Date
Dec. 6, 2024, 3:11 p.m.
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 64.504200] ================================================================== [ 64.505004] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 64.505004] [ 64.505759] Use-after-free read at 0x00000000ec28697c (in kfence-#212): [ 64.506943] test_krealloc+0x51c/0x830 [ 64.507505] test_krealloc+0x458/0x830 [ 64.508143] kunit_try_run_case+0x14c/0x3d0 [ 64.508828] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.509432] kthread+0x24c/0x2d0 [ 64.510045] ret_from_fork+0x10/0x20 [ 64.510676] [ 64.511072] kfence-#212: 0x00000000ec28697c-0x00000000b31e3a5c, size=32, cache=kmalloc-32 [ 64.511072] [ 64.512226] allocated by task 326 on cpu 1 at 64.502999s (0.009215s ago): [ 64.513054] test_alloc+0x298/0x620 [ 64.513667] test_krealloc+0xc0/0x830 [ 64.514279] kunit_try_run_case+0x14c/0x3d0 [ 64.514925] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.515551] kthread+0x24c/0x2d0 [ 64.516160] ret_from_fork+0x10/0x20 [ 64.516783] [ 64.517154] freed by task 326 on cpu 1 at 64.503556s (0.013586s ago): [ 64.517926] krealloc_noprof+0x148/0x360 [ 64.518578] test_krealloc+0x1dc/0x830 [ 64.519173] kunit_try_run_case+0x14c/0x3d0 [ 64.519830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.520620] kthread+0x24c/0x2d0 [ 64.521125] ret_from_fork+0x10/0x20 [ 64.521765] [ 64.522186] CPU: 1 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 64.523391] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.524018] Hardware name: linux,dummy-virt (DT) [ 64.524653] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 64.333815] ================================================================== [ 64.334583] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 64.334583] [ 64.335527] Use-after-free read at 0x000000004ca53444 (in kfence-#210): [ 64.336211] test_memcache_typesafe_by_rcu+0x280/0x560 [ 64.336798] test_memcache_typesafe_by_rcu+0x260/0x560 [ 64.337574] kunit_try_run_case+0x14c/0x3d0 [ 64.338139] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.338889] kthread+0x24c/0x2d0 [ 64.339447] ret_from_fork+0x10/0x20 [ 64.340054] [ 64.340356] kfence-#210: 0x000000004ca53444-0x0000000081aa9c1a, size=32, cache=test [ 64.340356] [ 64.341443] allocated by task 324 on cpu 0 at 64.295407s (0.046023s ago): [ 64.342320] test_alloc+0x22c/0x620 [ 64.342933] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 64.343611] kunit_try_run_case+0x14c/0x3d0 [ 64.344281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.345055] kthread+0x24c/0x2d0 [ 64.345615] ret_from_fork+0x10/0x20 [ 64.346245] [ 64.346602] freed by task 324 on cpu 0 at 64.295638s (0.050951s ago): [ 64.347460] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 64.348211] kunit_try_run_case+0x14c/0x3d0 [ 64.348872] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.349656] kthread+0x24c/0x2d0 [ 64.350246] ret_from_fork+0x10/0x20 [ 64.350784] [ 64.351206] CPU: 0 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 64.352237] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.352882] Hardware name: linux,dummy-virt (DT) [ 64.353558] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 45.604002] ================================================================== [ 45.605235] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 45.605235] [ 45.606240] Invalid read at 0x000000000b98070f: [ 45.608289] test_invalid_access+0xdc/0x1f0 [ 45.608916] kunit_try_run_case+0x14c/0x3d0 [ 45.609576] kunit_try_run_case+0x14c/0x3d0 [ 45.610330] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.611929] kthread+0x24c/0x2d0 [ 45.612599] ret_from_fork+0x10/0x20 [ 45.613335] [ 45.613883] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 45.615351] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.616003] Hardware name: linux,dummy-virt (DT) [ 45.616711] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 39.127484] ================================================================== [ 39.128310] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 39.128310] [ 39.129088] Out-of-bounds write at 0x00000000f0d6522c (1B left of kfence-#146): [ 39.130029] test_out_of_bounds_write+0x100/0x240 [ 39.131471] test_out_of_bounds_write+0xc8/0x240 [ 39.132121] kunit_try_run_case+0x14c/0x3d0 [ 39.132754] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.133528] kthread+0x24c/0x2d0 [ 39.134021] ret_from_fork+0x10/0x20 [ 39.134655] [ 39.134996] kfence-#146: 0x0000000003ea21d4-0x00000000d6efede0, size=32, cache=kmalloc-32 [ 39.134996] [ 39.136099] allocated by task 280 on cpu 1 at 39.127194s (0.008894s ago): [ 39.136947] test_alloc+0x298/0x620 [ 39.137461] test_out_of_bounds_write+0xc8/0x240 [ 39.138194] kunit_try_run_case+0x14c/0x3d0 [ 39.138772] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.139587] kthread+0x24c/0x2d0 [ 39.140179] ret_from_fork+0x10/0x20 [ 39.140787] [ 39.141205] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 39.142356] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.142927] Hardware name: linux,dummy-virt (DT) [ 39.143543] ================================================================== [ 39.231353] ================================================================== [ 39.232122] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 39.232122] [ 39.233054] Out-of-bounds write at 0x00000000c4b497c3 (1B left of kfence-#147): [ 39.234060] test_out_of_bounds_write+0x100/0x240 [ 39.234856] test_out_of_bounds_write+0xc8/0x240 [ 39.235609] kunit_try_run_case+0x14c/0x3d0 [ 39.236218] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.237040] kthread+0x24c/0x2d0 [ 39.237583] ret_from_fork+0x10/0x20 [ 39.238245] [ 39.238678] kfence-#147: 0x00000000ed129c7f-0x00000000a24848fa, size=32, cache=test [ 39.238678] [ 39.239576] allocated by task 282 on cpu 0 at 39.231166s (0.008397s ago): [ 39.240559] test_alloc+0x22c/0x620 [ 39.241200] test_out_of_bounds_write+0xc8/0x240 [ 39.241918] kunit_try_run_case+0x14c/0x3d0 [ 39.242545] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.243359] kthread+0x24c/0x2d0 [ 39.243876] ret_from_fork+0x10/0x20 [ 39.244539] [ 39.244944] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 39.246067] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.246739] Hardware name: linux,dummy-virt (DT) [ 39.247303] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 45.367645] ================================================================== [ 45.368406] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 45.368406] [ 45.369203] Corrupted memory at 0x000000003320c25c [ ! . . . . . . . . . . . . . . . ] (in kfence-#206): [ 45.371970] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 45.372624] kunit_try_run_case+0x14c/0x3d0 [ 45.373219] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.373883] kthread+0x24c/0x2d0 [ 45.374473] ret_from_fork+0x10/0x20 [ 45.375041] [ 45.375373] kfence-#206: 0x000000002d1f07e8-0x000000005255f76c, size=73, cache=kmalloc-96 [ 45.375373] [ 45.376427] allocated by task 314 on cpu 0 at 45.367126s (0.009290s ago): [ 45.377226] test_alloc+0x298/0x620 [ 45.377829] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 45.378481] kunit_try_run_case+0x14c/0x3d0 [ 45.379070] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.379857] kthread+0x24c/0x2d0 [ 45.380435] ret_from_fork+0x10/0x20 [ 45.381060] [ 45.381428] freed by task 314 on cpu 0 at 45.367380s (0.014037s ago): [ 45.382149] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 45.382914] kunit_try_run_case+0x14c/0x3d0 [ 45.383583] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.384351] kthread+0x24c/0x2d0 [ 45.384941] ret_from_fork+0x10/0x20 [ 45.385488] [ 45.385949] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 45.387104] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.387611] Hardware name: linux,dummy-virt (DT) [ 45.388265] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 45.263502] ================================================================== [ 45.264355] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 45.264355] [ 45.265329] Out-of-bounds read at 0x0000000016673cbe (105B right of kfence-#205): [ 45.266312] test_kmalloc_aligned_oob_read+0x238/0x468 [ 45.267017] test_kmalloc_aligned_oob_read+0x100/0x468 [ 45.267801] kunit_try_run_case+0x14c/0x3d0 [ 45.268487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.269211] kthread+0x24c/0x2d0 [ 45.269823] ret_from_fork+0x10/0x20 [ 45.270398] [ 45.270800] kfence-#205: 0x0000000006bd45fe-0x00000000aef7a023, size=73, cache=kmalloc-96 [ 45.270800] [ 45.271798] allocated by task 312 on cpu 1 at 45.263033s (0.008753s ago): [ 45.272746] test_alloc+0x298/0x620 [ 45.273259] test_kmalloc_aligned_oob_read+0x100/0x468 [ 45.274040] kunit_try_run_case+0x14c/0x3d0 [ 45.275478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.276826] kthread+0x24c/0x2d0 [ 45.277751] ret_from_fork+0x10/0x20 [ 45.278197] [ 45.278562] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 45.279410] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.281001] Hardware name: linux,dummy-virt (DT) [ 45.281706] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[ 41.415355] ================================================================== [ 41.416036] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 41.416036] [ 41.416875] Corrupted memory at 0x0000000009f227a1 [ ! . . . . . . . . . . . . . . . ] (in kfence-#168): [ 41.419600] test_corruption+0x120/0x378 [ 41.420178] kunit_try_run_case+0x14c/0x3d0 [ 41.420859] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.421609] kthread+0x24c/0x2d0 [ 41.422204] ret_from_fork+0x10/0x20 [ 41.422799] [ 41.423188] kfence-#168: 0x00000000928b8394-0x00000000476e3f3e, size=32, cache=test [ 41.423188] [ 41.424090] allocated by task 302 on cpu 0 at 41.415081s (0.008997s ago): [ 41.425011] test_alloc+0x22c/0x620 [ 41.425506] test_corruption+0xdc/0x378 [ 41.426029] kunit_try_run_case+0x14c/0x3d0 [ 41.426699] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.427320] kthread+0x24c/0x2d0 [ 41.427894] ret_from_fork+0x10/0x20 [ 41.428364] [ 41.428750] freed by task 302 on cpu 0 at 41.415187s (0.013550s ago): [ 41.429529] test_corruption+0x120/0x378 [ 41.430161] kunit_try_run_case+0x14c/0x3d0 [ 41.430848] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.431611] kthread+0x24c/0x2d0 [ 41.432172] ret_from_fork+0x10/0x20 [ 41.432673] [ 41.433086] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 41.434309] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.434838] Hardware name: linux,dummy-virt (DT) [ 41.435476] ================================================================== [ 41.103615] ================================================================== [ 41.104353] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 41.104353] [ 41.105162] Corrupted memory at 0x00000000712da544 [ ! ] (in kfence-#165): [ 41.106454] test_corruption+0x284/0x378 [ 41.107090] kunit_try_run_case+0x14c/0x3d0 [ 41.107718] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.108469] kthread+0x24c/0x2d0 [ 41.109063] ret_from_fork+0x10/0x20 [ 41.109583] [ 41.109930] kfence-#165: 0x000000004de98b11-0x000000002bdcccf8, size=32, cache=kmalloc-32 [ 41.109930] [ 41.111045] allocated by task 300 on cpu 0 at 41.103077s (0.007956s ago): [ 41.111733] test_alloc+0x298/0x620 [ 41.112306] test_corruption+0x198/0x378 [ 41.112950] kunit_try_run_case+0x14c/0x3d0 [ 41.113634] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.114230] kthread+0x24c/0x2d0 [ 41.114832] ret_from_fork+0x10/0x20 [ 41.115427] [ 41.115852] freed by task 300 on cpu 0 at 41.103246s (0.012593s ago): [ 41.116650] test_corruption+0x284/0x378 [ 41.117241] kunit_try_run_case+0x14c/0x3d0 [ 41.117905] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.118679] kthread+0x24c/0x2d0 [ 41.119184] ret_from_fork+0x10/0x20 [ 41.119801] [ 41.120151] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 41.121227] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.121760] Hardware name: linux,dummy-virt (DT) [ 41.122423] ================================================================== [ 40.895608] ================================================================== [ 40.896445] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 40.896445] [ 40.897334] Corrupted memory at 0x00000000e48ee75d [ ! . . . . . . . . . . . . . . . ] (in kfence-#163): [ 40.901391] test_corruption+0x278/0x378 [ 40.902046] kunit_try_run_case+0x14c/0x3d0 [ 40.902642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.903353] kthread+0x24c/0x2d0 [ 40.903953] ret_from_fork+0x10/0x20 [ 40.904481] [ 40.904876] kfence-#163: 0x00000000f14d94c7-0x00000000ba9d7e53, size=32, cache=kmalloc-32 [ 40.904876] [ 40.905969] allocated by task 300 on cpu 0 at 40.895052s (0.010905s ago): [ 40.906714] test_alloc+0x298/0x620 [ 40.907312] test_corruption+0xdc/0x378 [ 40.907838] kunit_try_run_case+0x14c/0x3d0 [ 40.908453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.909188] kthread+0x24c/0x2d0 [ 40.909776] ret_from_fork+0x10/0x20 [ 40.910298] [ 40.910684] freed by task 300 on cpu 0 at 40.895219s (0.015452s ago): [ 40.911434] test_corruption+0x278/0x378 [ 40.912001] kunit_try_run_case+0x14c/0x3d0 [ 40.912661] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.913427] kthread+0x24c/0x2d0 [ 40.914025] ret_from_fork+0x10/0x20 [ 40.914562] [ 40.914916] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 40.915993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.916547] Hardware name: linux,dummy-virt (DT) [ 40.917115] ================================================================== [ 41.623244] ================================================================== [ 41.624040] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 41.624040] [ 41.624785] Corrupted memory at 0x000000008a6f21bb [ ! ] (in kfence-#170): [ 41.625957] test_corruption+0x1d8/0x378 [ 41.626548] kunit_try_run_case+0x14c/0x3d0 [ 41.627225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.627788] kthread+0x24c/0x2d0 [ 41.628372] ret_from_fork+0x10/0x20 [ 41.628977] [ 41.629340] kfence-#170: 0x0000000074b34bb6-0x00000000c08be4ed, size=32, cache=test [ 41.629340] [ 41.630344] allocated by task 302 on cpu 0 at 41.622972s (0.007361s ago): [ 41.631284] test_alloc+0x22c/0x620 [ 41.631853] test_corruption+0x198/0x378 [ 41.632400] kunit_try_run_case+0x14c/0x3d0 [ 41.633007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.633588] kthread+0x24c/0x2d0 [ 41.634161] ret_from_fork+0x10/0x20 [ 41.634787] [ 41.635176] freed by task 302 on cpu 0 at 41.623068s (0.012095s ago): [ 41.635992] test_corruption+0x1d8/0x378 [ 41.636640] kunit_try_run_case+0x14c/0x3d0 [ 41.637305] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.637973] kthread+0x24c/0x2d0 [ 41.638458] ret_from_fork+0x10/0x20 [ 41.639085] [ 41.639493] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 41.640587] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.641189] Hardware name: linux,dummy-virt (DT) [ 41.641838] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 40.063231] ================================================================== [ 40.064072] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 40.064072] [ 40.064771] Invalid free of 0x0000000069c1bae8 (in kfence-#155): [ 40.065569] test_invalid_addr_free+0xec/0x238 [ 40.066220] kunit_try_run_case+0x14c/0x3d0 [ 40.066907] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.067476] kthread+0x24c/0x2d0 [ 40.068089] ret_from_fork+0x10/0x20 [ 40.068722] [ 40.069099] kfence-#155: 0x0000000001eb12f2-0x000000000b799322, size=32, cache=test [ 40.069099] [ 40.070047] allocated by task 298 on cpu 0 at 40.063026s (0.007009s ago): [ 40.070900] test_alloc+0x22c/0x620 [ 40.071402] test_invalid_addr_free+0xd4/0x238 [ 40.072103] kunit_try_run_case+0x14c/0x3d0 [ 40.072767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.073430] kthread+0x24c/0x2d0 [ 40.074011] ret_from_fork+0x10/0x20 [ 40.074632] [ 40.074993] CPU: 0 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 40.076253] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.076811] Hardware name: linux,dummy-virt (DT) [ 40.077455] ================================================================== [ 39.959243] ================================================================== [ 39.960118] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 39.960118] [ 39.960875] Invalid free of 0x0000000008728172 (in kfence-#154): [ 39.961707] test_invalid_addr_free+0x1ac/0x238 [ 39.962794] kunit_try_run_case+0x14c/0x3d0 [ 39.963445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.964232] kthread+0x24c/0x2d0 [ 39.964758] ret_from_fork+0x10/0x20 [ 39.965360] [ 39.965762] kfence-#154: 0x00000000177c53c1-0x000000007b3f5005, size=32, cache=kmalloc-32 [ 39.965762] [ 39.966799] allocated by task 296 on cpu 1 at 39.958997s (0.007790s ago): [ 39.967754] test_alloc+0x298/0x620 [ 39.968223] test_invalid_addr_free+0xd4/0x238 [ 39.968944] kunit_try_run_case+0x14c/0x3d0 [ 39.969632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.970315] kthread+0x24c/0x2d0 [ 39.970928] ret_from_fork+0x10/0x20 [ 39.971554] [ 39.971967] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 39.973116] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.973762] Hardware name: linux,dummy-virt (DT) [ 39.974300] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[ 39.751740] ================================================================== [ 39.752619] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 39.752619] [ 39.753311] Invalid free of 0x000000001bbbfa2f (in kfence-#152): [ 39.754402] test_double_free+0x1bc/0x238 [ 39.755112] kunit_try_run_case+0x14c/0x3d0 [ 39.755826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.756564] kthread+0x24c/0x2d0 [ 39.757101] ret_from_fork+0x10/0x20 [ 39.757699] [ 39.758047] kfence-#152: 0x000000001bbbfa2f-0x000000008e59599b, size=32, cache=kmalloc-32 [ 39.758047] [ 39.759038] allocated by task 292 on cpu 1 at 39.751164s (0.007862s ago): [ 39.759999] test_alloc+0x298/0x620 [ 39.760568] test_double_free+0xd4/0x238 [ 39.761200] kunit_try_run_case+0x14c/0x3d0 [ 39.761894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.762528] kthread+0x24c/0x2d0 [ 39.763128] ret_from_fork+0x10/0x20 [ 39.763763] [ 39.764091] freed by task 292 on cpu 1 at 39.751291s (0.012788s ago): [ 39.765023] test_double_free+0x1ac/0x238 [ 39.765576] kunit_try_run_case+0x14c/0x3d0 [ 39.766250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.766893] kthread+0x24c/0x2d0 [ 39.767478] ret_from_fork+0x10/0x20 [ 39.768050] [ 39.768472] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 39.769585] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.770197] Hardware name: linux,dummy-virt (DT) [ 39.770890] ================================================================== [ 39.855503] ================================================================== [ 39.856315] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 39.856315] [ 39.857020] Invalid free of 0x0000000079e1b88d (in kfence-#153): [ 39.857817] test_double_free+0x100/0x238 [ 39.858392] kunit_try_run_case+0x14c/0x3d0 [ 39.858988] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.859769] kthread+0x24c/0x2d0 [ 39.860231] ret_from_fork+0x10/0x20 [ 39.860854] [ 39.861226] kfence-#153: 0x0000000079e1b88d-0x00000000e2a57187, size=32, cache=test [ 39.861226] [ 39.862108] allocated by task 294 on cpu 0 at 39.855098s (0.006998s ago): [ 39.862965] test_alloc+0x22c/0x620 [ 39.863580] test_double_free+0xd4/0x238 [ 39.864199] kunit_try_run_case+0x14c/0x3d0 [ 39.864878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.865464] kthread+0x24c/0x2d0 [ 39.866021] ret_from_fork+0x10/0x20 [ 39.866637] [ 39.867023] freed by task 294 on cpu 0 at 39.855205s (0.011805s ago): [ 39.867755] test_double_free+0xf0/0x238 [ 39.868371] kunit_try_run_case+0x14c/0x3d0 [ 39.869052] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.869832] kthread+0x24c/0x2d0 [ 39.870329] ret_from_fork+0x10/0x20 [ 39.870811] [ 39.871227] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 39.872476] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.873107] Hardware name: linux,dummy-virt (DT) [ 39.873676] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 39.335854] ================================================================== [ 39.336716] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 39.336716] [ 39.337947] Use-after-free read at 0x00000000f1237827 (in kfence-#148): [ 39.339201] test_use_after_free_read+0x114/0x248 [ 39.339800] test_use_after_free_read+0x1c0/0x248 [ 39.340550] kunit_try_run_case+0x14c/0x3d0 [ 39.341214] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.342043] kthread+0x24c/0x2d0 [ 39.342592] ret_from_fork+0x10/0x20 [ 39.343127] [ 39.343506] kfence-#148: 0x00000000f1237827-0x0000000096aafa70, size=32, cache=kmalloc-32 [ 39.343506] [ 39.344481] allocated by task 284 on cpu 1 at 39.335195s (0.009275s ago): [ 39.345422] test_alloc+0x298/0x620 [ 39.345908] test_use_after_free_read+0xd0/0x248 [ 39.346632] kunit_try_run_case+0x14c/0x3d0 [ 39.347288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.347900] kthread+0x24c/0x2d0 [ 39.348487] ret_from_fork+0x10/0x20 [ 39.349150] [ 39.349832] freed by task 284 on cpu 1 at 39.335327s (0.014295s ago): [ 39.350853] test_use_after_free_read+0x1c0/0x248 [ 39.351578] kunit_try_run_case+0x14c/0x3d0 [ 39.352197] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.352942] kthread+0x24c/0x2d0 [ 39.353476] ret_from_fork+0x10/0x20 [ 39.354088] [ 39.354476] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 39.355609] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.356231] Hardware name: linux,dummy-virt (DT) [ 39.356832] ================================================================== [ 39.439651] ================================================================== [ 39.440445] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 39.440445] [ 39.441405] Use-after-free read at 0x0000000027a1664e (in kfence-#149): [ 39.442432] test_use_after_free_read+0x114/0x248 [ 39.443146] test_use_after_free_read+0xf0/0x248 [ 39.444095] kunit_try_run_case+0x14c/0x3d0 [ 39.444816] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.445677] kthread+0x24c/0x2d0 [ 39.446283] ret_from_fork+0x10/0x20 [ 39.447066] [ 39.447435] kfence-#149: 0x0000000027a1664e-0x00000000c336d6b1, size=32, cache=test [ 39.447435] [ 39.448439] allocated by task 286 on cpu 0 at 39.439236s (0.009192s ago): [ 39.449298] test_alloc+0x22c/0x620 [ 39.449830] test_use_after_free_read+0xd0/0x248 [ 39.450358] kunit_try_run_case+0x14c/0x3d0 [ 39.451084] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.451895] kthread+0x24c/0x2d0 [ 39.452529] ret_from_fork+0x10/0x20 [ 39.453138] [ 39.453578] freed by task 286 on cpu 0 at 39.439344s (0.014221s ago): [ 39.454469] test_use_after_free_read+0xf0/0x248 [ 39.455227] kunit_try_run_case+0x14c/0x3d0 [ 39.455831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.456649] kthread+0x24c/0x2d0 [ 39.457146] ret_from_fork+0x10/0x20 [ 39.457809] [ 39.458264] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 39.459428] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.460086] Hardware name: linux,dummy-virt (DT) [ 39.460657] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 32.162372] ================================================================== [ 32.163385] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 32.164305] Read of size 8 at addr fff00000c671a2c0 by task kunit_try_catch/189 [ 32.165480] [ 32.165914] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 32.168426] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.169097] Hardware name: linux,dummy-virt (DT) [ 32.169692] Call trace: [ 32.170152] show_stack+0x20/0x38 (C) [ 32.171236] dump_stack_lvl+0x8c/0xd0 [ 32.171809] print_report+0x118/0x5e0 [ 32.172338] kasan_report+0xc8/0x118 [ 32.172995] __asan_report_load8_noabort+0x20/0x30 [ 32.173660] workqueue_uaf+0x480/0x4a8 [ 32.174611] kunit_try_run_case+0x14c/0x3d0 [ 32.175160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.175989] kthread+0x24c/0x2d0 [ 32.176624] ret_from_fork+0x10/0x20 [ 32.177257] [ 32.177636] Allocated by task 189: [ 32.178218] kasan_save_stack+0x3c/0x68 [ 32.178854] kasan_save_track+0x20/0x40 [ 32.179407] kasan_save_alloc_info+0x40/0x58 [ 32.180130] __kasan_kmalloc+0xd4/0xd8 [ 32.180750] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.181431] workqueue_uaf+0x13c/0x4a8 [ 32.183010] kunit_try_run_case+0x14c/0x3d0 [ 32.183640] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.184809] kthread+0x24c/0x2d0 [ 32.185547] ret_from_fork+0x10/0x20 [ 32.186318] [ 32.186985] Freed by task 49: [ 32.187600] kasan_save_stack+0x3c/0x68 [ 32.188358] kasan_save_track+0x20/0x40 [ 32.188958] kasan_save_free_info+0x4c/0x78 [ 32.189615] __kasan_slab_free+0x6c/0x98 [ 32.190221] kfree+0x114/0x3c8 [ 32.190746] workqueue_uaf_work+0x18/0x30 [ 32.191274] process_one_work+0x530/0xf98 [ 32.192621] worker_thread+0x614/0xf28 [ 32.193442] kthread+0x24c/0x2d0 [ 32.194201] ret_from_fork+0x10/0x20 [ 32.194897] [ 32.195351] Last potentially related work creation: [ 32.196169] kasan_save_stack+0x3c/0x68 [ 32.196876] kasan_record_aux_stack+0xb4/0xc8 [ 32.197575] __queue_work+0x65c/0xfd8 [ 32.198137] queue_work_on+0xbc/0xf8 [ 32.199367] workqueue_uaf+0x210/0x4a8 [ 32.199906] kunit_try_run_case+0x14c/0x3d0 [ 32.200576] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.201264] kthread+0x24c/0x2d0 [ 32.202091] ret_from_fork+0x10/0x20 [ 32.203075] [ 32.203431] The buggy address belongs to the object at fff00000c671a2c0 [ 32.203431] which belongs to the cache kmalloc-32 of size 32 [ 32.204626] The buggy address is located 0 bytes inside of [ 32.204626] freed 32-byte region [fff00000c671a2c0, fff00000c671a2e0) [ 32.205849] [ 32.206153] The buggy address belongs to the physical page: [ 32.207278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10671a [ 32.208764] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.209458] page_type: f5(slab) [ 32.210042] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 32.211112] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 32.211968] page dumped because: kasan: bad access detected [ 32.212995] [ 32.213360] Memory state around the buggy address: [ 32.213917] fff00000c671a180: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.215384] fff00000c671a200: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 32.216385] >fff00000c671a280: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc [ 32.217221] ^ [ 32.218050] fff00000c671a300: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.219004] fff00000c671a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.220160] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 32.079186] ================================================================== [ 32.080236] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 32.081141] Read of size 4 at addr fff00000c66cf640 by task swapper/0/0 [ 32.081874] [ 32.082413] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 32.083490] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.084631] Hardware name: linux,dummy-virt (DT) [ 32.085189] Call trace: [ 32.085737] show_stack+0x20/0x38 (C) [ 32.086718] dump_stack_lvl+0x8c/0xd0 [ 32.087303] print_report+0x118/0x5e0 [ 32.087926] kasan_report+0xc8/0x118 [ 32.088656] __asan_report_load4_noabort+0x20/0x30 [ 32.089250] rcu_uaf_reclaim+0x64/0x70 [ 32.089900] rcu_core+0x9f4/0x1e20 [ 32.090477] rcu_core_si+0x18/0x30 [ 32.091205] handle_softirqs+0x374/0xb20 [ 32.092309] __do_softirq+0x1c/0x28 [ 32.092863] ____do_softirq+0x18/0x30 [ 32.093646] call_on_irq_stack+0x24/0x58 [ 32.094706] do_softirq_own_stack+0x24/0x38 [ 32.095312] __irq_exit_rcu+0x1fc/0x318 [ 32.096054] irq_exit_rcu+0x1c/0x80 [ 32.096648] el1_interrupt+0x38/0x58 [ 32.097364] el1h_64_irq_handler+0x18/0x28 [ 32.098081] el1h_64_irq+0x6c/0x70 [ 32.099341] arch_local_irq_enable+0x4/0x8 (P) [ 32.100163] default_idle_call+0x6c/0x78 (L) [ 32.100909] do_idle+0x384/0x4e8 [ 32.101459] cpu_startup_entry+0x68/0x80 [ 32.101780] rest_init+0x160/0x188 [ 32.102039] start_kernel+0x308/0x3d0 [ 32.103203] __primary_switched+0x8c/0xa0 [ 32.103975] [ 32.104401] Allocated by task 187: [ 32.105046] kasan_save_stack+0x3c/0x68 [ 32.105673] kasan_save_track+0x20/0x40 [ 32.106594] kasan_save_alloc_info+0x40/0x58 [ 32.107268] __kasan_kmalloc+0xd4/0xd8 [ 32.107809] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.108496] rcu_uaf+0xb0/0x2d0 [ 32.109334] kunit_try_run_case+0x14c/0x3d0 [ 32.110083] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.110987] kthread+0x24c/0x2d0 [ 32.111252] ret_from_fork+0x10/0x20 [ 32.111502] [ 32.112117] Freed by task 0: [ 32.112845] kasan_save_stack+0x3c/0x68 [ 32.113559] kasan_save_track+0x20/0x40 [ 32.114250] kasan_save_free_info+0x4c/0x78 [ 32.115111] __kasan_slab_free+0x6c/0x98 [ 32.116006] kfree+0x114/0x3c8 [ 32.117098] rcu_uaf_reclaim+0x28/0x70 [ 32.117707] rcu_core+0x9f4/0x1e20 [ 32.118255] rcu_core_si+0x18/0x30 [ 32.118840] handle_softirqs+0x374/0xb20 [ 32.119425] __do_softirq+0x1c/0x28 [ 32.120199] [ 32.120387] Last potentially related work creation: [ 32.120699] kasan_save_stack+0x3c/0x68 [ 32.120968] kasan_record_aux_stack+0xb4/0xc8 [ 32.121246] __call_rcu_common.constprop.0+0x74/0xa10 [ 32.121613] call_rcu+0x18/0x30 [ 32.122685] rcu_uaf+0x14c/0x2d0 [ 32.123285] kunit_try_run_case+0x14c/0x3d0 [ 32.123971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.125706] kthread+0x24c/0x2d0 [ 32.126598] ret_from_fork+0x10/0x20 [ 32.127154] [ 32.127564] The buggy address belongs to the object at fff00000c66cf640 [ 32.127564] which belongs to the cache kmalloc-32 of size 32 [ 32.128686] The buggy address is located 0 bytes inside of [ 32.128686] freed 32-byte region [fff00000c66cf640, fff00000c66cf660) [ 32.129828] [ 32.130198] The buggy address belongs to the physical page: [ 32.130954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066cf [ 32.132919] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.133719] page_type: f5(slab) [ 32.134274] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 32.135757] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 32.136358] page dumped because: kasan: bad access detected [ 32.137124] [ 32.137477] Memory state around the buggy address: [ 32.138169] fff00000c66cf500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.139285] fff00000c66cf580: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.140297] >fff00000c66cf600: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.141232] ^ [ 32.141992] fff00000c66cf680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.143127] fff00000c66cf700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.144036] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 31.910624] ================================================================== [ 31.911938] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x600 [ 31.912728] Read of size 1 at addr fff00000c6779700 by task kunit_try_catch/185 [ 31.913536] [ 31.913976] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 31.915783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.916343] Hardware name: linux,dummy-virt (DT) [ 31.916983] Call trace: [ 31.917370] show_stack+0x20/0x38 (C) [ 31.917919] dump_stack_lvl+0x8c/0xd0 [ 31.918725] print_report+0x118/0x5e0 [ 31.919346] kasan_report+0xc8/0x118 [ 31.919795] __kasan_check_byte+0x54/0x70 [ 31.920504] ksize+0x30/0x88 [ 31.921061] ksize_uaf+0x168/0x600 [ 31.921688] kunit_try_run_case+0x14c/0x3d0 [ 31.922271] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.923576] kthread+0x24c/0x2d0 [ 31.924155] ret_from_fork+0x10/0x20 [ 31.924759] [ 31.925082] Allocated by task 185: [ 31.925594] kasan_save_stack+0x3c/0x68 [ 31.926215] kasan_save_track+0x20/0x40 [ 31.927108] kasan_save_alloc_info+0x40/0x58 [ 31.927699] __kasan_kmalloc+0xd4/0xd8 [ 31.928310] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.928937] ksize_uaf+0xb8/0x600 [ 31.929533] kunit_try_run_case+0x14c/0x3d0 [ 31.930139] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.931289] kthread+0x24c/0x2d0 [ 31.932003] ret_from_fork+0x10/0x20 [ 31.932379] [ 31.932768] Freed by task 185: [ 31.933295] kasan_save_stack+0x3c/0x68 [ 31.933857] kasan_save_track+0x20/0x40 [ 31.935054] kasan_save_free_info+0x4c/0x78 [ 31.935660] __kasan_slab_free+0x6c/0x98 [ 31.936328] kfree+0x114/0x3c8 [ 31.936826] ksize_uaf+0x11c/0x600 [ 31.937419] kunit_try_run_case+0x14c/0x3d0 [ 31.938105] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.938776] kthread+0x24c/0x2d0 [ 31.939359] ret_from_fork+0x10/0x20 [ 31.940314] [ 31.940671] The buggy address belongs to the object at fff00000c6779700 [ 31.940671] which belongs to the cache kmalloc-128 of size 128 [ 31.941911] The buggy address is located 0 bytes inside of [ 31.941911] freed 128-byte region [fff00000c6779700, fff00000c6779780) [ 31.943602] [ 31.943979] The buggy address belongs to the physical page: [ 31.944755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106779 [ 31.945679] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.946573] page_type: f5(slab) [ 31.947118] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.948452] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.949298] page dumped because: kasan: bad access detected [ 31.949929] [ 31.950343] Memory state around the buggy address: [ 31.950894] fff00000c6779600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 31.952108] fff00000c6779680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.953039] >fff00000c6779700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.953826] ^ [ 31.954322] fff00000c6779780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.955211] fff00000c6779800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.956077] ================================================================== [ 31.960054] ================================================================== [ 31.961013] BUG: KASAN: slab-use-after-free in ksize_uaf+0x59c/0x600 [ 31.961733] Read of size 1 at addr fff00000c6779700 by task kunit_try_catch/185 [ 31.963294] [ 31.963712] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 31.965294] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.966052] Hardware name: linux,dummy-virt (DT) [ 31.967272] Call trace: [ 31.967642] show_stack+0x20/0x38 (C) [ 31.968119] dump_stack_lvl+0x8c/0xd0 [ 31.968625] print_report+0x118/0x5e0 [ 31.969270] kasan_report+0xc8/0x118 [ 31.969873] __asan_report_load1_noabort+0x20/0x30 [ 31.970625] ksize_uaf+0x59c/0x600 [ 31.971230] kunit_try_run_case+0x14c/0x3d0 [ 31.971861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.972652] kthread+0x24c/0x2d0 [ 31.973493] ret_from_fork+0x10/0x20 [ 31.974155] [ 31.975038] Allocated by task 185: [ 31.975467] kasan_save_stack+0x3c/0x68 [ 31.976154] kasan_save_track+0x20/0x40 [ 31.977030] kasan_save_alloc_info+0x40/0x58 [ 31.977542] __kasan_kmalloc+0xd4/0xd8 [ 31.978156] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.979274] ksize_uaf+0xb8/0x600 [ 31.979825] kunit_try_run_case+0x14c/0x3d0 [ 31.980478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.981256] kthread+0x24c/0x2d0 [ 31.981834] ret_from_fork+0x10/0x20 [ 31.982721] [ 31.983095] Freed by task 185: [ 31.983538] kasan_save_stack+0x3c/0x68 [ 31.984289] kasan_save_track+0x20/0x40 [ 31.984982] kasan_save_free_info+0x4c/0x78 [ 31.985632] __kasan_slab_free+0x6c/0x98 [ 31.986452] kfree+0x114/0x3c8 [ 31.987560] ksize_uaf+0x11c/0x600 [ 31.988139] kunit_try_run_case+0x14c/0x3d0 [ 31.988881] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.989762] kthread+0x24c/0x2d0 [ 31.990549] ret_from_fork+0x10/0x20 [ 31.991045] [ 31.991411] The buggy address belongs to the object at fff00000c6779700 [ 31.991411] which belongs to the cache kmalloc-128 of size 128 [ 31.992587] The buggy address is located 0 bytes inside of [ 31.992587] freed 128-byte region [fff00000c6779700, fff00000c6779780) [ 31.994052] [ 31.994543] The buggy address belongs to the physical page: [ 31.995711] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106779 [ 31.996456] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.997304] page_type: f5(slab) [ 31.997863] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.999300] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.000213] page dumped because: kasan: bad access detected [ 32.000731] [ 32.001124] Memory state around the buggy address: [ 32.001827] fff00000c6779600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.003397] fff00000c6779680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.004391] >fff00000c6779700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.005290] ^ [ 32.005877] fff00000c6779780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.007628] fff00000c6779800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.008468] ================================================================== [ 32.011061] ================================================================== [ 32.012478] BUG: KASAN: slab-use-after-free in ksize_uaf+0x548/0x600 [ 32.013227] Read of size 1 at addr fff00000c6779778 by task kunit_try_catch/185 [ 32.014148] [ 32.014607] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 32.016580] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.017076] Hardware name: linux,dummy-virt (DT) [ 32.017383] Call trace: [ 32.017605] show_stack+0x20/0x38 (C) [ 32.017890] dump_stack_lvl+0x8c/0xd0 [ 32.018160] print_report+0x118/0x5e0 [ 32.018428] kasan_report+0xc8/0x118 [ 32.019042] __asan_report_load1_noabort+0x20/0x30 [ 32.019855] ksize_uaf+0x548/0x600 [ 32.020533] kunit_try_run_case+0x14c/0x3d0 [ 32.021282] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.022157] kthread+0x24c/0x2d0 [ 32.022890] ret_from_fork+0x10/0x20 [ 32.023642] [ 32.023982] Allocated by task 185: [ 32.024479] kasan_save_stack+0x3c/0x68 [ 32.025049] kasan_save_track+0x20/0x40 [ 32.025665] kasan_save_alloc_info+0x40/0x58 [ 32.026288] __kasan_kmalloc+0xd4/0xd8 [ 32.026864] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.027554] ksize_uaf+0xb8/0x600 [ 32.028028] kunit_try_run_case+0x14c/0x3d0 [ 32.028694] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.029333] kthread+0x24c/0x2d0 [ 32.029941] ret_from_fork+0x10/0x20 [ 32.030548] [ 32.030921] Freed by task 185: [ 32.031439] kasan_save_stack+0x3c/0x68 [ 32.032050] kasan_save_track+0x20/0x40 [ 32.032690] kasan_save_free_info+0x4c/0x78 [ 32.033302] __kasan_slab_free+0x6c/0x98 [ 32.033802] kfree+0x114/0x3c8 [ 32.034353] ksize_uaf+0x11c/0x600 [ 32.034927] kunit_try_run_case+0x14c/0x3d0 [ 32.035617] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.036421] kthread+0x24c/0x2d0 [ 32.036903] ret_from_fork+0x10/0x20 [ 32.037495] [ 32.037878] The buggy address belongs to the object at fff00000c6779700 [ 32.037878] which belongs to the cache kmalloc-128 of size 128 [ 32.038943] The buggy address is located 120 bytes inside of [ 32.038943] freed 128-byte region [fff00000c6779700, fff00000c6779780) [ 32.040367] [ 32.040764] The buggy address belongs to the physical page: [ 32.041431] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106779 [ 32.042197] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.043095] page_type: f5(slab) [ 32.043666] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.044653] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.045501] page dumped because: kasan: bad access detected [ 32.046147] [ 32.046532] Memory state around the buggy address: [ 32.047208] fff00000c6779600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.048048] fff00000c6779680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.048751] >fff00000c6779700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.049653] ^ [ 32.050405] fff00000c6779780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.051248] fff00000c6779800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.052111] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 39.023651] ================================================================== [ 39.024578] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 39.024578] [ 39.025375] Out-of-bounds read at 0x000000007d404fa9 (32B right of kfence-#145): [ 39.026298] test_out_of_bounds_read+0x1c8/0x3e0 [ 39.026956] test_out_of_bounds_read+0x198/0x3e0 [ 39.027686] kunit_try_run_case+0x14c/0x3d0 [ 39.028255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.029005] kthread+0x24c/0x2d0 [ 39.029543] ret_from_fork+0x10/0x20 [ 39.030164] [ 39.030545] kfence-#145: 0x00000000fb0f0ad4-0x0000000011ac27bd, size=32, cache=test [ 39.030545] [ 39.031370] allocated by task 278 on cpu 1 at 39.023454s (0.007903s ago): [ 39.032323] test_alloc+0x22c/0x620 [ 39.032938] test_out_of_bounds_read+0x198/0x3e0 [ 39.033588] kunit_try_run_case+0x14c/0x3d0 [ 39.034258] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.034883] kthread+0x24c/0x2d0 [ 39.035456] ret_from_fork+0x10/0x20 [ 39.036037] [ 39.036450] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 39.037582] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.038101] Hardware name: linux,dummy-virt (DT) [ 39.038790] ================================================================== [ 38.815181] ================================================================== [ 38.816020] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 38.816020] [ 38.816950] Out-of-bounds read at 0x00000000e1dd7fbc (1B left of kfence-#143): [ 38.817755] test_out_of_bounds_read+0x114/0x3e0 [ 38.818493] test_out_of_bounds_read+0xdc/0x3e0 [ 38.819171] kunit_try_run_case+0x14c/0x3d0 [ 38.819785] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.820578] kthread+0x24c/0x2d0 [ 38.821179] ret_from_fork+0x10/0x20 [ 38.821765] [ 38.822084] kfence-#143: 0x0000000050a4a2c6-0x0000000033ebf5c3, size=32, cache=test [ 38.822084] [ 38.823211] allocated by task 278 on cpu 1 at 38.815008s (0.008192s ago): [ 38.824258] test_alloc+0x22c/0x620 [ 38.824887] test_out_of_bounds_read+0xdc/0x3e0 [ 38.825598] kunit_try_run_case+0x14c/0x3d0 [ 38.826241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.826862] kthread+0x24c/0x2d0 [ 38.827451] ret_from_fork+0x10/0x20 [ 38.828059] [ 38.828485] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 38.829434] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.830076] Hardware name: linux,dummy-virt (DT) [ 38.830778] ================================================================== [ 38.711533] ================================================================== [ 38.712433] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 38.712433] [ 38.713210] Out-of-bounds read at 0x000000001b533283 (32B right of kfence-#142): [ 38.714145] test_out_of_bounds_read+0x1c8/0x3e0 [ 38.714832] test_out_of_bounds_read+0x198/0x3e0 [ 38.715417] kunit_try_run_case+0x14c/0x3d0 [ 38.716100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.716903] kthread+0x24c/0x2d0 [ 38.717506] ret_from_fork+0x10/0x20 [ 38.718084] [ 38.718478] kfence-#142: 0x00000000846c5d91-0x00000000611b0d29, size=32, cache=kmalloc-32 [ 38.718478] [ 38.719599] allocated by task 276 on cpu 1 at 38.711232s (0.008354s ago): [ 38.720561] test_alloc+0x298/0x620 [ 38.721171] test_out_of_bounds_read+0x198/0x3e0 [ 38.721736] kunit_try_run_case+0x14c/0x3d0 [ 38.722404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.723219] kthread+0x24c/0x2d0 [ 38.723737] ret_from_fork+0x10/0x20 [ 38.724278] [ 38.724718] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 38.725894] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.726493] Hardware name: linux,dummy-virt (DT) [ 38.727046] ================================================================== [ 38.399473] ================================================================== [ 38.400334] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 38.400334] [ 38.401317] Out-of-bounds read at 0x00000000dd7a9143 (1B left of kfence-#139): [ 38.402742] test_out_of_bounds_read+0x114/0x3e0 [ 38.403423] test_out_of_bounds_read+0xdc/0x3e0 [ 38.404039] kunit_try_run_case+0x14c/0x3d0 [ 38.404687] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.405379] kthread+0x24c/0x2d0 [ 38.405903] ret_from_fork+0x10/0x20 [ 38.406410] [ 38.406822] kfence-#139: 0x000000002f110a13-0x0000000032b6379d, size=32, cache=kmalloc-32 [ 38.406822] [ 38.407780] allocated by task 276 on cpu 1 at 38.399013s (0.008755s ago): [ 38.408738] test_alloc+0x298/0x620 [ 38.409294] test_out_of_bounds_read+0xdc/0x3e0 [ 38.409892] kunit_try_run_case+0x14c/0x3d0 [ 38.410585] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.411370] kthread+0x24c/0x2d0 [ 38.411994] ret_from_fork+0x10/0x20 [ 38.412584] [ 38.412968] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 38.414044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.414686] Hardware name: linux,dummy-virt (DT) [ 38.415296] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-kmalloc_node_oob_right
[ 29.909338] ================================================================== [ 29.910706] BUG: KFENCE: out-of-bounds read in kmalloc_node_oob_right+0x160/0x330 [ 29.910706] [ 29.911683] Out-of-bounds read at 0x00000000712d1165 (4096B right of kfence-#97): [ 29.913058] kmalloc_node_oob_right+0x160/0x330 [ 29.913742] kmalloc_node_oob_right+0xbc/0x330 [ 29.914358] kunit_try_run_case+0x14c/0x3d0 [ 29.915003] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.915726] kthread+0x24c/0x2d0 [ 29.916306] ret_from_fork+0x10/0x20 [ 29.916811] [ 29.917558] kfence-#97: 0x00000000a6f1d1db-0x00000000abefa2ae, size=4096, cache=kmalloc-4k [ 29.917558] [ 29.918950] allocated by task 129 on cpu 0 at 29.907574s (0.011220s ago): [ 29.920480] kmalloc_node_oob_right+0xbc/0x330 [ 29.921107] kunit_try_run_case+0x14c/0x3d0 [ 29.921693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.922371] kthread+0x24c/0x2d0 [ 29.922949] ret_from_fork+0x10/0x20 [ 29.923642] [ 29.924118] CPU: 0 UID: 0 PID: 129 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 29.925234] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.925852] Hardware name: linux,dummy-virt (DT) [ 29.926426] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 38.149292] ================================================================== [ 38.149851] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 38.150780] Write of size 121 at addr fff00000c66d6400 by task kunit_try_catch/274 [ 38.151687] [ 38.152121] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 38.153273] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.153910] Hardware name: linux,dummy-virt (DT) [ 38.154499] Call trace: [ 38.154996] show_stack+0x20/0x38 (C) [ 38.155646] dump_stack_lvl+0x8c/0xd0 [ 38.156352] print_report+0x118/0x5e0 [ 38.156985] kasan_report+0xc8/0x118 [ 38.157604] kasan_check_range+0x100/0x1a8 [ 38.158283] __kasan_check_write+0x20/0x30 [ 38.158930] strncpy_from_user+0x3c/0x2a0 [ 38.159500] copy_user_test_oob+0x5c0/0xec0 [ 38.160144] kunit_try_run_case+0x14c/0x3d0 [ 38.160838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.161650] kthread+0x24c/0x2d0 [ 38.162243] ret_from_fork+0x10/0x20 [ 38.162761] [ 38.163138] Allocated by task 274: [ 38.163700] kasan_save_stack+0x3c/0x68 [ 38.164194] kasan_save_track+0x20/0x40 [ 38.164847] kasan_save_alloc_info+0x40/0x58 [ 38.165358] __kasan_kmalloc+0xd4/0xd8 [ 38.166027] __kmalloc_noprof+0x188/0x4c8 [ 38.166581] kunit_kmalloc_array+0x34/0x88 [ 38.167237] copy_user_test_oob+0xac/0xec0 [ 38.167805] kunit_try_run_case+0x14c/0x3d0 [ 38.168405] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.169174] kthread+0x24c/0x2d0 [ 38.169772] ret_from_fork+0x10/0x20 [ 38.170366] [ 38.170722] The buggy address belongs to the object at fff00000c66d6400 [ 38.170722] which belongs to the cache kmalloc-128 of size 128 [ 38.171917] The buggy address is located 0 bytes inside of [ 38.171917] allocated 120-byte region [fff00000c66d6400, fff00000c66d6478) [ 38.172985] [ 38.173354] The buggy address belongs to the physical page: [ 38.174098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066d6 [ 38.175061] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.175757] page_type: f5(slab) [ 38.176323] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 38.177292] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 38.178124] page dumped because: kasan: bad access detected [ 38.178891] [ 38.179251] Memory state around the buggy address: [ 38.179935] fff00000c66d6300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.180649] fff00000c66d6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.181420] >fff00000c66d6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 38.182332] ^ [ 38.183064] fff00000c66d6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.183912] fff00000c66d6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.184666] ================================================================== [ 38.186880] ================================================================== [ 38.187776] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 38.188407] Write of size 1 at addr fff00000c66d6478 by task kunit_try_catch/274 [ 38.189372] [ 38.189862] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 38.190970] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.191597] Hardware name: linux,dummy-virt (DT) [ 38.192300] Call trace: [ 38.192823] show_stack+0x20/0x38 (C) [ 38.193472] dump_stack_lvl+0x8c/0xd0 [ 38.194187] print_report+0x118/0x5e0 [ 38.194783] kasan_report+0xc8/0x118 [ 38.195471] __asan_report_store1_noabort+0x20/0x30 [ 38.196257] strncpy_from_user+0x270/0x2a0 [ 38.196983] copy_user_test_oob+0x5c0/0xec0 [ 38.197732] kunit_try_run_case+0x14c/0x3d0 [ 38.198577] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.199374] kthread+0x24c/0x2d0 [ 38.200013] ret_from_fork+0x10/0x20 [ 38.200661] [ 38.201017] Allocated by task 274: [ 38.201613] kasan_save_stack+0x3c/0x68 [ 38.202228] kasan_save_track+0x20/0x40 [ 38.202868] kasan_save_alloc_info+0x40/0x58 [ 38.203498] __kasan_kmalloc+0xd4/0xd8 [ 38.204145] __kmalloc_noprof+0x188/0x4c8 [ 38.204776] kunit_kmalloc_array+0x34/0x88 [ 38.205421] copy_user_test_oob+0xac/0xec0 [ 38.206077] kunit_try_run_case+0x14c/0x3d0 [ 38.206650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.207419] kthread+0x24c/0x2d0 [ 38.207995] ret_from_fork+0x10/0x20 [ 38.208633] [ 38.209008] The buggy address belongs to the object at fff00000c66d6400 [ 38.209008] which belongs to the cache kmalloc-128 of size 128 [ 38.210334] The buggy address is located 0 bytes to the right of [ 38.210334] allocated 120-byte region [fff00000c66d6400, fff00000c66d6478) [ 38.211718] [ 38.212156] The buggy address belongs to the physical page: [ 38.212826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066d6 [ 38.213762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.214540] page_type: f5(slab) [ 38.215097] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 38.215909] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 38.216993] page dumped because: kasan: bad access detected [ 38.217659] [ 38.218060] Memory state around the buggy address: [ 38.218722] fff00000c66d6300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.219621] fff00000c66d6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.220560] >fff00000c66d6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 38.221384] ^ [ 38.222179] fff00000c66d6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.223056] fff00000c66d6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.223895] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 38.019225] ================================================================== [ 38.020018] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0 [ 38.021437] Read of size 121 at addr fff00000c66d6400 by task kunit_try_catch/274 [ 38.022178] [ 38.022612] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 38.023694] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.024297] Hardware name: linux,dummy-virt (DT) [ 38.024805] Call trace: [ 38.025262] show_stack+0x20/0x38 (C) [ 38.025948] dump_stack_lvl+0x8c/0xd0 [ 38.026480] print_report+0x118/0x5e0 [ 38.027149] kasan_report+0xc8/0x118 [ 38.027802] kasan_check_range+0x100/0x1a8 [ 38.028415] __kasan_check_read+0x20/0x30 [ 38.029059] copy_user_test_oob+0x3c8/0xec0 [ 38.029719] kunit_try_run_case+0x14c/0x3d0 [ 38.030317] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.031112] kthread+0x24c/0x2d0 [ 38.031723] ret_from_fork+0x10/0x20 [ 38.032275] [ 38.032660] Allocated by task 274: [ 38.033148] kasan_save_stack+0x3c/0x68 [ 38.033781] kasan_save_track+0x20/0x40 [ 38.034269] kasan_save_alloc_info+0x40/0x58 [ 38.034947] __kasan_kmalloc+0xd4/0xd8 [ 38.035494] __kmalloc_noprof+0x188/0x4c8 [ 38.036086] kunit_kmalloc_array+0x34/0x88 [ 38.036751] copy_user_test_oob+0xac/0xec0 [ 38.037281] kunit_try_run_case+0x14c/0x3d0 [ 38.037968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.038751] kthread+0x24c/0x2d0 [ 38.039305] ret_from_fork+0x10/0x20 [ 38.039875] [ 38.040244] The buggy address belongs to the object at fff00000c66d6400 [ 38.040244] which belongs to the cache kmalloc-128 of size 128 [ 38.041406] The buggy address is located 0 bytes inside of [ 38.041406] allocated 120-byte region [fff00000c66d6400, fff00000c66d6478) [ 38.042931] [ 38.043239] The buggy address belongs to the physical page: [ 38.043960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066d6 [ 38.044850] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.045644] page_type: f5(slab) [ 38.046142] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 38.047027] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 38.047910] page dumped because: kasan: bad access detected [ 38.048537] [ 38.048873] Memory state around the buggy address: [ 38.049563] fff00000c66d6300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.050333] fff00000c66d6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.051193] >fff00000c66d6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 38.051964] ^ [ 38.052749] fff00000c66d6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.053561] fff00000c66d6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.054353] ================================================================== [ 37.885145] ================================================================== [ 37.886655] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0 [ 37.887473] Write of size 121 at addr fff00000c66d6400 by task kunit_try_catch/274 [ 37.888403] [ 37.889549] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.891082] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.891957] Hardware name: linux,dummy-virt (DT) [ 37.892887] Call trace: [ 37.893359] show_stack+0x20/0x38 (C) [ 37.894033] dump_stack_lvl+0x8c/0xd0 [ 37.894743] print_report+0x118/0x5e0 [ 37.895285] kasan_report+0xc8/0x118 [ 37.895995] kasan_check_range+0x100/0x1a8 [ 37.896745] __kasan_check_write+0x20/0x30 [ 37.897483] copy_user_test_oob+0x234/0xec0 [ 37.898324] kunit_try_run_case+0x14c/0x3d0 [ 37.899137] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.900002] kthread+0x24c/0x2d0 [ 37.900655] ret_from_fork+0x10/0x20 [ 37.901335] [ 37.901736] Allocated by task 274: [ 37.902260] kasan_save_stack+0x3c/0x68 [ 37.902993] kasan_save_track+0x20/0x40 [ 37.903654] kasan_save_alloc_info+0x40/0x58 [ 37.904348] __kasan_kmalloc+0xd4/0xd8 [ 37.904910] __kmalloc_noprof+0x188/0x4c8 [ 37.905195] kunit_kmalloc_array+0x34/0x88 [ 37.905461] copy_user_test_oob+0xac/0xec0 [ 37.905936] kunit_try_run_case+0x14c/0x3d0 [ 37.906688] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.907501] kthread+0x24c/0x2d0 [ 37.908057] ret_from_fork+0x10/0x20 [ 37.908664] [ 37.909006] The buggy address belongs to the object at fff00000c66d6400 [ 37.909006] which belongs to the cache kmalloc-128 of size 128 [ 37.910339] The buggy address is located 0 bytes inside of [ 37.910339] allocated 120-byte region [fff00000c66d6400, fff00000c66d6478) [ 37.911716] [ 37.912116] The buggy address belongs to the physical page: [ 37.912861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066d6 [ 37.913717] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.914712] page_type: f5(slab) [ 37.915295] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.916182] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.917055] page dumped because: kasan: bad access detected [ 37.917846] [ 37.918238] Memory state around the buggy address: [ 37.918837] fff00000c66d6300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.919810] fff00000c66d6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.920711] >fff00000c66d6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.921491] ^ [ 37.922282] fff00000c66d6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.923190] fff00000c66d6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.924066] ================================================================== [ 38.056174] ================================================================== [ 38.057487] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0 [ 38.059244] Write of size 121 at addr fff00000c66d6400 by task kunit_try_catch/274 [ 38.060125] [ 38.060581] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 38.061763] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.062327] Hardware name: linux,dummy-virt (DT) [ 38.062961] Call trace: [ 38.063461] show_stack+0x20/0x38 (C) [ 38.064074] dump_stack_lvl+0x8c/0xd0 [ 38.064765] print_report+0x118/0x5e0 [ 38.065399] kasan_report+0xc8/0x118 [ 38.066114] kasan_check_range+0x100/0x1a8 [ 38.066730] __kasan_check_write+0x20/0x30 [ 38.067471] copy_user_test_oob+0x434/0xec0 [ 38.068143] kunit_try_run_case+0x14c/0x3d0 [ 38.068857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.069695] kthread+0x24c/0x2d0 [ 38.070286] ret_from_fork+0x10/0x20 [ 38.070921] [ 38.071286] Allocated by task 274: [ 38.071882] kasan_save_stack+0x3c/0x68 [ 38.072425] kasan_save_track+0x20/0x40 [ 38.073060] kasan_save_alloc_info+0x40/0x58 [ 38.073779] __kasan_kmalloc+0xd4/0xd8 [ 38.074368] __kmalloc_noprof+0x188/0x4c8 [ 38.075041] kunit_kmalloc_array+0x34/0x88 [ 38.075592] copy_user_test_oob+0xac/0xec0 [ 38.076307] kunit_try_run_case+0x14c/0x3d0 [ 38.076924] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.077705] kthread+0x24c/0x2d0 [ 38.078253] ret_from_fork+0x10/0x20 [ 38.078902] [ 38.079233] The buggy address belongs to the object at fff00000c66d6400 [ 38.079233] which belongs to the cache kmalloc-128 of size 128 [ 38.080566] The buggy address is located 0 bytes inside of [ 38.080566] allocated 120-byte region [fff00000c66d6400, fff00000c66d6478) [ 38.081819] [ 38.082248] The buggy address belongs to the physical page: [ 38.082954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066d6 [ 38.083887] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.084749] page_type: f5(slab) [ 38.085584] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 38.086240] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 38.086958] page dumped because: kasan: bad access detected [ 38.087457] [ 38.090354] Memory state around the buggy address: [ 38.091870] fff00000c66d6300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.093617] fff00000c66d6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.095485] >fff00000c66d6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 38.097400] ^ [ 38.099218] fff00000c66d6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.101033] fff00000c66d6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.102807] ================================================================== [ 37.983146] ================================================================== [ 37.983867] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0 [ 37.984644] Write of size 121 at addr fff00000c66d6400 by task kunit_try_catch/274 [ 37.985373] [ 37.985864] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.987333] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.987724] Hardware name: linux,dummy-virt (DT) [ 37.988388] Call trace: [ 37.988852] show_stack+0x20/0x38 (C) [ 37.989503] dump_stack_lvl+0x8c/0xd0 [ 37.990155] print_report+0x118/0x5e0 [ 37.990746] kasan_report+0xc8/0x118 [ 37.991391] kasan_check_range+0x100/0x1a8 [ 37.991954] __kasan_check_write+0x20/0x30 [ 37.992655] copy_user_test_oob+0x35c/0xec0 [ 37.993181] kunit_try_run_case+0x14c/0x3d0 [ 37.993892] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.994612] kthread+0x24c/0x2d0 [ 37.995224] ret_from_fork+0x10/0x20 [ 37.995910] [ 37.996257] Allocated by task 274: [ 37.996719] kasan_save_stack+0x3c/0x68 [ 37.997326] kasan_save_track+0x20/0x40 [ 37.997950] kasan_save_alloc_info+0x40/0x58 [ 37.998463] __kasan_kmalloc+0xd4/0xd8 [ 37.999104] __kmalloc_noprof+0x188/0x4c8 [ 37.999705] kunit_kmalloc_array+0x34/0x88 [ 38.000356] copy_user_test_oob+0xac/0xec0 [ 38.000992] kunit_try_run_case+0x14c/0x3d0 [ 38.001660] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.002298] kthread+0x24c/0x2d0 [ 38.002888] ret_from_fork+0x10/0x20 [ 38.003348] [ 38.003731] The buggy address belongs to the object at fff00000c66d6400 [ 38.003731] which belongs to the cache kmalloc-128 of size 128 [ 38.004906] The buggy address is located 0 bytes inside of [ 38.004906] allocated 120-byte region [fff00000c66d6400, fff00000c66d6478) [ 38.006204] [ 38.006603] The buggy address belongs to the physical page: [ 38.007277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066d6 [ 38.008278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.009010] page_type: f5(slab) [ 38.009583] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 38.010406] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 38.011289] page dumped because: kasan: bad access detected [ 38.011957] [ 38.012302] Memory state around the buggy address: [ 38.012826] fff00000c66d6300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.013757] fff00000c66d6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.014623] >fff00000c66d6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 38.015485] ^ [ 38.016228] fff00000c66d6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.017096] fff00000c66d6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.017893] ================================================================== [ 37.933046] ================================================================== [ 37.933819] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0 [ 37.934618] Read of size 121 at addr fff00000c66d6400 by task kunit_try_catch/274 [ 37.936095] [ 37.936432] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.937541] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.938146] Hardware name: linux,dummy-virt (DT) [ 37.938878] Call trace: [ 37.939229] show_stack+0x20/0x38 (C) [ 37.939739] dump_stack_lvl+0x8c/0xd0 [ 37.940906] print_report+0x118/0x5e0 [ 37.941548] kasan_report+0xc8/0x118 [ 37.942171] kasan_check_range+0x100/0x1a8 [ 37.942939] __kasan_check_read+0x20/0x30 [ 37.944155] copy_user_test_oob+0x728/0xec0 [ 37.945096] kunit_try_run_case+0x14c/0x3d0 [ 37.946001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.947042] kthread+0x24c/0x2d0 [ 37.947971] ret_from_fork+0x10/0x20 [ 37.948878] [ 37.949206] Allocated by task 274: [ 37.949731] kasan_save_stack+0x3c/0x68 [ 37.950324] kasan_save_track+0x20/0x40 [ 37.950887] kasan_save_alloc_info+0x40/0x58 [ 37.951863] __kasan_kmalloc+0xd4/0xd8 [ 37.952483] __kmalloc_noprof+0x188/0x4c8 [ 37.953090] kunit_kmalloc_array+0x34/0x88 [ 37.953639] copy_user_test_oob+0xac/0xec0 [ 37.954711] kunit_try_run_case+0x14c/0x3d0 [ 37.955366] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.955976] kthread+0x24c/0x2d0 [ 37.956471] ret_from_fork+0x10/0x20 [ 37.957090] [ 37.957459] The buggy address belongs to the object at fff00000c66d6400 [ 37.957459] which belongs to the cache kmalloc-128 of size 128 [ 37.958883] The buggy address is located 0 bytes inside of [ 37.958883] allocated 120-byte region [fff00000c66d6400, fff00000c66d6478) [ 37.960169] [ 37.960770] The buggy address belongs to the physical page: [ 37.961740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066d6 [ 37.962929] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.963592] page_type: f5(slab) [ 37.964057] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.964798] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.965773] page dumped because: kasan: bad access detected [ 37.966598] [ 37.966977] Memory state around the buggy address: [ 37.968125] fff00000c66d6300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.968963] fff00000c66d6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.970023] >fff00000c66d6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.971064] ^ [ 37.972194] fff00000c66d6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.973129] fff00000c66d6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.974121] ================================================================== [ 38.106571] ================================================================== [ 38.109657] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0 [ 38.111620] Read of size 121 at addr fff00000c66d6400 by task kunit_try_catch/274 [ 38.113888] [ 38.114748] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 38.116049] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.117332] Hardware name: linux,dummy-virt (DT) [ 38.117977] Call trace: [ 38.118429] show_stack+0x20/0x38 (C) [ 38.119007] dump_stack_lvl+0x8c/0xd0 [ 38.119677] print_report+0x118/0x5e0 [ 38.120188] kasan_report+0xc8/0x118 [ 38.120846] kasan_check_range+0x100/0x1a8 [ 38.121434] __kasan_check_read+0x20/0x30 [ 38.122052] copy_user_test_oob+0x4a0/0xec0 [ 38.122729] kunit_try_run_case+0x14c/0x3d0 [ 38.123346] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.124162] kthread+0x24c/0x2d0 [ 38.124738] ret_from_fork+0x10/0x20 [ 38.125315] [ 38.125667] Allocated by task 274: [ 38.126158] kasan_save_stack+0x3c/0x68 [ 38.126790] kasan_save_track+0x20/0x40 [ 38.127373] kasan_save_alloc_info+0x40/0x58 [ 38.128015] __kasan_kmalloc+0xd4/0xd8 [ 38.128556] __kmalloc_noprof+0x188/0x4c8 [ 38.129164] kunit_kmalloc_array+0x34/0x88 [ 38.129816] copy_user_test_oob+0xac/0xec0 [ 38.130454] kunit_try_run_case+0x14c/0x3d0 [ 38.131022] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.131822] kthread+0x24c/0x2d0 [ 38.132387] ret_from_fork+0x10/0x20 [ 38.133001] [ 38.133373] The buggy address belongs to the object at fff00000c66d6400 [ 38.133373] which belongs to the cache kmalloc-128 of size 128 [ 38.134400] The buggy address is located 0 bytes inside of [ 38.134400] allocated 120-byte region [fff00000c66d6400, fff00000c66d6478) [ 38.135876] [ 38.136252] The buggy address belongs to the physical page: [ 38.136915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066d6 [ 38.137674] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.138552] page_type: f5(slab) [ 38.139116] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 38.140058] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 38.140855] page dumped because: kasan: bad access detected [ 38.141558] [ 38.141913] Memory state around the buggy address: [ 38.142603] fff00000c66d6300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.143352] fff00000c66d6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.144247] >fff00000c66d6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 38.144991] ^ [ 38.145830] fff00000c66d6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.146581] fff00000c66d6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.147374] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 37.812347] ================================================================== [ 37.813264] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 37.814005] Write of size 8 at addr fff00000c66d6278 by task kunit_try_catch/270 [ 37.815483] [ 37.815870] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.817264] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.818030] Hardware name: linux,dummy-virt (DT) [ 37.818655] Call trace: [ 37.819554] show_stack+0x20/0x38 (C) [ 37.820365] dump_stack_lvl+0x8c/0xd0 [ 37.820969] print_report+0x118/0x5e0 [ 37.821263] kasan_report+0xc8/0x118 [ 37.821563] kasan_check_range+0x100/0x1a8 [ 37.822094] __kasan_check_write+0x20/0x30 [ 37.822827] copy_to_kernel_nofault+0x8c/0x250 [ 37.823572] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 37.824681] kunit_try_run_case+0x14c/0x3d0 [ 37.825381] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.826195] kthread+0x24c/0x2d0 [ 37.826828] ret_from_fork+0x10/0x20 [ 37.827468] [ 37.827811] Allocated by task 270: [ 37.828373] kasan_save_stack+0x3c/0x68 [ 37.828969] kasan_save_track+0x20/0x40 [ 37.829884] kasan_save_alloc_info+0x40/0x58 [ 37.830499] __kasan_kmalloc+0xd4/0xd8 [ 37.831241] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.832014] copy_to_kernel_nofault_oob+0xc8/0x418 [ 37.832787] kunit_try_run_case+0x14c/0x3d0 [ 37.833527] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.834431] kthread+0x24c/0x2d0 [ 37.835072] ret_from_fork+0x10/0x20 [ 37.835761] [ 37.836438] The buggy address belongs to the object at fff00000c66d6200 [ 37.836438] which belongs to the cache kmalloc-128 of size 128 [ 37.837954] The buggy address is located 0 bytes to the right of [ 37.837954] allocated 120-byte region [fff00000c66d6200, fff00000c66d6278) [ 37.839236] [ 37.839630] The buggy address belongs to the physical page: [ 37.840370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066d6 [ 37.842055] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.843664] page_type: f5(slab) [ 37.844164] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.845129] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.846504] page dumped because: kasan: bad access detected [ 37.847136] [ 37.847442] Memory state around the buggy address: [ 37.848113] fff00000c66d6100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 37.849448] fff00000c66d6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.850749] >fff00000c66d6200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.851629] ^ [ 37.852302] fff00000c66d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.852844] fff00000c66d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.853775] ================================================================== [ 37.768503] ================================================================== [ 37.770130] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 37.771243] Read of size 8 at addr fff00000c66d6278 by task kunit_try_catch/270 [ 37.772106] [ 37.772462] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.773683] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.774396] Hardware name: linux,dummy-virt (DT) [ 37.775359] Call trace: [ 37.775878] show_stack+0x20/0x38 (C) [ 37.776723] dump_stack_lvl+0x8c/0xd0 [ 37.777496] print_report+0x118/0x5e0 [ 37.778208] kasan_report+0xc8/0x118 [ 37.779038] __asan_report_load8_noabort+0x20/0x30 [ 37.779929] copy_to_kernel_nofault+0x204/0x250 [ 37.780841] copy_to_kernel_nofault_oob+0x158/0x418 [ 37.781745] kunit_try_run_case+0x14c/0x3d0 [ 37.782687] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.783401] kthread+0x24c/0x2d0 [ 37.784121] ret_from_fork+0x10/0x20 [ 37.784808] [ 37.785204] Allocated by task 270: [ 37.785717] kasan_save_stack+0x3c/0x68 [ 37.786735] kasan_save_track+0x20/0x40 [ 37.787836] kasan_save_alloc_info+0x40/0x58 [ 37.788677] __kasan_kmalloc+0xd4/0xd8 [ 37.789200] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.789841] copy_to_kernel_nofault_oob+0xc8/0x418 [ 37.791050] kunit_try_run_case+0x14c/0x3d0 [ 37.791725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.792390] kthread+0x24c/0x2d0 [ 37.793366] ret_from_fork+0x10/0x20 [ 37.793938] [ 37.794443] The buggy address belongs to the object at fff00000c66d6200 [ 37.794443] which belongs to the cache kmalloc-128 of size 128 [ 37.795655] The buggy address is located 0 bytes to the right of [ 37.795655] allocated 120-byte region [fff00000c66d6200, fff00000c66d6278) [ 37.797155] [ 37.797477] The buggy address belongs to the physical page: [ 37.798299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066d6 [ 37.799686] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.800636] page_type: f5(slab) [ 37.801247] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.802160] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.803422] page dumped because: kasan: bad access detected [ 37.804130] [ 37.804554] Memory state around the buggy address: [ 37.805220] fff00000c66d6100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 37.806065] fff00000c66d6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.806996] >fff00000c66d6200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.808266] ^ [ 37.809191] fff00000c66d6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.809835] fff00000c66d6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.810841] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 37.679042] ================================================================== [ 37.679733] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 37.682019] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/258 [ 37.685142] [ 37.685488] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.687732] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.690384] Hardware name: linux,dummy-virt (DT) [ 37.692183] Call trace: [ 37.692708] show_stack+0x20/0x38 (C) [ 37.693369] dump_stack_lvl+0x8c/0xd0 [ 37.694060] print_report+0x2fc/0x5e0 [ 37.694625] kasan_report+0xc8/0x118 [ 37.695283] __asan_report_load1_noabort+0x20/0x30 [ 37.696355] vmalloc_oob+0x51c/0x5d0 [ 37.696872] kunit_try_run_case+0x14c/0x3d0 [ 37.697606] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.698325] kthread+0x24c/0x2d0 [ 37.698961] ret_from_fork+0x10/0x20 [ 37.699499] [ 37.699914] The buggy address belongs to the virtual mapping at [ 37.699914] [ffff80008010b000, ffff80008010d000) created by: [ 37.699914] vmalloc_oob+0x98/0x5d0 [ 37.701723] [ 37.702071] The buggy address belongs to the physical page: [ 37.702901] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10696b [ 37.703833] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.704752] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 37.705646] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 37.706681] page dumped because: kasan: bad access detected [ 37.707366] [ 37.707764] Memory state around the buggy address: [ 37.708668] ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.709413] ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.710808] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 37.711638] ^ [ 37.712532] ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 37.713409] ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 37.714253] ================================================================== [ 37.647532] ================================================================== [ 37.648474] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 37.648878] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/258 [ 37.649245] [ 37.649426] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.651105] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.652635] Hardware name: linux,dummy-virt (DT) [ 37.653446] Call trace: [ 37.653912] show_stack+0x20/0x38 (C) [ 37.654650] dump_stack_lvl+0x8c/0xd0 [ 37.655818] print_report+0x2fc/0x5e0 [ 37.656596] kasan_report+0xc8/0x118 [ 37.657266] __asan_report_load1_noabort+0x20/0x30 [ 37.658135] vmalloc_oob+0x578/0x5d0 [ 37.658970] kunit_try_run_case+0x14c/0x3d0 [ 37.659669] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.660367] kthread+0x24c/0x2d0 [ 37.661048] ret_from_fork+0x10/0x20 [ 37.661651] [ 37.662090] The buggy address belongs to the virtual mapping at [ 37.662090] [ffff80008010b000, ffff80008010d000) created by: [ 37.662090] vmalloc_oob+0x98/0x5d0 [ 37.663926] [ 37.664276] The buggy address belongs to the physical page: [ 37.664834] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10696b [ 37.666465] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.667547] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 37.668569] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 37.669610] page dumped because: kasan: bad access detected [ 37.670350] [ 37.670716] Memory state around the buggy address: [ 37.671377] ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.672985] ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.674273] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 37.675472] ^ [ 37.676110] ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 37.676500] ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 37.677474] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 35.288398] ================================================================== [ 35.289036] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 35.289963] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.290976] [ 35.291432] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.292501] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.293182] Hardware name: linux,dummy-virt (DT) [ 35.293913] Call trace: [ 35.294418] show_stack+0x20/0x38 (C) [ 35.295088] dump_stack_lvl+0x8c/0xd0 [ 35.295830] print_report+0x118/0x5e0 [ 35.296442] kasan_report+0xc8/0x118 [ 35.297155] kasan_check_range+0x100/0x1a8 [ 35.297906] __kasan_check_read+0x20/0x30 [ 35.298598] kasan_atomics_helper+0x2b0/0x4858 [ 35.299290] kasan_atomics+0x198/0x2e8 [ 35.300003] kunit_try_run_case+0x14c/0x3d0 [ 35.300637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.301485] kthread+0x24c/0x2d0 [ 35.302075] ret_from_fork+0x10/0x20 [ 35.302729] [ 35.303230] Allocated by task 254: [ 35.303786] kasan_save_stack+0x3c/0x68 [ 35.304483] kasan_save_track+0x20/0x40 [ 35.305268] kasan_save_alloc_info+0x40/0x58 [ 35.305868] __kasan_kmalloc+0xd4/0xd8 [ 35.306155] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.306441] kasan_atomics+0xb8/0x2e8 [ 35.306894] kunit_try_run_case+0x14c/0x3d0 [ 35.307583] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.308368] kthread+0x24c/0x2d0 [ 35.308964] ret_from_fork+0x10/0x20 [ 35.309491] [ 35.309932] The buggy address belongs to the object at fff00000c69ef080 [ 35.309932] which belongs to the cache kmalloc-64 of size 64 [ 35.311087] The buggy address is located 0 bytes to the right of [ 35.311087] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.312646] [ 35.313033] The buggy address belongs to the physical page: [ 35.313852] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.314794] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.315740] page_type: f5(slab) [ 35.316287] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.317194] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.318137] page dumped because: kasan: bad access detected [ 35.318907] [ 35.319272] Memory state around the buggy address: [ 35.320002] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.320874] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.321724] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.322601] ^ [ 35.323273] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.324137] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.324841] ================================================================== [ 37.472359] ================================================================== [ 37.473319] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 37.474922] Read of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 37.475923] [ 37.476303] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.477375] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.478010] Hardware name: linux,dummy-virt (DT) [ 37.478622] Call trace: [ 37.479097] show_stack+0x20/0x38 (C) [ 37.479717] dump_stack_lvl+0x8c/0xd0 [ 37.480335] print_report+0x118/0x5e0 [ 37.481003] kasan_report+0xc8/0x118 [ 37.481653] __asan_report_load8_noabort+0x20/0x30 [ 37.482333] kasan_atomics_helper+0x3e10/0x4858 [ 37.483035] kasan_atomics+0x198/0x2e8 [ 37.483608] kunit_try_run_case+0x14c/0x3d0 [ 37.484311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.485132] kthread+0x24c/0x2d0 [ 37.485692] ret_from_fork+0x10/0x20 [ 37.486380] [ 37.486768] Allocated by task 254: [ 37.487344] kasan_save_stack+0x3c/0x68 [ 37.487888] kasan_save_track+0x20/0x40 [ 37.488539] kasan_save_alloc_info+0x40/0x58 [ 37.489192] __kasan_kmalloc+0xd4/0xd8 [ 37.489812] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.490500] kasan_atomics+0xb8/0x2e8 [ 37.491145] kunit_try_run_case+0x14c/0x3d0 [ 37.491736] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.492490] kthread+0x24c/0x2d0 [ 37.493097] ret_from_fork+0x10/0x20 [ 37.493678] [ 37.494050] The buggy address belongs to the object at fff00000c69ef080 [ 37.494050] which belongs to the cache kmalloc-64 of size 64 [ 37.495318] The buggy address is located 0 bytes to the right of [ 37.495318] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 37.496710] [ 37.497094] The buggy address belongs to the physical page: [ 37.497752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 37.498769] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.499528] page_type: f5(slab) [ 37.500100] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.500836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.501811] page dumped because: kasan: bad access detected [ 37.502561] [ 37.502949] Memory state around the buggy address: [ 37.503593] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.504441] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.505318] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.506131] ^ [ 37.506780] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.507630] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.508383] ================================================================== [ 36.052666] ================================================================== [ 36.053437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 36.054353] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.055384] [ 36.055874] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.057115] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.057756] Hardware name: linux,dummy-virt (DT) [ 36.058402] Call trace: [ 36.058850] show_stack+0x20/0x38 (C) [ 36.059580] dump_stack_lvl+0x8c/0xd0 [ 36.060240] print_report+0x118/0x5e0 [ 36.060917] kasan_report+0xc8/0x118 [ 36.061625] kasan_check_range+0x100/0x1a8 [ 36.062341] __kasan_check_write+0x20/0x30 [ 36.063026] kasan_atomics_helper+0xa6c/0x4858 [ 36.063745] kasan_atomics+0x198/0x2e8 [ 36.064388] kunit_try_run_case+0x14c/0x3d0 [ 36.065113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.065885] kthread+0x24c/0x2d0 [ 36.066431] ret_from_fork+0x10/0x20 [ 36.067043] [ 36.067371] Allocated by task 254: [ 36.067953] kasan_save_stack+0x3c/0x68 [ 36.068461] kasan_save_track+0x20/0x40 [ 36.069109] kasan_save_alloc_info+0x40/0x58 [ 36.069734] __kasan_kmalloc+0xd4/0xd8 [ 36.070365] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.071055] kasan_atomics+0xb8/0x2e8 [ 36.071570] kunit_try_run_case+0x14c/0x3d0 [ 36.072245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.072923] kthread+0x24c/0x2d0 [ 36.073497] ret_from_fork+0x10/0x20 [ 36.073985] [ 36.074357] The buggy address belongs to the object at fff00000c69ef080 [ 36.074357] which belongs to the cache kmalloc-64 of size 64 [ 36.075625] The buggy address is located 0 bytes to the right of [ 36.075625] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.076844] [ 36.077220] The buggy address belongs to the physical page: [ 36.077998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.078799] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.079696] page_type: f5(slab) [ 36.080265] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.081229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.082196] page dumped because: kasan: bad access detected [ 36.082870] [ 36.083244] Memory state around the buggy address: [ 36.084130] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.084933] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.085998] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.086776] ^ [ 36.087088] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.087453] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.088159] ================================================================== [ 35.825236] ================================================================== [ 35.826140] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 35.826973] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.827957] [ 35.828374] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.829678] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.830460] Hardware name: linux,dummy-virt (DT) [ 35.831186] Call trace: [ 35.831676] show_stack+0x20/0x38 (C) [ 35.832303] dump_stack_lvl+0x8c/0xd0 [ 35.832983] print_report+0x118/0x5e0 [ 35.833535] kasan_report+0xc8/0x118 [ 35.834195] kasan_check_range+0x100/0x1a8 [ 35.834909] __kasan_check_write+0x20/0x30 [ 35.835628] kasan_atomics_helper+0x7cc/0x4858 [ 35.836304] kasan_atomics+0x198/0x2e8 [ 35.836909] kunit_try_run_case+0x14c/0x3d0 [ 35.837565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.838368] kthread+0x24c/0x2d0 [ 35.839008] ret_from_fork+0x10/0x20 [ 35.839650] [ 35.839967] Allocated by task 254: [ 35.840554] kasan_save_stack+0x3c/0x68 [ 35.841094] kasan_save_track+0x20/0x40 [ 35.841720] kasan_save_alloc_info+0x40/0x58 [ 35.842388] __kasan_kmalloc+0xd4/0xd8 [ 35.842918] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.843636] kasan_atomics+0xb8/0x2e8 [ 35.844130] kunit_try_run_case+0x14c/0x3d0 [ 35.844815] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.845498] kthread+0x24c/0x2d0 [ 35.846119] ret_from_fork+0x10/0x20 [ 35.846682] [ 35.847066] The buggy address belongs to the object at fff00000c69ef080 [ 35.847066] which belongs to the cache kmalloc-64 of size 64 [ 35.848158] The buggy address is located 0 bytes to the right of [ 35.848158] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.849466] [ 35.849863] The buggy address belongs to the physical page: [ 35.850614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.851564] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.852310] page_type: f5(slab) [ 35.852895] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.853685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.854652] page dumped because: kasan: bad access detected [ 35.855352] [ 35.855783] Memory state around the buggy address: [ 35.856298] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.857208] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.858039] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.858803] ^ [ 35.859531] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.860281] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.861222] ================================================================== [ 35.327852] ================================================================== [ 35.328809] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 35.329772] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.330761] [ 35.331804] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.332875] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.333151] Hardware name: linux,dummy-virt (DT) [ 35.333425] Call trace: [ 35.333731] show_stack+0x20/0x38 (C) [ 35.334472] dump_stack_lvl+0x8c/0xd0 [ 35.335875] print_report+0x118/0x5e0 [ 35.336539] kasan_report+0xc8/0x118 [ 35.337178] __asan_report_load4_noabort+0x20/0x30 [ 35.338580] kasan_atomics_helper+0x40fc/0x4858 [ 35.339378] kasan_atomics+0x198/0x2e8 [ 35.339972] kunit_try_run_case+0x14c/0x3d0 [ 35.340740] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.341527] kthread+0x24c/0x2d0 [ 35.342112] ret_from_fork+0x10/0x20 [ 35.342804] [ 35.343223] Allocated by task 254: [ 35.343849] kasan_save_stack+0x3c/0x68 [ 35.344540] kasan_save_track+0x20/0x40 [ 35.345136] kasan_save_alloc_info+0x40/0x58 [ 35.345868] __kasan_kmalloc+0xd4/0xd8 [ 35.346540] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.347189] kasan_atomics+0xb8/0x2e8 [ 35.347872] kunit_try_run_case+0x14c/0x3d0 [ 35.348596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.349297] kthread+0x24c/0x2d0 [ 35.349940] ret_from_fork+0x10/0x20 [ 35.350487] [ 35.350922] The buggy address belongs to the object at fff00000c69ef080 [ 35.350922] which belongs to the cache kmalloc-64 of size 64 [ 35.352232] The buggy address is located 0 bytes to the right of [ 35.352232] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.353570] [ 35.353997] The buggy address belongs to the physical page: [ 35.354838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.355752] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.356700] page_type: f5(slab) [ 35.357310] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.358268] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.359204] page dumped because: kasan: bad access detected [ 35.359922] [ 35.360279] Memory state around the buggy address: [ 35.360965] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.361902] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.362787] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.363502] ^ [ 35.364262] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.365125] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.365918] ================================================================== [ 35.711921] ================================================================== [ 35.712694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 35.713658] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.714505] [ 35.714955] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.716165] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.716743] Hardware name: linux,dummy-virt (DT) [ 35.717351] Call trace: [ 35.717765] show_stack+0x20/0x38 (C) [ 35.718413] dump_stack_lvl+0x8c/0xd0 [ 35.719097] print_report+0x118/0x5e0 [ 35.719771] kasan_report+0xc8/0x118 [ 35.720346] kasan_check_range+0x100/0x1a8 [ 35.721054] __kasan_check_write+0x20/0x30 [ 35.721608] kasan_atomics_helper+0x684/0x4858 [ 35.722334] kasan_atomics+0x198/0x2e8 [ 35.723021] kunit_try_run_case+0x14c/0x3d0 [ 35.723620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.724386] kthread+0x24c/0x2d0 [ 35.724966] ret_from_fork+0x10/0x20 [ 35.725573] [ 35.725993] Allocated by task 254: [ 35.726580] kasan_save_stack+0x3c/0x68 [ 35.727195] kasan_save_track+0x20/0x40 [ 35.727830] kasan_save_alloc_info+0x40/0x58 [ 35.728434] __kasan_kmalloc+0xd4/0xd8 [ 35.729074] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.729716] kasan_atomics+0xb8/0x2e8 [ 35.730334] kunit_try_run_case+0x14c/0x3d0 [ 35.731025] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.731726] kthread+0x24c/0x2d0 [ 35.732212] ret_from_fork+0x10/0x20 [ 35.732877] [ 35.733244] The buggy address belongs to the object at fff00000c69ef080 [ 35.733244] which belongs to the cache kmalloc-64 of size 64 [ 35.734495] The buggy address is located 0 bytes to the right of [ 35.734495] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.735756] [ 35.736130] The buggy address belongs to the physical page: [ 35.736828] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.737709] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.738541] page_type: f5(slab) [ 35.739065] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.739959] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.740827] page dumped because: kasan: bad access detected [ 35.741601] [ 35.741968] Memory state around the buggy address: [ 35.742539] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.743461] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.744297] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.745030] ^ [ 35.745779] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.746630] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.747467] ================================================================== [ 35.749069] ================================================================== [ 35.750037] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 35.751366] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.752274] [ 35.752739] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.754045] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.754729] Hardware name: linux,dummy-virt (DT) [ 35.755384] Call trace: [ 35.755898] show_stack+0x20/0x38 (C) [ 35.756529] dump_stack_lvl+0x8c/0xd0 [ 35.757233] print_report+0x118/0x5e0 [ 35.757940] kasan_report+0xc8/0x118 [ 35.758620] kasan_check_range+0x100/0x1a8 [ 35.759310] __kasan_check_write+0x20/0x30 [ 35.760064] kasan_atomics_helper+0x6ec/0x4858 [ 35.760741] kasan_atomics+0x198/0x2e8 [ 35.761446] kunit_try_run_case+0x14c/0x3d0 [ 35.762151] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.763016] kthread+0x24c/0x2d0 [ 35.763681] ret_from_fork+0x10/0x20 [ 35.764304] [ 35.764649] Allocated by task 254: [ 35.765147] kasan_save_stack+0x3c/0x68 [ 35.765839] kasan_save_track+0x20/0x40 [ 35.766323] kasan_save_alloc_info+0x40/0x58 [ 35.767020] __kasan_kmalloc+0xd4/0xd8 [ 35.767575] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.768283] kasan_atomics+0xb8/0x2e8 [ 35.768848] kunit_try_run_case+0x14c/0x3d0 [ 35.769528] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.770217] kthread+0x24c/0x2d0 [ 35.770821] ret_from_fork+0x10/0x20 [ 35.771373] [ 35.771768] The buggy address belongs to the object at fff00000c69ef080 [ 35.771768] which belongs to the cache kmalloc-64 of size 64 [ 35.772840] The buggy address is located 0 bytes to the right of [ 35.772840] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.774328] [ 35.774709] The buggy address belongs to the physical page: [ 35.775376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.776246] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.777144] page_type: f5(slab) [ 35.777733] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.778594] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.779589] page dumped because: kasan: bad access detected [ 35.780230] [ 35.780590] Memory state around the buggy address: [ 35.781143] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.781997] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.782805] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.783676] ^ [ 35.784355] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.785234] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.786095] ================================================================== [ 37.510337] ================================================================== [ 37.511264] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 37.513043] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 37.514617] [ 37.515125] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.516384] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.516910] Hardware name: linux,dummy-virt (DT) [ 37.517536] Call trace: [ 37.517993] show_stack+0x20/0x38 (C) [ 37.518629] dump_stack_lvl+0x8c/0xd0 [ 37.519288] print_report+0x118/0x5e0 [ 37.519881] kasan_report+0xc8/0x118 [ 37.520408] kasan_check_range+0x100/0x1a8 [ 37.521127] __kasan_check_write+0x20/0x30 [ 37.521803] kasan_atomics_helper+0x175c/0x4858 [ 37.522466] kasan_atomics+0x198/0x2e8 [ 37.523100] kunit_try_run_case+0x14c/0x3d0 [ 37.523751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.524410] kthread+0x24c/0x2d0 [ 37.525068] ret_from_fork+0x10/0x20 [ 37.525766] [ 37.526144] Allocated by task 254: [ 37.526715] kasan_save_stack+0x3c/0x68 [ 37.527251] kasan_save_track+0x20/0x40 [ 37.527890] kasan_save_alloc_info+0x40/0x58 [ 37.528425] __kasan_kmalloc+0xd4/0xd8 [ 37.529065] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.529672] kasan_atomics+0xb8/0x2e8 [ 37.530297] kunit_try_run_case+0x14c/0x3d0 [ 37.531003] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.531755] kthread+0x24c/0x2d0 [ 37.532256] ret_from_fork+0x10/0x20 [ 37.532885] [ 37.533263] The buggy address belongs to the object at fff00000c69ef080 [ 37.533263] which belongs to the cache kmalloc-64 of size 64 [ 37.534425] The buggy address is located 0 bytes to the right of [ 37.534425] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 37.535808] [ 37.536192] The buggy address belongs to the physical page: [ 37.536788] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 37.537781] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.538575] page_type: f5(slab) [ 37.539079] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.540002] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.540752] page dumped because: kasan: bad access detected [ 37.541499] [ 37.541850] Memory state around the buggy address: [ 37.542435] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.543225] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.544170] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.544968] ^ [ 37.545551] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.546456] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.547275] ================================================================== [ 36.857160] ================================================================== [ 36.858010] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 36.858792] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.859782] [ 36.860192] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.861236] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.861887] Hardware name: linux,dummy-virt (DT) [ 36.862575] Call trace: [ 36.863032] show_stack+0x20/0x38 (C) [ 36.863606] dump_stack_lvl+0x8c/0xd0 [ 36.864269] print_report+0x118/0x5e0 [ 36.864952] kasan_report+0xc8/0x118 [ 36.865505] kasan_check_range+0x100/0x1a8 [ 36.866220] __kasan_check_write+0x20/0x30 [ 36.866939] kasan_atomics_helper+0x1128/0x4858 [ 36.867630] kasan_atomics+0x198/0x2e8 [ 36.868142] kunit_try_run_case+0x14c/0x3d0 [ 36.868875] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.869547] kthread+0x24c/0x2d0 [ 36.870156] ret_from_fork+0x10/0x20 [ 36.870840] [ 36.871221] Allocated by task 254: [ 36.871803] kasan_save_stack+0x3c/0x68 [ 36.872367] kasan_save_track+0x20/0x40 [ 36.872884] kasan_save_alloc_info+0x40/0x58 [ 36.873579] __kasan_kmalloc+0xd4/0xd8 [ 36.874149] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.874777] kasan_atomics+0xb8/0x2e8 [ 36.875371] kunit_try_run_case+0x14c/0x3d0 [ 36.875924] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.876718] kthread+0x24c/0x2d0 [ 36.877211] ret_from_fork+0x10/0x20 [ 36.877811] [ 36.878143] The buggy address belongs to the object at fff00000c69ef080 [ 36.878143] which belongs to the cache kmalloc-64 of size 64 [ 36.879543] The buggy address is located 0 bytes to the right of [ 36.879543] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.881261] [ 36.881620] The buggy address belongs to the physical page: [ 36.882292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.883088] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.884012] page_type: f5(slab) [ 36.884275] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.884819] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.885796] page dumped because: kasan: bad access detected [ 36.886413] [ 36.886797] Memory state around the buggy address: [ 36.887491] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.888314] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.889114] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.889985] ^ [ 36.890710] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.891534] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.892360] ================================================================== [ 36.626931] ================================================================== [ 36.627674] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 36.628460] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.629244] [ 36.629663] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.630851] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.631360] Hardware name: linux,dummy-virt (DT) [ 36.632559] Call trace: [ 36.632940] show_stack+0x20/0x38 (C) [ 36.633869] dump_stack_lvl+0x8c/0xd0 [ 36.634398] print_report+0x118/0x5e0 [ 36.635011] kasan_report+0xc8/0x118 [ 36.635663] kasan_check_range+0x100/0x1a8 [ 36.636325] __kasan_check_write+0x20/0x30 [ 36.636962] kasan_atomics_helper+0xeb8/0x4858 [ 36.637572] kasan_atomics+0x198/0x2e8 [ 36.638217] kunit_try_run_case+0x14c/0x3d0 [ 36.638874] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.639567] kthread+0x24c/0x2d0 [ 36.640157] ret_from_fork+0x10/0x20 [ 36.640766] [ 36.641146] Allocated by task 254: [ 36.641693] kasan_save_stack+0x3c/0x68 [ 36.642260] kasan_save_track+0x20/0x40 [ 36.642889] kasan_save_alloc_info+0x40/0x58 [ 36.643455] __kasan_kmalloc+0xd4/0xd8 [ 36.644072] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.644717] kasan_atomics+0xb8/0x2e8 [ 36.645241] kunit_try_run_case+0x14c/0x3d0 [ 36.645964] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.646692] kthread+0x24c/0x2d0 [ 36.647278] ret_from_fork+0x10/0x20 [ 36.647896] [ 36.648226] The buggy address belongs to the object at fff00000c69ef080 [ 36.648226] which belongs to the cache kmalloc-64 of size 64 [ 36.649559] The buggy address is located 0 bytes to the right of [ 36.649559] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.650919] [ 36.651257] The buggy address belongs to the physical page: [ 36.651929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.652846] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.653628] page_type: f5(slab) [ 36.654201] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.655040] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.656024] page dumped because: kasan: bad access detected [ 36.656758] [ 36.657128] Memory state around the buggy address: [ 36.657730] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.658545] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.659410] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.660175] ^ [ 36.660818] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.661663] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.662570] ================================================================== [ 36.931370] ================================================================== [ 36.932233] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 36.932944] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.933908] [ 36.934364] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.935649] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.936184] Hardware name: linux,dummy-virt (DT) [ 36.936874] Call trace: [ 36.937342] show_stack+0x20/0x38 (C) [ 36.938032] dump_stack_lvl+0x8c/0xd0 [ 36.938669] print_report+0x118/0x5e0 [ 36.939333] kasan_report+0xc8/0x118 [ 36.939991] kasan_check_range+0x100/0x1a8 [ 36.940604] __kasan_check_write+0x20/0x30 [ 36.941292] kasan_atomics_helper+0x11f8/0x4858 [ 36.941945] kasan_atomics+0x198/0x2e8 [ 36.942543] kunit_try_run_case+0x14c/0x3d0 [ 36.943216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.944065] kthread+0x24c/0x2d0 [ 36.944687] ret_from_fork+0x10/0x20 [ 36.945271] [ 36.945674] Allocated by task 254: [ 36.946146] kasan_save_stack+0x3c/0x68 [ 36.946808] kasan_save_track+0x20/0x40 [ 36.947404] kasan_save_alloc_info+0x40/0x58 [ 36.948099] __kasan_kmalloc+0xd4/0xd8 [ 36.948612] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.949311] kasan_atomics+0xb8/0x2e8 [ 36.949959] kunit_try_run_case+0x14c/0x3d0 [ 36.950550] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.951312] kthread+0x24c/0x2d0 [ 36.951909] ret_from_fork+0x10/0x20 [ 36.952502] [ 36.952898] The buggy address belongs to the object at fff00000c69ef080 [ 36.952898] which belongs to the cache kmalloc-64 of size 64 [ 36.954179] The buggy address is located 0 bytes to the right of [ 36.954179] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.955559] [ 36.955944] The buggy address belongs to the physical page: [ 36.956588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.957526] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.958296] page_type: f5(slab) [ 36.958792] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.959690] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.960602] page dumped because: kasan: bad access detected [ 36.961350] [ 36.961742] Memory state around the buggy address: [ 36.962350] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.963292] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.964110] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.965020] ^ [ 36.965651] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.966413] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.967260] ================================================================== [ 37.239220] ================================================================== [ 37.239964] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 37.240853] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 37.241564] [ 37.242015] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.243424] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.244060] Hardware name: linux,dummy-virt (DT) [ 37.244796] Call trace: [ 37.245251] show_stack+0x20/0x38 (C) [ 37.245954] dump_stack_lvl+0x8c/0xd0 [ 37.246669] print_report+0x118/0x5e0 [ 37.247282] kasan_report+0xc8/0x118 [ 37.247970] kasan_check_range+0x100/0x1a8 [ 37.248641] __kasan_check_write+0x20/0x30 [ 37.249348] kasan_atomics_helper+0x154c/0x4858 [ 37.250075] kasan_atomics+0x198/0x2e8 [ 37.250755] kunit_try_run_case+0x14c/0x3d0 [ 37.251463] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.252260] kthread+0x24c/0x2d0 [ 37.252865] ret_from_fork+0x10/0x20 [ 37.253546] [ 37.253902] Allocated by task 254: [ 37.254499] kasan_save_stack+0x3c/0x68 [ 37.255206] kasan_save_track+0x20/0x40 [ 37.255840] kasan_save_alloc_info+0x40/0x58 [ 37.256580] __kasan_kmalloc+0xd4/0xd8 [ 37.257115] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.257864] kasan_atomics+0xb8/0x2e8 [ 37.258410] kunit_try_run_case+0x14c/0x3d0 [ 37.259134] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.259895] kthread+0x24c/0x2d0 [ 37.260466] ret_from_fork+0x10/0x20 [ 37.261060] [ 37.261466] The buggy address belongs to the object at fff00000c69ef080 [ 37.261466] which belongs to the cache kmalloc-64 of size 64 [ 37.262770] The buggy address is located 0 bytes to the right of [ 37.262770] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 37.264104] [ 37.264488] The buggy address belongs to the physical page: [ 37.265096] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 37.266205] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.267232] page_type: f5(slab) [ 37.267994] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.269091] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.270132] page dumped because: kasan: bad access detected [ 37.271004] [ 37.271338] Memory state around the buggy address: [ 37.272039] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.273184] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.274080] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.274911] ^ [ 37.275627] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.276525] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.277253] ================================================================== [ 37.159976] ================================================================== [ 37.161426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 37.163096] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 37.164015] [ 37.164366] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.165587] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.166106] Hardware name: linux,dummy-virt (DT) [ 37.166790] Call trace: [ 37.167230] show_stack+0x20/0x38 (C) [ 37.167870] dump_stack_lvl+0x8c/0xd0 [ 37.168439] print_report+0x118/0x5e0 [ 37.169111] kasan_report+0xc8/0x118 [ 37.169766] kasan_check_range+0x100/0x1a8 [ 37.170417] __kasan_check_write+0x20/0x30 [ 37.171089] kasan_atomics_helper+0x147c/0x4858 [ 37.171767] kasan_atomics+0x198/0x2e8 [ 37.172330] kunit_try_run_case+0x14c/0x3d0 [ 37.172962] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.173786] kthread+0x24c/0x2d0 [ 37.174345] ret_from_fork+0x10/0x20 [ 37.174935] [ 37.175302] Allocated by task 254: [ 37.175811] kasan_save_stack+0x3c/0x68 [ 37.176448] kasan_save_track+0x20/0x40 [ 37.177027] kasan_save_alloc_info+0x40/0x58 [ 37.177685] __kasan_kmalloc+0xd4/0xd8 [ 37.178284] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.179000] kasan_atomics+0xb8/0x2e8 [ 37.179535] kunit_try_run_case+0x14c/0x3d0 [ 37.180216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.180889] kthread+0x24c/0x2d0 [ 37.181433] ret_from_fork+0x10/0x20 [ 37.182064] [ 37.182425] The buggy address belongs to the object at fff00000c69ef080 [ 37.182425] which belongs to the cache kmalloc-64 of size 64 [ 37.183643] The buggy address is located 0 bytes to the right of [ 37.183643] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 37.184975] [ 37.185356] The buggy address belongs to the physical page: [ 37.186063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 37.187097] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.187875] page_type: f5(slab) [ 37.188450] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.189357] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.190326] page dumped because: kasan: bad access detected [ 37.191067] [ 37.191447] Memory state around the buggy address: [ 37.192064] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.193017] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.193774] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.194680] ^ [ 37.195357] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.196230] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.196924] ================================================================== [ 35.936931] ================================================================== [ 35.937720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 35.938493] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.939490] [ 35.939923] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.941053] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.941685] Hardware name: linux,dummy-virt (DT) [ 35.942334] Call trace: [ 35.942831] show_stack+0x20/0x38 (C) [ 35.943439] dump_stack_lvl+0x8c/0xd0 [ 35.943988] print_report+0x118/0x5e0 [ 35.944650] kasan_report+0xc8/0x118 [ 35.945266] kasan_check_range+0x100/0x1a8 [ 35.945895] __kasan_check_write+0x20/0x30 [ 35.946611] kasan_atomics_helper+0x934/0x4858 [ 35.947339] kasan_atomics+0x198/0x2e8 [ 35.947956] kunit_try_run_case+0x14c/0x3d0 [ 35.948571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.949391] kthread+0x24c/0x2d0 [ 35.950019] ret_from_fork+0x10/0x20 [ 35.950561] [ 35.950944] Allocated by task 254: [ 35.951526] kasan_save_stack+0x3c/0x68 [ 35.952100] kasan_save_track+0x20/0x40 [ 35.952608] kasan_save_alloc_info+0x40/0x58 [ 35.953290] __kasan_kmalloc+0xd4/0xd8 [ 35.953878] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.954591] kasan_atomics+0xb8/0x2e8 [ 35.955095] kunit_try_run_case+0x14c/0x3d0 [ 35.955826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.956625] kthread+0x24c/0x2d0 [ 35.957160] ret_from_fork+0x10/0x20 [ 35.957692] [ 35.958058] The buggy address belongs to the object at fff00000c69ef080 [ 35.958058] which belongs to the cache kmalloc-64 of size 64 [ 35.959284] The buggy address is located 0 bytes to the right of [ 35.959284] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.960651] [ 35.961032] The buggy address belongs to the physical page: [ 35.961729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.962577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.963430] page_type: f5(slab) [ 35.964018] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.964873] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.965783] page dumped because: kasan: bad access detected [ 35.966549] [ 35.966915] Memory state around the buggy address: [ 35.967617] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.968478] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.969312] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.970139] ^ [ 35.970864] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.971624] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.972430] ================================================================== [ 36.778529] ================================================================== [ 36.779284] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 36.780341] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.781285] [ 36.781699] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.782871] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.783416] Hardware name: linux,dummy-virt (DT) [ 36.783977] Call trace: [ 36.784441] show_stack+0x20/0x38 (C) [ 36.785081] dump_stack_lvl+0x8c/0xd0 [ 36.785777] print_report+0x118/0x5e0 [ 36.786343] kasan_report+0xc8/0x118 [ 36.787313] kasan_check_range+0x100/0x1a8 [ 36.788152] __kasan_check_write+0x20/0x30 [ 36.788989] kasan_atomics_helper+0x1058/0x4858 [ 36.789755] kasan_atomics+0x198/0x2e8 [ 36.790406] kunit_try_run_case+0x14c/0x3d0 [ 36.791207] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.791989] kthread+0x24c/0x2d0 [ 36.792599] ret_from_fork+0x10/0x20 [ 36.793203] [ 36.793622] Allocated by task 254: [ 36.794231] kasan_save_stack+0x3c/0x68 [ 36.794872] kasan_save_track+0x20/0x40 [ 36.795555] kasan_save_alloc_info+0x40/0x58 [ 36.796233] __kasan_kmalloc+0xd4/0xd8 [ 36.796917] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.797583] kasan_atomics+0xb8/0x2e8 [ 36.798240] kunit_try_run_case+0x14c/0x3d0 [ 36.798838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.799668] kthread+0x24c/0x2d0 [ 36.800245] ret_from_fork+0x10/0x20 [ 36.800885] [ 36.801303] The buggy address belongs to the object at fff00000c69ef080 [ 36.801303] which belongs to the cache kmalloc-64 of size 64 [ 36.802612] The buggy address is located 0 bytes to the right of [ 36.802612] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.803940] [ 36.804313] The buggy address belongs to the physical page: [ 36.805035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.806086] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.807035] page_type: f5(slab) [ 36.807648] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.808550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.809581] page dumped because: kasan: bad access detected [ 36.810260] [ 36.810625] Memory state around the buggy address: [ 36.811254] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.812476] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.813500] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.814286] ^ [ 36.814974] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.815789] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.816660] ================================================================== [ 36.130276] ================================================================== [ 36.131576] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 36.132446] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.133121] [ 36.134326] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.135565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.136164] Hardware name: linux,dummy-virt (DT) [ 36.136802] Call trace: [ 36.137299] show_stack+0x20/0x38 (C) [ 36.137998] dump_stack_lvl+0x8c/0xd0 [ 36.138666] print_report+0x118/0x5e0 [ 36.139332] kasan_report+0xc8/0x118 [ 36.139988] __asan_report_load4_noabort+0x20/0x30 [ 36.140717] kasan_atomics_helper+0x3dcc/0x4858 [ 36.141438] kasan_atomics+0x198/0x2e8 [ 36.142079] kunit_try_run_case+0x14c/0x3d0 [ 36.142798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.143604] kthread+0x24c/0x2d0 [ 36.144205] ret_from_fork+0x10/0x20 [ 36.144833] [ 36.145233] Allocated by task 254: [ 36.145763] kasan_save_stack+0x3c/0x68 [ 36.146442] kasan_save_track+0x20/0x40 [ 36.147114] kasan_save_alloc_info+0x40/0x58 [ 36.147848] __kasan_kmalloc+0xd4/0xd8 [ 36.148379] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.149194] kasan_atomics+0xb8/0x2e8 [ 36.149959] kunit_try_run_case+0x14c/0x3d0 [ 36.150760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.151585] kthread+0x24c/0x2d0 [ 36.152242] ret_from_fork+0x10/0x20 [ 36.152910] [ 36.153335] The buggy address belongs to the object at fff00000c69ef080 [ 36.153335] which belongs to the cache kmalloc-64 of size 64 [ 36.154607] The buggy address is located 0 bytes to the right of [ 36.154607] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.156047] [ 36.156479] The buggy address belongs to the physical page: [ 36.157140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.158162] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.159097] page_type: f5(slab) [ 36.159629] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.160641] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.161556] page dumped because: kasan: bad access detected [ 36.162215] [ 36.162651] Memory state around the buggy address: [ 36.163228] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.164158] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.164972] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.165898] ^ [ 36.166579] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.167448] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.168298] ================================================================== [ 36.012213] ================================================================== [ 36.013047] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 36.014675] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.015866] [ 36.016284] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.017754] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.018365] Hardware name: linux,dummy-virt (DT) [ 36.019073] Call trace: [ 36.019533] show_stack+0x20/0x38 (C) [ 36.020289] dump_stack_lvl+0x8c/0xd0 [ 36.021070] print_report+0x118/0x5e0 [ 36.021366] kasan_report+0xc8/0x118 [ 36.021804] kasan_check_range+0x100/0x1a8 [ 36.022619] __kasan_check_write+0x20/0x30 [ 36.023396] kasan_atomics_helper+0xa04/0x4858 [ 36.024252] kasan_atomics+0x198/0x2e8 [ 36.025049] kunit_try_run_case+0x14c/0x3d0 [ 36.025776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.026803] kthread+0x24c/0x2d0 [ 36.027606] ret_from_fork+0x10/0x20 [ 36.028195] [ 36.028770] Allocated by task 254: [ 36.029254] kasan_save_stack+0x3c/0x68 [ 36.029896] kasan_save_track+0x20/0x40 [ 36.030473] kasan_save_alloc_info+0x40/0x58 [ 36.031121] __kasan_kmalloc+0xd4/0xd8 [ 36.031803] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.032400] kasan_atomics+0xb8/0x2e8 [ 36.033076] kunit_try_run_case+0x14c/0x3d0 [ 36.033690] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.034488] kthread+0x24c/0x2d0 [ 36.035108] ret_from_fork+0x10/0x20 [ 36.035682] [ 36.036087] The buggy address belongs to the object at fff00000c69ef080 [ 36.036087] which belongs to the cache kmalloc-64 of size 64 [ 36.037223] The buggy address is located 0 bytes to the right of [ 36.037223] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.038623] [ 36.039018] The buggy address belongs to the physical page: [ 36.039751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.040669] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.041587] page_type: f5(slab) [ 36.042124] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.043112] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.044049] page dumped because: kasan: bad access detected [ 36.044756] [ 36.045167] Memory state around the buggy address: [ 36.045802] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.046650] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.047581] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.048423] ^ [ 36.049078] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.050002] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.050979] ================================================================== [ 36.893684] ================================================================== [ 36.895146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 36.895969] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.896796] [ 36.897207] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.898441] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.899036] Hardware name: linux,dummy-virt (DT) [ 36.899633] Call trace: [ 36.900028] show_stack+0x20/0x38 (C) [ 36.900700] dump_stack_lvl+0x8c/0xd0 [ 36.901328] print_report+0x118/0x5e0 [ 36.901996] kasan_report+0xc8/0x118 [ 36.902581] kasan_check_range+0x100/0x1a8 [ 36.903281] __kasan_check_write+0x20/0x30 [ 36.903846] kasan_atomics_helper+0x1190/0x4858 [ 36.904498] kasan_atomics+0x198/0x2e8 [ 36.905175] kunit_try_run_case+0x14c/0x3d0 [ 36.905768] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.906604] kthread+0x24c/0x2d0 [ 36.907230] ret_from_fork+0x10/0x20 [ 36.907880] [ 36.908210] Allocated by task 254: [ 36.908798] kasan_save_stack+0x3c/0x68 [ 36.909388] kasan_save_track+0x20/0x40 [ 36.909986] kasan_save_alloc_info+0x40/0x58 [ 36.910534] __kasan_kmalloc+0xd4/0xd8 [ 36.911166] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.911841] kasan_atomics+0xb8/0x2e8 [ 36.912372] kunit_try_run_case+0x14c/0x3d0 [ 36.913045] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.913650] kthread+0x24c/0x2d0 [ 36.914229] ret_from_fork+0x10/0x20 [ 36.914855] [ 36.915227] The buggy address belongs to the object at fff00000c69ef080 [ 36.915227] which belongs to the cache kmalloc-64 of size 64 [ 36.916469] The buggy address is located 0 bytes to the right of [ 36.916469] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.917697] [ 36.918081] The buggy address belongs to the physical page: [ 36.918854] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.919742] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.920505] page_type: f5(slab) [ 36.921096] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.921988] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.922940] page dumped because: kasan: bad access detected [ 36.923700] [ 36.924018] Memory state around the buggy address: [ 36.924677] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.925450] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.926283] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.927079] ^ [ 36.927737] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.928588] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.929412] ================================================================== [ 37.317446] ================================================================== [ 37.319113] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 37.320094] Read of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 37.321057] [ 37.321546] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.322885] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.323592] Hardware name: linux,dummy-virt (DT) [ 37.324235] Call trace: [ 37.324790] show_stack+0x20/0x38 (C) [ 37.325525] dump_stack_lvl+0x8c/0xd0 [ 37.326185] print_report+0x118/0x5e0 [ 37.326854] kasan_report+0xc8/0x118 [ 37.327559] __asan_report_load8_noabort+0x20/0x30 [ 37.328352] kasan_atomics_helper+0x3db0/0x4858 [ 37.329210] kasan_atomics+0x198/0x2e8 [ 37.329778] kunit_try_run_case+0x14c/0x3d0 [ 37.330366] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.331249] kthread+0x24c/0x2d0 [ 37.331861] ret_from_fork+0x10/0x20 [ 37.332402] [ 37.332732] Allocated by task 254: [ 37.333268] kasan_save_stack+0x3c/0x68 [ 37.333873] kasan_save_track+0x20/0x40 [ 37.334506] kasan_save_alloc_info+0x40/0x58 [ 37.335067] __kasan_kmalloc+0xd4/0xd8 [ 37.335754] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.336342] kasan_atomics+0xb8/0x2e8 [ 37.336980] kunit_try_run_case+0x14c/0x3d0 [ 37.337578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.338353] kthread+0x24c/0x2d0 [ 37.338963] ret_from_fork+0x10/0x20 [ 37.339478] [ 37.339875] The buggy address belongs to the object at fff00000c69ef080 [ 37.339875] which belongs to the cache kmalloc-64 of size 64 [ 37.341120] The buggy address is located 0 bytes to the right of [ 37.341120] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 37.342428] [ 37.342843] The buggy address belongs to the physical page: [ 37.343553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 37.344499] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.345396] page_type: f5(slab) [ 37.346011] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.346909] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.347887] page dumped because: kasan: bad access detected [ 37.348591] [ 37.348970] Memory state around the buggy address: [ 37.349669] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.350445] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.351303] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.352086] ^ [ 37.352723] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.353504] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.354362] ================================================================== [ 35.672403] ================================================================== [ 35.673230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 35.674473] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.676146] [ 35.676810] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.677887] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.678491] Hardware name: linux,dummy-virt (DT) [ 35.679115] Call trace: [ 35.679529] show_stack+0x20/0x38 (C) [ 35.680124] dump_stack_lvl+0x8c/0xd0 [ 35.680704] print_report+0x118/0x5e0 [ 35.681351] kasan_report+0xc8/0x118 [ 35.681972] kasan_check_range+0x100/0x1a8 [ 35.682650] __kasan_check_write+0x20/0x30 [ 35.683238] kasan_atomics_helper+0x61c/0x4858 [ 35.683922] kasan_atomics+0x198/0x2e8 [ 35.684607] kunit_try_run_case+0x14c/0x3d0 [ 35.685315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.686052] kthread+0x24c/0x2d0 [ 35.686672] ret_from_fork+0x10/0x20 [ 35.687274] [ 35.687682] Allocated by task 254: [ 35.688244] kasan_save_stack+0x3c/0x68 [ 35.688810] kasan_save_track+0x20/0x40 [ 35.689430] kasan_save_alloc_info+0x40/0x58 [ 35.690080] __kasan_kmalloc+0xd4/0xd8 [ 35.690717] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.691343] kasan_atomics+0xb8/0x2e8 [ 35.691977] kunit_try_run_case+0x14c/0x3d0 [ 35.692667] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.693673] kthread+0x24c/0x2d0 [ 35.694286] ret_from_fork+0x10/0x20 [ 35.694785] [ 35.695169] The buggy address belongs to the object at fff00000c69ef080 [ 35.695169] which belongs to the cache kmalloc-64 of size 64 [ 35.696448] The buggy address is located 0 bytes to the right of [ 35.696448] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.697704] [ 35.698084] The buggy address belongs to the physical page: [ 35.698829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.699731] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.700550] page_type: f5(slab) [ 35.701058] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.701938] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.702841] page dumped because: kasan: bad access detected [ 35.703599] [ 35.703922] Memory state around the buggy address: [ 35.704534] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.705381] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.706375] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.707253] ^ [ 35.708140] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.709161] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.710095] ================================================================== [ 35.974636] ================================================================== [ 35.975729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 35.976625] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.977420] [ 35.977831] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.979015] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.979528] Hardware name: linux,dummy-virt (DT) [ 35.980204] Call trace: [ 35.980623] show_stack+0x20/0x38 (C) [ 35.981274] dump_stack_lvl+0x8c/0xd0 [ 35.981960] print_report+0x118/0x5e0 [ 35.982620] kasan_report+0xc8/0x118 [ 35.983235] kasan_check_range+0x100/0x1a8 [ 35.983868] __kasan_check_write+0x20/0x30 [ 35.984584] kasan_atomics_helper+0x99c/0x4858 [ 35.985262] kasan_atomics+0x198/0x2e8 [ 35.985896] kunit_try_run_case+0x14c/0x3d0 [ 35.986489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.987338] kthread+0x24c/0x2d0 [ 35.987949] ret_from_fork+0x10/0x20 [ 35.988622] [ 35.988995] Allocated by task 254: [ 35.989455] kasan_save_stack+0x3c/0x68 [ 35.990101] kasan_save_track+0x20/0x40 [ 35.990638] kasan_save_alloc_info+0x40/0x58 [ 35.991312] __kasan_kmalloc+0xd4/0xd8 [ 35.991876] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.992469] kasan_atomics+0xb8/0x2e8 [ 35.993106] kunit_try_run_case+0x14c/0x3d0 [ 35.993777] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.994472] kthread+0x24c/0x2d0 [ 35.994994] ret_from_fork+0x10/0x20 [ 35.995553] [ 35.995960] The buggy address belongs to the object at fff00000c69ef080 [ 35.995960] which belongs to the cache kmalloc-64 of size 64 [ 35.997150] The buggy address is located 0 bytes to the right of [ 35.997150] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.998399] [ 35.998800] The buggy address belongs to the physical page: [ 35.999575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.000387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.001164] page_type: f5(slab) [ 36.001756] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.002604] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.003529] page dumped because: kasan: bad access detected [ 36.004217] [ 36.004560] Memory state around the buggy address: [ 36.005134] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.006062] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.006826] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.007749] ^ [ 36.008387] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.009193] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.010060] ================================================================== [ 37.083463] ================================================================== [ 37.084309] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 37.085243] Read of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 37.086576] [ 37.086961] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.088094] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.088664] Hardware name: linux,dummy-virt (DT) [ 37.089182] Call trace: [ 37.089675] show_stack+0x20/0x38 (C) [ 37.090318] dump_stack_lvl+0x8c/0xd0 [ 37.090954] print_report+0x118/0x5e0 [ 37.091605] kasan_report+0xc8/0x118 [ 37.092211] __asan_report_load8_noabort+0x20/0x30 [ 37.092965] kasan_atomics_helper+0x3f04/0x4858 [ 37.093693] kasan_atomics+0x198/0x2e8 [ 37.094337] kunit_try_run_case+0x14c/0x3d0 [ 37.095017] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.095775] kthread+0x24c/0x2d0 [ 37.096337] ret_from_fork+0x10/0x20 [ 37.097007] [ 37.097383] Allocated by task 254: [ 37.097880] kasan_save_stack+0x3c/0x68 [ 37.098546] kasan_save_track+0x20/0x40 [ 37.099195] kasan_save_alloc_info+0x40/0x58 [ 37.099816] __kasan_kmalloc+0xd4/0xd8 [ 37.100415] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.101044] kasan_atomics+0xb8/0x2e8 [ 37.101672] kunit_try_run_case+0x14c/0x3d0 [ 37.102379] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.103043] kthread+0x24c/0x2d0 [ 37.103650] ret_from_fork+0x10/0x20 [ 37.104251] [ 37.104632] The buggy address belongs to the object at fff00000c69ef080 [ 37.104632] which belongs to the cache kmalloc-64 of size 64 [ 37.105860] The buggy address is located 0 bytes to the right of [ 37.105860] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 37.107105] [ 37.107485] The buggy address belongs to the physical page: [ 37.108207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 37.109133] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.109978] page_type: f5(slab) [ 37.110497] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.111472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.112231] page dumped because: kasan: bad access detected [ 37.113161] [ 37.113492] Memory state around the buggy address: [ 37.114116] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.114920] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.115857] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.116753] ^ [ 37.117458] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.118316] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.119205] ================================================================== [ 35.248841] ================================================================== [ 35.249587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 35.250635] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.251699] [ 35.252139] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.253071] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.253688] Hardware name: linux,dummy-virt (DT) [ 35.254416] Call trace: [ 35.255013] show_stack+0x20/0x38 (C) [ 35.255760] dump_stack_lvl+0x8c/0xd0 [ 35.256471] print_report+0x118/0x5e0 [ 35.257158] kasan_report+0xc8/0x118 [ 35.257818] kasan_check_range+0x100/0x1a8 [ 35.258598] __kasan_check_write+0x20/0x30 [ 35.259314] kasan_atomics_helper+0x24c/0x4858 [ 35.260136] kasan_atomics+0x198/0x2e8 [ 35.260852] kunit_try_run_case+0x14c/0x3d0 [ 35.261529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.262351] kthread+0x24c/0x2d0 [ 35.262965] ret_from_fork+0x10/0x20 [ 35.263626] [ 35.264015] Allocated by task 254: [ 35.264652] kasan_save_stack+0x3c/0x68 [ 35.265259] kasan_save_track+0x20/0x40 [ 35.265965] kasan_save_alloc_info+0x40/0x58 [ 35.266564] __kasan_kmalloc+0xd4/0xd8 [ 35.267227] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.267876] kasan_atomics+0xb8/0x2e8 [ 35.268542] kunit_try_run_case+0x14c/0x3d0 [ 35.269156] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.269961] kthread+0x24c/0x2d0 [ 35.270538] ret_from_fork+0x10/0x20 [ 35.271133] [ 35.271569] The buggy address belongs to the object at fff00000c69ef080 [ 35.271569] which belongs to the cache kmalloc-64 of size 64 [ 35.272858] The buggy address is located 0 bytes to the right of [ 35.272858] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.274193] [ 35.274622] The buggy address belongs to the physical page: [ 35.275307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.276409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.277228] page_type: f5(slab) [ 35.277842] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.278739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.279686] page dumped because: kasan: bad access detected [ 35.280393] [ 35.280785] Memory state around the buggy address: [ 35.281379] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.282311] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.283174] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.284085] ^ [ 35.284753] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.285641] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.286499] ================================================================== [ 36.361876] ================================================================== [ 36.362733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 36.363554] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.364276] [ 36.364712] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.365929] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.366570] Hardware name: linux,dummy-virt (DT) [ 36.367088] Call trace: [ 36.368045] show_stack+0x20/0x38 (C) [ 36.368652] dump_stack_lvl+0x8c/0xd0 [ 36.369248] print_report+0x118/0x5e0 [ 36.369841] kasan_report+0xc8/0x118 [ 36.370404] __asan_report_load4_noabort+0x20/0x30 [ 36.371193] kasan_atomics_helper+0x3dd8/0x4858 [ 36.371927] kasan_atomics+0x198/0x2e8 [ 36.372545] kunit_try_run_case+0x14c/0x3d0 [ 36.373176] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.374001] kthread+0x24c/0x2d0 [ 36.374559] ret_from_fork+0x10/0x20 [ 36.375132] [ 36.375487] Allocated by task 254: [ 36.376047] kasan_save_stack+0x3c/0x68 [ 36.376706] kasan_save_track+0x20/0x40 [ 36.377236] kasan_save_alloc_info+0x40/0x58 [ 36.377907] __kasan_kmalloc+0xd4/0xd8 [ 36.378448] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.379152] kasan_atomics+0xb8/0x2e8 [ 36.379781] kunit_try_run_case+0x14c/0x3d0 [ 36.380335] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.381107] kthread+0x24c/0x2d0 [ 36.381654] ret_from_fork+0x10/0x20 [ 36.382268] [ 36.382672] The buggy address belongs to the object at fff00000c69ef080 [ 36.382672] which belongs to the cache kmalloc-64 of size 64 [ 36.383894] The buggy address is located 0 bytes to the right of [ 36.383894] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.385090] [ 36.385470] The buggy address belongs to the physical page: [ 36.386216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.387087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.387987] page_type: f5(slab) [ 36.388563] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.389361] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.390331] page dumped because: kasan: bad access detected [ 36.391034] [ 36.391376] Memory state around the buggy address: [ 36.392089] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.392933] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.393872] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.394640] ^ [ 36.395306] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.396282] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.397094] ================================================================== [ 36.171264] ================================================================== [ 36.172023] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 36.172743] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.173656] [ 36.174091] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.175583] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.176266] Hardware name: linux,dummy-virt (DT) [ 36.176897] Call trace: [ 36.177381] show_stack+0x20/0x38 (C) [ 36.177988] dump_stack_lvl+0x8c/0xd0 [ 36.178692] print_report+0x118/0x5e0 [ 36.179332] kasan_report+0xc8/0x118 [ 36.179976] kasan_check_range+0x100/0x1a8 [ 36.180668] __kasan_check_write+0x20/0x30 [ 36.181359] kasan_atomics_helper+0xb70/0x4858 [ 36.182053] kasan_atomics+0x198/0x2e8 [ 36.182727] kunit_try_run_case+0x14c/0x3d0 [ 36.183424] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.184236] kthread+0x24c/0x2d0 [ 36.184849] ret_from_fork+0x10/0x20 [ 36.185444] [ 36.185877] Allocated by task 254: [ 36.186390] kasan_save_stack+0x3c/0x68 [ 36.187094] kasan_save_track+0x20/0x40 [ 36.187719] kasan_save_alloc_info+0x40/0x58 [ 36.188427] __kasan_kmalloc+0xd4/0xd8 [ 36.189008] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.189753] kasan_atomics+0xb8/0x2e8 [ 36.190338] kunit_try_run_case+0x14c/0x3d0 [ 36.191066] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.191771] kthread+0x24c/0x2d0 [ 36.192387] ret_from_fork+0x10/0x20 [ 36.192971] [ 36.193395] The buggy address belongs to the object at fff00000c69ef080 [ 36.193395] which belongs to the cache kmalloc-64 of size 64 [ 36.194729] The buggy address is located 0 bytes to the right of [ 36.194729] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.196159] [ 36.196500] The buggy address belongs to the physical page: [ 36.197259] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.198209] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.199103] page_type: f5(slab) [ 36.199620] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.200606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.201504] page dumped because: kasan: bad access detected [ 36.202217] [ 36.202624] Memory state around the buggy address: [ 36.203224] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.204144] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.205053] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.206022] ^ [ 36.206676] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.207612] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.208388] ================================================================== [ 35.368458] ================================================================== [ 35.369246] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 35.370068] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.370933] [ 35.371310] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.372486] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.373128] Hardware name: linux,dummy-virt (DT) [ 35.373707] Call trace: [ 35.374114] show_stack+0x20/0x38 (C) [ 35.374789] dump_stack_lvl+0x8c/0xd0 [ 35.375450] print_report+0x118/0x5e0 [ 35.376067] kasan_report+0xc8/0x118 [ 35.376664] kasan_check_range+0x100/0x1a8 [ 35.377250] __kasan_check_write+0x20/0x30 [ 35.377961] kasan_atomics_helper+0x32c/0x4858 [ 35.378634] kasan_atomics+0x198/0x2e8 [ 35.379219] kunit_try_run_case+0x14c/0x3d0 [ 35.379957] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.380707] kthread+0x24c/0x2d0 [ 35.381319] ret_from_fork+0x10/0x20 [ 35.381984] [ 35.382367] Allocated by task 254: [ 35.382910] kasan_save_stack+0x3c/0x68 [ 35.383567] kasan_save_track+0x20/0x40 [ 35.384095] kasan_save_alloc_info+0x40/0x58 [ 35.384771] __kasan_kmalloc+0xd4/0xd8 [ 35.385237] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.385940] kasan_atomics+0xb8/0x2e8 [ 35.386468] kunit_try_run_case+0x14c/0x3d0 [ 35.387181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.387968] kthread+0x24c/0x2d0 [ 35.388466] ret_from_fork+0x10/0x20 [ 35.389098] [ 35.389426] The buggy address belongs to the object at fff00000c69ef080 [ 35.389426] which belongs to the cache kmalloc-64 of size 64 [ 35.390744] The buggy address is located 0 bytes to the right of [ 35.390744] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.391956] [ 35.392343] The buggy address belongs to the physical page: [ 35.393102] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.393948] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.394806] page_type: f5(slab) [ 35.395324] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.396215] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.397195] page dumped because: kasan: bad access detected [ 35.397907] [ 35.398284] Memory state around the buggy address: [ 35.398993] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.399743] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.400693] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.401416] ^ [ 35.402132] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.402915] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.403789] ================================================================== [ 36.703609] ================================================================== [ 36.704399] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 36.705334] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.706203] [ 36.706628] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.708015] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.708643] Hardware name: linux,dummy-virt (DT) [ 36.709254] Call trace: [ 36.709657] show_stack+0x20/0x38 (C) [ 36.710268] dump_stack_lvl+0x8c/0xd0 [ 36.710952] print_report+0x118/0x5e0 [ 36.711621] kasan_report+0xc8/0x118 [ 36.712267] kasan_check_range+0x100/0x1a8 [ 36.712960] __kasan_check_write+0x20/0x30 [ 36.713663] kasan_atomics_helper+0xf88/0x4858 [ 36.714338] kasan_atomics+0x198/0x2e8 [ 36.715023] kunit_try_run_case+0x14c/0x3d0 [ 36.715784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.716477] kthread+0x24c/0x2d0 [ 36.717113] ret_from_fork+0x10/0x20 [ 36.717733] [ 36.718079] Allocated by task 254: [ 36.718661] kasan_save_stack+0x3c/0x68 [ 36.719303] kasan_save_track+0x20/0x40 [ 36.719913] kasan_save_alloc_info+0x40/0x58 [ 36.720580] __kasan_kmalloc+0xd4/0xd8 [ 36.721201] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.721905] kasan_atomics+0xb8/0x2e8 [ 36.722391] kunit_try_run_case+0x14c/0x3d0 [ 36.723094] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.723833] kthread+0x24c/0x2d0 [ 36.724363] ret_from_fork+0x10/0x20 [ 36.724995] [ 36.725306] The buggy address belongs to the object at fff00000c69ef080 [ 36.725306] which belongs to the cache kmalloc-64 of size 64 [ 36.726642] The buggy address is located 0 bytes to the right of [ 36.726642] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.727903] [ 36.728278] The buggy address belongs to the physical page: [ 36.729036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.729857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.730753] page_type: f5(slab) [ 36.731275] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.732200] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.733160] page dumped because: kasan: bad access detected [ 36.733782] [ 36.734152] Memory state around the buggy address: [ 36.734860] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.735736] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.736476] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.737349] ^ [ 36.737972] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.738803] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.739646] ================================================================== [ 36.968754] ================================================================== [ 36.969692] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 36.970670] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.971472] [ 36.971903] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.973054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.973662] Hardware name: linux,dummy-virt (DT) [ 36.974272] Call trace: [ 36.974687] show_stack+0x20/0x38 (C) [ 36.975293] dump_stack_lvl+0x8c/0xd0 [ 36.975948] print_report+0x118/0x5e0 [ 36.976622] kasan_report+0xc8/0x118 [ 36.977274] kasan_check_range+0x100/0x1a8 [ 36.977984] __kasan_check_write+0x20/0x30 [ 36.978589] kasan_atomics_helper+0x126c/0x4858 [ 36.979324] kasan_atomics+0x198/0x2e8 [ 36.979886] kunit_try_run_case+0x14c/0x3d0 [ 36.980627] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.981361] kthread+0x24c/0x2d0 [ 36.981969] ret_from_fork+0x10/0x20 [ 36.982641] [ 36.983019] Allocated by task 254: [ 36.983611] kasan_save_stack+0x3c/0x68 [ 36.984192] kasan_save_track+0x20/0x40 [ 36.984740] kasan_save_alloc_info+0x40/0x58 [ 36.985422] __kasan_kmalloc+0xd4/0xd8 [ 36.986028] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.986738] kasan_atomics+0xb8/0x2e8 [ 36.987266] kunit_try_run_case+0x14c/0x3d0 [ 36.987957] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.988658] kthread+0x24c/0x2d0 [ 36.989195] ret_from_fork+0x10/0x20 [ 36.989807] [ 36.990180] The buggy address belongs to the object at fff00000c69ef080 [ 36.990180] which belongs to the cache kmalloc-64 of size 64 [ 36.991469] The buggy address is located 0 bytes to the right of [ 36.991469] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.992709] [ 36.993094] The buggy address belongs to the physical page: [ 36.993858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.994693] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.995538] page_type: f5(slab) [ 36.996028] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.996981] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.997839] page dumped because: kasan: bad access detected [ 36.998378] [ 36.998769] Memory state around the buggy address: [ 36.999457] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.000304] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.001219] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.002066] ^ [ 37.002783] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.003541] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.004398] ================================================================== [ 35.559076] ================================================================== [ 35.560006] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 35.561071] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.562012] [ 35.562397] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.563535] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.564154] Hardware name: linux,dummy-virt (DT) [ 35.564743] Call trace: [ 35.565214] show_stack+0x20/0x38 (C) [ 35.565888] dump_stack_lvl+0x8c/0xd0 [ 35.566485] print_report+0x118/0x5e0 [ 35.567050] kasan_report+0xc8/0x118 [ 35.567696] kasan_check_range+0x100/0x1a8 [ 35.568384] __kasan_check_write+0x20/0x30 [ 35.569017] kasan_atomics_helper+0x4e4/0x4858 [ 35.569757] kasan_atomics+0x198/0x2e8 [ 35.570355] kunit_try_run_case+0x14c/0x3d0 [ 35.570942] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.571759] kthread+0x24c/0x2d0 [ 35.572343] ret_from_fork+0x10/0x20 [ 35.573018] [ 35.573394] Allocated by task 254: [ 35.573898] kasan_save_stack+0x3c/0x68 [ 35.574556] kasan_save_track+0x20/0x40 [ 35.575119] kasan_save_alloc_info+0x40/0x58 [ 35.575728] __kasan_kmalloc+0xd4/0xd8 [ 35.576353] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.577015] kasan_atomics+0xb8/0x2e8 [ 35.577659] kunit_try_run_case+0x14c/0x3d0 [ 35.578322] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.579026] kthread+0x24c/0x2d0 [ 35.579591] ret_from_fork+0x10/0x20 [ 35.580118] [ 35.580497] The buggy address belongs to the object at fff00000c69ef080 [ 35.580497] which belongs to the cache kmalloc-64 of size 64 [ 35.581971] The buggy address is located 0 bytes to the right of [ 35.581971] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.583233] [ 35.583628] The buggy address belongs to the physical page: [ 35.584205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.585221] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.586067] page_type: f5(slab) [ 35.586647] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.587547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.588299] page dumped because: kasan: bad access detected [ 35.588966] [ 35.589334] Memory state around the buggy address: [ 35.589857] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.590796] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.591665] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.592355] ^ [ 35.593073] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.593888] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.594772] ================================================================== [ 35.207633] ================================================================== [ 35.208605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 35.209653] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.211069] [ 35.211416] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.212737] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.213377] Hardware name: linux,dummy-virt (DT) [ 35.214119] Call trace: [ 35.214717] show_stack+0x20/0x38 (C) [ 35.215354] dump_stack_lvl+0x8c/0xd0 [ 35.216110] print_report+0x118/0x5e0 [ 35.216762] kasan_report+0xc8/0x118 [ 35.217454] kasan_check_range+0x100/0x1a8 [ 35.218171] __kasan_check_read+0x20/0x30 [ 35.218891] kasan_atomics_helper+0x1ec/0x4858 [ 35.219651] kasan_atomics+0x198/0x2e8 [ 35.220298] kunit_try_run_case+0x14c/0x3d0 [ 35.221019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.221840] kthread+0x24c/0x2d0 [ 35.222494] ret_from_fork+0x10/0x20 [ 35.223151] [ 35.223525] Allocated by task 254: [ 35.224125] kasan_save_stack+0x3c/0x68 [ 35.224817] kasan_save_track+0x20/0x40 [ 35.225386] kasan_save_alloc_info+0x40/0x58 [ 35.226144] __kasan_kmalloc+0xd4/0xd8 [ 35.226694] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.227435] kasan_atomics+0xb8/0x2e8 [ 35.228038] kunit_try_run_case+0x14c/0x3d0 [ 35.228766] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.229528] kthread+0x24c/0x2d0 [ 35.230086] ret_from_fork+0x10/0x20 [ 35.230754] [ 35.231154] The buggy address belongs to the object at fff00000c69ef080 [ 35.231154] which belongs to the cache kmalloc-64 of size 64 [ 35.232526] The buggy address is located 0 bytes to the right of [ 35.232526] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.233916] [ 35.234251] The buggy address belongs to the physical page: [ 35.235036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.235999] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.236903] page_type: f5(slab) [ 35.237462] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.238415] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.239341] page dumped because: kasan: bad access detected [ 35.240028] [ 35.240414] Memory state around the buggy address: [ 35.241006] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.241962] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.242850] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.243721] ^ [ 35.244396] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.245263] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.246135] ================================================================== [ 36.741070] ================================================================== [ 36.741889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 36.742719] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.743669] [ 36.744059] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.745296] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.745868] Hardware name: linux,dummy-virt (DT) [ 36.746564] Call trace: [ 36.747034] show_stack+0x20/0x38 (C) [ 36.747709] dump_stack_lvl+0x8c/0xd0 [ 36.748312] print_report+0x118/0x5e0 [ 36.748944] kasan_report+0xc8/0x118 [ 36.749606] kasan_check_range+0x100/0x1a8 [ 36.750306] __kasan_check_write+0x20/0x30 [ 36.751030] kasan_atomics_helper+0xff0/0x4858 [ 36.751741] kasan_atomics+0x198/0x2e8 [ 36.752252] kunit_try_run_case+0x14c/0x3d0 [ 36.752987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.753812] kthread+0x24c/0x2d0 [ 36.754408] ret_from_fork+0x10/0x20 [ 36.755089] [ 36.755424] Allocated by task 254: [ 36.755962] kasan_save_stack+0x3c/0x68 [ 36.756618] kasan_save_track+0x20/0x40 [ 36.757194] kasan_save_alloc_info+0x40/0x58 [ 36.757817] __kasan_kmalloc+0xd4/0xd8 [ 36.758306] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.759024] kasan_atomics+0xb8/0x2e8 [ 36.759656] kunit_try_run_case+0x14c/0x3d0 [ 36.760341] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.761136] kthread+0x24c/0x2d0 [ 36.761654] ret_from_fork+0x10/0x20 [ 36.762259] [ 36.762653] The buggy address belongs to the object at fff00000c69ef080 [ 36.762653] which belongs to the cache kmalloc-64 of size 64 [ 36.763798] The buggy address is located 0 bytes to the right of [ 36.763798] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.765045] [ 36.765419] The buggy address belongs to the physical page: [ 36.766218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.767134] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.767940] page_type: f5(slab) [ 36.768537] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.769409] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.770146] page dumped because: kasan: bad access detected [ 36.770931] [ 36.771302] Memory state around the buggy address: [ 36.771863] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.772773] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.773592] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.774376] ^ [ 36.775096] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.775934] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.776700] ================================================================== [ 37.397941] ================================================================== [ 37.398920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 37.399780] Read of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 37.401148] [ 37.401441] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.402551] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.403102] Hardware name: linux,dummy-virt (DT) [ 37.403726] Call trace: [ 37.404090] show_stack+0x20/0x38 (C) [ 37.404750] dump_stack_lvl+0x8c/0xd0 [ 37.405331] print_report+0x118/0x5e0 [ 37.405998] kasan_report+0xc8/0x118 [ 37.406530] __asan_report_load8_noabort+0x20/0x30 [ 37.407288] kasan_atomics_helper+0x3df4/0x4858 [ 37.407999] kasan_atomics+0x198/0x2e8 [ 37.408671] kunit_try_run_case+0x14c/0x3d0 [ 37.409316] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.410106] kthread+0x24c/0x2d0 [ 37.410609] ret_from_fork+0x10/0x20 [ 37.411245] [ 37.411636] Allocated by task 254: [ 37.412208] kasan_save_stack+0x3c/0x68 [ 37.412764] kasan_save_track+0x20/0x40 [ 37.413327] kasan_save_alloc_info+0x40/0x58 [ 37.414007] __kasan_kmalloc+0xd4/0xd8 [ 37.414653] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.415207] kasan_atomics+0xb8/0x2e8 [ 37.415882] kunit_try_run_case+0x14c/0x3d0 [ 37.416434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.417247] kthread+0x24c/0x2d0 [ 37.417782] ret_from_fork+0x10/0x20 [ 37.418320] [ 37.418712] The buggy address belongs to the object at fff00000c69ef080 [ 37.418712] which belongs to the cache kmalloc-64 of size 64 [ 37.419864] The buggy address is located 0 bytes to the right of [ 37.419864] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 37.421150] [ 37.421821] The buggy address belongs to the physical page: [ 37.422671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 37.423575] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.424357] page_type: f5(slab) [ 37.425083] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.426181] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.427085] page dumped because: kasan: bad access detected [ 37.427865] [ 37.428202] Memory state around the buggy address: [ 37.428742] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.429681] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.430448] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.431283] ^ [ 37.431972] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.432794] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.433545] ================================================================== [ 37.587561] ================================================================== [ 37.588318] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 37.589324] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 37.590667] [ 37.591134] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.592432] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.593115] Hardware name: linux,dummy-virt (DT) [ 37.593767] Call trace: [ 37.594272] show_stack+0x20/0x38 (C) [ 37.594988] dump_stack_lvl+0x8c/0xd0 [ 37.595692] print_report+0x118/0x5e0 [ 37.596373] kasan_report+0xc8/0x118 [ 37.597001] kasan_check_range+0x100/0x1a8 [ 37.597727] __kasan_check_write+0x20/0x30 [ 37.598427] kasan_atomics_helper+0x17ec/0x4858 [ 37.599155] kasan_atomics+0x198/0x2e8 [ 37.599858] kunit_try_run_case+0x14c/0x3d0 [ 37.600576] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.601363] kthread+0x24c/0x2d0 [ 37.601967] ret_from_fork+0x10/0x20 [ 37.602598] [ 37.603016] Allocated by task 254: [ 37.603644] kasan_save_stack+0x3c/0x68 [ 37.604189] kasan_save_track+0x20/0x40 [ 37.604880] kasan_save_alloc_info+0x40/0x58 [ 37.605489] __kasan_kmalloc+0xd4/0xd8 [ 37.606196] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.606846] kasan_atomics+0xb8/0x2e8 [ 37.607450] kunit_try_run_case+0x14c/0x3d0 [ 37.608156] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.608953] kthread+0x24c/0x2d0 [ 37.609498] ret_from_fork+0x10/0x20 [ 37.610117] [ 37.610503] The buggy address belongs to the object at fff00000c69ef080 [ 37.610503] which belongs to the cache kmalloc-64 of size 64 [ 37.611850] The buggy address is located 0 bytes to the right of [ 37.611850] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 37.613394] [ 37.613745] The buggy address belongs to the physical page: [ 37.614532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 37.615463] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.616390] page_type: f5(slab) [ 37.617025] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.618000] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.619327] page dumped because: kasan: bad access detected [ 37.619850] [ 37.620130] Memory state around the buggy address: [ 37.620764] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.621830] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.622807] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.623779] ^ [ 37.624536] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.625565] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.626414] ================================================================== [ 35.863099] ================================================================== [ 35.863992] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 35.864886] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.865828] [ 35.866257] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.867399] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.868040] Hardware name: linux,dummy-virt (DT) [ 35.868604] Call trace: [ 35.869080] show_stack+0x20/0x38 (C) [ 35.869709] dump_stack_lvl+0x8c/0xd0 [ 35.870373] print_report+0x118/0x5e0 [ 35.870956] kasan_report+0xc8/0x118 [ 35.871553] kasan_check_range+0x100/0x1a8 [ 35.872093] __kasan_check_write+0x20/0x30 [ 35.872805] kasan_atomics_helper+0x894/0x4858 [ 35.873561] kasan_atomics+0x198/0x2e8 [ 35.874218] kunit_try_run_case+0x14c/0x3d0 [ 35.874956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.875771] kthread+0x24c/0x2d0 [ 35.876366] ret_from_fork+0x10/0x20 [ 35.876974] [ 35.877302] Allocated by task 254: [ 35.877817] kasan_save_stack+0x3c/0x68 [ 35.878453] kasan_save_track+0x20/0x40 [ 35.879124] kasan_save_alloc_info+0x40/0x58 [ 35.879775] __kasan_kmalloc+0xd4/0xd8 [ 35.880374] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.881059] kasan_atomics+0xb8/0x2e8 [ 35.881696] kunit_try_run_case+0x14c/0x3d0 [ 35.882293] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.883070] kthread+0x24c/0x2d0 [ 35.883543] ret_from_fork+0x10/0x20 [ 35.884144] [ 35.884528] The buggy address belongs to the object at fff00000c69ef080 [ 35.884528] which belongs to the cache kmalloc-64 of size 64 [ 35.885839] The buggy address is located 0 bytes to the right of [ 35.885839] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.887113] [ 35.887438] The buggy address belongs to the physical page: [ 35.888215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.889076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.889911] page_type: f5(slab) [ 35.890455] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.891374] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.892314] page dumped because: kasan: bad access detected [ 35.892873] [ 35.893250] Memory state around the buggy address: [ 35.893957] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.894822] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.895805] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.896679] ^ [ 35.897374] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.898143] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.899063] ================================================================== [ 35.518719] ================================================================== [ 35.519550] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 35.520466] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.521340] [ 35.521801] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.523373] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.524062] Hardware name: linux,dummy-virt (DT) [ 35.524777] Call trace: [ 35.525286] show_stack+0x20/0x38 (C) [ 35.525981] dump_stack_lvl+0x8c/0xd0 [ 35.526615] print_report+0x118/0x5e0 [ 35.527323] kasan_report+0xc8/0x118 [ 35.527939] kasan_check_range+0x100/0x1a8 [ 35.528677] __kasan_check_write+0x20/0x30 [ 35.529335] kasan_atomics_helper+0x47c/0x4858 [ 35.530043] kasan_atomics+0x198/0x2e8 [ 35.530688] kunit_try_run_case+0x14c/0x3d0 [ 35.531398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.532195] kthread+0x24c/0x2d0 [ 35.532827] ret_from_fork+0x10/0x20 [ 35.533463] [ 35.533843] Allocated by task 254: [ 35.534451] kasan_save_stack+0x3c/0x68 [ 35.535087] kasan_save_track+0x20/0x40 [ 35.535823] kasan_save_alloc_info+0x40/0x58 [ 35.536711] __kasan_kmalloc+0xd4/0xd8 [ 35.537538] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.538436] kasan_atomics+0xb8/0x2e8 [ 35.539249] kunit_try_run_case+0x14c/0x3d0 [ 35.539986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.540800] kthread+0x24c/0x2d0 [ 35.541269] ret_from_fork+0x10/0x20 [ 35.541816] [ 35.542197] The buggy address belongs to the object at fff00000c69ef080 [ 35.542197] which belongs to the cache kmalloc-64 of size 64 [ 35.543549] The buggy address is located 0 bytes to the right of [ 35.543549] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.544700] [ 35.545086] The buggy address belongs to the physical page: [ 35.545889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.546853] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.547648] page_type: f5(slab) [ 35.548226] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.549110] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.549906] page dumped because: kasan: bad access detected [ 35.550638] [ 35.551080] Memory state around the buggy address: [ 35.551644] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.552576] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.553387] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.554149] ^ [ 35.554863] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.555610] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.556495] ================================================================== [ 35.119324] ================================================================== [ 35.120920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 35.121811] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.122693] [ 35.123076] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.124243] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.124917] Hardware name: linux,dummy-virt (DT) [ 35.125834] Call trace: [ 35.126181] show_stack+0x20/0x38 (C) [ 35.127288] dump_stack_lvl+0x8c/0xd0 [ 35.127853] print_report+0x118/0x5e0 [ 35.128495] kasan_report+0xc8/0x118 [ 35.129023] __asan_report_load4_noabort+0x20/0x30 [ 35.129799] kasan_atomics_helper+0x40a8/0x4858 [ 35.130760] kasan_atomics+0x198/0x2e8 [ 35.131336] kunit_try_run_case+0x14c/0x3d0 [ 35.132036] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.132813] kthread+0x24c/0x2d0 [ 35.133414] ret_from_fork+0x10/0x20 [ 35.134035] [ 35.134605] Allocated by task 254: [ 35.135221] kasan_save_stack+0x3c/0x68 [ 35.136077] kasan_save_track+0x20/0x40 [ 35.137110] kasan_save_alloc_info+0x40/0x58 [ 35.137772] __kasan_kmalloc+0xd4/0xd8 [ 35.139610] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.140649] kasan_atomics+0xb8/0x2e8 [ 35.141529] kunit_try_run_case+0x14c/0x3d0 [ 35.142039] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.143258] kthread+0x24c/0x2d0 [ 35.143821] ret_from_fork+0x10/0x20 [ 35.144497] [ 35.144912] The buggy address belongs to the object at fff00000c69ef080 [ 35.144912] which belongs to the cache kmalloc-64 of size 64 [ 35.146225] The buggy address is located 0 bytes to the right of [ 35.146225] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.147450] [ 35.148166] The buggy address belongs to the physical page: [ 35.149142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.150025] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.150859] page_type: f5(slab) [ 35.151556] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.152568] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.153601] page dumped because: kasan: bad access detected [ 35.154395] [ 35.154877] Memory state around the buggy address: [ 35.155662] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.156649] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.157360] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.158238] ^ [ 35.158896] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.159673] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.160610] ================================================================== [ 36.513252] ================================================================== [ 36.514038] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 36.515042] Read of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.515864] [ 36.516266] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.517427] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.518014] Hardware name: linux,dummy-virt (DT) [ 36.518899] Call trace: [ 36.519859] show_stack+0x20/0x38 (C) [ 36.520844] dump_stack_lvl+0x8c/0xd0 [ 36.521493] print_report+0x118/0x5e0 [ 36.522151] kasan_report+0xc8/0x118 [ 36.522732] __asan_report_load8_noabort+0x20/0x30 [ 36.523419] kasan_atomics_helper+0x3f58/0x4858 [ 36.524146] kasan_atomics+0x198/0x2e8 [ 36.524819] kunit_try_run_case+0x14c/0x3d0 [ 36.525454] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.526331] kthread+0x24c/0x2d0 [ 36.526901] ret_from_fork+0x10/0x20 [ 36.527471] [ 36.527806] Allocated by task 254: [ 36.528370] kasan_save_stack+0x3c/0x68 [ 36.528883] kasan_save_track+0x20/0x40 [ 36.529541] kasan_save_alloc_info+0x40/0x58 [ 36.530168] __kasan_kmalloc+0xd4/0xd8 [ 36.530759] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.531460] kasan_atomics+0xb8/0x2e8 [ 36.531992] kunit_try_run_case+0x14c/0x3d0 [ 36.532697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.533487] kthread+0x24c/0x2d0 [ 36.534026] ret_from_fork+0x10/0x20 [ 36.534619] [ 36.534999] The buggy address belongs to the object at fff00000c69ef080 [ 36.534999] which belongs to the cache kmalloc-64 of size 64 [ 36.536195] The buggy address is located 0 bytes to the right of [ 36.536195] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.537438] [ 36.537839] The buggy address belongs to the physical page: [ 36.538926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.539936] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.540791] page_type: f5(slab) [ 36.541324] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.542265] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.543193] page dumped because: kasan: bad access detected [ 36.543822] [ 36.544201] Memory state around the buggy address: [ 36.544899] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.545874] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.546609] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.547490] ^ [ 36.548137] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.548987] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.549724] ================================================================== [ 37.434975] ================================================================== [ 37.435770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 37.436741] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 37.437670] [ 37.438007] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.439352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.439944] Hardware name: linux,dummy-virt (DT) [ 37.440621] Call trace: [ 37.441088] show_stack+0x20/0x38 (C) [ 37.441759] dump_stack_lvl+0x8c/0xd0 [ 37.442287] print_report+0x118/0x5e0 [ 37.442964] kasan_report+0xc8/0x118 [ 37.443643] kasan_check_range+0x100/0x1a8 [ 37.444227] __kasan_check_write+0x20/0x30 [ 37.444927] kasan_atomics_helper+0x16d0/0x4858 [ 37.445596] kasan_atomics+0x198/0x2e8 [ 37.446247] kunit_try_run_case+0x14c/0x3d0 [ 37.446843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.447687] kthread+0x24c/0x2d0 [ 37.448212] ret_from_fork+0x10/0x20 [ 37.448880] [ 37.449250] Allocated by task 254: [ 37.449821] kasan_save_stack+0x3c/0x68 [ 37.450311] kasan_save_track+0x20/0x40 [ 37.450963] kasan_save_alloc_info+0x40/0x58 [ 37.451541] __kasan_kmalloc+0xd4/0xd8 [ 37.452181] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.452824] kasan_atomics+0xb8/0x2e8 [ 37.453435] kunit_try_run_case+0x14c/0x3d0 [ 37.454037] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.454780] kthread+0x24c/0x2d0 [ 37.455384] ret_from_fork+0x10/0x20 [ 37.455942] [ 37.456313] The buggy address belongs to the object at fff00000c69ef080 [ 37.456313] which belongs to the cache kmalloc-64 of size 64 [ 37.457584] The buggy address is located 0 bytes to the right of [ 37.457584] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 37.458780] [ 37.459170] The buggy address belongs to the physical page: [ 37.459938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 37.460819] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.461597] page_type: f5(slab) [ 37.462150] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.463180] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.463967] page dumped because: kasan: bad access detected [ 37.464698] [ 37.465050] Memory state around the buggy address: [ 37.465619] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.466452] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.467390] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.468266] ^ [ 37.468950] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.469841] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.470721] ================================================================== [ 36.474964] ================================================================== [ 36.475900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 36.476281] Read of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.477149] [ 36.477758] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.479191] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.479592] Hardware name: linux,dummy-virt (DT) [ 36.480568] Call trace: [ 36.481036] show_stack+0x20/0x38 (C) [ 36.481672] dump_stack_lvl+0x8c/0xd0 [ 36.482229] print_report+0x118/0x5e0 [ 36.482912] kasan_report+0xc8/0x118 [ 36.483557] kasan_check_range+0x100/0x1a8 [ 36.484256] __kasan_check_read+0x20/0x30 [ 36.484970] kasan_atomics_helper+0xdd4/0x4858 [ 36.485748] kasan_atomics+0x198/0x2e8 [ 36.486426] kunit_try_run_case+0x14c/0x3d0 [ 36.487267] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.488133] kthread+0x24c/0x2d0 [ 36.488724] ret_from_fork+0x10/0x20 [ 36.489258] [ 36.489661] Allocated by task 254: [ 36.490159] kasan_save_stack+0x3c/0x68 [ 36.490796] kasan_save_track+0x20/0x40 [ 36.491446] kasan_save_alloc_info+0x40/0x58 [ 36.492123] __kasan_kmalloc+0xd4/0xd8 [ 36.492644] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.493339] kasan_atomics+0xb8/0x2e8 [ 36.493904] kunit_try_run_case+0x14c/0x3d0 [ 36.494606] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.495394] kthread+0x24c/0x2d0 [ 36.495945] ret_from_fork+0x10/0x20 [ 36.496556] [ 36.496939] The buggy address belongs to the object at fff00000c69ef080 [ 36.496939] which belongs to the cache kmalloc-64 of size 64 [ 36.498176] The buggy address is located 0 bytes to the right of [ 36.498176] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.499597] [ 36.499979] The buggy address belongs to the physical page: [ 36.500585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.501612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.502303] page_type: f5(slab) [ 36.502910] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.503736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.504646] page dumped because: kasan: bad access detected [ 36.505304] [ 36.505681] Memory state around the buggy address: [ 36.506400] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.507276] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.508123] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.508859] ^ [ 36.509579] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.510356] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.511232] ================================================================== [ 37.355866] ================================================================== [ 37.356812] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 37.357750] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 37.358783] [ 37.359220] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.360584] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.361251] Hardware name: linux,dummy-virt (DT) [ 37.362003] Call trace: [ 37.362480] show_stack+0x20/0x38 (C) [ 37.363291] dump_stack_lvl+0x8c/0xd0 [ 37.364037] print_report+0x118/0x5e0 [ 37.364808] kasan_report+0xc8/0x118 [ 37.365491] kasan_check_range+0x100/0x1a8 [ 37.366275] __kasan_check_write+0x20/0x30 [ 37.367090] kasan_atomics_helper+0x1644/0x4858 [ 37.367865] kasan_atomics+0x198/0x2e8 [ 37.368578] kunit_try_run_case+0x14c/0x3d0 [ 37.369370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.370206] kthread+0x24c/0x2d0 [ 37.370740] ret_from_fork+0x10/0x20 [ 37.371388] [ 37.371769] Allocated by task 254: [ 37.372282] kasan_save_stack+0x3c/0x68 [ 37.372950] kasan_save_track+0x20/0x40 [ 37.373636] kasan_save_alloc_info+0x40/0x58 [ 37.374269] __kasan_kmalloc+0xd4/0xd8 [ 37.374942] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.375569] kasan_atomics+0xb8/0x2e8 [ 37.376253] kunit_try_run_case+0x14c/0x3d0 [ 37.376923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.377708] kthread+0x24c/0x2d0 [ 37.378275] ret_from_fork+0x10/0x20 [ 37.378940] [ 37.379303] The buggy address belongs to the object at fff00000c69ef080 [ 37.379303] which belongs to the cache kmalloc-64 of size 64 [ 37.380568] The buggy address is located 0 bytes to the right of [ 37.380568] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 37.381902] [ 37.382267] The buggy address belongs to the physical page: [ 37.382978] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 37.384021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.384873] page_type: f5(slab) [ 37.385480] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.386444] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.387384] page dumped because: kasan: bad access detected [ 37.388086] [ 37.388479] Memory state around the buggy address: [ 37.389103] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.390088] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.391163] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.392189] ^ [ 37.393005] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.394021] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.395029] ================================================================== [ 37.198504] ================================================================== [ 37.199269] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 37.200098] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 37.201037] [ 37.201376] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.202475] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.203361] Hardware name: linux,dummy-virt (DT) [ 37.204058] Call trace: [ 37.204544] show_stack+0x20/0x38 (C) [ 37.205155] dump_stack_lvl+0x8c/0xd0 [ 37.205702] print_report+0x118/0x5e0 [ 37.206347] kasan_report+0xc8/0x118 [ 37.207024] kasan_check_range+0x100/0x1a8 [ 37.207661] __kasan_check_write+0x20/0x30 [ 37.208307] kasan_atomics_helper+0x14e4/0x4858 [ 37.208914] kasan_atomics+0x198/0x2e8 [ 37.209576] kunit_try_run_case+0x14c/0x3d0 [ 37.210288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.211120] kthread+0x24c/0x2d0 [ 37.211777] ret_from_fork+0x10/0x20 [ 37.212323] [ 37.213048] Allocated by task 254: [ 37.213713] kasan_save_stack+0x3c/0x68 [ 37.214335] kasan_save_track+0x20/0x40 [ 37.215050] kasan_save_alloc_info+0x40/0x58 [ 37.215802] __kasan_kmalloc+0xd4/0xd8 [ 37.216526] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.217145] kasan_atomics+0xb8/0x2e8 [ 37.217819] kunit_try_run_case+0x14c/0x3d0 [ 37.218455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.219247] kthread+0x24c/0x2d0 [ 37.219823] ret_from_fork+0x10/0x20 [ 37.220442] [ 37.220880] The buggy address belongs to the object at fff00000c69ef080 [ 37.220880] which belongs to the cache kmalloc-64 of size 64 [ 37.222180] The buggy address is located 0 bytes to the right of [ 37.222180] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 37.223574] [ 37.223975] The buggy address belongs to the physical page: [ 37.224742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 37.225784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.226679] page_type: f5(slab) [ 37.227172] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.228121] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.229068] page dumped because: kasan: bad access detected [ 37.229764] [ 37.230161] Memory state around the buggy address: [ 37.230894] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.231812] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.232663] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.233557] ^ [ 37.234251] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.235140] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.236017] ================================================================== [ 37.279206] ================================================================== [ 37.280009] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 37.281773] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 37.282980] [ 37.283365] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.284492] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.285096] Hardware name: linux,dummy-virt (DT) [ 37.285678] Call trace: [ 37.286181] show_stack+0x20/0x38 (C) [ 37.286785] dump_stack_lvl+0x8c/0xd0 [ 37.287452] print_report+0x118/0x5e0 [ 37.288103] kasan_report+0xc8/0x118 [ 37.288701] kasan_check_range+0x100/0x1a8 [ 37.289284] __kasan_check_write+0x20/0x30 [ 37.289994] kasan_atomics_helper+0x15b4/0x4858 [ 37.290655] kasan_atomics+0x198/0x2e8 [ 37.291326] kunit_try_run_case+0x14c/0x3d0 [ 37.291961] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.292778] kthread+0x24c/0x2d0 [ 37.293398] ret_from_fork+0x10/0x20 [ 37.294010] [ 37.294339] Allocated by task 254: [ 37.294845] kasan_save_stack+0x3c/0x68 [ 37.295486] kasan_save_track+0x20/0x40 [ 37.296104] kasan_save_alloc_info+0x40/0x58 [ 37.296938] __kasan_kmalloc+0xd4/0xd8 [ 37.297440] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.298160] kasan_atomics+0xb8/0x2e8 [ 37.298791] kunit_try_run_case+0x14c/0x3d0 [ 37.299450] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.300093] kthread+0x24c/0x2d0 [ 37.300685] ret_from_fork+0x10/0x20 [ 37.301294] [ 37.301689] The buggy address belongs to the object at fff00000c69ef080 [ 37.301689] which belongs to the cache kmalloc-64 of size 64 [ 37.302898] The buggy address is located 0 bytes to the right of [ 37.302898] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 37.304256] [ 37.304605] The buggy address belongs to the physical page: [ 37.305317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 37.306285] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.307133] page_type: f5(slab) [ 37.307688] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.308612] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.309525] page dumped because: kasan: bad access detected [ 37.310131] [ 37.310498] Memory state around the buggy address: [ 37.311110] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.312014] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.312725] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.313642] ^ [ 37.314253] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.315066] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.316020] ================================================================== [ 36.248123] ================================================================== [ 36.248771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 36.249685] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.250559] [ 36.250977] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.251993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.252630] Hardware name: linux,dummy-virt (DT) [ 36.253308] Call trace: [ 36.253806] show_stack+0x20/0x38 (C) [ 36.254356] dump_stack_lvl+0x8c/0xd0 [ 36.255021] print_report+0x118/0x5e0 [ 36.255602] kasan_report+0xc8/0x118 [ 36.256269] kasan_check_range+0x100/0x1a8 [ 36.256824] __kasan_check_write+0x20/0x30 [ 36.257537] kasan_atomics_helper+0xc08/0x4858 [ 36.258264] kasan_atomics+0x198/0x2e8 [ 36.258909] kunit_try_run_case+0x14c/0x3d0 [ 36.259647] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.260471] kthread+0x24c/0x2d0 [ 36.261054] ret_from_fork+0x10/0x20 [ 36.261621] [ 36.262003] Allocated by task 254: [ 36.262489] kasan_save_stack+0x3c/0x68 [ 36.263156] kasan_save_track+0x20/0x40 [ 36.263736] kasan_save_alloc_info+0x40/0x58 [ 36.264360] __kasan_kmalloc+0xd4/0xd8 [ 36.264922] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.265641] kasan_atomics+0xb8/0x2e8 [ 36.266165] kunit_try_run_case+0x14c/0x3d0 [ 36.266860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.267638] kthread+0x24c/0x2d0 [ 36.268219] ret_from_fork+0x10/0x20 [ 36.268793] [ 36.269110] The buggy address belongs to the object at fff00000c69ef080 [ 36.269110] which belongs to the cache kmalloc-64 of size 64 [ 36.270412] The buggy address is located 0 bytes to the right of [ 36.270412] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.271721] [ 36.272104] The buggy address belongs to the physical page: [ 36.272822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.273689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.274419] page_type: f5(slab) [ 36.275027] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.275954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.276925] page dumped because: kasan: bad access detected [ 36.277592] [ 36.277965] Memory state around the buggy address: [ 36.278674] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.279504] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.280302] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.281065] ^ [ 36.281770] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.282548] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.283315] ================================================================== [ 37.006006] ================================================================== [ 37.006956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 37.007679] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 37.008658] [ 37.009063] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.010136] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.010718] Hardware name: linux,dummy-virt (DT) [ 37.011398] Call trace: [ 37.011888] show_stack+0x20/0x38 (C) [ 37.012501] dump_stack_lvl+0x8c/0xd0 [ 37.013124] print_report+0x118/0x5e0 [ 37.013802] kasan_report+0xc8/0x118 [ 37.014351] kasan_check_range+0x100/0x1a8 [ 37.015085] __kasan_check_write+0x20/0x30 [ 37.015784] kasan_atomics_helper+0x12d8/0x4858 [ 37.016377] kasan_atomics+0x198/0x2e8 [ 37.017050] kunit_try_run_case+0x14c/0x3d0 [ 37.017753] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.018589] kthread+0x24c/0x2d0 [ 37.019086] ret_from_fork+0x10/0x20 [ 37.019765] [ 37.020144] Allocated by task 254: [ 37.020719] kasan_save_stack+0x3c/0x68 [ 37.021214] kasan_save_track+0x20/0x40 [ 37.021852] kasan_save_alloc_info+0x40/0x58 [ 37.022553] __kasan_kmalloc+0xd4/0xd8 [ 37.023188] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.023861] kasan_atomics+0xb8/0x2e8 [ 37.024407] kunit_try_run_case+0x14c/0x3d0 [ 37.025102] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.025894] kthread+0x24c/0x2d0 [ 37.026427] ret_from_fork+0x10/0x20 [ 37.026981] [ 37.027347] The buggy address belongs to the object at fff00000c69ef080 [ 37.027347] which belongs to the cache kmalloc-64 of size 64 [ 37.028587] The buggy address is located 0 bytes to the right of [ 37.028587] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 37.029957] [ 37.030283] The buggy address belongs to the physical page: [ 37.031001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 37.031849] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.032732] page_type: f5(slab) [ 37.033273] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.034155] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.035032] page dumped because: kasan: bad access detected [ 37.035886] [ 37.036547] Memory state around the buggy address: [ 37.037183] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.038068] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.038979] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.039996] ^ [ 37.040594] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.041473] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.042465] ================================================================== [ 36.284721] ================================================================== [ 36.285454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 36.286422] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.287422] [ 36.287853] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.288968] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.289566] Hardware name: linux,dummy-virt (DT) [ 36.290094] Call trace: [ 36.290576] show_stack+0x20/0x38 (C) [ 36.291234] dump_stack_lvl+0x8c/0xd0 [ 36.291870] print_report+0x118/0x5e0 [ 36.292381] kasan_report+0xc8/0x118 [ 36.293037] __asan_report_load4_noabort+0x20/0x30 [ 36.293794] kasan_atomics_helper+0x3de4/0x4858 [ 36.294349] kasan_atomics+0x198/0x2e8 [ 36.295014] kunit_try_run_case+0x14c/0x3d0 [ 36.295763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.296482] kthread+0x24c/0x2d0 [ 36.297112] ret_from_fork+0x10/0x20 [ 36.297746] [ 36.298132] Allocated by task 254: [ 36.298714] kasan_save_stack+0x3c/0x68 [ 36.299271] kasan_save_track+0x20/0x40 [ 36.299931] kasan_save_alloc_info+0x40/0x58 [ 36.300568] __kasan_kmalloc+0xd4/0xd8 [ 36.301147] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.301847] kasan_atomics+0xb8/0x2e8 [ 36.302458] kunit_try_run_case+0x14c/0x3d0 [ 36.303046] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.303810] kthread+0x24c/0x2d0 [ 36.304355] ret_from_fork+0x10/0x20 [ 36.304894] [ 36.305274] The buggy address belongs to the object at fff00000c69ef080 [ 36.305274] which belongs to the cache kmalloc-64 of size 64 [ 36.307013] The buggy address is located 0 bytes to the right of [ 36.307013] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.308313] [ 36.309089] The buggy address belongs to the physical page: [ 36.309861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.310572] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.311463] page_type: f5(slab) [ 36.312044] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.313025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.314046] page dumped because: kasan: bad access detected [ 36.314677] [ 36.315005] Memory state around the buggy address: [ 36.315751] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.316558] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.317486] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.318211] ^ [ 36.318926] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.319709] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.320456] ================================================================== [ 35.788143] ================================================================== [ 35.788981] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 35.789724] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.791016] [ 35.791421] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.792543] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.793173] Hardware name: linux,dummy-virt (DT) [ 35.793878] Call trace: [ 35.794398] show_stack+0x20/0x38 (C) [ 35.795004] dump_stack_lvl+0x8c/0xd0 [ 35.795674] print_report+0x118/0x5e0 [ 35.796360] kasan_report+0xc8/0x118 [ 35.796933] kasan_check_range+0x100/0x1a8 [ 35.797633] __kasan_check_write+0x20/0x30 [ 35.798213] kasan_atomics_helper+0x760/0x4858 [ 35.798998] kasan_atomics+0x198/0x2e8 [ 35.799955] kunit_try_run_case+0x14c/0x3d0 [ 35.800575] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.801243] kthread+0x24c/0x2d0 [ 35.801807] ret_from_fork+0x10/0x20 [ 35.802387] [ 35.802785] Allocated by task 254: [ 35.803333] kasan_save_stack+0x3c/0x68 [ 35.803990] kasan_save_track+0x20/0x40 [ 35.804642] kasan_save_alloc_info+0x40/0x58 [ 35.805166] __kasan_kmalloc+0xd4/0xd8 [ 35.805841] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.806416] kasan_atomics+0xb8/0x2e8 [ 35.807062] kunit_try_run_case+0x14c/0x3d0 [ 35.807669] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.808305] kthread+0x24c/0x2d0 [ 35.808912] ret_from_fork+0x10/0x20 [ 35.809468] [ 35.809811] The buggy address belongs to the object at fff00000c69ef080 [ 35.809811] which belongs to the cache kmalloc-64 of size 64 [ 35.811008] The buggy address is located 0 bytes to the right of [ 35.811008] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.812339] [ 35.812743] The buggy address belongs to the physical page: [ 35.813319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.814243] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.815063] page_type: f5(slab) [ 35.815573] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.816616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.817386] page dumped because: kasan: bad access detected [ 35.818154] [ 35.818468] Memory state around the buggy address: [ 35.819084] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.819961] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.820722] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.821476] ^ [ 35.822198] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.822973] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.823905] ================================================================== [ 35.900810] ================================================================== [ 35.901645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 35.902424] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.903316] [ 35.903703] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.904830] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.905320] Hardware name: linux,dummy-virt (DT) [ 35.906020] Call trace: [ 35.906488] show_stack+0x20/0x38 (C) [ 35.907161] dump_stack_lvl+0x8c/0xd0 [ 35.907739] print_report+0x118/0x5e0 [ 35.908385] kasan_report+0xc8/0x118 [ 35.908951] __asan_report_load4_noabort+0x20/0x30 [ 35.909704] kasan_atomics_helper+0x42d8/0x4858 [ 35.910268] kasan_atomics+0x198/0x2e8 [ 35.910941] kunit_try_run_case+0x14c/0x3d0 [ 35.911538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.912316] kthread+0x24c/0x2d0 [ 35.912861] ret_from_fork+0x10/0x20 [ 35.913526] [ 35.913897] Allocated by task 254: [ 35.914455] kasan_save_stack+0x3c/0x68 [ 35.915041] kasan_save_track+0x20/0x40 [ 35.915715] kasan_save_alloc_info+0x40/0x58 [ 35.916245] __kasan_kmalloc+0xd4/0xd8 [ 35.916893] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.917548] kasan_atomics+0xb8/0x2e8 [ 35.918168] kunit_try_run_case+0x14c/0x3d0 [ 35.918753] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.919585] kthread+0x24c/0x2d0 [ 35.920131] ret_from_fork+0x10/0x20 [ 35.920629] [ 35.921008] The buggy address belongs to the object at fff00000c69ef080 [ 35.921008] which belongs to the cache kmalloc-64 of size 64 [ 35.922312] The buggy address is located 0 bytes to the right of [ 35.922312] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.923739] [ 35.924094] The buggy address belongs to the physical page: [ 35.924855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.925737] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.926623] page_type: f5(slab) [ 35.927171] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.928013] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.928861] page dumped because: kasan: bad access detected [ 35.929628] [ 35.929951] Memory state around the buggy address: [ 35.930530] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.931375] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.932203] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.933023] ^ [ 35.933661] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.934606] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.935292] ================================================================== [ 37.120741] ================================================================== [ 37.121485] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 37.122501] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 37.123492] [ 37.123956] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.125113] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.125797] Hardware name: linux,dummy-virt (DT) [ 37.126359] Call trace: [ 37.126881] show_stack+0x20/0x38 (C) [ 37.127529] dump_stack_lvl+0x8c/0xd0 [ 37.128203] print_report+0x118/0x5e0 [ 37.128892] kasan_report+0xc8/0x118 [ 37.129569] kasan_check_range+0x100/0x1a8 [ 37.130330] __kasan_check_write+0x20/0x30 [ 37.130959] kasan_atomics_helper+0x1414/0x4858 [ 37.131795] kasan_atomics+0x198/0x2e8 [ 37.132430] kunit_try_run_case+0x14c/0x3d0 [ 37.133198] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.133969] kthread+0x24c/0x2d0 [ 37.134643] ret_from_fork+0x10/0x20 [ 37.135279] [ 37.135672] Allocated by task 254: [ 37.136276] kasan_save_stack+0x3c/0x68 [ 37.136890] kasan_save_track+0x20/0x40 [ 37.137582] kasan_save_alloc_info+0x40/0x58 [ 37.138202] __kasan_kmalloc+0xd4/0xd8 [ 37.138893] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.139559] kasan_atomics+0xb8/0x2e8 [ 37.140211] kunit_try_run_case+0x14c/0x3d0 [ 37.140799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.141601] kthread+0x24c/0x2d0 [ 37.142196] ret_from_fork+0x10/0x20 [ 37.142798] [ 37.143220] The buggy address belongs to the object at fff00000c69ef080 [ 37.143220] which belongs to the cache kmalloc-64 of size 64 [ 37.144487] The buggy address is located 0 bytes to the right of [ 37.144487] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 37.145847] [ 37.146220] The buggy address belongs to the physical page: [ 37.146883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 37.147851] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.148745] page_type: f5(slab) [ 37.149280] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.150251] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.151200] page dumped because: kasan: bad access detected [ 37.151899] [ 37.152298] Memory state around the buggy address: [ 37.152940] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.153864] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.154736] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.155616] ^ [ 37.156228] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.157107] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.157996] ================================================================== [ 35.481423] ================================================================== [ 35.482566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 35.483611] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.484503] [ 35.484865] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.486008] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.486617] Hardware name: linux,dummy-virt (DT) [ 35.487130] Call trace: [ 35.487620] show_stack+0x20/0x38 (C) [ 35.488279] dump_stack_lvl+0x8c/0xd0 [ 35.488905] print_report+0x118/0x5e0 [ 35.489421] kasan_report+0xc8/0x118 [ 35.490077] kasan_check_range+0x100/0x1a8 [ 35.490791] __kasan_check_write+0x20/0x30 [ 35.491363] kasan_atomics_helper+0x414/0x4858 [ 35.492095] kasan_atomics+0x198/0x2e8 [ 35.492707] kunit_try_run_case+0x14c/0x3d0 [ 35.493417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.494156] kthread+0x24c/0x2d0 [ 35.494731] ret_from_fork+0x10/0x20 [ 35.495305] [ 35.495706] Allocated by task 254: [ 35.496171] kasan_save_stack+0x3c/0x68 [ 35.496823] kasan_save_track+0x20/0x40 [ 35.497398] kasan_save_alloc_info+0x40/0x58 [ 35.498069] __kasan_kmalloc+0xd4/0xd8 [ 35.498576] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.499280] kasan_atomics+0xb8/0x2e8 [ 35.499786] kunit_try_run_case+0x14c/0x3d0 [ 35.500455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.501101] kthread+0x24c/0x2d0 [ 35.501642] ret_from_fork+0x10/0x20 [ 35.502245] [ 35.502646] The buggy address belongs to the object at fff00000c69ef080 [ 35.502646] which belongs to the cache kmalloc-64 of size 64 [ 35.503918] The buggy address is located 0 bytes to the right of [ 35.503918] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.505027] [ 35.505443] The buggy address belongs to the physical page: [ 35.506219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.507196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.507939] page_type: f5(slab) [ 35.508567] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.509484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.510396] page dumped because: kasan: bad access detected [ 35.511114] [ 35.511491] Memory state around the buggy address: [ 35.512205] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.513048] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.513951] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.514818] ^ [ 35.515436] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.516340] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.517201] ================================================================== [ 35.405667] ================================================================== [ 35.406736] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 35.407801] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.408477] [ 35.408913] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.410100] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.410597] Hardware name: linux,dummy-virt (DT) [ 35.411282] Call trace: [ 35.411777] show_stack+0x20/0x38 (C) [ 35.412429] dump_stack_lvl+0x8c/0xd0 [ 35.413109] print_report+0x118/0x5e0 [ 35.413750] kasan_report+0xc8/0x118 [ 35.414260] __asan_report_store4_noabort+0x20/0x30 [ 35.415046] kasan_atomics_helper+0x3f94/0x4858 [ 35.415807] kasan_atomics+0x198/0x2e8 [ 35.416457] kunit_try_run_case+0x14c/0x3d0 [ 35.417175] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.418004] kthread+0x24c/0x2d0 [ 35.418572] ret_from_fork+0x10/0x20 [ 35.419159] [ 35.419542] Allocated by task 254: [ 35.420085] kasan_save_stack+0x3c/0x68 [ 35.420756] kasan_save_track+0x20/0x40 [ 35.421376] kasan_save_alloc_info+0x40/0x58 [ 35.422025] __kasan_kmalloc+0xd4/0xd8 [ 35.422671] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.423376] kasan_atomics+0xb8/0x2e8 [ 35.423961] kunit_try_run_case+0x14c/0x3d0 [ 35.424619] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.425413] kthread+0x24c/0x2d0 [ 35.425978] ret_from_fork+0x10/0x20 [ 35.426607] [ 35.426966] The buggy address belongs to the object at fff00000c69ef080 [ 35.426966] which belongs to the cache kmalloc-64 of size 64 [ 35.428243] The buggy address is located 0 bytes to the right of [ 35.428243] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.429545] [ 35.429928] The buggy address belongs to the physical page: [ 35.430632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.431473] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.432345] page_type: f5(slab) [ 35.432896] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.433780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.434647] page dumped because: kasan: bad access detected [ 35.435307] [ 35.435691] Memory state around the buggy address: [ 35.436389] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.437138] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.438046] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.438877] ^ [ 35.439428] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.440378] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.441152] ================================================================== [ 36.819357] ================================================================== [ 36.820413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 36.821240] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.822203] [ 36.822660] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.823960] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.824609] Hardware name: linux,dummy-virt (DT) [ 36.825302] Call trace: [ 36.825747] show_stack+0x20/0x38 (C) [ 36.826404] dump_stack_lvl+0x8c/0xd0 [ 36.827007] print_report+0x118/0x5e0 [ 36.827594] kasan_report+0xc8/0x118 [ 36.828248] kasan_check_range+0x100/0x1a8 [ 36.828964] __kasan_check_write+0x20/0x30 [ 36.829672] kasan_atomics_helper+0x10c0/0x4858 [ 36.830288] kasan_atomics+0x198/0x2e8 [ 36.830968] kunit_try_run_case+0x14c/0x3d0 [ 36.831629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.832436] kthread+0x24c/0x2d0 [ 36.833067] ret_from_fork+0x10/0x20 [ 36.833694] [ 36.834040] Allocated by task 254: [ 36.834620] kasan_save_stack+0x3c/0x68 [ 36.835197] kasan_save_track+0x20/0x40 [ 36.835796] kasan_save_alloc_info+0x40/0x58 [ 36.836367] __kasan_kmalloc+0xd4/0xd8 [ 36.836971] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.837558] kasan_atomics+0xb8/0x2e8 [ 36.838191] kunit_try_run_case+0x14c/0x3d0 [ 36.838882] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.839657] kthread+0x24c/0x2d0 [ 36.840245] ret_from_fork+0x10/0x20 [ 36.840878] [ 36.841264] The buggy address belongs to the object at fff00000c69ef080 [ 36.841264] which belongs to the cache kmalloc-64 of size 64 [ 36.842348] The buggy address is located 0 bytes to the right of [ 36.842348] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.843718] [ 36.844090] The buggy address belongs to the physical page: [ 36.844853] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.845707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.846530] page_type: f5(slab) [ 36.847066] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.848071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.848883] page dumped because: kasan: bad access detected [ 36.849708] [ 36.850005] Memory state around the buggy address: [ 36.850710] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.851560] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.852338] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.853163] ^ [ 36.853746] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.854681] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.855491] ================================================================== [ 36.551253] ================================================================== [ 36.552086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 36.552820] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.553766] [ 36.554210] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.555277] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.555941] Hardware name: linux,dummy-virt (DT) [ 36.556571] Call trace: [ 36.557037] show_stack+0x20/0x38 (C) [ 36.557662] dump_stack_lvl+0x8c/0xd0 [ 36.558319] print_report+0x118/0x5e0 [ 36.559003] kasan_report+0xc8/0x118 [ 36.559643] kasan_check_range+0x100/0x1a8 [ 36.560167] __kasan_check_write+0x20/0x30 [ 36.560881] kasan_atomics_helper+0xe44/0x4858 [ 36.561620] kasan_atomics+0x198/0x2e8 [ 36.562215] kunit_try_run_case+0x14c/0x3d0 [ 36.562884] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.563637] kthread+0x24c/0x2d0 [ 36.564262] ret_from_fork+0x10/0x20 [ 36.564837] [ 36.565220] Allocated by task 254: [ 36.565814] kasan_save_stack+0x3c/0x68 [ 36.566444] kasan_save_track+0x20/0x40 [ 36.566973] kasan_save_alloc_info+0x40/0x58 [ 36.567671] __kasan_kmalloc+0xd4/0xd8 [ 36.568304] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.568888] kasan_atomics+0xb8/0x2e8 [ 36.569776] kunit_try_run_case+0x14c/0x3d0 [ 36.570406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.571131] kthread+0x24c/0x2d0 [ 36.571729] ret_from_fork+0x10/0x20 [ 36.572268] [ 36.572661] The buggy address belongs to the object at fff00000c69ef080 [ 36.572661] which belongs to the cache kmalloc-64 of size 64 [ 36.573848] The buggy address is located 0 bytes to the right of [ 36.573848] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.575113] [ 36.575483] The buggy address belongs to the physical page: [ 36.576278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.577105] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.577955] page_type: f5(slab) [ 36.578550] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.579388] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.580362] page dumped because: kasan: bad access detected [ 36.581082] [ 36.581456] Memory state around the buggy address: [ 36.582097] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.582943] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.583785] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.584544] ^ [ 36.585232] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.586080] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.586928] ================================================================== [ 37.548824] ================================================================== [ 37.549767] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 37.550857] Read of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 37.552051] [ 37.552782] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.554207] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.554670] Hardware name: linux,dummy-virt (DT) [ 37.555143] Call trace: [ 37.555591] show_stack+0x20/0x38 (C) [ 37.556111] dump_stack_lvl+0x8c/0xd0 [ 37.556405] print_report+0x118/0x5e0 [ 37.557178] kasan_report+0xc8/0x118 [ 37.557875] __asan_report_load8_noabort+0x20/0x30 [ 37.558724] kasan_atomics_helper+0x3e20/0x4858 [ 37.559529] kasan_atomics+0x198/0x2e8 [ 37.560104] kunit_try_run_case+0x14c/0x3d0 [ 37.560823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.561637] kthread+0x24c/0x2d0 [ 37.562246] ret_from_fork+0x10/0x20 [ 37.562827] [ 37.563203] Allocated by task 254: [ 37.563691] kasan_save_stack+0x3c/0x68 [ 37.564331] kasan_save_track+0x20/0x40 [ 37.565032] kasan_save_alloc_info+0x40/0x58 [ 37.565797] __kasan_kmalloc+0xd4/0xd8 [ 37.566335] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.567092] kasan_atomics+0xb8/0x2e8 [ 37.567681] kunit_try_run_case+0x14c/0x3d0 [ 37.568398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.569158] kthread+0x24c/0x2d0 [ 37.569806] ret_from_fork+0x10/0x20 [ 37.570374] [ 37.570811] The buggy address belongs to the object at fff00000c69ef080 [ 37.570811] which belongs to the cache kmalloc-64 of size 64 [ 37.572127] The buggy address is located 0 bytes to the right of [ 37.572127] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 37.573485] [ 37.573927] The buggy address belongs to the physical page: [ 37.574638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 37.575640] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.576603] page_type: f5(slab) [ 37.577126] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.578098] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.579008] page dumped because: kasan: bad access detected [ 37.579748] [ 37.580159] Memory state around the buggy address: [ 37.580860] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.581777] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.582642] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.583542] ^ [ 37.584158] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.585083] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.585997] ================================================================== [ 36.588661] ================================================================== [ 36.589716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 36.590910] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.591702] [ 36.592108] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.593407] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.593934] Hardware name: linux,dummy-virt (DT) [ 36.594631] Call trace: [ 36.595104] show_stack+0x20/0x38 (C) [ 36.595796] dump_stack_lvl+0x8c/0xd0 [ 36.596351] print_report+0x118/0x5e0 [ 36.597004] kasan_report+0xc8/0x118 [ 36.597566] __asan_report_store8_noabort+0x20/0x30 [ 36.598326] kasan_atomics_helper+0x3e5c/0x4858 [ 36.598940] kasan_atomics+0x198/0x2e8 [ 36.599604] kunit_try_run_case+0x14c/0x3d0 [ 36.600316] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.601783] kthread+0x24c/0x2d0 [ 36.602339] ret_from_fork+0x10/0x20 [ 36.602885] [ 36.603265] Allocated by task 254: [ 36.603840] kasan_save_stack+0x3c/0x68 [ 36.604453] kasan_save_track+0x20/0x40 [ 36.605106] kasan_save_alloc_info+0x40/0x58 [ 36.605846] __kasan_kmalloc+0xd4/0xd8 [ 36.606469] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.607097] kasan_atomics+0xb8/0x2e8 [ 36.607714] kunit_try_run_case+0x14c/0x3d0 [ 36.608399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.609191] kthread+0x24c/0x2d0 [ 36.609719] ret_from_fork+0x10/0x20 [ 36.610302] [ 36.610693] The buggy address belongs to the object at fff00000c69ef080 [ 36.610693] which belongs to the cache kmalloc-64 of size 64 [ 36.611897] The buggy address is located 0 bytes to the right of [ 36.611897] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.613247] [ 36.613649] The buggy address belongs to the physical page: [ 36.614301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.615333] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.616141] page_type: f5(slab) [ 36.616671] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.617601] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.618371] page dumped because: kasan: bad access detected [ 36.619140] [ 36.619535] Memory state around the buggy address: [ 36.620180] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.621126] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.621887] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.622771] ^ [ 36.623429] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.624315] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.625171] ================================================================== [ 37.045413] ================================================================== [ 37.046393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 37.047404] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 37.048446] [ 37.048944] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.049775] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.050396] Hardware name: linux,dummy-virt (DT) [ 37.051112] Call trace: [ 37.051584] show_stack+0x20/0x38 (C) [ 37.052247] dump_stack_lvl+0x8c/0xd0 [ 37.052827] print_report+0x118/0x5e0 [ 37.053729] kasan_report+0xc8/0x118 [ 37.054271] kasan_check_range+0x100/0x1a8 [ 37.054928] __kasan_check_write+0x20/0x30 [ 37.055619] kasan_atomics_helper+0x1384/0x4858 [ 37.056281] kasan_atomics+0x198/0x2e8 [ 37.056950] kunit_try_run_case+0x14c/0x3d0 [ 37.057567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.058357] kthread+0x24c/0x2d0 [ 37.058918] ret_from_fork+0x10/0x20 [ 37.059584] [ 37.059953] Allocated by task 254: [ 37.060449] kasan_save_stack+0x3c/0x68 [ 37.061114] kasan_save_track+0x20/0x40 [ 37.061734] kasan_save_alloc_info+0x40/0x58 [ 37.062419] __kasan_kmalloc+0xd4/0xd8 [ 37.063074] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.063685] kasan_atomics+0xb8/0x2e8 [ 37.064263] kunit_try_run_case+0x14c/0x3d0 [ 37.064956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.065751] kthread+0x24c/0x2d0 [ 37.066276] ret_from_fork+0x10/0x20 [ 37.066864] [ 37.067248] The buggy address belongs to the object at fff00000c69ef080 [ 37.067248] which belongs to the cache kmalloc-64 of size 64 [ 37.068426] The buggy address is located 0 bytes to the right of [ 37.068426] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 37.069870] [ 37.070253] The buggy address belongs to the physical page: [ 37.071041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 37.071868] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.072727] page_type: f5(slab) [ 37.073307] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.074292] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.075150] page dumped because: kasan: bad access detected [ 37.075905] [ 37.076282] Memory state around the buggy address: [ 37.076939] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.077879] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.078780] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.079638] ^ [ 37.080326] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.081114] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.081904] ================================================================== [ 35.596223] ================================================================== [ 35.597234] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 35.598425] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.599456] [ 35.599918] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.601185] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.601741] Hardware name: linux,dummy-virt (DT) [ 35.602416] Call trace: [ 35.602943] show_stack+0x20/0x38 (C) [ 35.603565] dump_stack_lvl+0x8c/0xd0 [ 35.604261] print_report+0x118/0x5e0 [ 35.604893] kasan_report+0xc8/0x118 [ 35.605472] kasan_check_range+0x100/0x1a8 [ 35.606167] __kasan_check_write+0x20/0x30 [ 35.606821] kasan_atomics_helper+0x54c/0x4858 [ 35.607558] kasan_atomics+0x198/0x2e8 [ 35.608221] kunit_try_run_case+0x14c/0x3d0 [ 35.608955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.609652] kthread+0x24c/0x2d0 [ 35.610257] ret_from_fork+0x10/0x20 [ 35.610927] [ 35.611280] Allocated by task 254: [ 35.611831] kasan_save_stack+0x3c/0x68 [ 35.612462] kasan_save_track+0x20/0x40 [ 35.613184] kasan_save_alloc_info+0x40/0x58 [ 35.613855] __kasan_kmalloc+0xd4/0xd8 [ 35.614413] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.615066] kasan_atomics+0xb8/0x2e8 [ 35.615584] kunit_try_run_case+0x14c/0x3d0 [ 35.616302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.617098] kthread+0x24c/0x2d0 [ 35.617699] ret_from_fork+0x10/0x20 [ 35.618177] [ 35.618577] The buggy address belongs to the object at fff00000c69ef080 [ 35.618577] which belongs to the cache kmalloc-64 of size 64 [ 35.619686] The buggy address is located 0 bytes to the right of [ 35.619686] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.621141] [ 35.621541] The buggy address belongs to the physical page: [ 35.622138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.623153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.624054] page_type: f5(slab) [ 35.624536] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.625437] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.626311] page dumped because: kasan: bad access detected [ 35.627087] [ 35.627395] Memory state around the buggy address: [ 35.628013] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.628858] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.629722] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.630468] ^ [ 35.631161] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.631955] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.632818] ================================================================== [ 35.635238] ================================================================== [ 35.636199] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 35.637054] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.637905] [ 35.638340] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.639286] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.639920] Hardware name: linux,dummy-virt (DT) [ 35.640614] Call trace: [ 35.641084] show_stack+0x20/0x38 (C) [ 35.641765] dump_stack_lvl+0x8c/0xd0 [ 35.642317] print_report+0x118/0x5e0 [ 35.642989] kasan_report+0xc8/0x118 [ 35.643622] kasan_check_range+0x100/0x1a8 [ 35.644251] __kasan_check_write+0x20/0x30 [ 35.644859] kasan_atomics_helper+0x5b4/0x4858 [ 35.645506] kasan_atomics+0x198/0x2e8 [ 35.646161] kunit_try_run_case+0x14c/0x3d0 [ 35.646786] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.647638] kthread+0x24c/0x2d0 [ 35.648227] ret_from_fork+0x10/0x20 [ 35.648814] [ 35.649181] Allocated by task 254: [ 35.649720] kasan_save_stack+0x3c/0x68 [ 35.650357] kasan_save_track+0x20/0x40 [ 35.650923] kasan_save_alloc_info+0x40/0x58 [ 35.651627] __kasan_kmalloc+0xd4/0xd8 [ 35.652252] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.652808] kasan_atomics+0xb8/0x2e8 [ 35.653435] kunit_try_run_case+0x14c/0x3d0 [ 35.654125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.654880] kthread+0x24c/0x2d0 [ 35.655467] ret_from_fork+0x10/0x20 [ 35.656122] [ 35.656503] The buggy address belongs to the object at fff00000c69ef080 [ 35.656503] which belongs to the cache kmalloc-64 of size 64 [ 35.657644] The buggy address is located 0 bytes to the right of [ 35.657644] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.658844] [ 35.659221] The buggy address belongs to the physical page: [ 35.659965] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.660929] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.661676] page_type: f5(slab) [ 35.662212] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.663226] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.663990] page dumped because: kasan: bad access detected [ 35.664752] [ 35.665132] Memory state around the buggy address: [ 35.665718] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.666615] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.667571] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.668265] ^ [ 35.668976] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.669772] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.670558] ================================================================== [ 36.091041] ================================================================== [ 36.091874] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 36.092788] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.093462] [ 36.093893] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.095101] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.095752] Hardware name: linux,dummy-virt (DT) [ 36.096287] Call trace: [ 36.096765] show_stack+0x20/0x38 (C) [ 36.097399] dump_stack_lvl+0x8c/0xd0 [ 36.098078] print_report+0x118/0x5e0 [ 36.098682] kasan_report+0xc8/0x118 [ 36.099343] kasan_check_range+0x100/0x1a8 [ 36.100035] __kasan_check_write+0x20/0x30 [ 36.100750] kasan_atomics_helper+0xad4/0x4858 [ 36.101408] kasan_atomics+0x198/0x2e8 [ 36.102016] kunit_try_run_case+0x14c/0x3d0 [ 36.102704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.103555] kthread+0x24c/0x2d0 [ 36.104136] ret_from_fork+0x10/0x20 [ 36.104732] [ 36.105162] Allocated by task 254: [ 36.105629] kasan_save_stack+0x3c/0x68 [ 36.106217] kasan_save_track+0x20/0x40 [ 36.106829] kasan_save_alloc_info+0x40/0x58 [ 36.107458] __kasan_kmalloc+0xd4/0xd8 [ 36.108068] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.109150] kasan_atomics+0xb8/0x2e8 [ 36.109674] kunit_try_run_case+0x14c/0x3d0 [ 36.110255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.111032] kthread+0x24c/0x2d0 [ 36.111620] ret_from_fork+0x10/0x20 [ 36.112267] [ 36.112664] The buggy address belongs to the object at fff00000c69ef080 [ 36.112664] which belongs to the cache kmalloc-64 of size 64 [ 36.113919] The buggy address is located 0 bytes to the right of [ 36.113919] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.115249] [ 36.115675] The buggy address belongs to the physical page: [ 36.116431] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.117447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.118320] page_type: f5(slab) [ 36.118924] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.119953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.120982] page dumped because: kasan: bad access detected [ 36.121772] [ 36.122201] Memory state around the buggy address: [ 36.122864] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.123869] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.124800] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.125776] ^ [ 36.126345] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.127318] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.128300] ================================================================== [ 36.210102] ================================================================== [ 36.210797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 36.211792] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.212692] [ 36.213081] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.214146] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.214796] Hardware name: linux,dummy-virt (DT) [ 36.215489] Call trace: [ 36.215986] show_stack+0x20/0x38 (C) [ 36.216649] dump_stack_lvl+0x8c/0xd0 [ 36.217264] print_report+0x118/0x5e0 [ 36.217787] kasan_report+0xc8/0x118 [ 36.218420] __asan_report_load4_noabort+0x20/0x30 [ 36.219133] kasan_atomics_helper+0x3dbc/0x4858 [ 36.219869] kasan_atomics+0x198/0x2e8 [ 36.220438] kunit_try_run_case+0x14c/0x3d0 [ 36.221075] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.221851] kthread+0x24c/0x2d0 [ 36.222457] ret_from_fork+0x10/0x20 [ 36.223126] [ 36.223440] Allocated by task 254: [ 36.224026] kasan_save_stack+0x3c/0x68 [ 36.224628] kasan_save_track+0x20/0x40 [ 36.225158] kasan_save_alloc_info+0x40/0x58 [ 36.225874] __kasan_kmalloc+0xd4/0xd8 [ 36.226496] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.227128] kasan_atomics+0xb8/0x2e8 [ 36.227775] kunit_try_run_case+0x14c/0x3d0 [ 36.228444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.229202] kthread+0x24c/0x2d0 [ 36.229772] ret_from_fork+0x10/0x20 [ 36.230381] [ 36.230758] The buggy address belongs to the object at fff00000c69ef080 [ 36.230758] which belongs to the cache kmalloc-64 of size 64 [ 36.231956] The buggy address is located 0 bytes to the right of [ 36.231956] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.233185] [ 36.233592] The buggy address belongs to the physical page: [ 36.234331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.235183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.236010] page_type: f5(slab) [ 36.236584] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.237466] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.238317] page dumped because: kasan: bad access detected [ 36.238962] [ 36.239338] Memory state around the buggy address: [ 36.240041] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.240847] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.241626] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.242427] ^ [ 36.243151] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.243916] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.244569] ================================================================== [ 36.398494] ================================================================== [ 36.399859] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 36.400841] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.401704] [ 36.402098] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.403363] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.403863] Hardware name: linux,dummy-virt (DT) [ 36.404551] Call trace: [ 36.404947] show_stack+0x20/0x38 (C) [ 36.405622] dump_stack_lvl+0x8c/0xd0 [ 36.406225] print_report+0x118/0x5e0 [ 36.406828] kasan_report+0xc8/0x118 [ 36.407483] kasan_check_range+0x100/0x1a8 [ 36.408196] __kasan_check_write+0x20/0x30 [ 36.408836] kasan_atomics_helper+0xd3c/0x4858 [ 36.409586] kasan_atomics+0x198/0x2e8 [ 36.410243] kunit_try_run_case+0x14c/0x3d0 [ 36.410984] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.411741] kthread+0x24c/0x2d0 [ 36.412245] ret_from_fork+0x10/0x20 [ 36.412914] [ 36.413285] Allocated by task 254: [ 36.413836] kasan_save_stack+0x3c/0x68 [ 36.414468] kasan_save_track+0x20/0x40 [ 36.415048] kasan_save_alloc_info+0x40/0x58 [ 36.415668] __kasan_kmalloc+0xd4/0xd8 [ 36.416330] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.416909] kasan_atomics+0xb8/0x2e8 [ 36.417538] kunit_try_run_case+0x14c/0x3d0 [ 36.418115] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.418874] kthread+0x24c/0x2d0 [ 36.419452] ret_from_fork+0x10/0x20 [ 36.420017] [ 36.420346] The buggy address belongs to the object at fff00000c69ef080 [ 36.420346] which belongs to the cache kmalloc-64 of size 64 [ 36.421640] The buggy address is located 0 bytes to the right of [ 36.421640] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.422871] [ 36.423252] The buggy address belongs to the physical page: [ 36.423953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.424903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.425775] page_type: f5(slab) [ 36.426317] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.427244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.428015] page dumped because: kasan: bad access detected [ 36.428772] [ 36.429147] Memory state around the buggy address: [ 36.430110] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.430965] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.431786] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.432603] ^ [ 36.433239] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.434089] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.434915] ================================================================== [ 35.443206] ================================================================== [ 35.443876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 35.444500] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.445319] [ 35.445750] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.447927] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.448493] Hardware name: linux,dummy-virt (DT) [ 35.449200] Call trace: [ 35.449673] show_stack+0x20/0x38 (C) [ 35.450219] dump_stack_lvl+0x8c/0xd0 [ 35.450912] print_report+0x118/0x5e0 [ 35.451585] kasan_report+0xc8/0x118 [ 35.452205] kasan_check_range+0x100/0x1a8 [ 35.452848] __kasan_check_write+0x20/0x30 [ 35.453481] kasan_atomics_helper+0x3ac/0x4858 [ 35.454123] kasan_atomics+0x198/0x2e8 [ 35.454737] kunit_try_run_case+0x14c/0x3d0 [ 35.455400] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.456103] kthread+0x24c/0x2d0 [ 35.456732] ret_from_fork+0x10/0x20 [ 35.457373] [ 35.457734] Allocated by task 254: [ 35.458243] kasan_save_stack+0x3c/0x68 [ 35.458868] kasan_save_track+0x20/0x40 [ 35.459488] kasan_save_alloc_info+0x40/0x58 [ 35.460178] __kasan_kmalloc+0xd4/0xd8 [ 35.460822] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.461533] kasan_atomics+0xb8/0x2e8 [ 35.462055] kunit_try_run_case+0x14c/0x3d0 [ 35.463208] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.464075] kthread+0x24c/0x2d0 [ 35.464551] ret_from_fork+0x10/0x20 [ 35.465150] [ 35.465557] The buggy address belongs to the object at fff00000c69ef080 [ 35.465557] which belongs to the cache kmalloc-64 of size 64 [ 35.466771] The buggy address is located 0 bytes to the right of [ 35.466771] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.468029] [ 35.468412] The buggy address belongs to the physical page: [ 35.469180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.470076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.470779] page_type: f5(slab) [ 35.471359] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.472241] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.473092] page dumped because: kasan: bad access detected [ 35.473883] [ 35.474287] Memory state around the buggy address: [ 35.474997] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.475977] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.476848] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.477574] ^ [ 35.478271] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.479051] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.479845] ================================================================== [ 36.664179] ================================================================== [ 36.665139] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 36.665840] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.666927] [ 36.667338] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.668702] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.669343] Hardware name: linux,dummy-virt (DT) [ 36.670072] Call trace: [ 36.670595] show_stack+0x20/0x38 (C) [ 36.671280] dump_stack_lvl+0x8c/0xd0 [ 36.671888] print_report+0x118/0x5e0 [ 36.672577] kasan_report+0xc8/0x118 [ 36.673120] kasan_check_range+0x100/0x1a8 [ 36.673834] __kasan_check_write+0x20/0x30 [ 36.674452] kasan_atomics_helper+0xf20/0x4858 [ 36.675101] kasan_atomics+0x198/0x2e8 [ 36.675746] kunit_try_run_case+0x14c/0x3d0 [ 36.676460] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.677281] kthread+0x24c/0x2d0 [ 36.677926] ret_from_fork+0x10/0x20 [ 36.678594] [ 36.678990] Allocated by task 254: [ 36.679426] kasan_save_stack+0x3c/0x68 [ 36.680270] kasan_save_track+0x20/0x40 [ 36.680868] kasan_save_alloc_info+0x40/0x58 [ 36.681418] __kasan_kmalloc+0xd4/0xd8 [ 36.681906] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.682408] kasan_atomics+0xb8/0x2e8 [ 36.682885] kunit_try_run_case+0x14c/0x3d0 [ 36.683572] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.684336] kthread+0x24c/0x2d0 [ 36.684870] ret_from_fork+0x10/0x20 [ 36.685472] [ 36.685865] The buggy address belongs to the object at fff00000c69ef080 [ 36.685865] which belongs to the cache kmalloc-64 of size 64 [ 36.686855] The buggy address is located 0 bytes to the right of [ 36.686855] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.687820] [ 36.688092] The buggy address belongs to the physical page: [ 36.688593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.689633] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.690539] page_type: f5(slab) [ 36.691118] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.692142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.693108] page dumped because: kasan: bad access detected [ 36.693823] [ 36.694191] Memory state around the buggy address: [ 36.694903] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.696734] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.698015] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.698834] ^ [ 36.699437] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.700249] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.701080] ================================================================== [ 36.322177] ================================================================== [ 36.323053] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 36.324003] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.324792] [ 36.325137] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.326453] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.327095] Hardware name: linux,dummy-virt (DT) [ 36.327788] Call trace: [ 36.328212] show_stack+0x20/0x38 (C) [ 36.328890] dump_stack_lvl+0x8c/0xd0 [ 36.329573] print_report+0x118/0x5e0 [ 36.330179] kasan_report+0xc8/0x118 [ 36.330809] kasan_check_range+0x100/0x1a8 [ 36.331526] __kasan_check_write+0x20/0x30 [ 36.332219] kasan_atomics_helper+0xca0/0x4858 [ 36.332915] kasan_atomics+0x198/0x2e8 [ 36.333561] kunit_try_run_case+0x14c/0x3d0 [ 36.334280] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.335143] kthread+0x24c/0x2d0 [ 36.335722] ret_from_fork+0x10/0x20 [ 36.336348] [ 36.336939] Allocated by task 254: [ 36.337495] kasan_save_stack+0x3c/0x68 [ 36.338155] kasan_save_track+0x20/0x40 [ 36.338758] kasan_save_alloc_info+0x40/0x58 [ 36.339482] __kasan_kmalloc+0xd4/0xd8 [ 36.340075] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.340795] kasan_atomics+0xb8/0x2e8 [ 36.341457] kunit_try_run_case+0x14c/0x3d0 [ 36.342160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.343019] kthread+0x24c/0x2d0 [ 36.343571] ret_from_fork+0x10/0x20 [ 36.344139] [ 36.344458] The buggy address belongs to the object at fff00000c69ef080 [ 36.344458] which belongs to the cache kmalloc-64 of size 64 [ 36.345688] The buggy address is located 0 bytes to the right of [ 36.345688] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.347030] [ 36.347410] The buggy address belongs to the physical page: [ 36.348117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.348981] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.349815] page_type: f5(slab) [ 36.350313] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.351195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.352066] page dumped because: kasan: bad access detected [ 36.352743] [ 36.353111] Memory state around the buggy address: [ 36.353647] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.354539] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.355273] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.356183] ^ [ 36.356806] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.357692] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.358532] ================================================================== [ 36.436231] ================================================================== [ 36.437054] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 36.438436] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.439289] [ 36.439711] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.440856] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.441392] Hardware name: linux,dummy-virt (DT) [ 36.442089] Call trace: [ 36.442563] show_stack+0x20/0x38 (C) [ 36.443121] dump_stack_lvl+0x8c/0xd0 [ 36.443750] print_report+0x118/0x5e0 [ 36.444284] kasan_report+0xc8/0x118 [ 36.444937] __asan_report_load4_noabort+0x20/0x30 [ 36.445732] kasan_atomics_helper+0x3e04/0x4858 [ 36.446471] kasan_atomics+0x198/0x2e8 [ 36.447127] kunit_try_run_case+0x14c/0x3d0 [ 36.447766] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.448502] kthread+0x24c/0x2d0 [ 36.449014] ret_from_fork+0x10/0x20 [ 36.449677] [ 36.450018] Allocated by task 254: [ 36.450599] kasan_save_stack+0x3c/0x68 [ 36.451225] kasan_save_track+0x20/0x40 [ 36.451824] kasan_save_alloc_info+0x40/0x58 [ 36.452416] __kasan_kmalloc+0xd4/0xd8 [ 36.453063] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.453695] kasan_atomics+0xb8/0x2e8 [ 36.454249] kunit_try_run_case+0x14c/0x3d0 [ 36.454952] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.455721] kthread+0x24c/0x2d0 [ 36.456240] ret_from_fork+0x10/0x20 [ 36.456876] [ 36.457251] The buggy address belongs to the object at fff00000c69ef080 [ 36.457251] which belongs to the cache kmalloc-64 of size 64 [ 36.458441] The buggy address is located 0 bytes to the right of [ 36.458441] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.459857] [ 36.460219] The buggy address belongs to the physical page: [ 36.460993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.461921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.462793] page_type: f5(slab) [ 36.463376] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.464221] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.465189] page dumped because: kasan: bad access detected [ 36.465936] [ 36.466317] Memory state around the buggy address: [ 36.466958] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.467793] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.468625] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.469403] ^ [ 36.470108] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.470939] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.471861] ================================================================== [ 35.162576] ================================================================== [ 35.163669] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 35.164545] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.165654] [ 35.166200] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.167768] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.168213] Hardware name: linux,dummy-virt (DT) [ 35.168754] Call trace: [ 35.169295] show_stack+0x20/0x38 (C) [ 35.170001] dump_stack_lvl+0x8c/0xd0 [ 35.170692] print_report+0x118/0x5e0 [ 35.171826] kasan_report+0xc8/0x118 [ 35.172482] __asan_report_store4_noabort+0x20/0x30 [ 35.173379] kasan_atomics_helper+0x3f7c/0x4858 [ 35.174133] kasan_atomics+0x198/0x2e8 [ 35.174833] kunit_try_run_case+0x14c/0x3d0 [ 35.175808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.176600] kthread+0x24c/0x2d0 [ 35.177204] ret_from_fork+0x10/0x20 [ 35.177910] [ 35.178204] Allocated by task 254: [ 35.179175] kasan_save_stack+0x3c/0x68 [ 35.179828] kasan_save_track+0x20/0x40 [ 35.180373] kasan_save_alloc_info+0x40/0x58 [ 35.181634] __kasan_kmalloc+0xd4/0xd8 [ 35.182435] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.183307] kasan_atomics+0xb8/0x2e8 [ 35.183907] kunit_try_run_case+0x14c/0x3d0 [ 35.184215] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.184571] kthread+0x24c/0x2d0 [ 35.185072] ret_from_fork+0x10/0x20 [ 35.185824] [ 35.186248] The buggy address belongs to the object at fff00000c69ef080 [ 35.186248] which belongs to the cache kmalloc-64 of size 64 [ 35.187645] The buggy address is located 0 bytes to the right of [ 35.187645] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.189100] [ 35.189419] The buggy address belongs to the physical page: [ 35.190304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.191270] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.192113] page_type: f5(slab) [ 35.192739] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.193546] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.194617] page dumped because: kasan: bad access detected [ 35.195271] [ 35.195729] Memory state around the buggy address: [ 35.196467] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.197326] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.198750] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.199652] ^ [ 35.200129] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.201778] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.202769] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 34.907738] ================================================================== [ 34.908986] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 34.909754] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250 [ 34.910848] [ 34.911274] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.912658] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.913231] Hardware name: linux,dummy-virt (DT) [ 34.913944] Call trace: [ 34.914454] show_stack+0x20/0x38 (C) [ 34.915076] dump_stack_lvl+0x8c/0xd0 [ 34.915819] print_report+0x118/0x5e0 [ 34.916448] kasan_report+0xc8/0x118 [ 34.917181] kasan_check_range+0x100/0x1a8 [ 34.917833] __kasan_check_write+0x20/0x30 [ 34.918586] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 34.919428] kasan_bitops_generic+0x11c/0x1c8 [ 34.920146] kunit_try_run_case+0x14c/0x3d0 [ 34.920848] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.921638] kthread+0x24c/0x2d0 [ 34.922233] ret_from_fork+0x10/0x20 [ 34.922913] [ 34.923307] Allocated by task 250: [ 34.923925] kasan_save_stack+0x3c/0x68 [ 34.924499] kasan_save_track+0x20/0x40 [ 34.925184] kasan_save_alloc_info+0x40/0x58 [ 34.925830] __kasan_kmalloc+0xd4/0xd8 [ 34.926487] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.927138] kasan_bitops_generic+0xa0/0x1c8 [ 34.927864] kunit_try_run_case+0x14c/0x3d0 [ 34.928660] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.929287] kthread+0x24c/0x2d0 [ 34.929919] ret_from_fork+0x10/0x20 [ 34.930652] [ 34.930985] The buggy address belongs to the object at fff00000c5b518c0 [ 34.930985] which belongs to the cache kmalloc-16 of size 16 [ 34.932157] The buggy address is located 8 bytes inside of [ 34.932157] allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9) [ 34.933006] [ 34.933317] The buggy address belongs to the physical page: [ 34.933874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 34.934856] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.935600] page_type: f5(slab) [ 34.936215] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.937039] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.938012] page dumped because: kasan: bad access detected [ 34.938711] [ 34.939051] Memory state around the buggy address: [ 34.939709] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.940433] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.941302] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.942140] ^ [ 34.942847] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.943633] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.944431] ================================================================== [ 34.946112] ================================================================== [ 34.947051] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 34.948145] Read of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250 [ 34.948929] [ 34.949338] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.950474] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.951060] Hardware name: linux,dummy-virt (DT) [ 34.951636] Call trace: [ 34.952099] show_stack+0x20/0x38 (C) [ 34.952703] dump_stack_lvl+0x8c/0xd0 [ 34.953331] print_report+0x118/0x5e0 [ 34.953956] kasan_report+0xc8/0x118 [ 34.954609] __asan_report_load8_noabort+0x20/0x30 [ 34.955224] kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 34.956139] kasan_bitops_generic+0x11c/0x1c8 [ 34.956766] kunit_try_run_case+0x14c/0x3d0 [ 34.957481] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.958307] kthread+0x24c/0x2d0 [ 34.958942] ret_from_fork+0x10/0x20 [ 34.959561] [ 34.959873] Allocated by task 250: [ 34.960440] kasan_save_stack+0x3c/0x68 [ 34.961102] kasan_save_track+0x20/0x40 [ 34.961662] kasan_save_alloc_info+0x40/0x58 [ 34.962350] __kasan_kmalloc+0xd4/0xd8 [ 34.963004] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.963566] kasan_bitops_generic+0xa0/0x1c8 [ 34.964233] kunit_try_run_case+0x14c/0x3d0 [ 34.964894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.965593] kthread+0x24c/0x2d0 [ 34.966219] ret_from_fork+0x10/0x20 [ 34.966851] [ 34.967223] The buggy address belongs to the object at fff00000c5b518c0 [ 34.967223] which belongs to the cache kmalloc-16 of size 16 [ 34.968488] The buggy address is located 8 bytes inside of [ 34.968488] allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9) [ 34.969609] [ 34.969980] The buggy address belongs to the physical page: [ 34.970755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 34.971554] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.972427] page_type: f5(slab) [ 34.973011] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.973875] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.974769] page dumped because: kasan: bad access detected [ 34.975553] [ 34.975967] Memory state around the buggy address: [ 34.976528] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.977450] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.978181] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.979117] ^ [ 34.979768] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.980671] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.981531] ================================================================== [ 35.063205] ================================================================== [ 35.063959] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 35.064952] Read of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250 [ 35.065674] [ 35.066081] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.067790] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.068343] Hardware name: linux,dummy-virt (DT) [ 35.069077] Call trace: [ 35.069573] show_stack+0x20/0x38 (C) [ 35.070228] dump_stack_lvl+0x8c/0xd0 [ 35.070748] print_report+0x118/0x5e0 [ 35.071340] kasan_report+0xc8/0x118 [ 35.071897] __asan_report_load8_noabort+0x20/0x30 [ 35.072696] kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 35.073618] kasan_bitops_generic+0x11c/0x1c8 [ 35.074332] kunit_try_run_case+0x14c/0x3d0 [ 35.075097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.075736] kthread+0x24c/0x2d0 [ 35.076347] ret_from_fork+0x10/0x20 [ 35.077022] [ 35.077426] Allocated by task 250: [ 35.077893] kasan_save_stack+0x3c/0x68 [ 35.078469] kasan_save_track+0x20/0x40 [ 35.079072] kasan_save_alloc_info+0x40/0x58 [ 35.079653] __kasan_kmalloc+0xd4/0xd8 [ 35.080267] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.080871] kasan_bitops_generic+0xa0/0x1c8 [ 35.081442] kunit_try_run_case+0x14c/0x3d0 [ 35.082116] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.082847] kthread+0x24c/0x2d0 [ 35.083449] ret_from_fork+0x10/0x20 [ 35.084085] [ 35.084451] The buggy address belongs to the object at fff00000c5b518c0 [ 35.084451] which belongs to the cache kmalloc-16 of size 16 [ 35.085652] The buggy address is located 8 bytes inside of [ 35.085652] allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9) [ 35.087030] [ 35.087416] The buggy address belongs to the physical page: [ 35.088185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 35.089054] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.089828] page_type: f5(slab) [ 35.090392] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.091220] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 35.092110] page dumped because: kasan: bad access detected [ 35.092864] [ 35.093240] Memory state around the buggy address: [ 35.093898] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.094655] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.095606] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 35.096394] ^ [ 35.097146] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.098020] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.098892] ================================================================== [ 34.753084] ================================================================== [ 34.754033] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 34.755174] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250 [ 34.756117] [ 34.756665] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.757757] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.758933] Hardware name: linux,dummy-virt (DT) [ 34.759807] Call trace: [ 34.760297] show_stack+0x20/0x38 (C) [ 34.761032] dump_stack_lvl+0x8c/0xd0 [ 34.761724] print_report+0x118/0x5e0 [ 34.762390] kasan_report+0xc8/0x118 [ 34.763070] kasan_check_range+0x100/0x1a8 [ 34.763670] __kasan_check_write+0x20/0x30 [ 34.764401] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 34.765289] kasan_bitops_generic+0x11c/0x1c8 [ 34.766023] kunit_try_run_case+0x14c/0x3d0 [ 34.766797] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.767500] kthread+0x24c/0x2d0 [ 34.768181] ret_from_fork+0x10/0x20 [ 34.768892] [ 34.769280] Allocated by task 250: [ 34.769946] kasan_save_stack+0x3c/0x68 [ 34.770695] kasan_save_track+0x20/0x40 [ 34.771327] kasan_save_alloc_info+0x40/0x58 [ 34.772015] __kasan_kmalloc+0xd4/0xd8 [ 34.772552] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.773296] kasan_bitops_generic+0xa0/0x1c8 [ 34.774032] kunit_try_run_case+0x14c/0x3d0 [ 34.774697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.775454] kthread+0x24c/0x2d0 [ 34.776077] ret_from_fork+0x10/0x20 [ 34.776701] [ 34.777078] The buggy address belongs to the object at fff00000c5b518c0 [ 34.777078] which belongs to the cache kmalloc-16 of size 16 [ 34.778298] The buggy address is located 8 bytes inside of [ 34.778298] allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9) [ 34.779764] [ 34.780185] The buggy address belongs to the physical page: [ 34.780916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 34.781886] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.782654] page_type: f5(slab) [ 34.783162] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.784176] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.784961] page dumped because: kasan: bad access detected [ 34.785726] [ 34.786093] Memory state around the buggy address: [ 34.786726] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.787500] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.788432] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.789254] ^ [ 34.790015] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.790918] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.791805] ================================================================== [ 34.983490] ================================================================== [ 34.984745] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 34.986330] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250 [ 34.987318] [ 34.988141] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.989322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.989883] Hardware name: linux,dummy-virt (DT) [ 34.990481] Call trace: [ 34.991217] show_stack+0x20/0x38 (C) [ 34.991770] dump_stack_lvl+0x8c/0xd0 [ 34.992427] print_report+0x118/0x5e0 [ 34.993125] kasan_report+0xc8/0x118 [ 34.993787] kasan_check_range+0x100/0x1a8 [ 34.994460] __kasan_check_write+0x20/0x30 [ 34.995166] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 34.996041] kasan_bitops_generic+0x11c/0x1c8 [ 34.996756] kunit_try_run_case+0x14c/0x3d0 [ 34.997443] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.998252] kthread+0x24c/0x2d0 [ 34.998831] ret_from_fork+0x10/0x20 [ 34.999415] [ 34.999834] Allocated by task 250: [ 35.000412] kasan_save_stack+0x3c/0x68 [ 35.001139] kasan_save_track+0x20/0x40 [ 35.001675] kasan_save_alloc_info+0x40/0x58 [ 35.002444] __kasan_kmalloc+0xd4/0xd8 [ 35.003128] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.003803] kasan_bitops_generic+0xa0/0x1c8 [ 35.004506] kunit_try_run_case+0x14c/0x3d0 [ 35.005127] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.005913] kthread+0x24c/0x2d0 [ 35.006476] ret_from_fork+0x10/0x20 [ 35.007094] [ 35.007526] The buggy address belongs to the object at fff00000c5b518c0 [ 35.007526] which belongs to the cache kmalloc-16 of size 16 [ 35.008816] The buggy address is located 8 bytes inside of [ 35.008816] allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9) [ 35.010116] [ 35.010540] The buggy address belongs to the physical page: [ 35.011196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 35.012182] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.012871] page_type: f5(slab) [ 35.013439] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.014339] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 35.015364] page dumped because: kasan: bad access detected [ 35.016140] [ 35.016627] Memory state around the buggy address: [ 35.017209] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.018066] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.019046] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 35.019983] ^ [ 35.020723] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.021650] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.022578] ================================================================== [ 34.830996] ================================================================== [ 34.831787] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 34.833122] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250 [ 34.834017] [ 34.834423] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.835807] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.836420] Hardware name: linux,dummy-virt (DT) [ 34.837006] Call trace: [ 34.837477] show_stack+0x20/0x38 (C) [ 34.838151] dump_stack_lvl+0x8c/0xd0 [ 34.838732] print_report+0x118/0x5e0 [ 34.839381] kasan_report+0xc8/0x118 [ 34.839990] kasan_check_range+0x100/0x1a8 [ 34.840641] __kasan_check_write+0x20/0x30 [ 34.841273] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 34.841985] kasan_bitops_generic+0x11c/0x1c8 [ 34.842715] kunit_try_run_case+0x14c/0x3d0 [ 34.843425] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.844211] kthread+0x24c/0x2d0 [ 34.844840] ret_from_fork+0x10/0x20 [ 34.845456] [ 34.845842] Allocated by task 250: [ 34.846410] kasan_save_stack+0x3c/0x68 [ 34.846967] kasan_save_track+0x20/0x40 [ 34.847580] kasan_save_alloc_info+0x40/0x58 [ 34.848203] __kasan_kmalloc+0xd4/0xd8 [ 34.848846] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.849450] kasan_bitops_generic+0xa0/0x1c8 [ 34.850061] kunit_try_run_case+0x14c/0x3d0 [ 34.850753] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.851428] kthread+0x24c/0x2d0 [ 34.852024] ret_from_fork+0x10/0x20 [ 34.852586] [ 34.852944] The buggy address belongs to the object at fff00000c5b518c0 [ 34.852944] which belongs to the cache kmalloc-16 of size 16 [ 34.854273] The buggy address is located 8 bytes inside of [ 34.854273] allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9) [ 34.855453] [ 34.855837] The buggy address belongs to the physical page: [ 34.856597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 34.857433] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.858181] page_type: f5(slab) [ 34.858774] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.859783] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.860713] page dumped because: kasan: bad access detected [ 34.861422] [ 34.861814] Memory state around the buggy address: [ 34.862468] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.863276] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.864119] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.864955] ^ [ 34.865694] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.866450] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.867335] ================================================================== [ 35.023934] ================================================================== [ 35.025061] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 35.026285] Read of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250 [ 35.027719] [ 35.027993] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.029457] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.030169] Hardware name: linux,dummy-virt (DT) [ 35.031002] Call trace: [ 35.031402] show_stack+0x20/0x38 (C) [ 35.031977] dump_stack_lvl+0x8c/0xd0 [ 35.032661] print_report+0x118/0x5e0 [ 35.033343] kasan_report+0xc8/0x118 [ 35.034069] __asan_report_load8_noabort+0x20/0x30 [ 35.034852] kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 35.035227] kasan_bitops_generic+0x11c/0x1c8 [ 35.035544] kunit_try_run_case+0x14c/0x3d0 [ 35.036111] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.036885] kthread+0x24c/0x2d0 [ 35.037537] ret_from_fork+0x10/0x20 [ 35.038204] [ 35.038460] Allocated by task 250: [ 35.038996] kasan_save_stack+0x3c/0x68 [ 35.039676] kasan_save_track+0x20/0x40 [ 35.040354] kasan_save_alloc_info+0x40/0x58 [ 35.041104] __kasan_kmalloc+0xd4/0xd8 [ 35.041845] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.042683] kasan_bitops_generic+0xa0/0x1c8 [ 35.043411] kunit_try_run_case+0x14c/0x3d0 [ 35.044030] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.044376] kthread+0x24c/0x2d0 [ 35.044749] ret_from_fork+0x10/0x20 [ 35.045500] [ 35.045960] The buggy address belongs to the object at fff00000c5b518c0 [ 35.045960] which belongs to the cache kmalloc-16 of size 16 [ 35.047563] The buggy address is located 8 bytes inside of [ 35.047563] allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9) [ 35.048835] [ 35.049147] The buggy address belongs to the physical page: [ 35.049867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 35.050806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.051608] page_type: f5(slab) [ 35.052184] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 35.053092] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 35.053873] page dumped because: kasan: bad access detected [ 35.054634] [ 35.054961] Memory state around the buggy address: [ 35.055609] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.056481] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 35.057278] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 35.058116] ^ [ 35.058819] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.059727] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.060479] ================================================================== [ 34.793661] ================================================================== [ 34.794677] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 34.795566] Read of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250 [ 34.796270] [ 34.796700] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.797899] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.798543] Hardware name: linux,dummy-virt (DT) [ 34.799213] Call trace: [ 34.799698] show_stack+0x20/0x38 (C) [ 34.800253] dump_stack_lvl+0x8c/0xd0 [ 34.800927] print_report+0x118/0x5e0 [ 34.801547] kasan_report+0xc8/0x118 [ 34.802048] __asan_report_load8_noabort+0x20/0x30 [ 34.802822] kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 34.803561] kasan_bitops_generic+0x11c/0x1c8 [ 34.804274] kunit_try_run_case+0x14c/0x3d0 [ 34.804993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.805812] kthread+0x24c/0x2d0 [ 34.806330] ret_from_fork+0x10/0x20 [ 34.807003] [ 34.807383] Allocated by task 250: [ 34.807847] kasan_save_stack+0x3c/0x68 [ 34.808483] kasan_save_track+0x20/0x40 [ 34.809068] kasan_save_alloc_info+0x40/0x58 [ 34.809779] __kasan_kmalloc+0xd4/0xd8 [ 34.810402] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.811094] kasan_bitops_generic+0xa0/0x1c8 [ 34.811686] kunit_try_run_case+0x14c/0x3d0 [ 34.812375] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.813186] kthread+0x24c/0x2d0 [ 34.813744] ret_from_fork+0x10/0x20 [ 34.814367] [ 34.814767] The buggy address belongs to the object at fff00000c5b518c0 [ 34.814767] which belongs to the cache kmalloc-16 of size 16 [ 34.815909] The buggy address is located 8 bytes inside of [ 34.815909] allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9) [ 34.817343] [ 34.817708] The buggy address belongs to the physical page: [ 34.818446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 34.819329] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.820127] page_type: f5(slab) [ 34.820700] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.821417] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.822393] page dumped because: kasan: bad access detected [ 34.823134] [ 34.823538] Memory state around the buggy address: [ 34.824157] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.825103] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.825851] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.826717] ^ [ 34.827381] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.828237] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.829048] ================================================================== [ 34.870679] ================================================================== [ 34.871425] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 34.872346] Read of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250 [ 34.873063] [ 34.873465] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.874724] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.875353] Hardware name: linux,dummy-virt (DT) [ 34.875939] Call trace: [ 34.876407] show_stack+0x20/0x38 (C) [ 34.877066] dump_stack_lvl+0x8c/0xd0 [ 34.877733] print_report+0x118/0x5e0 [ 34.878311] kasan_report+0xc8/0x118 [ 34.878858] __asan_report_load8_noabort+0x20/0x30 [ 34.879576] kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 34.880362] kasan_bitops_generic+0x11c/0x1c8 [ 34.881035] kunit_try_run_case+0x14c/0x3d0 [ 34.881692] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.882523] kthread+0x24c/0x2d0 [ 34.883127] ret_from_fork+0x10/0x20 [ 34.883699] [ 34.884083] Allocated by task 250: [ 34.884673] kasan_save_stack+0x3c/0x68 [ 34.885307] kasan_save_track+0x20/0x40 [ 34.885875] kasan_save_alloc_info+0x40/0x58 [ 34.886554] __kasan_kmalloc+0xd4/0xd8 [ 34.887190] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.887809] kasan_bitops_generic+0xa0/0x1c8 [ 34.888486] kunit_try_run_case+0x14c/0x3d0 [ 34.889106] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.889842] kthread+0x24c/0x2d0 [ 34.890429] ret_from_fork+0x10/0x20 [ 34.891009] [ 34.891398] The buggy address belongs to the object at fff00000c5b518c0 [ 34.891398] which belongs to the cache kmalloc-16 of size 16 [ 34.892659] The buggy address is located 8 bytes inside of [ 34.892659] allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9) [ 34.893814] [ 34.894190] The buggy address belongs to the physical page: [ 34.894957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 34.895978] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.896760] page_type: f5(slab) [ 34.897398] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.898651] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.899311] page dumped because: kasan: bad access detected [ 34.900013] [ 34.900433] Memory state around the buggy address: [ 34.901075] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.901990] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.902829] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.903889] ^ [ 34.904213] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.904667] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.905698] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 34.633721] ================================================================== [ 34.634730] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 34.635869] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250 [ 34.636611] [ 34.637024] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.638244] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.638928] Hardware name: linux,dummy-virt (DT) [ 34.639665] Call trace: [ 34.640155] show_stack+0x20/0x38 (C) [ 34.640837] dump_stack_lvl+0x8c/0xd0 [ 34.641558] print_report+0x118/0x5e0 [ 34.642256] kasan_report+0xc8/0x118 [ 34.642917] kasan_check_range+0x100/0x1a8 [ 34.643582] __kasan_check_write+0x20/0x30 [ 34.644209] kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 34.645040] kasan_bitops_generic+0x110/0x1c8 [ 34.645749] kunit_try_run_case+0x14c/0x3d0 [ 34.646434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.647270] kthread+0x24c/0x2d0 [ 34.647910] ret_from_fork+0x10/0x20 [ 34.648317] [ 34.648788] Allocated by task 250: [ 34.649533] kasan_save_stack+0x3c/0x68 [ 34.650199] kasan_save_track+0x20/0x40 [ 34.650838] kasan_save_alloc_info+0x40/0x58 [ 34.651613] __kasan_kmalloc+0xd4/0xd8 [ 34.652295] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.652948] kasan_bitops_generic+0xa0/0x1c8 [ 34.653591] kunit_try_run_case+0x14c/0x3d0 [ 34.654246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.655018] kthread+0x24c/0x2d0 [ 34.655620] ret_from_fork+0x10/0x20 [ 34.656198] [ 34.656630] The buggy address belongs to the object at fff00000c5b518c0 [ 34.656630] which belongs to the cache kmalloc-16 of size 16 [ 34.658022] The buggy address is located 8 bytes inside of [ 34.658022] allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9) [ 34.659329] [ 34.659738] The buggy address belongs to the physical page: [ 34.660541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 34.661482] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.662362] page_type: f5(slab) [ 34.662934] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.663912] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.664831] page dumped because: kasan: bad access detected [ 34.665507] [ 34.665917] Memory state around the buggy address: [ 34.666668] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.667454] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.668404] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.669246] ^ [ 34.669955] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.670784] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.671626] ================================================================== [ 34.353003] ================================================================== [ 34.354558] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 34.355542] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250 [ 34.356411] [ 34.356919] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.358229] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.358801] Hardware name: linux,dummy-virt (DT) [ 34.359433] Call trace: [ 34.359868] show_stack+0x20/0x38 (C) [ 34.360475] dump_stack_lvl+0x8c/0xd0 [ 34.361219] print_report+0x118/0x5e0 [ 34.361862] kasan_report+0xc8/0x118 [ 34.362766] kasan_check_range+0x100/0x1a8 [ 34.363368] __kasan_check_write+0x20/0x30 [ 34.364075] kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 34.364790] kasan_bitops_generic+0x110/0x1c8 [ 34.365492] kunit_try_run_case+0x14c/0x3d0 [ 34.366150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.366983] kthread+0x24c/0x2d0 [ 34.367586] ret_from_fork+0x10/0x20 [ 34.368158] [ 34.368743] Allocated by task 250: [ 34.369397] kasan_save_stack+0x3c/0x68 [ 34.370066] kasan_save_track+0x20/0x40 [ 34.370795] kasan_save_alloc_info+0x40/0x58 [ 34.371481] __kasan_kmalloc+0xd4/0xd8 [ 34.372120] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.372768] kasan_bitops_generic+0xa0/0x1c8 [ 34.373373] kunit_try_run_case+0x14c/0x3d0 [ 34.374012] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.375262] kthread+0x24c/0x2d0 [ 34.375922] ret_from_fork+0x10/0x20 [ 34.376482] [ 34.376878] The buggy address belongs to the object at fff00000c5b518c0 [ 34.376878] which belongs to the cache kmalloc-16 of size 16 [ 34.378196] The buggy address is located 8 bytes inside of [ 34.378196] allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9) [ 34.379332] [ 34.379733] The buggy address belongs to the physical page: [ 34.380417] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 34.381773] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.382538] page_type: f5(slab) [ 34.383122] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.383958] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.384872] page dumped because: kasan: bad access detected [ 34.385461] [ 34.385838] Memory state around the buggy address: [ 34.386496] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.387322] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.388186] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.388913] ^ [ 34.389696] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.390485] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.391260] ================================================================== [ 34.393249] ================================================================== [ 34.395189] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 34.395942] Read of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250 [ 34.397593] [ 34.398092] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.399532] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.400152] Hardware name: linux,dummy-virt (DT) [ 34.400779] Call trace: [ 34.401184] show_stack+0x20/0x38 (C) [ 34.402076] dump_stack_lvl+0x8c/0xd0 [ 34.402753] print_report+0x118/0x5e0 [ 34.403456] kasan_report+0xc8/0x118 [ 34.404126] __asan_report_load8_noabort+0x20/0x30 [ 34.404887] kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 34.405674] kasan_bitops_generic+0x110/0x1c8 [ 34.406261] kunit_try_run_case+0x14c/0x3d0 [ 34.406973] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.407793] kthread+0x24c/0x2d0 [ 34.408393] ret_from_fork+0x10/0x20 [ 34.409038] [ 34.409403] Allocated by task 250: [ 34.410022] kasan_save_stack+0x3c/0x68 [ 34.410607] kasan_save_track+0x20/0x40 [ 34.411287] kasan_save_alloc_info+0x40/0x58 [ 34.411881] __kasan_kmalloc+0xd4/0xd8 [ 34.412568] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.413209] kasan_bitops_generic+0xa0/0x1c8 [ 34.413945] kunit_try_run_case+0x14c/0x3d0 [ 34.414587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.415405] kthread+0x24c/0x2d0 [ 34.416007] ret_from_fork+0x10/0x20 [ 34.416613] [ 34.416976] The buggy address belongs to the object at fff00000c5b518c0 [ 34.416976] which belongs to the cache kmalloc-16 of size 16 [ 34.418225] The buggy address is located 8 bytes inside of [ 34.418225] allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9) [ 34.419574] [ 34.419993] The buggy address belongs to the physical page: [ 34.420778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 34.421794] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.422676] page_type: f5(slab) [ 34.423221] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.424154] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.425097] page dumped because: kasan: bad access detected [ 34.425807] [ 34.426226] Memory state around the buggy address: [ 34.426927] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.427823] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.428695] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.429552] ^ [ 34.430353] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.431311] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.432216] ================================================================== [ 34.674355] ================================================================== [ 34.675438] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 34.676549] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250 [ 34.677263] [ 34.677653] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.679215] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.679682] Hardware name: linux,dummy-virt (DT) [ 34.680193] Call trace: [ 34.680588] show_stack+0x20/0x38 (C) [ 34.681265] dump_stack_lvl+0x8c/0xd0 [ 34.682016] print_report+0x118/0x5e0 [ 34.682597] kasan_report+0xc8/0x118 [ 34.683285] kasan_check_range+0x100/0x1a8 [ 34.683922] __kasan_check_write+0x20/0x30 [ 34.684660] kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 34.685535] kasan_bitops_generic+0x110/0x1c8 [ 34.686170] kunit_try_run_case+0x14c/0x3d0 [ 34.686949] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.687779] kthread+0x24c/0x2d0 [ 34.688395] ret_from_fork+0x10/0x20 [ 34.689025] [ 34.689442] Allocated by task 250: [ 34.690056] kasan_save_stack+0x3c/0x68 [ 34.690737] kasan_save_track+0x20/0x40 [ 34.691304] kasan_save_alloc_info+0x40/0x58 [ 34.692027] __kasan_kmalloc+0xd4/0xd8 [ 34.692720] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.693320] kasan_bitops_generic+0xa0/0x1c8 [ 34.694043] kunit_try_run_case+0x14c/0x3d0 [ 34.694842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.695441] kthread+0x24c/0x2d0 [ 34.696007] ret_from_fork+0x10/0x20 [ 34.696690] [ 34.697062] The buggy address belongs to the object at fff00000c5b518c0 [ 34.697062] which belongs to the cache kmalloc-16 of size 16 [ 34.698436] The buggy address is located 8 bytes inside of [ 34.698436] allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9) [ 34.699849] [ 34.700258] The buggy address belongs to the physical page: [ 34.700964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 34.701905] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.702745] page_type: f5(slab) [ 34.703301] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.704301] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.705257] page dumped because: kasan: bad access detected [ 34.705966] [ 34.706348] Memory state around the buggy address: [ 34.707008] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.708036] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.709075] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.709961] ^ [ 34.710782] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.711625] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.712502] ================================================================== [ 34.595982] ================================================================== [ 34.596731] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 34.597549] Read of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250 [ 34.598453] [ 34.598890] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.600030] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.600559] Hardware name: linux,dummy-virt (DT) [ 34.601186] Call trace: [ 34.601686] show_stack+0x20/0x38 (C) [ 34.602355] dump_stack_lvl+0x8c/0xd0 [ 34.602939] print_report+0x118/0x5e0 [ 34.603639] kasan_report+0xc8/0x118 [ 34.604272] __asan_report_load8_noabort+0x20/0x30 [ 34.604904] kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 34.605732] kasan_bitops_generic+0x110/0x1c8 [ 34.606290] kunit_try_run_case+0x14c/0x3d0 [ 34.607008] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.607680] kthread+0x24c/0x2d0 [ 34.608283] ret_from_fork+0x10/0x20 [ 34.608941] [ 34.609314] Allocated by task 250: [ 34.609784] kasan_save_stack+0x3c/0x68 [ 34.610394] kasan_save_track+0x20/0x40 [ 34.611061] kasan_save_alloc_info+0x40/0x58 [ 34.611755] __kasan_kmalloc+0xd4/0xd8 [ 34.612399] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.613011] kasan_bitops_generic+0xa0/0x1c8 [ 34.613657] kunit_try_run_case+0x14c/0x3d0 [ 34.614264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.614971] kthread+0x24c/0x2d0 [ 34.615573] ret_from_fork+0x10/0x20 [ 34.616219] [ 34.616619] The buggy address belongs to the object at fff00000c5b518c0 [ 34.616619] which belongs to the cache kmalloc-16 of size 16 [ 34.617776] The buggy address is located 8 bytes inside of [ 34.617776] allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9) [ 34.618992] [ 34.619371] The buggy address belongs to the physical page: [ 34.620131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 34.620982] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.621796] page_type: f5(slab) [ 34.622371] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.623285] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.624172] page dumped because: kasan: bad access detected [ 34.624928] [ 34.625275] Memory state around the buggy address: [ 34.625884] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.626774] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.627636] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.628315] ^ [ 34.629114] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.629934] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.630840] ================================================================== [ 34.556056] ================================================================== [ 34.556885] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 34.559283] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250 [ 34.560158] [ 34.560501] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.561616] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.562228] Hardware name: linux,dummy-virt (DT) [ 34.562762] Call trace: [ 34.563243] show_stack+0x20/0x38 (C) [ 34.564178] dump_stack_lvl+0x8c/0xd0 [ 34.564819] print_report+0x118/0x5e0 [ 34.565429] kasan_report+0xc8/0x118 [ 34.566033] kasan_check_range+0x100/0x1a8 [ 34.566730] __kasan_check_write+0x20/0x30 [ 34.567342] kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 34.568159] kasan_bitops_generic+0x110/0x1c8 [ 34.568975] kunit_try_run_case+0x14c/0x3d0 [ 34.569644] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.570310] kthread+0x24c/0x2d0 [ 34.570943] ret_from_fork+0x10/0x20 [ 34.571546] [ 34.571924] Allocated by task 250: [ 34.572403] kasan_save_stack+0x3c/0x68 [ 34.573047] kasan_save_track+0x20/0x40 [ 34.573642] kasan_save_alloc_info+0x40/0x58 [ 34.574209] __kasan_kmalloc+0xd4/0xd8 [ 34.574852] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.575407] kasan_bitops_generic+0xa0/0x1c8 [ 34.576123] kunit_try_run_case+0x14c/0x3d0 [ 34.576679] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.577465] kthread+0x24c/0x2d0 [ 34.577982] ret_from_fork+0x10/0x20 [ 34.578525] [ 34.578910] The buggy address belongs to the object at fff00000c5b518c0 [ 34.578910] which belongs to the cache kmalloc-16 of size 16 [ 34.580059] The buggy address is located 8 bytes inside of [ 34.580059] allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9) [ 34.581283] [ 34.581690] The buggy address belongs to the physical page: [ 34.582416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 34.583446] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.584271] page_type: f5(slab) [ 34.584854] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.585776] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.586706] page dumped because: kasan: bad access detected [ 34.587453] [ 34.587804] Memory state around the buggy address: [ 34.588317] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.589249] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.590029] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.590837] ^ [ 34.591637] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.592361] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.593276] ================================================================== [ 34.476019] ================================================================== [ 34.477078] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 34.477978] Read of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250 [ 34.479205] [ 34.479838] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.481217] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.481881] Hardware name: linux,dummy-virt (DT) [ 34.482631] Call trace: [ 34.483132] show_stack+0x20/0x38 (C) [ 34.483870] dump_stack_lvl+0x8c/0xd0 [ 34.484410] print_report+0x118/0x5e0 [ 34.484932] kasan_report+0xc8/0x118 [ 34.485589] __asan_report_load8_noabort+0x20/0x30 [ 34.486297] kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 34.487092] kasan_bitops_generic+0x110/0x1c8 [ 34.487803] kunit_try_run_case+0x14c/0x3d0 [ 34.488498] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.489263] kthread+0x24c/0x2d0 [ 34.489780] ret_from_fork+0x10/0x20 [ 34.490406] [ 34.490805] Allocated by task 250: [ 34.491280] kasan_save_stack+0x3c/0x68 [ 34.491937] kasan_save_track+0x20/0x40 [ 34.492500] kasan_save_alloc_info+0x40/0x58 [ 34.493210] __kasan_kmalloc+0xd4/0xd8 [ 34.493857] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.494459] kasan_bitops_generic+0xa0/0x1c8 [ 34.495123] kunit_try_run_case+0x14c/0x3d0 [ 34.495851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.496617] kthread+0x24c/0x2d0 [ 34.497166] ret_from_fork+0x10/0x20 [ 34.497708] [ 34.498086] The buggy address belongs to the object at fff00000c5b518c0 [ 34.498086] which belongs to the cache kmalloc-16 of size 16 [ 34.499311] The buggy address is located 8 bytes inside of [ 34.499311] allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9) [ 34.500637] [ 34.500960] The buggy address belongs to the physical page: [ 34.501830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 34.502764] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.503856] page_type: f5(slab) [ 34.504447] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.505397] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.506355] page dumped because: kasan: bad access detected [ 34.507029] [ 34.507411] Memory state around the buggy address: [ 34.508035] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.508818] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.509602] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.510371] ^ [ 34.511172] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.512127] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.512894] ================================================================== [ 34.436341] ================================================================== [ 34.437120] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 34.437914] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250 [ 34.439309] [ 34.439824] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.441093] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.441806] Hardware name: linux,dummy-virt (DT) [ 34.442438] Call trace: [ 34.442969] show_stack+0x20/0x38 (C) [ 34.443677] dump_stack_lvl+0x8c/0xd0 [ 34.444255] print_report+0x118/0x5e0 [ 34.444979] kasan_report+0xc8/0x118 [ 34.445630] kasan_check_range+0x100/0x1a8 [ 34.446251] __kasan_check_write+0x20/0x30 [ 34.447012] kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 34.447821] kasan_bitops_generic+0x110/0x1c8 [ 34.448548] kunit_try_run_case+0x14c/0x3d0 [ 34.449288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.450173] kthread+0x24c/0x2d0 [ 34.450758] ret_from_fork+0x10/0x20 [ 34.451456] [ 34.451887] Allocated by task 250: [ 34.452363] kasan_save_stack+0x3c/0x68 [ 34.453063] kasan_save_track+0x20/0x40 [ 34.453706] kasan_save_alloc_info+0x40/0x58 [ 34.454267] __kasan_kmalloc+0xd4/0xd8 [ 34.454782] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.455416] kasan_bitops_generic+0xa0/0x1c8 [ 34.455955] kunit_try_run_case+0x14c/0x3d0 [ 34.456648] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.457279] kthread+0x24c/0x2d0 [ 34.457875] ret_from_fork+0x10/0x20 [ 34.458487] [ 34.458869] The buggy address belongs to the object at fff00000c5b518c0 [ 34.458869] which belongs to the cache kmalloc-16 of size 16 [ 34.460160] The buggy address is located 8 bytes inside of [ 34.460160] allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9) [ 34.461387] [ 34.461788] The buggy address belongs to the physical page: [ 34.462558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 34.463472] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.464249] page_type: f5(slab) [ 34.464779] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.465735] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.466636] page dumped because: kasan: bad access detected [ 34.467329] [ 34.467690] Memory state around the buggy address: [ 34.468200] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.469146] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.469867] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.470779] ^ [ 34.471469] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.472273] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.473121] ================================================================== [ 34.715947] ================================================================== [ 34.716753] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 34.717652] Read of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250 [ 34.718461] [ 34.719234] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.720302] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.720880] Hardware name: linux,dummy-virt (DT) [ 34.721452] Call trace: [ 34.721931] show_stack+0x20/0x38 (C) [ 34.722587] dump_stack_lvl+0x8c/0xd0 [ 34.723176] print_report+0x118/0x5e0 [ 34.723730] kasan_report+0xc8/0x118 [ 34.724372] __asan_report_load8_noabort+0x20/0x30 [ 34.725047] kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 34.725792] kasan_bitops_generic+0x110/0x1c8 [ 34.726418] kunit_try_run_case+0x14c/0x3d0 [ 34.727080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.727739] kthread+0x24c/0x2d0 [ 34.728338] ret_from_fork+0x10/0x20 [ 34.728929] [ 34.729305] Allocated by task 250: [ 34.729819] kasan_save_stack+0x3c/0x68 [ 34.730456] kasan_save_track+0x20/0x40 [ 34.731087] kasan_save_alloc_info+0x40/0x58 [ 34.731717] __kasan_kmalloc+0xd4/0xd8 [ 34.732252] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.732969] kasan_bitops_generic+0xa0/0x1c8 [ 34.733544] kunit_try_run_case+0x14c/0x3d0 [ 34.734213] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.734875] kthread+0x24c/0x2d0 [ 34.735462] ret_from_fork+0x10/0x20 [ 34.736075] [ 34.736433] The buggy address belongs to the object at fff00000c5b518c0 [ 34.736433] which belongs to the cache kmalloc-16 of size 16 [ 34.737764] The buggy address is located 8 bytes inside of [ 34.737764] allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9) [ 34.738981] [ 34.739357] The buggy address belongs to the physical page: [ 34.740118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 34.740908] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.741816] page_type: f5(slab) [ 34.742382] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.743356] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.744164] page dumped because: kasan: bad access detected [ 34.744867] [ 34.745240] Memory state around the buggy address: [ 34.745863] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.746657] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.747599] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.748384] ^ [ 34.749098] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.749955] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.750839] ================================================================== [ 34.516926] ================================================================== [ 34.517706] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 34.518450] Write of size 8 at addr fff00000c5b518c8 by task kunit_try_catch/250 [ 34.519533] [ 34.520137] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.521473] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.522151] Hardware name: linux,dummy-virt (DT) [ 34.522708] Call trace: [ 34.523632] show_stack+0x20/0x38 (C) [ 34.524675] dump_stack_lvl+0x8c/0xd0 [ 34.525266] print_report+0x118/0x5e0 [ 34.525929] kasan_report+0xc8/0x118 [ 34.526884] kasan_check_range+0x100/0x1a8 [ 34.527418] __kasan_check_write+0x20/0x30 [ 34.528140] kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 34.528807] kasan_bitops_generic+0x110/0x1c8 [ 34.529533] kunit_try_run_case+0x14c/0x3d0 [ 34.530160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.530975] kthread+0x24c/0x2d0 [ 34.531619] ret_from_fork+0x10/0x20 [ 34.532202] [ 34.532597] Allocated by task 250: [ 34.533031] kasan_save_stack+0x3c/0x68 [ 34.533695] kasan_save_track+0x20/0x40 [ 34.534256] kasan_save_alloc_info+0x40/0x58 [ 34.534959] __kasan_kmalloc+0xd4/0xd8 [ 34.535489] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.536239] kasan_bitops_generic+0xa0/0x1c8 [ 34.536866] kunit_try_run_case+0x14c/0x3d0 [ 34.537381] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.538332] kthread+0x24c/0x2d0 [ 34.538730] ret_from_fork+0x10/0x20 [ 34.539339] [ 34.539725] The buggy address belongs to the object at fff00000c5b518c0 [ 34.539725] which belongs to the cache kmalloc-16 of size 16 [ 34.540926] The buggy address is located 8 bytes inside of [ 34.540926] allocated 9-byte region [fff00000c5b518c0, fff00000c5b518c9) [ 34.542263] [ 34.542606] The buggy address belongs to the physical page: [ 34.543327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 34.544244] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.544928] page_type: f5(slab) [ 34.545493] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.546435] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.547419] page dumped because: kasan: bad access detected [ 34.548034] [ 34.548409] Memory state around the buggy address: [ 34.549112] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.549861] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.550749] >fff00000c5b51880: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 34.551480] ^ [ 34.552278] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.553113] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.553996] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 34.300203] ================================================================== [ 34.301299] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 34.302239] Read of size 1 at addr fff00000c69e4d10 by task kunit_try_catch/248 [ 34.303046] [ 34.303442] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.304778] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.305317] Hardware name: linux,dummy-virt (DT) [ 34.306125] Call trace: [ 34.306532] show_stack+0x20/0x38 (C) [ 34.307151] dump_stack_lvl+0x8c/0xd0 [ 34.307810] print_report+0x118/0x5e0 [ 34.308462] kasan_report+0xc8/0x118 [ 34.309131] __asan_report_load1_noabort+0x20/0x30 [ 34.309869] strnlen+0x80/0x88 [ 34.310456] kasan_strings+0x364/0x8d8 [ 34.311111] kunit_try_run_case+0x14c/0x3d0 [ 34.311734] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.312560] kthread+0x24c/0x2d0 [ 34.313051] ret_from_fork+0x10/0x20 [ 34.313738] [ 34.314112] Allocated by task 248: [ 34.314694] kasan_save_stack+0x3c/0x68 [ 34.315326] kasan_save_track+0x20/0x40 [ 34.316000] kasan_save_alloc_info+0x40/0x58 [ 34.316638] __kasan_kmalloc+0xd4/0xd8 [ 34.317266] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.317903] kasan_strings+0xb0/0x8d8 [ 34.318538] kunit_try_run_case+0x14c/0x3d0 [ 34.319085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.319900] kthread+0x24c/0x2d0 [ 34.320483] ret_from_fork+0x10/0x20 [ 34.321101] [ 34.321481] Freed by task 248: [ 34.321927] kasan_save_stack+0x3c/0x68 [ 34.322578] kasan_save_track+0x20/0x40 [ 34.323225] kasan_save_free_info+0x4c/0x78 [ 34.323898] __kasan_slab_free+0x6c/0x98 [ 34.324453] kfree+0x114/0x3c8 [ 34.325044] kasan_strings+0x124/0x8d8 [ 34.325693] kunit_try_run_case+0x14c/0x3d0 [ 34.326250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.327056] kthread+0x24c/0x2d0 [ 34.327661] ret_from_fork+0x10/0x20 [ 34.328144] [ 34.328536] The buggy address belongs to the object at fff00000c69e4d00 [ 34.328536] which belongs to the cache kmalloc-32 of size 32 [ 34.329813] The buggy address is located 16 bytes inside of [ 34.329813] freed 32-byte region [fff00000c69e4d00, fff00000c69e4d20) [ 34.331179] [ 34.331572] The buggy address belongs to the physical page: [ 34.332308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069e4 [ 34.333222] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.333943] page_type: f5(slab) [ 34.334505] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 34.335404] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 34.336227] page dumped because: kasan: bad access detected [ 34.337001] [ 34.337322] Memory state around the buggy address: [ 34.337933] fff00000c69e4c00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 34.338771] fff00000c69e4c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 34.339734] >fff00000c69e4d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 34.340457] ^ [ 34.341071] fff00000c69e4d80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 34.341847] fff00000c69e4e00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 34.342681] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[ 34.249714] ================================================================== [ 34.250982] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 34.251738] Read of size 1 at addr fff00000c69e4d10 by task kunit_try_catch/248 [ 34.252505] [ 34.253459] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.254641] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.255128] Hardware name: linux,dummy-virt (DT) [ 34.255758] Call trace: [ 34.256227] show_stack+0x20/0x38 (C) [ 34.256895] dump_stack_lvl+0x8c/0xd0 [ 34.257556] print_report+0x118/0x5e0 [ 34.258158] kasan_report+0xc8/0x118 [ 34.259127] __asan_report_load1_noabort+0x20/0x30 [ 34.259889] strlen+0xa8/0xb0 [ 34.260257] kasan_strings+0x304/0x8d8 [ 34.260924] kunit_try_run_case+0x14c/0x3d0 [ 34.261569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.262624] kthread+0x24c/0x2d0 [ 34.263394] ret_from_fork+0x10/0x20 [ 34.264010] [ 34.264367] Allocated by task 248: [ 34.264825] kasan_save_stack+0x3c/0x68 [ 34.265466] kasan_save_track+0x20/0x40 [ 34.266007] kasan_save_alloc_info+0x40/0x58 [ 34.266911] __kasan_kmalloc+0xd4/0xd8 [ 34.267874] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.268844] kasan_strings+0xb0/0x8d8 [ 34.269722] kunit_try_run_case+0x14c/0x3d0 [ 34.270142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.271185] kthread+0x24c/0x2d0 [ 34.271764] ret_from_fork+0x10/0x20 [ 34.272269] [ 34.272641] Freed by task 248: [ 34.273165] kasan_save_stack+0x3c/0x68 [ 34.273822] kasan_save_track+0x20/0x40 [ 34.274767] kasan_save_free_info+0x4c/0x78 [ 34.275410] __kasan_slab_free+0x6c/0x98 [ 34.275967] kfree+0x114/0x3c8 [ 34.276548] kasan_strings+0x124/0x8d8 [ 34.277165] kunit_try_run_case+0x14c/0x3d0 [ 34.277842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.278492] kthread+0x24c/0x2d0 [ 34.279101] ret_from_fork+0x10/0x20 [ 34.279731] [ 34.280101] The buggy address belongs to the object at fff00000c69e4d00 [ 34.280101] which belongs to the cache kmalloc-32 of size 32 [ 34.281472] The buggy address is located 16 bytes inside of [ 34.281472] freed 32-byte region [fff00000c69e4d00, fff00000c69e4d20) [ 34.283010] [ 34.283385] The buggy address belongs to the physical page: [ 34.284034] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069e4 [ 34.285176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.286006] page_type: f5(slab) [ 34.287173] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 34.288677] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 34.289549] page dumped because: kasan: bad access detected [ 34.290227] [ 34.290590] Memory state around the buggy address: [ 34.291289] fff00000c69e4c00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 34.292390] fff00000c69e4c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 34.293224] >fff00000c69e4d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 34.294501] ^ [ 34.295108] fff00000c69e4d80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 34.296014] fff00000c69e4e00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 34.296943] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 34.200195] ================================================================== [ 34.200952] BUG: KASAN: slab-use-after-free in kasan_strings+0x838/0x8d8 [ 34.201745] Read of size 1 at addr fff00000c69e4d10 by task kunit_try_catch/248 [ 34.202998] [ 34.203360] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.204234] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.204886] Hardware name: linux,dummy-virt (DT) [ 34.205498] Call trace: [ 34.205910] show_stack+0x20/0x38 (C) [ 34.206872] dump_stack_lvl+0x8c/0xd0 [ 34.207548] print_report+0x118/0x5e0 [ 34.208147] kasan_report+0xc8/0x118 [ 34.208748] __asan_report_load1_noabort+0x20/0x30 [ 34.209525] kasan_strings+0x838/0x8d8 [ 34.210147] kunit_try_run_case+0x14c/0x3d0 [ 34.211004] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.211814] kthread+0x24c/0x2d0 [ 34.212421] ret_from_fork+0x10/0x20 [ 34.213040] [ 34.213423] Allocated by task 248: [ 34.213965] kasan_save_stack+0x3c/0x68 [ 34.214822] kasan_save_track+0x20/0x40 [ 34.215610] kasan_save_alloc_info+0x40/0x58 [ 34.216288] __kasan_kmalloc+0xd4/0xd8 [ 34.217001] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.217786] kasan_strings+0xb0/0x8d8 [ 34.218593] kunit_try_run_case+0x14c/0x3d0 [ 34.219294] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.220210] kthread+0x24c/0x2d0 [ 34.220804] ret_from_fork+0x10/0x20 [ 34.221639] [ 34.222350] Freed by task 248: [ 34.223044] kasan_save_stack+0x3c/0x68 [ 34.223782] kasan_save_track+0x20/0x40 [ 34.224290] kasan_save_free_info+0x4c/0x78 [ 34.224979] __kasan_slab_free+0x6c/0x98 [ 34.225551] kfree+0x114/0x3c8 [ 34.226046] kasan_strings+0x124/0x8d8 [ 34.226574] kunit_try_run_case+0x14c/0x3d0 [ 34.227343] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.228265] kthread+0x24c/0x2d0 [ 34.228955] ret_from_fork+0x10/0x20 [ 34.229554] [ 34.229940] The buggy address belongs to the object at fff00000c69e4d00 [ 34.229940] which belongs to the cache kmalloc-32 of size 32 [ 34.231676] The buggy address is located 16 bytes inside of [ 34.231676] freed 32-byte region [fff00000c69e4d00, fff00000c69e4d20) [ 34.232759] [ 34.233139] The buggy address belongs to the physical page: [ 34.233801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069e4 [ 34.234897] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.235713] page_type: f5(slab) [ 34.236263] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 34.237199] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 34.238178] page dumped because: kasan: bad access detected [ 34.239106] [ 34.239454] Memory state around the buggy address: [ 34.240112] fff00000c69e4c00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 34.241965] fff00000c69e4c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 34.243069] >fff00000c69e4d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 34.243872] ^ [ 34.244365] fff00000c69e4d80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 34.245604] fff00000c69e4e00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 34.246618] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 34.148178] ================================================================== [ 34.150109] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 34.151910] Read of size 1 at addr fff00000c69e4d10 by task kunit_try_catch/248 [ 34.152770] [ 34.153181] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.154683] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.155317] Hardware name: linux,dummy-virt (DT) [ 34.155997] Call trace: [ 34.156442] show_stack+0x20/0x38 (C) [ 34.157068] dump_stack_lvl+0x8c/0xd0 [ 34.157708] print_report+0x118/0x5e0 [ 34.158659] kasan_report+0xc8/0x118 [ 34.159202] __asan_report_load1_noabort+0x20/0x30 [ 34.159994] strcmp+0xc0/0xc8 [ 34.160575] kasan_strings+0x228/0x8d8 [ 34.161150] kunit_try_run_case+0x14c/0x3d0 [ 34.161831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.162898] kthread+0x24c/0x2d0 [ 34.163426] ret_from_fork+0x10/0x20 [ 34.164080] [ 34.164415] Allocated by task 248: [ 34.164963] kasan_save_stack+0x3c/0x68 [ 34.165614] kasan_save_track+0x20/0x40 [ 34.166441] kasan_save_alloc_info+0x40/0x58 [ 34.167149] __kasan_kmalloc+0xd4/0xd8 [ 34.167707] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.168392] kasan_strings+0xb0/0x8d8 [ 34.169028] kunit_try_run_case+0x14c/0x3d0 [ 34.169710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.170936] kthread+0x24c/0x2d0 [ 34.171391] ret_from_fork+0x10/0x20 [ 34.172016] [ 34.172365] Freed by task 248: [ 34.173372] kasan_save_stack+0x3c/0x68 [ 34.173949] kasan_save_track+0x20/0x40 [ 34.174870] kasan_save_free_info+0x4c/0x78 [ 34.175562] __kasan_slab_free+0x6c/0x98 [ 34.176199] kfree+0x114/0x3c8 [ 34.176769] kasan_strings+0x124/0x8d8 [ 34.177298] kunit_try_run_case+0x14c/0x3d0 [ 34.177980] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.179069] kthread+0x24c/0x2d0 [ 34.179611] ret_from_fork+0x10/0x20 [ 34.180223] [ 34.180561] The buggy address belongs to the object at fff00000c69e4d00 [ 34.180561] which belongs to the cache kmalloc-32 of size 32 [ 34.181821] The buggy address is located 16 bytes inside of [ 34.181821] freed 32-byte region [fff00000c69e4d00, fff00000c69e4d20) [ 34.183371] [ 34.183733] The buggy address belongs to the physical page: [ 34.184469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069e4 [ 34.185397] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.186503] page_type: f5(slab) [ 34.187086] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 34.188007] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 34.188898] page dumped because: kasan: bad access detected [ 34.189635] [ 34.190008] Memory state around the buggy address: [ 34.191182] fff00000c69e4c00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 34.192002] fff00000c69e4c80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 34.193415] >fff00000c69e4d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 34.194248] ^ [ 34.194841] fff00000c69e4d80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 34.196030] fff00000c69e4e00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 34.196825] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 34.093760] ================================================================== [ 34.094880] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 34.095582] Read of size 1 at addr fff00000c69e4c58 by task kunit_try_catch/246 [ 34.096415] [ 34.096851] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.098723] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.099321] Hardware name: linux,dummy-virt (DT) [ 34.100063] Call trace: [ 34.100544] show_stack+0x20/0x38 (C) [ 34.101210] dump_stack_lvl+0x8c/0xd0 [ 34.101817] print_report+0x118/0x5e0 [ 34.102744] kasan_report+0xc8/0x118 [ 34.103343] __asan_report_load1_noabort+0x20/0x30 [ 34.104021] memcmp+0x198/0x1d8 [ 34.104594] kasan_memcmp+0x16c/0x300 [ 34.105169] kunit_try_run_case+0x14c/0x3d0 [ 34.105911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.106974] kthread+0x24c/0x2d0 [ 34.107544] ret_from_fork+0x10/0x20 [ 34.108180] [ 34.108579] Allocated by task 246: [ 34.109012] kasan_save_stack+0x3c/0x68 [ 34.109676] kasan_save_track+0x20/0x40 [ 34.110714] kasan_save_alloc_info+0x40/0x58 [ 34.111346] __kasan_kmalloc+0xd4/0xd8 [ 34.111929] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.112566] kasan_memcmp+0xbc/0x300 [ 34.113065] kunit_try_run_case+0x14c/0x3d0 [ 34.113760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.114797] kthread+0x24c/0x2d0 [ 34.115353] ret_from_fork+0x10/0x20 [ 34.115937] [ 34.116291] The buggy address belongs to the object at fff00000c69e4c40 [ 34.116291] which belongs to the cache kmalloc-32 of size 32 [ 34.117481] The buggy address is located 0 bytes to the right of [ 34.117481] allocated 24-byte region [fff00000c69e4c40, fff00000c69e4c58) [ 34.119160] [ 34.119562] The buggy address belongs to the physical page: [ 34.120194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069e4 [ 34.121113] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.121897] page_type: f5(slab) [ 34.122774] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 34.123618] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 34.124468] page dumped because: kasan: bad access detected [ 34.125183] [ 34.125578] Memory state around the buggy address: [ 34.126148] fff00000c69e4b00: 00 00 07 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 34.127402] fff00000c69e4b80: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc [ 34.128216] >fff00000c69e4c00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 34.129084] ^ [ 34.129813] fff00000c69e4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.131129] fff00000c69e4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.131902] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 31.777868] ================================================================== [ 31.779035] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750 [ 31.780469] Read of size 1 at addr fff00000c66fc373 by task kunit_try_catch/183 [ 31.781266] [ 31.782244] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 31.783444] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.784075] Hardware name: linux,dummy-virt (DT) [ 31.784830] Call trace: [ 31.785418] show_stack+0x20/0x38 (C) [ 31.786013] dump_stack_lvl+0x8c/0xd0 [ 31.787003] print_report+0x118/0x5e0 [ 31.787549] kasan_report+0xc8/0x118 [ 31.788136] __asan_report_load1_noabort+0x20/0x30 [ 31.788810] ksize_unpoisons_memory+0x638/0x750 [ 31.789540] kunit_try_run_case+0x14c/0x3d0 [ 31.790100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.791201] kthread+0x24c/0x2d0 [ 31.791695] ret_from_fork+0x10/0x20 [ 31.792334] [ 31.792724] Allocated by task 183: [ 31.793205] kasan_save_stack+0x3c/0x68 [ 31.793861] kasan_save_track+0x20/0x40 [ 31.794760] kasan_save_alloc_info+0x40/0x58 [ 31.795367] __kasan_kmalloc+0xd4/0xd8 [ 31.796033] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.796707] ksize_unpoisons_memory+0xc0/0x750 [ 31.797363] kunit_try_run_case+0x14c/0x3d0 [ 31.797983] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.798704] kthread+0x24c/0x2d0 [ 31.799297] ret_from_fork+0x10/0x20 [ 31.799842] [ 31.800212] The buggy address belongs to the object at fff00000c66fc300 [ 31.800212] which belongs to the cache kmalloc-128 of size 128 [ 31.802677] The buggy address is located 0 bytes to the right of [ 31.802677] allocated 115-byte region [fff00000c66fc300, fff00000c66fc373) [ 31.803975] [ 31.804353] The buggy address belongs to the physical page: [ 31.804989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066fc [ 31.805937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.807086] page_type: f5(slab) [ 31.807675] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.808471] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.809358] page dumped because: kasan: bad access detected [ 31.810104] [ 31.810774] Memory state around the buggy address: [ 31.811423] fff00000c66fc200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.812303] fff00000c66fc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.813183] >fff00000c66fc300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.814078] ^ [ 31.815262] fff00000c66fc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.816105] fff00000c66fc400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.816914] ================================================================== [ 31.820120] ================================================================== [ 31.820885] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750 [ 31.821649] Read of size 1 at addr fff00000c66fc378 by task kunit_try_catch/183 [ 31.823003] [ 31.823622] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 31.824797] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.825412] Hardware name: linux,dummy-virt (DT) [ 31.826078] Call trace: [ 31.826440] show_stack+0x20/0x38 (C) [ 31.827324] dump_stack_lvl+0x8c/0xd0 [ 31.827899] print_report+0x118/0x5e0 [ 31.828559] kasan_report+0xc8/0x118 [ 31.829202] __asan_report_load1_noabort+0x20/0x30 [ 31.829900] ksize_unpoisons_memory+0x628/0x750 [ 31.830671] kunit_try_run_case+0x14c/0x3d0 [ 31.831287] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.832043] kthread+0x24c/0x2d0 [ 31.832667] ret_from_fork+0x10/0x20 [ 31.833294] [ 31.833622] Allocated by task 183: [ 31.834183] kasan_save_stack+0x3c/0x68 [ 31.834763] kasan_save_track+0x20/0x40 [ 31.835694] kasan_save_alloc_info+0x40/0x58 [ 31.836335] __kasan_kmalloc+0xd4/0xd8 [ 31.836932] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.837654] ksize_unpoisons_memory+0xc0/0x750 [ 31.838703] kunit_try_run_case+0x14c/0x3d0 [ 31.839281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.840051] kthread+0x24c/0x2d0 [ 31.840603] ret_from_fork+0x10/0x20 [ 31.841207] [ 31.841590] The buggy address belongs to the object at fff00000c66fc300 [ 31.841590] which belongs to the cache kmalloc-128 of size 128 [ 31.843043] The buggy address is located 5 bytes to the right of [ 31.843043] allocated 115-byte region [fff00000c66fc300, fff00000c66fc373) [ 31.844691] [ 31.845038] The buggy address belongs to the physical page: [ 31.845588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066fc [ 31.846940] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.847863] page_type: f5(slab) [ 31.848329] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.849084] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.850233] page dumped because: kasan: bad access detected [ 31.851091] [ 31.851430] Memory state around the buggy address: [ 31.852059] fff00000c66fc200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.852840] fff00000c66fc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.853805] >fff00000c66fc300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.854964] ^ [ 31.855978] fff00000c66fc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.857011] fff00000c66fc400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.858003] ================================================================== [ 31.860067] ================================================================== [ 31.860780] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750 [ 31.861689] Read of size 1 at addr fff00000c66fc37f by task kunit_try_catch/183 [ 31.863375] [ 31.863802] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 31.864915] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.865546] Hardware name: linux,dummy-virt (DT) [ 31.866258] Call trace: [ 31.866724] show_stack+0x20/0x38 (C) [ 31.867307] dump_stack_lvl+0x8c/0xd0 [ 31.868226] print_report+0x118/0x5e0 [ 31.868882] kasan_report+0xc8/0x118 [ 31.869531] __asan_report_load1_noabort+0x20/0x30 [ 31.870143] ksize_unpoisons_memory+0x6a0/0x750 [ 31.871120] kunit_try_run_case+0x14c/0x3d0 [ 31.871838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.872481] kthread+0x24c/0x2d0 [ 31.873097] ret_from_fork+0x10/0x20 [ 31.873706] [ 31.874048] Allocated by task 183: [ 31.874558] kasan_save_stack+0x3c/0x68 [ 31.875094] kasan_save_track+0x20/0x40 [ 31.876004] kasan_save_alloc_info+0x40/0x58 [ 31.876642] __kasan_kmalloc+0xd4/0xd8 [ 31.877183] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.877898] ksize_unpoisons_memory+0xc0/0x750 [ 31.878899] kunit_try_run_case+0x14c/0x3d0 [ 31.879409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.880210] kthread+0x24c/0x2d0 [ 31.880892] ret_from_fork+0x10/0x20 [ 31.881503] [ 31.881890] The buggy address belongs to the object at fff00000c66fc300 [ 31.881890] which belongs to the cache kmalloc-128 of size 128 [ 31.883426] The buggy address is located 12 bytes to the right of [ 31.883426] allocated 115-byte region [fff00000c66fc300, fff00000c66fc373) [ 31.884677] [ 31.885050] The buggy address belongs to the physical page: [ 31.885882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066fc [ 31.886931] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.887807] page_type: f5(slab) [ 31.888320] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.889734] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.891098] page dumped because: kasan: bad access detected [ 31.891824] [ 31.892457] Memory state around the buggy address: [ 31.893248] fff00000c66fc200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.894410] fff00000c66fc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.895283] >fff00000c66fc300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.896058] ^ [ 31.897195] fff00000c66fc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.898219] fff00000c66fc400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.899286] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 34.039561] ================================================================== [ 34.040745] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2e4/0x348 [ 34.041574] Read of size 1 at addr ffff800080c27bea by task kunit_try_catch/242 [ 34.042420] [ 34.042912] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.045214] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.045940] Hardware name: linux,dummy-virt (DT) [ 34.046896] Call trace: [ 34.047377] show_stack+0x20/0x38 (C) [ 34.048057] dump_stack_lvl+0x8c/0xd0 [ 34.048734] print_report+0x2fc/0x5e0 [ 34.049393] kasan_report+0xc8/0x118 [ 34.050044] __asan_report_load1_noabort+0x20/0x30 [ 34.051043] kasan_alloca_oob_right+0x2e4/0x348 [ 34.051740] kunit_try_run_case+0x14c/0x3d0 [ 34.052451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.053197] kthread+0x24c/0x2d0 [ 34.053823] ret_from_fork+0x10/0x20 [ 34.054742] [ 34.055090] The buggy address belongs to stack of task kunit_try_catch/242 [ 34.055917] [ 34.056316] The buggy address belongs to the virtual mapping at [ 34.056316] [ffff800080c20000, ffff800080c29000) created by: [ 34.056316] kernel_clone+0x140/0x788 [ 34.057862] [ 34.058474] The buggy address belongs to the physical page: [ 34.059270] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106b61 [ 34.060191] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.061825] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 34.062787] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.063722] page dumped because: kasan: bad access detected [ 34.064361] [ 34.064752] Memory state around the buggy address: [ 34.065435] ffff800080c27a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.066855] ffff800080c27b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.067772] >ffff800080c27b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 34.068599] ^ [ 34.069338] ffff800080c27c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 [ 34.070155] ffff800080c27c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 [ 34.071293] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 33.996474] ================================================================== [ 33.997586] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 33.998447] Read of size 1 at addr ffff800080c27bdf by task kunit_try_catch/240 [ 33.999381] [ 34.000701] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 34.001904] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.003661] Hardware name: linux,dummy-virt (DT) [ 34.004187] Call trace: [ 34.004669] show_stack+0x20/0x38 (C) [ 34.005306] dump_stack_lvl+0x8c/0xd0 [ 34.005951] print_report+0x2fc/0x5e0 [ 34.006657] kasan_report+0xc8/0x118 [ 34.007225] __asan_report_load1_noabort+0x20/0x30 [ 34.008399] kasan_alloca_oob_left+0x2b8/0x310 [ 34.009123] kunit_try_run_case+0x14c/0x3d0 [ 34.009818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.011040] kthread+0x24c/0x2d0 [ 34.011704] ret_from_fork+0x10/0x20 [ 34.012225] [ 34.012622] The buggy address belongs to stack of task kunit_try_catch/240 [ 34.013408] [ 34.014062] The buggy address belongs to the virtual mapping at [ 34.014062] [ffff800080c20000, ffff800080c29000) created by: [ 34.014062] kernel_clone+0x140/0x788 [ 34.016043] [ 34.016503] The buggy address belongs to the physical page: [ 34.017262] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106b61 [ 34.018122] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.019977] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 34.020873] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.021739] page dumped because: kasan: bad access detected [ 34.022655] [ 34.023035] Memory state around the buggy address: [ 34.023749] ffff800080c27a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.024696] ffff800080c27b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.025477] >ffff800080c27b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 34.026275] ^ [ 34.027368] ffff800080c27c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 [ 34.028303] ffff800080c27c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 [ 34.029210] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 33.948789] ================================================================== [ 33.950884] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x230/0x268 [ 33.951582] Read of size 1 at addr ffff800080c27cba by task kunit_try_catch/238 [ 33.953255] [ 33.953724] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 33.955265] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.955958] Hardware name: linux,dummy-virt (DT) [ 33.956642] Call trace: [ 33.957063] show_stack+0x20/0x38 (C) [ 33.957695] dump_stack_lvl+0x8c/0xd0 [ 33.958431] print_report+0x2fc/0x5e0 [ 33.959447] kasan_report+0xc8/0x118 [ 33.960127] __asan_report_load1_noabort+0x20/0x30 [ 33.960998] kasan_stack_oob+0x230/0x268 [ 33.961610] kunit_try_run_case+0x14c/0x3d0 [ 33.962369] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.963120] kthread+0x24c/0x2d0 [ 33.964128] ret_from_fork+0x10/0x20 [ 33.964707] [ 33.965331] The buggy address belongs to stack of task kunit_try_catch/238 [ 33.966349] and is located at offset 138 in frame: [ 33.967255] kasan_stack_oob+0x0/0x268 [ 33.968051] [ 33.968472] This frame has 4 objects: [ 33.969184] [48, 49) '__assertion' [ 33.969376] [64, 72) 'array' [ 33.969914] [96, 112) '__assertion' [ 33.970423] [128, 138) 'stack_array' [ 33.971237] [ 33.971970] The buggy address belongs to the virtual mapping at [ 33.971970] [ffff800080c20000, ffff800080c29000) created by: [ 33.971970] kernel_clone+0x140/0x788 [ 33.973723] [ 33.974098] The buggy address belongs to the physical page: [ 33.975208] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106b61 [ 33.976163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.977034] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.977921] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.979187] page dumped because: kasan: bad access detected [ 33.979860] [ 33.980222] Memory state around the buggy address: [ 33.980763] ffff800080c27b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.981684] ffff800080c27c00: 00 00 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 [ 33.982906] >ffff800080c27c80: f2 f2 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 [ 33.983640] ^ [ 33.984351] ffff800080c27d00: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 [ 33.985119] ffff800080c27d80: f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 [ 33.985976] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 33.896764] ================================================================== [ 33.898043] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 33.899423] Read of size 1 at addr ffffa4990632202d by task kunit_try_catch/234 [ 33.900267] [ 33.900749] CPU: 0 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 33.901989] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.902656] Hardware name: linux,dummy-virt (DT) [ 33.903799] Call trace: [ 33.904125] show_stack+0x20/0x38 (C) [ 33.904787] dump_stack_lvl+0x8c/0xd0 [ 33.905400] print_report+0x2fc/0x5e0 [ 33.906096] kasan_report+0xc8/0x118 [ 33.907155] __asan_report_load1_noabort+0x20/0x30 [ 33.907815] kasan_global_oob_right+0x230/0x270 [ 33.908437] kunit_try_run_case+0x14c/0x3d0 [ 33.909078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.909797] kthread+0x24c/0x2d0 [ 33.910708] ret_from_fork+0x10/0x20 [ 33.911473] [ 33.911926] The buggy address belongs to the variable: [ 33.912604] global_array+0xd/0x40 [ 33.913220] [ 33.913795] The buggy address belongs to the virtual mapping at [ 33.913795] [ffffa49904650000, ffffa499063d1000) created by: [ 33.913795] paging_init+0x668/0x7c8 [ 33.915725] [ 33.916402] The buggy address belongs to the physical page: [ 33.917161] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47922 [ 33.918193] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 33.919579] raw: 03fffe0000002000 ffffc1ffc01e4888 ffffc1ffc01e4888 0000000000000000 [ 33.920572] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.921548] page dumped because: kasan: bad access detected [ 33.922311] [ 33.923129] Memory state around the buggy address: [ 33.923782] ffffa49906321f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.924663] ffffa49906321f80: 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9 f9 [ 33.925619] >ffffa49906322000: f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 [ 33.926800] ^ [ 33.927575] ffffa49906322080: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 [ 33.928432] ffffa49906322100: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.929325] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 33.795149] ================================================================== [ 33.796753] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 33.797610] Free of addr fff00000c6711b01 by task kunit_try_catch/230 [ 33.798286] [ 33.798780] CPU: 1 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 33.800116] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.801195] Hardware name: linux,dummy-virt (DT) [ 33.801809] Call trace: [ 33.802470] show_stack+0x20/0x38 (C) [ 33.803249] dump_stack_lvl+0x8c/0xd0 [ 33.803947] print_report+0x118/0x5e0 [ 33.804577] kasan_report_invalid_free+0xb0/0xd8 [ 33.805118] check_slab_allocation+0xfc/0x108 [ 33.805901] __kasan_mempool_poison_object+0x78/0x150 [ 33.806731] mempool_free+0x28c/0x328 [ 33.807469] mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 33.808185] mempool_kmalloc_invalid_free+0xb8/0x110 [ 33.808936] kunit_try_run_case+0x14c/0x3d0 [ 33.809650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.810403] kthread+0x24c/0x2d0 [ 33.811073] ret_from_fork+0x10/0x20 [ 33.811690] [ 33.812090] Allocated by task 230: [ 33.812675] kasan_save_stack+0x3c/0x68 [ 33.813234] kasan_save_track+0x20/0x40 [ 33.813754] kasan_save_alloc_info+0x40/0x58 [ 33.814356] __kasan_mempool_unpoison_object+0x11c/0x180 [ 33.815053] remove_element+0x130/0x1f8 [ 33.815732] mempool_alloc_preallocated+0x58/0xc0 [ 33.816404] mempool_kmalloc_invalid_free_helper+0x94/0x2a0 [ 33.817086] mempool_kmalloc_invalid_free+0xb8/0x110 [ 33.817840] kunit_try_run_case+0x14c/0x3d0 [ 33.818503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.819233] kthread+0x24c/0x2d0 [ 33.819836] ret_from_fork+0x10/0x20 [ 33.820435] [ 33.820812] The buggy address belongs to the object at fff00000c6711b00 [ 33.820812] which belongs to the cache kmalloc-128 of size 128 [ 33.822045] The buggy address is located 1 bytes inside of [ 33.822045] 128-byte region [fff00000c6711b00, fff00000c6711b80) [ 33.823265] [ 33.823668] The buggy address belongs to the physical page: [ 33.824323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106711 [ 33.825295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.826157] page_type: f5(slab) [ 33.826681] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.827619] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.828412] page dumped because: kasan: bad access detected [ 33.829030] [ 33.829394] Memory state around the buggy address: [ 33.830057] fff00000c6711a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.830876] fff00000c6711a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.831820] >fff00000c6711b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.832658] ^ [ 33.833108] fff00000c6711b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.833962] fff00000c6711c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.834764] ================================================================== [ 33.849127] ================================================================== [ 33.850219] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 33.851408] Free of addr fff00000c6b20001 by task kunit_try_catch/232 [ 33.852291] [ 33.852726] CPU: 0 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 33.853710] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.854483] Hardware name: linux,dummy-virt (DT) [ 33.855489] Call trace: [ 33.856005] show_stack+0x20/0x38 (C) [ 33.856667] dump_stack_lvl+0x8c/0xd0 [ 33.857246] print_report+0x118/0x5e0 [ 33.857830] kasan_report_invalid_free+0xb0/0xd8 [ 33.858853] __kasan_mempool_poison_object+0xfc/0x150 [ 33.859989] mempool_free+0x28c/0x328 [ 33.860542] mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 33.861315] mempool_kmalloc_large_invalid_free+0xb8/0x110 [ 33.862042] kunit_try_run_case+0x14c/0x3d0 [ 33.862703] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.863451] kthread+0x24c/0x2d0 [ 33.864672] ret_from_fork+0x10/0x20 [ 33.865223] [ 33.865625] The buggy address belongs to the physical page: [ 33.866424] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106b20 [ 33.867725] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.868673] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.869644] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.870468] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.871921] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.872834] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.873917] head: 0bfffe0000000002 ffffc1ffc31ac801 ffffffffffffffff 0000000000000000 [ 33.875389] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 33.876268] page dumped because: kasan: bad access detected [ 33.877005] [ 33.877411] Memory state around the buggy address: [ 33.878052] fff00000c6b1ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.879290] fff00000c6b1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.880128] >fff00000c6b20000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.881584] ^ [ 33.882111] fff00000c6b20080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.883400] fff00000c6b20100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.884246] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 33.650637] ================================================================== [ 33.651842] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 33.652538] Free of addr fff00000c69f2600 by task kunit_try_catch/224 [ 33.653340] [ 33.653696] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 33.654875] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.655480] Hardware name: linux,dummy-virt (DT) [ 33.656182] Call trace: [ 33.656625] show_stack+0x20/0x38 (C) [ 33.657152] dump_stack_lvl+0x8c/0xd0 [ 33.657743] print_report+0x118/0x5e0 [ 33.658291] kasan_report_invalid_free+0xb0/0xd8 [ 33.659046] check_slab_allocation+0xd4/0x108 [ 33.659630] __kasan_mempool_poison_object+0x78/0x150 [ 33.660376] mempool_free+0x28c/0x328 [ 33.660936] mempool_double_free_helper+0x150/0x2e0 [ 33.661668] mempool_kmalloc_double_free+0xb8/0x110 [ 33.662417] kunit_try_run_case+0x14c/0x3d0 [ 33.663135] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.663837] kthread+0x24c/0x2d0 [ 33.664430] ret_from_fork+0x10/0x20 [ 33.665029] [ 33.665404] Allocated by task 224: [ 33.666013] kasan_save_stack+0x3c/0x68 [ 33.666587] kasan_save_track+0x20/0x40 [ 33.667228] kasan_save_alloc_info+0x40/0x58 [ 33.667880] __kasan_mempool_unpoison_object+0x11c/0x180 [ 33.668616] remove_element+0x130/0x1f8 [ 33.669243] mempool_alloc_preallocated+0x58/0xc0 [ 33.669963] mempool_double_free_helper+0x94/0x2e0 [ 33.670608] mempool_kmalloc_double_free+0xb8/0x110 [ 33.671341] kunit_try_run_case+0x14c/0x3d0 [ 33.671877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.672676] kthread+0x24c/0x2d0 [ 33.673139] ret_from_fork+0x10/0x20 [ 33.673761] [ 33.674134] Freed by task 224: [ 33.674659] kasan_save_stack+0x3c/0x68 [ 33.675256] kasan_save_track+0x20/0x40 [ 33.675872] kasan_save_free_info+0x4c/0x78 [ 33.676575] __kasan_mempool_poison_object+0xc0/0x150 [ 33.677325] mempool_free+0x28c/0x328 [ 33.677923] mempool_double_free_helper+0x100/0x2e0 [ 33.678481] mempool_kmalloc_double_free+0xb8/0x110 [ 33.679240] kunit_try_run_case+0x14c/0x3d0 [ 33.679899] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.680669] kthread+0x24c/0x2d0 [ 33.681122] ret_from_fork+0x10/0x20 [ 33.681735] [ 33.682117] The buggy address belongs to the object at fff00000c69f2600 [ 33.682117] which belongs to the cache kmalloc-128 of size 128 [ 33.683199] The buggy address is located 0 bytes inside of [ 33.683199] 128-byte region [fff00000c69f2600, fff00000c69f2680) [ 33.684558] [ 33.684885] The buggy address belongs to the physical page: [ 33.685643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069f2 [ 33.686573] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.687370] page_type: f5(slab) [ 33.687947] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.688787] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.689575] page dumped because: kasan: bad access detected [ 33.690322] [ 33.690711] Memory state around the buggy address: [ 33.691306] fff00000c69f2500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.692106] fff00000c69f2580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.692924] >fff00000c69f2600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.693834] ^ [ 33.694324] fff00000c69f2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.695040] fff00000c69f2700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.695964] ================================================================== [ 33.707304] ================================================================== [ 33.708572] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 33.709276] Free of addr fff00000c6b30000 by task kunit_try_catch/226 [ 33.709931] [ 33.710336] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 33.711669] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.712257] Hardware name: linux,dummy-virt (DT) [ 33.712910] Call trace: [ 33.713473] show_stack+0x20/0x38 (C) [ 33.714490] dump_stack_lvl+0x8c/0xd0 [ 33.715160] print_report+0x118/0x5e0 [ 33.715702] kasan_report_invalid_free+0xb0/0xd8 [ 33.716417] __kasan_mempool_poison_object+0x14c/0x150 [ 33.718873] mempool_free+0x28c/0x328 [ 33.719682] mempool_double_free_helper+0x150/0x2e0 [ 33.720529] mempool_kmalloc_large_double_free+0xb8/0x110 [ 33.721349] kunit_try_run_case+0x14c/0x3d0 [ 33.722165] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.722964] kthread+0x24c/0x2d0 [ 33.723526] ret_from_fork+0x10/0x20 [ 33.724118] [ 33.724464] The buggy address belongs to the physical page: [ 33.725095] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106b30 [ 33.726818] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.727658] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.729039] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.729869] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.730924] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.731842] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.732911] head: 0bfffe0000000002 ffffc1ffc31acc01 ffffffffffffffff 0000000000000000 [ 33.733837] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 33.735417] page dumped because: kasan: bad access detected [ 33.736125] [ 33.736564] Memory state around the buggy address: [ 33.737320] fff00000c6b2ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.738485] fff00000c6b2ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.739250] >fff00000c6b30000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.740205] ^ [ 33.740689] fff00000c6b30080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.741068] fff00000c6b30100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.741419] ================================================================== [ 33.752243] ================================================================== [ 33.753528] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 33.754468] Free of addr fff00000c6b30000 by task kunit_try_catch/228 [ 33.755572] [ 33.756976] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 33.758065] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.758681] Hardware name: linux,dummy-virt (DT) [ 33.759723] Call trace: [ 33.760186] show_stack+0x20/0x38 (C) [ 33.760852] dump_stack_lvl+0x8c/0xd0 [ 33.761548] print_report+0x118/0x5e0 [ 33.762152] kasan_report_invalid_free+0xb0/0xd8 [ 33.763716] __kasan_mempool_poison_pages+0xe0/0xe8 [ 33.764440] mempool_free+0x24c/0x328 [ 33.765034] mempool_double_free_helper+0x150/0x2e0 [ 33.765823] mempool_page_alloc_double_free+0xb4/0x110 [ 33.766635] kunit_try_run_case+0x14c/0x3d0 [ 33.767634] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.768452] kthread+0x24c/0x2d0 [ 33.769063] ret_from_fork+0x10/0x20 [ 33.769714] [ 33.770086] The buggy address belongs to the physical page: [ 33.771705] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106b30 [ 33.772669] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.773474] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.774862] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.775756] page dumped because: kasan: bad access detected [ 33.776450] [ 33.776875] Memory state around the buggy address: [ 33.777441] fff00000c6b2ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.778904] fff00000c6b2ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.780164] >fff00000c6b30000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.780977] ^ [ 33.781578] fff00000c6b30080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.782693] fff00000c6b30100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.783460] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[ 30.181870] ================================================================== [ 30.183250] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 30.184233] Free of addr fff00000c6220001 by task kunit_try_catch/139 [ 30.184957] [ 30.185364] CPU: 0 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.186806] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.187289] Hardware name: linux,dummy-virt (DT) [ 30.187779] Call trace: [ 30.188136] show_stack+0x20/0x38 (C) [ 30.188705] dump_stack_lvl+0x8c/0xd0 [ 30.189402] print_report+0x118/0x5e0 [ 30.190158] kasan_report_invalid_free+0xb0/0xd8 [ 30.191399] __kasan_kfree_large+0x5c/0xa8 [ 30.192266] free_large_kmalloc+0x58/0x140 [ 30.192989] kfree+0x270/0x3c8 [ 30.193438] kmalloc_large_invalid_free+0x108/0x270 [ 30.194394] kunit_try_run_case+0x14c/0x3d0 [ 30.195051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.195804] kthread+0x24c/0x2d0 [ 30.196375] ret_from_fork+0x10/0x20 [ 30.197352] [ 30.197704] The buggy address belongs to the physical page: [ 30.198821] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106220 [ 30.199666] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.200547] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.201409] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.202299] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.203088] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.204002] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.205370] head: 0bfffe0000000002 ffffc1ffc3188801 ffffffffffffffff 0000000000000000 [ 30.206503] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.207344] page dumped because: kasan: bad access detected [ 30.208556] [ 30.208867] Memory state around the buggy address: [ 30.209604] fff00000c621ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.210435] fff00000c621ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.211179] >fff00000c6220000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.211991] ^ [ 30.212571] fff00000c6220080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.213401] fff00000c6220100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.214365] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 33.491768] ================================================================== [ 33.492924] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 33.493675] Read of size 1 at addr fff00000c6b30000 by task kunit_try_catch/218 [ 33.494836] [ 33.495724] CPU: 1 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 33.496870] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.497436] Hardware name: linux,dummy-virt (DT) [ 33.498002] Call trace: [ 33.498416] show_stack+0x20/0x38 (C) [ 33.499476] dump_stack_lvl+0x8c/0xd0 [ 33.500097] print_report+0x118/0x5e0 [ 33.500635] kasan_report+0xc8/0x118 [ 33.501268] __asan_report_load1_noabort+0x20/0x30 [ 33.502038] mempool_uaf_helper+0x314/0x340 [ 33.503008] mempool_kmalloc_large_uaf+0xbc/0x118 [ 33.503597] kunit_try_run_case+0x14c/0x3d0 [ 33.504483] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.505356] kthread+0x24c/0x2d0 [ 33.505974] ret_from_fork+0x10/0x20 [ 33.506950] [ 33.507325] The buggy address belongs to the physical page: [ 33.508261] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106b30 [ 33.509298] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.510359] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.511251] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.512983] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.513944] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.515262] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.515884] head: 0bfffe0000000002 ffffc1ffc31acc01 ffffffffffffffff 0000000000000000 [ 33.516817] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 33.517715] page dumped because: kasan: bad access detected [ 33.518842] [ 33.519621] Memory state around the buggy address: [ 33.520249] fff00000c6b2ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.521154] fff00000c6b2ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.522128] >fff00000c6b30000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.523309] ^ [ 33.524058] fff00000c6b30080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.525035] fff00000c6b30100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.525951] ================================================================== [ 33.612016] ================================================================== [ 33.613276] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 33.614718] Read of size 1 at addr fff00000c6b20000 by task kunit_try_catch/222 [ 33.615947] [ 33.616276] CPU: 0 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 33.617437] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.617912] Hardware name: linux,dummy-virt (DT) [ 33.618680] Call trace: [ 33.619147] show_stack+0x20/0x38 (C) [ 33.619808] dump_stack_lvl+0x8c/0xd0 [ 33.620322] print_report+0x118/0x5e0 [ 33.620975] kasan_report+0xc8/0x118 [ 33.621528] __asan_report_load1_noabort+0x20/0x30 [ 33.622214] mempool_uaf_helper+0x314/0x340 [ 33.622851] mempool_page_alloc_uaf+0xb8/0x118 [ 33.623545] kunit_try_run_case+0x14c/0x3d0 [ 33.624228] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.624979] kthread+0x24c/0x2d0 [ 33.625585] ret_from_fork+0x10/0x20 [ 33.626248] [ 33.626592] The buggy address belongs to the physical page: [ 33.627323] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106b20 [ 33.628171] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.629036] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.629911] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.630728] page dumped because: kasan: bad access detected [ 33.631460] [ 33.631849] Memory state around the buggy address: [ 33.632496] fff00000c6b1ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.633321] fff00000c6b1ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.634169] >fff00000c6b20000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.634976] ^ [ 33.635457] fff00000c6b20080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.636397] fff00000c6b20100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.637098] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 33.428863] ================================================================== [ 33.430184] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 33.431562] Read of size 1 at addr fff00000c69c6f00 by task kunit_try_catch/216 [ 33.432412] [ 33.433175] CPU: 0 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 33.434299] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.434985] Hardware name: linux,dummy-virt (DT) [ 33.435616] Call trace: [ 33.436032] show_stack+0x20/0x38 (C) [ 33.436792] dump_stack_lvl+0x8c/0xd0 [ 33.437447] print_report+0x118/0x5e0 [ 33.438127] kasan_report+0xc8/0x118 [ 33.438728] __asan_report_load1_noabort+0x20/0x30 [ 33.439914] mempool_uaf_helper+0x314/0x340 [ 33.440529] mempool_kmalloc_uaf+0xbc/0x118 [ 33.441188] kunit_try_run_case+0x14c/0x3d0 [ 33.441876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.442856] kthread+0x24c/0x2d0 [ 33.443397] ret_from_fork+0x10/0x20 [ 33.443986] [ 33.444320] Allocated by task 216: [ 33.445538] kasan_save_stack+0x3c/0x68 [ 33.446084] kasan_save_track+0x20/0x40 [ 33.446740] kasan_save_alloc_info+0x40/0x58 [ 33.447319] __kasan_mempool_unpoison_object+0x11c/0x180 [ 33.448373] remove_element+0x130/0x1f8 [ 33.448905] mempool_alloc_preallocated+0x58/0xc0 [ 33.449633] mempool_uaf_helper+0xa4/0x340 [ 33.451232] mempool_kmalloc_uaf+0xbc/0x118 [ 33.451745] kunit_try_run_case+0x14c/0x3d0 [ 33.452409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.453031] kthread+0x24c/0x2d0 [ 33.453615] ret_from_fork+0x10/0x20 [ 33.454248] [ 33.454580] Freed by task 216: [ 33.455108] kasan_save_stack+0x3c/0x68 [ 33.455715] kasan_save_track+0x20/0x40 [ 33.456325] kasan_save_free_info+0x4c/0x78 [ 33.457253] __kasan_mempool_poison_object+0xc0/0x150 [ 33.458021] mempool_free+0x28c/0x328 [ 33.458913] mempool_uaf_helper+0x104/0x340 [ 33.459527] mempool_kmalloc_uaf+0xbc/0x118 [ 33.460089] kunit_try_run_case+0x14c/0x3d0 [ 33.460669] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.461451] kthread+0x24c/0x2d0 [ 33.461932] ret_from_fork+0x10/0x20 [ 33.462836] [ 33.463208] The buggy address belongs to the object at fff00000c69c6f00 [ 33.463208] which belongs to the cache kmalloc-128 of size 128 [ 33.464446] The buggy address is located 0 bytes inside of [ 33.464446] freed 128-byte region [fff00000c69c6f00, fff00000c69c6f80) [ 33.465735] [ 33.466108] The buggy address belongs to the physical page: [ 33.467004] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069c6 [ 33.468044] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.468933] page_type: f5(slab) [ 33.469428] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.470632] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 33.471600] page dumped because: kasan: bad access detected [ 33.472266] [ 33.473170] Memory state around the buggy address: [ 33.474026] fff00000c69c6e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.475339] fff00000c69c6e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.476054] >fff00000c69c6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.477039] ^ [ 33.477607] fff00000c69c6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.478854] fff00000c69c7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.479694] ================================================================== [ 33.540598] ================================================================== [ 33.541722] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 33.543065] Read of size 1 at addr fff00000c69e2240 by task kunit_try_catch/220 [ 33.544027] [ 33.544406] CPU: 1 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 33.545374] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.545986] Hardware name: linux,dummy-virt (DT) [ 33.547102] Call trace: [ 33.547572] show_stack+0x20/0x38 (C) [ 33.548213] dump_stack_lvl+0x8c/0xd0 [ 33.548868] print_report+0x118/0x5e0 [ 33.549389] kasan_report+0xc8/0x118 [ 33.550032] __asan_report_load1_noabort+0x20/0x30 [ 33.551158] mempool_uaf_helper+0x314/0x340 [ 33.551809] mempool_slab_uaf+0xb8/0x110 [ 33.552459] kunit_try_run_case+0x14c/0x3d0 [ 33.553108] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.553830] kthread+0x24c/0x2d0 [ 33.554847] ret_from_fork+0x10/0x20 [ 33.555438] [ 33.555817] Allocated by task 220: [ 33.556314] kasan_save_stack+0x3c/0x68 [ 33.556974] kasan_save_track+0x20/0x40 [ 33.557479] kasan_save_alloc_info+0x40/0x58 [ 33.558597] __kasan_mempool_unpoison_object+0xbc/0x180 [ 33.559314] remove_element+0x16c/0x1f8 [ 33.559862] mempool_alloc_preallocated+0x58/0xc0 [ 33.560592] mempool_uaf_helper+0xa4/0x340 [ 33.561155] mempool_slab_uaf+0xb8/0x110 [ 33.561806] kunit_try_run_case+0x14c/0x3d0 [ 33.562757] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.563563] kthread+0x24c/0x2d0 [ 33.564088] ret_from_fork+0x10/0x20 [ 33.564707] [ 33.565055] Freed by task 220: [ 33.565537] kasan_save_stack+0x3c/0x68 [ 33.566164] kasan_save_track+0x20/0x40 [ 33.567200] kasan_save_free_info+0x4c/0x78 [ 33.567805] __kasan_mempool_poison_object+0xc0/0x150 [ 33.568427] mempool_free+0x28c/0x328 [ 33.569069] mempool_uaf_helper+0x104/0x340 [ 33.569686] mempool_slab_uaf+0xb8/0x110 [ 33.570204] kunit_try_run_case+0x14c/0x3d0 [ 33.570910] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.571622] kthread+0x24c/0x2d0 [ 33.572184] ret_from_fork+0x10/0x20 [ 33.573171] [ 33.573550] The buggy address belongs to the object at fff00000c69e2240 [ 33.573550] which belongs to the cache test_cache of size 123 [ 33.575110] The buggy address is located 0 bytes inside of [ 33.575110] freed 123-byte region [fff00000c69e2240, fff00000c69e22bb) [ 33.576448] [ 33.576844] The buggy address belongs to the physical page: [ 33.577426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069e2 [ 33.578402] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.579837] page_type: f5(slab) [ 33.580394] raw: 0bfffe0000000000 fff00000c13faa00 dead000000000122 0000000000000000 [ 33.581204] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 33.582487] page dumped because: kasan: bad access detected [ 33.583262] [ 33.583651] Memory state around the buggy address: [ 33.584286] fff00000c69e2100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.585723] fff00000c69e2180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.586802] >fff00000c69e2200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 33.587449] ^ [ 33.588196] fff00000c69e2280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.589249] fff00000c69e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.590063] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 33.258944] ================================================================== [ 33.260043] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 33.261111] Read of size 1 at addr fff00000c69c6773 by task kunit_try_catch/210 [ 33.261800] [ 33.262139] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 33.263272] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.264121] Hardware name: linux,dummy-virt (DT) [ 33.265419] Call trace: [ 33.265946] show_stack+0x20/0x38 (C) [ 33.266899] dump_stack_lvl+0x8c/0xd0 [ 33.267404] print_report+0x118/0x5e0 [ 33.268463] kasan_report+0xc8/0x118 [ 33.269465] __asan_report_load1_noabort+0x20/0x30 [ 33.270563] mempool_oob_right_helper+0x2ac/0x2f0 [ 33.271234] mempool_kmalloc_oob_right+0xbc/0x118 [ 33.271841] kunit_try_run_case+0x14c/0x3d0 [ 33.272620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.273370] kthread+0x24c/0x2d0 [ 33.274042] ret_from_fork+0x10/0x20 [ 33.274952] [ 33.275270] Allocated by task 210: [ 33.275711] kasan_save_stack+0x3c/0x68 [ 33.276339] kasan_save_track+0x20/0x40 [ 33.277081] kasan_save_alloc_info+0x40/0x58 [ 33.278084] __kasan_mempool_unpoison_object+0x11c/0x180 [ 33.278924] remove_element+0x130/0x1f8 [ 33.279917] mempool_alloc_preallocated+0x58/0xc0 [ 33.280659] mempool_oob_right_helper+0x98/0x2f0 [ 33.281367] mempool_kmalloc_oob_right+0xbc/0x118 [ 33.282085] kunit_try_run_case+0x14c/0x3d0 [ 33.282876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.284112] kthread+0x24c/0x2d0 [ 33.284813] ret_from_fork+0x10/0x20 [ 33.285412] [ 33.285909] The buggy address belongs to the object at fff00000c69c6700 [ 33.285909] which belongs to the cache kmalloc-128 of size 128 [ 33.287716] The buggy address is located 0 bytes to the right of [ 33.287716] allocated 115-byte region [fff00000c69c6700, fff00000c69c6773) [ 33.289179] [ 33.289617] The buggy address belongs to the physical page: [ 33.290237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069c6 [ 33.291717] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.292877] page_type: f5(slab) [ 33.293767] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.295426] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.296371] page dumped because: kasan: bad access detected [ 33.296963] [ 33.297284] Memory state around the buggy address: [ 33.297868] fff00000c69c6600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.299106] fff00000c69c6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.299884] >fff00000c69c6700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 33.300619] ^ [ 33.301384] fff00000c69c6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.302238] fff00000c69c6800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 33.303045] ================================================================== [ 33.364970] ================================================================== [ 33.366213] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 33.367060] Read of size 1 at addr fff00000c69e42bb by task kunit_try_catch/214 [ 33.368302] [ 33.368755] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 33.370129] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.371108] Hardware name: linux,dummy-virt (DT) [ 33.371755] Call trace: [ 33.372152] show_stack+0x20/0x38 (C) [ 33.372678] dump_stack_lvl+0x8c/0xd0 [ 33.373333] print_report+0x118/0x5e0 [ 33.374032] kasan_report+0xc8/0x118 [ 33.374962] __asan_report_load1_noabort+0x20/0x30 [ 33.375805] mempool_oob_right_helper+0x2ac/0x2f0 [ 33.376665] mempool_slab_oob_right+0xb8/0x110 [ 33.377474] kunit_try_run_case+0x14c/0x3d0 [ 33.378560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.379348] kthread+0x24c/0x2d0 [ 33.379870] ret_from_fork+0x10/0x20 [ 33.380373] [ 33.380802] Allocated by task 214: [ 33.381409] kasan_save_stack+0x3c/0x68 [ 33.382066] kasan_save_track+0x20/0x40 [ 33.383060] kasan_save_alloc_info+0x40/0x58 [ 33.383804] __kasan_mempool_unpoison_object+0xbc/0x180 [ 33.384543] remove_element+0x16c/0x1f8 [ 33.385165] mempool_alloc_preallocated+0x58/0xc0 [ 33.385856] mempool_oob_right_helper+0x98/0x2f0 [ 33.386872] mempool_slab_oob_right+0xb8/0x110 [ 33.387761] kunit_try_run_case+0x14c/0x3d0 [ 33.388528] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.389322] kthread+0x24c/0x2d0 [ 33.389875] ret_from_fork+0x10/0x20 [ 33.390378] [ 33.390773] The buggy address belongs to the object at fff00000c69e4240 [ 33.390773] which belongs to the cache test_cache of size 123 [ 33.392068] The buggy address is located 0 bytes to the right of [ 33.392068] allocated 123-byte region [fff00000c69e4240, fff00000c69e42bb) [ 33.393754] [ 33.394233] The buggy address belongs to the physical page: [ 33.394959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069e4 [ 33.396282] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.397152] page_type: f5(slab) [ 33.397656] raw: 0bfffe0000000000 fff00000c13fa8c0 dead000000000122 0000000000000000 [ 33.398920] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 33.399909] page dumped because: kasan: bad access detected [ 33.400800] [ 33.401342] Memory state around the buggy address: [ 33.402135] fff00000c69e4180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.403196] fff00000c69e4200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 33.403645] >fff00000c69e4280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 33.404624] ^ [ 33.405262] fff00000c69e4300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.406134] fff00000c69e4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.406972] ================================================================== [ 33.315480] ================================================================== [ 33.316636] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 33.317527] Read of size 1 at addr fff00000c6a8e001 by task kunit_try_catch/212 [ 33.319476] [ 33.319904] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 33.320993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.321621] Hardware name: linux,dummy-virt (DT) [ 33.322145] Call trace: [ 33.323180] show_stack+0x20/0x38 (C) [ 33.323887] dump_stack_lvl+0x8c/0xd0 [ 33.324450] print_report+0x118/0x5e0 [ 33.325113] kasan_report+0xc8/0x118 [ 33.325724] __asan_report_load1_noabort+0x20/0x30 [ 33.326526] mempool_oob_right_helper+0x2ac/0x2f0 [ 33.327751] mempool_kmalloc_large_oob_right+0xbc/0x118 [ 33.328423] kunit_try_run_case+0x14c/0x3d0 [ 33.329009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.329704] kthread+0x24c/0x2d0 [ 33.330550] ret_from_fork+0x10/0x20 [ 33.331457] [ 33.331991] The buggy address belongs to the physical page: [ 33.332599] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a8c [ 33.333467] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.334363] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.335833] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.336901] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.337780] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.338821] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.339725] head: 0bfffe0000000002 ffffc1ffc31aa301 ffffffffffffffff 0000000000000000 [ 33.340705] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 33.341682] page dumped because: kasan: bad access detected [ 33.342630] [ 33.343241] Memory state around the buggy address: [ 33.344208] fff00000c6a8df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.345120] fff00000c6a8df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.346048] >fff00000c6a8e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.346984] ^ [ 33.347666] fff00000c6a8e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.348416] fff00000c6a8e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.349355] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 32.636794] ================================================================== [ 32.637479] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x17c/0x2f8 [ 32.637906] Read of size 1 at addr fff00000c13fa640 by task kunit_try_catch/204 [ 32.638469] [ 32.638888] CPU: 1 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 32.640157] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.640839] Hardware name: linux,dummy-virt (DT) [ 32.641565] Call trace: [ 32.642078] show_stack+0x20/0x38 (C) [ 32.642760] dump_stack_lvl+0x8c/0xd0 [ 32.643382] print_report+0x118/0x5e0 [ 32.643992] kasan_report+0xc8/0x118 [ 32.644491] __kasan_check_byte+0x54/0x70 [ 32.645271] kmem_cache_destroy+0x34/0x218 [ 32.646046] kmem_cache_double_destroy+0x17c/0x2f8 [ 32.646822] kunit_try_run_case+0x14c/0x3d0 [ 32.647628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.648321] kthread+0x24c/0x2d0 [ 32.648979] ret_from_fork+0x10/0x20 [ 32.649648] [ 32.650019] Allocated by task 204: [ 32.650581] kasan_save_stack+0x3c/0x68 [ 32.651203] kasan_save_track+0x20/0x40 [ 32.651849] kasan_save_alloc_info+0x40/0x58 [ 32.652482] __kasan_slab_alloc+0xa8/0xb0 [ 32.653113] kmem_cache_alloc_noprof+0x108/0x398 [ 32.653814] __kmem_cache_create_args+0x18c/0x2b0 [ 32.654501] kmem_cache_double_destroy+0xc8/0x2f8 [ 32.655168] kunit_try_run_case+0x14c/0x3d0 [ 32.655889] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.656621] kthread+0x24c/0x2d0 [ 32.657196] ret_from_fork+0x10/0x20 [ 32.657707] [ 32.658112] Freed by task 204: [ 32.658676] kasan_save_stack+0x3c/0x68 [ 32.659297] kasan_save_track+0x20/0x40 [ 32.659913] kasan_save_free_info+0x4c/0x78 [ 32.660626] __kasan_slab_free+0x6c/0x98 [ 32.661229] kmem_cache_free+0x118/0x470 [ 32.661924] slab_kmem_cache_release+0x38/0x50 [ 32.662531] kmem_cache_release+0x1c/0x30 [ 32.663211] kobject_put+0x17c/0x430 [ 32.663728] sysfs_slab_release+0x1c/0x30 [ 32.664401] kmem_cache_destroy+0x118/0x218 [ 32.665033] kmem_cache_double_destroy+0x130/0x2f8 [ 32.665778] kunit_try_run_case+0x14c/0x3d0 [ 32.666422] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.667198] kthread+0x24c/0x2d0 [ 32.667790] ret_from_fork+0x10/0x20 [ 32.668334] [ 32.668739] The buggy address belongs to the object at fff00000c13fa640 [ 32.668739] which belongs to the cache kmem_cache of size 208 [ 32.669996] The buggy address is located 0 bytes inside of [ 32.669996] freed 208-byte region [fff00000c13fa640, fff00000c13fa710) [ 32.671315] [ 32.671752] The buggy address belongs to the physical page: [ 32.672436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1013fa [ 32.673504] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.674341] page_type: f5(slab) [ 32.674890] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 32.675869] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 32.676776] page dumped because: kasan: bad access detected [ 32.677477] [ 32.677884] Memory state around the buggy address: [ 32.678616] fff00000c13fa500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.679546] fff00000c13fa580: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 32.680412] >fff00000c13fa600: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 32.681311] ^ [ 32.681999] fff00000c13fa680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.682893] fff00000c13fa700: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.683743] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 32.535556] ================================================================== [ 32.536935] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x390/0x468 [ 32.537944] Read of size 1 at addr fff00000c69b9000 by task kunit_try_catch/202 [ 32.539148] [ 32.539566] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 32.540557] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.541065] Hardware name: linux,dummy-virt (DT) [ 32.541667] Call trace: [ 32.542067] show_stack+0x20/0x38 (C) [ 32.542933] dump_stack_lvl+0x8c/0xd0 [ 32.543591] print_report+0x118/0x5e0 [ 32.544154] kasan_report+0xc8/0x118 [ 32.544870] __asan_report_load1_noabort+0x20/0x30 [ 32.545618] kmem_cache_rcu_uaf+0x390/0x468 [ 32.546479] kunit_try_run_case+0x14c/0x3d0 [ 32.547107] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.547764] kthread+0x24c/0x2d0 [ 32.548355] ret_from_fork+0x10/0x20 [ 32.548936] [ 32.549283] Allocated by task 202: [ 32.549859] kasan_save_stack+0x3c/0x68 [ 32.550675] kasan_save_track+0x20/0x40 [ 32.551302] kasan_save_alloc_info+0x40/0x58 [ 32.551890] __kasan_slab_alloc+0xa8/0xb0 [ 32.552584] kmem_cache_alloc_noprof+0x108/0x398 [ 32.553279] kmem_cache_rcu_uaf+0x12c/0x468 [ 32.553963] kunit_try_run_case+0x14c/0x3d0 [ 32.554856] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.555558] kthread+0x24c/0x2d0 [ 32.556143] ret_from_fork+0x10/0x20 [ 32.556732] [ 32.557072] Freed by task 0: [ 32.557462] kasan_save_stack+0x3c/0x68 [ 32.558111] kasan_save_track+0x20/0x40 [ 32.559618] kasan_save_free_info+0x4c/0x78 [ 32.560388] __kasan_slab_free+0x6c/0x98 [ 32.561136] slab_free_after_rcu_debug+0xd4/0x2f8 [ 32.561745] rcu_core+0x9f4/0x1e20 [ 32.562232] rcu_core_si+0x18/0x30 [ 32.562829] handle_softirqs+0x374/0xb20 [ 32.563349] __do_softirq+0x1c/0x28 [ 32.564245] [ 32.564626] Last potentially related work creation: [ 32.565203] kasan_save_stack+0x3c/0x68 [ 32.565876] kasan_record_aux_stack+0xb4/0xc8 [ 32.566806] kmem_cache_free+0x28c/0x470 [ 32.567385] kmem_cache_rcu_uaf+0x16c/0x468 [ 32.567968] kunit_try_run_case+0x14c/0x3d0 [ 32.568656] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.569370] kthread+0x24c/0x2d0 [ 32.569920] ret_from_fork+0x10/0x20 [ 32.570791] [ 32.571128] The buggy address belongs to the object at fff00000c69b9000 [ 32.571128] which belongs to the cache test_cache of size 200 [ 32.572343] The buggy address is located 0 bytes inside of [ 32.572343] freed 200-byte region [fff00000c69b9000, fff00000c69b90c8) [ 32.573552] [ 32.573925] The buggy address belongs to the physical page: [ 32.574920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069b9 [ 32.575745] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.576638] page_type: f5(slab) [ 32.577193] raw: 0bfffe0000000000 fff00000c5b4c280 dead000000000122 0000000000000000 [ 32.578022] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 32.579250] page dumped because: kasan: bad access detected [ 32.579809] [ 32.580178] Memory state around the buggy address: [ 32.580816] fff00000c69b8f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.581592] fff00000c69b8f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.582457] >fff00000c69b9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.583530] ^ [ 32.583990] fff00000c69b9080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 32.584923] fff00000c69b9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.585871] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 32.417701] ================================================================== [ 32.419050] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3b8 [ 32.420694] Free of addr fff00000c69bb001 by task kunit_try_catch/200 [ 32.421568] [ 32.421957] CPU: 0 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 32.423596] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.424144] Hardware name: linux,dummy-virt (DT) [ 32.424816] Call trace: [ 32.425315] show_stack+0x20/0x38 (C) [ 32.425947] dump_stack_lvl+0x8c/0xd0 [ 32.426874] print_report+0x118/0x5e0 [ 32.427632] kasan_report_invalid_free+0xb0/0xd8 [ 32.428391] check_slab_allocation+0xfc/0x108 [ 32.429054] __kasan_slab_pre_free+0x2c/0x48 [ 32.429769] kmem_cache_free+0xf0/0x470 [ 32.430853] kmem_cache_invalid_free+0x184/0x3b8 [ 32.431597] kunit_try_run_case+0x14c/0x3d0 [ 32.432228] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.432971] kthread+0x24c/0x2d0 [ 32.433631] ret_from_fork+0x10/0x20 [ 32.434202] [ 32.434660] Allocated by task 200: [ 32.435600] kasan_save_stack+0x3c/0x68 [ 32.436186] kasan_save_track+0x20/0x40 [ 32.436749] kasan_save_alloc_info+0x40/0x58 [ 32.437409] __kasan_slab_alloc+0xa8/0xb0 [ 32.438065] kmem_cache_alloc_noprof+0x108/0x398 [ 32.438638] kmem_cache_invalid_free+0x12c/0x3b8 [ 32.439341] kunit_try_run_case+0x14c/0x3d0 [ 32.440425] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.441142] kthread+0x24c/0x2d0 [ 32.441690] ret_from_fork+0x10/0x20 [ 32.442242] [ 32.442588] The buggy address belongs to the object at fff00000c69bb000 [ 32.442588] which belongs to the cache test_cache of size 200 [ 32.444398] The buggy address is located 1 bytes inside of [ 32.444398] 200-byte region [fff00000c69bb000, fff00000c69bb0c8) [ 32.446050] [ 32.446626] The buggy address belongs to the physical page: [ 32.447390] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069bb [ 32.448412] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.449421] page_type: f5(slab) [ 32.450109] raw: 0bfffe0000000000 fff00000c13fa500 dead000000000122 0000000000000000 [ 32.451322] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 32.452552] page dumped because: kasan: bad access detected [ 32.453400] [ 32.453739] Memory state around the buggy address: [ 32.454399] fff00000c69baf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.455343] fff00000c69baf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.456197] >fff00000c69bb000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.457362] ^ [ 32.457875] fff00000c69bb080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 32.459093] fff00000c69bb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.459899] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 32.341161] ================================================================== [ 32.342090] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 32.343525] Free of addr fff00000c6725000 by task kunit_try_catch/198 [ 32.344395] [ 32.345425] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 32.346461] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.347433] Hardware name: linux,dummy-virt (DT) [ 32.348250] Call trace: [ 32.348939] show_stack+0x20/0x38 (C) [ 32.349603] dump_stack_lvl+0x8c/0xd0 [ 32.350438] print_report+0x118/0x5e0 [ 32.351051] kasan_report_invalid_free+0xb0/0xd8 [ 32.351704] check_slab_allocation+0xd4/0x108 [ 32.352325] __kasan_slab_pre_free+0x2c/0x48 [ 32.352941] kmem_cache_free+0xf0/0x470 [ 32.353543] kmem_cache_double_free+0x190/0x3c8 [ 32.354228] kunit_try_run_case+0x14c/0x3d0 [ 32.355164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.355777] kthread+0x24c/0x2d0 [ 32.356252] ret_from_fork+0x10/0x20 [ 32.357068] [ 32.357543] Allocated by task 198: [ 32.358208] kasan_save_stack+0x3c/0x68 [ 32.359128] kasan_save_track+0x20/0x40 [ 32.359768] kasan_save_alloc_info+0x40/0x58 [ 32.360449] __kasan_slab_alloc+0xa8/0xb0 [ 32.361063] kmem_cache_alloc_noprof+0x108/0x398 [ 32.361761] kmem_cache_double_free+0x12c/0x3c8 [ 32.362571] kunit_try_run_case+0x14c/0x3d0 [ 32.363472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.364076] kthread+0x24c/0x2d0 [ 32.364765] ret_from_fork+0x10/0x20 [ 32.365369] [ 32.365894] Freed by task 198: [ 32.366485] kasan_save_stack+0x3c/0x68 [ 32.367352] kasan_save_track+0x20/0x40 [ 32.368034] kasan_save_free_info+0x4c/0x78 [ 32.368779] __kasan_slab_free+0x6c/0x98 [ 32.369404] kmem_cache_free+0x118/0x470 [ 32.370151] kmem_cache_double_free+0x140/0x3c8 [ 32.371147] kunit_try_run_case+0x14c/0x3d0 [ 32.371775] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.372920] kthread+0x24c/0x2d0 [ 32.373620] ret_from_fork+0x10/0x20 [ 32.374419] [ 32.375209] The buggy address belongs to the object at fff00000c6725000 [ 32.375209] which belongs to the cache test_cache of size 200 [ 32.376713] The buggy address is located 0 bytes inside of [ 32.376713] 200-byte region [fff00000c6725000, fff00000c67250c8) [ 32.377837] [ 32.378237] The buggy address belongs to the physical page: [ 32.379331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106725 [ 32.380375] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.381391] page_type: f5(slab) [ 32.381978] raw: 0bfffe0000000000 fff00000c5b4c140 dead000000000122 0000000000000000 [ 32.383395] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 32.384548] page dumped because: kasan: bad access detected [ 32.385167] [ 32.385541] Memory state around the buggy address: [ 32.386235] fff00000c6724f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.387008] fff00000c6724f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.387905] >fff00000c6725000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.388857] ^ [ 32.389399] fff00000c6725080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 32.390077] fff00000c6725100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.390727] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 32.253445] ================================================================== [ 32.254470] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x33c/0x428 [ 32.255660] Read of size 1 at addr fff00000c67300c8 by task kunit_try_catch/196 [ 32.257233] [ 32.257713] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 32.259258] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.259992] Hardware name: linux,dummy-virt (DT) [ 32.260489] Call trace: [ 32.261016] show_stack+0x20/0x38 (C) [ 32.261618] dump_stack_lvl+0x8c/0xd0 [ 32.262464] print_report+0x118/0x5e0 [ 32.263068] kasan_report+0xc8/0x118 [ 32.263639] __asan_report_load1_noabort+0x20/0x30 [ 32.264403] kmem_cache_oob+0x33c/0x428 [ 32.265039] kunit_try_run_case+0x14c/0x3d0 [ 32.265750] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.266842] kthread+0x24c/0x2d0 [ 32.267225] ret_from_fork+0x10/0x20 [ 32.268110] [ 32.268697] Allocated by task 196: [ 32.269233] kasan_save_stack+0x3c/0x68 [ 32.269807] kasan_save_track+0x20/0x40 [ 32.270885] kasan_save_alloc_info+0x40/0x58 [ 32.271551] __kasan_slab_alloc+0xa8/0xb0 [ 32.272172] kmem_cache_alloc_noprof+0x108/0x398 [ 32.272996] kmem_cache_oob+0x12c/0x428 [ 32.273632] kunit_try_run_case+0x14c/0x3d0 [ 32.274145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.275384] kthread+0x24c/0x2d0 [ 32.276389] ret_from_fork+0x10/0x20 [ 32.276952] [ 32.277344] The buggy address belongs to the object at fff00000c6730000 [ 32.277344] which belongs to the cache test_cache of size 200 [ 32.278980] The buggy address is located 0 bytes to the right of [ 32.278980] allocated 200-byte region [fff00000c6730000, fff00000c67300c8) [ 32.280347] [ 32.280707] The buggy address belongs to the physical page: [ 32.281446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106730 [ 32.282503] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.283357] page_type: f5(slab) [ 32.283979] raw: 0bfffe0000000000 fff00000c13fa3c0 dead000000000122 0000000000000000 [ 32.284845] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 32.285826] page dumped because: kasan: bad access detected [ 32.286444] [ 32.286971] Memory state around the buggy address: [ 32.287908] fff00000c672ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.288798] fff00000c6730000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.289813] >fff00000c6730080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 32.290947] ^ [ 32.291616] fff00000c6730100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.292409] fff00000c6730180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.293293] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[ 31.715362] ================================================================== [ 31.716164] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 31.716964] Free of addr fff00000c5b518a0 by task kunit_try_catch/181 [ 31.717757] [ 31.718137] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 31.720473] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.721056] Hardware name: linux,dummy-virt (DT) [ 31.721701] Call trace: [ 31.722092] show_stack+0x20/0x38 (C) [ 31.722960] dump_stack_lvl+0x8c/0xd0 [ 31.723660] print_report+0x118/0x5e0 [ 31.724346] kasan_report_invalid_free+0xb0/0xd8 [ 31.725031] check_slab_allocation+0xd4/0x108 [ 31.725818] __kasan_slab_pre_free+0x2c/0x48 [ 31.726919] kfree+0xe8/0x3c8 [ 31.727483] kfree_sensitive+0x3c/0xb0 [ 31.728103] kmalloc_double_kzfree+0x168/0x308 [ 31.728724] kunit_try_run_case+0x14c/0x3d0 [ 31.729419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.730136] kthread+0x24c/0x2d0 [ 31.730908] ret_from_fork+0x10/0x20 [ 31.731493] [ 31.731888] Allocated by task 181: [ 31.732434] kasan_save_stack+0x3c/0x68 [ 31.733027] kasan_save_track+0x20/0x40 [ 31.733564] kasan_save_alloc_info+0x40/0x58 [ 31.734130] __kasan_kmalloc+0xd4/0xd8 [ 31.734749] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.735870] kmalloc_double_kzfree+0xb8/0x308 [ 31.736386] kunit_try_run_case+0x14c/0x3d0 [ 31.737068] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.737787] kthread+0x24c/0x2d0 [ 31.738372] ret_from_fork+0x10/0x20 [ 31.739541] [ 31.739914] Freed by task 181: [ 31.740437] kasan_save_stack+0x3c/0x68 [ 31.740931] kasan_save_track+0x20/0x40 [ 31.741591] kasan_save_free_info+0x4c/0x78 [ 31.742860] __kasan_slab_free+0x6c/0x98 [ 31.743404] kfree+0x114/0x3c8 [ 31.743943] kfree_sensitive+0x80/0xb0 [ 31.744601] kmalloc_double_kzfree+0x11c/0x308 [ 31.745184] kunit_try_run_case+0x14c/0x3d0 [ 31.745736] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.746684] kthread+0x24c/0x2d0 [ 31.747277] ret_from_fork+0x10/0x20 [ 31.748046] [ 31.748407] The buggy address belongs to the object at fff00000c5b518a0 [ 31.748407] which belongs to the cache kmalloc-16 of size 16 [ 31.749705] The buggy address is located 0 bytes inside of [ 31.749705] 16-byte region [fff00000c5b518a0, fff00000c5b518b0) [ 31.751288] [ 31.751722] The buggy address belongs to the physical page: [ 31.752441] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 31.753447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.754538] page_type: f5(slab) [ 31.755122] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 31.756077] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.756981] page dumped because: kasan: bad access detected [ 31.757684] [ 31.758092] Memory state around the buggy address: [ 31.759740] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.760602] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.761477] >fff00000c5b51880: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 31.762413] ^ [ 31.763278] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.764128] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.765295] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 31.664136] ================================================================== [ 31.665493] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 31.666936] Read of size 1 at addr fff00000c5b518a0 by task kunit_try_catch/181 [ 31.668054] [ 31.668676] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 31.669990] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.670626] Hardware name: linux,dummy-virt (DT) [ 31.671587] Call trace: [ 31.672042] show_stack+0x20/0x38 (C) [ 31.672766] dump_stack_lvl+0x8c/0xd0 [ 31.673398] print_report+0x118/0x5e0 [ 31.674059] kasan_report+0xc8/0x118 [ 31.674908] __kasan_check_byte+0x54/0x70 [ 31.675572] kfree_sensitive+0x30/0xb0 [ 31.676286] kmalloc_double_kzfree+0x168/0x308 [ 31.677010] kunit_try_run_case+0x14c/0x3d0 [ 31.677719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.678568] kthread+0x24c/0x2d0 [ 31.679152] ret_from_fork+0x10/0x20 [ 31.679815] [ 31.680162] Allocated by task 181: [ 31.680811] kasan_save_stack+0x3c/0x68 [ 31.681484] kasan_save_track+0x20/0x40 [ 31.682050] kasan_save_alloc_info+0x40/0x58 [ 31.683058] __kasan_kmalloc+0xd4/0xd8 [ 31.683838] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.684546] kmalloc_double_kzfree+0xb8/0x308 [ 31.685265] kunit_try_run_case+0x14c/0x3d0 [ 31.685987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.686977] kthread+0x24c/0x2d0 [ 31.687567] ret_from_fork+0x10/0x20 [ 31.688427] [ 31.688909] Freed by task 181: [ 31.689530] kasan_save_stack+0x3c/0x68 [ 31.690150] kasan_save_track+0x20/0x40 [ 31.690698] kasan_save_free_info+0x4c/0x78 [ 31.691292] __kasan_slab_free+0x6c/0x98 [ 31.692184] kfree+0x114/0x3c8 [ 31.692752] kfree_sensitive+0x80/0xb0 [ 31.693318] kmalloc_double_kzfree+0x11c/0x308 [ 31.693959] kunit_try_run_case+0x14c/0x3d0 [ 31.694880] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.695718] kthread+0x24c/0x2d0 [ 31.696274] ret_from_fork+0x10/0x20 [ 31.696931] [ 31.697310] The buggy address belongs to the object at fff00000c5b518a0 [ 31.697310] which belongs to the cache kmalloc-16 of size 16 [ 31.698985] The buggy address is located 0 bytes inside of [ 31.698985] freed 16-byte region [fff00000c5b518a0, fff00000c5b518b0) [ 31.700250] [ 31.700677] The buggy address belongs to the physical page: [ 31.701328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 31.702555] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.703344] page_type: f5(slab) [ 31.703840] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 31.704896] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.705784] page dumped because: kasan: bad access detected [ 31.706099] [ 31.706720] Memory state around the buggy address: [ 31.707212] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.708400] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.709424] >fff00000c5b51880: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 31.710335] ^ [ 31.710859] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.711848] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.712648] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 31.535848] ================================================================== [ 31.536893] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 31.537797] Write of size 33 at addr fff00000c66d2400 by task kunit_try_catch/175 [ 31.538448] [ 31.538885] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 31.540479] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.541100] Hardware name: linux,dummy-virt (DT) [ 31.541617] Call trace: [ 31.542085] show_stack+0x20/0x38 (C) [ 31.543048] dump_stack_lvl+0x8c/0xd0 [ 31.543706] print_report+0x118/0x5e0 [ 31.544295] kasan_report+0xc8/0x118 [ 31.544870] kasan_check_range+0x100/0x1a8 [ 31.545446] __asan_memset+0x34/0x78 [ 31.546102] kmalloc_uaf_memset+0x170/0x310 [ 31.547051] kunit_try_run_case+0x14c/0x3d0 [ 31.547701] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.548483] kthread+0x24c/0x2d0 [ 31.549048] ret_from_fork+0x10/0x20 [ 31.549638] [ 31.549986] Allocated by task 175: [ 31.550793] kasan_save_stack+0x3c/0x68 [ 31.551324] kasan_save_track+0x20/0x40 [ 31.551973] kasan_save_alloc_info+0x40/0x58 [ 31.552657] __kasan_kmalloc+0xd4/0xd8 [ 31.553235] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.553775] kmalloc_uaf_memset+0xb8/0x310 [ 31.554721] kunit_try_run_case+0x14c/0x3d0 [ 31.555365] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.556143] kthread+0x24c/0x2d0 [ 31.556743] ret_from_fork+0x10/0x20 [ 31.557339] [ 31.557718] Freed by task 175: [ 31.559206] kasan_save_stack+0x3c/0x68 [ 31.559792] kasan_save_track+0x20/0x40 [ 31.560456] kasan_save_free_info+0x4c/0x78 [ 31.561061] __kasan_slab_free+0x6c/0x98 [ 31.561680] kfree+0x114/0x3c8 [ 31.562236] kmalloc_uaf_memset+0x11c/0x310 [ 31.562966] kunit_try_run_case+0x14c/0x3d0 [ 31.563772] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.564619] kthread+0x24c/0x2d0 [ 31.565262] ret_from_fork+0x10/0x20 [ 31.565911] [ 31.566595] The buggy address belongs to the object at fff00000c66d2400 [ 31.566595] which belongs to the cache kmalloc-64 of size 64 [ 31.567877] The buggy address is located 0 bytes inside of [ 31.567877] freed 64-byte region [fff00000c66d2400, fff00000c66d2440) [ 31.569158] [ 31.569589] The buggy address belongs to the physical page: [ 31.570495] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066d2 [ 31.571483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.572335] page_type: f5(slab) [ 31.572819] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 31.573790] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.575011] page dumped because: kasan: bad access detected [ 31.575716] [ 31.576101] Memory state around the buggy address: [ 31.576856] fff00000c66d2300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 31.577685] fff00000c66d2380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.579006] >fff00000c66d2400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.579946] ^ [ 31.580695] fff00000c66d2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.581710] fff00000c66d2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.582452] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 31.425348] ================================================================== [ 31.426634] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e8 [ 31.428712] Read of size 64 at addr fff00000c66d2104 by task kunit_try_catch/171 [ 31.429648] [ 31.430023] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 31.431626] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.432132] Hardware name: linux,dummy-virt (DT) [ 31.432806] Call trace: [ 31.433178] show_stack+0x20/0x38 (C) [ 31.433853] dump_stack_lvl+0x8c/0xd0 [ 31.434762] print_report+0x118/0x5e0 [ 31.435372] kasan_report+0xc8/0x118 [ 31.435951] kasan_check_range+0x100/0x1a8 [ 31.436601] __asan_memmove+0x3c/0x98 [ 31.437171] kmalloc_memmove_invalid_size+0x154/0x2e8 [ 31.437911] kunit_try_run_case+0x14c/0x3d0 [ 31.438869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.440081] kthread+0x24c/0x2d0 [ 31.440649] ret_from_fork+0x10/0x20 [ 31.441257] [ 31.441620] Allocated by task 171: [ 31.442045] kasan_save_stack+0x3c/0x68 [ 31.443614] kasan_save_track+0x20/0x40 [ 31.444131] kasan_save_alloc_info+0x40/0x58 [ 31.444784] __kasan_kmalloc+0xd4/0xd8 [ 31.445398] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.446058] kmalloc_memmove_invalid_size+0xb0/0x2e8 [ 31.447004] kunit_try_run_case+0x14c/0x3d0 [ 31.447671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.448433] kthread+0x24c/0x2d0 [ 31.449016] ret_from_fork+0x10/0x20 [ 31.449571] [ 31.449948] The buggy address belongs to the object at fff00000c66d2100 [ 31.449948] which belongs to the cache kmalloc-64 of size 64 [ 31.451443] The buggy address is located 4 bytes inside of [ 31.451443] allocated 64-byte region [fff00000c66d2100, fff00000c66d2140) [ 31.452679] [ 31.453053] The buggy address belongs to the physical page: [ 31.453791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066d2 [ 31.454990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.455872] page_type: f5(slab) [ 31.456359] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 31.457367] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.458501] page dumped because: kasan: bad access detected [ 31.459277] [ 31.459657] Memory state around the buggy address: [ 31.460208] fff00000c66d2000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 31.461111] fff00000c66d2080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.461900] >fff00000c66d2100: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 31.463640] ^ [ 31.464217] fff00000c66d2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.465134] fff00000c66d2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.465936] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 31.373332] ================================================================== [ 31.374610] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 31.375595] Read of size 18446744073709551614 at addr fff00000c66d2084 by task kunit_try_catch/169 [ 31.376554] [ 31.376970] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 31.378579] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.379074] Hardware name: linux,dummy-virt (DT) [ 31.379747] Call trace: [ 31.380169] show_stack+0x20/0x38 (C) [ 31.380810] dump_stack_lvl+0x8c/0xd0 [ 31.381333] print_report+0x118/0x5e0 [ 31.381993] kasan_report+0xc8/0x118 [ 31.382906] kasan_check_range+0x100/0x1a8 [ 31.383491] __asan_memmove+0x3c/0x98 [ 31.384158] kmalloc_memmove_negative_size+0x154/0x2e0 [ 31.384919] kunit_try_run_case+0x14c/0x3d0 [ 31.385645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.386693] kthread+0x24c/0x2d0 [ 31.387276] ret_from_fork+0x10/0x20 [ 31.387930] [ 31.388337] Allocated by task 169: [ 31.388912] kasan_save_stack+0x3c/0x68 [ 31.389565] kasan_save_track+0x20/0x40 [ 31.390122] kasan_save_alloc_info+0x40/0x58 [ 31.391141] __kasan_kmalloc+0xd4/0xd8 [ 31.391817] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.392498] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 31.393098] kunit_try_run_case+0x14c/0x3d0 [ 31.393803] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.395048] kthread+0x24c/0x2d0 [ 31.395619] ret_from_fork+0x10/0x20 [ 31.396288] [ 31.396686] The buggy address belongs to the object at fff00000c66d2080 [ 31.396686] which belongs to the cache kmalloc-64 of size 64 [ 31.398133] The buggy address is located 4 bytes inside of [ 31.398133] 64-byte region [fff00000c66d2080, fff00000c66d20c0) [ 31.399292] [ 31.400294] The buggy address belongs to the physical page: [ 31.401011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066d2 [ 31.402024] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.403033] page_type: f5(slab) [ 31.403500] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 31.404273] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.405231] page dumped because: kasan: bad access detected [ 31.405981] [ 31.406506] Memory state around the buggy address: [ 31.407378] fff00000c66d1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.408222] fff00000c66d2000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 31.409055] >fff00000c66d2080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 31.409808] ^ [ 31.410290] fff00000c66d2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.411189] fff00000c66d2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.412102] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset
[ 31.318964] ================================================================== [ 31.320252] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 31.321164] Write of size 16 at addr fff00000c6779069 by task kunit_try_catch/167 [ 31.321916] [ 31.322342] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 31.323556] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.323984] Hardware name: linux,dummy-virt (DT) [ 31.324682] Call trace: [ 31.325375] show_stack+0x20/0x38 (C) [ 31.326051] dump_stack_lvl+0x8c/0xd0 [ 31.326751] print_report+0x118/0x5e0 [ 31.327415] kasan_report+0xc8/0x118 [ 31.328634] kasan_check_range+0x100/0x1a8 [ 31.329148] __asan_memset+0x34/0x78 [ 31.329667] kmalloc_oob_memset_16+0x150/0x2f8 [ 31.331149] kunit_try_run_case+0x14c/0x3d0 [ 31.331995] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.332922] kthread+0x24c/0x2d0 [ 31.333495] ret_from_fork+0x10/0x20 [ 31.334387] [ 31.335362] Allocated by task 167: [ 31.336026] kasan_save_stack+0x3c/0x68 [ 31.336668] kasan_save_track+0x20/0x40 [ 31.337195] kasan_save_alloc_info+0x40/0x58 [ 31.337818] __kasan_kmalloc+0xd4/0xd8 [ 31.338645] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.339319] kmalloc_oob_memset_16+0xb0/0x2f8 [ 31.339963] kunit_try_run_case+0x14c/0x3d0 [ 31.340617] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.341234] kthread+0x24c/0x2d0 [ 31.341821] ret_from_fork+0x10/0x20 [ 31.342333] [ 31.343478] The buggy address belongs to the object at fff00000c6779000 [ 31.343478] which belongs to the cache kmalloc-128 of size 128 [ 31.344949] The buggy address is located 105 bytes inside of [ 31.344949] allocated 120-byte region [fff00000c6779000, fff00000c6779078) [ 31.346204] [ 31.347043] The buggy address belongs to the physical page: [ 31.347489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106779 [ 31.348530] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.349311] page_type: f5(slab) [ 31.349828] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.351203] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.352146] page dumped because: kasan: bad access detected [ 31.352891] [ 31.353257] Memory state around the buggy address: [ 31.353935] fff00000c6778f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.355217] fff00000c6778f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.356039] >fff00000c6779000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.356894] ^ [ 31.357727] fff00000c6779080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.359395] fff00000c6779100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.360197] ================================================================== [ 31.265308] ================================================================== [ 31.266733] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 31.268075] Write of size 8 at addr fff00000c6728f71 by task kunit_try_catch/165 [ 31.269637] [ 31.270136] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 31.271702] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.272158] Hardware name: linux,dummy-virt (DT) [ 31.272842] Call trace: [ 31.273301] show_stack+0x20/0x38 (C) [ 31.273943] dump_stack_lvl+0x8c/0xd0 [ 31.274559] print_report+0x118/0x5e0 [ 31.275293] kasan_report+0xc8/0x118 [ 31.276780] kasan_check_range+0x100/0x1a8 [ 31.277443] __asan_memset+0x34/0x78 [ 31.278054] kmalloc_oob_memset_8+0x150/0x2f8 [ 31.279202] kunit_try_run_case+0x14c/0x3d0 [ 31.280040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.280958] kthread+0x24c/0x2d0 [ 31.281562] ret_from_fork+0x10/0x20 [ 31.282606] [ 31.283023] Allocated by task 165: [ 31.283747] kasan_save_stack+0x3c/0x68 [ 31.284624] kasan_save_track+0x20/0x40 [ 31.285696] kasan_save_alloc_info+0x40/0x58 [ 31.286230] __kasan_kmalloc+0xd4/0xd8 [ 31.286874] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.287882] kmalloc_oob_memset_8+0xb0/0x2f8 [ 31.288616] kunit_try_run_case+0x14c/0x3d0 [ 31.289232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.289962] kthread+0x24c/0x2d0 [ 31.290869] ret_from_fork+0x10/0x20 [ 31.291327] [ 31.291634] The buggy address belongs to the object at fff00000c6728f00 [ 31.291634] which belongs to the cache kmalloc-128 of size 128 [ 31.292186] The buggy address is located 113 bytes inside of [ 31.292186] allocated 120-byte region [fff00000c6728f00, fff00000c6728f78) [ 31.293129] [ 31.294010] The buggy address belongs to the physical page: [ 31.295490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106728 [ 31.296435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.297173] page_type: f5(slab) [ 31.297698] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.298578] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.299415] page dumped because: kasan: bad access detected [ 31.300608] [ 31.300944] Memory state around the buggy address: [ 31.301463] fff00000c6728e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 31.303076] fff00000c6728e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.304095] >fff00000c6728f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.304854] ^ [ 31.305739] fff00000c6728f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.307069] fff00000c6729000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.307892] ================================================================== [ 31.159691] ================================================================== [ 31.161033] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 31.161963] Write of size 2 at addr fff00000c6702377 by task kunit_try_catch/161 [ 31.162640] [ 31.163052] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 31.165050] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.165882] Hardware name: linux,dummy-virt (DT) [ 31.166839] Call trace: [ 31.167471] show_stack+0x20/0x38 (C) [ 31.168124] dump_stack_lvl+0x8c/0xd0 [ 31.168765] print_report+0x118/0x5e0 [ 31.169536] kasan_report+0xc8/0x118 [ 31.170084] kasan_check_range+0x100/0x1a8 [ 31.171041] __asan_memset+0x34/0x78 [ 31.171816] kmalloc_oob_memset_2+0x150/0x2f8 [ 31.172476] kunit_try_run_case+0x14c/0x3d0 [ 31.173210] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.174028] kthread+0x24c/0x2d0 [ 31.174922] ret_from_fork+0x10/0x20 [ 31.175548] [ 31.175895] Allocated by task 161: [ 31.176393] kasan_save_stack+0x3c/0x68 [ 31.177038] kasan_save_track+0x20/0x40 [ 31.177687] kasan_save_alloc_info+0x40/0x58 [ 31.178678] __kasan_kmalloc+0xd4/0xd8 [ 31.179345] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.179980] kmalloc_oob_memset_2+0xb0/0x2f8 [ 31.180685] kunit_try_run_case+0x14c/0x3d0 [ 31.181229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.182008] kthread+0x24c/0x2d0 [ 31.182898] ret_from_fork+0x10/0x20 [ 31.184101] [ 31.184466] The buggy address belongs to the object at fff00000c6702300 [ 31.184466] which belongs to the cache kmalloc-128 of size 128 [ 31.186110] The buggy address is located 119 bytes inside of [ 31.186110] allocated 120-byte region [fff00000c6702300, fff00000c6702378) [ 31.187687] [ 31.188062] The buggy address belongs to the physical page: [ 31.188823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106702 [ 31.189665] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.190884] page_type: f5(slab) [ 31.191447] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.192324] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.193147] page dumped because: kasan: bad access detected [ 31.193805] [ 31.194166] Memory state around the buggy address: [ 31.194846] fff00000c6702200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.195762] fff00000c6702280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.196763] >fff00000c6702300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.197678] ^ [ 31.198762] fff00000c6702380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.199561] fff00000c6702400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.200345] ================================================================== [ 31.211771] ================================================================== [ 31.212895] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 31.213833] Write of size 4 at addr fff00000c6728d75 by task kunit_try_catch/163 [ 31.215173] [ 31.216287] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 31.217443] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.217925] Hardware name: linux,dummy-virt (DT) [ 31.218840] Call trace: [ 31.219194] show_stack+0x20/0x38 (C) [ 31.220080] dump_stack_lvl+0x8c/0xd0 [ 31.221005] print_report+0x118/0x5e0 [ 31.221946] kasan_report+0xc8/0x118 [ 31.222907] kasan_check_range+0x100/0x1a8 [ 31.223485] __asan_memset+0x34/0x78 [ 31.224137] kmalloc_oob_memset_4+0x150/0x300 [ 31.224708] kunit_try_run_case+0x14c/0x3d0 [ 31.225400] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.226139] kthread+0x24c/0x2d0 [ 31.226922] ret_from_fork+0x10/0x20 [ 31.227421] [ 31.228603] Allocated by task 163: [ 31.229191] kasan_save_stack+0x3c/0x68 [ 31.229763] kasan_save_track+0x20/0x40 [ 31.230784] kasan_save_alloc_info+0x40/0x58 [ 31.231467] __kasan_kmalloc+0xd4/0xd8 [ 31.232022] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.232656] kmalloc_oob_memset_4+0xb0/0x300 [ 31.233225] kunit_try_run_case+0x14c/0x3d0 [ 31.233847] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.234919] kthread+0x24c/0x2d0 [ 31.235537] ret_from_fork+0x10/0x20 [ 31.236555] [ 31.236854] The buggy address belongs to the object at fff00000c6728d00 [ 31.236854] which belongs to the cache kmalloc-128 of size 128 [ 31.238101] The buggy address is located 117 bytes inside of [ 31.238101] allocated 120-byte region [fff00000c6728d00, fff00000c6728d78) [ 31.239767] [ 31.240135] The buggy address belongs to the physical page: [ 31.240811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106728 [ 31.241839] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.242770] page_type: f5(slab) [ 31.243352] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.244333] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.245758] page dumped because: kasan: bad access detected [ 31.246889] [ 31.247186] Memory state around the buggy address: [ 31.247691] fff00000c6728c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 31.248905] fff00000c6728c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.249852] >fff00000c6728d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.250889] ^ [ 31.251634] fff00000c6728d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.252561] fff00000c6728e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.253492] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 31.108198] ================================================================== [ 31.109323] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 31.110285] Write of size 128 at addr fff00000c6728900 by task kunit_try_catch/159 [ 31.111830] [ 31.112254] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 31.113663] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.114328] Hardware name: linux,dummy-virt (DT) [ 31.115277] Call trace: [ 31.115688] show_stack+0x20/0x38 (C) [ 31.116581] dump_stack_lvl+0x8c/0xd0 [ 31.117336] print_report+0x118/0x5e0 [ 31.118086] kasan_report+0xc8/0x118 [ 31.118917] kasan_check_range+0x100/0x1a8 [ 31.119732] __asan_memset+0x34/0x78 [ 31.120405] kmalloc_oob_in_memset+0x144/0x2d0 [ 31.121162] kunit_try_run_case+0x14c/0x3d0 [ 31.121860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.122915] kthread+0x24c/0x2d0 [ 31.123481] ret_from_fork+0x10/0x20 [ 31.124096] [ 31.124459] Allocated by task 159: [ 31.125014] kasan_save_stack+0x3c/0x68 [ 31.125603] kasan_save_track+0x20/0x40 [ 31.126258] kasan_save_alloc_info+0x40/0x58 [ 31.126818] __kasan_kmalloc+0xd4/0xd8 [ 31.127427] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.128123] kmalloc_oob_in_memset+0xb0/0x2d0 [ 31.129155] kunit_try_run_case+0x14c/0x3d0 [ 31.129724] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.130869] kthread+0x24c/0x2d0 [ 31.131386] ret_from_fork+0x10/0x20 [ 31.131995] [ 31.132363] The buggy address belongs to the object at fff00000c6728900 [ 31.132363] which belongs to the cache kmalloc-128 of size 128 [ 31.133403] The buggy address is located 0 bytes inside of [ 31.133403] allocated 120-byte region [fff00000c6728900, fff00000c6728978) [ 31.134803] [ 31.135126] The buggy address belongs to the physical page: [ 31.136615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106728 [ 31.137482] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.138274] page_type: f5(slab) [ 31.138843] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.139742] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.140941] page dumped because: kasan: bad access detected [ 31.141712] [ 31.142039] Memory state around the buggy address: [ 31.142943] fff00000c6728800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 31.143716] fff00000c6728880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.144839] >fff00000c6728900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.145693] ^ [ 31.146577] fff00000c6728980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.147449] fff00000c6728a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.148165] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 31.476198] ================================================================== [ 31.477328] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 31.478137] Read of size 1 at addr fff00000c66bc228 by task kunit_try_catch/173 [ 31.478969] [ 31.479376] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 31.480427] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.481857] Hardware name: linux,dummy-virt (DT) [ 31.482661] Call trace: [ 31.483409] show_stack+0x20/0x38 (C) [ 31.484059] dump_stack_lvl+0x8c/0xd0 [ 31.484676] print_report+0x118/0x5e0 [ 31.485267] kasan_report+0xc8/0x118 [ 31.485794] __asan_report_load1_noabort+0x20/0x30 [ 31.487060] kmalloc_uaf+0x300/0x338 [ 31.487624] kunit_try_run_case+0x14c/0x3d0 [ 31.488337] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.489165] kthread+0x24c/0x2d0 [ 31.489755] ret_from_fork+0x10/0x20 [ 31.490352] [ 31.490742] Allocated by task 173: [ 31.491555] kasan_save_stack+0x3c/0x68 [ 31.492172] kasan_save_track+0x20/0x40 [ 31.493011] kasan_save_alloc_info+0x40/0x58 [ 31.493624] __kasan_kmalloc+0xd4/0xd8 [ 31.494945] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.495705] kmalloc_uaf+0xb8/0x338 [ 31.496320] kunit_try_run_case+0x14c/0x3d0 [ 31.496898] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.497235] kthread+0x24c/0x2d0 [ 31.497474] ret_from_fork+0x10/0x20 [ 31.497972] [ 31.498322] Freed by task 173: [ 31.498870] kasan_save_stack+0x3c/0x68 [ 31.499393] kasan_save_track+0x20/0x40 [ 31.500294] kasan_save_free_info+0x4c/0x78 [ 31.500886] __kasan_slab_free+0x6c/0x98 [ 31.501493] kfree+0x114/0x3c8 [ 31.501952] kmalloc_uaf+0x11c/0x338 [ 31.503368] kunit_try_run_case+0x14c/0x3d0 [ 31.503946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.504731] kthread+0x24c/0x2d0 [ 31.505348] ret_from_fork+0x10/0x20 [ 31.506003] [ 31.506833] The buggy address belongs to the object at fff00000c66bc220 [ 31.506833] which belongs to the cache kmalloc-16 of size 16 [ 31.508200] The buggy address is located 8 bytes inside of [ 31.508200] freed 16-byte region [fff00000c66bc220, fff00000c66bc230) [ 31.509438] [ 31.509832] The buggy address belongs to the physical page: [ 31.510642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066bc [ 31.511679] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.513279] page_type: f5(slab) [ 31.513855] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 31.515207] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.516050] page dumped because: kasan: bad access detected [ 31.516727] [ 31.517091] Memory state around the buggy address: [ 31.517644] fff00000c66bc100: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 31.518634] fff00000c66bc180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.520435] >fff00000c66bc200: 00 04 fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 31.521192] ^ [ 31.521817] fff00000c66bc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.522934] fff00000c66bc300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.523740] ================================================================== [ 31.593940] ================================================================== [ 31.595016] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 31.595863] Read of size 1 at addr fff00000c6729d28 by task kunit_try_catch/177 [ 31.596849] [ 31.597767] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 31.599503] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.600024] Hardware name: linux,dummy-virt (DT) [ 31.600734] Call trace: [ 31.601135] show_stack+0x20/0x38 (C) [ 31.601793] dump_stack_lvl+0x8c/0xd0 [ 31.602783] print_report+0x118/0x5e0 [ 31.603436] kasan_report+0xc8/0x118 [ 31.604087] __asan_report_load1_noabort+0x20/0x30 [ 31.604934] kmalloc_uaf2+0x3f4/0x468 [ 31.605476] kunit_try_run_case+0x14c/0x3d0 [ 31.606100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.607350] kthread+0x24c/0x2d0 [ 31.607961] ret_from_fork+0x10/0x20 [ 31.608577] [ 31.608949] Allocated by task 177: [ 31.609561] kasan_save_stack+0x3c/0x68 [ 31.610150] kasan_save_track+0x20/0x40 [ 31.611211] kasan_save_alloc_info+0x40/0x58 [ 31.611890] __kasan_kmalloc+0xd4/0xd8 [ 31.612526] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.613182] kmalloc_uaf2+0xc4/0x468 [ 31.613831] kunit_try_run_case+0x14c/0x3d0 [ 31.614531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.615308] kthread+0x24c/0x2d0 [ 31.615797] ret_from_fork+0x10/0x20 [ 31.616354] [ 31.616753] Freed by task 177: [ 31.617557] kasan_save_stack+0x3c/0x68 [ 31.618329] kasan_save_track+0x20/0x40 [ 31.619231] kasan_save_free_info+0x4c/0x78 [ 31.620125] __kasan_slab_free+0x6c/0x98 [ 31.620947] kfree+0x114/0x3c8 [ 31.621393] kmalloc_uaf2+0x134/0x468 [ 31.622015] kunit_try_run_case+0x14c/0x3d0 [ 31.623198] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.624029] kthread+0x24c/0x2d0 [ 31.624692] ret_from_fork+0x10/0x20 [ 31.625188] [ 31.625495] The buggy address belongs to the object at fff00000c6729d00 [ 31.625495] which belongs to the cache kmalloc-64 of size 64 [ 31.627080] The buggy address is located 40 bytes inside of [ 31.627080] freed 64-byte region [fff00000c6729d00, fff00000c6729d40) [ 31.629299] [ 31.629701] The buggy address belongs to the physical page: [ 31.630465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106729 [ 31.631582] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.632638] page_type: f5(slab) [ 31.633044] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 31.633999] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.635306] page dumped because: kasan: bad access detected [ 31.635976] [ 31.636306] Memory state around the buggy address: [ 31.636845] fff00000c6729c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.637679] fff00000c6729c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.638695] >fff00000c6729d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.639786] ^ [ 31.640419] fff00000c6729d80: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 31.641143] fff00000c6729e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.642022] ================================================================== [ 31.049941] ================================================================== [ 31.051037] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 31.051872] Read of size 16 at addr fff00000c5b51880 by task kunit_try_catch/157 [ 31.052713] [ 31.053101] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 31.054210] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.055175] Hardware name: linux,dummy-virt (DT) [ 31.055789] Call trace: [ 31.056241] show_stack+0x20/0x38 (C) [ 31.056878] dump_stack_lvl+0x8c/0xd0 [ 31.057376] print_report+0x118/0x5e0 [ 31.058015] kasan_report+0xc8/0x118 [ 31.058645] __asan_report_load16_noabort+0x20/0x30 [ 31.059338] kmalloc_uaf_16+0x3bc/0x438 [ 31.060151] kunit_try_run_case+0x14c/0x3d0 [ 31.060878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.061693] kthread+0x24c/0x2d0 [ 31.062765] ret_from_fork+0x10/0x20 [ 31.063360] [ 31.063736] Allocated by task 157: [ 31.064240] kasan_save_stack+0x3c/0x68 [ 31.064789] kasan_save_track+0x20/0x40 [ 31.065330] kasan_save_alloc_info+0x40/0x58 [ 31.065894] __kasan_kmalloc+0xd4/0xd8 [ 31.066416] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.067420] kmalloc_uaf_16+0x140/0x438 [ 31.068159] kunit_try_run_case+0x14c/0x3d0 [ 31.068879] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.069626] kthread+0x24c/0x2d0 [ 31.070207] ret_from_fork+0x10/0x20 [ 31.071135] [ 31.071425] Freed by task 157: [ 31.071951] kasan_save_stack+0x3c/0x68 [ 31.072649] kasan_save_track+0x20/0x40 [ 31.073907] kasan_save_free_info+0x4c/0x78 [ 31.074390] __kasan_slab_free+0x6c/0x98 [ 31.075089] kfree+0x114/0x3c8 [ 31.075727] kmalloc_uaf_16+0x190/0x438 [ 31.076342] kunit_try_run_case+0x14c/0x3d0 [ 31.076983] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.077812] kthread+0x24c/0x2d0 [ 31.078366] ret_from_fork+0x10/0x20 [ 31.078979] [ 31.079348] The buggy address belongs to the object at fff00000c5b51880 [ 31.079348] which belongs to the cache kmalloc-16 of size 16 [ 31.081126] The buggy address is located 0 bytes inside of [ 31.081126] freed 16-byte region [fff00000c5b51880, fff00000c5b51890) [ 31.082666] [ 31.083175] The buggy address belongs to the physical page: [ 31.084010] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 31.085073] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.086150] page_type: f5(slab) [ 31.086622] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 31.087740] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.088769] page dumped because: kasan: bad access detected [ 31.089396] [ 31.089744] Memory state around the buggy address: [ 31.090414] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.091495] fff00000c5b51800: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc [ 31.092499] >fff00000c5b51880: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.093490] ^ [ 31.094235] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.095299] fff00000c5b51980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.096326] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob
[ 30.999089] ================================================================== [ 31.000358] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 31.001161] Write of size 16 at addr fff00000c5b51820 by task kunit_try_catch/155 [ 31.002145] [ 31.002882] CPU: 0 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 31.004146] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.004908] Hardware name: linux,dummy-virt (DT) [ 31.005674] Call trace: [ 31.006111] show_stack+0x20/0x38 (C) [ 31.007482] dump_stack_lvl+0x8c/0xd0 [ 31.008175] print_report+0x118/0x5e0 [ 31.008748] kasan_report+0xc8/0x118 [ 31.009408] __asan_report_store16_noabort+0x20/0x30 [ 31.010130] kmalloc_oob_16+0x3a0/0x3f8 [ 31.011035] kunit_try_run_case+0x14c/0x3d0 [ 31.011743] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.012432] kthread+0x24c/0x2d0 [ 31.013020] ret_from_fork+0x10/0x20 [ 31.013704] [ 31.014112] Allocated by task 155: [ 31.014987] kasan_save_stack+0x3c/0x68 [ 31.015725] kasan_save_track+0x20/0x40 [ 31.016384] kasan_save_alloc_info+0x40/0x58 [ 31.017089] __kasan_kmalloc+0xd4/0xd8 [ 31.017737] __kmalloc_cache_noprof+0x15c/0x3c0 [ 31.018683] kmalloc_oob_16+0xb4/0x3f8 [ 31.019877] kunit_try_run_case+0x14c/0x3d0 [ 31.020556] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.021258] kthread+0x24c/0x2d0 [ 31.021850] ret_from_fork+0x10/0x20 [ 31.022471] [ 31.022804] The buggy address belongs to the object at fff00000c5b51820 [ 31.022804] which belongs to the cache kmalloc-16 of size 16 [ 31.024112] The buggy address is located 0 bytes inside of [ 31.024112] allocated 13-byte region [fff00000c5b51820, fff00000c5b5182d) [ 31.025491] [ 31.025947] The buggy address belongs to the physical page: [ 31.026682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 31.027823] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.028573] page_type: f5(slab) [ 31.029173] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 31.030089] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.031056] page dumped because: kasan: bad access detected [ 31.032064] [ 31.032540] Memory state around the buggy address: [ 31.033157] fff00000c5b51700: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.034028] fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.035299] >fff00000c5b51800: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc [ 31.036133] ^ [ 31.036717] fff00000c5b51880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.037503] fff00000c5b51900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.038722] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 30.933941] ================================================================== [ 30.934881] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 30.936084] Read of size 1 at addr fff00000c1920800 by task kunit_try_catch/153 [ 30.936820] [ 30.937350] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.938770] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.939342] Hardware name: linux,dummy-virt (DT) [ 30.939991] Call trace: [ 30.940429] show_stack+0x20/0x38 (C) [ 30.941157] dump_stack_lvl+0x8c/0xd0 [ 30.941811] print_report+0x118/0x5e0 [ 30.942740] kasan_report+0xc8/0x118 [ 30.943470] __asan_report_load1_noabort+0x20/0x30 [ 30.944113] krealloc_uaf+0x4c8/0x520 [ 30.944801] kunit_try_run_case+0x14c/0x3d0 [ 30.945431] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.946557] kthread+0x24c/0x2d0 [ 30.947055] ret_from_fork+0x10/0x20 [ 30.947685] [ 30.948075] Allocated by task 153: [ 30.948597] kasan_save_stack+0x3c/0x68 [ 30.949266] kasan_save_track+0x20/0x40 [ 30.949890] kasan_save_alloc_info+0x40/0x58 [ 30.950856] __kasan_kmalloc+0xd4/0xd8 [ 30.951425] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.952102] krealloc_uaf+0xc8/0x520 [ 30.952701] kunit_try_run_case+0x14c/0x3d0 [ 30.953320] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.954054] kthread+0x24c/0x2d0 [ 30.954656] ret_from_fork+0x10/0x20 [ 30.955247] [ 30.955636] Freed by task 153: [ 30.956148] kasan_save_stack+0x3c/0x68 [ 30.957112] kasan_save_track+0x20/0x40 [ 30.958261] kasan_save_free_info+0x4c/0x78 [ 30.959212] __kasan_slab_free+0x6c/0x98 [ 30.960077] kfree+0x114/0x3c8 [ 30.960801] krealloc_uaf+0x12c/0x520 [ 30.961550] kunit_try_run_case+0x14c/0x3d0 [ 30.962436] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.963145] kthread+0x24c/0x2d0 [ 30.963489] ret_from_fork+0x10/0x20 [ 30.964496] [ 30.964878] The buggy address belongs to the object at fff00000c1920800 [ 30.964878] which belongs to the cache kmalloc-256 of size 256 [ 30.966105] The buggy address is located 0 bytes inside of [ 30.966105] freed 256-byte region [fff00000c1920800, fff00000c1920900) [ 30.967904] [ 30.968356] The buggy address belongs to the physical page: [ 30.969140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101920 [ 30.970076] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.971256] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.972238] page_type: f5(slab) [ 30.972824] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.973865] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.974977] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.976431] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.977443] head: 0bfffe0000000001 ffffc1ffc3064801 ffffffffffffffff 0000000000000000 [ 30.978600] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 30.979533] page dumped because: kasan: bad access detected [ 30.980315] [ 30.980785] Memory state around the buggy address: [ 30.981492] fff00000c1920700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.982532] fff00000c1920780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.983552] >fff00000c1920800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.984426] ^ [ 30.984932] fff00000c1920880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.985830] fff00000c1920900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.986979] ================================================================== [ 30.879429] ================================================================== [ 30.880568] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 30.881456] Read of size 1 at addr fff00000c1920800 by task kunit_try_catch/153 [ 30.882280] [ 30.883109] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.884411] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.884798] Hardware name: linux,dummy-virt (DT) [ 30.885464] Call trace: [ 30.885867] show_stack+0x20/0x38 (C) [ 30.886741] dump_stack_lvl+0x8c/0xd0 [ 30.887497] print_report+0x118/0x5e0 [ 30.888181] kasan_report+0xc8/0x118 [ 30.888782] __kasan_check_byte+0x54/0x70 [ 30.889477] krealloc_noprof+0x44/0x360 [ 30.890189] krealloc_uaf+0x180/0x520 [ 30.891139] kunit_try_run_case+0x14c/0x3d0 [ 30.891801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.892531] kthread+0x24c/0x2d0 [ 30.893139] ret_from_fork+0x10/0x20 [ 30.893771] [ 30.894146] Allocated by task 153: [ 30.894597] kasan_save_stack+0x3c/0x68 [ 30.895236] kasan_save_track+0x20/0x40 [ 30.895789] kasan_save_alloc_info+0x40/0x58 [ 30.896442] __kasan_kmalloc+0xd4/0xd8 [ 30.897313] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.897887] krealloc_uaf+0xc8/0x520 [ 30.899206] kunit_try_run_case+0x14c/0x3d0 [ 30.899862] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.900586] kthread+0x24c/0x2d0 [ 30.901090] ret_from_fork+0x10/0x20 [ 30.901727] [ 30.902088] Freed by task 153: [ 30.902498] kasan_save_stack+0x3c/0x68 [ 30.903375] kasan_save_track+0x20/0x40 [ 30.904026] kasan_save_free_info+0x4c/0x78 [ 30.904653] __kasan_slab_free+0x6c/0x98 [ 30.905138] kfree+0x114/0x3c8 [ 30.905764] krealloc_uaf+0x12c/0x520 [ 30.906672] kunit_try_run_case+0x14c/0x3d0 [ 30.907333] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.908106] kthread+0x24c/0x2d0 [ 30.908731] ret_from_fork+0x10/0x20 [ 30.909304] [ 30.909694] The buggy address belongs to the object at fff00000c1920800 [ 30.909694] which belongs to the cache kmalloc-256 of size 256 [ 30.911653] The buggy address is located 0 bytes inside of [ 30.911653] freed 256-byte region [fff00000c1920800, fff00000c1920900) [ 30.913069] [ 30.913422] The buggy address belongs to the physical page: [ 30.914210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101920 [ 30.915528] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.916458] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.917331] page_type: f5(slab) [ 30.917878] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.919033] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.920074] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.920817] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.921860] head: 0bfffe0000000001 ffffc1ffc3064801 ffffffffffffffff 0000000000000000 [ 30.922690] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 30.923935] page dumped because: kasan: bad access detected [ 30.924684] [ 30.925398] Memory state around the buggy address: [ 30.926029] fff00000c1920700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.927387] fff00000c1920780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.928219] >fff00000c1920800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.929282] ^ [ 30.929794] fff00000c1920880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.931031] fff00000c1920900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.931804] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 30.838981] ================================================================== [ 30.839646] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 30.840594] Write of size 1 at addr fff00000c62220eb by task kunit_try_catch/151 [ 30.841407] [ 30.841843] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.843147] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.843810] Hardware name: linux,dummy-virt (DT) [ 30.844406] Call trace: [ 30.844892] show_stack+0x20/0x38 (C) [ 30.845450] dump_stack_lvl+0x8c/0xd0 [ 30.846142] print_report+0x118/0x5e0 [ 30.846825] kasan_report+0xc8/0x118 [ 30.847496] __asan_report_store1_noabort+0x20/0x30 [ 30.848264] krealloc_less_oob_helper+0xa58/0xc50 [ 30.848906] krealloc_large_less_oob+0x20/0x38 [ 30.849677] kunit_try_run_case+0x14c/0x3d0 [ 30.850348] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.851125] kthread+0x24c/0x2d0 [ 30.851790] ret_from_fork+0x10/0x20 [ 30.852438] [ 30.852832] The buggy address belongs to the physical page: [ 30.853447] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106220 [ 30.854481] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.855397] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.856308] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.857221] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.858159] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.859115] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.860089] head: 0bfffe0000000002 ffffc1ffc3188801 ffffffffffffffff 0000000000000000 [ 30.861008] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.861906] page dumped because: kasan: bad access detected [ 30.862592] [ 30.862987] Memory state around the buggy address: [ 30.863706] fff00000c6221f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.864477] fff00000c6222000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.865395] >fff00000c6222080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.866233] ^ [ 30.867051] fff00000c6222100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.867910] fff00000c6222180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.868755] ================================================================== [ 30.423809] ================================================================== [ 30.424661] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 30.425545] Write of size 1 at addr fff00000c0c136d0 by task kunit_try_catch/147 [ 30.426773] [ 30.427161] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.428323] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.428886] Hardware name: linux,dummy-virt (DT) [ 30.429544] Call trace: [ 30.430063] show_stack+0x20/0x38 (C) [ 30.431045] dump_stack_lvl+0x8c/0xd0 [ 30.431726] print_report+0x118/0x5e0 [ 30.432340] kasan_report+0xc8/0x118 [ 30.432950] __asan_report_store1_noabort+0x20/0x30 [ 30.433752] krealloc_less_oob_helper+0xb9c/0xc50 [ 30.434788] krealloc_less_oob+0x20/0x38 [ 30.435406] kunit_try_run_case+0x14c/0x3d0 [ 30.436150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.436870] kthread+0x24c/0x2d0 [ 30.437503] ret_from_fork+0x10/0x20 [ 30.438137] [ 30.438804] Allocated by task 147: [ 30.439356] kasan_save_stack+0x3c/0x68 [ 30.440049] kasan_save_track+0x20/0x40 [ 30.440695] kasan_save_alloc_info+0x40/0x58 [ 30.441322] __kasan_krealloc+0x118/0x178 [ 30.442014] krealloc_noprof+0x128/0x360 [ 30.443576] krealloc_less_oob_helper+0x168/0xc50 [ 30.444238] krealloc_less_oob+0x20/0x38 [ 30.444922] kunit_try_run_case+0x14c/0x3d0 [ 30.445589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.446582] kthread+0x24c/0x2d0 [ 30.447155] ret_from_fork+0x10/0x20 [ 30.447838] [ 30.448239] The buggy address belongs to the object at fff00000c0c13600 [ 30.448239] which belongs to the cache kmalloc-256 of size 256 [ 30.449570] The buggy address is located 7 bytes to the right of [ 30.449570] allocated 201-byte region [fff00000c0c13600, fff00000c0c136c9) [ 30.451211] [ 30.451639] The buggy address belongs to the physical page: [ 30.452248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c12 [ 30.453241] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.454112] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.455324] page_type: f5(slab) [ 30.455856] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.456787] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.457724] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.459064] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.460037] head: 0bfffe0000000001 ffffc1ffc3030481 ffffffffffffffff 0000000000000000 [ 30.460910] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 30.461817] page dumped because: kasan: bad access detected [ 30.462877] [ 30.463179] Memory state around the buggy address: [ 30.464289] fff00000c0c13580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.465040] fff00000c0c13600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.466208] >fff00000c0c13680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.467465] ^ [ 30.468202] fff00000c0c13700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.469158] fff00000c0c13780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.470074] ================================================================== [ 30.564173] ================================================================== [ 30.565156] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 30.567060] Write of size 1 at addr fff00000c0c136eb by task kunit_try_catch/147 [ 30.568017] [ 30.568484] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.570038] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.570589] Hardware name: linux,dummy-virt (DT) [ 30.571182] Call trace: [ 30.571605] show_stack+0x20/0x38 (C) [ 30.572207] dump_stack_lvl+0x8c/0xd0 [ 30.572825] print_report+0x118/0x5e0 [ 30.573367] kasan_report+0xc8/0x118 [ 30.574012] __asan_report_store1_noabort+0x20/0x30 [ 30.574698] krealloc_less_oob_helper+0xa58/0xc50 [ 30.575374] krealloc_less_oob+0x20/0x38 [ 30.575929] kunit_try_run_case+0x14c/0x3d0 [ 30.576638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.577369] kthread+0x24c/0x2d0 [ 30.577976] ret_from_fork+0x10/0x20 [ 30.578613] [ 30.578998] Allocated by task 147: [ 30.579562] kasan_save_stack+0x3c/0x68 [ 30.580068] kasan_save_track+0x20/0x40 [ 30.580715] kasan_save_alloc_info+0x40/0x58 [ 30.581303] __kasan_krealloc+0x118/0x178 [ 30.581833] krealloc_noprof+0x128/0x360 [ 30.582457] krealloc_less_oob_helper+0x168/0xc50 [ 30.583135] krealloc_less_oob+0x20/0x38 [ 30.583657] kunit_try_run_case+0x14c/0x3d0 [ 30.584314] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.585022] kthread+0x24c/0x2d0 [ 30.585584] ret_from_fork+0x10/0x20 [ 30.586256] [ 30.586675] The buggy address belongs to the object at fff00000c0c13600 [ 30.586675] which belongs to the cache kmalloc-256 of size 256 [ 30.587962] The buggy address is located 34 bytes to the right of [ 30.587962] allocated 201-byte region [fff00000c0c13600, fff00000c0c136c9) [ 30.589107] [ 30.589414] The buggy address belongs to the physical page: [ 30.590070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c12 [ 30.591010] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.591805] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.592677] page_type: f5(slab) [ 30.593178] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.594099] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.594973] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.595901] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.596740] head: 0bfffe0000000001 ffffc1ffc3030481 ffffffffffffffff 0000000000000000 [ 30.597611] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 30.598457] page dumped because: kasan: bad access detected [ 30.599193] [ 30.599572] Memory state around the buggy address: [ 30.600148] fff00000c0c13580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.601075] fff00000c0c13600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.601786] >fff00000c0c13680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.602700] ^ [ 30.603409] fff00000c0c13700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.604275] fff00000c0c13780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.605058] ================================================================== [ 30.731681] ================================================================== [ 30.732504] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 30.734388] Write of size 1 at addr fff00000c62220d0 by task kunit_try_catch/151 [ 30.736144] [ 30.736499] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.737691] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.738439] Hardware name: linux,dummy-virt (DT) [ 30.739774] Call trace: [ 30.740128] show_stack+0x20/0x38 (C) [ 30.740785] dump_stack_lvl+0x8c/0xd0 [ 30.741360] print_report+0x118/0x5e0 [ 30.742004] kasan_report+0xc8/0x118 [ 30.743018] __asan_report_store1_noabort+0x20/0x30 [ 30.743603] krealloc_less_oob_helper+0xb9c/0xc50 [ 30.744245] krealloc_large_less_oob+0x20/0x38 [ 30.744958] kunit_try_run_case+0x14c/0x3d0 [ 30.745689] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.746735] kthread+0x24c/0x2d0 [ 30.747227] ret_from_fork+0x10/0x20 [ 30.748566] [ 30.749068] The buggy address belongs to the physical page: [ 30.749875] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106220 [ 30.751140] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.752003] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.753114] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.754006] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.755054] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.755959] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.757138] head: 0bfffe0000000002 ffffc1ffc3188801 ffffffffffffffff 0000000000000000 [ 30.758257] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.759657] page dumped because: kasan: bad access detected [ 30.760192] [ 30.760364] Memory state around the buggy address: [ 30.760752] fff00000c6221f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.761741] fff00000c6222000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.762738] >fff00000c6222080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.764472] ^ [ 30.765154] fff00000c6222100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.766037] fff00000c6222180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.767237] ================================================================== [ 30.517983] ================================================================== [ 30.519339] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 30.520181] Write of size 1 at addr fff00000c0c136ea by task kunit_try_catch/147 [ 30.520958] [ 30.521358] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.523174] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.523436] Hardware name: linux,dummy-virt (DT) [ 30.523899] Call trace: [ 30.524358] show_stack+0x20/0x38 (C) [ 30.525106] dump_stack_lvl+0x8c/0xd0 [ 30.525804] print_report+0x118/0x5e0 [ 30.526434] kasan_report+0xc8/0x118 [ 30.527240] __asan_report_store1_noabort+0x20/0x30 [ 30.528037] krealloc_less_oob_helper+0xae4/0xc50 [ 30.528816] krealloc_less_oob+0x20/0x38 [ 30.529560] kunit_try_run_case+0x14c/0x3d0 [ 30.530600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.531391] kthread+0x24c/0x2d0 [ 30.531912] ret_from_fork+0x10/0x20 [ 30.532452] [ 30.532887] Allocated by task 147: [ 30.533442] kasan_save_stack+0x3c/0x68 [ 30.534220] kasan_save_track+0x20/0x40 [ 30.534943] kasan_save_alloc_info+0x40/0x58 [ 30.535889] __kasan_krealloc+0x118/0x178 [ 30.536956] krealloc_noprof+0x128/0x360 [ 30.537874] krealloc_less_oob_helper+0x168/0xc50 [ 30.538748] krealloc_less_oob+0x20/0x38 [ 30.539476] kunit_try_run_case+0x14c/0x3d0 [ 30.540098] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.540805] kthread+0x24c/0x2d0 [ 30.541300] ret_from_fork+0x10/0x20 [ 30.541839] [ 30.542221] The buggy address belongs to the object at fff00000c0c13600 [ 30.542221] which belongs to the cache kmalloc-256 of size 256 [ 30.543899] The buggy address is located 33 bytes to the right of [ 30.543899] allocated 201-byte region [fff00000c0c13600, fff00000c0c136c9) [ 30.545274] [ 30.545697] The buggy address belongs to the physical page: [ 30.546371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c12 [ 30.547306] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.548114] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.548891] page_type: f5(slab) [ 30.549456] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.550432] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.551585] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.552397] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.553263] head: 0bfffe0000000001 ffffc1ffc3030481 ffffffffffffffff 0000000000000000 [ 30.554224] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 30.555091] page dumped because: kasan: bad access detected [ 30.556021] [ 30.556306] Memory state around the buggy address: [ 30.557153] fff00000c0c13580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.558082] fff00000c0c13600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.559297] >fff00000c0c13680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.560036] ^ [ 30.560849] fff00000c0c13700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.561589] fff00000c0c13780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.562663] ================================================================== [ 30.472136] ================================================================== [ 30.472969] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 30.473771] Write of size 1 at addr fff00000c0c136da by task kunit_try_catch/147 [ 30.474975] [ 30.475389] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.476749] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.477559] Hardware name: linux,dummy-virt (DT) [ 30.478543] Call trace: [ 30.479426] show_stack+0x20/0x38 (C) [ 30.479929] dump_stack_lvl+0x8c/0xd0 [ 30.480444] print_report+0x118/0x5e0 [ 30.481028] kasan_report+0xc8/0x118 [ 30.481560] __asan_report_store1_noabort+0x20/0x30 [ 30.482287] krealloc_less_oob_helper+0xa80/0xc50 [ 30.483178] krealloc_less_oob+0x20/0x38 [ 30.483844] kunit_try_run_case+0x14c/0x3d0 [ 30.484482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.485205] kthread+0x24c/0x2d0 [ 30.485779] ret_from_fork+0x10/0x20 [ 30.486386] [ 30.486920] Allocated by task 147: [ 30.487407] kasan_save_stack+0x3c/0x68 [ 30.488134] kasan_save_track+0x20/0x40 [ 30.488635] kasan_save_alloc_info+0x40/0x58 [ 30.489301] __kasan_krealloc+0x118/0x178 [ 30.489965] krealloc_noprof+0x128/0x360 [ 30.491030] krealloc_less_oob_helper+0x168/0xc50 [ 30.491700] krealloc_less_oob+0x20/0x38 [ 30.492216] kunit_try_run_case+0x14c/0x3d0 [ 30.492875] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.493607] kthread+0x24c/0x2d0 [ 30.494081] ret_from_fork+0x10/0x20 [ 30.495342] [ 30.495751] The buggy address belongs to the object at fff00000c0c13600 [ 30.495751] which belongs to the cache kmalloc-256 of size 256 [ 30.496974] The buggy address is located 17 bytes to the right of [ 30.496974] allocated 201-byte region [fff00000c0c13600, fff00000c0c136c9) [ 30.498255] [ 30.499101] The buggy address belongs to the physical page: [ 30.499865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c12 [ 30.500659] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.501635] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.502386] page_type: f5(slab) [ 30.503185] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.504087] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.504993] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.505995] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.507101] head: 0bfffe0000000001 ffffc1ffc3030481 ffffffffffffffff 0000000000000000 [ 30.508003] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 30.508848] page dumped because: kasan: bad access detected [ 30.509499] [ 30.509844] Memory state around the buggy address: [ 30.510393] fff00000c0c13580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.511581] fff00000c0c13600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.512430] >fff00000c0c13680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.513222] ^ [ 30.513933] fff00000c0c13700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.515341] fff00000c0c13780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.516133] ================================================================== [ 30.376154] ================================================================== [ 30.377177] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 30.378092] Write of size 1 at addr fff00000c0c136c9 by task kunit_try_catch/147 [ 30.379045] [ 30.379392] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.381055] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.381555] Hardware name: linux,dummy-virt (DT) [ 30.382498] Call trace: [ 30.382939] show_stack+0x20/0x38 (C) [ 30.383604] dump_stack_lvl+0x8c/0xd0 [ 30.384243] print_report+0x118/0x5e0 [ 30.384904] kasan_report+0xc8/0x118 [ 30.385476] __asan_report_store1_noabort+0x20/0x30 [ 30.386143] krealloc_less_oob_helper+0xa48/0xc50 [ 30.387195] krealloc_less_oob+0x20/0x38 [ 30.387863] kunit_try_run_case+0x14c/0x3d0 [ 30.388567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.389354] kthread+0x24c/0x2d0 [ 30.389878] ret_from_fork+0x10/0x20 [ 30.390802] [ 30.391186] Allocated by task 147: [ 30.391685] kasan_save_stack+0x3c/0x68 [ 30.392283] kasan_save_track+0x20/0x40 [ 30.392931] kasan_save_alloc_info+0x40/0x58 [ 30.393616] __kasan_krealloc+0x118/0x178 [ 30.394155] krealloc_noprof+0x128/0x360 [ 30.395090] krealloc_less_oob_helper+0x168/0xc50 [ 30.395796] krealloc_less_oob+0x20/0x38 [ 30.396391] kunit_try_run_case+0x14c/0x3d0 [ 30.397018] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.397628] kthread+0x24c/0x2d0 [ 30.399069] ret_from_fork+0x10/0x20 [ 30.399684] [ 30.400056] The buggy address belongs to the object at fff00000c0c13600 [ 30.400056] which belongs to the cache kmalloc-256 of size 256 [ 30.401278] The buggy address is located 0 bytes to the right of [ 30.401278] allocated 201-byte region [fff00000c0c13600, fff00000c0c136c9) [ 30.403043] [ 30.403463] The buggy address belongs to the physical page: [ 30.404281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c12 [ 30.405366] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.406360] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.407216] page_type: f5(slab) [ 30.407698] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.408994] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.409924] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.411101] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.412026] head: 0bfffe0000000001 ffffc1ffc3030481 ffffffffffffffff 0000000000000000 [ 30.412966] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 30.413769] page dumped because: kasan: bad access detected [ 30.414827] [ 30.415385] Memory state around the buggy address: [ 30.416051] fff00000c0c13580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.416891] fff00000c0c13600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.417754] >fff00000c0c13680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.418683] ^ [ 30.419573] fff00000c0c13700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.420204] fff00000c0c13780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.421131] ================================================================== [ 30.769904] ================================================================== [ 30.770893] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 30.771713] Write of size 1 at addr fff00000c62220da by task kunit_try_catch/151 [ 30.772724] [ 30.773140] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.774647] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.775529] Hardware name: linux,dummy-virt (DT) [ 30.776216] Call trace: [ 30.776697] show_stack+0x20/0x38 (C) [ 30.777365] dump_stack_lvl+0x8c/0xd0 [ 30.778088] print_report+0x118/0x5e0 [ 30.778931] kasan_report+0xc8/0x118 [ 30.779411] __asan_report_store1_noabort+0x20/0x30 [ 30.780379] krealloc_less_oob_helper+0xa80/0xc50 [ 30.781343] krealloc_large_less_oob+0x20/0x38 [ 30.782157] kunit_try_run_case+0x14c/0x3d0 [ 30.783168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.783906] kthread+0x24c/0x2d0 [ 30.784427] ret_from_fork+0x10/0x20 [ 30.785340] [ 30.785941] The buggy address belongs to the physical page: [ 30.787164] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106220 [ 30.787957] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.788535] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.789482] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.790940] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.791752] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.792680] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.793572] head: 0bfffe0000000002 ffffc1ffc3188801 ffffffffffffffff 0000000000000000 [ 30.794741] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.795908] page dumped because: kasan: bad access detected [ 30.796558] [ 30.796930] Memory state around the buggy address: [ 30.797501] fff00000c6221f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.798504] fff00000c6222000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.799561] >fff00000c6222080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.800453] ^ [ 30.801210] fff00000c6222100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.802052] fff00000c6222180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.803330] ================================================================== [ 30.697188] ================================================================== [ 30.698333] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 30.699598] Write of size 1 at addr fff00000c62220c9 by task kunit_try_catch/151 [ 30.701318] [ 30.701773] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.703304] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.703939] Hardware name: linux,dummy-virt (DT) [ 30.704672] Call trace: [ 30.705219] show_stack+0x20/0x38 (C) [ 30.705981] dump_stack_lvl+0x8c/0xd0 [ 30.707110] print_report+0x118/0x5e0 [ 30.707749] kasan_report+0xc8/0x118 [ 30.708354] __asan_report_store1_noabort+0x20/0x30 [ 30.709075] krealloc_less_oob_helper+0xa48/0xc50 [ 30.709798] krealloc_large_less_oob+0x20/0x38 [ 30.710503] kunit_try_run_case+0x14c/0x3d0 [ 30.711530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.712311] kthread+0x24c/0x2d0 [ 30.712893] ret_from_fork+0x10/0x20 [ 30.713370] [ 30.713829] The buggy address belongs to the physical page: [ 30.714980] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106220 [ 30.715939] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.716804] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.717610] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.718577] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.719712] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.720582] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.721434] head: 0bfffe0000000002 ffffc1ffc3188801 ffffffffffffffff 0000000000000000 [ 30.722349] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.723119] page dumped because: kasan: bad access detected [ 30.723868] [ 30.724178] Memory state around the buggy address: [ 30.724865] fff00000c6221f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.725634] fff00000c6222000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.726425] >fff00000c6222080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.727480] ^ [ 30.728419] fff00000c6222100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.729273] fff00000c6222180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.729992] ================================================================== [ 30.804596] ================================================================== [ 30.805473] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 30.806221] Write of size 1 at addr fff00000c62220ea by task kunit_try_catch/151 [ 30.807232] [ 30.807655] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.808765] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.809371] Hardware name: linux,dummy-virt (DT) [ 30.810007] Call trace: [ 30.810989] show_stack+0x20/0x38 (C) [ 30.811499] dump_stack_lvl+0x8c/0xd0 [ 30.812186] print_report+0x118/0x5e0 [ 30.812874] kasan_report+0xc8/0x118 [ 30.813555] __asan_report_store1_noabort+0x20/0x30 [ 30.814345] krealloc_less_oob_helper+0xae4/0xc50 [ 30.815178] krealloc_large_less_oob+0x20/0x38 [ 30.815924] kunit_try_run_case+0x14c/0x3d0 [ 30.816722] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.817608] kthread+0x24c/0x2d0 [ 30.818229] ret_from_fork+0x10/0x20 [ 30.818943] [ 30.819471] The buggy address belongs to the physical page: [ 30.820289] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106220 [ 30.821330] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.822162] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.823180] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.823973] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.824963] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.825900] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.826845] head: 0bfffe0000000002 ffffc1ffc3188801 ffffffffffffffff 0000000000000000 [ 30.827776] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.828690] page dumped because: kasan: bad access detected [ 30.829397] [ 30.829837] Memory state around the buggy address: [ 30.830428] fff00000c6221f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.831402] fff00000c6222000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.832252] >fff00000c6222080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.833172] ^ [ 30.833974] fff00000c6222100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.834807] fff00000c6222180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.835697] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 30.319477] ================================================================== [ 30.320972] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680 [ 30.321931] Write of size 1 at addr fff00000c0c134f0 by task kunit_try_catch/145 [ 30.323337] [ 30.323735] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.324966] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.325549] Hardware name: linux,dummy-virt (DT) [ 30.326223] Call trace: [ 30.326613] show_stack+0x20/0x38 (C) [ 30.327260] dump_stack_lvl+0x8c/0xd0 [ 30.327908] print_report+0x118/0x5e0 [ 30.328482] kasan_report+0xc8/0x118 [ 30.329318] __asan_report_store1_noabort+0x20/0x30 [ 30.329956] krealloc_more_oob_helper+0x5c8/0x680 [ 30.330972] krealloc_more_oob+0x20/0x38 [ 30.331554] kunit_try_run_case+0x14c/0x3d0 [ 30.332236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.332900] kthread+0x24c/0x2d0 [ 30.333484] ret_from_fork+0x10/0x20 [ 30.334141] [ 30.334783] Allocated by task 145: [ 30.335287] kasan_save_stack+0x3c/0x68 [ 30.335924] kasan_save_track+0x20/0x40 [ 30.336465] kasan_save_alloc_info+0x40/0x58 [ 30.337150] __kasan_krealloc+0x118/0x178 [ 30.337800] krealloc_noprof+0x128/0x360 [ 30.338653] krealloc_more_oob_helper+0x168/0x680 [ 30.339292] krealloc_more_oob+0x20/0x38 [ 30.339922] kunit_try_run_case+0x14c/0x3d0 [ 30.340541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.341238] kthread+0x24c/0x2d0 [ 30.341781] ret_from_fork+0x10/0x20 [ 30.343170] [ 30.343423] The buggy address belongs to the object at fff00000c0c13400 [ 30.343423] which belongs to the cache kmalloc-256 of size 256 [ 30.344756] The buggy address is located 5 bytes to the right of [ 30.344756] allocated 235-byte region [fff00000c0c13400, fff00000c0c134eb) [ 30.345936] [ 30.346635] The buggy address belongs to the physical page: [ 30.347338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c12 [ 30.348270] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.349059] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.349928] page_type: f5(slab) [ 30.350715] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.351640] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.352534] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.353468] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.354389] head: 0bfffe0000000001 ffffc1ffc3030481 ffffffffffffffff 0000000000000000 [ 30.355341] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 30.356219] page dumped because: kasan: bad access detected [ 30.356823] [ 30.357193] Memory state around the buggy address: [ 30.357854] fff00000c0c13380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.359090] fff00000c0c13400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.359862] >fff00000c0c13480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 30.360725] ^ [ 30.361531] fff00000c0c13500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.362344] fff00000c0c13580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.363027] ================================================================== [ 30.273328] ================================================================== [ 30.274086] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680 [ 30.275399] Write of size 1 at addr fff00000c0c134eb by task kunit_try_catch/145 [ 30.276057] [ 30.276399] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.277466] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.278056] Hardware name: linux,dummy-virt (DT) [ 30.278957] Call trace: [ 30.279379] show_stack+0x20/0x38 (C) [ 30.280037] dump_stack_lvl+0x8c/0xd0 [ 30.280914] print_report+0x118/0x5e0 [ 30.281450] kasan_report+0xc8/0x118 [ 30.282094] __asan_report_store1_noabort+0x20/0x30 [ 30.283045] krealloc_more_oob_helper+0x614/0x680 [ 30.283767] krealloc_more_oob+0x20/0x38 [ 30.284413] kunit_try_run_case+0x14c/0x3d0 [ 30.285098] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.285832] kthread+0x24c/0x2d0 [ 30.286737] ret_from_fork+0x10/0x20 [ 30.287285] [ 30.287682] Allocated by task 145: [ 30.288174] kasan_save_stack+0x3c/0x68 [ 30.288828] kasan_save_track+0x20/0x40 [ 30.289307] kasan_save_alloc_info+0x40/0x58 [ 30.289993] __kasan_krealloc+0x118/0x178 [ 30.291013] krealloc_noprof+0x128/0x360 [ 30.291648] krealloc_more_oob_helper+0x168/0x680 [ 30.292260] krealloc_more_oob+0x20/0x38 [ 30.292870] kunit_try_run_case+0x14c/0x3d0 [ 30.293419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.294208] kthread+0x24c/0x2d0 [ 30.294775] ret_from_fork+0x10/0x20 [ 30.295273] [ 30.295681] The buggy address belongs to the object at fff00000c0c13400 [ 30.295681] which belongs to the cache kmalloc-256 of size 256 [ 30.297864] The buggy address is located 0 bytes to the right of [ 30.297864] allocated 235-byte region [fff00000c0c13400, fff00000c0c134eb) [ 30.299638] [ 30.299980] The buggy address belongs to the physical page: [ 30.300648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100c12 [ 30.301505] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.302282] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.303535] page_type: f5(slab) [ 30.304076] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.304915] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.305838] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.307165] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.308133] head: 0bfffe0000000001 ffffc1ffc3030481 ffffffffffffffff 0000000000000000 [ 30.308978] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 30.309824] page dumped because: kasan: bad access detected [ 30.310974] [ 30.311340] Memory state around the buggy address: [ 30.312013] fff00000c0c13380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.312842] fff00000c0c13400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.313623] >fff00000c0c13480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 30.314350] ^ [ 30.315578] fff00000c0c13500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.316531] fff00000c0c13580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.317465] ================================================================== [ 30.618766] ================================================================== [ 30.619998] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680 [ 30.620963] Write of size 1 at addr fff00000c62220eb by task kunit_try_catch/149 [ 30.621631] [ 30.622041] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.623881] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.624535] Hardware name: linux,dummy-virt (DT) [ 30.625151] Call trace: [ 30.625806] show_stack+0x20/0x38 (C) [ 30.626550] dump_stack_lvl+0x8c/0xd0 [ 30.627386] print_report+0x118/0x5e0 [ 30.627961] kasan_report+0xc8/0x118 [ 30.628584] __asan_report_store1_noabort+0x20/0x30 [ 30.629220] krealloc_more_oob_helper+0x614/0x680 [ 30.629937] krealloc_large_more_oob+0x20/0x38 [ 30.630667] kunit_try_run_case+0x14c/0x3d0 [ 30.631310] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.632127] kthread+0x24c/0x2d0 [ 30.632835] ret_from_fork+0x10/0x20 [ 30.633557] [ 30.633942] The buggy address belongs to the physical page: [ 30.635017] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106220 [ 30.635950] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.636843] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.637802] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.639248] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.640205] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.641102] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.641850] head: 0bfffe0000000002 ffffc1ffc3188801 ffffffffffffffff 0000000000000000 [ 30.643064] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.644128] page dumped because: kasan: bad access detected [ 30.644795] [ 30.645149] Memory state around the buggy address: [ 30.646166] fff00000c6221f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.647391] fff00000c6222000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.648334] >fff00000c6222080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 30.649176] ^ [ 30.649906] fff00000c6222100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.650674] fff00000c6222180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.651500] ================================================================== [ 30.653378] ================================================================== [ 30.654563] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680 [ 30.655912] Write of size 1 at addr fff00000c62220f0 by task kunit_try_catch/149 [ 30.656735] [ 30.657172] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.658589] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.660245] Hardware name: linux,dummy-virt (DT) [ 30.660995] Call trace: [ 30.661585] show_stack+0x20/0x38 (C) [ 30.662657] dump_stack_lvl+0x8c/0xd0 [ 30.663154] print_report+0x118/0x5e0 [ 30.664051] kasan_report+0xc8/0x118 [ 30.664715] __asan_report_store1_noabort+0x20/0x30 [ 30.665331] krealloc_more_oob_helper+0x5c8/0x680 [ 30.666072] krealloc_large_more_oob+0x20/0x38 [ 30.666723] kunit_try_run_case+0x14c/0x3d0 [ 30.667650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.668615] kthread+0x24c/0x2d0 [ 30.669195] ret_from_fork+0x10/0x20 [ 30.669805] [ 30.670142] The buggy address belongs to the physical page: [ 30.671415] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106220 [ 30.672348] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.673184] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.674055] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.674959] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.675695] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.676694] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.677697] head: 0bfffe0000000002 ffffc1ffc3188801 ffffffffffffffff 0000000000000000 [ 30.679003] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.679992] page dumped because: kasan: bad access detected [ 30.680798] [ 30.680971] Memory state around the buggy address: [ 30.681310] fff00000c6221f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.682249] fff00000c6222000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.684153] >fff00000c6222080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 30.685086] ^ [ 30.685954] fff00000c6222100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.687083] fff00000c6222180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.688107] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 30.234832] ================================================================== [ 30.236390] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 30.237142] Read of size 1 at addr fff00000c6a90000 by task kunit_try_catch/143 [ 30.237793] [ 30.239262] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.240339] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.240848] Hardware name: linux,dummy-virt (DT) [ 30.241482] Call trace: [ 30.241965] show_stack+0x20/0x38 (C) [ 30.242943] dump_stack_lvl+0x8c/0xd0 [ 30.243455] print_report+0x118/0x5e0 [ 30.244110] kasan_report+0xc8/0x118 [ 30.244742] __asan_report_load1_noabort+0x20/0x30 [ 30.245637] page_alloc_uaf+0x328/0x350 [ 30.246414] kunit_try_run_case+0x14c/0x3d0 [ 30.247098] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.247832] kthread+0x24c/0x2d0 [ 30.248420] ret_from_fork+0x10/0x20 [ 30.249250] [ 30.249609] The buggy address belongs to the physical page: [ 30.250495] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a90 [ 30.251461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.252254] page_type: f0(buddy) [ 30.252731] raw: 0bfffe0000000000 fff00000ff6150e0 fff00000ff6150e0 0000000000000000 [ 30.253713] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000 [ 30.254843] page dumped because: kasan: bad access detected [ 30.255543] [ 30.255908] Memory state around the buggy address: [ 30.256454] fff00000c6a8ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.258045] fff00000c6a8ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.259230] >fff00000c6a90000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.259979] ^ [ 30.260533] fff00000c6a90080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.261343] fff00000c6a90100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.262145] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 30.141970] ================================================================== [ 30.143643] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 30.144572] Read of size 1 at addr fff00000c6220000 by task kunit_try_catch/137 [ 30.145391] [ 30.145847] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.147181] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.148118] Hardware name: linux,dummy-virt (DT) [ 30.148790] Call trace: [ 30.149232] show_stack+0x20/0x38 (C) [ 30.149859] dump_stack_lvl+0x8c/0xd0 [ 30.150702] print_report+0x118/0x5e0 [ 30.151322] kasan_report+0xc8/0x118 [ 30.151836] __asan_report_load1_noabort+0x20/0x30 [ 30.152928] kmalloc_large_uaf+0x2cc/0x2f8 [ 30.153708] kunit_try_run_case+0x14c/0x3d0 [ 30.154600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.155338] kthread+0x24c/0x2d0 [ 30.155948] ret_from_fork+0x10/0x20 [ 30.156641] [ 30.157040] The buggy address belongs to the physical page: [ 30.157876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106220 [ 30.158675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.159610] raw: 0bfffe0000000000 ffffc1ffc3188908 fff00000da4dc040 0000000000000000 [ 30.160781] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 30.161604] page dumped because: kasan: bad access detected [ 30.162615] [ 30.162986] Memory state around the buggy address: [ 30.163613] fff00000c621ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.164404] fff00000c621ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.165903] >fff00000c6220000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.166716] ^ [ 30.167239] fff00000c6220080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.168947] fff00000c6220100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.169703] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 30.096895] ================================================================== [ 30.097834] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 30.098849] Write of size 1 at addr fff00000c69fe00a by task kunit_try_catch/135 [ 30.100399] [ 30.100708] CPU: 1 UID: 0 PID: 135 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.101947] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.103190] Hardware name: linux,dummy-virt (DT) [ 30.103833] Call trace: [ 30.104258] show_stack+0x20/0x38 (C) [ 30.105041] dump_stack_lvl+0x8c/0xd0 [ 30.105696] print_report+0x118/0x5e0 [ 30.106729] kasan_report+0xc8/0x118 [ 30.107295] __asan_report_store1_noabort+0x20/0x30 [ 30.108065] kmalloc_large_oob_right+0x278/0x2b8 [ 30.108735] kunit_try_run_case+0x14c/0x3d0 [ 30.109404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.110128] kthread+0x24c/0x2d0 [ 30.110998] ret_from_fork+0x10/0x20 [ 30.111601] [ 30.111939] The buggy address belongs to the physical page: [ 30.112627] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069fc [ 30.113591] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.114693] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.115588] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.117326] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.119066] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.120039] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.121036] head: 0bfffe0000000002 ffffc1ffc31a7f01 ffffffffffffffff 0000000000000000 [ 30.122053] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 30.123348] page dumped because: kasan: bad access detected [ 30.124172] [ 30.124501] Memory state around the buggy address: [ 30.125383] fff00000c69fdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.126423] fff00000c69fdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.127674] >fff00000c69fe000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.128644] ^ [ 30.129210] fff00000c69fe080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.129967] fff00000c69fe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.130593] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 30.035153] ================================================================== [ 30.036657] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 30.037439] Write of size 1 at addr fff00000c13bdf00 by task kunit_try_catch/133 [ 30.038098] [ 30.038500] CPU: 1 UID: 0 PID: 133 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.039891] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.040336] Hardware name: linux,dummy-virt (DT) [ 30.041452] Call trace: [ 30.041953] show_stack+0x20/0x38 (C) [ 30.042719] dump_stack_lvl+0x8c/0xd0 [ 30.043680] print_report+0x118/0x5e0 [ 30.044242] kasan_report+0xc8/0x118 [ 30.044795] __asan_report_store1_noabort+0x20/0x30 [ 30.045461] kmalloc_big_oob_right+0x2a4/0x2f0 [ 30.046458] kunit_try_run_case+0x14c/0x3d0 [ 30.047135] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.048332] kthread+0x24c/0x2d0 [ 30.049013] ret_from_fork+0x10/0x20 [ 30.049599] [ 30.049971] Allocated by task 133: [ 30.050959] kasan_save_stack+0x3c/0x68 [ 30.051594] kasan_save_track+0x20/0x40 [ 30.052120] kasan_save_alloc_info+0x40/0x58 [ 30.052695] __kasan_kmalloc+0xd4/0xd8 [ 30.053384] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.054178] kmalloc_big_oob_right+0xb8/0x2f0 [ 30.054971] kunit_try_run_case+0x14c/0x3d0 [ 30.056829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.057857] kthread+0x24c/0x2d0 [ 30.058897] ret_from_fork+0x10/0x20 [ 30.059378] [ 30.059879] The buggy address belongs to the object at fff00000c13bc000 [ 30.059879] which belongs to the cache kmalloc-8k of size 8192 [ 30.060793] The buggy address is located 0 bytes to the right of [ 30.060793] allocated 7936-byte region [fff00000c13bc000, fff00000c13bdf00) [ 30.061839] [ 30.062481] The buggy address belongs to the physical page: [ 30.063349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1013b8 [ 30.064363] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.066953] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.068009] page_type: f5(slab) [ 30.068600] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 30.069682] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 30.070902] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 30.071907] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 30.073527] head: 0bfffe0000000003 ffffc1ffc304ee01 ffffffffffffffff 0000000000000000 [ 30.074558] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000 [ 30.075638] page dumped because: kasan: bad access detected [ 30.076563] [ 30.076899] Memory state around the buggy address: [ 30.077995] fff00000c13bde00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.078759] fff00000c13bde80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.080255] >fff00000c13bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.081274] ^ [ 30.081964] fff00000c13bdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.083182] fff00000c13be000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.084038] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 29.983161] ================================================================== [ 29.984069] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x420/0x490 [ 29.984952] Write of size 1 at addr fff00000c69ae878 by task kunit_try_catch/131 [ 29.985774] [ 29.986097] CPU: 1 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 29.987540] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.988180] Hardware name: linux,dummy-virt (DT) [ 29.988816] Call trace: [ 29.989173] show_stack+0x20/0x38 (C) [ 29.989814] dump_stack_lvl+0x8c/0xd0 [ 29.990491] print_report+0x118/0x5e0 [ 29.991164] kasan_report+0xc8/0x118 [ 29.991808] __asan_report_store1_noabort+0x20/0x30 [ 29.992440] kmalloc_track_caller_oob_right+0x420/0x490 [ 29.993286] kunit_try_run_case+0x14c/0x3d0 [ 29.993933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.995850] kthread+0x24c/0x2d0 [ 29.996400] ret_from_fork+0x10/0x20 [ 29.996950] [ 29.997312] Allocated by task 131: [ 29.997862] kasan_save_stack+0x3c/0x68 [ 29.998476] kasan_save_track+0x20/0x40 [ 29.998997] kasan_save_alloc_info+0x40/0x58 [ 30.000069] __kasan_kmalloc+0xd4/0xd8 [ 30.000621] __kmalloc_node_track_caller_noprof+0x184/0x4b8 [ 30.001410] kmalloc_track_caller_oob_right+0x184/0x490 [ 30.002021] kunit_try_run_case+0x14c/0x3d0 [ 30.003390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.004124] kthread+0x24c/0x2d0 [ 30.004674] ret_from_fork+0x10/0x20 [ 30.005259] [ 30.005664] The buggy address belongs to the object at fff00000c69ae800 [ 30.005664] which belongs to the cache kmalloc-128 of size 128 [ 30.007164] The buggy address is located 0 bytes to the right of [ 30.007164] allocated 120-byte region [fff00000c69ae800, fff00000c69ae878) [ 30.008400] [ 30.008993] The buggy address belongs to the physical page: [ 30.009689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ae [ 30.011780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.012563] page_type: f5(slab) [ 30.013046] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.013840] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.015166] page dumped because: kasan: bad access detected [ 30.015791] [ 30.016152] Memory state around the buggy address: [ 30.016837] fff00000c69ae700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.017609] fff00000c69ae780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.019329] >fff00000c69ae800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.020072] ^ [ 30.020942] fff00000c69ae880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.021689] fff00000c69ae900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.022635] ================================================================== [ 29.941836] ================================================================== [ 29.943553] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x414/0x490 [ 29.944761] Write of size 1 at addr fff00000c69ae778 by task kunit_try_catch/131 [ 29.945984] [ 29.947449] CPU: 1 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 29.948548] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.949151] Hardware name: linux,dummy-virt (DT) [ 29.949684] Call trace: [ 29.950143] show_stack+0x20/0x38 (C) [ 29.950805] dump_stack_lvl+0x8c/0xd0 [ 29.951394] print_report+0x118/0x5e0 [ 29.952382] kasan_report+0xc8/0x118 [ 29.952974] __asan_report_store1_noabort+0x20/0x30 [ 29.953567] kmalloc_track_caller_oob_right+0x414/0x490 [ 29.954563] kunit_try_run_case+0x14c/0x3d0 [ 29.955662] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.956488] kthread+0x24c/0x2d0 [ 29.957025] ret_from_fork+0x10/0x20 [ 29.957667] [ 29.958027] Allocated by task 131: [ 29.958745] kasan_save_stack+0x3c/0x68 [ 29.959391] kasan_save_track+0x20/0x40 [ 29.960033] kasan_save_alloc_info+0x40/0x58 [ 29.960864] __kasan_kmalloc+0xd4/0xd8 [ 29.961446] __kmalloc_node_track_caller_noprof+0x184/0x4b8 [ 29.962766] kmalloc_track_caller_oob_right+0xa8/0x490 [ 29.963603] kunit_try_run_case+0x14c/0x3d0 [ 29.964270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.965082] kthread+0x24c/0x2d0 [ 29.965629] ret_from_fork+0x10/0x20 [ 29.966229] [ 29.966591] The buggy address belongs to the object at fff00000c69ae700 [ 29.966591] which belongs to the cache kmalloc-128 of size 128 [ 29.967845] The buggy address is located 0 bytes to the right of [ 29.967845] allocated 120-byte region [fff00000c69ae700, fff00000c69ae778) [ 29.969135] [ 29.969526] The buggy address belongs to the physical page: [ 29.970179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ae [ 29.971134] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.972151] page_type: f5(slab) [ 29.972632] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.973561] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.974564] page dumped because: kasan: bad access detected [ 29.975190] [ 29.975660] Memory state around the buggy address: [ 29.976326] fff00000c69ae600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 29.977256] fff00000c69ae680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.978060] >fff00000c69ae700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.978946] ^ [ 29.979654] fff00000c69ae780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.980607] fff00000c69ae800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.981229] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 29.851125] ================================================================== [ 29.852499] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 29.853317] Read of size 1 at addr fff00000c5b517ff by task kunit_try_catch/127 [ 29.854350] [ 29.855077] CPU: 0 UID: 0 PID: 127 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 29.856558] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.857235] Hardware name: linux,dummy-virt (DT) [ 29.857874] Call trace: [ 29.858692] show_stack+0x20/0x38 (C) [ 29.859259] dump_stack_lvl+0x8c/0xd0 [ 29.859846] print_report+0x118/0x5e0 [ 29.860475] kasan_report+0xc8/0x118 [ 29.861057] __asan_report_load1_noabort+0x20/0x30 [ 29.861757] kmalloc_oob_left+0x2ec/0x320 [ 29.862598] kunit_try_run_case+0x14c/0x3d0 [ 29.863247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.864037] kthread+0x24c/0x2d0 [ 29.864760] ret_from_fork+0x10/0x20 [ 29.865334] [ 29.865693] Allocated by task 28: [ 29.866552] kasan_save_stack+0x3c/0x68 [ 29.867163] kasan_save_track+0x20/0x40 [ 29.867721] kasan_save_alloc_info+0x40/0x58 [ 29.868335] __kasan_kmalloc+0xd4/0xd8 [ 29.868908] __kmalloc_node_track_caller_noprof+0x184/0x4b8 [ 29.869576] kstrdup+0x54/0xc8 [ 29.870132] devtmpfs_work_loop+0x384/0x590 [ 29.871118] devtmpfsd+0x50/0x58 [ 29.871660] kthread+0x24c/0x2d0 [ 29.872158] ret_from_fork+0x10/0x20 [ 29.872728] [ 29.873131] Freed by task 28: [ 29.873690] kasan_save_stack+0x3c/0x68 [ 29.874797] kasan_save_track+0x20/0x40 [ 29.875693] kasan_save_free_info+0x4c/0x78 [ 29.876256] __kasan_slab_free+0x6c/0x98 [ 29.876773] kfree+0x114/0x3c8 [ 29.877319] devtmpfs_work_loop+0x498/0x590 [ 29.878288] devtmpfsd+0x50/0x58 [ 29.878839] kthread+0x24c/0x2d0 [ 29.879371] ret_from_fork+0x10/0x20 [ 29.879981] [ 29.880361] The buggy address belongs to the object at fff00000c5b517e0 [ 29.880361] which belongs to the cache kmalloc-16 of size 16 [ 29.881656] The buggy address is located 15 bytes to the right of [ 29.881656] allocated 16-byte region [fff00000c5b517e0, fff00000c5b517f0) [ 29.882957] [ 29.883305] The buggy address belongs to the physical page: [ 29.884062] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b51 [ 29.884974] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.885856] page_type: f5(slab) [ 29.886422] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 29.887811] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 29.888659] page dumped because: kasan: bad access detected [ 29.889302] [ 29.890003] Memory state around the buggy address: [ 29.890834] fff00000c5b51680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.891616] fff00000c5b51700: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.892422] >fff00000c5b51780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.893229] ^ [ 29.894049] fff00000c5b51800: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.894788] fff00000c5b51880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.895651] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 29.804808] ================================================================== [ 29.805793] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 29.806899] Read of size 1 at addr fff00000c66f7580 by task kunit_try_catch/125 [ 29.808143] [ 29.808720] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 29.809873] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.810335] Hardware name: linux,dummy-virt (DT) [ 29.810848] Call trace: [ 29.811295] show_stack+0x20/0x38 (C) [ 29.811897] dump_stack_lvl+0x8c/0xd0 [ 29.812457] print_report+0x118/0x5e0 [ 29.813102] kasan_report+0xc8/0x118 [ 29.813710] __asan_report_load1_noabort+0x20/0x30 [ 29.814447] kmalloc_oob_right+0x5d0/0x660 [ 29.815036] kunit_try_run_case+0x14c/0x3d0 [ 29.815779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.816526] kthread+0x24c/0x2d0 [ 29.817068] ret_from_fork+0x10/0x20 [ 29.817665] [ 29.818001] Allocated by task 125: [ 29.818560] kasan_save_stack+0x3c/0x68 [ 29.819203] kasan_save_track+0x20/0x40 [ 29.819782] kasan_save_alloc_info+0x40/0x58 [ 29.820411] __kasan_kmalloc+0xd4/0xd8 [ 29.821050] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.821615] kmalloc_oob_right+0xb0/0x660 [ 29.822257] kunit_try_run_case+0x14c/0x3d0 [ 29.822953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.823714] kthread+0x24c/0x2d0 [ 29.824250] ret_from_fork+0x10/0x20 [ 29.824865] [ 29.825232] The buggy address belongs to the object at fff00000c66f7500 [ 29.825232] which belongs to the cache kmalloc-128 of size 128 [ 29.826532] The buggy address is located 13 bytes to the right of [ 29.826532] allocated 115-byte region [fff00000c66f7500, fff00000c66f7573) [ 29.827614] [ 29.827986] The buggy address belongs to the physical page: [ 29.828738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f7 [ 29.829748] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.830463] page_type: f5(slab) [ 29.831050] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.831894] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.832824] page dumped because: kasan: bad access detected [ 29.833574] [ 29.833944] Memory state around the buggy address: [ 29.834494] fff00000c66f7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.835324] fff00000c66f7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.836118] >fff00000c66f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.837015] ^ [ 29.837758] fff00000c66f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.838700] fff00000c66f7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.839449] ================================================================== [ 29.721153] ================================================================== [ 29.722692] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 29.725165] Write of size 1 at addr fff00000c66f7573 by task kunit_try_catch/125 [ 29.726060] [ 29.728086] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G N 6.13.0-rc1-next-20241206 #1 [ 29.729541] Tainted: [N]=TEST [ 29.730003] Hardware name: linux,dummy-virt (DT) [ 29.731201] Call trace: [ 29.731961] show_stack+0x20/0x38 (C) [ 29.732776] dump_stack_lvl+0x8c/0xd0 [ 29.733429] print_report+0x118/0x5e0 [ 29.734013] kasan_report+0xc8/0x118 [ 29.734584] __asan_report_store1_noabort+0x20/0x30 [ 29.735266] kmalloc_oob_right+0x5a4/0x660 [ 29.735982] kunit_try_run_case+0x14c/0x3d0 [ 29.736625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.737297] kthread+0x24c/0x2d0 [ 29.737909] ret_from_fork+0x10/0x20 [ 29.738837] [ 29.739278] Allocated by task 125: [ 29.740139] kasan_save_stack+0x3c/0x68 [ 29.740880] kasan_save_track+0x20/0x40 [ 29.741416] kasan_save_alloc_info+0x40/0x58 [ 29.742032] __kasan_kmalloc+0xd4/0xd8 [ 29.742596] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.743221] kmalloc_oob_right+0xb0/0x660 [ 29.743806] kunit_try_run_case+0x14c/0x3d0 [ 29.744333] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.745129] kthread+0x24c/0x2d0 [ 29.745698] ret_from_fork+0x10/0x20 [ 29.746257] [ 29.746779] The buggy address belongs to the object at fff00000c66f7500 [ 29.746779] which belongs to the cache kmalloc-128 of size 128 [ 29.748065] The buggy address is located 0 bytes to the right of [ 29.748065] allocated 115-byte region [fff00000c66f7500, fff00000c66f7573) [ 29.749292] [ 29.749917] The buggy address belongs to the physical page: [ 29.750971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f7 [ 29.752309] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.753672] page_type: f5(slab) [ 29.754823] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.755687] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.756735] page dumped because: kasan: bad access detected [ 29.757456] [ 29.757823] Memory state around the buggy address: [ 29.759082] fff00000c66f7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.759970] fff00000c66f7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.760819] >fff00000c66f7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.761698] ^ [ 29.762633] fff00000c66f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.763414] fff00000c66f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.764274] ================================================================== [ 29.768134] ================================================================== [ 29.769222] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 29.770003] Write of size 1 at addr fff00000c66f7578 by task kunit_try_catch/125 [ 29.770922] [ 29.771332] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 29.772447] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.773154] Hardware name: linux,dummy-virt (DT) [ 29.773863] Call trace: [ 29.774262] show_stack+0x20/0x38 (C) [ 29.774966] dump_stack_lvl+0x8c/0xd0 [ 29.775267] print_report+0x118/0x5e0 [ 29.775568] kasan_report+0xc8/0x118 [ 29.776228] __asan_report_store1_noabort+0x20/0x30 [ 29.777244] kmalloc_oob_right+0x538/0x660 [ 29.777868] kunit_try_run_case+0x14c/0x3d0 [ 29.778471] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.779214] kthread+0x24c/0x2d0 [ 29.779782] ret_from_fork+0x10/0x20 [ 29.780356] [ 29.780718] Allocated by task 125: [ 29.781265] kasan_save_stack+0x3c/0x68 [ 29.781805] kasan_save_track+0x20/0x40 [ 29.782437] kasan_save_alloc_info+0x40/0x58 [ 29.783049] __kasan_kmalloc+0xd4/0xd8 [ 29.783692] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.784371] kmalloc_oob_right+0xb0/0x660 [ 29.785028] kunit_try_run_case+0x14c/0x3d0 [ 29.785659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.786395] kthread+0x24c/0x2d0 [ 29.786903] ret_from_fork+0x10/0x20 [ 29.787500] [ 29.787887] The buggy address belongs to the object at fff00000c66f7500 [ 29.787887] which belongs to the cache kmalloc-128 of size 128 [ 29.789106] The buggy address is located 5 bytes to the right of [ 29.789106] allocated 115-byte region [fff00000c66f7500, fff00000c66f7573) [ 29.790387] [ 29.790784] The buggy address belongs to the physical page: [ 29.791492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f7 [ 29.792341] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.793170] page_type: f5(slab) [ 29.793710] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.794617] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.795445] page dumped because: kasan: bad access detected [ 29.796169] [ 29.796492] Memory state around the buggy address: [ 29.797163] fff00000c66f7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.797957] fff00000c66f7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.798796] >fff00000c66f7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.799722] ^ [ 29.800560] fff00000c66f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.801378] fff00000c66f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.802201] ==================================================================
Failure - kunit - check_workingset_xarray
(no logs available)
Failure - kunit - check_xas_conflict_get_order_check_xa_alloc
(no logs available)
Failure - log-parser-boot - internal-error-oops-oops-preempt-smp
KNOWN ISSUE - kunit_test_null_dereference internal oops on qemu-arm64 KUNIT KASAN
[ 145.283402] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP [ 145.284368] Modules linked in: [ 145.285713] CPU: 1 UID: 0 PID: 621 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 145.287555] Tainted: [B]=BAD_PAGE, [N]=TEST [ 145.288135] Hardware name: linux,dummy-virt (DT) [ 145.289396] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 145.290695] pc : kunit_test_null_dereference+0x70/0x170 [ 145.291214] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 145.291955] sp : ffff8000834b7dc0 [ 145.292575] x29: ffff8000834b7e20 x28: 0000000000000000 x27: 0000000000000000 [ 145.293852] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000c6b61c80 [ 145.295040] x23: ffffa498ffdc56e0 x22: ffffa498ffdce2a0 x21: fff00000c6b61c88 [ 145.296401] x20: 1ffff00010696fb8 x19: ffff8000800879f0 x18: 000000005c0f8582 [ 145.297470] x17: 0000000000000001 x16: 0000000000000100 x15: fff00000da4e93d8 [ 145.298701] x14: 1ffe00001b49f390 x13: 0000000000000000 x12: fffd80001990ddc3 [ 145.299417] x11: 1ffe00001990ddc2 x10: fffd80001990ddc2 x9 : ffffa498ffdc5768 [ 145.300621] x8 : ffff8000834b7cb8 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 145.301698] x5 : ffff700010696fb8 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 145.303487] x2 : dfff800000000000 x1 : fff00000cc86e540 x0 : ffff8000800879f0 [ 145.304665] Call trace: [ 145.305124] kunit_test_null_dereference+0x70/0x170 (P) [ 145.305875] kunit_generic_run_threadfn_adapter+0x88/0x100 (L) [ 145.306737] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 145.307447] kthread+0x24c/0x2d0 [ 145.308098] ret_from_fork+0x10/0x20 [ 145.309200] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 145.310631] ---[ end trace 0000000000000000 ]---