 67.847220] kunit_try_run_case+0x14c/0x3d0 [ 67.847849] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.848667] kthread+0x24c/0x2d0 [ 67.849297] ret_from_fork+0x10/0x20 [ 67.849972] [ 67.850299] kfence-#207: 0x0000000075c59714-0x0000000098de6172, size=32, cache=kmalloc-32 [ 67.850299] [ 67.851431] allocated by task 325 on cpu 0 at 67.842490s (0.008930s ago): [ 67.852432] test_alloc+0x298/0x620 [ 67.852967] test_krealloc+0xc0/0x830 [ 67.853655] kunit_try_run_case+0x14c/0x3d0 [ 67.854428] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.855211] kthread+0x24c/0x2d0 [ 67.855816] ret_from_fork+0x10/0x20 [ 67.856459] [ 67.856785] freed by task 325 on cpu 0 at 67.842890s (0.013884s ago): [ 67.857803] krealloc_noprof+0x148/0x360 [ 67.858376] test_krealloc+0x1dc/0x830 [ 67.859030] kunit_try_run_case+0x14c/0x3d0 [ 67.859668] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.860257] kthread+0x24c/0x2d0 [ 67.860871] ret_from_fork+0x10/0x20 [ 67.861397] [ 67.861806] CPU: 0 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 67.863073] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.863532] Hardware name: linux,dummy-virt (DT) [ 67.864258] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 67.655267] ================================================================== [ 67.656068] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 67.656068] [ 67.657201] Use-after-free read at 0x0000000050e1b1c0 (in kfence-#205): [ 67.657981] test_memcache_typesafe_by_rcu+0x280/0x560 [ 67.658930] test_memcache_typesafe_by_rcu+0x260/0x560 [ 67.659825] kunit_try_run_case+0x14c/0x3d0 [ 67.660432] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.661499] kthread+0x24c/0x2d0 [ 67.662227] ret_from_fork+0x10/0x20 [ 67.662782] [ 67.663167] kfence-#205: 0x0000000050e1b1c0-0x00000000fdf6b0db, size=32, cache=test [ 67.663167] [ 67.664152] allocated by task 323 on cpu 0 at 67.638291s (0.025852s ago): [ 67.665152] test_alloc+0x22c/0x620 [ 67.665616] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 67.666447] kunit_try_run_case+0x14c/0x3d0 [ 67.666993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.667828] kthread+0x24c/0x2d0 [ 67.668320] ret_from_fork+0x10/0x20 [ 67.668857] [ 67.669320] freed by task 323 on cpu 0 at 67.638422s (0.030889s ago): [ 67.670137] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 67.670987] kunit_try_run_case+0x14c/0x3d0 [ 67.671674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.672361] kthread+0x24c/0x2d0 [ 67.672894] ret_from_fork+0x10/0x20 [ 67.673445] [ 67.673820] CPU: 1 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 67.675003] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.675587] Hardware name: linux,dummy-virt (DT) [ 67.676272] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 47.586276] ================================================================== [ 47.587672] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 47.587672] [ 47.588639] Invalid read at 0x00000000eabf43fe: [ 47.589398] test_invalid_access+0xdc/0x1f0 [ 47.591404] kunit_try_run_case+0x14c/0x3d0 [ 47.592195] kunit_try_run_case+0x14c/0x3d0 [ 47.592914] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.593614] kthread+0x24c/0x2d0 [ 47.594466] ret_from_fork+0x10/0x20 [ 47.595136] [ 47.595537] CPU: 0 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 47.597337] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.598853] Hardware name: linux,dummy-virt (DT) [ 47.599386] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 47.354845] ================================================================== [ 47.355660] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 47.355660] [ 47.356502] Corrupted memory at 0x000000005c619f7e [ ! . . . . . . . . . . . . . . . ] (in kfence-#201): [ 47.359048] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 47.359730] kunit_try_run_case+0x14c/0x3d0 [ 47.360311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.361090] kthread+0x24c/0x2d0 [ 47.361684] ret_from_fork+0x10/0x20 [ 47.362287] [ 47.362645] kfence-#201: 0x0000000006c44b68-0x000000000d28e926, size=73, cache=kmalloc-96 [ 47.362645] [ 47.363736] allocated by task 313 on cpu 1 at 47.354427s (0.009299s ago): [ 47.364586] test_alloc+0x298/0x620 [ 47.365261] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 47.365962] kunit_try_run_case+0x14c/0x3d0 [ 47.366543] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.367287] kthread+0x24c/0x2d0 [ 47.367858] ret_from_fork+0x10/0x20 [ 47.368394] [ 47.368780] freed by task 313 on cpu 1 at 47.354668s (0.014102s ago): [ 47.369831] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 47.370462] kunit_try_run_case+0x14c/0x3d0 [ 47.371168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.371953] kthread+0x24c/0x2d0 [ 47.372476] ret_from_fork+0x10/0x20 [ 47.373063] [ 47.373434] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 47.374569] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.375203] Hardware name: linux,dummy-virt (DT) [ 47.375883] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 47.146937] ================================================================== [ 47.147674] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 47.147674] [ 47.148944] Out-of-bounds read at 0x00000000e3b25392 (105B right of kfence-#199): [ 47.149771] test_kmalloc_aligned_oob_read+0x238/0x468 [ 47.150845] test_kmalloc_aligned_oob_read+0x100/0x468 [ 47.151551] kunit_try_run_case+0x14c/0x3d0 [ 47.152238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.152989] kthread+0x24c/0x2d0 [ 47.153417] ret_from_fork+0x10/0x20 [ 47.154062] [ 47.154470] kfence-#199: 0x000000008a6292ea-0x0000000016685bf9, size=73, cache=kmalloc-96 [ 47.154470] [ 47.155694] allocated by task 311 on cpu 0 at 47.146487s (0.009197s ago): [ 47.156460] test_alloc+0x298/0x620 [ 47.157092] test_kmalloc_aligned_oob_read+0x100/0x468 [ 47.157874] kunit_try_run_case+0x14c/0x3d0 [ 47.158556] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.159376] kthread+0x24c/0x2d0 [ 47.159989] ret_from_fork+0x10/0x20 [ 47.160597] [ 47.161063] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 47.162340] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.162968] Hardware name: linux,dummy-virt (DT) [ 47.163656] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[ 41.843128] ================================================================== [ 41.843903] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 41.843903] [ 41.844873] Corrupted memory at 0x00000000cd9f54ff [ ! ] (in kfence-#148): [ 41.846109] test_corruption+0x284/0x378 [ 41.846732] kunit_try_run_case+0x14c/0x3d0 [ 41.847350] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.848348] kthread+0x24c/0x2d0 [ 41.848940] ret_from_fork+0x10/0x20 [ 41.849697] [ 41.850047] kfence-#148: 0x00000000494f9c82-0x00000000489c03c0, size=32, cache=kmalloc-32 [ 41.850047] [ 41.851233] allocated by task 299 on cpu 1 at 41.842652s (0.008570s ago): [ 41.852230] test_alloc+0x298/0x620 [ 41.852881] test_corruption+0x198/0x378 [ 41.853405] kunit_try_run_case+0x14c/0x3d0 [ 41.854068] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.854895] kthread+0x24c/0x2d0 [ 41.855406] ret_from_fork+0x10/0x20 [ 41.856072] [ 41.856398] freed by task 299 on cpu 1 at 41.842809s (0.013578s ago): [ 41.857376] test_corruption+0x284/0x378 [ 41.858001] kunit_try_run_case+0x14c/0x3d0 [ 41.858540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.859415] kthread+0x24c/0x2d0 [ 41.859948] ret_from_fork+0x10/0x20 [ 41.860494] [ 41.860972] CPU: 1 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 41.862139] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.862753] Hardware name: linux,dummy-virt (DT) [ 41.863270] ================================================================== [ 41.739225] ================================================================== [ 41.740150] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 41.740150] [ 41.740999] Corrupted memory at 0x0000000039ea7e98 [ ! . . . . . . . . . . . . . . . ] (in kfence-#147): [ 41.744530] test_corruption+0x278/0x378 [ 41.745042] kunit_try_run_case+0x14c/0x3d0 [ 41.745743] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.746546] kthread+0x24c/0x2d0 [ 41.747136] ret_from_fork+0x10/0x20 [ 41.747681] [ 41.748059] kfence-#147: 0x00000000ee66ca16-0x00000000cb77f3b0, size=32, cache=kmalloc-32 [ 41.748059] [ 41.749246] allocated by task 299 on cpu 1 at 41.738772s (0.010464s ago): [ 41.750265] test_alloc+0x298/0x620 [ 41.751033] test_corruption+0xdc/0x378 [ 41.751533] kunit_try_run_case+0x14c/0x3d0 [ 41.752309] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.753114] kthread+0x24c/0x2d0 [ 41.753617] ret_from_fork+0x10/0x20 [ 41.754131] [ 41.754595] freed by task 299 on cpu 1 at 41.738958s (0.015628s ago): [ 41.755419] test_corruption+0x278/0x378 [ 41.756111] kunit_try_run_case+0x14c/0x3d0 [ 41.756817] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.757751] kthread+0x24c/0x2d0 [ 41.758283] ret_from_fork+0x10/0x20 [ 41.759070] [ 41.759462] CPU: 1 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 41.760642] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.761321] Hardware name: linux,dummy-virt (DT) [ 41.761880] ================================================================== [ 41.946829] ================================================================== [ 41.947934] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 41.947934] [ 41.948848] Corrupted memory at 0x00000000212e2aa9 [ ! . . . . . . . . . . . . . . . ] (in kfence-#149): [ 41.951357] test_corruption+0x120/0x378 [ 41.951974] kunit_try_run_case+0x14c/0x3d0 [ 41.952614] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.953447] kthread+0x24c/0x2d0 [ 41.954072] ret_from_fork+0x10/0x20 [ 41.954561] [ 41.954921] kfence-#149: 0x000000007f718833-0x00000000c354d21f, size=32, cache=test [ 41.954921] [ 41.955934] allocated by task 301 on cpu 0 at 41.946553s (0.009371s ago): [ 41.956884] test_alloc+0x22c/0x620 [ 41.957512] test_corruption+0xdc/0x378 [ 41.958082] kunit_try_run_case+0x14c/0x3d0 [ 41.958614] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.959435] kthread+0x24c/0x2d0 [ 41.960021] ret_from_fork+0x10/0x20 [ 41.960584] [ 41.960950] freed by task 301 on cpu 0 at 41.946676s (0.014263s ago): [ 41.961886] test_corruption+0x120/0x378 [ 41.962448] kunit_try_run_case+0x14c/0x3d0 [ 41.962983] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.963785] kthread+0x24c/0x2d0 [ 41.964389] ret_from_fork+0x10/0x20 [ 41.964923] [ 41.965410] CPU: 0 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 41.966585] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.967249] Hardware name: linux,dummy-virt (DT) [ 41.967878] ================================================================== [ 42.050919] ================================================================== [ 42.051773] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 42.051773] [ 42.052683] Corrupted memory at 0x00000000e02c6ea8 [ ! ] (in kfence-#150): [ 42.053729] test_corruption+0x1d8/0x378 [ 42.054340] kunit_try_run_case+0x14c/0x3d0 [ 42.054993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.055732] kthread+0x24c/0x2d0 [ 42.056426] ret_from_fork+0x10/0x20 [ 42.057152] [ 42.057603] kfence-#150: 0x00000000904db895-0x00000000468e1d0a, size=32, cache=test [ 42.057603] [ 42.058815] allocated by task 301 on cpu 0 at 42.050660s (0.008145s ago): [ 42.059766] test_alloc+0x22c/0x620 [ 42.060354] test_corruption+0x198/0x378 [ 42.060991] kunit_try_run_case+0x14c/0x3d0 [ 42.061570] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.062441] kthread+0x24c/0x2d0 [ 42.062972] ret_from_fork+0x10/0x20 [ 42.063517] [ 42.063891] freed by task 301 on cpu 0 at 42.050757s (0.013124s ago): [ 42.064758] test_corruption+0x1d8/0x378 [ 42.065396] kunit_try_run_case+0x14c/0x3d0 [ 42.066089] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.066843] kthread+0x24c/0x2d0 [ 42.067365] ret_from_fork+0x10/0x20 [ 42.068052] [ 42.068421] CPU: 0 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 42.069565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.070290] Hardware name: linux,dummy-virt (DT) [ 42.070944] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 41.530845] ================================================================== [ 41.531823] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 41.531823] [ 41.532611] Invalid free of 0x00000000bf589abd (in kfence-#145): [ 41.533349] test_invalid_addr_free+0x1ac/0x238 [ 41.534531] kunit_try_run_case+0x14c/0x3d0 [ 41.535290] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.536034] kthread+0x24c/0x2d0 [ 41.536616] ret_from_fork+0x10/0x20 [ 41.537246] [ 41.537562] kfence-#145: 0x00000000fc9d4e1e-0x0000000044d87612, size=32, cache=kmalloc-32 [ 41.537562] [ 41.538672] allocated by task 295 on cpu 0 at 41.530589s (0.008072s ago): [ 41.539583] test_alloc+0x298/0x620 [ 41.540241] test_invalid_addr_free+0xd4/0x238 [ 41.541086] kunit_try_run_case+0x14c/0x3d0 [ 41.541808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.542619] kthread+0x24c/0x2d0 [ 41.543130] ret_from_fork+0x10/0x20 [ 41.543819] [ 41.544290] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 41.545493] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.546123] Hardware name: linux,dummy-virt (DT) [ 41.546775] ================================================================== [ 41.634806] ================================================================== [ 41.635881] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 41.635881] [ 41.636794] Invalid free of 0x00000000daab33ce (in kfence-#146): [ 41.637578] test_invalid_addr_free+0xec/0x238 [ 41.639143] kunit_try_run_case+0x14c/0x3d0 [ 41.639817] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.640570] kthread+0x24c/0x2d0 [ 41.641243] ret_from_fork+0x10/0x20 [ 41.642095] [ 41.642539] kfence-#146: 0x00000000eb414d9d-0x000000009e8cf10c, size=32, cache=test [ 41.642539] [ 41.644013] allocated by task 297 on cpu 1 at 41.634584s (0.009417s ago): [ 41.645022] test_alloc+0x22c/0x620 [ 41.645769] test_invalid_addr_free+0xd4/0x238 [ 41.646506] kunit_try_run_case+0x14c/0x3d0 [ 41.647191] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.648232] kthread+0x24c/0x2d0 [ 41.648851] ret_from_fork+0x10/0x20 [ 41.649394] [ 41.649784] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 41.650959] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.651452] Hardware name: linux,dummy-virt (DT) [ 41.652280] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[ 41.427151] ================================================================== [ 41.428061] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 41.428061] [ 41.428866] Invalid free of 0x00000000e67ff70e (in kfence-#144): [ 41.429796] test_double_free+0x100/0x238 [ 41.430320] kunit_try_run_case+0x14c/0x3d0 [ 41.431193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.431896] kthread+0x24c/0x2d0 [ 41.432503] ret_from_fork+0x10/0x20 [ 41.433144] [ 41.433473] kfence-#144: 0x00000000e67ff70e-0x000000009e384c8d, size=32, cache=test [ 41.433473] [ 41.434691] allocated by task 293 on cpu 1 at 41.426657s (0.008024s ago): [ 41.435705] test_alloc+0x22c/0x620 [ 41.436434] test_double_free+0xd4/0x238 [ 41.437150] kunit_try_run_case+0x14c/0x3d0 [ 41.437793] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.438737] kthread+0x24c/0x2d0 [ 41.439283] ret_from_fork+0x10/0x20 [ 41.439863] [ 41.440250] freed by task 293 on cpu 1 at 41.426764s (0.013476s ago): [ 41.441104] test_double_free+0xf0/0x238 [ 41.441692] kunit_try_run_case+0x14c/0x3d0 [ 41.442499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.443172] kthread+0x24c/0x2d0 [ 41.443829] ret_from_fork+0x10/0x20 [ 41.444443] [ 41.444945] CPU: 1 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 41.446141] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.446774] Hardware name: linux,dummy-virt (DT) [ 41.447382] ================================================================== [ 41.323256] ================================================================== [ 41.324191] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 41.324191] [ 41.324984] Invalid free of 0x00000000317517ed (in kfence-#143): [ 41.326427] test_double_free+0x1bc/0x238 [ 41.326985] kunit_try_run_case+0x14c/0x3d0 [ 41.327850] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.328476] kthread+0x24c/0x2d0 [ 41.329149] ret_from_fork+0x10/0x20 [ 41.329711] [ 41.330086] kfence-#143: 0x00000000317517ed-0x000000004c9a0283, size=32, cache=kmalloc-32 [ 41.330086] [ 41.331324] allocated by task 291 on cpu 0 at 41.322692s (0.008623s ago): [ 41.332115] test_alloc+0x298/0x620 [ 41.332807] test_double_free+0xd4/0x238 [ 41.333391] kunit_try_run_case+0x14c/0x3d0 [ 41.333989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.334595] kthread+0x24c/0x2d0 [ 41.335246] ret_from_fork+0x10/0x20 [ 41.335816] [ 41.336242] freed by task 291 on cpu 0 at 41.322817s (0.013416s ago): [ 41.337062] test_double_free+0x1ac/0x238 [ 41.337760] kunit_try_run_case+0x14c/0x3d0 [ 41.338489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.339241] kthread+0x24c/0x2d0 [ 41.339846] ret_from_fork+0x10/0x20 [ 41.340470] [ 41.340928] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 41.342119] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.342782] Hardware name: linux,dummy-virt (DT) [ 41.343509] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 41.011055] ================================================================== [ 41.012100] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 41.012100] [ 41.013249] Use-after-free read at 0x000000003c5a3b65 (in kfence-#140): [ 41.014445] test_use_after_free_read+0x114/0x248 [ 41.015406] test_use_after_free_read+0xf0/0x248 [ 41.016021] kunit_try_run_case+0x14c/0x3d0 [ 41.016677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.017449] kthread+0x24c/0x2d0 [ 41.017955] ret_from_fork+0x10/0x20 [ 41.018578] [ 41.019051] kfence-#140: 0x000000003c5a3b65-0x00000000ff482700, size=32, cache=test [ 41.019051] [ 41.020103] allocated by task 285 on cpu 1 at 41.010695s (0.009399s ago): [ 41.021068] test_alloc+0x22c/0x620 [ 41.021587] test_use_after_free_read+0xd0/0x248 [ 41.022371] kunit_try_run_case+0x14c/0x3d0 [ 41.022957] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.023850] kthread+0x24c/0x2d0 [ 41.024374] ret_from_fork+0x10/0x20 [ 41.024881] [ 41.025262] freed by task 285 on cpu 1 at 41.010798s (0.014455s ago): [ 41.026164] test_use_after_free_read+0xf0/0x248 [ 41.026982] kunit_try_run_case+0x14c/0x3d0 [ 41.027556] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.028318] kthread+0x24c/0x2d0 [ 41.028944] ret_from_fork+0x10/0x20 [ 41.029453] [ 41.029901] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 41.031063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.031776] Hardware name: linux,dummy-virt (DT) [ 41.032430] ================================================================== [ 40.907224] ================================================================== [ 40.908171] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 40.908171] [ 40.909175] Use-after-free read at 0x000000004f4e8da3 (in kfence-#139): [ 40.909880] test_use_after_free_read+0x114/0x248 [ 40.910815] test_use_after_free_read+0x1c0/0x248 [ 40.911503] kunit_try_run_case+0x14c/0x3d0 [ 40.912236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.913033] kthread+0x24c/0x2d0 [ 40.913558] ret_from_fork+0x10/0x20 [ 40.914217] [ 40.914595] kfence-#139: 0x000000004f4e8da3-0x00000000c74ad180, size=32, cache=kmalloc-32 [ 40.914595] [ 40.915909] allocated by task 283 on cpu 0 at 40.906662s (0.009237s ago): [ 40.916862] test_alloc+0x298/0x620 [ 40.917412] test_use_after_free_read+0xd0/0x248 [ 40.918163] kunit_try_run_case+0x14c/0x3d0 [ 40.918798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.919507] kthread+0x24c/0x2d0 [ 40.920101] ret_from_fork+0x10/0x20 [ 40.920656] [ 40.921264] freed by task 283 on cpu 0 at 40.906783s (0.014325s ago): [ 40.922371] test_use_after_free_read+0x1c0/0x248 [ 40.923086] kunit_try_run_case+0x14c/0x3d0 [ 40.923692] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.924402] kthread+0x24c/0x2d0 [ 40.924968] ret_from_fork+0x10/0x20 [ 40.925563] [ 40.925986] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 40.927961] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.928439] Hardware name: linux,dummy-virt (DT) [ 40.928935] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 40.699115] ================================================================== [ 40.700103] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 40.700103] [ 40.700942] Out-of-bounds write at 0x00000000797ee6d8 (1B left of kfence-#137): [ 40.702665] test_out_of_bounds_write+0x100/0x240 [ 40.703592] test_out_of_bounds_write+0xc8/0x240 [ 40.704208] kunit_try_run_case+0x14c/0x3d0 [ 40.704541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.705134] kthread+0x24c/0x2d0 [ 40.705706] ret_from_fork+0x10/0x20 [ 40.706414] [ 40.706789] kfence-#137: 0x00000000cb8067a0-0x00000000178172ab, size=32, cache=kmalloc-32 [ 40.706789] [ 40.708194] allocated by task 279 on cpu 0 at 40.698751s (0.009432s ago): [ 40.709093] test_alloc+0x298/0x620 [ 40.709803] test_out_of_bounds_write+0xc8/0x240 [ 40.710451] kunit_try_run_case+0x14c/0x3d0 [ 40.711164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.711884] kthread+0x24c/0x2d0 [ 40.712346] ret_from_fork+0x10/0x20 [ 40.713046] [ 40.713416] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 40.714593] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.715298] Hardware name: linux,dummy-virt (DT) [ 40.715867] ================================================================== [ 40.802851] ================================================================== [ 40.803779] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 40.803779] [ 40.804704] Out-of-bounds write at 0x0000000036ad742f (1B left of kfence-#138): [ 40.805785] test_out_of_bounds_write+0x100/0x240 [ 40.806342] test_out_of_bounds_write+0xc8/0x240 [ 40.807184] kunit_try_run_case+0x14c/0x3d0 [ 40.807953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.808806] kthread+0x24c/0x2d0 [ 40.809433] ret_from_fork+0x10/0x20 [ 40.810221] [ 40.810601] kfence-#138: 0x00000000d96756f7-0x00000000087f0a00, size=32, cache=test [ 40.810601] [ 40.811673] allocated by task 281 on cpu 0 at 40.802696s (0.008966s ago): [ 40.812586] test_alloc+0x22c/0x620 [ 40.813255] test_out_of_bounds_write+0xc8/0x240 [ 40.814019] kunit_try_run_case+0x14c/0x3d0 [ 40.814536] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.815397] kthread+0x24c/0x2d0 [ 40.815999] ret_from_fork+0x10/0x20 [ 40.816522] [ 40.816892] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 40.818157] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.818819] Hardware name: linux,dummy-virt (DT) [ 40.819560] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 40.490813] ================================================================== [ 40.491800] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 40.491800] [ 40.492759] Out-of-bounds read at 0x00000000f8fc7b89 (1B left of kfence-#135): [ 40.493522] test_out_of_bounds_read+0x114/0x3e0 [ 40.494412] test_out_of_bounds_read+0xdc/0x3e0 [ 40.495117] kunit_try_run_case+0x14c/0x3d0 [ 40.495743] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.496450] kthread+0x24c/0x2d0 [ 40.496966] ret_from_fork+0x10/0x20 [ 40.497656] [ 40.497977] kfence-#135: 0x00000000aa9bdd4f-0x00000000d4f799ea, size=32, cache=test [ 40.497977] [ 40.498967] allocated by task 277 on cpu 0 at 40.490620s (0.008336s ago): [ 40.500100] test_alloc+0x22c/0x620 [ 40.500794] test_out_of_bounds_read+0xdc/0x3e0 [ 40.501519] kunit_try_run_case+0x14c/0x3d0 [ 40.502191] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.502928] kthread+0x24c/0x2d0 [ 40.503519] ret_from_fork+0x10/0x20 [ 40.504187] [ 40.504545] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 40.505728] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.506386] Hardware name: linux,dummy-virt (DT) [ 40.507184] ================================================================== [ 40.179037] ================================================================== [ 40.179857] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 40.179857] [ 40.180857] Out-of-bounds read at 0x00000000948dd830 (32B right of kfence-#132): [ 40.181894] test_out_of_bounds_read+0x1c8/0x3e0 [ 40.182671] test_out_of_bounds_read+0x198/0x3e0 [ 40.183260] kunit_try_run_case+0x14c/0x3d0 [ 40.184045] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.184736] kthread+0x24c/0x2d0 [ 40.185426] ret_from_fork+0x10/0x20 [ 40.186128] [ 40.186545] kfence-#132: 0x00000000bf9e0475-0x00000000f1b250ff, size=32, cache=kmalloc-32 [ 40.186545] [ 40.187769] allocated by task 275 on cpu 1 at 40.178673s (0.009086s ago): [ 40.188588] test_alloc+0x298/0x620 [ 40.189235] test_out_of_bounds_read+0x198/0x3e0 [ 40.189922] kunit_try_run_case+0x14c/0x3d0 [ 40.190611] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.191267] kthread+0x24c/0x2d0 [ 40.191968] ret_from_fork+0x10/0x20 [ 40.192503] [ 40.192962] CPU: 1 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 40.194215] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.194864] Hardware name: linux,dummy-virt (DT) [ 40.195470] ================================================================== [ 40.594876] ================================================================== [ 40.595765] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 40.595765] [ 40.596576] Out-of-bounds read at 0x00000000fdf02350 (32B right of kfence-#136): [ 40.597599] test_out_of_bounds_read+0x1c8/0x3e0 [ 40.598299] test_out_of_bounds_read+0x198/0x3e0 [ 40.598845] kunit_try_run_case+0x14c/0x3d0 [ 40.599679] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.600541] kthread+0x24c/0x2d0 [ 40.601019] ret_from_fork+0x10/0x20 [ 40.601778] [ 40.602169] kfence-#136: 0x0000000073e6a0ab-0x00000000e8743b31, size=32, cache=test [ 40.602169] [ 40.603217] allocated by task 277 on cpu 0 at 40.594732s (0.008475s ago): [ 40.604220] test_alloc+0x22c/0x620 [ 40.604749] test_out_of_bounds_read+0x198/0x3e0 [ 40.605434] kunit_try_run_case+0x14c/0x3d0 [ 40.606252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.607104] kthread+0x24c/0x2d0 [ 40.607802] ret_from_fork+0x10/0x20 [ 40.608355] [ 40.608839] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 40.610143] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.610754] Hardware name: linux,dummy-virt (DT) [ 40.611450] ================================================================== [ 39.764024] ================================================================== [ 39.764890] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 39.764890] [ 39.765977] Out-of-bounds read at 0x00000000f8e4ece0 (1B left of kfence-#128): [ 39.767536] test_out_of_bounds_read+0x114/0x3e0 [ 39.768279] test_out_of_bounds_read+0xdc/0x3e0 [ 39.768914] kunit_try_run_case+0x14c/0x3d0 [ 39.769587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.770433] kthread+0x24c/0x2d0 [ 39.771187] ret_from_fork+0x10/0x20 [ 39.771764] [ 39.772408] kfence-#128: 0x0000000042927e50-0x00000000382124db, size=32, cache=kmalloc-32 [ 39.772408] [ 39.773740] allocated by task 275 on cpu 1 at 39.762604s (0.010993s ago): [ 39.775325] test_alloc+0x298/0x620 [ 39.775899] test_out_of_bounds_read+0xdc/0x3e0 [ 39.776515] kunit_try_run_case+0x14c/0x3d0 [ 39.777155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.777920] kthread+0x24c/0x2d0 [ 39.778568] ret_from_fork+0x10/0x20 [ 39.779323] [ 39.779585] CPU: 1 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 39.780202] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.780487] Hardware name: linux,dummy-virt (DT) [ 39.781212] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 39.557692] ================================================================== [ 39.559525] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 39.560747] Write of size 121 at addr fff00000c6766e00 by task kunit_try_catch/273 [ 39.561597] [ 39.562498] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 39.563895] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.564452] Hardware name: linux,dummy-virt (DT) [ 39.565089] Call trace: [ 39.565483] show_stack+0x20/0x38 (C) [ 39.566504] dump_stack_lvl+0x8c/0xd0 [ 39.567352] print_report+0x118/0x5e0 [ 39.567913] kasan_report+0xc8/0x118 [ 39.568443] kasan_check_range+0x100/0x1a8 [ 39.569101] __kasan_check_write+0x20/0x30 [ 39.569759] strncpy_from_user+0x3c/0x2a0 [ 39.570525] copy_user_test_oob+0x5c0/0xec0 [ 39.571356] kunit_try_run_case+0x14c/0x3d0 [ 39.572172] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.572899] kthread+0x24c/0x2d0 [ 39.573392] ret_from_fork+0x10/0x20 [ 39.574216] [ 39.574731] Allocated by task 273: [ 39.575382] kasan_save_stack+0x3c/0x68 [ 39.576093] kasan_save_track+0x20/0x40 [ 39.576868] kasan_save_alloc_info+0x40/0x58 [ 39.577705] __kasan_kmalloc+0xd4/0xd8 [ 39.578415] __kmalloc_noprof+0x188/0x4c8 [ 39.579269] kunit_kmalloc_array+0x34/0x88 [ 39.579980] copy_user_test_oob+0xac/0xec0 [ 39.580512] kunit_try_run_case+0x14c/0x3d0 [ 39.581047] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.581760] kthread+0x24c/0x2d0 [ 39.582272] ret_from_fork+0x10/0x20 [ 39.582967] [ 39.583224] The buggy address belongs to the object at fff00000c6766e00 [ 39.583224] which belongs to the cache kmalloc-128 of size 128 [ 39.584832] The buggy address is located 0 bytes inside of [ 39.584832] allocated 120-byte region [fff00000c6766e00, fff00000c6766e78) [ 39.586246] [ 39.586566] The buggy address belongs to the physical page: [ 39.587515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106766 [ 39.588366] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.589357] page_type: f5(slab) [ 39.589847] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 39.590990] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 39.591883] page dumped because: kasan: bad access detected [ 39.592593] [ 39.593013] Memory state around the buggy address: [ 39.593601] fff00000c6766d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 39.594817] fff00000c6766d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.595730] >fff00000c6766e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 39.596845] ^ [ 39.597562] fff00000c6766e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.598412] fff00000c6766f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.599353] ================================================================== [ 39.601182] ================================================================== [ 39.602447] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 39.603466] Write of size 1 at addr fff00000c6766e78 by task kunit_try_catch/273 [ 39.604585] [ 39.605086] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 39.606371] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.607066] Hardware name: linux,dummy-virt (DT) [ 39.607792] Call trace: [ 39.608358] show_stack+0x20/0x38 (C) [ 39.608953] dump_stack_lvl+0x8c/0xd0 [ 39.609573] print_report+0x118/0x5e0 [ 39.610157] kasan_report+0xc8/0x118 [ 39.610666] __asan_report_store1_noabort+0x20/0x30 [ 39.611562] strncpy_from_user+0x270/0x2a0 [ 39.612250] copy_user_test_oob+0x5c0/0xec0 [ 39.612888] kunit_try_run_case+0x14c/0x3d0 [ 39.613569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.614329] kthread+0x24c/0x2d0 [ 39.614999] ret_from_fork+0x10/0x20 [ 39.615589] [ 39.616034] Allocated by task 273: [ 39.616543] kasan_save_stack+0x3c/0x68 [ 39.617152] kasan_save_track+0x20/0x40 [ 39.617744] kasan_save_alloc_info+0x40/0x58 [ 39.618441] __kasan_kmalloc+0xd4/0xd8 [ 39.619030] __kmalloc_noprof+0x188/0x4c8 [ 39.619727] kunit_kmalloc_array+0x34/0x88 [ 39.620344] copy_user_test_oob+0xac/0xec0 [ 39.621049] kunit_try_run_case+0x14c/0x3d0 [ 39.621568] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.622385] kthread+0x24c/0x2d0 [ 39.623028] ret_from_fork+0x10/0x20 [ 39.623577] [ 39.623947] The buggy address belongs to the object at fff00000c6766e00 [ 39.623947] which belongs to the cache kmalloc-128 of size 128 [ 39.625330] The buggy address is located 0 bytes to the right of [ 39.625330] allocated 120-byte region [fff00000c6766e00, fff00000c6766e78) [ 39.626824] [ 39.627184] The buggy address belongs to the physical page: [ 39.627893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106766 [ 39.628884] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.629721] page_type: f5(slab) [ 39.630190] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 39.631274] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 39.632153] page dumped because: kasan: bad access detected [ 39.632958] [ 39.633386] Memory state around the buggy address: [ 39.633934] fff00000c6766d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 39.634752] fff00000c6766d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.635762] >fff00000c6766e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 39.636734] ^ [ 39.637675] fff00000c6766e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.638694] fff00000c6766f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.639556] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 39.437521] ================================================================== [ 39.438233] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0 [ 39.439309] Read of size 121 at addr fff00000c6766e00 by task kunit_try_catch/273 [ 39.440750] [ 39.441087] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 39.443880] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.444691] Hardware name: linux,dummy-virt (DT) [ 39.445485] Call trace: [ 39.445917] show_stack+0x20/0x38 (C) [ 39.446505] dump_stack_lvl+0x8c/0xd0 [ 39.447039] print_report+0x118/0x5e0 [ 39.447559] kasan_report+0xc8/0x118 [ 39.448147] kasan_check_range+0x100/0x1a8 [ 39.448764] __kasan_check_read+0x20/0x30 [ 39.449469] copy_user_test_oob+0x3c8/0xec0 [ 39.450016] kunit_try_run_case+0x14c/0x3d0 [ 39.450742] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.451593] kthread+0x24c/0x2d0 [ 39.452189] ret_from_fork+0x10/0x20 [ 39.452851] [ 39.453262] Allocated by task 273: [ 39.453739] kasan_save_stack+0x3c/0x68 [ 39.454329] kasan_save_track+0x20/0x40 [ 39.454766] kasan_save_alloc_info+0x40/0x58 [ 39.455229] __kasan_kmalloc+0xd4/0xd8 [ 39.455675] __kmalloc_noprof+0x188/0x4c8 [ 39.456100] kunit_kmalloc_array+0x34/0x88 [ 39.456753] copy_user_test_oob+0xac/0xec0 [ 39.457586] kunit_try_run_case+0x14c/0x3d0 [ 39.458074] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.458745] kthread+0x24c/0x2d0 [ 39.459370] ret_from_fork+0x10/0x20 [ 39.459918] [ 39.460213] The buggy address belongs to the object at fff00000c6766e00 [ 39.460213] which belongs to the cache kmalloc-128 of size 128 [ 39.461870] The buggy address is located 0 bytes inside of [ 39.461870] allocated 120-byte region [fff00000c6766e00, fff00000c6766e78) [ 39.463487] [ 39.463813] The buggy address belongs to the physical page: [ 39.464538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106766 [ 39.465229] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.466192] page_type: f5(slab) [ 39.466682] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 39.467735] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 39.468874] page dumped because: kasan: bad access detected [ 39.469572] [ 39.469966] Memory state around the buggy address: [ 39.470651] fff00000c6766d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 39.471706] fff00000c6766d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.472701] >fff00000c6766e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 39.473520] ^ [ 39.474401] fff00000c6766e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.475282] fff00000c6766f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.476232] ================================================================== [ 39.479349] ================================================================== [ 39.480226] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0 [ 39.480971] Write of size 121 at addr fff00000c6766e00 by task kunit_try_catch/273 [ 39.481896] [ 39.482408] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 39.483657] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.484192] Hardware name: linux,dummy-virt (DT) [ 39.484818] Call trace: [ 39.485306] show_stack+0x20/0x38 (C) [ 39.485983] dump_stack_lvl+0x8c/0xd0 [ 39.486689] print_report+0x118/0x5e0 [ 39.487273] kasan_report+0xc8/0x118 [ 39.488032] kasan_check_range+0x100/0x1a8 [ 39.488759] __kasan_check_write+0x20/0x30 [ 39.489356] copy_user_test_oob+0x434/0xec0 [ 39.490038] kunit_try_run_case+0x14c/0x3d0 [ 39.490707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.491478] kthread+0x24c/0x2d0 [ 39.492100] ret_from_fork+0x10/0x20 [ 39.492808] [ 39.493136] Allocated by task 273: [ 39.493645] kasan_save_stack+0x3c/0x68 [ 39.494253] kasan_save_track+0x20/0x40 [ 39.494856] kasan_save_alloc_info+0x40/0x58 [ 39.495371] __kasan_kmalloc+0xd4/0xd8 [ 39.496122] __kmalloc_noprof+0x188/0x4c8 [ 39.496679] kunit_kmalloc_array+0x34/0x88 [ 39.497304] copy_user_test_oob+0xac/0xec0 [ 39.497941] kunit_try_run_case+0x14c/0x3d0 [ 39.498646] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.499366] kthread+0x24c/0x2d0 [ 39.499823] ret_from_fork+0x10/0x20 [ 39.500443] [ 39.500814] The buggy address belongs to the object at fff00000c6766e00 [ 39.500814] which belongs to the cache kmalloc-128 of size 128 [ 39.502165] The buggy address is located 0 bytes inside of [ 39.502165] allocated 120-byte region [fff00000c6766e00, fff00000c6766e78) [ 39.503564] [ 39.503911] The buggy address belongs to the physical page: [ 39.504791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106766 [ 39.505724] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.506649] page_type: f5(slab) [ 39.507263] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 39.508108] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 39.509136] page dumped because: kasan: bad access detected [ 39.509970] [ 39.510318] Memory state around the buggy address: [ 39.510957] fff00000c6766d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 39.511940] fff00000c6766d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.512965] >fff00000c6766e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 39.513847] ^ [ 39.514781] fff00000c6766e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.515682] fff00000c6766f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.516505] ================================================================== [ 39.295031] ================================================================== [ 39.296469] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0 [ 39.297285] Write of size 121 at addr fff00000c6766e00 by task kunit_try_catch/273 [ 39.298070] [ 39.299177] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 39.300510] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.301127] Hardware name: linux,dummy-virt (DT) [ 39.301955] Call trace: [ 39.302456] show_stack+0x20/0x38 (C) [ 39.303145] dump_stack_lvl+0x8c/0xd0 [ 39.303850] print_report+0x118/0x5e0 [ 39.304416] kasan_report+0xc8/0x118 [ 39.304961] kasan_check_range+0x100/0x1a8 [ 39.305530] __kasan_check_write+0x20/0x30 [ 39.306481] copy_user_test_oob+0x234/0xec0 [ 39.307154] kunit_try_run_case+0x14c/0x3d0 [ 39.307754] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.308514] kthread+0x24c/0x2d0 [ 39.309072] ret_from_fork+0x10/0x20 [ 39.309820] [ 39.310277] Allocated by task 273: [ 39.311228] kasan_save_stack+0x3c/0x68 [ 39.311831] kasan_save_track+0x20/0x40 [ 39.312340] kasan_save_alloc_info+0x40/0x58 [ 39.313083] __kasan_kmalloc+0xd4/0xd8 [ 39.313652] __kmalloc_noprof+0x188/0x4c8 [ 39.314383] kunit_kmalloc_array+0x34/0x88 [ 39.315296] copy_user_test_oob+0xac/0xec0 [ 39.315862] kunit_try_run_case+0x14c/0x3d0 [ 39.316758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.317745] kthread+0x24c/0x2d0 [ 39.319101] ret_from_fork+0x10/0x20 [ 39.319537] [ 39.320099] The buggy address belongs to the object at fff00000c6766e00 [ 39.320099] which belongs to the cache kmalloc-128 of size 128 [ 39.321445] The buggy address is located 0 bytes inside of [ 39.321445] allocated 120-byte region [fff00000c6766e00, fff00000c6766e78) [ 39.323309] [ 39.323785] The buggy address belongs to the physical page: [ 39.324501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106766 [ 39.325436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.326485] page_type: f5(slab) [ 39.327275] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 39.328197] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 39.329154] page dumped because: kasan: bad access detected [ 39.329758] [ 39.330235] Memory state around the buggy address: [ 39.331466] fff00000c6766d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 39.332491] fff00000c6766d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.333464] >fff00000c6766e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 39.335012] ^ [ 39.335619] fff00000c6766e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.336830] fff00000c6766f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.337684] ================================================================== [ 39.346381] ================================================================== [ 39.347785] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0 [ 39.348673] Read of size 121 at addr fff00000c6766e00 by task kunit_try_catch/273 [ 39.350179] [ 39.351057] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 39.352527] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.353238] Hardware name: linux,dummy-virt (DT) [ 39.353967] Call trace: [ 39.354372] show_stack+0x20/0x38 (C) [ 39.355017] dump_stack_lvl+0x8c/0xd0 [ 39.355613] print_report+0x118/0x5e0 [ 39.356234] kasan_report+0xc8/0x118 [ 39.356911] kasan_check_range+0x100/0x1a8 [ 39.357642] __kasan_check_read+0x20/0x30 [ 39.358197] copy_user_test_oob+0x728/0xec0 [ 39.358950] kunit_try_run_case+0x14c/0x3d0 [ 39.359697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.360446] kthread+0x24c/0x2d0 [ 39.360999] ret_from_fork+0x10/0x20 [ 39.361732] [ 39.362177] Allocated by task 273: [ 39.362775] kasan_save_stack+0x3c/0x68 [ 39.363259] kasan_save_track+0x20/0x40 [ 39.364003] kasan_save_alloc_info+0x40/0x58 [ 39.364535] __kasan_kmalloc+0xd4/0xd8 [ 39.365185] __kmalloc_noprof+0x188/0x4c8 [ 39.365959] kunit_kmalloc_array+0x34/0x88 [ 39.366521] copy_user_test_oob+0xac/0xec0 [ 39.367238] kunit_try_run_case+0x14c/0x3d0 [ 39.367865] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.368607] kthread+0x24c/0x2d0 [ 39.369121] ret_from_fork+0x10/0x20 [ 39.369657] [ 39.370085] The buggy address belongs to the object at fff00000c6766e00 [ 39.370085] which belongs to the cache kmalloc-128 of size 128 [ 39.371451] The buggy address is located 0 bytes inside of [ 39.371451] allocated 120-byte region [fff00000c6766e00, fff00000c6766e78) [ 39.372832] [ 39.373246] The buggy address belongs to the physical page: [ 39.373937] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106766 [ 39.374942] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.375746] page_type: f5(slab) [ 39.376293] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 39.377244] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 39.378188] page dumped because: kasan: bad access detected [ 39.378866] [ 39.379194] Memory state around the buggy address: [ 39.379856] fff00000c6766d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 39.380647] fff00000c6766d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.381656] >fff00000c6766e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 39.382483] ^ [ 39.383392] fff00000c6766e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.384304] fff00000c6766f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.385263] ================================================================== [ 39.394559] ================================================================== [ 39.395345] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0 [ 39.396136] Write of size 121 at addr fff00000c6766e00 by task kunit_try_catch/273 [ 39.397018] [ 39.397401] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 39.399172] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.399834] Hardware name: linux,dummy-virt (DT) [ 39.400566] Call trace: [ 39.401104] show_stack+0x20/0x38 (C) [ 39.401939] dump_stack_lvl+0x8c/0xd0 [ 39.402681] print_report+0x118/0x5e0 [ 39.403296] kasan_report+0xc8/0x118 [ 39.403982] kasan_check_range+0x100/0x1a8 [ 39.404695] __kasan_check_write+0x20/0x30 [ 39.405379] copy_user_test_oob+0x35c/0xec0 [ 39.406074] kunit_try_run_case+0x14c/0x3d0 [ 39.406823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.407702] kthread+0x24c/0x2d0 [ 39.408293] ret_from_fork+0x10/0x20 [ 39.408851] [ 39.409108] Allocated by task 273: [ 39.409501] kasan_save_stack+0x3c/0x68 [ 39.409953] kasan_save_track+0x20/0x40 [ 39.410397] kasan_save_alloc_info+0x40/0x58 [ 39.411070] __kasan_kmalloc+0xd4/0xd8 [ 39.411927] __kmalloc_noprof+0x188/0x4c8 [ 39.412588] kunit_kmalloc_array+0x34/0x88 [ 39.413058] copy_user_test_oob+0xac/0xec0 [ 39.416293] kunit_try_run_case+0x14c/0x3d0 [ 39.416977] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.417730] kthread+0x24c/0x2d0 [ 39.418219] ret_from_fork+0x10/0x20 [ 39.418962] [ 39.419293] The buggy address belongs to the object at fff00000c6766e00 [ 39.419293] which belongs to the cache kmalloc-128 of size 128 [ 39.420715] The buggy address is located 0 bytes inside of [ 39.420715] allocated 120-byte region [fff00000c6766e00, fff00000c6766e78) [ 39.422574] [ 39.423036] The buggy address belongs to the physical page: [ 39.424033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106766 [ 39.424987] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.425729] page_type: f5(slab) [ 39.426272] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 39.427769] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 39.428640] page dumped because: kasan: bad access detected [ 39.429329] [ 39.429668] Memory state around the buggy address: [ 39.430409] fff00000c6766d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 39.431258] fff00000c6766d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.432287] >fff00000c6766e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 39.433194] ^ [ 39.434131] fff00000c6766e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.435034] fff00000c6766f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.436038] ================================================================== [ 39.518205] ================================================================== [ 39.519129] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0 [ 39.520418] Read of size 121 at addr fff00000c6766e00 by task kunit_try_catch/273 [ 39.521146] [ 39.521485] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 39.523027] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.523559] Hardware name: linux,dummy-virt (DT) [ 39.524336] Call trace: [ 39.524820] show_stack+0x20/0x38 (C) [ 39.525343] dump_stack_lvl+0x8c/0xd0 [ 39.526069] print_report+0x118/0x5e0 [ 39.526680] kasan_report+0xc8/0x118 [ 39.527270] kasan_check_range+0x100/0x1a8 [ 39.527903] __kasan_check_read+0x20/0x30 [ 39.528490] copy_user_test_oob+0x4a0/0xec0 [ 39.529111] kunit_try_run_case+0x14c/0x3d0 [ 39.529954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.530671] kthread+0x24c/0x2d0 [ 39.531237] ret_from_fork+0x10/0x20 [ 39.531893] [ 39.532260] Allocated by task 273: [ 39.532754] kasan_save_stack+0x3c/0x68 [ 39.533367] kasan_save_track+0x20/0x40 [ 39.534106] kasan_save_alloc_info+0x40/0x58 [ 39.534745] __kasan_kmalloc+0xd4/0xd8 [ 39.535228] __kmalloc_noprof+0x188/0x4c8 [ 39.535920] kunit_kmalloc_array+0x34/0x88 [ 39.536536] copy_user_test_oob+0xac/0xec0 [ 39.537155] kunit_try_run_case+0x14c/0x3d0 [ 39.537698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.538521] kthread+0x24c/0x2d0 [ 39.539067] ret_from_fork+0x10/0x20 [ 39.539807] [ 39.540102] The buggy address belongs to the object at fff00000c6766e00 [ 39.540102] which belongs to the cache kmalloc-128 of size 128 [ 39.541533] The buggy address is located 0 bytes inside of [ 39.541533] allocated 120-byte region [fff00000c6766e00, fff00000c6766e78) [ 39.543031] [ 39.543366] The buggy address belongs to the physical page: [ 39.544113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106766 [ 39.545038] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.545864] page_type: f5(slab) [ 39.546452] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 39.547407] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 39.548398] page dumped because: kasan: bad access detected [ 39.549090] [ 39.549420] Memory state around the buggy address: [ 39.550090] fff00000c6766d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 39.551035] fff00000c6766d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.551907] >fff00000c6766e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 39.552782] ^ [ 39.553650] fff00000c6766e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.554530] fff00000c6766f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.555436] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 39.159297] ================================================================== [ 39.160923] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 39.161997] Read of size 8 at addr fff00000c6646978 by task kunit_try_catch/269 [ 39.162848] [ 39.163252] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 39.165945] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.166887] Hardware name: linux,dummy-virt (DT) [ 39.167365] Call trace: [ 39.167959] show_stack+0x20/0x38 (C) [ 39.168951] dump_stack_lvl+0x8c/0xd0 [ 39.169606] print_report+0x118/0x5e0 [ 39.170479] kasan_report+0xc8/0x118 [ 39.171181] __asan_report_load8_noabort+0x20/0x30 [ 39.172812] copy_to_kernel_nofault+0x204/0x250 [ 39.173561] copy_to_kernel_nofault_oob+0x158/0x418 [ 39.174375] kunit_try_run_case+0x14c/0x3d0 [ 39.175680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.177391] kthread+0x24c/0x2d0 [ 39.178093] ret_from_fork+0x10/0x20 [ 39.178870] [ 39.179285] Allocated by task 269: [ 39.179905] kasan_save_stack+0x3c/0x68 [ 39.180490] kasan_save_track+0x20/0x40 [ 39.181295] kasan_save_alloc_info+0x40/0x58 [ 39.182084] __kasan_kmalloc+0xd4/0xd8 [ 39.183353] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.184756] copy_to_kernel_nofault_oob+0xc8/0x418 [ 39.185412] kunit_try_run_case+0x14c/0x3d0 [ 39.186116] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.187374] kthread+0x24c/0x2d0 [ 39.188165] ret_from_fork+0x10/0x20 [ 39.188768] [ 39.189249] The buggy address belongs to the object at fff00000c6646900 [ 39.189249] which belongs to the cache kmalloc-128 of size 128 [ 39.191319] The buggy address is located 0 bytes to the right of [ 39.191319] allocated 120-byte region [fff00000c6646900, fff00000c6646978) [ 39.192680] [ 39.192982] The buggy address belongs to the physical page: [ 39.194741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106646 [ 39.195845] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.196488] page_type: f5(slab) [ 39.197175] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 39.198487] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 39.199766] page dumped because: kasan: bad access detected [ 39.200579] [ 39.201066] Memory state around the buggy address: [ 39.201828] fff00000c6646800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 39.203421] fff00000c6646880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.204169] >fff00000c6646900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 39.205058] ^ [ 39.207184] fff00000c6646980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.208203] fff00000c6646a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.209102] ================================================================== [ 39.212007] ================================================================== [ 39.212751] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 39.213877] Write of size 8 at addr fff00000c6646978 by task kunit_try_catch/269 [ 39.215153] [ 39.215490] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 39.218547] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.219491] Hardware name: linux,dummy-virt (DT) [ 39.220955] Call trace: [ 39.221492] show_stack+0x20/0x38 (C) [ 39.222609] dump_stack_lvl+0x8c/0xd0 [ 39.223327] print_report+0x118/0x5e0 [ 39.224168] kasan_report+0xc8/0x118 [ 39.224968] kasan_check_range+0x100/0x1a8 [ 39.225615] __kasan_check_write+0x20/0x30 [ 39.226854] copy_to_kernel_nofault+0x8c/0x250 [ 39.227383] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 39.227909] kunit_try_run_case+0x14c/0x3d0 [ 39.228726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.229600] kthread+0x24c/0x2d0 [ 39.230650] ret_from_fork+0x10/0x20 [ 39.231332] [ 39.231778] Allocated by task 269: [ 39.232454] kasan_save_stack+0x3c/0x68 [ 39.233039] kasan_save_track+0x20/0x40 [ 39.234383] kasan_save_alloc_info+0x40/0x58 [ 39.235050] __kasan_kmalloc+0xd4/0xd8 [ 39.235372] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.235753] copy_to_kernel_nofault_oob+0xc8/0x418 [ 39.236558] kunit_try_run_case+0x14c/0x3d0 [ 39.237487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.238638] kthread+0x24c/0x2d0 [ 39.239074] ret_from_fork+0x10/0x20 [ 39.239763] [ 39.240188] The buggy address belongs to the object at fff00000c6646900 [ 39.240188] which belongs to the cache kmalloc-128 of size 128 [ 39.241908] The buggy address is located 0 bytes to the right of [ 39.241908] allocated 120-byte region [fff00000c6646900, fff00000c6646978) [ 39.243913] [ 39.244933] The buggy address belongs to the physical page: [ 39.245987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106646 [ 39.247878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.248319] page_type: f5(slab) [ 39.248586] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 39.249074] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 39.249513] page dumped because: kasan: bad access detected [ 39.251919] [ 39.252319] Memory state around the buggy address: [ 39.252991] fff00000c6646800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 39.253891] fff00000c6646880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.254783] >fff00000c6646900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 39.256201] ^ [ 39.257143] fff00000c6646980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.258580] fff00000c6646a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.259917] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 39.032213] ================================================================== [ 39.033682] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 39.034698] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/257 [ 39.036256] [ 39.036588] CPU: 0 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 39.037553] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.038391] Hardware name: linux,dummy-virt (DT) [ 39.039015] Call trace: [ 39.039446] show_stack+0x20/0x38 (C) [ 39.040167] dump_stack_lvl+0x8c/0xd0 [ 39.040698] print_report+0x2fc/0x5e0 [ 39.041319] kasan_report+0xc8/0x118 [ 39.042184] __asan_report_load1_noabort+0x20/0x30 [ 39.043221] vmalloc_oob+0x578/0x5d0 [ 39.044313] kunit_try_run_case+0x14c/0x3d0 [ 39.045088] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.046119] kthread+0x24c/0x2d0 [ 39.047247] ret_from_fork+0x10/0x20 [ 39.048037] [ 39.048299] The buggy address belongs to the virtual mapping at [ 39.048299] [ffff80008010b000, ffff80008010d000) created by: [ 39.048299] vmalloc_oob+0x98/0x5d0 [ 39.050296] [ 39.050712] The buggy address belongs to the physical page: [ 39.052000] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10666d [ 39.053100] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.054111] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 39.055563] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.056442] page dumped because: kasan: bad access detected [ 39.057274] [ 39.057707] Memory state around the buggy address: [ 39.058684] ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.060002] ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.060755] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 39.061750] ^ [ 39.063243] ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 39.064478] ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 39.065240] ================================================================== [ 39.068751] ================================================================== [ 39.070209] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 39.071334] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/257 [ 39.072591] [ 39.073022] CPU: 0 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 39.074581] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.075031] Hardware name: linux,dummy-virt (DT) [ 39.075603] Call trace: [ 39.076022] show_stack+0x20/0x38 (C) [ 39.076817] dump_stack_lvl+0x8c/0xd0 [ 39.077409] print_report+0x2fc/0x5e0 [ 39.078427] kasan_report+0xc8/0x118 [ 39.079010] __asan_report_load1_noabort+0x20/0x30 [ 39.079935] vmalloc_oob+0x51c/0x5d0 [ 39.080666] kunit_try_run_case+0x14c/0x3d0 [ 39.081319] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.082416] kthread+0x24c/0x2d0 [ 39.083267] ret_from_fork+0x10/0x20 [ 39.083886] [ 39.084182] The buggy address belongs to the virtual mapping at [ 39.084182] [ffff80008010b000, ffff80008010d000) created by: [ 39.084182] vmalloc_oob+0x98/0x5d0 [ 39.086397] [ 39.086980] The buggy address belongs to the physical page: [ 39.088391] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10666d [ 39.089566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.090988] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 39.092554] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.093928] page dumped because: kasan: bad access detected [ 39.094709] [ 39.095036] Memory state around the buggy address: [ 39.095954] ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.096875] ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.097996] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 39.099252] ^ [ 39.100912] ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 39.102589] ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 39.104389] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 37.643395] ================================================================== [ 37.644357] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 37.645930] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.647000] [ 37.647292] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.648533] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.649855] Hardware name: linux,dummy-virt (DT) [ 37.650590] Call trace: [ 37.651092] show_stack+0x20/0x38 (C) [ 37.651771] dump_stack_lvl+0x8c/0xd0 [ 37.652421] print_report+0x118/0x5e0 [ 37.653078] kasan_report+0xc8/0x118 [ 37.653717] kasan_check_range+0x100/0x1a8 [ 37.654446] __kasan_check_write+0x20/0x30 [ 37.655129] kasan_atomics_helper+0xca0/0x4858 [ 37.655854] kasan_atomics+0x198/0x2e8 [ 37.656576] kunit_try_run_case+0x14c/0x3d0 [ 37.657338] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.658184] kthread+0x24c/0x2d0 [ 37.658850] ret_from_fork+0x10/0x20 [ 37.659522] [ 37.659891] Allocated by task 253: [ 37.660483] kasan_save_stack+0x3c/0x68 [ 37.661246] kasan_save_track+0x20/0x40 [ 37.662018] kasan_save_alloc_info+0x40/0x58 [ 37.662752] __kasan_kmalloc+0xd4/0xd8 [ 37.663372] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.664119] kasan_atomics+0xb8/0x2e8 [ 37.664784] kunit_try_run_case+0x14c/0x3d0 [ 37.665474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.666268] kthread+0x24c/0x2d0 [ 37.666991] ret_from_fork+0x10/0x20 [ 37.667708] [ 37.668098] The buggy address belongs to the object at fff00000c6767080 [ 37.668098] which belongs to the cache kmalloc-64 of size 64 [ 37.668874] The buggy address is located 0 bytes to the right of [ 37.668874] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.670692] [ 37.671186] The buggy address belongs to the physical page: [ 37.671952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.673065] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.673947] page_type: f5(slab) [ 37.674531] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.675562] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.676534] page dumped because: kasan: bad access detected [ 37.677315] [ 37.677679] Memory state around the buggy address: [ 37.678408] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.679453] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.680406] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.681287] ^ [ 37.682015] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.682954] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.683926] ================================================================== [ 37.886319] ================================================================== [ 37.887927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 37.889220] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.890572] [ 37.890984] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.892061] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.892659] Hardware name: linux,dummy-virt (DT) [ 37.893439] Call trace: [ 37.893843] show_stack+0x20/0x38 (C) [ 37.894466] dump_stack_lvl+0x8c/0xd0 [ 37.895151] print_report+0x118/0x5e0 [ 37.895804] kasan_report+0xc8/0x118 [ 37.896378] kasan_check_range+0x100/0x1a8 [ 37.897034] __kasan_check_write+0x20/0x30 [ 37.897588] kasan_atomics_helper+0xe44/0x4858 [ 37.898349] kasan_atomics+0x198/0x2e8 [ 37.898976] kunit_try_run_case+0x14c/0x3d0 [ 37.899320] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.899773] kthread+0x24c/0x2d0 [ 37.900330] ret_from_fork+0x10/0x20 [ 37.901084] [ 37.901396] Allocated by task 253: [ 37.902141] kasan_save_stack+0x3c/0x68 [ 37.902740] kasan_save_track+0x20/0x40 [ 37.903549] kasan_save_alloc_info+0x40/0x58 [ 37.904231] __kasan_kmalloc+0xd4/0xd8 [ 37.904913] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.905528] kasan_atomics+0xb8/0x2e8 [ 37.906103] kunit_try_run_case+0x14c/0x3d0 [ 37.906789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.907447] kthread+0x24c/0x2d0 [ 37.908093] ret_from_fork+0x10/0x20 [ 37.908586] [ 37.908955] The buggy address belongs to the object at fff00000c6767080 [ 37.908955] which belongs to the cache kmalloc-64 of size 64 [ 37.910383] The buggy address is located 0 bytes to the right of [ 37.910383] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.911826] [ 37.912165] The buggy address belongs to the physical page: [ 37.913069] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.913897] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.914872] page_type: f5(slab) [ 37.915356] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.916428] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.917372] page dumped because: kasan: bad access detected [ 37.918027] [ 37.918416] Memory state around the buggy address: [ 37.919126] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.919971] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.920894] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.921787] ^ [ 37.922388] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.923299] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.924224] ================================================================== [ 38.248189] ================================================================== [ 38.249018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 38.249913] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.250797] [ 38.251202] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.252316] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.253089] Hardware name: linux,dummy-virt (DT) [ 38.253842] Call trace: [ 38.254288] show_stack+0x20/0x38 (C) [ 38.254847] dump_stack_lvl+0x8c/0xd0 [ 38.255524] print_report+0x118/0x5e0 [ 38.256156] kasan_report+0xc8/0x118 [ 38.256732] kasan_check_range+0x100/0x1a8 [ 38.257469] __kasan_check_write+0x20/0x30 [ 38.258147] kasan_atomics_helper+0x1190/0x4858 [ 38.258945] kasan_atomics+0x198/0x2e8 [ 38.259493] kunit_try_run_case+0x14c/0x3d0 [ 38.260086] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.261059] kthread+0x24c/0x2d0 [ 38.261700] ret_from_fork+0x10/0x20 [ 38.262300] [ 38.262639] Allocated by task 253: [ 38.263142] kasan_save_stack+0x3c/0x68 [ 38.263857] kasan_save_track+0x20/0x40 [ 38.264387] kasan_save_alloc_info+0x40/0x58 [ 38.265038] __kasan_kmalloc+0xd4/0xd8 [ 38.265641] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.266216] kasan_atomics+0xb8/0x2e8 [ 38.266923] kunit_try_run_case+0x14c/0x3d0 [ 38.267524] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.268299] kthread+0x24c/0x2d0 [ 38.268787] ret_from_fork+0x10/0x20 [ 38.269461] [ 38.269777] The buggy address belongs to the object at fff00000c6767080 [ 38.269777] which belongs to the cache kmalloc-64 of size 64 [ 38.271190] The buggy address is located 0 bytes to the right of [ 38.271190] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.272741] [ 38.273141] The buggy address belongs to the physical page: [ 38.273920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.274988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.275794] page_type: f5(slab) [ 38.276375] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.277310] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.278243] page dumped because: kasan: bad access detected [ 38.278964] [ 38.279290] Memory state around the buggy address: [ 38.279926] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.280785] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.281591] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.282536] ^ [ 38.283297] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.284229] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.285095] ================================================================== [ 38.085497] ================================================================== [ 38.086397] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 38.087368] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.088162] [ 38.088738] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.090185] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.090863] Hardware name: linux,dummy-virt (DT) [ 38.091535] Call trace: [ 38.092056] show_stack+0x20/0x38 (C) [ 38.092797] dump_stack_lvl+0x8c/0xd0 [ 38.093411] print_report+0x118/0x5e0 [ 38.094141] kasan_report+0xc8/0x118 [ 38.094841] kasan_check_range+0x100/0x1a8 [ 38.095526] __kasan_check_write+0x20/0x30 [ 38.096269] kasan_atomics_helper+0xff0/0x4858 [ 38.097039] kasan_atomics+0x198/0x2e8 [ 38.097708] kunit_try_run_case+0x14c/0x3d0 [ 38.098417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.099353] kthread+0x24c/0x2d0 [ 38.100002] ret_from_fork+0x10/0x20 [ 38.100658] [ 38.101020] Allocated by task 253: [ 38.101684] kasan_save_stack+0x3c/0x68 [ 38.102402] kasan_save_track+0x20/0x40 [ 38.103079] kasan_save_alloc_info+0x40/0x58 [ 38.103816] __kasan_kmalloc+0xd4/0xd8 [ 38.104461] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.105148] kasan_atomics+0xb8/0x2e8 [ 38.105788] kunit_try_run_case+0x14c/0x3d0 [ 38.106508] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.107375] kthread+0x24c/0x2d0 [ 38.108068] ret_from_fork+0x10/0x20 [ 38.108739] [ 38.109087] The buggy address belongs to the object at fff00000c6767080 [ 38.109087] which belongs to the cache kmalloc-64 of size 64 [ 38.110692] The buggy address is located 0 bytes to the right of [ 38.110692] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.112205] [ 38.112747] The buggy address belongs to the physical page: [ 38.113537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.114740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.115728] page_type: f5(slab) [ 38.116370] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.117468] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.118311] page dumped because: kasan: bad access detected [ 38.119165] [ 38.119693] Memory state around the buggy address: [ 38.120405] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.121434] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.122489] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.123439] ^ [ 38.124133] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.125107] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.126005] ================================================================== [ 37.237396] ================================================================== [ 37.238771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 37.239642] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.240500] [ 37.240913] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.242466] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.243168] Hardware name: linux,dummy-virt (DT) [ 37.243903] Call trace: [ 37.244411] show_stack+0x20/0x38 (C) [ 37.245163] dump_stack_lvl+0x8c/0xd0 [ 37.245896] print_report+0x118/0x5e0 [ 37.246563] kasan_report+0xc8/0x118 [ 37.247359] kasan_check_range+0x100/0x1a8 [ 37.248094] __kasan_check_write+0x20/0x30 [ 37.248955] kasan_atomics_helper+0x934/0x4858 [ 37.249710] kasan_atomics+0x198/0x2e8 [ 37.250370] kunit_try_run_case+0x14c/0x3d0 [ 37.251098] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.251945] kthread+0x24c/0x2d0 [ 37.252536] ret_from_fork+0x10/0x20 [ 37.253173] [ 37.253524] Allocated by task 253: [ 37.254252] kasan_save_stack+0x3c/0x68 [ 37.255017] kasan_save_track+0x20/0x40 [ 37.255657] kasan_save_alloc_info+0x40/0x58 [ 37.256306] __kasan_kmalloc+0xd4/0xd8 [ 37.256962] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.257691] kasan_atomics+0xb8/0x2e8 [ 37.258337] kunit_try_run_case+0x14c/0x3d0 [ 37.259137] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.259937] kthread+0x24c/0x2d0 [ 37.260495] ret_from_fork+0x10/0x20 [ 37.261061] [ 37.261406] The buggy address belongs to the object at fff00000c6767080 [ 37.261406] which belongs to the cache kmalloc-64 of size 64 [ 37.263031] The buggy address is located 0 bytes to the right of [ 37.263031] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.264617] [ 37.265146] The buggy address belongs to the physical page: [ 37.265933] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.267017] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.267900] page_type: f5(slab) [ 37.268473] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.269502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.270450] page dumped because: kasan: bad access detected [ 37.271228] [ 37.271581] Memory state around the buggy address: [ 37.272382] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.273358] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.274316] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.275248] ^ [ 37.276021] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.276965] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.277871] ================================================================== [ 38.769796] ================================================================== [ 38.770760] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 38.772185] Read of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.773210] [ 38.773684] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.774882] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.775650] Hardware name: linux,dummy-virt (DT) [ 38.776303] Call trace: [ 38.776883] show_stack+0x20/0x38 (C) [ 38.777387] dump_stack_lvl+0x8c/0xd0 [ 38.778120] print_report+0x118/0x5e0 [ 38.778758] kasan_report+0xc8/0x118 [ 38.779520] __asan_report_load8_noabort+0x20/0x30 [ 38.780250] kasan_atomics_helper+0x3df4/0x4858 [ 38.781009] kasan_atomics+0x198/0x2e8 [ 38.781506] kunit_try_run_case+0x14c/0x3d0 [ 38.782236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.783014] kthread+0x24c/0x2d0 [ 38.783716] ret_from_fork+0x10/0x20 [ 38.784357] [ 38.784799] Allocated by task 253: [ 38.785245] kasan_save_stack+0x3c/0x68 [ 38.785873] kasan_save_track+0x20/0x40 [ 38.786612] kasan_save_alloc_info+0x40/0x58 [ 38.787262] __kasan_kmalloc+0xd4/0xd8 [ 38.787923] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.788588] kasan_atomics+0xb8/0x2e8 [ 38.789249] kunit_try_run_case+0x14c/0x3d0 [ 38.790005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.790727] kthread+0x24c/0x2d0 [ 38.791203] ret_from_fork+0x10/0x20 [ 38.791869] [ 38.792253] The buggy address belongs to the object at fff00000c6767080 [ 38.792253] which belongs to the cache kmalloc-64 of size 64 [ 38.793598] The buggy address is located 0 bytes to the right of [ 38.793598] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.795189] [ 38.795515] The buggy address belongs to the physical page: [ 38.796186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.797188] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.798096] page_type: f5(slab) [ 38.798618] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.799718] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.800704] page dumped because: kasan: bad access detected [ 38.801415] [ 38.801772] Memory state around the buggy address: [ 38.802338] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.803218] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.804153] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.805066] ^ [ 38.805576] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.806453] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.807466] ================================================================== [ 37.926261] ================================================================== [ 37.927294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 37.928117] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.929063] [ 37.929404] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.930681] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.931315] Hardware name: linux,dummy-virt (DT) [ 37.931926] Call trace: [ 37.932393] show_stack+0x20/0x38 (C) [ 37.933136] dump_stack_lvl+0x8c/0xd0 [ 37.933735] print_report+0x118/0x5e0 [ 37.934414] kasan_report+0xc8/0x118 [ 37.934938] __asan_report_store8_noabort+0x20/0x30 [ 37.935758] kasan_atomics_helper+0x3e5c/0x4858 [ 37.936442] kasan_atomics+0x198/0x2e8 [ 37.937123] kunit_try_run_case+0x14c/0x3d0 [ 37.937799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.938465] kthread+0x24c/0x2d0 [ 37.939129] ret_from_fork+0x10/0x20 [ 37.939697] [ 37.940062] Allocated by task 253: [ 37.940608] kasan_save_stack+0x3c/0x68 [ 37.941154] kasan_save_track+0x20/0x40 [ 37.941839] kasan_save_alloc_info+0x40/0x58 [ 37.942428] __kasan_kmalloc+0xd4/0xd8 [ 37.943137] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.943787] kasan_atomics+0xb8/0x2e8 [ 37.944343] kunit_try_run_case+0x14c/0x3d0 [ 37.945105] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.945840] kthread+0x24c/0x2d0 [ 37.946289] ret_from_fork+0x10/0x20 [ 37.947049] [ 37.947419] The buggy address belongs to the object at fff00000c6767080 [ 37.947419] which belongs to the cache kmalloc-64 of size 64 [ 37.948595] The buggy address is located 0 bytes to the right of [ 37.948595] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.950186] [ 37.950512] The buggy address belongs to the physical page: [ 37.951264] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.952362] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.953113] page_type: f5(slab) [ 37.953693] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.954657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.955547] page dumped because: kasan: bad access detected [ 37.956193] [ 37.956551] Memory state around the buggy address: [ 37.957200] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.958065] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.959024] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.959902] ^ [ 37.960497] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.961445] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.962297] ================================================================== [ 38.166774] ================================================================== [ 38.167718] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 38.168543] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.169323] [ 38.169783] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.171258] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.171987] Hardware name: linux,dummy-virt (DT) [ 38.172605] Call trace: [ 38.173058] show_stack+0x20/0x38 (C) [ 38.173696] dump_stack_lvl+0x8c/0xd0 [ 38.174365] print_report+0x118/0x5e0 [ 38.174860] kasan_report+0xc8/0x118 [ 38.175527] kasan_check_range+0x100/0x1a8 [ 38.176168] __kasan_check_write+0x20/0x30 [ 38.176813] kasan_atomics_helper+0x10c0/0x4858 [ 38.177466] kasan_atomics+0x198/0x2e8 [ 38.178131] kunit_try_run_case+0x14c/0x3d0 [ 38.178778] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.179551] kthread+0x24c/0x2d0 [ 38.180195] ret_from_fork+0x10/0x20 [ 38.180824] [ 38.181187] Allocated by task 253: [ 38.181721] kasan_save_stack+0x3c/0x68 [ 38.182291] kasan_save_track+0x20/0x40 [ 38.182955] kasan_save_alloc_info+0x40/0x58 [ 38.183699] __kasan_kmalloc+0xd4/0xd8 [ 38.184277] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.184907] kasan_atomics+0xb8/0x2e8 [ 38.185527] kunit_try_run_case+0x14c/0x3d0 [ 38.186121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.186928] kthread+0x24c/0x2d0 [ 38.187504] ret_from_fork+0x10/0x20 [ 38.188028] [ 38.188472] The buggy address belongs to the object at fff00000c6767080 [ 38.188472] which belongs to the cache kmalloc-64 of size 64 [ 38.189884] The buggy address is located 0 bytes to the right of [ 38.189884] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.191298] [ 38.191648] The buggy address belongs to the physical page: [ 38.192324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.193263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.194003] page_type: f5(slab) [ 38.194578] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.195538] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.196423] page dumped because: kasan: bad access detected [ 38.197138] [ 38.197458] Memory state around the buggy address: [ 38.198129] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.198926] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.199932] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.200773] ^ [ 38.201435] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.202361] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.203304] ================================================================== [ 38.205404] ================================================================== [ 38.206960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 38.207739] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.208190] [ 38.208379] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.209431] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.210091] Hardware name: linux,dummy-virt (DT) [ 38.211102] Call trace: [ 38.211773] show_stack+0x20/0x38 (C) [ 38.212533] dump_stack_lvl+0x8c/0xd0 [ 38.213315] print_report+0x118/0x5e0 [ 38.214111] kasan_report+0xc8/0x118 [ 38.214737] kasan_check_range+0x100/0x1a8 [ 38.215361] __kasan_check_write+0x20/0x30 [ 38.216063] kasan_atomics_helper+0x1128/0x4858 [ 38.216752] kasan_atomics+0x198/0x2e8 [ 38.217477] kunit_try_run_case+0x14c/0x3d0 [ 38.218152] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.218979] kthread+0x24c/0x2d0 [ 38.219574] ret_from_fork+0x10/0x20 [ 38.220317] [ 38.220683] Allocated by task 253: [ 38.221392] kasan_save_stack+0x3c/0x68 [ 38.222078] kasan_save_track+0x20/0x40 [ 38.222722] kasan_save_alloc_info+0x40/0x58 [ 38.223442] __kasan_kmalloc+0xd4/0xd8 [ 38.224043] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.224809] kasan_atomics+0xb8/0x2e8 [ 38.225440] kunit_try_run_case+0x14c/0x3d0 [ 38.226108] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.226959] kthread+0x24c/0x2d0 [ 38.227669] ret_from_fork+0x10/0x20 [ 38.228307] [ 38.228663] The buggy address belongs to the object at fff00000c6767080 [ 38.228663] which belongs to the cache kmalloc-64 of size 64 [ 38.230278] The buggy address is located 0 bytes to the right of [ 38.230278] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.231929] [ 38.232383] The buggy address belongs to the physical page: [ 38.233173] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.234216] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.235092] page_type: f5(slab) [ 38.235711] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.236721] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.237682] page dumped because: kasan: bad access detected [ 38.238455] [ 38.238860] Memory state around the buggy address: [ 38.239562] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.240613] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.241547] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.242477] ^ [ 38.243230] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.244280] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.245195] ================================================================== [ 37.111017] ================================================================== [ 37.111783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 37.112701] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.113537] [ 37.113993] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.115379] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.115886] Hardware name: linux,dummy-virt (DT) [ 37.116699] Call trace: [ 37.117121] show_stack+0x20/0x38 (C) [ 37.117781] dump_stack_lvl+0x8c/0xd0 [ 37.118445] print_report+0x118/0x5e0 [ 37.119055] kasan_report+0xc8/0x118 [ 37.119690] kasan_check_range+0x100/0x1a8 [ 37.120356] __kasan_check_write+0x20/0x30 [ 37.120979] kasan_atomics_helper+0x7cc/0x4858 [ 37.121760] kasan_atomics+0x198/0x2e8 [ 37.122370] kunit_try_run_case+0x14c/0x3d0 [ 37.123005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.123731] kthread+0x24c/0x2d0 [ 37.124380] ret_from_fork+0x10/0x20 [ 37.124998] [ 37.125366] Allocated by task 253: [ 37.125996] kasan_save_stack+0x3c/0x68 [ 37.126568] kasan_save_track+0x20/0x40 [ 37.127206] kasan_save_alloc_info+0x40/0x58 [ 37.127808] __kasan_kmalloc+0xd4/0xd8 [ 37.128564] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.129178] kasan_atomics+0xb8/0x2e8 [ 37.129918] kunit_try_run_case+0x14c/0x3d0 [ 37.130455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.131463] kthread+0x24c/0x2d0 [ 37.132061] ret_from_fork+0x10/0x20 [ 37.132692] [ 37.133030] The buggy address belongs to the object at fff00000c6767080 [ 37.133030] which belongs to the cache kmalloc-64 of size 64 [ 37.134950] The buggy address is located 0 bytes to the right of [ 37.134950] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.136491] [ 37.136832] The buggy address belongs to the physical page: [ 37.137619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.138722] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.139653] page_type: f5(slab) [ 37.140238] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.141183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.142079] page dumped because: kasan: bad access detected [ 37.142795] [ 37.143068] Memory state around the buggy address: [ 37.143801] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.144899] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.145908] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.146755] ^ [ 37.147405] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.148257] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.149212] ================================================================== [ 37.442587] ================================================================== [ 37.443656] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 37.444457] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.445226] [ 37.445804] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.447134] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.447765] Hardware name: linux,dummy-virt (DT) [ 37.448442] Call trace: [ 37.448818] show_stack+0x20/0x38 (C) [ 37.449538] dump_stack_lvl+0x8c/0xd0 [ 37.450117] print_report+0x118/0x5e0 [ 37.450681] kasan_report+0xc8/0x118 [ 37.451333] __asan_report_load4_noabort+0x20/0x30 [ 37.452033] kasan_atomics_helper+0x3dcc/0x4858 [ 37.452740] kasan_atomics+0x198/0x2e8 [ 37.453386] kunit_try_run_case+0x14c/0x3d0 [ 37.454021] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.454728] kthread+0x24c/0x2d0 [ 37.455294] ret_from_fork+0x10/0x20 [ 37.455936] [ 37.456290] Allocated by task 253: [ 37.456893] kasan_save_stack+0x3c/0x68 [ 37.457416] kasan_save_track+0x20/0x40 [ 37.458097] kasan_save_alloc_info+0x40/0x58 [ 37.458653] __kasan_kmalloc+0xd4/0xd8 [ 37.459309] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.459940] kasan_atomics+0xb8/0x2e8 [ 37.460453] kunit_try_run_case+0x14c/0x3d0 [ 37.461085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.461908] kthread+0x24c/0x2d0 [ 37.462514] ret_from_fork+0x10/0x20 [ 37.463120] [ 37.463462] The buggy address belongs to the object at fff00000c6767080 [ 37.463462] which belongs to the cache kmalloc-64 of size 64 [ 37.465049] The buggy address is located 0 bytes to the right of [ 37.465049] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.466346] [ 37.466683] The buggy address belongs to the physical page: [ 37.467380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.468432] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.469330] page_type: f5(slab) [ 37.470019] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.471025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.471995] page dumped because: kasan: bad access detected [ 37.472692] [ 37.473057] Memory state around the buggy address: [ 37.473760] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.474698] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.475613] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.476469] ^ [ 37.477119] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.478045] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.479033] ================================================================== [ 37.559576] ================================================================== [ 37.560441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 37.561456] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.563126] [ 37.563720] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.564989] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.565682] Hardware name: linux,dummy-virt (DT) [ 37.566412] Call trace: [ 37.566817] show_stack+0x20/0x38 (C) [ 37.567392] dump_stack_lvl+0x8c/0xd0 [ 37.568037] print_report+0x118/0x5e0 [ 37.568671] kasan_report+0xc8/0x118 [ 37.569577] kasan_check_range+0x100/0x1a8 [ 37.570295] __kasan_check_write+0x20/0x30 [ 37.571084] kasan_atomics_helper+0xc08/0x4858 [ 37.571811] kasan_atomics+0x198/0x2e8 [ 37.572529] kunit_try_run_case+0x14c/0x3d0 [ 37.573238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.574060] kthread+0x24c/0x2d0 [ 37.574709] ret_from_fork+0x10/0x20 [ 37.575412] [ 37.575771] Allocated by task 253: [ 37.576478] kasan_save_stack+0x3c/0x68 [ 37.577022] kasan_save_track+0x20/0x40 [ 37.577766] kasan_save_alloc_info+0x40/0x58 [ 37.578439] __kasan_kmalloc+0xd4/0xd8 [ 37.579192] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.579857] kasan_atomics+0xb8/0x2e8 [ 37.580567] kunit_try_run_case+0x14c/0x3d0 [ 37.581204] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.582019] kthread+0x24c/0x2d0 [ 37.582693] ret_from_fork+0x10/0x20 [ 37.583327] [ 37.583733] The buggy address belongs to the object at fff00000c6767080 [ 37.583733] which belongs to the cache kmalloc-64 of size 64 [ 37.585504] The buggy address is located 0 bytes to the right of [ 37.585504] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.587145] [ 37.587461] The buggy address belongs to the physical page: [ 37.588235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.589619] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.590787] page_type: f5(slab) [ 37.591698] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.592795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.593884] page dumped because: kasan: bad access detected [ 37.594871] [ 37.595252] Memory state around the buggy address: [ 37.596159] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.597293] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.598244] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.599478] ^ [ 37.600151] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.601342] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.602445] ================================================================== [ 37.685849] ================================================================== [ 37.686889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 37.687978] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.689382] [ 37.689716] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.691387] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.692100] Hardware name: linux,dummy-virt (DT) [ 37.692721] Call trace: [ 37.693040] show_stack+0x20/0x38 (C) [ 37.693690] dump_stack_lvl+0x8c/0xd0 [ 37.694280] print_report+0x118/0x5e0 [ 37.694899] kasan_report+0xc8/0x118 [ 37.695510] __asan_report_load4_noabort+0x20/0x30 [ 37.696182] kasan_atomics_helper+0x3dd8/0x4858 [ 37.696859] kasan_atomics+0x198/0x2e8 [ 37.697512] kunit_try_run_case+0x14c/0x3d0 [ 37.698135] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.698807] kthread+0x24c/0x2d0 [ 37.699279] ret_from_fork+0x10/0x20 [ 37.700080] [ 37.700496] Allocated by task 253: [ 37.701089] kasan_save_stack+0x3c/0x68 [ 37.701724] kasan_save_track+0x20/0x40 [ 37.702372] kasan_save_alloc_info+0x40/0x58 [ 37.702938] __kasan_kmalloc+0xd4/0xd8 [ 37.703654] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.704292] kasan_atomics+0xb8/0x2e8 [ 37.704941] kunit_try_run_case+0x14c/0x3d0 [ 37.705533] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.706299] kthread+0x24c/0x2d0 [ 37.706809] ret_from_fork+0x10/0x20 [ 37.707603] [ 37.707981] The buggy address belongs to the object at fff00000c6767080 [ 37.707981] which belongs to the cache kmalloc-64 of size 64 [ 37.709326] The buggy address is located 0 bytes to the right of [ 37.709326] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.710946] [ 37.711346] The buggy address belongs to the physical page: [ 37.712119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.713084] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.713985] page_type: f5(slab) [ 37.714473] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.715451] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.716352] page dumped because: kasan: bad access detected [ 37.717120] [ 37.717436] Memory state around the buggy address: [ 37.718096] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.718948] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.719885] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.720807] ^ [ 37.721465] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.722467] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.723355] ================================================================== [ 38.128567] ================================================================== [ 38.129992] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 38.130876] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.131348] [ 38.131539] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.132165] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.132445] Hardware name: linux,dummy-virt (DT) [ 38.132866] Call trace: [ 38.133219] show_stack+0x20/0x38 (C) [ 38.134328] dump_stack_lvl+0x8c/0xd0 [ 38.135498] print_report+0x118/0x5e0 [ 38.136266] kasan_report+0xc8/0x118 [ 38.136811] kasan_check_range+0x100/0x1a8 [ 38.137412] __kasan_check_write+0x20/0x30 [ 38.138094] kasan_atomics_helper+0x1058/0x4858 [ 38.138702] kasan_atomics+0x198/0x2e8 [ 38.139395] kunit_try_run_case+0x14c/0x3d0 [ 38.139985] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.140784] kthread+0x24c/0x2d0 [ 38.141417] ret_from_fork+0x10/0x20 [ 38.142047] [ 38.142397] Allocated by task 253: [ 38.142988] kasan_save_stack+0x3c/0x68 [ 38.143566] kasan_save_track+0x20/0x40 [ 38.144213] kasan_save_alloc_info+0x40/0x58 [ 38.144778] __kasan_kmalloc+0xd4/0xd8 [ 38.145404] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.146032] kasan_atomics+0xb8/0x2e8 [ 38.146686] kunit_try_run_case+0x14c/0x3d0 [ 38.147334] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.148236] kthread+0x24c/0x2d0 [ 38.148764] ret_from_fork+0x10/0x20 [ 38.149360] [ 38.149687] The buggy address belongs to the object at fff00000c6767080 [ 38.149687] which belongs to the cache kmalloc-64 of size 64 [ 38.151250] The buggy address is located 0 bytes to the right of [ 38.151250] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.152647] [ 38.152998] The buggy address belongs to the physical page: [ 38.153717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.154600] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.155500] page_type: f5(slab) [ 38.156022] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.156989] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.157920] page dumped because: kasan: bad access detected [ 38.158571] [ 38.158975] Memory state around the buggy address: [ 38.159589] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.160467] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.161278] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.162224] ^ [ 38.162853] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.163827] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.164683] ================================================================== [ 37.320134] ================================================================== [ 37.320998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 37.322747] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.323866] [ 37.324248] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.325584] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.326217] Hardware name: linux,dummy-virt (DT) [ 37.326898] Call trace: [ 37.327498] show_stack+0x20/0x38 (C) [ 37.328138] dump_stack_lvl+0x8c/0xd0 [ 37.328897] print_report+0x118/0x5e0 [ 37.329573] kasan_report+0xc8/0x118 [ 37.330325] kasan_check_range+0x100/0x1a8 [ 37.331119] __kasan_check_write+0x20/0x30 [ 37.331878] kasan_atomics_helper+0xa04/0x4858 [ 37.332651] kasan_atomics+0x198/0x2e8 [ 37.333294] kunit_try_run_case+0x14c/0x3d0 [ 37.333990] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.334817] kthread+0x24c/0x2d0 [ 37.335496] ret_from_fork+0x10/0x20 [ 37.336132] [ 37.336555] Allocated by task 253: [ 37.337173] kasan_save_stack+0x3c/0x68 [ 37.337910] kasan_save_track+0x20/0x40 [ 37.338456] kasan_save_alloc_info+0x40/0x58 [ 37.339280] __kasan_kmalloc+0xd4/0xd8 [ 37.339865] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.340671] kasan_atomics+0xb8/0x2e8 [ 37.341372] kunit_try_run_case+0x14c/0x3d0 [ 37.342200] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.343027] kthread+0x24c/0x2d0 [ 37.343746] ret_from_fork+0x10/0x20 [ 37.344461] [ 37.344813] The buggy address belongs to the object at fff00000c6767080 [ 37.344813] which belongs to the cache kmalloc-64 of size 64 [ 37.346485] The buggy address is located 0 bytes to the right of [ 37.346485] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.348222] [ 37.348708] The buggy address belongs to the physical page: [ 37.349403] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.350602] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.351436] page_type: f5(slab) [ 37.352030] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.353019] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.353827] page dumped because: kasan: bad access detected [ 37.354544] [ 37.354988] Memory state around the buggy address: [ 37.355662] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.356521] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.357391] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.358319] ^ [ 37.358964] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.359898] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.360801] ================================================================== [ 38.731006] ================================================================== [ 38.731817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 38.734075] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.734929] [ 38.735242] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.736318] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.736808] Hardware name: linux,dummy-virt (DT) [ 38.737546] Call trace: [ 38.737990] show_stack+0x20/0x38 (C) [ 38.738496] dump_stack_lvl+0x8c/0xd0 [ 38.739234] print_report+0x118/0x5e0 [ 38.739961] kasan_report+0xc8/0x118 [ 38.740646] kasan_check_range+0x100/0x1a8 [ 38.741350] __kasan_check_write+0x20/0x30 [ 38.742021] kasan_atomics_helper+0x1644/0x4858 [ 38.742667] kasan_atomics+0x198/0x2e8 [ 38.743298] kunit_try_run_case+0x14c/0x3d0 [ 38.744033] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.744746] kthread+0x24c/0x2d0 [ 38.745359] ret_from_fork+0x10/0x20 [ 38.745936] [ 38.746318] Allocated by task 253: [ 38.746970] kasan_save_stack+0x3c/0x68 [ 38.747689] kasan_save_track+0x20/0x40 [ 38.748273] kasan_save_alloc_info+0x40/0x58 [ 38.748842] __kasan_kmalloc+0xd4/0xd8 [ 38.749487] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.750100] kasan_atomics+0xb8/0x2e8 [ 38.750789] kunit_try_run_case+0x14c/0x3d0 [ 38.751416] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.752176] kthread+0x24c/0x2d0 [ 38.752678] ret_from_fork+0x10/0x20 [ 38.753176] [ 38.753577] The buggy address belongs to the object at fff00000c6767080 [ 38.753577] which belongs to the cache kmalloc-64 of size 64 [ 38.754964] The buggy address is located 0 bytes to the right of [ 38.754964] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.756402] [ 38.756779] The buggy address belongs to the physical page: [ 38.757499] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.758452] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.759161] page_type: f5(slab) [ 38.759680] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.760642] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.761558] page dumped because: kasan: bad access detected [ 38.762315] [ 38.762683] Memory state around the buggy address: [ 38.763187] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.764171] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.765007] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.765957] ^ [ 38.766520] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.767475] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.768379] ================================================================== [ 37.604575] ================================================================== [ 37.605472] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 37.606782] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.607700] [ 37.608054] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.609244] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.609777] Hardware name: linux,dummy-virt (DT) [ 37.610587] Call trace: [ 37.611261] show_stack+0x20/0x38 (C) [ 37.611982] dump_stack_lvl+0x8c/0xd0 [ 37.612567] print_report+0x118/0x5e0 [ 37.613146] kasan_report+0xc8/0x118 [ 37.613802] __asan_report_load4_noabort+0x20/0x30 [ 37.614557] kasan_atomics_helper+0x3de4/0x4858 [ 37.615259] kasan_atomics+0x198/0x2e8 [ 37.615889] kunit_try_run_case+0x14c/0x3d0 [ 37.616458] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.617260] kthread+0x24c/0x2d0 [ 37.617899] ret_from_fork+0x10/0x20 [ 37.618453] [ 37.618834] Allocated by task 253: [ 37.619409] kasan_save_stack+0x3c/0x68 [ 37.619973] kasan_save_track+0x20/0x40 [ 37.620648] kasan_save_alloc_info+0x40/0x58 [ 37.621292] __kasan_kmalloc+0xd4/0xd8 [ 37.621832] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.622614] kasan_atomics+0xb8/0x2e8 [ 37.623129] kunit_try_run_case+0x14c/0x3d0 [ 37.623840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.624571] kthread+0x24c/0x2d0 [ 37.625240] ret_from_fork+0x10/0x20 [ 37.625819] [ 37.626197] The buggy address belongs to the object at fff00000c6767080 [ 37.626197] which belongs to the cache kmalloc-64 of size 64 [ 37.627671] The buggy address is located 0 bytes to the right of [ 37.627671] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.629177] [ 37.629500] The buggy address belongs to the physical page: [ 37.630131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.631103] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.632098] page_type: f5(slab) [ 37.632563] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.633605] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.634536] page dumped because: kasan: bad access detected [ 37.635233] [ 37.635577] Memory state around the buggy address: [ 37.636216] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.637035] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.637920] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.638927] ^ [ 37.639582] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.640503] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.641395] ================================================================== [ 37.024815] ================================================================== [ 37.025586] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 37.026506] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.027817] [ 37.029157] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.030550] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.031136] Hardware name: linux,dummy-virt (DT) [ 37.031983] Call trace: [ 37.032315] show_stack+0x20/0x38 (C) [ 37.033119] dump_stack_lvl+0x8c/0xd0 [ 37.033710] print_report+0x118/0x5e0 [ 37.034321] kasan_report+0xc8/0x118 [ 37.035102] kasan_check_range+0x100/0x1a8 [ 37.035894] __kasan_check_write+0x20/0x30 [ 37.036573] kasan_atomics_helper+0x6ec/0x4858 [ 37.037305] kasan_atomics+0x198/0x2e8 [ 37.037969] kunit_try_run_case+0x14c/0x3d0 [ 37.038728] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.039547] kthread+0x24c/0x2d0 [ 37.040241] ret_from_fork+0x10/0x20 [ 37.040887] [ 37.041229] Allocated by task 253: [ 37.041952] kasan_save_stack+0x3c/0x68 [ 37.042663] kasan_save_track+0x20/0x40 [ 37.043385] kasan_save_alloc_info+0x40/0x58 [ 37.044066] __kasan_kmalloc+0xd4/0xd8 [ 37.044718] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.045535] kasan_atomics+0xb8/0x2e8 [ 37.046155] kunit_try_run_case+0x14c/0x3d0 [ 37.046844] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.047708] kthread+0x24c/0x2d0 [ 37.048317] ret_from_fork+0x10/0x20 [ 37.048981] [ 37.049325] The buggy address belongs to the object at fff00000c6767080 [ 37.049325] which belongs to the cache kmalloc-64 of size 64 [ 37.050887] The buggy address is located 0 bytes to the right of [ 37.050887] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.052594] [ 37.053055] The buggy address belongs to the physical page: [ 37.053860] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.054961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.055871] page_type: f5(slab) [ 37.056565] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.057600] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.058597] page dumped because: kasan: bad access detected [ 37.059491] [ 37.059984] Memory state around the buggy address: [ 37.060756] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.061753] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.062751] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.063698] ^ [ 37.064483] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.065513] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.066407] ================================================================== [ 37.193381] ================================================================== [ 37.195175] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 37.196713] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.197914] [ 37.198375] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.199917] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.200698] Hardware name: linux,dummy-virt (DT) [ 37.201459] Call trace: [ 37.201907] show_stack+0x20/0x38 (C) [ 37.202514] dump_stack_lvl+0x8c/0xd0 [ 37.203339] print_report+0x118/0x5e0 [ 37.204007] kasan_report+0xc8/0x118 [ 37.204697] __asan_report_load4_noabort+0x20/0x30 [ 37.205425] kasan_atomics_helper+0x42d8/0x4858 [ 37.206136] kasan_atomics+0x198/0x2e8 [ 37.206744] kunit_try_run_case+0x14c/0x3d0 [ 37.207534] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.208438] kthread+0x24c/0x2d0 [ 37.209009] ret_from_fork+0x10/0x20 [ 37.209683] [ 37.210040] Allocated by task 253: [ 37.210620] kasan_save_stack+0x3c/0x68 [ 37.211325] kasan_save_track+0x20/0x40 [ 37.211885] kasan_save_alloc_info+0x40/0x58 [ 37.212722] __kasan_kmalloc+0xd4/0xd8 [ 37.213353] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.214066] kasan_atomics+0xb8/0x2e8 [ 37.214721] kunit_try_run_case+0x14c/0x3d0 [ 37.215418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.216198] kthread+0x24c/0x2d0 [ 37.216817] ret_from_fork+0x10/0x20 [ 37.217459] [ 37.217907] The buggy address belongs to the object at fff00000c6767080 [ 37.217907] which belongs to the cache kmalloc-64 of size 64 [ 37.219435] The buggy address is located 0 bytes to the right of [ 37.219435] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.221041] [ 37.221532] The buggy address belongs to the physical page: [ 37.222350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.223436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.224297] page_type: f5(slab) [ 37.224871] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.225972] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.227071] page dumped because: kasan: bad access detected [ 37.227866] [ 37.228299] Memory state around the buggy address: [ 37.229013] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.230065] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.231042] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.232010] ^ [ 37.232734] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.233692] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.234566] ================================================================== [ 36.328983] ================================================================== [ 36.330523] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 36.333554] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 36.334856] [ 36.335409] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.336676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.337441] Hardware name: linux,dummy-virt (DT) [ 36.338953] Call trace: [ 36.339679] show_stack+0x20/0x38 (C) [ 36.340268] dump_stack_lvl+0x8c/0xd0 [ 36.340946] print_report+0x118/0x5e0 [ 36.341566] kasan_report+0xc8/0x118 [ 36.342159] __asan_report_store4_noabort+0x20/0x30 [ 36.342969] kasan_atomics_helper+0x3f7c/0x4858 [ 36.343712] kasan_atomics+0x198/0x2e8 [ 36.344661] kunit_try_run_case+0x14c/0x3d0 [ 36.345325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.346116] kthread+0x24c/0x2d0 [ 36.347234] ret_from_fork+0x10/0x20 [ 36.347831] [ 36.348129] Allocated by task 253: [ 36.348669] kasan_save_stack+0x3c/0x68 [ 36.349359] kasan_save_track+0x20/0x40 [ 36.349904] kasan_save_alloc_info+0x40/0x58 [ 36.350798] __kasan_kmalloc+0xd4/0xd8 [ 36.352144] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.352674] kasan_atomics+0xb8/0x2e8 [ 36.354012] kunit_try_run_case+0x14c/0x3d0 [ 36.354641] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.355364] kthread+0x24c/0x2d0 [ 36.356353] ret_from_fork+0x10/0x20 [ 36.357117] [ 36.357610] The buggy address belongs to the object at fff00000c6767080 [ 36.357610] which belongs to the cache kmalloc-64 of size 64 [ 36.359508] The buggy address is located 0 bytes to the right of [ 36.359508] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 36.361261] [ 36.361553] The buggy address belongs to the physical page: [ 36.362321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 36.363358] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.364197] page_type: f5(slab) [ 36.364766] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.365926] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.366958] page dumped because: kasan: bad access detected [ 36.367550] [ 36.367908] Memory state around the buggy address: [ 36.368475] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.369421] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.371297] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.372445] ^ [ 36.373084] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.374709] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.375375] ================================================================== [ 36.983383] ================================================================== [ 36.984413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 36.985512] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 36.987422] [ 36.987797] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.989863] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.990834] Hardware name: linux,dummy-virt (DT) [ 36.991579] Call trace: [ 36.991985] show_stack+0x20/0x38 (C) [ 36.992654] dump_stack_lvl+0x8c/0xd0 [ 36.993339] print_report+0x118/0x5e0 [ 36.993880] kasan_report+0xc8/0x118 [ 36.994532] kasan_check_range+0x100/0x1a8 [ 36.995198] __kasan_check_write+0x20/0x30 [ 36.995852] kasan_atomics_helper+0x684/0x4858 [ 36.996520] kasan_atomics+0x198/0x2e8 [ 36.997122] kunit_try_run_case+0x14c/0x3d0 [ 36.997701] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.998544] kthread+0x24c/0x2d0 [ 36.999100] ret_from_fork+0x10/0x20 [ 36.999679] [ 36.999963] Allocated by task 253: [ 37.000515] kasan_save_stack+0x3c/0x68 [ 37.001168] kasan_save_track+0x20/0x40 [ 37.001769] kasan_save_alloc_info+0x40/0x58 [ 37.002315] __kasan_kmalloc+0xd4/0xd8 [ 37.003016] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.003519] kasan_atomics+0xb8/0x2e8 [ 37.004201] kunit_try_run_case+0x14c/0x3d0 [ 37.004774] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.005527] kthread+0x24c/0x2d0 [ 37.006007] ret_from_fork+0x10/0x20 [ 37.006735] [ 37.007126] The buggy address belongs to the object at fff00000c6767080 [ 37.007126] which belongs to the cache kmalloc-64 of size 64 [ 37.008617] The buggy address is located 0 bytes to the right of [ 37.008617] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.010200] [ 37.010499] The buggy address belongs to the physical page: [ 37.011412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.012278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.013153] page_type: f5(slab) [ 37.013814] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.014756] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.015768] page dumped because: kasan: bad access detected [ 37.016397] [ 37.016732] Memory state around the buggy address: [ 37.017366] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.018493] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.019374] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.020294] ^ [ 37.020943] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.021869] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.022719] ================================================================== [ 37.804578] ================================================================== [ 37.805518] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 37.806923] Read of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.808216] [ 37.808970] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.810235] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.810780] Hardware name: linux,dummy-virt (DT) [ 37.811547] Call trace: [ 37.812093] show_stack+0x20/0x38 (C) [ 37.812737] dump_stack_lvl+0x8c/0xd0 [ 37.813365] print_report+0x118/0x5e0 [ 37.813999] kasan_report+0xc8/0x118 [ 37.814655] kasan_check_range+0x100/0x1a8 [ 37.815239] __kasan_check_read+0x20/0x30 [ 37.815927] kasan_atomics_helper+0xdd4/0x4858 [ 37.816598] kasan_atomics+0x198/0x2e8 [ 37.817208] kunit_try_run_case+0x14c/0x3d0 [ 37.817861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.818606] kthread+0x24c/0x2d0 [ 37.819297] ret_from_fork+0x10/0x20 [ 37.819901] [ 37.820214] Allocated by task 253: [ 37.820726] kasan_save_stack+0x3c/0x68 [ 37.821414] kasan_save_track+0x20/0x40 [ 37.821968] kasan_save_alloc_info+0x40/0x58 [ 37.822608] __kasan_kmalloc+0xd4/0xd8 [ 37.823447] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.824121] kasan_atomics+0xb8/0x2e8 [ 37.824773] kunit_try_run_case+0x14c/0x3d0 [ 37.825364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.826148] kthread+0x24c/0x2d0 [ 37.826662] ret_from_fork+0x10/0x20 [ 37.827266] [ 37.827574] The buggy address belongs to the object at fff00000c6767080 [ 37.827574] which belongs to the cache kmalloc-64 of size 64 [ 37.829120] The buggy address is located 0 bytes to the right of [ 37.829120] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.830564] [ 37.830925] The buggy address belongs to the physical page: [ 37.831760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.832733] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.833657] page_type: f5(slab) [ 37.834272] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.835351] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.836268] page dumped because: kasan: bad access detected [ 37.836944] [ 37.837302] Memory state around the buggy address: [ 37.837939] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.838895] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.839718] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.840579] ^ [ 37.841277] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.842080] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.843101] ================================================================== [ 36.704679] ================================================================== [ 36.705462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 36.706877] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 36.708406] [ 36.708983] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.711426] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.712705] Hardware name: linux,dummy-virt (DT) [ 36.713040] Call trace: [ 36.713252] show_stack+0x20/0x38 (C) [ 36.713566] dump_stack_lvl+0x8c/0xd0 [ 36.715066] print_report+0x118/0x5e0 [ 36.715996] kasan_report+0xc8/0x118 [ 36.716785] kasan_check_range+0x100/0x1a8 [ 36.717447] __kasan_check_write+0x20/0x30 [ 36.718374] kasan_atomics_helper+0x414/0x4858 [ 36.719316] kasan_atomics+0x198/0x2e8 [ 36.719998] kunit_try_run_case+0x14c/0x3d0 [ 36.720661] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.721445] kthread+0x24c/0x2d0 [ 36.722040] ret_from_fork+0x10/0x20 [ 36.722746] [ 36.723040] Allocated by task 253: [ 36.724079] kasan_save_stack+0x3c/0x68 [ 36.724699] kasan_save_track+0x20/0x40 [ 36.725273] kasan_save_alloc_info+0x40/0x58 [ 36.726524] __kasan_kmalloc+0xd4/0xd8 [ 36.727020] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.727484] kasan_atomics+0xb8/0x2e8 [ 36.728490] kunit_try_run_case+0x14c/0x3d0 [ 36.729184] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.730784] kthread+0x24c/0x2d0 [ 36.731211] ret_from_fork+0x10/0x20 [ 36.731784] [ 36.732105] The buggy address belongs to the object at fff00000c6767080 [ 36.732105] which belongs to the cache kmalloc-64 of size 64 [ 36.733389] The buggy address is located 0 bytes to the right of [ 36.733389] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 36.735719] [ 36.736100] The buggy address belongs to the physical page: [ 36.736927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 36.738513] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.739542] page_type: f5(slab) [ 36.740076] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.741244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.742662] page dumped because: kasan: bad access detected [ 36.743439] [ 36.743763] Memory state around the buggy address: [ 36.744399] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.745330] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.746643] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.748263] ^ [ 36.749396] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.751085] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.752731] ================================================================== [ 37.481012] ================================================================== [ 37.481899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 37.482781] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.483786] [ 37.484245] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.485426] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.486123] Hardware name: linux,dummy-virt (DT) [ 37.486710] Call trace: [ 37.487259] show_stack+0x20/0x38 (C) [ 37.487989] dump_stack_lvl+0x8c/0xd0 [ 37.488693] print_report+0x118/0x5e0 [ 37.489338] kasan_report+0xc8/0x118 [ 37.489919] kasan_check_range+0x100/0x1a8 [ 37.490533] __kasan_check_write+0x20/0x30 [ 37.491240] kasan_atomics_helper+0xb70/0x4858 [ 37.492007] kasan_atomics+0x198/0x2e8 [ 37.492671] kunit_try_run_case+0x14c/0x3d0 [ 37.493342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.494162] kthread+0x24c/0x2d0 [ 37.494824] ret_from_fork+0x10/0x20 [ 37.495403] [ 37.495752] Allocated by task 253: [ 37.496301] kasan_save_stack+0x3c/0x68 [ 37.496984] kasan_save_track+0x20/0x40 [ 37.497546] kasan_save_alloc_info+0x40/0x58 [ 37.498234] __kasan_kmalloc+0xd4/0xd8 [ 37.498891] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.499552] kasan_atomics+0xb8/0x2e8 [ 37.500091] kunit_try_run_case+0x14c/0x3d0 [ 37.500703] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.501384] kthread+0x24c/0x2d0 [ 37.501936] ret_from_fork+0x10/0x20 [ 37.502504] [ 37.502970] The buggy address belongs to the object at fff00000c6767080 [ 37.502970] which belongs to the cache kmalloc-64 of size 64 [ 37.504280] The buggy address is located 0 bytes to the right of [ 37.504280] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.505839] [ 37.506307] The buggy address belongs to the physical page: [ 37.507068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.508043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.508981] page_type: f5(slab) [ 37.509357] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.510340] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.511370] page dumped because: kasan: bad access detected [ 37.512079] [ 37.512385] Memory state around the buggy address: [ 37.513049] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.513886] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.514826] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.515690] ^ [ 37.516324] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.517152] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.518065] ================================================================== [ 36.427002] ================================================================== [ 36.427787] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 36.428541] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 36.429678] [ 36.430151] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.431461] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.432427] Hardware name: linux,dummy-virt (DT) [ 36.433378] Call trace: [ 36.434115] show_stack+0x20/0x38 (C) [ 36.434607] dump_stack_lvl+0x8c/0xd0 [ 36.435234] print_report+0x118/0x5e0 [ 36.436037] kasan_report+0xc8/0x118 [ 36.436692] kasan_check_range+0x100/0x1a8 [ 36.437446] __kasan_check_write+0x20/0x30 [ 36.438394] kasan_atomics_helper+0x24c/0x4858 [ 36.439070] kasan_atomics+0x198/0x2e8 [ 36.439683] kunit_try_run_case+0x14c/0x3d0 [ 36.440271] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.441056] kthread+0x24c/0x2d0 [ 36.441692] ret_from_fork+0x10/0x20 [ 36.442458] [ 36.443382] Allocated by task 253: [ 36.444056] kasan_save_stack+0x3c/0x68 [ 36.444876] kasan_save_track+0x20/0x40 [ 36.445410] kasan_save_alloc_info+0x40/0x58 [ 36.446051] __kasan_kmalloc+0xd4/0xd8 [ 36.446480] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.447019] kasan_atomics+0xb8/0x2e8 [ 36.447681] kunit_try_run_case+0x14c/0x3d0 [ 36.448265] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.449235] kthread+0x24c/0x2d0 [ 36.449794] ret_from_fork+0x10/0x20 [ 36.451106] [ 36.451572] The buggy address belongs to the object at fff00000c6767080 [ 36.451572] which belongs to the cache kmalloc-64 of size 64 [ 36.453415] The buggy address is located 0 bytes to the right of [ 36.453415] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 36.455120] [ 36.455310] The buggy address belongs to the physical page: [ 36.455687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 36.456971] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.457705] page_type: f5(slab) [ 36.458602] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.459714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.461189] page dumped because: kasan: bad access detected [ 36.462052] [ 36.462699] Memory state around the buggy address: [ 36.463961] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.465198] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.466057] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.466877] ^ [ 36.467504] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.468993] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.470114] ================================================================== [ 38.531693] ================================================================== [ 38.532333] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 38.533868] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.534837] [ 38.535191] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.536453] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.536968] Hardware name: linux,dummy-virt (DT) [ 38.537726] Call trace: [ 38.538118] show_stack+0x20/0x38 (C) [ 38.538890] dump_stack_lvl+0x8c/0xd0 [ 38.539554] print_report+0x118/0x5e0 [ 38.540074] kasan_report+0xc8/0x118 [ 38.540768] kasan_check_range+0x100/0x1a8 [ 38.541351] __kasan_check_write+0x20/0x30 [ 38.542129] kasan_atomics_helper+0x147c/0x4858 [ 38.542812] kasan_atomics+0x198/0x2e8 [ 38.543469] kunit_try_run_case+0x14c/0x3d0 [ 38.544173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.544996] kthread+0x24c/0x2d0 [ 38.545607] ret_from_fork+0x10/0x20 [ 38.546316] [ 38.546794] Allocated by task 253: [ 38.547376] kasan_save_stack+0x3c/0x68 [ 38.547932] kasan_save_track+0x20/0x40 [ 38.548588] kasan_save_alloc_info+0x40/0x58 [ 38.549203] __kasan_kmalloc+0xd4/0xd8 [ 38.549967] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.550647] kasan_atomics+0xb8/0x2e8 [ 38.551322] kunit_try_run_case+0x14c/0x3d0 [ 38.551868] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.552830] kthread+0x24c/0x2d0 [ 38.553352] ret_from_fork+0x10/0x20 [ 38.554019] [ 38.554324] The buggy address belongs to the object at fff00000c6767080 [ 38.554324] which belongs to the cache kmalloc-64 of size 64 [ 38.555920] The buggy address is located 0 bytes to the right of [ 38.555920] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.557376] [ 38.557764] The buggy address belongs to the physical page: [ 38.558457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.559442] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.560270] page_type: f5(slab) [ 38.560884] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.561867] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.562772] page dumped because: kasan: bad access detected [ 38.563465] [ 38.563802] Memory state around the buggy address: [ 38.564483] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.565256] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.566257] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.567156] ^ [ 38.567730] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.568614] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.569519] ================================================================== [ 36.851178] ================================================================== [ 36.852067] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 36.852798] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 36.853680] [ 36.854611] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.856884] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.857642] Hardware name: linux,dummy-virt (DT) [ 36.858613] Call trace: [ 36.859006] show_stack+0x20/0x38 (C) [ 36.859811] dump_stack_lvl+0x8c/0xd0 [ 36.860373] print_report+0x118/0x5e0 [ 36.861054] kasan_report+0xc8/0x118 [ 36.861645] kasan_check_range+0x100/0x1a8 [ 36.862674] __kasan_check_write+0x20/0x30 [ 36.863516] kasan_atomics_helper+0x54c/0x4858 [ 36.864249] kasan_atomics+0x198/0x2e8 [ 36.864904] kunit_try_run_case+0x14c/0x3d0 [ 36.865922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.866752] kthread+0x24c/0x2d0 [ 36.867284] ret_from_fork+0x10/0x20 [ 36.867704] [ 36.868097] Allocated by task 253: [ 36.868581] kasan_save_stack+0x3c/0x68 [ 36.869088] kasan_save_track+0x20/0x40 [ 36.869946] kasan_save_alloc_info+0x40/0x58 [ 36.870890] __kasan_kmalloc+0xd4/0xd8 [ 36.871646] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.872257] kasan_atomics+0xb8/0x2e8 [ 36.872861] kunit_try_run_case+0x14c/0x3d0 [ 36.873571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.874712] kthread+0x24c/0x2d0 [ 36.875983] ret_from_fork+0x10/0x20 [ 36.876582] [ 36.877078] The buggy address belongs to the object at fff00000c6767080 [ 36.877078] which belongs to the cache kmalloc-64 of size 64 [ 36.879076] The buggy address is located 0 bytes to the right of [ 36.879076] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 36.881124] [ 36.881325] The buggy address belongs to the physical page: [ 36.882157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 36.883306] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.884185] page_type: f5(slab) [ 36.884694] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.885580] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.886882] page dumped because: kasan: bad access detected [ 36.887744] [ 36.888095] Memory state around the buggy address: [ 36.889003] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.890072] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.891290] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.892255] ^ [ 36.892959] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.894042] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.895992] ================================================================== [ 38.688940] ================================================================== [ 38.690648] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 38.691838] Read of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.692943] [ 38.693808] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.695071] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.695592] Hardware name: linux,dummy-virt (DT) [ 38.696303] Call trace: [ 38.696759] show_stack+0x20/0x38 (C) [ 38.697434] dump_stack_lvl+0x8c/0xd0 [ 38.698148] print_report+0x118/0x5e0 [ 38.698880] kasan_report+0xc8/0x118 [ 38.699585] __asan_report_load8_noabort+0x20/0x30 [ 38.700367] kasan_atomics_helper+0x3db0/0x4858 [ 38.701077] kasan_atomics+0x198/0x2e8 [ 38.701728] kunit_try_run_case+0x14c/0x3d0 [ 38.702472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.703336] kthread+0x24c/0x2d0 [ 38.703963] ret_from_fork+0x10/0x20 [ 38.704595] [ 38.705015] Allocated by task 253: [ 38.705605] kasan_save_stack+0x3c/0x68 [ 38.706356] kasan_save_track+0x20/0x40 [ 38.707081] kasan_save_alloc_info+0x40/0x58 [ 38.707828] __kasan_kmalloc+0xd4/0xd8 [ 38.708489] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.709201] kasan_atomics+0xb8/0x2e8 [ 38.709846] kunit_try_run_case+0x14c/0x3d0 [ 38.710593] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.711439] kthread+0x24c/0x2d0 [ 38.711974] ret_from_fork+0x10/0x20 [ 38.712679] [ 38.713021] The buggy address belongs to the object at fff00000c6767080 [ 38.713021] which belongs to the cache kmalloc-64 of size 64 [ 38.714464] The buggy address is located 0 bytes to the right of [ 38.714464] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.716062] [ 38.716557] The buggy address belongs to the physical page: [ 38.717355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.718396] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.719326] page_type: f5(slab) [ 38.719829] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.720948] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.721941] page dumped because: kasan: bad access detected [ 38.722780] [ 38.723235] Memory state around the buggy address: [ 38.723875] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.724712] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.725587] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.726453] ^ [ 38.727077] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.728005] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.728888] ================================================================== [ 38.932121] ================================================================== [ 38.932872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 38.934268] Read of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.935393] [ 38.935757] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.937195] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.937718] Hardware name: linux,dummy-virt (DT) [ 38.938408] Call trace: [ 38.938958] show_stack+0x20/0x38 (C) [ 38.939493] dump_stack_lvl+0x8c/0xd0 [ 38.940171] print_report+0x118/0x5e0 [ 38.940754] kasan_report+0xc8/0x118 [ 38.941396] __asan_report_load8_noabort+0x20/0x30 [ 38.942006] kasan_atomics_helper+0x3e20/0x4858 [ 38.942763] kasan_atomics+0x198/0x2e8 [ 38.943472] kunit_try_run_case+0x14c/0x3d0 [ 38.944077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.944960] kthread+0x24c/0x2d0 [ 38.945527] ret_from_fork+0x10/0x20 [ 38.946100] [ 38.946440] Allocated by task 253: [ 38.946938] kasan_save_stack+0x3c/0x68 [ 38.947526] kasan_save_track+0x20/0x40 [ 38.948185] kasan_save_alloc_info+0x40/0x58 [ 38.948700] __kasan_kmalloc+0xd4/0xd8 [ 38.949438] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.950126] kasan_atomics+0xb8/0x2e8 [ 38.950690] kunit_try_run_case+0x14c/0x3d0 [ 38.951299] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.952105] kthread+0x24c/0x2d0 [ 38.952737] ret_from_fork+0x10/0x20 [ 38.953270] [ 38.953662] The buggy address belongs to the object at fff00000c6767080 [ 38.953662] which belongs to the cache kmalloc-64 of size 64 [ 38.955097] The buggy address is located 0 bytes to the right of [ 38.955097] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.956524] [ 38.956902] The buggy address belongs to the physical page: [ 38.957686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.958804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.959684] page_type: f5(slab) [ 38.960156] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.961182] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.962163] page dumped because: kasan: bad access detected [ 38.962876] [ 38.963228] Memory state around the buggy address: [ 38.963967] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.964826] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.965711] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.966648] ^ [ 38.967267] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.968184] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.969077] ================================================================== [ 36.518173] ================================================================== [ 36.519841] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 36.520925] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 36.522840] [ 36.523346] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.524494] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.525125] Hardware name: linux,dummy-virt (DT) [ 36.525444] Call trace: [ 36.525733] show_stack+0x20/0x38 (C) [ 36.527076] dump_stack_lvl+0x8c/0xd0 [ 36.527694] print_report+0x118/0x5e0 [ 36.528396] kasan_report+0xc8/0x118 [ 36.529021] __asan_report_load4_noabort+0x20/0x30 [ 36.529936] kasan_atomics_helper+0x40fc/0x4858 [ 36.530692] kasan_atomics+0x198/0x2e8 [ 36.531177] kunit_try_run_case+0x14c/0x3d0 [ 36.531909] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.532583] kthread+0x24c/0x2d0 [ 36.533255] ret_from_fork+0x10/0x20 [ 36.533969] [ 36.534251] Allocated by task 253: [ 36.534995] kasan_save_stack+0x3c/0x68 [ 36.535667] kasan_save_track+0x20/0x40 [ 36.536437] kasan_save_alloc_info+0x40/0x58 [ 36.537386] __kasan_kmalloc+0xd4/0xd8 [ 36.538230] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.539230] kasan_atomics+0xb8/0x2e8 [ 36.539991] kunit_try_run_case+0x14c/0x3d0 [ 36.540794] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.541556] kthread+0x24c/0x2d0 [ 36.542379] ret_from_fork+0x10/0x20 [ 36.542927] [ 36.543319] The buggy address belongs to the object at fff00000c6767080 [ 36.543319] which belongs to the cache kmalloc-64 of size 64 [ 36.545283] The buggy address is located 0 bytes to the right of [ 36.545283] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 36.547183] [ 36.547505] The buggy address belongs to the physical page: [ 36.548121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 36.549365] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.550674] page_type: f5(slab) [ 36.551097] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.552986] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.554057] page dumped because: kasan: bad access detected [ 36.556100] [ 36.556354] Memory state around the buggy address: [ 36.556732] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.557581] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.558415] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.559407] ^ [ 36.560302] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.561726] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.562823] ================================================================== [ 38.889974] ================================================================== [ 38.890946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 38.891854] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.892690] [ 38.893177] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.894758] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.895397] Hardware name: linux,dummy-virt (DT) [ 38.896055] Call trace: [ 38.896595] show_stack+0x20/0x38 (C) [ 38.897316] dump_stack_lvl+0x8c/0xd0 [ 38.898002] print_report+0x118/0x5e0 [ 38.898658] kasan_report+0xc8/0x118 [ 38.899340] kasan_check_range+0x100/0x1a8 [ 38.900080] __kasan_check_write+0x20/0x30 [ 38.900775] kasan_atomics_helper+0x175c/0x4858 [ 38.901541] kasan_atomics+0x198/0x2e8 [ 38.902201] kunit_try_run_case+0x14c/0x3d0 [ 38.902937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.903734] kthread+0x24c/0x2d0 [ 38.904372] ret_from_fork+0x10/0x20 [ 38.905014] [ 38.905349] Allocated by task 253: [ 38.905958] kasan_save_stack+0x3c/0x68 [ 38.906612] kasan_save_track+0x20/0x40 [ 38.907319] kasan_save_alloc_info+0x40/0x58 [ 38.908058] __kasan_kmalloc+0xd4/0xd8 [ 38.908794] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.909509] kasan_atomics+0xb8/0x2e8 [ 38.910156] kunit_try_run_case+0x14c/0x3d0 [ 38.910846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.911684] kthread+0x24c/0x2d0 [ 38.912259] ret_from_fork+0x10/0x20 [ 38.912992] [ 38.913409] The buggy address belongs to the object at fff00000c6767080 [ 38.913409] which belongs to the cache kmalloc-64 of size 64 [ 38.915104] The buggy address is located 0 bytes to the right of [ 38.915104] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.916726] [ 38.917241] The buggy address belongs to the physical page: [ 38.917977] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.919150] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.920075] page_type: f5(slab) [ 38.920763] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.921827] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.922829] page dumped because: kasan: bad access detected [ 38.923647] [ 38.923986] Memory state around the buggy address: [ 38.924748] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.925845] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.926844] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.927981] ^ [ 38.928715] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.929715] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.930597] ================================================================== [ 36.754855] ================================================================== [ 36.756019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 36.757391] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 36.759060] [ 36.759704] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.761013] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.761547] Hardware name: linux,dummy-virt (DT) [ 36.762182] Call trace: [ 36.762566] show_stack+0x20/0x38 (C) [ 36.763546] dump_stack_lvl+0x8c/0xd0 [ 36.764143] print_report+0x118/0x5e0 [ 36.764853] kasan_report+0xc8/0x118 [ 36.765417] kasan_check_range+0x100/0x1a8 [ 36.766473] __kasan_check_write+0x20/0x30 [ 36.767152] kasan_atomics_helper+0x47c/0x4858 [ 36.767775] kasan_atomics+0x198/0x2e8 [ 36.768330] kunit_try_run_case+0x14c/0x3d0 [ 36.769311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.770466] kthread+0x24c/0x2d0 [ 36.771386] ret_from_fork+0x10/0x20 [ 36.772105] [ 36.772430] Allocated by task 253: [ 36.772919] kasan_save_stack+0x3c/0x68 [ 36.773450] kasan_save_track+0x20/0x40 [ 36.774765] kasan_save_alloc_info+0x40/0x58 [ 36.775234] __kasan_kmalloc+0xd4/0xd8 [ 36.776093] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.776911] kasan_atomics+0xb8/0x2e8 [ 36.777580] kunit_try_run_case+0x14c/0x3d0 [ 36.778731] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.779471] kthread+0x24c/0x2d0 [ 36.780094] ret_from_fork+0x10/0x20 [ 36.780770] [ 36.781117] The buggy address belongs to the object at fff00000c6767080 [ 36.781117] which belongs to the cache kmalloc-64 of size 64 [ 36.783180] The buggy address is located 0 bytes to the right of [ 36.783180] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 36.784573] [ 36.785060] The buggy address belongs to the physical page: [ 36.786213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 36.787439] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.788332] page_type: f5(slab) [ 36.788880] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.790001] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.791031] page dumped because: kasan: bad access detected [ 36.791882] [ 36.792187] Memory state around the buggy address: [ 36.793193] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.794863] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.796439] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.797216] ^ [ 36.798150] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.799104] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.800024] ================================================================== [ 36.659327] ================================================================== [ 36.660275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 36.661119] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 36.662463] [ 36.663134] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.664393] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.665460] Hardware name: linux,dummy-virt (DT) [ 36.666253] Call trace: [ 36.666949] show_stack+0x20/0x38 (C) [ 36.667367] dump_stack_lvl+0x8c/0xd0 [ 36.668043] print_report+0x118/0x5e0 [ 36.668829] kasan_report+0xc8/0x118 [ 36.669475] kasan_check_range+0x100/0x1a8 [ 36.670425] __kasan_check_write+0x20/0x30 [ 36.671472] kasan_atomics_helper+0x3ac/0x4858 [ 36.672087] kasan_atomics+0x198/0x2e8 [ 36.672723] kunit_try_run_case+0x14c/0x3d0 [ 36.673361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.674157] kthread+0x24c/0x2d0 [ 36.674802] ret_from_fork+0x10/0x20 [ 36.675502] [ 36.675836] Allocated by task 253: [ 36.676434] kasan_save_stack+0x3c/0x68 [ 36.677114] kasan_save_track+0x20/0x40 [ 36.677769] kasan_save_alloc_info+0x40/0x58 [ 36.679029] __kasan_kmalloc+0xd4/0xd8 [ 36.680708] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.681343] kasan_atomics+0xb8/0x2e8 [ 36.681933] kunit_try_run_case+0x14c/0x3d0 [ 36.682537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.683290] kthread+0x24c/0x2d0 [ 36.684023] ret_from_fork+0x10/0x20 [ 36.684569] [ 36.685068] The buggy address belongs to the object at fff00000c6767080 [ 36.685068] which belongs to the cache kmalloc-64 of size 64 [ 36.687328] The buggy address is located 0 bytes to the right of [ 36.687328] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 36.688812] [ 36.689125] The buggy address belongs to the physical page: [ 36.690114] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 36.691192] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.692022] page_type: f5(slab) [ 36.692677] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.693684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.695196] page dumped because: kasan: bad access detected [ 36.695943] [ 36.696381] Memory state around the buggy address: [ 36.697137] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.697935] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.699182] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.700185] ^ [ 36.701075] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.702018] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.703307] ================================================================== [ 36.281290] ================================================================== [ 36.283456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 36.284435] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 36.285130] [ 36.285479] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.287566] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.288281] Hardware name: linux,dummy-virt (DT) [ 36.288918] Call trace: [ 36.289309] show_stack+0x20/0x38 (C) [ 36.290250] dump_stack_lvl+0x8c/0xd0 [ 36.290925] print_report+0x118/0x5e0 [ 36.291447] kasan_report+0xc8/0x118 [ 36.292143] __asan_report_load4_noabort+0x20/0x30 [ 36.292981] kasan_atomics_helper+0x40a8/0x4858 [ 36.293846] kasan_atomics+0x198/0x2e8 [ 36.294802] kunit_try_run_case+0x14c/0x3d0 [ 36.295581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.296500] kthread+0x24c/0x2d0 [ 36.297050] ret_from_fork+0x10/0x20 [ 36.297381] [ 36.297558] Allocated by task 253: [ 36.298764] kasan_save_stack+0x3c/0x68 [ 36.299840] kasan_save_track+0x20/0x40 [ 36.300824] kasan_save_alloc_info+0x40/0x58 [ 36.301657] __kasan_kmalloc+0xd4/0xd8 [ 36.302481] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.302977] kasan_atomics+0xb8/0x2e8 [ 36.304061] kunit_try_run_case+0x14c/0x3d0 [ 36.304931] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.305701] kthread+0x24c/0x2d0 [ 36.306770] ret_from_fork+0x10/0x20 [ 36.307354] [ 36.307841] The buggy address belongs to the object at fff00000c6767080 [ 36.307841] which belongs to the cache kmalloc-64 of size 64 [ 36.309230] The buggy address is located 0 bytes to the right of [ 36.309230] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 36.311414] [ 36.311761] The buggy address belongs to the physical page: [ 36.312462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 36.313568] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.315208] page_type: f5(slab) [ 36.315853] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.316808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.317720] page dumped because: kasan: bad access detected [ 36.318401] [ 36.319206] Memory state around the buggy address: [ 36.319969] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.320959] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.322451] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.323175] ^ [ 36.323808] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.324895] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.326501] ================================================================== [ 37.068472] ================================================================== [ 37.069382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 37.070690] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.072235] [ 37.072837] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.074224] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.075006] Hardware name: linux,dummy-virt (DT) [ 37.075809] Call trace: [ 37.076406] show_stack+0x20/0x38 (C) [ 37.077104] dump_stack_lvl+0x8c/0xd0 [ 37.077838] print_report+0x118/0x5e0 [ 37.078583] kasan_report+0xc8/0x118 [ 37.079283] kasan_check_range+0x100/0x1a8 [ 37.079893] __kasan_check_write+0x20/0x30 [ 37.080487] kasan_atomics_helper+0x760/0x4858 [ 37.081257] kasan_atomics+0x198/0x2e8 [ 37.082034] kunit_try_run_case+0x14c/0x3d0 [ 37.082693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.083662] kthread+0x24c/0x2d0 [ 37.084340] ret_from_fork+0x10/0x20 [ 37.085033] [ 37.085386] Allocated by task 253: [ 37.086059] kasan_save_stack+0x3c/0x68 [ 37.086732] kasan_save_track+0x20/0x40 [ 37.087352] kasan_save_alloc_info+0x40/0x58 [ 37.087999] __kasan_kmalloc+0xd4/0xd8 [ 37.088719] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.089430] kasan_atomics+0xb8/0x2e8 [ 37.090134] kunit_try_run_case+0x14c/0x3d0 [ 37.090922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.091729] kthread+0x24c/0x2d0 [ 37.092409] ret_from_fork+0x10/0x20 [ 37.093014] [ 37.093431] The buggy address belongs to the object at fff00000c6767080 [ 37.093431] which belongs to the cache kmalloc-64 of size 64 [ 37.094940] The buggy address is located 0 bytes to the right of [ 37.094940] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.096590] [ 37.097060] The buggy address belongs to the physical page: [ 37.097839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.098864] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.099906] page_type: f5(slab) [ 37.100360] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.101181] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.102279] page dumped because: kasan: bad access detected [ 37.103051] [ 37.103360] Memory state around the buggy address: [ 37.103991] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.104888] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.105814] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.106813] ^ [ 37.107587] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.108413] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.109347] ================================================================== [ 36.898753] ================================================================== [ 36.899545] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 36.900996] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 36.902497] [ 36.903004] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.905016] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.905712] Hardware name: linux,dummy-virt (DT) [ 36.906430] Call trace: [ 36.906945] show_stack+0x20/0x38 (C) [ 36.907710] dump_stack_lvl+0x8c/0xd0 [ 36.908379] print_report+0x118/0x5e0 [ 36.909044] kasan_report+0xc8/0x118 [ 36.909766] kasan_check_range+0x100/0x1a8 [ 36.910486] __kasan_check_write+0x20/0x30 [ 36.911285] kasan_atomics_helper+0x5b4/0x4858 [ 36.912040] kasan_atomics+0x198/0x2e8 [ 36.912717] kunit_try_run_case+0x14c/0x3d0 [ 36.913500] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.914309] kthread+0x24c/0x2d0 [ 36.914953] ret_from_fork+0x10/0x20 [ 36.915590] [ 36.915906] Allocated by task 253: [ 36.916432] kasan_save_stack+0x3c/0x68 [ 36.917123] kasan_save_track+0x20/0x40 [ 36.917749] kasan_save_alloc_info+0x40/0x58 [ 36.918488] __kasan_kmalloc+0xd4/0xd8 [ 36.919133] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.919834] kasan_atomics+0xb8/0x2e8 [ 36.920442] kunit_try_run_case+0x14c/0x3d0 [ 36.921069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.921929] kthread+0x24c/0x2d0 [ 36.922606] ret_from_fork+0x10/0x20 [ 36.923251] [ 36.923688] The buggy address belongs to the object at fff00000c6767080 [ 36.923688] which belongs to the cache kmalloc-64 of size 64 [ 36.925164] The buggy address is located 0 bytes to the right of [ 36.925164] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 36.927235] [ 36.927565] The buggy address belongs to the physical page: [ 36.928485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 36.929557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.930445] page_type: f5(slab) [ 36.931069] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.932142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.933093] page dumped because: kasan: bad access detected [ 36.933878] [ 36.934281] Memory state around the buggy address: [ 36.934967] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.936008] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.936956] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.937967] ^ [ 36.938707] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.939803] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.940701] ================================================================== [ 37.401654] ================================================================== [ 37.402499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 37.403378] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.405740] [ 37.406113] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.407562] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.408179] Hardware name: linux,dummy-virt (DT) [ 37.408719] Call trace: [ 37.409139] show_stack+0x20/0x38 (C) [ 37.409830] dump_stack_lvl+0x8c/0xd0 [ 37.410479] print_report+0x118/0x5e0 [ 37.411096] kasan_report+0xc8/0x118 [ 37.411770] kasan_check_range+0x100/0x1a8 [ 37.412488] __kasan_check_write+0x20/0x30 [ 37.413115] kasan_atomics_helper+0xad4/0x4858 [ 37.413775] kasan_atomics+0x198/0x2e8 [ 37.414386] kunit_try_run_case+0x14c/0x3d0 [ 37.415059] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.415746] kthread+0x24c/0x2d0 [ 37.416365] ret_from_fork+0x10/0x20 [ 37.417032] [ 37.417339] Allocated by task 253: [ 37.417937] kasan_save_stack+0x3c/0x68 [ 37.418466] kasan_save_track+0x20/0x40 [ 37.419189] kasan_save_alloc_info+0x40/0x58 [ 37.419785] __kasan_kmalloc+0xd4/0xd8 [ 37.420454] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.421114] kasan_atomics+0xb8/0x2e8 [ 37.421609] kunit_try_run_case+0x14c/0x3d0 [ 37.422313] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.422989] kthread+0x24c/0x2d0 [ 37.423606] ret_from_fork+0x10/0x20 [ 37.424251] [ 37.424532] The buggy address belongs to the object at fff00000c6767080 [ 37.424532] which belongs to the cache kmalloc-64 of size 64 [ 37.426482] The buggy address is located 0 bytes to the right of [ 37.426482] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.427945] [ 37.428275] The buggy address belongs to the physical page: [ 37.429145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.430104] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.431054] page_type: f5(slab) [ 37.431647] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.432570] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.433517] page dumped because: kasan: bad access detected [ 37.434228] [ 37.434571] Memory state around the buggy address: [ 37.435237] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.436095] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.437247] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.438113] ^ [ 37.438841] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.439714] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.440530] ================================================================== [ 36.564748] ================================================================== [ 36.565754] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 36.567809] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 36.568758] [ 36.569201] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.570505] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.571067] Hardware name: linux,dummy-virt (DT) [ 36.572177] Call trace: [ 36.572539] show_stack+0x20/0x38 (C) [ 36.573308] dump_stack_lvl+0x8c/0xd0 [ 36.574210] print_report+0x118/0x5e0 [ 36.575100] kasan_report+0xc8/0x118 [ 36.575893] kasan_check_range+0x100/0x1a8 [ 36.576568] __kasan_check_write+0x20/0x30 [ 36.577161] kasan_atomics_helper+0x32c/0x4858 [ 36.578315] kasan_atomics+0x198/0x2e8 [ 36.579129] kunit_try_run_case+0x14c/0x3d0 [ 36.579857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.580552] kthread+0x24c/0x2d0 [ 36.581149] ret_from_fork+0x10/0x20 [ 36.582193] [ 36.582488] Allocated by task 253: [ 36.583017] kasan_save_stack+0x3c/0x68 [ 36.583714] kasan_save_track+0x20/0x40 [ 36.584264] kasan_save_alloc_info+0x40/0x58 [ 36.585033] __kasan_kmalloc+0xd4/0xd8 [ 36.585526] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.586863] kasan_atomics+0xb8/0x2e8 [ 36.587872] kunit_try_run_case+0x14c/0x3d0 [ 36.588834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.589437] kthread+0x24c/0x2d0 [ 36.590252] ret_from_fork+0x10/0x20 [ 36.591237] [ 36.591545] The buggy address belongs to the object at fff00000c6767080 [ 36.591545] which belongs to the cache kmalloc-64 of size 64 [ 36.593084] The buggy address is located 0 bytes to the right of [ 36.593084] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 36.595025] [ 36.595398] The buggy address belongs to the physical page: [ 36.596240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 36.597300] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.598509] page_type: f5(slab) [ 36.599341] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.600466] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.601496] page dumped because: kasan: bad access detected [ 36.602271] [ 36.602835] Memory state around the buggy address: [ 36.603926] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.605066] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.606151] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.607262] ^ [ 36.607920] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.609109] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.610261] ================================================================== [ 38.407953] ================================================================== [ 38.408839] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 38.409740] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.410584] [ 38.410955] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.412382] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.412936] Hardware name: linux,dummy-virt (DT) [ 38.413512] Call trace: [ 38.414243] show_stack+0x20/0x38 (C) [ 38.414877] dump_stack_lvl+0x8c/0xd0 [ 38.415470] print_report+0x118/0x5e0 [ 38.416393] kasan_report+0xc8/0x118 [ 38.417171] kasan_check_range+0x100/0x1a8 [ 38.417926] __kasan_check_write+0x20/0x30 [ 38.418662] kasan_atomics_helper+0x1384/0x4858 [ 38.419408] kasan_atomics+0x198/0x2e8 [ 38.420117] kunit_try_run_case+0x14c/0x3d0 [ 38.420957] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.421726] kthread+0x24c/0x2d0 [ 38.422255] ret_from_fork+0x10/0x20 [ 38.423151] [ 38.423488] Allocated by task 253: [ 38.424017] kasan_save_stack+0x3c/0x68 [ 38.424526] kasan_save_track+0x20/0x40 [ 38.425336] kasan_save_alloc_info+0x40/0x58 [ 38.426155] __kasan_kmalloc+0xd4/0xd8 [ 38.426802] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.427606] kasan_atomics+0xb8/0x2e8 [ 38.428235] kunit_try_run_case+0x14c/0x3d0 [ 38.428907] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.429699] kthread+0x24c/0x2d0 [ 38.430260] ret_from_fork+0x10/0x20 [ 38.430965] [ 38.431314] The buggy address belongs to the object at fff00000c6767080 [ 38.431314] which belongs to the cache kmalloc-64 of size 64 [ 38.432945] The buggy address is located 0 bytes to the right of [ 38.432945] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.434533] [ 38.435057] The buggy address belongs to the physical page: [ 38.435872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.436950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.437866] page_type: f5(slab) [ 38.438440] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.439505] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.440441] page dumped because: kasan: bad access detected [ 38.441246] [ 38.441529] Memory state around the buggy address: [ 38.442290] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.443386] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.444308] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.445227] ^ [ 38.445939] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.446859] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.447384] ================================================================== [ 37.844585] ================================================================== [ 37.845658] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 37.846835] Read of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.848510] [ 37.849106] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.850245] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.850830] Hardware name: linux,dummy-virt (DT) [ 37.851765] Call trace: [ 37.852199] show_stack+0x20/0x38 (C) [ 37.852846] dump_stack_lvl+0x8c/0xd0 [ 37.853519] print_report+0x118/0x5e0 [ 37.854237] kasan_report+0xc8/0x118 [ 37.854937] __asan_report_load8_noabort+0x20/0x30 [ 37.855704] kasan_atomics_helper+0x3f58/0x4858 [ 37.856412] kasan_atomics+0x198/0x2e8 [ 37.857039] kunit_try_run_case+0x14c/0x3d0 [ 37.857697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.858509] kthread+0x24c/0x2d0 [ 37.859145] ret_from_fork+0x10/0x20 [ 37.859875] [ 37.860214] Allocated by task 253: [ 37.860863] kasan_save_stack+0x3c/0x68 [ 37.861471] kasan_save_track+0x20/0x40 [ 37.862216] kasan_save_alloc_info+0x40/0x58 [ 37.863012] __kasan_kmalloc+0xd4/0xd8 [ 37.863682] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.864369] kasan_atomics+0xb8/0x2e8 [ 37.865029] kunit_try_run_case+0x14c/0x3d0 [ 37.865729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.866547] kthread+0x24c/0x2d0 [ 37.867169] ret_from_fork+0x10/0x20 [ 37.867789] [ 37.868194] The buggy address belongs to the object at fff00000c6767080 [ 37.868194] which belongs to the cache kmalloc-64 of size 64 [ 37.869580] The buggy address is located 0 bytes to the right of [ 37.869580] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.871183] [ 37.871683] The buggy address belongs to the physical page: [ 37.872445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.873485] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.874439] page_type: f5(slab) [ 37.875059] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.876012] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.876938] page dumped because: kasan: bad access detected [ 37.877696] [ 37.878084] Memory state around the buggy address: [ 37.878805] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.879892] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.880854] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.881785] ^ [ 37.882497] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.883393] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.884290] ================================================================== [ 36.472505] ================================================================== [ 36.473409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 36.474278] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 36.475699] [ 36.476023] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.477539] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.478782] Hardware name: linux,dummy-virt (DT) [ 36.479582] Call trace: [ 36.479959] show_stack+0x20/0x38 (C) [ 36.480798] dump_stack_lvl+0x8c/0xd0 [ 36.481596] print_report+0x118/0x5e0 [ 36.482253] kasan_report+0xc8/0x118 [ 36.483286] kasan_check_range+0x100/0x1a8 [ 36.483923] __kasan_check_read+0x20/0x30 [ 36.484563] kasan_atomics_helper+0x2b0/0x4858 [ 36.485196] kasan_atomics+0x198/0x2e8 [ 36.485948] kunit_try_run_case+0x14c/0x3d0 [ 36.486295] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.486750] kthread+0x24c/0x2d0 [ 36.487579] ret_from_fork+0x10/0x20 [ 36.488738] [ 36.489266] Allocated by task 253: [ 36.490186] kasan_save_stack+0x3c/0x68 [ 36.490852] kasan_save_track+0x20/0x40 [ 36.491551] kasan_save_alloc_info+0x40/0x58 [ 36.492253] __kasan_kmalloc+0xd4/0xd8 [ 36.492897] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.493588] kasan_atomics+0xb8/0x2e8 [ 36.494597] kunit_try_run_case+0x14c/0x3d0 [ 36.495976] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.496770] kthread+0x24c/0x2d0 [ 36.497464] ret_from_fork+0x10/0x20 [ 36.498535] [ 36.499029] The buggy address belongs to the object at fff00000c6767080 [ 36.499029] which belongs to the cache kmalloc-64 of size 64 [ 36.500536] The buggy address is located 0 bytes to the right of [ 36.500536] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 36.502150] [ 36.502618] The buggy address belongs to the physical page: [ 36.503837] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 36.504894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.506080] page_type: f5(slab) [ 36.506594] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.507791] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.508774] page dumped because: kasan: bad access detected [ 36.509532] [ 36.510380] Memory state around the buggy address: [ 36.511146] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.512208] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.513158] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.514589] ^ [ 36.515103] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.515576] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.516176] ================================================================== [ 38.326168] ================================================================== [ 38.326999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 38.328155] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.329259] [ 38.329704] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.330988] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.331844] Hardware name: linux,dummy-virt (DT) [ 38.332465] Call trace: [ 38.332929] show_stack+0x20/0x38 (C) [ 38.333687] dump_stack_lvl+0x8c/0xd0 [ 38.334206] print_report+0x118/0x5e0 [ 38.334925] kasan_report+0xc8/0x118 [ 38.335607] kasan_check_range+0x100/0x1a8 [ 38.336283] __kasan_check_write+0x20/0x30 [ 38.337057] kasan_atomics_helper+0x126c/0x4858 [ 38.337713] kasan_atomics+0x198/0x2e8 [ 38.338379] kunit_try_run_case+0x14c/0x3d0 [ 38.339133] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.340000] kthread+0x24c/0x2d0 [ 38.340659] ret_from_fork+0x10/0x20 [ 38.341218] [ 38.341609] Allocated by task 253: [ 38.342169] kasan_save_stack+0x3c/0x68 [ 38.342898] kasan_save_track+0x20/0x40 [ 38.343474] kasan_save_alloc_info+0x40/0x58 [ 38.344126] __kasan_kmalloc+0xd4/0xd8 [ 38.344649] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.345340] kasan_atomics+0xb8/0x2e8 [ 38.345941] kunit_try_run_case+0x14c/0x3d0 [ 38.346568] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.347208] kthread+0x24c/0x2d0 [ 38.347810] ret_from_fork+0x10/0x20 [ 38.348302] [ 38.348781] The buggy address belongs to the object at fff00000c6767080 [ 38.348781] which belongs to the cache kmalloc-64 of size 64 [ 38.350215] The buggy address is located 0 bytes to the right of [ 38.350215] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.351678] [ 38.352014] The buggy address belongs to the physical page: [ 38.352776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.353769] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.354592] page_type: f5(slab) [ 38.355161] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.356188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.357093] page dumped because: kasan: bad access detected [ 38.357834] [ 38.358149] Memory state around the buggy address: [ 38.358760] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.359578] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.360570] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.361512] ^ [ 38.362118] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.363051] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.363898] ================================================================== [ 38.003779] ================================================================== [ 38.004592] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 38.005398] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.006794] [ 38.007277] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.008578] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.009137] Hardware name: linux,dummy-virt (DT) [ 38.009775] Call trace: [ 38.010240] show_stack+0x20/0x38 (C) [ 38.010845] dump_stack_lvl+0x8c/0xd0 [ 38.011425] print_report+0x118/0x5e0 [ 38.011991] kasan_report+0xc8/0x118 [ 38.012578] kasan_check_range+0x100/0x1a8 [ 38.013224] __kasan_check_write+0x20/0x30 [ 38.013904] kasan_atomics_helper+0xf20/0x4858 [ 38.014591] kasan_atomics+0x198/0x2e8 [ 38.015188] kunit_try_run_case+0x14c/0x3d0 [ 38.015853] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.016716] kthread+0x24c/0x2d0 [ 38.017245] ret_from_fork+0x10/0x20 [ 38.017845] [ 38.018214] Allocated by task 253: [ 38.018784] kasan_save_stack+0x3c/0x68 [ 38.019355] kasan_save_track+0x20/0x40 [ 38.019950] kasan_save_alloc_info+0x40/0x58 [ 38.020694] __kasan_kmalloc+0xd4/0xd8 [ 38.021243] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.021946] kasan_atomics+0xb8/0x2e8 [ 38.022479] kunit_try_run_case+0x14c/0x3d0 [ 38.023271] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.024015] kthread+0x24c/0x2d0 [ 38.024543] ret_from_fork+0x10/0x20 [ 38.025293] [ 38.025607] The buggy address belongs to the object at fff00000c6767080 [ 38.025607] which belongs to the cache kmalloc-64 of size 64 [ 38.027273] The buggy address is located 0 bytes to the right of [ 38.027273] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.029303] [ 38.029695] The buggy address belongs to the physical page: [ 38.030409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.031270] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.032199] page_type: f5(slab) [ 38.032683] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.033662] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.034282] page dumped because: kasan: bad access detected [ 38.034660] [ 38.034987] Memory state around the buggy address: [ 38.035667] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.036673] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.037558] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.038412] ^ [ 38.039154] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.040028] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.040988] ================================================================== [ 38.366547] ================================================================== [ 38.367497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 38.368515] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.369666] [ 38.370143] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.371490] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.372073] Hardware name: linux,dummy-virt (DT) [ 38.372841] Call trace: [ 38.373558] show_stack+0x20/0x38 (C) [ 38.374393] dump_stack_lvl+0x8c/0xd0 [ 38.374795] print_report+0x118/0x5e0 [ 38.375511] kasan_report+0xc8/0x118 [ 38.376334] kasan_check_range+0x100/0x1a8 [ 38.377062] __kasan_check_write+0x20/0x30 [ 38.377764] kasan_atomics_helper+0x12d8/0x4858 [ 38.378484] kasan_atomics+0x198/0x2e8 [ 38.379138] kunit_try_run_case+0x14c/0x3d0 [ 38.379910] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.380721] kthread+0x24c/0x2d0 [ 38.381332] ret_from_fork+0x10/0x20 [ 38.382011] [ 38.382342] Allocated by task 253: [ 38.382948] kasan_save_stack+0x3c/0x68 [ 38.383738] kasan_save_track+0x20/0x40 [ 38.384380] kasan_save_alloc_info+0x40/0x58 [ 38.385072] __kasan_kmalloc+0xd4/0xd8 [ 38.385707] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.386526] kasan_atomics+0xb8/0x2e8 [ 38.387171] kunit_try_run_case+0x14c/0x3d0 [ 38.387885] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.388926] kthread+0x24c/0x2d0 [ 38.389400] ret_from_fork+0x10/0x20 [ 38.389906] [ 38.390294] The buggy address belongs to the object at fff00000c6767080 [ 38.390294] which belongs to the cache kmalloc-64 of size 64 [ 38.391751] The buggy address is located 0 bytes to the right of [ 38.391751] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.393241] [ 38.393560] The buggy address belongs to the physical page: [ 38.394255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.395249] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.396171] page_type: f5(slab) [ 38.396613] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.397568] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.398497] page dumped because: kasan: bad access detected [ 38.399272] [ 38.399598] Memory state around the buggy address: [ 38.400236] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.401175] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.402082] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.403075] ^ [ 38.403714] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.404579] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.405511] ================================================================== [ 38.492054] ================================================================== [ 38.493051] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 38.495072] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.496156] [ 38.496566] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.497760] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.498335] Hardware name: linux,dummy-virt (DT) [ 38.498969] Call trace: [ 38.499420] show_stack+0x20/0x38 (C) [ 38.500000] dump_stack_lvl+0x8c/0xd0 [ 38.500604] print_report+0x118/0x5e0 [ 38.501228] kasan_report+0xc8/0x118 [ 38.501843] kasan_check_range+0x100/0x1a8 [ 38.502559] __kasan_check_write+0x20/0x30 [ 38.503104] kasan_atomics_helper+0x1414/0x4858 [ 38.503919] kasan_atomics+0x198/0x2e8 [ 38.504509] kunit_try_run_case+0x14c/0x3d0 [ 38.505232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.506061] kthread+0x24c/0x2d0 [ 38.506703] ret_from_fork+0x10/0x20 [ 38.507256] [ 38.507743] Allocated by task 253: [ 38.508307] kasan_save_stack+0x3c/0x68 [ 38.508943] kasan_save_track+0x20/0x40 [ 38.509503] kasan_save_alloc_info+0x40/0x58 [ 38.510275] __kasan_kmalloc+0xd4/0xd8 [ 38.510856] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.511648] kasan_atomics+0xb8/0x2e8 [ 38.512210] kunit_try_run_case+0x14c/0x3d0 [ 38.512802] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.513459] kthread+0x24c/0x2d0 [ 38.514080] ret_from_fork+0x10/0x20 [ 38.514572] [ 38.515047] The buggy address belongs to the object at fff00000c6767080 [ 38.515047] which belongs to the cache kmalloc-64 of size 64 [ 38.516513] The buggy address is located 0 bytes to the right of [ 38.516513] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.518063] [ 38.518377] The buggy address belongs to the physical page: [ 38.519070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.520078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.520920] page_type: f5(slab) [ 38.521404] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.522343] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.523369] page dumped because: kasan: bad access detected [ 38.524075] [ 38.524386] Memory state around the buggy address: [ 38.525040] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.525919] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.526837] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.527782] ^ [ 38.528410] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.529274] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.530190] ================================================================== [ 37.963832] ================================================================== [ 37.964529] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 37.965620] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.966933] [ 37.967312] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.968520] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.969088] Hardware name: linux,dummy-virt (DT) [ 37.969838] Call trace: [ 37.970297] show_stack+0x20/0x38 (C) [ 37.971119] dump_stack_lvl+0x8c/0xd0 [ 37.971756] print_report+0x118/0x5e0 [ 37.972339] kasan_report+0xc8/0x118 [ 37.972888] kasan_check_range+0x100/0x1a8 [ 37.973589] __kasan_check_write+0x20/0x30 [ 37.974236] kasan_atomics_helper+0xeb8/0x4858 [ 37.974885] kasan_atomics+0x198/0x2e8 [ 37.975490] kunit_try_run_case+0x14c/0x3d0 [ 37.976170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.976962] kthread+0x24c/0x2d0 [ 37.977494] ret_from_fork+0x10/0x20 [ 37.977988] [ 37.978386] Allocated by task 253: [ 37.978970] kasan_save_stack+0x3c/0x68 [ 37.979662] kasan_save_track+0x20/0x40 [ 37.980215] kasan_save_alloc_info+0x40/0x58 [ 37.980897] __kasan_kmalloc+0xd4/0xd8 [ 37.981412] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.982213] kasan_atomics+0xb8/0x2e8 [ 37.982796] kunit_try_run_case+0x14c/0x3d0 [ 37.983380] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.984131] kthread+0x24c/0x2d0 [ 37.984760] ret_from_fork+0x10/0x20 [ 37.985303] [ 37.985618] The buggy address belongs to the object at fff00000c6767080 [ 37.985618] which belongs to the cache kmalloc-64 of size 64 [ 37.987122] The buggy address is located 0 bytes to the right of [ 37.987122] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.988497] [ 37.988890] The buggy address belongs to the physical page: [ 37.989575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.990519] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.991471] page_type: f5(slab) [ 37.991986] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.992899] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.993806] page dumped because: kasan: bad access detected [ 37.994456] [ 37.994793] Memory state around the buggy address: [ 37.995457] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.996422] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.997388] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.998253] ^ [ 37.998942] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.999802] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.000697] ================================================================== [ 37.363065] ================================================================== [ 37.363877] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 37.364732] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.365515] [ 37.365993] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.367122] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.367930] Hardware name: linux,dummy-virt (DT) [ 37.368509] Call trace: [ 37.369012] show_stack+0x20/0x38 (C) [ 37.369585] dump_stack_lvl+0x8c/0xd0 [ 37.370277] print_report+0x118/0x5e0 [ 37.370893] kasan_report+0xc8/0x118 [ 37.371458] kasan_check_range+0x100/0x1a8 [ 37.372127] __kasan_check_write+0x20/0x30 [ 37.372870] kasan_atomics_helper+0xa6c/0x4858 [ 37.373482] kasan_atomics+0x198/0x2e8 [ 37.374119] kunit_try_run_case+0x14c/0x3d0 [ 37.374724] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.375530] kthread+0x24c/0x2d0 [ 37.376130] ret_from_fork+0x10/0x20 [ 37.376718] [ 37.377099] Allocated by task 253: [ 37.377672] kasan_save_stack+0x3c/0x68 [ 37.378157] kasan_save_track+0x20/0x40 [ 37.378837] kasan_save_alloc_info+0x40/0x58 [ 37.379539] __kasan_kmalloc+0xd4/0xd8 [ 37.380111] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.380727] kasan_atomics+0xb8/0x2e8 [ 37.381342] kunit_try_run_case+0x14c/0x3d0 [ 37.381965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.382663] kthread+0x24c/0x2d0 [ 37.383264] ret_from_fork+0x10/0x20 [ 37.383831] [ 37.384138] The buggy address belongs to the object at fff00000c6767080 [ 37.384138] which belongs to the cache kmalloc-64 of size 64 [ 37.385477] The buggy address is located 0 bytes to the right of [ 37.385477] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.386967] [ 37.387373] The buggy address belongs to the physical page: [ 37.388051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.389023] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.389934] page_type: f5(slab) [ 37.390481] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.391444] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.392362] page dumped because: kasan: bad access detected [ 37.393038] [ 37.393402] Memory state around the buggy address: [ 37.394110] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.394923] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.395910] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.396787] ^ [ 37.397436] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.398318] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.399243] ================================================================== [ 36.801363] ================================================================== [ 36.802742] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 36.805138] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 36.805937] [ 36.806694] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.808062] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.808804] Hardware name: linux,dummy-virt (DT) [ 36.809588] Call trace: [ 36.810177] show_stack+0x20/0x38 (C) [ 36.811050] dump_stack_lvl+0x8c/0xd0 [ 36.811756] print_report+0x118/0x5e0 [ 36.812671] kasan_report+0xc8/0x118 [ 36.813227] kasan_check_range+0x100/0x1a8 [ 36.814091] __kasan_check_write+0x20/0x30 [ 36.814995] kasan_atomics_helper+0x4e4/0x4858 [ 36.815909] kasan_atomics+0x198/0x2e8 [ 36.816521] kunit_try_run_case+0x14c/0x3d0 [ 36.817293] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.818458] kthread+0x24c/0x2d0 [ 36.818923] ret_from_fork+0x10/0x20 [ 36.819702] [ 36.819984] Allocated by task 253: [ 36.820786] kasan_save_stack+0x3c/0x68 [ 36.821549] kasan_save_track+0x20/0x40 [ 36.822369] kasan_save_alloc_info+0x40/0x58 [ 36.823210] __kasan_kmalloc+0xd4/0xd8 [ 36.824183] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.825215] kasan_atomics+0xb8/0x2e8 [ 36.825924] kunit_try_run_case+0x14c/0x3d0 [ 36.826657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.828020] kthread+0x24c/0x2d0 [ 36.828604] ret_from_fork+0x10/0x20 [ 36.829289] [ 36.829721] The buggy address belongs to the object at fff00000c6767080 [ 36.829721] which belongs to the cache kmalloc-64 of size 64 [ 36.831572] The buggy address is located 0 bytes to the right of [ 36.831572] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 36.832894] [ 36.833202] The buggy address belongs to the physical page: [ 36.833968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 36.835416] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.836408] page_type: f5(slab) [ 36.837097] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.838550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.839385] page dumped because: kasan: bad access detected [ 36.840328] [ 36.840705] Memory state around the buggy address: [ 36.841479] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.843091] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.844270] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.845158] ^ [ 36.845884] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.847394] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.848395] ================================================================== [ 38.847797] ================================================================== [ 38.848653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 38.849822] Read of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.850560] [ 38.851116] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.853107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.853840] Hardware name: linux,dummy-virt (DT) [ 38.854542] Call trace: [ 38.855141] show_stack+0x20/0x38 (C) [ 38.855783] dump_stack_lvl+0x8c/0xd0 [ 38.856469] print_report+0x118/0x5e0 [ 38.857102] kasan_report+0xc8/0x118 [ 38.857824] __asan_report_load8_noabort+0x20/0x30 [ 38.858577] kasan_atomics_helper+0x3e10/0x4858 [ 38.859402] kasan_atomics+0x198/0x2e8 [ 38.860100] kunit_try_run_case+0x14c/0x3d0 [ 38.860845] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.861751] kthread+0x24c/0x2d0 [ 38.862361] ret_from_fork+0x10/0x20 [ 38.863076] [ 38.863428] Allocated by task 253: [ 38.864061] kasan_save_stack+0x3c/0x68 [ 38.864690] kasan_save_track+0x20/0x40 [ 38.865411] kasan_save_alloc_info+0x40/0x58 [ 38.866083] __kasan_kmalloc+0xd4/0xd8 [ 38.866729] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.867392] kasan_atomics+0xb8/0x2e8 [ 38.868053] kunit_try_run_case+0x14c/0x3d0 [ 38.868767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.869542] kthread+0x24c/0x2d0 [ 38.870145] ret_from_fork+0x10/0x20 [ 38.870790] [ 38.871155] The buggy address belongs to the object at fff00000c6767080 [ 38.871155] which belongs to the cache kmalloc-64 of size 64 [ 38.872807] The buggy address is located 0 bytes to the right of [ 38.872807] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.874361] [ 38.874814] The buggy address belongs to the physical page: [ 38.875586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.876599] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.877665] page_type: f5(slab) [ 38.878233] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.879284] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.880242] page dumped because: kasan: bad access detected [ 38.881062] [ 38.881395] Memory state around the buggy address: [ 38.882147] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.883103] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.884091] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.885011] ^ [ 38.885756] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.886689] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.887641] ================================================================== [ 37.280898] ================================================================== [ 37.281805] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 37.283052] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.284229] [ 37.284770] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.286125] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.286714] Hardware name: linux,dummy-virt (DT) [ 37.287414] Call trace: [ 37.287831] show_stack+0x20/0x38 (C) [ 37.288350] dump_stack_lvl+0x8c/0xd0 [ 37.289003] print_report+0x118/0x5e0 [ 37.289724] kasan_report+0xc8/0x118 [ 37.290416] kasan_check_range+0x100/0x1a8 [ 37.290973] __kasan_check_write+0x20/0x30 [ 37.291707] kasan_atomics_helper+0x99c/0x4858 [ 37.292456] kasan_atomics+0x198/0x2e8 [ 37.293154] kunit_try_run_case+0x14c/0x3d0 [ 37.293824] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.294575] kthread+0x24c/0x2d0 [ 37.295113] ret_from_fork+0x10/0x20 [ 37.295794] [ 37.296201] Allocated by task 253: [ 37.296653] kasan_save_stack+0x3c/0x68 [ 37.297359] kasan_save_track+0x20/0x40 [ 37.297946] kasan_save_alloc_info+0x40/0x58 [ 37.298614] __kasan_kmalloc+0xd4/0xd8 [ 37.299218] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.299866] kasan_atomics+0xb8/0x2e8 [ 37.300614] kunit_try_run_case+0x14c/0x3d0 [ 37.301182] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.302031] kthread+0x24c/0x2d0 [ 37.302528] ret_from_fork+0x10/0x20 [ 37.303061] [ 37.303528] The buggy address belongs to the object at fff00000c6767080 [ 37.303528] which belongs to the cache kmalloc-64 of size 64 [ 37.304936] The buggy address is located 0 bytes to the right of [ 37.304936] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.306364] [ 37.306797] The buggy address belongs to the physical page: [ 37.307508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.308523] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.309324] page_type: f5(slab) [ 37.309894] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.310822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.311845] page dumped because: kasan: bad access detected [ 37.312522] [ 37.312958] Memory state around the buggy address: [ 37.313660] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.314503] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.315429] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.316310] ^ [ 37.316958] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.317838] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.318688] ================================================================== [ 37.766706] ================================================================== [ 37.767662] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 37.768413] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.769258] [ 37.769716] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.771422] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.771960] Hardware name: linux,dummy-virt (DT) [ 37.772618] Call trace: [ 37.773036] show_stack+0x20/0x38 (C) [ 37.773678] dump_stack_lvl+0x8c/0xd0 [ 37.774242] print_report+0x118/0x5e0 [ 37.774852] kasan_report+0xc8/0x118 [ 37.775487] __asan_report_load4_noabort+0x20/0x30 [ 37.776204] kasan_atomics_helper+0x3e04/0x4858 [ 37.776850] kasan_atomics+0x198/0x2e8 [ 37.777509] kunit_try_run_case+0x14c/0x3d0 [ 37.778083] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.778942] kthread+0x24c/0x2d0 [ 37.779575] ret_from_fork+0x10/0x20 [ 37.780214] [ 37.780504] Allocated by task 253: [ 37.781015] kasan_save_stack+0x3c/0x68 [ 37.781745] kasan_save_track+0x20/0x40 [ 37.782397] kasan_save_alloc_info+0x40/0x58 [ 37.783034] __kasan_kmalloc+0xd4/0xd8 [ 37.783700] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.784431] kasan_atomics+0xb8/0x2e8 [ 37.784989] kunit_try_run_case+0x14c/0x3d0 [ 37.785498] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.786286] kthread+0x24c/0x2d0 [ 37.786774] ret_from_fork+0x10/0x20 [ 37.787427] [ 37.787808] The buggy address belongs to the object at fff00000c6767080 [ 37.787808] which belongs to the cache kmalloc-64 of size 64 [ 37.789168] The buggy address is located 0 bytes to the right of [ 37.789168] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.790705] [ 37.791087] The buggy address belongs to the physical page: [ 37.791920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.792780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.793679] page_type: f5(slab) [ 37.794229] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.795236] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.796262] page dumped because: kasan: bad access detected [ 37.796953] [ 37.797288] Memory state around the buggy address: [ 37.797893] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.798699] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.799653] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.800533] ^ [ 37.801250] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.802186] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.803080] ================================================================== [ 37.151220] ================================================================== [ 37.152095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 37.152982] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.154131] [ 37.154702] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.155884] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.156697] Hardware name: linux,dummy-virt (DT) [ 37.157267] Call trace: [ 37.157834] show_stack+0x20/0x38 (C) [ 37.158385] dump_stack_lvl+0x8c/0xd0 [ 37.159077] print_report+0x118/0x5e0 [ 37.159734] kasan_report+0xc8/0x118 [ 37.160341] kasan_check_range+0x100/0x1a8 [ 37.161052] __kasan_check_write+0x20/0x30 [ 37.161824] kasan_atomics_helper+0x894/0x4858 [ 37.162539] kasan_atomics+0x198/0x2e8 [ 37.163103] kunit_try_run_case+0x14c/0x3d0 [ 37.163793] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.164686] kthread+0x24c/0x2d0 [ 37.165357] ret_from_fork+0x10/0x20 [ 37.166149] [ 37.166527] Allocated by task 253: [ 37.167133] kasan_save_stack+0x3c/0x68 [ 37.167778] kasan_save_track+0x20/0x40 [ 37.168373] kasan_save_alloc_info+0x40/0x58 [ 37.168993] __kasan_kmalloc+0xd4/0xd8 [ 37.169617] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.170356] kasan_atomics+0xb8/0x2e8 [ 37.171064] kunit_try_run_case+0x14c/0x3d0 [ 37.171659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.172495] kthread+0x24c/0x2d0 [ 37.173068] ret_from_fork+0x10/0x20 [ 37.173756] [ 37.174107] The buggy address belongs to the object at fff00000c6767080 [ 37.174107] which belongs to the cache kmalloc-64 of size 64 [ 37.175866] The buggy address is located 0 bytes to the right of [ 37.175866] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.177693] [ 37.178243] The buggy address belongs to the physical page: [ 37.178932] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.180121] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.181071] page_type: f5(slab) [ 37.181610] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.182804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.183953] page dumped because: kasan: bad access detected [ 37.184870] [ 37.185414] Memory state around the buggy address: [ 37.186191] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.187209] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.188055] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.189158] ^ [ 37.189493] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.190679] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.191745] ================================================================== [ 38.286568] ================================================================== [ 38.287748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 38.288741] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.290290] [ 38.290610] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.291809] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.292438] Hardware name: linux,dummy-virt (DT) [ 38.293047] Call trace: [ 38.293428] show_stack+0x20/0x38 (C) [ 38.294135] dump_stack_lvl+0x8c/0xd0 [ 38.294848] print_report+0x118/0x5e0 [ 38.295551] kasan_report+0xc8/0x118 [ 38.296105] kasan_check_range+0x100/0x1a8 [ 38.296825] __kasan_check_write+0x20/0x30 [ 38.297447] kasan_atomics_helper+0x11f8/0x4858 [ 38.298095] kasan_atomics+0x198/0x2e8 [ 38.298594] kunit_try_run_case+0x14c/0x3d0 [ 38.299398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.300168] kthread+0x24c/0x2d0 [ 38.300716] ret_from_fork+0x10/0x20 [ 38.301343] [ 38.301757] Allocated by task 253: [ 38.302247] kasan_save_stack+0x3c/0x68 [ 38.302992] kasan_save_track+0x20/0x40 [ 38.303642] kasan_save_alloc_info+0x40/0x58 [ 38.304352] __kasan_kmalloc+0xd4/0xd8 [ 38.304850] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.305564] kasan_atomics+0xb8/0x2e8 [ 38.306096] kunit_try_run_case+0x14c/0x3d0 [ 38.306791] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.307526] kthread+0x24c/0x2d0 [ 38.308219] ret_from_fork+0x10/0x20 [ 38.308807] [ 38.309182] The buggy address belongs to the object at fff00000c6767080 [ 38.309182] which belongs to the cache kmalloc-64 of size 64 [ 38.310727] The buggy address is located 0 bytes to the right of [ 38.310727] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.312168] [ 38.312512] The buggy address belongs to the physical page: [ 38.313212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.314144] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.315043] page_type: f5(slab) [ 38.315543] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.316566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.317492] page dumped because: kasan: bad access detected [ 38.318316] [ 38.318672] Memory state around the buggy address: [ 38.319229] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.320185] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.320983] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.321969] ^ [ 38.322608] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.323572] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.324409] ================================================================== [ 36.942425] ================================================================== [ 36.943420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 36.944433] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 36.945350] [ 36.945803] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.947570] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.948283] Hardware name: linux,dummy-virt (DT) [ 36.949075] Call trace: [ 36.949603] show_stack+0x20/0x38 (C) [ 36.950207] dump_stack_lvl+0x8c/0xd0 [ 36.950767] print_report+0x118/0x5e0 [ 36.951325] kasan_report+0xc8/0x118 [ 36.952199] kasan_check_range+0x100/0x1a8 [ 36.952841] __kasan_check_write+0x20/0x30 [ 36.953438] kasan_atomics_helper+0x61c/0x4858 [ 36.954069] kasan_atomics+0x198/0x2e8 [ 36.954734] kunit_try_run_case+0x14c/0x3d0 [ 36.955503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.956534] kthread+0x24c/0x2d0 [ 36.957272] ret_from_fork+0x10/0x20 [ 36.957726] [ 36.958070] Allocated by task 253: [ 36.958517] kasan_save_stack+0x3c/0x68 [ 36.959042] kasan_save_track+0x20/0x40 [ 36.959692] kasan_save_alloc_info+0x40/0x58 [ 36.960332] __kasan_kmalloc+0xd4/0xd8 [ 36.960899] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.961746] kasan_atomics+0xb8/0x2e8 [ 36.962224] kunit_try_run_case+0x14c/0x3d0 [ 36.962996] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.963781] kthread+0x24c/0x2d0 [ 36.964377] ret_from_fork+0x10/0x20 [ 36.964994] [ 36.965288] The buggy address belongs to the object at fff00000c6767080 [ 36.965288] which belongs to the cache kmalloc-64 of size 64 [ 36.966805] The buggy address is located 0 bytes to the right of [ 36.966805] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 36.968281] [ 36.968602] The buggy address belongs to the physical page: [ 36.969340] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 36.970271] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.971115] page_type: f5(slab) [ 36.971728] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.972695] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.973595] page dumped because: kasan: bad access detected [ 36.974286] [ 36.974517] Memory state around the buggy address: [ 36.975356] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.976236] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.977059] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.978059] ^ [ 36.978980] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.980168] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.981291] ================================================================== [ 38.610706] ================================================================== [ 38.611366] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 38.612414] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.613077] [ 38.613380] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.615165] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.615956] Hardware name: linux,dummy-virt (DT) [ 38.616862] Call trace: [ 38.617855] show_stack+0x20/0x38 (C) [ 38.618510] dump_stack_lvl+0x8c/0xd0 [ 38.619130] print_report+0x118/0x5e0 [ 38.619918] kasan_report+0xc8/0x118 [ 38.620397] kasan_check_range+0x100/0x1a8 [ 38.621044] __kasan_check_write+0x20/0x30 [ 38.621648] kasan_atomics_helper+0x154c/0x4858 [ 38.622287] kasan_atomics+0x198/0x2e8 [ 38.623082] kunit_try_run_case+0x14c/0x3d0 [ 38.623717] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.624433] kthread+0x24c/0x2d0 [ 38.625172] ret_from_fork+0x10/0x20 [ 38.625871] [ 38.626241] Allocated by task 253: [ 38.626941] kasan_save_stack+0x3c/0x68 [ 38.627584] kasan_save_track+0x20/0x40 [ 38.628091] kasan_save_alloc_info+0x40/0x58 [ 38.628800] __kasan_kmalloc+0xd4/0xd8 [ 38.629400] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.630059] kasan_atomics+0xb8/0x2e8 [ 38.630661] kunit_try_run_case+0x14c/0x3d0 [ 38.631391] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.632012] kthread+0x24c/0x2d0 [ 38.632612] ret_from_fork+0x10/0x20 [ 38.633142] [ 38.633510] The buggy address belongs to the object at fff00000c6767080 [ 38.633510] which belongs to the cache kmalloc-64 of size 64 [ 38.635056] The buggy address is located 0 bytes to the right of [ 38.635056] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.636570] [ 38.636898] The buggy address belongs to the physical page: [ 38.637616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.638692] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.639548] page_type: f5(slab) [ 38.640020] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.641059] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.642002] page dumped because: kasan: bad access detected [ 38.642646] [ 38.643031] Memory state around the buggy address: [ 38.643652] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.644489] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.645398] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.646289] ^ [ 38.646860] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.647855] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.648761] ================================================================== [ 36.377333] ================================================================== [ 36.378708] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 36.379454] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 36.380422] [ 36.380773] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.382421] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.383219] Hardware name: linux,dummy-virt (DT) [ 36.383945] Call trace: [ 36.384302] show_stack+0x20/0x38 (C) [ 36.385095] dump_stack_lvl+0x8c/0xd0 [ 36.385751] print_report+0x118/0x5e0 [ 36.387018] kasan_report+0xc8/0x118 [ 36.387663] kasan_check_range+0x100/0x1a8 [ 36.388583] __kasan_check_read+0x20/0x30 [ 36.389269] kasan_atomics_helper+0x1ec/0x4858 [ 36.390702] kasan_atomics+0x198/0x2e8 [ 36.391412] kunit_try_run_case+0x14c/0x3d0 [ 36.392081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.392469] kthread+0x24c/0x2d0 [ 36.393058] ret_from_fork+0x10/0x20 [ 36.394126] [ 36.394847] Allocated by task 253: [ 36.395558] kasan_save_stack+0x3c/0x68 [ 36.396148] kasan_save_track+0x20/0x40 [ 36.396722] kasan_save_alloc_info+0x40/0x58 [ 36.397372] __kasan_kmalloc+0xd4/0xd8 [ 36.397906] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.399470] kasan_atomics+0xb8/0x2e8 [ 36.400872] kunit_try_run_case+0x14c/0x3d0 [ 36.401507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.402761] kthread+0x24c/0x2d0 [ 36.403432] ret_from_fork+0x10/0x20 [ 36.404300] [ 36.404749] The buggy address belongs to the object at fff00000c6767080 [ 36.404749] which belongs to the cache kmalloc-64 of size 64 [ 36.406671] The buggy address is located 0 bytes to the right of [ 36.406671] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 36.408576] [ 36.409215] The buggy address belongs to the physical page: [ 36.410619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 36.412074] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.412522] page_type: f5(slab) [ 36.412978] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.414436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.415619] page dumped because: kasan: bad access detected [ 36.416556] [ 36.416992] Memory state around the buggy address: [ 36.417901] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.418827] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.420124] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.421324] ^ [ 36.422160] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.423805] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.424818] ================================================================== [ 38.971127] ================================================================== [ 38.972418] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 38.973213] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.974747] [ 38.975403] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.976686] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.977247] Hardware name: linux,dummy-virt (DT) [ 38.978030] Call trace: [ 38.978679] show_stack+0x20/0x38 (C) [ 38.979461] dump_stack_lvl+0x8c/0xd0 [ 38.980044] print_report+0x118/0x5e0 [ 38.980775] kasan_report+0xc8/0x118 [ 38.981480] kasan_check_range+0x100/0x1a8 [ 38.982150] __kasan_check_write+0x20/0x30 [ 38.982943] kasan_atomics_helper+0x17ec/0x4858 [ 38.983561] kasan_atomics+0x198/0x2e8 [ 38.984303] kunit_try_run_case+0x14c/0x3d0 [ 38.985131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.985935] kthread+0x24c/0x2d0 [ 38.986652] ret_from_fork+0x10/0x20 [ 38.987286] [ 38.987718] Allocated by task 253: [ 38.988362] kasan_save_stack+0x3c/0x68 [ 38.989062] kasan_save_track+0x20/0x40 [ 38.989688] kasan_save_alloc_info+0x40/0x58 [ 38.990405] __kasan_kmalloc+0xd4/0xd8 [ 38.990960] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.991504] kasan_atomics+0xb8/0x2e8 [ 38.992078] kunit_try_run_case+0x14c/0x3d0 [ 38.992862] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.993545] kthread+0x24c/0x2d0 [ 38.994095] ret_from_fork+0x10/0x20 [ 38.994922] [ 38.995286] The buggy address belongs to the object at fff00000c6767080 [ 38.995286] which belongs to the cache kmalloc-64 of size 64 [ 38.996849] The buggy address is located 0 bytes to the right of [ 38.996849] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.998433] [ 38.998720] The buggy address belongs to the physical page: [ 38.999407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 39.000506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.001609] page_type: f5(slab) [ 39.002112] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.003217] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.004299] page dumped because: kasan: bad access detected [ 39.004951] [ 39.005270] Memory state around the buggy address: [ 39.005915] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.006663] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.007850] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.008742] ^ [ 39.009505] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.010365] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.011337] ================================================================== [ 38.809186] ================================================================== [ 38.810011] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 38.810843] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.811938] [ 38.812293] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.813470] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.814080] Hardware name: linux,dummy-virt (DT) [ 38.814841] Call trace: [ 38.815218] show_stack+0x20/0x38 (C) [ 38.815873] dump_stack_lvl+0x8c/0xd0 [ 38.816423] print_report+0x118/0x5e0 [ 38.817086] kasan_report+0xc8/0x118 [ 38.817721] kasan_check_range+0x100/0x1a8 [ 38.818481] __kasan_check_write+0x20/0x30 [ 38.819043] kasan_atomics_helper+0x16d0/0x4858 [ 38.819827] kasan_atomics+0x198/0x2e8 [ 38.820547] kunit_try_run_case+0x14c/0x3d0 [ 38.821226] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.822013] kthread+0x24c/0x2d0 [ 38.822733] ret_from_fork+0x10/0x20 [ 38.823249] [ 38.823591] Allocated by task 253: [ 38.824200] kasan_save_stack+0x3c/0x68 [ 38.824772] kasan_save_track+0x20/0x40 [ 38.825395] kasan_save_alloc_info+0x40/0x58 [ 38.826072] __kasan_kmalloc+0xd4/0xd8 [ 38.826647] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.827320] kasan_atomics+0xb8/0x2e8 [ 38.827854] kunit_try_run_case+0x14c/0x3d0 [ 38.828458] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.829339] kthread+0x24c/0x2d0 [ 38.829887] ret_from_fork+0x10/0x20 [ 38.830416] [ 38.830778] The buggy address belongs to the object at fff00000c6767080 [ 38.830778] which belongs to the cache kmalloc-64 of size 64 [ 38.832082] The buggy address is located 0 bytes to the right of [ 38.832082] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.833532] [ 38.833865] The buggy address belongs to the physical page: [ 38.834640] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.835584] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.836538] page_type: f5(slab) [ 38.837127] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.838025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.839090] page dumped because: kasan: bad access detected [ 38.839913] [ 38.840260] Memory state around the buggy address: [ 38.840919] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.841836] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.842822] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.843671] ^ [ 38.844284] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.845229] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.846086] ================================================================== [ 38.650766] ================================================================== [ 38.651557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 38.652384] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.653204] [ 38.653718] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.654979] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.655538] Hardware name: linux,dummy-virt (DT) [ 38.656247] Call trace: [ 38.656655] show_stack+0x20/0x38 (C) [ 38.657339] dump_stack_lvl+0x8c/0xd0 [ 38.658036] print_report+0x118/0x5e0 [ 38.658560] kasan_report+0xc8/0x118 [ 38.659214] kasan_check_range+0x100/0x1a8 [ 38.659925] __kasan_check_write+0x20/0x30 [ 38.660579] kasan_atomics_helper+0x15b4/0x4858 [ 38.661266] kasan_atomics+0x198/0x2e8 [ 38.661827] kunit_try_run_case+0x14c/0x3d0 [ 38.662416] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.663256] kthread+0x24c/0x2d0 [ 38.663876] ret_from_fork+0x10/0x20 [ 38.664564] [ 38.664886] Allocated by task 253: [ 38.665467] kasan_save_stack+0x3c/0x68 [ 38.666145] kasan_save_track+0x20/0x40 [ 38.666836] kasan_save_alloc_info+0x40/0x58 [ 38.667451] __kasan_kmalloc+0xd4/0xd8 [ 38.668066] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.668895] kasan_atomics+0xb8/0x2e8 [ 38.669400] kunit_try_run_case+0x14c/0x3d0 [ 38.670106] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.670725] kthread+0x24c/0x2d0 [ 38.671322] ret_from_fork+0x10/0x20 [ 38.671928] [ 38.672246] The buggy address belongs to the object at fff00000c6767080 [ 38.672246] which belongs to the cache kmalloc-64 of size 64 [ 38.673569] The buggy address is located 0 bytes to the right of [ 38.673569] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.675111] [ 38.675419] The buggy address belongs to the physical page: [ 38.676270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.677256] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.678090] page_type: f5(slab) [ 38.678581] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.679524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.680499] page dumped because: kasan: bad access detected [ 38.681248] [ 38.681590] Memory state around the buggy address: [ 38.682245] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.683215] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.684152] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.685040] ^ [ 38.685764] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.686699] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.687547] ================================================================== [ 38.043549] ================================================================== [ 38.044297] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 38.045607] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.046848] [ 38.047373] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.048565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.049240] Hardware name: linux,dummy-virt (DT) [ 38.050092] Call trace: [ 38.050438] show_stack+0x20/0x38 (C) [ 38.051201] dump_stack_lvl+0x8c/0xd0 [ 38.051917] print_report+0x118/0x5e0 [ 38.052445] kasan_report+0xc8/0x118 [ 38.053084] kasan_check_range+0x100/0x1a8 [ 38.053834] __kasan_check_write+0x20/0x30 [ 38.054588] kasan_atomics_helper+0xf88/0x4858 [ 38.055364] kasan_atomics+0x198/0x2e8 [ 38.056001] kunit_try_run_case+0x14c/0x3d0 [ 38.056580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.057428] kthread+0x24c/0x2d0 [ 38.058168] ret_from_fork+0x10/0x20 [ 38.058849] [ 38.059260] Allocated by task 253: [ 38.059941] kasan_save_stack+0x3c/0x68 [ 38.060560] kasan_save_track+0x20/0x40 [ 38.061278] kasan_save_alloc_info+0x40/0x58 [ 38.062027] __kasan_kmalloc+0xd4/0xd8 [ 38.062691] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.063417] kasan_atomics+0xb8/0x2e8 [ 38.064023] kunit_try_run_case+0x14c/0x3d0 [ 38.064723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.065460] kthread+0x24c/0x2d0 [ 38.066050] ret_from_fork+0x10/0x20 [ 38.066762] [ 38.067157] The buggy address belongs to the object at fff00000c6767080 [ 38.067157] which belongs to the cache kmalloc-64 of size 64 [ 38.068768] The buggy address is located 0 bytes to the right of [ 38.068768] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.070417] [ 38.070853] The buggy address belongs to the physical page: [ 38.071586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.072695] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.073555] page_type: f5(slab) [ 38.074156] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.075207] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.076183] page dumped because: kasan: bad access detected [ 38.076971] [ 38.077382] Memory state around the buggy address: [ 38.078162] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.079165] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.080187] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.081079] ^ [ 38.081773] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.082783] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.083712] ================================================================== [ 38.449350] ================================================================== [ 38.450575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 38.451562] Read of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.452507] [ 38.452890] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.454404] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.455122] Hardware name: linux,dummy-virt (DT) [ 38.455926] Call trace: [ 38.456358] show_stack+0x20/0x38 (C) [ 38.457097] dump_stack_lvl+0x8c/0xd0 [ 38.457835] print_report+0x118/0x5e0 [ 38.458494] kasan_report+0xc8/0x118 [ 38.459151] __asan_report_load8_noabort+0x20/0x30 [ 38.459912] kasan_atomics_helper+0x3f04/0x4858 [ 38.460602] kasan_atomics+0x198/0x2e8 [ 38.461221] kunit_try_run_case+0x14c/0x3d0 [ 38.461979] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.462834] kthread+0x24c/0x2d0 [ 38.463457] ret_from_fork+0x10/0x20 [ 38.464087] [ 38.464499] Allocated by task 253: [ 38.465086] kasan_save_stack+0x3c/0x68 [ 38.465830] kasan_save_track+0x20/0x40 [ 38.466528] kasan_save_alloc_info+0x40/0x58 [ 38.467257] __kasan_kmalloc+0xd4/0xd8 [ 38.467965] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.468707] kasan_atomics+0xb8/0x2e8 [ 38.469322] kunit_try_run_case+0x14c/0x3d0 [ 38.470019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.470820] kthread+0x24c/0x2d0 [ 38.471509] ret_from_fork+0x10/0x20 [ 38.472167] [ 38.472544] The buggy address belongs to the object at fff00000c6767080 [ 38.472544] which belongs to the cache kmalloc-64 of size 64 [ 38.474110] The buggy address is located 0 bytes to the right of [ 38.474110] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.475675] [ 38.476064] The buggy address belongs to the physical page: [ 38.476687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.477949] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.478860] page_type: f5(slab) [ 38.479459] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.480522] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.481493] page dumped because: kasan: bad access detected [ 38.482320] [ 38.482693] Memory state around the buggy address: [ 38.483495] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.484491] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.485462] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.486394] ^ [ 38.487174] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.488106] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.489018] ================================================================== [ 38.572332] ================================================================== [ 38.573080] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 38.573509] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.574166] [ 38.574644] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.575904] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.576690] Hardware name: linux,dummy-virt (DT) [ 38.577328] Call trace: [ 38.577710] show_stack+0x20/0x38 (C) [ 38.578451] dump_stack_lvl+0x8c/0xd0 [ 38.579000] print_report+0x118/0x5e0 [ 38.579798] kasan_report+0xc8/0x118 [ 38.580390] kasan_check_range+0x100/0x1a8 [ 38.581254] __kasan_check_write+0x20/0x30 [ 38.581875] kasan_atomics_helper+0x14e4/0x4858 [ 38.582745] kasan_atomics+0x198/0x2e8 [ 38.583360] kunit_try_run_case+0x14c/0x3d0 [ 38.583936] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.584834] kthread+0x24c/0x2d0 [ 38.585383] ret_from_fork+0x10/0x20 [ 38.586054] [ 38.586427] Allocated by task 253: [ 38.586933] kasan_save_stack+0x3c/0x68 [ 38.587595] kasan_save_track+0x20/0x40 [ 38.588216] kasan_save_alloc_info+0x40/0x58 [ 38.588847] __kasan_kmalloc+0xd4/0xd8 [ 38.589410] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.590104] kasan_atomics+0xb8/0x2e8 [ 38.590682] kunit_try_run_case+0x14c/0x3d0 [ 38.591348] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.592237] kthread+0x24c/0x2d0 [ 38.592876] ret_from_fork+0x10/0x20 [ 38.593390] [ 38.593809] The buggy address belongs to the object at fff00000c6767080 [ 38.593809] which belongs to the cache kmalloc-64 of size 64 [ 38.595126] The buggy address is located 0 bytes to the right of [ 38.595126] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.596488] [ 38.596827] The buggy address belongs to the physical page: [ 38.597439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.598471] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.599369] page_type: f5(slab) [ 38.600110] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.601015] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.601973] page dumped because: kasan: bad access detected [ 38.602572] [ 38.602977] Memory state around the buggy address: [ 38.603678] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.604515] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.605445] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.606418] ^ [ 38.607029] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.607998] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.608871] ================================================================== [ 37.520103] ================================================================== [ 37.520963] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 37.522106] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.523050] [ 37.523422] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.525150] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.525875] Hardware name: linux,dummy-virt (DT) [ 37.526472] Call trace: [ 37.527182] show_stack+0x20/0x38 (C) [ 37.527803] dump_stack_lvl+0x8c/0xd0 [ 37.528616] print_report+0x118/0x5e0 [ 37.529110] kasan_report+0xc8/0x118 [ 37.529610] __asan_report_load4_noabort+0x20/0x30 [ 37.530512] kasan_atomics_helper+0x3dbc/0x4858 [ 37.531077] kasan_atomics+0x198/0x2e8 [ 37.532005] kunit_try_run_case+0x14c/0x3d0 [ 37.532815] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.533691] kthread+0x24c/0x2d0 [ 37.534229] ret_from_fork+0x10/0x20 [ 37.534896] [ 37.535254] Allocated by task 253: [ 37.535841] kasan_save_stack+0x3c/0x68 [ 37.536463] kasan_save_track+0x20/0x40 [ 37.537111] kasan_save_alloc_info+0x40/0x58 [ 37.537776] __kasan_kmalloc+0xd4/0xd8 [ 37.538403] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.539058] kasan_atomics+0xb8/0x2e8 [ 37.539669] kunit_try_run_case+0x14c/0x3d0 [ 37.540326] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.541031] kthread+0x24c/0x2d0 [ 37.541604] ret_from_fork+0x10/0x20 [ 37.542149] [ 37.542507] The buggy address belongs to the object at fff00000c6767080 [ 37.542507] which belongs to the cache kmalloc-64 of size 64 [ 37.544072] The buggy address is located 0 bytes to the right of [ 37.544072] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.545689] [ 37.546005] The buggy address belongs to the physical page: [ 37.546721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.547683] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.548570] page_type: f5(slab) [ 37.549166] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.550170] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.551057] page dumped because: kasan: bad access detected [ 37.551726] [ 37.552094] Memory state around the buggy address: [ 37.552823] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.553554] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.554471] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.555350] ^ [ 37.556046] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.557031] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.557926] ================================================================== [ 36.612316] ================================================================== [ 36.613094] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 36.614953] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 36.616471] [ 36.617125] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.618570] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.619420] Hardware name: linux,dummy-virt (DT) [ 36.620187] Call trace: [ 36.620591] show_stack+0x20/0x38 (C) [ 36.621198] dump_stack_lvl+0x8c/0xd0 [ 36.622313] print_report+0x118/0x5e0 [ 36.622863] kasan_report+0xc8/0x118 [ 36.623257] __asan_report_store4_noabort+0x20/0x30 [ 36.623934] kasan_atomics_helper+0x3f94/0x4858 [ 36.624577] kasan_atomics+0x198/0x2e8 [ 36.625107] kunit_try_run_case+0x14c/0x3d0 [ 36.625665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.626504] kthread+0x24c/0x2d0 [ 36.627291] ret_from_fork+0x10/0x20 [ 36.628056] [ 36.628461] Allocated by task 253: [ 36.628976] kasan_save_stack+0x3c/0x68 [ 36.629713] kasan_save_track+0x20/0x40 [ 36.630538] kasan_save_alloc_info+0x40/0x58 [ 36.631576] __kasan_kmalloc+0xd4/0xd8 [ 36.632543] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.633315] kasan_atomics+0xb8/0x2e8 [ 36.633944] kunit_try_run_case+0x14c/0x3d0 [ 36.634768] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.635888] kthread+0x24c/0x2d0 [ 36.636288] ret_from_fork+0x10/0x20 [ 36.636759] [ 36.637351] The buggy address belongs to the object at fff00000c6767080 [ 36.637351] which belongs to the cache kmalloc-64 of size 64 [ 36.639855] The buggy address is located 0 bytes to the right of [ 36.639855] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 36.641355] [ 36.642158] The buggy address belongs to the physical page: [ 36.642950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 36.643881] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.644851] page_type: f5(slab) [ 36.645334] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.646971] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.647744] page dumped because: kasan: bad access detected [ 36.648942] [ 36.649252] Memory state around the buggy address: [ 36.650493] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.651552] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.652522] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.653560] ^ [ 36.654563] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.656036] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.656991] ================================================================== [ 37.725066] ================================================================== [ 37.725743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 37.726799] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.728042] [ 37.728494] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.729741] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.731092] Hardware name: linux,dummy-virt (DT) [ 37.731659] Call trace: [ 37.732116] show_stack+0x20/0x38 (C) [ 37.733403] dump_stack_lvl+0x8c/0xd0 [ 37.734165] print_report+0x118/0x5e0 [ 37.734832] kasan_report+0xc8/0x118 [ 37.735517] kasan_check_range+0x100/0x1a8 [ 37.736152] __kasan_check_write+0x20/0x30 [ 37.737012] kasan_atomics_helper+0xd3c/0x4858 [ 37.737688] kasan_atomics+0x198/0x2e8 [ 37.738290] kunit_try_run_case+0x14c/0x3d0 [ 37.738670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.739440] kthread+0x24c/0x2d0 [ 37.740151] ret_from_fork+0x10/0x20 [ 37.740854] [ 37.741219] Allocated by task 253: [ 37.741792] kasan_save_stack+0x3c/0x68 [ 37.742389] kasan_save_track+0x20/0x40 [ 37.743122] kasan_save_alloc_info+0x40/0x58 [ 37.743659] __kasan_kmalloc+0xd4/0xd8 [ 37.744317] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.745000] kasan_atomics+0xb8/0x2e8 [ 37.745650] kunit_try_run_case+0x14c/0x3d0 [ 37.746248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.747196] kthread+0x24c/0x2d0 [ 37.747648] ret_from_fork+0x10/0x20 [ 37.748327] [ 37.748683] The buggy address belongs to the object at fff00000c6767080 [ 37.748683] which belongs to the cache kmalloc-64 of size 64 [ 37.750107] The buggy address is located 0 bytes to the right of [ 37.750107] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.751526] [ 37.751855] The buggy address belongs to the physical page: [ 37.752439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.753546] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.754329] page_type: f5(slab) [ 37.755004] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.755955] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.756952] page dumped because: kasan: bad access detected [ 37.757648] [ 37.757996] Memory state around the buggy address: [ 37.758696] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.759601] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.760409] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.761404] ^ [ 37.761950] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.762895] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.763826] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 35.978257] ================================================================== [ 35.979314] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 35.980359] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249 [ 35.981067] [ 35.981504] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 35.983044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.983768] Hardware name: linux,dummy-virt (DT) [ 35.984459] Call trace: [ 35.984985] show_stack+0x20/0x38 (C) [ 35.985707] dump_stack_lvl+0x8c/0xd0 [ 35.986521] print_report+0x118/0x5e0 [ 35.987142] kasan_report+0xc8/0x118 [ 35.987793] kasan_check_range+0x100/0x1a8 [ 35.988477] __kasan_check_write+0x20/0x30 [ 35.989173] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 35.990063] kasan_bitops_generic+0x11c/0x1c8 [ 35.990788] kunit_try_run_case+0x14c/0x3d0 [ 35.991532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.992372] kthread+0x24c/0x2d0 [ 35.992967] ret_from_fork+0x10/0x20 [ 35.993716] [ 35.994063] Allocated by task 249: [ 35.994716] kasan_save_stack+0x3c/0x68 [ 35.995430] kasan_save_track+0x20/0x40 [ 35.996092] kasan_save_alloc_info+0x40/0x58 [ 35.996824] __kasan_kmalloc+0xd4/0xd8 [ 35.997449] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.998080] kasan_bitops_generic+0xa0/0x1c8 [ 35.998820] kunit_try_run_case+0x14c/0x3d0 [ 35.999554] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.000350] kthread+0x24c/0x2d0 [ 36.000980] ret_from_fork+0x10/0x20 [ 36.001684] [ 36.002036] The buggy address belongs to the object at fff00000c6153d80 [ 36.002036] which belongs to the cache kmalloc-16 of size 16 [ 36.003655] The buggy address is located 8 bytes inside of [ 36.003655] allocated 9-byte region [fff00000c6153d80, fff00000c6153d89) [ 36.005185] [ 36.005650] The buggy address belongs to the physical page: [ 36.006359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 36.007527] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.008555] page_type: f5(slab) [ 36.009145] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 36.010172] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 36.011261] page dumped because: kasan: bad access detected [ 36.012001] [ 36.012347] Memory state around the buggy address: [ 36.013324] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 36.014311] fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 36.015297] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.016361] ^ [ 36.016980] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.017974] fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.018899] ================================================================== [ 36.183371] ================================================================== [ 36.184262] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 36.185226] Read of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249 [ 36.186244] [ 36.186709] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.187881] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.188532] Hardware name: linux,dummy-virt (DT) [ 36.189232] Call trace: [ 36.189648] show_stack+0x20/0x38 (C) [ 36.190228] dump_stack_lvl+0x8c/0xd0 [ 36.190893] print_report+0x118/0x5e0 [ 36.191413] kasan_report+0xc8/0x118 [ 36.192140] __asan_report_load8_noabort+0x20/0x30 [ 36.192814] kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 36.193683] kasan_bitops_generic+0x11c/0x1c8 [ 36.194278] kunit_try_run_case+0x14c/0x3d0 [ 36.195051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.195819] kthread+0x24c/0x2d0 [ 36.196450] ret_from_fork+0x10/0x20 [ 36.197063] [ 36.197400] Allocated by task 249: [ 36.197922] kasan_save_stack+0x3c/0x68 [ 36.198458] kasan_save_track+0x20/0x40 [ 36.199167] kasan_save_alloc_info+0x40/0x58 [ 36.199802] __kasan_kmalloc+0xd4/0xd8 [ 36.200341] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.201111] kasan_bitops_generic+0xa0/0x1c8 [ 36.201744] kunit_try_run_case+0x14c/0x3d0 [ 36.202347] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.203092] kthread+0x24c/0x2d0 [ 36.203609] ret_from_fork+0x10/0x20 [ 36.204137] [ 36.204468] The buggy address belongs to the object at fff00000c6153d80 [ 36.204468] which belongs to the cache kmalloc-16 of size 16 [ 36.205914] The buggy address is located 8 bytes inside of [ 36.205914] allocated 9-byte region [fff00000c6153d80, fff00000c6153d89) [ 36.207381] [ 36.207803] The buggy address belongs to the physical page: [ 36.208500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 36.209457] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.210338] page_type: f5(slab) [ 36.210877] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 36.211814] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 36.212731] page dumped because: kasan: bad access detected [ 36.213455] [ 36.213844] Memory state around the buggy address: [ 36.214566] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 36.215400] fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 36.216293] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.217169] ^ [ 36.217670] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.218662] fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.219572] ================================================================== [ 36.222155] ================================================================== [ 36.223482] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 36.224206] Read of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249 [ 36.224867] [ 36.225143] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.226695] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.227700] Hardware name: linux,dummy-virt (DT) [ 36.228450] Call trace: [ 36.228958] show_stack+0x20/0x38 (C) [ 36.229719] dump_stack_lvl+0x8c/0xd0 [ 36.230441] print_report+0x118/0x5e0 [ 36.231050] kasan_report+0xc8/0x118 [ 36.231585] __asan_report_load8_noabort+0x20/0x30 [ 36.232234] kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 36.233342] kasan_bitops_generic+0x11c/0x1c8 [ 36.234128] kunit_try_run_case+0x14c/0x3d0 [ 36.234819] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.235585] kthread+0x24c/0x2d0 [ 36.236442] ret_from_fork+0x10/0x20 [ 36.237120] [ 36.237333] Allocated by task 249: [ 36.237597] kasan_save_stack+0x3c/0x68 [ 36.238197] kasan_save_track+0x20/0x40 [ 36.238931] kasan_save_alloc_info+0x40/0x58 [ 36.239831] __kasan_kmalloc+0xd4/0xd8 [ 36.240447] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.241240] kasan_bitops_generic+0xa0/0x1c8 [ 36.241929] kunit_try_run_case+0x14c/0x3d0 [ 36.242642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.243436] kthread+0x24c/0x2d0 [ 36.244016] ret_from_fork+0x10/0x20 [ 36.244659] [ 36.245015] The buggy address belongs to the object at fff00000c6153d80 [ 36.245015] which belongs to the cache kmalloc-16 of size 16 [ 36.246650] The buggy address is located 8 bytes inside of [ 36.246650] allocated 9-byte region [fff00000c6153d80, fff00000c6153d89) [ 36.248221] [ 36.248713] The buggy address belongs to the physical page: [ 36.249405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 36.250561] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.251467] page_type: f5(slab) [ 36.251984] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 36.253053] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 36.254115] page dumped because: kasan: bad access detected [ 36.255004] [ 36.255520] Memory state around the buggy address: [ 36.256121] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 36.257094] fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 36.257865] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.258922] ^ [ 36.259417] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.260249] fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.261219] ================================================================== [ 35.888022] ================================================================== [ 35.889188] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 35.891645] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249 [ 35.893231] [ 35.893552] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 35.895823] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.897361] Hardware name: linux,dummy-virt (DT) [ 35.898285] Call trace: [ 35.898870] show_stack+0x20/0x38 (C) [ 35.899496] dump_stack_lvl+0x8c/0xd0 [ 35.900091] print_report+0x118/0x5e0 [ 35.900675] kasan_report+0xc8/0x118 [ 35.901367] kasan_check_range+0x100/0x1a8 [ 35.902082] __kasan_check_write+0x20/0x30 [ 35.902415] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 35.903135] kasan_bitops_generic+0x11c/0x1c8 [ 35.904185] kunit_try_run_case+0x14c/0x3d0 [ 35.905062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.906027] kthread+0x24c/0x2d0 [ 35.906718] ret_from_fork+0x10/0x20 [ 35.907347] [ 35.907731] Allocated by task 249: [ 35.908323] kasan_save_stack+0x3c/0x68 [ 35.909018] kasan_save_track+0x20/0x40 [ 35.909728] kasan_save_alloc_info+0x40/0x58 [ 35.910409] __kasan_kmalloc+0xd4/0xd8 [ 35.911060] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.911789] kasan_bitops_generic+0xa0/0x1c8 [ 35.912454] kunit_try_run_case+0x14c/0x3d0 [ 35.913094] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.913965] kthread+0x24c/0x2d0 [ 35.914545] ret_from_fork+0x10/0x20 [ 35.915173] [ 35.915658] The buggy address belongs to the object at fff00000c6153d80 [ 35.915658] which belongs to the cache kmalloc-16 of size 16 [ 35.917200] The buggy address is located 8 bytes inside of [ 35.917200] allocated 9-byte region [fff00000c6153d80, fff00000c6153d89) [ 35.918672] [ 35.919067] The buggy address belongs to the physical page: [ 35.919824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 35.920907] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.921919] page_type: f5(slab) [ 35.922519] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.923508] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 35.924473] page dumped because: kasan: bad access detected [ 35.924985] [ 35.925242] Memory state around the buggy address: [ 35.925922] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 35.926890] fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.928018] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.929105] ^ [ 35.929743] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.930740] fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.931793] ================================================================== [ 36.021213] ================================================================== [ 36.022175] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 36.023360] Read of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249 [ 36.024218] [ 36.024791] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.026147] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.026929] Hardware name: linux,dummy-virt (DT) [ 36.027655] Call trace: [ 36.028118] show_stack+0x20/0x38 (C) [ 36.028824] dump_stack_lvl+0x8c/0xd0 [ 36.029537] print_report+0x118/0x5e0 [ 36.030207] kasan_report+0xc8/0x118 [ 36.030858] __asan_report_load8_noabort+0x20/0x30 [ 36.031605] kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 36.032461] kasan_bitops_generic+0x11c/0x1c8 [ 36.033155] kunit_try_run_case+0x14c/0x3d0 [ 36.033858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.034698] kthread+0x24c/0x2d0 [ 36.035327] ret_from_fork+0x10/0x20 [ 36.035980] [ 36.036364] Allocated by task 249: [ 36.037022] kasan_save_stack+0x3c/0x68 [ 36.037679] kasan_save_track+0x20/0x40 [ 36.038441] kasan_save_alloc_info+0x40/0x58 [ 36.039355] __kasan_kmalloc+0xd4/0xd8 [ 36.040041] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.040722] kasan_bitops_generic+0xa0/0x1c8 [ 36.041456] kunit_try_run_case+0x14c/0x3d0 [ 36.042230] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.043162] kthread+0x24c/0x2d0 [ 36.043830] ret_from_fork+0x10/0x20 [ 36.044413] [ 36.044823] The buggy address belongs to the object at fff00000c6153d80 [ 36.044823] which belongs to the cache kmalloc-16 of size 16 [ 36.046401] The buggy address is located 8 bytes inside of [ 36.046401] allocated 9-byte region [fff00000c6153d80, fff00000c6153d89) [ 36.047991] [ 36.048458] The buggy address belongs to the physical page: [ 36.049324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 36.050387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.051211] page_type: f5(slab) [ 36.051692] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 36.052872] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 36.053829] page dumped because: kasan: bad access detected [ 36.054589] [ 36.055023] Memory state around the buggy address: [ 36.055704] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 36.056794] fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 36.057762] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.058693] ^ [ 36.059387] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.060342] fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.061261] ================================================================== [ 36.063457] ================================================================== [ 36.064359] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 36.065380] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249 [ 36.066382] [ 36.066958] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.068363] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.068999] Hardware name: linux,dummy-virt (DT) [ 36.069767] Call trace: [ 36.070317] show_stack+0x20/0x38 (C) [ 36.070952] dump_stack_lvl+0x8c/0xd0 [ 36.071706] print_report+0x118/0x5e0 [ 36.072299] kasan_report+0xc8/0x118 [ 36.072882] kasan_check_range+0x100/0x1a8 [ 36.073476] __kasan_check_write+0x20/0x30 [ 36.074131] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 36.075226] kasan_bitops_generic+0x11c/0x1c8 [ 36.075589] kunit_try_run_case+0x14c/0x3d0 [ 36.076060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.076951] kthread+0x24c/0x2d0 [ 36.077560] ret_from_fork+0x10/0x20 [ 36.078346] [ 36.078718] Allocated by task 249: [ 36.079563] kasan_save_stack+0x3c/0x68 [ 36.080235] kasan_save_track+0x20/0x40 [ 36.080763] kasan_save_alloc_info+0x40/0x58 [ 36.081383] __kasan_kmalloc+0xd4/0xd8 [ 36.081887] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.082750] kasan_bitops_generic+0xa0/0x1c8 [ 36.083344] kunit_try_run_case+0x14c/0x3d0 [ 36.084031] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.084744] kthread+0x24c/0x2d0 [ 36.085314] ret_from_fork+0x10/0x20 [ 36.085878] [ 36.086295] The buggy address belongs to the object at fff00000c6153d80 [ 36.086295] which belongs to the cache kmalloc-16 of size 16 [ 36.087708] The buggy address is located 8 bytes inside of [ 36.087708] allocated 9-byte region [fff00000c6153d80, fff00000c6153d89) [ 36.089130] [ 36.089495] The buggy address belongs to the physical page: [ 36.090375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 36.091274] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.092260] page_type: f5(slab) [ 36.092759] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 36.093780] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 36.094720] page dumped because: kasan: bad access detected [ 36.095357] [ 36.095751] Memory state around the buggy address: [ 36.096269] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 36.097256] fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 36.098045] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.099002] ^ [ 36.099520] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.100377] fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.101227] ================================================================== [ 35.934036] ================================================================== [ 35.934947] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 35.936527] Read of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249 [ 35.937483] [ 35.938008] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 35.939279] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.940038] Hardware name: linux,dummy-virt (DT) [ 35.940742] Call trace: [ 35.941193] show_stack+0x20/0x38 (C) [ 35.941923] dump_stack_lvl+0x8c/0xd0 [ 35.942564] print_report+0x118/0x5e0 [ 35.943258] kasan_report+0xc8/0x118 [ 35.943977] __asan_report_load8_noabort+0x20/0x30 [ 35.944731] kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 35.945655] kasan_bitops_generic+0x11c/0x1c8 [ 35.946350] kunit_try_run_case+0x14c/0x3d0 [ 35.947211] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.948025] kthread+0x24c/0x2d0 [ 35.948655] ret_from_fork+0x10/0x20 [ 35.949306] [ 35.949678] Allocated by task 249: [ 35.950409] kasan_save_stack+0x3c/0x68 [ 35.951102] kasan_save_track+0x20/0x40 [ 35.951837] kasan_save_alloc_info+0x40/0x58 [ 35.952646] __kasan_kmalloc+0xd4/0xd8 [ 35.953290] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.954131] kasan_bitops_generic+0xa0/0x1c8 [ 35.954895] kunit_try_run_case+0x14c/0x3d0 [ 35.955568] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.956378] kthread+0x24c/0x2d0 [ 35.956981] ret_from_fork+0x10/0x20 [ 35.957616] [ 35.958052] The buggy address belongs to the object at fff00000c6153d80 [ 35.958052] which belongs to the cache kmalloc-16 of size 16 [ 35.959619] The buggy address is located 8 bytes inside of [ 35.959619] allocated 9-byte region [fff00000c6153d80, fff00000c6153d89) [ 35.961116] [ 35.961555] The buggy address belongs to the physical page: [ 35.962356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 35.963474] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.964430] page_type: f5(slab) [ 35.965011] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.966101] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 35.967136] page dumped because: kasan: bad access detected [ 35.967923] [ 35.968388] Memory state around the buggy address: [ 35.969125] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 35.970186] fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.971313] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.972253] ^ [ 35.972867] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.973819] fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.974821] ================================================================== [ 36.143036] ================================================================== [ 36.143787] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 36.145386] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249 [ 36.146426] [ 36.146885] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.148220] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.148825] Hardware name: linux,dummy-virt (DT) [ 36.149579] Call trace: [ 36.149958] show_stack+0x20/0x38 (C) [ 36.150694] dump_stack_lvl+0x8c/0xd0 [ 36.151387] print_report+0x118/0x5e0 [ 36.152012] kasan_report+0xc8/0x118 [ 36.152613] kasan_check_range+0x100/0x1a8 [ 36.153189] __kasan_check_write+0x20/0x30 [ 36.153929] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 36.154790] kasan_bitops_generic+0x11c/0x1c8 [ 36.155446] kunit_try_run_case+0x14c/0x3d0 [ 36.156141] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.156941] kthread+0x24c/0x2d0 [ 36.157590] ret_from_fork+0x10/0x20 [ 36.158194] [ 36.158524] Allocated by task 249: [ 36.159021] kasan_save_stack+0x3c/0x68 [ 36.159737] kasan_save_track+0x20/0x40 [ 36.160233] kasan_save_alloc_info+0x40/0x58 [ 36.160951] __kasan_kmalloc+0xd4/0xd8 [ 36.161459] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.162215] kasan_bitops_generic+0xa0/0x1c8 [ 36.162829] kunit_try_run_case+0x14c/0x3d0 [ 36.163436] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.164329] kthread+0x24c/0x2d0 [ 36.164914] ret_from_fork+0x10/0x20 [ 36.165466] [ 36.165843] The buggy address belongs to the object at fff00000c6153d80 [ 36.165843] which belongs to the cache kmalloc-16 of size 16 [ 36.167184] The buggy address is located 8 bytes inside of [ 36.167184] allocated 9-byte region [fff00000c6153d80, fff00000c6153d89) [ 36.168733] [ 36.169047] The buggy address belongs to the physical page: [ 36.170007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 36.170973] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.171867] page_type: f5(slab) [ 36.172338] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 36.173401] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 36.174329] page dumped because: kasan: bad access detected [ 36.175025] [ 36.175424] Memory state around the buggy address: [ 36.176097] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 36.176999] fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 36.177865] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.178681] ^ [ 36.179264] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.180200] fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.181189] ================================================================== [ 36.103274] ================================================================== [ 36.104008] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 36.105602] Read of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249 [ 36.106587] [ 36.106936] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.108686] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.109202] Hardware name: linux,dummy-virt (DT) [ 36.110468] Call trace: [ 36.111084] show_stack+0x20/0x38 (C) [ 36.111729] dump_stack_lvl+0x8c/0xd0 [ 36.112277] print_report+0x118/0x5e0 [ 36.112921] kasan_report+0xc8/0x118 [ 36.113405] __asan_report_load8_noabort+0x20/0x30 [ 36.114219] kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 36.115111] kasan_bitops_generic+0x11c/0x1c8 [ 36.115867] kunit_try_run_case+0x14c/0x3d0 [ 36.116414] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.117200] kthread+0x24c/0x2d0 [ 36.117853] ret_from_fork+0x10/0x20 [ 36.118528] [ 36.118849] Allocated by task 249: [ 36.119455] kasan_save_stack+0x3c/0x68 [ 36.119966] kasan_save_track+0x20/0x40 [ 36.120659] kasan_save_alloc_info+0x40/0x58 [ 36.121295] __kasan_kmalloc+0xd4/0xd8 [ 36.121938] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.122712] kasan_bitops_generic+0xa0/0x1c8 [ 36.123359] kunit_try_run_case+0x14c/0x3d0 [ 36.123933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.124744] kthread+0x24c/0x2d0 [ 36.125240] ret_from_fork+0x10/0x20 [ 36.125814] [ 36.126222] The buggy address belongs to the object at fff00000c6153d80 [ 36.126222] which belongs to the cache kmalloc-16 of size 16 [ 36.127683] The buggy address is located 8 bytes inside of [ 36.127683] allocated 9-byte region [fff00000c6153d80, fff00000c6153d89) [ 36.129130] [ 36.129461] The buggy address belongs to the physical page: [ 36.130127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 36.131130] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.132076] page_type: f5(slab) [ 36.132557] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 36.133521] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 36.134655] page dumped because: kasan: bad access detected [ 36.135390] [ 36.135747] Memory state around the buggy address: [ 36.136429] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 36.137315] fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 36.138134] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.139148] ^ [ 36.139683] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.140593] fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.141607] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 35.620370] ================================================================== [ 35.621885] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 35.623406] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249 [ 35.624196] [ 35.624569] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 35.625879] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.626511] Hardware name: linux,dummy-virt (DT) [ 35.627834] Call trace: [ 35.628263] show_stack+0x20/0x38 (C) [ 35.628759] dump_stack_lvl+0x8c/0xd0 [ 35.629270] print_report+0x118/0x5e0 [ 35.629819] kasan_report+0xc8/0x118 [ 35.631145] kasan_check_range+0x100/0x1a8 [ 35.631933] __kasan_check_write+0x20/0x30 [ 35.632613] kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 35.633482] kasan_bitops_generic+0x110/0x1c8 [ 35.635134] kunit_try_run_case+0x14c/0x3d0 [ 35.635943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.636902] kthread+0x24c/0x2d0 [ 35.637583] ret_from_fork+0x10/0x20 [ 35.638696] [ 35.639037] Allocated by task 249: [ 35.639682] kasan_save_stack+0x3c/0x68 [ 35.640189] kasan_save_track+0x20/0x40 [ 35.640874] kasan_save_alloc_info+0x40/0x58 [ 35.641402] __kasan_kmalloc+0xd4/0xd8 [ 35.642990] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.643773] kasan_bitops_generic+0xa0/0x1c8 [ 35.644329] kunit_try_run_case+0x14c/0x3d0 [ 35.645044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.645913] kthread+0x24c/0x2d0 [ 35.646717] ret_from_fork+0x10/0x20 [ 35.647395] [ 35.647837] The buggy address belongs to the object at fff00000c6153d80 [ 35.647837] which belongs to the cache kmalloc-16 of size 16 [ 35.649339] The buggy address is located 8 bytes inside of [ 35.649339] allocated 9-byte region [fff00000c6153d80, fff00000c6153d89) [ 35.651739] [ 35.652442] The buggy address belongs to the physical page: [ 35.653442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 35.654934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.656036] page_type: f5(slab) [ 35.656879] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.658322] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 35.659575] page dumped because: kasan: bad access detected [ 35.660855] [ 35.661184] Memory state around the buggy address: [ 35.662231] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 35.664300] fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.665264] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.666526] ^ [ 35.668325] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.669473] fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.670653] ================================================================== [ 35.718215] ================================================================== [ 35.719056] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 35.719908] Read of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249 [ 35.720957] [ 35.721340] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 35.723427] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.724070] Hardware name: linux,dummy-virt (DT) [ 35.725138] Call trace: [ 35.725459] show_stack+0x20/0x38 (C) [ 35.726146] dump_stack_lvl+0x8c/0xd0 [ 35.727494] print_report+0x118/0x5e0 [ 35.728280] kasan_report+0xc8/0x118 [ 35.728872] __asan_report_load8_noabort+0x20/0x30 [ 35.729678] kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 35.730414] kasan_bitops_generic+0x110/0x1c8 [ 35.731055] kunit_try_run_case+0x14c/0x3d0 [ 35.732050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.732701] kthread+0x24c/0x2d0 [ 35.733357] ret_from_fork+0x10/0x20 [ 35.734566] [ 35.734946] Allocated by task 249: [ 35.735451] kasan_save_stack+0x3c/0x68 [ 35.736131] kasan_save_track+0x20/0x40 [ 35.737357] kasan_save_alloc_info+0x40/0x58 [ 35.738431] __kasan_kmalloc+0xd4/0xd8 [ 35.739234] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.740006] kasan_bitops_generic+0xa0/0x1c8 [ 35.740869] kunit_try_run_case+0x14c/0x3d0 [ 35.741579] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.742361] kthread+0x24c/0x2d0 [ 35.742933] ret_from_fork+0x10/0x20 [ 35.743504] [ 35.744323] The buggy address belongs to the object at fff00000c6153d80 [ 35.744323] which belongs to the cache kmalloc-16 of size 16 [ 35.745667] The buggy address is located 8 bytes inside of [ 35.745667] allocated 9-byte region [fff00000c6153d80, fff00000c6153d89) [ 35.748256] [ 35.748496] The buggy address belongs to the physical page: [ 35.749390] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 35.750930] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.751809] page_type: f5(slab) [ 35.752362] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.753397] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 35.755208] page dumped because: kasan: bad access detected [ 35.756469] [ 35.756792] Memory state around the buggy address: [ 35.757860] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 35.759135] fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.759969] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.761230] ^ [ 35.761738] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.763168] fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.763608] ================================================================== [ 35.476872] ================================================================== [ 35.477826] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 35.478958] Read of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249 [ 35.481082] [ 35.481895] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 35.483533] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.484084] Hardware name: linux,dummy-virt (DT) [ 35.484936] Call trace: [ 35.485321] show_stack+0x20/0x38 (C) [ 35.486130] dump_stack_lvl+0x8c/0xd0 [ 35.486567] print_report+0x118/0x5e0 [ 35.487047] kasan_report+0xc8/0x118 [ 35.487526] __asan_report_load8_noabort+0x20/0x30 [ 35.488644] kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 35.489069] kasan_bitops_generic+0x110/0x1c8 [ 35.489394] kunit_try_run_case+0x14c/0x3d0 [ 35.489903] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.491768] kthread+0x24c/0x2d0 [ 35.492336] ret_from_fork+0x10/0x20 [ 35.493108] [ 35.493616] Allocated by task 249: [ 35.494447] kasan_save_stack+0x3c/0x68 [ 35.494976] kasan_save_track+0x20/0x40 [ 35.495856] kasan_save_alloc_info+0x40/0x58 [ 35.496407] __kasan_kmalloc+0xd4/0xd8 [ 35.496998] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.498227] kasan_bitops_generic+0xa0/0x1c8 [ 35.499083] kunit_try_run_case+0x14c/0x3d0 [ 35.499706] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.500609] kthread+0x24c/0x2d0 [ 35.501170] ret_from_fork+0x10/0x20 [ 35.501744] [ 35.502731] The buggy address belongs to the object at fff00000c6153d80 [ 35.502731] which belongs to the cache kmalloc-16 of size 16 [ 35.504149] The buggy address is located 8 bytes inside of [ 35.504149] allocated 9-byte region [fff00000c6153d80, fff00000c6153d89) [ 35.506139] [ 35.506960] The buggy address belongs to the physical page: [ 35.507936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 35.508941] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.509839] page_type: f5(slab) [ 35.510319] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.511474] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 35.512787] page dumped because: kasan: bad access detected [ 35.513414] [ 35.514069] Memory state around the buggy address: [ 35.515232] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 35.516160] fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.516881] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.517713] ^ [ 35.518214] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.519610] fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.520876] ================================================================== [ 35.672874] ================================================================== [ 35.674232] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 35.675204] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249 [ 35.676156] [ 35.676531] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 35.677787] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.678517] Hardware name: linux,dummy-virt (DT) [ 35.679260] Call trace: [ 35.679743] show_stack+0x20/0x38 (C) [ 35.680268] dump_stack_lvl+0x8c/0xd0 [ 35.681049] print_report+0x118/0x5e0 [ 35.681757] kasan_report+0xc8/0x118 [ 35.682263] kasan_check_range+0x100/0x1a8 [ 35.683585] __kasan_check_write+0x20/0x30 [ 35.684108] kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 35.684977] kasan_bitops_generic+0x110/0x1c8 [ 35.686403] kunit_try_run_case+0x14c/0x3d0 [ 35.687096] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.687797] kthread+0x24c/0x2d0 [ 35.688428] ret_from_fork+0x10/0x20 [ 35.689033] [ 35.689408] Allocated by task 249: [ 35.690833] kasan_save_stack+0x3c/0x68 [ 35.691341] kasan_save_track+0x20/0x40 [ 35.692077] kasan_save_alloc_info+0x40/0x58 [ 35.692760] __kasan_kmalloc+0xd4/0xd8 [ 35.693292] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.694653] kasan_bitops_generic+0xa0/0x1c8 [ 35.695230] kunit_try_run_case+0x14c/0x3d0 [ 35.695890] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.696718] kthread+0x24c/0x2d0 [ 35.697197] ret_from_fork+0x10/0x20 [ 35.698167] [ 35.698542] The buggy address belongs to the object at fff00000c6153d80 [ 35.698542] which belongs to the cache kmalloc-16 of size 16 [ 35.699885] The buggy address is located 8 bytes inside of [ 35.699885] allocated 9-byte region [fff00000c6153d80, fff00000c6153d89) [ 35.701754] [ 35.702173] The buggy address belongs to the physical page: [ 35.702981] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 35.704067] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.704935] page_type: f5(slab) [ 35.705663] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.707617] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 35.708272] page dumped because: kasan: bad access detected [ 35.708693] [ 35.709328] Memory state around the buggy address: [ 35.710270] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 35.711105] fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.711997] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.712930] ^ [ 35.713667] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.714533] fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.715764] ================================================================== [ 35.571011] ================================================================== [ 35.571945] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 35.572832] Read of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249 [ 35.573687] [ 35.574044] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 35.575892] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.576655] Hardware name: linux,dummy-virt (DT) [ 35.577228] Call trace: [ 35.578103] show_stack+0x20/0x38 (C) [ 35.578576] dump_stack_lvl+0x8c/0xd0 [ 35.579305] print_report+0x118/0x5e0 [ 35.580382] kasan_report+0xc8/0x118 [ 35.580973] __asan_report_load8_noabort+0x20/0x30 [ 35.581793] kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 35.582583] kasan_bitops_generic+0x110/0x1c8 [ 35.583258] kunit_try_run_case+0x14c/0x3d0 [ 35.584251] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.585077] kthread+0x24c/0x2d0 [ 35.585699] ret_from_fork+0x10/0x20 [ 35.586528] [ 35.587645] Allocated by task 249: [ 35.588548] kasan_save_stack+0x3c/0x68 [ 35.589164] kasan_save_track+0x20/0x40 [ 35.589930] kasan_save_alloc_info+0x40/0x58 [ 35.590558] __kasan_kmalloc+0xd4/0xd8 [ 35.591095] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.592052] kasan_bitops_generic+0xa0/0x1c8 [ 35.592737] kunit_try_run_case+0x14c/0x3d0 [ 35.593330] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.594251] kthread+0x24c/0x2d0 [ 35.594974] ret_from_fork+0x10/0x20 [ 35.596301] [ 35.596711] The buggy address belongs to the object at fff00000c6153d80 [ 35.596711] which belongs to the cache kmalloc-16 of size 16 [ 35.598117] The buggy address is located 8 bytes inside of [ 35.598117] allocated 9-byte region [fff00000c6153d80, fff00000c6153d89) [ 35.600402] [ 35.601021] The buggy address belongs to the physical page: [ 35.602171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 35.603484] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.605258] page_type: f5(slab) [ 35.606327] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.608036] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 35.609029] page dumped because: kasan: bad access detected [ 35.610132] [ 35.610475] Memory state around the buggy address: [ 35.611218] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 35.612926] fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.613885] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.614315] ^ [ 35.614581] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.616499] fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.617458] ================================================================== [ 35.522453] ================================================================== [ 35.523922] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 35.524735] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249 [ 35.525326] [ 35.526301] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 35.528110] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.528766] Hardware name: linux,dummy-virt (DT) [ 35.529484] Call trace: [ 35.530575] show_stack+0x20/0x38 (C) [ 35.531075] dump_stack_lvl+0x8c/0xd0 [ 35.532064] print_report+0x118/0x5e0 [ 35.532672] kasan_report+0xc8/0x118 [ 35.533251] kasan_check_range+0x100/0x1a8 [ 35.534047] __kasan_check_write+0x20/0x30 [ 35.534671] kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 35.535468] kasan_bitops_generic+0x110/0x1c8 [ 35.536383] kunit_try_run_case+0x14c/0x3d0 [ 35.537104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.537881] kthread+0x24c/0x2d0 [ 35.538356] ret_from_fork+0x10/0x20 [ 35.539237] [ 35.539594] Allocated by task 249: [ 35.540072] kasan_save_stack+0x3c/0x68 [ 35.540692] kasan_save_track+0x20/0x40 [ 35.541342] kasan_save_alloc_info+0x40/0x58 [ 35.542416] __kasan_kmalloc+0xd4/0xd8 [ 35.543015] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.544527] kasan_bitops_generic+0xa0/0x1c8 [ 35.545355] kunit_try_run_case+0x14c/0x3d0 [ 35.546412] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.547278] kthread+0x24c/0x2d0 [ 35.547817] ret_from_fork+0x10/0x20 [ 35.548439] [ 35.548781] The buggy address belongs to the object at fff00000c6153d80 [ 35.548781] which belongs to the cache kmalloc-16 of size 16 [ 35.550110] The buggy address is located 8 bytes inside of [ 35.550110] allocated 9-byte region [fff00000c6153d80, fff00000c6153d89) [ 35.551811] [ 35.552107] The buggy address belongs to the physical page: [ 35.553874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 35.554844] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.555925] page_type: f5(slab) [ 35.556466] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.557600] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 35.558954] page dumped because: kasan: bad access detected [ 35.560232] [ 35.560558] Memory state around the buggy address: [ 35.561191] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 35.562258] fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.563546] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.564367] ^ [ 35.564907] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.566468] fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.567967] ================================================================== [ 35.765329] ================================================================== [ 35.767433] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 35.768316] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249 [ 35.769166] [ 35.769565] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 35.770847] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.771478] Hardware name: linux,dummy-virt (DT) [ 35.772954] Call trace: [ 35.773366] show_stack+0x20/0x38 (C) [ 35.774231] dump_stack_lvl+0x8c/0xd0 [ 35.774819] print_report+0x118/0x5e0 [ 35.775694] kasan_report+0xc8/0x118 [ 35.776279] kasan_check_range+0x100/0x1a8 [ 35.777418] __kasan_check_write+0x20/0x30 [ 35.778392] kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 35.779159] kasan_bitops_generic+0x110/0x1c8 [ 35.780007] kunit_try_run_case+0x14c/0x3d0 [ 35.780761] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.781724] kthread+0x24c/0x2d0 [ 35.782362] ret_from_fork+0x10/0x20 [ 35.783138] [ 35.783566] Allocated by task 249: [ 35.784305] kasan_save_stack+0x3c/0x68 [ 35.784927] kasan_save_track+0x20/0x40 [ 35.785678] kasan_save_alloc_info+0x40/0x58 [ 35.786476] __kasan_kmalloc+0xd4/0xd8 [ 35.787226] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.787893] kasan_bitops_generic+0xa0/0x1c8 [ 35.788678] kunit_try_run_case+0x14c/0x3d0 [ 35.789445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.790293] kthread+0x24c/0x2d0 [ 35.790811] ret_from_fork+0x10/0x20 [ 35.791302] [ 35.791772] The buggy address belongs to the object at fff00000c6153d80 [ 35.791772] which belongs to the cache kmalloc-16 of size 16 [ 35.793067] The buggy address is located 8 bytes inside of [ 35.793067] allocated 9-byte region [fff00000c6153d80, fff00000c6153d89) [ 35.794606] [ 35.794981] The buggy address belongs to the physical page: [ 35.795746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 35.796745] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.797673] page_type: f5(slab) [ 35.798161] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.799117] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 35.800008] page dumped because: kasan: bad access detected [ 35.800738] [ 35.801122] Memory state around the buggy address: [ 35.801772] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 35.802850] fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.803691] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.804608] ^ [ 35.805163] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.806172] fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.807057] ================================================================== [ 35.850927] ================================================================== [ 35.851757] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 35.852558] Read of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249 [ 35.853512] [ 35.853988] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 35.855476] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.855998] Hardware name: linux,dummy-virt (DT) [ 35.856649] Call trace: [ 35.857132] show_stack+0x20/0x38 (C) [ 35.857772] dump_stack_lvl+0x8c/0xd0 [ 35.858461] print_report+0x118/0x5e0 [ 35.859070] kasan_report+0xc8/0x118 [ 35.859655] __asan_report_load8_noabort+0x20/0x30 [ 35.860292] kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 35.861153] kasan_bitops_generic+0x110/0x1c8 [ 35.861673] kunit_try_run_case+0x14c/0x3d0 [ 35.862405] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.863115] kthread+0x24c/0x2d0 [ 35.863770] ret_from_fork+0x10/0x20 [ 35.864331] [ 35.864721] Allocated by task 249: [ 35.865155] kasan_save_stack+0x3c/0x68 [ 35.865807] kasan_save_track+0x20/0x40 [ 35.866390] kasan_save_alloc_info+0x40/0x58 [ 35.866972] __kasan_kmalloc+0xd4/0xd8 [ 35.867678] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.868409] kasan_bitops_generic+0xa0/0x1c8 [ 35.869087] kunit_try_run_case+0x14c/0x3d0 [ 35.869719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.870457] kthread+0x24c/0x2d0 [ 35.870974] ret_from_fork+0x10/0x20 [ 35.871593] [ 35.871963] The buggy address belongs to the object at fff00000c6153d80 [ 35.871963] which belongs to the cache kmalloc-16 of size 16 [ 35.873378] The buggy address is located 8 bytes inside of [ 35.873378] allocated 9-byte region [fff00000c6153d80, fff00000c6153d89) [ 35.874754] [ 35.875090] The buggy address belongs to the physical page: [ 35.875895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 35.876804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.877800] page_type: f5(slab) [ 35.878276] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.879267] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 35.880175] page dumped because: kasan: bad access detected [ 35.880899] [ 35.881244] Memory state around the buggy address: [ 35.881874] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 35.882860] fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.883668] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.884615] ^ [ 35.885034] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.885661] fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.886262] ================================================================== [ 35.808905] ================================================================== [ 35.810228] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 35.811335] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249 [ 35.812162] [ 35.812614] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 35.814517] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.815067] Hardware name: linux,dummy-virt (DT) [ 35.815733] Call trace: [ 35.816152] show_stack+0x20/0x38 (C) [ 35.816744] dump_stack_lvl+0x8c/0xd0 [ 35.817343] print_report+0x118/0x5e0 [ 35.817970] kasan_report+0xc8/0x118 [ 35.818502] kasan_check_range+0x100/0x1a8 [ 35.819270] __kasan_check_write+0x20/0x30 [ 35.820000] kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 35.820927] kasan_bitops_generic+0x110/0x1c8 [ 35.821549] kunit_try_run_case+0x14c/0x3d0 [ 35.822252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.823047] kthread+0x24c/0x2d0 [ 35.823687] ret_from_fork+0x10/0x20 [ 35.824409] [ 35.824846] Allocated by task 249: [ 35.825275] kasan_save_stack+0x3c/0x68 [ 35.825962] kasan_save_track+0x20/0x40 [ 35.826569] kasan_save_alloc_info+0x40/0x58 [ 35.827303] __kasan_kmalloc+0xd4/0xd8 [ 35.827835] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.828562] kasan_bitops_generic+0xa0/0x1c8 [ 35.829211] kunit_try_run_case+0x14c/0x3d0 [ 35.830054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.830769] kthread+0x24c/0x2d0 [ 35.831348] ret_from_fork+0x10/0x20 [ 35.831983] [ 35.832418] The buggy address belongs to the object at fff00000c6153d80 [ 35.832418] which belongs to the cache kmalloc-16 of size 16 [ 35.833786] The buggy address is located 8 bytes inside of [ 35.833786] allocated 9-byte region [fff00000c6153d80, fff00000c6153d89) [ 35.835338] [ 35.835734] The buggy address belongs to the physical page: [ 35.836382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 35.837340] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.838293] page_type: f5(slab) [ 35.838972] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.839949] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 35.840800] page dumped because: kasan: bad access detected [ 35.841547] [ 35.841897] Memory state around the buggy address: [ 35.842495] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 35.843439] fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.844390] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.845389] ^ [ 35.845875] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.846855] fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.847805] ================================================================== [ 35.424650] ================================================================== [ 35.425834] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 35.426941] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249 [ 35.429296] [ 35.430297] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 35.432065] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.432957] Hardware name: linux,dummy-virt (DT) [ 35.433442] Call trace: [ 35.434355] show_stack+0x20/0x38 (C) [ 35.435483] dump_stack_lvl+0x8c/0xd0 [ 35.436466] print_report+0x118/0x5e0 [ 35.437122] kasan_report+0xc8/0x118 [ 35.438032] kasan_check_range+0x100/0x1a8 [ 35.439057] __kasan_check_write+0x20/0x30 [ 35.439834] kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 35.440597] kasan_bitops_generic+0x110/0x1c8 [ 35.441434] kunit_try_run_case+0x14c/0x3d0 [ 35.442180] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.442992] kthread+0x24c/0x2d0 [ 35.443579] ret_from_fork+0x10/0x20 [ 35.444968] [ 35.445291] Allocated by task 249: [ 35.445795] kasan_save_stack+0x3c/0x68 [ 35.446396] kasan_save_track+0x20/0x40 [ 35.447019] kasan_save_alloc_info+0x40/0x58 [ 35.447751] __kasan_kmalloc+0xd4/0xd8 [ 35.448321] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.450529] kasan_bitops_generic+0xa0/0x1c8 [ 35.451242] kunit_try_run_case+0x14c/0x3d0 [ 35.452163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.453052] kthread+0x24c/0x2d0 [ 35.453860] ret_from_fork+0x10/0x20 [ 35.454688] [ 35.455092] The buggy address belongs to the object at fff00000c6153d80 [ 35.455092] which belongs to the cache kmalloc-16 of size 16 [ 35.456679] The buggy address is located 8 bytes inside of [ 35.456679] allocated 9-byte region [fff00000c6153d80, fff00000c6153d89) [ 35.458539] [ 35.459035] The buggy address belongs to the physical page: [ 35.459983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 35.460949] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.462011] page_type: f5(slab) [ 35.462801] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.464023] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 35.464897] page dumped because: kasan: bad access detected [ 35.466545] [ 35.467315] Memory state around the buggy address: [ 35.468401] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 35.469594] fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.470856] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.472515] ^ [ 35.472959] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.474583] fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.475386] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 35.363796] ================================================================== [ 35.365133] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 35.365805] Read of size 1 at addr fff00000c6643a90 by task kunit_try_catch/247 [ 35.367178] [ 35.367652] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 35.368962] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.369569] Hardware name: linux,dummy-virt (DT) [ 35.370346] Call trace: [ 35.370977] show_stack+0x20/0x38 (C) [ 35.371644] dump_stack_lvl+0x8c/0xd0 [ 35.372286] print_report+0x118/0x5e0 [ 35.372964] kasan_report+0xc8/0x118 [ 35.373599] __asan_report_load1_noabort+0x20/0x30 [ 35.374375] strnlen+0x80/0x88 [ 35.375016] kasan_strings+0x364/0x8d8 [ 35.375675] kunit_try_run_case+0x14c/0x3d0 [ 35.376397] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.377282] kthread+0x24c/0x2d0 [ 35.377910] ret_from_fork+0x10/0x20 [ 35.378572] [ 35.378960] Allocated by task 247: [ 35.379648] kasan_save_stack+0x3c/0x68 [ 35.380391] kasan_save_track+0x20/0x40 [ 35.381090] kasan_save_alloc_info+0x40/0x58 [ 35.381864] __kasan_kmalloc+0xd4/0xd8 [ 35.382503] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.383160] kasan_strings+0xb0/0x8d8 [ 35.383886] kunit_try_run_case+0x14c/0x3d0 [ 35.384688] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.385468] kthread+0x24c/0x2d0 [ 35.386052] ret_from_fork+0x10/0x20 [ 35.386998] [ 35.387775] Freed by task 247: [ 35.388898] kasan_save_stack+0x3c/0x68 [ 35.389693] kasan_save_track+0x20/0x40 [ 35.390666] kasan_save_free_info+0x4c/0x78 [ 35.392130] __kasan_slab_free+0x6c/0x98 [ 35.392868] kfree+0x114/0x3c8 [ 35.393571] kasan_strings+0x124/0x8d8 [ 35.394279] kunit_try_run_case+0x14c/0x3d0 [ 35.395236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.395955] kthread+0x24c/0x2d0 [ 35.396438] ret_from_fork+0x10/0x20 [ 35.397062] [ 35.397432] The buggy address belongs to the object at fff00000c6643a80 [ 35.397432] which belongs to the cache kmalloc-32 of size 32 [ 35.398872] The buggy address is located 16 bytes inside of [ 35.398872] freed 32-byte region [fff00000c6643a80, fff00000c6643aa0) [ 35.400185] [ 35.400521] The buggy address belongs to the physical page: [ 35.401356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106643 [ 35.402397] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.403411] page_type: f5(slab) [ 35.403934] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 35.404988] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 35.405889] page dumped because: kasan: bad access detected [ 35.406647] [ 35.407045] Memory state around the buggy address: [ 35.407616] fff00000c6643980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.408613] fff00000c6643a00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 35.409583] >fff00000c6643a80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.410408] ^ [ 35.411063] fff00000c6643b00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 35.411888] fff00000c6643b80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.412735] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[ 35.314743] ================================================================== [ 35.315557] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 35.316283] Read of size 1 at addr fff00000c6643a90 by task kunit_try_catch/247 [ 35.317200] [ 35.317587] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 35.318987] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.319555] Hardware name: linux,dummy-virt (DT) [ 35.320072] Call trace: [ 35.320620] show_stack+0x20/0x38 (C) [ 35.321977] dump_stack_lvl+0x8c/0xd0 [ 35.322547] print_report+0x118/0x5e0 [ 35.323185] kasan_report+0xc8/0x118 [ 35.323834] __asan_report_load1_noabort+0x20/0x30 [ 35.324524] strlen+0xa8/0xb0 [ 35.325145] kasan_strings+0x304/0x8d8 [ 35.325770] kunit_try_run_case+0x14c/0x3d0 [ 35.326466] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.327313] kthread+0x24c/0x2d0 [ 35.327948] ret_from_fork+0x10/0x20 [ 35.328501] [ 35.328920] Allocated by task 247: [ 35.329508] kasan_save_stack+0x3c/0x68 [ 35.330222] kasan_save_track+0x20/0x40 [ 35.330781] kasan_save_alloc_info+0x40/0x58 [ 35.331509] __kasan_kmalloc+0xd4/0xd8 [ 35.332002] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.332772] kasan_strings+0xb0/0x8d8 [ 35.333290] kunit_try_run_case+0x14c/0x3d0 [ 35.334214] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.334878] kthread+0x24c/0x2d0 [ 35.335179] ret_from_fork+0x10/0x20 [ 35.335458] [ 35.335659] Freed by task 247: [ 35.336048] kasan_save_stack+0x3c/0x68 [ 35.336868] kasan_save_track+0x20/0x40 [ 35.337382] kasan_save_free_info+0x4c/0x78 [ 35.338239] __kasan_slab_free+0x6c/0x98 [ 35.339116] kfree+0x114/0x3c8 [ 35.339580] kasan_strings+0x124/0x8d8 [ 35.340254] kunit_try_run_case+0x14c/0x3d0 [ 35.341073] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.341888] kthread+0x24c/0x2d0 [ 35.342489] ret_from_fork+0x10/0x20 [ 35.343180] [ 35.343585] The buggy address belongs to the object at fff00000c6643a80 [ 35.343585] which belongs to the cache kmalloc-32 of size 32 [ 35.345161] The buggy address is located 16 bytes inside of [ 35.345161] freed 32-byte region [fff00000c6643a80, fff00000c6643aa0) [ 35.346736] [ 35.347174] The buggy address belongs to the physical page: [ 35.347953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106643 [ 35.349125] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.350011] page_type: f5(slab) [ 35.350686] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 35.351697] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 35.352578] page dumped because: kasan: bad access detected [ 35.353420] [ 35.353786] Memory state around the buggy address: [ 35.354548] fff00000c6643980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.355478] fff00000c6643a00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 35.356434] >fff00000c6643a80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.357357] ^ [ 35.357964] fff00000c6643b00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 35.358996] fff00000c6643b80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.359901] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 35.259050] ================================================================== [ 35.259881] BUG: KASAN: slab-use-after-free in kasan_strings+0x838/0x8d8 [ 35.260714] Read of size 1 at addr fff00000c6643a90 by task kunit_try_catch/247 [ 35.262374] [ 35.262966] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 35.264458] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.265037] Hardware name: linux,dummy-virt (DT) [ 35.266254] Call trace: [ 35.267364] show_stack+0x20/0x38 (C) [ 35.268063] dump_stack_lvl+0x8c/0xd0 [ 35.268857] print_report+0x118/0x5e0 [ 35.269425] kasan_report+0xc8/0x118 [ 35.270053] __asan_report_load1_noabort+0x20/0x30 [ 35.271330] kasan_strings+0x838/0x8d8 [ 35.272053] kunit_try_run_case+0x14c/0x3d0 [ 35.272923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.274182] kthread+0x24c/0x2d0 [ 35.274847] ret_from_fork+0x10/0x20 [ 35.275554] [ 35.275978] Allocated by task 247: [ 35.276713] kasan_save_stack+0x3c/0x68 [ 35.277447] kasan_save_track+0x20/0x40 [ 35.278527] kasan_save_alloc_info+0x40/0x58 [ 35.279076] __kasan_kmalloc+0xd4/0xd8 [ 35.280098] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.281093] kasan_strings+0xb0/0x8d8 [ 35.282012] kunit_try_run_case+0x14c/0x3d0 [ 35.282668] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.283445] kthread+0x24c/0x2d0 [ 35.283998] ret_from_fork+0x10/0x20 [ 35.284509] [ 35.285013] Freed by task 247: [ 35.285586] kasan_save_stack+0x3c/0x68 [ 35.286203] kasan_save_track+0x20/0x40 [ 35.287309] kasan_save_free_info+0x4c/0x78 [ 35.288131] __kasan_slab_free+0x6c/0x98 [ 35.288832] kfree+0x114/0x3c8 [ 35.289337] kasan_strings+0x124/0x8d8 [ 35.290261] kunit_try_run_case+0x14c/0x3d0 [ 35.290845] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.291718] kthread+0x24c/0x2d0 [ 35.292304] ret_from_fork+0x10/0x20 [ 35.292937] [ 35.293254] The buggy address belongs to the object at fff00000c6643a80 [ 35.293254] which belongs to the cache kmalloc-32 of size 32 [ 35.295073] The buggy address is located 16 bytes inside of [ 35.295073] freed 32-byte region [fff00000c6643a80, fff00000c6643aa0) [ 35.296527] [ 35.297149] The buggy address belongs to the physical page: [ 35.297824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106643 [ 35.299462] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.300990] page_type: f5(slab) [ 35.302036] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 35.302835] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 35.303474] page dumped because: kasan: bad access detected [ 35.304338] [ 35.304694] Memory state around the buggy address: [ 35.305612] fff00000c6643980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.306745] fff00000c6643a00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 35.307953] >fff00000c6643a80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.308898] ^ [ 35.309386] fff00000c6643b00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 35.310416] fff00000c6643b80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.311724] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 35.200814] ================================================================== [ 35.204481] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 35.206689] Read of size 1 at addr fff00000c6643a90 by task kunit_try_catch/247 [ 35.207473] [ 35.207891] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 35.209390] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.210734] Hardware name: linux,dummy-virt (DT) [ 35.212030] Call trace: [ 35.212576] show_stack+0x20/0x38 (C) [ 35.213398] dump_stack_lvl+0x8c/0xd0 [ 35.214004] print_report+0x118/0x5e0 [ 35.215020] kasan_report+0xc8/0x118 [ 35.215758] __asan_report_load1_noabort+0x20/0x30 [ 35.216669] strcmp+0xc0/0xc8 [ 35.217186] kasan_strings+0x228/0x8d8 [ 35.217955] kunit_try_run_case+0x14c/0x3d0 [ 35.219040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.219796] kthread+0x24c/0x2d0 [ 35.220482] ret_from_fork+0x10/0x20 [ 35.221113] [ 35.221455] Allocated by task 247: [ 35.222144] kasan_save_stack+0x3c/0x68 [ 35.222970] kasan_save_track+0x20/0x40 [ 35.224053] kasan_save_alloc_info+0x40/0x58 [ 35.224580] __kasan_kmalloc+0xd4/0xd8 [ 35.226230] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.226849] kasan_strings+0xb0/0x8d8 [ 35.227345] kunit_try_run_case+0x14c/0x3d0 [ 35.228069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.228704] kthread+0x24c/0x2d0 [ 35.229281] ret_from_fork+0x10/0x20 [ 35.230532] [ 35.230978] Freed by task 247: [ 35.231509] kasan_save_stack+0x3c/0x68 [ 35.232117] kasan_save_track+0x20/0x40 [ 35.232731] kasan_save_free_info+0x4c/0x78 [ 35.233362] __kasan_slab_free+0x6c/0x98 [ 35.233896] kfree+0x114/0x3c8 [ 35.234474] kasan_strings+0x124/0x8d8 [ 35.235478] kunit_try_run_case+0x14c/0x3d0 [ 35.236189] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.236879] kthread+0x24c/0x2d0 [ 35.237456] ret_from_fork+0x10/0x20 [ 35.237930] [ 35.238666] The buggy address belongs to the object at fff00000c6643a80 [ 35.238666] which belongs to the cache kmalloc-32 of size 32 [ 35.240234] The buggy address is located 16 bytes inside of [ 35.240234] freed 32-byte region [fff00000c6643a80, fff00000c6643aa0) [ 35.241670] [ 35.241982] The buggy address belongs to the physical page: [ 35.243855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106643 [ 35.244700] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.245604] page_type: f5(slab) [ 35.246570] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 35.247502] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 35.248447] page dumped because: kasan: bad access detected [ 35.249164] [ 35.249470] Memory state around the buggy address: [ 35.250617] fff00000c6643980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.251477] fff00000c6643a00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 35.252427] >fff00000c6643a80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.253279] ^ [ 35.254021] fff00000c6643b00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 35.254859] fff00000c6643b80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.256084] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 35.139678] ================================================================== [ 35.140864] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 35.141748] Read of size 1 at addr fff00000c66439d8 by task kunit_try_catch/245 [ 35.142485] [ 35.143011] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 35.144428] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.145106] Hardware name: linux,dummy-virt (DT) [ 35.146557] Call trace: [ 35.147256] show_stack+0x20/0x38 (C) [ 35.148018] dump_stack_lvl+0x8c/0xd0 [ 35.148784] print_report+0x118/0x5e0 [ 35.149420] kasan_report+0xc8/0x118 [ 35.150038] __asan_report_load1_noabort+0x20/0x30 [ 35.150896] memcmp+0x198/0x1d8 [ 35.151433] kasan_memcmp+0x16c/0x300 [ 35.152462] kunit_try_run_case+0x14c/0x3d0 [ 35.153131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.153966] kthread+0x24c/0x2d0 [ 35.154565] ret_from_fork+0x10/0x20 [ 35.155216] [ 35.155529] Allocated by task 245: [ 35.156377] kasan_save_stack+0x3c/0x68 [ 35.157025] kasan_save_track+0x20/0x40 [ 35.157970] kasan_save_alloc_info+0x40/0x58 [ 35.158734] __kasan_kmalloc+0xd4/0xd8 [ 35.159308] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.160090] kasan_memcmp+0xbc/0x300 [ 35.160653] kunit_try_run_case+0x14c/0x3d0 [ 35.161295] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.162729] kthread+0x24c/0x2d0 [ 35.164220] ret_from_fork+0x10/0x20 [ 35.164921] [ 35.165248] The buggy address belongs to the object at fff00000c66439c0 [ 35.165248] which belongs to the cache kmalloc-32 of size 32 [ 35.167045] The buggy address is located 0 bytes to the right of [ 35.167045] allocated 24-byte region [fff00000c66439c0, fff00000c66439d8) [ 35.168151] [ 35.168587] The buggy address belongs to the physical page: [ 35.169281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106643 [ 35.170769] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.171686] page_type: f5(slab) [ 35.172184] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 35.173031] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 35.173948] page dumped because: kasan: bad access detected [ 35.175097] [ 35.175403] Memory state around the buggy address: [ 35.176338] fff00000c6643880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.177557] fff00000c6643900: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 35.179026] >fff00000c6643980: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 35.180079] ^ [ 35.181116] fff00000c6643a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.182258] fff00000c6643a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.183156] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 35.084109] ================================================================== [ 35.085426] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2e4/0x348 [ 35.086401] Read of size 1 at addr ffff800080bf7bea by task kunit_try_catch/241 [ 35.087115] [ 35.088288] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 35.089620] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.090449] Hardware name: linux,dummy-virt (DT) [ 35.091404] Call trace: [ 35.092062] show_stack+0x20/0x38 (C) [ 35.092858] dump_stack_lvl+0x8c/0xd0 [ 35.093416] print_report+0x2fc/0x5e0 [ 35.094471] kasan_report+0xc8/0x118 [ 35.095239] __asan_report_load1_noabort+0x20/0x30 [ 35.095652] kasan_alloca_oob_right+0x2e4/0x348 [ 35.095993] kunit_try_run_case+0x14c/0x3d0 [ 35.096317] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.096844] kthread+0x24c/0x2d0 [ 35.097820] ret_from_fork+0x10/0x20 [ 35.098408] [ 35.098765] The buggy address belongs to stack of task kunit_try_catch/241 [ 35.100271] [ 35.100554] The buggy address belongs to the virtual mapping at [ 35.100554] [ffff800080bf0000, ffff800080bf9000) created by: [ 35.100554] kernel_clone+0x140/0x788 [ 35.102337] [ 35.103033] The buggy address belongs to the physical page: [ 35.103730] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106709 [ 35.104933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.106472] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 35.107459] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 35.108266] page dumped because: kasan: bad access detected [ 35.109035] [ 35.109377] Memory state around the buggy address: [ 35.110493] ffff800080bf7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.111749] ffff800080bf7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.112582] >ffff800080bf7b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 35.113734] ^ [ 35.114844] ffff800080bf7c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 [ 35.115559] ffff800080bf7c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 [ 35.116535] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 35.037004] ================================================================== [ 35.038812] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 35.039826] Read of size 1 at addr ffff800080bf7bdf by task kunit_try_catch/239 [ 35.040445] [ 35.041423] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 35.042857] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.043471] Hardware name: linux,dummy-virt (DT) [ 35.044940] Call trace: [ 35.045541] show_stack+0x20/0x38 (C) [ 35.046822] dump_stack_lvl+0x8c/0xd0 [ 35.047577] print_report+0x2fc/0x5e0 [ 35.048205] kasan_report+0xc8/0x118 [ 35.048770] __asan_report_load1_noabort+0x20/0x30 [ 35.049461] kasan_alloca_oob_left+0x2b8/0x310 [ 35.050979] kunit_try_run_case+0x14c/0x3d0 [ 35.051528] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.052358] kthread+0x24c/0x2d0 [ 35.052925] ret_from_fork+0x10/0x20 [ 35.053501] [ 35.053862] The buggy address belongs to stack of task kunit_try_catch/239 [ 35.054781] [ 35.055134] The buggy address belongs to the virtual mapping at [ 35.055134] [ffff800080bf0000, ffff800080bf9000) created by: [ 35.055134] kernel_clone+0x140/0x788 [ 35.057604] [ 35.058347] The buggy address belongs to the physical page: [ 35.059041] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106709 [ 35.060270] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.061134] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 35.062443] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 35.064237] page dumped because: kasan: bad access detected [ 35.064845] [ 35.065061] Memory state around the buggy address: [ 35.065583] ffff800080bf7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.067430] ffff800080bf7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.068044] >ffff800080bf7b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 35.068862] ^ [ 35.069645] ffff800080bf7c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 [ 35.070988] ffff800080bf7c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 [ 35.071822] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 34.979162] ================================================================== [ 34.980706] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x230/0x268 [ 34.981683] Read of size 1 at addr ffff800080b97cba by task kunit_try_catch/237 [ 34.983353] [ 34.984304] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 34.986520] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.987642] Hardware name: linux,dummy-virt (DT) [ 34.988852] Call trace: [ 34.989257] show_stack+0x20/0x38 (C) [ 34.989888] dump_stack_lvl+0x8c/0xd0 [ 34.990404] print_report+0x2fc/0x5e0 [ 34.992032] kasan_report+0xc8/0x118 [ 34.992520] __asan_report_load1_noabort+0x20/0x30 [ 34.993191] kasan_stack_oob+0x230/0x268 [ 34.994146] kunit_try_run_case+0x14c/0x3d0 [ 34.994870] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.995963] kthread+0x24c/0x2d0 [ 34.996507] ret_from_fork+0x10/0x20 [ 34.997291] [ 34.998355] The buggy address belongs to stack of task kunit_try_catch/237 [ 34.999265] and is located at offset 138 in frame: [ 34.999592] kasan_stack_oob+0x0/0x268 [ 35.000464] [ 35.001021] This frame has 4 objects: [ 35.001827] [48, 49) '__assertion' [ 35.002364] [64, 72) 'array' [ 35.002966] [96, 112) '__assertion' [ 35.003544] [128, 138) 'stack_array' [ 35.004206] [ 35.004927] The buggy address belongs to the virtual mapping at [ 35.004927] [ffff800080b90000, ffff800080b99000) created by: [ 35.004927] kernel_clone+0x140/0x788 [ 35.007230] [ 35.008086] The buggy address belongs to the physical page: [ 35.008798] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106646 [ 35.010445] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.011648] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 35.012676] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 35.013788] page dumped because: kasan: bad access detected [ 35.015057] [ 35.015605] Memory state around the buggy address: [ 35.016396] ffff800080b97b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.017455] ffff800080b97c00: 00 00 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 [ 35.018781] >ffff800080b97c80: f2 f2 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 [ 35.020308] ^ [ 35.021007] ffff800080b97d00: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 [ 35.021761] ffff800080b97d80: f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 [ 35.023482] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 34.922591] ================================================================== [ 34.924006] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 34.924819] Read of size 1 at addr ffff9826426e302d by task kunit_try_catch/233 [ 34.925581] [ 34.926047] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 34.927462] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.928553] Hardware name: linux,dummy-virt (DT) [ 34.929206] Call trace: [ 34.929569] show_stack+0x20/0x38 (C) [ 34.930933] dump_stack_lvl+0x8c/0xd0 [ 34.932110] print_report+0x2fc/0x5e0 [ 34.932658] kasan_report+0xc8/0x118 [ 34.933273] __asan_report_load1_noabort+0x20/0x30 [ 34.934459] kasan_global_oob_right+0x230/0x270 [ 34.935140] kunit_try_run_case+0x14c/0x3d0 [ 34.935895] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.936561] kthread+0x24c/0x2d0 [ 34.938698] ret_from_fork+0x10/0x20 [ 34.939325] [ 34.939759] The buggy address belongs to the variable: [ 34.940364] global_array+0xd/0x40 [ 34.941178] [ 34.941547] The buggy address belongs to the virtual mapping at [ 34.941547] [ffff982640a20000, ffff9826427a1000) created by: [ 34.941547] paging_init+0x668/0x7c8 [ 34.943829] [ 34.944477] The buggy address belongs to the physical page: [ 34.945142] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x478e3 [ 34.947059] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 34.948069] raw: 03fffe0000002000 ffffc1ffc01e38c8 ffffc1ffc01e38c8 0000000000000000 [ 34.949165] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.950241] page dumped because: kasan: bad access detected [ 34.951127] [ 34.951496] Memory state around the buggy address: [ 34.952011] ffff9826426e2f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.953659] ffff9826426e2f80: 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9 f9 [ 34.954956] >ffff9826426e3000: f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 [ 34.955989] ^ [ 34.956559] ffff9826426e3080: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 [ 34.957376] ffff9826426e3100: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.959280] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 34.813255] ================================================================== [ 34.814924] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 34.815895] Free of addr fff00000c667b301 by task kunit_try_catch/229 [ 34.816965] [ 34.817359] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 34.818848] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.820006] Hardware name: linux,dummy-virt (DT) [ 34.820680] Call trace: [ 34.821125] show_stack+0x20/0x38 (C) [ 34.821890] dump_stack_lvl+0x8c/0xd0 [ 34.822611] print_report+0x118/0x5e0 [ 34.823251] kasan_report_invalid_free+0xb0/0xd8 [ 34.824253] check_slab_allocation+0xfc/0x108 [ 34.825345] __kasan_mempool_poison_object+0x78/0x150 [ 34.826584] mempool_free+0x28c/0x328 [ 34.827388] mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 34.828230] mempool_kmalloc_invalid_free+0xb8/0x110 [ 34.828938] kunit_try_run_case+0x14c/0x3d0 [ 34.829539] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.830715] kthread+0x24c/0x2d0 [ 34.831023] ret_from_fork+0x10/0x20 [ 34.831315] [ 34.831482] Allocated by task 229: [ 34.831829] kasan_save_stack+0x3c/0x68 [ 34.832455] kasan_save_track+0x20/0x40 [ 34.833394] kasan_save_alloc_info+0x40/0x58 [ 34.834015] __kasan_mempool_unpoison_object+0x11c/0x180 [ 34.835135] remove_element+0x130/0x1f8 [ 34.836007] mempool_alloc_preallocated+0x58/0xc0 [ 34.836688] mempool_kmalloc_invalid_free_helper+0x94/0x2a0 [ 34.837556] mempool_kmalloc_invalid_free+0xb8/0x110 [ 34.838579] kunit_try_run_case+0x14c/0x3d0 [ 34.839113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.840291] kthread+0x24c/0x2d0 [ 34.840945] ret_from_fork+0x10/0x20 [ 34.841584] [ 34.842106] The buggy address belongs to the object at fff00000c667b300 [ 34.842106] which belongs to the cache kmalloc-128 of size 128 [ 34.844050] The buggy address is located 1 bytes inside of [ 34.844050] 128-byte region [fff00000c667b300, fff00000c667b380) [ 34.845985] [ 34.846700] The buggy address belongs to the physical page: [ 34.847452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10667b [ 34.848500] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.849425] page_type: f5(slab) [ 34.850507] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.851726] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.852848] page dumped because: kasan: bad access detected [ 34.853554] [ 34.854260] Memory state around the buggy address: [ 34.854596] fff00000c667b200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.855529] fff00000c667b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.856379] >fff00000c667b300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.857422] ^ [ 34.857923] fff00000c667b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.859674] fff00000c667b400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.861098] ================================================================== [ 34.873224] ================================================================== [ 34.874746] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 34.875510] Free of addr fff00000c6848001 by task kunit_try_catch/231 [ 34.876555] [ 34.877027] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 34.879216] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.880020] Hardware name: linux,dummy-virt (DT) [ 34.880907] Call trace: [ 34.881270] show_stack+0x20/0x38 (C) [ 34.881901] dump_stack_lvl+0x8c/0xd0 [ 34.882551] print_report+0x118/0x5e0 [ 34.883791] kasan_report_invalid_free+0xb0/0xd8 [ 34.884345] __kasan_mempool_poison_object+0xfc/0x150 [ 34.885451] mempool_free+0x28c/0x328 [ 34.887269] mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 34.888144] mempool_kmalloc_large_invalid_free+0xb8/0x110 [ 34.889186] kunit_try_run_case+0x14c/0x3d0 [ 34.889894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.890826] kthread+0x24c/0x2d0 [ 34.891349] ret_from_fork+0x10/0x20 [ 34.892776] [ 34.893056] The buggy address belongs to the physical page: [ 34.894237] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106848 [ 34.895306] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.896386] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.897309] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.898536] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.900278] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.901192] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.902294] head: 0bfffe0000000002 ffffc1ffc31a1201 ffffffffffffffff 0000000000000000 [ 34.903237] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 34.904373] page dumped because: kasan: bad access detected [ 34.905004] [ 34.905378] Memory state around the buggy address: [ 34.906474] fff00000c6847f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.907122] fff00000c6847f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.907812] >fff00000c6848000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.908646] ^ [ 34.909080] fff00000c6848080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.910514] fff00000c6848100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.911439] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 34.721134] ================================================================== [ 34.722992] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 34.724413] Free of addr fff00000c6854000 by task kunit_try_catch/225 [ 34.725275] [ 34.725650] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 34.727091] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.727611] Hardware name: linux,dummy-virt (DT) [ 34.728171] Call trace: [ 34.728682] show_stack+0x20/0x38 (C) [ 34.729307] dump_stack_lvl+0x8c/0xd0 [ 34.730299] print_report+0x118/0x5e0 [ 34.730847] kasan_report_invalid_free+0xb0/0xd8 [ 34.731593] __kasan_mempool_poison_object+0x14c/0x150 [ 34.732440] mempool_free+0x28c/0x328 [ 34.733039] mempool_double_free_helper+0x150/0x2e0 [ 34.733688] mempool_kmalloc_large_double_free+0xb8/0x110 [ 34.734564] kunit_try_run_case+0x14c/0x3d0 [ 34.735442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.736243] kthread+0x24c/0x2d0 [ 34.737148] ret_from_fork+0x10/0x20 [ 34.737680] [ 34.738059] The buggy address belongs to the physical page: [ 34.739406] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106854 [ 34.740377] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.741316] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.742593] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.743449] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.744449] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.745999] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.746749] head: 0bfffe0000000002 ffffc1ffc31a1501 ffffffffffffffff 0000000000000000 [ 34.747801] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 34.748490] page dumped because: kasan: bad access detected [ 34.749248] [ 34.749554] Memory state around the buggy address: [ 34.750738] fff00000c6853f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.751697] fff00000c6853f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.752539] >fff00000c6854000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.753369] ^ [ 34.753862] fff00000c6854080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.755107] fff00000c6854100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.756080] ================================================================== [ 34.767314] ================================================================== [ 34.768679] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 34.769500] Free of addr fff00000c6848000 by task kunit_try_catch/227 [ 34.771768] [ 34.772473] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 34.774864] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.775439] Hardware name: linux,dummy-virt (DT) [ 34.776089] Call trace: [ 34.776550] show_stack+0x20/0x38 (C) [ 34.777286] dump_stack_lvl+0x8c/0xd0 [ 34.778305] print_report+0x118/0x5e0 [ 34.779281] kasan_report_invalid_free+0xb0/0xd8 [ 34.780066] __kasan_mempool_poison_pages+0xe0/0xe8 [ 34.780864] mempool_free+0x24c/0x328 [ 34.781549] mempool_double_free_helper+0x150/0x2e0 [ 34.782536] mempool_page_alloc_double_free+0xb4/0x110 [ 34.783300] kunit_try_run_case+0x14c/0x3d0 [ 34.783991] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.784849] kthread+0x24c/0x2d0 [ 34.785499] ret_from_fork+0x10/0x20 [ 34.786430] [ 34.787310] The buggy address belongs to the physical page: [ 34.788197] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106848 [ 34.789364] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.790285] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 34.791853] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.792950] page dumped because: kasan: bad access detected [ 34.793915] [ 34.794385] Memory state around the buggy address: [ 34.795654] fff00000c6847f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.796602] fff00000c6847f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.797742] >fff00000c6848000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.798502] ^ [ 34.799732] fff00000c6848080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.800620] fff00000c6848100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.801452] ================================================================== [ 34.653065] ================================================================== [ 34.654270] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 34.655268] Free of addr fff00000c66a6d00 by task kunit_try_catch/223 [ 34.656026] [ 34.656414] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 34.659145] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.659693] Hardware name: linux,dummy-virt (DT) [ 34.660375] Call trace: [ 34.660750] show_stack+0x20/0x38 (C) [ 34.661427] dump_stack_lvl+0x8c/0xd0 [ 34.662036] print_report+0x118/0x5e0 [ 34.662527] kasan_report_invalid_free+0xb0/0xd8 [ 34.663582] check_slab_allocation+0xd4/0x108 [ 34.664224] __kasan_mempool_poison_object+0x78/0x150 [ 34.665064] mempool_free+0x28c/0x328 [ 34.666268] mempool_double_free_helper+0x150/0x2e0 [ 34.666956] mempool_kmalloc_double_free+0xb8/0x110 [ 34.667500] kunit_try_run_case+0x14c/0x3d0 [ 34.668372] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.669144] kthread+0x24c/0x2d0 [ 34.669680] ret_from_fork+0x10/0x20 [ 34.671008] [ 34.671361] Allocated by task 223: [ 34.671883] kasan_save_stack+0x3c/0x68 [ 34.672455] kasan_save_track+0x20/0x40 [ 34.673026] kasan_save_alloc_info+0x40/0x58 [ 34.673700] __kasan_mempool_unpoison_object+0x11c/0x180 [ 34.674961] remove_element+0x130/0x1f8 [ 34.675464] mempool_alloc_preallocated+0x58/0xc0 [ 34.676270] mempool_double_free_helper+0x94/0x2e0 [ 34.676900] mempool_kmalloc_double_free+0xb8/0x110 [ 34.677706] kunit_try_run_case+0x14c/0x3d0 [ 34.678971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.679724] kthread+0x24c/0x2d0 [ 34.680464] ret_from_fork+0x10/0x20 [ 34.681198] [ 34.681533] Freed by task 223: [ 34.682241] kasan_save_stack+0x3c/0x68 [ 34.683192] kasan_save_track+0x20/0x40 [ 34.683545] kasan_save_free_info+0x4c/0x78 [ 34.683912] __kasan_mempool_poison_object+0xc0/0x150 [ 34.684548] mempool_free+0x28c/0x328 [ 34.685544] mempool_double_free_helper+0x100/0x2e0 [ 34.686826] mempool_kmalloc_double_free+0xb8/0x110 [ 34.687651] kunit_try_run_case+0x14c/0x3d0 [ 34.688303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.689013] kthread+0x24c/0x2d0 [ 34.689600] ret_from_fork+0x10/0x20 [ 34.690238] [ 34.690704] The buggy address belongs to the object at fff00000c66a6d00 [ 34.690704] which belongs to the cache kmalloc-128 of size 128 [ 34.692767] The buggy address is located 0 bytes inside of [ 34.692767] 128-byte region [fff00000c66a6d00, fff00000c66a6d80) [ 34.694360] [ 34.695098] The buggy address belongs to the physical page: [ 34.695814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066a6 [ 34.696958] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.698047] page_type: f5(slab) [ 34.698755] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.699895] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.700887] page dumped because: kasan: bad access detected [ 34.702153] [ 34.702764] Memory state around the buggy address: [ 34.703421] fff00000c66a6c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.704376] fff00000c66a6c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.705362] >fff00000c66a6d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.706370] ^ [ 34.707319] fff00000c66a6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.708218] fff00000c66a6e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.709202] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 34.608812] ================================================================== [ 34.610767] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 34.611854] Read of size 1 at addr fff00000c6844000 by task kunit_try_catch/221 [ 34.613384] [ 34.614365] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 34.615783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.616563] Hardware name: linux,dummy-virt (DT) [ 34.617219] Call trace: [ 34.617570] show_stack+0x20/0x38 (C) [ 34.618323] dump_stack_lvl+0x8c/0xd0 [ 34.619004] print_report+0x118/0x5e0 [ 34.619540] kasan_report+0xc8/0x118 [ 34.620564] __asan_report_load1_noabort+0x20/0x30 [ 34.621273] mempool_uaf_helper+0x314/0x340 [ 34.621855] mempool_page_alloc_uaf+0xb8/0x118 [ 34.622552] kunit_try_run_case+0x14c/0x3d0 [ 34.623655] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.624316] kthread+0x24c/0x2d0 [ 34.624946] ret_from_fork+0x10/0x20 [ 34.625529] [ 34.626471] The buggy address belongs to the physical page: [ 34.627159] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106844 [ 34.628241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.629371] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 34.630966] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.631841] page dumped because: kasan: bad access detected [ 34.632492] [ 34.632885] Memory state around the buggy address: [ 34.633484] fff00000c6843f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.634718] fff00000c6843f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.635582] >fff00000c6844000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.636495] ^ [ 34.637487] fff00000c6844080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.638820] fff00000c6844100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.640137] ================================================================== [ 34.484870] ================================================================== [ 34.486104] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 34.487028] Read of size 1 at addr fff00000c6844000 by task kunit_try_catch/217 [ 34.487908] [ 34.488307] CPU: 0 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 34.489711] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.490601] Hardware name: linux,dummy-virt (DT) [ 34.491147] Call trace: [ 34.491754] show_stack+0x20/0x38 (C) [ 34.492538] dump_stack_lvl+0x8c/0xd0 [ 34.493388] print_report+0x118/0x5e0 [ 34.494241] kasan_report+0xc8/0x118 [ 34.494793] __asan_report_load1_noabort+0x20/0x30 [ 34.495488] mempool_uaf_helper+0x314/0x340 [ 34.496454] mempool_kmalloc_large_uaf+0xbc/0x118 [ 34.497127] kunit_try_run_case+0x14c/0x3d0 [ 34.498694] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.499476] kthread+0x24c/0x2d0 [ 34.500000] ret_from_fork+0x10/0x20 [ 34.500690] [ 34.501066] The buggy address belongs to the physical page: [ 34.501833] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106844 [ 34.503205] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.504127] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.505294] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.506465] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.507880] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.508812] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.509821] head: 0bfffe0000000002 ffffc1ffc31a1101 ffffffffffffffff 0000000000000000 [ 34.511406] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 34.512289] page dumped because: kasan: bad access detected [ 34.513025] [ 34.513333] Memory state around the buggy address: [ 34.514209] fff00000c6843f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.515512] fff00000c6843f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.516480] >fff00000c6844000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.517395] ^ [ 34.518520] fff00000c6844080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.519471] fff00000c6844100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.520414] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 34.423764] ================================================================== [ 34.424977] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 34.425703] Read of size 1 at addr fff00000c66e1900 by task kunit_try_catch/215 [ 34.426843] [ 34.427958] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 34.429289] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.430566] Hardware name: linux,dummy-virt (DT) [ 34.431179] Call trace: [ 34.431713] show_stack+0x20/0x38 (C) [ 34.432388] dump_stack_lvl+0x8c/0xd0 [ 34.433007] print_report+0x118/0x5e0 [ 34.433606] kasan_report+0xc8/0x118 [ 34.434165] __asan_report_load1_noabort+0x20/0x30 [ 34.434976] mempool_uaf_helper+0x314/0x340 [ 34.435605] mempool_kmalloc_uaf+0xbc/0x118 [ 34.436237] kunit_try_run_case+0x14c/0x3d0 [ 34.436798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.437602] kthread+0x24c/0x2d0 [ 34.438225] ret_from_fork+0x10/0x20 [ 34.438773] [ 34.439243] Allocated by task 215: [ 34.439690] kasan_save_stack+0x3c/0x68 [ 34.440354] kasan_save_track+0x20/0x40 [ 34.440925] kasan_save_alloc_info+0x40/0x58 [ 34.441526] __kasan_mempool_unpoison_object+0x11c/0x180 [ 34.442155] remove_element+0x130/0x1f8 [ 34.442846] mempool_alloc_preallocated+0x58/0xc0 [ 34.443567] mempool_uaf_helper+0xa4/0x340 [ 34.444229] mempool_kmalloc_uaf+0xbc/0x118 [ 34.444761] kunit_try_run_case+0x14c/0x3d0 [ 34.445485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.446143] kthread+0x24c/0x2d0 [ 34.446840] ret_from_fork+0x10/0x20 [ 34.447429] [ 34.447871] Freed by task 215: [ 34.448358] kasan_save_stack+0x3c/0x68 [ 34.449086] kasan_save_track+0x20/0x40 [ 34.449612] kasan_save_free_info+0x4c/0x78 [ 34.450184] __kasan_mempool_poison_object+0xc0/0x150 [ 34.451113] mempool_free+0x28c/0x328 [ 34.451719] mempool_uaf_helper+0x104/0x340 [ 34.452406] mempool_kmalloc_uaf+0xbc/0x118 [ 34.453001] kunit_try_run_case+0x14c/0x3d0 [ 34.453597] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.454402] kthread+0x24c/0x2d0 [ 34.455016] ret_from_fork+0x10/0x20 [ 34.455558] [ 34.455922] The buggy address belongs to the object at fff00000c66e1900 [ 34.455922] which belongs to the cache kmalloc-128 of size 128 [ 34.457405] The buggy address is located 0 bytes inside of [ 34.457405] freed 128-byte region [fff00000c66e1900, fff00000c66e1980) [ 34.458804] [ 34.459125] The buggy address belongs to the physical page: [ 34.459892] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e1 [ 34.460979] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.461757] page_type: f5(slab) [ 34.462348] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.463391] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.464309] page dumped because: kasan: bad access detected [ 34.464949] [ 34.465317] Memory state around the buggy address: [ 34.465939] fff00000c66e1800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.466946] fff00000c66e1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.467845] >fff00000c66e1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.468778] ^ [ 34.469229] fff00000c66e1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.470119] fff00000c66e1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.471063] ================================================================== [ 34.533199] ================================================================== [ 34.534885] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 34.535836] Read of size 1 at addr fff00000c6643240 by task kunit_try_catch/219 [ 34.537503] [ 34.538048] CPU: 0 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 34.539615] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.540045] Hardware name: linux,dummy-virt (DT) [ 34.540831] Call trace: [ 34.541518] show_stack+0x20/0x38 (C) [ 34.542662] dump_stack_lvl+0x8c/0xd0 [ 34.543256] print_report+0x118/0x5e0 [ 34.543852] kasan_report+0xc8/0x118 [ 34.544430] __asan_report_load1_noabort+0x20/0x30 [ 34.545151] mempool_uaf_helper+0x314/0x340 [ 34.545843] mempool_slab_uaf+0xb8/0x110 [ 34.546341] kunit_try_run_case+0x14c/0x3d0 [ 34.547708] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.548382] kthread+0x24c/0x2d0 [ 34.549103] ret_from_fork+0x10/0x20 [ 34.550460] [ 34.550783] Allocated by task 219: [ 34.551284] kasan_save_stack+0x3c/0x68 [ 34.551811] kasan_save_track+0x20/0x40 [ 34.552513] kasan_save_alloc_info+0x40/0x58 [ 34.553297] __kasan_mempool_unpoison_object+0xbc/0x180 [ 34.554014] remove_element+0x16c/0x1f8 [ 34.554569] mempool_alloc_preallocated+0x58/0xc0 [ 34.555288] mempool_uaf_helper+0xa4/0x340 [ 34.555985] mempool_slab_uaf+0xb8/0x110 [ 34.556575] kunit_try_run_case+0x14c/0x3d0 [ 34.558263] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.559014] kthread+0x24c/0x2d0 [ 34.559541] ret_from_fork+0x10/0x20 [ 34.560363] [ 34.560691] Freed by task 219: [ 34.561116] kasan_save_stack+0x3c/0x68 [ 34.562744] kasan_save_track+0x20/0x40 [ 34.563363] kasan_save_free_info+0x4c/0x78 [ 34.563925] __kasan_mempool_poison_object+0xc0/0x150 [ 34.564611] mempool_free+0x28c/0x328 [ 34.565287] mempool_uaf_helper+0x104/0x340 [ 34.566013] mempool_slab_uaf+0xb8/0x110 [ 34.566714] kunit_try_run_case+0x14c/0x3d0 [ 34.567339] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.568009] kthread+0x24c/0x2d0 [ 34.569015] ret_from_fork+0x10/0x20 [ 34.569584] [ 34.569942] The buggy address belongs to the object at fff00000c6643240 [ 34.569942] which belongs to the cache test_cache of size 123 [ 34.571946] The buggy address is located 0 bytes inside of [ 34.571946] freed 123-byte region [fff00000c6643240, fff00000c66432bb) [ 34.573287] [ 34.573669] The buggy address belongs to the physical page: [ 34.574914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106643 [ 34.576060] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.577037] page_type: f5(slab) [ 34.577499] raw: 0bfffe0000000000 fff00000c6651140 dead000000000122 0000000000000000 [ 34.578763] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 34.579425] page dumped because: kasan: bad access detected [ 34.580246] [ 34.580546] Memory state around the buggy address: [ 34.581371] fff00000c6643100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.582260] fff00000c6643180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.583673] >fff00000c6643200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 34.584497] ^ [ 34.585245] fff00000c6643280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.586359] fff00000c6643300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.587253] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 34.349559] ================================================================== [ 34.351261] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 34.351953] Read of size 1 at addr fff00000c664e2bb by task kunit_try_catch/213 [ 34.352571] [ 34.353111] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 34.354863] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.355651] Hardware name: linux,dummy-virt (DT) [ 34.356503] Call trace: [ 34.358137] show_stack+0x20/0x38 (C) [ 34.359675] dump_stack_lvl+0x8c/0xd0 [ 34.360694] print_report+0x118/0x5e0 [ 34.362032] kasan_report+0xc8/0x118 [ 34.363066] __asan_report_load1_noabort+0x20/0x30 [ 34.364116] mempool_oob_right_helper+0x2ac/0x2f0 [ 34.364869] mempool_slab_oob_right+0xb8/0x110 [ 34.365486] kunit_try_run_case+0x14c/0x3d0 [ 34.366529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.367528] kthread+0x24c/0x2d0 [ 34.368503] ret_from_fork+0x10/0x20 [ 34.369156] [ 34.369547] Allocated by task 213: [ 34.370236] kasan_save_stack+0x3c/0x68 [ 34.371160] kasan_save_track+0x20/0x40 [ 34.371573] kasan_save_alloc_info+0x40/0x58 [ 34.372538] __kasan_mempool_unpoison_object+0xbc/0x180 [ 34.373646] remove_element+0x16c/0x1f8 [ 34.375038] mempool_alloc_preallocated+0x58/0xc0 [ 34.376272] mempool_oob_right_helper+0x98/0x2f0 [ 34.377056] mempool_slab_oob_right+0xb8/0x110 [ 34.377663] kunit_try_run_case+0x14c/0x3d0 [ 34.378978] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.379854] kthread+0x24c/0x2d0 [ 34.380753] ret_from_fork+0x10/0x20 [ 34.381280] [ 34.381570] The buggy address belongs to the object at fff00000c664e240 [ 34.381570] which belongs to the cache test_cache of size 123 [ 34.383490] The buggy address is located 0 bytes to the right of [ 34.383490] allocated 123-byte region [fff00000c664e240, fff00000c664e2bb) [ 34.385127] [ 34.385457] The buggy address belongs to the physical page: [ 34.387258] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664e [ 34.388210] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.388956] page_type: f5(slab) [ 34.389477] raw: 0bfffe0000000000 fff00000c6651000 dead000000000122 0000000000000000 [ 34.391191] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 34.392257] page dumped because: kasan: bad access detected [ 34.392603] [ 34.392888] Memory state around the buggy address: [ 34.393481] fff00000c664e180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.395826] fff00000c664e200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 34.396469] >fff00000c664e280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 34.397096] ^ [ 34.397596] fff00000c664e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.398714] fff00000c664e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.400377] ================================================================== [ 34.249312] ================================================================== [ 34.250669] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 34.251395] Read of size 1 at addr fff00000c66e1373 by task kunit_try_catch/209 [ 34.252514] [ 34.252873] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 34.253984] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.254648] Hardware name: linux,dummy-virt (DT) [ 34.255262] Call trace: [ 34.255765] show_stack+0x20/0x38 (C) [ 34.256380] dump_stack_lvl+0x8c/0xd0 [ 34.256903] print_report+0x118/0x5e0 [ 34.257548] kasan_report+0xc8/0x118 [ 34.258119] __asan_report_load1_noabort+0x20/0x30 [ 34.258923] mempool_oob_right_helper+0x2ac/0x2f0 [ 34.259730] mempool_kmalloc_oob_right+0xbc/0x118 [ 34.260346] kunit_try_run_case+0x14c/0x3d0 [ 34.261053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.261809] kthread+0x24c/0x2d0 [ 34.262363] ret_from_fork+0x10/0x20 [ 34.263068] [ 34.263374] Allocated by task 209: [ 34.263918] kasan_save_stack+0x3c/0x68 [ 34.264601] kasan_save_track+0x20/0x40 [ 34.265117] kasan_save_alloc_info+0x40/0x58 [ 34.265758] __kasan_mempool_unpoison_object+0x11c/0x180 [ 34.266222] remove_element+0x130/0x1f8 [ 34.266595] mempool_alloc_preallocated+0x58/0xc0 [ 34.267062] mempool_oob_right_helper+0x98/0x2f0 [ 34.267476] mempool_kmalloc_oob_right+0xbc/0x118 [ 34.267989] kunit_try_run_case+0x14c/0x3d0 [ 34.268462] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.269437] kthread+0x24c/0x2d0 [ 34.270046] ret_from_fork+0x10/0x20 [ 34.270644] [ 34.270984] The buggy address belongs to the object at fff00000c66e1300 [ 34.270984] which belongs to the cache kmalloc-128 of size 128 [ 34.272257] The buggy address is located 0 bytes to the right of [ 34.272257] allocated 115-byte region [fff00000c66e1300, fff00000c66e1373) [ 34.273912] [ 34.274263] The buggy address belongs to the physical page: [ 34.274883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e1 [ 34.275954] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.276672] page_type: f5(slab) [ 34.277239] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.278347] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.279126] page dumped because: kasan: bad access detected [ 34.279959] [ 34.280297] Memory state around the buggy address: [ 34.281036] fff00000c66e1200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.281947] fff00000c66e1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.282770] >fff00000c66e1300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 34.283736] ^ [ 34.284395] fff00000c66e1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.285335] fff00000c66e1400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 34.286258] ================================================================== [ 34.299973] ================================================================== [ 34.301215] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 34.302399] Read of size 1 at addr fff00000c6856001 by task kunit_try_catch/211 [ 34.303357] [ 34.303720] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 34.305719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.306614] Hardware name: linux,dummy-virt (DT) [ 34.307298] Call trace: [ 34.307719] show_stack+0x20/0x38 (C) [ 34.308524] dump_stack_lvl+0x8c/0xd0 [ 34.309224] print_report+0x118/0x5e0 [ 34.310167] kasan_report+0xc8/0x118 [ 34.310733] __asan_report_load1_noabort+0x20/0x30 [ 34.311604] mempool_oob_right_helper+0x2ac/0x2f0 [ 34.312348] mempool_kmalloc_large_oob_right+0xbc/0x118 [ 34.313386] kunit_try_run_case+0x14c/0x3d0 [ 34.314794] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.315549] kthread+0x24c/0x2d0 [ 34.316211] ret_from_fork+0x10/0x20 [ 34.316898] [ 34.317258] The buggy address belongs to the physical page: [ 34.318344] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106854 [ 34.319470] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.320379] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.321512] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.322517] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.324260] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.325918] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.326996] head: 0bfffe0000000002 ffffc1ffc31a1501 ffffffffffffffff 0000000000000000 [ 34.328034] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 34.328917] page dumped because: kasan: bad access detected [ 34.329567] [ 34.329920] Memory state around the buggy address: [ 34.330658] fff00000c6855f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.331416] fff00000c6855f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.332395] >fff00000c6856000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.333286] ^ [ 34.333959] fff00000c6856080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.334802] fff00000c6856100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.335740] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 33.612096] ================================================================== [ 33.613577] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x17c/0x2f8 [ 33.615014] Read of size 1 at addr fff00000c5699dc0 by task kunit_try_catch/203 [ 33.616068] [ 33.616355] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 33.618656] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.619162] Hardware name: linux,dummy-virt (DT) [ 33.619611] Call trace: [ 33.620132] show_stack+0x20/0x38 (C) [ 33.620666] dump_stack_lvl+0x8c/0xd0 [ 33.621479] print_report+0x118/0x5e0 [ 33.623023] kasan_report+0xc8/0x118 [ 33.623945] __kasan_check_byte+0x54/0x70 [ 33.624725] kmem_cache_destroy+0x34/0x218 [ 33.625399] kmem_cache_double_destroy+0x17c/0x2f8 [ 33.626382] kunit_try_run_case+0x14c/0x3d0 [ 33.627045] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.627963] kthread+0x24c/0x2d0 [ 33.628611] ret_from_fork+0x10/0x20 [ 33.629193] [ 33.629497] Allocated by task 203: [ 33.630208] kasan_save_stack+0x3c/0x68 [ 33.630926] kasan_save_track+0x20/0x40 [ 33.632076] kasan_save_alloc_info+0x40/0x58 [ 33.632690] __kasan_slab_alloc+0xa8/0xb0 [ 33.633303] kmem_cache_alloc_noprof+0x108/0x398 [ 33.634386] __kmem_cache_create_args+0x18c/0x2b0 [ 33.635215] kmem_cache_double_destroy+0xc8/0x2f8 [ 33.636028] kunit_try_run_case+0x14c/0x3d0 [ 33.637219] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.638509] kthread+0x24c/0x2d0 [ 33.638981] ret_from_fork+0x10/0x20 [ 33.639727] [ 33.640194] Freed by task 203: [ 33.640820] kasan_save_stack+0x3c/0x68 [ 33.641589] kasan_save_track+0x20/0x40 [ 33.642469] kasan_save_free_info+0x4c/0x78 [ 33.642958] __kasan_slab_free+0x6c/0x98 [ 33.643415] kmem_cache_free+0x118/0x470 [ 33.644194] slab_kmem_cache_release+0x38/0x50 [ 33.644852] kmem_cache_release+0x1c/0x30 [ 33.645316] kobject_put+0x17c/0x430 [ 33.645786] sysfs_slab_release+0x1c/0x30 [ 33.646575] kmem_cache_destroy+0x118/0x218 [ 33.648139] kmem_cache_double_destroy+0x130/0x2f8 [ 33.649025] kunit_try_run_case+0x14c/0x3d0 [ 33.650172] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.651410] kthread+0x24c/0x2d0 [ 33.651884] ret_from_fork+0x10/0x20 [ 33.652440] [ 33.652700] The buggy address belongs to the object at fff00000c5699dc0 [ 33.652700] which belongs to the cache kmem_cache of size 208 [ 33.655058] The buggy address is located 0 bytes inside of [ 33.655058] freed 208-byte region [fff00000c5699dc0, fff00000c5699e90) [ 33.656442] [ 33.656770] The buggy address belongs to the physical page: [ 33.657558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105699 [ 33.659389] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.660327] page_type: f5(slab) [ 33.661184] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 33.662379] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 33.663876] page dumped because: kasan: bad access detected [ 33.664592] [ 33.665227] Memory state around the buggy address: [ 33.666360] fff00000c5699c80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.667316] fff00000c5699d00: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 33.668739] >fff00000c5699d80: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 33.669587] ^ [ 33.671066] fff00000c5699e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.672110] fff00000c5699e80: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.673174] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 33.499241] ================================================================== [ 33.500912] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x390/0x468 [ 33.501754] Read of size 1 at addr fff00000c66a3000 by task kunit_try_catch/201 [ 33.502932] [ 33.503821] CPU: 1 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 33.505447] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.506444] Hardware name: linux,dummy-virt (DT) [ 33.507394] Call trace: [ 33.507821] show_stack+0x20/0x38 (C) [ 33.508397] dump_stack_lvl+0x8c/0xd0 [ 33.509010] print_report+0x118/0x5e0 [ 33.509534] kasan_report+0xc8/0x118 [ 33.510864] __asan_report_load1_noabort+0x20/0x30 [ 33.511914] kmem_cache_rcu_uaf+0x390/0x468 [ 33.512344] kunit_try_run_case+0x14c/0x3d0 [ 33.513102] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.514130] kthread+0x24c/0x2d0 [ 33.515058] ret_from_fork+0x10/0x20 [ 33.515781] [ 33.516117] Allocated by task 201: [ 33.516823] kasan_save_stack+0x3c/0x68 [ 33.517500] kasan_save_track+0x20/0x40 [ 33.518110] kasan_save_alloc_info+0x40/0x58 [ 33.519083] __kasan_slab_alloc+0xa8/0xb0 [ 33.520091] kmem_cache_alloc_noprof+0x108/0x398 [ 33.520589] kmem_cache_rcu_uaf+0x12c/0x468 [ 33.521041] kunit_try_run_case+0x14c/0x3d0 [ 33.522607] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.523658] kthread+0x24c/0x2d0 [ 33.524411] ret_from_fork+0x10/0x20 [ 33.525149] [ 33.525725] Freed by task 0: [ 33.526514] kasan_save_stack+0x3c/0x68 [ 33.528038] kasan_save_track+0x20/0x40 [ 33.528783] kasan_save_free_info+0x4c/0x78 [ 33.529251] __kasan_slab_free+0x6c/0x98 [ 33.529558] slab_free_after_rcu_debug+0xd4/0x2f8 [ 33.530259] rcu_core+0x9f4/0x1e20 [ 33.531070] rcu_core_si+0x18/0x30 [ 33.532602] handle_softirqs+0x374/0xb20 [ 33.533319] __do_softirq+0x1c/0x28 [ 33.534328] [ 33.534599] Last potentially related work creation: [ 33.535095] kasan_save_stack+0x3c/0x68 [ 33.535667] kasan_record_aux_stack+0xb4/0xc8 [ 33.536500] kmem_cache_free+0x28c/0x470 [ 33.537059] kmem_cache_rcu_uaf+0x16c/0x468 [ 33.537676] kunit_try_run_case+0x14c/0x3d0 [ 33.538884] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.539673] kthread+0x24c/0x2d0 [ 33.540258] ret_from_fork+0x10/0x20 [ 33.540813] [ 33.541087] The buggy address belongs to the object at fff00000c66a3000 [ 33.541087] which belongs to the cache test_cache of size 200 [ 33.543011] The buggy address is located 0 bytes inside of [ 33.543011] freed 200-byte region [fff00000c66a3000, fff00000c66a30c8) [ 33.544579] [ 33.544869] The buggy address belongs to the physical page: [ 33.546034] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066a3 [ 33.546938] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.548356] page_type: f5(slab) [ 33.548977] raw: 0bfffe0000000000 fff00000c105cb40 dead000000000122 0000000000000000 [ 33.550333] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 33.551175] page dumped because: kasan: bad access detected [ 33.552028] [ 33.552407] Memory state around the buggy address: [ 33.553049] fff00000c66a2f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.554835] fff00000c66a2f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.556145] >fff00000c66a3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.557204] ^ [ 33.557806] fff00000c66a3080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 33.559399] fff00000c66a3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.560469] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 33.389694] ================================================================== [ 33.391375] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3b8 [ 33.392352] Free of addr fff00000c66ad001 by task kunit_try_catch/199 [ 33.393038] [ 33.393470] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 33.395170] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.395782] Hardware name: linux,dummy-virt (DT) [ 33.396345] Call trace: [ 33.396794] show_stack+0x20/0x38 (C) [ 33.397522] dump_stack_lvl+0x8c/0xd0 [ 33.398476] print_report+0x118/0x5e0 [ 33.399094] kasan_report_invalid_free+0xb0/0xd8 [ 33.399736] check_slab_allocation+0xfc/0x108 [ 33.400480] __kasan_slab_pre_free+0x2c/0x48 [ 33.401015] kmem_cache_free+0xf0/0x470 [ 33.401778] kmem_cache_invalid_free+0x184/0x3b8 [ 33.402462] kunit_try_run_case+0x14c/0x3d0 [ 33.403150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.403852] kthread+0x24c/0x2d0 [ 33.404499] ret_from_fork+0x10/0x20 [ 33.405292] [ 33.405613] Allocated by task 199: [ 33.407076] kasan_save_stack+0x3c/0x68 [ 33.407383] kasan_save_track+0x20/0x40 [ 33.407711] kasan_save_alloc_info+0x40/0x58 [ 33.408538] __kasan_slab_alloc+0xa8/0xb0 [ 33.409255] kmem_cache_alloc_noprof+0x108/0x398 [ 33.409906] kmem_cache_invalid_free+0x12c/0x3b8 [ 33.411174] kunit_try_run_case+0x14c/0x3d0 [ 33.411600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.412463] kthread+0x24c/0x2d0 [ 33.413246] ret_from_fork+0x10/0x20 [ 33.414075] [ 33.414697] The buggy address belongs to the object at fff00000c66ad000 [ 33.414697] which belongs to the cache test_cache of size 200 [ 33.416492] The buggy address is located 1 bytes inside of [ 33.416492] 200-byte region [fff00000c66ad000, fff00000c66ad0c8) [ 33.417494] [ 33.417970] The buggy address belongs to the physical page: [ 33.419387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ad [ 33.420911] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.421641] page_type: f5(slab) [ 33.422492] raw: 0bfffe0000000000 fff00000c5699c80 dead000000000122 0000000000000000 [ 33.424023] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 33.425297] page dumped because: kasan: bad access detected [ 33.426028] [ 33.426350] Memory state around the buggy address: [ 33.427830] fff00000c66acf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.428982] fff00000c66acf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.429573] >fff00000c66ad000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.430818] ^ [ 33.431305] fff00000c66ad080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 33.432266] fff00000c66ad100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.433124] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 33.323510] ================================================================== [ 33.325150] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 33.326037] Free of addr fff00000c66ed000 by task kunit_try_catch/197 [ 33.326738] [ 33.327173] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 33.328457] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.328989] Hardware name: linux,dummy-virt (DT) [ 33.329683] Call trace: [ 33.330041] show_stack+0x20/0x38 (C) [ 33.330753] dump_stack_lvl+0x8c/0xd0 [ 33.331360] print_report+0x118/0x5e0 [ 33.331920] kasan_report_invalid_free+0xb0/0xd8 [ 33.332673] check_slab_allocation+0xd4/0x108 [ 33.333260] __kasan_slab_pre_free+0x2c/0x48 [ 33.333828] kmem_cache_free+0xf0/0x470 [ 33.334489] kmem_cache_double_free+0x190/0x3c8 [ 33.335135] kunit_try_run_case+0x14c/0x3d0 [ 33.335890] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.336644] kthread+0x24c/0x2d0 [ 33.337243] ret_from_fork+0x10/0x20 [ 33.337838] [ 33.338142] Allocated by task 197: [ 33.338577] kasan_save_stack+0x3c/0x68 [ 33.339291] kasan_save_track+0x20/0x40 [ 33.339826] kasan_save_alloc_info+0x40/0x58 [ 33.340472] __kasan_slab_alloc+0xa8/0xb0 [ 33.341088] kmem_cache_alloc_noprof+0x108/0x398 [ 33.341755] kmem_cache_double_free+0x12c/0x3c8 [ 33.342264] kunit_try_run_case+0x14c/0x3d0 [ 33.343028] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.343700] kthread+0x24c/0x2d0 [ 33.344184] ret_from_fork+0x10/0x20 [ 33.344676] [ 33.345061] Freed by task 197: [ 33.345537] kasan_save_stack+0x3c/0x68 [ 33.346063] kasan_save_track+0x20/0x40 [ 33.346766] kasan_save_free_info+0x4c/0x78 [ 33.347431] __kasan_slab_free+0x6c/0x98 [ 33.348110] kmem_cache_free+0x118/0x470 [ 33.348709] kmem_cache_double_free+0x140/0x3c8 [ 33.349438] kunit_try_run_case+0x14c/0x3d0 [ 33.349982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.350851] kthread+0x24c/0x2d0 [ 33.351339] ret_from_fork+0x10/0x20 [ 33.352009] [ 33.352338] The buggy address belongs to the object at fff00000c66ed000 [ 33.352338] which belongs to the cache test_cache of size 200 [ 33.353856] The buggy address is located 0 bytes inside of [ 33.353856] 200-byte region [fff00000c66ed000, fff00000c66ed0c8) [ 33.355208] [ 33.355542] The buggy address belongs to the physical page: [ 33.356445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ed [ 33.357381] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.358209] page_type: f5(slab) [ 33.358681] raw: 0bfffe0000000000 fff00000c5699b40 dead000000000122 0000000000000000 [ 33.359777] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 33.360828] page dumped because: kasan: bad access detected [ 33.361727] [ 33.362055] Memory state around the buggy address: [ 33.362706] fff00000c66ecf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.363508] fff00000c66ecf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.364675] >fff00000c66ed000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.365442] ^ [ 33.365881] fff00000c66ed080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 33.366925] fff00000c66ed100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.367971] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 33.228730] ================================================================== [ 33.229800] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x33c/0x428 [ 33.230511] Read of size 1 at addr fff00000c66cd0c8 by task kunit_try_catch/195 [ 33.232062] [ 33.232402] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 33.234607] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.235171] Hardware name: linux,dummy-virt (DT) [ 33.235917] Call trace: [ 33.236314] show_stack+0x20/0x38 (C) [ 33.236884] dump_stack_lvl+0x8c/0xd0 [ 33.237468] print_report+0x118/0x5e0 [ 33.238502] kasan_report+0xc8/0x118 [ 33.239337] __asan_report_load1_noabort+0x20/0x30 [ 33.240312] kmem_cache_oob+0x33c/0x428 [ 33.241363] kunit_try_run_case+0x14c/0x3d0 [ 33.242114] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.243474] kthread+0x24c/0x2d0 [ 33.244743] ret_from_fork+0x10/0x20 [ 33.245356] [ 33.245734] Allocated by task 195: [ 33.246589] kasan_save_stack+0x3c/0x68 [ 33.247754] kasan_save_track+0x20/0x40 [ 33.248329] kasan_save_alloc_info+0x40/0x58 [ 33.248937] __kasan_slab_alloc+0xa8/0xb0 [ 33.249583] kmem_cache_alloc_noprof+0x108/0x398 [ 33.251057] kmem_cache_oob+0x12c/0x428 [ 33.251607] kunit_try_run_case+0x14c/0x3d0 [ 33.252570] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.253376] kthread+0x24c/0x2d0 [ 33.254665] ret_from_fork+0x10/0x20 [ 33.255091] [ 33.255263] The buggy address belongs to the object at fff00000c66cd000 [ 33.255263] which belongs to the cache test_cache of size 200 [ 33.256244] The buggy address is located 0 bytes to the right of [ 33.256244] allocated 200-byte region [fff00000c66cd000, fff00000c66cd0c8) [ 33.257792] [ 33.258692] The buggy address belongs to the physical page: [ 33.259420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066cd [ 33.260359] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.261573] page_type: f5(slab) [ 33.262762] raw: 0bfffe0000000000 fff00000c5699a00 dead000000000122 0000000000000000 [ 33.263894] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 33.264857] page dumped because: kasan: bad access detected [ 33.265939] [ 33.266533] Memory state around the buggy address: [ 33.268116] fff00000c66ccf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.269106] fff00000c66cd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.270147] >fff00000c66cd080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 33.271011] ^ [ 33.272552] fff00000c66cd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.273336] fff00000c66cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.275463] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 33.133399] ================================================================== [ 33.135468] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 33.136326] Read of size 8 at addr fff00000c6609440 by task kunit_try_catch/188 [ 33.137242] [ 33.138417] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 33.139816] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.140340] Hardware name: linux,dummy-virt (DT) [ 33.140857] Call trace: [ 33.141340] show_stack+0x20/0x38 (C) [ 33.142123] dump_stack_lvl+0x8c/0xd0 [ 33.143232] print_report+0x118/0x5e0 [ 33.143723] kasan_report+0xc8/0x118 [ 33.144571] __asan_report_load8_noabort+0x20/0x30 [ 33.145543] workqueue_uaf+0x480/0x4a8 [ 33.146189] kunit_try_run_case+0x14c/0x3d0 [ 33.146930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.148144] kthread+0x24c/0x2d0 [ 33.148805] ret_from_fork+0x10/0x20 [ 33.149439] [ 33.149770] Allocated by task 188: [ 33.150450] kasan_save_stack+0x3c/0x68 [ 33.151745] kasan_save_track+0x20/0x40 [ 33.152790] kasan_save_alloc_info+0x40/0x58 [ 33.153271] __kasan_kmalloc+0xd4/0xd8 [ 33.153847] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.155080] workqueue_uaf+0x13c/0x4a8 [ 33.155673] kunit_try_run_case+0x14c/0x3d0 [ 33.156473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.157193] kthread+0x24c/0x2d0 [ 33.157935] ret_from_fork+0x10/0x20 [ 33.158442] [ 33.158739] Freed by task 8: [ 33.159242] kasan_save_stack+0x3c/0x68 [ 33.160738] kasan_save_track+0x20/0x40 [ 33.161222] kasan_save_free_info+0x4c/0x78 [ 33.161821] __kasan_slab_free+0x6c/0x98 [ 33.162279] kfree+0x114/0x3c8 [ 33.163288] workqueue_uaf_work+0x18/0x30 [ 33.163822] process_one_work+0x530/0xf98 [ 33.164449] worker_thread+0x614/0xf28 [ 33.164994] kthread+0x24c/0x2d0 [ 33.165578] ret_from_fork+0x10/0x20 [ 33.166777] [ 33.167128] Last potentially related work creation: [ 33.167618] kasan_save_stack+0x3c/0x68 [ 33.168320] kasan_record_aux_stack+0xb4/0xc8 [ 33.170109] __queue_work+0x65c/0xfd8 [ 33.170676] queue_work_on+0xbc/0xf8 [ 33.171247] workqueue_uaf+0x210/0x4a8 [ 33.171908] kunit_try_run_case+0x14c/0x3d0 [ 33.172497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.173189] kthread+0x24c/0x2d0 [ 33.173692] ret_from_fork+0x10/0x20 [ 33.174690] [ 33.174999] The buggy address belongs to the object at fff00000c6609440 [ 33.174999] which belongs to the cache kmalloc-32 of size 32 [ 33.176406] The buggy address is located 0 bytes inside of [ 33.176406] freed 32-byte region [fff00000c6609440, fff00000c6609460) [ 33.178751] [ 33.179162] The buggy address belongs to the physical page: [ 33.180311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106609 [ 33.181437] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.182141] page_type: f5(slab) [ 33.182731] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 33.184394] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 33.185328] page dumped because: kasan: bad access detected [ 33.186620] [ 33.187320] Memory state around the buggy address: [ 33.188012] fff00000c6609300: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc [ 33.188993] fff00000c6609380: 00 00 07 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 33.189816] >fff00000c6609400: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 33.191073] ^ [ 33.191805] fff00000c6609480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.192726] fff00000c6609500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.193531] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 33.046346] ================================================================== [ 33.047383] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 33.048316] Read of size 4 at addr fff00000c67471c0 by task swapper/1/0 [ 33.049563] [ 33.050250] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 33.052445] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.053100] Hardware name: linux,dummy-virt (DT) [ 33.053863] Call trace: [ 33.054443] show_stack+0x20/0x38 (C) [ 33.055335] dump_stack_lvl+0x8c/0xd0 [ 33.055917] print_report+0x118/0x5e0 [ 33.056501] kasan_report+0xc8/0x118 [ 33.057167] __asan_report_load4_noabort+0x20/0x30 [ 33.057763] rcu_uaf_reclaim+0x64/0x70 [ 33.058435] rcu_core+0x9f4/0x1e20 [ 33.058986] rcu_core_si+0x18/0x30 [ 33.059611] handle_softirqs+0x374/0xb20 [ 33.060533] __do_softirq+0x1c/0x28 [ 33.061101] ____do_softirq+0x18/0x30 [ 33.062028] call_on_irq_stack+0x24/0x58 [ 33.062674] do_softirq_own_stack+0x24/0x38 [ 33.063368] __irq_exit_rcu+0x1fc/0x318 [ 33.063925] irq_exit_rcu+0x1c/0x80 [ 33.064675] el1_interrupt+0x38/0x58 [ 33.065436] el1h_64_irq_handler+0x18/0x28 [ 33.066420] el1h_64_irq+0x6c/0x70 [ 33.067138] arch_local_irq_enable+0x4/0x8 (P) [ 33.067826] default_idle_call+0x6c/0x78 (L) [ 33.068482] do_idle+0x384/0x4e8 [ 33.069105] cpu_startup_entry+0x64/0x80 [ 33.069683] secondary_start_kernel+0x288/0x340 [ 33.070726] __secondary_switched+0xc0/0xc8 [ 33.071483] [ 33.071851] Allocated by task 186: [ 33.072409] kasan_save_stack+0x3c/0x68 [ 33.073129] kasan_save_track+0x20/0x40 [ 33.074030] kasan_save_alloc_info+0x40/0x58 [ 33.074764] __kasan_kmalloc+0xd4/0xd8 [ 33.075486] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.076171] rcu_uaf+0xb0/0x2d0 [ 33.076718] kunit_try_run_case+0x14c/0x3d0 [ 33.077387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.078347] kthread+0x24c/0x2d0 [ 33.079222] ret_from_fork+0x10/0x20 [ 33.079911] [ 33.080369] Freed by task 0: [ 33.080886] kasan_save_stack+0x3c/0x68 [ 33.081400] kasan_save_track+0x20/0x40 [ 33.082480] kasan_save_free_info+0x4c/0x78 [ 33.083310] __kasan_slab_free+0x6c/0x98 [ 33.083990] kfree+0x114/0x3c8 [ 33.084455] rcu_uaf_reclaim+0x28/0x70 [ 33.085012] rcu_core+0x9f4/0x1e20 [ 33.085600] rcu_core_si+0x18/0x30 [ 33.086168] handle_softirqs+0x374/0xb20 [ 33.086879] __do_softirq+0x1c/0x28 [ 33.087482] [ 33.088236] Last potentially related work creation: [ 33.088939] kasan_save_stack+0x3c/0x68 [ 33.089592] kasan_record_aux_stack+0xb4/0xc8 [ 33.090718] __call_rcu_common.constprop.0+0x74/0xa10 [ 33.091420] call_rcu+0x18/0x30 [ 33.092004] rcu_uaf+0x14c/0x2d0 [ 33.092558] kunit_try_run_case+0x14c/0x3d0 [ 33.093205] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.094203] kthread+0x24c/0x2d0 [ 33.094781] ret_from_fork+0x10/0x20 [ 33.095359] [ 33.095770] The buggy address belongs to the object at fff00000c67471c0 [ 33.095770] which belongs to the cache kmalloc-32 of size 32 [ 33.097114] The buggy address is located 0 bytes inside of [ 33.097114] freed 32-byte region [fff00000c67471c0, fff00000c67471e0) [ 33.098925] [ 33.099241] The buggy address belongs to the physical page: [ 33.099877] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106747 [ 33.100956] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.102059] page_type: f5(slab) [ 33.102682] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 33.103471] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 33.104521] page dumped because: kasan: bad access detected [ 33.105141] [ 33.105496] Memory state around the buggy address: [ 33.106694] fff00000c6747080: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 33.107643] fff00000c6747100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.108534] >fff00000c6747180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.109496] ^ [ 33.110184] fff00000c6747200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.111584] fff00000c6747280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.112477] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 32.964754] ================================================================== [ 32.965497] BUG: KASAN: slab-use-after-free in ksize_uaf+0x548/0x600 [ 32.966963] Read of size 1 at addr fff00000c6763a78 by task kunit_try_catch/184 [ 32.968791] [ 32.969321] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 32.971137] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.971935] Hardware name: linux,dummy-virt (DT) [ 32.972785] Call trace: [ 32.973254] show_stack+0x20/0x38 (C) [ 32.973846] dump_stack_lvl+0x8c/0xd0 [ 32.974355] print_report+0x118/0x5e0 [ 32.975400] kasan_report+0xc8/0x118 [ 32.976039] __asan_report_load1_noabort+0x20/0x30 [ 32.976738] ksize_uaf+0x548/0x600 [ 32.977382] kunit_try_run_case+0x14c/0x3d0 [ 32.978729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.979307] kthread+0x24c/0x2d0 [ 32.979843] ret_from_fork+0x10/0x20 [ 32.980290] [ 32.980567] Allocated by task 184: [ 32.981302] kasan_save_stack+0x3c/0x68 [ 32.982127] kasan_save_track+0x20/0x40 [ 32.983600] kasan_save_alloc_info+0x40/0x58 [ 32.984336] __kasan_kmalloc+0xd4/0xd8 [ 32.984873] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.985486] ksize_uaf+0xb8/0x600 [ 32.986031] kunit_try_run_case+0x14c/0x3d0 [ 32.986617] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.987398] kthread+0x24c/0x2d0 [ 32.988694] ret_from_fork+0x10/0x20 [ 32.989585] [ 32.990702] Freed by task 184: [ 32.991103] kasan_save_stack+0x3c/0x68 [ 32.991874] kasan_save_track+0x20/0x40 [ 32.992334] kasan_save_free_info+0x4c/0x78 [ 32.993125] __kasan_slab_free+0x6c/0x98 [ 32.994404] kfree+0x114/0x3c8 [ 32.995330] ksize_uaf+0x11c/0x600 [ 32.996017] kunit_try_run_case+0x14c/0x3d0 [ 32.996859] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.998193] kthread+0x24c/0x2d0 [ 32.998770] ret_from_fork+0x10/0x20 [ 32.999371] [ 32.999867] The buggy address belongs to the object at fff00000c6763a00 [ 32.999867] which belongs to the cache kmalloc-128 of size 128 [ 33.001448] The buggy address is located 120 bytes inside of [ 33.001448] freed 128-byte region [fff00000c6763a00, fff00000c6763a80) [ 33.003992] [ 33.004406] The buggy address belongs to the physical page: [ 33.005211] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106763 [ 33.006548] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.007480] page_type: f5(slab) [ 33.008355] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.009229] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.010463] page dumped because: kasan: bad access detected [ 33.011013] [ 33.011253] Memory state around the buggy address: [ 33.011725] fff00000c6763900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.012557] fff00000c6763980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.013226] >fff00000c6763a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.014575] ^ [ 33.016013] fff00000c6763a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.016868] fff00000c6763b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.017785] ================================================================== [ 32.909432] ================================================================== [ 32.910500] BUG: KASAN: slab-use-after-free in ksize_uaf+0x59c/0x600 [ 32.911841] Read of size 1 at addr fff00000c6763a00 by task kunit_try_catch/184 [ 32.912568] [ 32.912934] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 32.914774] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.915461] Hardware name: linux,dummy-virt (DT) [ 32.916251] Call trace: [ 32.916779] show_stack+0x20/0x38 (C) [ 32.917530] dump_stack_lvl+0x8c/0xd0 [ 32.918465] print_report+0x118/0x5e0 [ 32.919459] kasan_report+0xc8/0x118 [ 32.920282] __asan_report_load1_noabort+0x20/0x30 [ 32.921048] ksize_uaf+0x59c/0x600 [ 32.921508] kunit_try_run_case+0x14c/0x3d0 [ 32.922817] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.923742] kthread+0x24c/0x2d0 [ 32.924304] ret_from_fork+0x10/0x20 [ 32.925098] [ 32.925407] Allocated by task 184: [ 32.926668] kasan_save_stack+0x3c/0x68 [ 32.927261] kasan_save_track+0x20/0x40 [ 32.927727] kasan_save_alloc_info+0x40/0x58 [ 32.928181] __kasan_kmalloc+0xd4/0xd8 [ 32.928716] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.929437] ksize_uaf+0xb8/0x600 [ 32.930671] kunit_try_run_case+0x14c/0x3d0 [ 32.931510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.932399] kthread+0x24c/0x2d0 [ 32.932959] ret_from_fork+0x10/0x20 [ 32.933651] [ 32.934306] Freed by task 184: [ 32.934819] kasan_save_stack+0x3c/0x68 [ 32.935384] kasan_save_track+0x20/0x40 [ 32.936524] kasan_save_free_info+0x4c/0x78 [ 32.937432] __kasan_slab_free+0x6c/0x98 [ 32.938215] kfree+0x114/0x3c8 [ 32.939284] ksize_uaf+0x11c/0x600 [ 32.939847] kunit_try_run_case+0x14c/0x3d0 [ 32.940459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.941266] kthread+0x24c/0x2d0 [ 32.941759] ret_from_fork+0x10/0x20 [ 32.942860] [ 32.943427] The buggy address belongs to the object at fff00000c6763a00 [ 32.943427] which belongs to the cache kmalloc-128 of size 128 [ 32.945429] The buggy address is located 0 bytes inside of [ 32.945429] freed 128-byte region [fff00000c6763a00, fff00000c6763a80) [ 32.947160] [ 32.947673] The buggy address belongs to the physical page: [ 32.948176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106763 [ 32.949307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.950145] page_type: f5(slab) [ 32.950619] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.952669] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.954019] page dumped because: kasan: bad access detected [ 32.955290] [ 32.955565] Memory state around the buggy address: [ 32.956534] fff00000c6763900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.957619] fff00000c6763980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.958878] >fff00000c6763a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.959862] ^ [ 32.960961] fff00000c6763a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.961993] fff00000c6763b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.963034] ================================================================== [ 32.851199] ================================================================== [ 32.852616] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x600 [ 32.854343] Read of size 1 at addr fff00000c6763a00 by task kunit_try_catch/184 [ 32.855198] [ 32.855476] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 32.856986] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.858017] Hardware name: linux,dummy-virt (DT) [ 32.859085] Call trace: [ 32.859786] show_stack+0x20/0x38 (C) [ 32.860304] dump_stack_lvl+0x8c/0xd0 [ 32.860914] print_report+0x118/0x5e0 [ 32.861397] kasan_report+0xc8/0x118 [ 32.862545] __kasan_check_byte+0x54/0x70 [ 32.863855] ksize+0x30/0x88 [ 32.864256] ksize_uaf+0x168/0x600 [ 32.865055] kunit_try_run_case+0x14c/0x3d0 [ 32.866218] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.867007] kthread+0x24c/0x2d0 [ 32.867616] ret_from_fork+0x10/0x20 [ 32.868187] [ 32.868502] Allocated by task 184: [ 32.869510] kasan_save_stack+0x3c/0x68 [ 32.870257] kasan_save_track+0x20/0x40 [ 32.871046] kasan_save_alloc_info+0x40/0x58 [ 32.872256] __kasan_kmalloc+0xd4/0xd8 [ 32.872686] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.873132] ksize_uaf+0xb8/0x600 [ 32.873804] kunit_try_run_case+0x14c/0x3d0 [ 32.874896] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.876087] kthread+0x24c/0x2d0 [ 32.876472] ret_from_fork+0x10/0x20 [ 32.877351] [ 32.877731] Freed by task 184: [ 32.878120] kasan_save_stack+0x3c/0x68 [ 32.879411] kasan_save_track+0x20/0x40 [ 32.880110] kasan_save_free_info+0x4c/0x78 [ 32.881025] __kasan_slab_free+0x6c/0x98 [ 32.881939] kfree+0x114/0x3c8 [ 32.882784] ksize_uaf+0x11c/0x600 [ 32.883347] kunit_try_run_case+0x14c/0x3d0 [ 32.883927] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.884412] kthread+0x24c/0x2d0 [ 32.885555] ret_from_fork+0x10/0x20 [ 32.886565] [ 32.887256] The buggy address belongs to the object at fff00000c6763a00 [ 32.887256] which belongs to the cache kmalloc-128 of size 128 [ 32.888884] The buggy address is located 0 bytes inside of [ 32.888884] freed 128-byte region [fff00000c6763a00, fff00000c6763a80) [ 32.891288] [ 32.891845] The buggy address belongs to the physical page: [ 32.892688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106763 [ 32.893827] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.894900] page_type: f5(slab) [ 32.895354] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.897241] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.898362] page dumped because: kasan: bad access detected [ 32.899608] [ 32.899966] Memory state around the buggy address: [ 32.900773] fff00000c6763900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.901651] fff00000c6763980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.902983] >fff00000c6763a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.904291] ^ [ 32.905028] fff00000c6763a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.906445] fff00000c6763b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.907325] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 32.795035] ================================================================== [ 32.796669] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750 [ 32.798048] Read of size 1 at addr fff00000c672c07f by task kunit_try_catch/182 [ 32.799024] [ 32.799447] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 32.800812] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.801396] Hardware name: linux,dummy-virt (DT) [ 32.802297] Call trace: [ 32.803111] show_stack+0x20/0x38 (C) [ 32.804337] dump_stack_lvl+0x8c/0xd0 [ 32.805135] print_report+0x118/0x5e0 [ 32.805807] kasan_report+0xc8/0x118 [ 32.806373] __asan_report_load1_noabort+0x20/0x30 [ 32.807482] ksize_unpoisons_memory+0x6a0/0x750 [ 32.808442] kunit_try_run_case+0x14c/0x3d0 [ 32.809314] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.810177] kthread+0x24c/0x2d0 [ 32.811859] ret_from_fork+0x10/0x20 [ 32.812410] [ 32.812835] Allocated by task 182: [ 32.813346] kasan_save_stack+0x3c/0x68 [ 32.813957] kasan_save_track+0x20/0x40 [ 32.814517] kasan_save_alloc_info+0x40/0x58 [ 32.815379] __kasan_kmalloc+0xd4/0xd8 [ 32.816382] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.817000] ksize_unpoisons_memory+0xc0/0x750 [ 32.818347] kunit_try_run_case+0x14c/0x3d0 [ 32.818872] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.819293] kthread+0x24c/0x2d0 [ 32.819560] ret_from_fork+0x10/0x20 [ 32.819894] [ 32.820266] The buggy address belongs to the object at fff00000c672c000 [ 32.820266] which belongs to the cache kmalloc-128 of size 128 [ 32.823374] The buggy address is located 12 bytes to the right of [ 32.823374] allocated 115-byte region [fff00000c672c000, fff00000c672c073) [ 32.825003] [ 32.825354] The buggy address belongs to the physical page: [ 32.826671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10672c [ 32.828713] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.829531] page_type: f5(slab) [ 32.830732] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.831709] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.832369] page dumped because: kasan: bad access detected [ 32.832746] [ 32.832915] Memory state around the buggy address: [ 32.833225] fff00000c672bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.833706] fff00000c672bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.834442] >fff00000c672c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.836506] ^ [ 32.837533] fff00000c672c080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.839303] fff00000c672c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.840309] ================================================================== [ 32.744892] ================================================================== [ 32.746555] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750 [ 32.747255] Read of size 1 at addr fff00000c672c078 by task kunit_try_catch/182 [ 32.749184] [ 32.749783] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 32.751575] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.752183] Hardware name: linux,dummy-virt (DT) [ 32.752645] Call trace: [ 32.753198] show_stack+0x20/0x38 (C) [ 32.754169] dump_stack_lvl+0x8c/0xd0 [ 32.755186] print_report+0x118/0x5e0 [ 32.756011] kasan_report+0xc8/0x118 [ 32.756826] __asan_report_load1_noabort+0x20/0x30 [ 32.757274] ksize_unpoisons_memory+0x628/0x750 [ 32.758898] kunit_try_run_case+0x14c/0x3d0 [ 32.759532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.760430] kthread+0x24c/0x2d0 [ 32.760992] ret_from_fork+0x10/0x20 [ 32.761570] [ 32.762420] Allocated by task 182: [ 32.763335] kasan_save_stack+0x3c/0x68 [ 32.763787] kasan_save_track+0x20/0x40 [ 32.764211] kasan_save_alloc_info+0x40/0x58 [ 32.764967] __kasan_kmalloc+0xd4/0xd8 [ 32.765662] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.766590] ksize_unpoisons_memory+0xc0/0x750 [ 32.767888] kunit_try_run_case+0x14c/0x3d0 [ 32.768378] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.769438] kthread+0x24c/0x2d0 [ 32.770225] ret_from_fork+0x10/0x20 [ 32.771653] [ 32.772334] The buggy address belongs to the object at fff00000c672c000 [ 32.772334] which belongs to the cache kmalloc-128 of size 128 [ 32.774372] The buggy address is located 5 bytes to the right of [ 32.774372] allocated 115-byte region [fff00000c672c000, fff00000c672c073) [ 32.776345] [ 32.776652] The buggy address belongs to the physical page: [ 32.777391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10672c [ 32.779132] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.780050] page_type: f5(slab) [ 32.780544] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.782306] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.783234] page dumped because: kasan: bad access detected [ 32.784292] [ 32.784546] Memory state around the buggy address: [ 32.785416] fff00000c672bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.786180] fff00000c672bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.788311] >fff00000c672c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.789375] ^ [ 32.790650] fff00000c672c080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.791536] fff00000c672c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.792668] ================================================================== [ 32.697320] ================================================================== [ 32.699108] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750 [ 32.700444] Read of size 1 at addr fff00000c672c073 by task kunit_try_catch/182 [ 32.701350] [ 32.701712] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 32.704834] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.706262] Hardware name: linux,dummy-virt (DT) [ 32.707585] Call trace: [ 32.708034] show_stack+0x20/0x38 (C) [ 32.708437] dump_stack_lvl+0x8c/0xd0 [ 32.709220] print_report+0x118/0x5e0 [ 32.709852] kasan_report+0xc8/0x118 [ 32.710490] __asan_report_load1_noabort+0x20/0x30 [ 32.711881] ksize_unpoisons_memory+0x638/0x750 [ 32.712431] kunit_try_run_case+0x14c/0x3d0 [ 32.712863] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.713757] kthread+0x24c/0x2d0 [ 32.714315] ret_from_fork+0x10/0x20 [ 32.714978] [ 32.716045] Allocated by task 182: [ 32.716453] kasan_save_stack+0x3c/0x68 [ 32.716919] kasan_save_track+0x20/0x40 [ 32.717512] kasan_save_alloc_info+0x40/0x58 [ 32.718270] __kasan_kmalloc+0xd4/0xd8 [ 32.719514] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.720081] ksize_unpoisons_memory+0xc0/0x750 [ 32.720734] kunit_try_run_case+0x14c/0x3d0 [ 32.721321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.722809] kthread+0x24c/0x2d0 [ 32.723307] ret_from_fork+0x10/0x20 [ 32.724072] [ 32.724442] The buggy address belongs to the object at fff00000c672c000 [ 32.724442] which belongs to the cache kmalloc-128 of size 128 [ 32.726677] The buggy address is located 0 bytes to the right of [ 32.726677] allocated 115-byte region [fff00000c672c000, fff00000c672c073) [ 32.728078] [ 32.728458] The buggy address belongs to the physical page: [ 32.729520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10672c [ 32.730820] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.731435] page_type: f5(slab) [ 32.732247] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.733136] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.734196] page dumped because: kasan: bad access detected [ 32.735405] [ 32.735735] Memory state around the buggy address: [ 32.736363] fff00000c672bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.737192] fff00000c672bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.738336] >fff00000c672c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.739487] ^ [ 32.740921] fff00000c672c080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.741941] fff00000c672c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.743005] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[ 32.627877] ================================================================== [ 32.629586] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 32.630744] Free of addr fff00000c5b31d20 by task kunit_try_catch/180 [ 32.632043] [ 32.632330] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 32.633606] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.634263] Hardware name: linux,dummy-virt (DT) [ 32.635207] Call trace: [ 32.635517] show_stack+0x20/0x38 (C) [ 32.636122] dump_stack_lvl+0x8c/0xd0 [ 32.637196] print_report+0x118/0x5e0 [ 32.637932] kasan_report_invalid_free+0xb0/0xd8 [ 32.639252] check_slab_allocation+0xd4/0x108 [ 32.640025] __kasan_slab_pre_free+0x2c/0x48 [ 32.641150] kfree+0xe8/0x3c8 [ 32.641934] kfree_sensitive+0x3c/0xb0 [ 32.642667] kmalloc_double_kzfree+0x168/0x308 [ 32.643147] kunit_try_run_case+0x14c/0x3d0 [ 32.643661] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.644554] kthread+0x24c/0x2d0 [ 32.645063] ret_from_fork+0x10/0x20 [ 32.645719] [ 32.646390] Allocated by task 180: [ 32.647329] kasan_save_stack+0x3c/0x68 [ 32.648226] kasan_save_track+0x20/0x40 [ 32.648836] kasan_save_alloc_info+0x40/0x58 [ 32.649417] __kasan_kmalloc+0xd4/0xd8 [ 32.650338] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.651393] kmalloc_double_kzfree+0xb8/0x308 [ 32.652180] kunit_try_run_case+0x14c/0x3d0 [ 32.652853] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.653693] kthread+0x24c/0x2d0 [ 32.654212] ret_from_fork+0x10/0x20 [ 32.654835] [ 32.655206] Freed by task 180: [ 32.656278] kasan_save_stack+0x3c/0x68 [ 32.656915] kasan_save_track+0x20/0x40 [ 32.657587] kasan_save_free_info+0x4c/0x78 [ 32.658331] __kasan_slab_free+0x6c/0x98 [ 32.659229] kfree+0x114/0x3c8 [ 32.660560] kfree_sensitive+0x80/0xb0 [ 32.661163] kmalloc_double_kzfree+0x11c/0x308 [ 32.661907] kunit_try_run_case+0x14c/0x3d0 [ 32.662669] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.663431] kthread+0x24c/0x2d0 [ 32.664348] ret_from_fork+0x10/0x20 [ 32.664785] [ 32.665057] The buggy address belongs to the object at fff00000c5b31d20 [ 32.665057] which belongs to the cache kmalloc-16 of size 16 [ 32.667900] The buggy address is located 0 bytes inside of [ 32.667900] 16-byte region [fff00000c5b31d20, fff00000c5b31d30) [ 32.670325] [ 32.671122] The buggy address belongs to the physical page: [ 32.672064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b31 [ 32.673130] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.674372] page_type: f5(slab) [ 32.675174] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 32.676269] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.677048] page dumped because: kasan: bad access detected [ 32.678095] [ 32.678519] Memory state around the buggy address: [ 32.679908] fff00000c5b31c00: 00 06 fc fc 00 06 fc fc fa fb fc fc 00 06 fc fc [ 32.681219] fff00000c5b31c80: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.683061] >fff00000c5b31d00: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 32.683959] ^ [ 32.684517] fff00000c5b31d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.685382] fff00000c5b31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.686520] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 31.984585] ================================================================== [ 31.985701] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 31.986511] Write of size 128 at addr fff00000c6723d00 by task kunit_try_catch/158 [ 31.987480] [ 31.988177] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 31.989371] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.990511] Hardware name: linux,dummy-virt (DT) [ 31.991135] Call trace: [ 31.991649] show_stack+0x20/0x38 (C) [ 31.992230] dump_stack_lvl+0x8c/0xd0 [ 31.992881] print_report+0x118/0x5e0 [ 31.993407] kasan_report+0xc8/0x118 [ 31.994383] kasan_check_range+0x100/0x1a8 [ 31.995039] __asan_memset+0x34/0x78 [ 31.995586] kmalloc_oob_in_memset+0x144/0x2d0 [ 31.996316] kunit_try_run_case+0x14c/0x3d0 [ 31.996946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.998126] kthread+0x24c/0x2d0 [ 31.998620] ret_from_fork+0x10/0x20 [ 31.999214] [ 31.999573] Allocated by task 158: [ 32.000036] kasan_save_stack+0x3c/0x68 [ 32.000699] kasan_save_track+0x20/0x40 [ 32.001243] kasan_save_alloc_info+0x40/0x58 [ 32.001920] __kasan_kmalloc+0xd4/0xd8 [ 32.002808] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.003495] kmalloc_oob_in_memset+0xb0/0x2d0 [ 32.004179] kunit_try_run_case+0x14c/0x3d0 [ 32.004729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.005545] kthread+0x24c/0x2d0 [ 32.006108] ret_from_fork+0x10/0x20 [ 32.006677] [ 32.007036] The buggy address belongs to the object at fff00000c6723d00 [ 32.007036] which belongs to the cache kmalloc-128 of size 128 [ 32.008839] The buggy address is located 0 bytes inside of [ 32.008839] allocated 120-byte region [fff00000c6723d00, fff00000c6723d78) [ 32.011305] [ 32.011796] The buggy address belongs to the physical page: [ 32.012893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106723 [ 32.013947] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.014879] page_type: f5(slab) [ 32.015503] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.016416] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.017391] page dumped because: kasan: bad access detected [ 32.018428] [ 32.018955] Memory state around the buggy address: [ 32.019580] fff00000c6723c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 32.020522] fff00000c6723c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.022228] >fff00000c6723d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.023213] ^ [ 32.023924] fff00000c6723d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.025016] fff00000c6723e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.027048] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 32.567388] ================================================================== [ 32.568896] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 32.569607] Read of size 1 at addr fff00000c5b31d20 by task kunit_try_catch/180 [ 32.570769] [ 32.571155] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 32.572345] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.573558] Hardware name: linux,dummy-virt (DT) [ 32.574201] Call trace: [ 32.575173] show_stack+0x20/0x38 (C) [ 32.575998] dump_stack_lvl+0x8c/0xd0 [ 32.576891] print_report+0x118/0x5e0 [ 32.577550] kasan_report+0xc8/0x118 [ 32.578391] __kasan_check_byte+0x54/0x70 [ 32.579027] kfree_sensitive+0x30/0xb0 [ 32.579478] kmalloc_double_kzfree+0x168/0x308 [ 32.580699] kunit_try_run_case+0x14c/0x3d0 [ 32.581323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.582358] kthread+0x24c/0x2d0 [ 32.582983] ret_from_fork+0x10/0x20 [ 32.584105] [ 32.584368] Allocated by task 180: [ 32.585062] kasan_save_stack+0x3c/0x68 [ 32.586831] kasan_save_track+0x20/0x40 [ 32.587500] kasan_save_alloc_info+0x40/0x58 [ 32.588085] __kasan_kmalloc+0xd4/0xd8 [ 32.588604] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.589608] kmalloc_double_kzfree+0xb8/0x308 [ 32.590642] kunit_try_run_case+0x14c/0x3d0 [ 32.591545] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.592291] kthread+0x24c/0x2d0 [ 32.592920] ret_from_fork+0x10/0x20 [ 32.593616] [ 32.595044] Freed by task 180: [ 32.595580] kasan_save_stack+0x3c/0x68 [ 32.596312] kasan_save_track+0x20/0x40 [ 32.597114] kasan_save_free_info+0x4c/0x78 [ 32.597888] __kasan_slab_free+0x6c/0x98 [ 32.599266] kfree+0x114/0x3c8 [ 32.599702] kfree_sensitive+0x80/0xb0 [ 32.600476] kmalloc_double_kzfree+0x11c/0x308 [ 32.601137] kunit_try_run_case+0x14c/0x3d0 [ 32.601842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.603030] kthread+0x24c/0x2d0 [ 32.603413] ret_from_fork+0x10/0x20 [ 32.604160] [ 32.604845] The buggy address belongs to the object at fff00000c5b31d20 [ 32.604845] which belongs to the cache kmalloc-16 of size 16 [ 32.606657] The buggy address is located 0 bytes inside of [ 32.606657] freed 16-byte region [fff00000c5b31d20, fff00000c5b31d30) [ 32.608048] [ 32.608362] The buggy address belongs to the physical page: [ 32.609242] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b31 [ 32.610179] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.611310] page_type: f5(slab) [ 32.612281] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 32.613723] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.615459] page dumped because: kasan: bad access detected [ 32.616509] [ 32.617027] Memory state around the buggy address: [ 32.617820] fff00000c5b31c00: 00 06 fc fc 00 06 fc fc fa fb fc fc 00 06 fc fc [ 32.618800] fff00000c5b31c80: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.619834] >fff00000c5b31d00: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 32.622279] ^ [ 32.623085] fff00000c5b31d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.624149] fff00000c5b31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.625105] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 32.435402] ================================================================== [ 32.436489] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 32.437187] Write of size 33 at addr fff00000c66e4f00 by task kunit_try_catch/174 [ 32.438501] [ 32.439421] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 32.440794] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.441086] Hardware name: linux,dummy-virt (DT) [ 32.441390] Call trace: [ 32.441595] show_stack+0x20/0x38 (C) [ 32.442083] dump_stack_lvl+0x8c/0xd0 [ 32.442797] print_report+0x118/0x5e0 [ 32.444190] kasan_report+0xc8/0x118 [ 32.445008] kasan_check_range+0x100/0x1a8 [ 32.445686] __asan_memset+0x34/0x78 [ 32.446262] kmalloc_uaf_memset+0x170/0x310 [ 32.447244] kunit_try_run_case+0x14c/0x3d0 [ 32.448028] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.448742] kthread+0x24c/0x2d0 [ 32.449335] ret_from_fork+0x10/0x20 [ 32.450441] [ 32.450734] Allocated by task 174: [ 32.451271] kasan_save_stack+0x3c/0x68 [ 32.451931] kasan_save_track+0x20/0x40 [ 32.452495] kasan_save_alloc_info+0x40/0x58 [ 32.453143] __kasan_kmalloc+0xd4/0xd8 [ 32.453746] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.454788] kmalloc_uaf_memset+0xb8/0x310 [ 32.455359] kunit_try_run_case+0x14c/0x3d0 [ 32.456015] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.457129] kthread+0x24c/0x2d0 [ 32.458049] ret_from_fork+0x10/0x20 [ 32.458790] [ 32.459196] Freed by task 174: [ 32.459847] kasan_save_stack+0x3c/0x68 [ 32.460421] kasan_save_track+0x20/0x40 [ 32.461236] kasan_save_free_info+0x4c/0x78 [ 32.462128] __kasan_slab_free+0x6c/0x98 [ 32.462681] kfree+0x114/0x3c8 [ 32.463255] kmalloc_uaf_memset+0x11c/0x310 [ 32.463754] kunit_try_run_case+0x14c/0x3d0 [ 32.464516] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.465287] kthread+0x24c/0x2d0 [ 32.465824] ret_from_fork+0x10/0x20 [ 32.466321] [ 32.467461] The buggy address belongs to the object at fff00000c66e4f00 [ 32.467461] which belongs to the cache kmalloc-64 of size 64 [ 32.468973] The buggy address is located 0 bytes inside of [ 32.468973] freed 64-byte region [fff00000c66e4f00, fff00000c66e4f40) [ 32.471118] [ 32.471697] The buggy address belongs to the physical page: [ 32.472212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e4 [ 32.473044] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.473959] page_type: f5(slab) [ 32.474688] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.475687] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.476484] page dumped because: kasan: bad access detected [ 32.478132] [ 32.478837] Memory state around the buggy address: [ 32.479348] fff00000c66e4e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.480972] fff00000c66e4e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.482456] >fff00000c66e4f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.483811] ^ [ 32.484768] fff00000c66e4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.486435] fff00000c66e5000: 00 00 00 fc fc fc fc fc 00 00 00 03 fc fc fc fc [ 32.488014] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 32.312678] ================================================================== [ 32.313990] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e8 [ 32.315238] Read of size 64 at addr fff00000c66e4e04 by task kunit_try_catch/170 [ 32.316816] [ 32.317352] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 32.318951] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.320087] Hardware name: linux,dummy-virt (DT) [ 32.320843] Call trace: [ 32.321318] show_stack+0x20/0x38 (C) [ 32.322960] dump_stack_lvl+0x8c/0xd0 [ 32.323772] print_report+0x118/0x5e0 [ 32.324276] kasan_report+0xc8/0x118 [ 32.325163] kasan_check_range+0x100/0x1a8 [ 32.326195] __asan_memmove+0x3c/0x98 [ 32.327315] kmalloc_memmove_invalid_size+0x154/0x2e8 [ 32.328106] kunit_try_run_case+0x14c/0x3d0 [ 32.328859] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.329680] kthread+0x24c/0x2d0 [ 32.331217] ret_from_fork+0x10/0x20 [ 32.331777] [ 32.332093] Allocated by task 170: [ 32.332544] kasan_save_stack+0x3c/0x68 [ 32.333232] kasan_save_track+0x20/0x40 [ 32.334122] kasan_save_alloc_info+0x40/0x58 [ 32.335294] __kasan_kmalloc+0xd4/0xd8 [ 32.336069] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.336802] kmalloc_memmove_invalid_size+0xb0/0x2e8 [ 32.337566] kunit_try_run_case+0x14c/0x3d0 [ 32.339272] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.340210] kthread+0x24c/0x2d0 [ 32.340973] ret_from_fork+0x10/0x20 [ 32.341503] [ 32.342025] The buggy address belongs to the object at fff00000c66e4e00 [ 32.342025] which belongs to the cache kmalloc-64 of size 64 [ 32.344192] The buggy address is located 4 bytes inside of [ 32.344192] allocated 64-byte region [fff00000c66e4e00, fff00000c66e4e40) [ 32.346263] [ 32.346603] The buggy address belongs to the physical page: [ 32.348384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e4 [ 32.349412] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.350813] page_type: f5(slab) [ 32.351307] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.352204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.353110] page dumped because: kasan: bad access detected [ 32.353928] [ 32.354202] Memory state around the buggy address: [ 32.355041] fff00000c66e4d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 32.356436] fff00000c66e4d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.357761] >fff00000c66e4e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 32.359515] ^ [ 32.360111] fff00000c66e4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.361319] fff00000c66e4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.362451] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 32.258398] ================================================================== [ 32.259920] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 32.260504] Read of size 18446744073709551614 at addr fff00000c66e4d84 by task kunit_try_catch/168 [ 32.262573] [ 32.263100] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 32.264468] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.264868] Hardware name: linux,dummy-virt (DT) [ 32.265651] Call trace: [ 32.266415] show_stack+0x20/0x38 (C) [ 32.267207] dump_stack_lvl+0x8c/0xd0 [ 32.267977] print_report+0x118/0x5e0 [ 32.268454] kasan_report+0xc8/0x118 [ 32.269044] kasan_check_range+0x100/0x1a8 [ 32.269936] __asan_memmove+0x3c/0x98 [ 32.270695] kmalloc_memmove_negative_size+0x154/0x2e0 [ 32.271475] kunit_try_run_case+0x14c/0x3d0 [ 32.272132] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.272898] kthread+0x24c/0x2d0 [ 32.273365] ret_from_fork+0x10/0x20 [ 32.274369] [ 32.274685] Allocated by task 168: [ 32.275132] kasan_save_stack+0x3c/0x68 [ 32.275450] kasan_save_track+0x20/0x40 [ 32.275823] kasan_save_alloc_info+0x40/0x58 [ 32.276563] __kasan_kmalloc+0xd4/0xd8 [ 32.277760] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.278896] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 32.279650] kunit_try_run_case+0x14c/0x3d0 [ 32.280411] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.281321] kthread+0x24c/0x2d0 [ 32.282436] ret_from_fork+0x10/0x20 [ 32.283403] [ 32.283727] The buggy address belongs to the object at fff00000c66e4d80 [ 32.283727] which belongs to the cache kmalloc-64 of size 64 [ 32.285180] The buggy address is located 4 bytes inside of [ 32.285180] 64-byte region [fff00000c66e4d80, fff00000c66e4dc0) [ 32.286828] [ 32.287324] The buggy address belongs to the physical page: [ 32.288263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e4 [ 32.289309] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.290900] page_type: f5(slab) [ 32.291406] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.292528] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.293573] page dumped because: kasan: bad access detected [ 32.294719] [ 32.295170] Memory state around the buggy address: [ 32.295867] fff00000c66e4c80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 32.296809] fff00000c66e4d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 32.298110] >fff00000c66e4d80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 32.299011] ^ [ 32.299855] fff00000c66e4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.300866] fff00000c66e4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.302103] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset
[ 32.036948] ================================================================== [ 32.038575] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 32.039731] Write of size 2 at addr fff00000c6723e77 by task kunit_try_catch/160 [ 32.040613] [ 32.041201] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 32.042762] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.043403] Hardware name: linux,dummy-virt (DT) [ 32.043923] Call trace: [ 32.044297] show_stack+0x20/0x38 (C) [ 32.045001] dump_stack_lvl+0x8c/0xd0 [ 32.045567] print_report+0x118/0x5e0 [ 32.046358] kasan_report+0xc8/0x118 [ 32.047407] kasan_check_range+0x100/0x1a8 [ 32.048065] __asan_memset+0x34/0x78 [ 32.048653] kmalloc_oob_memset_2+0x150/0x2f8 [ 32.049326] kunit_try_run_case+0x14c/0x3d0 [ 32.050405] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.051216] kthread+0x24c/0x2d0 [ 32.051591] ret_from_fork+0x10/0x20 [ 32.052177] [ 32.052572] Allocated by task 160: [ 32.053395] kasan_save_stack+0x3c/0x68 [ 32.054193] kasan_save_track+0x20/0x40 [ 32.054748] kasan_save_alloc_info+0x40/0x58 [ 32.055420] __kasan_kmalloc+0xd4/0xd8 [ 32.056270] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.056985] kmalloc_oob_memset_2+0xb0/0x2f8 [ 32.057674] kunit_try_run_case+0x14c/0x3d0 [ 32.058781] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.059557] kthread+0x24c/0x2d0 [ 32.060136] ret_from_fork+0x10/0x20 [ 32.060783] [ 32.061156] The buggy address belongs to the object at fff00000c6723e00 [ 32.061156] which belongs to the cache kmalloc-128 of size 128 [ 32.063324] The buggy address is located 119 bytes inside of [ 32.063324] allocated 120-byte region [fff00000c6723e00, fff00000c6723e78) [ 32.065074] [ 32.065380] The buggy address belongs to the physical page: [ 32.066504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106723 [ 32.067530] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.068323] page_type: f5(slab) [ 32.068930] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.069868] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.070769] page dumped because: kasan: bad access detected [ 32.071531] [ 32.072179] Memory state around the buggy address: [ 32.072785] fff00000c6723d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.073871] fff00000c6723d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.074762] >fff00000c6723e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.075565] ^ [ 32.076525] fff00000c6723e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.077366] fff00000c6723f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.078290] ================================================================== [ 32.148114] ================================================================== [ 32.149309] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 32.150240] Write of size 8 at addr fff00000c6763071 by task kunit_try_catch/164 [ 32.151999] [ 32.152320] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 32.153681] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.154339] Hardware name: linux,dummy-virt (DT) [ 32.155776] Call trace: [ 32.156465] show_stack+0x20/0x38 (C) [ 32.157266] dump_stack_lvl+0x8c/0xd0 [ 32.158083] print_report+0x118/0x5e0 [ 32.158831] kasan_report+0xc8/0x118 [ 32.159465] kasan_check_range+0x100/0x1a8 [ 32.160061] __asan_memset+0x34/0x78 [ 32.160849] kmalloc_oob_memset_8+0x150/0x2f8 [ 32.161648] kunit_try_run_case+0x14c/0x3d0 [ 32.162294] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.163561] kthread+0x24c/0x2d0 [ 32.164108] ret_from_fork+0x10/0x20 [ 32.164941] [ 32.165293] Allocated by task 164: [ 32.166237] kasan_save_stack+0x3c/0x68 [ 32.166928] kasan_save_track+0x20/0x40 [ 32.167690] kasan_save_alloc_info+0x40/0x58 [ 32.168332] __kasan_kmalloc+0xd4/0xd8 [ 32.168913] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.169658] kmalloc_oob_memset_8+0xb0/0x2f8 [ 32.170938] kunit_try_run_case+0x14c/0x3d0 [ 32.171465] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.172211] kthread+0x24c/0x2d0 [ 32.173335] ret_from_fork+0x10/0x20 [ 32.173930] [ 32.174351] The buggy address belongs to the object at fff00000c6763000 [ 32.174351] which belongs to the cache kmalloc-128 of size 128 [ 32.176157] The buggy address is located 113 bytes inside of [ 32.176157] allocated 120-byte region [fff00000c6763000, fff00000c6763078) [ 32.177598] [ 32.178356] The buggy address belongs to the physical page: [ 32.179059] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106763 [ 32.180064] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.180891] page_type: f5(slab) [ 32.181403] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.182816] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.183734] page dumped because: kasan: bad access detected [ 32.184323] [ 32.184707] Memory state around the buggy address: [ 32.185277] fff00000c6762f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.186756] fff00000c6762f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.187791] >fff00000c6763000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.188670] ^ [ 32.189579] fff00000c6763080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.191198] fff00000c6763100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.191944] ================================================================== [ 32.091212] ================================================================== [ 32.092396] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 32.093115] Write of size 4 at addr fff00000c674d375 by task kunit_try_catch/162 [ 32.094173] [ 32.095910] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 32.097123] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.097692] Hardware name: linux,dummy-virt (DT) [ 32.098978] Call trace: [ 32.099433] show_stack+0x20/0x38 (C) [ 32.100200] dump_stack_lvl+0x8c/0xd0 [ 32.100782] print_report+0x118/0x5e0 [ 32.101422] kasan_report+0xc8/0x118 [ 32.102386] kasan_check_range+0x100/0x1a8 [ 32.103024] __asan_memset+0x34/0x78 [ 32.103687] kmalloc_oob_memset_4+0x150/0x300 [ 32.104160] kunit_try_run_case+0x14c/0x3d0 [ 32.105357] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.106581] kthread+0x24c/0x2d0 [ 32.107104] ret_from_fork+0x10/0x20 [ 32.107698] [ 32.108014] Allocated by task 162: [ 32.108443] kasan_save_stack+0x3c/0x68 [ 32.109141] kasan_save_track+0x20/0x40 [ 32.109604] kasan_save_alloc_info+0x40/0x58 [ 32.110741] __kasan_kmalloc+0xd4/0xd8 [ 32.111474] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.112499] kmalloc_oob_memset_4+0xb0/0x300 [ 32.113107] kunit_try_run_case+0x14c/0x3d0 [ 32.114249] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.115033] kthread+0x24c/0x2d0 [ 32.115777] ret_from_fork+0x10/0x20 [ 32.116296] [ 32.116618] The buggy address belongs to the object at fff00000c674d300 [ 32.116618] which belongs to the cache kmalloc-128 of size 128 [ 32.118988] The buggy address is located 117 bytes inside of [ 32.118988] allocated 120-byte region [fff00000c674d300, fff00000c674d378) [ 32.122710] [ 32.123468] The buggy address belongs to the physical page: [ 32.123959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10674d [ 32.124427] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.125065] page_type: f5(slab) [ 32.125616] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.126957] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.127592] page dumped because: kasan: bad access detected [ 32.128750] [ 32.129340] Memory state around the buggy address: [ 32.131405] fff00000c674d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 32.132810] fff00000c674d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.134025] >fff00000c674d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.135526] ^ [ 32.136019] fff00000c674d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.136435] fff00000c674d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.137076] ================================================================== [ 32.203199] ================================================================== [ 32.204475] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 32.205307] Write of size 16 at addr fff00000c6763169 by task kunit_try_catch/166 [ 32.206857] [ 32.207613] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 32.209055] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.210110] Hardware name: linux,dummy-virt (DT) [ 32.210745] Call trace: [ 32.211152] show_stack+0x20/0x38 (C) [ 32.211939] dump_stack_lvl+0x8c/0xd0 [ 32.212563] print_report+0x118/0x5e0 [ 32.213312] kasan_report+0xc8/0x118 [ 32.214262] kasan_check_range+0x100/0x1a8 [ 32.215129] __asan_memset+0x34/0x78 [ 32.215809] kmalloc_oob_memset_16+0x150/0x2f8 [ 32.216418] kunit_try_run_case+0x14c/0x3d0 [ 32.217046] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.218273] kthread+0x24c/0x2d0 [ 32.219076] ret_from_fork+0x10/0x20 [ 32.219830] [ 32.220247] Allocated by task 166: [ 32.220876] kasan_save_stack+0x3c/0x68 [ 32.222110] kasan_save_track+0x20/0x40 [ 32.222615] kasan_save_alloc_info+0x40/0x58 [ 32.223434] __kasan_kmalloc+0xd4/0xd8 [ 32.224129] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.224895] kmalloc_oob_memset_16+0xb0/0x2f8 [ 32.225568] kunit_try_run_case+0x14c/0x3d0 [ 32.227487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.228191] kthread+0x24c/0x2d0 [ 32.228720] ret_from_fork+0x10/0x20 [ 32.229507] [ 32.230151] The buggy address belongs to the object at fff00000c6763100 [ 32.230151] which belongs to the cache kmalloc-128 of size 128 [ 32.231164] The buggy address is located 105 bytes inside of [ 32.231164] allocated 120-byte region [fff00000c6763100, fff00000c6763178) [ 32.231956] [ 32.232369] The buggy address belongs to the physical page: [ 32.233285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106763 [ 32.234370] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.235693] page_type: f5(slab) [ 32.236158] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.237109] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.238736] page dumped because: kasan: bad access detected [ 32.239395] [ 32.239730] Memory state around the buggy address: [ 32.240456] fff00000c6763000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.241374] fff00000c6763080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.242660] >fff00000c6763100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.243507] ^ [ 32.244393] fff00000c6763180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.245326] fff00000c6763200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.246457] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 32.500452] ================================================================== [ 32.501762] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 32.502643] Read of size 1 at addr fff00000c6743e28 by task kunit_try_catch/176 [ 32.503349] [ 32.504500] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 32.506346] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.507233] Hardware name: linux,dummy-virt (DT) [ 32.508239] Call trace: [ 32.509003] show_stack+0x20/0x38 (C) [ 32.509607] dump_stack_lvl+0x8c/0xd0 [ 32.510315] print_report+0x118/0x5e0 [ 32.511354] kasan_report+0xc8/0x118 [ 32.512026] __asan_report_load1_noabort+0x20/0x30 [ 32.512680] kmalloc_uaf2+0x3f4/0x468 [ 32.513322] kunit_try_run_case+0x14c/0x3d0 [ 32.514036] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.514784] kthread+0x24c/0x2d0 [ 32.515375] ret_from_fork+0x10/0x20 [ 32.515895] [ 32.516252] Allocated by task 176: [ 32.516871] kasan_save_stack+0x3c/0x68 [ 32.517396] kasan_save_track+0x20/0x40 [ 32.518149] kasan_save_alloc_info+0x40/0x58 [ 32.519046] __kasan_kmalloc+0xd4/0xd8 [ 32.519668] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.520522] kmalloc_uaf2+0xc4/0x468 [ 32.521026] kunit_try_run_case+0x14c/0x3d0 [ 32.521831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.522770] kthread+0x24c/0x2d0 [ 32.523292] ret_from_fork+0x10/0x20 [ 32.523907] [ 32.524266] Freed by task 176: [ 32.524793] kasan_save_stack+0x3c/0x68 [ 32.525304] kasan_save_track+0x20/0x40 [ 32.526058] kasan_save_free_info+0x4c/0x78 [ 32.526745] __kasan_slab_free+0x6c/0x98 [ 32.527444] kfree+0x114/0x3c8 [ 32.528009] kmalloc_uaf2+0x134/0x468 [ 32.528539] kunit_try_run_case+0x14c/0x3d0 [ 32.529113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.530024] kthread+0x24c/0x2d0 [ 32.530454] ret_from_fork+0x10/0x20 [ 32.531119] [ 32.531513] The buggy address belongs to the object at fff00000c6743e00 [ 32.531513] which belongs to the cache kmalloc-64 of size 64 [ 32.532969] The buggy address is located 40 bytes inside of [ 32.532969] freed 64-byte region [fff00000c6743e00, fff00000c6743e40) [ 32.534448] [ 32.534780] The buggy address belongs to the physical page: [ 32.535562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106743 [ 32.536508] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.537418] page_type: f5(slab) [ 32.537924] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.538843] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.539822] page dumped because: kasan: bad access detected [ 32.540588] [ 32.541002] Memory state around the buggy address: [ 32.541547] fff00000c6743d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 32.542541] fff00000c6743d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.543364] >fff00000c6743e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.544302] ^ [ 32.545001] fff00000c6743e80: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 32.545951] fff00000c6743f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.546957] ================================================================== [ 31.919259] ================================================================== [ 31.920507] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 31.921435] Read of size 16 at addr fff00000c6153d60 by task kunit_try_catch/156 [ 31.922458] [ 31.922958] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 31.925428] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.926654] Hardware name: linux,dummy-virt (DT) [ 31.927331] Call trace: [ 31.927860] show_stack+0x20/0x38 (C) [ 31.928383] dump_stack_lvl+0x8c/0xd0 [ 31.929060] print_report+0x118/0x5e0 [ 31.929562] kasan_report+0xc8/0x118 [ 31.930452] __asan_report_load16_noabort+0x20/0x30 [ 31.931143] kmalloc_uaf_16+0x3bc/0x438 [ 31.931785] kunit_try_run_case+0x14c/0x3d0 [ 31.932380] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.933168] kthread+0x24c/0x2d0 [ 31.933655] ret_from_fork+0x10/0x20 [ 31.934320] [ 31.934986] Allocated by task 156: [ 31.935798] kasan_save_stack+0x3c/0x68 [ 31.936477] kasan_save_track+0x20/0x40 [ 31.937281] kasan_save_alloc_info+0x40/0x58 [ 31.938303] __kasan_kmalloc+0xd4/0xd8 [ 31.939001] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.939817] kmalloc_uaf_16+0x140/0x438 [ 31.940494] kunit_try_run_case+0x14c/0x3d0 [ 31.941140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.942487] kthread+0x24c/0x2d0 [ 31.943475] ret_from_fork+0x10/0x20 [ 31.943889] [ 31.944136] Freed by task 156: [ 31.944805] kasan_save_stack+0x3c/0x68 [ 31.945399] kasan_save_track+0x20/0x40 [ 31.946731] kasan_save_free_info+0x4c/0x78 [ 31.947386] __kasan_slab_free+0x6c/0x98 [ 31.947969] kfree+0x114/0x3c8 [ 31.948434] kmalloc_uaf_16+0x190/0x438 [ 31.949043] kunit_try_run_case+0x14c/0x3d0 [ 31.949657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.950899] kthread+0x24c/0x2d0 [ 31.951731] ret_from_fork+0x10/0x20 [ 31.952385] [ 31.952759] The buggy address belongs to the object at fff00000c6153d60 [ 31.952759] which belongs to the cache kmalloc-16 of size 16 [ 31.954651] The buggy address is located 0 bytes inside of [ 31.954651] freed 16-byte region [fff00000c6153d60, fff00000c6153d70) [ 31.956009] [ 31.956341] The buggy address belongs to the physical page: [ 31.957091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 31.958377] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.959381] page_type: f5(slab) [ 31.959898] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 31.961093] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.962372] page dumped because: kasan: bad access detected [ 31.964202] [ 31.964545] Memory state around the buggy address: [ 31.965082] fff00000c6153c00: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 31.966355] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 31.968699] >fff00000c6153d00: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 31.969469] ^ [ 31.970552] fff00000c6153d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.971584] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.972462] ================================================================== [ 32.373130] ================================================================== [ 32.374483] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 32.375357] Read of size 1 at addr fff00000c5b31d08 by task kunit_try_catch/172 [ 32.376583] [ 32.377009] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 32.379244] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.379801] Hardware name: linux,dummy-virt (DT) [ 32.380416] Call trace: [ 32.380891] show_stack+0x20/0x38 (C) [ 32.381576] dump_stack_lvl+0x8c/0xd0 [ 32.382767] print_report+0x118/0x5e0 [ 32.383334] kasan_report+0xc8/0x118 [ 32.384018] __asan_report_load1_noabort+0x20/0x30 [ 32.384782] kmalloc_uaf+0x300/0x338 [ 32.385432] kunit_try_run_case+0x14c/0x3d0 [ 32.386600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.387368] kthread+0x24c/0x2d0 [ 32.387920] ret_from_fork+0x10/0x20 [ 32.388662] [ 32.389021] Allocated by task 172: [ 32.389571] kasan_save_stack+0x3c/0x68 [ 32.390858] kasan_save_track+0x20/0x40 [ 32.391604] kasan_save_alloc_info+0x40/0x58 [ 32.392240] __kasan_kmalloc+0xd4/0xd8 [ 32.392798] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.393522] kmalloc_uaf+0xb8/0x338 [ 32.394290] kunit_try_run_case+0x14c/0x3d0 [ 32.395217] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.396215] kthread+0x24c/0x2d0 [ 32.396675] ret_from_fork+0x10/0x20 [ 32.397259] [ 32.397543] Freed by task 172: [ 32.398184] kasan_save_stack+0x3c/0x68 [ 32.399269] kasan_save_track+0x20/0x40 [ 32.400310] kasan_save_free_info+0x4c/0x78 [ 32.400980] __kasan_slab_free+0x6c/0x98 [ 32.401683] kfree+0x114/0x3c8 [ 32.402165] kmalloc_uaf+0x11c/0x338 [ 32.403192] kunit_try_run_case+0x14c/0x3d0 [ 32.403918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.404554] kthread+0x24c/0x2d0 [ 32.405176] ret_from_fork+0x10/0x20 [ 32.406045] [ 32.406483] The buggy address belongs to the object at fff00000c5b31d00 [ 32.406483] which belongs to the cache kmalloc-16 of size 16 [ 32.408098] The buggy address is located 8 bytes inside of [ 32.408098] freed 16-byte region [fff00000c5b31d00, fff00000c5b31d10) [ 32.409515] [ 32.409897] The buggy address belongs to the physical page: [ 32.410702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b31 [ 32.412383] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.413320] page_type: f5(slab) [ 32.413907] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 32.415183] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.416271] page dumped because: kasan: bad access detected [ 32.416968] [ 32.417294] Memory state around the buggy address: [ 32.418572] fff00000c5b31c00: 00 06 fc fc 00 06 fc fc fa fb fc fc 00 06 fc fc [ 32.419486] fff00000c5b31c80: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.420462] >fff00000c5b31d00: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.421324] ^ [ 32.421931] fff00000c5b31d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.422998] fff00000c5b31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.423841] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob
[ 31.864276] ================================================================== [ 31.865558] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 31.866175] Write of size 16 at addr fff00000c6153d00 by task kunit_try_catch/154 [ 31.867258] [ 31.868031] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 31.869278] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.870969] Hardware name: linux,dummy-virt (DT) [ 31.871471] Call trace: [ 31.871776] show_stack+0x20/0x38 (C) [ 31.872322] dump_stack_lvl+0x8c/0xd0 [ 31.872754] print_report+0x118/0x5e0 [ 31.873593] kasan_report+0xc8/0x118 [ 31.874217] __asan_report_store16_noabort+0x20/0x30 [ 31.875194] kmalloc_oob_16+0x3a0/0x3f8 [ 31.875825] kunit_try_run_case+0x14c/0x3d0 [ 31.876414] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.877510] kthread+0x24c/0x2d0 [ 31.878463] ret_from_fork+0x10/0x20 [ 31.878997] [ 31.879353] Allocated by task 154: [ 31.879970] kasan_save_stack+0x3c/0x68 [ 31.880557] kasan_save_track+0x20/0x40 [ 31.881454] kasan_save_alloc_info+0x40/0x58 [ 31.882474] __kasan_kmalloc+0xd4/0xd8 [ 31.883037] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.883686] kmalloc_oob_16+0xb4/0x3f8 [ 31.884315] kunit_try_run_case+0x14c/0x3d0 [ 31.884957] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.886298] kthread+0x24c/0x2d0 [ 31.886700] ret_from_fork+0x10/0x20 [ 31.887292] [ 31.887699] The buggy address belongs to the object at fff00000c6153d00 [ 31.887699] which belongs to the cache kmalloc-16 of size 16 [ 31.889313] The buggy address is located 0 bytes inside of [ 31.889313] allocated 13-byte region [fff00000c6153d00, fff00000c6153d0d) [ 31.890955] [ 31.891272] The buggy address belongs to the physical page: [ 31.892791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153 [ 31.893749] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.894743] page_type: f5(slab) [ 31.895328] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 31.896381] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.897368] page dumped because: kasan: bad access detected [ 31.898411] [ 31.898741] Memory state around the buggy address: [ 31.899352] fff00000c6153c00: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 31.900218] fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 31.901612] >fff00000c6153d00: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.903162] ^ [ 31.903724] fff00000c6153d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.904685] fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.905678] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 31.791454] ================================================================== [ 31.792085] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 31.793161] Read of size 1 at addr fff00000c1dd4e00 by task kunit_try_catch/152 [ 31.795032] [ 31.795471] CPU: 1 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 31.796507] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.797303] Hardware name: linux,dummy-virt (DT) [ 31.797999] Call trace: [ 31.799445] show_stack+0x20/0x38 (C) [ 31.800110] dump_stack_lvl+0x8c/0xd0 [ 31.800796] print_report+0x118/0x5e0 [ 31.801484] kasan_report+0xc8/0x118 [ 31.802177] __asan_report_load1_noabort+0x20/0x30 [ 31.802991] krealloc_uaf+0x4c8/0x520 [ 31.803707] kunit_try_run_case+0x14c/0x3d0 [ 31.804410] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.805407] kthread+0x24c/0x2d0 [ 31.807147] ret_from_fork+0x10/0x20 [ 31.807767] [ 31.808127] Allocated by task 152: [ 31.808671] kasan_save_stack+0x3c/0x68 [ 31.809167] kasan_save_track+0x20/0x40 [ 31.810185] kasan_save_alloc_info+0x40/0x58 [ 31.811026] __kasan_kmalloc+0xd4/0xd8 [ 31.812160] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.812929] krealloc_uaf+0xc8/0x520 [ 31.813549] kunit_try_run_case+0x14c/0x3d0 [ 31.814290] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.815279] kthread+0x24c/0x2d0 [ 31.816536] ret_from_fork+0x10/0x20 [ 31.817128] [ 31.817580] Freed by task 152: [ 31.818106] kasan_save_stack+0x3c/0x68 [ 31.819021] kasan_save_track+0x20/0x40 [ 31.819954] kasan_save_free_info+0x4c/0x78 [ 31.820797] __kasan_slab_free+0x6c/0x98 [ 31.821417] kfree+0x114/0x3c8 [ 31.822093] krealloc_uaf+0x12c/0x520 [ 31.823726] kunit_try_run_case+0x14c/0x3d0 [ 31.824363] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.825303] kthread+0x24c/0x2d0 [ 31.826023] ret_from_fork+0x10/0x20 [ 31.826878] [ 31.827333] The buggy address belongs to the object at fff00000c1dd4e00 [ 31.827333] which belongs to the cache kmalloc-256 of size 256 [ 31.828769] The buggy address is located 0 bytes inside of [ 31.828769] freed 256-byte region [fff00000c1dd4e00, fff00000c1dd4f00) [ 31.830334] [ 31.830995] The buggy address belongs to the physical page: [ 31.831543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101dd4 [ 31.833165] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.834138] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.835475] page_type: f5(slab) [ 31.836151] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.837047] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.838203] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.839169] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.840210] head: 0bfffe0000000001 ffffc1ffc3077501 ffffffffffffffff 0000000000000000 [ 31.841131] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 31.843080] page dumped because: kasan: bad access detected [ 31.843736] [ 31.844130] Memory state around the buggy address: [ 31.844846] fff00000c1dd4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.845802] fff00000c1dd4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.847084] >fff00000c1dd4e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.848034] ^ [ 31.848619] fff00000c1dd4e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.850424] fff00000c1dd4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.851187] ================================================================== [ 31.729674] ================================================================== [ 31.732335] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 31.733168] Read of size 1 at addr fff00000c1dd4e00 by task kunit_try_catch/152 [ 31.734120] [ 31.735100] CPU: 1 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 31.736457] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.737085] Hardware name: linux,dummy-virt (DT) [ 31.738019] Call trace: [ 31.738743] show_stack+0x20/0x38 (C) [ 31.739695] dump_stack_lvl+0x8c/0xd0 [ 31.740817] print_report+0x118/0x5e0 [ 31.741528] kasan_report+0xc8/0x118 [ 31.742577] __kasan_check_byte+0x54/0x70 [ 31.743217] krealloc_noprof+0x44/0x360 [ 31.743932] krealloc_uaf+0x180/0x520 [ 31.744568] kunit_try_run_case+0x14c/0x3d0 [ 31.745219] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.746281] kthread+0x24c/0x2d0 [ 31.747008] ret_from_fork+0x10/0x20 [ 31.747643] [ 31.748011] Allocated by task 152: [ 31.748489] kasan_save_stack+0x3c/0x68 [ 31.749603] kasan_save_track+0x20/0x40 [ 31.750789] kasan_save_alloc_info+0x40/0x58 [ 31.751374] __kasan_kmalloc+0xd4/0xd8 [ 31.751979] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.752604] krealloc_uaf+0xc8/0x520 [ 31.753280] kunit_try_run_case+0x14c/0x3d0 [ 31.753903] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.755287] kthread+0x24c/0x2d0 [ 31.755701] ret_from_fork+0x10/0x20 [ 31.756469] [ 31.757164] Freed by task 152: [ 31.758417] kasan_save_stack+0x3c/0x68 [ 31.759030] kasan_save_track+0x20/0x40 [ 31.759500] kasan_save_free_info+0x4c/0x78 [ 31.760178] __kasan_slab_free+0x6c/0x98 [ 31.760783] kfree+0x114/0x3c8 [ 31.761225] krealloc_uaf+0x12c/0x520 [ 31.761946] kunit_try_run_case+0x14c/0x3d0 [ 31.762855] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.763710] kthread+0x24c/0x2d0 [ 31.764323] ret_from_fork+0x10/0x20 [ 31.765111] [ 31.765364] The buggy address belongs to the object at fff00000c1dd4e00 [ 31.765364] which belongs to the cache kmalloc-256 of size 256 [ 31.767605] The buggy address is located 0 bytes inside of [ 31.767605] freed 256-byte region [fff00000c1dd4e00, fff00000c1dd4f00) [ 31.769213] [ 31.769535] The buggy address belongs to the physical page: [ 31.770655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101dd4 [ 31.772144] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.773049] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.773989] page_type: f5(slab) [ 31.774787] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.775804] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.776684] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.777733] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.778706] head: 0bfffe0000000001 ffffc1ffc3077501 ffffffffffffffff 0000000000000000 [ 31.779618] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 31.780422] page dumped because: kasan: bad access detected [ 31.781742] [ 31.781990] Memory state around the buggy address: [ 31.782355] fff00000c1dd4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.783316] fff00000c1dd4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.785184] >fff00000c1dd4e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.786490] ^ [ 31.786991] fff00000c1dd4e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.787996] fff00000c1dd4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.788563] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 31.569709] ================================================================== [ 31.571029] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 31.571980] Write of size 1 at addr fff00000c5e720d0 by task kunit_try_catch/150 [ 31.573465] [ 31.573967] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 31.575142] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.575799] Hardware name: linux,dummy-virt (DT) [ 31.576549] Call trace: [ 31.577863] show_stack+0x20/0x38 (C) [ 31.578528] dump_stack_lvl+0x8c/0xd0 [ 31.579222] print_report+0x118/0x5e0 [ 31.580301] kasan_report+0xc8/0x118 [ 31.581233] __asan_report_store1_noabort+0x20/0x30 [ 31.581970] krealloc_less_oob_helper+0xb9c/0xc50 [ 31.582618] krealloc_large_less_oob+0x20/0x38 [ 31.583995] kunit_try_run_case+0x14c/0x3d0 [ 31.584603] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.585458] kthread+0x24c/0x2d0 [ 31.586378] ret_from_fork+0x10/0x20 [ 31.587034] [ 31.587453] The buggy address belongs to the physical page: [ 31.588902] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e70 [ 31.589908] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.590931] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.591838] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.592912] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 31.594011] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.594896] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 31.596173] head: 0bfffe0000000002 ffffc1ffc3179c01 ffffffffffffffff 0000000000000000 [ 31.597116] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 31.598593] page dumped because: kasan: bad access detected [ 31.599172] [ 31.599502] Memory state around the buggy address: [ 31.600191] fff00000c5e71f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.601060] fff00000c5e72000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.602806] >fff00000c5e72080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 31.603594] ^ [ 31.604608] fff00000c5e72100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.606003] fff00000c5e72180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.606971] ================================================================== [ 31.609281] ================================================================== [ 31.610480] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 31.611377] Write of size 1 at addr fff00000c5e720da by task kunit_try_catch/150 [ 31.612706] [ 31.613235] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 31.614963] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.615751] Hardware name: linux,dummy-virt (DT) [ 31.616550] Call trace: [ 31.616815] show_stack+0x20/0x38 (C) [ 31.617882] dump_stack_lvl+0x8c/0xd0 [ 31.619000] print_report+0x118/0x5e0 [ 31.619536] kasan_report+0xc8/0x118 [ 31.620169] __asan_report_store1_noabort+0x20/0x30 [ 31.620966] krealloc_less_oob_helper+0xa80/0xc50 [ 31.621927] krealloc_large_less_oob+0x20/0x38 [ 31.622594] kunit_try_run_case+0x14c/0x3d0 [ 31.624079] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.624711] kthread+0x24c/0x2d0 [ 31.625351] ret_from_fork+0x10/0x20 [ 31.625984] [ 31.626394] The buggy address belongs to the physical page: [ 31.627292] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e70 [ 31.628793] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.630607] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.631470] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.632374] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 31.633391] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.634406] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 31.635395] head: 0bfffe0000000002 ffffc1ffc3179c01 ffffffffffffffff 0000000000000000 [ 31.636662] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 31.637527] page dumped because: kasan: bad access detected [ 31.638603] [ 31.638886] Memory state around the buggy address: [ 31.639355] fff00000c5e71f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.640050] fff00000c5e72000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.640743] >fff00000c5e72080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 31.641750] ^ [ 31.642929] fff00000c5e72100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.643911] fff00000c5e72180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.644903] ================================================================== [ 31.234737] ================================================================== [ 31.235719] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 31.236516] Write of size 1 at addr fff00000c09730d0 by task kunit_try_catch/146 [ 31.237234] [ 31.237582] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 31.239611] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.240478] Hardware name: linux,dummy-virt (DT) [ 31.241090] Call trace: [ 31.241643] show_stack+0x20/0x38 (C) [ 31.242570] dump_stack_lvl+0x8c/0xd0 [ 31.243292] print_report+0x118/0x5e0 [ 31.244119] kasan_report+0xc8/0x118 [ 31.244931] __asan_report_store1_noabort+0x20/0x30 [ 31.246116] krealloc_less_oob_helper+0xb9c/0xc50 [ 31.246936] krealloc_less_oob+0x20/0x38 [ 31.247488] kunit_try_run_case+0x14c/0x3d0 [ 31.248015] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.248717] kthread+0x24c/0x2d0 [ 31.249349] ret_from_fork+0x10/0x20 [ 31.250179] [ 31.250578] Allocated by task 146: [ 31.251153] kasan_save_stack+0x3c/0x68 [ 31.251977] kasan_save_track+0x20/0x40 [ 31.252684] kasan_save_alloc_info+0x40/0x58 [ 31.253395] __kasan_krealloc+0x118/0x178 [ 31.254595] krealloc_noprof+0x128/0x360 [ 31.255500] krealloc_less_oob_helper+0x168/0xc50 [ 31.256197] krealloc_less_oob+0x20/0x38 [ 31.256769] kunit_try_run_case+0x14c/0x3d0 [ 31.257365] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.258479] kthread+0x24c/0x2d0 [ 31.258989] ret_from_fork+0x10/0x20 [ 31.259503] [ 31.259844] The buggy address belongs to the object at fff00000c0973000 [ 31.259844] which belongs to the cache kmalloc-256 of size 256 [ 31.261973] The buggy address is located 7 bytes to the right of [ 31.261973] allocated 201-byte region [fff00000c0973000, fff00000c09730c9) [ 31.263811] [ 31.264108] The buggy address belongs to the physical page: [ 31.264815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100972 [ 31.265865] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.267461] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.268563] page_type: f5(slab) [ 31.269242] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.270684] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.271562] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.272579] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.273520] head: 0bfffe0000000001 ffffc1ffc3025c81 ffffffffffffffff 0000000000000000 [ 31.274399] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 31.275693] page dumped because: kasan: bad access detected [ 31.276364] [ 31.276867] Memory state around the buggy address: [ 31.277555] fff00000c0972f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.278966] fff00000c0973000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.281059] >fff00000c0973080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 31.282850] ^ [ 31.283576] fff00000c0973100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.284422] fff00000c0973180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.285355] ================================================================== [ 31.289305] ================================================================== [ 31.290554] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 31.291451] Write of size 1 at addr fff00000c09730da by task kunit_try_catch/146 [ 31.292218] [ 31.292528] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 31.293722] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.294416] Hardware name: linux,dummy-virt (DT) [ 31.295461] Call trace: [ 31.295927] show_stack+0x20/0x38 (C) [ 31.296499] dump_stack_lvl+0x8c/0xd0 [ 31.297072] print_report+0x118/0x5e0 [ 31.297736] kasan_report+0xc8/0x118 [ 31.298271] __asan_report_store1_noabort+0x20/0x30 [ 31.299170] krealloc_less_oob_helper+0xa80/0xc50 [ 31.300215] krealloc_less_oob+0x20/0x38 [ 31.300827] kunit_try_run_case+0x14c/0x3d0 [ 31.301477] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.302333] kthread+0x24c/0x2d0 [ 31.302981] ret_from_fork+0x10/0x20 [ 31.303560] [ 31.303943] Allocated by task 146: [ 31.304434] kasan_save_stack+0x3c/0x68 [ 31.305211] kasan_save_track+0x20/0x40 [ 31.305727] kasan_save_alloc_info+0x40/0x58 [ 31.306947] __kasan_krealloc+0x118/0x178 [ 31.307523] krealloc_noprof+0x128/0x360 [ 31.308194] krealloc_less_oob_helper+0x168/0xc50 [ 31.309424] krealloc_less_oob+0x20/0x38 [ 31.310459] kunit_try_run_case+0x14c/0x3d0 [ 31.311107] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.311791] kthread+0x24c/0x2d0 [ 31.312404] ret_from_fork+0x10/0x20 [ 31.312970] [ 31.313399] The buggy address belongs to the object at fff00000c0973000 [ 31.313399] which belongs to the cache kmalloc-256 of size 256 [ 31.315049] The buggy address is located 17 bytes to the right of [ 31.315049] allocated 201-byte region [fff00000c0973000, fff00000c09730c9) [ 31.316595] [ 31.316939] The buggy address belongs to the physical page: [ 31.317712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100972 [ 31.319326] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.320213] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.321251] page_type: f5(slab) [ 31.322322] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.323377] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.324317] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.325245] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.326265] head: 0bfffe0000000001 ffffc1ffc3025c81 ffffffffffffffff 0000000000000000 [ 31.327143] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 31.328080] page dumped because: kasan: bad access detected [ 31.328745] [ 31.329122] Memory state around the buggy address: [ 31.330651] fff00000c0972f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.331852] fff00000c0973000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.332704] >fff00000c0973080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 31.334182] ^ [ 31.335004] fff00000c0973100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.335922] fff00000c0973180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.336824] ================================================================== [ 31.647247] ================================================================== [ 31.648219] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 31.649075] Write of size 1 at addr fff00000c5e720ea by task kunit_try_catch/150 [ 31.649777] [ 31.650256] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 31.651477] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.652130] Hardware name: linux,dummy-virt (DT) [ 31.653328] Call trace: [ 31.653659] show_stack+0x20/0x38 (C) [ 31.654287] dump_stack_lvl+0x8c/0xd0 [ 31.654997] print_report+0x118/0x5e0 [ 31.655569] kasan_report+0xc8/0x118 [ 31.656720] __asan_report_store1_noabort+0x20/0x30 [ 31.657116] krealloc_less_oob_helper+0xae4/0xc50 [ 31.657447] krealloc_large_less_oob+0x20/0x38 [ 31.658269] kunit_try_run_case+0x14c/0x3d0 [ 31.659202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.659877] kthread+0x24c/0x2d0 [ 31.660503] ret_from_fork+0x10/0x20 [ 31.661232] [ 31.661993] The buggy address belongs to the physical page: [ 31.662990] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e70 [ 31.663996] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.665069] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.666932] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.668050] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 31.669029] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.670547] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 31.671738] head: 0bfffe0000000002 ffffc1ffc3179c01 ffffffffffffffff 0000000000000000 [ 31.672713] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 31.673556] page dumped because: kasan: bad access detected [ 31.674202] [ 31.674540] Memory state around the buggy address: [ 31.675243] fff00000c5e71f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.676601] fff00000c5e72000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.677500] >fff00000c5e72080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 31.679079] ^ [ 31.679665] fff00000c5e72100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.680584] fff00000c5e72180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.681400] ================================================================== [ 31.183468] ================================================================== [ 31.184777] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 31.185798] Write of size 1 at addr fff00000c09730c9 by task kunit_try_catch/146 [ 31.187150] [ 31.187523] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 31.188721] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.189482] Hardware name: linux,dummy-virt (DT) [ 31.190690] Call trace: [ 31.191104] show_stack+0x20/0x38 (C) [ 31.191690] dump_stack_lvl+0x8c/0xd0 [ 31.192284] print_report+0x118/0x5e0 [ 31.192928] kasan_report+0xc8/0x118 [ 31.193527] __asan_report_store1_noabort+0x20/0x30 [ 31.194227] krealloc_less_oob_helper+0xa48/0xc50 [ 31.195345] krealloc_less_oob+0x20/0x38 [ 31.196039] kunit_try_run_case+0x14c/0x3d0 [ 31.196817] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.197602] kthread+0x24c/0x2d0 [ 31.198405] ret_from_fork+0x10/0x20 [ 31.199011] [ 31.199284] Allocated by task 146: [ 31.199884] kasan_save_stack+0x3c/0x68 [ 31.200544] kasan_save_track+0x20/0x40 [ 31.201127] kasan_save_alloc_info+0x40/0x58 [ 31.202120] __kasan_krealloc+0x118/0x178 [ 31.202574] krealloc_noprof+0x128/0x360 [ 31.203288] krealloc_less_oob_helper+0x168/0xc50 [ 31.203958] krealloc_less_oob+0x20/0x38 [ 31.204531] kunit_try_run_case+0x14c/0x3d0 [ 31.205143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.206425] kthread+0x24c/0x2d0 [ 31.207034] ret_from_fork+0x10/0x20 [ 31.207662] [ 31.207988] The buggy address belongs to the object at fff00000c0973000 [ 31.207988] which belongs to the cache kmalloc-256 of size 256 [ 31.209800] The buggy address is located 0 bytes to the right of [ 31.209800] allocated 201-byte region [fff00000c0973000, fff00000c09730c9) [ 31.212167] [ 31.212549] The buggy address belongs to the physical page: [ 31.213180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100972 [ 31.214438] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.215385] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.216188] page_type: f5(slab) [ 31.216729] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.217651] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.219075] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.220139] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.221075] head: 0bfffe0000000001 ffffc1ffc3025c81 ffffffffffffffff 0000000000000000 [ 31.222210] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 31.223398] page dumped because: kasan: bad access detected [ 31.223927] [ 31.224393] Memory state around the buggy address: [ 31.225030] fff00000c0972f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.226175] fff00000c0973000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.227202] >fff00000c0973080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 31.228659] ^ [ 31.229260] fff00000c0973100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.229889] fff00000c0973180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.231107] ================================================================== [ 31.386891] ================================================================== [ 31.387759] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 31.388471] Write of size 1 at addr fff00000c09730eb by task kunit_try_catch/146 [ 31.389350] [ 31.389769] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 31.390993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.391462] Hardware name: linux,dummy-virt (DT) [ 31.392312] Call trace: [ 31.392758] show_stack+0x20/0x38 (C) [ 31.393278] dump_stack_lvl+0x8c/0xd0 [ 31.393870] print_report+0x118/0x5e0 [ 31.394526] kasan_report+0xc8/0x118 [ 31.395269] __asan_report_store1_noabort+0x20/0x30 [ 31.396081] krealloc_less_oob_helper+0xa58/0xc50 [ 31.396748] krealloc_less_oob+0x20/0x38 [ 31.397420] kunit_try_run_case+0x14c/0x3d0 [ 31.397999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.398833] kthread+0x24c/0x2d0 [ 31.399419] ret_from_fork+0x10/0x20 [ 31.400036] [ 31.400449] Allocated by task 146: [ 31.401009] kasan_save_stack+0x3c/0x68 [ 31.401562] kasan_save_track+0x20/0x40 [ 31.402200] kasan_save_alloc_info+0x40/0x58 [ 31.402832] __kasan_krealloc+0x118/0x178 [ 31.403367] krealloc_noprof+0x128/0x360 [ 31.404051] krealloc_less_oob_helper+0x168/0xc50 [ 31.404716] krealloc_less_oob+0x20/0x38 [ 31.405265] kunit_try_run_case+0x14c/0x3d0 [ 31.405844] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.406684] kthread+0x24c/0x2d0 [ 31.407211] ret_from_fork+0x10/0x20 [ 31.407741] [ 31.408181] The buggy address belongs to the object at fff00000c0973000 [ 31.408181] which belongs to the cache kmalloc-256 of size 256 [ 31.409670] The buggy address is located 34 bytes to the right of [ 31.409670] allocated 201-byte region [fff00000c0973000, fff00000c09730c9) [ 31.411121] [ 31.411436] The buggy address belongs to the physical page: [ 31.412110] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100972 [ 31.413082] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.414066] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.415051] page_type: f5(slab) [ 31.415534] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.416416] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.417349] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.418281] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.419264] head: 0bfffe0000000001 ffffc1ffc3025c81 ffffffffffffffff 0000000000000000 [ 31.420165] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 31.421205] page dumped because: kasan: bad access detected [ 31.421884] [ 31.422191] Memory state around the buggy address: [ 31.422841] fff00000c0972f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.423748] fff00000c0973000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.424590] >fff00000c0973080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 31.425495] ^ [ 31.426386] fff00000c0973100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.427296] fff00000c0973180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.428185] ================================================================== [ 31.529056] ================================================================== [ 31.530235] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 31.531506] Write of size 1 at addr fff00000c5e720c9 by task kunit_try_catch/150 [ 31.532511] [ 31.532965] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 31.534663] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.535321] Hardware name: linux,dummy-virt (DT) [ 31.536227] Call trace: [ 31.536614] show_stack+0x20/0x38 (C) [ 31.537226] dump_stack_lvl+0x8c/0xd0 [ 31.537808] print_report+0x118/0x5e0 [ 31.538792] kasan_report+0xc8/0x118 [ 31.539356] __asan_report_store1_noabort+0x20/0x30 [ 31.540056] krealloc_less_oob_helper+0xa48/0xc50 [ 31.540832] krealloc_large_less_oob+0x20/0x38 [ 31.541463] kunit_try_run_case+0x14c/0x3d0 [ 31.542403] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.543175] kthread+0x24c/0x2d0 [ 31.543789] ret_from_fork+0x10/0x20 [ 31.544398] [ 31.544733] The buggy address belongs to the physical page: [ 31.545475] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e70 [ 31.546979] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.547850] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.548831] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.549670] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 31.551647] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.552996] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 31.554023] head: 0bfffe0000000002 ffffc1ffc3179c01 ffffffffffffffff 0000000000000000 [ 31.555328] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 31.556248] page dumped because: kasan: bad access detected [ 31.556885] [ 31.557252] Memory state around the buggy address: [ 31.557890] fff00000c5e71f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.559114] fff00000c5e72000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.559964] >fff00000c5e72080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 31.560940] ^ [ 31.561682] fff00000c5e72100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.563153] fff00000c5e72180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.564003] ================================================================== [ 31.683280] ================================================================== [ 31.685340] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 31.687547] Write of size 1 at addr fff00000c5e720eb by task kunit_try_catch/150 [ 31.690180] [ 31.690977] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 31.692258] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.692942] Hardware name: linux,dummy-virt (DT) [ 31.693535] Call trace: [ 31.694528] show_stack+0x20/0x38 (C) [ 31.695013] dump_stack_lvl+0x8c/0xd0 [ 31.695490] print_report+0x118/0x5e0 [ 31.695837] kasan_report+0xc8/0x118 [ 31.696455] __asan_report_store1_noabort+0x20/0x30 [ 31.697687] krealloc_less_oob_helper+0xa58/0xc50 [ 31.698899] krealloc_large_less_oob+0x20/0x38 [ 31.699608] kunit_try_run_case+0x14c/0x3d0 [ 31.700430] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.701261] kthread+0x24c/0x2d0 [ 31.701544] ret_from_fork+0x10/0x20 [ 31.702300] [ 31.702788] The buggy address belongs to the physical page: [ 31.703930] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e70 [ 31.705237] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.706509] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.707071] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.707518] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 31.707992] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.708440] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 31.709298] head: 0bfffe0000000002 ffffc1ffc3179c01 ffffffffffffffff 0000000000000000 [ 31.710134] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 31.712293] page dumped because: kasan: bad access detected [ 31.712965] [ 31.713212] Memory state around the buggy address: [ 31.714691] fff00000c5e71f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.716078] fff00000c5e72000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.716983] >fff00000c5e72080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 31.718082] ^ [ 31.718753] fff00000c5e72100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.719391] fff00000c5e72180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.720313] ================================================================== [ 31.339516] ================================================================== [ 31.341151] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 31.341616] Write of size 1 at addr fff00000c09730ea by task kunit_try_catch/146 [ 31.343799] [ 31.344234] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 31.345491] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.346315] Hardware name: linux,dummy-virt (DT) [ 31.346954] Call trace: [ 31.347472] show_stack+0x20/0x38 (C) [ 31.348131] dump_stack_lvl+0x8c/0xd0 [ 31.348873] print_report+0x118/0x5e0 [ 31.349449] kasan_report+0xc8/0x118 [ 31.350023] __asan_report_store1_noabort+0x20/0x30 [ 31.350693] krealloc_less_oob_helper+0xae4/0xc50 [ 31.351482] krealloc_less_oob+0x20/0x38 [ 31.352026] kunit_try_run_case+0x14c/0x3d0 [ 31.352870] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.353607] kthread+0x24c/0x2d0 [ 31.354142] ret_from_fork+0x10/0x20 [ 31.354703] [ 31.355055] Allocated by task 146: [ 31.355649] kasan_save_stack+0x3c/0x68 [ 31.356265] kasan_save_track+0x20/0x40 [ 31.356940] kasan_save_alloc_info+0x40/0x58 [ 31.357613] __kasan_krealloc+0x118/0x178 [ 31.358149] krealloc_noprof+0x128/0x360 [ 31.358826] krealloc_less_oob_helper+0x168/0xc50 [ 31.359598] krealloc_less_oob+0x20/0x38 [ 31.360171] kunit_try_run_case+0x14c/0x3d0 [ 31.360831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.361477] kthread+0x24c/0x2d0 [ 31.362077] ret_from_fork+0x10/0x20 [ 31.362729] [ 31.363069] The buggy address belongs to the object at fff00000c0973000 [ 31.363069] which belongs to the cache kmalloc-256 of size 256 [ 31.364559] The buggy address is located 33 bytes to the right of [ 31.364559] allocated 201-byte region [fff00000c0973000, fff00000c09730c9) [ 31.366123] [ 31.366420] The buggy address belongs to the physical page: [ 31.367229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100972 [ 31.368154] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.369065] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.369927] page_type: f5(slab) [ 31.370490] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.371438] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.372426] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.373439] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.374342] head: 0bfffe0000000001 ffffc1ffc3025c81 ffffffffffffffff 0000000000000000 [ 31.375372] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 31.376287] page dumped because: kasan: bad access detected [ 31.376962] [ 31.377292] Memory state around the buggy address: [ 31.377874] fff00000c0972f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.378797] fff00000c0973000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.379752] >fff00000c0973080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 31.380683] ^ [ 31.381517] fff00000c0973100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.382492] fff00000c0973180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.383321] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 31.480477] ================================================================== [ 31.481260] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680 [ 31.483537] Write of size 1 at addr fff00000c5de20f0 by task kunit_try_catch/148 [ 31.484528] [ 31.484902] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 31.486765] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.487802] Hardware name: linux,dummy-virt (DT) [ 31.488941] Call trace: [ 31.489495] show_stack+0x20/0x38 (C) [ 31.489979] dump_stack_lvl+0x8c/0xd0 [ 31.491376] print_report+0x118/0x5e0 [ 31.492067] kasan_report+0xc8/0x118 [ 31.492671] __asan_report_store1_noabort+0x20/0x30 [ 31.493236] krealloc_more_oob_helper+0x5c8/0x680 [ 31.494251] krealloc_large_more_oob+0x20/0x38 [ 31.495420] kunit_try_run_case+0x14c/0x3d0 [ 31.495901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.496802] kthread+0x24c/0x2d0 [ 31.497312] ret_from_fork+0x10/0x20 [ 31.497963] [ 31.498399] The buggy address belongs to the physical page: [ 31.499064] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105de0 [ 31.500513] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.501176] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.503049] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.504137] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 31.505095] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.505975] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 31.507849] head: 0bfffe0000000002 ffffc1ffc3177801 ffffffffffffffff 0000000000000000 [ 31.509856] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 31.511232] page dumped because: kasan: bad access detected [ 31.511917] [ 31.512277] Memory state around the buggy address: [ 31.512907] fff00000c5de1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.514172] fff00000c5de2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.514961] >fff00000c5de2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 31.516691] ^ [ 31.517406] fff00000c5de2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.518878] fff00000c5de2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.519920] ================================================================== [ 31.122019] ================================================================== [ 31.123553] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680 [ 31.125049] Write of size 1 at addr fff00000c0972ef0 by task kunit_try_catch/144 [ 31.126773] [ 31.127560] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 31.129146] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.129764] Hardware name: linux,dummy-virt (DT) [ 31.130731] Call trace: [ 31.131324] show_stack+0x20/0x38 (C) [ 31.131881] dump_stack_lvl+0x8c/0xd0 [ 31.132190] print_report+0x118/0x5e0 [ 31.132478] kasan_report+0xc8/0x118 [ 31.132875] __asan_report_store1_noabort+0x20/0x30 [ 31.133400] krealloc_more_oob_helper+0x5c8/0x680 [ 31.134016] krealloc_more_oob+0x20/0x38 [ 31.135009] kunit_try_run_case+0x14c/0x3d0 [ 31.135689] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.136512] kthread+0x24c/0x2d0 [ 31.137068] ret_from_fork+0x10/0x20 [ 31.137592] [ 31.138055] Allocated by task 144: [ 31.139066] kasan_save_stack+0x3c/0x68 [ 31.139617] kasan_save_track+0x20/0x40 [ 31.140263] kasan_save_alloc_info+0x40/0x58 [ 31.140881] __kasan_krealloc+0x118/0x178 [ 31.141437] krealloc_noprof+0x128/0x360 [ 31.142954] krealloc_more_oob_helper+0x168/0x680 [ 31.143549] krealloc_more_oob+0x20/0x38 [ 31.143928] kunit_try_run_case+0x14c/0x3d0 [ 31.144234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.144582] kthread+0x24c/0x2d0 [ 31.145227] ret_from_fork+0x10/0x20 [ 31.146340] [ 31.146764] The buggy address belongs to the object at fff00000c0972e00 [ 31.146764] which belongs to the cache kmalloc-256 of size 256 [ 31.148329] The buggy address is located 5 bytes to the right of [ 31.148329] allocated 235-byte region [fff00000c0972e00, fff00000c0972eeb) [ 31.150386] [ 31.150816] The buggy address belongs to the physical page: [ 31.151457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100972 [ 31.152681] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.153755] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.154592] page_type: f5(slab) [ 31.155091] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.156793] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.157256] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.157813] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.159653] head: 0bfffe0000000001 ffffc1ffc3025c81 ffffffffffffffff 0000000000000000 [ 31.160709] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 31.161573] page dumped because: kasan: bad access detected [ 31.163287] [ 31.163769] Memory state around the buggy address: [ 31.164605] fff00000c0972d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.165457] fff00000c0972e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.166505] >fff00000c0972e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 31.167500] ^ [ 31.168671] fff00000c0972f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.169962] fff00000c0972f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.171244] ================================================================== [ 31.439095] ================================================================== [ 31.440486] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680 [ 31.441498] Write of size 1 at addr fff00000c5de20eb by task kunit_try_catch/148 [ 31.442715] [ 31.443424] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 31.444778] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.445379] Hardware name: linux,dummy-virt (DT) [ 31.446520] Call trace: [ 31.446987] show_stack+0x20/0x38 (C) [ 31.448050] dump_stack_lvl+0x8c/0xd0 [ 31.448512] print_report+0x118/0x5e0 [ 31.449606] kasan_report+0xc8/0x118 [ 31.450561] __asan_report_store1_noabort+0x20/0x30 [ 31.452356] krealloc_more_oob_helper+0x614/0x680 [ 31.453009] krealloc_large_more_oob+0x20/0x38 [ 31.453761] kunit_try_run_case+0x14c/0x3d0 [ 31.454854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.455691] kthread+0x24c/0x2d0 [ 31.456407] ret_from_fork+0x10/0x20 [ 31.457071] [ 31.457476] The buggy address belongs to the physical page: [ 31.458428] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105de0 [ 31.459416] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.460439] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.461744] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.463659] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 31.464602] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.465820] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 31.467531] head: 0bfffe0000000002 ffffc1ffc3177801 ffffffffffffffff 0000000000000000 [ 31.468281] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 31.469145] page dumped because: kasan: bad access detected [ 31.470369] [ 31.470868] Memory state around the buggy address: [ 31.471591] fff00000c5de1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.472670] fff00000c5de2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.473475] >fff00000c5de2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 31.474613] ^ [ 31.476530] fff00000c5de2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.477605] fff00000c5de2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.478697] ================================================================== [ 31.071601] ================================================================== [ 31.072861] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680 [ 31.073468] Write of size 1 at addr fff00000c0972eeb by task kunit_try_catch/144 [ 31.074568] [ 31.074939] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 31.076928] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.077521] Hardware name: linux,dummy-virt (DT) [ 31.078563] Call trace: [ 31.078981] show_stack+0x20/0x38 (C) [ 31.079654] dump_stack_lvl+0x8c/0xd0 [ 31.080256] print_report+0x118/0x5e0 [ 31.080825] kasan_report+0xc8/0x118 [ 31.081435] __asan_report_store1_noabort+0x20/0x30 [ 31.082565] krealloc_more_oob_helper+0x614/0x680 [ 31.083246] krealloc_more_oob+0x20/0x38 [ 31.083916] kunit_try_run_case+0x14c/0x3d0 [ 31.084665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.085388] kthread+0x24c/0x2d0 [ 31.086336] ret_from_fork+0x10/0x20 [ 31.086928] [ 31.087313] Allocated by task 144: [ 31.087948] kasan_save_stack+0x3c/0x68 [ 31.088649] kasan_save_track+0x20/0x40 [ 31.089122] kasan_save_alloc_info+0x40/0x58 [ 31.090175] __kasan_krealloc+0x118/0x178 [ 31.090653] krealloc_noprof+0x128/0x360 [ 31.091300] krealloc_more_oob_helper+0x168/0x680 [ 31.091961] krealloc_more_oob+0x20/0x38 [ 31.092494] kunit_try_run_case+0x14c/0x3d0 [ 31.093287] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.094541] kthread+0x24c/0x2d0 [ 31.095187] ret_from_fork+0x10/0x20 [ 31.095658] [ 31.096487] The buggy address belongs to the object at fff00000c0972e00 [ 31.096487] which belongs to the cache kmalloc-256 of size 256 [ 31.098544] The buggy address is located 0 bytes to the right of [ 31.098544] allocated 235-byte region [fff00000c0972e00, fff00000c0972eeb) [ 31.100047] [ 31.100366] The buggy address belongs to the physical page: [ 31.101264] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100972 [ 31.102607] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.103564] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.104450] page_type: f5(slab) [ 31.104900] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.106250] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.107107] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.108245] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.109382] head: 0bfffe0000000001 ffffc1ffc3025c81 ffffffffffffffff 0000000000000000 [ 31.110780] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 31.111729] page dumped because: kasan: bad access detected [ 31.112378] [ 31.112735] Memory state around the buggy address: [ 31.113299] fff00000c0972d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.114482] fff00000c0972e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.115860] >fff00000c0972e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 31.116767] ^ [ 31.118020] fff00000c0972f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.119680] fff00000c0972f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.120372] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 31.031381] ================================================================== [ 31.032966] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 31.033613] Read of size 1 at addr fff00000c5e30000 by task kunit_try_catch/142 [ 31.035923] [ 31.036372] CPU: 0 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 31.037767] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.038322] Hardware name: linux,dummy-virt (DT) [ 31.039495] Call trace: [ 31.039971] show_stack+0x20/0x38 (C) [ 31.040521] dump_stack_lvl+0x8c/0xd0 [ 31.041102] print_report+0x118/0x5e0 [ 31.041811] kasan_report+0xc8/0x118 [ 31.042609] __asan_report_load1_noabort+0x20/0x30 [ 31.043472] page_alloc_uaf+0x328/0x350 [ 31.044089] kunit_try_run_case+0x14c/0x3d0 [ 31.044844] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.045494] kthread+0x24c/0x2d0 [ 31.046348] ret_from_fork+0x10/0x20 [ 31.047007] [ 31.047357] The buggy address belongs to the physical page: [ 31.048052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e30 [ 31.049034] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.049906] page_type: f0(buddy) [ 31.050462] raw: 0bfffe0000000000 fff00000ff6150e0 fff00000ff6150e0 0000000000000000 [ 31.051364] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000 [ 31.052717] page dumped because: kasan: bad access detected [ 31.053649] [ 31.054928] Memory state around the buggy address: [ 31.055527] fff00000c5e2ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.056427] fff00000c5e2ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.057364] >fff00000c5e30000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.058679] ^ [ 31.059120] fff00000c5e30080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.060080] fff00000c5e30100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.060882] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[ 30.972417] ================================================================== [ 30.973607] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 30.974272] Free of addr fff00000c5e70001 by task kunit_try_catch/138 [ 30.976151] [ 30.976863] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 30.979306] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.979983] Hardware name: linux,dummy-virt (DT) [ 30.980581] Call trace: [ 30.980971] show_stack+0x20/0x38 (C) [ 30.981672] dump_stack_lvl+0x8c/0xd0 [ 30.982217] print_report+0x118/0x5e0 [ 30.983155] kasan_report_invalid_free+0xb0/0xd8 [ 30.984648] __kasan_kfree_large+0x5c/0xa8 [ 30.985324] free_large_kmalloc+0x58/0x140 [ 30.986222] kfree+0x270/0x3c8 [ 30.986937] kmalloc_large_invalid_free+0x108/0x270 [ 30.987664] kunit_try_run_case+0x14c/0x3d0 [ 30.988297] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.989152] kthread+0x24c/0x2d0 [ 30.989665] ret_from_fork+0x10/0x20 [ 30.990562] [ 30.991374] The buggy address belongs to the physical page: [ 30.992272] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e70 [ 30.993179] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.994326] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.995750] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.996792] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.998499] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.999519] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 31.000508] head: 0bfffe0000000002 ffffc1ffc3179c01 ffffffffffffffff 0000000000000000 [ 31.001531] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 31.002790] page dumped because: kasan: bad access detected [ 31.003428] [ 31.003820] Memory state around the buggy address: [ 31.004457] fff00000c5e6ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.005420] fff00000c5e6ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.006849] >fff00000c5e70000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.007771] ^ [ 31.008214] fff00000c5e70080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.009398] fff00000c5e70100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.010475] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 30.931180] ================================================================== [ 30.932514] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 30.933457] Read of size 1 at addr fff00000c5e70000 by task kunit_try_catch/136 [ 30.934549] [ 30.935106] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 30.936709] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.937433] Hardware name: linux,dummy-virt (DT) [ 30.938294] Call trace: [ 30.938845] show_stack+0x20/0x38 (C) [ 30.940253] dump_stack_lvl+0x8c/0xd0 [ 30.941284] print_report+0x118/0x5e0 [ 30.942064] kasan_report+0xc8/0x118 [ 30.943015] __asan_report_load1_noabort+0x20/0x30 [ 30.943822] kmalloc_large_uaf+0x2cc/0x2f8 [ 30.944494] kunit_try_run_case+0x14c/0x3d0 [ 30.945173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.946001] kthread+0x24c/0x2d0 [ 30.946924] ret_from_fork+0x10/0x20 [ 30.947614] [ 30.948078] The buggy address belongs to the physical page: [ 30.948896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e70 [ 30.949833] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.951303] raw: 0bfffe0000000000 ffffc1ffc3179d08 fff00000da4e2f80 0000000000000000 [ 30.952289] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 30.953243] page dumped because: kasan: bad access detected [ 30.954241] [ 30.954818] Memory state around the buggy address: [ 30.955470] fff00000c5e6ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.956330] fff00000c5e6ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.957552] >fff00000c5e70000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.958865] ^ [ 30.959450] fff00000c5e70080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.960261] fff00000c5e70100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.961196] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 30.885273] ================================================================== [ 30.887081] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 30.888298] Write of size 1 at addr fff00000c5e7200a by task kunit_try_catch/134 [ 30.889487] [ 30.890091] CPU: 0 UID: 0 PID: 134 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 30.892300] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.893178] Hardware name: linux,dummy-virt (DT) [ 30.893960] Call trace: [ 30.894757] show_stack+0x20/0x38 (C) [ 30.895382] dump_stack_lvl+0x8c/0xd0 [ 30.895969] print_report+0x118/0x5e0 [ 30.896697] kasan_report+0xc8/0x118 [ 30.897400] __asan_report_store1_noabort+0x20/0x30 [ 30.898257] kmalloc_large_oob_right+0x278/0x2b8 [ 30.899140] kunit_try_run_case+0x14c/0x3d0 [ 30.899814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.900487] kthread+0x24c/0x2d0 [ 30.901128] ret_from_fork+0x10/0x20 [ 30.901744] [ 30.902450] The buggy address belongs to the physical page: [ 30.903291] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e70 [ 30.904278] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.905320] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.906664] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.908084] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.909060] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.910147] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.911469] head: 0bfffe0000000002 ffffc1ffc3179c01 ffffffffffffffff 0000000000000000 [ 30.912395] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.913320] page dumped because: kasan: bad access detected [ 30.914103] [ 30.915164] Memory state around the buggy address: [ 30.915997] fff00000c5e71f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.917065] fff00000c5e71f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.917832] >fff00000c5e72000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.918702] ^ [ 30.919014] fff00000c5e72080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.919427] fff00000c5e72100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.919860] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 30.822873] ================================================================== [ 30.824258] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 30.825199] Write of size 1 at addr fff00000c6025f00 by task kunit_try_catch/132 [ 30.827289] [ 30.827964] CPU: 1 UID: 0 PID: 132 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 30.830338] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.831350] Hardware name: linux,dummy-virt (DT) [ 30.831726] Call trace: [ 30.831940] show_stack+0x20/0x38 (C) [ 30.832246] dump_stack_lvl+0x8c/0xd0 [ 30.832544] print_report+0x118/0x5e0 [ 30.833447] kasan_report+0xc8/0x118 [ 30.834336] __asan_report_store1_noabort+0x20/0x30 [ 30.835425] kmalloc_big_oob_right+0x2a4/0x2f0 [ 30.836374] kunit_try_run_case+0x14c/0x3d0 [ 30.837259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.838151] kthread+0x24c/0x2d0 [ 30.839249] ret_from_fork+0x10/0x20 [ 30.839852] [ 30.840255] Allocated by task 132: [ 30.840844] kasan_save_stack+0x3c/0x68 [ 30.841448] kasan_save_track+0x20/0x40 [ 30.842108] kasan_save_alloc_info+0x40/0x58 [ 30.843017] __kasan_kmalloc+0xd4/0xd8 [ 30.844154] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.845006] kmalloc_big_oob_right+0xb8/0x2f0 [ 30.846031] kunit_try_run_case+0x14c/0x3d0 [ 30.847033] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.848089] kthread+0x24c/0x2d0 [ 30.848519] ret_from_fork+0x10/0x20 [ 30.849125] [ 30.849491] The buggy address belongs to the object at fff00000c6024000 [ 30.849491] which belongs to the cache kmalloc-8k of size 8192 [ 30.851681] The buggy address is located 0 bytes to the right of [ 30.851681] allocated 7936-byte region [fff00000c6024000, fff00000c6025f00) [ 30.853534] [ 30.854359] The buggy address belongs to the physical page: [ 30.855487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106020 [ 30.856520] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.857475] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.858695] page_type: f5(slab) [ 30.859105] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 30.859897] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 30.861185] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 30.862577] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 30.863570] head: 0bfffe0000000003 ffffc1ffc3180801 ffffffffffffffff 0000000000000000 [ 30.864600] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000 [ 30.865559] page dumped because: kasan: bad access detected [ 30.866645] [ 30.866935] Memory state around the buggy address: [ 30.868361] fff00000c6025e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.869267] fff00000c6025e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.870262] >fff00000c6025f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.871136] ^ [ 30.871600] fff00000c6025f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.872991] fff00000c6026000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.873571] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 30.720088] ================================================================== [ 30.721336] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x414/0x490 [ 30.722231] Write of size 1 at addr fff00000c66da478 by task kunit_try_catch/130 [ 30.723033] [ 30.723403] CPU: 1 UID: 0 PID: 130 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 30.724608] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.725204] Hardware name: linux,dummy-virt (DT) [ 30.726136] Call trace: [ 30.726689] show_stack+0x20/0x38 (C) [ 30.727754] dump_stack_lvl+0x8c/0xd0 [ 30.728935] print_report+0x118/0x5e0 [ 30.729858] kasan_report+0xc8/0x118 [ 30.730586] __asan_report_store1_noabort+0x20/0x30 [ 30.731879] kmalloc_track_caller_oob_right+0x414/0x490 [ 30.733254] kunit_try_run_case+0x14c/0x3d0 [ 30.734111] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.734928] kthread+0x24c/0x2d0 [ 30.735285] ret_from_fork+0x10/0x20 [ 30.735579] [ 30.735866] Allocated by task 130: [ 30.736253] kasan_save_stack+0x3c/0x68 [ 30.736735] kasan_save_track+0x20/0x40 [ 30.737301] kasan_save_alloc_info+0x40/0x58 [ 30.738408] __kasan_kmalloc+0xd4/0xd8 [ 30.739107] __kmalloc_node_track_caller_noprof+0x184/0x4b8 [ 30.739874] kmalloc_track_caller_oob_right+0xa8/0x490 [ 30.740582] kunit_try_run_case+0x14c/0x3d0 [ 30.741295] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.742684] kthread+0x24c/0x2d0 [ 30.743212] ret_from_fork+0x10/0x20 [ 30.743731] [ 30.744164] The buggy address belongs to the object at fff00000c66da400 [ 30.744164] which belongs to the cache kmalloc-128 of size 128 [ 30.745557] The buggy address is located 0 bytes to the right of [ 30.745557] allocated 120-byte region [fff00000c66da400, fff00000c66da478) [ 30.747838] [ 30.748251] The buggy address belongs to the physical page: [ 30.749131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066da [ 30.750786] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.751578] page_type: f5(slab) [ 30.752080] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.752964] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.754149] page dumped because: kasan: bad access detected [ 30.754783] [ 30.755208] Memory state around the buggy address: [ 30.756242] fff00000c66da300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 30.757227] fff00000c66da380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.758642] >fff00000c66da400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.759359] ^ [ 30.760257] fff00000c66da480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.761270] fff00000c66da500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.762467] ================================================================== [ 30.765065] ================================================================== [ 30.766381] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x420/0x490 [ 30.769091] Write of size 1 at addr fff00000c66da578 by task kunit_try_catch/130 [ 30.770852] [ 30.771311] CPU: 1 UID: 0 PID: 130 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 30.773746] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.774150] Hardware name: linux,dummy-virt (DT) [ 30.774489] Call trace: [ 30.774770] show_stack+0x20/0x38 (C) [ 30.775811] dump_stack_lvl+0x8c/0xd0 [ 30.777120] print_report+0x118/0x5e0 [ 30.778120] kasan_report+0xc8/0x118 [ 30.778689] __asan_report_store1_noabort+0x20/0x30 [ 30.779202] kmalloc_track_caller_oob_right+0x420/0x490 [ 30.780239] kunit_try_run_case+0x14c/0x3d0 [ 30.781298] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.782521] kthread+0x24c/0x2d0 [ 30.783084] ret_from_fork+0x10/0x20 [ 30.783672] [ 30.784050] Allocated by task 130: [ 30.784543] kasan_save_stack+0x3c/0x68 [ 30.785248] kasan_save_track+0x20/0x40 [ 30.785776] kasan_save_alloc_info+0x40/0x58 [ 30.786495] __kasan_kmalloc+0xd4/0xd8 [ 30.787052] __kmalloc_node_track_caller_noprof+0x184/0x4b8 [ 30.787905] kmalloc_track_caller_oob_right+0x184/0x490 [ 30.788919] kunit_try_run_case+0x14c/0x3d0 [ 30.790018] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.790970] kthread+0x24c/0x2d0 [ 30.792392] ret_from_fork+0x10/0x20 [ 30.792935] [ 30.793283] The buggy address belongs to the object at fff00000c66da500 [ 30.793283] which belongs to the cache kmalloc-128 of size 128 [ 30.795495] The buggy address is located 0 bytes to the right of [ 30.795495] allocated 120-byte region [fff00000c66da500, fff00000c66da578) [ 30.797464] [ 30.798212] The buggy address belongs to the physical page: [ 30.799004] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066da [ 30.800112] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.800913] page_type: f5(slab) [ 30.801868] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.803129] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.803947] page dumped because: kasan: bad access detected [ 30.804735] [ 30.805043] Memory state around the buggy address: [ 30.805571] fff00000c66da400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.807693] fff00000c66da480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.808490] >fff00000c66da500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.809487] ^ [ 30.810494] fff00000c66da580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.811536] fff00000c66da600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.812617] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 30.639539] ================================================================== [ 30.642929] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 30.643580] Read of size 1 at addr fff00000c638b000 by task kunit_try_catch/128 [ 30.645974] [ 30.646926] CPU: 0 UID: 0 PID: 128 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 30.650006] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.651265] Hardware name: linux,dummy-virt (DT) [ 30.652543] Call trace: [ 30.653482] show_stack+0x20/0x38 (C) [ 30.654521] dump_stack_lvl+0x8c/0xd0 [ 30.655970] print_report+0x118/0x5e0 [ 30.657561] kasan_report+0xc8/0x118 [ 30.658041] __asan_report_load1_noabort+0x20/0x30 [ 30.658505] kmalloc_node_oob_right+0x2f4/0x330 [ 30.661927] kunit_try_run_case+0x14c/0x3d0 [ 30.663410] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.665096] kthread+0x24c/0x2d0 [ 30.666725] ret_from_fork+0x10/0x20 [ 30.667430] [ 30.667684] Allocated by task 128: [ 30.668033] kasan_save_stack+0x3c/0x68 [ 30.668426] kasan_save_track+0x20/0x40 [ 30.671312] kasan_save_alloc_info+0x40/0x58 [ 30.673038] __kasan_kmalloc+0xd4/0xd8 [ 30.673508] __kmalloc_cache_node_noprof+0x168/0x3d0 [ 30.674264] kmalloc_node_oob_right+0xbc/0x330 [ 30.674709] kunit_try_run_case+0x14c/0x3d0 [ 30.675138] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.675611] kthread+0x24c/0x2d0 [ 30.677099] ret_from_fork+0x10/0x20 [ 30.677883] [ 30.678171] The buggy address belongs to the object at fff00000c638a000 [ 30.678171] which belongs to the cache kmalloc-4k of size 4096 [ 30.684790] The buggy address is located 0 bytes to the right of [ 30.684790] allocated 4096-byte region [fff00000c638a000, fff00000c638b000) [ 30.687735] [ 30.688436] The buggy address belongs to the physical page: [ 30.689459] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106388 [ 30.691960] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.692692] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.693597] page_type: f5(slab) [ 30.694283] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 30.696072] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 30.697299] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 30.699083] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 30.699882] head: 0bfffe0000000003 ffffc1ffc318e201 ffffffffffffffff 0000000000000000 [ 30.700807] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000 [ 30.701749] page dumped because: kasan: bad access detected [ 30.702925] [ 30.703203] Memory state around the buggy address: [ 30.703893] fff00000c638af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.704811] fff00000c638af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.705667] >fff00000c638b000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.706896] ^ [ 30.707515] fff00000c638b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.708402] fff00000c638b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.709463] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 30.576959] ================================================================== [ 30.578833] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 30.579811] Read of size 1 at addr fff00000c5b31cdf by task kunit_try_catch/126 [ 30.580939] [ 30.581375] CPU: 0 UID: 0 PID: 126 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 30.583001] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.583604] Hardware name: linux,dummy-virt (DT) [ 30.584355] Call trace: [ 30.584827] show_stack+0x20/0x38 (C) [ 30.585430] dump_stack_lvl+0x8c/0xd0 [ 30.586096] print_report+0x118/0x5e0 [ 30.586803] kasan_report+0xc8/0x118 [ 30.587748] __asan_report_load1_noabort+0x20/0x30 [ 30.588413] kmalloc_oob_left+0x2ec/0x320 [ 30.589199] kunit_try_run_case+0x14c/0x3d0 [ 30.590054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.590611] kthread+0x24c/0x2d0 [ 30.591158] ret_from_fork+0x10/0x20 [ 30.592191] [ 30.592661] Allocated by task 28: [ 30.593153] kasan_save_stack+0x3c/0x68 [ 30.593817] kasan_save_track+0x20/0x40 [ 30.594586] kasan_save_alloc_info+0x40/0x58 [ 30.595355] __kasan_kmalloc+0xd4/0xd8 [ 30.596015] __kmalloc_node_track_caller_noprof+0x184/0x4b8 [ 30.596802] kstrdup+0x54/0xc8 [ 30.597317] devtmpfs_work_loop+0x384/0x590 [ 30.598034] devtmpfsd+0x50/0x58 [ 30.598596] kthread+0x24c/0x2d0 [ 30.599104] ret_from_fork+0x10/0x20 [ 30.600258] [ 30.600977] Freed by task 28: [ 30.601525] kasan_save_stack+0x3c/0x68 [ 30.602125] kasan_save_track+0x20/0x40 [ 30.603180] kasan_save_free_info+0x4c/0x78 [ 30.603919] __kasan_slab_free+0x6c/0x98 [ 30.604364] kfree+0x114/0x3c8 [ 30.604784] devtmpfs_work_loop+0x498/0x590 [ 30.605292] devtmpfsd+0x50/0x58 [ 30.606131] kthread+0x24c/0x2d0 [ 30.606988] ret_from_fork+0x10/0x20 [ 30.607925] [ 30.608369] The buggy address belongs to the object at fff00000c5b31cc0 [ 30.608369] which belongs to the cache kmalloc-16 of size 16 [ 30.610132] The buggy address is located 15 bytes to the right of [ 30.610132] allocated 16-byte region [fff00000c5b31cc0, fff00000c5b31cd0) [ 30.611924] [ 30.612305] The buggy address belongs to the physical page: [ 30.613107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b31 [ 30.613960] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.615328] page_type: f5(slab) [ 30.615954] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 30.617011] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.618128] page dumped because: kasan: bad access detected [ 30.618718] [ 30.619353] Memory state around the buggy address: [ 30.620188] fff00000c5b31b80: fa fb fc fc 00 02 fc fc 00 02 fc fc 00 00 fc fc [ 30.620984] fff00000c5b31c00: 00 06 fc fc 00 06 fc fc fa fb fc fc 00 06 fc fc [ 30.622644] >fff00000c5b31c80: 00 06 fc fc fa fb fc fc fa fb fc fc 00 07 fc fc [ 30.623401] ^ [ 30.624428] fff00000c5b31d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.625589] fff00000c5b31d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.626604] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 30.478515] ================================================================== [ 30.479507] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 30.480359] Write of size 1 at addr fff00000c66da078 by task kunit_try_catch/124 [ 30.481063] [ 30.481333] CPU: 1 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 30.482896] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.483445] Hardware name: linux,dummy-virt (DT) [ 30.484265] Call trace: [ 30.484678] show_stack+0x20/0x38 (C) [ 30.485849] dump_stack_lvl+0x8c/0xd0 [ 30.486875] print_report+0x118/0x5e0 [ 30.487696] kasan_report+0xc8/0x118 [ 30.488117] __asan_report_store1_noabort+0x20/0x30 [ 30.488672] kmalloc_oob_right+0x538/0x660 [ 30.489148] kunit_try_run_case+0x14c/0x3d0 [ 30.490641] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.491608] kthread+0x24c/0x2d0 [ 30.492156] ret_from_fork+0x10/0x20 [ 30.492780] [ 30.493099] Allocated by task 124: [ 30.493664] kasan_save_stack+0x3c/0x68 [ 30.494274] kasan_save_track+0x20/0x40 [ 30.495802] kasan_save_alloc_info+0x40/0x58 [ 30.496377] __kasan_kmalloc+0xd4/0xd8 [ 30.496942] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.498001] kmalloc_oob_right+0xb0/0x660 [ 30.498658] kunit_try_run_case+0x14c/0x3d0 [ 30.499229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.500302] kthread+0x24c/0x2d0 [ 30.500804] ret_from_fork+0x10/0x20 [ 30.501357] [ 30.502721] The buggy address belongs to the object at fff00000c66da000 [ 30.502721] which belongs to the cache kmalloc-128 of size 128 [ 30.504171] The buggy address is located 5 bytes to the right of [ 30.504171] allocated 115-byte region [fff00000c66da000, fff00000c66da073) [ 30.506311] [ 30.506574] The buggy address belongs to the physical page: [ 30.507406] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066da [ 30.508326] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.509345] page_type: f5(slab) [ 30.509861] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.511787] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.512711] page dumped because: kasan: bad access detected [ 30.513338] [ 30.514134] Memory state around the buggy address: [ 30.514670] fff00000c66d9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.515620] fff00000c66d9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.516583] >fff00000c66da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.517487] ^ [ 30.518455] fff00000c66da080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.519188] fff00000c66da100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.520142] ================================================================== [ 30.425199] ================================================================== [ 30.427052] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 30.429365] Write of size 1 at addr fff00000c66da073 by task kunit_try_catch/124 [ 30.430414] [ 30.432816] CPU: 1 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G N 6.13.0-rc1-next-20241204 #1 [ 30.434575] Tainted: [N]=TEST [ 30.435415] Hardware name: linux,dummy-virt (DT) [ 30.437175] Call trace: [ 30.438148] show_stack+0x20/0x38 (C) [ 30.438994] dump_stack_lvl+0x8c/0xd0 [ 30.439700] print_report+0x118/0x5e0 [ 30.440227] kasan_report+0xc8/0x118 [ 30.440847] __asan_report_store1_noabort+0x20/0x30 [ 30.441537] kmalloc_oob_right+0x5a4/0x660 [ 30.442194] kunit_try_run_case+0x14c/0x3d0 [ 30.442955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.443612] kthread+0x24c/0x2d0 [ 30.444301] ret_from_fork+0x10/0x20 [ 30.445100] [ 30.445576] Allocated by task 124: [ 30.446575] kasan_save_stack+0x3c/0x68 [ 30.447153] kasan_save_track+0x20/0x40 [ 30.447839] kasan_save_alloc_info+0x40/0x58 [ 30.448420] __kasan_kmalloc+0xd4/0xd8 [ 30.449028] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.449603] kmalloc_oob_right+0xb0/0x660 [ 30.450412] kunit_try_run_case+0x14c/0x3d0 [ 30.451099] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.452302] kthread+0x24c/0x2d0 [ 30.452937] ret_from_fork+0x10/0x20 [ 30.453592] [ 30.455198] The buggy address belongs to the object at fff00000c66da000 [ 30.455198] which belongs to the cache kmalloc-128 of size 128 [ 30.456616] The buggy address is located 0 bytes to the right of [ 30.456616] allocated 115-byte region [fff00000c66da000, fff00000c66da073) [ 30.458498] [ 30.459047] The buggy address belongs to the physical page: [ 30.460197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066da [ 30.461499] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.463381] page_type: f5(slab) [ 30.464478] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.465439] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.466951] page dumped because: kasan: bad access detected [ 30.467524] [ 30.467841] Memory state around the buggy address: [ 30.468746] fff00000c66d9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.470458] fff00000c66d9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.471803] >fff00000c66da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.472566] ^ [ 30.473300] fff00000c66da080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.474083] fff00000c66da100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.475037] ================================================================== [ 30.521889] ================================================================== [ 30.522989] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 30.524262] Read of size 1 at addr fff00000c66da080 by task kunit_try_catch/124 [ 30.525577] [ 30.526095] CPU: 1 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 30.527784] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.528199] Hardware name: linux,dummy-virt (DT) [ 30.528868] Call trace: [ 30.529240] show_stack+0x20/0x38 (C) [ 30.529685] dump_stack_lvl+0x8c/0xd0 [ 30.530779] print_report+0x118/0x5e0 [ 30.531956] kasan_report+0xc8/0x118 [ 30.532975] __asan_report_load1_noabort+0x20/0x30 [ 30.533668] kmalloc_oob_right+0x5d0/0x660 [ 30.534833] kunit_try_run_case+0x14c/0x3d0 [ 30.535779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.536784] kthread+0x24c/0x2d0 [ 30.537169] ret_from_fork+0x10/0x20 [ 30.538175] [ 30.538537] Allocated by task 124: [ 30.539488] kasan_save_stack+0x3c/0x68 [ 30.540195] kasan_save_track+0x20/0x40 [ 30.540494] kasan_save_alloc_info+0x40/0x58 [ 30.540916] __kasan_kmalloc+0xd4/0xd8 [ 30.541568] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.543358] kmalloc_oob_right+0xb0/0x660 [ 30.543797] kunit_try_run_case+0x14c/0x3d0 [ 30.544617] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.545376] kthread+0x24c/0x2d0 [ 30.545856] ret_from_fork+0x10/0x20 [ 30.546497] [ 30.546937] The buggy address belongs to the object at fff00000c66da000 [ 30.546937] which belongs to the cache kmalloc-128 of size 128 [ 30.549380] The buggy address is located 13 bytes to the right of [ 30.549380] allocated 115-byte region [fff00000c66da000, fff00000c66da073) [ 30.551347] [ 30.551614] The buggy address belongs to the physical page: [ 30.552165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066da [ 30.552942] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.553539] page_type: f5(slab) [ 30.554735] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.555954] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.557007] page dumped because: kasan: bad access detected [ 30.558137] [ 30.558392] Memory state around the buggy address: [ 30.559540] fff00000c66d9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.560831] fff00000c66da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.561933] >fff00000c66da080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.563341] ^ [ 30.564064] fff00000c66da100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.565018] fff00000c66da180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.566457] ==================================================================
Failure - log-parser-boot - internal-error-oops-oops-preempt-smp
KNOWN ISSUE - kunit_test_null_dereference internal oops on qemu-arm64 KUNIT KASAN
[ 154.910228] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP [ 154.911498] Modules linked in: [ 154.912300] CPU: 0 UID: 0 PID: 620 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 154.913616] Tainted: [B]=BAD_PAGE, [N]=TEST [ 154.914521] Hardware name: linux,dummy-virt (DT) [ 154.915404] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 154.916376] pc : kunit_test_null_dereference+0x70/0x170 [ 154.917067] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 154.918037] sp : ffff8000832f7dc0 [ 154.918978] x29: ffff8000832f7e20 x28: 0000000000000000 x27: 0000000000000000 [ 154.920713] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000c81cec80 [ 154.922181] x23: ffff98263c1c2800 x22: ffff98263c1cb3c0 x21: fff00000c81cec88 [ 154.923702] x20: 1ffff0001065efb8 x19: ffff8000800879f0 x18: 000000006f3e42e4 [ 154.925428] x17: 0000000000000001 x16: fff00000da4deca0 x15: fff00000ff615b48 [ 154.927598] x14: 1ffe00001b49bd78 x13: 0000000000000000 x12: fffd8000194813a2 [ 154.928507] x11: 1ffe0000194813a1 x10: fffd8000194813a1 x9 : ffff98263c1c2888 [ 154.929663] x8 : ffff8000832f7cb8 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 154.930827] x5 : ffff70001065efb8 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 154.932014] x2 : dfff800000000000 x1 : fff00000ca409440 x0 : ffff8000800879f0 [ 154.933200] Call trace: [ 154.933732] kunit_test_null_dereference+0x70/0x170 (P) [ 154.934548] kunit_generic_run_threadfn_adapter+0x88/0x100 (L) [ 154.935313] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 154.936230] kthread+0x24c/0x2d0 [ 154.936775] ret_from_fork+0x10/0x20 [ 154.937930] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 154.939697] ---[ end trace 0000000000000000 ]---