Date
Dec. 5, 2024, 2:07 p.m.
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 29.221933] ================================================================== [ 29.223486] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 29.224481] Read of size 1 at addr fff00000c64e0000 by task kunit_try_catch/143 [ 29.225610] [ 29.226022] CPU: 0 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 29.227758] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.228621] Hardware name: linux,dummy-virt (DT) [ 29.229122] Call trace: [ 29.229510] show_stack+0x20/0x38 (C) [ 29.230190] dump_stack_lvl+0x8c/0xd0 [ 29.230944] print_report+0x118/0x5e0 [ 29.232212] kasan_report+0xc8/0x118 [ 29.232961] __asan_report_load1_noabort+0x20/0x30 [ 29.233637] page_alloc_uaf+0x328/0x350 [ 29.234234] kunit_try_run_case+0x14c/0x3d0 [ 29.234800] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.235955] kthread+0x24c/0x2d0 [ 29.236551] ret_from_fork+0x10/0x20 [ 29.237201] [ 29.237531] The buggy address belongs to the physical page: [ 29.238799] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064e0 [ 29.240292] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.241085] page_type: f0(buddy) [ 29.241686] raw: 0bfffe0000000000 fff00000ff615148 fff00000ff615148 0000000000000000 [ 29.242596] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000 [ 29.243860] page dumped because: kasan: bad access detected [ 29.244478] [ 29.244813] Memory state around the buggy address: [ 29.245433] fff00000c64dff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.246705] fff00000c64dff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.247660] >fff00000c64e0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.248553] ^ [ 29.249418] fff00000c64e0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.250297] fff00000c64e0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.251150] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 63.716839] ================================================================== [ 63.717638] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 63.717638] [ 63.718597] Use-after-free read at 0x000000005f542089 (in kfence-#198): [ 63.719591] test_krealloc+0x51c/0x830 [ 63.720366] test_krealloc+0x458/0x830 [ 63.721156] kunit_try_run_case+0x14c/0x3d0 [ 63.722015] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.722772] kthread+0x24c/0x2d0 [ 63.723419] ret_from_fork+0x10/0x20 [ 63.724041] [ 63.724394] kfence-#198: 0x000000005f542089-0x000000004f695cd4, size=32, cache=kmalloc-32 [ 63.724394] [ 63.725578] allocated by task 326 on cpu 1 at 63.715803s (0.009766s ago): [ 63.726691] test_alloc+0x298/0x620 [ 63.727390] test_krealloc+0xc0/0x830 [ 63.727956] kunit_try_run_case+0x14c/0x3d0 [ 63.728714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.729472] kthread+0x24c/0x2d0 [ 63.730171] ret_from_fork+0x10/0x20 [ 63.730747] [ 63.731170] freed by task 326 on cpu 1 at 63.716210s (0.014949s ago): [ 63.732061] krealloc_noprof+0x148/0x360 [ 63.732735] test_krealloc+0x1dc/0x830 [ 63.733362] kunit_try_run_case+0x14c/0x3d0 [ 63.734063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.734889] kthread+0x24c/0x2d0 [ 63.735474] ret_from_fork+0x10/0x20 [ 63.736069] [ 63.736526] CPU: 1 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 63.737802] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.738431] Hardware name: linux,dummy-virt (DT) [ 63.739189] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 29.134709] ================================================================== [ 29.136170] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 29.137313] Read of size 1 at addr fff00000c6490000 by task kunit_try_catch/137 [ 29.138901] [ 29.139205] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 29.141131] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.142107] Hardware name: linux,dummy-virt (DT) [ 29.142767] Call trace: [ 29.143482] show_stack+0x20/0x38 (C) [ 29.144373] dump_stack_lvl+0x8c/0xd0 [ 29.145038] print_report+0x118/0x5e0 [ 29.145638] kasan_report+0xc8/0x118 [ 29.146252] __asan_report_load1_noabort+0x20/0x30 [ 29.146861] kmalloc_large_uaf+0x2cc/0x2f8 [ 29.147542] kunit_try_run_case+0x14c/0x3d0 [ 29.148134] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.149081] kthread+0x24c/0x2d0 [ 29.149553] ret_from_fork+0x10/0x20 [ 29.150089] [ 29.150515] The buggy address belongs to the physical page: [ 29.151157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106490 [ 29.153003] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.154000] raw: 0bfffe0000000000 ffffc1ffc3192508 fff00000da4e3040 0000000000000000 [ 29.154981] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 29.156458] page dumped because: kasan: bad access detected [ 29.157099] [ 29.157433] Memory state around the buggy address: [ 29.158287] fff00000c648ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.159237] fff00000c648ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.160086] >fff00000c6490000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.161412] ^ [ 29.162004] fff00000c6490080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.162910] fff00000c6490100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.163968] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 63.535562] ================================================================== [ 63.536359] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 63.536359] [ 63.537409] Use-after-free read at 0x00000000c4ebd226 (in kfence-#196): [ 63.538562] test_memcache_typesafe_by_rcu+0x280/0x560 [ 63.539553] test_memcache_typesafe_by_rcu+0x260/0x560 [ 63.540373] kunit_try_run_case+0x14c/0x3d0 [ 63.541204] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.542076] kthread+0x24c/0x2d0 [ 63.542524] ret_from_fork+0x10/0x20 [ 63.542969] [ 63.543252] kfence-#196: 0x00000000c4ebd226-0x00000000373ee0c2, size=32, cache=test [ 63.543252] [ 63.544386] allocated by task 324 on cpu 0 at 63.509065s (0.035312s ago): [ 63.545298] test_alloc+0x22c/0x620 [ 63.546031] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 63.546834] kunit_try_run_case+0x14c/0x3d0 [ 63.547507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.548341] kthread+0x24c/0x2d0 [ 63.548904] ret_from_fork+0x10/0x20 [ 63.549479] [ 63.549988] freed by task 324 on cpu 0 at 63.509218s (0.040759s ago): [ 63.551009] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 63.551749] kunit_try_run_case+0x14c/0x3d0 [ 63.552419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.553221] kthread+0x24c/0x2d0 [ 63.553797] ret_from_fork+0x10/0x20 [ 63.554422] [ 63.554832] CPU: 0 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 63.556119] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.556759] Hardware name: linux,dummy-virt (DT) [ 63.557489] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 43.975998] ================================================================== [ 43.977310] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 43.977310] [ 43.978451] Invalid read at 0x00000000ed834bb7: [ 43.979061] test_invalid_access+0xdc/0x1f0 [ 43.980946] kunit_try_run_case+0x14c/0x3d0 [ 43.981688] kunit_try_run_case+0x14c/0x3d0 [ 43.982304] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.983079] kthread+0x24c/0x2d0 [ 43.984279] ret_from_fork+0x10/0x20 [ 43.984935] [ 43.985357] CPU: 1 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 43.986764] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.987998] Hardware name: linux,dummy-virt (DT) [ 43.989127] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 43.744375] ================================================================== [ 43.745144] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 43.745144] [ 43.746071] Corrupted memory at 0x000000005173c554 [ ! . . . . . . . . . . . . . . . ] (in kfence-#192): [ 43.748562] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 43.749259] kunit_try_run_case+0x14c/0x3d0 [ 43.749851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.750583] kthread+0x24c/0x2d0 [ 43.751188] ret_from_fork+0x10/0x20 [ 43.751731] [ 43.752182] kfence-#192: 0x00000000b4e78023-0x00000000774da766, size=73, cache=kmalloc-96 [ 43.752182] [ 43.753371] allocated by task 314 on cpu 0 at 43.743931s (0.009431s ago): [ 43.754335] test_alloc+0x298/0x620 [ 43.754907] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 43.755594] kunit_try_run_case+0x14c/0x3d0 [ 43.756248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.757090] kthread+0x24c/0x2d0 [ 43.757555] ret_from_fork+0x10/0x20 [ 43.758184] [ 43.758535] freed by task 314 on cpu 0 at 43.744178s (0.014347s ago): [ 43.759401] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 43.760237] kunit_try_run_case+0x14c/0x3d0 [ 43.760857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.761652] kthread+0x24c/0x2d0 [ 43.762162] ret_from_fork+0x10/0x20 [ 43.762686] [ 43.763058] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 43.764265] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.764862] Hardware name: linux,dummy-virt (DT) [ 43.765487] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 43.640202] ================================================================== [ 43.640902] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 43.640902] [ 43.641963] Out-of-bounds read at 0x0000000002501113 (105B right of kfence-#191): [ 43.642945] test_kmalloc_aligned_oob_read+0x238/0x468 [ 43.643814] test_kmalloc_aligned_oob_read+0x100/0x468 [ 43.644715] kunit_try_run_case+0x14c/0x3d0 [ 43.645343] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.646088] kthread+0x24c/0x2d0 [ 43.646611] ret_from_fork+0x10/0x20 [ 43.647193] [ 43.647512] kfence-#191: 0x00000000c925a462-0x0000000015e77de7, size=73, cache=kmalloc-96 [ 43.647512] [ 43.648631] allocated by task 312 on cpu 1 at 43.639813s (0.008809s ago): [ 43.649485] test_alloc+0x298/0x620 [ 43.650119] test_kmalloc_aligned_oob_read+0x100/0x468 [ 43.650955] kunit_try_run_case+0x14c/0x3d0 [ 43.651522] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.652384] kthread+0x24c/0x2d0 [ 43.653022] ret_from_fork+0x10/0x20 [ 43.653532] [ 43.653959] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 43.655234] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.655764] Hardware name: linux,dummy-virt (DT) [ 43.656413] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[ 39.272266] ================================================================== [ 39.273048] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 39.273048] [ 39.273971] Corrupted memory at 0x000000003cec2d35 [ ! . . . . . . . . . . . . . . . ] (in kfence-#149): [ 39.277589] test_corruption+0x278/0x378 [ 39.278274] kunit_try_run_case+0x14c/0x3d0 [ 39.278982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.279792] kthread+0x24c/0x2d0 [ 39.280375] ret_from_fork+0x10/0x20 [ 39.280990] [ 39.281330] kfence-#149: 0x00000000eab72c63-0x0000000094d5f37c, size=32, cache=kmalloc-32 [ 39.281330] [ 39.282550] allocated by task 300 on cpu 1 at 39.271806s (0.010734s ago): [ 39.283603] test_alloc+0x298/0x620 [ 39.284260] test_corruption+0xdc/0x378 [ 39.284936] kunit_try_run_case+0x14c/0x3d0 [ 39.285602] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.286411] kthread+0x24c/0x2d0 [ 39.287071] ret_from_fork+0x10/0x20 [ 39.287687] [ 39.288359] freed by task 300 on cpu 1 at 39.271966s (0.016383s ago): [ 39.288948] test_corruption+0x278/0x378 [ 39.289334] kunit_try_run_case+0x14c/0x3d0 [ 39.289752] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.292961] kthread+0x24c/0x2d0 [ 39.293804] ret_from_fork+0x10/0x20 [ 39.295402] [ 39.296344] CPU: 1 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 39.298727] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.300143] Hardware name: linux,dummy-virt (DT) [ 39.301407] ================================================================== [ 39.480280] ================================================================== [ 39.481107] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 39.481107] [ 39.481824] Corrupted memory at 0x00000000d834d574 [ ! ] (in kfence-#151): [ 39.483181] test_corruption+0x284/0x378 [ 39.483764] kunit_try_run_case+0x14c/0x3d0 [ 39.484510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.485309] kthread+0x24c/0x2d0 [ 39.485789] ret_from_fork+0x10/0x20 [ 39.486336] [ 39.486715] kfence-#151: 0x000000005dc35715-0x00000000e38eaca2, size=32, cache=kmalloc-32 [ 39.486715] [ 39.487804] allocated by task 300 on cpu 1 at 39.479810s (0.007985s ago): [ 39.488674] test_alloc+0x298/0x620 [ 39.489156] test_corruption+0x198/0x378 [ 39.489936] kunit_try_run_case+0x14c/0x3d0 [ 39.490569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.491444] kthread+0x24c/0x2d0 [ 39.491981] ret_from_fork+0x10/0x20 [ 39.492681] [ 39.493071] freed by task 300 on cpu 1 at 39.479981s (0.013080s ago): [ 39.493891] test_corruption+0x284/0x378 [ 39.494615] kunit_try_run_case+0x14c/0x3d0 [ 39.495365] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.495957] kthread+0x24c/0x2d0 [ 39.496533] ret_from_fork+0x10/0x20 [ 39.497118] [ 39.497592] CPU: 1 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 39.498900] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.499481] Hardware name: linux,dummy-virt (DT) [ 39.500134] ================================================================== [ 39.584117] ================================================================== [ 39.585013] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 39.585013] [ 39.585901] Corrupted memory at 0x00000000ee26f81d [ ! . . . . . . . . . . . . . . . ] (in kfence-#152): [ 39.588373] test_corruption+0x120/0x378 [ 39.588957] kunit_try_run_case+0x14c/0x3d0 [ 39.589527] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.590417] kthread+0x24c/0x2d0 [ 39.590891] ret_from_fork+0x10/0x20 [ 39.591396] [ 39.591749] kfence-#152: 0x000000007eea6791-0x00000000ab207009, size=32, cache=test [ 39.591749] [ 39.592964] allocated by task 302 on cpu 0 at 39.583920s (0.009035s ago): [ 39.593942] test_alloc+0x22c/0x620 [ 39.594462] test_corruption+0xdc/0x378 [ 39.595118] kunit_try_run_case+0x14c/0x3d0 [ 39.595702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.596503] kthread+0x24c/0x2d0 [ 39.596978] ret_from_fork+0x10/0x20 [ 39.597645] [ 39.598017] freed by task 302 on cpu 0 at 39.583995s (0.014013s ago): [ 39.598776] test_corruption+0x120/0x378 [ 39.599446] kunit_try_run_case+0x14c/0x3d0 [ 39.600163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.600851] kthread+0x24c/0x2d0 [ 39.601426] ret_from_fork+0x10/0x20 [ 39.602047] [ 39.602372] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 39.603589] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.604266] Hardware name: linux,dummy-virt (DT) [ 39.604856] ================================================================== [ 40.000003] ================================================================== [ 40.000824] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 40.000824] [ 40.001724] Corrupted memory at 0x00000000abcd8030 [ ! ] (in kfence-#156): [ 40.002917] test_corruption+0x1d8/0x378 [ 40.003572] kunit_try_run_case+0x14c/0x3d0 [ 40.004259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.005005] kthread+0x24c/0x2d0 [ 40.005496] ret_from_fork+0x10/0x20 [ 40.006151] [ 40.006467] kfence-#156: 0x00000000cceb83fc-0x000000008903fadd, size=32, cache=test [ 40.006467] [ 40.007577] allocated by task 302 on cpu 0 at 39.999781s (0.007787s ago): [ 40.008460] test_alloc+0x22c/0x620 [ 40.009045] test_corruption+0x198/0x378 [ 40.009682] kunit_try_run_case+0x14c/0x3d0 [ 40.010279] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.011022] kthread+0x24c/0x2d0 [ 40.011449] ret_from_fork+0x10/0x20 [ 40.012175] [ 40.012568] freed by task 302 on cpu 0 at 39.999859s (0.012700s ago): [ 40.013299] test_corruption+0x1d8/0x378 [ 40.013979] kunit_try_run_case+0x14c/0x3d0 [ 40.014554] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.015338] kthread+0x24c/0x2d0 [ 40.015831] ret_from_fork+0x10/0x20 [ 40.016423] [ 40.016785] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 40.017986] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.018624] Hardware name: linux,dummy-virt (DT) [ 40.019123] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 39.168295] ================================================================== [ 39.169066] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 39.169066] [ 39.169968] Invalid free of 0x00000000d2b2d440 (in kfence-#148): [ 39.170661] test_invalid_addr_free+0xec/0x238 [ 39.171413] kunit_try_run_case+0x14c/0x3d0 [ 39.172014] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.172783] kthread+0x24c/0x2d0 [ 39.173321] ret_from_fork+0x10/0x20 [ 39.173901] [ 39.174279] kfence-#148: 0x0000000086488266-0x000000007bcc31dd, size=32, cache=test [ 39.174279] [ 39.175250] allocated by task 298 on cpu 0 at 39.168197s (0.007044s ago): [ 39.176161] test_alloc+0x22c/0x620 [ 39.176663] test_invalid_addr_free+0xd4/0x238 [ 39.177516] kunit_try_run_case+0x14c/0x3d0 [ 39.178110] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.178995] kthread+0x24c/0x2d0 [ 39.179506] ret_from_fork+0x10/0x20 [ 39.180102] [ 39.180419] CPU: 0 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 39.181644] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.182238] Hardware name: linux,dummy-virt (DT) [ 39.182838] ================================================================== [ 39.064033] ================================================================== [ 39.064912] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 39.064912] [ 39.065785] Invalid free of 0x00000000864907c0 (in kfence-#147): [ 39.066572] test_invalid_addr_free+0x1ac/0x238 [ 39.067272] kunit_try_run_case+0x14c/0x3d0 [ 39.067903] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.068649] kthread+0x24c/0x2d0 [ 39.069180] ret_from_fork+0x10/0x20 [ 39.069677] [ 39.070064] kfence-#147: 0x000000009a3cd0f5-0x00000000a6a3ca1b, size=32, cache=kmalloc-32 [ 39.070064] [ 39.071037] allocated by task 296 on cpu 0 at 39.063844s (0.007184s ago): [ 39.072111] test_alloc+0x298/0x620 [ 39.072602] test_invalid_addr_free+0xd4/0x238 [ 39.073428] kunit_try_run_case+0x14c/0x3d0 [ 39.074178] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.074900] kthread+0x24c/0x2d0 [ 39.075384] ret_from_fork+0x10/0x20 [ 39.076045] [ 39.076471] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 39.077595] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.078282] Hardware name: linux,dummy-virt (DT) [ 39.078851] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[ 38.960248] ================================================================== [ 38.961040] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 38.961040] [ 38.962087] Invalid free of 0x00000000a1677d62 (in kfence-#146): [ 38.962721] test_double_free+0x100/0x238 [ 38.963475] kunit_try_run_case+0x14c/0x3d0 [ 38.964019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.964565] kthread+0x24c/0x2d0 [ 38.965242] ret_from_fork+0x10/0x20 [ 38.965820] [ 38.966181] kfence-#146: 0x00000000a1677d62-0x000000004d07bffc, size=32, cache=test [ 38.966181] [ 38.967256] allocated by task 294 on cpu 1 at 38.959866s (0.007382s ago): [ 38.968235] test_alloc+0x22c/0x620 [ 38.968755] test_double_free+0xd4/0x238 [ 38.969344] kunit_try_run_case+0x14c/0x3d0 [ 38.969970] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.970633] kthread+0x24c/0x2d0 [ 38.971230] ret_from_fork+0x10/0x20 [ 38.971796] [ 38.972161] freed by task 294 on cpu 1 at 38.959967s (0.012185s ago): [ 38.973008] test_double_free+0xf0/0x238 [ 38.973553] kunit_try_run_case+0x14c/0x3d0 [ 38.974243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.974958] kthread+0x24c/0x2d0 [ 38.975436] ret_from_fork+0x10/0x20 [ 38.976112] [ 38.976510] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 38.977698] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.978334] Hardware name: linux,dummy-virt (DT) [ 38.978965] ================================================================== [ 38.856301] ================================================================== [ 38.857108] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 38.857108] [ 38.858087] Invalid free of 0x00000000119ff20a (in kfence-#145): [ 38.858840] test_double_free+0x1bc/0x238 [ 38.859529] kunit_try_run_case+0x14c/0x3d0 [ 38.860634] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.861360] kthread+0x24c/0x2d0 [ 38.861944] ret_from_fork+0x10/0x20 [ 38.862523] [ 38.862949] kfence-#145: 0x00000000119ff20a-0x00000000339e45ee, size=32, cache=kmalloc-32 [ 38.862949] [ 38.863981] allocated by task 292 on cpu 0 at 38.855810s (0.008162s ago): [ 38.864905] test_alloc+0x298/0x620 [ 38.865430] test_double_free+0xd4/0x238 [ 38.866005] kunit_try_run_case+0x14c/0x3d0 [ 38.866676] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.867361] kthread+0x24c/0x2d0 [ 38.867983] ret_from_fork+0x10/0x20 [ 38.868509] [ 38.868827] freed by task 292 on cpu 0 at 38.855930s (0.012888s ago): [ 38.869685] test_double_free+0x1ac/0x238 [ 38.870220] kunit_try_run_case+0x14c/0x3d0 [ 38.870913] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.871609] kthread+0x24c/0x2d0 [ 38.872184] ret_from_fork+0x10/0x20 [ 38.872629] [ 38.873097] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 38.874352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.875007] Hardware name: linux,dummy-virt (DT) [ 38.875699] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 38.544278] ================================================================== [ 38.545141] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 38.545141] [ 38.546328] Use-after-free read at 0x00000000a3367d76 (in kfence-#142): [ 38.546995] test_use_after_free_read+0x114/0x248 [ 38.547727] test_use_after_free_read+0xf0/0x248 [ 38.548354] kunit_try_run_case+0x14c/0x3d0 [ 38.549002] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.549687] kthread+0x24c/0x2d0 [ 38.550225] ret_from_fork+0x10/0x20 [ 38.550752] [ 38.551100] kfence-#142: 0x00000000a3367d76-0x00000000f8cfd6d9, size=32, cache=test [ 38.551100] [ 38.551942] allocated by task 286 on cpu 1 at 38.543981s (0.007952s ago): [ 38.552603] test_alloc+0x22c/0x620 [ 38.553295] test_use_after_free_read+0xd0/0x248 [ 38.554126] kunit_try_run_case+0x14c/0x3d0 [ 38.554987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.555733] kthread+0x24c/0x2d0 [ 38.556260] ret_from_fork+0x10/0x20 [ 38.556953] [ 38.557342] freed by task 286 on cpu 1 at 38.544061s (0.013271s ago): [ 38.558475] test_use_after_free_read+0xf0/0x248 [ 38.559035] kunit_try_run_case+0x14c/0x3d0 [ 38.559738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.560492] kthread+0x24c/0x2d0 [ 38.560947] ret_from_fork+0x10/0x20 [ 38.561644] [ 38.561994] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 38.563322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.563968] Hardware name: linux,dummy-virt (DT) [ 38.564540] ================================================================== [ 38.440370] ================================================================== [ 38.441226] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 38.441226] [ 38.442359] Use-after-free read at 0x000000005363260a (in kfence-#141): [ 38.443146] test_use_after_free_read+0x114/0x248 [ 38.443771] test_use_after_free_read+0x1c0/0x248 [ 38.444454] kunit_try_run_case+0x14c/0x3d0 [ 38.445158] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.445755] kthread+0x24c/0x2d0 [ 38.446397] ret_from_fork+0x10/0x20 [ 38.447258] [ 38.448195] kfence-#141: 0x000000005363260a-0x000000008947792c, size=32, cache=kmalloc-32 [ 38.448195] [ 38.449170] allocated by task 284 on cpu 1 at 38.439869s (0.009291s ago): [ 38.450007] test_alloc+0x298/0x620 [ 38.450569] test_use_after_free_read+0xd0/0x248 [ 38.451373] kunit_try_run_case+0x14c/0x3d0 [ 38.451984] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.452677] kthread+0x24c/0x2d0 [ 38.453225] ret_from_fork+0x10/0x20 [ 38.453852] [ 38.454411] freed by task 284 on cpu 1 at 38.439988s (0.014252s ago): [ 38.455429] test_use_after_free_read+0x1c0/0x248 [ 38.456161] kunit_try_run_case+0x14c/0x3d0 [ 38.456721] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.457488] kthread+0x24c/0x2d0 [ 38.458111] ret_from_fork+0x10/0x20 [ 38.458868] [ 38.459273] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 38.460627] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.461264] Hardware name: linux,dummy-virt (DT) [ 38.461909] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 38.332019] ================================================================== [ 38.332868] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 38.332868] [ 38.333859] Out-of-bounds write at 0x000000004452669d (1B left of kfence-#140): [ 38.334928] test_out_of_bounds_write+0x100/0x240 [ 38.335625] test_out_of_bounds_write+0xc8/0x240 [ 38.336554] kunit_try_run_case+0x14c/0x3d0 [ 38.337299] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.338183] kthread+0x24c/0x2d0 [ 38.338827] ret_from_fork+0x10/0x20 [ 38.339474] [ 38.339889] kfence-#140: 0x000000008f165d43-0x00000000abfd8761, size=32, cache=test [ 38.339889] [ 38.341046] allocated by task 282 on cpu 1 at 38.331848s (0.009189s ago): [ 38.342087] test_alloc+0x22c/0x620 [ 38.342823] test_out_of_bounds_write+0xc8/0x240 [ 38.343445] kunit_try_run_case+0x14c/0x3d0 [ 38.344096] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.344866] kthread+0x24c/0x2d0 [ 38.345389] ret_from_fork+0x10/0x20 [ 38.346030] [ 38.346363] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 38.347495] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.348122] Hardware name: linux,dummy-virt (DT) [ 38.348699] ================================================================== [ 38.020120] ================================================================== [ 38.021052] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 38.021052] [ 38.022272] Out-of-bounds write at 0x0000000074f38218 (1B left of kfence-#137): [ 38.023204] test_out_of_bounds_write+0x100/0x240 [ 38.024377] test_out_of_bounds_write+0xc8/0x240 [ 38.025063] kunit_try_run_case+0x14c/0x3d0 [ 38.025850] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.026559] kthread+0x24c/0x2d0 [ 38.027209] ret_from_fork+0x10/0x20 [ 38.027754] [ 38.028168] kfence-#137: 0x00000000bbdb1d19-0x000000005fd9b2d9, size=32, cache=kmalloc-32 [ 38.028168] [ 38.029313] allocated by task 280 on cpu 1 at 38.019904s (0.009400s ago): [ 38.030200] test_alloc+0x298/0x620 [ 38.030861] test_out_of_bounds_write+0xc8/0x240 [ 38.031484] kunit_try_run_case+0x14c/0x3d0 [ 38.032179] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.032910] kthread+0x24c/0x2d0 [ 38.033506] ret_from_fork+0x10/0x20 [ 38.034078] [ 38.034415] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 38.035747] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.036446] Hardware name: linux,dummy-virt (DT) [ 38.037077] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 37.916042] ================================================================== [ 37.917007] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 37.917007] [ 37.918009] Out-of-bounds read at 0x00000000225f3778 (32B right of kfence-#136): [ 37.918928] test_out_of_bounds_read+0x1c8/0x3e0 [ 37.919756] test_out_of_bounds_read+0x198/0x3e0 [ 37.920548] kunit_try_run_case+0x14c/0x3d0 [ 37.921130] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.921868] kthread+0x24c/0x2d0 [ 37.922493] ret_from_fork+0x10/0x20 [ 37.923060] [ 37.923397] kfence-#136: 0x00000000a5ab6b24-0x000000008279d173, size=32, cache=test [ 37.923397] [ 37.924415] allocated by task 278 on cpu 0 at 37.915904s (0.008502s ago): [ 37.925358] test_alloc+0x22c/0x620 [ 37.925927] test_out_of_bounds_read+0x198/0x3e0 [ 37.926557] kunit_try_run_case+0x14c/0x3d0 [ 37.927271] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.928020] kthread+0x24c/0x2d0 [ 37.928448] ret_from_fork+0x10/0x20 [ 37.929124] [ 37.929449] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 37.930556] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.931256] Hardware name: linux,dummy-virt (DT) [ 37.931869] ================================================================== [ 37.500131] ================================================================== [ 37.500850] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 37.500850] [ 37.501789] Out-of-bounds read at 0x00000000650f0bc7 (32B right of kfence-#132): [ 37.503086] test_out_of_bounds_read+0x1c8/0x3e0 [ 37.503852] test_out_of_bounds_read+0x198/0x3e0 [ 37.504658] kunit_try_run_case+0x14c/0x3d0 [ 37.505305] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.505984] kthread+0x24c/0x2d0 [ 37.506605] ret_from_fork+0x10/0x20 [ 37.507220] [ 37.507564] kfence-#132: 0x0000000055f81137-0x00000000129a2513, size=32, cache=kmalloc-32 [ 37.507564] [ 37.508791] allocated by task 276 on cpu 1 at 37.499801s (0.008981s ago): [ 37.509562] test_alloc+0x298/0x620 [ 37.510192] test_out_of_bounds_read+0x198/0x3e0 [ 37.510940] kunit_try_run_case+0x14c/0x3d0 [ 37.511525] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.512321] kthread+0x24c/0x2d0 [ 37.512824] ret_from_fork+0x10/0x20 [ 37.513385] [ 37.513750] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 37.514824] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.515509] Hardware name: linux,dummy-virt (DT) [ 37.516136] ================================================================== [ 37.397104] ================================================================== [ 37.397981] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 37.397981] [ 37.399156] Out-of-bounds read at 0x00000000d55dd1b3 (1B left of kfence-#131): [ 37.400644] test_out_of_bounds_read+0x114/0x3e0 [ 37.401238] test_out_of_bounds_read+0xdc/0x3e0 [ 37.402018] kunit_try_run_case+0x14c/0x3d0 [ 37.402575] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.403408] kthread+0x24c/0x2d0 [ 37.403939] ret_from_fork+0x10/0x20 [ 37.404565] [ 37.405169] kfence-#131: 0x000000002b217142-0x00000000cd330071, size=32, cache=kmalloc-32 [ 37.405169] [ 37.406634] allocated by task 276 on cpu 1 at 37.395927s (0.010587s ago): [ 37.408010] test_alloc+0x298/0x620 [ 37.408566] test_out_of_bounds_read+0xdc/0x3e0 [ 37.409206] kunit_try_run_case+0x14c/0x3d0 [ 37.409793] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.410643] kthread+0x24c/0x2d0 [ 37.411175] ret_from_fork+0x10/0x20 [ 37.411845] [ 37.412286] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 37.413464] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.414038] Hardware name: linux,dummy-virt (DT) [ 37.414626] ================================================================== [ 37.604019] ================================================================== [ 37.605082] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 37.605082] [ 37.606077] Out-of-bounds read at 0x000000003f583c71 (1B left of kfence-#133): [ 37.606932] test_out_of_bounds_read+0x114/0x3e0 [ 37.608181] test_out_of_bounds_read+0xdc/0x3e0 [ 37.608713] kunit_try_run_case+0x14c/0x3d0 [ 37.609435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.610278] kthread+0x24c/0x2d0 [ 37.610826] ret_from_fork+0x10/0x20 [ 37.611471] [ 37.611781] kfence-#133: 0x0000000048b17d69-0x0000000090fcbd1a, size=32, cache=test [ 37.611781] [ 37.612808] allocated by task 278 on cpu 0 at 37.603853s (0.008945s ago): [ 37.613806] test_alloc+0x22c/0x620 [ 37.614367] test_out_of_bounds_read+0xdc/0x3e0 [ 37.614957] kunit_try_run_case+0x14c/0x3d0 [ 37.615709] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.616288] kthread+0x24c/0x2d0 [ 37.616857] ret_from_fork+0x10/0x20 [ 37.617461] [ 37.617809] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 37.619078] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.619748] Hardware name: linux,dummy-virt (DT) [ 37.620394] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 37.142773] ================================================================== [ 37.144546] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 37.145363] Write of size 121 at addr fff00000c669bf00 by task kunit_try_catch/274 [ 37.146170] [ 37.146554] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 37.147751] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.148318] Hardware name: linux,dummy-virt (DT) [ 37.149152] Call trace: [ 37.149687] show_stack+0x20/0x38 (C) [ 37.150317] dump_stack_lvl+0x8c/0xd0 [ 37.150858] print_report+0x118/0x5e0 [ 37.151631] kasan_report+0xc8/0x118 [ 37.152197] kasan_check_range+0x100/0x1a8 [ 37.152893] __kasan_check_write+0x20/0x30 [ 37.153517] strncpy_from_user+0x3c/0x2a0 [ 37.154103] copy_user_test_oob+0x5c0/0xec0 [ 37.154660] kunit_try_run_case+0x14c/0x3d0 [ 37.155474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.156418] kthread+0x24c/0x2d0 [ 37.156914] ret_from_fork+0x10/0x20 [ 37.157415] [ 37.157745] Allocated by task 274: [ 37.158175] kasan_save_stack+0x3c/0x68 [ 37.158892] kasan_save_track+0x20/0x40 [ 37.159365] kasan_save_alloc_info+0x40/0x58 [ 37.159958] __kasan_kmalloc+0xd4/0xd8 [ 37.160597] __kmalloc_noprof+0x188/0x4c8 [ 37.161190] kunit_kmalloc_array+0x34/0x88 [ 37.161829] copy_user_test_oob+0xac/0xec0 [ 37.162363] kunit_try_run_case+0x14c/0x3d0 [ 37.163105] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.163690] kthread+0x24c/0x2d0 [ 37.164344] ret_from_fork+0x10/0x20 [ 37.164972] [ 37.165266] The buggy address belongs to the object at fff00000c669bf00 [ 37.165266] which belongs to the cache kmalloc-128 of size 128 [ 37.166756] The buggy address is located 0 bytes inside of [ 37.166756] allocated 120-byte region [fff00000c669bf00, fff00000c669bf78) [ 37.168151] [ 37.168453] The buggy address belongs to the physical page: [ 37.169103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669b [ 37.170288] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.171286] page_type: f5(slab) [ 37.171768] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.172731] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.173724] page dumped because: kasan: bad access detected [ 37.174484] [ 37.174800] Memory state around the buggy address: [ 37.175443] fff00000c669be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.176358] fff00000c669be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.177380] >fff00000c669bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.178652] ^ [ 37.179657] fff00000c669bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.180550] fff00000c669c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.181456] ================================================================== [ 37.183268] ================================================================== [ 37.184027] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 37.185098] Write of size 1 at addr fff00000c669bf78 by task kunit_try_catch/274 [ 37.186162] [ 37.186522] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 37.187938] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.188527] Hardware name: linux,dummy-virt (DT) [ 37.189172] Call trace: [ 37.189532] show_stack+0x20/0x38 (C) [ 37.190000] dump_stack_lvl+0x8c/0xd0 [ 37.190739] print_report+0x118/0x5e0 [ 37.191519] kasan_report+0xc8/0x118 [ 37.192264] __asan_report_store1_noabort+0x20/0x30 [ 37.193051] strncpy_from_user+0x270/0x2a0 [ 37.193688] copy_user_test_oob+0x5c0/0xec0 [ 37.194416] kunit_try_run_case+0x14c/0x3d0 [ 37.195154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.195819] kthread+0x24c/0x2d0 [ 37.196498] ret_from_fork+0x10/0x20 [ 37.197050] [ 37.197431] Allocated by task 274: [ 37.197972] kasan_save_stack+0x3c/0x68 [ 37.198709] kasan_save_track+0x20/0x40 [ 37.199281] kasan_save_alloc_info+0x40/0x58 [ 37.200069] __kasan_kmalloc+0xd4/0xd8 [ 37.200595] __kmalloc_noprof+0x188/0x4c8 [ 37.201246] kunit_kmalloc_array+0x34/0x88 [ 37.201974] copy_user_test_oob+0xac/0xec0 [ 37.202677] kunit_try_run_case+0x14c/0x3d0 [ 37.203362] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.204110] kthread+0x24c/0x2d0 [ 37.204604] ret_from_fork+0x10/0x20 [ 37.205211] [ 37.205526] The buggy address belongs to the object at fff00000c669bf00 [ 37.205526] which belongs to the cache kmalloc-128 of size 128 [ 37.207028] The buggy address is located 0 bytes to the right of [ 37.207028] allocated 120-byte region [fff00000c669bf00, fff00000c669bf78) [ 37.208485] [ 37.208788] The buggy address belongs to the physical page: [ 37.209439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669b [ 37.210570] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.211476] page_type: f5(slab) [ 37.212002] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.213040] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.214013] page dumped because: kasan: bad access detected [ 37.214694] [ 37.215033] Memory state around the buggy address: [ 37.215597] fff00000c669be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.216452] fff00000c669be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.217387] >fff00000c669bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.218275] ^ [ 37.219134] fff00000c669bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.220009] fff00000c669c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.220813] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 36.870548] ================================================================== [ 36.872284] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0 [ 36.873233] Write of size 121 at addr fff00000c669bf00 by task kunit_try_catch/274 [ 36.874308] [ 36.874651] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.876589] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.877145] Hardware name: linux,dummy-virt (DT) [ 36.877685] Call trace: [ 36.878193] show_stack+0x20/0x38 (C) [ 36.878785] dump_stack_lvl+0x8c/0xd0 [ 36.879486] print_report+0x118/0x5e0 [ 36.880100] kasan_report+0xc8/0x118 [ 36.880756] kasan_check_range+0x100/0x1a8 [ 36.881700] __kasan_check_write+0x20/0x30 [ 36.882301] copy_user_test_oob+0x234/0xec0 [ 36.882922] kunit_try_run_case+0x14c/0x3d0 [ 36.883795] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.884708] kthread+0x24c/0x2d0 [ 36.885301] ret_from_fork+0x10/0x20 [ 36.885869] [ 36.886230] Allocated by task 274: [ 36.886776] kasan_save_stack+0x3c/0x68 [ 36.887701] kasan_save_track+0x20/0x40 [ 36.888291] kasan_save_alloc_info+0x40/0x58 [ 36.888964] __kasan_kmalloc+0xd4/0xd8 [ 36.889536] __kmalloc_noprof+0x188/0x4c8 [ 36.890213] kunit_kmalloc_array+0x34/0x88 [ 36.890892] copy_user_test_oob+0xac/0xec0 [ 36.892057] kunit_try_run_case+0x14c/0x3d0 [ 36.892675] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.893671] kthread+0x24c/0x2d0 [ 36.894266] ret_from_fork+0x10/0x20 [ 36.894768] [ 36.895163] The buggy address belongs to the object at fff00000c669bf00 [ 36.895163] which belongs to the cache kmalloc-128 of size 128 [ 36.896672] The buggy address is located 0 bytes inside of [ 36.896672] allocated 120-byte region [fff00000c669bf00, fff00000c669bf78) [ 36.898339] [ 36.898538] The buggy address belongs to the physical page: [ 36.898896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669b [ 36.899589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.900537] page_type: f5(slab) [ 36.901079] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 36.902011] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 36.903055] page dumped because: kasan: bad access detected [ 36.904043] [ 36.904358] Memory state around the buggy address: [ 36.904927] fff00000c669be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 36.905893] fff00000c669be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.906723] >fff00000c669bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 36.907989] ^ [ 36.908829] fff00000c669bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.909665] fff00000c669c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.910596] ================================================================== [ 36.918104] ================================================================== [ 36.918896] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0 [ 36.919922] Read of size 121 at addr fff00000c669bf00 by task kunit_try_catch/274 [ 36.921844] [ 36.922579] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.924717] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.925260] Hardware name: linux,dummy-virt (DT) [ 36.925902] Call trace: [ 36.926357] show_stack+0x20/0x38 (C) [ 36.926972] dump_stack_lvl+0x8c/0xd0 [ 36.927421] print_report+0x118/0x5e0 [ 36.928416] kasan_report+0xc8/0x118 [ 36.928978] kasan_check_range+0x100/0x1a8 [ 36.929648] __kasan_check_read+0x20/0x30 [ 36.930272] copy_user_test_oob+0x728/0xec0 [ 36.930909] kunit_try_run_case+0x14c/0x3d0 [ 36.931805] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.932626] kthread+0x24c/0x2d0 [ 36.933165] ret_from_fork+0x10/0x20 [ 36.933725] [ 36.934104] Allocated by task 274: [ 36.934697] kasan_save_stack+0x3c/0x68 [ 36.935198] kasan_save_track+0x20/0x40 [ 36.935925] kasan_save_alloc_info+0x40/0x58 [ 36.936501] __kasan_kmalloc+0xd4/0xd8 [ 36.937108] __kmalloc_noprof+0x188/0x4c8 [ 36.937711] kunit_kmalloc_array+0x34/0x88 [ 36.938585] copy_user_test_oob+0xac/0xec0 [ 36.939665] kunit_try_run_case+0x14c/0x3d0 [ 36.940426] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.941156] kthread+0x24c/0x2d0 [ 36.941600] ret_from_fork+0x10/0x20 [ 36.942253] [ 36.942572] The buggy address belongs to the object at fff00000c669bf00 [ 36.942572] which belongs to the cache kmalloc-128 of size 128 [ 36.944262] The buggy address is located 0 bytes inside of [ 36.944262] allocated 120-byte region [fff00000c669bf00, fff00000c669bf78) [ 36.945691] [ 36.946052] The buggy address belongs to the physical page: [ 36.946691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669b [ 36.948320] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.949002] page_type: f5(slab) [ 36.949361] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 36.950225] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 36.951431] page dumped because: kasan: bad access detected [ 36.952241] [ 36.952487] Memory state around the buggy address: [ 36.953260] fff00000c669be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.954181] fff00000c669be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.954995] >fff00000c669bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 36.956462] ^ [ 36.957682] fff00000c669bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.958629] fff00000c669c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.959595] ================================================================== [ 37.010658] ================================================================== [ 37.011633] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0 [ 37.012527] Read of size 121 at addr fff00000c669bf00 by task kunit_try_catch/274 [ 37.013790] [ 37.014253] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 37.015762] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.016476] Hardware name: linux,dummy-virt (DT) [ 37.017544] Call trace: [ 37.018056] show_stack+0x20/0x38 (C) [ 37.018742] dump_stack_lvl+0x8c/0xd0 [ 37.019728] print_report+0x118/0x5e0 [ 37.020340] kasan_report+0xc8/0x118 [ 37.021048] kasan_check_range+0x100/0x1a8 [ 37.021808] __kasan_check_read+0x20/0x30 [ 37.022511] copy_user_test_oob+0x3c8/0xec0 [ 37.023208] kunit_try_run_case+0x14c/0x3d0 [ 37.023973] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.024801] kthread+0x24c/0x2d0 [ 37.025419] ret_from_fork+0x10/0x20 [ 37.026050] [ 37.026412] Allocated by task 274: [ 37.027052] kasan_save_stack+0x3c/0x68 [ 37.028026] kasan_save_track+0x20/0x40 [ 37.028687] kasan_save_alloc_info+0x40/0x58 [ 37.029381] __kasan_kmalloc+0xd4/0xd8 [ 37.029917] __kmalloc_noprof+0x188/0x4c8 [ 37.030726] kunit_kmalloc_array+0x34/0x88 [ 37.031350] copy_user_test_oob+0xac/0xec0 [ 37.032002] kunit_try_run_case+0x14c/0x3d0 [ 37.032678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.033441] kthread+0x24c/0x2d0 [ 37.034079] ret_from_fork+0x10/0x20 [ 37.034808] [ 37.035308] The buggy address belongs to the object at fff00000c669bf00 [ 37.035308] which belongs to the cache kmalloc-128 of size 128 [ 37.037253] The buggy address is located 0 bytes inside of [ 37.037253] allocated 120-byte region [fff00000c669bf00, fff00000c669bf78) [ 37.039215] [ 37.039582] The buggy address belongs to the physical page: [ 37.040489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669b [ 37.041679] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.042596] page_type: f5(slab) [ 37.043154] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.044332] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.045284] page dumped because: kasan: bad access detected [ 37.046043] [ 37.046555] Memory state around the buggy address: [ 37.047225] fff00000c669be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.049178] fff00000c669be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.050619] >fff00000c669bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.051899] ^ [ 37.052354] fff00000c669bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.052767] fff00000c669c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.054054] ================================================================== [ 37.098307] ================================================================== [ 37.099059] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0 [ 37.100808] Read of size 121 at addr fff00000c669bf00 by task kunit_try_catch/274 [ 37.101687] [ 37.102053] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 37.103614] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.104474] Hardware name: linux,dummy-virt (DT) [ 37.105030] Call trace: [ 37.105475] show_stack+0x20/0x38 (C) [ 37.106032] dump_stack_lvl+0x8c/0xd0 [ 37.106666] print_report+0x118/0x5e0 [ 37.107412] kasan_report+0xc8/0x118 [ 37.108062] kasan_check_range+0x100/0x1a8 [ 37.108720] __kasan_check_read+0x20/0x30 [ 37.109358] copy_user_test_oob+0x4a0/0xec0 [ 37.110003] kunit_try_run_case+0x14c/0x3d0 [ 37.110651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.111686] kthread+0x24c/0x2d0 [ 37.112204] ret_from_fork+0x10/0x20 [ 37.112856] [ 37.113253] Allocated by task 274: [ 37.113697] kasan_save_stack+0x3c/0x68 [ 37.114315] kasan_save_track+0x20/0x40 [ 37.115034] kasan_save_alloc_info+0x40/0x58 [ 37.115728] __kasan_kmalloc+0xd4/0xd8 [ 37.116058] __kmalloc_noprof+0x188/0x4c8 [ 37.116349] kunit_kmalloc_array+0x34/0x88 [ 37.116643] copy_user_test_oob+0xac/0xec0 [ 37.117064] kunit_try_run_case+0x14c/0x3d0 [ 37.117901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.118954] kthread+0x24c/0x2d0 [ 37.119782] ret_from_fork+0x10/0x20 [ 37.120938] [ 37.121209] The buggy address belongs to the object at fff00000c669bf00 [ 37.121209] which belongs to the cache kmalloc-128 of size 128 [ 37.122834] The buggy address is located 0 bytes inside of [ 37.122834] allocated 120-byte region [fff00000c669bf00, fff00000c669bf78) [ 37.124972] [ 37.125306] The buggy address belongs to the physical page: [ 37.126281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669b [ 37.127498] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.128635] page_type: f5(slab) [ 37.129485] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.130601] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.131851] page dumped because: kasan: bad access detected [ 37.132870] [ 37.133237] Memory state around the buggy address: [ 37.134128] fff00000c669be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.135153] fff00000c669be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.136269] >fff00000c669bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.137087] ^ [ 37.137779] fff00000c669bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.139071] fff00000c669c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.140644] ================================================================== [ 37.055830] ================================================================== [ 37.056488] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0 [ 37.057114] Write of size 121 at addr fff00000c669bf00 by task kunit_try_catch/274 [ 37.058036] [ 37.058393] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 37.059516] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.060145] Hardware name: linux,dummy-virt (DT) [ 37.061591] Call trace: [ 37.062115] show_stack+0x20/0x38 (C) [ 37.062996] dump_stack_lvl+0x8c/0xd0 [ 37.064091] print_report+0x118/0x5e0 [ 37.064919] kasan_report+0xc8/0x118 [ 37.065487] kasan_check_range+0x100/0x1a8 [ 37.066220] __kasan_check_write+0x20/0x30 [ 37.066835] copy_user_test_oob+0x434/0xec0 [ 37.067822] kunit_try_run_case+0x14c/0x3d0 [ 37.068434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.069228] kthread+0x24c/0x2d0 [ 37.069806] ret_from_fork+0x10/0x20 [ 37.070442] [ 37.070771] Allocated by task 274: [ 37.071548] kasan_save_stack+0x3c/0x68 [ 37.072192] kasan_save_track+0x20/0x40 [ 37.072644] kasan_save_alloc_info+0x40/0x58 [ 37.073362] __kasan_kmalloc+0xd4/0xd8 [ 37.073862] __kmalloc_noprof+0x188/0x4c8 [ 37.074452] kunit_kmalloc_array+0x34/0x88 [ 37.075254] copy_user_test_oob+0xac/0xec0 [ 37.075911] kunit_try_run_case+0x14c/0x3d0 [ 37.076684] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.077421] kthread+0x24c/0x2d0 [ 37.077947] ret_from_fork+0x10/0x20 [ 37.078681] [ 37.079029] The buggy address belongs to the object at fff00000c669bf00 [ 37.079029] which belongs to the cache kmalloc-128 of size 128 [ 37.081635] The buggy address is located 0 bytes inside of [ 37.081635] allocated 120-byte region [fff00000c669bf00, fff00000c669bf78) [ 37.083121] [ 37.083472] The buggy address belongs to the physical page: [ 37.084550] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669b [ 37.085632] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.086540] page_type: f5(slab) [ 37.087513] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.088413] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.089550] page dumped because: kasan: bad access detected [ 37.090235] [ 37.090605] Memory state around the buggy address: [ 37.091615] fff00000c669be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.092483] fff00000c669be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.093176] >fff00000c669bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.094135] ^ [ 37.095006] fff00000c669bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.096046] fff00000c669c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.096990] ================================================================== [ 36.967911] ================================================================== [ 36.968663] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0 [ 36.969473] Write of size 121 at addr fff00000c669bf00 by task kunit_try_catch/274 [ 36.970269] [ 36.970671] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.972167] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.972749] Hardware name: linux,dummy-virt (DT) [ 36.973296] Call trace: [ 36.973774] show_stack+0x20/0x38 (C) [ 36.974439] dump_stack_lvl+0x8c/0xd0 [ 36.975143] print_report+0x118/0x5e0 [ 36.975947] kasan_report+0xc8/0x118 [ 36.976502] kasan_check_range+0x100/0x1a8 [ 36.977137] __kasan_check_write+0x20/0x30 [ 36.977995] copy_user_test_oob+0x35c/0xec0 [ 36.978628] kunit_try_run_case+0x14c/0x3d0 [ 36.979275] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.980236] kthread+0x24c/0x2d0 [ 36.980930] ret_from_fork+0x10/0x20 [ 36.981539] [ 36.981825] Allocated by task 274: [ 36.982478] kasan_save_stack+0x3c/0x68 [ 36.983222] kasan_save_track+0x20/0x40 [ 36.983994] kasan_save_alloc_info+0x40/0x58 [ 36.984981] __kasan_kmalloc+0xd4/0xd8 [ 36.985678] __kmalloc_noprof+0x188/0x4c8 [ 36.986493] kunit_kmalloc_array+0x34/0x88 [ 36.987085] copy_user_test_oob+0xac/0xec0 [ 36.987851] kunit_try_run_case+0x14c/0x3d0 [ 36.988773] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.990064] kthread+0x24c/0x2d0 [ 36.991272] ret_from_fork+0x10/0x20 [ 36.992262] [ 36.992539] The buggy address belongs to the object at fff00000c669bf00 [ 36.992539] which belongs to the cache kmalloc-128 of size 128 [ 36.994217] The buggy address is located 0 bytes inside of [ 36.994217] allocated 120-byte region [fff00000c669bf00, fff00000c669bf78) [ 36.995821] [ 36.996282] The buggy address belongs to the physical page: [ 36.997002] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669b [ 36.998078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.999027] page_type: f5(slab) [ 36.999634] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.000663] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.001618] page dumped because: kasan: bad access detected [ 37.002401] [ 37.002736] Memory state around the buggy address: [ 37.003523] fff00000c669be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.004469] fff00000c669be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.005435] >fff00000c669bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.006355] ^ [ 37.007368] fff00000c669bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.008452] fff00000c669c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.009511] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 36.798084] ================================================================== [ 36.799507] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 36.800216] Write of size 8 at addr fff00000c669bb78 by task kunit_try_catch/270 [ 36.802007] [ 36.802340] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.803717] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.804521] Hardware name: linux,dummy-virt (DT) [ 36.805008] Call trace: [ 36.805568] show_stack+0x20/0x38 (C) [ 36.806217] dump_stack_lvl+0x8c/0xd0 [ 36.807016] print_report+0x118/0x5e0 [ 36.807927] kasan_report+0xc8/0x118 [ 36.808669] kasan_check_range+0x100/0x1a8 [ 36.809515] __kasan_check_write+0x20/0x30 [ 36.810249] copy_to_kernel_nofault+0x8c/0x250 [ 36.810847] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 36.812219] kunit_try_run_case+0x14c/0x3d0 [ 36.812943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.813651] kthread+0x24c/0x2d0 [ 36.814133] ret_from_fork+0x10/0x20 [ 36.814794] [ 36.815238] Allocated by task 270: [ 36.815974] kasan_save_stack+0x3c/0x68 [ 36.816548] kasan_save_track+0x20/0x40 [ 36.817112] kasan_save_alloc_info+0x40/0x58 [ 36.817712] __kasan_kmalloc+0xd4/0xd8 [ 36.818706] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.819600] copy_to_kernel_nofault_oob+0xc8/0x418 [ 36.820324] kunit_try_run_case+0x14c/0x3d0 [ 36.821716] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.822550] kthread+0x24c/0x2d0 [ 36.823509] ret_from_fork+0x10/0x20 [ 36.824467] [ 36.824738] The buggy address belongs to the object at fff00000c669bb00 [ 36.824738] which belongs to the cache kmalloc-128 of size 128 [ 36.826348] The buggy address is located 0 bytes to the right of [ 36.826348] allocated 120-byte region [fff00000c669bb00, fff00000c669bb78) [ 36.828583] [ 36.828921] The buggy address belongs to the physical page: [ 36.829637] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669b [ 36.830584] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.831635] page_type: f5(slab) [ 36.832183] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 36.833111] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 36.834095] page dumped because: kasan: bad access detected [ 36.834802] [ 36.835381] Memory state around the buggy address: [ 36.836014] fff00000c669ba00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.836923] fff00000c669ba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.837864] >fff00000c669bb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 36.838710] ^ [ 36.840425] fff00000c669bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.841503] fff00000c669bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.842403] ================================================================== [ 36.752496] ================================================================== [ 36.753808] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 36.754733] Read of size 8 at addr fff00000c669bb78 by task kunit_try_catch/270 [ 36.755747] [ 36.757000] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.758348] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.758940] Hardware name: linux,dummy-virt (DT) [ 36.759757] Call trace: [ 36.760161] show_stack+0x20/0x38 (C) [ 36.760953] dump_stack_lvl+0x8c/0xd0 [ 36.761545] print_report+0x118/0x5e0 [ 36.762202] kasan_report+0xc8/0x118 [ 36.762863] __asan_report_load8_noabort+0x20/0x30 [ 36.763503] copy_to_kernel_nofault+0x204/0x250 [ 36.764286] copy_to_kernel_nofault_oob+0x158/0x418 [ 36.765466] kunit_try_run_case+0x14c/0x3d0 [ 36.766091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.766870] kthread+0x24c/0x2d0 [ 36.767478] ret_from_fork+0x10/0x20 [ 36.768041] [ 36.768351] Allocated by task 270: [ 36.768797] kasan_save_stack+0x3c/0x68 [ 36.769530] kasan_save_track+0x20/0x40 [ 36.770219] kasan_save_alloc_info+0x40/0x58 [ 36.770915] __kasan_kmalloc+0xd4/0xd8 [ 36.771580] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.772282] copy_to_kernel_nofault_oob+0xc8/0x418 [ 36.772970] kunit_try_run_case+0x14c/0x3d0 [ 36.773729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.774771] kthread+0x24c/0x2d0 [ 36.775702] ret_from_fork+0x10/0x20 [ 36.776595] [ 36.776931] The buggy address belongs to the object at fff00000c669bb00 [ 36.776931] which belongs to the cache kmalloc-128 of size 128 [ 36.778492] The buggy address is located 0 bytes to the right of [ 36.778492] allocated 120-byte region [fff00000c669bb00, fff00000c669bb78) [ 36.780168] [ 36.780846] The buggy address belongs to the physical page: [ 36.781741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669b [ 36.782943] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.784437] page_type: f5(slab) [ 36.785183] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 36.786153] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 36.787027] page dumped because: kasan: bad access detected [ 36.788046] [ 36.788380] Memory state around the buggy address: [ 36.789003] fff00000c669ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 36.789931] fff00000c669ba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.790865] >fff00000c669bb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 36.791975] ^ [ 36.792931] fff00000c669bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.793941] fff00000c669bc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.795353] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 32.892427] ================================================================== [ 32.893930] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x230/0x268 [ 32.894870] Read of size 1 at addr ffff800080be7cba by task kunit_try_catch/238 [ 32.896469] [ 32.896774] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.898118] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.898415] Hardware name: linux,dummy-virt (DT) [ 32.898709] Call trace: [ 32.898959] show_stack+0x20/0x38 (C) [ 32.899511] dump_stack_lvl+0x8c/0xd0 [ 32.900309] print_report+0x2fc/0x5e0 [ 32.901676] kasan_report+0xc8/0x118 [ 32.902288] __asan_report_load1_noabort+0x20/0x30 [ 32.903029] kasan_stack_oob+0x230/0x268 [ 32.903705] kunit_try_run_case+0x14c/0x3d0 [ 32.904569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.905137] kthread+0x24c/0x2d0 [ 32.906161] ret_from_fork+0x10/0x20 [ 32.906842] [ 32.908151] The buggy address belongs to stack of task kunit_try_catch/238 [ 32.909299] and is located at offset 138 in frame: [ 32.909973] kasan_stack_oob+0x0/0x268 [ 32.910709] [ 32.911137] This frame has 4 objects: [ 32.911791] [48, 49) '__assertion' [ 32.911962] [64, 72) 'array' [ 32.912929] [96, 112) '__assertion' [ 32.913363] [128, 138) 'stack_array' [ 32.913996] [ 32.914698] The buggy address belongs to the virtual mapping at [ 32.914698] [ffff800080be0000, ffff800080be9000) created by: [ 32.914698] kernel_clone+0x140/0x788 [ 32.916751] [ 32.917053] The buggy address belongs to the physical page: [ 32.918056] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10657e [ 32.919183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.919947] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.921063] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.922083] page dumped because: kasan: bad access detected [ 32.922768] [ 32.923138] Memory state around the buggy address: [ 32.924097] ffff800080be7b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.924741] ffff800080be7c00: 00 00 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 [ 32.925410] >ffff800080be7c80: f2 f2 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 [ 32.926396] ^ [ 32.927227] ffff800080be7d00: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 [ 32.928301] ffff800080be7d80: f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 [ 32.929388] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 36.672958] ================================================================== [ 36.673600] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 36.675270] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/258 [ 36.676237] [ 36.676559] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.678353] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.678865] Hardware name: linux,dummy-virt (DT) [ 36.680043] Call trace: [ 36.680378] show_stack+0x20/0x38 (C) [ 36.680841] dump_stack_lvl+0x8c/0xd0 [ 36.681744] print_report+0x2fc/0x5e0 [ 36.682525] kasan_report+0xc8/0x118 [ 36.683142] __asan_report_load1_noabort+0x20/0x30 [ 36.684549] vmalloc_oob+0x51c/0x5d0 [ 36.685112] kunit_try_run_case+0x14c/0x3d0 [ 36.685731] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.686452] kthread+0x24c/0x2d0 [ 36.687121] ret_from_fork+0x10/0x20 [ 36.687686] [ 36.688049] The buggy address belongs to the virtual mapping at [ 36.688049] [ffff80008010b000, ffff80008010d000) created by: [ 36.688049] vmalloc_oob+0x98/0x5d0 [ 36.690903] [ 36.691230] The buggy address belongs to the physical page: [ 36.692293] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106690 [ 36.693297] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.694314] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 36.695611] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 36.696306] page dumped because: kasan: bad access detected [ 36.696992] [ 36.697419] Memory state around the buggy address: [ 36.698203] ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.699079] ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.699847] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 36.700671] ^ [ 36.701781] ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 36.702817] ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 36.703640] ================================================================== [ 36.640319] ================================================================== [ 36.641742] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 36.642614] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/258 [ 36.643946] [ 36.644597] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.645970] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.646736] Hardware name: linux,dummy-virt (DT) [ 36.647454] Call trace: [ 36.647985] show_stack+0x20/0x38 (C) [ 36.648515] dump_stack_lvl+0x8c/0xd0 [ 36.649102] print_report+0x2fc/0x5e0 [ 36.649745] kasan_report+0xc8/0x118 [ 36.650318] __asan_report_load1_noabort+0x20/0x30 [ 36.651031] vmalloc_oob+0x578/0x5d0 [ 36.651556] kunit_try_run_case+0x14c/0x3d0 [ 36.652688] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.653431] kthread+0x24c/0x2d0 [ 36.653947] ret_from_fork+0x10/0x20 [ 36.654662] [ 36.655008] The buggy address belongs to the virtual mapping at [ 36.655008] [ffff80008010b000, ffff80008010d000) created by: [ 36.655008] vmalloc_oob+0x98/0x5d0 [ 36.657390] [ 36.657840] The buggy address belongs to the physical page: [ 36.658586] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106690 [ 36.659691] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.660496] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 36.661757] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 36.663029] page dumped because: kasan: bad access detected [ 36.664338] [ 36.664981] Memory state around the buggy address: [ 36.665487] ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.666180] ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.667063] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 36.668217] ^ [ 36.669459] ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 36.670514] ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 36.671652] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 36.586967] ================================================================== [ 36.587901] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 36.588701] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 36.589496] [ 36.589821] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.590889] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.591591] Hardware name: linux,dummy-virt (DT) [ 36.592302] Call trace: [ 36.592694] show_stack+0x20/0x38 (C) [ 36.593259] dump_stack_lvl+0x8c/0xd0 [ 36.593928] print_report+0x118/0x5e0 [ 36.594609] kasan_report+0xc8/0x118 [ 36.595252] kasan_check_range+0x100/0x1a8 [ 36.595995] __kasan_check_write+0x20/0x30 [ 36.596563] kasan_atomics_helper+0x17ec/0x4858 [ 36.597276] kasan_atomics+0x198/0x2e8 [ 36.597857] kunit_try_run_case+0x14c/0x3d0 [ 36.598589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.599327] kthread+0x24c/0x2d0 [ 36.599913] ret_from_fork+0x10/0x20 [ 36.600454] [ 36.600735] Allocated by task 254: [ 36.601326] kasan_save_stack+0x3c/0x68 [ 36.601960] kasan_save_track+0x20/0x40 [ 36.602534] kasan_save_alloc_info+0x40/0x58 [ 36.603096] __kasan_kmalloc+0xd4/0xd8 [ 36.603637] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.604157] kasan_atomics+0xb8/0x2e8 [ 36.604788] kunit_try_run_case+0x14c/0x3d0 [ 36.605416] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.606109] kthread+0x24c/0x2d0 [ 36.606604] ret_from_fork+0x10/0x20 [ 36.607265] [ 36.607560] The buggy address belongs to the object at fff00000c664f800 [ 36.607560] which belongs to the cache kmalloc-64 of size 64 [ 36.609051] The buggy address is located 0 bytes to the right of [ 36.609051] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 36.610477] [ 36.610798] The buggy address belongs to the physical page: [ 36.611460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 36.612477] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.613256] page_type: f5(slab) [ 36.613773] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.614745] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.615713] page dumped because: kasan: bad access detected [ 36.616331] [ 36.616701] Memory state around the buggy address: [ 36.617361] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.618261] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.619220] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.620066] ^ [ 36.620716] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.621621] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.622533] ================================================================== [ 35.504552] ================================================================== [ 35.505258] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 35.506270] Read of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.507126] [ 35.507440] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.508678] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.509261] Hardware name: linux,dummy-virt (DT) [ 35.509965] Call trace: [ 35.510311] show_stack+0x20/0x38 (C) [ 35.510982] dump_stack_lvl+0x8c/0xd0 [ 35.511549] print_report+0x118/0x5e0 [ 35.512191] kasan_report+0xc8/0x118 [ 35.512758] __asan_report_load8_noabort+0x20/0x30 [ 35.513452] kasan_atomics_helper+0x3f58/0x4858 [ 35.514217] kasan_atomics+0x198/0x2e8 [ 35.514790] kunit_try_run_case+0x14c/0x3d0 [ 35.515516] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.516289] kthread+0x24c/0x2d0 [ 35.516829] ret_from_fork+0x10/0x20 [ 35.517478] [ 35.517900] Allocated by task 254: [ 35.518439] kasan_save_stack+0x3c/0x68 [ 35.519044] kasan_save_track+0x20/0x40 [ 35.519617] kasan_save_alloc_info+0x40/0x58 [ 35.520264] __kasan_kmalloc+0xd4/0xd8 [ 35.520723] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.521429] kasan_atomics+0xb8/0x2e8 [ 35.521986] kunit_try_run_case+0x14c/0x3d0 [ 35.522715] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.523414] kthread+0x24c/0x2d0 [ 35.524024] ret_from_fork+0x10/0x20 [ 35.524536] [ 35.524835] The buggy address belongs to the object at fff00000c664f800 [ 35.524835] which belongs to the cache kmalloc-64 of size 64 [ 35.526264] The buggy address is located 0 bytes to the right of [ 35.526264] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.527570] [ 35.527955] The buggy address belongs to the physical page: [ 35.528622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.529647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.530784] page_type: f5(slab) [ 35.531325] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.531774] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.532907] page dumped because: kasan: bad access detected [ 35.533680] [ 35.534026] Memory state around the buggy address: [ 35.534740] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.535818] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.536725] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.537679] ^ [ 35.538367] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.539275] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.540191] ================================================================== [ 34.136082] ================================================================== [ 34.136926] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 34.138089] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.139864] [ 34.140777] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.142010] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.142589] Hardware name: linux,dummy-virt (DT) [ 34.143365] Call trace: [ 34.144159] show_stack+0x20/0x38 (C) [ 34.144615] dump_stack_lvl+0x8c/0xd0 [ 34.145199] print_report+0x118/0x5e0 [ 34.145919] kasan_report+0xc8/0x118 [ 34.146986] kasan_check_range+0x100/0x1a8 [ 34.148002] __kasan_check_read+0x20/0x30 [ 34.148568] kasan_atomics_helper+0x1ec/0x4858 [ 34.149301] kasan_atomics+0x198/0x2e8 [ 34.149810] kunit_try_run_case+0x14c/0x3d0 [ 34.150428] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.151161] kthread+0x24c/0x2d0 [ 34.151789] ret_from_fork+0x10/0x20 [ 34.152443] [ 34.152865] Allocated by task 254: [ 34.153569] kasan_save_stack+0x3c/0x68 [ 34.154349] kasan_save_track+0x20/0x40 [ 34.155941] kasan_save_alloc_info+0x40/0x58 [ 34.156479] __kasan_kmalloc+0xd4/0xd8 [ 34.157080] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.157726] kasan_atomics+0xb8/0x2e8 [ 34.158368] kunit_try_run_case+0x14c/0x3d0 [ 34.158945] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.159797] kthread+0x24c/0x2d0 [ 34.160759] ret_from_fork+0x10/0x20 [ 34.161681] [ 34.162297] The buggy address belongs to the object at fff00000c664f800 [ 34.162297] which belongs to the cache kmalloc-64 of size 64 [ 34.164162] The buggy address is located 0 bytes to the right of [ 34.164162] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.165571] [ 34.165866] The buggy address belongs to the physical page: [ 34.166785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.168016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.168816] page_type: f5(slab) [ 34.169320] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.170780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.172289] page dumped because: kasan: bad access detected [ 34.173231] [ 34.173411] Memory state around the buggy address: [ 34.173717] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.174789] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.176155] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.177377] ^ [ 34.178387] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.178944] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.180370] ================================================================== [ 34.648792] ================================================================== [ 34.649598] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 34.650412] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.651449] [ 34.652042] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.653348] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.653779] Hardware name: linux,dummy-virt (DT) [ 34.654507] Call trace: [ 34.654865] show_stack+0x20/0x38 (C) [ 34.655513] dump_stack_lvl+0x8c/0xd0 [ 34.656266] print_report+0x118/0x5e0 [ 34.656773] kasan_report+0xc8/0x118 [ 34.657446] kasan_check_range+0x100/0x1a8 [ 34.658044] __kasan_check_write+0x20/0x30 [ 34.658715] kasan_atomics_helper+0x61c/0x4858 [ 34.659428] kasan_atomics+0x198/0x2e8 [ 34.660122] kunit_try_run_case+0x14c/0x3d0 [ 34.660759] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.661516] kthread+0x24c/0x2d0 [ 34.662065] ret_from_fork+0x10/0x20 [ 34.662711] [ 34.663108] Allocated by task 254: [ 34.663591] kasan_save_stack+0x3c/0x68 [ 34.664206] kasan_save_track+0x20/0x40 [ 34.664761] kasan_save_alloc_info+0x40/0x58 [ 34.665483] __kasan_kmalloc+0xd4/0xd8 [ 34.665999] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.666743] kasan_atomics+0xb8/0x2e8 [ 34.667339] kunit_try_run_case+0x14c/0x3d0 [ 34.668067] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.668889] kthread+0x24c/0x2d0 [ 34.669315] ret_from_fork+0x10/0x20 [ 34.669921] [ 34.670319] The buggy address belongs to the object at fff00000c664f800 [ 34.670319] which belongs to the cache kmalloc-64 of size 64 [ 34.671679] The buggy address is located 0 bytes to the right of [ 34.671679] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.673093] [ 34.673466] The buggy address belongs to the physical page: [ 34.674219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.675158] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.675965] page_type: f5(slab) [ 34.676422] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.677414] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.678394] page dumped because: kasan: bad access detected [ 34.679112] [ 34.679458] Memory state around the buggy address: [ 34.680173] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.680982] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.681964] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.682865] ^ [ 34.683520] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.684428] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.685309] ================================================================== [ 34.728077] ================================================================== [ 34.728920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 34.729831] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.731005] [ 34.731477] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.733039] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.733704] Hardware name: linux,dummy-virt (DT) [ 34.734418] Call trace: [ 34.734952] show_stack+0x20/0x38 (C) [ 34.735557] dump_stack_lvl+0x8c/0xd0 [ 34.736289] print_report+0x118/0x5e0 [ 34.736984] kasan_report+0xc8/0x118 [ 34.737611] kasan_check_range+0x100/0x1a8 [ 34.738301] __kasan_check_write+0x20/0x30 [ 34.739005] kasan_atomics_helper+0x6ec/0x4858 [ 34.739801] kasan_atomics+0x198/0x2e8 [ 34.740536] kunit_try_run_case+0x14c/0x3d0 [ 34.741234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.742108] kthread+0x24c/0x2d0 [ 34.742630] ret_from_fork+0x10/0x20 [ 34.743293] [ 34.743626] Allocated by task 254: [ 34.744258] kasan_save_stack+0x3c/0x68 [ 34.744964] kasan_save_track+0x20/0x40 [ 34.745713] kasan_save_alloc_info+0x40/0x58 [ 34.746405] __kasan_kmalloc+0xd4/0xd8 [ 34.747074] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.747765] kasan_atomics+0xb8/0x2e8 [ 34.748388] kunit_try_run_case+0x14c/0x3d0 [ 34.749147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.749950] kthread+0x24c/0x2d0 [ 34.750568] ret_from_fork+0x10/0x20 [ 34.751321] [ 34.751772] The buggy address belongs to the object at fff00000c664f800 [ 34.751772] which belongs to the cache kmalloc-64 of size 64 [ 34.753239] The buggy address is located 0 bytes to the right of [ 34.753239] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.754794] [ 34.755296] The buggy address belongs to the physical page: [ 34.756113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.757109] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.757976] page_type: f5(slab) [ 34.758521] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.759529] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.760476] page dumped because: kasan: bad access detected [ 34.761236] [ 34.761567] Memory state around the buggy address: [ 34.762343] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.763323] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.764330] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.765246] ^ [ 34.765973] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.766984] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.767866] ================================================================== [ 36.273066] ================================================================== [ 36.273892] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 36.275764] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 36.276734] [ 36.277236] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.278485] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.279132] Hardware name: linux,dummy-virt (DT) [ 36.279865] Call trace: [ 36.280443] show_stack+0x20/0x38 (C) [ 36.281122] dump_stack_lvl+0x8c/0xd0 [ 36.281766] print_report+0x118/0x5e0 [ 36.282423] kasan_report+0xc8/0x118 [ 36.283064] kasan_check_range+0x100/0x1a8 [ 36.283708] __kasan_check_write+0x20/0x30 [ 36.284401] kasan_atomics_helper+0x15b4/0x4858 [ 36.285123] kasan_atomics+0x198/0x2e8 [ 36.285754] kunit_try_run_case+0x14c/0x3d0 [ 36.286450] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.287256] kthread+0x24c/0x2d0 [ 36.287857] ret_from_fork+0x10/0x20 [ 36.288577] [ 36.288922] Allocated by task 254: [ 36.289509] kasan_save_stack+0x3c/0x68 [ 36.290163] kasan_save_track+0x20/0x40 [ 36.290863] kasan_save_alloc_info+0x40/0x58 [ 36.291596] __kasan_kmalloc+0xd4/0xd8 [ 36.292330] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.293042] kasan_atomics+0xb8/0x2e8 [ 36.293594] kunit_try_run_case+0x14c/0x3d0 [ 36.294261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.295100] kthread+0x24c/0x2d0 [ 36.295653] ret_from_fork+0x10/0x20 [ 36.296306] [ 36.296722] The buggy address belongs to the object at fff00000c664f800 [ 36.296722] which belongs to the cache kmalloc-64 of size 64 [ 36.298157] The buggy address is located 0 bytes to the right of [ 36.298157] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 36.299757] [ 36.300211] The buggy address belongs to the physical page: [ 36.301055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 36.302068] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.302945] page_type: f5(slab) [ 36.303522] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.304477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.305443] page dumped because: kasan: bad access detected [ 36.306227] [ 36.306693] Memory state around the buggy address: [ 36.307366] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.308385] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.309401] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.310347] ^ [ 36.311099] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.312128] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.313038] ================================================================== [ 34.323497] ================================================================== [ 34.324287] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 34.326032] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.327027] [ 34.327721] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.329042] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.329593] Hardware name: linux,dummy-virt (DT) [ 34.330326] Call trace: [ 34.330772] show_stack+0x20/0x38 (C) [ 34.331908] dump_stack_lvl+0x8c/0xd0 [ 34.332578] print_report+0x118/0x5e0 [ 34.333319] kasan_report+0xc8/0x118 [ 34.333964] kasan_check_range+0x100/0x1a8 [ 34.334599] __kasan_check_write+0x20/0x30 [ 34.335270] kasan_atomics_helper+0x32c/0x4858 [ 34.336233] kasan_atomics+0x198/0x2e8 [ 34.336892] kunit_try_run_case+0x14c/0x3d0 [ 34.337694] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.338504] kthread+0x24c/0x2d0 [ 34.339141] ret_from_fork+0x10/0x20 [ 34.339930] [ 34.340616] Allocated by task 254: [ 34.341312] kasan_save_stack+0x3c/0x68 [ 34.341795] kasan_save_track+0x20/0x40 [ 34.342450] kasan_save_alloc_info+0x40/0x58 [ 34.343749] __kasan_kmalloc+0xd4/0xd8 [ 34.344340] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.344947] kasan_atomics+0xb8/0x2e8 [ 34.345441] kunit_try_run_case+0x14c/0x3d0 [ 34.346080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.346870] kthread+0x24c/0x2d0 [ 34.347447] ret_from_fork+0x10/0x20 [ 34.347998] [ 34.348274] The buggy address belongs to the object at fff00000c664f800 [ 34.348274] which belongs to the cache kmalloc-64 of size 64 [ 34.351078] The buggy address is located 0 bytes to the right of [ 34.351078] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.352442] [ 34.353250] The buggy address belongs to the physical page: [ 34.354186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.355400] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.356675] page_type: f5(slab) [ 34.357787] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.358902] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.359944] page dumped because: kasan: bad access detected [ 34.360689] [ 34.361370] Memory state around the buggy address: [ 34.361871] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.362821] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.364150] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.364895] ^ [ 34.365622] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.366458] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.367357] ================================================================== [ 34.854270] ================================================================== [ 34.854977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 34.856257] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.857644] [ 34.858018] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.859424] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.860190] Hardware name: linux,dummy-virt (DT) [ 34.860751] Call trace: [ 34.861207] show_stack+0x20/0x38 (C) [ 34.861509] dump_stack_lvl+0x8c/0xd0 [ 34.861806] print_report+0x118/0x5e0 [ 34.862688] kasan_report+0xc8/0x118 [ 34.863509] kasan_check_range+0x100/0x1a8 [ 34.864131] __kasan_check_write+0x20/0x30 [ 34.864746] kasan_atomics_helper+0x894/0x4858 [ 34.865434] kasan_atomics+0x198/0x2e8 [ 34.866006] kunit_try_run_case+0x14c/0x3d0 [ 34.866702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.867515] kthread+0x24c/0x2d0 [ 34.868011] ret_from_fork+0x10/0x20 [ 34.868518] [ 34.868861] Allocated by task 254: [ 34.869400] kasan_save_stack+0x3c/0x68 [ 34.870082] kasan_save_track+0x20/0x40 [ 34.870847] kasan_save_alloc_info+0x40/0x58 [ 34.871647] __kasan_kmalloc+0xd4/0xd8 [ 34.872366] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.873052] kasan_atomics+0xb8/0x2e8 [ 34.873708] kunit_try_run_case+0x14c/0x3d0 [ 34.874488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.875290] kthread+0x24c/0x2d0 [ 34.875995] ret_from_fork+0x10/0x20 [ 34.876662] [ 34.877106] The buggy address belongs to the object at fff00000c664f800 [ 34.877106] which belongs to the cache kmalloc-64 of size 64 [ 34.878229] The buggy address is located 0 bytes to the right of [ 34.878229] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.878936] [ 34.879314] The buggy address belongs to the physical page: [ 34.880102] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.880980] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.882104] page_type: f5(slab) [ 34.882558] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.883572] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.884654] page dumped because: kasan: bad access detected [ 34.885456] [ 34.885934] Memory state around the buggy address: [ 34.886641] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.887656] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.888562] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.889508] ^ [ 34.890245] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.891193] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.892199] ================================================================== [ 36.507772] ================================================================== [ 36.508517] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 36.510446] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 36.512569] [ 36.513176] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.514391] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.514948] Hardware name: linux,dummy-virt (DT) [ 36.515553] Call trace: [ 36.515959] show_stack+0x20/0x38 (C) [ 36.516528] dump_stack_lvl+0x8c/0xd0 [ 36.517241] print_report+0x118/0x5e0 [ 36.517803] kasan_report+0xc8/0x118 [ 36.518454] kasan_check_range+0x100/0x1a8 [ 36.519091] __kasan_check_write+0x20/0x30 [ 36.519705] kasan_atomics_helper+0x175c/0x4858 [ 36.520386] kasan_atomics+0x198/0x2e8 [ 36.521040] kunit_try_run_case+0x14c/0x3d0 [ 36.521760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.522487] kthread+0x24c/0x2d0 [ 36.523028] ret_from_fork+0x10/0x20 [ 36.523523] [ 36.523977] Allocated by task 254: [ 36.524530] kasan_save_stack+0x3c/0x68 [ 36.525033] kasan_save_track+0x20/0x40 [ 36.525737] kasan_save_alloc_info+0x40/0x58 [ 36.526350] __kasan_kmalloc+0xd4/0xd8 [ 36.527024] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.527641] kasan_atomics+0xb8/0x2e8 [ 36.528124] kunit_try_run_case+0x14c/0x3d0 [ 36.528808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.529582] kthread+0x24c/0x2d0 [ 36.530081] ret_from_fork+0x10/0x20 [ 36.530712] [ 36.531077] The buggy address belongs to the object at fff00000c664f800 [ 36.531077] which belongs to the cache kmalloc-64 of size 64 [ 36.532396] The buggy address is located 0 bytes to the right of [ 36.532396] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 36.533840] [ 36.534236] The buggy address belongs to the physical page: [ 36.535134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 36.536268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.537262] page_type: f5(slab) [ 36.537958] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.538846] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.539852] page dumped because: kasan: bad access detected [ 36.540552] [ 36.541105] Memory state around the buggy address: [ 36.541772] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.542663] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.543546] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.544430] ^ [ 36.545118] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.546091] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.547024] ================================================================== [ 34.893763] ================================================================== [ 34.894424] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 34.896802] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.897989] [ 34.898442] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.899560] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.900138] Hardware name: linux,dummy-virt (DT) [ 34.900996] Call trace: [ 34.901603] show_stack+0x20/0x38 (C) [ 34.902410] dump_stack_lvl+0x8c/0xd0 [ 34.903206] print_report+0x118/0x5e0 [ 34.903818] kasan_report+0xc8/0x118 [ 34.904284] __asan_report_load4_noabort+0x20/0x30 [ 34.905215] kasan_atomics_helper+0x42d8/0x4858 [ 34.905775] kasan_atomics+0x198/0x2e8 [ 34.906349] kunit_try_run_case+0x14c/0x3d0 [ 34.906986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.907674] kthread+0x24c/0x2d0 [ 34.908264] ret_from_fork+0x10/0x20 [ 34.908779] [ 34.909138] Allocated by task 254: [ 34.909816] kasan_save_stack+0x3c/0x68 [ 34.910446] kasan_save_track+0x20/0x40 [ 34.911036] kasan_save_alloc_info+0x40/0x58 [ 34.911748] __kasan_kmalloc+0xd4/0xd8 [ 34.912420] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.912961] kasan_atomics+0xb8/0x2e8 [ 34.913574] kunit_try_run_case+0x14c/0x3d0 [ 34.914273] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.915082] kthread+0x24c/0x2d0 [ 34.915578] ret_from_fork+0x10/0x20 [ 34.916224] [ 34.916591] The buggy address belongs to the object at fff00000c664f800 [ 34.916591] which belongs to the cache kmalloc-64 of size 64 [ 34.918006] The buggy address is located 0 bytes to the right of [ 34.918006] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.919445] [ 34.919726] The buggy address belongs to the physical page: [ 34.920489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.921364] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.922315] page_type: f5(slab) [ 34.922747] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.923705] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.924617] page dumped because: kasan: bad access detected [ 34.925318] [ 34.925627] Memory state around the buggy address: [ 34.926290] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.927182] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.928125] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.928965] ^ [ 34.929594] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.930502] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.931325] ================================================================== [ 35.199084] ================================================================== [ 35.200293] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 35.201448] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.202490] [ 35.202953] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.204337] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.204912] Hardware name: linux,dummy-virt (DT) [ 35.205509] Call trace: [ 35.206002] show_stack+0x20/0x38 (C) [ 35.206651] dump_stack_lvl+0x8c/0xd0 [ 35.207289] print_report+0x118/0x5e0 [ 35.207810] kasan_report+0xc8/0x118 [ 35.208453] __asan_report_load4_noabort+0x20/0x30 [ 35.209134] kasan_atomics_helper+0x3dbc/0x4858 [ 35.209761] kasan_atomics+0x198/0x2e8 [ 35.210438] kunit_try_run_case+0x14c/0x3d0 [ 35.211006] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.211841] kthread+0x24c/0x2d0 [ 35.212503] ret_from_fork+0x10/0x20 [ 35.213041] [ 35.213417] Allocated by task 254: [ 35.213915] kasan_save_stack+0x3c/0x68 [ 35.214436] kasan_save_track+0x20/0x40 [ 35.215203] kasan_save_alloc_info+0x40/0x58 [ 35.215831] __kasan_kmalloc+0xd4/0xd8 [ 35.216333] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.217111] kasan_atomics+0xb8/0x2e8 [ 35.217649] kunit_try_run_case+0x14c/0x3d0 [ 35.218300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.219081] kthread+0x24c/0x2d0 [ 35.219702] ret_from_fork+0x10/0x20 [ 35.220333] [ 35.220642] The buggy address belongs to the object at fff00000c664f800 [ 35.220642] which belongs to the cache kmalloc-64 of size 64 [ 35.222088] The buggy address is located 0 bytes to the right of [ 35.222088] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.223482] [ 35.223765] The buggy address belongs to the physical page: [ 35.224523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.225601] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.226360] page_type: f5(slab) [ 35.226861] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.228163] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.228900] page dumped because: kasan: bad access detected [ 35.229552] [ 35.229924] Memory state around the buggy address: [ 35.230630] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.231453] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.232354] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.233305] ^ [ 35.233920] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.234849] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.235705] ================================================================== [ 34.411566] ================================================================== [ 34.412244] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 34.414379] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.415458] [ 34.415791] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.417032] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.417649] Hardware name: linux,dummy-virt (DT) [ 34.418239] Call trace: [ 34.418630] show_stack+0x20/0x38 (C) [ 34.419325] dump_stack_lvl+0x8c/0xd0 [ 34.419895] print_report+0x118/0x5e0 [ 34.420454] kasan_report+0xc8/0x118 [ 34.421541] kasan_check_range+0x100/0x1a8 [ 34.422063] __kasan_check_write+0x20/0x30 [ 34.422704] kasan_atomics_helper+0x3ac/0x4858 [ 34.423720] kasan_atomics+0x198/0x2e8 [ 34.424315] kunit_try_run_case+0x14c/0x3d0 [ 34.425003] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.425805] kthread+0x24c/0x2d0 [ 34.426425] ret_from_fork+0x10/0x20 [ 34.427099] [ 34.427960] Allocated by task 254: [ 34.428611] kasan_save_stack+0x3c/0x68 [ 34.429268] kasan_save_track+0x20/0x40 [ 34.429958] kasan_save_alloc_info+0x40/0x58 [ 34.430847] __kasan_kmalloc+0xd4/0xd8 [ 34.431855] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.432568] kasan_atomics+0xb8/0x2e8 [ 34.433104] kunit_try_run_case+0x14c/0x3d0 [ 34.433751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.434356] kthread+0x24c/0x2d0 [ 34.434981] ret_from_fork+0x10/0x20 [ 34.435438] [ 34.435987] The buggy address belongs to the object at fff00000c664f800 [ 34.435987] which belongs to the cache kmalloc-64 of size 64 [ 34.437413] The buggy address is located 0 bytes to the right of [ 34.437413] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.438843] [ 34.439156] The buggy address belongs to the physical page: [ 34.440181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.441057] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.441923] page_type: f5(slab) [ 34.442569] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.443777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.444767] page dumped because: kasan: bad access detected [ 34.445751] [ 34.446135] Memory state around the buggy address: [ 34.446909] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.447698] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.448992] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.449917] ^ [ 34.450664] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.451744] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.452603] ================================================================== [ 35.313851] ================================================================== [ 35.314645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 35.315561] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.316519] [ 35.316921] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.318029] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.318697] Hardware name: linux,dummy-virt (DT) [ 35.319328] Call trace: [ 35.319754] show_stack+0x20/0x38 (C) [ 35.320388] dump_stack_lvl+0x8c/0xd0 [ 35.321118] print_report+0x118/0x5e0 [ 35.321721] kasan_report+0xc8/0x118 [ 35.322366] kasan_check_range+0x100/0x1a8 [ 35.323003] __kasan_check_write+0x20/0x30 [ 35.323697] kasan_atomics_helper+0xca0/0x4858 [ 35.324313] kasan_atomics+0x198/0x2e8 [ 35.324959] kunit_try_run_case+0x14c/0x3d0 [ 35.325758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.326592] kthread+0x24c/0x2d0 [ 35.327094] ret_from_fork+0x10/0x20 [ 35.327650] [ 35.328063] Allocated by task 254: [ 35.328529] kasan_save_stack+0x3c/0x68 [ 35.329216] kasan_save_track+0x20/0x40 [ 35.329825] kasan_save_alloc_info+0x40/0x58 [ 35.330463] __kasan_kmalloc+0xd4/0xd8 [ 35.331002] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.331701] kasan_atomics+0xb8/0x2e8 [ 35.332164] kunit_try_run_case+0x14c/0x3d0 [ 35.332830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.333600] kthread+0x24c/0x2d0 [ 35.334143] ret_from_fork+0x10/0x20 [ 35.334719] [ 35.335022] The buggy address belongs to the object at fff00000c664f800 [ 35.335022] which belongs to the cache kmalloc-64 of size 64 [ 35.336431] The buggy address is located 0 bytes to the right of [ 35.336431] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.337794] [ 35.338096] The buggy address belongs to the physical page: [ 35.338812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.339835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.340750] page_type: f5(slab) [ 35.341332] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.342284] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.343170] page dumped because: kasan: bad access detected [ 35.343834] [ 35.344240] Memory state around the buggy address: [ 35.344913] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.345756] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.346729] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.347564] ^ [ 35.348213] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.349147] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.350026] ================================================================== [ 35.620138] ================================================================== [ 35.621157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 35.621556] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.622036] [ 35.622411] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.623767] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.624340] Hardware name: linux,dummy-virt (DT) [ 35.625126] Call trace: [ 35.625523] show_stack+0x20/0x38 (C) [ 35.626149] dump_stack_lvl+0x8c/0xd0 [ 35.626802] print_report+0x118/0x5e0 [ 35.627452] kasan_report+0xc8/0x118 [ 35.628131] kasan_check_range+0x100/0x1a8 [ 35.628712] __kasan_check_write+0x20/0x30 [ 35.629438] kasan_atomics_helper+0xeb8/0x4858 [ 35.630052] kasan_atomics+0x198/0x2e8 [ 35.630743] kunit_try_run_case+0x14c/0x3d0 [ 35.631281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.632150] kthread+0x24c/0x2d0 [ 35.632727] ret_from_fork+0x10/0x20 [ 35.633368] [ 35.633698] Allocated by task 254: [ 35.634134] kasan_save_stack+0x3c/0x68 [ 35.634828] kasan_save_track+0x20/0x40 [ 35.635499] kasan_save_alloc_info+0x40/0x58 [ 35.636205] __kasan_kmalloc+0xd4/0xd8 [ 35.636776] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.637333] kasan_atomics+0xb8/0x2e8 [ 35.638013] kunit_try_run_case+0x14c/0x3d0 [ 35.638622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.639381] kthread+0x24c/0x2d0 [ 35.639860] ret_from_fork+0x10/0x20 [ 35.640417] [ 35.640757] The buggy address belongs to the object at fff00000c664f800 [ 35.640757] which belongs to the cache kmalloc-64 of size 64 [ 35.642185] The buggy address is located 0 bytes to the right of [ 35.642185] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.643609] [ 35.643929] The buggy address belongs to the physical page: [ 35.644862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.645782] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.646585] page_type: f5(slab) [ 35.647115] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.648046] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.649049] page dumped because: kasan: bad access detected [ 35.649668] [ 35.650043] Memory state around the buggy address: [ 35.650572] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.651563] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.652393] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.653347] ^ [ 35.654010] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.654850] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.655705] ================================================================== [ 35.851988] ================================================================== [ 35.852813] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 35.853620] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.854401] [ 35.854810] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.856039] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.856676] Hardware name: linux,dummy-virt (DT) [ 35.857363] Call trace: [ 35.857840] show_stack+0x20/0x38 (C) [ 35.858435] dump_stack_lvl+0x8c/0xd0 [ 35.859100] print_report+0x118/0x5e0 [ 35.859772] kasan_report+0xc8/0x118 [ 35.860427] kasan_check_range+0x100/0x1a8 [ 35.861039] __kasan_check_write+0x20/0x30 [ 35.861738] kasan_atomics_helper+0x1128/0x4858 [ 35.862417] kasan_atomics+0x198/0x2e8 [ 35.863038] kunit_try_run_case+0x14c/0x3d0 [ 35.863631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.864340] kthread+0x24c/0x2d0 [ 35.864921] ret_from_fork+0x10/0x20 [ 35.865493] [ 35.865769] Allocated by task 254: [ 35.866348] kasan_save_stack+0x3c/0x68 [ 35.866944] kasan_save_track+0x20/0x40 [ 35.867569] kasan_save_alloc_info+0x40/0x58 [ 35.868118] __kasan_kmalloc+0xd4/0xd8 [ 35.868756] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.869309] kasan_atomics+0xb8/0x2e8 [ 35.870083] kunit_try_run_case+0x14c/0x3d0 [ 35.870594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.871444] kthread+0x24c/0x2d0 [ 35.871974] ret_from_fork+0x10/0x20 [ 35.872513] [ 35.872839] The buggy address belongs to the object at fff00000c664f800 [ 35.872839] which belongs to the cache kmalloc-64 of size 64 [ 35.874311] The buggy address is located 0 bytes to the right of [ 35.874311] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.875763] [ 35.876129] The buggy address belongs to the physical page: [ 35.876919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.877761] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.878674] page_type: f5(slab) [ 35.879197] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.880131] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.881082] page dumped because: kasan: bad access detected [ 35.881731] [ 35.882111] Memory state around the buggy address: [ 35.882777] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.883628] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.884452] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.885374] ^ [ 35.885967] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.886860] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.887692] ================================================================== [ 35.657214] ================================================================== [ 35.658033] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 35.659141] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.660308] [ 35.660672] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.661868] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.662525] Hardware name: linux,dummy-virt (DT) [ 35.663141] Call trace: [ 35.663675] show_stack+0x20/0x38 (C) [ 35.664340] dump_stack_lvl+0x8c/0xd0 [ 35.664947] print_report+0x118/0x5e0 [ 35.665524] kasan_report+0xc8/0x118 [ 35.666088] kasan_check_range+0x100/0x1a8 [ 35.666687] __kasan_check_write+0x20/0x30 [ 35.667458] kasan_atomics_helper+0xf20/0x4858 [ 35.668092] kasan_atomics+0x198/0x2e8 [ 35.668734] kunit_try_run_case+0x14c/0x3d0 [ 35.669390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.670196] kthread+0x24c/0x2d0 [ 35.670822] ret_from_fork+0x10/0x20 [ 35.671377] [ 35.671713] Allocated by task 254: [ 35.672205] kasan_save_stack+0x3c/0x68 [ 35.672846] kasan_save_track+0x20/0x40 [ 35.673423] kasan_save_alloc_info+0x40/0x58 [ 35.673972] __kasan_kmalloc+0xd4/0xd8 [ 35.674645] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.675298] kasan_atomics+0xb8/0x2e8 [ 35.675951] kunit_try_run_case+0x14c/0x3d0 [ 35.676581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.677437] kthread+0x24c/0x2d0 [ 35.677951] ret_from_fork+0x10/0x20 [ 35.678421] [ 35.678824] The buggy address belongs to the object at fff00000c664f800 [ 35.678824] which belongs to the cache kmalloc-64 of size 64 [ 35.680262] The buggy address is located 0 bytes to the right of [ 35.680262] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.681680] [ 35.682088] The buggy address belongs to the physical page: [ 35.682906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.683805] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.684607] page_type: f5(slab) [ 35.685182] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.686142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.687138] page dumped because: kasan: bad access detected [ 35.687799] [ 35.688138] Memory state around the buggy address: [ 35.688744] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.689588] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.690457] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.691416] ^ [ 35.692050] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.692936] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.693758] ================================================================== [ 35.083957] ================================================================== [ 35.084681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 35.085662] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.086505] [ 35.086899] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.088188] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.088679] Hardware name: linux,dummy-virt (DT) [ 35.089436] Call trace: [ 35.089867] show_stack+0x20/0x38 (C) [ 35.090528] dump_stack_lvl+0x8c/0xd0 [ 35.091219] print_report+0x118/0x5e0 [ 35.091762] kasan_report+0xc8/0x118 [ 35.092521] kasan_check_range+0x100/0x1a8 [ 35.093104] __kasan_check_write+0x20/0x30 [ 35.093839] kasan_atomics_helper+0xad4/0x4858 [ 35.094598] kasan_atomics+0x198/0x2e8 [ 35.095156] kunit_try_run_case+0x14c/0x3d0 [ 35.095778] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.096461] kthread+0x24c/0x2d0 [ 35.097110] ret_from_fork+0x10/0x20 [ 35.097695] [ 35.098053] Allocated by task 254: [ 35.098615] kasan_save_stack+0x3c/0x68 [ 35.099229] kasan_save_track+0x20/0x40 [ 35.099689] kasan_save_alloc_info+0x40/0x58 [ 35.100383] __kasan_kmalloc+0xd4/0xd8 [ 35.100982] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.101496] kasan_atomics+0xb8/0x2e8 [ 35.102149] kunit_try_run_case+0x14c/0x3d0 [ 35.102772] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.103543] kthread+0x24c/0x2d0 [ 35.104145] ret_from_fork+0x10/0x20 [ 35.104650] [ 35.104985] The buggy address belongs to the object at fff00000c664f800 [ 35.104985] which belongs to the cache kmalloc-64 of size 64 [ 35.106394] The buggy address is located 0 bytes to the right of [ 35.106394] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.107827] [ 35.108196] The buggy address belongs to the physical page: [ 35.109097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.109959] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.110905] page_type: f5(slab) [ 35.111406] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.112362] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.113377] page dumped because: kasan: bad access detected [ 35.114058] [ 35.114424] Memory state around the buggy address: [ 35.115258] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.116043] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.116963] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.117797] ^ [ 35.118408] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.119344] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.120189] ================================================================== [ 34.368641] ================================================================== [ 34.369533] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 34.370541] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.372217] [ 34.372708] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.373842] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.374531] Hardware name: linux,dummy-virt (DT) [ 34.375035] Call trace: [ 34.375626] show_stack+0x20/0x38 (C) [ 34.376256] dump_stack_lvl+0x8c/0xd0 [ 34.376866] print_report+0x118/0x5e0 [ 34.377441] kasan_report+0xc8/0x118 [ 34.378236] __asan_report_store4_noabort+0x20/0x30 [ 34.378938] kasan_atomics_helper+0x3f94/0x4858 [ 34.380306] kasan_atomics+0x198/0x2e8 [ 34.380866] kunit_try_run_case+0x14c/0x3d0 [ 34.381523] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.382340] kthread+0x24c/0x2d0 [ 34.382994] ret_from_fork+0x10/0x20 [ 34.383824] [ 34.384260] Allocated by task 254: [ 34.384616] kasan_save_stack+0x3c/0x68 [ 34.385327] kasan_save_track+0x20/0x40 [ 34.385897] kasan_save_alloc_info+0x40/0x58 [ 34.386649] __kasan_kmalloc+0xd4/0xd8 [ 34.387270] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.388385] kasan_atomics+0xb8/0x2e8 [ 34.389482] kunit_try_run_case+0x14c/0x3d0 [ 34.390080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.391045] kthread+0x24c/0x2d0 [ 34.391595] ret_from_fork+0x10/0x20 [ 34.392179] [ 34.392533] The buggy address belongs to the object at fff00000c664f800 [ 34.392533] which belongs to the cache kmalloc-64 of size 64 [ 34.394037] The buggy address is located 0 bytes to the right of [ 34.394037] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.395916] [ 34.396630] The buggy address belongs to the physical page: [ 34.397238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.398386] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.399422] page_type: f5(slab) [ 34.399958] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.401461] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.402513] page dumped because: kasan: bad access detected [ 34.403657] [ 34.404074] Memory state around the buggy address: [ 34.405161] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.405581] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.406386] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.407800] ^ [ 34.408466] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.409248] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.410138] ================================================================== [ 36.195622] ================================================================== [ 36.196200] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 36.197759] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 36.198839] [ 36.199429] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.200679] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.201327] Hardware name: linux,dummy-virt (DT) [ 36.202042] Call trace: [ 36.202520] show_stack+0x20/0x38 (C) [ 36.203262] dump_stack_lvl+0x8c/0xd0 [ 36.203896] print_report+0x118/0x5e0 [ 36.204469] kasan_report+0xc8/0x118 [ 36.205103] kasan_check_range+0x100/0x1a8 [ 36.205703] __kasan_check_write+0x20/0x30 [ 36.206426] kasan_atomics_helper+0x14e4/0x4858 [ 36.207042] kasan_atomics+0x198/0x2e8 [ 36.207711] kunit_try_run_case+0x14c/0x3d0 [ 36.208368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.209026] kthread+0x24c/0x2d0 [ 36.209700] ret_from_fork+0x10/0x20 [ 36.210297] [ 36.210611] Allocated by task 254: [ 36.211233] kasan_save_stack+0x3c/0x68 [ 36.211738] kasan_save_track+0x20/0x40 [ 36.212398] kasan_save_alloc_info+0x40/0x58 [ 36.212950] __kasan_kmalloc+0xd4/0xd8 [ 36.213644] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.214243] kasan_atomics+0xb8/0x2e8 [ 36.214946] kunit_try_run_case+0x14c/0x3d0 [ 36.215538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.216170] kthread+0x24c/0x2d0 [ 36.216717] ret_from_fork+0x10/0x20 [ 36.217278] [ 36.217602] The buggy address belongs to the object at fff00000c664f800 [ 36.217602] which belongs to the cache kmalloc-64 of size 64 [ 36.219056] The buggy address is located 0 bytes to the right of [ 36.219056] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 36.220401] [ 36.220723] The buggy address belongs to the physical page: [ 36.221556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 36.222439] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.223242] page_type: f5(slab) [ 36.223779] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.224675] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.225633] page dumped because: kasan: bad access detected [ 36.226321] [ 36.226623] Memory state around the buggy address: [ 36.227283] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.228143] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.229034] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.229897] ^ [ 36.230497] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.231480] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.232196] ================================================================== [ 36.470332] ================================================================== [ 36.471422] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 36.472128] Read of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 36.472896] [ 36.473388] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.474475] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.475164] Hardware name: linux,dummy-virt (DT) [ 36.475796] Call trace: [ 36.476242] show_stack+0x20/0x38 (C) [ 36.476748] dump_stack_lvl+0x8c/0xd0 [ 36.477414] print_report+0x118/0x5e0 [ 36.477924] kasan_report+0xc8/0x118 [ 36.478586] __asan_report_load8_noabort+0x20/0x30 [ 36.479298] kasan_atomics_helper+0x3e10/0x4858 [ 36.479964] kasan_atomics+0x198/0x2e8 [ 36.480631] kunit_try_run_case+0x14c/0x3d0 [ 36.481165] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.481989] kthread+0x24c/0x2d0 [ 36.482527] ret_from_fork+0x10/0x20 [ 36.483085] [ 36.483398] Allocated by task 254: [ 36.484013] kasan_save_stack+0x3c/0x68 [ 36.484611] kasan_save_track+0x20/0x40 [ 36.485140] kasan_save_alloc_info+0x40/0x58 [ 36.485849] __kasan_kmalloc+0xd4/0xd8 [ 36.486570] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.487132] kasan_atomics+0xb8/0x2e8 [ 36.487786] kunit_try_run_case+0x14c/0x3d0 [ 36.488454] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.489221] kthread+0x24c/0x2d0 [ 36.489728] ret_from_fork+0x10/0x20 [ 36.490288] [ 36.490726] The buggy address belongs to the object at fff00000c664f800 [ 36.490726] which belongs to the cache kmalloc-64 of size 64 [ 36.492095] The buggy address is located 0 bytes to the right of [ 36.492095] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 36.493543] [ 36.493946] The buggy address belongs to the physical page: [ 36.494535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 36.495645] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.496512] page_type: f5(slab) [ 36.496956] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.497966] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.498942] page dumped because: kasan: bad access detected [ 36.499552] [ 36.499921] Memory state around the buggy address: [ 36.500569] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.501431] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.502258] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.503214] ^ [ 36.503932] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.504847] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.505703] ================================================================== [ 35.046785] ================================================================== [ 35.047482] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 35.048634] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.049557] [ 35.050042] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.051093] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.051440] Hardware name: linux,dummy-virt (DT) [ 35.051744] Call trace: [ 35.052141] show_stack+0x20/0x38 (C) [ 35.052953] dump_stack_lvl+0x8c/0xd0 [ 35.053766] print_report+0x118/0x5e0 [ 35.054383] kasan_report+0xc8/0x118 [ 35.055005] kasan_check_range+0x100/0x1a8 [ 35.055702] __kasan_check_write+0x20/0x30 [ 35.056381] kasan_atomics_helper+0xa6c/0x4858 [ 35.057148] kasan_atomics+0x198/0x2e8 [ 35.057820] kunit_try_run_case+0x14c/0x3d0 [ 35.058453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.059220] kthread+0x24c/0x2d0 [ 35.059845] ret_from_fork+0x10/0x20 [ 35.060403] [ 35.060747] Allocated by task 254: [ 35.061223] kasan_save_stack+0x3c/0x68 [ 35.061839] kasan_save_track+0x20/0x40 [ 35.062420] kasan_save_alloc_info+0x40/0x58 [ 35.063062] __kasan_kmalloc+0xd4/0xd8 [ 35.063576] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.064279] kasan_atomics+0xb8/0x2e8 [ 35.064752] kunit_try_run_case+0x14c/0x3d0 [ 35.065490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.066131] kthread+0x24c/0x2d0 [ 35.066693] ret_from_fork+0x10/0x20 [ 35.067200] [ 35.067594] The buggy address belongs to the object at fff00000c664f800 [ 35.067594] which belongs to the cache kmalloc-64 of size 64 [ 35.069063] The buggy address is located 0 bytes to the right of [ 35.069063] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.070494] [ 35.070814] The buggy address belongs to the physical page: [ 35.071456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.072476] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.073319] page_type: f5(slab) [ 35.073845] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.074832] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.075763] page dumped because: kasan: bad access detected [ 35.076472] [ 35.076837] Memory state around the buggy address: [ 35.077445] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.078192] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.079268] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.080091] ^ [ 35.080700] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.081591] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.082498] ================================================================== [ 35.122200] ================================================================== [ 35.122922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 35.123969] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.125148] [ 35.125524] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.126983] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.127600] Hardware name: linux,dummy-virt (DT) [ 35.128163] Call trace: [ 35.128379] show_stack+0x20/0x38 (C) [ 35.128672] dump_stack_lvl+0x8c/0xd0 [ 35.129053] print_report+0x118/0x5e0 [ 35.129995] kasan_report+0xc8/0x118 [ 35.130627] __asan_report_load4_noabort+0x20/0x30 [ 35.131400] kasan_atomics_helper+0x3dcc/0x4858 [ 35.132195] kasan_atomics+0x198/0x2e8 [ 35.132722] kunit_try_run_case+0x14c/0x3d0 [ 35.133514] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.134342] kthread+0x24c/0x2d0 [ 35.134976] ret_from_fork+0x10/0x20 [ 35.135605] [ 35.136010] Allocated by task 254: [ 35.136600] kasan_save_stack+0x3c/0x68 [ 35.137293] kasan_save_track+0x20/0x40 [ 35.138019] kasan_save_alloc_info+0x40/0x58 [ 35.138710] __kasan_kmalloc+0xd4/0xd8 [ 35.139373] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.140079] kasan_atomics+0xb8/0x2e8 [ 35.140682] kunit_try_run_case+0x14c/0x3d0 [ 35.141326] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.142135] kthread+0x24c/0x2d0 [ 35.142680] ret_from_fork+0x10/0x20 [ 35.143297] [ 35.143702] The buggy address belongs to the object at fff00000c664f800 [ 35.143702] which belongs to the cache kmalloc-64 of size 64 [ 35.145215] The buggy address is located 0 bytes to the right of [ 35.145215] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.146824] [ 35.147256] The buggy address belongs to the physical page: [ 35.147980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.149054] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.149938] page_type: f5(slab) [ 35.150524] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.151492] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.152433] page dumped because: kasan: bad access detected [ 35.153214] [ 35.153545] Memory state around the buggy address: [ 35.154341] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.155244] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.156203] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.156969] ^ [ 35.157555] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.158706] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.159574] ================================================================== [ 35.733422] ================================================================== [ 35.734196] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 35.735134] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.736522] [ 35.736909] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.738110] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.738639] Hardware name: linux,dummy-virt (DT) [ 35.739244] Call trace: [ 35.739708] show_stack+0x20/0x38 (C) [ 35.740280] dump_stack_lvl+0x8c/0xd0 [ 35.740762] print_report+0x118/0x5e0 [ 35.741444] kasan_report+0xc8/0x118 [ 35.742034] kasan_check_range+0x100/0x1a8 [ 35.742637] __kasan_check_write+0x20/0x30 [ 35.743222] kasan_atomics_helper+0xff0/0x4858 [ 35.743926] kasan_atomics+0x198/0x2e8 [ 35.744595] kunit_try_run_case+0x14c/0x3d0 [ 35.745160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.746047] kthread+0x24c/0x2d0 [ 35.746649] ret_from_fork+0x10/0x20 [ 35.747244] [ 35.747555] Allocated by task 254: [ 35.748144] kasan_save_stack+0x3c/0x68 [ 35.748658] kasan_save_track+0x20/0x40 [ 35.749289] kasan_save_alloc_info+0x40/0x58 [ 35.749903] __kasan_kmalloc+0xd4/0xd8 [ 35.750489] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.751112] kasan_atomics+0xb8/0x2e8 [ 35.751635] kunit_try_run_case+0x14c/0x3d0 [ 35.752240] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.752976] kthread+0x24c/0x2d0 [ 35.753488] ret_from_fork+0x10/0x20 [ 35.754037] [ 35.754351] The buggy address belongs to the object at fff00000c664f800 [ 35.754351] which belongs to the cache kmalloc-64 of size 64 [ 35.755750] The buggy address is located 0 bytes to the right of [ 35.755750] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.757235] [ 35.757564] The buggy address belongs to the physical page: [ 35.758281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.759252] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.760186] page_type: f5(slab) [ 35.760739] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.761657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.762604] page dumped because: kasan: bad access detected [ 35.763282] [ 35.763617] Memory state around the buggy address: [ 35.764268] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.765074] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.766000] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.766861] ^ [ 35.767510] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.768415] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.769308] ================================================================== [ 36.119828] ================================================================== [ 36.120465] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 36.121609] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 36.122458] [ 36.122767] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.124027] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.124586] Hardware name: linux,dummy-virt (DT) [ 36.125269] Call trace: [ 36.125794] show_stack+0x20/0x38 (C) [ 36.126389] dump_stack_lvl+0x8c/0xd0 [ 36.127126] print_report+0x118/0x5e0 [ 36.127673] kasan_report+0xc8/0x118 [ 36.128274] kasan_check_range+0x100/0x1a8 [ 36.128826] __kasan_check_write+0x20/0x30 [ 36.129578] kasan_atomics_helper+0x1414/0x4858 [ 36.130329] kasan_atomics+0x198/0x2e8 [ 36.130914] kunit_try_run_case+0x14c/0x3d0 [ 36.131564] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.132221] kthread+0x24c/0x2d0 [ 36.132862] ret_from_fork+0x10/0x20 [ 36.133391] [ 36.133761] Allocated by task 254: [ 36.134321] kasan_save_stack+0x3c/0x68 [ 36.134893] kasan_save_track+0x20/0x40 [ 36.135426] kasan_save_alloc_info+0x40/0x58 [ 36.136112] __kasan_kmalloc+0xd4/0xd8 [ 36.136665] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.137576] kasan_atomics+0xb8/0x2e8 [ 36.138339] kunit_try_run_case+0x14c/0x3d0 [ 36.139253] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.139948] kthread+0x24c/0x2d0 [ 36.140404] ret_from_fork+0x10/0x20 [ 36.141002] [ 36.141361] The buggy address belongs to the object at fff00000c664f800 [ 36.141361] which belongs to the cache kmalloc-64 of size 64 [ 36.142746] The buggy address is located 0 bytes to the right of [ 36.142746] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 36.144159] [ 36.144458] The buggy address belongs to the physical page: [ 36.145175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 36.146249] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.146960] page_type: f5(slab) [ 36.147524] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.148443] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.149358] page dumped because: kasan: bad access detected [ 36.150045] [ 36.150339] Memory state around the buggy address: [ 36.151023] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.151832] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.152664] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.153535] ^ [ 36.154202] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.155084] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.155936] ================================================================== [ 36.157729] ================================================================== [ 36.158473] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 36.160311] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 36.161166] [ 36.161556] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.162778] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.163321] Hardware name: linux,dummy-virt (DT) [ 36.163917] Call trace: [ 36.164320] show_stack+0x20/0x38 (C) [ 36.164929] dump_stack_lvl+0x8c/0xd0 [ 36.165495] print_report+0x118/0x5e0 [ 36.166110] kasan_report+0xc8/0x118 [ 36.166768] kasan_check_range+0x100/0x1a8 [ 36.167339] __kasan_check_write+0x20/0x30 [ 36.168111] kasan_atomics_helper+0x147c/0x4858 [ 36.168668] kasan_atomics+0x198/0x2e8 [ 36.169070] kunit_try_run_case+0x14c/0x3d0 [ 36.169747] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.170503] kthread+0x24c/0x2d0 [ 36.171038] ret_from_fork+0x10/0x20 [ 36.171510] [ 36.171892] Allocated by task 254: [ 36.172524] kasan_save_stack+0x3c/0x68 [ 36.173108] kasan_save_track+0x20/0x40 [ 36.173621] kasan_save_alloc_info+0x40/0x58 [ 36.174355] __kasan_kmalloc+0xd4/0xd8 [ 36.174947] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.175531] kasan_atomics+0xb8/0x2e8 [ 36.176126] kunit_try_run_case+0x14c/0x3d0 [ 36.176730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.177492] kthread+0x24c/0x2d0 [ 36.178068] ret_from_fork+0x10/0x20 [ 36.178595] [ 36.178978] The buggy address belongs to the object at fff00000c664f800 [ 36.178978] which belongs to the cache kmalloc-64 of size 64 [ 36.180347] The buggy address is located 0 bytes to the right of [ 36.180347] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 36.181852] [ 36.182201] The buggy address belongs to the physical page: [ 36.183105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 36.183927] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.184793] page_type: f5(slab) [ 36.185311] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.186216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.187172] page dumped because: kasan: bad access detected [ 36.187854] [ 36.188208] Memory state around the buggy address: [ 36.188944] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.189786] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.190620] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.191529] ^ [ 36.192299] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.193168] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.194039] ================================================================== [ 36.082083] ================================================================== [ 36.082947] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 36.084074] Read of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 36.084892] [ 36.085283] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.086498] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.087065] Hardware name: linux,dummy-virt (DT) [ 36.087791] Call trace: [ 36.088317] show_stack+0x20/0x38 (C) [ 36.088824] dump_stack_lvl+0x8c/0xd0 [ 36.089553] print_report+0x118/0x5e0 [ 36.090150] kasan_report+0xc8/0x118 [ 36.090891] __asan_report_load8_noabort+0x20/0x30 [ 36.091562] kasan_atomics_helper+0x3f04/0x4858 [ 36.092297] kasan_atomics+0x198/0x2e8 [ 36.092900] kunit_try_run_case+0x14c/0x3d0 [ 36.093592] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.094362] kthread+0x24c/0x2d0 [ 36.095032] ret_from_fork+0x10/0x20 [ 36.095671] [ 36.096100] Allocated by task 254: [ 36.096533] kasan_save_stack+0x3c/0x68 [ 36.097259] kasan_save_track+0x20/0x40 [ 36.097801] kasan_save_alloc_info+0x40/0x58 [ 36.098385] __kasan_kmalloc+0xd4/0xd8 [ 36.099041] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.099833] kasan_atomics+0xb8/0x2e8 [ 36.100362] kunit_try_run_case+0x14c/0x3d0 [ 36.101065] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.101814] kthread+0x24c/0x2d0 [ 36.102331] ret_from_fork+0x10/0x20 [ 36.102844] [ 36.103219] The buggy address belongs to the object at fff00000c664f800 [ 36.103219] which belongs to the cache kmalloc-64 of size 64 [ 36.104684] The buggy address is located 0 bytes to the right of [ 36.104684] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 36.106067] [ 36.106393] The buggy address belongs to the physical page: [ 36.107078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 36.108021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.108965] page_type: f5(slab) [ 36.109506] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.110529] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.111457] page dumped because: kasan: bad access detected [ 36.112228] [ 36.112535] Memory state around the buggy address: [ 36.113190] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.114094] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.115018] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.115819] ^ [ 36.116489] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.117358] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.118203] ================================================================== [ 34.686837] ================================================================== [ 34.687661] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 34.688511] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.689418] [ 34.689917] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.691470] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.692137] Hardware name: linux,dummy-virt (DT) [ 34.692796] Call trace: [ 34.693270] show_stack+0x20/0x38 (C) [ 34.693983] dump_stack_lvl+0x8c/0xd0 [ 34.694665] print_report+0x118/0x5e0 [ 34.695340] kasan_report+0xc8/0x118 [ 34.695972] kasan_check_range+0x100/0x1a8 [ 34.696665] __kasan_check_write+0x20/0x30 [ 34.697357] kasan_atomics_helper+0x684/0x4858 [ 34.698064] kasan_atomics+0x198/0x2e8 [ 34.698735] kunit_try_run_case+0x14c/0x3d0 [ 34.699488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.700297] kthread+0x24c/0x2d0 [ 34.700977] ret_from_fork+0x10/0x20 [ 34.701607] [ 34.701901] Allocated by task 254: [ 34.702459] kasan_save_stack+0x3c/0x68 [ 34.703157] kasan_save_track+0x20/0x40 [ 34.703791] kasan_save_alloc_info+0x40/0x58 [ 34.704455] __kasan_kmalloc+0xd4/0xd8 [ 34.705155] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.705864] kasan_atomics+0xb8/0x2e8 [ 34.706487] kunit_try_run_case+0x14c/0x3d0 [ 34.707145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.707951] kthread+0x24c/0x2d0 [ 34.708509] ret_from_fork+0x10/0x20 [ 34.709126] [ 34.709570] The buggy address belongs to the object at fff00000c664f800 [ 34.709570] which belongs to the cache kmalloc-64 of size 64 [ 34.710985] The buggy address is located 0 bytes to the right of [ 34.710985] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.712506] [ 34.712953] The buggy address belongs to the physical page: [ 34.713756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.714813] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.715743] page_type: f5(slab) [ 34.716287] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.717337] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.718277] page dumped because: kasan: bad access detected [ 34.719112] [ 34.719464] Memory state around the buggy address: [ 34.720215] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.721257] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.722165] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.723041] ^ [ 34.723793] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.724825] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.725712] ================================================================== [ 34.932776] ================================================================== [ 34.933406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 34.934523] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.935655] [ 34.936122] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.937314] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.937855] Hardware name: linux,dummy-virt (DT) [ 34.938442] Call trace: [ 34.938946] show_stack+0x20/0x38 (C) [ 34.939510] dump_stack_lvl+0x8c/0xd0 [ 34.940081] print_report+0x118/0x5e0 [ 34.940743] kasan_report+0xc8/0x118 [ 34.941254] kasan_check_range+0x100/0x1a8 [ 34.941918] __kasan_check_write+0x20/0x30 [ 34.942580] kasan_atomics_helper+0x934/0x4858 [ 34.943261] kasan_atomics+0x198/0x2e8 [ 34.943785] kunit_try_run_case+0x14c/0x3d0 [ 34.944533] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.945330] kthread+0x24c/0x2d0 [ 34.945925] ret_from_fork+0x10/0x20 [ 34.946514] [ 34.946847] Allocated by task 254: [ 34.947369] kasan_save_stack+0x3c/0x68 [ 34.947942] kasan_save_track+0x20/0x40 [ 34.948669] kasan_save_alloc_info+0x40/0x58 [ 34.949249] __kasan_kmalloc+0xd4/0xd8 [ 34.949897] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.950525] kasan_atomics+0xb8/0x2e8 [ 34.951107] kunit_try_run_case+0x14c/0x3d0 [ 34.951707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.952386] kthread+0x24c/0x2d0 [ 34.952980] ret_from_fork+0x10/0x20 [ 34.953542] [ 34.953863] The buggy address belongs to the object at fff00000c664f800 [ 34.953863] which belongs to the cache kmalloc-64 of size 64 [ 34.955168] The buggy address is located 0 bytes to the right of [ 34.955168] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.956581] [ 34.956899] The buggy address belongs to the physical page: [ 34.957594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.958662] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.959565] page_type: f5(slab) [ 34.960059] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.960950] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.961753] page dumped because: kasan: bad access detected [ 34.962588] [ 34.962957] Memory state around the buggy address: [ 34.963607] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.964508] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.965437] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.966233] ^ [ 34.966931] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.967832] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.968741] ================================================================== [ 35.277352] ================================================================== [ 35.278142] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 35.279025] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.279952] [ 35.280327] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.281689] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.282310] Hardware name: linux,dummy-virt (DT) [ 35.283018] Call trace: [ 35.283411] show_stack+0x20/0x38 (C) [ 35.283992] dump_stack_lvl+0x8c/0xd0 [ 35.284546] print_report+0x118/0x5e0 [ 35.285220] kasan_report+0xc8/0x118 [ 35.285835] __asan_report_load4_noabort+0x20/0x30 [ 35.286582] kasan_atomics_helper+0x3de4/0x4858 [ 35.287313] kasan_atomics+0x198/0x2e8 [ 35.287899] kunit_try_run_case+0x14c/0x3d0 [ 35.288520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.289241] kthread+0x24c/0x2d0 [ 35.289793] ret_from_fork+0x10/0x20 [ 35.290448] [ 35.290821] Allocated by task 254: [ 35.291323] kasan_save_stack+0x3c/0x68 [ 35.291996] kasan_save_track+0x20/0x40 [ 35.292569] kasan_save_alloc_info+0x40/0x58 [ 35.293192] __kasan_kmalloc+0xd4/0xd8 [ 35.293664] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.294393] kasan_atomics+0xb8/0x2e8 [ 35.295014] kunit_try_run_case+0x14c/0x3d0 [ 35.295620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.296403] kthread+0x24c/0x2d0 [ 35.296900] ret_from_fork+0x10/0x20 [ 35.297423] [ 35.297769] The buggy address belongs to the object at fff00000c664f800 [ 35.297769] which belongs to the cache kmalloc-64 of size 64 [ 35.299216] The buggy address is located 0 bytes to the right of [ 35.299216] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.300626] [ 35.300943] The buggy address belongs to the physical page: [ 35.301504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.302632] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.303558] page_type: f5(slab) [ 35.304042] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.304956] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.305852] page dumped because: kasan: bad access detected [ 35.306553] [ 35.306900] Memory state around the buggy address: [ 35.307497] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.308396] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.309268] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.310128] ^ [ 35.310765] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.311682] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.312600] ================================================================== [ 35.928980] ================================================================== [ 35.929801] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 35.930492] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.932429] [ 35.932802] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.934077] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.934700] Hardware name: linux,dummy-virt (DT) [ 35.935386] Call trace: [ 35.935905] show_stack+0x20/0x38 (C) [ 35.936486] dump_stack_lvl+0x8c/0xd0 [ 35.937079] print_report+0x118/0x5e0 [ 35.937591] kasan_report+0xc8/0x118 [ 35.938252] kasan_check_range+0x100/0x1a8 [ 35.938857] __kasan_check_write+0x20/0x30 [ 35.939416] kasan_atomics_helper+0x11f8/0x4858 [ 35.940201] kasan_atomics+0x198/0x2e8 [ 35.940774] kunit_try_run_case+0x14c/0x3d0 [ 35.941462] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.942261] kthread+0x24c/0x2d0 [ 35.942905] ret_from_fork+0x10/0x20 [ 35.943491] [ 35.943850] Allocated by task 254: [ 35.944319] kasan_save_stack+0x3c/0x68 [ 35.944962] kasan_save_track+0x20/0x40 [ 35.945517] kasan_save_alloc_info+0x40/0x58 [ 35.946131] __kasan_kmalloc+0xd4/0xd8 [ 35.946617] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.947341] kasan_atomics+0xb8/0x2e8 [ 35.947847] kunit_try_run_case+0x14c/0x3d0 [ 35.948504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.949197] kthread+0x24c/0x2d0 [ 35.949790] ret_from_fork+0x10/0x20 [ 35.950434] [ 35.950715] The buggy address belongs to the object at fff00000c664f800 [ 35.950715] which belongs to the cache kmalloc-64 of size 64 [ 35.952203] The buggy address is located 0 bytes to the right of [ 35.952203] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.953603] [ 35.953953] The buggy address belongs to the physical page: [ 35.954643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.955651] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.956575] page_type: f5(slab) [ 35.957054] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.958049] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.958986] page dumped because: kasan: bad access detected [ 35.959716] [ 35.960101] Memory state around the buggy address: [ 35.960758] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.961585] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.962464] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.963430] ^ [ 35.964146] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.965060] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.965892] ================================================================== [ 34.046355] ================================================================== [ 34.048029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 34.049160] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.050084] [ 34.050574] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.052284] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.053129] Hardware name: linux,dummy-virt (DT) [ 34.053928] Call trace: [ 34.054546] show_stack+0x20/0x38 (C) [ 34.055382] dump_stack_lvl+0x8c/0xd0 [ 34.056230] print_report+0x118/0x5e0 [ 34.056530] kasan_report+0xc8/0x118 [ 34.056813] __asan_report_load4_noabort+0x20/0x30 [ 34.057181] kasan_atomics_helper+0x40a8/0x4858 [ 34.057503] kasan_atomics+0x198/0x2e8 [ 34.057793] kunit_try_run_case+0x14c/0x3d0 [ 34.059468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.060294] kthread+0x24c/0x2d0 [ 34.060919] ret_from_fork+0x10/0x20 [ 34.061372] [ 34.061757] Allocated by task 254: [ 34.062480] kasan_save_stack+0x3c/0x68 [ 34.063046] kasan_save_track+0x20/0x40 [ 34.064104] kasan_save_alloc_info+0x40/0x58 [ 34.064710] __kasan_kmalloc+0xd4/0xd8 [ 34.065258] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.065808] kasan_atomics+0xb8/0x2e8 [ 34.066494] kunit_try_run_case+0x14c/0x3d0 [ 34.067040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.068174] kthread+0x24c/0x2d0 [ 34.068664] ret_from_fork+0x10/0x20 [ 34.069229] [ 34.069548] The buggy address belongs to the object at fff00000c664f800 [ 34.069548] which belongs to the cache kmalloc-64 of size 64 [ 34.070936] The buggy address is located 0 bytes to the right of [ 34.070936] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.072576] [ 34.072946] The buggy address belongs to the physical page: [ 34.073627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.074817] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.075942] page_type: f5(slab) [ 34.076389] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.077382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.078327] page dumped because: kasan: bad access detected [ 34.079017] [ 34.079708] Memory state around the buggy address: [ 34.080183] fff00000c664f700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 34.081399] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.082318] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.083146] ^ [ 34.083896] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.084841] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.086074] ================================================================== [ 34.089158] ================================================================== [ 34.090114] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 34.090953] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.092319] [ 34.092603] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.094493] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.095778] Hardware name: linux,dummy-virt (DT) [ 34.096817] Call trace: [ 34.097159] show_stack+0x20/0x38 (C) [ 34.098059] dump_stack_lvl+0x8c/0xd0 [ 34.098752] print_report+0x118/0x5e0 [ 34.099706] kasan_report+0xc8/0x118 [ 34.100275] __asan_report_store4_noabort+0x20/0x30 [ 34.100894] kasan_atomics_helper+0x3f7c/0x4858 [ 34.101623] kasan_atomics+0x198/0x2e8 [ 34.102271] kunit_try_run_case+0x14c/0x3d0 [ 34.102992] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.103748] kthread+0x24c/0x2d0 [ 34.104294] ret_from_fork+0x10/0x20 [ 34.104903] [ 34.105195] Allocated by task 254: [ 34.106127] kasan_save_stack+0x3c/0x68 [ 34.106733] kasan_save_track+0x20/0x40 [ 34.107378] kasan_save_alloc_info+0x40/0x58 [ 34.108055] __kasan_kmalloc+0xd4/0xd8 [ 34.108722] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.109288] kasan_atomics+0xb8/0x2e8 [ 34.110054] kunit_try_run_case+0x14c/0x3d0 [ 34.110710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.111693] kthread+0x24c/0x2d0 [ 34.112185] ret_from_fork+0x10/0x20 [ 34.112772] [ 34.113063] The buggy address belongs to the object at fff00000c664f800 [ 34.113063] which belongs to the cache kmalloc-64 of size 64 [ 34.115594] The buggy address is located 0 bytes to the right of [ 34.115594] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.117154] [ 34.117560] The buggy address belongs to the physical page: [ 34.118462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.119823] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.121144] page_type: f5(slab) [ 34.121678] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.122655] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.124053] page dumped because: kasan: bad access detected [ 34.124985] [ 34.125325] Memory state around the buggy address: [ 34.126390] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.127350] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.129287] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.131002] ^ [ 34.132128] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.133224] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.134358] ================================================================== [ 35.580670] ================================================================== [ 35.582072] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 35.583737] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.584974] [ 35.585645] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.587053] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.587705] Hardware name: linux,dummy-virt (DT) [ 35.588412] Call trace: [ 35.588841] show_stack+0x20/0x38 (C) [ 35.589408] dump_stack_lvl+0x8c/0xd0 [ 35.589954] print_report+0x118/0x5e0 [ 35.590493] kasan_report+0xc8/0x118 [ 35.591101] __asan_report_store8_noabort+0x20/0x30 [ 35.591855] kasan_atomics_helper+0x3e5c/0x4858 [ 35.592828] kasan_atomics+0x198/0x2e8 [ 35.593562] kunit_try_run_case+0x14c/0x3d0 [ 35.594196] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.594696] kthread+0x24c/0x2d0 [ 35.595597] ret_from_fork+0x10/0x20 [ 35.596132] [ 35.596554] Allocated by task 254: [ 35.597281] kasan_save_stack+0x3c/0x68 [ 35.597914] kasan_save_track+0x20/0x40 [ 35.598439] kasan_save_alloc_info+0x40/0x58 [ 35.599084] __kasan_kmalloc+0xd4/0xd8 [ 35.599639] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.600279] kasan_atomics+0xb8/0x2e8 [ 35.600856] kunit_try_run_case+0x14c/0x3d0 [ 35.601464] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.602193] kthread+0x24c/0x2d0 [ 35.602695] ret_from_fork+0x10/0x20 [ 35.603301] [ 35.603642] The buggy address belongs to the object at fff00000c664f800 [ 35.603642] which belongs to the cache kmalloc-64 of size 64 [ 35.605098] The buggy address is located 0 bytes to the right of [ 35.605098] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.606494] [ 35.606846] The buggy address belongs to the physical page: [ 35.607432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.608495] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.609293] page_type: f5(slab) [ 35.609854] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.610756] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.611757] page dumped because: kasan: bad access detected [ 35.612427] [ 35.612754] Memory state around the buggy address: [ 35.613380] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.614228] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.615102] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.616111] ^ [ 35.616721] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.617610] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.618605] ================================================================== [ 36.350307] ================================================================== [ 36.351161] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 36.352008] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 36.353588] [ 36.354108] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.355373] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.355997] Hardware name: linux,dummy-virt (DT) [ 36.356653] Call trace: [ 36.357026] show_stack+0x20/0x38 (C) [ 36.357742] dump_stack_lvl+0x8c/0xd0 [ 36.358395] print_report+0x118/0x5e0 [ 36.359041] kasan_report+0xc8/0x118 [ 36.359669] kasan_check_range+0x100/0x1a8 [ 36.360362] __kasan_check_write+0x20/0x30 [ 36.361053] kasan_atomics_helper+0x1644/0x4858 [ 36.361776] kasan_atomics+0x198/0x2e8 [ 36.362442] kunit_try_run_case+0x14c/0x3d0 [ 36.363143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.363951] kthread+0x24c/0x2d0 [ 36.364545] ret_from_fork+0x10/0x20 [ 36.365204] [ 36.365544] Allocated by task 254: [ 36.366168] kasan_save_stack+0x3c/0x68 [ 36.366854] kasan_save_track+0x20/0x40 [ 36.367570] kasan_save_alloc_info+0x40/0x58 [ 36.368350] __kasan_kmalloc+0xd4/0xd8 [ 36.369033] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.369709] kasan_atomics+0xb8/0x2e8 [ 36.370307] kunit_try_run_case+0x14c/0x3d0 [ 36.371019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.371783] kthread+0x24c/0x2d0 [ 36.372459] ret_from_fork+0x10/0x20 [ 36.373100] [ 36.373442] The buggy address belongs to the object at fff00000c664f800 [ 36.373442] which belongs to the cache kmalloc-64 of size 64 [ 36.375044] The buggy address is located 0 bytes to the right of [ 36.375044] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 36.376515] [ 36.376957] The buggy address belongs to the physical page: [ 36.377659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 36.378785] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.379655] page_type: f5(slab) [ 36.380192] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.381294] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.382435] page dumped because: kasan: bad access detected [ 36.383269] [ 36.383567] Memory state around the buggy address: [ 36.384170] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.385107] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.386395] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.387449] ^ [ 36.388131] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.389077] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.389973] ================================================================== [ 35.541467] ================================================================== [ 35.542645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 35.543731] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.544620] [ 35.544961] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.546008] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.546659] Hardware name: linux,dummy-virt (DT) [ 35.547379] Call trace: [ 35.547815] show_stack+0x20/0x38 (C) [ 35.548301] dump_stack_lvl+0x8c/0xd0 [ 35.549120] print_report+0x118/0x5e0 [ 35.549722] kasan_report+0xc8/0x118 [ 35.550305] kasan_check_range+0x100/0x1a8 [ 35.551021] __kasan_check_write+0x20/0x30 [ 35.551695] kasan_atomics_helper+0xe44/0x4858 [ 35.552425] kasan_atomics+0x198/0x2e8 [ 35.552923] kunit_try_run_case+0x14c/0x3d0 [ 35.553669] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.554448] kthread+0x24c/0x2d0 [ 35.555025] ret_from_fork+0x10/0x20 [ 35.555632] [ 35.555962] Allocated by task 254: [ 35.556456] kasan_save_stack+0x3c/0x68 [ 35.557042] kasan_save_track+0x20/0x40 [ 35.557612] kasan_save_alloc_info+0x40/0x58 [ 35.558347] __kasan_kmalloc+0xd4/0xd8 [ 35.558807] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.559584] kasan_atomics+0xb8/0x2e8 [ 35.560282] kunit_try_run_case+0x14c/0x3d0 [ 35.560775] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.561533] kthread+0x24c/0x2d0 [ 35.562078] ret_from_fork+0x10/0x20 [ 35.562610] [ 35.562973] The buggy address belongs to the object at fff00000c664f800 [ 35.562973] which belongs to the cache kmalloc-64 of size 64 [ 35.564416] The buggy address is located 0 bytes to the right of [ 35.564416] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.565839] [ 35.566157] The buggy address belongs to the physical page: [ 35.566947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.567862] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.568685] page_type: f5(slab) [ 35.569238] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.570262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.571369] page dumped because: kasan: bad access detected [ 35.572129] [ 35.572452] Memory state around the buggy address: [ 35.573096] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.574180] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.575243] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.576314] ^ [ 35.577140] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.578225] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.579273] ================================================================== [ 34.228623] ================================================================== [ 34.229660] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 34.230903] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.232559] [ 34.233363] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.234784] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.235663] Hardware name: linux,dummy-virt (DT) [ 34.236344] Call trace: [ 34.236730] show_stack+0x20/0x38 (C) [ 34.237177] dump_stack_lvl+0x8c/0xd0 [ 34.238326] print_report+0x118/0x5e0 [ 34.239150] kasan_report+0xc8/0x118 [ 34.240448] kasan_check_range+0x100/0x1a8 [ 34.241385] __kasan_check_read+0x20/0x30 [ 34.242036] kasan_atomics_helper+0x2b0/0x4858 [ 34.242752] kasan_atomics+0x198/0x2e8 [ 34.243684] kunit_try_run_case+0x14c/0x3d0 [ 34.244504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.245213] kthread+0x24c/0x2d0 [ 34.245949] ret_from_fork+0x10/0x20 [ 34.246670] [ 34.247164] Allocated by task 254: [ 34.248020] kasan_save_stack+0x3c/0x68 [ 34.248493] kasan_save_track+0x20/0x40 [ 34.249408] kasan_save_alloc_info+0x40/0x58 [ 34.250132] __kasan_kmalloc+0xd4/0xd8 [ 34.250957] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.251963] kasan_atomics+0xb8/0x2e8 [ 34.252493] kunit_try_run_case+0x14c/0x3d0 [ 34.253202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.254026] kthread+0x24c/0x2d0 [ 34.254649] ret_from_fork+0x10/0x20 [ 34.255594] [ 34.256265] The buggy address belongs to the object at fff00000c664f800 [ 34.256265] which belongs to the cache kmalloc-64 of size 64 [ 34.257729] The buggy address is located 0 bytes to the right of [ 34.257729] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.259224] [ 34.259507] The buggy address belongs to the physical page: [ 34.261018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.261922] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.262688] page_type: f5(slab) [ 34.263604] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.264891] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.266141] page dumped because: kasan: bad access detected [ 34.266954] [ 34.267705] Memory state around the buggy address: [ 34.268508] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.269429] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.270349] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.271600] ^ [ 34.272547] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.273667] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.274474] ================================================================== [ 34.811130] ================================================================== [ 34.812831] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 34.813921] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.815289] [ 34.815832] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.817264] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.817819] Hardware name: linux,dummy-virt (DT) [ 34.818713] Call trace: [ 34.819172] show_stack+0x20/0x38 (C) [ 34.820005] dump_stack_lvl+0x8c/0xd0 [ 34.820791] print_report+0x118/0x5e0 [ 34.821595] kasan_report+0xc8/0x118 [ 34.822232] kasan_check_range+0x100/0x1a8 [ 34.823066] __kasan_check_write+0x20/0x30 [ 34.823387] kasan_atomics_helper+0x7cc/0x4858 [ 34.823838] kasan_atomics+0x198/0x2e8 [ 34.825011] kunit_try_run_case+0x14c/0x3d0 [ 34.825650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.826671] kthread+0x24c/0x2d0 [ 34.827385] ret_from_fork+0x10/0x20 [ 34.827987] [ 34.828365] Allocated by task 254: [ 34.828897] kasan_save_stack+0x3c/0x68 [ 34.829696] kasan_save_track+0x20/0x40 [ 34.830275] kasan_save_alloc_info+0x40/0x58 [ 34.830959] __kasan_kmalloc+0xd4/0xd8 [ 34.831673] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.832348] kasan_atomics+0xb8/0x2e8 [ 34.832994] kunit_try_run_case+0x14c/0x3d0 [ 34.833657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.834459] kthread+0x24c/0x2d0 [ 34.835033] ret_from_fork+0x10/0x20 [ 34.835626] [ 34.835998] The buggy address belongs to the object at fff00000c664f800 [ 34.835998] which belongs to the cache kmalloc-64 of size 64 [ 34.837545] The buggy address is located 0 bytes to the right of [ 34.837545] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.839122] [ 34.839571] The buggy address belongs to the physical page: [ 34.840450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.841515] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.842483] page_type: f5(slab) [ 34.843079] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.844083] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.845136] page dumped because: kasan: bad access detected [ 34.845869] [ 34.846369] Memory state around the buggy address: [ 34.847055] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.848071] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.849005] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.849939] ^ [ 34.850651] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.851631] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.852554] ================================================================== [ 35.427670] ================================================================== [ 35.428506] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 35.429280] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.430155] [ 35.430604] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.431892] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.432506] Hardware name: linux,dummy-virt (DT) [ 35.433178] Call trace: [ 35.433591] show_stack+0x20/0x38 (C) [ 35.434226] dump_stack_lvl+0x8c/0xd0 [ 35.434909] print_report+0x118/0x5e0 [ 35.435464] kasan_report+0xc8/0x118 [ 35.435988] __asan_report_load4_noabort+0x20/0x30 [ 35.436816] kasan_atomics_helper+0x3e04/0x4858 [ 35.437485] kasan_atomics+0x198/0x2e8 [ 35.438129] kunit_try_run_case+0x14c/0x3d0 [ 35.438755] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.439605] kthread+0x24c/0x2d0 [ 35.440455] ret_from_fork+0x10/0x20 [ 35.441203] [ 35.441660] Allocated by task 254: [ 35.442503] kasan_save_stack+0x3c/0x68 [ 35.443074] kasan_save_track+0x20/0x40 [ 35.443631] kasan_save_alloc_info+0x40/0x58 [ 35.444257] __kasan_kmalloc+0xd4/0xd8 [ 35.444710] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.445490] kasan_atomics+0xb8/0x2e8 [ 35.446051] kunit_try_run_case+0x14c/0x3d0 [ 35.446665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.447407] kthread+0x24c/0x2d0 [ 35.448012] ret_from_fork+0x10/0x20 [ 35.448645] [ 35.449040] The buggy address belongs to the object at fff00000c664f800 [ 35.449040] which belongs to the cache kmalloc-64 of size 64 [ 35.450394] The buggy address is located 0 bytes to the right of [ 35.450394] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.451773] [ 35.452105] The buggy address belongs to the physical page: [ 35.452832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.453751] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.454560] page_type: f5(slab) [ 35.455113] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.456079] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.456968] page dumped because: kasan: bad access detected [ 35.457665] [ 35.458049] Memory state around the buggy address: [ 35.458576] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.459635] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.460559] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.461419] ^ [ 35.462017] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.462827] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.463797] ================================================================== [ 35.695173] ================================================================== [ 35.696121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 35.697171] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.698615] [ 35.699728] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.700856] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.701562] Hardware name: linux,dummy-virt (DT) [ 35.702192] Call trace: [ 35.702612] show_stack+0x20/0x38 (C) [ 35.703164] dump_stack_lvl+0x8c/0xd0 [ 35.703830] print_report+0x118/0x5e0 [ 35.704617] kasan_report+0xc8/0x118 [ 35.705269] kasan_check_range+0x100/0x1a8 [ 35.705863] __kasan_check_write+0x20/0x30 [ 35.706492] kasan_atomics_helper+0xf88/0x4858 [ 35.707218] kasan_atomics+0x198/0x2e8 [ 35.707524] kunit_try_run_case+0x14c/0x3d0 [ 35.707837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.708533] kthread+0x24c/0x2d0 [ 35.709049] ret_from_fork+0x10/0x20 [ 35.709749] [ 35.710052] Allocated by task 254: [ 35.710656] kasan_save_stack+0x3c/0x68 [ 35.711248] kasan_save_track+0x20/0x40 [ 35.711900] kasan_save_alloc_info+0x40/0x58 [ 35.712579] __kasan_kmalloc+0xd4/0xd8 [ 35.713285] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.713907] kasan_atomics+0xb8/0x2e8 [ 35.714397] kunit_try_run_case+0x14c/0x3d0 [ 35.715164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.715955] kthread+0x24c/0x2d0 [ 35.716386] ret_from_fork+0x10/0x20 [ 35.717031] [ 35.717352] The buggy address belongs to the object at fff00000c664f800 [ 35.717352] which belongs to the cache kmalloc-64 of size 64 [ 35.718684] The buggy address is located 0 bytes to the right of [ 35.718684] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.720001] [ 35.720450] The buggy address belongs to the physical page: [ 35.721132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.722236] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.723096] page_type: f5(slab) [ 35.723568] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.724557] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.725476] page dumped because: kasan: bad access detected [ 35.726109] [ 35.726458] Memory state around the buggy address: [ 35.727071] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.727986] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.728760] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.729655] ^ [ 35.730242] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.731144] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.732055] ================================================================== [ 34.454540] ================================================================== [ 34.455368] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 34.457083] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.457866] [ 34.458272] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.460357] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.460949] Hardware name: linux,dummy-virt (DT) [ 34.461562] Call trace: [ 34.462014] show_stack+0x20/0x38 (C) [ 34.462605] dump_stack_lvl+0x8c/0xd0 [ 34.463182] print_report+0x118/0x5e0 [ 34.463844] kasan_report+0xc8/0x118 [ 34.464485] kasan_check_range+0x100/0x1a8 [ 34.465199] __kasan_check_write+0x20/0x30 [ 34.465815] kasan_atomics_helper+0x414/0x4858 [ 34.466477] kasan_atomics+0x198/0x2e8 [ 34.467013] kunit_try_run_case+0x14c/0x3d0 [ 34.467751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.468527] kthread+0x24c/0x2d0 [ 34.469152] ret_from_fork+0x10/0x20 [ 34.469799] [ 34.470300] Allocated by task 254: [ 34.471078] kasan_save_stack+0x3c/0x68 [ 34.471672] kasan_save_track+0x20/0x40 [ 34.472237] kasan_save_alloc_info+0x40/0x58 [ 34.472784] __kasan_kmalloc+0xd4/0xd8 [ 34.473392] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.473964] kasan_atomics+0xb8/0x2e8 [ 34.474678] kunit_try_run_case+0x14c/0x3d0 [ 34.475345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.476195] kthread+0x24c/0x2d0 [ 34.476848] ret_from_fork+0x10/0x20 [ 34.477596] [ 34.478117] The buggy address belongs to the object at fff00000c664f800 [ 34.478117] which belongs to the cache kmalloc-64 of size 64 [ 34.479523] The buggy address is located 0 bytes to the right of [ 34.479523] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.481059] [ 34.481635] The buggy address belongs to the physical page: [ 34.482505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.483526] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.484433] page_type: f5(slab) [ 34.485004] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.485923] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.486905] page dumped because: kasan: bad access detected [ 34.487563] [ 34.487923] Memory state around the buggy address: [ 34.488489] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.489397] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.490342] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.491273] ^ [ 34.491902] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.492762] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.493640] ================================================================== [ 34.495355] ================================================================== [ 34.496917] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 34.497793] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.498750] [ 34.499094] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.500539] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.501127] Hardware name: linux,dummy-virt (DT) [ 34.501795] Call trace: [ 34.502203] show_stack+0x20/0x38 (C) [ 34.502952] dump_stack_lvl+0x8c/0xd0 [ 34.503384] print_report+0x118/0x5e0 [ 34.504011] kasan_report+0xc8/0x118 [ 34.504653] kasan_check_range+0x100/0x1a8 [ 34.505372] __kasan_check_write+0x20/0x30 [ 34.506079] kasan_atomics_helper+0x47c/0x4858 [ 34.506758] kasan_atomics+0x198/0x2e8 [ 34.507411] kunit_try_run_case+0x14c/0x3d0 [ 34.508134] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.508900] kthread+0x24c/0x2d0 [ 34.509514] ret_from_fork+0x10/0x20 [ 34.510122] [ 34.510460] Allocated by task 254: [ 34.510909] kasan_save_stack+0x3c/0x68 [ 34.511551] kasan_save_track+0x20/0x40 [ 34.512339] kasan_save_alloc_info+0x40/0x58 [ 34.512923] __kasan_kmalloc+0xd4/0xd8 [ 34.513558] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.514187] kasan_atomics+0xb8/0x2e8 [ 34.514807] kunit_try_run_case+0x14c/0x3d0 [ 34.515414] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.516210] kthread+0x24c/0x2d0 [ 34.516800] ret_from_fork+0x10/0x20 [ 34.517356] [ 34.517658] The buggy address belongs to the object at fff00000c664f800 [ 34.517658] which belongs to the cache kmalloc-64 of size 64 [ 34.519174] The buggy address is located 0 bytes to the right of [ 34.519174] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.520547] [ 34.520870] The buggy address belongs to the physical page: [ 34.521696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.522669] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.523442] page_type: f5(slab) [ 34.523982] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.524978] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.525848] page dumped because: kasan: bad access detected [ 34.526540] [ 34.526865] Memory state around the buggy address: [ 34.527513] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.528330] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.529289] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.530168] ^ [ 34.530797] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.531696] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.532568] ================================================================== [ 34.770511] ================================================================== [ 34.771393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 34.772371] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.773313] [ 34.773684] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.775017] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.775670] Hardware name: linux,dummy-virt (DT) [ 34.776324] Call trace: [ 34.776923] show_stack+0x20/0x38 (C) [ 34.777764] dump_stack_lvl+0x8c/0xd0 [ 34.778420] print_report+0x118/0x5e0 [ 34.779144] kasan_report+0xc8/0x118 [ 34.779766] kasan_check_range+0x100/0x1a8 [ 34.780462] __kasan_check_write+0x20/0x30 [ 34.781141] kasan_atomics_helper+0x760/0x4858 [ 34.781926] kasan_atomics+0x198/0x2e8 [ 34.782552] kunit_try_run_case+0x14c/0x3d0 [ 34.783261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.784077] kthread+0x24c/0x2d0 [ 34.784672] ret_from_fork+0x10/0x20 [ 34.785308] [ 34.785739] Allocated by task 254: [ 34.786252] kasan_save_stack+0x3c/0x68 [ 34.786820] kasan_save_track+0x20/0x40 [ 34.787323] kasan_save_alloc_info+0x40/0x58 [ 34.788152] __kasan_kmalloc+0xd4/0xd8 [ 34.788749] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.789430] kasan_atomics+0xb8/0x2e8 [ 34.790044] kunit_try_run_case+0x14c/0x3d0 [ 34.790707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.791494] kthread+0x24c/0x2d0 [ 34.792104] ret_from_fork+0x10/0x20 [ 34.792717] [ 34.793112] The buggy address belongs to the object at fff00000c664f800 [ 34.793112] which belongs to the cache kmalloc-64 of size 64 [ 34.794557] The buggy address is located 0 bytes to the right of [ 34.794557] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.796199] [ 34.796596] The buggy address belongs to the physical page: [ 34.797364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.798413] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.799297] page_type: f5(slab) [ 34.799870] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.800892] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.801806] page dumped because: kasan: bad access detected [ 34.802571] [ 34.803074] Memory state around the buggy address: [ 34.803794] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.804796] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.805713] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.806620] ^ [ 34.807362] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.808302] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.809154] ================================================================== [ 35.237325] ================================================================== [ 35.238106] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 35.239484] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.241400] [ 35.241840] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.243470] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.244002] Hardware name: linux,dummy-virt (DT) [ 35.244567] Call trace: [ 35.245038] show_stack+0x20/0x38 (C) [ 35.245851] dump_stack_lvl+0x8c/0xd0 [ 35.246688] print_report+0x118/0x5e0 [ 35.247214] kasan_report+0xc8/0x118 [ 35.247868] kasan_check_range+0x100/0x1a8 [ 35.248486] __kasan_check_write+0x20/0x30 [ 35.249165] kasan_atomics_helper+0xc08/0x4858 [ 35.249936] kasan_atomics+0x198/0x2e8 [ 35.250452] kunit_try_run_case+0x14c/0x3d0 [ 35.251123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.251888] kthread+0x24c/0x2d0 [ 35.252459] ret_from_fork+0x10/0x20 [ 35.253149] [ 35.253463] Allocated by task 254: [ 35.254020] kasan_save_stack+0x3c/0x68 [ 35.254571] kasan_save_track+0x20/0x40 [ 35.255505] kasan_save_alloc_info+0x40/0x58 [ 35.256113] __kasan_kmalloc+0xd4/0xd8 [ 35.256664] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.257324] kasan_atomics+0xb8/0x2e8 [ 35.257941] kunit_try_run_case+0x14c/0x3d0 [ 35.258594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.259295] kthread+0x24c/0x2d0 [ 35.259903] ret_from_fork+0x10/0x20 [ 35.260485] [ 35.260834] The buggy address belongs to the object at fff00000c664f800 [ 35.260834] which belongs to the cache kmalloc-64 of size 64 [ 35.262300] The buggy address is located 0 bytes to the right of [ 35.262300] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.263699] [ 35.264058] The buggy address belongs to the physical page: [ 35.264662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.265624] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.266515] page_type: f5(slab) [ 35.267074] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.267967] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.268959] page dumped because: kasan: bad access detected [ 35.269652] [ 35.269992] Memory state around the buggy address: [ 35.270625] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.271442] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.272269] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.273128] ^ [ 35.273916] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.274801] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.275651] ================================================================== [ 36.233535] ================================================================== [ 36.234432] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 36.235459] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 36.236595] [ 36.237004] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.238496] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.239074] Hardware name: linux,dummy-virt (DT) [ 36.239937] Call trace: [ 36.240360] show_stack+0x20/0x38 (C) [ 36.241056] dump_stack_lvl+0x8c/0xd0 [ 36.241776] print_report+0x118/0x5e0 [ 36.242505] kasan_report+0xc8/0x118 [ 36.243139] kasan_check_range+0x100/0x1a8 [ 36.243819] __kasan_check_write+0x20/0x30 [ 36.244533] kasan_atomics_helper+0x154c/0x4858 [ 36.245247] kasan_atomics+0x198/0x2e8 [ 36.245897] kunit_try_run_case+0x14c/0x3d0 [ 36.246588] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.247408] kthread+0x24c/0x2d0 [ 36.248017] ret_from_fork+0x10/0x20 [ 36.248649] [ 36.249013] Allocated by task 254: [ 36.249650] kasan_save_stack+0x3c/0x68 [ 36.250287] kasan_save_track+0x20/0x40 [ 36.251014] kasan_save_alloc_info+0x40/0x58 [ 36.251697] __kasan_kmalloc+0xd4/0xd8 [ 36.252318] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.252994] kasan_atomics+0xb8/0x2e8 [ 36.253583] kunit_try_run_case+0x14c/0x3d0 [ 36.254263] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.255095] kthread+0x24c/0x2d0 [ 36.255801] ret_from_fork+0x10/0x20 [ 36.256496] [ 36.257014] The buggy address belongs to the object at fff00000c664f800 [ 36.257014] which belongs to the cache kmalloc-64 of size 64 [ 36.258362] The buggy address is located 0 bytes to the right of [ 36.258362] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 36.259947] [ 36.260450] The buggy address belongs to the physical page: [ 36.261157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 36.262347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.262763] page_type: f5(slab) [ 36.263050] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.263494] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.264024] page dumped because: kasan: bad access detected [ 36.265120] [ 36.265618] Memory state around the buggy address: [ 36.266282] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.267223] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.268127] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.269030] ^ [ 36.269705] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.270617] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.271526] ================================================================== [ 36.043925] ================================================================== [ 36.044687] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 36.045490] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 36.046586] [ 36.047031] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.048288] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.048868] Hardware name: linux,dummy-virt (DT) [ 36.049556] Call trace: [ 36.049970] show_stack+0x20/0x38 (C) [ 36.050571] dump_stack_lvl+0x8c/0xd0 [ 36.051097] print_report+0x118/0x5e0 [ 36.051765] kasan_report+0xc8/0x118 [ 36.052298] kasan_check_range+0x100/0x1a8 [ 36.052986] __kasan_check_write+0x20/0x30 [ 36.053686] kasan_atomics_helper+0x1384/0x4858 [ 36.054304] kasan_atomics+0x198/0x2e8 [ 36.055002] kunit_try_run_case+0x14c/0x3d0 [ 36.055631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.056409] kthread+0x24c/0x2d0 [ 36.057013] ret_from_fork+0x10/0x20 [ 36.057621] [ 36.057917] Allocated by task 254: [ 36.058477] kasan_save_stack+0x3c/0x68 [ 36.059088] kasan_save_track+0x20/0x40 [ 36.059678] kasan_save_alloc_info+0x40/0x58 [ 36.060186] __kasan_kmalloc+0xd4/0xd8 [ 36.060825] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.061370] kasan_atomics+0xb8/0x2e8 [ 36.062003] kunit_try_run_case+0x14c/0x3d0 [ 36.062637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.063434] kthread+0x24c/0x2d0 [ 36.063947] ret_from_fork+0x10/0x20 [ 36.064570] [ 36.064866] The buggy address belongs to the object at fff00000c664f800 [ 36.064866] which belongs to the cache kmalloc-64 of size 64 [ 36.066417] The buggy address is located 0 bytes to the right of [ 36.066417] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 36.067852] [ 36.068186] The buggy address belongs to the physical page: [ 36.068897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 36.069784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.070692] page_type: f5(slab) [ 36.071146] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.072148] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.073014] page dumped because: kasan: bad access detected [ 36.073679] [ 36.074023] Memory state around the buggy address: [ 36.074753] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.075620] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.076947] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.077911] ^ [ 36.078745] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.079687] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.080540] ================================================================== [ 34.572991] ================================================================== [ 34.573605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 34.574659] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.575627] [ 34.576148] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.577226] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.577701] Hardware name: linux,dummy-virt (DT) [ 34.578481] Call trace: [ 34.578900] show_stack+0x20/0x38 (C) [ 34.579475] dump_stack_lvl+0x8c/0xd0 [ 34.580039] print_report+0x118/0x5e0 [ 34.580588] kasan_report+0xc8/0x118 [ 34.581096] kasan_check_range+0x100/0x1a8 [ 34.581804] __kasan_check_write+0x20/0x30 [ 34.582499] kasan_atomics_helper+0x54c/0x4858 [ 34.583252] kasan_atomics+0x198/0x2e8 [ 34.583821] kunit_try_run_case+0x14c/0x3d0 [ 34.584427] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.585200] kthread+0x24c/0x2d0 [ 34.585806] ret_from_fork+0x10/0x20 [ 34.586403] [ 34.586794] Allocated by task 254: [ 34.587362] kasan_save_stack+0x3c/0x68 [ 34.587952] kasan_save_track+0x20/0x40 [ 34.588494] kasan_save_alloc_info+0x40/0x58 [ 34.589173] __kasan_kmalloc+0xd4/0xd8 [ 34.589715] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.590361] kasan_atomics+0xb8/0x2e8 [ 34.590927] kunit_try_run_case+0x14c/0x3d0 [ 34.591556] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.592274] kthread+0x24c/0x2d0 [ 34.592774] ret_from_fork+0x10/0x20 [ 34.593410] [ 34.593743] The buggy address belongs to the object at fff00000c664f800 [ 34.593743] which belongs to the cache kmalloc-64 of size 64 [ 34.595140] The buggy address is located 0 bytes to the right of [ 34.595140] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.596738] [ 34.597042] The buggy address belongs to the physical page: [ 34.597841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.598821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.599675] page_type: f5(slab) [ 34.600211] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.601113] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.602087] page dumped because: kasan: bad access detected [ 34.602753] [ 34.603138] Memory state around the buggy address: [ 34.603810] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.604642] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.605508] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.606356] ^ [ 34.607117] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.607968] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.608809] ================================================================== [ 35.889413] ================================================================== [ 35.890044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 35.891290] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.892472] [ 35.892976] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.894736] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.895610] Hardware name: linux,dummy-virt (DT) [ 35.896492] Call trace: [ 35.897125] show_stack+0x20/0x38 (C) [ 35.897936] dump_stack_lvl+0x8c/0xd0 [ 35.898518] print_report+0x118/0x5e0 [ 35.899310] kasan_report+0xc8/0x118 [ 35.900052] kasan_check_range+0x100/0x1a8 [ 35.900647] __kasan_check_write+0x20/0x30 [ 35.901434] kasan_atomics_helper+0x1190/0x4858 [ 35.902098] kasan_atomics+0x198/0x2e8 [ 35.902669] kunit_try_run_case+0x14c/0x3d0 [ 35.903483] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.904301] kthread+0x24c/0x2d0 [ 35.904827] ret_from_fork+0x10/0x20 [ 35.905432] [ 35.905804] Allocated by task 254: [ 35.906422] kasan_save_stack+0x3c/0x68 [ 35.906961] kasan_save_track+0x20/0x40 [ 35.907540] kasan_save_alloc_info+0x40/0x58 [ 35.908230] __kasan_kmalloc+0xd4/0xd8 [ 35.908777] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.909410] kasan_atomics+0xb8/0x2e8 [ 35.909898] kunit_try_run_case+0x14c/0x3d0 [ 35.910585] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.911383] kthread+0x24c/0x2d0 [ 35.911985] ret_from_fork+0x10/0x20 [ 35.912524] [ 35.912864] The buggy address belongs to the object at fff00000c664f800 [ 35.912864] which belongs to the cache kmalloc-64 of size 64 [ 35.914244] The buggy address is located 0 bytes to the right of [ 35.914244] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.915570] [ 35.915994] The buggy address belongs to the physical page: [ 35.916660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.917776] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.918526] page_type: f5(slab) [ 35.919114] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.920063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.921015] page dumped because: kasan: bad access detected [ 35.921670] [ 35.921989] Memory state around the buggy address: [ 35.922619] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.923427] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.924361] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.925204] ^ [ 35.925801] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.926703] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.927526] ================================================================== [ 35.770693] ================================================================== [ 35.771679] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 35.772848] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.774001] [ 35.774457] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.775688] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.776370] Hardware name: linux,dummy-virt (DT) [ 35.776964] Call trace: [ 35.777570] show_stack+0x20/0x38 (C) [ 35.778296] dump_stack_lvl+0x8c/0xd0 [ 35.778968] print_report+0x118/0x5e0 [ 35.779588] kasan_report+0xc8/0x118 [ 35.780219] kasan_check_range+0x100/0x1a8 [ 35.780902] __kasan_check_write+0x20/0x30 [ 35.781522] kasan_atomics_helper+0x1058/0x4858 [ 35.782230] kasan_atomics+0x198/0x2e8 [ 35.782895] kunit_try_run_case+0x14c/0x3d0 [ 35.783580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.784387] kthread+0x24c/0x2d0 [ 35.785007] ret_from_fork+0x10/0x20 [ 35.785655] [ 35.786028] Allocated by task 254: [ 35.786631] kasan_save_stack+0x3c/0x68 [ 35.787360] kasan_save_track+0x20/0x40 [ 35.787981] kasan_save_alloc_info+0x40/0x58 [ 35.788643] __kasan_kmalloc+0xd4/0xd8 [ 35.789252] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.789974] kasan_atomics+0xb8/0x2e8 [ 35.790593] kunit_try_run_case+0x14c/0x3d0 [ 35.791323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.792114] kthread+0x24c/0x2d0 [ 35.792666] ret_from_fork+0x10/0x20 [ 35.793292] [ 35.793634] The buggy address belongs to the object at fff00000c664f800 [ 35.793634] which belongs to the cache kmalloc-64 of size 64 [ 35.795141] The buggy address is located 0 bytes to the right of [ 35.795141] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.796506] [ 35.796923] The buggy address belongs to the physical page: [ 35.797596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.798658] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.799524] page_type: f5(slab) [ 35.800066] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.801123] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.802106] page dumped because: kasan: bad access detected [ 35.802806] [ 35.803132] Memory state around the buggy address: [ 35.803834] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.804638] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.805484] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.806333] ^ [ 35.807026] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.808119] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.808982] ================================================================== [ 35.465277] ================================================================== [ 35.466282] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 35.468175] Read of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.469376] [ 35.469697] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.471303] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.471899] Hardware name: linux,dummy-virt (DT) [ 35.472535] Call trace: [ 35.473040] show_stack+0x20/0x38 (C) [ 35.473723] dump_stack_lvl+0x8c/0xd0 [ 35.474452] print_report+0x118/0x5e0 [ 35.474969] kasan_report+0xc8/0x118 [ 35.475507] kasan_check_range+0x100/0x1a8 [ 35.476170] __kasan_check_read+0x20/0x30 [ 35.476752] kasan_atomics_helper+0xdd4/0x4858 [ 35.477396] kasan_atomics+0x198/0x2e8 [ 35.478113] kunit_try_run_case+0x14c/0x3d0 [ 35.478782] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.479485] kthread+0x24c/0x2d0 [ 35.480090] ret_from_fork+0x10/0x20 [ 35.480572] [ 35.480944] Allocated by task 254: [ 35.481446] kasan_save_stack+0x3c/0x68 [ 35.482122] kasan_save_track+0x20/0x40 [ 35.482700] kasan_save_alloc_info+0x40/0x58 [ 35.483744] __kasan_kmalloc+0xd4/0xd8 [ 35.484328] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.485025] kasan_atomics+0xb8/0x2e8 [ 35.485594] kunit_try_run_case+0x14c/0x3d0 [ 35.486276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.486985] kthread+0x24c/0x2d0 [ 35.487545] ret_from_fork+0x10/0x20 [ 35.488089] [ 35.488380] The buggy address belongs to the object at fff00000c664f800 [ 35.488380] which belongs to the cache kmalloc-64 of size 64 [ 35.489783] The buggy address is located 0 bytes to the right of [ 35.489783] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.491190] [ 35.491472] The buggy address belongs to the physical page: [ 35.492247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.493154] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.493953] page_type: f5(slab) [ 35.494497] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.495489] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.496390] page dumped because: kasan: bad access detected [ 35.497055] [ 35.497384] Memory state around the buggy address: [ 35.497949] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.498870] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.499760] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.500621] ^ [ 35.501319] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.502183] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.503008] ================================================================== [ 34.181635] ================================================================== [ 34.182575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 34.184543] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.185559] [ 34.185926] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.187212] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.187983] Hardware name: linux,dummy-virt (DT) [ 34.188849] Call trace: [ 34.189452] show_stack+0x20/0x38 (C) [ 34.190246] dump_stack_lvl+0x8c/0xd0 [ 34.190980] print_report+0x118/0x5e0 [ 34.191772] kasan_report+0xc8/0x118 [ 34.192663] kasan_check_range+0x100/0x1a8 [ 34.193168] __kasan_check_write+0x20/0x30 [ 34.194029] kasan_atomics_helper+0x24c/0x4858 [ 34.194891] kasan_atomics+0x198/0x2e8 [ 34.195986] kunit_try_run_case+0x14c/0x3d0 [ 34.196779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.197578] kthread+0x24c/0x2d0 [ 34.198197] ret_from_fork+0x10/0x20 [ 34.198846] [ 34.199225] Allocated by task 254: [ 34.199932] kasan_save_stack+0x3c/0x68 [ 34.200595] kasan_save_track+0x20/0x40 [ 34.201260] kasan_save_alloc_info+0x40/0x58 [ 34.201911] __kasan_kmalloc+0xd4/0xd8 [ 34.202537] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.203324] kasan_atomics+0xb8/0x2e8 [ 34.204422] kunit_try_run_case+0x14c/0x3d0 [ 34.205162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.205991] kthread+0x24c/0x2d0 [ 34.206632] ret_from_fork+0x10/0x20 [ 34.207254] [ 34.207758] The buggy address belongs to the object at fff00000c664f800 [ 34.207758] which belongs to the cache kmalloc-64 of size 64 [ 34.209862] The buggy address is located 0 bytes to the right of [ 34.209862] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.211510] [ 34.212154] The buggy address belongs to the physical page: [ 34.212913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.214031] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.214897] page_type: f5(slab) [ 34.215977] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.217127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.218166] page dumped because: kasan: bad access detected [ 34.219158] [ 34.219907] Memory state around the buggy address: [ 34.220576] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.221648] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.222681] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.223917] ^ [ 34.224559] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.225370] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.226534] ================================================================== [ 34.610009] ================================================================== [ 34.610761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 34.612080] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.612978] [ 34.613357] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.614500] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.615267] Hardware name: linux,dummy-virt (DT) [ 34.615810] Call trace: [ 34.616307] show_stack+0x20/0x38 (C) [ 34.617052] dump_stack_lvl+0x8c/0xd0 [ 34.617682] print_report+0x118/0x5e0 [ 34.618278] kasan_report+0xc8/0x118 [ 34.618815] kasan_check_range+0x100/0x1a8 [ 34.619541] __kasan_check_write+0x20/0x30 [ 34.620165] kasan_atomics_helper+0x5b4/0x4858 [ 34.620669] kasan_atomics+0x198/0x2e8 [ 34.621342] kunit_try_run_case+0x14c/0x3d0 [ 34.622065] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.622930] kthread+0x24c/0x2d0 [ 34.623469] ret_from_fork+0x10/0x20 [ 34.624136] [ 34.624412] Allocated by task 254: [ 34.625197] kasan_save_stack+0x3c/0x68 [ 34.625912] kasan_save_track+0x20/0x40 [ 34.626510] kasan_save_alloc_info+0x40/0x58 [ 34.627108] __kasan_kmalloc+0xd4/0xd8 [ 34.627726] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.628394] kasan_atomics+0xb8/0x2e8 [ 34.628971] kunit_try_run_case+0x14c/0x3d0 [ 34.629620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.630325] kthread+0x24c/0x2d0 [ 34.630947] ret_from_fork+0x10/0x20 [ 34.631476] [ 34.631892] The buggy address belongs to the object at fff00000c664f800 [ 34.631892] which belongs to the cache kmalloc-64 of size 64 [ 34.633323] The buggy address is located 0 bytes to the right of [ 34.633323] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.634695] [ 34.635034] The buggy address belongs to the physical page: [ 34.635753] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.636699] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.637488] page_type: f5(slab) [ 34.638093] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.638982] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.639902] page dumped because: kasan: bad access detected [ 34.640571] [ 34.640863] Memory state around the buggy address: [ 34.641501] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.642366] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.643244] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.644115] ^ [ 34.644630] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.645609] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.646475] ================================================================== [ 35.008161] ================================================================== [ 35.008839] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 35.010366] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.011319] [ 35.011755] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.013054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.013738] Hardware name: linux,dummy-virt (DT) [ 35.014294] Call trace: [ 35.014852] show_stack+0x20/0x38 (C) [ 35.015422] dump_stack_lvl+0x8c/0xd0 [ 35.016016] print_report+0x118/0x5e0 [ 35.016660] kasan_report+0xc8/0x118 [ 35.017255] kasan_check_range+0x100/0x1a8 [ 35.017783] __kasan_check_write+0x20/0x30 [ 35.018504] kasan_atomics_helper+0xa04/0x4858 [ 35.019185] kasan_atomics+0x198/0x2e8 [ 35.019855] kunit_try_run_case+0x14c/0x3d0 [ 35.020508] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.021232] kthread+0x24c/0x2d0 [ 35.021787] ret_from_fork+0x10/0x20 [ 35.022496] [ 35.022823] Allocated by task 254: [ 35.023295] kasan_save_stack+0x3c/0x68 [ 35.023917] kasan_save_track+0x20/0x40 [ 35.024450] kasan_save_alloc_info+0x40/0x58 [ 35.025147] __kasan_kmalloc+0xd4/0xd8 [ 35.025651] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.026323] kasan_atomics+0xb8/0x2e8 [ 35.027054] kunit_try_run_case+0x14c/0x3d0 [ 35.027642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.028319] kthread+0x24c/0x2d0 [ 35.028929] ret_from_fork+0x10/0x20 [ 35.029505] [ 35.029957] The buggy address belongs to the object at fff00000c664f800 [ 35.029957] which belongs to the cache kmalloc-64 of size 64 [ 35.031340] The buggy address is located 0 bytes to the right of [ 35.031340] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.032764] [ 35.033111] The buggy address belongs to the physical page: [ 35.033793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.035020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.036036] page_type: f5(slab) [ 35.036513] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.037398] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.038474] page dumped because: kasan: bad access detected [ 35.039188] [ 35.039520] Memory state around the buggy address: [ 35.040175] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.040989] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.041823] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.042752] ^ [ 35.043394] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.044253] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.045163] ================================================================== [ 35.161581] ================================================================== [ 35.162320] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 35.163382] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.164219] [ 35.164599] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.165642] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.166424] Hardware name: linux,dummy-virt (DT) [ 35.167077] Call trace: [ 35.167470] show_stack+0x20/0x38 (C) [ 35.168053] dump_stack_lvl+0x8c/0xd0 [ 35.168687] print_report+0x118/0x5e0 [ 35.169231] kasan_report+0xc8/0x118 [ 35.169700] kasan_check_range+0x100/0x1a8 [ 35.170655] __kasan_check_write+0x20/0x30 [ 35.171314] kasan_atomics_helper+0xb70/0x4858 [ 35.171942] kasan_atomics+0x198/0x2e8 [ 35.172668] kunit_try_run_case+0x14c/0x3d0 [ 35.173323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.174099] kthread+0x24c/0x2d0 [ 35.174616] ret_from_fork+0x10/0x20 [ 35.175184] [ 35.175602] Allocated by task 254: [ 35.176114] kasan_save_stack+0x3c/0x68 [ 35.176665] kasan_save_track+0x20/0x40 [ 35.177229] kasan_save_alloc_info+0x40/0x58 [ 35.177901] __kasan_kmalloc+0xd4/0xd8 [ 35.178440] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.179113] kasan_atomics+0xb8/0x2e8 [ 35.179598] kunit_try_run_case+0x14c/0x3d0 [ 35.180266] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.181089] kthread+0x24c/0x2d0 [ 35.181663] ret_from_fork+0x10/0x20 [ 35.182129] [ 35.182529] The buggy address belongs to the object at fff00000c664f800 [ 35.182529] which belongs to the cache kmalloc-64 of size 64 [ 35.183913] The buggy address is located 0 bytes to the right of [ 35.183913] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.185617] [ 35.185911] The buggy address belongs to the physical page: [ 35.186769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.187594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.188670] page_type: f5(slab) [ 35.189127] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.190027] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.191052] page dumped because: kasan: bad access detected [ 35.191712] [ 35.192075] Memory state around the buggy address: [ 35.192709] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.193579] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.194445] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.195267] ^ [ 35.195962] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.196837] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.197716] ================================================================== [ 34.276127] ================================================================== [ 34.276715] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 34.278698] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.280430] [ 34.280975] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.282251] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.282870] Hardware name: linux,dummy-virt (DT) [ 34.283687] Call trace: [ 34.284790] show_stack+0x20/0x38 (C) [ 34.285671] dump_stack_lvl+0x8c/0xd0 [ 34.286339] print_report+0x118/0x5e0 [ 34.287003] kasan_report+0xc8/0x118 [ 34.287694] __asan_report_load4_noabort+0x20/0x30 [ 34.288650] kasan_atomics_helper+0x40fc/0x4858 [ 34.289372] kasan_atomics+0x198/0x2e8 [ 34.290028] kunit_try_run_case+0x14c/0x3d0 [ 34.290693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.291520] kthread+0x24c/0x2d0 [ 34.292287] ret_from_fork+0x10/0x20 [ 34.292851] [ 34.293153] Allocated by task 254: [ 34.293680] kasan_save_stack+0x3c/0x68 [ 34.294724] kasan_save_track+0x20/0x40 [ 34.295758] kasan_save_alloc_info+0x40/0x58 [ 34.296651] __kasan_kmalloc+0xd4/0xd8 [ 34.297305] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.298013] kasan_atomics+0xb8/0x2e8 [ 34.298629] kunit_try_run_case+0x14c/0x3d0 [ 34.299323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.300166] kthread+0x24c/0x2d0 [ 34.301348] ret_from_fork+0x10/0x20 [ 34.301902] [ 34.302232] The buggy address belongs to the object at fff00000c664f800 [ 34.302232] which belongs to the cache kmalloc-64 of size 64 [ 34.304485] The buggy address is located 0 bytes to the right of [ 34.304485] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.306108] [ 34.306573] The buggy address belongs to the physical page: [ 34.307473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.309166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.310065] page_type: f5(slab) [ 34.310639] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.311758] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.313260] page dumped because: kasan: bad access detected [ 34.314090] [ 34.314448] Memory state around the buggy address: [ 34.315156] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.316732] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.317631] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.318621] ^ [ 34.319334] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.320770] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.321682] ================================================================== [ 35.390416] ================================================================== [ 35.391089] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 35.392090] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.392924] [ 35.393239] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.394685] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.395225] Hardware name: linux,dummy-virt (DT) [ 35.396191] Call trace: [ 35.396641] show_stack+0x20/0x38 (C) [ 35.397214] dump_stack_lvl+0x8c/0xd0 [ 35.397827] print_report+0x118/0x5e0 [ 35.398465] kasan_report+0xc8/0x118 [ 35.399025] kasan_check_range+0x100/0x1a8 [ 35.399700] __kasan_check_write+0x20/0x30 [ 35.400363] kasan_atomics_helper+0xd3c/0x4858 [ 35.401056] kasan_atomics+0x198/0x2e8 [ 35.401619] kunit_try_run_case+0x14c/0x3d0 [ 35.402203] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.402987] kthread+0x24c/0x2d0 [ 35.403481] ret_from_fork+0x10/0x20 [ 35.404119] [ 35.404474] Allocated by task 254: [ 35.404967] kasan_save_stack+0x3c/0x68 [ 35.405563] kasan_save_track+0x20/0x40 [ 35.406203] kasan_save_alloc_info+0x40/0x58 [ 35.406822] __kasan_kmalloc+0xd4/0xd8 [ 35.407431] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.408126] kasan_atomics+0xb8/0x2e8 [ 35.408658] kunit_try_run_case+0x14c/0x3d0 [ 35.409360] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.409988] kthread+0x24c/0x2d0 [ 35.410589] ret_from_fork+0x10/0x20 [ 35.411154] [ 35.411460] The buggy address belongs to the object at fff00000c664f800 [ 35.411460] which belongs to the cache kmalloc-64 of size 64 [ 35.412894] The buggy address is located 0 bytes to the right of [ 35.412894] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.414237] [ 35.414607] The buggy address belongs to the physical page: [ 35.415323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.416214] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.417110] page_type: f5(slab) [ 35.417690] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.418594] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.419586] page dumped because: kasan: bad access detected [ 35.420400] [ 35.420681] Memory state around the buggy address: [ 35.421372] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.422215] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.423048] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.423916] ^ [ 35.424534] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.425441] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.426336] ================================================================== [ 36.432764] ================================================================== [ 36.433695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 36.434324] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 36.435059] [ 36.435359] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.436748] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.437313] Hardware name: linux,dummy-virt (DT) [ 36.437939] Call trace: [ 36.438469] show_stack+0x20/0x38 (C) [ 36.439241] dump_stack_lvl+0x8c/0xd0 [ 36.440009] print_report+0x118/0x5e0 [ 36.440781] kasan_report+0xc8/0x118 [ 36.441356] kasan_check_range+0x100/0x1a8 [ 36.442024] __kasan_check_write+0x20/0x30 [ 36.442659] kasan_atomics_helper+0x16d0/0x4858 [ 36.443358] kasan_atomics+0x198/0x2e8 [ 36.443996] kunit_try_run_case+0x14c/0x3d0 [ 36.444601] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.445321] kthread+0x24c/0x2d0 [ 36.445898] ret_from_fork+0x10/0x20 [ 36.446563] [ 36.446910] Allocated by task 254: [ 36.447594] kasan_save_stack+0x3c/0x68 [ 36.448193] kasan_save_track+0x20/0x40 [ 36.448706] kasan_save_alloc_info+0x40/0x58 [ 36.449463] __kasan_kmalloc+0xd4/0xd8 [ 36.450094] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.450710] kasan_atomics+0xb8/0x2e8 [ 36.451250] kunit_try_run_case+0x14c/0x3d0 [ 36.451771] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.452657] kthread+0x24c/0x2d0 [ 36.453184] ret_from_fork+0x10/0x20 [ 36.453698] [ 36.454060] The buggy address belongs to the object at fff00000c664f800 [ 36.454060] which belongs to the cache kmalloc-64 of size 64 [ 36.455352] The buggy address is located 0 bytes to the right of [ 36.455352] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 36.456912] [ 36.457215] The buggy address belongs to the physical page: [ 36.458018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 36.458994] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.459804] page_type: f5(slab) [ 36.460379] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.461312] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.462228] page dumped because: kasan: bad access detected [ 36.462938] [ 36.463306] Memory state around the buggy address: [ 36.464082] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.464896] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.465724] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.466707] ^ [ 36.467364] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.468241] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.469189] ================================================================== [ 35.352187] ================================================================== [ 35.352960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 35.353770] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.354725] [ 35.355273] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.356692] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.357335] Hardware name: linux,dummy-virt (DT) [ 35.358474] Call trace: [ 35.358983] show_stack+0x20/0x38 (C) [ 35.359695] dump_stack_lvl+0x8c/0xd0 [ 35.360294] print_report+0x118/0x5e0 [ 35.360867] kasan_report+0xc8/0x118 [ 35.361464] __asan_report_load4_noabort+0x20/0x30 [ 35.362029] kasan_atomics_helper+0x3dd8/0x4858 [ 35.362768] kasan_atomics+0x198/0x2e8 [ 35.363451] kunit_try_run_case+0x14c/0x3d0 [ 35.364185] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.364924] kthread+0x24c/0x2d0 [ 35.365538] ret_from_fork+0x10/0x20 [ 35.366138] [ 35.366430] Allocated by task 254: [ 35.367123] kasan_save_stack+0x3c/0x68 [ 35.367794] kasan_save_track+0x20/0x40 [ 35.368445] kasan_save_alloc_info+0x40/0x58 [ 35.369091] __kasan_kmalloc+0xd4/0xd8 [ 35.369646] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.370336] kasan_atomics+0xb8/0x2e8 [ 35.370861] kunit_try_run_case+0x14c/0x3d0 [ 35.371579] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.372273] kthread+0x24c/0x2d0 [ 35.372867] ret_from_fork+0x10/0x20 [ 35.373499] [ 35.373791] The buggy address belongs to the object at fff00000c664f800 [ 35.373791] which belongs to the cache kmalloc-64 of size 64 [ 35.375254] The buggy address is located 0 bytes to the right of [ 35.375254] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.376633] [ 35.377107] The buggy address belongs to the physical page: [ 35.377851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.379104] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.379897] page_type: f5(slab) [ 35.380502] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.381357] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.382367] page dumped because: kasan: bad access detected [ 35.383056] [ 35.383353] Memory state around the buggy address: [ 35.384046] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.384903] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.385768] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.386648] ^ [ 35.387264] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.388184] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.389026] ================================================================== [ 35.967570] ================================================================== [ 35.968495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 35.969323] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.970199] [ 35.970577] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.971889] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.972390] Hardware name: linux,dummy-virt (DT) [ 35.973026] Call trace: [ 35.973519] show_stack+0x20/0x38 (C) [ 35.974188] dump_stack_lvl+0x8c/0xd0 [ 35.974771] print_report+0x118/0x5e0 [ 35.975429] kasan_report+0xc8/0x118 [ 35.976108] kasan_check_range+0x100/0x1a8 [ 35.976597] __kasan_check_write+0x20/0x30 [ 35.977260] kasan_atomics_helper+0x126c/0x4858 [ 35.977914] kasan_atomics+0x198/0x2e8 [ 35.978592] kunit_try_run_case+0x14c/0x3d0 [ 35.979303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.980026] kthread+0x24c/0x2d0 [ 35.980548] ret_from_fork+0x10/0x20 [ 35.981179] [ 35.981504] Allocated by task 254: [ 35.982079] kasan_save_stack+0x3c/0x68 [ 35.982604] kasan_save_track+0x20/0x40 [ 35.983289] kasan_save_alloc_info+0x40/0x58 [ 35.983910] __kasan_kmalloc+0xd4/0xd8 [ 35.984377] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.985129] kasan_atomics+0xb8/0x2e8 [ 35.985743] kunit_try_run_case+0x14c/0x3d0 [ 35.986404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.987134] kthread+0x24c/0x2d0 [ 35.987607] ret_from_fork+0x10/0x20 [ 35.988219] [ 35.988521] The buggy address belongs to the object at fff00000c664f800 [ 35.988521] which belongs to the cache kmalloc-64 of size 64 [ 35.989851] The buggy address is located 0 bytes to the right of [ 35.989851] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.991308] [ 35.991592] The buggy address belongs to the physical page: [ 35.992381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.993237] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.994215] page_type: f5(slab) [ 35.994690] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.995660] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.996565] page dumped because: kasan: bad access detected [ 35.997365] [ 35.997703] Memory state around the buggy address: [ 35.998422] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.999291] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.000197] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.001058] ^ [ 36.001695] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.002631] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.003552] ================================================================== [ 34.534916] ================================================================== [ 34.535793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 34.536667] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.537690] [ 34.538043] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.539311] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.539953] Hardware name: linux,dummy-virt (DT) [ 34.540579] Call trace: [ 34.541012] show_stack+0x20/0x38 (C) [ 34.541587] dump_stack_lvl+0x8c/0xd0 [ 34.542158] print_report+0x118/0x5e0 [ 34.542849] kasan_report+0xc8/0x118 [ 34.543389] kasan_check_range+0x100/0x1a8 [ 34.544094] __kasan_check_write+0x20/0x30 [ 34.544633] kasan_atomics_helper+0x4e4/0x4858 [ 34.545381] kasan_atomics+0x198/0x2e8 [ 34.546046] kunit_try_run_case+0x14c/0x3d0 [ 34.546698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.547521] kthread+0x24c/0x2d0 [ 34.548152] ret_from_fork+0x10/0x20 [ 34.548716] [ 34.549184] Allocated by task 254: [ 34.549688] kasan_save_stack+0x3c/0x68 [ 34.550254] kasan_save_track+0x20/0x40 [ 34.550925] kasan_save_alloc_info+0x40/0x58 [ 34.551514] __kasan_kmalloc+0xd4/0xd8 [ 34.552026] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.552688] kasan_atomics+0xb8/0x2e8 [ 34.553179] kunit_try_run_case+0x14c/0x3d0 [ 34.553870] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.554608] kthread+0x24c/0x2d0 [ 34.555225] ret_from_fork+0x10/0x20 [ 34.555711] [ 34.556113] The buggy address belongs to the object at fff00000c664f800 [ 34.556113] which belongs to the cache kmalloc-64 of size 64 [ 34.557493] The buggy address is located 0 bytes to the right of [ 34.557493] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.558937] [ 34.559341] The buggy address belongs to the physical page: [ 34.559905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.560931] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.561789] page_type: f5(slab) [ 34.562270] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.563282] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.564134] page dumped because: kasan: bad access detected [ 34.564951] [ 34.565310] Memory state around the buggy address: [ 34.565968] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.566974] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.567814] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.568616] ^ [ 34.569388] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.570355] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.571221] ================================================================== [ 36.548452] ================================================================== [ 36.549547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 36.550471] Read of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 36.551385] [ 36.551804] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.553121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.553648] Hardware name: linux,dummy-virt (DT) [ 36.554238] Call trace: [ 36.554703] show_stack+0x20/0x38 (C) [ 36.555290] dump_stack_lvl+0x8c/0xd0 [ 36.555901] print_report+0x118/0x5e0 [ 36.556666] kasan_report+0xc8/0x118 [ 36.557381] __asan_report_load8_noabort+0x20/0x30 [ 36.558127] kasan_atomics_helper+0x3e20/0x4858 [ 36.558894] kasan_atomics+0x198/0x2e8 [ 36.559490] kunit_try_run_case+0x14c/0x3d0 [ 36.560003] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.560787] kthread+0x24c/0x2d0 [ 36.561411] ret_from_fork+0x10/0x20 [ 36.562070] [ 36.562445] Allocated by task 254: [ 36.563116] kasan_save_stack+0x3c/0x68 [ 36.563632] kasan_save_track+0x20/0x40 [ 36.564274] kasan_save_alloc_info+0x40/0x58 [ 36.564933] __kasan_kmalloc+0xd4/0xd8 [ 36.565921] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.566505] kasan_atomics+0xb8/0x2e8 [ 36.567118] kunit_try_run_case+0x14c/0x3d0 [ 36.567826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.568596] kthread+0x24c/0x2d0 [ 36.569121] ret_from_fork+0x10/0x20 [ 36.569604] [ 36.570064] The buggy address belongs to the object at fff00000c664f800 [ 36.570064] which belongs to the cache kmalloc-64 of size 64 [ 36.571444] The buggy address is located 0 bytes to the right of [ 36.571444] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 36.573102] [ 36.573377] The buggy address belongs to the physical page: [ 36.574424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 36.575578] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.576502] page_type: f5(slab) [ 36.576972] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.577967] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.578826] page dumped because: kasan: bad access detected [ 36.579469] [ 36.579778] Memory state around the buggy address: [ 36.580348] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.581255] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.582129] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.583039] ^ [ 36.583675] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.584532] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.585433] ================================================================== [ 35.812098] ================================================================== [ 35.812870] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 35.813698] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.815103] [ 35.815479] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.816714] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.817296] Hardware name: linux,dummy-virt (DT) [ 35.817850] Call trace: [ 35.818326] show_stack+0x20/0x38 (C) [ 35.819004] dump_stack_lvl+0x8c/0xd0 [ 35.819516] print_report+0x118/0x5e0 [ 35.820198] kasan_report+0xc8/0x118 [ 35.820705] kasan_check_range+0x100/0x1a8 [ 35.821494] __kasan_check_write+0x20/0x30 [ 35.822211] kasan_atomics_helper+0x10c0/0x4858 [ 35.822896] kasan_atomics+0x198/0x2e8 [ 35.823465] kunit_try_run_case+0x14c/0x3d0 [ 35.824118] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.824940] kthread+0x24c/0x2d0 [ 35.825571] ret_from_fork+0x10/0x20 [ 35.826129] [ 35.826445] Allocated by task 254: [ 35.826970] kasan_save_stack+0x3c/0x68 [ 35.827699] kasan_save_track+0x20/0x40 [ 35.828253] kasan_save_alloc_info+0x40/0x58 [ 35.828964] __kasan_kmalloc+0xd4/0xd8 [ 35.829556] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.830271] kasan_atomics+0xb8/0x2e8 [ 35.830857] kunit_try_run_case+0x14c/0x3d0 [ 35.831480] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.832254] kthread+0x24c/0x2d0 [ 35.832848] ret_from_fork+0x10/0x20 [ 35.833366] [ 35.833717] The buggy address belongs to the object at fff00000c664f800 [ 35.833717] which belongs to the cache kmalloc-64 of size 64 [ 35.835131] The buggy address is located 0 bytes to the right of [ 35.835131] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.836547] [ 35.836890] The buggy address belongs to the physical page: [ 35.837528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.838546] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.839474] page_type: f5(slab) [ 35.840296] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.841214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.842298] page dumped because: kasan: bad access detected [ 35.843117] [ 35.843630] Memory state around the buggy address: [ 35.844419] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.845523] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.846488] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.847455] ^ [ 35.848069] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.848995] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.849834] ================================================================== [ 36.392384] ================================================================== [ 36.393748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 36.394707] Read of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 36.396059] [ 36.396431] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.397999] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.398860] Hardware name: linux,dummy-virt (DT) [ 36.399491] Call trace: [ 36.399911] show_stack+0x20/0x38 (C) [ 36.400453] dump_stack_lvl+0x8c/0xd0 [ 36.401357] print_report+0x118/0x5e0 [ 36.402152] kasan_report+0xc8/0x118 [ 36.402980] __asan_report_load8_noabort+0x20/0x30 [ 36.403718] kasan_atomics_helper+0x3df4/0x4858 [ 36.404340] kasan_atomics+0x198/0x2e8 [ 36.404943] kunit_try_run_case+0x14c/0x3d0 [ 36.405552] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.406469] kthread+0x24c/0x2d0 [ 36.406962] ret_from_fork+0x10/0x20 [ 36.407663] [ 36.408053] Allocated by task 254: [ 36.408565] kasan_save_stack+0x3c/0x68 [ 36.409292] kasan_save_track+0x20/0x40 [ 36.409857] kasan_save_alloc_info+0x40/0x58 [ 36.410667] __kasan_kmalloc+0xd4/0xd8 [ 36.411313] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.411973] kasan_atomics+0xb8/0x2e8 [ 36.412594] kunit_try_run_case+0x14c/0x3d0 [ 36.413302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.414121] kthread+0x24c/0x2d0 [ 36.414769] ret_from_fork+0x10/0x20 [ 36.415395] [ 36.415851] The buggy address belongs to the object at fff00000c664f800 [ 36.415851] which belongs to the cache kmalloc-64 of size 64 [ 36.417291] The buggy address is located 0 bytes to the right of [ 36.417291] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 36.418032] [ 36.418543] The buggy address belongs to the physical page: [ 36.419425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 36.420540] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.421373] page_type: f5(slab) [ 36.422061] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.423128] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.424188] page dumped because: kasan: bad access detected [ 36.424956] [ 36.425291] Memory state around the buggy address: [ 36.426113] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.427049] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.427963] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.428812] ^ [ 36.429402] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.430343] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.431201] ================================================================== [ 34.970251] ================================================================== [ 34.971041] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 34.972225] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.973155] [ 34.973540] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.974723] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.975389] Hardware name: linux,dummy-virt (DT) [ 34.976014] Call trace: [ 34.976362] show_stack+0x20/0x38 (C) [ 34.977055] dump_stack_lvl+0x8c/0xd0 [ 34.977625] print_report+0x118/0x5e0 [ 34.978234] kasan_report+0xc8/0x118 [ 34.978843] kasan_check_range+0x100/0x1a8 [ 34.979475] __kasan_check_write+0x20/0x30 [ 34.980217] kasan_atomics_helper+0x99c/0x4858 [ 34.980756] kasan_atomics+0x198/0x2e8 [ 34.981483] kunit_try_run_case+0x14c/0x3d0 [ 34.982170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.982947] kthread+0x24c/0x2d0 [ 34.983592] ret_from_fork+0x10/0x20 [ 34.984166] [ 34.984461] Allocated by task 254: [ 34.984995] kasan_save_stack+0x3c/0x68 [ 34.985640] kasan_save_track+0x20/0x40 [ 34.986418] kasan_save_alloc_info+0x40/0x58 [ 34.986979] __kasan_kmalloc+0xd4/0xd8 [ 34.987633] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.988309] kasan_atomics+0xb8/0x2e8 [ 34.988842] kunit_try_run_case+0x14c/0x3d0 [ 34.989487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.990188] kthread+0x24c/0x2d0 [ 34.990718] ret_from_fork+0x10/0x20 [ 34.991248] [ 34.991614] The buggy address belongs to the object at fff00000c664f800 [ 34.991614] which belongs to the cache kmalloc-64 of size 64 [ 34.993018] The buggy address is located 0 bytes to the right of [ 34.993018] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.994396] [ 34.994697] The buggy address belongs to the physical page: [ 34.995537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.996467] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.997355] page_type: f5(slab) [ 34.997940] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.998895] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.999767] page dumped because: kasan: bad access detected [ 35.000548] [ 35.000871] Memory state around the buggy address: [ 35.001507] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.002361] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.003159] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.004019] ^ [ 35.004641] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.005609] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.006417] ================================================================== [ 36.004975] ================================================================== [ 36.005718] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 36.006716] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 36.007633] [ 36.008042] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.009362] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.010028] Hardware name: linux,dummy-virt (DT) [ 36.010531] Call trace: [ 36.011060] show_stack+0x20/0x38 (C) [ 36.011644] dump_stack_lvl+0x8c/0xd0 [ 36.012418] print_report+0x118/0x5e0 [ 36.012934] kasan_report+0xc8/0x118 [ 36.013589] kasan_check_range+0x100/0x1a8 [ 36.014424] __kasan_check_write+0x20/0x30 [ 36.014992] kasan_atomics_helper+0x12d8/0x4858 [ 36.015727] kasan_atomics+0x198/0x2e8 [ 36.016216] kunit_try_run_case+0x14c/0x3d0 [ 36.016990] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.017734] kthread+0x24c/0x2d0 [ 36.018308] ret_from_fork+0x10/0x20 [ 36.018933] [ 36.019315] Allocated by task 254: [ 36.019737] kasan_save_stack+0x3c/0x68 [ 36.020423] kasan_save_track+0x20/0x40 [ 36.020989] kasan_save_alloc_info+0x40/0x58 [ 36.021634] __kasan_kmalloc+0xd4/0xd8 [ 36.022132] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.022897] kasan_atomics+0xb8/0x2e8 [ 36.023409] kunit_try_run_case+0x14c/0x3d0 [ 36.024016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.024781] kthread+0x24c/0x2d0 [ 36.025303] ret_from_fork+0x10/0x20 [ 36.025784] [ 36.026213] The buggy address belongs to the object at fff00000c664f800 [ 36.026213] which belongs to the cache kmalloc-64 of size 64 [ 36.027593] The buggy address is located 0 bytes to the right of [ 36.027593] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 36.028978] [ 36.029285] The buggy address belongs to the physical page: [ 36.030396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 36.031369] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.032228] page_type: f5(slab) [ 36.032726] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.033646] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.034621] page dumped because: kasan: bad access detected [ 36.035331] [ 36.035712] Memory state around the buggy address: [ 36.036234] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.037189] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.037993] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.038961] ^ [ 36.039563] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.040432] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.041299] ================================================================== [ 36.314445] ================================================================== [ 36.315076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 36.316473] Read of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 36.317200] [ 36.317495] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.318485] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.319009] Hardware name: linux,dummy-virt (DT) [ 36.319661] Call trace: [ 36.320097] show_stack+0x20/0x38 (C) [ 36.320731] dump_stack_lvl+0x8c/0xd0 [ 36.321349] print_report+0x118/0x5e0 [ 36.321927] kasan_report+0xc8/0x118 [ 36.322460] __asan_report_load8_noabort+0x20/0x30 [ 36.323230] kasan_atomics_helper+0x3db0/0x4858 [ 36.323768] kasan_atomics+0x198/0x2e8 [ 36.324439] kunit_try_run_case+0x14c/0x3d0 [ 36.325143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.326020] kthread+0x24c/0x2d0 [ 36.326544] ret_from_fork+0x10/0x20 [ 36.327217] [ 36.327547] Allocated by task 254: [ 36.328002] kasan_save_stack+0x3c/0x68 [ 36.328598] kasan_save_track+0x20/0x40 [ 36.329115] kasan_save_alloc_info+0x40/0x58 [ 36.329831] __kasan_kmalloc+0xd4/0xd8 [ 36.330454] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.331080] kasan_atomics+0xb8/0x2e8 [ 36.331609] kunit_try_run_case+0x14c/0x3d0 [ 36.332247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.333002] kthread+0x24c/0x2d0 [ 36.333511] ret_from_fork+0x10/0x20 [ 36.334034] [ 36.334474] The buggy address belongs to the object at fff00000c664f800 [ 36.334474] which belongs to the cache kmalloc-64 of size 64 [ 36.335922] The buggy address is located 0 bytes to the right of [ 36.335922] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 36.337208] [ 36.337599] The buggy address belongs to the physical page: [ 36.338179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 36.339220] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.340119] page_type: f5(slab) [ 36.340650] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.341564] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.342520] page dumped because: kasan: bad access detected [ 36.343184] [ 36.343503] Memory state around the buggy address: [ 36.344136] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.344958] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.345768] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.346677] ^ [ 36.347316] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.348222] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.349089] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 33.956599] ================================================================== [ 33.958251] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 33.959280] Read of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250 [ 33.959977] [ 33.960274] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.961435] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.962094] Hardware name: linux,dummy-virt (DT) [ 33.962784] Call trace: [ 33.963191] show_stack+0x20/0x38 (C) [ 33.963772] dump_stack_lvl+0x8c/0xd0 [ 33.964399] print_report+0x118/0x5e0 [ 33.964970] kasan_report+0xc8/0x118 [ 33.965457] __asan_report_load8_noabort+0x20/0x30 [ 33.966182] kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 33.967141] kasan_bitops_generic+0x11c/0x1c8 [ 33.967804] kunit_try_run_case+0x14c/0x3d0 [ 33.968564] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.969230] kthread+0x24c/0x2d0 [ 33.969833] ret_from_fork+0x10/0x20 [ 33.970424] [ 33.970824] Allocated by task 250: [ 33.971427] kasan_save_stack+0x3c/0x68 [ 33.972034] kasan_save_track+0x20/0x40 [ 33.972525] kasan_save_alloc_info+0x40/0x58 [ 33.973243] __kasan_kmalloc+0xd4/0xd8 [ 33.973804] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.974651] kasan_bitops_generic+0xa0/0x1c8 [ 33.975252] kunit_try_run_case+0x14c/0x3d0 [ 33.975928] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.976634] kthread+0x24c/0x2d0 [ 33.977221] ret_from_fork+0x10/0x20 [ 33.977685] [ 33.978079] The buggy address belongs to the object at fff00000c61b4360 [ 33.978079] which belongs to the cache kmalloc-16 of size 16 [ 33.979488] The buggy address is located 8 bytes inside of [ 33.979488] allocated 9-byte region [fff00000c61b4360, fff00000c61b4369) [ 33.980823] [ 33.981145] The buggy address belongs to the physical page: [ 33.981935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 33.982858] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.983675] page_type: f5(slab) [ 33.984206] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.985165] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.986071] page dumped because: kasan: bad access detected [ 33.986756] [ 33.987154] Memory state around the buggy address: [ 33.987937] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.988596] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.989486] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 33.990265] ^ [ 33.991162] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.992092] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.992977] ================================================================== [ 33.919085] ================================================================== [ 33.919853] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 33.920861] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250 [ 33.921646] [ 33.922122] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.923307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.923856] Hardware name: linux,dummy-virt (DT) [ 33.924430] Call trace: [ 33.924977] show_stack+0x20/0x38 (C) [ 33.925548] dump_stack_lvl+0x8c/0xd0 [ 33.926183] print_report+0x118/0x5e0 [ 33.926745] kasan_report+0xc8/0x118 [ 33.927408] kasan_check_range+0x100/0x1a8 [ 33.928012] __kasan_check_write+0x20/0x30 [ 33.928658] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 33.929386] kasan_bitops_generic+0x11c/0x1c8 [ 33.930141] kunit_try_run_case+0x14c/0x3d0 [ 33.930784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.931599] kthread+0x24c/0x2d0 [ 33.932198] ret_from_fork+0x10/0x20 [ 33.932849] [ 33.933163] Allocated by task 250: [ 33.933767] kasan_save_stack+0x3c/0x68 [ 33.934425] kasan_save_track+0x20/0x40 [ 33.935027] kasan_save_alloc_info+0x40/0x58 [ 33.935625] __kasan_kmalloc+0xd4/0xd8 [ 33.936193] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.936862] kasan_bitops_generic+0xa0/0x1c8 [ 33.937348] kunit_try_run_case+0x14c/0x3d0 [ 33.938029] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.938765] kthread+0x24c/0x2d0 [ 33.939249] ret_from_fork+0x10/0x20 [ 33.939765] [ 33.940149] The buggy address belongs to the object at fff00000c61b4360 [ 33.940149] which belongs to the cache kmalloc-16 of size 16 [ 33.941555] The buggy address is located 8 bytes inside of [ 33.941555] allocated 9-byte region [fff00000c61b4360, fff00000c61b4369) [ 33.942964] [ 33.943412] The buggy address belongs to the physical page: [ 33.944106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 33.944960] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.945818] page_type: f5(slab) [ 33.946353] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.947284] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.948161] page dumped because: kasan: bad access detected [ 33.948779] [ 33.949141] Memory state around the buggy address: [ 33.949660] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.950709] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.951549] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 33.952379] ^ [ 33.953136] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.954065] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.954978] ================================================================== [ 33.880421] ================================================================== [ 33.881297] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 33.883487] Read of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250 [ 33.884535] [ 33.885011] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.886457] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.887044] Hardware name: linux,dummy-virt (DT) [ 33.887716] Call trace: [ 33.888098] show_stack+0x20/0x38 (C) [ 33.888728] dump_stack_lvl+0x8c/0xd0 [ 33.889289] print_report+0x118/0x5e0 [ 33.889913] kasan_report+0xc8/0x118 [ 33.890449] __asan_report_load8_noabort+0x20/0x30 [ 33.891230] kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 33.891911] kasan_bitops_generic+0x11c/0x1c8 [ 33.892720] kunit_try_run_case+0x14c/0x3d0 [ 33.893368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.894151] kthread+0x24c/0x2d0 [ 33.894662] ret_from_fork+0x10/0x20 [ 33.895351] [ 33.895664] Allocated by task 250: [ 33.896206] kasan_save_stack+0x3c/0x68 [ 33.896773] kasan_save_track+0x20/0x40 [ 33.897290] kasan_save_alloc_info+0x40/0x58 [ 33.898012] __kasan_kmalloc+0xd4/0xd8 [ 33.898766] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.899668] kasan_bitops_generic+0xa0/0x1c8 [ 33.900084] kunit_try_run_case+0x14c/0x3d0 [ 33.900593] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.901311] kthread+0x24c/0x2d0 [ 33.901786] ret_from_fork+0x10/0x20 [ 33.902476] [ 33.902794] The buggy address belongs to the object at fff00000c61b4360 [ 33.902794] which belongs to the cache kmalloc-16 of size 16 [ 33.904118] The buggy address is located 8 bytes inside of [ 33.904118] allocated 9-byte region [fff00000c61b4360, fff00000c61b4369) [ 33.905426] [ 33.905792] The buggy address belongs to the physical page: [ 33.906529] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 33.907393] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.908334] page_type: f5(slab) [ 33.908827] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.909698] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.910726] page dumped because: kasan: bad access detected [ 33.911411] [ 33.911734] Memory state around the buggy address: [ 33.912456] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.913283] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.914252] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 33.915090] ^ [ 33.916027] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.916864] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.917703] ================================================================== [ 33.994241] ================================================================== [ 33.995082] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 33.996264] Read of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250 [ 33.997285] [ 33.997607] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.998833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.999495] Hardware name: linux,dummy-virt (DT) [ 34.000142] Call trace: [ 34.000537] show_stack+0x20/0x38 (C) [ 34.001205] dump_stack_lvl+0x8c/0xd0 [ 34.001778] print_report+0x118/0x5e0 [ 34.002286] kasan_report+0xc8/0x118 [ 34.002988] __asan_report_load8_noabort+0x20/0x30 [ 34.003648] kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 34.004668] kasan_bitops_generic+0x11c/0x1c8 [ 34.005306] kunit_try_run_case+0x14c/0x3d0 [ 34.005822] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.006665] kthread+0x24c/0x2d0 [ 34.007279] ret_from_fork+0x10/0x20 [ 34.007768] [ 34.008178] Allocated by task 250: [ 34.008719] kasan_save_stack+0x3c/0x68 [ 34.009516] kasan_save_track+0x20/0x40 [ 34.010047] kasan_save_alloc_info+0x40/0x58 [ 34.010800] __kasan_kmalloc+0xd4/0xd8 [ 34.011430] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.012079] kasan_bitops_generic+0xa0/0x1c8 [ 34.012633] kunit_try_run_case+0x14c/0x3d0 [ 34.013263] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.013974] kthread+0x24c/0x2d0 [ 34.014507] ret_from_fork+0x10/0x20 [ 34.015052] [ 34.015367] The buggy address belongs to the object at fff00000c61b4360 [ 34.015367] which belongs to the cache kmalloc-16 of size 16 [ 34.016804] The buggy address is located 8 bytes inside of [ 34.016804] allocated 9-byte region [fff00000c61b4360, fff00000c61b4369) [ 34.018220] [ 34.018594] The buggy address belongs to the physical page: [ 34.019413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 34.020516] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.021428] page_type: f5(slab) [ 34.022020] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.022981] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.023861] page dumped because: kasan: bad access detected [ 34.024563] [ 34.024846] Memory state around the buggy address: [ 34.025531] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.026363] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.027293] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 34.028136] ^ [ 34.028954] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.029931] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.030822] ================================================================== [ 33.723104] ================================================================== [ 33.724270] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 33.725355] Read of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250 [ 33.727199] [ 33.727563] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.728751] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.729306] Hardware name: linux,dummy-virt (DT) [ 33.729932] Call trace: [ 33.730410] show_stack+0x20/0x38 (C) [ 33.731004] dump_stack_lvl+0x8c/0xd0 [ 33.731625] print_report+0x118/0x5e0 [ 33.732233] kasan_report+0xc8/0x118 [ 33.732804] __asan_report_load8_noabort+0x20/0x30 [ 33.733464] kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 33.734205] kasan_bitops_generic+0x11c/0x1c8 [ 33.734861] kunit_try_run_case+0x14c/0x3d0 [ 33.735529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.737136] kthread+0x24c/0x2d0 [ 33.737750] ret_from_fork+0x10/0x20 [ 33.738281] [ 33.738645] Allocated by task 250: [ 33.739109] kasan_save_stack+0x3c/0x68 [ 33.739755] kasan_save_track+0x20/0x40 [ 33.740576] kasan_save_alloc_info+0x40/0x58 [ 33.741366] __kasan_kmalloc+0xd4/0xd8 [ 33.742050] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.742653] kasan_bitops_generic+0xa0/0x1c8 [ 33.743237] kunit_try_run_case+0x14c/0x3d0 [ 33.744073] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.744929] kthread+0x24c/0x2d0 [ 33.745530] ret_from_fork+0x10/0x20 [ 33.746196] [ 33.746568] The buggy address belongs to the object at fff00000c61b4360 [ 33.746568] which belongs to the cache kmalloc-16 of size 16 [ 33.747887] The buggy address is located 8 bytes inside of [ 33.747887] allocated 9-byte region [fff00000c61b4360, fff00000c61b4369) [ 33.749350] [ 33.749727] The buggy address belongs to the physical page: [ 33.750468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 33.751549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.752605] page_type: f5(slab) [ 33.753197] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.754249] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.755210] page dumped because: kasan: bad access detected [ 33.755951] [ 33.756341] Memory state around the buggy address: [ 33.757060] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.757986] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.758982] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 33.759928] ^ [ 33.760651] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.761483] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.762431] ================================================================== [ 33.763947] ================================================================== [ 33.764679] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 33.765752] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250 [ 33.766856] [ 33.768161] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.769313] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.769802] Hardware name: linux,dummy-virt (DT) [ 33.770346] Call trace: [ 33.770711] show_stack+0x20/0x38 (C) [ 33.771324] dump_stack_lvl+0x8c/0xd0 [ 33.772012] print_report+0x118/0x5e0 [ 33.772593] kasan_report+0xc8/0x118 [ 33.773264] kasan_check_range+0x100/0x1a8 [ 33.773780] __kasan_check_write+0x20/0x30 [ 33.774490] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 33.775308] kasan_bitops_generic+0x11c/0x1c8 [ 33.775984] kunit_try_run_case+0x14c/0x3d0 [ 33.776613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.777388] kthread+0x24c/0x2d0 [ 33.778067] ret_from_fork+0x10/0x20 [ 33.778668] [ 33.778994] Allocated by task 250: [ 33.779689] kasan_save_stack+0x3c/0x68 [ 33.780179] kasan_save_track+0x20/0x40 [ 33.780903] kasan_save_alloc_info+0x40/0x58 [ 33.781442] __kasan_kmalloc+0xd4/0xd8 [ 33.782064] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.782749] kasan_bitops_generic+0xa0/0x1c8 [ 33.783411] kunit_try_run_case+0x14c/0x3d0 [ 33.784037] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.784733] kthread+0x24c/0x2d0 [ 33.785252] ret_from_fork+0x10/0x20 [ 33.785790] [ 33.786130] The buggy address belongs to the object at fff00000c61b4360 [ 33.786130] which belongs to the cache kmalloc-16 of size 16 [ 33.787537] The buggy address is located 8 bytes inside of [ 33.787537] allocated 9-byte region [fff00000c61b4360, fff00000c61b4369) [ 33.788998] [ 33.789298] The buggy address belongs to the physical page: [ 33.790122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 33.791002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.791864] page_type: f5(slab) [ 33.792412] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.793366] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.794262] page dumped because: kasan: bad access detected [ 33.795033] [ 33.795331] Memory state around the buggy address: [ 33.795922] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.796796] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.797684] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 33.798571] ^ [ 33.799367] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.800248] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.801144] ================================================================== [ 33.841720] ================================================================== [ 33.843112] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 33.844142] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250 [ 33.845016] [ 33.845345] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.846563] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.847148] Hardware name: linux,dummy-virt (DT) [ 33.847798] Call trace: [ 33.848237] show_stack+0x20/0x38 (C) [ 33.849115] dump_stack_lvl+0x8c/0xd0 [ 33.849634] print_report+0x118/0x5e0 [ 33.850176] kasan_report+0xc8/0x118 [ 33.850894] kasan_check_range+0x100/0x1a8 [ 33.851482] __kasan_check_write+0x20/0x30 [ 33.852203] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 33.853043] kasan_bitops_generic+0x11c/0x1c8 [ 33.853749] kunit_try_run_case+0x14c/0x3d0 [ 33.854465] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.855224] kthread+0x24c/0x2d0 [ 33.855818] ret_from_fork+0x10/0x20 [ 33.856370] [ 33.856746] Allocated by task 250: [ 33.857276] kasan_save_stack+0x3c/0x68 [ 33.857810] kasan_save_track+0x20/0x40 [ 33.858474] kasan_save_alloc_info+0x40/0x58 [ 33.859100] __kasan_kmalloc+0xd4/0xd8 [ 33.859648] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.860275] kasan_bitops_generic+0xa0/0x1c8 [ 33.860929] kunit_try_run_case+0x14c/0x3d0 [ 33.861483] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.862270] kthread+0x24c/0x2d0 [ 33.862869] ret_from_fork+0x10/0x20 [ 33.863716] [ 33.864067] The buggy address belongs to the object at fff00000c61b4360 [ 33.864067] which belongs to the cache kmalloc-16 of size 16 [ 33.865472] The buggy address is located 8 bytes inside of [ 33.865472] allocated 9-byte region [fff00000c61b4360, fff00000c61b4369) [ 33.866868] [ 33.867174] The buggy address belongs to the physical page: [ 33.867993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 33.868836] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.869717] page_type: f5(slab) [ 33.870225] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.871254] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.872224] page dumped because: kasan: bad access detected [ 33.872891] [ 33.873235] Memory state around the buggy address: [ 33.873861] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.874705] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.875609] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 33.876449] ^ [ 33.877224] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.878201] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.879038] ================================================================== [ 33.684789] ================================================================== [ 33.686067] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 33.687083] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250 [ 33.687825] [ 33.688219] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.689225] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.689852] Hardware name: linux,dummy-virt (DT) [ 33.690606] Call trace: [ 33.691032] show_stack+0x20/0x38 (C) [ 33.691607] dump_stack_lvl+0x8c/0xd0 [ 33.692203] print_report+0x118/0x5e0 [ 33.692768] kasan_report+0xc8/0x118 [ 33.693333] kasan_check_range+0x100/0x1a8 [ 33.693861] __kasan_check_write+0x20/0x30 [ 33.694402] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 33.695399] kasan_bitops_generic+0x11c/0x1c8 [ 33.696174] kunit_try_run_case+0x14c/0x3d0 [ 33.697045] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.697707] kthread+0x24c/0x2d0 [ 33.698380] ret_from_fork+0x10/0x20 [ 33.699088] [ 33.699423] Allocated by task 250: [ 33.699845] kasan_save_stack+0x3c/0x68 [ 33.700541] kasan_save_track+0x20/0x40 [ 33.701132] kasan_save_alloc_info+0x40/0x58 [ 33.701712] __kasan_kmalloc+0xd4/0xd8 [ 33.702354] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.703105] kasan_bitops_generic+0xa0/0x1c8 [ 33.703759] kunit_try_run_case+0x14c/0x3d0 [ 33.704383] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.705092] kthread+0x24c/0x2d0 [ 33.705582] ret_from_fork+0x10/0x20 [ 33.706128] [ 33.706515] The buggy address belongs to the object at fff00000c61b4360 [ 33.706515] which belongs to the cache kmalloc-16 of size 16 [ 33.707909] The buggy address is located 8 bytes inside of [ 33.707909] allocated 9-byte region [fff00000c61b4360, fff00000c61b4369) [ 33.709284] [ 33.709605] The buggy address belongs to the physical page: [ 33.710426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 33.711357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.712182] page_type: f5(slab) [ 33.712652] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.713553] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.714513] page dumped because: kasan: bad access detected [ 33.715192] [ 33.715505] Memory state around the buggy address: [ 33.716152] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.717014] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.717852] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 33.718720] ^ [ 33.719625] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.720505] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.721378] ================================================================== [ 33.802524] ================================================================== [ 33.803630] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 33.804966] Read of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250 [ 33.806305] [ 33.806729] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.808111] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.808642] Hardware name: linux,dummy-virt (DT) [ 33.809249] Call trace: [ 33.809627] show_stack+0x20/0x38 (C) [ 33.810422] dump_stack_lvl+0x8c/0xd0 [ 33.811246] print_report+0x118/0x5e0 [ 33.811790] kasan_report+0xc8/0x118 [ 33.812441] __asan_report_load8_noabort+0x20/0x30 [ 33.813118] kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 33.813950] kasan_bitops_generic+0x11c/0x1c8 [ 33.814682] kunit_try_run_case+0x14c/0x3d0 [ 33.815316] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.816085] kthread+0x24c/0x2d0 [ 33.816688] ret_from_fork+0x10/0x20 [ 33.817182] [ 33.817566] Allocated by task 250: [ 33.818193] kasan_save_stack+0x3c/0x68 [ 33.818773] kasan_save_track+0x20/0x40 [ 33.819260] kasan_save_alloc_info+0x40/0x58 [ 33.820026] __kasan_kmalloc+0xd4/0xd8 [ 33.820732] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.821349] kasan_bitops_generic+0xa0/0x1c8 [ 33.822081] kunit_try_run_case+0x14c/0x3d0 [ 33.822675] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.823374] kthread+0x24c/0x2d0 [ 33.824028] ret_from_fork+0x10/0x20 [ 33.824567] [ 33.825004] The buggy address belongs to the object at fff00000c61b4360 [ 33.825004] which belongs to the cache kmalloc-16 of size 16 [ 33.826434] The buggy address is located 8 bytes inside of [ 33.826434] allocated 9-byte region [fff00000c61b4360, fff00000c61b4369) [ 33.827866] [ 33.828184] The buggy address belongs to the physical page: [ 33.828980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 33.829806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.830728] page_type: f5(slab) [ 33.831166] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.832151] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.833139] page dumped because: kasan: bad access detected [ 33.833823] [ 33.834199] Memory state around the buggy address: [ 33.834836] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.835659] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.836544] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 33.837471] ^ [ 33.838287] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.839158] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.839979] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 33.478827] ================================================================== [ 33.479778] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 33.480696] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250 [ 33.482347] [ 33.482830] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.484049] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.484578] Hardware name: linux,dummy-virt (DT) [ 33.485181] Call trace: [ 33.485562] show_stack+0x20/0x38 (C) [ 33.486189] dump_stack_lvl+0x8c/0xd0 [ 33.486785] print_report+0x118/0x5e0 [ 33.487364] kasan_report+0xc8/0x118 [ 33.487934] kasan_check_range+0x100/0x1a8 [ 33.488582] __kasan_check_write+0x20/0x30 [ 33.489227] kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 33.489939] kasan_bitops_generic+0x110/0x1c8 [ 33.490580] kunit_try_run_case+0x14c/0x3d0 [ 33.491219] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.492015] kthread+0x24c/0x2d0 [ 33.492628] ret_from_fork+0x10/0x20 [ 33.493277] [ 33.493659] Allocated by task 250: [ 33.494193] kasan_save_stack+0x3c/0x68 [ 33.494973] kasan_save_track+0x20/0x40 [ 33.495479] kasan_save_alloc_info+0x40/0x58 [ 33.496221] __kasan_kmalloc+0xd4/0xd8 [ 33.496765] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.497508] kasan_bitops_generic+0xa0/0x1c8 [ 33.498129] kunit_try_run_case+0x14c/0x3d0 [ 33.498738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.499449] kthread+0x24c/0x2d0 [ 33.500200] ret_from_fork+0x10/0x20 [ 33.500734] [ 33.501074] The buggy address belongs to the object at fff00000c61b4360 [ 33.501074] which belongs to the cache kmalloc-16 of size 16 [ 33.502750] The buggy address is located 8 bytes inside of [ 33.502750] allocated 9-byte region [fff00000c61b4360, fff00000c61b4369) [ 33.504357] [ 33.504655] The buggy address belongs to the physical page: [ 33.505442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 33.506687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.507710] page_type: f5(slab) [ 33.508330] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.509253] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.510458] page dumped because: kasan: bad access detected [ 33.511430] [ 33.512377] Memory state around the buggy address: [ 33.512979] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.513842] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.514764] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 33.515636] ^ [ 33.516447] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.517347] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.518317] ================================================================== [ 33.558209] ================================================================== [ 33.559535] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 33.560434] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250 [ 33.561422] [ 33.561752] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.564153] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.564637] Hardware name: linux,dummy-virt (DT) [ 33.565369] Call trace: [ 33.565914] show_stack+0x20/0x38 (C) [ 33.566688] dump_stack_lvl+0x8c/0xd0 [ 33.567269] print_report+0x118/0x5e0 [ 33.567825] kasan_report+0xc8/0x118 [ 33.568557] kasan_check_range+0x100/0x1a8 [ 33.569169] __kasan_check_write+0x20/0x30 [ 33.569783] kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 33.570545] kasan_bitops_generic+0x110/0x1c8 [ 33.571228] kunit_try_run_case+0x14c/0x3d0 [ 33.571905] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.572692] kthread+0x24c/0x2d0 [ 33.573302] ret_from_fork+0x10/0x20 [ 33.573892] [ 33.574234] Allocated by task 250: [ 33.574687] kasan_save_stack+0x3c/0x68 [ 33.575371] kasan_save_track+0x20/0x40 [ 33.575978] kasan_save_alloc_info+0x40/0x58 [ 33.576610] __kasan_kmalloc+0xd4/0xd8 [ 33.577193] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.577852] kasan_bitops_generic+0xa0/0x1c8 [ 33.578465] kunit_try_run_case+0x14c/0x3d0 [ 33.579059] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.579831] kthread+0x24c/0x2d0 [ 33.580371] ret_from_fork+0x10/0x20 [ 33.580922] [ 33.581247] The buggy address belongs to the object at fff00000c61b4360 [ 33.581247] which belongs to the cache kmalloc-16 of size 16 [ 33.582702] The buggy address is located 8 bytes inside of [ 33.582702] allocated 9-byte region [fff00000c61b4360, fff00000c61b4369) [ 33.584046] [ 33.584358] The buggy address belongs to the physical page: [ 33.585042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 33.586059] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.586786] page_type: f5(slab) [ 33.587401] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.588337] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.589239] page dumped because: kasan: bad access detected [ 33.589909] [ 33.590246] Memory state around the buggy address: [ 33.590831] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.591658] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.592580] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 33.593535] ^ [ 33.594346] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.595280] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.596198] ================================================================== [ 33.362400] ================================================================== [ 33.363206] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 33.364146] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250 [ 33.365087] [ 33.365592] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.366800] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.367336] Hardware name: linux,dummy-virt (DT) [ 33.367938] Call trace: [ 33.368402] show_stack+0x20/0x38 (C) [ 33.369096] dump_stack_lvl+0x8c/0xd0 [ 33.369663] print_report+0x118/0x5e0 [ 33.370221] kasan_report+0xc8/0x118 [ 33.370798] kasan_check_range+0x100/0x1a8 [ 33.371412] __kasan_check_write+0x20/0x30 [ 33.372051] kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 33.372827] kasan_bitops_generic+0x110/0x1c8 [ 33.373377] kunit_try_run_case+0x14c/0x3d0 [ 33.374128] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.374940] kthread+0x24c/0x2d0 [ 33.375477] ret_from_fork+0x10/0x20 [ 33.376155] [ 33.376451] Allocated by task 250: [ 33.376969] kasan_save_stack+0x3c/0x68 [ 33.377422] kasan_save_track+0x20/0x40 [ 33.378061] kasan_save_alloc_info+0x40/0x58 [ 33.378972] __kasan_kmalloc+0xd4/0xd8 [ 33.379531] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.380202] kasan_bitops_generic+0xa0/0x1c8 [ 33.380947] kunit_try_run_case+0x14c/0x3d0 [ 33.381540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.382245] kthread+0x24c/0x2d0 [ 33.382781] ret_from_fork+0x10/0x20 [ 33.383288] [ 33.383603] The buggy address belongs to the object at fff00000c61b4360 [ 33.383603] which belongs to the cache kmalloc-16 of size 16 [ 33.384996] The buggy address is located 8 bytes inside of [ 33.384996] allocated 9-byte region [fff00000c61b4360, fff00000c61b4369) [ 33.386421] [ 33.386781] The buggy address belongs to the physical page: [ 33.387564] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 33.388508] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.389341] page_type: f5(slab) [ 33.389962] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.390906] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.391796] page dumped because: kasan: bad access detected [ 33.392512] [ 33.392827] Memory state around the buggy address: [ 33.393502] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.394348] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.395255] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 33.396094] ^ [ 33.396870] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.397727] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.398602] ================================================================== [ 33.520930] ================================================================== [ 33.521652] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 33.522560] Read of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250 [ 33.523575] [ 33.524065] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.525235] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.525914] Hardware name: linux,dummy-virt (DT) [ 33.526490] Call trace: [ 33.527051] show_stack+0x20/0x38 (C) [ 33.527648] dump_stack_lvl+0x8c/0xd0 [ 33.528231] print_report+0x118/0x5e0 [ 33.528842] kasan_report+0xc8/0x118 [ 33.529393] __asan_report_load8_noabort+0x20/0x30 [ 33.530074] kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 33.530945] kasan_bitops_generic+0x110/0x1c8 [ 33.531703] kunit_try_run_case+0x14c/0x3d0 [ 33.532361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.532996] kthread+0x24c/0x2d0 [ 33.533568] ret_from_fork+0x10/0x20 [ 33.534159] [ 33.534627] Allocated by task 250: [ 33.535077] kasan_save_stack+0x3c/0x68 [ 33.535762] kasan_save_track+0x20/0x40 [ 33.536354] kasan_save_alloc_info+0x40/0x58 [ 33.537061] __kasan_kmalloc+0xd4/0xd8 [ 33.537557] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.538311] kasan_bitops_generic+0xa0/0x1c8 [ 33.538889] kunit_try_run_case+0x14c/0x3d0 [ 33.539557] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.540275] kthread+0x24c/0x2d0 [ 33.540778] ret_from_fork+0x10/0x20 [ 33.541379] [ 33.541770] The buggy address belongs to the object at fff00000c61b4360 [ 33.541770] which belongs to the cache kmalloc-16 of size 16 [ 33.543212] The buggy address is located 8 bytes inside of [ 33.543212] allocated 9-byte region [fff00000c61b4360, fff00000c61b4369) [ 33.544551] [ 33.544915] The buggy address belongs to the physical page: [ 33.545674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 33.546554] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.547449] page_type: f5(slab) [ 33.548012] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.549009] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.549913] page dumped because: kasan: bad access detected [ 33.550569] [ 33.550930] Memory state around the buggy address: [ 33.551564] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.552354] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.553296] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 33.554113] ^ [ 33.555008] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.555891] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.556749] ================================================================== [ 33.600092] ================================================================== [ 33.600854] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 33.601699] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250 [ 33.602613] [ 33.603092] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.604387] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.605071] Hardware name: linux,dummy-virt (DT) [ 33.605653] Call trace: [ 33.606573] show_stack+0x20/0x38 (C) [ 33.607197] dump_stack_lvl+0x8c/0xd0 [ 33.607794] print_report+0x118/0x5e0 [ 33.608374] kasan_report+0xc8/0x118 [ 33.609405] kasan_check_range+0x100/0x1a8 [ 33.610053] __kasan_check_write+0x20/0x30 [ 33.610649] kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 33.611489] kasan_bitops_generic+0x110/0x1c8 [ 33.613058] kunit_try_run_case+0x14c/0x3d0 [ 33.614128] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.615302] kthread+0x24c/0x2d0 [ 33.616028] ret_from_fork+0x10/0x20 [ 33.616761] [ 33.617205] Allocated by task 250: [ 33.617901] kasan_save_stack+0x3c/0x68 [ 33.618700] kasan_save_track+0x20/0x40 [ 33.619494] kasan_save_alloc_info+0x40/0x58 [ 33.620371] __kasan_kmalloc+0xd4/0xd8 [ 33.621102] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.621632] kasan_bitops_generic+0xa0/0x1c8 [ 33.622300] kunit_try_run_case+0x14c/0x3d0 [ 33.622990] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.623671] kthread+0x24c/0x2d0 [ 33.624217] ret_from_fork+0x10/0x20 [ 33.624733] [ 33.625393] The buggy address belongs to the object at fff00000c61b4360 [ 33.625393] which belongs to the cache kmalloc-16 of size 16 [ 33.627002] The buggy address is located 8 bytes inside of [ 33.627002] allocated 9-byte region [fff00000c61b4360, fff00000c61b4369) [ 33.628527] [ 33.628840] The buggy address belongs to the physical page: [ 33.629695] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 33.630727] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.631618] page_type: f5(slab) [ 33.632203] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.633205] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.634155] page dumped because: kasan: bad access detected [ 33.634928] [ 33.635276] Memory state around the buggy address: [ 33.635992] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.637071] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.637970] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 33.638894] ^ [ 33.639750] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.640618] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.641540] ================================================================== [ 33.643341] ================================================================== [ 33.644241] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 33.645515] Read of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250 [ 33.647119] [ 33.647493] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.648800] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.649411] Hardware name: linux,dummy-virt (DT) [ 33.650097] Call trace: [ 33.650534] show_stack+0x20/0x38 (C) [ 33.651219] dump_stack_lvl+0x8c/0xd0 [ 33.651943] print_report+0x118/0x5e0 [ 33.652564] kasan_report+0xc8/0x118 [ 33.653249] __asan_report_load8_noabort+0x20/0x30 [ 33.653982] kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 33.654802] kasan_bitops_generic+0x110/0x1c8 [ 33.655572] kunit_try_run_case+0x14c/0x3d0 [ 33.656334] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.657225] kthread+0x24c/0x2d0 [ 33.657856] ret_from_fork+0x10/0x20 [ 33.658609] [ 33.659304] Allocated by task 250: [ 33.659687] kasan_save_stack+0x3c/0x68 [ 33.660154] kasan_save_track+0x20/0x40 [ 33.660603] kasan_save_alloc_info+0x40/0x58 [ 33.661169] __kasan_kmalloc+0xd4/0xd8 [ 33.662418] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.663291] kasan_bitops_generic+0xa0/0x1c8 [ 33.663916] kunit_try_run_case+0x14c/0x3d0 [ 33.664497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.665452] kthread+0x24c/0x2d0 [ 33.666334] ret_from_fork+0x10/0x20 [ 33.667008] [ 33.667306] The buggy address belongs to the object at fff00000c61b4360 [ 33.667306] which belongs to the cache kmalloc-16 of size 16 [ 33.668638] The buggy address is located 8 bytes inside of [ 33.668638] allocated 9-byte region [fff00000c61b4360, fff00000c61b4369) [ 33.670467] [ 33.670840] The buggy address belongs to the physical page: [ 33.671519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 33.672510] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.673283] page_type: f5(slab) [ 33.673760] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.674695] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.675507] page dumped because: kasan: bad access detected [ 33.676329] [ 33.676680] Memory state around the buggy address: [ 33.677344] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.678271] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.679204] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 33.679931] ^ [ 33.680906] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.681828] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.682623] ================================================================== [ 33.400769] ================================================================== [ 33.401604] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 33.402483] Read of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250 [ 33.404136] [ 33.404489] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.405694] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.406332] Hardware name: linux,dummy-virt (DT) [ 33.406974] Call trace: [ 33.407409] show_stack+0x20/0x38 (C) [ 33.408018] dump_stack_lvl+0x8c/0xd0 [ 33.408671] print_report+0x118/0x5e0 [ 33.409725] kasan_report+0xc8/0x118 [ 33.410502] __asan_report_load8_noabort+0x20/0x30 [ 33.411344] kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 33.412097] kasan_bitops_generic+0x110/0x1c8 [ 33.412732] kunit_try_run_case+0x14c/0x3d0 [ 33.413388] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.414227] kthread+0x24c/0x2d0 [ 33.414736] ret_from_fork+0x10/0x20 [ 33.415391] [ 33.415805] Allocated by task 250: [ 33.416384] kasan_save_stack+0x3c/0x68 [ 33.416974] kasan_save_track+0x20/0x40 [ 33.417472] kasan_save_alloc_info+0x40/0x58 [ 33.418201] __kasan_kmalloc+0xd4/0xd8 [ 33.418803] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.419515] kasan_bitops_generic+0xa0/0x1c8 [ 33.420109] kunit_try_run_case+0x14c/0x3d0 [ 33.420769] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.421504] kthread+0x24c/0x2d0 [ 33.422000] ret_from_fork+0x10/0x20 [ 33.422548] [ 33.422933] The buggy address belongs to the object at fff00000c61b4360 [ 33.422933] which belongs to the cache kmalloc-16 of size 16 [ 33.424368] The buggy address is located 8 bytes inside of [ 33.424368] allocated 9-byte region [fff00000c61b4360, fff00000c61b4369) [ 33.425693] [ 33.426031] The buggy address belongs to the physical page: [ 33.426667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 33.427701] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.428560] page_type: f5(slab) [ 33.429009] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.429952] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.430926] page dumped because: kasan: bad access detected [ 33.431575] [ 33.431921] Memory state around the buggy address: [ 33.432601] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.433423] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.434301] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 33.435244] ^ [ 33.436071] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.436941] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.437785] ================================================================== [ 33.283192] ================================================================== [ 33.284449] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 33.285498] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250 [ 33.286663] [ 33.287127] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.288499] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.289041] Hardware name: linux,dummy-virt (DT) [ 33.289582] Call trace: [ 33.290102] show_stack+0x20/0x38 (C) [ 33.290832] dump_stack_lvl+0x8c/0xd0 [ 33.291487] print_report+0x118/0x5e0 [ 33.292059] kasan_report+0xc8/0x118 [ 33.292665] kasan_check_range+0x100/0x1a8 [ 33.293365] __kasan_check_write+0x20/0x30 [ 33.294011] kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 33.294734] kasan_bitops_generic+0x110/0x1c8 [ 33.295433] kunit_try_run_case+0x14c/0x3d0 [ 33.296068] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.296836] kthread+0x24c/0x2d0 [ 33.297307] ret_from_fork+0x10/0x20 [ 33.297972] [ 33.298337] Allocated by task 250: [ 33.298792] kasan_save_stack+0x3c/0x68 [ 33.299511] kasan_save_track+0x20/0x40 [ 33.300170] kasan_save_alloc_info+0x40/0x58 [ 33.300801] __kasan_kmalloc+0xd4/0xd8 [ 33.301342] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.302102] kasan_bitops_generic+0xa0/0x1c8 [ 33.302604] kunit_try_run_case+0x14c/0x3d0 [ 33.303383] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.304142] kthread+0x24c/0x2d0 [ 33.304603] ret_from_fork+0x10/0x20 [ 33.305155] [ 33.305530] The buggy address belongs to the object at fff00000c61b4360 [ 33.305530] which belongs to the cache kmalloc-16 of size 16 [ 33.306978] The buggy address is located 8 bytes inside of [ 33.306978] allocated 9-byte region [fff00000c61b4360, fff00000c61b4369) [ 33.308300] [ 33.308605] The buggy address belongs to the physical page: [ 33.309446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 33.310322] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.311276] page_type: f5(slab) [ 33.311733] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.312762] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.313689] page dumped because: kasan: bad access detected [ 33.314417] [ 33.314739] Memory state around the buggy address: [ 33.315430] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.316571] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.317435] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 33.318546] ^ [ 33.319525] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.320510] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.321356] ================================================================== [ 33.439947] ================================================================== [ 33.440897] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 33.441820] Write of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250 [ 33.442519] [ 33.442868] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.444118] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.444673] Hardware name: linux,dummy-virt (DT) [ 33.445302] Call trace: [ 33.445787] show_stack+0x20/0x38 (C) [ 33.446331] dump_stack_lvl+0x8c/0xd0 [ 33.446954] print_report+0x118/0x5e0 [ 33.447589] kasan_report+0xc8/0x118 [ 33.448209] kasan_check_range+0x100/0x1a8 [ 33.448813] __kasan_check_write+0x20/0x30 [ 33.449443] kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 33.450149] kasan_bitops_generic+0x110/0x1c8 [ 33.450865] kunit_try_run_case+0x14c/0x3d0 [ 33.451510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.452307] kthread+0x24c/0x2d0 [ 33.452851] ret_from_fork+0x10/0x20 [ 33.453446] [ 33.453726] Allocated by task 250: [ 33.454379] kasan_save_stack+0x3c/0x68 [ 33.454894] kasan_save_track+0x20/0x40 [ 33.455510] kasan_save_alloc_info+0x40/0x58 [ 33.456318] __kasan_kmalloc+0xd4/0xd8 [ 33.456856] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.457593] kasan_bitops_generic+0xa0/0x1c8 [ 33.458204] kunit_try_run_case+0x14c/0x3d0 [ 33.458922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.459552] kthread+0x24c/0x2d0 [ 33.460172] ret_from_fork+0x10/0x20 [ 33.460707] [ 33.461033] The buggy address belongs to the object at fff00000c61b4360 [ 33.461033] which belongs to the cache kmalloc-16 of size 16 [ 33.462455] The buggy address is located 8 bytes inside of [ 33.462455] allocated 9-byte region [fff00000c61b4360, fff00000c61b4369) [ 33.463785] [ 33.464159] The buggy address belongs to the physical page: [ 33.464924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 33.465815] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.466669] page_type: f5(slab) [ 33.467176] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.468208] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.469154] page dumped because: kasan: bad access detected [ 33.469801] [ 33.470115] Memory state around the buggy address: [ 33.470717] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.471845] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.472806] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 33.473668] ^ [ 33.474511] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.475404] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.476248] ================================================================== [ 33.323052] ================================================================== [ 33.324983] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 33.326003] Read of size 8 at addr fff00000c61b4368 by task kunit_try_catch/250 [ 33.327058] [ 33.327536] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.328808] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.329426] Hardware name: linux,dummy-virt (DT) [ 33.330038] Call trace: [ 33.330434] show_stack+0x20/0x38 (C) [ 33.331064] dump_stack_lvl+0x8c/0xd0 [ 33.331603] print_report+0x118/0x5e0 [ 33.332300] kasan_report+0xc8/0x118 [ 33.332924] __asan_report_load8_noabort+0x20/0x30 [ 33.333729] kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 33.334486] kasan_bitops_generic+0x110/0x1c8 [ 33.335139] kunit_try_run_case+0x14c/0x3d0 [ 33.335793] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.336566] kthread+0x24c/0x2d0 [ 33.337164] ret_from_fork+0x10/0x20 [ 33.337700] [ 33.338031] Allocated by task 250: [ 33.338535] kasan_save_stack+0x3c/0x68 [ 33.339212] kasan_save_track+0x20/0x40 [ 33.339780] kasan_save_alloc_info+0x40/0x58 [ 33.340418] __kasan_kmalloc+0xd4/0xd8 [ 33.340980] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.341640] kasan_bitops_generic+0xa0/0x1c8 [ 33.342242] kunit_try_run_case+0x14c/0x3d0 [ 33.342766] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.343582] kthread+0x24c/0x2d0 [ 33.344112] ret_from_fork+0x10/0x20 [ 33.344595] [ 33.345076] The buggy address belongs to the object at fff00000c61b4360 [ 33.345076] which belongs to the cache kmalloc-16 of size 16 [ 33.346513] The buggy address is located 8 bytes inside of [ 33.346513] allocated 9-byte region [fff00000c61b4360, fff00000c61b4369) [ 33.347827] [ 33.348197] The buggy address belongs to the physical page: [ 33.348938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 33.349823] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.350726] page_type: f5(slab) [ 33.351299] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.352169] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.353116] page dumped because: kasan: bad access detected [ 33.353797] [ 33.354156] Memory state around the buggy address: [ 33.354742] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.355673] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.356512] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 33.357376] ^ [ 33.358168] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.359001] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.359823] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 33.230703] ================================================================== [ 33.232978] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 33.233899] Read of size 1 at addr fff00000c63d1e50 by task kunit_try_catch/248 [ 33.234744] [ 33.235102] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.236572] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.237164] Hardware name: linux,dummy-virt (DT) [ 33.237680] Call trace: [ 33.238181] show_stack+0x20/0x38 (C) [ 33.238896] dump_stack_lvl+0x8c/0xd0 [ 33.239477] print_report+0x118/0x5e0 [ 33.240122] kasan_report+0xc8/0x118 [ 33.240675] __asan_report_load1_noabort+0x20/0x30 [ 33.241339] strnlen+0x80/0x88 [ 33.241914] kasan_strings+0x364/0x8d8 [ 33.242552] kunit_try_run_case+0x14c/0x3d0 [ 33.243221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.243973] kthread+0x24c/0x2d0 [ 33.244521] ret_from_fork+0x10/0x20 [ 33.245083] [ 33.245416] Allocated by task 248: [ 33.245951] kasan_save_stack+0x3c/0x68 [ 33.246587] kasan_save_track+0x20/0x40 [ 33.247170] kasan_save_alloc_info+0x40/0x58 [ 33.247796] __kasan_kmalloc+0xd4/0xd8 [ 33.248373] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.248904] kasan_strings+0xb0/0x8d8 [ 33.249531] kunit_try_run_case+0x14c/0x3d0 [ 33.250081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.250924] kthread+0x24c/0x2d0 [ 33.251526] ret_from_fork+0x10/0x20 [ 33.252110] [ 33.252403] Freed by task 248: [ 33.252921] kasan_save_stack+0x3c/0x68 [ 33.253573] kasan_save_track+0x20/0x40 [ 33.254174] kasan_save_free_info+0x4c/0x78 [ 33.254796] __kasan_slab_free+0x6c/0x98 [ 33.255357] kfree+0x114/0x3c8 [ 33.255808] kasan_strings+0x124/0x8d8 [ 33.256489] kunit_try_run_case+0x14c/0x3d0 [ 33.257111] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.257673] kthread+0x24c/0x2d0 [ 33.258234] ret_from_fork+0x10/0x20 [ 33.258899] [ 33.259194] The buggy address belongs to the object at fff00000c63d1e40 [ 33.259194] which belongs to the cache kmalloc-32 of size 32 [ 33.260621] The buggy address is located 16 bytes inside of [ 33.260621] freed 32-byte region [fff00000c63d1e40, fff00000c63d1e60) [ 33.262041] [ 33.262391] The buggy address belongs to the physical page: [ 33.263077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d1 [ 33.264021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.264774] page_type: f5(slab) [ 33.265349] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 33.266221] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 33.267261] page dumped because: kasan: bad access detected [ 33.267971] [ 33.268277] Memory state around the buggy address: [ 33.268920] fff00000c63d1d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.269843] fff00000c63d1d80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.270692] >fff00000c63d1e00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.271588] ^ [ 33.272383] fff00000c63d1e80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.273303] fff00000c63d1f00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 33.274117] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[ 33.183185] ================================================================== [ 33.184120] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 33.185033] Read of size 1 at addr fff00000c63d1e50 by task kunit_try_catch/248 [ 33.186097] [ 33.186499] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.188021] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.188733] Hardware name: linux,dummy-virt (DT) [ 33.189424] Call trace: [ 33.189892] show_stack+0x20/0x38 (C) [ 33.190634] dump_stack_lvl+0x8c/0xd0 [ 33.191281] print_report+0x118/0x5e0 [ 33.191922] kasan_report+0xc8/0x118 [ 33.192549] __asan_report_load1_noabort+0x20/0x30 [ 33.193314] strlen+0xa8/0xb0 [ 33.193901] kasan_strings+0x304/0x8d8 [ 33.194518] kunit_try_run_case+0x14c/0x3d0 [ 33.195230] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.196134] kthread+0x24c/0x2d0 [ 33.196736] ret_from_fork+0x10/0x20 [ 33.197506] [ 33.197822] Allocated by task 248: [ 33.198345] kasan_save_stack+0x3c/0x68 [ 33.199345] kasan_save_track+0x20/0x40 [ 33.199803] kasan_save_alloc_info+0x40/0x58 [ 33.200626] __kasan_kmalloc+0xd4/0xd8 [ 33.201363] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.202176] kasan_strings+0xb0/0x8d8 [ 33.202928] kunit_try_run_case+0x14c/0x3d0 [ 33.203588] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.204464] kthread+0x24c/0x2d0 [ 33.204988] ret_from_fork+0x10/0x20 [ 33.205511] [ 33.205817] Freed by task 248: [ 33.206774] kasan_save_stack+0x3c/0x68 [ 33.207531] kasan_save_track+0x20/0x40 [ 33.208226] kasan_save_free_info+0x4c/0x78 [ 33.209016] __kasan_slab_free+0x6c/0x98 [ 33.209750] kfree+0x114/0x3c8 [ 33.210437] kasan_strings+0x124/0x8d8 [ 33.211203] kunit_try_run_case+0x14c/0x3d0 [ 33.211798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.212606] kthread+0x24c/0x2d0 [ 33.213301] ret_from_fork+0x10/0x20 [ 33.213800] [ 33.214214] The buggy address belongs to the object at fff00000c63d1e40 [ 33.214214] which belongs to the cache kmalloc-32 of size 32 [ 33.215527] The buggy address is located 16 bytes inside of [ 33.215527] freed 32-byte region [fff00000c63d1e40, fff00000c63d1e60) [ 33.216938] [ 33.217228] The buggy address belongs to the physical page: [ 33.218066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d1 [ 33.218978] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.219814] page_type: f5(slab) [ 33.220414] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 33.221382] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 33.222291] page dumped because: kasan: bad access detected [ 33.222983] [ 33.223344] Memory state around the buggy address: [ 33.224082] fff00000c63d1d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.224943] fff00000c63d1d80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.225829] >fff00000c63d1e00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.226689] ^ [ 33.227351] fff00000c63d1e80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.228351] fff00000c63d1f00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 33.229177] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 33.131681] ================================================================== [ 33.132630] BUG: KASAN: slab-use-after-free in kasan_strings+0x838/0x8d8 [ 33.133396] Read of size 1 at addr fff00000c63d1e50 by task kunit_try_catch/248 [ 33.134391] [ 33.134666] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.135649] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.137270] Hardware name: linux,dummy-virt (DT) [ 33.138281] Call trace: [ 33.138949] show_stack+0x20/0x38 (C) [ 33.139627] dump_stack_lvl+0x8c/0xd0 [ 33.140347] print_report+0x118/0x5e0 [ 33.141240] kasan_report+0xc8/0x118 [ 33.141964] __asan_report_load1_noabort+0x20/0x30 [ 33.142774] kasan_strings+0x838/0x8d8 [ 33.143480] kunit_try_run_case+0x14c/0x3d0 [ 33.144266] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.145103] kthread+0x24c/0x2d0 [ 33.145592] ret_from_fork+0x10/0x20 [ 33.146146] [ 33.146471] Allocated by task 248: [ 33.147099] kasan_save_stack+0x3c/0x68 [ 33.147722] kasan_save_track+0x20/0x40 [ 33.148554] kasan_save_alloc_info+0x40/0x58 [ 33.149245] __kasan_kmalloc+0xd4/0xd8 [ 33.150004] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.150747] kasan_strings+0xb0/0x8d8 [ 33.151454] kunit_try_run_case+0x14c/0x3d0 [ 33.152202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.153058] kthread+0x24c/0x2d0 [ 33.153676] ret_from_fork+0x10/0x20 [ 33.154407] [ 33.154971] Freed by task 248: [ 33.155596] kasan_save_stack+0x3c/0x68 [ 33.156327] kasan_save_track+0x20/0x40 [ 33.157020] kasan_save_free_info+0x4c/0x78 [ 33.157671] __kasan_slab_free+0x6c/0x98 [ 33.158417] kfree+0x114/0x3c8 [ 33.159034] kasan_strings+0x124/0x8d8 [ 33.159710] kunit_try_run_case+0x14c/0x3d0 [ 33.160441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.161372] kthread+0x24c/0x2d0 [ 33.162021] ret_from_fork+0x10/0x20 [ 33.162728] [ 33.163197] The buggy address belongs to the object at fff00000c63d1e40 [ 33.163197] which belongs to the cache kmalloc-32 of size 32 [ 33.164783] The buggy address is located 16 bytes inside of [ 33.164783] freed 32-byte region [fff00000c63d1e40, fff00000c63d1e60) [ 33.165465] [ 33.165638] The buggy address belongs to the physical page: [ 33.166049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d1 [ 33.167504] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.168592] page_type: f5(slab) [ 33.169342] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 33.170342] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 33.171323] page dumped because: kasan: bad access detected [ 33.172095] [ 33.172427] Memory state around the buggy address: [ 33.173468] fff00000c63d1d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.174436] fff00000c63d1d80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 33.175520] >fff00000c63d1e00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 33.176556] ^ [ 33.177154] fff00000c63d1e80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.178307] fff00000c63d1f00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 33.179359] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 33.086946] ================================================================== [ 33.089130] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 33.089949] Read of size 1 at addr fff00000c63d1e50 by task kunit_try_catch/248 [ 33.090738] [ 33.091173] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.092472] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.093057] Hardware name: linux,dummy-virt (DT) [ 33.093658] Call trace: [ 33.094095] show_stack+0x20/0x38 (C) [ 33.094766] dump_stack_lvl+0x8c/0xd0 [ 33.095361] print_report+0x118/0x5e0 [ 33.095966] kasan_report+0xc8/0x118 [ 33.096458] __asan_report_load1_noabort+0x20/0x30 [ 33.097260] strcmp+0xc0/0xc8 [ 33.097818] kasan_strings+0x228/0x8d8 [ 33.098382] kunit_try_run_case+0x14c/0x3d0 [ 33.099036] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.099810] kthread+0x24c/0x2d0 [ 33.100403] ret_from_fork+0x10/0x20 [ 33.101019] [ 33.101395] Allocated by task 248: [ 33.101946] kasan_save_stack+0x3c/0x68 [ 33.102461] kasan_save_track+0x20/0x40 [ 33.103113] kasan_save_alloc_info+0x40/0x58 [ 33.103691] __kasan_kmalloc+0xd4/0xd8 [ 33.104236] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.104966] kasan_strings+0xb0/0x8d8 [ 33.105555] kunit_try_run_case+0x14c/0x3d0 [ 33.106161] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.106822] kthread+0x24c/0x2d0 [ 33.107381] ret_from_fork+0x10/0x20 [ 33.107941] [ 33.108257] Freed by task 248: [ 33.108836] kasan_save_stack+0x3c/0x68 [ 33.109399] kasan_save_track+0x20/0x40 [ 33.110036] kasan_save_free_info+0x4c/0x78 [ 33.110650] __kasan_slab_free+0x6c/0x98 [ 33.111125] kfree+0x114/0x3c8 [ 33.111670] kasan_strings+0x124/0x8d8 [ 33.112302] kunit_try_run_case+0x14c/0x3d0 [ 33.112827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.113372] kthread+0x24c/0x2d0 [ 33.113795] ret_from_fork+0x10/0x20 [ 33.114481] [ 33.114813] The buggy address belongs to the object at fff00000c63d1e40 [ 33.114813] which belongs to the cache kmalloc-32 of size 32 [ 33.116071] The buggy address is located 16 bytes inside of [ 33.116071] freed 32-byte region [fff00000c63d1e40, fff00000c63d1e60) [ 33.117470] [ 33.117785] The buggy address belongs to the physical page: [ 33.118476] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d1 [ 33.119527] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.120281] page_type: f5(slab) [ 33.120808] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 33.121749] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 33.122705] page dumped because: kasan: bad access detected [ 33.123408] [ 33.123751] Memory state around the buggy address: [ 33.124409] fff00000c63d1d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.125287] fff00000c63d1d80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 33.126080] >fff00000c63d1e00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 33.126947] ^ [ 33.127754] fff00000c63d1e80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.128633] fff00000c63d1f00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 33.129534] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 33.033104] ================================================================== [ 33.034546] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 33.035896] Read of size 1 at addr fff00000c63d1d98 by task kunit_try_catch/246 [ 33.037013] [ 33.037475] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.038797] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.039657] Hardware name: linux,dummy-virt (DT) [ 33.040277] Call trace: [ 33.040732] show_stack+0x20/0x38 (C) [ 33.041378] dump_stack_lvl+0x8c/0xd0 [ 33.041936] print_report+0x118/0x5e0 [ 33.042614] kasan_report+0xc8/0x118 [ 33.043242] __asan_report_load1_noabort+0x20/0x30 [ 33.043917] memcmp+0x198/0x1d8 [ 33.044447] kasan_memcmp+0x16c/0x300 [ 33.045353] kunit_try_run_case+0x14c/0x3d0 [ 33.045953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.046746] kthread+0x24c/0x2d0 [ 33.047535] ret_from_fork+0x10/0x20 [ 33.048142] [ 33.048511] Allocated by task 246: [ 33.049044] kasan_save_stack+0x3c/0x68 [ 33.049621] kasan_save_track+0x20/0x40 [ 33.050222] kasan_save_alloc_info+0x40/0x58 [ 33.050786] __kasan_kmalloc+0xd4/0xd8 [ 33.051630] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.052219] kasan_memcmp+0xbc/0x300 [ 33.052828] kunit_try_run_case+0x14c/0x3d0 [ 33.053497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.054311] kthread+0x24c/0x2d0 [ 33.054827] ret_from_fork+0x10/0x20 [ 33.056177] [ 33.056537] The buggy address belongs to the object at fff00000c63d1d80 [ 33.056537] which belongs to the cache kmalloc-32 of size 32 [ 33.057960] The buggy address is located 0 bytes to the right of [ 33.057960] allocated 24-byte region [fff00000c63d1d80, fff00000c63d1d98) [ 33.059774] [ 33.060123] The buggy address belongs to the physical page: [ 33.060894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063d1 [ 33.061773] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.062748] page_type: f5(slab) [ 33.063484] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 33.064463] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 33.065403] page dumped because: kasan: bad access detected [ 33.066216] [ 33.066586] Memory state around the buggy address: [ 33.067436] fff00000c63d1c80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 33.068418] fff00000c63d1d00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 33.069303] >fff00000c63d1d80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.070182] ^ [ 33.070655] fff00000c63d1e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.071864] fff00000c63d1e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.072739] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 32.979110] ================================================================== [ 32.980475] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2e4/0x348 [ 32.982200] Read of size 1 at addr ffff800080c17bea by task kunit_try_catch/242 [ 32.983117] [ 32.983527] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.984623] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.985320] Hardware name: linux,dummy-virt (DT) [ 32.986464] Call trace: [ 32.986958] show_stack+0x20/0x38 (C) [ 32.987539] dump_stack_lvl+0x8c/0xd0 [ 32.988647] print_report+0x2fc/0x5e0 [ 32.989483] kasan_report+0xc8/0x118 [ 32.990079] __asan_report_load1_noabort+0x20/0x30 [ 32.990928] kasan_alloca_oob_right+0x2e4/0x348 [ 32.992033] kunit_try_run_case+0x14c/0x3d0 [ 32.992608] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.993446] kthread+0x24c/0x2d0 [ 32.994003] ret_from_fork+0x10/0x20 [ 32.994583] [ 32.995052] The buggy address belongs to stack of task kunit_try_catch/242 [ 32.996230] [ 32.997142] The buggy address belongs to the virtual mapping at [ 32.997142] [ffff800080c10000, ffff800080c19000) created by: [ 32.997142] kernel_clone+0x140/0x788 [ 32.999093] [ 32.999753] The buggy address belongs to the physical page: [ 33.000598] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664d [ 33.001636] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.002634] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.003926] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.005355] page dumped because: kasan: bad access detected [ 33.006068] [ 33.006484] Memory state around the buggy address: [ 33.007646] ffff800080c17a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.008608] ffff800080c17b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.009534] >ffff800080c17b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 33.010434] ^ [ 33.011853] ffff800080c17c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 [ 33.012583] ffff800080c17c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 [ 33.013518] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 32.937809] ================================================================== [ 32.939201] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 32.940208] Read of size 1 at addr ffff800080a27bdf by task kunit_try_catch/240 [ 32.941089] [ 32.941515] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.942617] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.943276] Hardware name: linux,dummy-virt (DT) [ 32.944142] Call trace: [ 32.945127] show_stack+0x20/0x38 (C) [ 32.945743] dump_stack_lvl+0x8c/0xd0 [ 32.946494] print_report+0x2fc/0x5e0 [ 32.947170] kasan_report+0xc8/0x118 [ 32.947753] __asan_report_load1_noabort+0x20/0x30 [ 32.948476] kasan_alloca_oob_left+0x2b8/0x310 [ 32.949498] kunit_try_run_case+0x14c/0x3d0 [ 32.950329] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.951197] kthread+0x24c/0x2d0 [ 32.952239] ret_from_fork+0x10/0x20 [ 32.953094] [ 32.953382] The buggy address belongs to stack of task kunit_try_catch/240 [ 32.954312] [ 32.954684] The buggy address belongs to the virtual mapping at [ 32.954684] [ffff800080a20000, ffff800080a29000) created by: [ 32.954684] kernel_clone+0x140/0x788 [ 32.956380] [ 32.956810] The buggy address belongs to the physical page: [ 32.957863] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063e1 [ 32.958913] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.959959] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.960843] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.961928] page dumped because: kasan: bad access detected [ 32.962657] [ 32.963047] Memory state around the buggy address: [ 32.964002] ffff800080a27a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.964845] ffff800080a27b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.965733] >ffff800080a27b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 32.966666] ^ [ 32.967732] ffff800080a27c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 [ 32.968517] ffff800080a27c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 [ 32.969490] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[ 29.173089] ================================================================== [ 29.174238] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 29.175037] Free of addr fff00000c644c001 by task kunit_try_catch/139 [ 29.176924] [ 29.177232] CPU: 1 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 29.178606] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.179282] Hardware name: linux,dummy-virt (DT) [ 29.179966] Call trace: [ 29.180585] show_stack+0x20/0x38 (C) [ 29.181236] dump_stack_lvl+0x8c/0xd0 [ 29.181897] print_report+0x118/0x5e0 [ 29.182649] kasan_report_invalid_free+0xb0/0xd8 [ 29.183649] __kasan_kfree_large+0x5c/0xa8 [ 29.184399] free_large_kmalloc+0x58/0x140 [ 29.185003] kfree+0x270/0x3c8 [ 29.185594] kmalloc_large_invalid_free+0x108/0x270 [ 29.186291] kunit_try_run_case+0x14c/0x3d0 [ 29.186944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.187652] kthread+0x24c/0x2d0 [ 29.188453] ret_from_fork+0x10/0x20 [ 29.189053] [ 29.189366] The buggy address belongs to the physical page: [ 29.190047] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10644c [ 29.190841] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.192241] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.193226] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.194260] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.195149] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.196168] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.197429] head: 0bfffe0000000002 ffffc1ffc3191301 ffffffffffffffff 0000000000000000 [ 29.198568] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 29.199356] page dumped because: kasan: bad access detected [ 29.199779] [ 29.200448] Memory state around the buggy address: [ 29.201125] fff00000c644bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.201907] fff00000c644bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.203005] >fff00000c644c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.204086] ^ [ 29.204551] fff00000c644c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.205486] fff00000c644c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.206408] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 32.842456] ================================================================== [ 32.843995] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 32.845117] Read of size 1 at addr ffffa4b337ee402d by task kunit_try_catch/234 [ 32.846384] [ 32.846756] CPU: 0 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.848783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.849572] Hardware name: linux,dummy-virt (DT) [ 32.850305] Call trace: [ 32.850915] show_stack+0x20/0x38 (C) [ 32.851688] dump_stack_lvl+0x8c/0xd0 [ 32.852699] print_report+0x2fc/0x5e0 [ 32.853321] kasan_report+0xc8/0x118 [ 32.853892] __asan_report_load1_noabort+0x20/0x30 [ 32.854589] kasan_global_oob_right+0x230/0x270 [ 32.855429] kunit_try_run_case+0x14c/0x3d0 [ 32.856017] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.856850] kthread+0x24c/0x2d0 [ 32.857548] ret_from_fork+0x10/0x20 [ 32.858107] [ 32.858561] The buggy address belongs to the variable: [ 32.859463] global_array+0xd/0x40 [ 32.860085] [ 32.860502] The buggy address belongs to the virtual mapping at [ 32.860502] [ffffa4b336220000, ffffa4b337fa1000) created by: [ 32.860502] paging_init+0x668/0x7c8 [ 32.862148] [ 32.862758] The buggy address belongs to the physical page: [ 32.864355] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x478e4 [ 32.865191] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 32.866119] raw: 03fffe0000002000 ffffc1ffc01e3908 ffffc1ffc01e3908 0000000000000000 [ 32.867041] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.867951] page dumped because: kasan: bad access detected [ 32.868650] [ 32.869177] Memory state around the buggy address: [ 32.869777] ffffa4b337ee3f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.870672] ffffa4b337ee3f80: 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9 f9 [ 32.871393] >ffffa4b337ee4000: f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 [ 32.872955] ^ [ 32.873480] ffffa4b337ee4080: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 [ 32.874529] ffffa4b337ee4100: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.875383] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 32.797290] ================================================================== [ 32.798829] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 32.800298] Free of addr fff00000c6610001 by task kunit_try_catch/232 [ 32.800922] [ 32.801392] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.803251] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.803939] Hardware name: linux,dummy-virt (DT) [ 32.804927] Call trace: [ 32.805381] show_stack+0x20/0x38 (C) [ 32.806149] dump_stack_lvl+0x8c/0xd0 [ 32.806826] print_report+0x118/0x5e0 [ 32.807713] kasan_report_invalid_free+0xb0/0xd8 [ 32.808655] __kasan_mempool_poison_object+0xfc/0x150 [ 32.809370] mempool_free+0x28c/0x328 [ 32.809835] mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 32.810675] mempool_kmalloc_large_invalid_free+0xb8/0x110 [ 32.811421] kunit_try_run_case+0x14c/0x3d0 [ 32.812045] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.812838] kthread+0x24c/0x2d0 [ 32.814198] ret_from_fork+0x10/0x20 [ 32.814991] [ 32.815353] The buggy address belongs to the physical page: [ 32.816495] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106610 [ 32.817398] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.818295] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.819163] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.820418] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.821180] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.822285] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.823365] head: 0bfffe0000000002 ffffc1ffc3198401 ffffffffffffffff 0000000000000000 [ 32.824357] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 32.825275] page dumped because: kasan: bad access detected [ 32.825954] [ 32.826260] Memory state around the buggy address: [ 32.826919] fff00000c660ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.828265] fff00000c660ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.829158] >fff00000c6610000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.829842] ^ [ 32.830926] fff00000c6610080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.831943] fff00000c6610100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.833115] ================================================================== [ 32.744352] ================================================================== [ 32.745519] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 32.746423] Free of addr fff00000c6567801 by task kunit_try_catch/230 [ 32.747073] [ 32.747537] CPU: 0 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.749212] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.749769] Hardware name: linux,dummy-virt (DT) [ 32.750615] Call trace: [ 32.751050] show_stack+0x20/0x38 (C) [ 32.751714] dump_stack_lvl+0x8c/0xd0 [ 32.752453] print_report+0x118/0x5e0 [ 32.752981] kasan_report_invalid_free+0xb0/0xd8 [ 32.753677] check_slab_allocation+0xfc/0x108 [ 32.754310] __kasan_mempool_poison_object+0x78/0x150 [ 32.755028] mempool_free+0x28c/0x328 [ 32.755822] mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 32.756506] mempool_kmalloc_invalid_free+0xb8/0x110 [ 32.757294] kunit_try_run_case+0x14c/0x3d0 [ 32.757936] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.758706] kthread+0x24c/0x2d0 [ 32.759582] ret_from_fork+0x10/0x20 [ 32.760086] [ 32.760454] Allocated by task 230: [ 32.761018] kasan_save_stack+0x3c/0x68 [ 32.761525] kasan_save_track+0x20/0x40 [ 32.762236] kasan_save_alloc_info+0x40/0x58 [ 32.762794] __kasan_mempool_unpoison_object+0x11c/0x180 [ 32.763864] remove_element+0x130/0x1f8 [ 32.764866] mempool_alloc_preallocated+0x58/0xc0 [ 32.765373] mempool_kmalloc_invalid_free_helper+0x94/0x2a0 [ 32.766277] mempool_kmalloc_invalid_free+0xb8/0x110 [ 32.767120] kunit_try_run_case+0x14c/0x3d0 [ 32.767950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.768980] kthread+0x24c/0x2d0 [ 32.769685] ret_from_fork+0x10/0x20 [ 32.770535] [ 32.770967] The buggy address belongs to the object at fff00000c6567800 [ 32.770967] which belongs to the cache kmalloc-128 of size 128 [ 32.772440] The buggy address is located 1 bytes inside of [ 32.772440] 128-byte region [fff00000c6567800, fff00000c6567880) [ 32.773769] [ 32.774223] The buggy address belongs to the physical page: [ 32.775954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106567 [ 32.776840] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.777748] page_type: f5(slab) [ 32.778266] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.779342] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.780232] page dumped because: kasan: bad access detected [ 32.781028] [ 32.781336] Memory state around the buggy address: [ 32.781911] fff00000c6567700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.782772] fff00000c6567780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.784417] >fff00000c6567800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.785360] ^ [ 32.785780] fff00000c6567880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.786997] fff00000c6567900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.788250] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 32.600271] ================================================================== [ 32.601506] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 32.602168] Free of addr fff00000c6567300 by task kunit_try_catch/224 [ 32.603023] [ 32.603850] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.604995] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.605620] Hardware name: linux,dummy-virt (DT) [ 32.606221] Call trace: [ 32.606631] show_stack+0x20/0x38 (C) [ 32.607147] dump_stack_lvl+0x8c/0xd0 [ 32.608014] print_report+0x118/0x5e0 [ 32.608515] kasan_report_invalid_free+0xb0/0xd8 [ 32.609282] check_slab_allocation+0xd4/0x108 [ 32.609949] __kasan_mempool_poison_object+0x78/0x150 [ 32.610735] mempool_free+0x28c/0x328 [ 32.611411] mempool_double_free_helper+0x150/0x2e0 [ 32.612072] mempool_kmalloc_double_free+0xb8/0x110 [ 32.612808] kunit_try_run_case+0x14c/0x3d0 [ 32.613481] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.614285] kthread+0x24c/0x2d0 [ 32.614763] ret_from_fork+0x10/0x20 [ 32.615475] [ 32.615841] Allocated by task 224: [ 32.616300] kasan_save_stack+0x3c/0x68 [ 32.617175] kasan_save_track+0x20/0x40 [ 32.617652] kasan_save_alloc_info+0x40/0x58 [ 32.618300] __kasan_mempool_unpoison_object+0x11c/0x180 [ 32.619073] remove_element+0x130/0x1f8 [ 32.619639] mempool_alloc_preallocated+0x58/0xc0 [ 32.620275] mempool_double_free_helper+0x94/0x2e0 [ 32.621387] mempool_kmalloc_double_free+0xb8/0x110 [ 32.622193] kunit_try_run_case+0x14c/0x3d0 [ 32.622861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.623489] kthread+0x24c/0x2d0 [ 32.624385] ret_from_fork+0x10/0x20 [ 32.624912] [ 32.625232] Freed by task 224: [ 32.625727] kasan_save_stack+0x3c/0x68 [ 32.626295] kasan_save_track+0x20/0x40 [ 32.626855] kasan_save_free_info+0x4c/0x78 [ 32.627679] __kasan_mempool_poison_object+0xc0/0x150 [ 32.628535] mempool_free+0x28c/0x328 [ 32.628986] mempool_double_free_helper+0x100/0x2e0 [ 32.629722] mempool_kmalloc_double_free+0xb8/0x110 [ 32.630469] kunit_try_run_case+0x14c/0x3d0 [ 32.631090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.632142] kthread+0x24c/0x2d0 [ 32.633063] ret_from_fork+0x10/0x20 [ 32.633531] [ 32.633812] The buggy address belongs to the object at fff00000c6567300 [ 32.633812] which belongs to the cache kmalloc-128 of size 128 [ 32.635550] The buggy address is located 0 bytes inside of [ 32.635550] 128-byte region [fff00000c6567300, fff00000c6567380) [ 32.637010] [ 32.637355] The buggy address belongs to the physical page: [ 32.638025] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106567 [ 32.639010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.640360] page_type: f5(slab) [ 32.640915] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.642146] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.643476] page dumped because: kasan: bad access detected [ 32.644258] [ 32.644601] Memory state around the buggy address: [ 32.645412] fff00000c6567200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.646463] fff00000c6567280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.647687] >fff00000c6567300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.648771] ^ [ 32.649488] fff00000c6567380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.650524] fff00000c6567400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.651347] ================================================================== [ 32.661507] ================================================================== [ 32.662682] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 32.663823] Free of addr fff00000c660c000 by task kunit_try_catch/226 [ 32.665355] [ 32.666005] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.667277] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.667867] Hardware name: linux,dummy-virt (DT) [ 32.668746] Call trace: [ 32.669271] show_stack+0x20/0x38 (C) [ 32.670002] dump_stack_lvl+0x8c/0xd0 [ 32.670700] print_report+0x118/0x5e0 [ 32.671137] kasan_report_invalid_free+0xb0/0xd8 [ 32.672418] __kasan_mempool_poison_object+0x14c/0x150 [ 32.673114] mempool_free+0x28c/0x328 [ 32.673664] mempool_double_free_helper+0x150/0x2e0 [ 32.674620] mempool_kmalloc_large_double_free+0xb8/0x110 [ 32.675625] kunit_try_run_case+0x14c/0x3d0 [ 32.676172] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.676926] kthread+0x24c/0x2d0 [ 32.677407] ret_from_fork+0x10/0x20 [ 32.678055] [ 32.678438] The buggy address belongs to the physical page: [ 32.679018] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10660c [ 32.680642] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.681727] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.682764] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.683829] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.684796] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.685688] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.686626] head: 0bfffe0000000002 ffffc1ffc3198301 ffffffffffffffff 0000000000000000 [ 32.688343] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 32.689029] page dumped because: kasan: bad access detected [ 32.689591] [ 32.689977] Memory state around the buggy address: [ 32.690544] fff00000c660bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.691422] fff00000c660bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.692428] >fff00000c660c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.693454] ^ [ 32.693907] fff00000c660c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.694732] fff00000c660c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.695765] ================================================================== [ 32.705798] ================================================================== [ 32.707028] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 32.707863] Free of addr fff00000c65d0000 by task kunit_try_catch/228 [ 32.708551] [ 32.709027] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.709982] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.710644] Hardware name: linux,dummy-virt (DT) [ 32.711804] Call trace: [ 32.712230] show_stack+0x20/0x38 (C) [ 32.712954] dump_stack_lvl+0x8c/0xd0 [ 32.713591] print_report+0x118/0x5e0 [ 32.714310] kasan_report_invalid_free+0xb0/0xd8 [ 32.715004] __kasan_mempool_poison_pages+0xe0/0xe8 [ 32.715951] mempool_free+0x24c/0x328 [ 32.716460] mempool_double_free_helper+0x150/0x2e0 [ 32.717266] mempool_page_alloc_double_free+0xb4/0x110 [ 32.717999] kunit_try_run_case+0x14c/0x3d0 [ 32.718555] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.719476] kthread+0x24c/0x2d0 [ 32.720054] ret_from_fork+0x10/0x20 [ 32.720669] [ 32.721272] The buggy address belongs to the physical page: [ 32.721982] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d0 [ 32.723010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.724220] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.725154] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.726042] page dumped because: kasan: bad access detected [ 32.726671] [ 32.727038] Memory state around the buggy address: [ 32.727972] fff00000c65cff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.728888] fff00000c65cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.729753] >fff00000c65d0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.730637] ^ [ 32.731125] fff00000c65d0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.732141] fff00000c65d0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.732548] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 32.560290] ================================================================== [ 32.561453] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 32.562124] Read of size 1 at addr fff00000c65d0000 by task kunit_try_catch/222 [ 32.563066] [ 32.563808] CPU: 0 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.565518] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.565949] Hardware name: linux,dummy-virt (DT) [ 32.567237] Call trace: [ 32.567759] show_stack+0x20/0x38 (C) [ 32.568488] dump_stack_lvl+0x8c/0xd0 [ 32.569355] print_report+0x118/0x5e0 [ 32.569997] kasan_report+0xc8/0x118 [ 32.570656] __asan_report_load1_noabort+0x20/0x30 [ 32.571658] mempool_uaf_helper+0x314/0x340 [ 32.572386] mempool_page_alloc_uaf+0xb8/0x118 [ 32.573127] kunit_try_run_case+0x14c/0x3d0 [ 32.573961] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.574865] kthread+0x24c/0x2d0 [ 32.575489] ret_from_fork+0x10/0x20 [ 32.576110] [ 32.576443] The buggy address belongs to the physical page: [ 32.577288] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d0 [ 32.578293] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.579307] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.580319] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.581299] page dumped because: kasan: bad access detected [ 32.582159] [ 32.582744] Memory state around the buggy address: [ 32.583413] fff00000c65cff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.584725] fff00000c65cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.585365] >fff00000c65d0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.587074] ^ [ 32.587977] fff00000c65d0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.589011] fff00000c65d0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.590061] ================================================================== [ 32.438414] ================================================================== [ 32.440201] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 32.440987] Read of size 1 at addr fff00000c65d0000 by task kunit_try_catch/218 [ 32.441671] [ 32.442211] CPU: 0 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.444161] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.444934] Hardware name: linux,dummy-virt (DT) [ 32.445504] Call trace: [ 32.445962] show_stack+0x20/0x38 (C) [ 32.446558] dump_stack_lvl+0x8c/0xd0 [ 32.448007] print_report+0x118/0x5e0 [ 32.448504] kasan_report+0xc8/0x118 [ 32.449083] __asan_report_load1_noabort+0x20/0x30 [ 32.449905] mempool_uaf_helper+0x314/0x340 [ 32.450544] mempool_kmalloc_large_uaf+0xbc/0x118 [ 32.451209] kunit_try_run_case+0x14c/0x3d0 [ 32.452387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.453204] kthread+0x24c/0x2d0 [ 32.453734] ret_from_fork+0x10/0x20 [ 32.454514] [ 32.455029] The buggy address belongs to the physical page: [ 32.456221] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d0 [ 32.457259] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.458465] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.459367] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.460437] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.461777] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.462837] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.464256] head: 0bfffe0000000002 ffffc1ffc3197401 ffffffffffffffff 0000000000000000 [ 32.465094] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 32.466029] page dumped because: kasan: bad access detected [ 32.466664] [ 32.467162] Memory state around the buggy address: [ 32.468506] fff00000c65cff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.469707] fff00000c65cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.470647] >fff00000c65d0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.471659] ^ [ 32.472565] fff00000c65d0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.473721] fff00000c65d0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.474730] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 32.485870] ================================================================== [ 32.487035] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 32.488136] Read of size 1 at addr fff00000c63b8240 by task kunit_try_catch/220 [ 32.489046] [ 32.489431] CPU: 0 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.490739] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.491335] Hardware name: linux,dummy-virt (DT) [ 32.492797] Call trace: [ 32.493221] show_stack+0x20/0x38 (C) [ 32.493716] dump_stack_lvl+0x8c/0xd0 [ 32.494317] print_report+0x118/0x5e0 [ 32.494944] kasan_report+0xc8/0x118 [ 32.495704] __asan_report_load1_noabort+0x20/0x30 [ 32.496740] mempool_uaf_helper+0x314/0x340 [ 32.497417] mempool_slab_uaf+0xb8/0x110 [ 32.497923] kunit_try_run_case+0x14c/0x3d0 [ 32.498618] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.499302] kthread+0x24c/0x2d0 [ 32.499798] ret_from_fork+0x10/0x20 [ 32.500259] [ 32.500514] Allocated by task 220: [ 32.500971] kasan_save_stack+0x3c/0x68 [ 32.501823] kasan_save_track+0x20/0x40 [ 32.502657] kasan_save_alloc_info+0x40/0x58 [ 32.503362] __kasan_mempool_unpoison_object+0xbc/0x180 [ 32.504239] remove_element+0x16c/0x1f8 [ 32.504702] mempool_alloc_preallocated+0x58/0xc0 [ 32.505380] mempool_uaf_helper+0xa4/0x340 [ 32.505976] mempool_slab_uaf+0xb8/0x110 [ 32.506633] kunit_try_run_case+0x14c/0x3d0 [ 32.507611] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.508809] kthread+0x24c/0x2d0 [ 32.509536] ret_from_fork+0x10/0x20 [ 32.510360] [ 32.510688] Freed by task 220: [ 32.511134] kasan_save_stack+0x3c/0x68 [ 32.512404] kasan_save_track+0x20/0x40 [ 32.512999] kasan_save_free_info+0x4c/0x78 [ 32.513510] __kasan_mempool_poison_object+0xc0/0x150 [ 32.514293] mempool_free+0x28c/0x328 [ 32.514919] mempool_uaf_helper+0x104/0x340 [ 32.515659] mempool_slab_uaf+0xb8/0x110 [ 32.516314] kunit_try_run_case+0x14c/0x3d0 [ 32.516930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.517635] kthread+0x24c/0x2d0 [ 32.518859] ret_from_fork+0x10/0x20 [ 32.519767] [ 32.520036] The buggy address belongs to the object at fff00000c63b8240 [ 32.520036] which belongs to the cache test_cache of size 123 [ 32.521455] The buggy address is located 0 bytes inside of [ 32.521455] freed 123-byte region [fff00000c63b8240, fff00000c63b82bb) [ 32.522775] [ 32.523080] The buggy address belongs to the physical page: [ 32.524618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063b8 [ 32.525563] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.526545] page_type: f5(slab) [ 32.527093] raw: 0bfffe0000000000 fff00000c63a83c0 dead000000000122 0000000000000000 [ 32.528446] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 32.529298] page dumped because: kasan: bad access detected [ 32.529948] [ 32.530252] Memory state around the buggy address: [ 32.531068] fff00000c63b8100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.532322] fff00000c63b8180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.533831] >fff00000c63b8200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 32.534864] ^ [ 32.535981] fff00000c63b8280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.536807] fff00000c63b8300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.537603] ================================================================== [ 32.378336] ================================================================== [ 32.380178] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 32.381101] Read of size 1 at addr fff00000c64e4d00 by task kunit_try_catch/216 [ 32.381944] [ 32.382388] CPU: 0 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.383981] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.384315] Hardware name: linux,dummy-virt (DT) [ 32.384616] Call trace: [ 32.384824] show_stack+0x20/0x38 (C) [ 32.385305] dump_stack_lvl+0x8c/0xd0 [ 32.385988] print_report+0x118/0x5e0 [ 32.386631] kasan_report+0xc8/0x118 [ 32.387117] __asan_report_load1_noabort+0x20/0x30 [ 32.387663] mempool_uaf_helper+0x314/0x340 [ 32.388562] mempool_kmalloc_uaf+0xbc/0x118 [ 32.389294] kunit_try_run_case+0x14c/0x3d0 [ 32.390222] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.390894] kthread+0x24c/0x2d0 [ 32.391869] ret_from_fork+0x10/0x20 [ 32.393271] [ 32.393775] Allocated by task 216: [ 32.394249] kasan_save_stack+0x3c/0x68 [ 32.395044] kasan_save_track+0x20/0x40 [ 32.396114] kasan_save_alloc_info+0x40/0x58 [ 32.396732] __kasan_mempool_unpoison_object+0x11c/0x180 [ 32.397528] remove_element+0x130/0x1f8 [ 32.398185] mempool_alloc_preallocated+0x58/0xc0 [ 32.398937] mempool_uaf_helper+0xa4/0x340 [ 32.399666] mempool_kmalloc_uaf+0xbc/0x118 [ 32.400474] kunit_try_run_case+0x14c/0x3d0 [ 32.401107] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.401805] kthread+0x24c/0x2d0 [ 32.402391] ret_from_fork+0x10/0x20 [ 32.402960] [ 32.403315] Freed by task 216: [ 32.403843] kasan_save_stack+0x3c/0x68 [ 32.404319] kasan_save_track+0x20/0x40 [ 32.405069] kasan_save_free_info+0x4c/0x78 [ 32.405691] __kasan_mempool_poison_object+0xc0/0x150 [ 32.406713] mempool_free+0x28c/0x328 [ 32.407569] mempool_uaf_helper+0x104/0x340 [ 32.408271] mempool_kmalloc_uaf+0xbc/0x118 [ 32.408831] kunit_try_run_case+0x14c/0x3d0 [ 32.409474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.410299] kthread+0x24c/0x2d0 [ 32.410822] ret_from_fork+0x10/0x20 [ 32.411783] [ 32.412103] The buggy address belongs to the object at fff00000c64e4d00 [ 32.412103] which belongs to the cache kmalloc-128 of size 128 [ 32.413398] The buggy address is located 0 bytes inside of [ 32.413398] freed 128-byte region [fff00000c64e4d00, fff00000c64e4d80) [ 32.414725] [ 32.415100] The buggy address belongs to the physical page: [ 32.416212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064e4 [ 32.417138] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.417978] page_type: f5(slab) [ 32.418488] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.420037] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.421000] page dumped because: kasan: bad access detected [ 32.421631] [ 32.421939] Memory state around the buggy address: [ 32.422668] fff00000c64e4c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.424026] fff00000c64e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.424925] >fff00000c64e4d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.425833] ^ [ 32.426282] fff00000c64e4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.427518] fff00000c64e4e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.428401] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 32.268588] ================================================================== [ 32.269815] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.270808] Read of size 1 at addr fff00000c65d2001 by task kunit_try_catch/212 [ 32.271902] [ 32.272196] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.274060] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.274568] Hardware name: linux,dummy-virt (DT) [ 32.275224] Call trace: [ 32.275839] show_stack+0x20/0x38 (C) [ 32.276640] dump_stack_lvl+0x8c/0xd0 [ 32.277195] print_report+0x118/0x5e0 [ 32.277919] kasan_report+0xc8/0x118 [ 32.278476] __asan_report_load1_noabort+0x20/0x30 [ 32.279772] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.280563] mempool_kmalloc_large_oob_right+0xbc/0x118 [ 32.281266] kunit_try_run_case+0x14c/0x3d0 [ 32.281982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.282711] kthread+0x24c/0x2d0 [ 32.283467] ret_from_fork+0x10/0x20 [ 32.284539] [ 32.284795] The buggy address belongs to the physical page: [ 32.285680] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d0 [ 32.286687] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.287974] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.289033] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.289853] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.290854] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.292360] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.293429] head: 0bfffe0000000002 ffffc1ffc3197401 ffffffffffffffff 0000000000000000 [ 32.294448] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 32.295802] page dumped because: kasan: bad access detected [ 32.296948] [ 32.297440] Memory state around the buggy address: [ 32.298229] fff00000c65d1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.299785] fff00000c65d1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.300559] >fff00000c65d2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.301519] ^ [ 32.302102] fff00000c65d2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.303124] fff00000c65d2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.304249] ================================================================== [ 32.215794] ================================================================== [ 32.217323] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.218213] Read of size 1 at addr fff00000c64e2073 by task kunit_try_catch/210 [ 32.219140] [ 32.219807] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.220732] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.221662] Hardware name: linux,dummy-virt (DT) [ 32.222940] Call trace: [ 32.223476] show_stack+0x20/0x38 (C) [ 32.224230] dump_stack_lvl+0x8c/0xd0 [ 32.224996] print_report+0x118/0x5e0 [ 32.225726] kasan_report+0xc8/0x118 [ 32.226445] __asan_report_load1_noabort+0x20/0x30 [ 32.227174] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.228040] mempool_kmalloc_oob_right+0xbc/0x118 [ 32.228691] kunit_try_run_case+0x14c/0x3d0 [ 32.229431] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.230206] kthread+0x24c/0x2d0 [ 32.230776] ret_from_fork+0x10/0x20 [ 32.231386] [ 32.231805] Allocated by task 210: [ 32.232514] kasan_save_stack+0x3c/0x68 [ 32.233107] kasan_save_track+0x20/0x40 [ 32.233642] kasan_save_alloc_info+0x40/0x58 [ 32.234341] __kasan_mempool_unpoison_object+0x11c/0x180 [ 32.234961] remove_element+0x130/0x1f8 [ 32.235630] mempool_alloc_preallocated+0x58/0xc0 [ 32.236594] mempool_oob_right_helper+0x98/0x2f0 [ 32.237174] mempool_kmalloc_oob_right+0xbc/0x118 [ 32.238078] kunit_try_run_case+0x14c/0x3d0 [ 32.238830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.240264] kthread+0x24c/0x2d0 [ 32.240834] ret_from_fork+0x10/0x20 [ 32.241533] [ 32.242029] The buggy address belongs to the object at fff00000c64e2000 [ 32.242029] which belongs to the cache kmalloc-128 of size 128 [ 32.243083] The buggy address is located 0 bytes to the right of [ 32.243083] allocated 115-byte region [fff00000c64e2000, fff00000c64e2073) [ 32.244993] [ 32.245336] The buggy address belongs to the physical page: [ 32.246112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064e2 [ 32.247101] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.248244] page_type: f5(slab) [ 32.248842] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.249929] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.250870] page dumped because: kasan: bad access detected [ 32.251798] [ 32.252292] Memory state around the buggy address: [ 32.253095] fff00000c64e1f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.254098] fff00000c64e1f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.255136] >fff00000c64e2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.256199] ^ [ 32.257346] fff00000c64e2080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.258075] fff00000c64e2100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.258501] ================================================================== [ 32.316764] ================================================================== [ 32.318053] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.318838] Read of size 1 at addr fff00000c63cf2bb by task kunit_try_catch/214 [ 32.319616] [ 32.320037] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.322093] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.322788] Hardware name: linux,dummy-virt (DT) [ 32.323684] Call trace: [ 32.324095] show_stack+0x20/0x38 (C) [ 32.324671] dump_stack_lvl+0x8c/0xd0 [ 32.325246] print_report+0x118/0x5e0 [ 32.326532] kasan_report+0xc8/0x118 [ 32.327123] __asan_report_load1_noabort+0x20/0x30 [ 32.327944] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.328720] mempool_slab_oob_right+0xb8/0x110 [ 32.329542] kunit_try_run_case+0x14c/0x3d0 [ 32.330219] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.331028] kthread+0x24c/0x2d0 [ 32.331615] ret_from_fork+0x10/0x20 [ 32.332828] [ 32.333266] Allocated by task 214: [ 32.333734] kasan_save_stack+0x3c/0x68 [ 32.334477] kasan_save_track+0x20/0x40 [ 32.335146] kasan_save_alloc_info+0x40/0x58 [ 32.335707] __kasan_mempool_unpoison_object+0xbc/0x180 [ 32.336347] remove_element+0x16c/0x1f8 [ 32.337173] mempool_alloc_preallocated+0x58/0xc0 [ 32.337817] mempool_oob_right_helper+0x98/0x2f0 [ 32.338482] mempool_slab_oob_right+0xb8/0x110 [ 32.339200] kunit_try_run_case+0x14c/0x3d0 [ 32.340406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.341102] kthread+0x24c/0x2d0 [ 32.341533] ret_from_fork+0x10/0x20 [ 32.342298] [ 32.342695] The buggy address belongs to the object at fff00000c63cf240 [ 32.342695] which belongs to the cache test_cache of size 123 [ 32.344716] The buggy address is located 0 bytes to the right of [ 32.344716] allocated 123-byte region [fff00000c63cf240, fff00000c63cf2bb) [ 32.346194] [ 32.346547] The buggy address belongs to the physical page: [ 32.347927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063cf [ 32.348921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.349711] page_type: f5(slab) [ 32.350162] raw: 0bfffe0000000000 fff00000c63a8280 dead000000000122 0000000000000000 [ 32.351096] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 32.352110] page dumped because: kasan: bad access detected [ 32.352780] [ 32.353196] Memory state around the buggy address: [ 32.353770] fff00000c63cf180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.354618] fff00000c63cf200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 32.356186] >fff00000c63cf280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 32.357731] ^ [ 32.358427] fff00000c63cf300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.359336] fff00000c63cf380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.360432] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 31.592028] ================================================================== [ 31.593523] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x17c/0x2f8 [ 31.594564] Read of size 1 at addr fff00000c56a0dc0 by task kunit_try_catch/204 [ 31.595801] [ 31.596424] CPU: 0 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 31.597663] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.598295] Hardware name: linux,dummy-virt (DT) [ 31.598972] Call trace: [ 31.599924] show_stack+0x20/0x38 (C) [ 31.600696] dump_stack_lvl+0x8c/0xd0 [ 31.601662] print_report+0x118/0x5e0 [ 31.602387] kasan_report+0xc8/0x118 [ 31.603144] __kasan_check_byte+0x54/0x70 [ 31.604025] kmem_cache_destroy+0x34/0x218 [ 31.604826] kmem_cache_double_destroy+0x17c/0x2f8 [ 31.605656] kunit_try_run_case+0x14c/0x3d0 [ 31.606261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.607077] kthread+0x24c/0x2d0 [ 31.607746] ret_from_fork+0x10/0x20 [ 31.608357] [ 31.608740] Allocated by task 204: [ 31.609842] kasan_save_stack+0x3c/0x68 [ 31.610452] kasan_save_track+0x20/0x40 [ 31.611024] kasan_save_alloc_info+0x40/0x58 [ 31.611538] __kasan_slab_alloc+0xa8/0xb0 [ 31.612642] kmem_cache_alloc_noprof+0x108/0x398 [ 31.613259] __kmem_cache_create_args+0x18c/0x2b0 [ 31.614037] kmem_cache_double_destroy+0xc8/0x2f8 [ 31.614701] kunit_try_run_case+0x14c/0x3d0 [ 31.615394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.616187] kthread+0x24c/0x2d0 [ 31.616691] ret_from_fork+0x10/0x20 [ 31.617218] [ 31.617548] Freed by task 204: [ 31.618798] kasan_save_stack+0x3c/0x68 [ 31.619698] kasan_save_track+0x20/0x40 [ 31.620357] kasan_save_free_info+0x4c/0x78 [ 31.621043] __kasan_slab_free+0x6c/0x98 [ 31.621583] kmem_cache_free+0x118/0x470 [ 31.622200] slab_kmem_cache_release+0x38/0x50 [ 31.622868] kmem_cache_release+0x1c/0x30 [ 31.623794] kobject_put+0x17c/0x430 [ 31.624317] sysfs_slab_release+0x1c/0x30 [ 31.624897] kmem_cache_destroy+0x118/0x218 [ 31.625536] kmem_cache_double_destroy+0x130/0x2f8 [ 31.626564] kunit_try_run_case+0x14c/0x3d0 [ 31.627250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.627986] kthread+0x24c/0x2d0 [ 31.628523] ret_from_fork+0x10/0x20 [ 31.629150] [ 31.629526] The buggy address belongs to the object at fff00000c56a0dc0 [ 31.629526] which belongs to the cache kmem_cache of size 208 [ 31.630966] The buggy address is located 0 bytes inside of [ 31.630966] freed 208-byte region [fff00000c56a0dc0, fff00000c56a0e90) [ 31.632753] [ 31.633055] The buggy address belongs to the physical page: [ 31.633787] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056a0 [ 31.635581] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.636433] page_type: f5(slab) [ 31.636924] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 31.637818] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 31.639013] page dumped because: kasan: bad access detected [ 31.640426] [ 31.640752] Memory state around the buggy address: [ 31.641361] fff00000c56a0c80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.642197] fff00000c56a0d00: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 31.643544] >fff00000c56a0d80: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 31.644456] ^ [ 31.645157] fff00000c56a0e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.646056] fff00000c56a0e80: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.646985] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 31.472502] ================================================================== [ 31.473737] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x390/0x468 [ 31.474521] Read of size 1 at addr fff00000c638b000 by task kunit_try_catch/202 [ 31.475578] [ 31.476106] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 31.477554] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.478099] Hardware name: linux,dummy-virt (DT) [ 31.478820] Call trace: [ 31.479455] show_stack+0x20/0x38 (C) [ 31.480182] dump_stack_lvl+0x8c/0xd0 [ 31.480775] print_report+0x118/0x5e0 [ 31.481472] kasan_report+0xc8/0x118 [ 31.482135] __asan_report_load1_noabort+0x20/0x30 [ 31.482918] kmem_cache_rcu_uaf+0x390/0x468 [ 31.483715] kunit_try_run_case+0x14c/0x3d0 [ 31.484537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.485550] kthread+0x24c/0x2d0 [ 31.486187] ret_from_fork+0x10/0x20 [ 31.486928] [ 31.487449] Allocated by task 202: [ 31.488085] kasan_save_stack+0x3c/0x68 [ 31.488655] kasan_save_track+0x20/0x40 [ 31.489305] kasan_save_alloc_info+0x40/0x58 [ 31.489859] __kasan_slab_alloc+0xa8/0xb0 [ 31.490575] kmem_cache_alloc_noprof+0x108/0x398 [ 31.491452] kmem_cache_rcu_uaf+0x12c/0x468 [ 31.492023] kunit_try_run_case+0x14c/0x3d0 [ 31.492619] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.493600] kthread+0x24c/0x2d0 [ 31.494217] ret_from_fork+0x10/0x20 [ 31.494776] [ 31.495162] Freed by task 0: [ 31.495770] kasan_save_stack+0x3c/0x68 [ 31.496616] kasan_save_track+0x20/0x40 [ 31.497131] kasan_save_free_info+0x4c/0x78 [ 31.497713] __kasan_slab_free+0x6c/0x98 [ 31.498192] slab_free_after_rcu_debug+0xd4/0x2f8 [ 31.498950] rcu_core+0x9f4/0x1e20 [ 31.499745] rcu_core_si+0x18/0x30 [ 31.500631] handle_softirqs+0x374/0xb20 [ 31.501383] __do_softirq+0x1c/0x28 [ 31.502094] [ 31.502558] Last potentially related work creation: [ 31.503347] kasan_save_stack+0x3c/0x68 [ 31.503944] kasan_record_aux_stack+0xb4/0xc8 [ 31.504701] kmem_cache_free+0x28c/0x470 [ 31.505283] kmem_cache_rcu_uaf+0x16c/0x468 [ 31.506142] kunit_try_run_case+0x14c/0x3d0 [ 31.506830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.507668] kthread+0x24c/0x2d0 [ 31.508262] ret_from_fork+0x10/0x20 [ 31.508949] [ 31.509319] The buggy address belongs to the object at fff00000c638b000 [ 31.509319] which belongs to the cache test_cache of size 200 [ 31.510811] The buggy address is located 0 bytes inside of [ 31.510811] freed 200-byte region [fff00000c638b000, fff00000c638b0c8) [ 31.513180] [ 31.513658] The buggy address belongs to the physical page: [ 31.514592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638b [ 31.515802] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.516941] page_type: f5(slab) [ 31.517476] raw: 0bfffe0000000000 fff00000c56a0c80 dead000000000122 0000000000000000 [ 31.518496] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 31.519584] page dumped because: kasan: bad access detected [ 31.520495] [ 31.520994] Memory state around the buggy address: [ 31.521712] fff00000c638af00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.522760] fff00000c638af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.524050] >fff00000c638b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.525413] ^ [ 31.525666] fff00000c638b080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 31.526598] fff00000c638b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.527735] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 31.339085] ================================================================== [ 31.341487] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3b8 [ 31.342174] Free of addr fff00000c63bc001 by task kunit_try_catch/200 [ 31.343120] [ 31.344348] CPU: 0 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 31.345205] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.346388] Hardware name: linux,dummy-virt (DT) [ 31.347675] Call trace: [ 31.348418] show_stack+0x20/0x38 (C) [ 31.348733] dump_stack_lvl+0x8c/0xd0 [ 31.349129] print_report+0x118/0x5e0 [ 31.349672] kasan_report_invalid_free+0xb0/0xd8 [ 31.350533] check_slab_allocation+0xfc/0x108 [ 31.351212] __kasan_slab_pre_free+0x2c/0x48 [ 31.352102] kmem_cache_free+0xf0/0x470 [ 31.352971] kmem_cache_invalid_free+0x184/0x3b8 [ 31.353754] kunit_try_run_case+0x14c/0x3d0 [ 31.354491] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.355442] kthread+0x24c/0x2d0 [ 31.356412] ret_from_fork+0x10/0x20 [ 31.356945] [ 31.357338] Allocated by task 200: [ 31.357817] kasan_save_stack+0x3c/0x68 [ 31.358390] kasan_save_track+0x20/0x40 [ 31.359053] kasan_save_alloc_info+0x40/0x58 [ 31.359974] __kasan_slab_alloc+0xa8/0xb0 [ 31.360562] kmem_cache_alloc_noprof+0x108/0x398 [ 31.361246] kmem_cache_invalid_free+0x12c/0x3b8 [ 31.361858] kunit_try_run_case+0x14c/0x3d0 [ 31.362445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.363219] kthread+0x24c/0x2d0 [ 31.363726] ret_from_fork+0x10/0x20 [ 31.364272] [ 31.364562] The buggy address belongs to the object at fff00000c63bc000 [ 31.364562] which belongs to the cache test_cache of size 200 [ 31.366551] The buggy address is located 1 bytes inside of [ 31.366551] 200-byte region [fff00000c63bc000, fff00000c63bc0c8) [ 31.368128] [ 31.368624] The buggy address belongs to the physical page: [ 31.369528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc [ 31.370438] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.371489] page_type: f5(slab) [ 31.372379] raw: 0bfffe0000000000 fff00000c56a0b40 dead000000000122 0000000000000000 [ 31.373161] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 31.374072] page dumped because: kasan: bad access detected [ 31.374782] [ 31.375140] Memory state around the buggy address: [ 31.376077] fff00000c63bbf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.377018] fff00000c63bbf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.378014] >fff00000c63bc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.378933] ^ [ 31.379367] fff00000c63bc080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 31.380840] fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.381698] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 31.270965] ================================================================== [ 31.271697] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 31.273346] Free of addr fff00000c6530000 by task kunit_try_catch/198 [ 31.274121] [ 31.274483] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 31.275610] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.276406] Hardware name: linux,dummy-virt (DT) [ 31.277330] Call trace: [ 31.277917] show_stack+0x20/0x38 (C) [ 31.278668] dump_stack_lvl+0x8c/0xd0 [ 31.279579] print_report+0x118/0x5e0 [ 31.280183] kasan_report_invalid_free+0xb0/0xd8 [ 31.280809] check_slab_allocation+0xd4/0x108 [ 31.281360] __kasan_slab_pre_free+0x2c/0x48 [ 31.282076] kmem_cache_free+0xf0/0x470 [ 31.282670] kmem_cache_double_free+0x190/0x3c8 [ 31.283735] kunit_try_run_case+0x14c/0x3d0 [ 31.284384] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.285209] kthread+0x24c/0x2d0 [ 31.285757] ret_from_fork+0x10/0x20 [ 31.286252] [ 31.286632] Allocated by task 198: [ 31.287968] kasan_save_stack+0x3c/0x68 [ 31.288520] kasan_save_track+0x20/0x40 [ 31.289113] kasan_save_alloc_info+0x40/0x58 [ 31.289778] __kasan_slab_alloc+0xa8/0xb0 [ 31.290392] kmem_cache_alloc_noprof+0x108/0x398 [ 31.291044] kmem_cache_double_free+0x12c/0x3c8 [ 31.291632] kunit_try_run_case+0x14c/0x3d0 [ 31.292538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.293253] kthread+0x24c/0x2d0 [ 31.293769] ret_from_fork+0x10/0x20 [ 31.294465] [ 31.294831] Freed by task 198: [ 31.295651] kasan_save_stack+0x3c/0x68 [ 31.296158] kasan_save_track+0x20/0x40 [ 31.296809] kasan_save_free_info+0x4c/0x78 [ 31.297381] __kasan_slab_free+0x6c/0x98 [ 31.298001] kmem_cache_free+0x118/0x470 [ 31.298591] kmem_cache_double_free+0x140/0x3c8 [ 31.299134] kunit_try_run_case+0x14c/0x3d0 [ 31.300089] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.300752] kthread+0x24c/0x2d0 [ 31.301380] ret_from_fork+0x10/0x20 [ 31.302011] [ 31.302392] The buggy address belongs to the object at fff00000c6530000 [ 31.302392] which belongs to the cache test_cache of size 200 [ 31.304384] The buggy address is located 0 bytes inside of [ 31.304384] 200-byte region [fff00000c6530000, fff00000c65300c8) [ 31.305849] [ 31.306325] The buggy address belongs to the physical page: [ 31.307328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106530 [ 31.308560] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.309553] page_type: f5(slab) [ 31.310034] raw: 0bfffe0000000000 fff00000c1608a00 dead000000000122 0000000000000000 [ 31.311194] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 31.312434] page dumped because: kasan: bad access detected [ 31.313301] [ 31.313644] Memory state around the buggy address: [ 31.314348] fff00000c652ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.315420] fff00000c652ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.316574] >fff00000c6530000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.317384] ^ [ 31.317793] fff00000c6530080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 31.318834] fff00000c6530100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.320090] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 31.190945] ================================================================== [ 31.192547] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x33c/0x428 [ 31.193810] Read of size 1 at addr fff00000c65650c8 by task kunit_try_catch/196 [ 31.194981] [ 31.195385] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 31.196677] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.197343] Hardware name: linux,dummy-virt (DT) [ 31.198004] Call trace: [ 31.198395] show_stack+0x20/0x38 (C) [ 31.198965] dump_stack_lvl+0x8c/0xd0 [ 31.199504] print_report+0x118/0x5e0 [ 31.200371] kasan_report+0xc8/0x118 [ 31.200912] __asan_report_load1_noabort+0x20/0x30 [ 31.201656] kmem_cache_oob+0x33c/0x428 [ 31.202327] kunit_try_run_case+0x14c/0x3d0 [ 31.202957] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.203941] kthread+0x24c/0x2d0 [ 31.204449] ret_from_fork+0x10/0x20 [ 31.205109] [ 31.205528] Allocated by task 196: [ 31.206056] kasan_save_stack+0x3c/0x68 [ 31.206805] kasan_save_track+0x20/0x40 [ 31.207730] kasan_save_alloc_info+0x40/0x58 [ 31.208211] __kasan_slab_alloc+0xa8/0xb0 [ 31.208749] kmem_cache_alloc_noprof+0x108/0x398 [ 31.209409] kmem_cache_oob+0x12c/0x428 [ 31.210424] kunit_try_run_case+0x14c/0x3d0 [ 31.211409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.212122] kthread+0x24c/0x2d0 [ 31.212690] ret_from_fork+0x10/0x20 [ 31.213355] [ 31.213712] The buggy address belongs to the object at fff00000c6565000 [ 31.213712] which belongs to the cache test_cache of size 200 [ 31.215160] The buggy address is located 0 bytes to the right of [ 31.215160] allocated 200-byte region [fff00000c6565000, fff00000c65650c8) [ 31.216765] [ 31.217193] The buggy address belongs to the physical page: [ 31.217949] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106565 [ 31.218862] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.219986] page_type: f5(slab) [ 31.220515] raw: 0bfffe0000000000 fff00000c16088c0 dead000000000122 0000000000000000 [ 31.221507] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 31.222527] page dumped because: kasan: bad access detected [ 31.223187] [ 31.223939] Memory state around the buggy address: [ 31.224572] fff00000c6564f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.225441] fff00000c6565000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.226547] >fff00000c6565080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 31.227445] ^ [ 31.228054] fff00000c6565100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.229151] fff00000c6565180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.230030] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 31.109007] ================================================================== [ 31.109932] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 31.111114] Read of size 8 at addr fff00000c655f1c0 by task kunit_try_catch/189 [ 31.111980] [ 31.112330] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 31.114319] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.115241] Hardware name: linux,dummy-virt (DT) [ 31.116294] Call trace: [ 31.116606] show_stack+0x20/0x38 (C) [ 31.117507] dump_stack_lvl+0x8c/0xd0 [ 31.118197] print_report+0x118/0x5e0 [ 31.118844] kasan_report+0xc8/0x118 [ 31.119562] __asan_report_load8_noabort+0x20/0x30 [ 31.120477] workqueue_uaf+0x480/0x4a8 [ 31.121209] kunit_try_run_case+0x14c/0x3d0 [ 31.122063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.122816] kthread+0x24c/0x2d0 [ 31.124102] ret_from_fork+0x10/0x20 [ 31.124641] [ 31.124981] Allocated by task 189: [ 31.125525] kasan_save_stack+0x3c/0x68 [ 31.126181] kasan_save_track+0x20/0x40 [ 31.126772] kasan_save_alloc_info+0x40/0x58 [ 31.127592] __kasan_kmalloc+0xd4/0xd8 [ 31.128302] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.128847] workqueue_uaf+0x13c/0x4a8 [ 31.129359] kunit_try_run_case+0x14c/0x3d0 [ 31.130064] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.130671] kthread+0x24c/0x2d0 [ 31.131330] ret_from_fork+0x10/0x20 [ 31.132097] [ 31.132475] Freed by task 31: [ 31.132995] kasan_save_stack+0x3c/0x68 [ 31.133694] kasan_save_track+0x20/0x40 [ 31.134342] kasan_save_free_info+0x4c/0x78 [ 31.134938] __kasan_slab_free+0x6c/0x98 [ 31.135892] kfree+0x114/0x3c8 [ 31.136335] workqueue_uaf_work+0x18/0x30 [ 31.137028] process_one_work+0x530/0xf98 [ 31.137621] worker_thread+0x614/0xf28 [ 31.138383] kthread+0x24c/0x2d0 [ 31.138855] ret_from_fork+0x10/0x20 [ 31.139862] [ 31.140232] Last potentially related work creation: [ 31.140823] kasan_save_stack+0x3c/0x68 [ 31.141450] kasan_record_aux_stack+0xb4/0xc8 [ 31.142111] __queue_work+0x65c/0xfd8 [ 31.142636] queue_work_on+0xbc/0xf8 [ 31.143490] workqueue_uaf+0x210/0x4a8 [ 31.144036] kunit_try_run_case+0x14c/0x3d0 [ 31.144637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.145419] kthread+0x24c/0x2d0 [ 31.146031] ret_from_fork+0x10/0x20 [ 31.146603] [ 31.146933] The buggy address belongs to the object at fff00000c655f1c0 [ 31.146933] which belongs to the cache kmalloc-32 of size 32 [ 31.149128] The buggy address is located 0 bytes inside of [ 31.149128] freed 32-byte region [fff00000c655f1c0, fff00000c655f1e0) [ 31.150613] [ 31.150925] The buggy address belongs to the physical page: [ 31.151893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10655f [ 31.152822] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.153735] page_type: f5(slab) [ 31.154216] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 31.155131] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 31.156255] page dumped because: kasan: bad access detected [ 31.157112] [ 31.157485] Memory state around the buggy address: [ 31.158226] fff00000c655f080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 31.159457] fff00000c655f100: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 31.160370] >fff00000c655f180: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc [ 31.161280] ^ [ 31.162003] fff00000c655f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.162828] fff00000c655f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.163947] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 31.027778] ================================================================== [ 31.028927] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 31.029504] Read of size 4 at addr fff00000c63c1600 by task swapper/0/0 [ 31.030921] [ 31.031258] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 31.032793] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.033566] Hardware name: linux,dummy-virt (DT) [ 31.034145] Call trace: [ 31.034696] show_stack+0x20/0x38 (C) [ 31.035236] dump_stack_lvl+0x8c/0xd0 [ 31.035901] print_report+0x118/0x5e0 [ 31.036434] kasan_report+0xc8/0x118 [ 31.037263] __asan_report_load4_noabort+0x20/0x30 [ 31.037895] rcu_uaf_reclaim+0x64/0x70 [ 31.038546] rcu_core+0x9f4/0x1e20 [ 31.039253] rcu_core_si+0x18/0x30 [ 31.039793] handle_softirqs+0x374/0xb20 [ 31.040430] __do_softirq+0x1c/0x28 [ 31.040998] ____do_softirq+0x18/0x30 [ 31.041598] call_on_irq_stack+0x24/0x58 [ 31.042332] do_softirq_own_stack+0x24/0x38 [ 31.042955] __irq_exit_rcu+0x1fc/0x318 [ 31.043765] irq_exit_rcu+0x1c/0x80 [ 31.044721] el1_interrupt+0x38/0x58 [ 31.045339] el1h_64_irq_handler+0x18/0x28 [ 31.045975] el1h_64_irq+0x6c/0x70 [ 31.046690] arch_local_irq_enable+0x4/0x8 (P) [ 31.047827] default_idle_call+0x6c/0x78 (L) [ 31.048586] do_idle+0x384/0x4e8 [ 31.049067] cpu_startup_entry+0x64/0x80 [ 31.049746] rest_init+0x160/0x188 [ 31.050400] start_kernel+0x308/0x3d0 [ 31.050952] __primary_switched+0x8c/0xa0 [ 31.051923] [ 31.052268] Allocated by task 187: [ 31.053333] kasan_save_stack+0x3c/0x68 [ 31.053952] kasan_save_track+0x20/0x40 [ 31.054717] kasan_save_alloc_info+0x40/0x58 [ 31.055813] __kasan_kmalloc+0xd4/0xd8 [ 31.057072] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.058115] rcu_uaf+0xb0/0x2d0 [ 31.058894] kunit_try_run_case+0x14c/0x3d0 [ 31.060020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.060663] kthread+0x24c/0x2d0 [ 31.061146] ret_from_fork+0x10/0x20 [ 31.061672] [ 31.062026] Freed by task 0: [ 31.062540] kasan_save_stack+0x3c/0x68 [ 31.063060] kasan_save_track+0x20/0x40 [ 31.063718] kasan_save_free_info+0x4c/0x78 [ 31.064795] __kasan_slab_free+0x6c/0x98 [ 31.065553] kfree+0x114/0x3c8 [ 31.066012] rcu_uaf_reclaim+0x28/0x70 [ 31.066751] rcu_core+0x9f4/0x1e20 [ 31.067222] rcu_core_si+0x18/0x30 [ 31.067837] handle_softirqs+0x374/0xb20 [ 31.068453] __do_softirq+0x1c/0x28 [ 31.069349] [ 31.069709] Last potentially related work creation: [ 31.070343] kasan_save_stack+0x3c/0x68 [ 31.070956] kasan_record_aux_stack+0xb4/0xc8 [ 31.072080] __call_rcu_common.constprop.0+0x74/0xa10 [ 31.073102] call_rcu+0x18/0x30 [ 31.073547] rcu_uaf+0x14c/0x2d0 [ 31.074097] kunit_try_run_case+0x14c/0x3d0 [ 31.074699] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.075783] kthread+0x24c/0x2d0 [ 31.076290] ret_from_fork+0x10/0x20 [ 31.076848] [ 31.077181] The buggy address belongs to the object at fff00000c63c1600 [ 31.077181] which belongs to the cache kmalloc-32 of size 32 [ 31.078608] The buggy address is located 0 bytes inside of [ 31.078608] freed 32-byte region [fff00000c63c1600, fff00000c63c1620) [ 31.080399] [ 31.080742] The buggy address belongs to the physical page: [ 31.081573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063c1 [ 31.082570] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.083352] page_type: f5(slab) [ 31.084355] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 31.085340] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 31.086240] page dumped because: kasan: bad access detected [ 31.086867] [ 31.087245] Memory state around the buggy address: [ 31.087913] fff00000c63c1500: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 31.088660] fff00000c63c1580: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 31.090203] >fff00000c63c1600: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 31.091287] ^ [ 31.092250] fff00000c63c1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.093309] fff00000c63c1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.094352] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 30.958180] ================================================================== [ 30.959117] BUG: KASAN: slab-use-after-free in ksize_uaf+0x548/0x600 [ 30.960289] Read of size 1 at addr fff00000c653d178 by task kunit_try_catch/185 [ 30.961210] [ 30.961554] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 30.962836] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.963630] Hardware name: linux,dummy-virt (DT) [ 30.964382] Call trace: [ 30.964851] show_stack+0x20/0x38 (C) [ 30.965612] dump_stack_lvl+0x8c/0xd0 [ 30.966257] print_report+0x118/0x5e0 [ 30.966894] kasan_report+0xc8/0x118 [ 30.967532] __asan_report_load1_noabort+0x20/0x30 [ 30.968277] ksize_uaf+0x548/0x600 [ 30.968895] kunit_try_run_case+0x14c/0x3d0 [ 30.969570] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.970402] kthread+0x24c/0x2d0 [ 30.970936] ret_from_fork+0x10/0x20 [ 30.971392] [ 30.971816] Allocated by task 185: [ 30.972416] kasan_save_stack+0x3c/0x68 [ 30.973144] kasan_save_track+0x20/0x40 [ 30.973776] kasan_save_alloc_info+0x40/0x58 [ 30.974496] __kasan_kmalloc+0xd4/0xd8 [ 30.975143] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.975965] ksize_uaf+0xb8/0x600 [ 30.976528] kunit_try_run_case+0x14c/0x3d0 [ 30.977327] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.978080] kthread+0x24c/0x2d0 [ 30.978638] ret_from_fork+0x10/0x20 [ 30.979273] [ 30.979604] Freed by task 185: [ 30.980255] kasan_save_stack+0x3c/0x68 [ 30.980960] kasan_save_track+0x20/0x40 [ 30.981696] kasan_save_free_info+0x4c/0x78 [ 30.982392] __kasan_slab_free+0x6c/0x98 [ 30.983079] kfree+0x114/0x3c8 [ 30.983585] ksize_uaf+0x11c/0x600 [ 30.984254] kunit_try_run_case+0x14c/0x3d0 [ 30.984934] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.985726] kthread+0x24c/0x2d0 [ 30.986280] ret_from_fork+0x10/0x20 [ 30.986934] [ 30.987376] The buggy address belongs to the object at fff00000c653d100 [ 30.987376] which belongs to the cache kmalloc-128 of size 128 [ 30.988893] The buggy address is located 120 bytes inside of [ 30.988893] freed 128-byte region [fff00000c653d100, fff00000c653d180) [ 30.990346] [ 30.990811] The buggy address belongs to the physical page: [ 30.991533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653d [ 30.992586] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.993467] page_type: f5(slab) [ 30.994032] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.995076] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.996042] page dumped because: kasan: bad access detected [ 30.996789] [ 30.997151] Memory state around the buggy address: [ 30.997892] fff00000c653d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.998902] fff00000c653d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.999898] >fff00000c653d100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.000747] ^ [ 31.001669] fff00000c653d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.002720] fff00000c653d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.003665] ================================================================== [ 30.858031] ================================================================== [ 30.859346] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x600 [ 30.860174] Read of size 1 at addr fff00000c653d100 by task kunit_try_catch/185 [ 30.861182] [ 30.862422] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 30.863935] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.864489] Hardware name: linux,dummy-virt (DT) [ 30.865049] Call trace: [ 30.865782] show_stack+0x20/0x38 (C) [ 30.866500] dump_stack_lvl+0x8c/0xd0 [ 30.867098] print_report+0x118/0x5e0 [ 30.867656] kasan_report+0xc8/0x118 [ 30.868200] __kasan_check_byte+0x54/0x70 [ 30.869441] ksize+0x30/0x88 [ 30.869899] ksize_uaf+0x168/0x600 [ 30.870503] kunit_try_run_case+0x14c/0x3d0 [ 30.871478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.872526] kthread+0x24c/0x2d0 [ 30.872948] ret_from_fork+0x10/0x20 [ 30.873548] [ 30.874023] Allocated by task 185: [ 30.874604] kasan_save_stack+0x3c/0x68 [ 30.875120] kasan_save_track+0x20/0x40 [ 30.875843] kasan_save_alloc_info+0x40/0x58 [ 30.876856] __kasan_kmalloc+0xd4/0xd8 [ 30.877918] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.878630] ksize_uaf+0xb8/0x600 [ 30.879255] kunit_try_run_case+0x14c/0x3d0 [ 30.879924] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.880681] kthread+0x24c/0x2d0 [ 30.881369] ret_from_fork+0x10/0x20 [ 30.881987] [ 30.882463] Freed by task 185: [ 30.883123] kasan_save_stack+0x3c/0x68 [ 30.884168] kasan_save_track+0x20/0x40 [ 30.884668] kasan_save_free_info+0x4c/0x78 [ 30.885179] __kasan_slab_free+0x6c/0x98 [ 30.886109] kfree+0x114/0x3c8 [ 30.886714] ksize_uaf+0x11c/0x600 [ 30.887147] kunit_try_run_case+0x14c/0x3d0 [ 30.888085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.889401] kthread+0x24c/0x2d0 [ 30.889862] ret_from_fork+0x10/0x20 [ 30.890483] [ 30.890840] The buggy address belongs to the object at fff00000c653d100 [ 30.890840] which belongs to the cache kmalloc-128 of size 128 [ 30.893273] The buggy address is located 0 bytes inside of [ 30.893273] freed 128-byte region [fff00000c653d100, fff00000c653d180) [ 30.894919] [ 30.895286] The buggy address belongs to the physical page: [ 30.896310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653d [ 30.897391] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.898422] page_type: f5(slab) [ 30.899108] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.900650] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.901682] page dumped because: kasan: bad access detected [ 30.902425] [ 30.902707] Memory state around the buggy address: [ 30.903350] fff00000c653d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.904281] fff00000c653d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.905409] >fff00000c653d100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.906345] ^ [ 30.906865] fff00000c653d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.908834] fff00000c653d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.909640] ================================================================== [ 30.911310] ================================================================== [ 30.912411] BUG: KASAN: slab-use-after-free in ksize_uaf+0x59c/0x600 [ 30.914440] Read of size 1 at addr fff00000c653d100 by task kunit_try_catch/185 [ 30.915340] [ 30.915658] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 30.917053] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.917641] Hardware name: linux,dummy-virt (DT) [ 30.918838] Call trace: [ 30.919674] show_stack+0x20/0x38 (C) [ 30.920157] dump_stack_lvl+0x8c/0xd0 [ 30.920758] print_report+0x118/0x5e0 [ 30.921441] kasan_report+0xc8/0x118 [ 30.922036] __asan_report_load1_noabort+0x20/0x30 [ 30.922685] ksize_uaf+0x59c/0x600 [ 30.923303] kunit_try_run_case+0x14c/0x3d0 [ 30.924171] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.925336] kthread+0x24c/0x2d0 [ 30.926068] ret_from_fork+0x10/0x20 [ 30.926922] [ 30.927239] Allocated by task 185: [ 30.927699] kasan_save_stack+0x3c/0x68 [ 30.928336] kasan_save_track+0x20/0x40 [ 30.928941] kasan_save_alloc_info+0x40/0x58 [ 30.929558] __kasan_kmalloc+0xd4/0xd8 [ 30.930069] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.930745] ksize_uaf+0xb8/0x600 [ 30.931286] kunit_try_run_case+0x14c/0x3d0 [ 30.932054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.932660] kthread+0x24c/0x2d0 [ 30.933304] ret_from_fork+0x10/0x20 [ 30.933909] [ 30.934316] Freed by task 185: [ 30.934774] kasan_save_stack+0x3c/0x68 [ 30.935421] kasan_save_track+0x20/0x40 [ 30.935985] kasan_save_free_info+0x4c/0x78 [ 30.936570] __kasan_slab_free+0x6c/0x98 [ 30.937235] kfree+0x114/0x3c8 [ 30.937720] ksize_uaf+0x11c/0x600 [ 30.938319] kunit_try_run_case+0x14c/0x3d0 [ 30.938957] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.939611] kthread+0x24c/0x2d0 [ 30.940251] ret_from_fork+0x10/0x20 [ 30.940781] [ 30.941098] The buggy address belongs to the object at fff00000c653d100 [ 30.941098] which belongs to the cache kmalloc-128 of size 128 [ 30.942466] The buggy address is located 0 bytes inside of [ 30.942466] freed 128-byte region [fff00000c653d100, fff00000c653d180) [ 30.943909] [ 30.944199] The buggy address belongs to the physical page: [ 30.944839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653d [ 30.945850] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.946786] page_type: f5(slab) [ 30.947251] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.948119] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.949159] page dumped because: kasan: bad access detected [ 30.949805] [ 30.950142] Memory state around the buggy address: [ 30.950746] fff00000c653d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.951628] fff00000c653d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.952419] >fff00000c653d100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.953344] ^ [ 30.953904] fff00000c653d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.954672] fff00000c653d200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.955606] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 30.721333] ================================================================== [ 30.722667] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750 [ 30.723520] Read of size 1 at addr fff00000c653d073 by task kunit_try_catch/183 [ 30.724725] [ 30.725129] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 30.726447] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.727320] Hardware name: linux,dummy-virt (DT) [ 30.728407] Call trace: [ 30.728819] show_stack+0x20/0x38 (C) [ 30.729509] dump_stack_lvl+0x8c/0xd0 [ 30.730133] print_report+0x118/0x5e0 [ 30.730807] kasan_report+0xc8/0x118 [ 30.731741] __asan_report_load1_noabort+0x20/0x30 [ 30.732945] ksize_unpoisons_memory+0x638/0x750 [ 30.733803] kunit_try_run_case+0x14c/0x3d0 [ 30.734468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.735682] kthread+0x24c/0x2d0 [ 30.736419] ret_from_fork+0x10/0x20 [ 30.737082] [ 30.737405] Allocated by task 183: [ 30.738058] kasan_save_stack+0x3c/0x68 [ 30.738694] kasan_save_track+0x20/0x40 [ 30.739456] kasan_save_alloc_info+0x40/0x58 [ 30.740215] __kasan_kmalloc+0xd4/0xd8 [ 30.740789] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.741368] ksize_unpoisons_memory+0xc0/0x750 [ 30.741855] kunit_try_run_case+0x14c/0x3d0 [ 30.742585] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.743315] kthread+0x24c/0x2d0 [ 30.744079] ret_from_fork+0x10/0x20 [ 30.745042] [ 30.745320] The buggy address belongs to the object at fff00000c653d000 [ 30.745320] which belongs to the cache kmalloc-128 of size 128 [ 30.746584] The buggy address is located 0 bytes to the right of [ 30.746584] allocated 115-byte region [fff00000c653d000, fff00000c653d073) [ 30.748179] [ 30.748589] The buggy address belongs to the physical page: [ 30.749157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653d [ 30.750928] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.751867] page_type: f5(slab) [ 30.752384] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.753275] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.754427] page dumped because: kasan: bad access detected [ 30.755480] [ 30.756101] Memory state around the buggy address: [ 30.756591] fff00000c653cf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.757453] fff00000c653cf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.758475] >fff00000c653d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.759287] ^ [ 30.760329] fff00000c653d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.760744] fff00000c653d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.761683] ================================================================== [ 30.764250] ================================================================== [ 30.765177] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750 [ 30.765836] Read of size 1 at addr fff00000c653d078 by task kunit_try_catch/183 [ 30.767668] [ 30.767967] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 30.769233] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.769746] Hardware name: linux,dummy-virt (DT) [ 30.770349] Call trace: [ 30.770960] show_stack+0x20/0x38 (C) [ 30.771751] dump_stack_lvl+0x8c/0xd0 [ 30.772559] print_report+0x118/0x5e0 [ 30.773212] kasan_report+0xc8/0x118 [ 30.773804] __asan_report_load1_noabort+0x20/0x30 [ 30.774628] ksize_unpoisons_memory+0x628/0x750 [ 30.775748] kunit_try_run_case+0x14c/0x3d0 [ 30.776502] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.777217] kthread+0x24c/0x2d0 [ 30.777724] ret_from_fork+0x10/0x20 [ 30.778384] [ 30.778747] Allocated by task 183: [ 30.779314] kasan_save_stack+0x3c/0x68 [ 30.780466] kasan_save_track+0x20/0x40 [ 30.781296] kasan_save_alloc_info+0x40/0x58 [ 30.781934] __kasan_kmalloc+0xd4/0xd8 [ 30.782628] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.783193] ksize_unpoisons_memory+0xc0/0x750 [ 30.784182] kunit_try_run_case+0x14c/0x3d0 [ 30.784699] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.785473] kthread+0x24c/0x2d0 [ 30.786072] ret_from_fork+0x10/0x20 [ 30.786625] [ 30.786923] The buggy address belongs to the object at fff00000c653d000 [ 30.786923] which belongs to the cache kmalloc-128 of size 128 [ 30.788983] The buggy address is located 5 bytes to the right of [ 30.788983] allocated 115-byte region [fff00000c653d000, fff00000c653d073) [ 30.790468] [ 30.790772] The buggy address belongs to the physical page: [ 30.792289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653d [ 30.792774] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.793193] page_type: f5(slab) [ 30.793443] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.794104] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.795607] page dumped because: kasan: bad access detected [ 30.797033] [ 30.797701] Memory state around the buggy address: [ 30.798553] fff00000c653cf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.800190] fff00000c653cf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.800807] >fff00000c653d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.801890] ^ [ 30.802941] fff00000c653d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.804104] fff00000c653d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.805260] ================================================================== [ 30.806635] ================================================================== [ 30.807595] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750 [ 30.808710] Read of size 1 at addr fff00000c653d07f by task kunit_try_catch/183 [ 30.809623] [ 30.810138] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 30.812091] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.812800] Hardware name: linux,dummy-virt (DT) [ 30.813631] Call trace: [ 30.814060] show_stack+0x20/0x38 (C) [ 30.814769] dump_stack_lvl+0x8c/0xd0 [ 30.815758] print_report+0x118/0x5e0 [ 30.816620] kasan_report+0xc8/0x118 [ 30.817425] __asan_report_load1_noabort+0x20/0x30 [ 30.818022] ksize_unpoisons_memory+0x6a0/0x750 [ 30.818708] kunit_try_run_case+0x14c/0x3d0 [ 30.819598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.820356] kthread+0x24c/0x2d0 [ 30.820938] ret_from_fork+0x10/0x20 [ 30.821541] [ 30.821824] Allocated by task 183: [ 30.822562] kasan_save_stack+0x3c/0x68 [ 30.823085] kasan_save_track+0x20/0x40 [ 30.824376] kasan_save_alloc_info+0x40/0x58 [ 30.825017] __kasan_kmalloc+0xd4/0xd8 [ 30.825656] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.826169] ksize_unpoisons_memory+0xc0/0x750 [ 30.826845] kunit_try_run_case+0x14c/0x3d0 [ 30.827479] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.828574] kthread+0x24c/0x2d0 [ 30.829074] ret_from_fork+0x10/0x20 [ 30.829685] [ 30.830060] The buggy address belongs to the object at fff00000c653d000 [ 30.830060] which belongs to the cache kmalloc-128 of size 128 [ 30.832232] The buggy address is located 12 bytes to the right of [ 30.832232] allocated 115-byte region [fff00000c653d000, fff00000c653d073) [ 30.833647] [ 30.833973] The buggy address belongs to the physical page: [ 30.834825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653d [ 30.836145] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.837011] page_type: f5(slab) [ 30.837557] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.838725] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.839749] page dumped because: kasan: bad access detected [ 30.840850] [ 30.841224] Memory state around the buggy address: [ 30.841806] fff00000c653cf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.842701] fff00000c653cf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.843666] >fff00000c653d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.844588] ^ [ 30.845729] fff00000c653d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.846615] fff00000c653d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.847170] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[ 30.662329] ================================================================== [ 30.663212] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 30.664597] Free of addr fff00000c61b4340 by task kunit_try_catch/181 [ 30.665476] [ 30.665936] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 30.667104] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.667638] Hardware name: linux,dummy-virt (DT) [ 30.670550] Call trace: [ 30.670975] show_stack+0x20/0x38 (C) [ 30.671892] dump_stack_lvl+0x8c/0xd0 [ 30.672473] print_report+0x118/0x5e0 [ 30.673063] kasan_report_invalid_free+0xb0/0xd8 [ 30.673708] check_slab_allocation+0xd4/0x108 [ 30.674431] __kasan_slab_pre_free+0x2c/0x48 [ 30.675055] kfree+0xe8/0x3c8 [ 30.675780] kfree_sensitive+0x3c/0xb0 [ 30.676352] kmalloc_double_kzfree+0x168/0x308 [ 30.676973] kunit_try_run_case+0x14c/0x3d0 [ 30.677672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.678486] kthread+0x24c/0x2d0 [ 30.678961] ret_from_fork+0x10/0x20 [ 30.679836] [ 30.680361] Allocated by task 181: [ 30.680754] kasan_save_stack+0x3c/0x68 [ 30.681321] kasan_save_track+0x20/0x40 [ 30.681839] kasan_save_alloc_info+0x40/0x58 [ 30.682607] __kasan_kmalloc+0xd4/0xd8 [ 30.683119] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.684282] kmalloc_double_kzfree+0xb8/0x308 [ 30.684598] kunit_try_run_case+0x14c/0x3d0 [ 30.684927] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.685681] kthread+0x24c/0x2d0 [ 30.686437] ret_from_fork+0x10/0x20 [ 30.686982] [ 30.687644] Freed by task 181: [ 30.688281] kasan_save_stack+0x3c/0x68 [ 30.688992] kasan_save_track+0x20/0x40 [ 30.689724] kasan_save_free_info+0x4c/0x78 [ 30.690501] __kasan_slab_free+0x6c/0x98 [ 30.691512] kfree+0x114/0x3c8 [ 30.692002] kfree_sensitive+0x80/0xb0 [ 30.692703] kmalloc_double_kzfree+0x11c/0x308 [ 30.693436] kunit_try_run_case+0x14c/0x3d0 [ 30.693971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.694771] kthread+0x24c/0x2d0 [ 30.695605] ret_from_fork+0x10/0x20 [ 30.696196] [ 30.696533] The buggy address belongs to the object at fff00000c61b4340 [ 30.696533] which belongs to the cache kmalloc-16 of size 16 [ 30.697951] The buggy address is located 0 bytes inside of [ 30.697951] 16-byte region [fff00000c61b4340, fff00000c61b4350) [ 30.699515] [ 30.699920] The buggy address belongs to the physical page: [ 30.700633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 30.701603] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.702387] page_type: f5(slab) [ 30.702841] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 30.704310] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.705198] page dumped because: kasan: bad access detected [ 30.705811] [ 30.706527] Memory state around the buggy address: [ 30.707140] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.708171] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.709026] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 30.709797] ^ [ 30.710449] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.711467] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.712275] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 30.611041] ================================================================== [ 30.613177] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 30.614214] Read of size 1 at addr fff00000c61b4340 by task kunit_try_catch/181 [ 30.615655] [ 30.616005] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 30.617590] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.618238] Hardware name: linux,dummy-virt (DT) [ 30.618940] Call trace: [ 30.619482] show_stack+0x20/0x38 (C) [ 30.620484] dump_stack_lvl+0x8c/0xd0 [ 30.621123] print_report+0x118/0x5e0 [ 30.621741] kasan_report+0xc8/0x118 [ 30.622344] __kasan_check_byte+0x54/0x70 [ 30.622962] kfree_sensitive+0x30/0xb0 [ 30.623555] kmalloc_double_kzfree+0x168/0x308 [ 30.624180] kunit_try_run_case+0x14c/0x3d0 [ 30.625117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.626022] kthread+0x24c/0x2d0 [ 30.626562] ret_from_fork+0x10/0x20 [ 30.627409] [ 30.627697] Allocated by task 181: [ 30.628225] kasan_save_stack+0x3c/0x68 [ 30.628839] kasan_save_track+0x20/0x40 [ 30.629420] kasan_save_alloc_info+0x40/0x58 [ 30.629941] __kasan_kmalloc+0xd4/0xd8 [ 30.630640] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.631649] kmalloc_double_kzfree+0xb8/0x308 [ 30.632227] kunit_try_run_case+0x14c/0x3d0 [ 30.632809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.633559] kthread+0x24c/0x2d0 [ 30.634190] ret_from_fork+0x10/0x20 [ 30.634727] [ 30.635088] Freed by task 181: [ 30.635633] kasan_save_stack+0x3c/0x68 [ 30.636443] kasan_save_track+0x20/0x40 [ 30.637030] kasan_save_free_info+0x4c/0x78 [ 30.637695] __kasan_slab_free+0x6c/0x98 [ 30.638271] kfree+0x114/0x3c8 [ 30.638724] kfree_sensitive+0x80/0xb0 [ 30.639704] kmalloc_double_kzfree+0x11c/0x308 [ 30.640312] kunit_try_run_case+0x14c/0x3d0 [ 30.640986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.641688] kthread+0x24c/0x2d0 [ 30.642267] ret_from_fork+0x10/0x20 [ 30.642817] [ 30.643146] The buggy address belongs to the object at fff00000c61b4340 [ 30.643146] which belongs to the cache kmalloc-16 of size 16 [ 30.644768] The buggy address is located 0 bytes inside of [ 30.644768] freed 16-byte region [fff00000c61b4340, fff00000c61b4350) [ 30.646125] [ 30.646440] The buggy address belongs to the physical page: [ 30.647591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 30.648687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.649608] page_type: f5(slab) [ 30.650068] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 30.651060] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.652245] page dumped because: kasan: bad access detected [ 30.652922] [ 30.653249] Memory state around the buggy address: [ 30.653830] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.654670] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.655628] >fff00000c61b4300: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 30.656723] ^ [ 30.657564] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.658404] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.659530] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob
[ 29.981906] ================================================================== [ 29.983128] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 29.983869] Write of size 16 at addr fff00000c61b42a0 by task kunit_try_catch/155 [ 29.984793] [ 29.985967] CPU: 0 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 29.987539] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.988190] Hardware name: linux,dummy-virt (DT) [ 29.988735] Call trace: [ 29.989246] show_stack+0x20/0x38 (C) [ 29.989818] dump_stack_lvl+0x8c/0xd0 [ 29.990611] print_report+0x118/0x5e0 [ 29.991074] kasan_report+0xc8/0x118 [ 29.992060] __asan_report_store16_noabort+0x20/0x30 [ 29.992710] kmalloc_oob_16+0x3a0/0x3f8 [ 29.993318] kunit_try_run_case+0x14c/0x3d0 [ 29.993919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.994658] kthread+0x24c/0x2d0 [ 29.995437] ret_from_fork+0x10/0x20 [ 29.996105] [ 29.996435] Allocated by task 155: [ 29.997018] kasan_save_stack+0x3c/0x68 [ 29.997578] kasan_save_track+0x20/0x40 [ 29.998170] kasan_save_alloc_info+0x40/0x58 [ 29.998760] __kasan_kmalloc+0xd4/0xd8 [ 29.999633] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.000210] kmalloc_oob_16+0xb4/0x3f8 [ 30.000844] kunit_try_run_case+0x14c/0x3d0 [ 30.001531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.002318] kthread+0x24c/0x2d0 [ 30.002896] ret_from_fork+0x10/0x20 [ 30.003851] [ 30.004130] The buggy address belongs to the object at fff00000c61b42a0 [ 30.004130] which belongs to the cache kmalloc-16 of size 16 [ 30.005392] The buggy address is located 0 bytes inside of [ 30.005392] allocated 13-byte region [fff00000c61b42a0, fff00000c61b42ad) [ 30.006784] [ 30.007162] The buggy address belongs to the physical page: [ 30.007780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 30.008836] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.009823] page_type: f5(slab) [ 30.010359] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 30.011522] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.012625] page dumped because: kasan: bad access detected [ 30.013420] [ 30.013946] Memory state around the buggy address: [ 30.014709] fff00000c61b4180: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 30.016046] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.017052] >fff00000c61b4280: 00 04 fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc [ 30.018163] ^ [ 30.018809] fff00000c61b4300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.019949] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.020852] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 30.489282] ================================================================== [ 30.490384] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 30.491215] Write of size 33 at addr fff00000c64e7d00 by task kunit_try_catch/175 [ 30.491921] [ 30.492217] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 30.494151] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.494697] Hardware name: linux,dummy-virt (DT) [ 30.495312] Call trace: [ 30.495723] show_stack+0x20/0x38 (C) [ 30.496496] dump_stack_lvl+0x8c/0xd0 [ 30.497039] print_report+0x118/0x5e0 [ 30.497640] kasan_report+0xc8/0x118 [ 30.498612] kasan_check_range+0x100/0x1a8 [ 30.499388] __asan_memset+0x34/0x78 [ 30.499861] kmalloc_uaf_memset+0x170/0x310 [ 30.500771] kunit_try_run_case+0x14c/0x3d0 [ 30.501426] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.502245] kthread+0x24c/0x2d0 [ 30.502919] ret_from_fork+0x10/0x20 [ 30.503701] [ 30.504291] Allocated by task 175: [ 30.504796] kasan_save_stack+0x3c/0x68 [ 30.505435] kasan_save_track+0x20/0x40 [ 30.506019] kasan_save_alloc_info+0x40/0x58 [ 30.506638] __kasan_kmalloc+0xd4/0xd8 [ 30.507386] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.508040] kmalloc_uaf_memset+0xb8/0x310 [ 30.508636] kunit_try_run_case+0x14c/0x3d0 [ 30.509217] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.510108] kthread+0x24c/0x2d0 [ 30.510853] ret_from_fork+0x10/0x20 [ 30.511462] [ 30.511764] Freed by task 175: [ 30.512255] kasan_save_stack+0x3c/0x68 [ 30.512855] kasan_save_track+0x20/0x40 [ 30.513966] kasan_save_free_info+0x4c/0x78 [ 30.514588] __kasan_slab_free+0x6c/0x98 [ 30.515057] kfree+0x114/0x3c8 [ 30.515610] kmalloc_uaf_memset+0x11c/0x310 [ 30.516650] kunit_try_run_case+0x14c/0x3d0 [ 30.517470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.518235] kthread+0x24c/0x2d0 [ 30.518732] ret_from_fork+0x10/0x20 [ 30.519495] [ 30.519797] The buggy address belongs to the object at fff00000c64e7d00 [ 30.519797] which belongs to the cache kmalloc-64 of size 64 [ 30.521216] The buggy address is located 0 bytes inside of [ 30.521216] freed 64-byte region [fff00000c64e7d00, fff00000c64e7d40) [ 30.522821] [ 30.523141] The buggy address belongs to the physical page: [ 30.524624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064e7 [ 30.525583] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.526340] page_type: f5(slab) [ 30.526952] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.528231] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.529149] page dumped because: kasan: bad access detected [ 30.529795] [ 30.530111] Memory state around the buggy address: [ 30.530756] fff00000c64e7c00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.532394] fff00000c64e7c80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.533376] >fff00000c64e7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.534261] ^ [ 30.534720] fff00000c64e7d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.535811] fff00000c64e7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.536647] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 30.384990] ================================================================== [ 30.386189] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e8 [ 30.387030] Read of size 64 at addr fff00000c63c2104 by task kunit_try_catch/171 [ 30.388628] [ 30.389015] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 30.390327] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.390858] Hardware name: linux,dummy-virt (DT) [ 30.391647] Call trace: [ 30.392182] show_stack+0x20/0x38 (C) [ 30.392734] dump_stack_lvl+0x8c/0xd0 [ 30.393390] print_report+0x118/0x5e0 [ 30.393991] kasan_report+0xc8/0x118 [ 30.394572] kasan_check_range+0x100/0x1a8 [ 30.395264] __asan_memmove+0x3c/0x98 [ 30.395808] kmalloc_memmove_invalid_size+0x154/0x2e8 [ 30.396491] kunit_try_run_case+0x14c/0x3d0 [ 30.397135] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.398071] kthread+0x24c/0x2d0 [ 30.398552] ret_from_fork+0x10/0x20 [ 30.399181] [ 30.399829] Allocated by task 171: [ 30.400235] kasan_save_stack+0x3c/0x68 [ 30.400807] kasan_save_track+0x20/0x40 [ 30.401364] kasan_save_alloc_info+0x40/0x58 [ 30.401891] __kasan_kmalloc+0xd4/0xd8 [ 30.402502] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.403054] kmalloc_memmove_invalid_size+0xb0/0x2e8 [ 30.403930] kunit_try_run_case+0x14c/0x3d0 [ 30.405113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.405791] kthread+0x24c/0x2d0 [ 30.406306] ret_from_fork+0x10/0x20 [ 30.406789] [ 30.407147] The buggy address belongs to the object at fff00000c63c2100 [ 30.407147] which belongs to the cache kmalloc-64 of size 64 [ 30.408512] The buggy address is located 4 bytes inside of [ 30.408512] allocated 64-byte region [fff00000c63c2100, fff00000c63c2140) [ 30.410361] [ 30.410718] The buggy address belongs to the physical page: [ 30.411262] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063c2 [ 30.412490] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.413366] page_type: f5(slab) [ 30.413957] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.414909] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.416111] page dumped because: kasan: bad access detected [ 30.416802] [ 30.417149] Memory state around the buggy address: [ 30.417725] fff00000c63c2000: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 30.418663] fff00000c63c2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.419864] >fff00000c63c2100: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.420772] ^ [ 30.421476] fff00000c63c2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.422461] fff00000c63c2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.423425] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 30.334339] ================================================================== [ 30.335459] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 30.336544] Read of size 18446744073709551614 at addr fff00000c64e7504 by task kunit_try_catch/169 [ 30.337827] [ 30.338748] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 30.340163] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.340719] Hardware name: linux,dummy-virt (DT) [ 30.341425] Call trace: [ 30.341800] show_stack+0x20/0x38 (C) [ 30.342655] dump_stack_lvl+0x8c/0xd0 [ 30.343747] print_report+0x118/0x5e0 [ 30.344353] kasan_report+0xc8/0x118 [ 30.344919] kasan_check_range+0x100/0x1a8 [ 30.345547] __asan_memmove+0x3c/0x98 [ 30.346202] kmalloc_memmove_negative_size+0x154/0x2e0 [ 30.347013] kunit_try_run_case+0x14c/0x3d0 [ 30.348086] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.348752] kthread+0x24c/0x2d0 [ 30.349261] ret_from_fork+0x10/0x20 [ 30.349810] [ 30.350162] Allocated by task 169: [ 30.350674] kasan_save_stack+0x3c/0x68 [ 30.351238] kasan_save_track+0x20/0x40 [ 30.351940] kasan_save_alloc_info+0x40/0x58 [ 30.352571] __kasan_kmalloc+0xd4/0xd8 [ 30.353244] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.354155] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 30.354904] kunit_try_run_case+0x14c/0x3d0 [ 30.355908] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.356533] kthread+0x24c/0x2d0 [ 30.357240] ret_from_fork+0x10/0x20 [ 30.357693] [ 30.358080] The buggy address belongs to the object at fff00000c64e7500 [ 30.358080] which belongs to the cache kmalloc-64 of size 64 [ 30.359463] The buggy address is located 4 bytes inside of [ 30.359463] 64-byte region [fff00000c64e7500, fff00000c64e7540) [ 30.361084] [ 30.361382] The buggy address belongs to the physical page: [ 30.362199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064e7 [ 30.363186] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.364633] page_type: f5(slab) [ 30.365110] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.366040] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.367025] page dumped because: kasan: bad access detected [ 30.368076] [ 30.368418] Memory state around the buggy address: [ 30.369024] fff00000c64e7400: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.369990] fff00000c64e7480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.370889] >fff00000c64e7500: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.371829] ^ [ 30.372413] fff00000c64e7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.373440] fff00000c64e7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.374686] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset
[ 30.286211] ================================================================== [ 30.287411] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 30.288164] Write of size 16 at addr fff00000c63de269 by task kunit_try_catch/167 [ 30.290169] [ 30.290550] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 30.291712] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.292344] Hardware name: linux,dummy-virt (DT) [ 30.292933] Call trace: [ 30.293297] show_stack+0x20/0x38 (C) [ 30.293904] dump_stack_lvl+0x8c/0xd0 [ 30.294448] print_report+0x118/0x5e0 [ 30.295121] kasan_report+0xc8/0x118 [ 30.295648] kasan_check_range+0x100/0x1a8 [ 30.296300] __asan_memset+0x34/0x78 [ 30.296896] kmalloc_oob_memset_16+0x150/0x2f8 [ 30.297497] kunit_try_run_case+0x14c/0x3d0 [ 30.298148] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.298998] kthread+0x24c/0x2d0 [ 30.299516] ret_from_fork+0x10/0x20 [ 30.300097] [ 30.300490] Allocated by task 167: [ 30.301021] kasan_save_stack+0x3c/0x68 [ 30.301593] kasan_save_track+0x20/0x40 [ 30.302231] kasan_save_alloc_info+0x40/0x58 [ 30.302866] __kasan_kmalloc+0xd4/0xd8 [ 30.303402] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.304052] kmalloc_oob_memset_16+0xb0/0x2f8 [ 30.304642] kunit_try_run_case+0x14c/0x3d0 [ 30.305306] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.306017] kthread+0x24c/0x2d0 [ 30.306619] ret_from_fork+0x10/0x20 [ 30.307080] [ 30.307487] The buggy address belongs to the object at fff00000c63de200 [ 30.307487] which belongs to the cache kmalloc-128 of size 128 [ 30.308953] The buggy address is located 105 bytes inside of [ 30.308953] allocated 120-byte region [fff00000c63de200, fff00000c63de278) [ 30.310352] [ 30.310657] The buggy address belongs to the physical page: [ 30.311363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063de [ 30.312293] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.313168] page_type: f5(slab) [ 30.313710] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.314680] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.315638] page dumped because: kasan: bad access detected [ 30.316374] [ 30.316678] Memory state around the buggy address: [ 30.317363] fff00000c63de100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.318175] fff00000c63de180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.319048] >fff00000c63de200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.319830] ^ [ 30.320643] fff00000c63de280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.321525] fff00000c63de300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.322415] ================================================================== [ 30.138478] ================================================================== [ 30.139720] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 30.140921] Write of size 2 at addr fff00000c63c0e77 by task kunit_try_catch/161 [ 30.141793] [ 30.142181] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 30.143905] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.144417] Hardware name: linux,dummy-virt (DT) [ 30.145018] Call trace: [ 30.145410] show_stack+0x20/0x38 (C) [ 30.145999] dump_stack_lvl+0x8c/0xd0 [ 30.146732] print_report+0x118/0x5e0 [ 30.147446] kasan_report+0xc8/0x118 [ 30.148079] kasan_check_range+0x100/0x1a8 [ 30.148607] __asan_memset+0x34/0x78 [ 30.149290] kmalloc_oob_memset_2+0x150/0x2f8 [ 30.149934] kunit_try_run_case+0x14c/0x3d0 [ 30.150559] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.151360] kthread+0x24c/0x2d0 [ 30.152080] ret_from_fork+0x10/0x20 [ 30.152555] [ 30.152929] Allocated by task 161: [ 30.153613] kasan_save_stack+0x3c/0x68 [ 30.154153] kasan_save_track+0x20/0x40 [ 30.154818] kasan_save_alloc_info+0x40/0x58 [ 30.156246] __kasan_kmalloc+0xd4/0xd8 [ 30.156981] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.157506] kmalloc_oob_memset_2+0xb0/0x2f8 [ 30.158105] kunit_try_run_case+0x14c/0x3d0 [ 30.158623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.159443] kthread+0x24c/0x2d0 [ 30.159860] ret_from_fork+0x10/0x20 [ 30.160518] [ 30.160811] The buggy address belongs to the object at fff00000c63c0e00 [ 30.160811] which belongs to the cache kmalloc-128 of size 128 [ 30.162585] The buggy address is located 119 bytes inside of [ 30.162585] allocated 120-byte region [fff00000c63c0e00, fff00000c63c0e78) [ 30.164322] [ 30.164579] The buggy address belongs to the physical page: [ 30.165410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063c0 [ 30.166508] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.167378] page_type: f5(slab) [ 30.168410] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.169332] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.170213] page dumped because: kasan: bad access detected [ 30.170945] [ 30.171275] Memory state around the buggy address: [ 30.171837] fff00000c63c0d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 30.172858] fff00000c63c0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.173808] >fff00000c63c0e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.174638] ^ [ 30.175796] fff00000c63c0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.176708] fff00000c63c0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.177549] ================================================================== [ 30.240339] ================================================================== [ 30.241485] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 30.242273] Write of size 8 at addr fff00000c63de171 by task kunit_try_catch/165 [ 30.243103] [ 30.243520] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 30.244778] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.245502] Hardware name: linux,dummy-virt (DT) [ 30.246627] Call trace: [ 30.247058] show_stack+0x20/0x38 (C) [ 30.248105] dump_stack_lvl+0x8c/0xd0 [ 30.248901] print_report+0x118/0x5e0 [ 30.249601] kasan_report+0xc8/0x118 [ 30.250188] kasan_check_range+0x100/0x1a8 [ 30.250911] __asan_memset+0x34/0x78 [ 30.251603] kmalloc_oob_memset_8+0x150/0x2f8 [ 30.252282] kunit_try_run_case+0x14c/0x3d0 [ 30.252820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.253595] kthread+0x24c/0x2d0 [ 30.254164] ret_from_fork+0x10/0x20 [ 30.254739] [ 30.255116] Allocated by task 165: [ 30.255658] kasan_save_stack+0x3c/0x68 [ 30.256216] kasan_save_track+0x20/0x40 [ 30.256783] kasan_save_alloc_info+0x40/0x58 [ 30.257553] __kasan_kmalloc+0xd4/0xd8 [ 30.258195] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.259051] kmalloc_oob_memset_8+0xb0/0x2f8 [ 30.259618] kunit_try_run_case+0x14c/0x3d0 [ 30.260308] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.261058] kthread+0x24c/0x2d0 [ 30.261629] ret_from_fork+0x10/0x20 [ 30.262152] [ 30.262580] The buggy address belongs to the object at fff00000c63de100 [ 30.262580] which belongs to the cache kmalloc-128 of size 128 [ 30.264075] The buggy address is located 113 bytes inside of [ 30.264075] allocated 120-byte region [fff00000c63de100, fff00000c63de178) [ 30.265458] [ 30.265867] The buggy address belongs to the physical page: [ 30.266549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063de [ 30.267598] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.268418] page_type: f5(slab) [ 30.268854] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.269895] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.270792] page dumped because: kasan: bad access detected [ 30.271455] [ 30.271769] Memory state around the buggy address: [ 30.272456] fff00000c63de000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.273343] fff00000c63de080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.274170] >fff00000c63de100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.275079] ^ [ 30.275870] fff00000c63de180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.276773] fff00000c63de200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.277659] ================================================================== [ 30.189995] ================================================================== [ 30.191697] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 30.192901] Write of size 4 at addr fff00000c63de075 by task kunit_try_catch/163 [ 30.193823] [ 30.194420] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 30.195949] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.196473] Hardware name: linux,dummy-virt (DT) [ 30.197203] Call trace: [ 30.197596] show_stack+0x20/0x38 (C) [ 30.198165] dump_stack_lvl+0x8c/0xd0 [ 30.198865] print_report+0x118/0x5e0 [ 30.199495] kasan_report+0xc8/0x118 [ 30.200355] kasan_check_range+0x100/0x1a8 [ 30.201011] __asan_memset+0x34/0x78 [ 30.201675] kmalloc_oob_memset_4+0x150/0x300 [ 30.202332] kunit_try_run_case+0x14c/0x3d0 [ 30.203067] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.203799] kthread+0x24c/0x2d0 [ 30.204371] ret_from_fork+0x10/0x20 [ 30.205169] [ 30.205686] Allocated by task 163: [ 30.206221] kasan_save_stack+0x3c/0x68 [ 30.206964] kasan_save_track+0x20/0x40 [ 30.207626] kasan_save_alloc_info+0x40/0x58 [ 30.208209] __kasan_kmalloc+0xd4/0xd8 [ 30.208836] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.209943] kmalloc_oob_memset_4+0xb0/0x300 [ 30.210585] kunit_try_run_case+0x14c/0x3d0 [ 30.211205] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.211840] kthread+0x24c/0x2d0 [ 30.212619] ret_from_fork+0x10/0x20 [ 30.213066] [ 30.213420] The buggy address belongs to the object at fff00000c63de000 [ 30.213420] which belongs to the cache kmalloc-128 of size 128 [ 30.215056] The buggy address is located 117 bytes inside of [ 30.215056] allocated 120-byte region [fff00000c63de000, fff00000c63de078) [ 30.216751] [ 30.217168] The buggy address belongs to the physical page: [ 30.217817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063de [ 30.218928] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.219972] page_type: f5(slab) [ 30.220439] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.221422] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.222384] page dumped because: kasan: bad access detected [ 30.223161] [ 30.223764] Memory state around the buggy address: [ 30.224382] fff00000c63ddf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.225257] fff00000c63ddf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.226153] >fff00000c63de000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.227023] ^ [ 30.228595] fff00000c63de080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.229463] fff00000c63de100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.230420] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 30.088325] ================================================================== [ 30.089585] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 30.090558] Write of size 128 at addr fff00000c63ed000 by task kunit_try_catch/159 [ 30.091660] [ 30.092919] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 30.094094] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.094605] Hardware name: linux,dummy-virt (DT) [ 30.095577] Call trace: [ 30.095993] show_stack+0x20/0x38 (C) [ 30.096542] dump_stack_lvl+0x8c/0xd0 [ 30.097127] print_report+0x118/0x5e0 [ 30.097716] kasan_report+0xc8/0x118 [ 30.098347] kasan_check_range+0x100/0x1a8 [ 30.098959] __asan_memset+0x34/0x78 [ 30.099686] kmalloc_oob_in_memset+0x144/0x2d0 [ 30.100240] kunit_try_run_case+0x14c/0x3d0 [ 30.101045] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.101758] kthread+0x24c/0x2d0 [ 30.102855] ret_from_fork+0x10/0x20 [ 30.103399] [ 30.103770] Allocated by task 159: [ 30.104327] kasan_save_stack+0x3c/0x68 [ 30.105256] kasan_save_track+0x20/0x40 [ 30.105837] kasan_save_alloc_info+0x40/0x58 [ 30.106463] __kasan_kmalloc+0xd4/0xd8 [ 30.107093] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.107986] kmalloc_oob_in_memset+0xb0/0x2d0 [ 30.108689] kunit_try_run_case+0x14c/0x3d0 [ 30.109584] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.110480] kthread+0x24c/0x2d0 [ 30.111168] ret_from_fork+0x10/0x20 [ 30.111693] [ 30.112008] The buggy address belongs to the object at fff00000c63ed000 [ 30.112008] which belongs to the cache kmalloc-128 of size 128 [ 30.113762] The buggy address is located 0 bytes inside of [ 30.113762] allocated 120-byte region [fff00000c63ed000, fff00000c63ed078) [ 30.115447] [ 30.115814] The buggy address belongs to the physical page: [ 30.116502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ed [ 30.117948] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.118587] page_type: f5(slab) [ 30.119143] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.120110] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.121349] page dumped because: kasan: bad access detected [ 30.122046] [ 30.122345] Memory state around the buggy address: [ 30.123098] fff00000c63ecf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.124396] fff00000c63ecf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.125174] >fff00000c63ed000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.125926] ^ [ 30.126821] fff00000c63ed080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.127719] fff00000c63ed100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.128554] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 30.546067] ================================================================== [ 30.547570] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 30.548737] Read of size 1 at addr fff00000c64e7e28 by task kunit_try_catch/177 [ 30.549678] [ 30.550104] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 30.551829] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.552444] Hardware name: linux,dummy-virt (DT) [ 30.553097] Call trace: [ 30.553583] show_stack+0x20/0x38 (C) [ 30.554180] dump_stack_lvl+0x8c/0xd0 [ 30.554825] print_report+0x118/0x5e0 [ 30.555787] kasan_report+0xc8/0x118 [ 30.556452] __asan_report_load1_noabort+0x20/0x30 [ 30.557101] kmalloc_uaf2+0x3f4/0x468 [ 30.557700] kunit_try_run_case+0x14c/0x3d0 [ 30.558611] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.559893] kthread+0x24c/0x2d0 [ 30.560491] ret_from_fork+0x10/0x20 [ 30.561152] [ 30.561588] Allocated by task 177: [ 30.562076] kasan_save_stack+0x3c/0x68 [ 30.562780] kasan_save_track+0x20/0x40 [ 30.563832] kasan_save_alloc_info+0x40/0x58 [ 30.564455] __kasan_kmalloc+0xd4/0xd8 [ 30.565110] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.565851] kmalloc_uaf2+0xc4/0x468 [ 30.566542] kunit_try_run_case+0x14c/0x3d0 [ 30.567137] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.568214] kthread+0x24c/0x2d0 [ 30.568766] ret_from_fork+0x10/0x20 [ 30.569440] [ 30.569866] Freed by task 177: [ 30.570432] kasan_save_stack+0x3c/0x68 [ 30.570955] kasan_save_track+0x20/0x40 [ 30.571854] kasan_save_free_info+0x4c/0x78 [ 30.572640] __kasan_slab_free+0x6c/0x98 [ 30.573533] kfree+0x114/0x3c8 [ 30.574017] kmalloc_uaf2+0x134/0x468 [ 30.574708] kunit_try_run_case+0x14c/0x3d0 [ 30.575459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.576397] kthread+0x24c/0x2d0 [ 30.577066] ret_from_fork+0x10/0x20 [ 30.577570] [ 30.578009] The buggy address belongs to the object at fff00000c64e7e00 [ 30.578009] which belongs to the cache kmalloc-64 of size 64 [ 30.579616] The buggy address is located 40 bytes inside of [ 30.579616] freed 64-byte region [fff00000c64e7e00, fff00000c64e7e40) [ 30.581350] [ 30.581833] The buggy address belongs to the physical page: [ 30.582732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064e7 [ 30.584241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.585010] page_type: f5(slab) [ 30.585588] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.586520] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.587622] page dumped because: kasan: bad access detected [ 30.588662] [ 30.589242] Memory state around the buggy address: [ 30.589900] fff00000c64e7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.590623] fff00000c64e7d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.591618] >fff00000c64e7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.592571] ^ [ 30.593027] fff00000c64e7e80: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 30.594006] fff00000c64e7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.594951] ================================================================== [ 30.031569] ================================================================== [ 30.032797] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 30.033534] Read of size 16 at addr fff00000c61b4300 by task kunit_try_catch/157 [ 30.034742] [ 30.035159] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 30.036525] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.037473] Hardware name: linux,dummy-virt (DT) [ 30.038280] Call trace: [ 30.038655] show_stack+0x20/0x38 (C) [ 30.039504] dump_stack_lvl+0x8c/0xd0 [ 30.040190] print_report+0x118/0x5e0 [ 30.040891] kasan_report+0xc8/0x118 [ 30.041430] __asan_report_load16_noabort+0x20/0x30 [ 30.042039] kmalloc_uaf_16+0x3bc/0x438 [ 30.042696] kunit_try_run_case+0x14c/0x3d0 [ 30.043257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.044225] kthread+0x24c/0x2d0 [ 30.044766] ret_from_fork+0x10/0x20 [ 30.045374] [ 30.045711] Allocated by task 157: [ 30.046328] kasan_save_stack+0x3c/0x68 [ 30.047093] kasan_save_track+0x20/0x40 [ 30.047850] kasan_save_alloc_info+0x40/0x58 [ 30.048527] __kasan_kmalloc+0xd4/0xd8 [ 30.049107] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.049658] kmalloc_uaf_16+0x140/0x438 [ 30.050298] kunit_try_run_case+0x14c/0x3d0 [ 30.050919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.051949] kthread+0x24c/0x2d0 [ 30.052379] ret_from_fork+0x10/0x20 [ 30.053281] [ 30.053695] Freed by task 157: [ 30.054113] kasan_save_stack+0x3c/0x68 [ 30.054774] kasan_save_track+0x20/0x40 [ 30.055328] kasan_save_free_info+0x4c/0x78 [ 30.056026] __kasan_slab_free+0x6c/0x98 [ 30.056807] kfree+0x114/0x3c8 [ 30.057566] kmalloc_uaf_16+0x190/0x438 [ 30.058102] kunit_try_run_case+0x14c/0x3d0 [ 30.058663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.059776] kthread+0x24c/0x2d0 [ 30.060305] ret_from_fork+0x10/0x20 [ 30.060870] [ 30.061207] The buggy address belongs to the object at fff00000c61b4300 [ 30.061207] which belongs to the cache kmalloc-16 of size 16 [ 30.062534] The buggy address is located 0 bytes inside of [ 30.062534] freed 16-byte region [fff00000c61b4300, fff00000c61b4310) [ 30.064033] [ 30.064568] The buggy address belongs to the physical page: [ 30.065422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 30.066536] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.067941] page_type: f5(slab) [ 30.068615] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 30.069526] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.070599] page dumped because: kasan: bad access detected [ 30.071426] [ 30.072286] Memory state around the buggy address: [ 30.073305] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.074212] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc 00 00 fc fc [ 30.075136] >fff00000c61b4300: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.076060] ^ [ 30.076832] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.077917] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.078919] ================================================================== [ 30.433372] ================================================================== [ 30.434584] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 30.435348] Read of size 1 at addr fff00000c61b4328 by task kunit_try_catch/173 [ 30.436312] [ 30.436686] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 30.438440] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.439451] Hardware name: linux,dummy-virt (DT) [ 30.440177] Call trace: [ 30.440612] show_stack+0x20/0x38 (C) [ 30.441546] dump_stack_lvl+0x8c/0xd0 [ 30.442338] print_report+0x118/0x5e0 [ 30.443124] kasan_report+0xc8/0x118 [ 30.443704] __asan_report_load1_noabort+0x20/0x30 [ 30.444510] kmalloc_uaf+0x300/0x338 [ 30.445213] kunit_try_run_case+0x14c/0x3d0 [ 30.446102] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.446920] kthread+0x24c/0x2d0 [ 30.447785] ret_from_fork+0x10/0x20 [ 30.448303] [ 30.448696] Allocated by task 173: [ 30.449163] kasan_save_stack+0x3c/0x68 [ 30.449757] kasan_save_track+0x20/0x40 [ 30.450542] kasan_save_alloc_info+0x40/0x58 [ 30.451219] __kasan_kmalloc+0xd4/0xd8 [ 30.451913] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.452515] kmalloc_uaf+0xb8/0x338 [ 30.452782] kunit_try_run_case+0x14c/0x3d0 [ 30.453707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.454667] kthread+0x24c/0x2d0 [ 30.455161] ret_from_fork+0x10/0x20 [ 30.455738] [ 30.456751] Freed by task 173: [ 30.457275] kasan_save_stack+0x3c/0x68 [ 30.457801] kasan_save_track+0x20/0x40 [ 30.458421] kasan_save_free_info+0x4c/0x78 [ 30.459026] __kasan_slab_free+0x6c/0x98 [ 30.459543] kfree+0x114/0x3c8 [ 30.460110] kmalloc_uaf+0x11c/0x338 [ 30.460634] kunit_try_run_case+0x14c/0x3d0 [ 30.461364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.462078] kthread+0x24c/0x2d0 [ 30.462651] ret_from_fork+0x10/0x20 [ 30.463168] [ 30.463557] The buggy address belongs to the object at fff00000c61b4320 [ 30.463557] which belongs to the cache kmalloc-16 of size 16 [ 30.465045] The buggy address is located 8 bytes inside of [ 30.465045] freed 16-byte region [fff00000c61b4320, fff00000c61b4330) [ 30.466520] [ 30.466836] The buggy address belongs to the physical page: [ 30.467836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4 [ 30.468705] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.469634] page_type: f5(slab) [ 30.470130] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 30.471162] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.472228] page dumped because: kasan: bad access detected [ 30.472903] [ 30.473243] Memory state around the buggy address: [ 30.473797] fff00000c61b4200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.474717] fff00000c61b4280: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.475796] >fff00000c61b4300: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 30.476713] ^ [ 30.477388] fff00000c61b4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.478264] fff00000c61b4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.479224] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 29.858672] ================================================================== [ 29.860557] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 29.861689] Read of size 1 at addr fff00000c18fba00 by task kunit_try_catch/153 [ 29.862626] [ 29.863029] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 29.864987] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.865916] Hardware name: linux,dummy-virt (DT) [ 29.866719] Call trace: [ 29.867098] show_stack+0x20/0x38 (C) [ 29.867933] dump_stack_lvl+0x8c/0xd0 [ 29.868797] print_report+0x118/0x5e0 [ 29.869504] kasan_report+0xc8/0x118 [ 29.870189] __kasan_check_byte+0x54/0x70 [ 29.870919] krealloc_noprof+0x44/0x360 [ 29.871463] krealloc_uaf+0x180/0x520 [ 29.872447] kunit_try_run_case+0x14c/0x3d0 [ 29.873023] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.873829] kthread+0x24c/0x2d0 [ 29.874431] ret_from_fork+0x10/0x20 [ 29.874981] [ 29.875608] Allocated by task 153: [ 29.876209] kasan_save_stack+0x3c/0x68 [ 29.876867] kasan_save_track+0x20/0x40 [ 29.877543] kasan_save_alloc_info+0x40/0x58 [ 29.878087] __kasan_kmalloc+0xd4/0xd8 [ 29.878818] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.879750] krealloc_uaf+0xc8/0x520 [ 29.880542] kunit_try_run_case+0x14c/0x3d0 [ 29.881144] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.881817] kthread+0x24c/0x2d0 [ 29.882395] ret_from_fork+0x10/0x20 [ 29.882975] [ 29.883910] Freed by task 153: [ 29.884352] kasan_save_stack+0x3c/0x68 [ 29.884849] kasan_save_track+0x20/0x40 [ 29.885565] kasan_save_free_info+0x4c/0x78 [ 29.886305] __kasan_slab_free+0x6c/0x98 [ 29.887025] kfree+0x114/0x3c8 [ 29.887536] krealloc_uaf+0x12c/0x520 [ 29.888219] kunit_try_run_case+0x14c/0x3d0 [ 29.888697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.889786] kthread+0x24c/0x2d0 [ 29.890282] ret_from_fork+0x10/0x20 [ 29.890812] [ 29.891549] The buggy address belongs to the object at fff00000c18fba00 [ 29.891549] which belongs to the cache kmalloc-256 of size 256 [ 29.892956] The buggy address is located 0 bytes inside of [ 29.892956] freed 256-byte region [fff00000c18fba00, fff00000c18fbb00) [ 29.894565] [ 29.894943] The buggy address belongs to the physical page: [ 29.896014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1018fa [ 29.897039] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.897964] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.898828] page_type: f5(slab) [ 29.899628] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.900455] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.901455] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.902329] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.903389] head: 0bfffe0000000001 ffffc1ffc3063e81 ffffffffffffffff 0000000000000000 [ 29.904598] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 29.905512] page dumped because: kasan: bad access detected [ 29.906351] [ 29.906683] Memory state around the buggy address: [ 29.907683] fff00000c18fb900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.908610] fff00000c18fb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.909459] >fff00000c18fba00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.910297] ^ [ 29.910748] fff00000c18fba80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.911988] fff00000c18fbb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.912813] ================================================================== [ 29.914394] ================================================================== [ 29.915048] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 29.916805] Read of size 1 at addr fff00000c18fba00 by task kunit_try_catch/153 [ 29.917819] [ 29.918492] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 29.920175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.920736] Hardware name: linux,dummy-virt (DT) [ 29.921818] Call trace: [ 29.922188] show_stack+0x20/0x38 (C) [ 29.922898] dump_stack_lvl+0x8c/0xd0 [ 29.923970] print_report+0x118/0x5e0 [ 29.925107] kasan_report+0xc8/0x118 [ 29.925843] __asan_report_load1_noabort+0x20/0x30 [ 29.926648] krealloc_uaf+0x4c8/0x520 [ 29.927667] kunit_try_run_case+0x14c/0x3d0 [ 29.928591] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.929711] kthread+0x24c/0x2d0 [ 29.930232] ret_from_fork+0x10/0x20 [ 29.930739] [ 29.931161] Allocated by task 153: [ 29.932071] kasan_save_stack+0x3c/0x68 [ 29.932655] kasan_save_track+0x20/0x40 [ 29.933449] kasan_save_alloc_info+0x40/0x58 [ 29.934013] __kasan_kmalloc+0xd4/0xd8 [ 29.934618] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.935416] krealloc_uaf+0xc8/0x520 [ 29.935845] kunit_try_run_case+0x14c/0x3d0 [ 29.936528] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.937685] kthread+0x24c/0x2d0 [ 29.938181] ret_from_fork+0x10/0x20 [ 29.938806] [ 29.939156] Freed by task 153: [ 29.939965] kasan_save_stack+0x3c/0x68 [ 29.940473] kasan_save_track+0x20/0x40 [ 29.941135] kasan_save_free_info+0x4c/0x78 [ 29.941734] __kasan_slab_free+0x6c/0x98 [ 29.942323] kfree+0x114/0x3c8 [ 29.942843] krealloc_uaf+0x12c/0x520 [ 29.944206] kunit_try_run_case+0x14c/0x3d0 [ 29.945009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.945822] kthread+0x24c/0x2d0 [ 29.946562] ret_from_fork+0x10/0x20 [ 29.947317] [ 29.947853] The buggy address belongs to the object at fff00000c18fba00 [ 29.947853] which belongs to the cache kmalloc-256 of size 256 [ 29.949445] The buggy address is located 0 bytes inside of [ 29.949445] freed 256-byte region [fff00000c18fba00, fff00000c18fbb00) [ 29.951007] [ 29.951979] The buggy address belongs to the physical page: [ 29.953088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1018fa [ 29.954233] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.955355] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.956461] page_type: f5(slab) [ 29.956986] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.958124] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.959079] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.960416] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.961457] head: 0bfffe0000000001 ffffc1ffc3063e81 ffffffffffffffff 0000000000000000 [ 29.962451] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 29.963479] page dumped because: kasan: bad access detected [ 29.964478] [ 29.964950] Memory state around the buggy address: [ 29.965717] fff00000c18fb900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.966705] fff00000c18fb980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.967729] >fff00000c18fba00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.968521] ^ [ 29.969188] fff00000c18fba80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.970547] fff00000c18fbb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.971660] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 29.674160] ================================================================== [ 29.675331] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 29.677486] Write of size 1 at addr fff00000c644e0c9 by task kunit_try_catch/151 [ 29.678379] [ 29.678706] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 29.680433] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.681041] Hardware name: linux,dummy-virt (DT) [ 29.681625] Call trace: [ 29.682025] show_stack+0x20/0x38 (C) [ 29.682544] dump_stack_lvl+0x8c/0xd0 [ 29.683085] print_report+0x118/0x5e0 [ 29.683683] kasan_report+0xc8/0x118 [ 29.684424] __asan_report_store1_noabort+0x20/0x30 [ 29.685514] krealloc_less_oob_helper+0xa48/0xc50 [ 29.686062] krealloc_large_less_oob+0x20/0x38 [ 29.686761] kunit_try_run_case+0x14c/0x3d0 [ 29.687423] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.688203] kthread+0x24c/0x2d0 [ 29.688784] ret_from_fork+0x10/0x20 [ 29.689585] [ 29.689927] The buggy address belongs to the physical page: [ 29.690616] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10644c [ 29.692028] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.692899] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.693736] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.694806] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.695701] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.696956] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.697819] head: 0bfffe0000000002 ffffc1ffc3191301 ffffffffffffffff 0000000000000000 [ 29.698768] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 29.700001] page dumped because: kasan: bad access detected [ 29.700722] [ 29.701117] Memory state around the buggy address: [ 29.701954] fff00000c644df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.702766] fff00000c644e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.703689] >fff00000c644e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 29.704931] ^ [ 29.705646] fff00000c644e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.706545] fff00000c644e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.707555] ================================================================== [ 29.370784] ================================================================== [ 29.372699] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 29.373441] Write of size 1 at addr fff00000c09762c9 by task kunit_try_catch/147 [ 29.374260] [ 29.374669] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 29.375865] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.376437] Hardware name: linux,dummy-virt (DT) [ 29.377202] Call trace: [ 29.377720] show_stack+0x20/0x38 (C) [ 29.378325] dump_stack_lvl+0x8c/0xd0 [ 29.378857] print_report+0x118/0x5e0 [ 29.379523] kasan_report+0xc8/0x118 [ 29.380113] __asan_report_store1_noabort+0x20/0x30 [ 29.380870] krealloc_less_oob_helper+0xa48/0xc50 [ 29.381459] krealloc_less_oob+0x20/0x38 [ 29.382196] kunit_try_run_case+0x14c/0x3d0 [ 29.382794] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.383607] kthread+0x24c/0x2d0 [ 29.384134] ret_from_fork+0x10/0x20 [ 29.384719] [ 29.385048] Allocated by task 147: [ 29.385559] kasan_save_stack+0x3c/0x68 [ 29.386237] kasan_save_track+0x20/0x40 [ 29.386861] kasan_save_alloc_info+0x40/0x58 [ 29.387471] __kasan_krealloc+0x118/0x178 [ 29.388097] krealloc_noprof+0x128/0x360 [ 29.388641] krealloc_less_oob_helper+0x168/0xc50 [ 29.389305] krealloc_less_oob+0x20/0x38 [ 29.389902] kunit_try_run_case+0x14c/0x3d0 [ 29.390558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.391314] kthread+0x24c/0x2d0 [ 29.391845] ret_from_fork+0x10/0x20 [ 29.392422] [ 29.392732] The buggy address belongs to the object at fff00000c0976200 [ 29.392732] which belongs to the cache kmalloc-256 of size 256 [ 29.394121] The buggy address is located 0 bytes to the right of [ 29.394121] allocated 201-byte region [fff00000c0976200, fff00000c09762c9) [ 29.395561] [ 29.395856] The buggy address belongs to the physical page: [ 29.396479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100976 [ 29.397475] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.398522] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.399388] page_type: f5(slab) [ 29.400110] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.401242] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.402171] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.403096] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.404003] head: 0bfffe0000000001 ffffc1ffc3025d81 ffffffffffffffff 0000000000000000 [ 29.404902] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 29.405909] page dumped because: kasan: bad access detected [ 29.406663] [ 29.407053] Memory state around the buggy address: [ 29.407668] fff00000c0976180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.408525] fff00000c0976200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.409437] >fff00000c0976280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 29.410301] ^ [ 29.410982] fff00000c0976300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.411847] fff00000c0976380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.412736] ================================================================== [ 29.708911] ================================================================== [ 29.709604] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 29.711217] Write of size 1 at addr fff00000c644e0d0 by task kunit_try_catch/151 [ 29.711971] [ 29.713439] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 29.714592] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.715179] Hardware name: linux,dummy-virt (DT) [ 29.715755] Call trace: [ 29.716270] show_stack+0x20/0x38 (C) [ 29.716790] dump_stack_lvl+0x8c/0xd0 [ 29.717928] print_report+0x118/0x5e0 [ 29.718479] kasan_report+0xc8/0x118 [ 29.719132] __asan_report_store1_noabort+0x20/0x30 [ 29.720311] krealloc_less_oob_helper+0xb9c/0xc50 [ 29.721034] krealloc_large_less_oob+0x20/0x38 [ 29.721723] kunit_try_run_case+0x14c/0x3d0 [ 29.722318] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.723050] kthread+0x24c/0x2d0 [ 29.724149] ret_from_fork+0x10/0x20 [ 29.724809] [ 29.725151] The buggy address belongs to the physical page: [ 29.725791] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10644c [ 29.726704] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.727672] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.728812] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.730194] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.731595] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.732559] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.733371] head: 0bfffe0000000002 ffffc1ffc3191301 ffffffffffffffff 0000000000000000 [ 29.734349] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 29.735327] page dumped because: kasan: bad access detected [ 29.736432] [ 29.736718] Memory state around the buggy address: [ 29.737206] fff00000c644df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.737903] fff00000c644e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.738743] >fff00000c644e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 29.740305] ^ [ 29.741008] fff00000c644e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.741891] fff00000c644e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.742738] ================================================================== [ 29.814951] ================================================================== [ 29.816299] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 29.818143] Write of size 1 at addr fff00000c644e0eb by task kunit_try_catch/151 [ 29.819120] [ 29.819398] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 29.820802] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.821362] Hardware name: linux,dummy-virt (DT) [ 29.821957] Call trace: [ 29.822482] show_stack+0x20/0x38 (C) [ 29.823106] dump_stack_lvl+0x8c/0xd0 [ 29.823816] print_report+0x118/0x5e0 [ 29.824318] kasan_report+0xc8/0x118 [ 29.825437] __asan_report_store1_noabort+0x20/0x30 [ 29.826095] krealloc_less_oob_helper+0xa58/0xc50 [ 29.826751] krealloc_large_less_oob+0x20/0x38 [ 29.828015] kunit_try_run_case+0x14c/0x3d0 [ 29.828555] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.829350] kthread+0x24c/0x2d0 [ 29.829846] ret_from_fork+0x10/0x20 [ 29.830507] [ 29.830839] The buggy address belongs to the physical page: [ 29.832303] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10644c [ 29.833204] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.834139] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.834999] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.836256] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.837462] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.838382] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.840104] head: 0bfffe0000000002 ffffc1ffc3191301 ffffffffffffffff 0000000000000000 [ 29.841014] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 29.841836] page dumped because: kasan: bad access detected [ 29.842691] [ 29.843048] Memory state around the buggy address: [ 29.844408] fff00000c644df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.845303] fff00000c644e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.846186] >fff00000c644e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 29.847069] ^ [ 29.848396] fff00000c644e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.849295] fff00000c644e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.850168] ================================================================== [ 29.744669] ================================================================== [ 29.745743] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 29.747958] Write of size 1 at addr fff00000c644e0da by task kunit_try_catch/151 [ 29.748698] [ 29.749199] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 29.750426] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.750903] Hardware name: linux,dummy-virt (DT) [ 29.752601] Call trace: [ 29.753008] show_stack+0x20/0x38 (C) [ 29.753611] dump_stack_lvl+0x8c/0xd0 [ 29.754160] print_report+0x118/0x5e0 [ 29.754703] kasan_report+0xc8/0x118 [ 29.755346] __asan_report_store1_noabort+0x20/0x30 [ 29.756009] krealloc_less_oob_helper+0xa80/0xc50 [ 29.756730] krealloc_large_less_oob+0x20/0x38 [ 29.757803] kunit_try_run_case+0x14c/0x3d0 [ 29.758437] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.759409] kthread+0x24c/0x2d0 [ 29.760399] ret_from_fork+0x10/0x20 [ 29.760974] [ 29.761292] The buggy address belongs to the physical page: [ 29.761965] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10644c [ 29.762722] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.764069] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.765337] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.766177] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.767156] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.768197] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.769607] head: 0bfffe0000000002 ffffc1ffc3191301 ffffffffffffffff 0000000000000000 [ 29.770908] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 29.771762] page dumped because: kasan: bad access detected [ 29.772443] [ 29.772743] Memory state around the buggy address: [ 29.773803] fff00000c644df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.774636] fff00000c644e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.775931] >fff00000c644e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 29.776721] ^ [ 29.777573] fff00000c644e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.779068] fff00000c644e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.780261] ================================================================== [ 29.549001] ================================================================== [ 29.549769] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 29.551577] Write of size 1 at addr fff00000c09762eb by task kunit_try_catch/147 [ 29.553269] [ 29.553806] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 29.554978] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.555494] Hardware name: linux,dummy-virt (DT) [ 29.556079] Call trace: [ 29.556525] show_stack+0x20/0x38 (C) [ 29.557264] dump_stack_lvl+0x8c/0xd0 [ 29.558010] print_report+0x118/0x5e0 [ 29.558581] kasan_report+0xc8/0x118 [ 29.559151] __asan_report_store1_noabort+0x20/0x30 [ 29.559707] krealloc_less_oob_helper+0xa58/0xc50 [ 29.560459] krealloc_less_oob+0x20/0x38 [ 29.561082] kunit_try_run_case+0x14c/0x3d0 [ 29.561781] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.562518] kthread+0x24c/0x2d0 [ 29.563169] ret_from_fork+0x10/0x20 [ 29.563792] [ 29.564126] Allocated by task 147: [ 29.564622] kasan_save_stack+0x3c/0x68 [ 29.565179] kasan_save_track+0x20/0x40 [ 29.565740] kasan_save_alloc_info+0x40/0x58 [ 29.566281] __kasan_krealloc+0x118/0x178 [ 29.566962] krealloc_noprof+0x128/0x360 [ 29.567543] krealloc_less_oob_helper+0x168/0xc50 [ 29.568227] krealloc_less_oob+0x20/0x38 [ 29.568799] kunit_try_run_case+0x14c/0x3d0 [ 29.569376] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.570238] kthread+0x24c/0x2d0 [ 29.570724] ret_from_fork+0x10/0x20 [ 29.571374] [ 29.571699] The buggy address belongs to the object at fff00000c0976200 [ 29.571699] which belongs to the cache kmalloc-256 of size 256 [ 29.573176] The buggy address is located 34 bytes to the right of [ 29.573176] allocated 201-byte region [fff00000c0976200, fff00000c09762c9) [ 29.574468] [ 29.574945] The buggy address belongs to the physical page: [ 29.575500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100976 [ 29.576474] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.577380] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.578234] page_type: f5(slab) [ 29.578763] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.579749] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.580746] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.581785] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.582636] head: 0bfffe0000000001 ffffc1ffc3025d81 ffffffffffffffff 0000000000000000 [ 29.583548] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 29.584426] page dumped because: kasan: bad access detected [ 29.585129] [ 29.585442] Memory state around the buggy address: [ 29.586126] fff00000c0976180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.586992] fff00000c0976200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.587808] >fff00000c0976280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 29.588619] ^ [ 29.589477] fff00000c0976300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.590344] fff00000c0976380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.591187] ================================================================== [ 29.460976] ================================================================== [ 29.461681] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 29.462296] Write of size 1 at addr fff00000c09762da by task kunit_try_catch/147 [ 29.463105] [ 29.463491] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 29.464606] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.465310] Hardware name: linux,dummy-virt (DT) [ 29.466019] Call trace: [ 29.466401] show_stack+0x20/0x38 (C) [ 29.467035] dump_stack_lvl+0x8c/0xd0 [ 29.467637] print_report+0x118/0x5e0 [ 29.468404] kasan_report+0xc8/0x118 [ 29.469000] __asan_report_store1_noabort+0x20/0x30 [ 29.469757] krealloc_less_oob_helper+0xa80/0xc50 [ 29.470480] krealloc_less_oob+0x20/0x38 [ 29.471184] kunit_try_run_case+0x14c/0x3d0 [ 29.471730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.472464] kthread+0x24c/0x2d0 [ 29.473079] ret_from_fork+0x10/0x20 [ 29.473702] [ 29.474137] Allocated by task 147: [ 29.474685] kasan_save_stack+0x3c/0x68 [ 29.475322] kasan_save_track+0x20/0x40 [ 29.475813] kasan_save_alloc_info+0x40/0x58 [ 29.476448] __kasan_krealloc+0x118/0x178 [ 29.477141] krealloc_noprof+0x128/0x360 [ 29.477731] krealloc_less_oob_helper+0x168/0xc50 [ 29.478328] krealloc_less_oob+0x20/0x38 [ 29.478949] kunit_try_run_case+0x14c/0x3d0 [ 29.479568] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.480325] kthread+0x24c/0x2d0 [ 29.480817] ret_from_fork+0x10/0x20 [ 29.481441] [ 29.481890] The buggy address belongs to the object at fff00000c0976200 [ 29.481890] which belongs to the cache kmalloc-256 of size 256 [ 29.483339] The buggy address is located 17 bytes to the right of [ 29.483339] allocated 201-byte region [fff00000c0976200, fff00000c09762c9) [ 29.484730] [ 29.485048] The buggy address belongs to the physical page: [ 29.485811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100976 [ 29.486742] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.487722] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.488573] page_type: f5(slab) [ 29.489044] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.489942] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.490930] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.492040] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.492866] head: 0bfffe0000000001 ffffc1ffc3025d81 ffffffffffffffff 0000000000000000 [ 29.493751] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 29.494799] page dumped because: kasan: bad access detected [ 29.495473] [ 29.495816] Memory state around the buggy address: [ 29.496471] fff00000c0976180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.497524] fff00000c0976200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.498591] >fff00000c0976280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 29.499572] ^ [ 29.500507] fff00000c0976300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.501479] fff00000c0976380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.502271] ================================================================== [ 29.503907] ================================================================== [ 29.505562] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 29.506665] Write of size 1 at addr fff00000c09762ea by task kunit_try_catch/147 [ 29.507850] [ 29.508294] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 29.509566] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.510128] Hardware name: linux,dummy-virt (DT) [ 29.510682] Call trace: [ 29.511144] show_stack+0x20/0x38 (C) [ 29.511702] dump_stack_lvl+0x8c/0xd0 [ 29.512820] print_report+0x118/0x5e0 [ 29.513687] kasan_report+0xc8/0x118 [ 29.514419] __asan_report_store1_noabort+0x20/0x30 [ 29.515264] krealloc_less_oob_helper+0xae4/0xc50 [ 29.516095] krealloc_less_oob+0x20/0x38 [ 29.516662] kunit_try_run_case+0x14c/0x3d0 [ 29.517236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.518084] kthread+0x24c/0x2d0 [ 29.518652] ret_from_fork+0x10/0x20 [ 29.519369] [ 29.519609] Allocated by task 147: [ 29.520198] kasan_save_stack+0x3c/0x68 [ 29.520787] kasan_save_track+0x20/0x40 [ 29.521440] kasan_save_alloc_info+0x40/0x58 [ 29.522180] __kasan_krealloc+0x118/0x178 [ 29.522835] krealloc_noprof+0x128/0x360 [ 29.523447] krealloc_less_oob_helper+0x168/0xc50 [ 29.524121] krealloc_less_oob+0x20/0x38 [ 29.524724] kunit_try_run_case+0x14c/0x3d0 [ 29.525309] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.526075] kthread+0x24c/0x2d0 [ 29.526653] ret_from_fork+0x10/0x20 [ 29.527182] [ 29.527518] The buggy address belongs to the object at fff00000c0976200 [ 29.527518] which belongs to the cache kmalloc-256 of size 256 [ 29.529020] The buggy address is located 33 bytes to the right of [ 29.529020] allocated 201-byte region [fff00000c0976200, fff00000c09762c9) [ 29.530431] [ 29.530711] The buggy address belongs to the physical page: [ 29.531505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100976 [ 29.532405] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.533331] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.534153] page_type: f5(slab) [ 29.534684] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.535563] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.536583] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.537599] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.538535] head: 0bfffe0000000001 ffffc1ffc3025d81 ffffffffffffffff 0000000000000000 [ 29.539589] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 29.540541] page dumped because: kasan: bad access detected [ 29.541220] [ 29.541555] Memory state around the buggy address: [ 29.542144] fff00000c0976180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.543059] fff00000c0976200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.543892] >fff00000c0976280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 29.544734] ^ [ 29.545639] fff00000c0976300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.546602] fff00000c0976380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.547513] ================================================================== [ 29.414662] ================================================================== [ 29.416408] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 29.417304] Write of size 1 at addr fff00000c09762d0 by task kunit_try_catch/147 [ 29.418103] [ 29.419167] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 29.420541] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.421096] Hardware name: linux,dummy-virt (DT) [ 29.421648] Call trace: [ 29.422781] show_stack+0x20/0x38 (C) [ 29.423384] dump_stack_lvl+0x8c/0xd0 [ 29.423934] print_report+0x118/0x5e0 [ 29.424513] kasan_report+0xc8/0x118 [ 29.425394] __asan_report_store1_noabort+0x20/0x30 [ 29.426027] krealloc_less_oob_helper+0xb9c/0xc50 [ 29.426663] krealloc_less_oob+0x20/0x38 [ 29.427682] kunit_try_run_case+0x14c/0x3d0 [ 29.428335] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.429281] kthread+0x24c/0x2d0 [ 29.429997] ret_from_fork+0x10/0x20 [ 29.430650] [ 29.431021] Allocated by task 147: [ 29.431712] kasan_save_stack+0x3c/0x68 [ 29.432900] kasan_save_track+0x20/0x40 [ 29.433518] kasan_save_alloc_info+0x40/0x58 [ 29.434205] __kasan_krealloc+0x118/0x178 [ 29.434841] krealloc_noprof+0x128/0x360 [ 29.435413] krealloc_less_oob_helper+0x168/0xc50 [ 29.436043] krealloc_less_oob+0x20/0x38 [ 29.436631] kunit_try_run_case+0x14c/0x3d0 [ 29.437223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.437978] kthread+0x24c/0x2d0 [ 29.438450] ret_from_fork+0x10/0x20 [ 29.439084] [ 29.439491] The buggy address belongs to the object at fff00000c0976200 [ 29.439491] which belongs to the cache kmalloc-256 of size 256 [ 29.440930] The buggy address is located 7 bytes to the right of [ 29.440930] allocated 201-byte region [fff00000c0976200, fff00000c09762c9) [ 29.442280] [ 29.442652] The buggy address belongs to the physical page: [ 29.443355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100976 [ 29.444293] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.445198] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.446085] page_type: f5(slab) [ 29.446556] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.447428] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.448446] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.449410] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.450359] head: 0bfffe0000000001 ffffc1ffc3025d81 ffffffffffffffff 0000000000000000 [ 29.451302] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 29.452190] page dumped because: kasan: bad access detected [ 29.452843] [ 29.453197] Memory state around the buggy address: [ 29.453940] fff00000c0976180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.454898] fff00000c0976200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.455692] >fff00000c0976280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 29.456608] ^ [ 29.457307] fff00000c0976300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.458171] fff00000c0976380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.459132] ================================================================== [ 29.781608] ================================================================== [ 29.782433] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 29.784090] Write of size 1 at addr fff00000c644e0ea by task kunit_try_catch/151 [ 29.785052] [ 29.785422] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 29.786600] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.787130] Hardware name: linux,dummy-virt (DT) [ 29.788128] Call trace: [ 29.788449] show_stack+0x20/0x38 (C) [ 29.789161] dump_stack_lvl+0x8c/0xd0 [ 29.789702] print_report+0x118/0x5e0 [ 29.790312] kasan_report+0xc8/0x118 [ 29.790863] __asan_report_store1_noabort+0x20/0x30 [ 29.792334] krealloc_less_oob_helper+0xae4/0xc50 [ 29.793028] krealloc_large_less_oob+0x20/0x38 [ 29.793657] kunit_try_run_case+0x14c/0x3d0 [ 29.794336] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.795526] kthread+0x24c/0x2d0 [ 29.796163] ret_from_fork+0x10/0x20 [ 29.796740] [ 29.797117] The buggy address belongs to the physical page: [ 29.797862] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10644c [ 29.798766] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.800001] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.801040] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.801841] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.803057] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.804216] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.805412] head: 0bfffe0000000002 ffffc1ffc3191301 ffffffffffffffff 0000000000000000 [ 29.806321] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 29.807120] page dumped because: kasan: bad access detected [ 29.807891] [ 29.808190] Memory state around the buggy address: [ 29.809546] fff00000c644df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.810183] fff00000c644e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.810612] >fff00000c644e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 29.811035] ^ [ 29.811416] fff00000c644e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.811819] fff00000c644e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.813448] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 29.313080] ================================================================== [ 29.314262] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680 [ 29.315141] Write of size 1 at addr fff00000c09760f0 by task kunit_try_catch/145 [ 29.316547] [ 29.316978] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 29.318215] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.318831] Hardware name: linux,dummy-virt (DT) [ 29.320309] Call trace: [ 29.320717] show_stack+0x20/0x38 (C) [ 29.321479] dump_stack_lvl+0x8c/0xd0 [ 29.322012] print_report+0x118/0x5e0 [ 29.322608] kasan_report+0xc8/0x118 [ 29.323158] __asan_report_store1_noabort+0x20/0x30 [ 29.324120] krealloc_more_oob_helper+0x5c8/0x680 [ 29.325163] krealloc_more_oob+0x20/0x38 [ 29.325783] kunit_try_run_case+0x14c/0x3d0 [ 29.326535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.327338] kthread+0x24c/0x2d0 [ 29.327805] ret_from_fork+0x10/0x20 [ 29.328415] [ 29.328777] Allocated by task 145: [ 29.329718] kasan_save_stack+0x3c/0x68 [ 29.330311] kasan_save_track+0x20/0x40 [ 29.331055] kasan_save_alloc_info+0x40/0x58 [ 29.331976] __kasan_krealloc+0x118/0x178 [ 29.332543] krealloc_noprof+0x128/0x360 [ 29.333241] krealloc_more_oob_helper+0x168/0x680 [ 29.333896] krealloc_more_oob+0x20/0x38 [ 29.334455] kunit_try_run_case+0x14c/0x3d0 [ 29.335051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.336528] kthread+0x24c/0x2d0 [ 29.337084] ret_from_fork+0x10/0x20 [ 29.337666] [ 29.338070] The buggy address belongs to the object at fff00000c0976000 [ 29.338070] which belongs to the cache kmalloc-256 of size 256 [ 29.339271] The buggy address is located 5 bytes to the right of [ 29.339271] allocated 235-byte region [fff00000c0976000, fff00000c09760eb) [ 29.341278] [ 29.341626] The buggy address belongs to the physical page: [ 29.342492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100976 [ 29.344004] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.344776] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.345758] page_type: f5(slab) [ 29.346324] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.347227] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.348124] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.349056] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.350188] head: 0bfffe0000000001 ffffc1ffc3025d81 ffffffffffffffff 0000000000000000 [ 29.351223] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 29.352761] page dumped because: kasan: bad access detected [ 29.353479] [ 29.353765] Memory state around the buggy address: [ 29.354407] fff00000c0975f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.355119] fff00000c0976000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.356433] >fff00000c0976080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 29.357314] ^ [ 29.358147] fff00000c0976100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.359132] fff00000c0976180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.360909] ================================================================== [ 29.636408] ================================================================== [ 29.637191] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680 [ 29.637978] Write of size 1 at addr fff00000c64920f0 by task kunit_try_catch/149 [ 29.638852] [ 29.639208] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 29.640577] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.641264] Hardware name: linux,dummy-virt (DT) [ 29.641869] Call trace: [ 29.642302] show_stack+0x20/0x38 (C) [ 29.642774] dump_stack_lvl+0x8c/0xd0 [ 29.643465] print_report+0x118/0x5e0 [ 29.644026] kasan_report+0xc8/0x118 [ 29.644712] __asan_report_store1_noabort+0x20/0x30 [ 29.645408] krealloc_more_oob_helper+0x5c8/0x680 [ 29.645974] krealloc_large_more_oob+0x20/0x38 [ 29.646695] kunit_try_run_case+0x14c/0x3d0 [ 29.647391] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.648103] kthread+0x24c/0x2d0 [ 29.648698] ret_from_fork+0x10/0x20 [ 29.649262] [ 29.649617] The buggy address belongs to the physical page: [ 29.650395] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106490 [ 29.651292] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.652156] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.653074] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.654088] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.655015] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.655986] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.657075] head: 0bfffe0000000002 ffffc1ffc3192401 ffffffffffffffff 0000000000000000 [ 29.657967] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 29.658829] page dumped because: kasan: bad access detected [ 29.659495] [ 29.659797] Memory state around the buggy address: [ 29.660407] fff00000c6491f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.661294] fff00000c6492000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.662261] >fff00000c6492080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 29.663301] ^ [ 29.664121] fff00000c6492100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.665043] fff00000c6492180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.665866] ================================================================== [ 29.260824] ================================================================== [ 29.262074] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680 [ 29.262988] Write of size 1 at addr fff00000c09760eb by task kunit_try_catch/145 [ 29.263800] [ 29.264277] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 29.266255] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.267032] Hardware name: linux,dummy-virt (DT) [ 29.268075] Call trace: [ 29.268571] show_stack+0x20/0x38 (C) [ 29.269196] dump_stack_lvl+0x8c/0xd0 [ 29.269770] print_report+0x118/0x5e0 [ 29.270382] kasan_report+0xc8/0x118 [ 29.271101] __asan_report_store1_noabort+0x20/0x30 [ 29.272023] krealloc_more_oob_helper+0x614/0x680 [ 29.272815] krealloc_more_oob+0x20/0x38 [ 29.273360] kunit_try_run_case+0x14c/0x3d0 [ 29.274508] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.275313] kthread+0x24c/0x2d0 [ 29.276110] ret_from_fork+0x10/0x20 [ 29.276958] [ 29.277330] Allocated by task 145: [ 29.277838] kasan_save_stack+0x3c/0x68 [ 29.278350] kasan_save_track+0x20/0x40 [ 29.279071] kasan_save_alloc_info+0x40/0x58 [ 29.280125] __kasan_krealloc+0x118/0x178 [ 29.281016] krealloc_noprof+0x128/0x360 [ 29.281610] krealloc_more_oob_helper+0x168/0x680 [ 29.282262] krealloc_more_oob+0x20/0x38 [ 29.283033] kunit_try_run_case+0x14c/0x3d0 [ 29.283652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.284665] kthread+0x24c/0x2d0 [ 29.285394] ret_from_fork+0x10/0x20 [ 29.285982] [ 29.286312] The buggy address belongs to the object at fff00000c0976000 [ 29.286312] which belongs to the cache kmalloc-256 of size 256 [ 29.288742] The buggy address is located 0 bytes to the right of [ 29.288742] allocated 235-byte region [fff00000c0976000, fff00000c09760eb) [ 29.290120] [ 29.290491] The buggy address belongs to the physical page: [ 29.291225] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100976 [ 29.292631] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.293505] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.294331] page_type: f5(slab) [ 29.294856] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.295997] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.297226] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.298094] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.299098] head: 0bfffe0000000001 ffffc1ffc3025d81 ffffffffffffffff 0000000000000000 [ 29.300475] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 29.301361] page dumped because: kasan: bad access detected [ 29.302211] [ 29.302706] Memory state around the buggy address: [ 29.303483] fff00000c0975f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.304568] fff00000c0976000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.305810] >fff00000c0976080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 29.306892] ^ [ 29.308258] fff00000c0976100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.309352] fff00000c0976180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.310186] ================================================================== [ 29.601786] ================================================================== [ 29.602974] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680 [ 29.603845] Write of size 1 at addr fff00000c64920eb by task kunit_try_catch/149 [ 29.604687] [ 29.605146] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 29.606476] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.606935] Hardware name: linux,dummy-virt (DT) [ 29.608532] Call trace: [ 29.608905] show_stack+0x20/0x38 (C) [ 29.609611] dump_stack_lvl+0x8c/0xd0 [ 29.610104] print_report+0x118/0x5e0 [ 29.610733] kasan_report+0xc8/0x118 [ 29.611598] __asan_report_store1_noabort+0x20/0x30 [ 29.612270] krealloc_more_oob_helper+0x614/0x680 [ 29.613006] krealloc_large_more_oob+0x20/0x38 [ 29.613745] kunit_try_run_case+0x14c/0x3d0 [ 29.614344] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.615178] kthread+0x24c/0x2d0 [ 29.615788] ret_from_fork+0x10/0x20 [ 29.616345] [ 29.616766] The buggy address belongs to the physical page: [ 29.617312] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106490 [ 29.618504] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.619477] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.620393] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.621432] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.622332] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.623267] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.624190] head: 0bfffe0000000002 ffffc1ffc3192401 ffffffffffffffff 0000000000000000 [ 29.625058] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 29.625964] page dumped because: kasan: bad access detected [ 29.626665] [ 29.627079] Memory state around the buggy address: [ 29.627671] fff00000c6491f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.628630] fff00000c6492000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.629575] >fff00000c6492080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 29.630409] ^ [ 29.631213] fff00000c6492100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.632095] fff00000c6492180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.633140] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 29.090504] ================================================================== [ 29.092057] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 29.093047] Write of size 1 at addr fff00000c649200a by task kunit_try_catch/135 [ 29.094315] [ 29.094807] CPU: 0 UID: 0 PID: 135 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 29.096780] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.097407] Hardware name: linux,dummy-virt (DT) [ 29.098014] Call trace: [ 29.098405] show_stack+0x20/0x38 (C) [ 29.098962] dump_stack_lvl+0x8c/0xd0 [ 29.100371] print_report+0x118/0x5e0 [ 29.101009] kasan_report+0xc8/0x118 [ 29.101715] __asan_report_store1_noabort+0x20/0x30 [ 29.102567] kmalloc_large_oob_right+0x278/0x2b8 [ 29.103477] kunit_try_run_case+0x14c/0x3d0 [ 29.104432] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.105311] kthread+0x24c/0x2d0 [ 29.105942] ret_from_fork+0x10/0x20 [ 29.106593] [ 29.107015] The buggy address belongs to the physical page: [ 29.108081] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106490 [ 29.109046] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.110243] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.111127] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.112329] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.113261] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.114227] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.116128] head: 0bfffe0000000002 ffffc1ffc3192401 ffffffffffffffff 0000000000000000 [ 29.117003] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 29.117836] page dumped because: kasan: bad access detected [ 29.118468] [ 29.118769] Memory state around the buggy address: [ 29.119929] fff00000c6491f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.120802] fff00000c6491f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.121696] >fff00000c6492000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.122574] ^ [ 29.123116] fff00000c6492080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.124406] fff00000c6492100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.125138] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 29.038862] ================================================================== [ 29.040329] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 29.041554] Write of size 1 at addr fff00000c6489f00 by task kunit_try_catch/133 [ 29.042390] [ 29.042760] CPU: 1 UID: 0 PID: 133 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 29.043959] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.044488] Hardware name: linux,dummy-virt (DT) [ 29.045356] Call trace: [ 29.045838] show_stack+0x20/0x38 (C) [ 29.046487] dump_stack_lvl+0x8c/0xd0 [ 29.047005] print_report+0x118/0x5e0 [ 29.047863] kasan_report+0xc8/0x118 [ 29.048442] __asan_report_store1_noabort+0x20/0x30 [ 29.049198] kmalloc_big_oob_right+0x2a4/0x2f0 [ 29.049936] kunit_try_run_case+0x14c/0x3d0 [ 29.050510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.051618] kthread+0x24c/0x2d0 [ 29.052126] ret_from_fork+0x10/0x20 [ 29.052682] [ 29.053028] Allocated by task 133: [ 29.053438] kasan_save_stack+0x3c/0x68 [ 29.054200] kasan_save_track+0x20/0x40 [ 29.054779] kasan_save_alloc_info+0x40/0x58 [ 29.055421] __kasan_kmalloc+0xd4/0xd8 [ 29.056242] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.056849] kmalloc_big_oob_right+0xb8/0x2f0 [ 29.057553] kunit_try_run_case+0x14c/0x3d0 [ 29.058146] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.059071] kthread+0x24c/0x2d0 [ 29.059994] ret_from_fork+0x10/0x20 [ 29.060588] [ 29.060989] The buggy address belongs to the object at fff00000c6488000 [ 29.060989] which belongs to the cache kmalloc-8k of size 8192 [ 29.062119] The buggy address is located 0 bytes to the right of [ 29.062119] allocated 7936-byte region [fff00000c6488000, fff00000c6489f00) [ 29.063534] [ 29.063850] The buggy address belongs to the physical page: [ 29.064480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106488 [ 29.065470] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.066666] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.067515] page_type: f5(slab) [ 29.068246] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 29.069189] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 29.070094] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 29.070996] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 29.072155] head: 0bfffe0000000003 ffffc1ffc3192201 ffffffffffffffff 0000000000000000 [ 29.073083] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000 [ 29.073967] page dumped because: kasan: bad access detected [ 29.074693] [ 29.075028] Memory state around the buggy address: [ 29.075898] fff00000c6489e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.076818] fff00000c6489e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.077754] >fff00000c6489f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.078649] ^ [ 29.079146] fff00000c6489f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.080733] fff00000c648a000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.081504] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 28.989574] ================================================================== [ 28.990386] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x420/0x490 [ 28.991605] Write of size 1 at addr fff00000c62b1e78 by task kunit_try_catch/131 [ 28.992458] [ 28.992859] CPU: 1 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 28.994112] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.994698] Hardware name: linux,dummy-virt (DT) [ 28.995573] Call trace: [ 28.996251] show_stack+0x20/0x38 (C) [ 28.996792] dump_stack_lvl+0x8c/0xd0 [ 28.997462] print_report+0x118/0x5e0 [ 28.998085] kasan_report+0xc8/0x118 [ 28.998586] __asan_report_store1_noabort+0x20/0x30 [ 28.999657] kmalloc_track_caller_oob_right+0x420/0x490 [ 29.000401] kunit_try_run_case+0x14c/0x3d0 [ 29.001050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.001865] kthread+0x24c/0x2d0 [ 29.002459] ret_from_fork+0x10/0x20 [ 29.003140] [ 29.003668] Allocated by task 131: [ 29.004147] kasan_save_stack+0x3c/0x68 [ 29.004754] kasan_save_track+0x20/0x40 [ 29.005417] kasan_save_alloc_info+0x40/0x58 [ 29.005916] __kasan_kmalloc+0xd4/0xd8 [ 29.006562] __kmalloc_node_track_caller_noprof+0x184/0x4b8 [ 29.007570] kmalloc_track_caller_oob_right+0x184/0x490 [ 29.008436] kunit_try_run_case+0x14c/0x3d0 [ 29.009007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.009637] kthread+0x24c/0x2d0 [ 29.010256] ret_from_fork+0x10/0x20 [ 29.010732] [ 29.011155] The buggy address belongs to the object at fff00000c62b1e00 [ 29.011155] which belongs to the cache kmalloc-128 of size 128 [ 29.013305] The buggy address is located 0 bytes to the right of [ 29.013305] allocated 120-byte region [fff00000c62b1e00, fff00000c62b1e78) [ 29.014922] [ 29.015520] The buggy address belongs to the physical page: [ 29.016340] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062b1 [ 29.017373] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.018255] page_type: f5(slab) [ 29.018902] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.020185] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.021056] page dumped because: kasan: bad access detected [ 29.021719] [ 29.022036] Memory state around the buggy address: [ 29.022808] fff00000c62b1d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.023870] fff00000c62b1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.025312] >fff00000c62b1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.026414] ^ [ 29.027605] fff00000c62b1e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.028757] fff00000c62b1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.029648] ================================================================== [ 28.946624] ================================================================== [ 28.948146] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x414/0x490 [ 28.949043] Write of size 1 at addr fff00000c62b1d78 by task kunit_try_catch/131 [ 28.949897] [ 28.950229] CPU: 1 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 28.951409] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.952205] Hardware name: linux,dummy-virt (DT) [ 28.952818] Call trace: [ 28.953301] show_stack+0x20/0x38 (C) [ 28.953836] dump_stack_lvl+0x8c/0xd0 [ 28.954492] print_report+0x118/0x5e0 [ 28.955042] kasan_report+0xc8/0x118 [ 28.955745] __asan_report_store1_noabort+0x20/0x30 [ 28.956376] kmalloc_track_caller_oob_right+0x414/0x490 [ 28.957404] kunit_try_run_case+0x14c/0x3d0 [ 28.958160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.958836] kthread+0x24c/0x2d0 [ 28.959582] ret_from_fork+0x10/0x20 [ 28.960217] [ 28.960544] Allocated by task 131: [ 28.961175] kasan_save_stack+0x3c/0x68 [ 28.961678] kasan_save_track+0x20/0x40 [ 28.962401] kasan_save_alloc_info+0x40/0x58 [ 28.962990] __kasan_kmalloc+0xd4/0xd8 [ 28.963960] __kmalloc_node_track_caller_noprof+0x184/0x4b8 [ 28.964643] kmalloc_track_caller_oob_right+0xa8/0x490 [ 28.965632] kunit_try_run_case+0x14c/0x3d0 [ 28.966215] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.966976] kthread+0x24c/0x2d0 [ 28.967640] ret_from_fork+0x10/0x20 [ 28.968851] [ 28.969133] The buggy address belongs to the object at fff00000c62b1d00 [ 28.969133] which belongs to the cache kmalloc-128 of size 128 [ 28.970477] The buggy address is located 0 bytes to the right of [ 28.970477] allocated 120-byte region [fff00000c62b1d00, fff00000c62b1d78) [ 28.972065] [ 28.972424] The buggy address belongs to the physical page: [ 28.973083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062b1 [ 28.974248] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.975067] page_type: f5(slab) [ 28.975783] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 28.976763] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.977614] page dumped because: kasan: bad access detected [ 28.978226] [ 28.978579] Memory state around the buggy address: [ 28.979612] fff00000c62b1c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 28.980387] fff00000c62b1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.981322] >fff00000c62b1d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 28.982219] ^ [ 28.983093] fff00000c62b1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.984278] fff00000c62b1e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.985116] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 28.893670] ================================================================== [ 28.895133] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 28.896184] Read of size 1 at addr fff00000c64a9000 by task kunit_try_catch/129 [ 28.897369] [ 28.897746] CPU: 0 UID: 0 PID: 129 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 28.898937] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.899736] Hardware name: linux,dummy-virt (DT) [ 28.900420] Call trace: [ 28.900769] show_stack+0x20/0x38 (C) [ 28.901375] dump_stack_lvl+0x8c/0xd0 [ 28.901908] print_report+0x118/0x5e0 [ 28.902568] kasan_report+0xc8/0x118 [ 28.903795] __asan_report_load1_noabort+0x20/0x30 [ 28.904375] kmalloc_node_oob_right+0x2f4/0x330 [ 28.905043] kunit_try_run_case+0x14c/0x3d0 [ 28.905701] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.906321] kthread+0x24c/0x2d0 [ 28.907217] ret_from_fork+0x10/0x20 [ 28.907922] [ 28.908338] Allocated by task 129: [ 28.908863] kasan_save_stack+0x3c/0x68 [ 28.909543] kasan_save_track+0x20/0x40 [ 28.910347] kasan_save_alloc_info+0x40/0x58 [ 28.910952] __kasan_kmalloc+0xd4/0xd8 [ 28.911422] __kmalloc_cache_node_noprof+0x168/0x3d0 [ 28.912322] kmalloc_node_oob_right+0xbc/0x330 [ 28.912953] kunit_try_run_case+0x14c/0x3d0 [ 28.913646] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.914730] kthread+0x24c/0x2d0 [ 28.915650] ret_from_fork+0x10/0x20 [ 28.916356] [ 28.916691] The buggy address belongs to the object at fff00000c64a8000 [ 28.916691] which belongs to the cache kmalloc-4k of size 4096 [ 28.918123] The buggy address is located 0 bytes to the right of [ 28.918123] allocated 4096-byte region [fff00000c64a8000, fff00000c64a9000) [ 28.919527] [ 28.920194] The buggy address belongs to the physical page: [ 28.920826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064a8 [ 28.922260] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.923183] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.924397] page_type: f5(slab) [ 28.924846] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 28.925812] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 28.926702] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 28.927983] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 28.928906] head: 0bfffe0000000003 ffffc1ffc3192a01 ffffffffffffffff 0000000000000000 [ 28.929783] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000 [ 28.930623] page dumped because: kasan: bad access detected [ 28.931695] [ 28.931975] Memory state around the buggy address: [ 28.932590] fff00000c64a8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.933447] fff00000c64a8f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.934420] >fff00000c64a9000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.935478] ^ [ 28.936207] fff00000c64a9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.936929] fff00000c64a9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.937863] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 28.842251] ================================================================== [ 28.843578] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 28.844666] Read of size 1 at addr fff00000c5f6079f by task kunit_try_catch/127 [ 28.846255] [ 28.846610] CPU: 1 UID: 0 PID: 127 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 28.847942] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.848426] Hardware name: linux,dummy-virt (DT) [ 28.849038] Call trace: [ 28.849487] show_stack+0x20/0x38 (C) [ 28.850102] dump_stack_lvl+0x8c/0xd0 [ 28.850612] print_report+0x118/0x5e0 [ 28.851273] kasan_report+0xc8/0x118 [ 28.851825] __asan_report_load1_noabort+0x20/0x30 [ 28.852515] kmalloc_oob_left+0x2ec/0x320 [ 28.853035] kunit_try_run_case+0x14c/0x3d0 [ 28.853715] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.854420] kthread+0x24c/0x2d0 [ 28.855033] ret_from_fork+0x10/0x20 [ 28.855670] [ 28.855996] Allocated by task 28: [ 28.856517] kasan_save_stack+0x3c/0x68 [ 28.857066] kasan_save_track+0x20/0x40 [ 28.857546] kasan_save_alloc_info+0x40/0x58 [ 28.858265] __kasan_kmalloc+0xd4/0xd8 [ 28.858853] __kmalloc_node_track_caller_noprof+0x184/0x4b8 [ 28.859685] kstrdup+0x54/0xc8 [ 28.860224] devtmpfs_work_loop+0x384/0x590 [ 28.860892] devtmpfsd+0x50/0x58 [ 28.861372] kthread+0x24c/0x2d0 [ 28.861921] ret_from_fork+0x10/0x20 [ 28.862443] [ 28.862773] Freed by task 28: [ 28.863366] kasan_save_stack+0x3c/0x68 [ 28.864013] kasan_save_track+0x20/0x40 [ 28.864636] kasan_save_free_info+0x4c/0x78 [ 28.865277] __kasan_slab_free+0x6c/0x98 [ 28.865739] kfree+0x114/0x3c8 [ 28.866340] devtmpfs_work_loop+0x498/0x590 [ 28.866988] devtmpfsd+0x50/0x58 [ 28.867467] kthread+0x24c/0x2d0 [ 28.867937] ret_from_fork+0x10/0x20 [ 28.868581] [ 28.868964] The buggy address belongs to the object at fff00000c5f60780 [ 28.868964] which belongs to the cache kmalloc-16 of size 16 [ 28.870401] The buggy address is located 15 bytes to the right of [ 28.870401] allocated 16-byte region [fff00000c5f60780, fff00000c5f60790) [ 28.871841] [ 28.872379] The buggy address belongs to the physical page: [ 28.873095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f60 [ 28.874007] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.874817] page_type: f5(slab) [ 28.875317] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 28.876218] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.877061] page dumped because: kasan: bad access detected [ 28.877807] [ 28.878267] Memory state around the buggy address: [ 28.878804] fff00000c5f60680: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 28.879772] fff00000c5f60700: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.880616] >fff00000c5f60780: fa fb fc fc 00 07 fc fc fc fc fc fc fc fc fc fc [ 28.881457] ^ [ 28.881987] fff00000c5f60800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.882808] fff00000c5f60880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.883735] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 28.794488] ================================================================== [ 28.795337] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 28.796261] Read of size 1 at addr fff00000c6397d80 by task kunit_try_catch/125 [ 28.797233] [ 28.797670] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 28.798824] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.799863] Hardware name: linux,dummy-virt (DT) [ 28.800575] Call trace: [ 28.801049] show_stack+0x20/0x38 (C) [ 28.801566] dump_stack_lvl+0x8c/0xd0 [ 28.802251] print_report+0x118/0x5e0 [ 28.802826] kasan_report+0xc8/0x118 [ 28.803377] __asan_report_load1_noabort+0x20/0x30 [ 28.804723] kmalloc_oob_right+0x5d0/0x660 [ 28.805411] kunit_try_run_case+0x14c/0x3d0 [ 28.806073] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.806805] kthread+0x24c/0x2d0 [ 28.807450] ret_from_fork+0x10/0x20 [ 28.807992] [ 28.808357] Allocated by task 125: [ 28.808836] kasan_save_stack+0x3c/0x68 [ 28.810400] kasan_save_track+0x20/0x40 [ 28.810973] kasan_save_alloc_info+0x40/0x58 [ 28.811775] __kasan_kmalloc+0xd4/0xd8 [ 28.812383] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.813023] kmalloc_oob_right+0xb0/0x660 [ 28.813718] kunit_try_run_case+0x14c/0x3d0 [ 28.814482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.815704] kthread+0x24c/0x2d0 [ 28.816147] ret_from_fork+0x10/0x20 [ 28.816649] [ 28.817022] The buggy address belongs to the object at fff00000c6397d00 [ 28.817022] which belongs to the cache kmalloc-128 of size 128 [ 28.818408] The buggy address is located 13 bytes to the right of [ 28.818408] allocated 115-byte region [fff00000c6397d00, fff00000c6397d73) [ 28.819835] [ 28.820542] The buggy address belongs to the physical page: [ 28.821254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106397 [ 28.822307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.823115] page_type: f5(slab) [ 28.824295] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 28.825231] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.826115] page dumped because: kasan: bad access detected [ 28.826734] [ 28.827096] Memory state around the buggy address: [ 28.827711] fff00000c6397c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.828964] fff00000c6397d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 28.829794] >fff00000c6397d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.830847] ^ [ 28.831675] fff00000c6397e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.832574] fff00000c6397e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.833524] ================================================================== [ 28.701270] ================================================================== [ 28.702711] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 28.704855] Write of size 1 at addr fff00000c6397d73 by task kunit_try_catch/125 [ 28.705762] [ 28.707551] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G N 6.13.0-rc1-next-20241205 #1 [ 28.708952] Tainted: [N]=TEST [ 28.709452] Hardware name: linux,dummy-virt (DT) [ 28.710562] Call trace: [ 28.711255] show_stack+0x20/0x38 (C) [ 28.712295] dump_stack_lvl+0x8c/0xd0 [ 28.712895] print_report+0x118/0x5e0 [ 28.713428] kasan_report+0xc8/0x118 [ 28.714043] __asan_report_store1_noabort+0x20/0x30 [ 28.714770] kmalloc_oob_right+0x5a4/0x660 [ 28.715697] kunit_try_run_case+0x14c/0x3d0 [ 28.716149] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.716920] kthread+0x24c/0x2d0 [ 28.717383] ret_from_fork+0x10/0x20 [ 28.718308] [ 28.718696] Allocated by task 125: [ 28.719367] kasan_save_stack+0x3c/0x68 [ 28.720296] kasan_save_track+0x20/0x40 [ 28.720731] kasan_save_alloc_info+0x40/0x58 [ 28.721318] __kasan_kmalloc+0xd4/0xd8 [ 28.721925] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.722506] kmalloc_oob_right+0xb0/0x660 [ 28.723160] kunit_try_run_case+0x14c/0x3d0 [ 28.723783] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.725250] kthread+0x24c/0x2d0 [ 28.725742] ret_from_fork+0x10/0x20 [ 28.726398] [ 28.726802] The buggy address belongs to the object at fff00000c6397d00 [ 28.726802] which belongs to the cache kmalloc-128 of size 128 [ 28.728685] The buggy address is located 0 bytes to the right of [ 28.728685] allocated 115-byte region [fff00000c6397d00, fff00000c6397d73) [ 28.730225] [ 28.730705] The buggy address belongs to the physical page: [ 28.732141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106397 [ 28.733402] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.734727] page_type: f5(slab) [ 28.735944] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 28.736868] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.737943] page dumped because: kasan: bad access detected [ 28.738677] [ 28.739023] Memory state around the buggy address: [ 28.740359] fff00000c6397c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 28.741292] fff00000c6397c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.742239] >fff00000c6397d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 28.743563] ^ [ 28.744650] fff00000c6397d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.745406] fff00000c6397e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.746338] ================================================================== [ 28.751248] ================================================================== [ 28.752676] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 28.753530] Write of size 1 at addr fff00000c6397d78 by task kunit_try_catch/125 [ 28.754423] [ 28.754765] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 28.756795] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.757299] Hardware name: linux,dummy-virt (DT) [ 28.757925] Call trace: [ 28.758297] show_stack+0x20/0x38 (C) [ 28.759024] dump_stack_lvl+0x8c/0xd0 [ 28.759667] print_report+0x118/0x5e0 [ 28.760356] kasan_report+0xc8/0x118 [ 28.761295] __asan_report_store1_noabort+0x20/0x30 [ 28.761866] kmalloc_oob_right+0x538/0x660 [ 28.762621] kunit_try_run_case+0x14c/0x3d0 [ 28.763803] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.764497] kthread+0x24c/0x2d0 [ 28.765073] ret_from_fork+0x10/0x20 [ 28.765603] [ 28.765995] Allocated by task 125: [ 28.766542] kasan_save_stack+0x3c/0x68 [ 28.767085] kasan_save_track+0x20/0x40 [ 28.768483] kasan_save_alloc_info+0x40/0x58 [ 28.769323] __kasan_kmalloc+0xd4/0xd8 [ 28.769932] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.770549] kmalloc_oob_right+0xb0/0x660 [ 28.771145] kunit_try_run_case+0x14c/0x3d0 [ 28.771994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.773127] kthread+0x24c/0x2d0 [ 28.773685] ret_from_fork+0x10/0x20 [ 28.774282] [ 28.774666] The buggy address belongs to the object at fff00000c6397d00 [ 28.774666] which belongs to the cache kmalloc-128 of size 128 [ 28.776385] The buggy address is located 5 bytes to the right of [ 28.776385] allocated 115-byte region [fff00000c6397d00, fff00000c6397d73) [ 28.777841] [ 28.778635] The buggy address belongs to the physical page: [ 28.779858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106397 [ 28.781039] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.781903] page_type: f5(slab) [ 28.782375] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 28.783772] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.784530] page dumped because: kasan: bad access detected [ 28.784863] [ 28.785508] Memory state around the buggy address: [ 28.786150] fff00000c6397c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 28.786979] fff00000c6397c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.788317] >fff00000c6397d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 28.789170] ^ [ 28.790034] fff00000c6397d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.790934] fff00000c6397e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.791972] ==================================================================
Failure - log-parser-boot - internal-error-oops-oops-preempt-smp
KNOWN ISSUE - kunit_test_null_dereference internal oops on qemu-arm64 KUNIT KASAN
[ 143.578026] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP [ 143.579010] Modules linked in: [ 143.580853] CPU: 1 UID: 0 PID: 621 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 143.581999] Tainted: [B]=BAD_PAGE, [N]=TEST [ 143.582667] Hardware name: linux,dummy-virt (DT) [ 143.583644] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 143.584912] pc : kunit_test_null_dereference+0x70/0x170 [ 143.585613] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 143.586431] sp : ffff800083487dc0 [ 143.586867] x29: ffff800083487e20 x28: 0000000000000000 x27: 0000000000000000 [ 143.588360] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000cbfab400 [ 143.589417] x23: ffffa4b3319c3020 x22: ffffa4b3319cbbe0 x21: fff00000cbfab408 [ 143.590465] x20: 1ffff00010690fb8 x19: ffff8000800879f0 x18: 00000000248aa35a [ 143.591777] x17: 0000000000000001 x16: fff00000da500d60 x15: 0000000000000000 [ 143.593500] x14: 1ffe00001b4a0190 x13: 0000000000000000 x12: fffd800019928b3b [ 143.594615] x11: 1ffe000019928b3a x10: fffd800019928b3a x9 : ffffa4b3319c30a8 [ 143.596335] x8 : ffff800083487cb8 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 143.597524] x5 : ffff700010690fb8 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 143.598378] x2 : dfff800000000000 x1 : fff00000cc945100 x0 : ffff8000800879f0 [ 143.599721] Call trace: [ 143.600523] kunit_test_null_dereference+0x70/0x170 (P) [ 143.601572] kunit_generic_run_threadfn_adapter+0x88/0x100 (L) [ 143.602247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 143.603057] kthread+0x24c/0x2d0 [ 143.603829] ret_from_fork+0x10/0x20 [ 143.605221] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 143.606513] ---[ end trace 0000000000000000 ]---