Date
Dec. 9, 2024, 6:35 a.m.
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 61.576492] ================================================================== [ 61.577205] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 61.577205] [ 61.578030] Use-after-free read at 0x000000004a11c74c (in kfence-#188): [ 61.578727] test_krealloc+0x51c/0x830 [ 61.579407] test_krealloc+0x458/0x830 [ 61.579874] kunit_try_run_case+0x14c/0x3d0 [ 61.580381] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.581213] kthread+0x24c/0x2d0 [ 61.581866] ret_from_fork+0x10/0x20 [ 61.582357] [ 61.582798] kfence-#188: 0x000000004a11c74c-0x000000004a065938, size=32, cache=kmalloc-32 [ 61.582798] [ 61.583858] allocated by task 325 on cpu 0 at 61.575550s (0.008298s ago): [ 61.584759] test_alloc+0x298/0x620 [ 61.585481] test_krealloc+0xc0/0x830 [ 61.586131] kunit_try_run_case+0x14c/0x3d0 [ 61.586731] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.587391] kthread+0x24c/0x2d0 [ 61.587926] ret_from_fork+0x10/0x20 [ 61.588461] [ 61.588613] freed by task 325 on cpu 0 at 61.575941s (0.012666s ago): [ 61.589500] krealloc_noprof+0x148/0x360 [ 61.590071] test_krealloc+0x1dc/0x830 [ 61.590544] kunit_try_run_case+0x14c/0x3d0 [ 61.591113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.591776] kthread+0x24c/0x2d0 [ 61.592324] ret_from_fork+0x10/0x20 [ 61.592852] [ 61.593254] CPU: 0 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 61.594424] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.594948] Hardware name: linux,dummy-virt (DT) [ 61.595537] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[ 32.759795] ================================================================== [ 32.760468] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 32.760468] [ 32.761234] Invalid free of 0x00000000a6545384 (in kfence-#120): [ 32.761893] test_double_free+0x100/0x238 [ 32.762410] kunit_try_run_case+0x14c/0x3d0 [ 32.763039] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.763745] kthread+0x24c/0x2d0 [ 32.764220] ret_from_fork+0x10/0x20 [ 32.764780] [ 32.765136] kfence-#120: 0x00000000a6545384-0x000000002975f454, size=32, cache=test [ 32.765136] [ 32.766040] allocated by task 293 on cpu 0 at 32.759429s (0.006600s ago): [ 32.766931] test_alloc+0x22c/0x620 [ 32.767492] test_double_free+0xd4/0x238 [ 32.768069] kunit_try_run_case+0x14c/0x3d0 [ 32.768584] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.769341] kthread+0x24c/0x2d0 [ 32.769824] ret_from_fork+0x10/0x20 [ 32.770400] [ 32.770734] freed by task 293 on cpu 0 at 32.759522s (0.011201s ago): [ 32.771485] test_double_free+0xf0/0x238 [ 32.772127] kunit_try_run_case+0x14c/0x3d0 [ 32.772648] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.773436] kthread+0x24c/0x2d0 [ 32.773987] ret_from_fork+0x10/0x20 [ 32.774539] [ 32.774883] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 32.776032] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.776571] Hardware name: linux,dummy-virt (DT) [ 32.777157] ================================================================== [ 32.656008] ================================================================== [ 32.656860] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 32.656860] [ 32.657559] Invalid free of 0x00000000a76696e7 (in kfence-#119): [ 32.658365] test_double_free+0x1bc/0x238 [ 32.658946] kunit_try_run_case+0x14c/0x3d0 [ 32.659585] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.660268] kthread+0x24c/0x2d0 [ 32.660785] ret_from_fork+0x10/0x20 [ 32.661353] [ 32.661691] kfence-#119: 0x00000000a76696e7-0x00000000983d1e6f, size=32, cache=kmalloc-32 [ 32.661691] [ 32.662687] allocated by task 291 on cpu 1 at 32.655516s (0.007162s ago): [ 32.663653] test_alloc+0x298/0x620 [ 32.664183] test_double_free+0xd4/0x238 [ 32.664825] kunit_try_run_case+0x14c/0x3d0 [ 32.665474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.666150] kthread+0x24c/0x2d0 [ 32.666784] ret_from_fork+0x10/0x20 [ 32.667335] [ 32.667712] freed by task 291 on cpu 1 at 32.655636s (0.012049s ago): [ 32.668443] test_double_free+0x1ac/0x238 [ 32.669062] kunit_try_run_case+0x14c/0x3d0 [ 32.669631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.670270] kthread+0x24c/0x2d0 [ 32.670864] ret_from_fork+0x10/0x20 [ 32.671369] [ 32.671739] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 32.672852] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.673367] Hardware name: linux,dummy-virt (DT) [ 32.673947] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 61.492948] ================================================================== [ 61.493582] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 61.493582] [ 61.494553] Use-after-free read at 0x00000000a6f89458 (in kfence-#187): [ 61.495682] test_memcache_typesafe_by_rcu+0x280/0x560 [ 61.496433] test_memcache_typesafe_by_rcu+0x260/0x560 [ 61.497683] kunit_try_run_case+0x14c/0x3d0 [ 61.498274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.499026] kthread+0x24c/0x2d0 [ 61.499546] ret_from_fork+0x10/0x20 [ 61.500190] [ 61.500518] kfence-#187: 0x00000000a6f89458-0x0000000010b8f95c, size=32, cache=test [ 61.500518] [ 61.501579] allocated by task 323 on cpu 1 at 61.471592s (0.029977s ago): [ 61.502651] test_alloc+0x22c/0x620 [ 61.503175] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 61.503787] kunit_try_run_case+0x14c/0x3d0 [ 61.504330] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.505033] kthread+0x24c/0x2d0 [ 61.505558] ret_from_fork+0x10/0x20 [ 61.506105] [ 61.506400] freed by task 323 on cpu 1 at 61.471786s (0.034604s ago): [ 61.507228] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 61.507862] kunit_try_run_case+0x14c/0x3d0 [ 61.508520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.509188] kthread+0x24c/0x2d0 [ 61.509671] ret_from_fork+0x10/0x20 [ 61.510239] [ 61.510604] CPU: 1 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 61.511727] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.512241] Hardware name: linux,dummy-virt (DT) [ 61.512764] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 39.337364] ================================================================== [ 39.338377] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 39.338377] [ 39.339338] Invalid read at 0x00000000af9b9a89: [ 39.340880] test_invalid_access+0xdc/0x1f0 [ 39.341511] kunit_try_run_case+0x14c/0x3d0 [ 39.342307] kunit_try_run_case+0x14c/0x3d0 [ 39.343516] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.344143] kthread+0x24c/0x2d0 [ 39.344653] ret_from_fork+0x10/0x20 [ 39.345391] [ 39.345841] CPU: 0 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 39.347385] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.348159] Hardware name: linux,dummy-virt (DT) [ 39.349116] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 39.103804] ================================================================== [ 39.104473] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 39.104473] [ 39.105369] Corrupted memory at 0x000000006b7d9cdb [ ! . . . . . . . . . . . . . . . ] (in kfence-#181): [ 39.107575] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 39.108251] kunit_try_run_case+0x14c/0x3d0 [ 39.108828] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.109514] kthread+0x24c/0x2d0 [ 39.110017] ret_from_fork+0x10/0x20 [ 39.110545] [ 39.110864] kfence-#181: 0x000000008e12bd74-0x0000000016e1791a, size=73, cache=kmalloc-96 [ 39.110864] [ 39.111886] allocated by task 313 on cpu 1 at 39.103394s (0.008482s ago): [ 39.112778] test_alloc+0x298/0x620 [ 39.113268] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 39.113913] kunit_try_run_case+0x14c/0x3d0 [ 39.114468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.115129] kthread+0x24c/0x2d0 [ 39.115677] ret_from_fork+0x10/0x20 [ 39.116197] [ 39.116528] freed by task 313 on cpu 1 at 39.103620s (0.012898s ago): [ 39.117387] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 39.118045] kunit_try_run_case+0x14c/0x3d0 [ 39.118598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.119281] kthread+0x24c/0x2d0 [ 39.119747] ret_from_fork+0x10/0x20 [ 39.120323] [ 39.120759] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 39.121915] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.122433] Hardware name: linux,dummy-virt (DT) [ 39.122999] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 38.999870] ================================================================== [ 39.000547] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 39.000547] [ 39.001563] Out-of-bounds read at 0x000000008a3e00f3 (105B right of kfence-#180): [ 39.002416] test_kmalloc_aligned_oob_read+0x238/0x468 [ 39.003154] test_kmalloc_aligned_oob_read+0x100/0x468 [ 39.003753] kunit_try_run_case+0x14c/0x3d0 [ 39.004307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.005180] kthread+0x24c/0x2d0 [ 39.005640] ret_from_fork+0x10/0x20 [ 39.006733] [ 39.007017] kfence-#180: 0x0000000055dfab21-0x000000008dbea06f, size=73, cache=kmalloc-96 [ 39.007017] [ 39.007995] allocated by task 311 on cpu 1 at 38.999472s (0.008512s ago): [ 39.008861] test_alloc+0x298/0x620 [ 39.009373] test_kmalloc_aligned_oob_read+0x100/0x468 [ 39.009941] kunit_try_run_case+0x14c/0x3d0 [ 39.010590] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.011336] kthread+0x24c/0x2d0 [ 39.011851] ret_from_fork+0x10/0x20 [ 39.012460] [ 39.012854] CPU: 1 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 39.013921] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.014471] Hardware name: linux,dummy-virt (DT) [ 39.015024] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[ 33.176047] ================================================================== [ 33.176776] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 33.176776] [ 33.177499] Corrupted memory at 0x00000000208f8d9e [ ! ] (in kfence-#124): [ 33.178608] test_corruption+0x284/0x378 [ 33.179279] kunit_try_run_case+0x14c/0x3d0 [ 33.179907] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.180571] kthread+0x24c/0x2d0 [ 33.181180] ret_from_fork+0x10/0x20 [ 33.181654] [ 33.182043] kfence-#124: 0x00000000f3dd9759-0x00000000d3bdd84b, size=32, cache=kmalloc-32 [ 33.182043] [ 33.183062] allocated by task 299 on cpu 1 at 33.175579s (0.007474s ago): [ 33.183823] test_alloc+0x298/0x620 [ 33.184450] test_corruption+0x198/0x378 [ 33.184967] kunit_try_run_case+0x14c/0x3d0 [ 33.185609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.186280] kthread+0x24c/0x2d0 [ 33.186811] ret_from_fork+0x10/0x20 [ 33.187417] [ 33.187757] freed by task 299 on cpu 1 at 33.175750s (0.011996s ago): [ 33.188518] test_corruption+0x284/0x378 [ 33.189112] kunit_try_run_case+0x14c/0x3d0 [ 33.189677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.190355] kthread+0x24c/0x2d0 [ 33.190883] ret_from_fork+0x10/0x20 [ 33.191425] [ 33.191798] CPU: 1 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 33.192955] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.193494] Hardware name: linux,dummy-virt (DT) [ 33.194076] ================================================================== [ 33.279914] ================================================================== [ 33.280688] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 33.280688] [ 33.281504] Corrupted memory at 0x00000000ba075af4 [ ! . . . . . . . . . . . . . . . ] (in kfence-#125): [ 33.283978] test_corruption+0x120/0x378 [ 33.284578] kunit_try_run_case+0x14c/0x3d0 [ 33.285207] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.285908] kthread+0x24c/0x2d0 [ 33.286472] ret_from_fork+0x10/0x20 [ 33.287000] [ 33.287311] kfence-#125: 0x0000000096908c10-0x000000000a6e7269, size=32, cache=test [ 33.287311] [ 33.288293] allocated by task 301 on cpu 1 at 33.279649s (0.008634s ago): [ 33.289184] test_alloc+0x22c/0x620 [ 33.289674] test_corruption+0xdc/0x378 [ 33.290314] kunit_try_run_case+0x14c/0x3d0 [ 33.290848] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.291585] kthread+0x24c/0x2d0 [ 33.292059] ret_from_fork+0x10/0x20 [ 33.292620] [ 33.292972] freed by task 301 on cpu 1 at 33.279763s (0.013198s ago): [ 33.293715] test_corruption+0x120/0x378 [ 33.294206] kunit_try_run_case+0x14c/0x3d0 [ 33.294851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.295553] kthread+0x24c/0x2d0 [ 33.296062] ret_from_fork+0x10/0x20 [ 33.296561] [ 33.296948] CPU: 1 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 33.297999] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.298542] Hardware name: linux,dummy-virt (DT) [ 33.299126] ================================================================== [ 33.383840] ================================================================== [ 33.384654] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 33.384654] [ 33.385390] Corrupted memory at 0x000000002d5eca7b [ ! ] (in kfence-#126): [ 33.386496] test_corruption+0x1d8/0x378 [ 33.387178] kunit_try_run_case+0x14c/0x3d0 [ 33.387781] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.388447] kthread+0x24c/0x2d0 [ 33.389091] ret_from_fork+0x10/0x20 [ 33.389677] [ 33.390004] kfence-#126: 0x000000001a06a115-0x000000000acbb084, size=32, cache=test [ 33.390004] [ 33.391038] allocated by task 301 on cpu 1 at 33.383579s (0.007449s ago): [ 33.391792] test_alloc+0x22c/0x620 [ 33.392346] test_corruption+0x198/0x378 [ 33.392907] kunit_try_run_case+0x14c/0x3d0 [ 33.393531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.394288] kthread+0x24c/0x2d0 [ 33.394844] ret_from_fork+0x10/0x20 [ 33.395338] [ 33.395740] freed by task 301 on cpu 1 at 33.383668s (0.012061s ago): [ 33.396402] test_corruption+0x1d8/0x378 [ 33.396984] kunit_try_run_case+0x14c/0x3d0 [ 33.397624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.398269] kthread+0x24c/0x2d0 [ 33.398730] ret_from_fork+0x10/0x20 [ 33.399307] [ 33.399727] CPU: 1 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 33.400762] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.401332] Hardware name: linux,dummy-virt (DT) [ 33.401970] ================================================================== [ 33.072117] ================================================================== [ 33.072834] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 33.072834] [ 33.073647] Corrupted memory at 0x000000006924fa2b [ ! . . . . . . . . . . . . . . . ] (in kfence-#123): [ 33.076860] test_corruption+0x278/0x378 [ 33.077405] kunit_try_run_case+0x14c/0x3d0 [ 33.078021] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.078666] kthread+0x24c/0x2d0 [ 33.079255] ret_from_fork+0x10/0x20 [ 33.079800] [ 33.080119] kfence-#123: 0x00000000c0770284-0x000000002ba68ec3, size=32, cache=kmalloc-32 [ 33.080119] [ 33.081064] allocated by task 299 on cpu 1 at 33.071674s (0.009381s ago): [ 33.081867] test_alloc+0x298/0x620 [ 33.082507] test_corruption+0xdc/0x378 [ 33.083079] kunit_try_run_case+0x14c/0x3d0 [ 33.083651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.084402] kthread+0x24c/0x2d0 [ 33.084912] ret_from_fork+0x10/0x20 [ 33.085473] [ 33.085803] freed by task 299 on cpu 1 at 33.071848s (0.013944s ago): [ 33.086648] test_corruption+0x278/0x378 [ 33.087221] kunit_try_run_case+0x14c/0x3d0 [ 33.087829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.088434] kthread+0x24c/0x2d0 [ 33.089026] ret_from_fork+0x10/0x20 [ 33.089550] [ 33.089963] CPU: 1 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 33.091049] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.091576] Hardware name: linux,dummy-virt (DT) [ 33.092146] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 32.967729] ================================================================== [ 32.968470] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 32.968470] [ 32.969253] Invalid free of 0x000000003c915777 (in kfence-#122): [ 32.970032] test_invalid_addr_free+0xec/0x238 [ 32.970625] kunit_try_run_case+0x14c/0x3d0 [ 32.971254] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.971864] kthread+0x24c/0x2d0 [ 32.972468] ret_from_fork+0x10/0x20 [ 32.973039] [ 32.973367] kfence-#122: 0x000000004d84e5be-0x0000000029955738, size=32, cache=test [ 32.973367] [ 32.974373] allocated by task 297 on cpu 0 at 32.967523s (0.006841s ago): [ 32.975316] test_alloc+0x22c/0x620 [ 32.975830] test_invalid_addr_free+0xd4/0x238 [ 32.976424] kunit_try_run_case+0x14c/0x3d0 [ 32.977123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.977845] kthread+0x24c/0x2d0 [ 32.978300] ret_from_fork+0x10/0x20 [ 32.978872] [ 32.979286] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 32.980294] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.980894] Hardware name: linux,dummy-virt (DT) [ 32.981477] ================================================================== [ 32.863880] ================================================================== [ 32.864557] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 32.864557] [ 32.865410] Invalid free of 0x0000000048bcf881 (in kfence-#121): [ 32.866145] test_invalid_addr_free+0x1ac/0x238 [ 32.866728] kunit_try_run_case+0x14c/0x3d0 [ 32.867540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.868276] kthread+0x24c/0x2d0 [ 32.868781] ret_from_fork+0x10/0x20 [ 32.869413] [ 32.869772] kfence-#121: 0x00000000c21b7c10-0x00000000e30d5b65, size=32, cache=kmalloc-32 [ 32.869772] [ 32.870917] allocated by task 295 on cpu 1 at 32.863511s (0.007396s ago): [ 32.871870] test_alloc+0x298/0x620 [ 32.872493] test_invalid_addr_free+0xd4/0x238 [ 32.873214] kunit_try_run_case+0x14c/0x3d0 [ 32.873854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.874647] kthread+0x24c/0x2d0 [ 32.875191] ret_from_fork+0x10/0x20 [ 32.875772] [ 32.876174] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 32.877299] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.877911] Hardware name: linux,dummy-virt (DT) [ 32.878553] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 25.185148] ================================================================== [ 25.186163] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 25.187439] Read of size 8 at addr fff00000c63712c0 by task kunit_try_catch/188 [ 25.188375] [ 25.188878] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 25.190245] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.190918] Hardware name: linux,dummy-virt (DT) [ 25.191422] Call trace: [ 25.191765] show_stack+0x20/0x38 (C) [ 25.192242] dump_stack_lvl+0x8c/0xd0 [ 25.193279] print_report+0x118/0x5e0 [ 25.193892] kasan_report+0xc8/0x118 [ 25.194139] __asan_report_load8_noabort+0x20/0x30 [ 25.194411] workqueue_uaf+0x480/0x4a8 [ 25.194640] kunit_try_run_case+0x14c/0x3d0 [ 25.196018] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.196940] kthread+0x24c/0x2d0 [ 25.197517] ret_from_fork+0x10/0x20 [ 25.198183] [ 25.198467] Allocated by task 188: [ 25.199335] kasan_save_stack+0x3c/0x68 [ 25.200042] kasan_save_track+0x20/0x40 [ 25.200735] kasan_save_alloc_info+0x40/0x58 [ 25.201431] __kasan_kmalloc+0xd4/0xd8 [ 25.202105] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.202834] workqueue_uaf+0x13c/0x4a8 [ 25.203611] kunit_try_run_case+0x14c/0x3d0 [ 25.204092] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.205241] kthread+0x24c/0x2d0 [ 25.205941] ret_from_fork+0x10/0x20 [ 25.206615] [ 25.206956] Freed by task 31: [ 25.207859] kasan_save_stack+0x3c/0x68 [ 25.208434] kasan_save_track+0x20/0x40 [ 25.208989] kasan_save_free_info+0x4c/0x78 [ 25.209559] __kasan_slab_free+0x6c/0x98 [ 25.210138] kfree+0x114/0x3c8 [ 25.210642] workqueue_uaf_work+0x18/0x30 [ 25.211148] process_one_work+0x530/0xf98 [ 25.211777] worker_thread+0x614/0xf28 [ 25.212334] kthread+0x24c/0x2d0 [ 25.212851] ret_from_fork+0x10/0x20 [ 25.213450] [ 25.213785] Last potentially related work creation: [ 25.214391] kasan_save_stack+0x3c/0x68 [ 25.214975] kasan_record_aux_stack+0xb4/0xc8 [ 25.215641] __queue_work+0x65c/0xfd8 [ 25.216135] queue_work_on+0xbc/0xf8 [ 25.216750] workqueue_uaf+0x210/0x4a8 [ 25.217229] kunit_try_run_case+0x14c/0x3d0 [ 25.217912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.218595] kthread+0x24c/0x2d0 [ 25.219310] ret_from_fork+0x10/0x20 [ 25.219844] [ 25.220173] The buggy address belongs to the object at fff00000c63712c0 [ 25.220173] which belongs to the cache kmalloc-32 of size 32 [ 25.221299] The buggy address is located 0 bytes inside of [ 25.221299] freed 32-byte region [fff00000c63712c0, fff00000c63712e0) [ 25.222536] [ 25.222887] The buggy address belongs to the physical page: [ 25.223603] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106371 [ 25.224434] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.225238] page_type: f5(slab) [ 25.225652] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 25.226418] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 25.227367] page dumped because: kasan: bad access detected [ 25.228050] [ 25.228315] Memory state around the buggy address: [ 25.229413] fff00000c6371180: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 25.230225] fff00000c6371200: 00 00 00 fc fc fc fc fc 00 00 03 fc fc fc fc fc [ 25.231246] >fff00000c6371280: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 25.231958] ^ [ 25.232836] fff00000c6371300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.233664] fff00000c6371380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.234424] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 25.115594] ================================================================== [ 25.116625] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 25.117295] Read of size 4 at addr fff00000c6371180 by task swapper/1/0 [ 25.117972] [ 25.118317] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 25.119236] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.120267] Hardware name: linux,dummy-virt (DT) [ 25.120957] Call trace: [ 25.121324] show_stack+0x20/0x38 (C) [ 25.121905] dump_stack_lvl+0x8c/0xd0 [ 25.122472] print_report+0x118/0x5e0 [ 25.123268] kasan_report+0xc8/0x118 [ 25.123797] __asan_report_load4_noabort+0x20/0x30 [ 25.124408] rcu_uaf_reclaim+0x64/0x70 [ 25.124981] rcu_core+0x9f4/0x1e20 [ 25.125536] rcu_core_si+0x18/0x30 [ 25.126052] handle_softirqs+0x374/0xb20 [ 25.126590] __do_softirq+0x1c/0x28 [ 25.127096] ____do_softirq+0x18/0x30 [ 25.127649] call_on_irq_stack+0x24/0x58 [ 25.128207] do_softirq_own_stack+0x24/0x38 [ 25.129039] __irq_exit_rcu+0x1fc/0x318 [ 25.129548] irq_exit_rcu+0x1c/0x80 [ 25.130130] el1_interrupt+0x38/0x58 [ 25.130725] el1h_64_irq_handler+0x18/0x28 [ 25.131650] el1h_64_irq+0x6c/0x70 [ 25.132291] arch_local_irq_enable+0x4/0x8 (P) [ 25.132974] default_idle_call+0x6c/0x78 (L) [ 25.133622] do_idle+0x384/0x4e8 [ 25.134281] cpu_startup_entry+0x68/0x80 [ 25.135298] secondary_start_kernel+0x288/0x340 [ 25.135841] __secondary_switched+0xc0/0xc8 [ 25.136481] [ 25.136799] Allocated by task 186: [ 25.137460] kasan_save_stack+0x3c/0x68 [ 25.138052] kasan_save_track+0x20/0x40 [ 25.138672] kasan_save_alloc_info+0x40/0x58 [ 25.139370] __kasan_kmalloc+0xd4/0xd8 [ 25.140118] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.140782] rcu_uaf+0xb0/0x2d0 [ 25.141338] kunit_try_run_case+0x14c/0x3d0 [ 25.141991] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.142736] kthread+0x24c/0x2d0 [ 25.143450] ret_from_fork+0x10/0x20 [ 25.144030] [ 25.144405] Freed by task 0: [ 25.144897] kasan_save_stack+0x3c/0x68 [ 25.145427] kasan_save_track+0x20/0x40 [ 25.146041] kasan_save_free_info+0x4c/0x78 [ 25.146651] __kasan_slab_free+0x6c/0x98 [ 25.147468] kfree+0x114/0x3c8 [ 25.147953] rcu_uaf_reclaim+0x28/0x70 [ 25.148485] rcu_core+0x9f4/0x1e20 [ 25.149207] rcu_core_si+0x18/0x30 [ 25.149764] handle_softirqs+0x374/0xb20 [ 25.150338] __do_softirq+0x1c/0x28 [ 25.151072] [ 25.151465] Last potentially related work creation: [ 25.152085] kasan_save_stack+0x3c/0x68 [ 25.152689] kasan_record_aux_stack+0xb4/0xc8 [ 25.153398] __call_rcu_common.constprop.0+0x74/0xa10 [ 25.154181] call_rcu+0x18/0x30 [ 25.154690] rcu_uaf+0x14c/0x2d0 [ 25.155530] kunit_try_run_case+0x14c/0x3d0 [ 25.155991] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.156286] kthread+0x24c/0x2d0 [ 25.156505] ret_from_fork+0x10/0x20 [ 25.156823] [ 25.157176] The buggy address belongs to the object at fff00000c6371180 [ 25.157176] which belongs to the cache kmalloc-32 of size 32 [ 25.158272] The buggy address is located 0 bytes inside of [ 25.158272] freed 32-byte region [fff00000c6371180, fff00000c63711a0) [ 25.159487] [ 25.160173] The buggy address belongs to the physical page: [ 25.160780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106371 [ 25.161886] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.162953] page_type: f5(slab) [ 25.163694] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 25.164737] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 25.165497] page dumped because: kasan: bad access detected [ 25.166170] [ 25.166549] Memory state around the buggy address: [ 25.167556] fff00000c6371080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 25.168247] fff00000c6371100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 25.169084] >fff00000c6371180: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 25.169887] ^ [ 25.170404] fff00000c6371200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.171468] fff00000c6371280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.172379] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 25.044100] ================================================================== [ 25.044998] BUG: KASAN: slab-use-after-free in ksize_uaf+0x548/0x600 [ 25.045610] Read of size 1 at addr fff00000c6484878 by task kunit_try_catch/184 [ 25.046465] [ 25.046893] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 25.048028] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.048627] Hardware name: linux,dummy-virt (DT) [ 25.049429] Call trace: [ 25.049896] show_stack+0x20/0x38 (C) [ 25.050520] dump_stack_lvl+0x8c/0xd0 [ 25.051223] print_report+0x118/0x5e0 [ 25.051776] kasan_report+0xc8/0x118 [ 25.052332] __asan_report_load1_noabort+0x20/0x30 [ 25.053229] ksize_uaf+0x548/0x600 [ 25.054086] kunit_try_run_case+0x14c/0x3d0 [ 25.054772] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.055473] kthread+0x24c/0x2d0 [ 25.055965] ret_from_fork+0x10/0x20 [ 25.056484] [ 25.057210] Allocated by task 184: [ 25.057654] kasan_save_stack+0x3c/0x68 [ 25.058484] kasan_save_track+0x20/0x40 [ 25.059247] kasan_save_alloc_info+0x40/0x58 [ 25.059719] __kasan_kmalloc+0xd4/0xd8 [ 25.060331] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.061055] ksize_uaf+0xb8/0x600 [ 25.061581] kunit_try_run_case+0x14c/0x3d0 [ 25.062194] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.062862] kthread+0x24c/0x2d0 [ 25.063601] ret_from_fork+0x10/0x20 [ 25.064363] [ 25.064688] Freed by task 184: [ 25.065146] kasan_save_stack+0x3c/0x68 [ 25.065818] kasan_save_track+0x20/0x40 [ 25.066408] kasan_save_free_info+0x4c/0x78 [ 25.067485] __kasan_slab_free+0x6c/0x98 [ 25.068020] kfree+0x114/0x3c8 [ 25.068410] ksize_uaf+0x11c/0x600 [ 25.068855] kunit_try_run_case+0x14c/0x3d0 [ 25.069290] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.070277] kthread+0x24c/0x2d0 [ 25.071623] ret_from_fork+0x10/0x20 [ 25.072070] [ 25.072494] The buggy address belongs to the object at fff00000c6484800 [ 25.072494] which belongs to the cache kmalloc-128 of size 128 [ 25.073829] The buggy address is located 120 bytes inside of [ 25.073829] freed 128-byte region [fff00000c6484800, fff00000c6484880) [ 25.075457] [ 25.075791] The buggy address belongs to the physical page: [ 25.076359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106484 [ 25.077307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.078062] page_type: f5(slab) [ 25.078583] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.079913] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.080884] page dumped because: kasan: bad access detected [ 25.081472] [ 25.081789] Memory state around the buggy address: [ 25.082430] fff00000c6484700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 25.083185] fff00000c6484780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.083970] >fff00000c6484800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.084880] ^ [ 25.086081] fff00000c6484880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.086823] fff00000c6484900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.087683] ================================================================== [ 24.953475] ================================================================== [ 24.954512] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x600 [ 24.955259] Read of size 1 at addr fff00000c6484800 by task kunit_try_catch/184 [ 24.956007] [ 24.956309] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 24.957648] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.958284] Hardware name: linux,dummy-virt (DT) [ 24.959296] Call trace: [ 24.959581] show_stack+0x20/0x38 (C) [ 24.960056] dump_stack_lvl+0x8c/0xd0 [ 24.960488] print_report+0x118/0x5e0 [ 24.960949] kasan_report+0xc8/0x118 [ 24.961784] __kasan_check_byte+0x54/0x70 [ 24.963236] ksize+0x30/0x88 [ 24.963823] ksize_uaf+0x168/0x600 [ 24.964197] kunit_try_run_case+0x14c/0x3d0 [ 24.964917] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.965604] kthread+0x24c/0x2d0 [ 24.966174] ret_from_fork+0x10/0x20 [ 24.966717] [ 24.967388] Allocated by task 184: [ 24.967877] kasan_save_stack+0x3c/0x68 [ 24.968428] kasan_save_track+0x20/0x40 [ 24.969047] kasan_save_alloc_info+0x40/0x58 [ 24.969547] __kasan_kmalloc+0xd4/0xd8 [ 24.970154] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.970780] ksize_uaf+0xb8/0x600 [ 24.971625] kunit_try_run_case+0x14c/0x3d0 [ 24.972196] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.972896] kthread+0x24c/0x2d0 [ 24.973420] ret_from_fork+0x10/0x20 [ 24.973928] [ 24.974231] Freed by task 184: [ 24.974645] kasan_save_stack+0x3c/0x68 [ 24.975638] kasan_save_track+0x20/0x40 [ 24.976151] kasan_save_free_info+0x4c/0x78 [ 24.976789] __kasan_slab_free+0x6c/0x98 [ 24.977355] kfree+0x114/0x3c8 [ 24.977914] ksize_uaf+0x11c/0x600 [ 24.978417] kunit_try_run_case+0x14c/0x3d0 [ 24.979464] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.980155] kthread+0x24c/0x2d0 [ 24.980661] ret_from_fork+0x10/0x20 [ 24.981136] [ 24.981455] The buggy address belongs to the object at fff00000c6484800 [ 24.981455] which belongs to the cache kmalloc-128 of size 128 [ 24.982680] The buggy address is located 0 bytes inside of [ 24.982680] freed 128-byte region [fff00000c6484800, fff00000c6484880) [ 24.984267] [ 24.984574] The buggy address belongs to the physical page: [ 24.985275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106484 [ 24.986154] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.986951] page_type: f5(slab) [ 24.987363] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.988544] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.989356] page dumped because: kasan: bad access detected [ 24.990014] [ 24.990330] Memory state around the buggy address: [ 24.991210] fff00000c6484700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 24.992078] fff00000c6484780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.992885] >fff00000c6484800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.993653] ^ [ 24.994073] fff00000c6484880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.995140] fff00000c6484900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.995837] ================================================================== [ 24.997256] ================================================================== [ 24.999080] BUG: KASAN: slab-use-after-free in ksize_uaf+0x59c/0x600 [ 24.999822] Read of size 1 at addr fff00000c6484800 by task kunit_try_catch/184 [ 25.000642] [ 25.001804] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 25.003543] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.004013] Hardware name: linux,dummy-virt (DT) [ 25.004542] Call trace: [ 25.004977] show_stack+0x20/0x38 (C) [ 25.005481] dump_stack_lvl+0x8c/0xd0 [ 25.006121] print_report+0x118/0x5e0 [ 25.006665] kasan_report+0xc8/0x118 [ 25.007581] __asan_report_load1_noabort+0x20/0x30 [ 25.008285] ksize_uaf+0x59c/0x600 [ 25.008823] kunit_try_run_case+0x14c/0x3d0 [ 25.009518] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.010273] kthread+0x24c/0x2d0 [ 25.010828] ret_from_fork+0x10/0x20 [ 25.011622] [ 25.011942] Allocated by task 184: [ 25.012390] kasan_save_stack+0x3c/0x68 [ 25.013308] kasan_save_track+0x20/0x40 [ 25.013999] kasan_save_alloc_info+0x40/0x58 [ 25.014587] __kasan_kmalloc+0xd4/0xd8 [ 25.015127] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.015666] ksize_uaf+0xb8/0x600 [ 25.016327] kunit_try_run_case+0x14c/0x3d0 [ 25.016931] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.018100] kthread+0x24c/0x2d0 [ 25.018556] ret_from_fork+0x10/0x20 [ 25.019605] [ 25.020024] Freed by task 184: [ 25.020585] kasan_save_stack+0x3c/0x68 [ 25.021145] kasan_save_track+0x20/0x40 [ 25.021665] kasan_save_free_info+0x4c/0x78 [ 25.022228] __kasan_slab_free+0x6c/0x98 [ 25.022785] kfree+0x114/0x3c8 [ 25.023615] ksize_uaf+0x11c/0x600 [ 25.024127] kunit_try_run_case+0x14c/0x3d0 [ 25.024692] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.025350] kthread+0x24c/0x2d0 [ 25.025570] ret_from_fork+0x10/0x20 [ 25.025902] [ 25.026264] The buggy address belongs to the object at fff00000c6484800 [ 25.026264] which belongs to the cache kmalloc-128 of size 128 [ 25.028332] The buggy address is located 0 bytes inside of [ 25.028332] freed 128-byte region [fff00000c6484800, fff00000c6484880) [ 25.029371] [ 25.029606] The buggy address belongs to the physical page: [ 25.030550] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106484 [ 25.032075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.032978] page_type: f5(slab) [ 25.033516] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 25.034444] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.035779] page dumped because: kasan: bad access detected [ 25.036349] [ 25.036572] Memory state around the buggy address: [ 25.037067] fff00000c6484700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 25.037739] fff00000c6484780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.038609] >fff00000c6484800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.040075] ^ [ 25.040514] fff00000c6484880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.041407] fff00000c6484900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.042349] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 32.240164] ================================================================== [ 32.240911] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 32.240911] [ 32.241959] Use-after-free read at 0x00000000da1ed975 (in kfence-#115): [ 32.242649] test_use_after_free_read+0x114/0x248 [ 32.243364] test_use_after_free_read+0x1c0/0x248 [ 32.243989] kunit_try_run_case+0x14c/0x3d0 [ 32.244663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.245357] kthread+0x24c/0x2d0 [ 32.245934] ret_from_fork+0x10/0x20 [ 32.246462] [ 32.246795] kfence-#115: 0x00000000da1ed975-0x00000000e4292113, size=32, cache=kmalloc-32 [ 32.246795] [ 32.247744] allocated by task 283 on cpu 1 at 32.239760s (0.007974s ago): [ 32.248529] test_alloc+0x298/0x620 [ 32.249125] test_use_after_free_read+0xd0/0x248 [ 32.249808] kunit_try_run_case+0x14c/0x3d0 [ 32.250365] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.251107] kthread+0x24c/0x2d0 [ 32.251661] ret_from_fork+0x10/0x20 [ 32.252198] [ 32.252806] freed by task 283 on cpu 1 at 32.239881s (0.012747s ago): [ 32.253638] test_use_after_free_read+0x1c0/0x248 [ 32.254369] kunit_try_run_case+0x14c/0x3d0 [ 32.254953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.255635] kthread+0x24c/0x2d0 [ 32.256151] ret_from_fork+0x10/0x20 [ 32.256760] [ 32.257129] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 32.258328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.258863] Hardware name: linux,dummy-virt (DT) [ 32.259453] ================================================================== [ 32.343871] ================================================================== [ 32.344578] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 32.344578] [ 32.345620] Use-after-free read at 0x00000000c98a10af (in kfence-#116): [ 32.347107] test_use_after_free_read+0x114/0x248 [ 32.347770] test_use_after_free_read+0xf0/0x248 [ 32.348395] kunit_try_run_case+0x14c/0x3d0 [ 32.349078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.349824] kthread+0x24c/0x2d0 [ 32.350328] ret_from_fork+0x10/0x20 [ 32.350778] [ 32.351077] kfence-#116: 0x00000000c98a10af-0x00000000499aa45e, size=32, cache=test [ 32.351077] [ 32.351992] allocated by task 285 on cpu 1 at 32.343552s (0.008430s ago): [ 32.352841] test_alloc+0x22c/0x620 [ 32.353401] test_use_after_free_read+0xd0/0x248 [ 32.354124] kunit_try_run_case+0x14c/0x3d0 [ 32.354798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.355490] kthread+0x24c/0x2d0 [ 32.356015] ret_from_fork+0x10/0x20 [ 32.356532] [ 32.356874] freed by task 285 on cpu 1 at 32.343640s (0.013225s ago): [ 32.357798] test_use_after_free_read+0xf0/0x248 [ 32.358429] kunit_try_run_case+0x14c/0x3d0 [ 32.359013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.359760] kthread+0x24c/0x2d0 [ 32.360279] ret_from_fork+0x10/0x20 [ 32.360825] [ 32.361162] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 32.362256] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.362830] Hardware name: linux,dummy-virt (DT) [ 32.363359] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 32.135721] ================================================================== [ 32.136555] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 32.136555] [ 32.137485] Out-of-bounds write at 0x00000000714f7f92 (1B left of kfence-#114): [ 32.139064] test_out_of_bounds_write+0x100/0x240 [ 32.139746] test_out_of_bounds_write+0xc8/0x240 [ 32.140322] kunit_try_run_case+0x14c/0x3d0 [ 32.140901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.141576] kthread+0x24c/0x2d0 [ 32.142148] ret_from_fork+0x10/0x20 [ 32.142731] [ 32.143123] kfence-#114: 0x00000000f9071ec4-0x000000002bd30384, size=32, cache=test [ 32.143123] [ 32.144106] allocated by task 281 on cpu 1 at 32.135558s (0.008536s ago): [ 32.144939] test_alloc+0x22c/0x620 [ 32.145497] test_out_of_bounds_write+0xc8/0x240 [ 32.146151] kunit_try_run_case+0x14c/0x3d0 [ 32.146792] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.147458] kthread+0x24c/0x2d0 [ 32.148037] ret_from_fork+0x10/0x20 [ 32.148631] [ 32.149055] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 32.150160] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.150694] Hardware name: linux,dummy-virt (DT) [ 32.151268] ================================================================== [ 31.927794] ================================================================== [ 31.928511] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 31.928511] [ 31.929434] Out-of-bounds write at 0x0000000018fa15c2 (1B left of kfence-#112): [ 31.930355] test_out_of_bounds_write+0x100/0x240 [ 31.931394] test_out_of_bounds_write+0xc8/0x240 [ 31.931998] kunit_try_run_case+0x14c/0x3d0 [ 31.932571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.933184] kthread+0x24c/0x2d0 [ 31.933796] ret_from_fork+0x10/0x20 [ 31.934342] [ 31.934634] kfence-#112: 0x000000008872257d-0x000000004920849b, size=32, cache=kmalloc-32 [ 31.934634] [ 31.935722] allocated by task 279 on cpu 1 at 31.927534s (0.008179s ago): [ 31.936620] test_alloc+0x298/0x620 [ 31.937179] test_out_of_bounds_write+0xc8/0x240 [ 31.937820] kunit_try_run_case+0x14c/0x3d0 [ 31.938358] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.939070] kthread+0x24c/0x2d0 [ 31.939508] ret_from_fork+0x10/0x20 [ 31.940105] [ 31.940447] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 31.941573] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.942091] Hardware name: linux,dummy-virt (DT) [ 31.942709] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 31.615760] ================================================================== [ 31.616556] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 31.616556] [ 31.617348] Out-of-bounds read at 0x00000000384528b8 (32B right of kfence-#109): [ 31.618218] test_out_of_bounds_read+0x1c8/0x3e0 [ 31.618813] test_out_of_bounds_read+0x198/0x3e0 [ 31.619366] kunit_try_run_case+0x14c/0x3d0 [ 31.620097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.620816] kthread+0x24c/0x2d0 [ 31.621397] ret_from_fork+0x10/0x20 [ 31.621897] [ 31.622178] kfence-#109: 0x000000008b70dba6-0x0000000032820204, size=32, cache=test [ 31.622178] [ 31.623368] allocated by task 277 on cpu 0 at 31.615600s (0.007758s ago): [ 31.624254] test_alloc+0x22c/0x620 [ 31.624747] test_out_of_bounds_read+0x198/0x3e0 [ 31.625388] kunit_try_run_case+0x14c/0x3d0 [ 31.626086] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.626847] kthread+0x24c/0x2d0 [ 31.627338] ret_from_fork+0x10/0x20 [ 31.627866] [ 31.628241] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 31.629353] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.629811] Hardware name: linux,dummy-virt (DT) [ 31.630351] ================================================================== [ 31.199681] ================================================================== [ 31.200384] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 31.200384] [ 31.201223] Out-of-bounds read at 0x00000000d20ef79a (32B right of kfence-#105): [ 31.202080] test_out_of_bounds_read+0x1c8/0x3e0 [ 31.202675] test_out_of_bounds_read+0x198/0x3e0 [ 31.203390] kunit_try_run_case+0x14c/0x3d0 [ 31.203952] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.204767] kthread+0x24c/0x2d0 [ 31.205318] ret_from_fork+0x10/0x20 [ 31.205963] [ 31.206333] kfence-#105: 0x00000000143c15c1-0x00000000bdbc9abd, size=32, cache=kmalloc-32 [ 31.206333] [ 31.207206] allocated by task 275 on cpu 1 at 31.199368s (0.007828s ago): [ 31.208141] test_alloc+0x298/0x620 [ 31.208647] test_out_of_bounds_read+0x198/0x3e0 [ 31.209213] kunit_try_run_case+0x14c/0x3d0 [ 31.209880] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.210535] kthread+0x24c/0x2d0 [ 31.211031] ret_from_fork+0x10/0x20 [ 31.211548] [ 31.211917] CPU: 1 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 31.213013] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.213629] Hardware name: linux,dummy-virt (DT) [ 31.214174] ================================================================== [ 31.511675] ================================================================== [ 31.512515] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 31.512515] [ 31.513312] Out-of-bounds read at 0x0000000038c64668 (1B left of kfence-#108): [ 31.514140] test_out_of_bounds_read+0x114/0x3e0 [ 31.514774] test_out_of_bounds_read+0xdc/0x3e0 [ 31.515460] kunit_try_run_case+0x14c/0x3d0 [ 31.516077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.516869] kthread+0x24c/0x2d0 [ 31.517384] ret_from_fork+0x10/0x20 [ 31.517960] [ 31.518317] kfence-#108: 0x0000000083c9f546-0x00000000f528438f, size=32, cache=test [ 31.518317] [ 31.519267] allocated by task 277 on cpu 0 at 31.511521s (0.007734s ago): [ 31.520177] test_alloc+0x22c/0x620 [ 31.520806] test_out_of_bounds_read+0xdc/0x3e0 [ 31.521469] kunit_try_run_case+0x14c/0x3d0 [ 31.522034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.522796] kthread+0x24c/0x2d0 [ 31.523242] ret_from_fork+0x10/0x20 [ 31.523888] [ 31.524231] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 31.525413] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.526010] Hardware name: linux,dummy-virt (DT) [ 31.526603] ================================================================== [ 30.888749] ================================================================== [ 30.889504] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 30.889504] [ 30.890528] Out-of-bounds read at 0x00000000e2002612 (1B left of kfence-#102): [ 30.891821] test_out_of_bounds_read+0x114/0x3e0 [ 30.892464] test_out_of_bounds_read+0xdc/0x3e0 [ 30.893126] kunit_try_run_case+0x14c/0x3d0 [ 30.893762] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.894508] kthread+0x24c/0x2d0 [ 30.895037] ret_from_fork+0x10/0x20 [ 30.895618] [ 30.896217] kfence-#102: 0x00000000d9759466-0x0000000074f1e680, size=32, cache=kmalloc-32 [ 30.896217] [ 30.897564] allocated by task 275 on cpu 1 at 30.887651s (0.009793s ago): [ 30.898896] test_alloc+0x298/0x620 [ 30.899369] test_out_of_bounds_read+0xdc/0x3e0 [ 30.900018] kunit_try_run_case+0x14c/0x3d0 [ 30.900587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.901226] kthread+0x24c/0x2d0 [ 30.901804] ret_from_fork+0x10/0x20 [ 30.902418] [ 30.902884] CPU: 1 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.904028] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.904553] Hardware name: linux,dummy-virt (DT) [ 30.905096] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 30.707239] ================================================================== [ 30.708567] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 30.709753] Write of size 121 at addr fff00000c1313100 by task kunit_try_catch/273 [ 30.710796] [ 30.711208] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.712373] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.712922] Hardware name: linux,dummy-virt (DT) [ 30.713465] Call trace: [ 30.713825] show_stack+0x20/0x38 (C) [ 30.714303] dump_stack_lvl+0x8c/0xd0 [ 30.714918] print_report+0x118/0x5e0 [ 30.715418] kasan_report+0xc8/0x118 [ 30.716083] kasan_check_range+0x100/0x1a8 [ 30.716654] __kasan_check_write+0x20/0x30 [ 30.717205] strncpy_from_user+0x3c/0x2a0 [ 30.717863] copy_user_test_oob+0x5c0/0xec0 [ 30.718554] kunit_try_run_case+0x14c/0x3d0 [ 30.719377] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.720128] kthread+0x24c/0x2d0 [ 30.720662] ret_from_fork+0x10/0x20 [ 30.721215] [ 30.721533] Allocated by task 273: [ 30.721991] kasan_save_stack+0x3c/0x68 [ 30.722617] kasan_save_track+0x20/0x40 [ 30.723343] kasan_save_alloc_info+0x40/0x58 [ 30.723784] __kasan_kmalloc+0xd4/0xd8 [ 30.724358] __kmalloc_noprof+0x188/0x4c8 [ 30.725069] kunit_kmalloc_array+0x34/0x88 [ 30.725607] copy_user_test_oob+0xac/0xec0 [ 30.726152] kunit_try_run_case+0x14c/0x3d0 [ 30.726790] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.728099] kthread+0x24c/0x2d0 [ 30.728564] ret_from_fork+0x10/0x20 [ 30.729181] [ 30.729499] The buggy address belongs to the object at fff00000c1313100 [ 30.729499] which belongs to the cache kmalloc-128 of size 128 [ 30.731045] The buggy address is located 0 bytes inside of [ 30.731045] allocated 120-byte region [fff00000c1313100, fff00000c1313178) [ 30.732479] [ 30.732868] The buggy address belongs to the physical page: [ 30.733479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101313 [ 30.734326] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.735409] page_type: f5(slab) [ 30.735926] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.736725] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.737586] page dumped because: kasan: bad access detected [ 30.738222] [ 30.738572] Memory state around the buggy address: [ 30.739499] fff00000c1313000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.740330] fff00000c1313080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.741176] >fff00000c1313100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.741963] ^ [ 30.742741] fff00000c1313180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.743673] fff00000c1313200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.744475] ================================================================== [ 30.747430] ================================================================== [ 30.748260] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 30.748972] Write of size 1 at addr fff00000c1313178 by task kunit_try_catch/273 [ 30.749575] [ 30.749934] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.751106] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.751605] Hardware name: linux,dummy-virt (DT) [ 30.752390] Call trace: [ 30.752813] show_stack+0x20/0x38 (C) [ 30.753522] dump_stack_lvl+0x8c/0xd0 [ 30.754224] print_report+0x118/0x5e0 [ 30.754891] kasan_report+0xc8/0x118 [ 30.755516] __asan_report_store1_noabort+0x20/0x30 [ 30.756278] strncpy_from_user+0x270/0x2a0 [ 30.756972] copy_user_test_oob+0x5c0/0xec0 [ 30.757668] kunit_try_run_case+0x14c/0x3d0 [ 30.758352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.759153] kthread+0x24c/0x2d0 [ 30.759840] ret_from_fork+0x10/0x20 [ 30.760333] [ 30.760613] Allocated by task 273: [ 30.761399] kasan_save_stack+0x3c/0x68 [ 30.762124] kasan_save_track+0x20/0x40 [ 30.762825] kasan_save_alloc_info+0x40/0x58 [ 30.763515] __kasan_kmalloc+0xd4/0xd8 [ 30.764201] __kmalloc_noprof+0x188/0x4c8 [ 30.764904] kunit_kmalloc_array+0x34/0x88 [ 30.765435] copy_user_test_oob+0xac/0xec0 [ 30.766238] kunit_try_run_case+0x14c/0x3d0 [ 30.766947] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.767849] kthread+0x24c/0x2d0 [ 30.768268] ret_from_fork+0x10/0x20 [ 30.768995] [ 30.769375] The buggy address belongs to the object at fff00000c1313100 [ 30.769375] which belongs to the cache kmalloc-128 of size 128 [ 30.770913] The buggy address is located 0 bytes to the right of [ 30.770913] allocated 120-byte region [fff00000c1313100, fff00000c1313178) [ 30.772252] [ 30.772568] The buggy address belongs to the physical page: [ 30.773307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101313 [ 30.774204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.774903] page_type: f5(slab) [ 30.775381] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.776264] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.777101] page dumped because: kasan: bad access detected [ 30.777742] [ 30.778064] Memory state around the buggy address: [ 30.778618] fff00000c1313000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.779375] fff00000c1313080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.780254] >fff00000c1313100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.781099] ^ [ 30.781885] fff00000c1313180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.782645] fff00000c1313200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.783448] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 30.464382] ================================================================== [ 30.465815] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0 [ 30.466620] Write of size 121 at addr fff00000c1313100 by task kunit_try_catch/273 [ 30.467484] [ 30.468180] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.469376] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.470059] Hardware name: linux,dummy-virt (DT) [ 30.470687] Call trace: [ 30.471330] show_stack+0x20/0x38 (C) [ 30.471939] dump_stack_lvl+0x8c/0xd0 [ 30.472626] print_report+0x118/0x5e0 [ 30.473244] kasan_report+0xc8/0x118 [ 30.473902] kasan_check_range+0x100/0x1a8 [ 30.474527] __kasan_check_write+0x20/0x30 [ 30.475374] copy_user_test_oob+0x234/0xec0 [ 30.476057] kunit_try_run_case+0x14c/0x3d0 [ 30.476688] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.477461] kthread+0x24c/0x2d0 [ 30.478001] ret_from_fork+0x10/0x20 [ 30.478644] [ 30.479398] Allocated by task 273: [ 30.479933] kasan_save_stack+0x3c/0x68 [ 30.480399] kasan_save_track+0x20/0x40 [ 30.481022] kasan_save_alloc_info+0x40/0x58 [ 30.481617] __kasan_kmalloc+0xd4/0xd8 [ 30.482137] __kmalloc_noprof+0x188/0x4c8 [ 30.482764] kunit_kmalloc_array+0x34/0x88 [ 30.483313] copy_user_test_oob+0xac/0xec0 [ 30.483950] kunit_try_run_case+0x14c/0x3d0 [ 30.484741] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.485425] kthread+0x24c/0x2d0 [ 30.486279] ret_from_fork+0x10/0x20 [ 30.486832] [ 30.487125] The buggy address belongs to the object at fff00000c1313100 [ 30.487125] which belongs to the cache kmalloc-128 of size 128 [ 30.488940] The buggy address is located 0 bytes inside of [ 30.488940] allocated 120-byte region [fff00000c1313100, fff00000c1313178) [ 30.490129] [ 30.490448] The buggy address belongs to the physical page: [ 30.491134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101313 [ 30.492206] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.492899] page_type: f5(slab) [ 30.493479] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.494489] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.495487] page dumped because: kasan: bad access detected [ 30.496207] [ 30.496599] Memory state around the buggy address: [ 30.497189] fff00000c1313000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.497961] fff00000c1313080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.498748] >fff00000c1313100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.500190] ^ [ 30.500883] fff00000c1313180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.501848] fff00000c1313200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.502778] ================================================================== [ 30.552819] ================================================================== [ 30.553454] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0 [ 30.554130] Write of size 121 at addr fff00000c1313100 by task kunit_try_catch/273 [ 30.554882] [ 30.555540] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.557022] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.557648] Hardware name: linux,dummy-virt (DT) [ 30.558396] Call trace: [ 30.558798] show_stack+0x20/0x38 (C) [ 30.559578] dump_stack_lvl+0x8c/0xd0 [ 30.560145] print_report+0x118/0x5e0 [ 30.560743] kasan_report+0xc8/0x118 [ 30.561302] kasan_check_range+0x100/0x1a8 [ 30.561895] __kasan_check_write+0x20/0x30 [ 30.562522] copy_user_test_oob+0x35c/0xec0 [ 30.563283] kunit_try_run_case+0x14c/0x3d0 [ 30.563857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.564787] kthread+0x24c/0x2d0 [ 30.565180] ret_from_fork+0x10/0x20 [ 30.565851] [ 30.566237] Allocated by task 273: [ 30.566664] kasan_save_stack+0x3c/0x68 [ 30.567774] kasan_save_track+0x20/0x40 [ 30.568459] kasan_save_alloc_info+0x40/0x58 [ 30.569257] __kasan_kmalloc+0xd4/0xd8 [ 30.569900] __kmalloc_noprof+0x188/0x4c8 [ 30.570415] kunit_kmalloc_array+0x34/0x88 [ 30.571111] copy_user_test_oob+0xac/0xec0 [ 30.571574] kunit_try_run_case+0x14c/0x3d0 [ 30.572030] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.572354] kthread+0x24c/0x2d0 [ 30.572565] ret_from_fork+0x10/0x20 [ 30.572981] [ 30.573260] The buggy address belongs to the object at fff00000c1313100 [ 30.573260] which belongs to the cache kmalloc-128 of size 128 [ 30.574251] The buggy address is located 0 bytes inside of [ 30.574251] allocated 120-byte region [fff00000c1313100, fff00000c1313178) [ 30.576212] [ 30.576639] The buggy address belongs to the physical page: [ 30.577365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101313 [ 30.578392] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.579090] page_type: f5(slab) [ 30.579518] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.580366] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.581177] page dumped because: kasan: bad access detected [ 30.581909] [ 30.582269] Memory state around the buggy address: [ 30.583262] fff00000c1313000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.584256] fff00000c1313080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.584996] >fff00000c1313100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.585760] ^ [ 30.586535] fff00000c1313180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.587937] fff00000c1313200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.588813] ================================================================== [ 30.590604] ================================================================== [ 30.591254] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0 [ 30.592516] Read of size 121 at addr fff00000c1313100 by task kunit_try_catch/273 [ 30.593793] [ 30.594260] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.595656] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.596397] Hardware name: linux,dummy-virt (DT) [ 30.597018] Call trace: [ 30.597508] show_stack+0x20/0x38 (C) [ 30.598066] dump_stack_lvl+0x8c/0xd0 [ 30.598551] print_report+0x118/0x5e0 [ 30.599026] kasan_report+0xc8/0x118 [ 30.599526] kasan_check_range+0x100/0x1a8 [ 30.600321] __kasan_check_read+0x20/0x30 [ 30.601279] copy_user_test_oob+0x3c8/0xec0 [ 30.602042] kunit_try_run_case+0x14c/0x3d0 [ 30.602743] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.603642] kthread+0x24c/0x2d0 [ 30.604281] ret_from_fork+0x10/0x20 [ 30.604912] [ 30.605233] Allocated by task 273: [ 30.605681] kasan_save_stack+0x3c/0x68 [ 30.606175] kasan_save_track+0x20/0x40 [ 30.606649] kasan_save_alloc_info+0x40/0x58 [ 30.607238] __kasan_kmalloc+0xd4/0xd8 [ 30.607884] __kmalloc_noprof+0x188/0x4c8 [ 30.608898] kunit_kmalloc_array+0x34/0x88 [ 30.609595] copy_user_test_oob+0xac/0xec0 [ 30.610281] kunit_try_run_case+0x14c/0x3d0 [ 30.611438] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.612452] kthread+0x24c/0x2d0 [ 30.612946] ret_from_fork+0x10/0x20 [ 30.613640] [ 30.614047] The buggy address belongs to the object at fff00000c1313100 [ 30.614047] which belongs to the cache kmalloc-128 of size 128 [ 30.615559] The buggy address is located 0 bytes inside of [ 30.615559] allocated 120-byte region [fff00000c1313100, fff00000c1313178) [ 30.617008] [ 30.617342] The buggy address belongs to the physical page: [ 30.617988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101313 [ 30.618847] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.619629] page_type: f5(slab) [ 30.620112] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.620999] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.621880] page dumped because: kasan: bad access detected [ 30.622464] [ 30.622812] Memory state around the buggy address: [ 30.623499] fff00000c1313000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.624395] fff00000c1313080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.625202] >fff00000c1313100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.626060] ^ [ 30.626783] fff00000c1313180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.628010] fff00000c1313200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.628922] ================================================================== [ 30.668250] ================================================================== [ 30.668903] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0 [ 30.670459] Read of size 121 at addr fff00000c1313100 by task kunit_try_catch/273 [ 30.671390] [ 30.672474] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.673434] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.673983] Hardware name: linux,dummy-virt (DT) [ 30.674565] Call trace: [ 30.675109] show_stack+0x20/0x38 (C) [ 30.675792] dump_stack_lvl+0x8c/0xd0 [ 30.676368] print_report+0x118/0x5e0 [ 30.677038] kasan_report+0xc8/0x118 [ 30.677677] kasan_check_range+0x100/0x1a8 [ 30.678319] __kasan_check_read+0x20/0x30 [ 30.679014] copy_user_test_oob+0x4a0/0xec0 [ 30.679788] kunit_try_run_case+0x14c/0x3d0 [ 30.680395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.681155] kthread+0x24c/0x2d0 [ 30.681649] ret_from_fork+0x10/0x20 [ 30.682199] [ 30.682506] Allocated by task 273: [ 30.683049] kasan_save_stack+0x3c/0x68 [ 30.683868] kasan_save_track+0x20/0x40 [ 30.684361] kasan_save_alloc_info+0x40/0x58 [ 30.684993] __kasan_kmalloc+0xd4/0xd8 [ 30.685506] __kmalloc_noprof+0x188/0x4c8 [ 30.686064] kunit_kmalloc_array+0x34/0x88 [ 30.686601] copy_user_test_oob+0xac/0xec0 [ 30.687234] kunit_try_run_case+0x14c/0x3d0 [ 30.688231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.688906] kthread+0x24c/0x2d0 [ 30.689456] ret_from_fork+0x10/0x20 [ 30.690024] [ 30.690354] The buggy address belongs to the object at fff00000c1313100 [ 30.690354] which belongs to the cache kmalloc-128 of size 128 [ 30.692535] The buggy address is located 0 bytes inside of [ 30.692535] allocated 120-byte region [fff00000c1313100, fff00000c1313178) [ 30.693757] [ 30.694065] The buggy address belongs to the physical page: [ 30.694674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101313 [ 30.695859] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.696823] page_type: f5(slab) [ 30.697297] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.698256] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.699163] page dumped because: kasan: bad access detected [ 30.699794] [ 30.700144] Memory state around the buggy address: [ 30.700696] fff00000c1313000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.701794] fff00000c1313080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.702605] >fff00000c1313100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.703597] ^ [ 30.704253] fff00000c1313180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.705016] fff00000c1313200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.705833] ================================================================== [ 30.629967] ================================================================== [ 30.630732] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0 [ 30.632479] Write of size 121 at addr fff00000c1313100 by task kunit_try_catch/273 [ 30.633589] [ 30.634038] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.635382] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.636126] Hardware name: linux,dummy-virt (DT) [ 30.636375] Call trace: [ 30.636544] show_stack+0x20/0x38 (C) [ 30.636904] dump_stack_lvl+0x8c/0xd0 [ 30.637567] print_report+0x118/0x5e0 [ 30.638248] kasan_report+0xc8/0x118 [ 30.638735] kasan_check_range+0x100/0x1a8 [ 30.639374] __kasan_check_write+0x20/0x30 [ 30.640413] copy_user_test_oob+0x434/0xec0 [ 30.641120] kunit_try_run_case+0x14c/0x3d0 [ 30.641773] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.642448] kthread+0x24c/0x2d0 [ 30.643084] ret_from_fork+0x10/0x20 [ 30.643792] [ 30.644120] Allocated by task 273: [ 30.644660] kasan_save_stack+0x3c/0x68 [ 30.645257] kasan_save_track+0x20/0x40 [ 30.645861] kasan_save_alloc_info+0x40/0x58 [ 30.646439] __kasan_kmalloc+0xd4/0xd8 [ 30.647039] __kmalloc_noprof+0x188/0x4c8 [ 30.647798] kunit_kmalloc_array+0x34/0x88 [ 30.648285] copy_user_test_oob+0xac/0xec0 [ 30.648940] kunit_try_run_case+0x14c/0x3d0 [ 30.649509] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.650136] kthread+0x24c/0x2d0 [ 30.650672] ret_from_fork+0x10/0x20 [ 30.651680] [ 30.651944] The buggy address belongs to the object at fff00000c1313100 [ 30.651944] which belongs to the cache kmalloc-128 of size 128 [ 30.653014] The buggy address is located 0 bytes inside of [ 30.653014] allocated 120-byte region [fff00000c1313100, fff00000c1313178) [ 30.654392] [ 30.654778] The buggy address belongs to the physical page: [ 30.655766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101313 [ 30.656744] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.657465] page_type: f5(slab) [ 30.657932] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.658822] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.659864] page dumped because: kasan: bad access detected [ 30.660560] [ 30.660915] Memory state around the buggy address: [ 30.661473] fff00000c1313000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.662262] fff00000c1313080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.663225] >fff00000c1313100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.664225] ^ [ 30.664892] fff00000c1313180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.665664] fff00000c1313200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.666472] ================================================================== [ 30.509025] ================================================================== [ 30.509721] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0 [ 30.510463] Read of size 121 at addr fff00000c1313100 by task kunit_try_catch/273 [ 30.511657] [ 30.512066] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.513346] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.513975] Hardware name: linux,dummy-virt (DT) [ 30.514601] Call trace: [ 30.515240] show_stack+0x20/0x38 (C) [ 30.515903] dump_stack_lvl+0x8c/0xd0 [ 30.516480] print_report+0x118/0x5e0 [ 30.517154] kasan_report+0xc8/0x118 [ 30.517829] kasan_check_range+0x100/0x1a8 [ 30.518474] __kasan_check_read+0x20/0x30 [ 30.519272] copy_user_test_oob+0x728/0xec0 [ 30.519881] kunit_try_run_case+0x14c/0x3d0 [ 30.520489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.521243] kthread+0x24c/0x2d0 [ 30.521851] ret_from_fork+0x10/0x20 [ 30.522448] [ 30.522806] Allocated by task 273: [ 30.523537] kasan_save_stack+0x3c/0x68 [ 30.524128] kasan_save_track+0x20/0x40 [ 30.524765] kasan_save_alloc_info+0x40/0x58 [ 30.525452] __kasan_kmalloc+0xd4/0xd8 [ 30.526058] __kmalloc_noprof+0x188/0x4c8 [ 30.526680] kunit_kmalloc_array+0x34/0x88 [ 30.527388] copy_user_test_oob+0xac/0xec0 [ 30.528069] kunit_try_run_case+0x14c/0x3d0 [ 30.528636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.529362] kthread+0x24c/0x2d0 [ 30.529862] ret_from_fork+0x10/0x20 [ 30.530372] [ 30.530679] The buggy address belongs to the object at fff00000c1313100 [ 30.530679] which belongs to the cache kmalloc-128 of size 128 [ 30.532337] The buggy address is located 0 bytes inside of [ 30.532337] allocated 120-byte region [fff00000c1313100, fff00000c1313178) [ 30.533466] [ 30.534551] The buggy address belongs to the physical page: [ 30.535600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101313 [ 30.536483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.537280] page_type: f5(slab) [ 30.537774] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.538551] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.539537] page dumped because: kasan: bad access detected [ 30.540341] [ 30.540569] Memory state around the buggy address: [ 30.541021] fff00000c1313000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.541882] fff00000c1313080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.542738] >fff00000c1313100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.543948] ^ [ 30.544745] fff00000c1313180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.545571] fff00000c1313200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.546365] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 30.399435] ================================================================== [ 30.400403] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 30.401328] Write of size 8 at addr fff00000c1313078 by task kunit_try_catch/269 [ 30.402250] [ 30.402731] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.404187] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.404994] Hardware name: linux,dummy-virt (DT) [ 30.405669] Call trace: [ 30.406145] show_stack+0x20/0x38 (C) [ 30.406793] dump_stack_lvl+0x8c/0xd0 [ 30.407488] print_report+0x118/0x5e0 [ 30.408338] kasan_report+0xc8/0x118 [ 30.408765] kasan_check_range+0x100/0x1a8 [ 30.409395] __kasan_check_write+0x20/0x30 [ 30.410041] copy_to_kernel_nofault+0x8c/0x250 [ 30.410734] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 30.411521] kunit_try_run_case+0x14c/0x3d0 [ 30.412230] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.413027] kthread+0x24c/0x2d0 [ 30.413572] ret_from_fork+0x10/0x20 [ 30.414219] [ 30.414599] Allocated by task 269: [ 30.415184] kasan_save_stack+0x3c/0x68 [ 30.415795] kasan_save_track+0x20/0x40 [ 30.416393] kasan_save_alloc_info+0x40/0x58 [ 30.416938] __kasan_kmalloc+0xd4/0xd8 [ 30.417588] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.418254] copy_to_kernel_nofault_oob+0xc8/0x418 [ 30.418903] kunit_try_run_case+0x14c/0x3d0 [ 30.419646] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.420312] kthread+0x24c/0x2d0 [ 30.420997] ret_from_fork+0x10/0x20 [ 30.421450] [ 30.421815] The buggy address belongs to the object at fff00000c1313000 [ 30.421815] which belongs to the cache kmalloc-128 of size 128 [ 30.423470] The buggy address is located 0 bytes to the right of [ 30.423470] allocated 120-byte region [fff00000c1313000, fff00000c1313078) [ 30.424970] [ 30.425635] The buggy address belongs to the physical page: [ 30.426479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101313 [ 30.427559] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.428439] page_type: f5(slab) [ 30.428936] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.429834] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.430652] page dumped because: kasan: bad access detected [ 30.431304] [ 30.431623] Memory state around the buggy address: [ 30.432364] fff00000c1312f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.433241] fff00000c1312f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.434116] >fff00000c1313000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.435113] ^ [ 30.436011] fff00000c1313080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.436827] fff00000c1313100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.437578] ================================================================== [ 30.356946] ================================================================== [ 30.358446] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 30.359296] Read of size 8 at addr fff00000c1313078 by task kunit_try_catch/269 [ 30.360062] [ 30.360410] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.362631] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.363751] Hardware name: linux,dummy-virt (DT) [ 30.364632] Call trace: [ 30.365277] show_stack+0x20/0x38 (C) [ 30.365930] dump_stack_lvl+0x8c/0xd0 [ 30.366612] print_report+0x118/0x5e0 [ 30.367613] kasan_report+0xc8/0x118 [ 30.368106] __asan_report_load8_noabort+0x20/0x30 [ 30.368776] copy_to_kernel_nofault+0x204/0x250 [ 30.369486] copy_to_kernel_nofault_oob+0x158/0x418 [ 30.370198] kunit_try_run_case+0x14c/0x3d0 [ 30.371152] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.371861] kthread+0x24c/0x2d0 [ 30.372433] ret_from_fork+0x10/0x20 [ 30.373023] [ 30.373393] Allocated by task 269: [ 30.373908] kasan_save_stack+0x3c/0x68 [ 30.374730] kasan_save_track+0x20/0x40 [ 30.375315] kasan_save_alloc_info+0x40/0x58 [ 30.376030] __kasan_kmalloc+0xd4/0xd8 [ 30.376696] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.377359] copy_to_kernel_nofault_oob+0xc8/0x418 [ 30.378117] kunit_try_run_case+0x14c/0x3d0 [ 30.378775] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.379597] kthread+0x24c/0x2d0 [ 30.380052] ret_from_fork+0x10/0x20 [ 30.380722] [ 30.381100] The buggy address belongs to the object at fff00000c1313000 [ 30.381100] which belongs to the cache kmalloc-128 of size 128 [ 30.382465] The buggy address is located 0 bytes to the right of [ 30.382465] allocated 120-byte region [fff00000c1313000, fff00000c1313078) [ 30.384379] [ 30.384618] The buggy address belongs to the physical page: [ 30.385965] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101313 [ 30.386750] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.387536] page_type: f5(slab) [ 30.388366] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.389234] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.390185] page dumped because: kasan: bad access detected [ 30.390848] [ 30.391530] Memory state around the buggy address: [ 30.392294] fff00000c1312f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.393278] fff00000c1312f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.394210] >fff00000c1313000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.395368] ^ [ 30.396024] fff00000c1313080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.396900] fff00000c1313100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.397834] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 30.259818] ================================================================== [ 30.261048] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 30.261854] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/257 [ 30.262591] [ 30.262983] CPU: 1 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.264014] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.264563] Hardware name: linux,dummy-virt (DT) [ 30.265143] Call trace: [ 30.265543] show_stack+0x20/0x38 (C) [ 30.266092] dump_stack_lvl+0x8c/0xd0 [ 30.266689] print_report+0x2fc/0x5e0 [ 30.267304] kasan_report+0xc8/0x118 [ 30.267794] __asan_report_load1_noabort+0x20/0x30 [ 30.268514] vmalloc_oob+0x578/0x5d0 [ 30.269188] kunit_try_run_case+0x14c/0x3d0 [ 30.270104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.270947] kthread+0x24c/0x2d0 [ 30.271541] ret_from_fork+0x10/0x20 [ 30.272125] [ 30.272735] The buggy address belongs to the virtual mapping at [ 30.272735] [ffff80008010b000, ffff80008010d000) created by: [ 30.272735] vmalloc_oob+0x98/0x5d0 [ 30.274108] [ 30.274448] The buggy address belongs to the physical page: [ 30.275217] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101306 [ 30.276546] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.277338] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 30.278176] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.279038] page dumped because: kasan: bad access detected [ 30.279902] [ 30.280140] Memory state around the buggy address: [ 30.280796] ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.281789] ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.282669] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 30.283855] ^ [ 30.284211] ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 30.284540] ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 30.285382] ================================================================== [ 30.287127] ================================================================== [ 30.288459] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 30.289451] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/257 [ 30.290395] [ 30.290734] CPU: 1 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.291833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.292495] Hardware name: linux,dummy-virt (DT) [ 30.293220] Call trace: [ 30.293575] show_stack+0x20/0x38 (C) [ 30.294099] dump_stack_lvl+0x8c/0xd0 [ 30.294776] print_report+0x2fc/0x5e0 [ 30.295401] kasan_report+0xc8/0x118 [ 30.295942] __asan_report_load1_noabort+0x20/0x30 [ 30.296574] vmalloc_oob+0x51c/0x5d0 [ 30.297142] kunit_try_run_case+0x14c/0x3d0 [ 30.297799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.298436] kthread+0x24c/0x2d0 [ 30.299100] ret_from_fork+0x10/0x20 [ 30.299666] [ 30.300076] The buggy address belongs to the virtual mapping at [ 30.300076] [ffff80008010b000, ffff80008010d000) created by: [ 30.300076] vmalloc_oob+0x98/0x5d0 [ 30.302523] [ 30.302945] The buggy address belongs to the physical page: [ 30.303599] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101306 [ 30.304505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.305688] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 30.306648] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.307953] page dumped because: kasan: bad access detected [ 30.308908] [ 30.309229] Memory state around the buggy address: [ 30.310054] ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.310912] ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.312128] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 30.312460] ^ [ 30.313423] ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 30.314216] ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 30.315074] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 28.813001] ================================================================== [ 28.814322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 28.815674] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.816732] [ 28.817036] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.818540] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.819056] Hardware name: linux,dummy-virt (DT) [ 28.819577] Call trace: [ 28.820125] show_stack+0x20/0x38 (C) [ 28.821000] dump_stack_lvl+0x8c/0xd0 [ 28.821560] print_report+0x118/0x5e0 [ 28.822119] kasan_report+0xc8/0x118 [ 28.822651] kasan_check_range+0x100/0x1a8 [ 28.823339] __kasan_check_write+0x20/0x30 [ 28.823934] kasan_atomics_helper+0xad4/0x4858 [ 28.824590] kasan_atomics+0x198/0x2e8 [ 28.825152] kunit_try_run_case+0x14c/0x3d0 [ 28.825770] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.826441] kthread+0x24c/0x2d0 [ 28.826978] ret_from_fork+0x10/0x20 [ 28.827560] [ 28.827902] Allocated by task 253: [ 28.828304] kasan_save_stack+0x3c/0x68 [ 28.828943] kasan_save_track+0x20/0x40 [ 28.829420] kasan_save_alloc_info+0x40/0x58 [ 28.830104] __kasan_kmalloc+0xd4/0xd8 [ 28.830618] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.831166] kasan_atomics+0xb8/0x2e8 [ 28.831795] kunit_try_run_case+0x14c/0x3d0 [ 28.832330] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.833074] kthread+0x24c/0x2d0 [ 28.833510] ret_from_fork+0x10/0x20 [ 28.834108] [ 28.834411] The buggy address belongs to the object at fff00000c12e8780 [ 28.834411] which belongs to the cache kmalloc-64 of size 64 [ 28.835720] The buggy address is located 0 bytes to the right of [ 28.835720] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.836907] [ 28.837274] The buggy address belongs to the physical page: [ 28.837955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.838893] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.839659] page_type: f5(slab) [ 28.840144] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.840927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.841840] page dumped because: kasan: bad access detected [ 28.842519] [ 28.842864] Memory state around the buggy address: [ 28.843447] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.844164] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.845097] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.845936] ^ [ 28.846517] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.847306] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.848100] ================================================================== [ 30.103719] ================================================================== [ 30.104333] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 30.105502] Read of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 30.106248] [ 30.106590] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.107833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.108345] Hardware name: linux,dummy-virt (DT) [ 30.108962] Call trace: [ 30.109388] show_stack+0x20/0x38 (C) [ 30.109929] dump_stack_lvl+0x8c/0xd0 [ 30.110584] print_report+0x118/0x5e0 [ 30.111192] kasan_report+0xc8/0x118 [ 30.111780] __asan_report_load8_noabort+0x20/0x30 [ 30.112457] kasan_atomics_helper+0x3e10/0x4858 [ 30.113099] kasan_atomics+0x198/0x2e8 [ 30.113621] kunit_try_run_case+0x14c/0x3d0 [ 30.114235] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.114850] kthread+0x24c/0x2d0 [ 30.115355] ret_from_fork+0x10/0x20 [ 30.115894] [ 30.116201] Allocated by task 253: [ 30.116774] kasan_save_stack+0x3c/0x68 [ 30.117372] kasan_save_track+0x20/0x40 [ 30.117919] kasan_save_alloc_info+0x40/0x58 [ 30.118475] __kasan_kmalloc+0xd4/0xd8 [ 30.119026] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.119655] kasan_atomics+0xb8/0x2e8 [ 30.120200] kunit_try_run_case+0x14c/0x3d0 [ 30.120866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.121468] kthread+0x24c/0x2d0 [ 30.122018] ret_from_fork+0x10/0x20 [ 30.122557] [ 30.122875] The buggy address belongs to the object at fff00000c12e8780 [ 30.122875] which belongs to the cache kmalloc-64 of size 64 [ 30.124121] The buggy address is located 0 bytes to the right of [ 30.124121] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 30.125439] [ 30.125763] The buggy address belongs to the physical page: [ 30.126446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 30.127391] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.128158] page_type: f5(slab) [ 30.128651] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.129504] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.130380] page dumped because: kasan: bad access detected [ 30.131031] [ 30.131347] Memory state around the buggy address: [ 30.131914] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.132645] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.133467] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.134252] ^ [ 30.134842] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.135581] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.136424] ================================================================== [ 30.173548] ================================================================== [ 30.174322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 30.175243] Read of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 30.176014] [ 30.176534] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.177783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.178291] Hardware name: linux,dummy-virt (DT) [ 30.178916] Call trace: [ 30.179340] show_stack+0x20/0x38 (C) [ 30.179902] dump_stack_lvl+0x8c/0xd0 [ 30.180433] print_report+0x118/0x5e0 [ 30.180981] kasan_report+0xc8/0x118 [ 30.181586] __asan_report_load8_noabort+0x20/0x30 [ 30.182194] kasan_atomics_helper+0x3e20/0x4858 [ 30.182869] kasan_atomics+0x198/0x2e8 [ 30.183448] kunit_try_run_case+0x14c/0x3d0 [ 30.184038] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.184728] kthread+0x24c/0x2d0 [ 30.185264] ret_from_fork+0x10/0x20 [ 30.185796] [ 30.186141] Allocated by task 253: [ 30.186645] kasan_save_stack+0x3c/0x68 [ 30.187202] kasan_save_track+0x20/0x40 [ 30.187776] kasan_save_alloc_info+0x40/0x58 [ 30.188333] __kasan_kmalloc+0xd4/0xd8 [ 30.188878] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.189617] kasan_atomics+0xb8/0x2e8 [ 30.190155] kunit_try_run_case+0x14c/0x3d0 [ 30.190846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.191443] kthread+0x24c/0x2d0 [ 30.192026] ret_from_fork+0x10/0x20 [ 30.192549] [ 30.192892] The buggy address belongs to the object at fff00000c12e8780 [ 30.192892] which belongs to the cache kmalloc-64 of size 64 [ 30.194090] The buggy address is located 0 bytes to the right of [ 30.194090] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 30.195350] [ 30.195743] The buggy address belongs to the physical page: [ 30.196317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 30.197257] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.198071] page_type: f5(slab) [ 30.198731] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.199683] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.200632] page dumped because: kasan: bad access detected [ 30.201291] [ 30.201596] Memory state around the buggy address: [ 30.202164] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.202948] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.203791] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.204554] ^ [ 30.205204] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.205992] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.206773] ================================================================== [ 29.715615] ================================================================== [ 29.716322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 29.717188] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.718249] [ 29.718593] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.719717] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.720235] Hardware name: linux,dummy-virt (DT) [ 29.720792] Call trace: [ 29.721239] show_stack+0x20/0x38 (C) [ 29.721833] dump_stack_lvl+0x8c/0xd0 [ 29.722474] print_report+0x118/0x5e0 [ 29.723020] kasan_report+0xc8/0x118 [ 29.723587] kasan_check_range+0x100/0x1a8 [ 29.724291] __kasan_check_write+0x20/0x30 [ 29.724889] kasan_atomics_helper+0x1384/0x4858 [ 29.725452] kasan_atomics+0x198/0x2e8 [ 29.726079] kunit_try_run_case+0x14c/0x3d0 [ 29.726654] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.727421] kthread+0x24c/0x2d0 [ 29.727986] ret_from_fork+0x10/0x20 [ 29.728544] [ 29.728875] Allocated by task 253: [ 29.729366] kasan_save_stack+0x3c/0x68 [ 29.729935] kasan_save_track+0x20/0x40 [ 29.730561] kasan_save_alloc_info+0x40/0x58 [ 29.731136] __kasan_kmalloc+0xd4/0xd8 [ 29.731724] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.732378] kasan_atomics+0xb8/0x2e8 [ 29.732975] kunit_try_run_case+0x14c/0x3d0 [ 29.733532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.734287] kthread+0x24c/0x2d0 [ 29.734832] ret_from_fork+0x10/0x20 [ 29.735364] [ 29.735713] The buggy address belongs to the object at fff00000c12e8780 [ 29.735713] which belongs to the cache kmalloc-64 of size 64 [ 29.736918] The buggy address is located 0 bytes to the right of [ 29.736918] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.738221] [ 29.738548] The buggy address belongs to the physical page: [ 29.739277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.740124] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.740887] page_type: f5(slab) [ 29.741413] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.742262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.743138] page dumped because: kasan: bad access detected [ 29.743788] [ 29.744123] Memory state around the buggy address: [ 29.744739] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.745777] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.746616] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.747585] ^ [ 29.748268] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.749168] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.749984] ================================================================== [ 27.888812] ================================================================== [ 27.890168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 27.891744] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 27.892639] [ 27.893110] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.894235] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.894864] Hardware name: linux,dummy-virt (DT) [ 27.895386] Call trace: [ 27.895812] show_stack+0x20/0x38 (C) [ 27.896391] dump_stack_lvl+0x8c/0xd0 [ 27.897106] print_report+0x118/0x5e0 [ 27.897691] kasan_report+0xc8/0x118 [ 27.898303] __asan_report_load4_noabort+0x20/0x30 [ 27.899067] kasan_atomics_helper+0x40a8/0x4858 [ 27.899719] kasan_atomics+0x198/0x2e8 [ 27.900372] kunit_try_run_case+0x14c/0x3d0 [ 27.901011] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.901783] kthread+0x24c/0x2d0 [ 27.902343] ret_from_fork+0x10/0x20 [ 27.903019] [ 27.903370] Allocated by task 253: [ 27.903873] kasan_save_stack+0x3c/0x68 [ 27.904568] kasan_save_track+0x20/0x40 [ 27.905189] kasan_save_alloc_info+0x40/0x58 [ 27.905851] __kasan_kmalloc+0xd4/0xd8 [ 27.906443] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.907440] kasan_atomics+0xb8/0x2e8 [ 27.908290] kunit_try_run_case+0x14c/0x3d0 [ 27.909341] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.910290] kthread+0x24c/0x2d0 [ 27.911007] ret_from_fork+0x10/0x20 [ 27.911503] [ 27.911822] The buggy address belongs to the object at fff00000c12e8780 [ 27.911822] which belongs to the cache kmalloc-64 of size 64 [ 27.913391] The buggy address is located 0 bytes to the right of [ 27.913391] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 27.914786] [ 27.915161] The buggy address belongs to the physical page: [ 27.915942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 27.916952] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.917754] page_type: f5(slab) [ 27.918292] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.919168] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.920233] page dumped because: kasan: bad access detected [ 27.920947] [ 27.921371] Memory state around the buggy address: [ 27.922029] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.922963] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.924157] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.924820] ^ [ 27.925501] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.926421] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.927300] ================================================================== [ 27.967254] ================================================================== [ 27.968057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 27.969017] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 27.969641] [ 27.969901] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.971846] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.972554] Hardware name: linux,dummy-virt (DT) [ 27.973165] Call trace: [ 27.973431] show_stack+0x20/0x38 (C) [ 27.973807] dump_stack_lvl+0x8c/0xd0 [ 27.974188] print_report+0x118/0x5e0 [ 27.974595] kasan_report+0xc8/0x118 [ 27.976158] kasan_check_range+0x100/0x1a8 [ 27.976845] __kasan_check_read+0x20/0x30 [ 27.977498] kasan_atomics_helper+0x1ec/0x4858 [ 27.978058] kasan_atomics+0x198/0x2e8 [ 27.978602] kunit_try_run_case+0x14c/0x3d0 [ 27.979576] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.980322] kthread+0x24c/0x2d0 [ 27.980987] ret_from_fork+0x10/0x20 [ 27.981589] [ 27.981969] Allocated by task 253: [ 27.982552] kasan_save_stack+0x3c/0x68 [ 27.983261] kasan_save_track+0x20/0x40 [ 27.983839] kasan_save_alloc_info+0x40/0x58 [ 27.984488] __kasan_kmalloc+0xd4/0xd8 [ 27.985174] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.985814] kasan_atomics+0xb8/0x2e8 [ 27.986446] kunit_try_run_case+0x14c/0x3d0 [ 27.987113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.987999] kthread+0x24c/0x2d0 [ 27.988632] ret_from_fork+0x10/0x20 [ 27.989111] [ 27.989450] The buggy address belongs to the object at fff00000c12e8780 [ 27.989450] which belongs to the cache kmalloc-64 of size 64 [ 27.990637] The buggy address is located 0 bytes to the right of [ 27.990637] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 27.992085] [ 27.992559] The buggy address belongs to the physical page: [ 27.993199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 27.995152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.995808] page_type: f5(slab) [ 27.996531] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.997520] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.998352] page dumped because: kasan: bad access detected [ 27.999040] [ 27.999353] Memory state around the buggy address: [ 27.999936] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.000785] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.001865] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.002615] ^ [ 28.003333] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.004281] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.005058] ================================================================== [ 28.521162] ================================================================== [ 28.521879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 28.523270] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.524845] [ 28.525221] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.526149] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.526381] Hardware name: linux,dummy-virt (DT) [ 28.526623] Call trace: [ 28.526958] show_stack+0x20/0x38 (C) [ 28.527658] dump_stack_lvl+0x8c/0xd0 [ 28.528256] print_report+0x118/0x5e0 [ 28.528811] kasan_report+0xc8/0x118 [ 28.529464] kasan_check_range+0x100/0x1a8 [ 28.530219] __kasan_check_write+0x20/0x30 [ 28.530828] kasan_atomics_helper+0x760/0x4858 [ 28.531519] kasan_atomics+0x198/0x2e8 [ 28.532105] kunit_try_run_case+0x14c/0x3d0 [ 28.532762] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.533615] kthread+0x24c/0x2d0 [ 28.534143] ret_from_fork+0x10/0x20 [ 28.534604] [ 28.535003] Allocated by task 253: [ 28.535533] kasan_save_stack+0x3c/0x68 [ 28.536257] kasan_save_track+0x20/0x40 [ 28.536828] kasan_save_alloc_info+0x40/0x58 [ 28.537560] __kasan_kmalloc+0xd4/0xd8 [ 28.538179] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.538778] kasan_atomics+0xb8/0x2e8 [ 28.539411] kunit_try_run_case+0x14c/0x3d0 [ 28.540050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.540907] kthread+0x24c/0x2d0 [ 28.541520] ret_from_fork+0x10/0x20 [ 28.542003] [ 28.542291] The buggy address belongs to the object at fff00000c12e8780 [ 28.542291] which belongs to the cache kmalloc-64 of size 64 [ 28.543499] The buggy address is located 0 bytes to the right of [ 28.543499] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.544823] [ 28.545184] The buggy address belongs to the physical page: [ 28.545830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.546743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.547451] page_type: f5(slab) [ 28.548009] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.548832] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.549665] page dumped because: kasan: bad access detected [ 28.550351] [ 28.550660] Memory state around the buggy address: [ 28.551250] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.551977] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.552734] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.553576] ^ [ 28.554190] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.554986] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.555815] ================================================================== [ 29.388404] ================================================================== [ 29.389140] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 29.390059] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.390807] [ 29.391228] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.392303] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.392961] Hardware name: linux,dummy-virt (DT) [ 29.393491] Call trace: [ 29.393991] show_stack+0x20/0x38 (C) [ 29.394599] dump_stack_lvl+0x8c/0xd0 [ 29.395165] print_report+0x118/0x5e0 [ 29.395673] kasan_report+0xc8/0x118 [ 29.396280] kasan_check_range+0x100/0x1a8 [ 29.396874] __kasan_check_write+0x20/0x30 [ 29.397460] kasan_atomics_helper+0xf88/0x4858 [ 29.398139] kasan_atomics+0x198/0x2e8 [ 29.398686] kunit_try_run_case+0x14c/0x3d0 [ 29.399263] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.400038] kthread+0x24c/0x2d0 [ 29.400571] ret_from_fork+0x10/0x20 [ 29.401147] [ 29.401499] Allocated by task 253: [ 29.401973] kasan_save_stack+0x3c/0x68 [ 29.402553] kasan_save_track+0x20/0x40 [ 29.403109] kasan_save_alloc_info+0x40/0x58 [ 29.403681] __kasan_kmalloc+0xd4/0xd8 [ 29.404277] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.404884] kasan_atomics+0xb8/0x2e8 [ 29.405385] kunit_try_run_case+0x14c/0x3d0 [ 29.405934] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.406672] kthread+0x24c/0x2d0 [ 29.407181] ret_from_fork+0x10/0x20 [ 29.407718] [ 29.408020] The buggy address belongs to the object at fff00000c12e8780 [ 29.408020] which belongs to the cache kmalloc-64 of size 64 [ 29.409244] The buggy address is located 0 bytes to the right of [ 29.409244] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.410564] [ 29.410884] The buggy address belongs to the physical page: [ 29.411532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.412361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.413145] page_type: f5(slab) [ 29.413578] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.414497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.415408] page dumped because: kasan: bad access detected [ 29.416042] [ 29.416345] Memory state around the buggy address: [ 29.417021] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.417790] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.418541] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.419336] ^ [ 29.419943] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.420798] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.421572] ================================================================== [ 29.529597] ================================================================== [ 29.530297] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 29.531092] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.531753] [ 29.532058] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.532554] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.533193] Hardware name: linux,dummy-virt (DT) [ 29.533970] Call trace: [ 29.534430] show_stack+0x20/0x38 (C) [ 29.535192] dump_stack_lvl+0x8c/0xd0 [ 29.535825] print_report+0x118/0x5e0 [ 29.536441] kasan_report+0xc8/0x118 [ 29.537066] kasan_check_range+0x100/0x1a8 [ 29.537712] __kasan_check_write+0x20/0x30 [ 29.538308] kasan_atomics_helper+0x1128/0x4858 [ 29.538940] kasan_atomics+0x198/0x2e8 [ 29.539574] kunit_try_run_case+0x14c/0x3d0 [ 29.540227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.540964] kthread+0x24c/0x2d0 [ 29.541526] ret_from_fork+0x10/0x20 [ 29.542113] [ 29.542469] Allocated by task 253: [ 29.542992] kasan_save_stack+0x3c/0x68 [ 29.543641] kasan_save_track+0x20/0x40 [ 29.544230] kasan_save_alloc_info+0x40/0x58 [ 29.544936] __kasan_kmalloc+0xd4/0xd8 [ 29.545527] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.546157] kasan_atomics+0xb8/0x2e8 [ 29.546737] kunit_try_run_case+0x14c/0x3d0 [ 29.547355] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.548134] kthread+0x24c/0x2d0 [ 29.548712] ret_from_fork+0x10/0x20 [ 29.549328] [ 29.549617] The buggy address belongs to the object at fff00000c12e8780 [ 29.549617] which belongs to the cache kmalloc-64 of size 64 [ 29.551213] The buggy address is located 0 bytes to the right of [ 29.551213] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.552512] [ 29.552982] The buggy address belongs to the physical page: [ 29.553784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.554691] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.555459] page_type: f5(slab) [ 29.555959] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.556927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.557828] page dumped because: kasan: bad access detected [ 29.558515] [ 29.558863] Memory state around the buggy address: [ 29.559535] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.560390] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.561234] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.562104] ^ [ 29.562749] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.563572] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.564354] ================================================================== [ 28.959688] ================================================================== [ 28.960343] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 28.961018] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.961859] [ 28.962111] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.962865] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.963246] Hardware name: linux,dummy-virt (DT) [ 28.963653] Call trace: [ 28.964067] show_stack+0x20/0x38 (C) [ 28.964823] dump_stack_lvl+0x8c/0xd0 [ 28.965469] print_report+0x118/0x5e0 [ 28.966155] kasan_report+0xc8/0x118 [ 28.966893] kasan_check_range+0x100/0x1a8 [ 28.967464] __kasan_check_write+0x20/0x30 [ 28.967978] kasan_atomics_helper+0xc08/0x4858 [ 28.968539] kasan_atomics+0x198/0x2e8 [ 28.969313] kunit_try_run_case+0x14c/0x3d0 [ 28.970074] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.970947] kthread+0x24c/0x2d0 [ 28.971560] ret_from_fork+0x10/0x20 [ 28.972222] [ 28.972625] Allocated by task 253: [ 28.973229] kasan_save_stack+0x3c/0x68 [ 28.973851] kasan_save_track+0x20/0x40 [ 28.974467] kasan_save_alloc_info+0x40/0x58 [ 28.975097] __kasan_kmalloc+0xd4/0xd8 [ 28.975768] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.976540] kasan_atomics+0xb8/0x2e8 [ 28.977316] kunit_try_run_case+0x14c/0x3d0 [ 28.977919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.978577] kthread+0x24c/0x2d0 [ 28.979184] ret_from_fork+0x10/0x20 [ 28.979825] [ 28.980163] The buggy address belongs to the object at fff00000c12e8780 [ 28.980163] which belongs to the cache kmalloc-64 of size 64 [ 28.981447] The buggy address is located 0 bytes to the right of [ 28.981447] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.982855] [ 28.983226] The buggy address belongs to the physical page: [ 28.983944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.984869] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.985725] page_type: f5(slab) [ 28.986274] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.987190] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.988073] page dumped because: kasan: bad access detected [ 28.988728] [ 28.989146] Memory state around the buggy address: [ 28.989788] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.990534] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.991409] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.992218] ^ [ 28.992884] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.993625] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.994534] ================================================================== [ 29.177250] ================================================================== [ 29.177911] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 29.178672] Read of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.179445] [ 29.179843] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.180938] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.181543] Hardware name: linux,dummy-virt (DT) [ 29.182055] Call trace: [ 29.182531] show_stack+0x20/0x38 (C) [ 29.183080] dump_stack_lvl+0x8c/0xd0 [ 29.183640] print_report+0x118/0x5e0 [ 29.184254] kasan_report+0xc8/0x118 [ 29.184816] kasan_check_range+0x100/0x1a8 [ 29.185475] __kasan_check_read+0x20/0x30 [ 29.186078] kasan_atomics_helper+0xdd4/0x4858 [ 29.186712] kasan_atomics+0x198/0x2e8 [ 29.187278] kunit_try_run_case+0x14c/0x3d0 [ 29.187929] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.188663] kthread+0x24c/0x2d0 [ 29.189188] ret_from_fork+0x10/0x20 [ 29.189850] [ 29.190177] Allocated by task 253: [ 29.190741] kasan_save_stack+0x3c/0x68 [ 29.191353] kasan_save_track+0x20/0x40 [ 29.191884] kasan_save_alloc_info+0x40/0x58 [ 29.192478] __kasan_kmalloc+0xd4/0xd8 [ 29.193088] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.193715] kasan_atomics+0xb8/0x2e8 [ 29.194267] kunit_try_run_case+0x14c/0x3d0 [ 29.194845] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.195509] kthread+0x24c/0x2d0 [ 29.196013] ret_from_fork+0x10/0x20 [ 29.196521] [ 29.196849] The buggy address belongs to the object at fff00000c12e8780 [ 29.196849] which belongs to the cache kmalloc-64 of size 64 [ 29.198040] The buggy address is located 0 bytes to the right of [ 29.198040] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.199328] [ 29.199649] The buggy address belongs to the physical page: [ 29.200256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.201121] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.201946] page_type: f5(slab) [ 29.202413] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.203233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.204021] page dumped because: kasan: bad access detected [ 29.204736] [ 29.205052] Memory state around the buggy address: [ 29.205618] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.206393] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.207171] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.207962] ^ [ 29.208556] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.209358] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.210118] ================================================================== [ 29.962054] ================================================================== [ 29.963262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 29.964116] Read of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.964932] [ 29.965291] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.966490] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.967026] Hardware name: linux,dummy-virt (DT) [ 29.967278] Call trace: [ 29.967444] show_stack+0x20/0x38 (C) [ 29.967682] dump_stack_lvl+0x8c/0xd0 [ 29.968257] print_report+0x118/0x5e0 [ 29.968891] kasan_report+0xc8/0x118 [ 29.969491] __asan_report_load8_noabort+0x20/0x30 [ 29.970163] kasan_atomics_helper+0x3db0/0x4858 [ 29.970962] kasan_atomics+0x198/0x2e8 [ 29.971639] kunit_try_run_case+0x14c/0x3d0 [ 29.972344] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.973114] kthread+0x24c/0x2d0 [ 29.973673] ret_from_fork+0x10/0x20 [ 29.974261] [ 29.974603] Allocated by task 253: [ 29.975152] kasan_save_stack+0x3c/0x68 [ 29.975772] kasan_save_track+0x20/0x40 [ 29.976368] kasan_save_alloc_info+0x40/0x58 [ 29.977004] __kasan_kmalloc+0xd4/0xd8 [ 29.977582] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.978222] kasan_atomics+0xb8/0x2e8 [ 29.978808] kunit_try_run_case+0x14c/0x3d0 [ 29.979430] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.980142] kthread+0x24c/0x2d0 [ 29.980677] ret_from_fork+0x10/0x20 [ 29.981281] [ 29.981625] The buggy address belongs to the object at fff00000c12e8780 [ 29.981625] which belongs to the cache kmalloc-64 of size 64 [ 29.982944] The buggy address is located 0 bytes to the right of [ 29.982944] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.984328] [ 29.984738] The buggy address belongs to the physical page: [ 29.985385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.986397] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.987277] page_type: f5(slab) [ 29.987819] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.988744] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.989606] page dumped because: kasan: bad access detected [ 29.990281] [ 29.990632] Memory state around the buggy address: [ 29.991301] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.992159] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.992983] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.993792] ^ [ 29.994403] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.995255] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.996055] ================================================================== [ 30.068427] ================================================================== [ 30.069099] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 30.069863] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 30.070583] [ 30.071009] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.072130] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.072759] Hardware name: linux,dummy-virt (DT) [ 30.073295] Call trace: [ 30.073695] show_stack+0x20/0x38 (C) [ 30.074295] dump_stack_lvl+0x8c/0xd0 [ 30.074939] print_report+0x118/0x5e0 [ 30.075542] kasan_report+0xc8/0x118 [ 30.076104] kasan_check_range+0x100/0x1a8 [ 30.076695] __kasan_check_write+0x20/0x30 [ 30.077282] kasan_atomics_helper+0x16d0/0x4858 [ 30.077901] kasan_atomics+0x198/0x2e8 [ 30.078519] kunit_try_run_case+0x14c/0x3d0 [ 30.079147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.079825] kthread+0x24c/0x2d0 [ 30.080401] ret_from_fork+0x10/0x20 [ 30.081006] [ 30.081309] Allocated by task 253: [ 30.082098] kasan_save_stack+0x3c/0x68 [ 30.082657] kasan_save_track+0x20/0x40 [ 30.083183] kasan_save_alloc_info+0x40/0x58 [ 30.083798] __kasan_kmalloc+0xd4/0xd8 [ 30.084337] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.084988] kasan_atomics+0xb8/0x2e8 [ 30.085491] kunit_try_run_case+0x14c/0x3d0 [ 30.086123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.086856] kthread+0x24c/0x2d0 [ 30.087389] ret_from_fork+0x10/0x20 [ 30.087905] [ 30.088220] The buggy address belongs to the object at fff00000c12e8780 [ 30.088220] which belongs to the cache kmalloc-64 of size 64 [ 30.089448] The buggy address is located 0 bytes to the right of [ 30.089448] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 30.090733] [ 30.091051] The buggy address belongs to the physical page: [ 30.091661] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 30.092521] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.093262] page_type: f5(slab) [ 30.093784] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.094618] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.095509] page dumped because: kasan: bad access detected [ 30.096121] [ 30.096455] Memory state around the buggy address: [ 30.097048] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.097810] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.098625] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.099411] ^ [ 30.100018] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.100853] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.101614] ================================================================== [ 28.340078] ================================================================== [ 28.340847] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 28.341518] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.342402] [ 28.342763] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.343851] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.344330] Hardware name: linux,dummy-virt (DT) [ 28.345025] Call trace: [ 28.345418] show_stack+0x20/0x38 (C) [ 28.346005] dump_stack_lvl+0x8c/0xd0 [ 28.346502] print_report+0x118/0x5e0 [ 28.347113] kasan_report+0xc8/0x118 [ 28.347800] kasan_check_range+0x100/0x1a8 [ 28.348391] __kasan_check_write+0x20/0x30 [ 28.348991] kasan_atomics_helper+0x54c/0x4858 [ 28.349561] kasan_atomics+0x198/0x2e8 [ 28.350250] kunit_try_run_case+0x14c/0x3d0 [ 28.350882] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.351655] kthread+0x24c/0x2d0 [ 28.352219] ret_from_fork+0x10/0x20 [ 28.352838] [ 28.353163] Allocated by task 253: [ 28.353684] kasan_save_stack+0x3c/0x68 [ 28.354293] kasan_save_track+0x20/0x40 [ 28.354813] kasan_save_alloc_info+0x40/0x58 [ 28.355410] __kasan_kmalloc+0xd4/0xd8 [ 28.355994] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.356600] kasan_atomics+0xb8/0x2e8 [ 28.357199] kunit_try_run_case+0x14c/0x3d0 [ 28.357795] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.358524] kthread+0x24c/0x2d0 [ 28.359066] ret_from_fork+0x10/0x20 [ 28.359608] [ 28.359959] The buggy address belongs to the object at fff00000c12e8780 [ 28.359959] which belongs to the cache kmalloc-64 of size 64 [ 28.361233] The buggy address is located 0 bytes to the right of [ 28.361233] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.362469] [ 28.362809] The buggy address belongs to the physical page: [ 28.363466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.364299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.365047] page_type: f5(slab) [ 28.365588] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.366405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.367252] page dumped because: kasan: bad access detected [ 28.367930] [ 28.368242] Memory state around the buggy address: [ 28.368841] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.369574] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.370344] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.371115] ^ [ 28.371742] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.372526] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.373332] ================================================================== [ 28.672354] ================================================================== [ 28.673129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 28.673937] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.674732] [ 28.675078] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.676192] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.676789] Hardware name: linux,dummy-virt (DT) [ 28.677333] Call trace: [ 28.677767] show_stack+0x20/0x38 (C) [ 28.678342] dump_stack_lvl+0x8c/0xd0 [ 28.678940] print_report+0x118/0x5e0 [ 28.679444] kasan_report+0xc8/0x118 [ 28.680059] kasan_check_range+0x100/0x1a8 [ 28.680643] __kasan_check_write+0x20/0x30 [ 28.681249] kasan_atomics_helper+0x934/0x4858 [ 28.681843] kasan_atomics+0x198/0x2e8 [ 28.682470] kunit_try_run_case+0x14c/0x3d0 [ 28.683026] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.683827] kthread+0x24c/0x2d0 [ 28.684393] ret_from_fork+0x10/0x20 [ 28.684944] [ 28.685260] Allocated by task 253: [ 28.685678] kasan_save_stack+0x3c/0x68 [ 28.686258] kasan_save_track+0x20/0x40 [ 28.686833] kasan_save_alloc_info+0x40/0x58 [ 28.687389] __kasan_kmalloc+0xd4/0xd8 [ 28.688011] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.688581] kasan_atomics+0xb8/0x2e8 [ 28.689160] kunit_try_run_case+0x14c/0x3d0 [ 28.689750] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.690406] kthread+0x24c/0x2d0 [ 28.690948] ret_from_fork+0x10/0x20 [ 28.691462] [ 28.691773] The buggy address belongs to the object at fff00000c12e8780 [ 28.691773] which belongs to the cache kmalloc-64 of size 64 [ 28.693005] The buggy address is located 0 bytes to the right of [ 28.693005] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.694294] [ 28.694654] The buggy address belongs to the physical page: [ 28.695277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.696196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.696938] page_type: f5(slab) [ 28.697524] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.698307] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.699140] page dumped because: kasan: bad access detected [ 28.699819] [ 28.700163] Memory state around the buggy address: [ 28.700782] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.701537] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.702345] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.703161] ^ [ 28.703795] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.704596] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.705414] ================================================================== [ 28.196141] ================================================================== [ 28.196770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 28.197658] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.198485] [ 28.198844] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.199963] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.200500] Hardware name: linux,dummy-virt (DT) [ 28.201197] Call trace: [ 28.201582] show_stack+0x20/0x38 (C) [ 28.202205] dump_stack_lvl+0x8c/0xd0 [ 28.202820] print_report+0x118/0x5e0 [ 28.203373] kasan_report+0xc8/0x118 [ 28.204035] kasan_check_range+0x100/0x1a8 [ 28.204683] __kasan_check_write+0x20/0x30 [ 28.205291] kasan_atomics_helper+0x3ac/0x4858 [ 28.205907] kasan_atomics+0x198/0x2e8 [ 28.206509] kunit_try_run_case+0x14c/0x3d0 [ 28.207142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.207893] kthread+0x24c/0x2d0 [ 28.208457] ret_from_fork+0x10/0x20 [ 28.209017] [ 28.209327] Allocated by task 253: [ 28.209880] kasan_save_stack+0x3c/0x68 [ 28.210417] kasan_save_track+0x20/0x40 [ 28.211002] kasan_save_alloc_info+0x40/0x58 [ 28.211583] __kasan_kmalloc+0xd4/0xd8 [ 28.212102] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.212764] kasan_atomics+0xb8/0x2e8 [ 28.213276] kunit_try_run_case+0x14c/0x3d0 [ 28.213881] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.214537] kthread+0x24c/0x2d0 [ 28.215040] ret_from_fork+0x10/0x20 [ 28.215536] [ 28.215928] The buggy address belongs to the object at fff00000c12e8780 [ 28.215928] which belongs to the cache kmalloc-64 of size 64 [ 28.217133] The buggy address is located 0 bytes to the right of [ 28.217133] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.218427] [ 28.218766] The buggy address belongs to the physical page: [ 28.219372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.220323] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.221070] page_type: f5(slab) [ 28.221580] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.222419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.223329] page dumped because: kasan: bad access detected [ 28.223946] [ 28.224302] Memory state around the buggy address: [ 28.224924] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.225824] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.226535] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.227384] ^ [ 28.227993] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.228818] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.229592] ================================================================== [ 28.230928] ================================================================== [ 28.231800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 28.232596] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.233388] [ 28.233761] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.234771] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.235271] Hardware name: linux,dummy-virt (DT) [ 28.235861] Call trace: [ 28.236339] show_stack+0x20/0x38 (C) [ 28.236970] dump_stack_lvl+0x8c/0xd0 [ 28.237482] print_report+0x118/0x5e0 [ 28.238130] kasan_report+0xc8/0x118 [ 28.238658] kasan_check_range+0x100/0x1a8 [ 28.239329] __kasan_check_write+0x20/0x30 [ 28.239923] kasan_atomics_helper+0x414/0x4858 [ 28.240558] kasan_atomics+0x198/0x2e8 [ 28.241117] kunit_try_run_case+0x14c/0x3d0 [ 28.241795] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.242530] kthread+0x24c/0x2d0 [ 28.243120] ret_from_fork+0x10/0x20 [ 28.243688] [ 28.244040] Allocated by task 253: [ 28.244487] kasan_save_stack+0x3c/0x68 [ 28.245062] kasan_save_track+0x20/0x40 [ 28.245626] kasan_save_alloc_info+0x40/0x58 [ 28.246203] __kasan_kmalloc+0xd4/0xd8 [ 28.246750] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.247342] kasan_atomics+0xb8/0x2e8 [ 28.247875] kunit_try_run_case+0x14c/0x3d0 [ 28.248435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.249140] kthread+0x24c/0x2d0 [ 28.249628] ret_from_fork+0x10/0x20 [ 28.250138] [ 28.250448] The buggy address belongs to the object at fff00000c12e8780 [ 28.250448] which belongs to the cache kmalloc-64 of size 64 [ 28.251695] The buggy address is located 0 bytes to the right of [ 28.251695] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.252974] [ 28.253326] The buggy address belongs to the physical page: [ 28.253936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.254780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.255488] page_type: f5(slab) [ 28.255997] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.256821] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.257643] page dumped because: kasan: bad access detected [ 28.258328] [ 28.258652] Memory state around the buggy address: [ 28.259237] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.260006] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.260824] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.261647] ^ [ 28.262279] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.263035] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.263833] ================================================================== [ 29.352046] ================================================================== [ 29.353552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 29.354390] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.355666] [ 29.356151] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.357332] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.357993] Hardware name: linux,dummy-virt (DT) [ 29.358568] Call trace: [ 29.359131] show_stack+0x20/0x38 (C) [ 29.359608] dump_stack_lvl+0x8c/0xd0 [ 29.360152] print_report+0x118/0x5e0 [ 29.360785] kasan_report+0xc8/0x118 [ 29.361403] kasan_check_range+0x100/0x1a8 [ 29.362037] __kasan_check_write+0x20/0x30 [ 29.362621] kasan_atomics_helper+0xf20/0x4858 [ 29.363276] kasan_atomics+0x198/0x2e8 [ 29.363890] kunit_try_run_case+0x14c/0x3d0 [ 29.364442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.365241] kthread+0x24c/0x2d0 [ 29.365759] ret_from_fork+0x10/0x20 [ 29.366368] [ 29.366721] Allocated by task 253: [ 29.367164] kasan_save_stack+0x3c/0x68 [ 29.367744] kasan_save_track+0x20/0x40 [ 29.368300] kasan_save_alloc_info+0x40/0x58 [ 29.368874] __kasan_kmalloc+0xd4/0xd8 [ 29.369399] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.369986] kasan_atomics+0xb8/0x2e8 [ 29.370516] kunit_try_run_case+0x14c/0x3d0 [ 29.371112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.371791] kthread+0x24c/0x2d0 [ 29.372257] ret_from_fork+0x10/0x20 [ 29.372819] [ 29.373146] The buggy address belongs to the object at fff00000c12e8780 [ 29.373146] which belongs to the cache kmalloc-64 of size 64 [ 29.374403] The buggy address is located 0 bytes to the right of [ 29.374403] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.375623] [ 29.375970] The buggy address belongs to the physical page: [ 29.376655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.377458] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.378288] page_type: f5(slab) [ 29.378812] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.379639] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.380555] page dumped because: kasan: bad access detected [ 29.381232] [ 29.381539] Memory state around the buggy address: [ 29.382054] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.382865] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.383659] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.384503] ^ [ 29.385106] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.385916] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.386689] ================================================================== [ 29.565902] ================================================================== [ 29.566539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 29.567547] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.568600] [ 29.568945] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.570574] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.571319] Hardware name: linux,dummy-virt (DT) [ 29.571888] Call trace: [ 29.572352] show_stack+0x20/0x38 (C) [ 29.573044] dump_stack_lvl+0x8c/0xd0 [ 29.573712] print_report+0x118/0x5e0 [ 29.574277] kasan_report+0xc8/0x118 [ 29.574936] kasan_check_range+0x100/0x1a8 [ 29.575589] __kasan_check_write+0x20/0x30 [ 29.576224] kasan_atomics_helper+0x1190/0x4858 [ 29.576898] kasan_atomics+0x198/0x2e8 [ 29.577484] kunit_try_run_case+0x14c/0x3d0 [ 29.578143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.578979] kthread+0x24c/0x2d0 [ 29.579565] ret_from_fork+0x10/0x20 [ 29.580185] [ 29.580565] Allocated by task 253: [ 29.581131] kasan_save_stack+0x3c/0x68 [ 29.581836] kasan_save_track+0x20/0x40 [ 29.582384] kasan_save_alloc_info+0x40/0x58 [ 29.583059] __kasan_kmalloc+0xd4/0xd8 [ 29.583625] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.584272] kasan_atomics+0xb8/0x2e8 [ 29.584870] kunit_try_run_case+0x14c/0x3d0 [ 29.585485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.586207] kthread+0x24c/0x2d0 [ 29.586753] ret_from_fork+0x10/0x20 [ 29.587310] [ 29.587638] The buggy address belongs to the object at fff00000c12e8780 [ 29.587638] which belongs to the cache kmalloc-64 of size 64 [ 29.589003] The buggy address is located 0 bytes to the right of [ 29.589003] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.590345] [ 29.590659] The buggy address belongs to the physical page: [ 29.591318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.592290] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.593097] page_type: f5(slab) [ 29.593631] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.594512] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.595407] page dumped because: kasan: bad access detected [ 29.596144] [ 29.596505] Memory state around the buggy address: [ 29.597152] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.598061] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.598903] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.599723] ^ [ 29.600329] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.601183] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.601995] ================================================================== [ 29.105885] ================================================================== [ 29.106612] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 29.107547] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.108327] [ 29.108732] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.109880] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.110440] Hardware name: linux,dummy-virt (DT) [ 29.111089] Call trace: [ 29.111481] show_stack+0x20/0x38 (C) [ 29.112110] dump_stack_lvl+0x8c/0xd0 [ 29.112663] print_report+0x118/0x5e0 [ 29.113225] kasan_report+0xc8/0x118 [ 29.113804] kasan_check_range+0x100/0x1a8 [ 29.114443] __kasan_check_write+0x20/0x30 [ 29.115077] kasan_atomics_helper+0xd3c/0x4858 [ 29.115743] kasan_atomics+0x198/0x2e8 [ 29.116280] kunit_try_run_case+0x14c/0x3d0 [ 29.116927] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.117586] kthread+0x24c/0x2d0 [ 29.118215] ret_from_fork+0x10/0x20 [ 29.118778] [ 29.119143] Allocated by task 253: [ 29.119642] kasan_save_stack+0x3c/0x68 [ 29.120494] kasan_save_track+0x20/0x40 [ 29.121017] kasan_save_alloc_info+0x40/0x58 [ 29.121598] __kasan_kmalloc+0xd4/0xd8 [ 29.122294] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.122862] kasan_atomics+0xb8/0x2e8 [ 29.123384] kunit_try_run_case+0x14c/0x3d0 [ 29.123949] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.124658] kthread+0x24c/0x2d0 [ 29.125224] ret_from_fork+0x10/0x20 [ 29.125760] [ 29.126141] The buggy address belongs to the object at fff00000c12e8780 [ 29.126141] which belongs to the cache kmalloc-64 of size 64 [ 29.127368] The buggy address is located 0 bytes to the right of [ 29.127368] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.128629] [ 29.128987] The buggy address belongs to the physical page: [ 29.129664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.130544] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.131311] page_type: f5(slab) [ 29.131834] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.132648] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.133515] page dumped because: kasan: bad access detected [ 29.134146] [ 29.134477] Memory state around the buggy address: [ 29.135139] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.135931] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.136785] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.137554] ^ [ 29.138182] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.138964] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.139738] ================================================================== [ 29.142365] ================================================================== [ 29.143180] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 29.143857] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.144508] [ 29.145160] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.146886] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.147554] Hardware name: linux,dummy-virt (DT) [ 29.148374] Call trace: [ 29.148910] show_stack+0x20/0x38 (C) [ 29.149409] dump_stack_lvl+0x8c/0xd0 [ 29.149912] print_report+0x118/0x5e0 [ 29.150389] kasan_report+0xc8/0x118 [ 29.150998] __asan_report_load4_noabort+0x20/0x30 [ 29.151659] kasan_atomics_helper+0x3e04/0x4858 [ 29.152377] kasan_atomics+0x198/0x2e8 [ 29.152990] kunit_try_run_case+0x14c/0x3d0 [ 29.153613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.154264] kthread+0x24c/0x2d0 [ 29.154864] ret_from_fork+0x10/0x20 [ 29.155419] [ 29.155788] Allocated by task 253: [ 29.156253] kasan_save_stack+0x3c/0x68 [ 29.156846] kasan_save_track+0x20/0x40 [ 29.157419] kasan_save_alloc_info+0x40/0x58 [ 29.157982] __kasan_kmalloc+0xd4/0xd8 [ 29.158592] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.159177] kasan_atomics+0xb8/0x2e8 [ 29.159807] kunit_try_run_case+0x14c/0x3d0 [ 29.160376] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.161085] kthread+0x24c/0x2d0 [ 29.161573] ret_from_fork+0x10/0x20 [ 29.162048] [ 29.162406] The buggy address belongs to the object at fff00000c12e8780 [ 29.162406] which belongs to the cache kmalloc-64 of size 64 [ 29.163634] The buggy address is located 0 bytes to the right of [ 29.163634] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.164916] [ 29.165240] The buggy address belongs to the physical page: [ 29.165930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.166805] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.167555] page_type: f5(slab) [ 29.168016] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.168904] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.169741] page dumped because: kasan: bad access detected [ 29.170357] [ 29.170708] Memory state around the buggy address: [ 29.171289] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.172029] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.172796] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.173647] ^ [ 29.174253] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.175057] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.175840] ================================================================== [ 29.493352] ================================================================== [ 29.494326] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 29.496002] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.496937] [ 29.497361] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.498372] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.499099] Hardware name: linux,dummy-virt (DT) [ 29.499802] Call trace: [ 29.500295] show_stack+0x20/0x38 (C) [ 29.500956] dump_stack_lvl+0x8c/0xd0 [ 29.501607] print_report+0x118/0x5e0 [ 29.502186] kasan_report+0xc8/0x118 [ 29.502740] kasan_check_range+0x100/0x1a8 [ 29.503325] __kasan_check_write+0x20/0x30 [ 29.503882] kasan_atomics_helper+0x10c0/0x4858 [ 29.504568] kasan_atomics+0x198/0x2e8 [ 29.505161] kunit_try_run_case+0x14c/0x3d0 [ 29.505846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.506546] kthread+0x24c/0x2d0 [ 29.507105] ret_from_fork+0x10/0x20 [ 29.507723] [ 29.508038] Allocated by task 253: [ 29.508513] kasan_save_stack+0x3c/0x68 [ 29.509075] kasan_save_track+0x20/0x40 [ 29.509578] kasan_save_alloc_info+0x40/0x58 [ 29.510248] __kasan_kmalloc+0xd4/0xd8 [ 29.510833] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.511426] kasan_atomics+0xb8/0x2e8 [ 29.511975] kunit_try_run_case+0x14c/0x3d0 [ 29.512535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.513146] kthread+0x24c/0x2d0 [ 29.513680] ret_from_fork+0x10/0x20 [ 29.514377] [ 29.514676] The buggy address belongs to the object at fff00000c12e8780 [ 29.514676] which belongs to the cache kmalloc-64 of size 64 [ 29.515937] The buggy address is located 0 bytes to the right of [ 29.515937] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.517241] [ 29.517580] The buggy address belongs to the physical page: [ 29.518154] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.518981] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.519788] page_type: f5(slab) [ 29.520259] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.521184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.521974] page dumped because: kasan: bad access detected [ 29.522618] [ 29.522962] Memory state around the buggy address: [ 29.523559] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.524305] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.525115] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.525917] ^ [ 29.526559] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.527325] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.528103] ================================================================== [ 29.317335] ================================================================== [ 29.317959] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 29.318960] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.319765] [ 29.320110] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.321197] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.321673] Hardware name: linux,dummy-virt (DT) [ 29.322361] Call trace: [ 29.322757] show_stack+0x20/0x38 (C) [ 29.323279] dump_stack_lvl+0x8c/0xd0 [ 29.323876] print_report+0x118/0x5e0 [ 29.324524] kasan_report+0xc8/0x118 [ 29.325058] kasan_check_range+0x100/0x1a8 [ 29.325664] __kasan_check_write+0x20/0x30 [ 29.326362] kasan_atomics_helper+0xeb8/0x4858 [ 29.327018] kasan_atomics+0x198/0x2e8 [ 29.327563] kunit_try_run_case+0x14c/0x3d0 [ 29.328155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.328847] kthread+0x24c/0x2d0 [ 29.329438] ret_from_fork+0x10/0x20 [ 29.330039] [ 29.330327] Allocated by task 253: [ 29.330840] kasan_save_stack+0x3c/0x68 [ 29.331440] kasan_save_track+0x20/0x40 [ 29.332024] kasan_save_alloc_info+0x40/0x58 [ 29.332584] __kasan_kmalloc+0xd4/0xd8 [ 29.333174] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.333694] kasan_atomics+0xb8/0x2e8 [ 29.334329] kunit_try_run_case+0x14c/0x3d0 [ 29.334923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.335515] kthread+0x24c/0x2d0 [ 29.336077] ret_from_fork+0x10/0x20 [ 29.336629] [ 29.336947] The buggy address belongs to the object at fff00000c12e8780 [ 29.336947] which belongs to the cache kmalloc-64 of size 64 [ 29.338237] The buggy address is located 0 bytes to the right of [ 29.338237] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.339491] [ 29.339848] The buggy address belongs to the physical page: [ 29.340468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.341241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.342147] page_type: f5(slab) [ 29.342606] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.343542] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.344364] page dumped because: kasan: bad access detected [ 29.345029] [ 29.345348] Memory state around the buggy address: [ 29.345924] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.346733] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.347543] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.348283] ^ [ 29.348870] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.349725] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.350523] ================================================================== [ 29.603921] ================================================================== [ 29.604454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 29.605440] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.606258] [ 29.606637] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.607903] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.608517] Hardware name: linux,dummy-virt (DT) [ 29.609188] Call trace: [ 29.609635] show_stack+0x20/0x38 (C) [ 29.610197] dump_stack_lvl+0x8c/0xd0 [ 29.610932] print_report+0x118/0x5e0 [ 29.611499] kasan_report+0xc8/0x118 [ 29.612173] kasan_check_range+0x100/0x1a8 [ 29.612877] __kasan_check_write+0x20/0x30 [ 29.613514] kasan_atomics_helper+0x11f8/0x4858 [ 29.614199] kasan_atomics+0x198/0x2e8 [ 29.614803] kunit_try_run_case+0x14c/0x3d0 [ 29.615449] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.616188] kthread+0x24c/0x2d0 [ 29.616766] ret_from_fork+0x10/0x20 [ 29.617364] [ 29.617653] Allocated by task 253: [ 29.618189] kasan_save_stack+0x3c/0x68 [ 29.618809] kasan_save_track+0x20/0x40 [ 29.619433] kasan_save_alloc_info+0x40/0x58 [ 29.620088] __kasan_kmalloc+0xd4/0xd8 [ 29.620721] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.621634] kasan_atomics+0xb8/0x2e8 [ 29.622050] kunit_try_run_case+0x14c/0x3d0 [ 29.622839] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.624111] kthread+0x24c/0x2d0 [ 29.624780] ret_from_fork+0x10/0x20 [ 29.625493] [ 29.626493] The buggy address belongs to the object at fff00000c12e8780 [ 29.626493] which belongs to the cache kmalloc-64 of size 64 [ 29.628547] The buggy address is located 0 bytes to the right of [ 29.628547] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.629843] [ 29.630227] The buggy address belongs to the physical page: [ 29.630868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.631902] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.632679] page_type: f5(slab) [ 29.633223] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.634152] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.635015] page dumped because: kasan: bad access detected [ 29.635713] [ 29.636097] Memory state around the buggy address: [ 29.636746] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.637501] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.638397] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.639218] ^ [ 29.639856] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.640695] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.641496] ================================================================== [ 28.557256] ================================================================== [ 28.557985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 28.559014] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.559778] [ 28.560152] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.561204] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.561861] Hardware name: linux,dummy-virt (DT) [ 28.562727] Call trace: [ 28.563202] show_stack+0x20/0x38 (C) [ 28.563947] dump_stack_lvl+0x8c/0xd0 [ 28.564623] print_report+0x118/0x5e0 [ 28.565317] kasan_report+0xc8/0x118 [ 28.565970] kasan_check_range+0x100/0x1a8 [ 28.566635] __kasan_check_write+0x20/0x30 [ 28.567332] kasan_atomics_helper+0x7cc/0x4858 [ 28.568042] kasan_atomics+0x198/0x2e8 [ 28.568723] kunit_try_run_case+0x14c/0x3d0 [ 28.569485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.570292] kthread+0x24c/0x2d0 [ 28.570889] ret_from_fork+0x10/0x20 [ 28.571525] [ 28.571956] Allocated by task 253: [ 28.572512] kasan_save_stack+0x3c/0x68 [ 28.573173] kasan_save_track+0x20/0x40 [ 28.573835] kasan_save_alloc_info+0x40/0x58 [ 28.574519] __kasan_kmalloc+0xd4/0xd8 [ 28.575131] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.575813] kasan_atomics+0xb8/0x2e8 [ 28.576501] kunit_try_run_case+0x14c/0x3d0 [ 28.577194] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.577947] kthread+0x24c/0x2d0 [ 28.578528] ret_from_fork+0x10/0x20 [ 28.579139] [ 28.579516] The buggy address belongs to the object at fff00000c12e8780 [ 28.579516] which belongs to the cache kmalloc-64 of size 64 [ 28.580940] The buggy address is located 0 bytes to the right of [ 28.580940] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.582447] [ 28.582905] The buggy address belongs to the physical page: [ 28.583582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.584577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.585411] page_type: f5(slab) [ 28.586010] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.587158] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.588061] page dumped because: kasan: bad access detected [ 28.588828] [ 28.589265] Memory state around the buggy address: [ 28.589968] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.590902] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.591780] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.592589] ^ [ 28.593283] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.594152] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.594981] ================================================================== [ 29.643185] ================================================================== [ 29.644062] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 29.644795] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.645643] [ 29.645971] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.647496] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.648129] Hardware name: linux,dummy-virt (DT) [ 29.648580] Call trace: [ 29.649024] show_stack+0x20/0x38 (C) [ 29.649660] dump_stack_lvl+0x8c/0xd0 [ 29.650208] print_report+0x118/0x5e0 [ 29.650820] kasan_report+0xc8/0x118 [ 29.651386] kasan_check_range+0x100/0x1a8 [ 29.652025] __kasan_check_write+0x20/0x30 [ 29.652684] kasan_atomics_helper+0x126c/0x4858 [ 29.653393] kasan_atomics+0x198/0x2e8 [ 29.653932] kunit_try_run_case+0x14c/0x3d0 [ 29.654505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.655245] kthread+0x24c/0x2d0 [ 29.655843] ret_from_fork+0x10/0x20 [ 29.656398] [ 29.656783] Allocated by task 253: [ 29.657217] kasan_save_stack+0x3c/0x68 [ 29.657822] kasan_save_track+0x20/0x40 [ 29.658483] kasan_save_alloc_info+0x40/0x58 [ 29.659015] __kasan_kmalloc+0xd4/0xd8 [ 29.659630] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.660237] kasan_atomics+0xb8/0x2e8 [ 29.660778] kunit_try_run_case+0x14c/0x3d0 [ 29.661345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.662022] kthread+0x24c/0x2d0 [ 29.662491] ret_from_fork+0x10/0x20 [ 29.663066] [ 29.663370] The buggy address belongs to the object at fff00000c12e8780 [ 29.663370] which belongs to the cache kmalloc-64 of size 64 [ 29.664528] The buggy address is located 0 bytes to the right of [ 29.664528] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.666212] [ 29.666467] The buggy address belongs to the physical page: [ 29.666970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.667612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.668346] page_type: f5(slab) [ 29.669282] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.670283] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.670981] page dumped because: kasan: bad access detected [ 29.671634] [ 29.672089] Memory state around the buggy address: [ 29.672783] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.673725] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.674471] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.675396] ^ [ 29.675940] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.677090] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.678034] ================================================================== [ 28.046793] ================================================================== [ 28.047786] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 28.048862] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.049859] [ 28.050170] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.051558] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.052406] Hardware name: linux,dummy-virt (DT) [ 28.053088] Call trace: [ 28.053621] show_stack+0x20/0x38 (C) [ 28.054328] dump_stack_lvl+0x8c/0xd0 [ 28.055065] print_report+0x118/0x5e0 [ 28.055607] kasan_report+0xc8/0x118 [ 28.056240] kasan_check_range+0x100/0x1a8 [ 28.056981] __kasan_check_read+0x20/0x30 [ 28.057648] kasan_atomics_helper+0x2b0/0x4858 [ 28.058400] kasan_atomics+0x198/0x2e8 [ 28.059109] kunit_try_run_case+0x14c/0x3d0 [ 28.059807] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.060547] kthread+0x24c/0x2d0 [ 28.061138] ret_from_fork+0x10/0x20 [ 28.061765] [ 28.062092] Allocated by task 253: [ 28.062596] kasan_save_stack+0x3c/0x68 [ 28.063312] kasan_save_track+0x20/0x40 [ 28.063944] kasan_save_alloc_info+0x40/0x58 [ 28.064544] __kasan_kmalloc+0xd4/0xd8 [ 28.065181] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.065896] kasan_atomics+0xb8/0x2e8 [ 28.066417] kunit_try_run_case+0x14c/0x3d0 [ 28.067057] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.068006] kthread+0x24c/0x2d0 [ 28.068730] ret_from_fork+0x10/0x20 [ 28.069548] [ 28.070139] The buggy address belongs to the object at fff00000c12e8780 [ 28.070139] which belongs to the cache kmalloc-64 of size 64 [ 28.071568] The buggy address is located 0 bytes to the right of [ 28.071568] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.072924] [ 28.073244] The buggy address belongs to the physical page: [ 28.073997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.075239] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.075998] page_type: f5(slab) [ 28.076523] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.077418] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.078268] page dumped because: kasan: bad access detected [ 28.078942] [ 28.079288] Memory state around the buggy address: [ 28.080217] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.080983] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.081904] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.082740] ^ [ 28.083454] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.084260] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.085253] ================================================================== [ 29.822237] ================================================================== [ 29.822895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 29.823847] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.824636] [ 29.825004] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.826157] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.826667] Hardware name: linux,dummy-virt (DT) [ 29.827201] Call trace: [ 29.827591] show_stack+0x20/0x38 (C) [ 29.828205] dump_stack_lvl+0x8c/0xd0 [ 29.828827] print_report+0x118/0x5e0 [ 29.829384] kasan_report+0xc8/0x118 [ 29.829970] kasan_check_range+0x100/0x1a8 [ 29.830625] __kasan_check_write+0x20/0x30 [ 29.831440] kasan_atomics_helper+0x147c/0x4858 [ 29.832144] kasan_atomics+0x198/0x2e8 [ 29.832693] kunit_try_run_case+0x14c/0x3d0 [ 29.833229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.833882] kthread+0x24c/0x2d0 [ 29.834400] ret_from_fork+0x10/0x20 [ 29.834977] [ 29.835344] Allocated by task 253: [ 29.835800] kasan_save_stack+0x3c/0x68 [ 29.836402] kasan_save_track+0x20/0x40 [ 29.836959] kasan_save_alloc_info+0x40/0x58 [ 29.837587] __kasan_kmalloc+0xd4/0xd8 [ 29.838137] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.838798] kasan_atomics+0xb8/0x2e8 [ 29.839328] kunit_try_run_case+0x14c/0x3d0 [ 29.839901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.840518] kthread+0x24c/0x2d0 [ 29.841135] ret_from_fork+0x10/0x20 [ 29.841604] [ 29.841950] The buggy address belongs to the object at fff00000c12e8780 [ 29.841950] which belongs to the cache kmalloc-64 of size 64 [ 29.843245] The buggy address is located 0 bytes to the right of [ 29.843245] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.844507] [ 29.844853] The buggy address belongs to the physical page: [ 29.845611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.846506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.847259] page_type: f5(slab) [ 29.847762] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.848601] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.849460] page dumped because: kasan: bad access detected [ 29.850101] [ 29.850409] Memory state around the buggy address: [ 29.851015] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.851795] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.852525] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.853366] ^ [ 29.854028] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.854805] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.855553] ================================================================== [ 29.857100] ================================================================== [ 29.857835] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 29.858453] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.859507] [ 29.859906] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.861123] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.861640] Hardware name: linux,dummy-virt (DT) [ 29.862235] Call trace: [ 29.862667] show_stack+0x20/0x38 (C) [ 29.863221] dump_stack_lvl+0x8c/0xd0 [ 29.863789] print_report+0x118/0x5e0 [ 29.864319] kasan_report+0xc8/0x118 [ 29.864949] kasan_check_range+0x100/0x1a8 [ 29.865660] __kasan_check_write+0x20/0x30 [ 29.866264] kasan_atomics_helper+0x14e4/0x4858 [ 29.867042] kasan_atomics+0x198/0x2e8 [ 29.867651] kunit_try_run_case+0x14c/0x3d0 [ 29.868248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.868905] kthread+0x24c/0x2d0 [ 29.869511] ret_from_fork+0x10/0x20 [ 29.870085] [ 29.870427] Allocated by task 253: [ 29.870906] kasan_save_stack+0x3c/0x68 [ 29.871501] kasan_save_track+0x20/0x40 [ 29.872028] kasan_save_alloc_info+0x40/0x58 [ 29.872548] __kasan_kmalloc+0xd4/0xd8 [ 29.873142] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.873903] kasan_atomics+0xb8/0x2e8 [ 29.874446] kunit_try_run_case+0x14c/0x3d0 [ 29.874997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.875726] kthread+0x24c/0x2d0 [ 29.876215] ret_from_fork+0x10/0x20 [ 29.876755] [ 29.877066] The buggy address belongs to the object at fff00000c12e8780 [ 29.877066] which belongs to the cache kmalloc-64 of size 64 [ 29.878219] The buggy address is located 0 bytes to the right of [ 29.878219] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.879414] [ 29.879804] The buggy address belongs to the physical page: [ 29.880464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.881297] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.882073] page_type: f5(slab) [ 29.882628] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.883453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.884333] page dumped because: kasan: bad access detected [ 29.885021] [ 29.885345] Memory state around the buggy address: [ 29.885959] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.886735] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.887525] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.888301] ^ [ 29.888907] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.889669] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.890508] ================================================================== [ 28.125057] ================================================================== [ 28.125843] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 28.127550] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.128421] [ 28.128764] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.129923] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.130462] Hardware name: linux,dummy-virt (DT) [ 28.131123] Call trace: [ 28.131531] show_stack+0x20/0x38 (C) [ 28.132100] dump_stack_lvl+0x8c/0xd0 [ 28.132816] print_report+0x118/0x5e0 [ 28.133302] kasan_report+0xc8/0x118 [ 28.133800] kasan_check_range+0x100/0x1a8 [ 28.134395] __kasan_check_write+0x20/0x30 [ 28.135169] kasan_atomics_helper+0x32c/0x4858 [ 28.135883] kasan_atomics+0x198/0x2e8 [ 28.136479] kunit_try_run_case+0x14c/0x3d0 [ 28.137140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.137826] kthread+0x24c/0x2d0 [ 28.138339] ret_from_fork+0x10/0x20 [ 28.138878] [ 28.139250] Allocated by task 253: [ 28.139685] kasan_save_stack+0x3c/0x68 [ 28.140315] kasan_save_track+0x20/0x40 [ 28.140877] kasan_save_alloc_info+0x40/0x58 [ 28.141438] __kasan_kmalloc+0xd4/0xd8 [ 28.141992] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.142588] kasan_atomics+0xb8/0x2e8 [ 28.143166] kunit_try_run_case+0x14c/0x3d0 [ 28.143767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.144459] kthread+0x24c/0x2d0 [ 28.144948] ret_from_fork+0x10/0x20 [ 28.145469] [ 28.145805] The buggy address belongs to the object at fff00000c12e8780 [ 28.145805] which belongs to the cache kmalloc-64 of size 64 [ 28.147029] The buggy address is located 0 bytes to the right of [ 28.147029] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.148202] [ 28.148579] The buggy address belongs to the physical page: [ 28.149182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.150110] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.150841] page_type: f5(slab) [ 28.151302] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.152107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.152984] page dumped because: kasan: bad access detected [ 28.153624] [ 28.153863] Memory state around the buggy address: [ 28.154452] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.155304] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.156057] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.156968] ^ [ 28.157474] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.158345] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.159104] ================================================================== [ 29.422742] ================================================================== [ 29.423524] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 29.424423] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.425333] [ 29.425724] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.426785] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.427269] Hardware name: linux,dummy-virt (DT) [ 29.427842] Call trace: [ 29.428285] show_stack+0x20/0x38 (C) [ 29.428813] dump_stack_lvl+0x8c/0xd0 [ 29.429492] print_report+0x118/0x5e0 [ 29.430006] kasan_report+0xc8/0x118 [ 29.430672] kasan_check_range+0x100/0x1a8 [ 29.431252] __kasan_check_write+0x20/0x30 [ 29.431921] kasan_atomics_helper+0xff0/0x4858 [ 29.432539] kasan_atomics+0x198/0x2e8 [ 29.433152] kunit_try_run_case+0x14c/0x3d0 [ 29.433777] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.434506] kthread+0x24c/0x2d0 [ 29.435026] ret_from_fork+0x10/0x20 [ 29.435596] [ 29.435937] Allocated by task 253: [ 29.436375] kasan_save_stack+0x3c/0x68 [ 29.437034] kasan_save_track+0x20/0x40 [ 29.437589] kasan_save_alloc_info+0x40/0x58 [ 29.438304] __kasan_kmalloc+0xd4/0xd8 [ 29.438861] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.439411] kasan_atomics+0xb8/0x2e8 [ 29.439979] kunit_try_run_case+0x14c/0x3d0 [ 29.440624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.441304] kthread+0x24c/0x2d0 [ 29.441754] ret_from_fork+0x10/0x20 [ 29.442350] [ 29.442681] The buggy address belongs to the object at fff00000c12e8780 [ 29.442681] which belongs to the cache kmalloc-64 of size 64 [ 29.443820] The buggy address is located 0 bytes to the right of [ 29.443820] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.445157] [ 29.445527] The buggy address belongs to the physical page: [ 29.446104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.447048] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.447787] page_type: f5(slab) [ 29.448367] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.449227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.450146] page dumped because: kasan: bad access detected [ 29.450867] [ 29.451172] Memory state around the buggy address: [ 29.451692] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.452497] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.453297] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.454157] ^ [ 29.454744] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.455527] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.456306] ================================================================== [ 29.245899] ================================================================== [ 29.246645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 29.247373] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.248317] [ 29.248772] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.251084] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.251648] Hardware name: linux,dummy-virt (DT) [ 29.252412] Call trace: [ 29.252830] show_stack+0x20/0x38 (C) [ 29.253474] dump_stack_lvl+0x8c/0xd0 [ 29.254082] print_report+0x118/0x5e0 [ 29.254679] kasan_report+0xc8/0x118 [ 29.255290] kasan_check_range+0x100/0x1a8 [ 29.255908] __kasan_check_write+0x20/0x30 [ 29.256506] kasan_atomics_helper+0xe44/0x4858 [ 29.257220] kasan_atomics+0x198/0x2e8 [ 29.257827] kunit_try_run_case+0x14c/0x3d0 [ 29.258474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.259212] kthread+0x24c/0x2d0 [ 29.259760] ret_from_fork+0x10/0x20 [ 29.260314] [ 29.260642] Allocated by task 253: [ 29.261145] kasan_save_stack+0x3c/0x68 [ 29.261650] kasan_save_track+0x20/0x40 [ 29.262299] kasan_save_alloc_info+0x40/0x58 [ 29.262867] __kasan_kmalloc+0xd4/0xd8 [ 29.263439] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.264113] kasan_atomics+0xb8/0x2e8 [ 29.264636] kunit_try_run_case+0x14c/0x3d0 [ 29.265228] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.265869] kthread+0x24c/0x2d0 [ 29.266400] ret_from_fork+0x10/0x20 [ 29.266932] [ 29.267250] The buggy address belongs to the object at fff00000c12e8780 [ 29.267250] which belongs to the cache kmalloc-64 of size 64 [ 29.268507] The buggy address is located 0 bytes to the right of [ 29.268507] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.269822] [ 29.270183] The buggy address belongs to the physical page: [ 29.270752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.271743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.272522] page_type: f5(slab) [ 29.273178] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.274051] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.274891] page dumped because: kasan: bad access detected [ 29.275486] [ 29.275816] Memory state around the buggy address: [ 29.276393] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.277289] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.278023] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.278907] ^ [ 29.279553] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.280336] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.281176] ================================================================== [ 28.849655] ================================================================== [ 28.850473] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 28.851241] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.852740] [ 28.853243] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.854360] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.855007] Hardware name: linux,dummy-virt (DT) [ 28.855629] Call trace: [ 28.856066] show_stack+0x20/0x38 (C) [ 28.856721] dump_stack_lvl+0x8c/0xd0 [ 28.857351] print_report+0x118/0x5e0 [ 28.857940] kasan_report+0xc8/0x118 [ 28.858410] __asan_report_load4_noabort+0x20/0x30 [ 28.859113] kasan_atomics_helper+0x3dcc/0x4858 [ 28.859667] kasan_atomics+0x198/0x2e8 [ 28.860289] kunit_try_run_case+0x14c/0x3d0 [ 28.860929] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.861732] kthread+0x24c/0x2d0 [ 28.862240] ret_from_fork+0x10/0x20 [ 28.862784] [ 28.863160] Allocated by task 253: [ 28.863670] kasan_save_stack+0x3c/0x68 [ 28.864218] kasan_save_track+0x20/0x40 [ 28.864791] kasan_save_alloc_info+0x40/0x58 [ 28.865430] __kasan_kmalloc+0xd4/0xd8 [ 28.865915] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.866610] kasan_atomics+0xb8/0x2e8 [ 28.867133] kunit_try_run_case+0x14c/0x3d0 [ 28.867686] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.868355] kthread+0x24c/0x2d0 [ 28.868920] ret_from_fork+0x10/0x20 [ 28.869420] [ 28.869787] The buggy address belongs to the object at fff00000c12e8780 [ 28.869787] which belongs to the cache kmalloc-64 of size 64 [ 28.871006] The buggy address is located 0 bytes to the right of [ 28.871006] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.872255] [ 28.872615] The buggy address belongs to the physical page: [ 28.873334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.874268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.875012] page_type: f5(slab) [ 28.875482] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.876338] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.877127] page dumped because: kasan: bad access detected [ 28.877811] [ 28.878122] Memory state around the buggy address: [ 28.878680] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.879475] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.880276] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.881065] ^ [ 28.881678] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.882555] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.883380] ================================================================== [ 30.138114] ================================================================== [ 30.138865] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 30.139808] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 30.141441] [ 30.141906] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.142993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.143490] Hardware name: linux,dummy-virt (DT) [ 30.144106] Call trace: [ 30.144515] show_stack+0x20/0x38 (C) [ 30.145075] dump_stack_lvl+0x8c/0xd0 [ 30.145720] print_report+0x118/0x5e0 [ 30.146268] kasan_report+0xc8/0x118 [ 30.146793] kasan_check_range+0x100/0x1a8 [ 30.147433] __kasan_check_write+0x20/0x30 [ 30.148061] kasan_atomics_helper+0x175c/0x4858 [ 30.148694] kasan_atomics+0x198/0x2e8 [ 30.149284] kunit_try_run_case+0x14c/0x3d0 [ 30.149919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.150667] kthread+0x24c/0x2d0 [ 30.151214] ret_from_fork+0x10/0x20 [ 30.151763] [ 30.152087] Allocated by task 253: [ 30.152547] kasan_save_stack+0x3c/0x68 [ 30.153173] kasan_save_track+0x20/0x40 [ 30.153736] kasan_save_alloc_info+0x40/0x58 [ 30.154364] __kasan_kmalloc+0xd4/0xd8 [ 30.154910] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.155488] kasan_atomics+0xb8/0x2e8 [ 30.156153] kunit_try_run_case+0x14c/0x3d0 [ 30.156743] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.157447] kthread+0x24c/0x2d0 [ 30.157911] ret_from_fork+0x10/0x20 [ 30.158448] [ 30.158812] The buggy address belongs to the object at fff00000c12e8780 [ 30.158812] which belongs to the cache kmalloc-64 of size 64 [ 30.159980] The buggy address is located 0 bytes to the right of [ 30.159980] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 30.161298] [ 30.161636] The buggy address belongs to the physical page: [ 30.162275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 30.163148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.163869] page_type: f5(slab) [ 30.164321] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.165256] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.166066] page dumped because: kasan: bad access detected [ 30.166729] [ 30.167047] Memory state around the buggy address: [ 30.167604] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.168404] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.169149] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.169974] ^ [ 30.170561] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.171335] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.172056] ================================================================== [ 27.929632] ================================================================== [ 27.930312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 27.931117] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 27.932785] [ 27.933263] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.935162] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.936001] Hardware name: linux,dummy-virt (DT) [ 27.936575] Call trace: [ 27.936853] show_stack+0x20/0x38 (C) [ 27.937543] dump_stack_lvl+0x8c/0xd0 [ 27.938145] print_report+0x118/0x5e0 [ 27.938834] kasan_report+0xc8/0x118 [ 27.939432] __asan_report_store4_noabort+0x20/0x30 [ 27.940184] kasan_atomics_helper+0x3f7c/0x4858 [ 27.940868] kasan_atomics+0x198/0x2e8 [ 27.941469] kunit_try_run_case+0x14c/0x3d0 [ 27.942117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.942904] kthread+0x24c/0x2d0 [ 27.943517] ret_from_fork+0x10/0x20 [ 27.944225] [ 27.944462] Allocated by task 253: [ 27.945186] kasan_save_stack+0x3c/0x68 [ 27.945845] kasan_save_track+0x20/0x40 [ 27.946467] kasan_save_alloc_info+0x40/0x58 [ 27.947126] __kasan_kmalloc+0xd4/0xd8 [ 27.947622] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.948420] kasan_atomics+0xb8/0x2e8 [ 27.949035] kunit_try_run_case+0x14c/0x3d0 [ 27.949665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.950389] kthread+0x24c/0x2d0 [ 27.951002] ret_from_fork+0x10/0x20 [ 27.951561] [ 27.951933] The buggy address belongs to the object at fff00000c12e8780 [ 27.951933] which belongs to the cache kmalloc-64 of size 64 [ 27.953408] The buggy address is located 0 bytes to the right of [ 27.953408] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 27.954472] [ 27.954742] The buggy address belongs to the physical page: [ 27.955483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 27.956323] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.957372] page_type: f5(slab) [ 27.958024] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.959180] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.960012] page dumped because: kasan: bad access detected [ 27.960339] [ 27.960480] Memory state around the buggy address: [ 27.960776] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.961322] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.962292] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.963137] ^ [ 27.963816] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.964740] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.965548] ================================================================== [ 29.786318] ================================================================== [ 29.787011] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 29.788191] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.789876] [ 29.790278] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.791583] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.792116] Hardware name: linux,dummy-virt (DT) [ 29.792693] Call trace: [ 29.793114] show_stack+0x20/0x38 (C) [ 29.793642] dump_stack_lvl+0x8c/0xd0 [ 29.794244] print_report+0x118/0x5e0 [ 29.794804] kasan_report+0xc8/0x118 [ 29.795396] kasan_check_range+0x100/0x1a8 [ 29.796016] __kasan_check_write+0x20/0x30 [ 29.796671] kasan_atomics_helper+0x1414/0x4858 [ 29.797352] kasan_atomics+0x198/0x2e8 [ 29.797992] kunit_try_run_case+0x14c/0x3d0 [ 29.798584] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.799251] kthread+0x24c/0x2d0 [ 29.799819] ret_from_fork+0x10/0x20 [ 29.800221] [ 29.800596] Allocated by task 253: [ 29.801113] kasan_save_stack+0x3c/0x68 [ 29.801630] kasan_save_track+0x20/0x40 [ 29.802227] kasan_save_alloc_info+0x40/0x58 [ 29.802885] __kasan_kmalloc+0xd4/0xd8 [ 29.803410] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.803974] kasan_atomics+0xb8/0x2e8 [ 29.804559] kunit_try_run_case+0x14c/0x3d0 [ 29.805148] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.805795] kthread+0x24c/0x2d0 [ 29.806338] ret_from_fork+0x10/0x20 [ 29.806890] [ 29.807203] The buggy address belongs to the object at fff00000c12e8780 [ 29.807203] which belongs to the cache kmalloc-64 of size 64 [ 29.808473] The buggy address is located 0 bytes to the right of [ 29.808473] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.809690] [ 29.810021] The buggy address belongs to the physical page: [ 29.810712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.811527] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.812358] page_type: f5(slab) [ 29.812910] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.813758] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.814583] page dumped because: kasan: bad access detected [ 29.815253] [ 29.815573] Memory state around the buggy address: [ 29.816161] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.816910] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.817749] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.818530] ^ [ 29.819183] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.819972] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.820818] ================================================================== [ 28.412064] ================================================================== [ 28.412945] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 28.413648] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.414323] [ 28.414549] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.415577] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.416181] Hardware name: linux,dummy-virt (DT) [ 28.416729] Call trace: [ 28.417209] show_stack+0x20/0x38 (C) [ 28.417852] dump_stack_lvl+0x8c/0xd0 [ 28.418488] print_report+0x118/0x5e0 [ 28.419239] kasan_report+0xc8/0x118 [ 28.419811] kasan_check_range+0x100/0x1a8 [ 28.420532] __kasan_check_write+0x20/0x30 [ 28.421220] kasan_atomics_helper+0x61c/0x4858 [ 28.422003] kasan_atomics+0x198/0x2e8 [ 28.422658] kunit_try_run_case+0x14c/0x3d0 [ 28.423377] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.424167] kthread+0x24c/0x2d0 [ 28.424670] ret_from_fork+0x10/0x20 [ 28.425332] [ 28.425679] Allocated by task 253: [ 28.426171] kasan_save_stack+0x3c/0x68 [ 28.426754] kasan_save_track+0x20/0x40 [ 28.427275] kasan_save_alloc_info+0x40/0x58 [ 28.427798] __kasan_kmalloc+0xd4/0xd8 [ 28.428365] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.428898] kasan_atomics+0xb8/0x2e8 [ 28.429499] kunit_try_run_case+0x14c/0x3d0 [ 28.430095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.430755] kthread+0x24c/0x2d0 [ 28.431272] ret_from_fork+0x10/0x20 [ 28.431834] [ 28.432125] The buggy address belongs to the object at fff00000c12e8780 [ 28.432125] which belongs to the cache kmalloc-64 of size 64 [ 28.433352] The buggy address is located 0 bytes to the right of [ 28.433352] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.434629] [ 28.434949] The buggy address belongs to the physical page: [ 28.435563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.436489] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.437350] page_type: f5(slab) [ 28.437870] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.438762] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.439501] page dumped because: kasan: bad access detected [ 28.440219] [ 28.440559] Memory state around the buggy address: [ 28.441154] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.441969] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.442792] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.443575] ^ [ 28.444187] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.444981] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.445793] ================================================================== [ 29.458906] ================================================================== [ 29.459747] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 29.460434] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.461223] [ 29.461601] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.462677] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.463333] Hardware name: linux,dummy-virt (DT) [ 29.463859] Call trace: [ 29.464335] show_stack+0x20/0x38 (C) [ 29.464962] dump_stack_lvl+0x8c/0xd0 [ 29.465517] print_report+0x118/0x5e0 [ 29.466050] kasan_report+0xc8/0x118 [ 29.466646] kasan_check_range+0x100/0x1a8 [ 29.467217] __kasan_check_write+0x20/0x30 [ 29.467837] kasan_atomics_helper+0x1058/0x4858 [ 29.468495] kasan_atomics+0x198/0x2e8 [ 29.469111] kunit_try_run_case+0x14c/0x3d0 [ 29.469763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.470472] kthread+0x24c/0x2d0 [ 29.471081] ret_from_fork+0x10/0x20 [ 29.471587] [ 29.471944] Allocated by task 253: [ 29.472416] kasan_save_stack+0x3c/0x68 [ 29.473081] kasan_save_track+0x20/0x40 [ 29.473614] kasan_save_alloc_info+0x40/0x58 [ 29.474184] __kasan_kmalloc+0xd4/0xd8 [ 29.474653] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.475323] kasan_atomics+0xb8/0x2e8 [ 29.475845] kunit_try_run_case+0x14c/0x3d0 [ 29.476367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.477110] kthread+0x24c/0x2d0 [ 29.477594] ret_from_fork+0x10/0x20 [ 29.478125] [ 29.478445] The buggy address belongs to the object at fff00000c12e8780 [ 29.478445] which belongs to the cache kmalloc-64 of size 64 [ 29.479607] The buggy address is located 0 bytes to the right of [ 29.479607] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.480862] [ 29.481197] The buggy address belongs to the physical page: [ 29.481762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.482658] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.483464] page_type: f5(slab) [ 29.483950] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.484871] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.485673] page dumped because: kasan: bad access detected [ 29.486318] [ 29.486668] Memory state around the buggy address: [ 29.487265] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.488041] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.488846] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.489691] ^ [ 29.490287] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.491085] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.491839] ================================================================== [ 30.032731] ================================================================== [ 30.033567] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 30.034560] Read of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 30.035630] [ 30.035983] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.037041] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.037529] Hardware name: linux,dummy-virt (DT) [ 30.038164] Call trace: [ 30.038590] show_stack+0x20/0x38 (C) [ 30.039245] dump_stack_lvl+0x8c/0xd0 [ 30.039839] print_report+0x118/0x5e0 [ 30.040430] kasan_report+0xc8/0x118 [ 30.040998] __asan_report_load8_noabort+0x20/0x30 [ 30.041675] kasan_atomics_helper+0x3df4/0x4858 [ 30.042292] kasan_atomics+0x198/0x2e8 [ 30.042883] kunit_try_run_case+0x14c/0x3d0 [ 30.043484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.044210] kthread+0x24c/0x2d0 [ 30.044819] ret_from_fork+0x10/0x20 [ 30.045402] [ 30.045739] Allocated by task 253: [ 30.046164] kasan_save_stack+0x3c/0x68 [ 30.046733] kasan_save_track+0x20/0x40 [ 30.047295] kasan_save_alloc_info+0x40/0x58 [ 30.047914] __kasan_kmalloc+0xd4/0xd8 [ 30.048494] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.049111] kasan_atomics+0xb8/0x2e8 [ 30.049680] kunit_try_run_case+0x14c/0x3d0 [ 30.050315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.051031] kthread+0x24c/0x2d0 [ 30.051548] ret_from_fork+0x10/0x20 [ 30.052073] [ 30.052403] The buggy address belongs to the object at fff00000c12e8780 [ 30.052403] which belongs to the cache kmalloc-64 of size 64 [ 30.053610] The buggy address is located 0 bytes to the right of [ 30.053610] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 30.054919] [ 30.055284] The buggy address belongs to the physical page: [ 30.055879] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 30.056784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.057491] page_type: f5(slab) [ 30.058024] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.058816] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.059736] page dumped because: kasan: bad access detected [ 30.060355] [ 30.060676] Memory state around the buggy address: [ 30.061267] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.062043] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.062826] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.063592] ^ [ 30.064189] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.065016] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.065775] ================================================================== [ 28.885834] ================================================================== [ 28.886760] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 28.887740] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.888531] [ 28.888931] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.890212] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.890443] Hardware name: linux,dummy-virt (DT) [ 28.890685] Call trace: [ 28.890883] show_stack+0x20/0x38 (C) [ 28.891131] dump_stack_lvl+0x8c/0xd0 [ 28.891372] print_report+0x118/0x5e0 [ 28.891611] kasan_report+0xc8/0x118 [ 28.892591] kasan_check_range+0x100/0x1a8 [ 28.893548] __kasan_check_write+0x20/0x30 [ 28.894383] kasan_atomics_helper+0xb70/0x4858 [ 28.895173] kasan_atomics+0x198/0x2e8 [ 28.895667] kunit_try_run_case+0x14c/0x3d0 [ 28.896384] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.897158] kthread+0x24c/0x2d0 [ 28.897802] ret_from_fork+0x10/0x20 [ 28.898400] [ 28.898839] Allocated by task 253: [ 28.899511] kasan_save_stack+0x3c/0x68 [ 28.900087] kasan_save_track+0x20/0x40 [ 28.900717] kasan_save_alloc_info+0x40/0x58 [ 28.901367] __kasan_kmalloc+0xd4/0xd8 [ 28.901972] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.902651] kasan_atomics+0xb8/0x2e8 [ 28.903289] kunit_try_run_case+0x14c/0x3d0 [ 28.903955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.904724] kthread+0x24c/0x2d0 [ 28.905257] ret_from_fork+0x10/0x20 [ 28.905827] [ 28.906204] The buggy address belongs to the object at fff00000c12e8780 [ 28.906204] which belongs to the cache kmalloc-64 of size 64 [ 28.907494] The buggy address is located 0 bytes to the right of [ 28.907494] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.908793] [ 28.909199] The buggy address belongs to the physical page: [ 28.909880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.910878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.911617] page_type: f5(slab) [ 28.912098] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.913014] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.913888] page dumped because: kasan: bad access detected [ 28.914558] [ 28.914887] Memory state around the buggy address: [ 28.915534] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.916355] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.917262] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.918061] ^ [ 28.918715] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.919589] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.920402] ================================================================== [ 28.482601] ================================================================== [ 28.483330] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 28.485621] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.486842] [ 28.487266] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.488526] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.489048] Hardware name: linux,dummy-virt (DT) [ 28.489590] Call trace: [ 28.489997] show_stack+0x20/0x38 (C) [ 28.490871] dump_stack_lvl+0x8c/0xd0 [ 28.491448] print_report+0x118/0x5e0 [ 28.492149] kasan_report+0xc8/0x118 [ 28.492657] kasan_check_range+0x100/0x1a8 [ 28.493208] __kasan_check_write+0x20/0x30 [ 28.493795] kasan_atomics_helper+0x6ec/0x4858 [ 28.494448] kasan_atomics+0x198/0x2e8 [ 28.495089] kunit_try_run_case+0x14c/0x3d0 [ 28.495773] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.496636] kthread+0x24c/0x2d0 [ 28.497157] ret_from_fork+0x10/0x20 [ 28.497918] [ 28.498218] Allocated by task 253: [ 28.498675] kasan_save_stack+0x3c/0x68 [ 28.499237] kasan_save_track+0x20/0x40 [ 28.500022] kasan_save_alloc_info+0x40/0x58 [ 28.500657] __kasan_kmalloc+0xd4/0xd8 [ 28.501445] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.502088] kasan_atomics+0xb8/0x2e8 [ 28.502789] kunit_try_run_case+0x14c/0x3d0 [ 28.503494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.504279] kthread+0x24c/0x2d0 [ 28.504810] ret_from_fork+0x10/0x20 [ 28.505309] [ 28.505645] The buggy address belongs to the object at fff00000c12e8780 [ 28.505645] which belongs to the cache kmalloc-64 of size 64 [ 28.506875] The buggy address is located 0 bytes to the right of [ 28.506875] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.508062] [ 28.508406] The buggy address belongs to the physical page: [ 28.509087] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.509913] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.510761] page_type: f5(slab) [ 28.511285] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.512159] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.513033] page dumped because: kasan: bad access detected [ 28.513695] [ 28.514038] Memory state around the buggy address: [ 28.514652] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.515426] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.516171] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.516963] ^ [ 28.517583] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.518431] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.519213] ================================================================== [ 29.751563] ================================================================== [ 29.752261] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 29.753041] Read of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.753967] [ 29.754303] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.755352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.756095] Hardware name: linux,dummy-virt (DT) [ 29.756736] Call trace: [ 29.757220] show_stack+0x20/0x38 (C) [ 29.757799] dump_stack_lvl+0x8c/0xd0 [ 29.758299] print_report+0x118/0x5e0 [ 29.758890] kasan_report+0xc8/0x118 [ 29.759536] __asan_report_load8_noabort+0x20/0x30 [ 29.760177] kasan_atomics_helper+0x3f04/0x4858 [ 29.760876] kasan_atomics+0x198/0x2e8 [ 29.761352] kunit_try_run_case+0x14c/0x3d0 [ 29.762054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.762724] kthread+0x24c/0x2d0 [ 29.763307] ret_from_fork+0x10/0x20 [ 29.763892] [ 29.764205] Allocated by task 253: [ 29.764715] kasan_save_stack+0x3c/0x68 [ 29.765345] kasan_save_track+0x20/0x40 [ 29.765962] kasan_save_alloc_info+0x40/0x58 [ 29.766600] __kasan_kmalloc+0xd4/0xd8 [ 29.767159] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.767729] kasan_atomics+0xb8/0x2e8 [ 29.768327] kunit_try_run_case+0x14c/0x3d0 [ 29.769014] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.769671] kthread+0x24c/0x2d0 [ 29.770217] ret_from_fork+0x10/0x20 [ 29.770751] [ 29.771047] The buggy address belongs to the object at fff00000c12e8780 [ 29.771047] which belongs to the cache kmalloc-64 of size 64 [ 29.772293] The buggy address is located 0 bytes to the right of [ 29.772293] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.773615] [ 29.773954] The buggy address belongs to the physical page: [ 29.774661] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.775557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.776361] page_type: f5(slab) [ 29.776861] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.777626] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.778469] page dumped because: kasan: bad access detected [ 29.779157] [ 29.779469] Memory state around the buggy address: [ 29.780029] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.780814] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.781610] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.782415] ^ [ 29.783014] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.783764] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.784567] ================================================================== [ 28.636962] ================================================================== [ 28.637733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 28.638553] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.639938] [ 28.640359] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.641564] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.642147] Hardware name: linux,dummy-virt (DT) [ 28.642754] Call trace: [ 28.643198] show_stack+0x20/0x38 (C) [ 28.643850] dump_stack_lvl+0x8c/0xd0 [ 28.644485] print_report+0x118/0x5e0 [ 28.645144] kasan_report+0xc8/0x118 [ 28.645750] __asan_report_load4_noabort+0x20/0x30 [ 28.646450] kasan_atomics_helper+0x42d8/0x4858 [ 28.647107] kasan_atomics+0x198/0x2e8 [ 28.647660] kunit_try_run_case+0x14c/0x3d0 [ 28.648291] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.649010] kthread+0x24c/0x2d0 [ 28.649532] ret_from_fork+0x10/0x20 [ 28.650105] [ 28.650450] Allocated by task 253: [ 28.650984] kasan_save_stack+0x3c/0x68 [ 28.651560] kasan_save_track+0x20/0x40 [ 28.652088] kasan_save_alloc_info+0x40/0x58 [ 28.652761] __kasan_kmalloc+0xd4/0xd8 [ 28.653240] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.653933] kasan_atomics+0xb8/0x2e8 [ 28.654428] kunit_try_run_case+0x14c/0x3d0 [ 28.655072] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.655767] kthread+0x24c/0x2d0 [ 28.656314] ret_from_fork+0x10/0x20 [ 28.656836] [ 28.657171] The buggy address belongs to the object at fff00000c12e8780 [ 28.657171] which belongs to the cache kmalloc-64 of size 64 [ 28.658332] The buggy address is located 0 bytes to the right of [ 28.658332] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.659458] [ 28.659818] The buggy address belongs to the physical page: [ 28.660548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.661346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.662135] page_type: f5(slab) [ 28.662647] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.663584] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.664427] page dumped because: kasan: bad access detected [ 28.665117] [ 28.665406] Memory state around the buggy address: [ 28.666030] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.666880] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.667653] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.668411] ^ [ 28.669015] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.669803] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.670534] ================================================================== [ 29.211255] ================================================================== [ 29.212007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 29.212881] Read of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.213593] [ 29.213983] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.215081] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.215736] Hardware name: linux,dummy-virt (DT) [ 29.216229] Call trace: [ 29.216717] show_stack+0x20/0x38 (C) [ 29.217317] dump_stack_lvl+0x8c/0xd0 [ 29.217864] print_report+0x118/0x5e0 [ 29.218542] kasan_report+0xc8/0x118 [ 29.219103] __asan_report_load8_noabort+0x20/0x30 [ 29.219784] kasan_atomics_helper+0x3f58/0x4858 [ 29.220406] kasan_atomics+0x198/0x2e8 [ 29.220960] kunit_try_run_case+0x14c/0x3d0 [ 29.221555] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.222318] kthread+0x24c/0x2d0 [ 29.222795] ret_from_fork+0x10/0x20 [ 29.223441] [ 29.223800] Allocated by task 253: [ 29.224312] kasan_save_stack+0x3c/0x68 [ 29.224965] kasan_save_track+0x20/0x40 [ 29.225550] kasan_save_alloc_info+0x40/0x58 [ 29.226163] __kasan_kmalloc+0xd4/0xd8 [ 29.226750] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.227378] kasan_atomics+0xb8/0x2e8 [ 29.227966] kunit_try_run_case+0x14c/0x3d0 [ 29.228556] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.229263] kthread+0x24c/0x2d0 [ 29.229801] ret_from_fork+0x10/0x20 [ 29.230344] [ 29.230653] The buggy address belongs to the object at fff00000c12e8780 [ 29.230653] which belongs to the cache kmalloc-64 of size 64 [ 29.231861] The buggy address is located 0 bytes to the right of [ 29.231861] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.233199] [ 29.233528] The buggy address belongs to the physical page: [ 29.234209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.235098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.235824] page_type: f5(slab) [ 29.236380] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.237263] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.238111] page dumped because: kasan: bad access detected [ 29.238679] [ 29.239078] Memory state around the buggy address: [ 29.239639] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.240504] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.241301] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.242140] ^ [ 29.242694] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.243536] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.244314] ================================================================== [ 28.375184] ================================================================== [ 28.376300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 28.378123] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.379449] [ 28.380113] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.381017] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.381500] Hardware name: linux,dummy-virt (DT) [ 28.382206] Call trace: [ 28.382563] show_stack+0x20/0x38 (C) [ 28.383193] dump_stack_lvl+0x8c/0xd0 [ 28.383826] print_report+0x118/0x5e0 [ 28.384502] kasan_report+0xc8/0x118 [ 28.385215] kasan_check_range+0x100/0x1a8 [ 28.385898] __kasan_check_write+0x20/0x30 [ 28.386322] kasan_atomics_helper+0x5b4/0x4858 [ 28.387012] kasan_atomics+0x198/0x2e8 [ 28.387512] kunit_try_run_case+0x14c/0x3d0 [ 28.388202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.388892] kthread+0x24c/0x2d0 [ 28.389443] ret_from_fork+0x10/0x20 [ 28.389982] [ 28.390313] Allocated by task 253: [ 28.390833] kasan_save_stack+0x3c/0x68 [ 28.391379] kasan_save_track+0x20/0x40 [ 28.391863] kasan_save_alloc_info+0x40/0x58 [ 28.392469] __kasan_kmalloc+0xd4/0xd8 [ 28.392974] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.393640] kasan_atomics+0xb8/0x2e8 [ 28.394158] kunit_try_run_case+0x14c/0x3d0 [ 28.394678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.395438] kthread+0x24c/0x2d0 [ 28.395890] ret_from_fork+0x10/0x20 [ 28.396502] [ 28.396856] The buggy address belongs to the object at fff00000c12e8780 [ 28.396856] which belongs to the cache kmalloc-64 of size 64 [ 28.398003] The buggy address is located 0 bytes to the right of [ 28.398003] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.399293] [ 28.399624] The buggy address belongs to the physical page: [ 28.400301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.401211] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.401929] page_type: f5(slab) [ 28.402463] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.403302] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.404144] page dumped because: kasan: bad access detected [ 28.404845] [ 28.405413] Memory state around the buggy address: [ 28.406051] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.406844] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.407552] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.408443] ^ [ 28.409039] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.409897] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.410683] ================================================================== [ 29.892032] ================================================================== [ 29.892684] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 29.893485] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.894488] [ 29.895184] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.896316] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.896849] Hardware name: linux,dummy-virt (DT) [ 29.897359] Call trace: [ 29.897813] show_stack+0x20/0x38 (C) [ 29.898406] dump_stack_lvl+0x8c/0xd0 [ 29.899089] print_report+0x118/0x5e0 [ 29.899656] kasan_report+0xc8/0x118 [ 29.900209] kasan_check_range+0x100/0x1a8 [ 29.900939] __kasan_check_write+0x20/0x30 [ 29.901513] kasan_atomics_helper+0x154c/0x4858 [ 29.902129] kasan_atomics+0x198/0x2e8 [ 29.902678] kunit_try_run_case+0x14c/0x3d0 [ 29.903290] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.904048] kthread+0x24c/0x2d0 [ 29.904593] ret_from_fork+0x10/0x20 [ 29.905177] [ 29.905475] Allocated by task 253: [ 29.905931] kasan_save_stack+0x3c/0x68 [ 29.906517] kasan_save_track+0x20/0x40 [ 29.907002] kasan_save_alloc_info+0x40/0x58 [ 29.907641] __kasan_kmalloc+0xd4/0xd8 [ 29.908311] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.908896] kasan_atomics+0xb8/0x2e8 [ 29.909472] kunit_try_run_case+0x14c/0x3d0 [ 29.910040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.910793] kthread+0x24c/0x2d0 [ 29.911300] ret_from_fork+0x10/0x20 [ 29.911850] [ 29.912192] The buggy address belongs to the object at fff00000c12e8780 [ 29.912192] which belongs to the cache kmalloc-64 of size 64 [ 29.913386] The buggy address is located 0 bytes to the right of [ 29.913386] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.914687] [ 29.915054] The buggy address belongs to the physical page: [ 29.915673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.916531] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.917290] page_type: f5(slab) [ 29.917807] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.918621] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.919476] page dumped because: kasan: bad access detected [ 29.920126] [ 29.920443] Memory state around the buggy address: [ 29.921097] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.921873] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.922638] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.923410] ^ [ 29.924018] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.924818] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.925626] ================================================================== [ 29.680688] ================================================================== [ 29.681581] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 29.682607] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.683903] [ 29.684169] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.685289] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.685837] Hardware name: linux,dummy-virt (DT) [ 29.686437] Call trace: [ 29.686823] show_stack+0x20/0x38 (C) [ 29.687420] dump_stack_lvl+0x8c/0xd0 [ 29.687975] print_report+0x118/0x5e0 [ 29.688519] kasan_report+0xc8/0x118 [ 29.689113] kasan_check_range+0x100/0x1a8 [ 29.689715] __kasan_check_write+0x20/0x30 [ 29.690294] kasan_atomics_helper+0x12d8/0x4858 [ 29.690939] kasan_atomics+0x198/0x2e8 [ 29.691491] kunit_try_run_case+0x14c/0x3d0 [ 29.692083] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.692810] kthread+0x24c/0x2d0 [ 29.693333] ret_from_fork+0x10/0x20 [ 29.693889] [ 29.694235] Allocated by task 253: [ 29.694743] kasan_save_stack+0x3c/0x68 [ 29.695286] kasan_save_track+0x20/0x40 [ 29.695758] kasan_save_alloc_info+0x40/0x58 [ 29.696437] __kasan_kmalloc+0xd4/0xd8 [ 29.696966] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.697575] kasan_atomics+0xb8/0x2e8 [ 29.698131] kunit_try_run_case+0x14c/0x3d0 [ 29.698760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.699411] kthread+0x24c/0x2d0 [ 29.699909] ret_from_fork+0x10/0x20 [ 29.700488] [ 29.700823] The buggy address belongs to the object at fff00000c12e8780 [ 29.700823] which belongs to the cache kmalloc-64 of size 64 [ 29.702105] The buggy address is located 0 bytes to the right of [ 29.702105] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.703306] [ 29.703658] The buggy address belongs to the physical page: [ 29.704246] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.705151] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.705888] page_type: f5(slab) [ 29.706393] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.707243] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.708035] page dumped because: kasan: bad access detected [ 29.708670] [ 29.709038] Memory state around the buggy address: [ 29.709641] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.710420] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.711206] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.711960] ^ [ 29.712624] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.713502] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.714249] ================================================================== [ 28.265725] ================================================================== [ 28.266381] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 28.267259] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.268119] [ 28.268517] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.269820] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.270253] Hardware name: linux,dummy-virt (DT) [ 28.271165] Call trace: [ 28.271611] show_stack+0x20/0x38 (C) [ 28.272444] dump_stack_lvl+0x8c/0xd0 [ 28.273547] print_report+0x118/0x5e0 [ 28.274188] kasan_report+0xc8/0x118 [ 28.274741] kasan_check_range+0x100/0x1a8 [ 28.275360] __kasan_check_write+0x20/0x30 [ 28.275995] kasan_atomics_helper+0x47c/0x4858 [ 28.276682] kasan_atomics+0x198/0x2e8 [ 28.277263] kunit_try_run_case+0x14c/0x3d0 [ 28.277898] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.278570] kthread+0x24c/0x2d0 [ 28.279142] ret_from_fork+0x10/0x20 [ 28.279730] [ 28.280125] Allocated by task 253: [ 28.280684] kasan_save_stack+0x3c/0x68 [ 28.281236] kasan_save_track+0x20/0x40 [ 28.281945] kasan_save_alloc_info+0x40/0x58 [ 28.282577] __kasan_kmalloc+0xd4/0xd8 [ 28.283174] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.283775] kasan_atomics+0xb8/0x2e8 [ 28.284376] kunit_try_run_case+0x14c/0x3d0 [ 28.285211] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.285944] kthread+0x24c/0x2d0 [ 28.286463] ret_from_fork+0x10/0x20 [ 28.287040] [ 28.287388] The buggy address belongs to the object at fff00000c12e8780 [ 28.287388] which belongs to the cache kmalloc-64 of size 64 [ 28.288717] The buggy address is located 0 bytes to the right of [ 28.288717] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.290051] [ 28.290497] The buggy address belongs to the physical page: [ 28.291169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.292055] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.292929] page_type: f5(slab) [ 28.293477] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.294400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.295232] page dumped because: kasan: bad access detected [ 28.295964] [ 28.296349] Memory state around the buggy address: [ 28.297006] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.297937] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.298712] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.299597] ^ [ 28.300209] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.301150] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.301879] ================================================================== [ 28.087296] ================================================================== [ 28.088690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 28.089716] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.091043] [ 28.091529] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.092631] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.093290] Hardware name: linux,dummy-virt (DT) [ 28.093844] Call trace: [ 28.094194] show_stack+0x20/0x38 (C) [ 28.094679] dump_stack_lvl+0x8c/0xd0 [ 28.095576] print_report+0x118/0x5e0 [ 28.096277] kasan_report+0xc8/0x118 [ 28.096935] __asan_report_load4_noabort+0x20/0x30 [ 28.097669] kasan_atomics_helper+0x40fc/0x4858 [ 28.098434] kasan_atomics+0x198/0x2e8 [ 28.099102] kunit_try_run_case+0x14c/0x3d0 [ 28.099646] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.100521] kthread+0x24c/0x2d0 [ 28.101198] ret_from_fork+0x10/0x20 [ 28.101898] [ 28.102361] Allocated by task 253: [ 28.103008] kasan_save_stack+0x3c/0x68 [ 28.103634] kasan_save_track+0x20/0x40 [ 28.104299] kasan_save_alloc_info+0x40/0x58 [ 28.104844] __kasan_kmalloc+0xd4/0xd8 [ 28.105324] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.106154] kasan_atomics+0xb8/0x2e8 [ 28.106757] kunit_try_run_case+0x14c/0x3d0 [ 28.107390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.108155] kthread+0x24c/0x2d0 [ 28.108676] ret_from_fork+0x10/0x20 [ 28.109219] [ 28.109520] The buggy address belongs to the object at fff00000c12e8780 [ 28.109520] which belongs to the cache kmalloc-64 of size 64 [ 28.110759] The buggy address is located 0 bytes to the right of [ 28.110759] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.112023] [ 28.112337] The buggy address belongs to the physical page: [ 28.112971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.113860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.114592] page_type: f5(slab) [ 28.115069] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.115949] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.116762] page dumped because: kasan: bad access detected [ 28.117396] [ 28.117744] Memory state around the buggy address: [ 28.118300] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.119057] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.119792] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.120600] ^ [ 28.121229] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.122046] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.122817] ================================================================== [ 29.033719] ================================================================== [ 29.034396] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 29.035633] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.037412] [ 29.037731] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.039135] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.039632] Hardware name: linux,dummy-virt (DT) [ 29.040203] Call trace: [ 29.040625] show_stack+0x20/0x38 (C) [ 29.041226] dump_stack_lvl+0x8c/0xd0 [ 29.041792] print_report+0x118/0x5e0 [ 29.042344] kasan_report+0xc8/0x118 [ 29.042862] kasan_check_range+0x100/0x1a8 [ 29.043512] __kasan_check_write+0x20/0x30 [ 29.044109] kasan_atomics_helper+0xca0/0x4858 [ 29.044980] kasan_atomics+0x198/0x2e8 [ 29.045618] kunit_try_run_case+0x14c/0x3d0 [ 29.046197] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.047035] kthread+0x24c/0x2d0 [ 29.047605] ret_from_fork+0x10/0x20 [ 29.048157] [ 29.048486] Allocated by task 253: [ 29.049317] kasan_save_stack+0x3c/0x68 [ 29.050088] kasan_save_track+0x20/0x40 [ 29.050713] kasan_save_alloc_info+0x40/0x58 [ 29.051549] __kasan_kmalloc+0xd4/0xd8 [ 29.052055] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.052560] kasan_atomics+0xb8/0x2e8 [ 29.053189] kunit_try_run_case+0x14c/0x3d0 [ 29.053795] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.054551] kthread+0x24c/0x2d0 [ 29.055052] ret_from_fork+0x10/0x20 [ 29.055555] [ 29.055871] The buggy address belongs to the object at fff00000c12e8780 [ 29.055871] which belongs to the cache kmalloc-64 of size 64 [ 29.057893] The buggy address is located 0 bytes to the right of [ 29.057893] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.059080] [ 29.059413] The buggy address belongs to the physical page: [ 29.060123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.060985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.061689] page_type: f5(slab) [ 29.062219] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.063118] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.063894] page dumped because: kasan: bad access detected [ 29.064532] [ 29.064867] Memory state around the buggy address: [ 29.065443] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.066261] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.066991] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.067809] ^ [ 29.068418] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.069248] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.070052] ================================================================== [ 28.741967] ================================================================== [ 28.743319] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 28.744311] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.745342] [ 28.745692] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.747004] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.747563] Hardware name: linux,dummy-virt (DT) [ 28.748320] Call trace: [ 28.748813] show_stack+0x20/0x38 (C) [ 28.749488] dump_stack_lvl+0x8c/0xd0 [ 28.750104] print_report+0x118/0x5e0 [ 28.750677] kasan_report+0xc8/0x118 [ 28.751393] kasan_check_range+0x100/0x1a8 [ 28.752046] __kasan_check_write+0x20/0x30 [ 28.752693] kasan_atomics_helper+0xa04/0x4858 [ 28.753339] kasan_atomics+0x198/0x2e8 [ 28.754008] kunit_try_run_case+0x14c/0x3d0 [ 28.754659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.755416] kthread+0x24c/0x2d0 [ 28.755965] ret_from_fork+0x10/0x20 [ 28.756550] [ 28.756919] Allocated by task 253: [ 28.757432] kasan_save_stack+0x3c/0x68 [ 28.757987] kasan_save_track+0x20/0x40 [ 28.758601] kasan_save_alloc_info+0x40/0x58 [ 28.759123] __kasan_kmalloc+0xd4/0xd8 [ 28.759674] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.760320] kasan_atomics+0xb8/0x2e8 [ 28.760922] kunit_try_run_case+0x14c/0x3d0 [ 28.761496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.762149] kthread+0x24c/0x2d0 [ 28.762717] ret_from_fork+0x10/0x20 [ 28.763218] [ 28.763544] The buggy address belongs to the object at fff00000c12e8780 [ 28.763544] which belongs to the cache kmalloc-64 of size 64 [ 28.764681] The buggy address is located 0 bytes to the right of [ 28.764681] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.766035] [ 28.766344] The buggy address belongs to the physical page: [ 28.767032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.767950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.768755] page_type: f5(slab) [ 28.769269] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.770063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.770981] page dumped because: kasan: bad access detected [ 28.771530] [ 28.771873] Memory state around the buggy address: [ 28.772468] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.773338] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.774164] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.774948] ^ [ 28.775561] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.776333] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.777165] ================================================================== [ 28.447081] ================================================================== [ 28.447864] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 28.448911] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.449754] [ 28.450182] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.451341] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.451968] Hardware name: linux,dummy-virt (DT) [ 28.452640] Call trace: [ 28.453061] show_stack+0x20/0x38 (C) [ 28.453685] dump_stack_lvl+0x8c/0xd0 [ 28.454334] print_report+0x118/0x5e0 [ 28.454969] kasan_report+0xc8/0x118 [ 28.455593] kasan_check_range+0x100/0x1a8 [ 28.456211] __kasan_check_write+0x20/0x30 [ 28.456770] kasan_atomics_helper+0x684/0x4858 [ 28.457408] kasan_atomics+0x198/0x2e8 [ 28.458035] kunit_try_run_case+0x14c/0x3d0 [ 28.458677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.459377] kthread+0x24c/0x2d0 [ 28.459936] ret_from_fork+0x10/0x20 [ 28.460511] [ 28.460844] Allocated by task 253: [ 28.461370] kasan_save_stack+0x3c/0x68 [ 28.461966] kasan_save_track+0x20/0x40 [ 28.462460] kasan_save_alloc_info+0x40/0x58 [ 28.463025] __kasan_kmalloc+0xd4/0xd8 [ 28.463611] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.464232] kasan_atomics+0xb8/0x2e8 [ 28.464768] kunit_try_run_case+0x14c/0x3d0 [ 28.465332] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.466067] kthread+0x24c/0x2d0 [ 28.466560] ret_from_fork+0x10/0x20 [ 28.467068] [ 28.467382] The buggy address belongs to the object at fff00000c12e8780 [ 28.467382] which belongs to the cache kmalloc-64 of size 64 [ 28.468556] The buggy address is located 0 bytes to the right of [ 28.468556] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.469851] [ 28.470153] The buggy address belongs to the physical page: [ 28.470812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.471666] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.472538] page_type: f5(slab) [ 28.473023] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.473911] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.474692] page dumped because: kasan: bad access detected [ 28.475327] [ 28.475680] Memory state around the buggy address: [ 28.476278] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.477011] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.477900] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.478735] ^ [ 28.479304] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.480147] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.480946] ================================================================== [ 29.927042] ================================================================== [ 29.927849] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 29.928901] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.929791] [ 29.930168] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.931458] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.932077] Hardware name: linux,dummy-virt (DT) [ 29.932736] Call trace: [ 29.933187] show_stack+0x20/0x38 (C) [ 29.933870] dump_stack_lvl+0x8c/0xd0 [ 29.934491] print_report+0x118/0x5e0 [ 29.935048] kasan_report+0xc8/0x118 [ 29.935724] kasan_check_range+0x100/0x1a8 [ 29.936325] __kasan_check_write+0x20/0x30 [ 29.937078] kasan_atomics_helper+0x15b4/0x4858 [ 29.937674] kasan_atomics+0x198/0x2e8 [ 29.938261] kunit_try_run_case+0x14c/0x3d0 [ 29.938843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.939649] kthread+0x24c/0x2d0 [ 29.940165] ret_from_fork+0x10/0x20 [ 29.940762] [ 29.941097] Allocated by task 253: [ 29.941535] kasan_save_stack+0x3c/0x68 [ 29.942148] kasan_save_track+0x20/0x40 [ 29.942726] kasan_save_alloc_info+0x40/0x58 [ 29.943294] __kasan_kmalloc+0xd4/0xd8 [ 29.943772] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.944490] kasan_atomics+0xb8/0x2e8 [ 29.945010] kunit_try_run_case+0x14c/0x3d0 [ 29.945664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.946326] kthread+0x24c/0x2d0 [ 29.946865] ret_from_fork+0x10/0x20 [ 29.947371] [ 29.947684] The buggy address belongs to the object at fff00000c12e8780 [ 29.947684] which belongs to the cache kmalloc-64 of size 64 [ 29.948865] The buggy address is located 0 bytes to the right of [ 29.948865] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.950111] [ 29.950412] The buggy address belongs to the physical page: [ 29.950999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.951928] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.952563] page_type: f5(slab) [ 29.952999] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.953872] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.954651] page dumped because: kasan: bad access detected [ 29.955284] [ 29.955506] Memory state around the buggy address: [ 29.955979] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.956629] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.957789] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.958542] ^ [ 29.959040] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.959916] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.960678] ================================================================== [ 28.597228] ================================================================== [ 28.597984] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 28.599287] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.600524] [ 28.601085] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.602249] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.602733] Hardware name: linux,dummy-virt (DT) [ 28.603686] Call trace: [ 28.604306] show_stack+0x20/0x38 (C) [ 28.604926] dump_stack_lvl+0x8c/0xd0 [ 28.605600] print_report+0x118/0x5e0 [ 28.606273] kasan_report+0xc8/0x118 [ 28.606925] kasan_check_range+0x100/0x1a8 [ 28.607617] __kasan_check_write+0x20/0x30 [ 28.608306] kasan_atomics_helper+0x894/0x4858 [ 28.609088] kasan_atomics+0x198/0x2e8 [ 28.609758] kunit_try_run_case+0x14c/0x3d0 [ 28.610430] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.611241] kthread+0x24c/0x2d0 [ 28.611859] ret_from_fork+0x10/0x20 [ 28.612507] [ 28.612923] Allocated by task 253: [ 28.613481] kasan_save_stack+0x3c/0x68 [ 28.613993] kasan_save_track+0x20/0x40 [ 28.614480] kasan_save_alloc_info+0x40/0x58 [ 28.615085] __kasan_kmalloc+0xd4/0xd8 [ 28.615756] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.616394] kasan_atomics+0xb8/0x2e8 [ 28.617006] kunit_try_run_case+0x14c/0x3d0 [ 28.617645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.618403] kthread+0x24c/0x2d0 [ 28.618902] ret_from_fork+0x10/0x20 [ 28.619393] [ 28.619689] The buggy address belongs to the object at fff00000c12e8780 [ 28.619689] which belongs to the cache kmalloc-64 of size 64 [ 28.621221] The buggy address is located 0 bytes to the right of [ 28.621221] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.622403] [ 28.622689] The buggy address belongs to the physical page: [ 28.623801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.624826] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.625733] page_type: f5(slab) [ 28.626381] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.627376] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.628346] page dumped because: kasan: bad access detected [ 28.629140] [ 28.629610] Memory state around the buggy address: [ 28.630267] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.631215] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.632083] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.632979] ^ [ 28.633644] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.634514] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.635343] ================================================================== [ 28.922647] ================================================================== [ 28.923674] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 28.924420] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.925334] [ 28.925873] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.927109] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.927680] Hardware name: linux,dummy-virt (DT) [ 28.928415] Call trace: [ 28.928914] show_stack+0x20/0x38 (C) [ 28.929541] dump_stack_lvl+0x8c/0xd0 [ 28.930237] print_report+0x118/0x5e0 [ 28.930891] kasan_report+0xc8/0x118 [ 28.931509] __asan_report_load4_noabort+0x20/0x30 [ 28.932274] kasan_atomics_helper+0x3dbc/0x4858 [ 28.932988] kasan_atomics+0x198/0x2e8 [ 28.933610] kunit_try_run_case+0x14c/0x3d0 [ 28.934290] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.935039] kthread+0x24c/0x2d0 [ 28.935598] ret_from_fork+0x10/0x20 [ 28.936200] [ 28.936529] Allocated by task 253: [ 28.937045] kasan_save_stack+0x3c/0x68 [ 28.937687] kasan_save_track+0x20/0x40 [ 28.938323] kasan_save_alloc_info+0x40/0x58 [ 28.938965] __kasan_kmalloc+0xd4/0xd8 [ 28.939554] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.940195] kasan_atomics+0xb8/0x2e8 [ 28.940779] kunit_try_run_case+0x14c/0x3d0 [ 28.941421] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.942144] kthread+0x24c/0x2d0 [ 28.942746] ret_from_fork+0x10/0x20 [ 28.943308] [ 28.943647] The buggy address belongs to the object at fff00000c12e8780 [ 28.943647] which belongs to the cache kmalloc-64 of size 64 [ 28.945010] The buggy address is located 0 bytes to the right of [ 28.945010] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.946367] [ 28.946754] The buggy address belongs to the physical page: [ 28.947438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.948384] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.949173] page_type: f5(slab) [ 28.949678] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.950608] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.951475] page dumped because: kasan: bad access detected [ 28.952120] [ 28.952413] Memory state around the buggy address: [ 28.953081] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.954127] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.954952] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.955759] ^ [ 28.956338] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.957174] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.957981] ================================================================== [ 28.303561] ================================================================== [ 28.304400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 28.305157] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.306782] [ 28.307230] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.308353] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.308914] Hardware name: linux,dummy-virt (DT) [ 28.309493] Call trace: [ 28.309909] show_stack+0x20/0x38 (C) [ 28.310548] dump_stack_lvl+0x8c/0xd0 [ 28.311138] print_report+0x118/0x5e0 [ 28.311827] kasan_report+0xc8/0x118 [ 28.312429] kasan_check_range+0x100/0x1a8 [ 28.313063] __kasan_check_write+0x20/0x30 [ 28.313759] kasan_atomics_helper+0x4e4/0x4858 [ 28.314408] kasan_atomics+0x198/0x2e8 [ 28.315120] kunit_try_run_case+0x14c/0x3d0 [ 28.315760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.316540] kthread+0x24c/0x2d0 [ 28.317152] ret_from_fork+0x10/0x20 [ 28.317771] [ 28.318123] Allocated by task 253: [ 28.318620] kasan_save_stack+0x3c/0x68 [ 28.319213] kasan_save_track+0x20/0x40 [ 28.319817] kasan_save_alloc_info+0x40/0x58 [ 28.320487] __kasan_kmalloc+0xd4/0xd8 [ 28.321072] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.321772] kasan_atomics+0xb8/0x2e8 [ 28.322338] kunit_try_run_case+0x14c/0x3d0 [ 28.322937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.323694] kthread+0x24c/0x2d0 [ 28.324196] ret_from_fork+0x10/0x20 [ 28.324826] [ 28.325168] The buggy address belongs to the object at fff00000c12e8780 [ 28.325168] which belongs to the cache kmalloc-64 of size 64 [ 28.326440] The buggy address is located 0 bytes to the right of [ 28.326440] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.327834] [ 28.328304] The buggy address belongs to the physical page: [ 28.328998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.329695] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.330484] page_type: f5(slab) [ 28.331027] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.331869] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.332727] page dumped because: kasan: bad access detected [ 28.333376] [ 28.333680] Memory state around the buggy address: [ 28.334273] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.335018] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.335847] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.336587] ^ [ 28.337229] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.337970] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.338837] ================================================================== [ 28.007845] ================================================================== [ 28.008670] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 28.009341] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.010117] [ 28.010479] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.011729] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.012690] Hardware name: linux,dummy-virt (DT) [ 28.013411] Call trace: [ 28.013946] show_stack+0x20/0x38 (C) [ 28.014458] dump_stack_lvl+0x8c/0xd0 [ 28.015034] print_report+0x118/0x5e0 [ 28.015675] kasan_report+0xc8/0x118 [ 28.016221] kasan_check_range+0x100/0x1a8 [ 28.016807] __kasan_check_write+0x20/0x30 [ 28.017401] kasan_atomics_helper+0x24c/0x4858 [ 28.018077] kasan_atomics+0x198/0x2e8 [ 28.018616] kunit_try_run_case+0x14c/0x3d0 [ 28.019484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.020212] kthread+0x24c/0x2d0 [ 28.020720] ret_from_fork+0x10/0x20 [ 28.021341] [ 28.021664] Allocated by task 253: [ 28.022150] kasan_save_stack+0x3c/0x68 [ 28.022778] kasan_save_track+0x20/0x40 [ 28.023403] kasan_save_alloc_info+0x40/0x58 [ 28.024014] __kasan_kmalloc+0xd4/0xd8 [ 28.024542] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.025126] kasan_atomics+0xb8/0x2e8 [ 28.025692] kunit_try_run_case+0x14c/0x3d0 [ 28.026204] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.026989] kthread+0x24c/0x2d0 [ 28.027553] ret_from_fork+0x10/0x20 [ 28.028122] [ 28.028449] The buggy address belongs to the object at fff00000c12e8780 [ 28.028449] which belongs to the cache kmalloc-64 of size 64 [ 28.030849] The buggy address is located 0 bytes to the right of [ 28.030849] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.032252] [ 28.032562] The buggy address belongs to the physical page: [ 28.033215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.034451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.035475] page_type: f5(slab) [ 28.035926] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.036628] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.037643] page dumped because: kasan: bad access detected [ 28.038232] [ 28.038516] Memory state around the buggy address: [ 28.039223] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.040558] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.041504] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.042329] ^ [ 28.043165] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.044129] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.045089] ================================================================== [ 30.209518] ================================================================== [ 30.210177] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 30.210914] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 30.211671] [ 30.212087] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.213254] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.213812] Hardware name: linux,dummy-virt (DT) [ 30.214361] Call trace: [ 30.214755] show_stack+0x20/0x38 (C) [ 30.215321] dump_stack_lvl+0x8c/0xd0 [ 30.215915] print_report+0x118/0x5e0 [ 30.216380] kasan_report+0xc8/0x118 [ 30.216827] kasan_check_range+0x100/0x1a8 [ 30.217444] __kasan_check_write+0x20/0x30 [ 30.218159] kasan_atomics_helper+0x17ec/0x4858 [ 30.218888] kasan_atomics+0x198/0x2e8 [ 30.219481] kunit_try_run_case+0x14c/0x3d0 [ 30.220149] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.220917] kthread+0x24c/0x2d0 [ 30.221464] ret_from_fork+0x10/0x20 [ 30.222016] [ 30.222341] Allocated by task 253: [ 30.222866] kasan_save_stack+0x3c/0x68 [ 30.223471] kasan_save_track+0x20/0x40 [ 30.224113] kasan_save_alloc_info+0x40/0x58 [ 30.224726] __kasan_kmalloc+0xd4/0xd8 [ 30.225352] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.225966] kasan_atomics+0xb8/0x2e8 [ 30.226528] kunit_try_run_case+0x14c/0x3d0 [ 30.227160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.227872] kthread+0x24c/0x2d0 [ 30.228440] ret_from_fork+0x10/0x20 [ 30.229024] [ 30.229392] The buggy address belongs to the object at fff00000c12e8780 [ 30.229392] which belongs to the cache kmalloc-64 of size 64 [ 30.230690] The buggy address is located 0 bytes to the right of [ 30.230690] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 30.232060] [ 30.232463] The buggy address belongs to the physical page: [ 30.233188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 30.234215] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.234998] page_type: f5(slab) [ 30.235582] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.236528] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.237381] page dumped because: kasan: bad access detected [ 30.238069] [ 30.238439] Memory state around the buggy address: [ 30.239033] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.239944] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.240784] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.241595] ^ [ 30.242216] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.243045] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.243866] ================================================================== [ 29.071933] ================================================================== [ 29.072663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 29.073452] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.074463] [ 29.074816] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.075887] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.076384] Hardware name: linux,dummy-virt (DT) [ 29.076990] Call trace: [ 29.077477] show_stack+0x20/0x38 (C) [ 29.078057] dump_stack_lvl+0x8c/0xd0 [ 29.078655] print_report+0x118/0x5e0 [ 29.079216] kasan_report+0xc8/0x118 [ 29.079788] __asan_report_load4_noabort+0x20/0x30 [ 29.080481] kasan_atomics_helper+0x3dd8/0x4858 [ 29.081165] kasan_atomics+0x198/0x2e8 [ 29.081693] kunit_try_run_case+0x14c/0x3d0 [ 29.082272] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.083006] kthread+0x24c/0x2d0 [ 29.083571] ret_from_fork+0x10/0x20 [ 29.084144] [ 29.084476] Allocated by task 253: [ 29.084988] kasan_save_stack+0x3c/0x68 [ 29.085536] kasan_save_track+0x20/0x40 [ 29.086124] kasan_save_alloc_info+0x40/0x58 [ 29.086748] __kasan_kmalloc+0xd4/0xd8 [ 29.087243] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.087987] kasan_atomics+0xb8/0x2e8 [ 29.088451] kunit_try_run_case+0x14c/0x3d0 [ 29.089130] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.089693] kthread+0x24c/0x2d0 [ 29.090204] ret_from_fork+0x10/0x20 [ 29.090715] [ 29.091099] The buggy address belongs to the object at fff00000c12e8780 [ 29.091099] which belongs to the cache kmalloc-64 of size 64 [ 29.092314] The buggy address is located 0 bytes to the right of [ 29.092314] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.093630] [ 29.093962] The buggy address belongs to the physical page: [ 29.094528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.095458] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.096183] page_type: f5(slab) [ 29.096760] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.097582] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.098375] page dumped because: kasan: bad access detected [ 29.099043] [ 29.099368] Memory state around the buggy address: [ 29.099977] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.100765] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.101530] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.102367] ^ [ 29.102956] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.103813] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.104574] ================================================================== [ 28.995815] ================================================================== [ 28.996630] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 28.997807] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.998627] [ 28.999033] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.000210] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.000850] Hardware name: linux,dummy-virt (DT) [ 29.001512] Call trace: [ 29.002000] show_stack+0x20/0x38 (C) [ 29.002629] dump_stack_lvl+0x8c/0xd0 [ 29.003274] print_report+0x118/0x5e0 [ 29.003871] kasan_report+0xc8/0x118 [ 29.004459] __asan_report_load4_noabort+0x20/0x30 [ 29.005194] kasan_atomics_helper+0x3de4/0x4858 [ 29.005804] kasan_atomics+0x198/0x2e8 [ 29.006450] kunit_try_run_case+0x14c/0x3d0 [ 29.007121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.007855] kthread+0x24c/0x2d0 [ 29.008391] ret_from_fork+0x10/0x20 [ 29.009105] [ 29.009587] Allocated by task 253: [ 29.010034] kasan_save_stack+0x3c/0x68 [ 29.010587] kasan_save_track+0x20/0x40 [ 29.011239] kasan_save_alloc_info+0x40/0x58 [ 29.011942] __kasan_kmalloc+0xd4/0xd8 [ 29.012589] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.013311] kasan_atomics+0xb8/0x2e8 [ 29.013797] kunit_try_run_case+0x14c/0x3d0 [ 29.014305] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.014956] kthread+0x24c/0x2d0 [ 29.015540] ret_from_fork+0x10/0x20 [ 29.016306] [ 29.016745] The buggy address belongs to the object at fff00000c12e8780 [ 29.016745] which belongs to the cache kmalloc-64 of size 64 [ 29.018194] The buggy address is located 0 bytes to the right of [ 29.018194] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.019726] [ 29.020155] The buggy address belongs to the physical page: [ 29.020936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.021909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.022786] page_type: f5(slab) [ 29.023326] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.024277] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.025165] page dumped because: kasan: bad access detected [ 29.025898] [ 29.026284] Memory state around the buggy address: [ 29.026988] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.027868] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.028776] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.029571] ^ [ 29.030291] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.031147] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.032006] ================================================================== [ 28.160888] ================================================================== [ 28.161658] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 28.162455] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.164053] [ 28.164474] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.165685] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.166229] Hardware name: linux,dummy-virt (DT) [ 28.166832] Call trace: [ 28.167275] show_stack+0x20/0x38 (C) [ 28.167855] dump_stack_lvl+0x8c/0xd0 [ 28.168492] print_report+0x118/0x5e0 [ 28.169008] kasan_report+0xc8/0x118 [ 28.169591] __asan_report_store4_noabort+0x20/0x30 [ 28.170303] kasan_atomics_helper+0x3f94/0x4858 [ 28.170982] kasan_atomics+0x198/0x2e8 [ 28.171460] kunit_try_run_case+0x14c/0x3d0 [ 28.172110] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.172810] kthread+0x24c/0x2d0 [ 28.173338] ret_from_fork+0x10/0x20 [ 28.173927] [ 28.174232] Allocated by task 253: [ 28.174754] kasan_save_stack+0x3c/0x68 [ 28.175318] kasan_save_track+0x20/0x40 [ 28.175889] kasan_save_alloc_info+0x40/0x58 [ 28.176443] __kasan_kmalloc+0xd4/0xd8 [ 28.177054] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.177760] kasan_atomics+0xb8/0x2e8 [ 28.178233] kunit_try_run_case+0x14c/0x3d0 [ 28.178861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.179482] kthread+0x24c/0x2d0 [ 28.180062] ret_from_fork+0x10/0x20 [ 28.180573] [ 28.180930] The buggy address belongs to the object at fff00000c12e8780 [ 28.180930] which belongs to the cache kmalloc-64 of size 64 [ 28.182154] The buggy address is located 0 bytes to the right of [ 28.182154] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.183393] [ 28.183763] The buggy address belongs to the physical page: [ 28.184440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.185377] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.186117] page_type: f5(slab) [ 28.186635] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.187438] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.188214] page dumped because: kasan: bad access detected [ 28.188900] [ 28.189231] Memory state around the buggy address: [ 28.189798] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.190570] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.191388] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.192256] ^ [ 28.192777] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.193582] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.194372] ================================================================== [ 28.707394] ================================================================== [ 28.708381] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 28.709313] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.710097] [ 28.710495] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.712284] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.712820] Hardware name: linux,dummy-virt (DT) [ 28.713407] Call trace: [ 28.713848] show_stack+0x20/0x38 (C) [ 28.714346] dump_stack_lvl+0x8c/0xd0 [ 28.714906] print_report+0x118/0x5e0 [ 28.715453] kasan_report+0xc8/0x118 [ 28.715969] kasan_check_range+0x100/0x1a8 [ 28.716645] __kasan_check_write+0x20/0x30 [ 28.717304] kasan_atomics_helper+0x99c/0x4858 [ 28.717958] kasan_atomics+0x198/0x2e8 [ 28.718581] kunit_try_run_case+0x14c/0x3d0 [ 28.719244] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.719955] kthread+0x24c/0x2d0 [ 28.720570] ret_from_fork+0x10/0x20 [ 28.721135] [ 28.721471] Allocated by task 253: [ 28.721998] kasan_save_stack+0x3c/0x68 [ 28.722511] kasan_save_track+0x20/0x40 [ 28.723113] kasan_save_alloc_info+0x40/0x58 [ 28.723639] __kasan_kmalloc+0xd4/0xd8 [ 28.724249] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.724851] kasan_atomics+0xb8/0x2e8 [ 28.725458] kunit_try_run_case+0x14c/0x3d0 [ 28.726024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.726781] kthread+0x24c/0x2d0 [ 28.727288] ret_from_fork+0x10/0x20 [ 28.727763] [ 28.728117] The buggy address belongs to the object at fff00000c12e8780 [ 28.728117] which belongs to the cache kmalloc-64 of size 64 [ 28.729432] The buggy address is located 0 bytes to the right of [ 28.729432] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.730716] [ 28.731025] The buggy address belongs to the physical page: [ 28.731753] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.732598] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.733356] page_type: f5(slab) [ 28.733924] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.734744] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.735582] page dumped because: kasan: bad access detected [ 28.736206] [ 28.736548] Memory state around the buggy address: [ 28.737097] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.737960] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.738799] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.739588] ^ [ 28.740087] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.740424] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.740799] ================================================================== [ 29.282410] ================================================================== [ 29.283556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 29.284418] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.285254] [ 29.285630] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.286685] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.287279] Hardware name: linux,dummy-virt (DT) [ 29.287856] Call trace: [ 29.288305] show_stack+0x20/0x38 (C) [ 29.288933] dump_stack_lvl+0x8c/0xd0 [ 29.289523] print_report+0x118/0x5e0 [ 29.290107] kasan_report+0xc8/0x118 [ 29.290667] __asan_report_store8_noabort+0x20/0x30 [ 29.291347] kasan_atomics_helper+0x3e5c/0x4858 [ 29.291969] kasan_atomics+0x198/0x2e8 [ 29.292503] kunit_try_run_case+0x14c/0x3d0 [ 29.293188] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.293885] kthread+0x24c/0x2d0 [ 29.294404] ret_from_fork+0x10/0x20 [ 29.294985] [ 29.295331] Allocated by task 253: [ 29.295835] kasan_save_stack+0x3c/0x68 [ 29.296349] kasan_save_track+0x20/0x40 [ 29.296982] kasan_save_alloc_info+0x40/0x58 [ 29.297538] __kasan_kmalloc+0xd4/0xd8 [ 29.298089] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.298715] kasan_atomics+0xb8/0x2e8 [ 29.299234] kunit_try_run_case+0x14c/0x3d0 [ 29.299826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.300540] kthread+0x24c/0x2d0 [ 29.301058] ret_from_fork+0x10/0x20 [ 29.301581] [ 29.301934] The buggy address belongs to the object at fff00000c12e8780 [ 29.301934] which belongs to the cache kmalloc-64 of size 64 [ 29.303207] The buggy address is located 0 bytes to the right of [ 29.303207] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.304555] [ 29.304913] The buggy address belongs to the physical page: [ 29.305547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.306558] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.307276] page_type: f5(slab) [ 29.307844] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.308674] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.309576] page dumped because: kasan: bad access detected [ 29.310270] [ 29.310580] Memory state around the buggy address: [ 29.311135] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.311899] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.312735] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.313481] ^ [ 29.314095] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.314915] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.315688] ================================================================== [ 28.778604] ================================================================== [ 28.779354] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 28.780135] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.780816] [ 28.781219] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.782354] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.782863] Hardware name: linux,dummy-virt (DT) [ 28.783525] Call trace: [ 28.783956] show_stack+0x20/0x38 (C) [ 28.784490] dump_stack_lvl+0x8c/0xd0 [ 28.785064] print_report+0x118/0x5e0 [ 28.785721] kasan_report+0xc8/0x118 [ 28.786241] kasan_check_range+0x100/0x1a8 [ 28.786811] __kasan_check_write+0x20/0x30 [ 28.787416] kasan_atomics_helper+0xa6c/0x4858 [ 28.788076] kasan_atomics+0x198/0x2e8 [ 28.788662] kunit_try_run_case+0x14c/0x3d0 [ 28.789302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.790044] kthread+0x24c/0x2d0 [ 28.790560] ret_from_fork+0x10/0x20 [ 28.791122] [ 28.791472] Allocated by task 253: [ 28.791957] kasan_save_stack+0x3c/0x68 [ 28.792480] kasan_save_track+0x20/0x40 [ 28.793097] kasan_save_alloc_info+0x40/0x58 [ 28.793609] __kasan_kmalloc+0xd4/0xd8 [ 28.794218] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.794825] kasan_atomics+0xb8/0x2e8 [ 28.795351] kunit_try_run_case+0x14c/0x3d0 [ 28.795876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.796506] kthread+0x24c/0x2d0 [ 28.797096] ret_from_fork+0x10/0x20 [ 28.797647] [ 28.798042] The buggy address belongs to the object at fff00000c12e8780 [ 28.798042] which belongs to the cache kmalloc-64 of size 64 [ 28.799283] The buggy address is located 0 bytes to the right of [ 28.799283] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.800536] [ 28.800892] The buggy address belongs to the physical page: [ 28.801517] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.802470] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.803262] page_type: f5(slab) [ 28.803750] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.804593] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.805507] page dumped because: kasan: bad access detected [ 28.806175] [ 28.806497] Memory state around the buggy address: [ 28.807138] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.807925] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.808676] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.809485] ^ [ 28.810026] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.810364] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.810686] ================================================================== [ 29.997733] ================================================================== [ 29.998389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 29.999452] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 30.000480] [ 30.000859] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.002264] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.002642] Hardware name: linux,dummy-virt (DT) [ 30.003145] Call trace: [ 30.003615] show_stack+0x20/0x38 (C) [ 30.004185] dump_stack_lvl+0x8c/0xd0 [ 30.004771] print_report+0x118/0x5e0 [ 30.005368] kasan_report+0xc8/0x118 [ 30.005879] kasan_check_range+0x100/0x1a8 [ 30.006571] __kasan_check_write+0x20/0x30 [ 30.007278] kasan_atomics_helper+0x1644/0x4858 [ 30.007905] kasan_atomics+0x198/0x2e8 [ 30.008433] kunit_try_run_case+0x14c/0x3d0 [ 30.009134] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.009945] kthread+0x24c/0x2d0 [ 30.010488] ret_from_fork+0x10/0x20 [ 30.011089] [ 30.011439] Allocated by task 253: [ 30.011898] kasan_save_stack+0x3c/0x68 [ 30.012458] kasan_save_track+0x20/0x40 [ 30.013111] kasan_save_alloc_info+0x40/0x58 [ 30.013681] __kasan_kmalloc+0xd4/0xd8 [ 30.014259] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.014919] kasan_atomics+0xb8/0x2e8 [ 30.015469] kunit_try_run_case+0x14c/0x3d0 [ 30.016072] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.016804] kthread+0x24c/0x2d0 [ 30.017283] ret_from_fork+0x10/0x20 [ 30.017927] [ 30.018232] The buggy address belongs to the object at fff00000c12e8780 [ 30.018232] which belongs to the cache kmalloc-64 of size 64 [ 30.019379] The buggy address is located 0 bytes to the right of [ 30.019379] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 30.020468] [ 30.020850] The buggy address belongs to the physical page: [ 30.021585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 30.022457] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.023199] page_type: f5(slab) [ 30.023659] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.024525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.025403] page dumped because: kasan: bad access detected [ 30.026065] [ 30.026391] Memory state around the buggy address: [ 30.026918] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.027727] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.028456] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.029286] ^ [ 30.029865] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.030650] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.031406] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 27.581814] ================================================================== [ 27.582546] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 27.583466] Read of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249 [ 27.584202] [ 27.584560] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.585751] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.586289] Hardware name: linux,dummy-virt (DT) [ 27.586891] Call trace: [ 27.587224] show_stack+0x20/0x38 (C) [ 27.587820] dump_stack_lvl+0x8c/0xd0 [ 27.588409] print_report+0x118/0x5e0 [ 27.589095] kasan_report+0xc8/0x118 [ 27.589633] __asan_report_load8_noabort+0x20/0x30 [ 27.590271] kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 27.591005] kasan_bitops_generic+0x11c/0x1c8 [ 27.591548] kunit_try_run_case+0x14c/0x3d0 [ 27.592243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.592966] kthread+0x24c/0x2d0 [ 27.593508] ret_from_fork+0x10/0x20 [ 27.594079] [ 27.594389] Allocated by task 249: [ 27.594938] kasan_save_stack+0x3c/0x68 [ 27.595516] kasan_save_track+0x20/0x40 [ 27.596113] kasan_save_alloc_info+0x40/0x58 [ 27.596760] __kasan_kmalloc+0xd4/0xd8 [ 27.597289] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.597928] kasan_bitops_generic+0xa0/0x1c8 [ 27.598522] kunit_try_run_case+0x14c/0x3d0 [ 27.599096] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.599800] kthread+0x24c/0x2d0 [ 27.600252] ret_from_fork+0x10/0x20 [ 27.600853] [ 27.601219] The buggy address belongs to the object at fff00000c11118e0 [ 27.601219] which belongs to the cache kmalloc-16 of size 16 [ 27.602402] The buggy address is located 8 bytes inside of [ 27.602402] allocated 9-byte region [fff00000c11118e0, fff00000c11118e9) [ 27.603617] [ 27.603998] The buggy address belongs to the physical page: [ 27.604601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111 [ 27.605361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.606156] page_type: f5(slab) [ 27.606625] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.607374] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.608341] page dumped because: kasan: bad access detected [ 27.609031] [ 27.609365] Memory state around the buggy address: [ 27.609978] fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc [ 27.610817] fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.611566] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.612292] ^ [ 27.613048] fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.613937] fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.614741] ================================================================== [ 27.765033] ================================================================== [ 27.765664] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 27.766444] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249 [ 27.766890] [ 27.767303] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.768432] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.769067] Hardware name: linux,dummy-virt (DT) [ 27.769758] Call trace: [ 27.770198] show_stack+0x20/0x38 (C) [ 27.770802] dump_stack_lvl+0x8c/0xd0 [ 27.771446] print_report+0x118/0x5e0 [ 27.772110] kasan_report+0xc8/0x118 [ 27.772785] kasan_check_range+0x100/0x1a8 [ 27.773397] __kasan_check_write+0x20/0x30 [ 27.774116] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 27.774901] kasan_bitops_generic+0x11c/0x1c8 [ 27.775554] kunit_try_run_case+0x14c/0x3d0 [ 27.776186] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.776952] kthread+0x24c/0x2d0 [ 27.777516] ret_from_fork+0x10/0x20 [ 27.778136] [ 27.778491] Allocated by task 249: [ 27.778982] kasan_save_stack+0x3c/0x68 [ 27.779659] kasan_save_track+0x20/0x40 [ 27.780294] kasan_save_alloc_info+0x40/0x58 [ 27.780945] __kasan_kmalloc+0xd4/0xd8 [ 27.781528] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.782124] kasan_bitops_generic+0xa0/0x1c8 [ 27.782674] kunit_try_run_case+0x14c/0x3d0 [ 27.783348] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.784089] kthread+0x24c/0x2d0 [ 27.784641] ret_from_fork+0x10/0x20 [ 27.785233] [ 27.785570] The buggy address belongs to the object at fff00000c11118e0 [ 27.785570] which belongs to the cache kmalloc-16 of size 16 [ 27.786900] The buggy address is located 8 bytes inside of [ 27.786900] allocated 9-byte region [fff00000c11118e0, fff00000c11118e9) [ 27.788233] [ 27.788627] The buggy address belongs to the physical page: [ 27.789333] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111 [ 27.790265] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.791047] page_type: f5(slab) [ 27.791582] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.792501] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.793355] page dumped because: kasan: bad access detected [ 27.794047] [ 27.794410] Memory state around the buggy address: [ 27.795018] fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc [ 27.795953] fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.796805] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.797594] ^ [ 27.798368] fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.799198] fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.799987] ================================================================== [ 27.616115] ================================================================== [ 27.617063] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 27.618638] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249 [ 27.619459] [ 27.619787] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.620990] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.621866] Hardware name: linux,dummy-virt (DT) [ 27.622385] Call trace: [ 27.623166] show_stack+0x20/0x38 (C) [ 27.623571] dump_stack_lvl+0x8c/0xd0 [ 27.624282] print_report+0x118/0x5e0 [ 27.624981] kasan_report+0xc8/0x118 [ 27.625667] kasan_check_range+0x100/0x1a8 [ 27.626371] __kasan_check_write+0x20/0x30 [ 27.627088] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 27.627930] kasan_bitops_generic+0x11c/0x1c8 [ 27.628646] kunit_try_run_case+0x14c/0x3d0 [ 27.629387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.630204] kthread+0x24c/0x2d0 [ 27.630844] ret_from_fork+0x10/0x20 [ 27.631529] [ 27.632037] Allocated by task 249: [ 27.632512] kasan_save_stack+0x3c/0x68 [ 27.633045] kasan_save_track+0x20/0x40 [ 27.633613] kasan_save_alloc_info+0x40/0x58 [ 27.634168] __kasan_kmalloc+0xd4/0xd8 [ 27.634819] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.635433] kasan_bitops_generic+0xa0/0x1c8 [ 27.636168] kunit_try_run_case+0x14c/0x3d0 [ 27.636835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.637540] kthread+0x24c/0x2d0 [ 27.638097] ret_from_fork+0x10/0x20 [ 27.638680] [ 27.639066] The buggy address belongs to the object at fff00000c11118e0 [ 27.639066] which belongs to the cache kmalloc-16 of size 16 [ 27.640389] The buggy address is located 8 bytes inside of [ 27.640389] allocated 9-byte region [fff00000c11118e0, fff00000c11118e9) [ 27.641677] [ 27.642039] The buggy address belongs to the physical page: [ 27.642737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111 [ 27.643679] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.644465] page_type: f5(slab) [ 27.645018] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.645951] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.646789] page dumped because: kasan: bad access detected [ 27.647439] [ 27.647772] Memory state around the buggy address: [ 27.648424] fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc [ 27.649258] fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.650126] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.650956] ^ [ 27.651739] fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.652560] fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.653382] ================================================================== [ 27.801749] ================================================================== [ 27.803058] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 27.804743] Read of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249 [ 27.805597] [ 27.805967] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.807213] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.807807] Hardware name: linux,dummy-virt (DT) [ 27.808427] Call trace: [ 27.808879] show_stack+0x20/0x38 (C) [ 27.809468] dump_stack_lvl+0x8c/0xd0 [ 27.810071] print_report+0x118/0x5e0 [ 27.810661] kasan_report+0xc8/0x118 [ 27.811261] __asan_report_load8_noabort+0x20/0x30 [ 27.811945] kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 27.812739] kasan_bitops_generic+0x11c/0x1c8 [ 27.813372] kunit_try_run_case+0x14c/0x3d0 [ 27.814013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.814751] kthread+0x24c/0x2d0 [ 27.815298] ret_from_fork+0x10/0x20 [ 27.815907] [ 27.816273] Allocated by task 249: [ 27.816786] kasan_save_stack+0x3c/0x68 [ 27.817399] kasan_save_track+0x20/0x40 [ 27.818024] kasan_save_alloc_info+0x40/0x58 [ 27.818650] __kasan_kmalloc+0xd4/0xd8 [ 27.819240] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.819899] kasan_bitops_generic+0xa0/0x1c8 [ 27.820513] kunit_try_run_case+0x14c/0x3d0 [ 27.821139] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.821858] kthread+0x24c/0x2d0 [ 27.822399] ret_from_fork+0x10/0x20 [ 27.822996] [ 27.823345] The buggy address belongs to the object at fff00000c11118e0 [ 27.823345] which belongs to the cache kmalloc-16 of size 16 [ 27.824627] The buggy address is located 8 bytes inside of [ 27.824627] allocated 9-byte region [fff00000c11118e0, fff00000c11118e9) [ 27.825950] [ 27.826337] The buggy address belongs to the physical page: [ 27.827009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111 [ 27.827934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.828756] page_type: f5(slab) [ 27.829195] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.830116] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.830971] page dumped because: kasan: bad access detected [ 27.831654] [ 27.831994] Memory state around the buggy address: [ 27.832630] fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc [ 27.833552] fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.834365] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.835200] ^ [ 27.835993] fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.836819] fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.837604] ================================================================== [ 27.654616] ================================================================== [ 27.655801] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 27.657120] Read of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249 [ 27.657887] [ 27.658309] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.659447] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.660116] Hardware name: linux,dummy-virt (DT) [ 27.660920] Call trace: [ 27.661341] show_stack+0x20/0x38 (C) [ 27.662090] dump_stack_lvl+0x8c/0xd0 [ 27.662768] print_report+0x118/0x5e0 [ 27.663315] kasan_report+0xc8/0x118 [ 27.663769] __asan_report_load8_noabort+0x20/0x30 [ 27.664404] kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 27.665266] kasan_bitops_generic+0x11c/0x1c8 [ 27.665918] kunit_try_run_case+0x14c/0x3d0 [ 27.666568] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.667309] kthread+0x24c/0x2d0 [ 27.667878] ret_from_fork+0x10/0x20 [ 27.668473] [ 27.668868] Allocated by task 249: [ 27.669367] kasan_save_stack+0x3c/0x68 [ 27.669899] kasan_save_track+0x20/0x40 [ 27.670484] kasan_save_alloc_info+0x40/0x58 [ 27.671052] __kasan_kmalloc+0xd4/0xd8 [ 27.671616] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.672210] kasan_bitops_generic+0xa0/0x1c8 [ 27.672854] kunit_try_run_case+0x14c/0x3d0 [ 27.673482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.674131] kthread+0x24c/0x2d0 [ 27.674728] ret_from_fork+0x10/0x20 [ 27.675209] [ 27.675584] The buggy address belongs to the object at fff00000c11118e0 [ 27.675584] which belongs to the cache kmalloc-16 of size 16 [ 27.676867] The buggy address is located 8 bytes inside of [ 27.676867] allocated 9-byte region [fff00000c11118e0, fff00000c11118e9) [ 27.678060] [ 27.678386] The buggy address belongs to the physical page: [ 27.679001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111 [ 27.680008] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.680768] page_type: f5(slab) [ 27.681198] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.682056] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.682817] page dumped because: kasan: bad access detected [ 27.683375] [ 27.683763] Memory state around the buggy address: [ 27.684410] fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc [ 27.685304] fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.686008] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.686905] ^ [ 27.687639] fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.688434] fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.689158] ================================================================== [ 27.543264] ================================================================== [ 27.543908] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 27.544809] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249 [ 27.545854] [ 27.546210] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.548458] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.549103] Hardware name: linux,dummy-virt (DT) [ 27.549793] Call trace: [ 27.550322] show_stack+0x20/0x38 (C) [ 27.551206] dump_stack_lvl+0x8c/0xd0 [ 27.551730] print_report+0x118/0x5e0 [ 27.552423] kasan_report+0xc8/0x118 [ 27.552969] kasan_check_range+0x100/0x1a8 [ 27.553510] __kasan_check_write+0x20/0x30 [ 27.554054] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 27.554982] kasan_bitops_generic+0x11c/0x1c8 [ 27.555841] kunit_try_run_case+0x14c/0x3d0 [ 27.556457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.557351] kthread+0x24c/0x2d0 [ 27.557842] ret_from_fork+0x10/0x20 [ 27.558333] [ 27.558625] Allocated by task 249: [ 27.560084] kasan_save_stack+0x3c/0x68 [ 27.560541] kasan_save_track+0x20/0x40 [ 27.561100] kasan_save_alloc_info+0x40/0x58 [ 27.561646] __kasan_kmalloc+0xd4/0xd8 [ 27.562425] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.563433] kasan_bitops_generic+0xa0/0x1c8 [ 27.564131] kunit_try_run_case+0x14c/0x3d0 [ 27.564772] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.565442] kthread+0x24c/0x2d0 [ 27.565957] ret_from_fork+0x10/0x20 [ 27.566480] [ 27.566848] The buggy address belongs to the object at fff00000c11118e0 [ 27.566848] which belongs to the cache kmalloc-16 of size 16 [ 27.568129] The buggy address is located 8 bytes inside of [ 27.568129] allocated 9-byte region [fff00000c11118e0, fff00000c11118e9) [ 27.569332] [ 27.569673] The buggy address belongs to the physical page: [ 27.570334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111 [ 27.571247] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.571941] page_type: f5(slab) [ 27.572446] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.573300] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.574151] page dumped because: kasan: bad access detected [ 27.574783] [ 27.575101] Memory state around the buggy address: [ 27.575620] fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc [ 27.576530] fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.577316] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.578158] ^ [ 27.578894] fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.579626] fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.580456] ================================================================== [ 27.839407] ================================================================== [ 27.840064] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 27.841118] Read of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249 [ 27.842037] [ 27.842361] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.843792] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.844300] Hardware name: linux,dummy-virt (DT) [ 27.845068] Call trace: [ 27.845367] show_stack+0x20/0x38 (C) [ 27.846164] dump_stack_lvl+0x8c/0xd0 [ 27.846691] print_report+0x118/0x5e0 [ 27.847231] kasan_report+0xc8/0x118 [ 27.847981] __asan_report_load8_noabort+0x20/0x30 [ 27.848650] kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 27.849418] kasan_bitops_generic+0x11c/0x1c8 [ 27.849946] kunit_try_run_case+0x14c/0x3d0 [ 27.850542] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.851323] kthread+0x24c/0x2d0 [ 27.851911] ret_from_fork+0x10/0x20 [ 27.852502] [ 27.852885] Allocated by task 249: [ 27.853435] kasan_save_stack+0x3c/0x68 [ 27.854057] kasan_save_track+0x20/0x40 [ 27.854692] kasan_save_alloc_info+0x40/0x58 [ 27.855373] __kasan_kmalloc+0xd4/0xd8 [ 27.855961] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.856627] kasan_bitops_generic+0xa0/0x1c8 [ 27.857280] kunit_try_run_case+0x14c/0x3d0 [ 27.857912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.858643] kthread+0x24c/0x2d0 [ 27.859273] ret_from_fork+0x10/0x20 [ 27.859875] [ 27.860218] The buggy address belongs to the object at fff00000c11118e0 [ 27.860218] which belongs to the cache kmalloc-16 of size 16 [ 27.861539] The buggy address is located 8 bytes inside of [ 27.861539] allocated 9-byte region [fff00000c11118e0, fff00000c11118e9) [ 27.862899] [ 27.863294] The buggy address belongs to the physical page: [ 27.863928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111 [ 27.864934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.865759] page_type: f5(slab) [ 27.866293] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.867199] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.868047] page dumped because: kasan: bad access detected [ 27.868741] [ 27.869085] Memory state around the buggy address: [ 27.869733] fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc [ 27.870618] fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.871462] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.872276] ^ [ 27.873102] fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.873939] fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.874786] ================================================================== [ 27.690946] ================================================================== [ 27.691550] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 27.692629] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249 [ 27.693838] [ 27.694302] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.695507] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.696166] Hardware name: linux,dummy-virt (DT) [ 27.696873] Call trace: [ 27.697339] show_stack+0x20/0x38 (C) [ 27.697833] dump_stack_lvl+0x8c/0xd0 [ 27.698589] print_report+0x118/0x5e0 [ 27.699345] kasan_report+0xc8/0x118 [ 27.700033] kasan_check_range+0x100/0x1a8 [ 27.700769] __kasan_check_write+0x20/0x30 [ 27.701267] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 27.701921] kasan_bitops_generic+0x11c/0x1c8 [ 27.702456] kunit_try_run_case+0x14c/0x3d0 [ 27.703283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.704109] kthread+0x24c/0x2d0 [ 27.704782] ret_from_fork+0x10/0x20 [ 27.705294] [ 27.705577] Allocated by task 249: [ 27.706060] kasan_save_stack+0x3c/0x68 [ 27.706550] kasan_save_track+0x20/0x40 [ 27.707152] kasan_save_alloc_info+0x40/0x58 [ 27.707654] __kasan_kmalloc+0xd4/0xd8 [ 27.708282] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.708967] kasan_bitops_generic+0xa0/0x1c8 [ 27.709580] kunit_try_run_case+0x14c/0x3d0 [ 27.710220] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.710988] kthread+0x24c/0x2d0 [ 27.711588] ret_from_fork+0x10/0x20 [ 27.712113] [ 27.712460] The buggy address belongs to the object at fff00000c11118e0 [ 27.712460] which belongs to the cache kmalloc-16 of size 16 [ 27.713687] The buggy address is located 8 bytes inside of [ 27.713687] allocated 9-byte region [fff00000c11118e0, fff00000c11118e9) [ 27.715035] [ 27.715424] The buggy address belongs to the physical page: [ 27.716127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111 [ 27.717098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.717897] page_type: f5(slab) [ 27.718435] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.719337] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.720192] page dumped because: kasan: bad access detected [ 27.720878] [ 27.721203] Memory state around the buggy address: [ 27.721852] fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc [ 27.722769] fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.723589] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.724371] ^ [ 27.725155] fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.725993] fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.726793] ================================================================== [ 27.728378] ================================================================== [ 27.729047] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 27.730586] Read of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249 [ 27.732476] [ 27.732981] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.734180] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.734732] Hardware name: linux,dummy-virt (DT) [ 27.735302] Call trace: [ 27.735808] show_stack+0x20/0x38 (C) [ 27.736431] dump_stack_lvl+0x8c/0xd0 [ 27.737076] print_report+0x118/0x5e0 [ 27.737653] kasan_report+0xc8/0x118 [ 27.738256] __asan_report_load8_noabort+0x20/0x30 [ 27.738956] kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 27.739723] kasan_bitops_generic+0x11c/0x1c8 [ 27.740363] kunit_try_run_case+0x14c/0x3d0 [ 27.741005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.741770] kthread+0x24c/0x2d0 [ 27.742346] ret_from_fork+0x10/0x20 [ 27.742873] [ 27.743168] Allocated by task 249: [ 27.743730] kasan_save_stack+0x3c/0x68 [ 27.744282] kasan_save_track+0x20/0x40 [ 27.744833] kasan_save_alloc_info+0x40/0x58 [ 27.745388] __kasan_kmalloc+0xd4/0xd8 [ 27.745927] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.746511] kasan_bitops_generic+0xa0/0x1c8 [ 27.747147] kunit_try_run_case+0x14c/0x3d0 [ 27.747749] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.748510] kthread+0x24c/0x2d0 [ 27.749091] ret_from_fork+0x10/0x20 [ 27.749598] [ 27.749910] The buggy address belongs to the object at fff00000c11118e0 [ 27.749910] which belongs to the cache kmalloc-16 of size 16 [ 27.751050] The buggy address is located 8 bytes inside of [ 27.751050] allocated 9-byte region [fff00000c11118e0, fff00000c11118e9) [ 27.752049] [ 27.752416] The buggy address belongs to the physical page: [ 27.753216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111 [ 27.754091] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.754983] page_type: f5(slab) [ 27.755537] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.756332] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.757161] page dumped because: kasan: bad access detected [ 27.757859] [ 27.758165] Memory state around the buggy address: [ 27.758738] fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc [ 27.759513] fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.760223] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.761027] ^ [ 27.761815] fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.762572] fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.763315] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 27.421625] ================================================================== [ 27.422614] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 27.424227] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249 [ 27.425283] [ 27.425694] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.427546] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.428036] Hardware name: linux,dummy-virt (DT) [ 27.428574] Call trace: [ 27.428996] show_stack+0x20/0x38 (C) [ 27.429643] dump_stack_lvl+0x8c/0xd0 [ 27.430255] print_report+0x118/0x5e0 [ 27.430987] kasan_report+0xc8/0x118 [ 27.431475] kasan_check_range+0x100/0x1a8 [ 27.432218] __kasan_check_write+0x20/0x30 [ 27.433082] kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 27.433785] kasan_bitops_generic+0x110/0x1c8 [ 27.434414] kunit_try_run_case+0x14c/0x3d0 [ 27.435254] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.436351] kthread+0x24c/0x2d0 [ 27.437074] ret_from_fork+0x10/0x20 [ 27.437616] [ 27.437956] Allocated by task 249: [ 27.438533] kasan_save_stack+0x3c/0x68 [ 27.439156] kasan_save_track+0x20/0x40 [ 27.439952] kasan_save_alloc_info+0x40/0x58 [ 27.440676] __kasan_kmalloc+0xd4/0xd8 [ 27.441306] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.441978] kasan_bitops_generic+0xa0/0x1c8 [ 27.442717] kunit_try_run_case+0x14c/0x3d0 [ 27.443475] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.444314] kthread+0x24c/0x2d0 [ 27.445042] ret_from_fork+0x10/0x20 [ 27.445583] [ 27.445826] The buggy address belongs to the object at fff00000c11118e0 [ 27.445826] which belongs to the cache kmalloc-16 of size 16 [ 27.448147] The buggy address is located 8 bytes inside of [ 27.448147] allocated 9-byte region [fff00000c11118e0, fff00000c11118e9) [ 27.449212] [ 27.449430] The buggy address belongs to the physical page: [ 27.450479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111 [ 27.451564] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.452343] page_type: f5(slab) [ 27.453050] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.454066] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.455097] page dumped because: kasan: bad access detected [ 27.456012] [ 27.456294] Memory state around the buggy address: [ 27.456883] fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc [ 27.457669] fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.458362] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.459279] ^ [ 27.460815] fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.461600] fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.462326] ================================================================== [ 27.175431] ================================================================== [ 27.177090] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 27.177957] Read of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249 [ 27.179223] [ 27.179892] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.181076] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.181901] Hardware name: linux,dummy-virt (DT) [ 27.182446] Call trace: [ 27.182837] show_stack+0x20/0x38 (C) [ 27.183632] dump_stack_lvl+0x8c/0xd0 [ 27.184212] print_report+0x118/0x5e0 [ 27.185034] kasan_report+0xc8/0x118 [ 27.185742] __asan_report_load8_noabort+0x20/0x30 [ 27.186509] kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 27.187883] kasan_bitops_generic+0x110/0x1c8 [ 27.188501] kunit_try_run_case+0x14c/0x3d0 [ 27.189160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.189954] kthread+0x24c/0x2d0 [ 27.190584] ret_from_fork+0x10/0x20 [ 27.191415] [ 27.191917] Allocated by task 249: [ 27.192136] kasan_save_stack+0x3c/0x68 [ 27.192375] kasan_save_track+0x20/0x40 [ 27.192620] kasan_save_alloc_info+0x40/0x58 [ 27.193044] __kasan_kmalloc+0xd4/0xd8 [ 27.193833] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.194456] kasan_bitops_generic+0xa0/0x1c8 [ 27.195093] kunit_try_run_case+0x14c/0x3d0 [ 27.195753] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.196573] kthread+0x24c/0x2d0 [ 27.197631] ret_from_fork+0x10/0x20 [ 27.198366] [ 27.198736] The buggy address belongs to the object at fff00000c11118e0 [ 27.198736] which belongs to the cache kmalloc-16 of size 16 [ 27.200040] The buggy address is located 8 bytes inside of [ 27.200040] allocated 9-byte region [fff00000c11118e0, fff00000c11118e9) [ 27.201291] [ 27.201628] The buggy address belongs to the physical page: [ 27.202345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111 [ 27.203228] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.204096] page_type: f5(slab) [ 27.204596] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.205805] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.206800] page dumped because: kasan: bad access detected [ 27.207523] [ 27.207795] Memory state around the buggy address: [ 27.208564] fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc [ 27.209323] fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.210034] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.211041] ^ [ 27.212235] fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.213294] fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.214109] ================================================================== [ 27.463841] ================================================================== [ 27.464536] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 27.465416] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249 [ 27.466270] [ 27.466766] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.468017] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.468779] Hardware name: linux,dummy-virt (DT) [ 27.469460] Call trace: [ 27.469929] show_stack+0x20/0x38 (C) [ 27.470588] dump_stack_lvl+0x8c/0xd0 [ 27.471317] print_report+0x118/0x5e0 [ 27.472125] kasan_report+0xc8/0x118 [ 27.472874] kasan_check_range+0x100/0x1a8 [ 27.473818] __kasan_check_write+0x20/0x30 [ 27.474200] kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 27.474495] kasan_bitops_generic+0x110/0x1c8 [ 27.474825] kunit_try_run_case+0x14c/0x3d0 [ 27.475631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.476414] kthread+0x24c/0x2d0 [ 27.477100] ret_from_fork+0x10/0x20 [ 27.477810] [ 27.478265] Allocated by task 249: [ 27.479006] kasan_save_stack+0x3c/0x68 [ 27.479448] kasan_save_track+0x20/0x40 [ 27.480507] kasan_save_alloc_info+0x40/0x58 [ 27.481206] __kasan_kmalloc+0xd4/0xd8 [ 27.481894] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.482432] kasan_bitops_generic+0xa0/0x1c8 [ 27.483558] kunit_try_run_case+0x14c/0x3d0 [ 27.484056] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.484858] kthread+0x24c/0x2d0 [ 27.485421] ret_from_fork+0x10/0x20 [ 27.486126] [ 27.486408] The buggy address belongs to the object at fff00000c11118e0 [ 27.486408] which belongs to the cache kmalloc-16 of size 16 [ 27.488437] The buggy address is located 8 bytes inside of [ 27.488437] allocated 9-byte region [fff00000c11118e0, fff00000c11118e9) [ 27.489555] [ 27.489952] The buggy address belongs to the physical page: [ 27.490630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111 [ 27.491936] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.492720] page_type: f5(slab) [ 27.493191] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.494097] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.495183] page dumped because: kasan: bad access detected [ 27.495821] [ 27.496130] Memory state around the buggy address: [ 27.497323] fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc [ 27.498016] fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.498814] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.499904] ^ [ 27.500653] fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.501509] fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.502287] ================================================================== [ 27.296362] ================================================================== [ 27.297122] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 27.298548] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249 [ 27.299731] [ 27.300007] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.301607] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.302134] Hardware name: linux,dummy-virt (DT) [ 27.302713] Call trace: [ 27.303424] show_stack+0x20/0x38 (C) [ 27.303993] dump_stack_lvl+0x8c/0xd0 [ 27.304575] print_report+0x118/0x5e0 [ 27.305186] kasan_report+0xc8/0x118 [ 27.305745] kasan_check_range+0x100/0x1a8 [ 27.306302] __kasan_check_write+0x20/0x30 [ 27.307177] kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 27.307816] kasan_bitops_generic+0x110/0x1c8 [ 27.308480] kunit_try_run_case+0x14c/0x3d0 [ 27.309605] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.310328] kthread+0x24c/0x2d0 [ 27.311236] ret_from_fork+0x10/0x20 [ 27.311731] [ 27.312019] Allocated by task 249: [ 27.312536] kasan_save_stack+0x3c/0x68 [ 27.313086] kasan_save_track+0x20/0x40 [ 27.313632] kasan_save_alloc_info+0x40/0x58 [ 27.314179] __kasan_kmalloc+0xd4/0xd8 [ 27.315542] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.316030] kasan_bitops_generic+0xa0/0x1c8 [ 27.316596] kunit_try_run_case+0x14c/0x3d0 [ 27.317239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.317982] kthread+0x24c/0x2d0 [ 27.318489] ret_from_fork+0x10/0x20 [ 27.319029] [ 27.319369] The buggy address belongs to the object at fff00000c11118e0 [ 27.319369] which belongs to the cache kmalloc-16 of size 16 [ 27.320905] The buggy address is located 8 bytes inside of [ 27.320905] allocated 9-byte region [fff00000c11118e0, fff00000c11118e9) [ 27.322132] [ 27.322479] The buggy address belongs to the physical page: [ 27.323927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111 [ 27.324933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.325761] page_type: f5(slab) [ 27.326265] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.327222] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.328106] page dumped because: kasan: bad access detected [ 27.328801] [ 27.329154] Memory state around the buggy address: [ 27.329745] fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc [ 27.330550] fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.331641] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.332555] ^ [ 27.333315] fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.334069] fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.334884] ================================================================== [ 27.504468] ================================================================== [ 27.505226] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 27.505919] Read of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249 [ 27.506842] [ 27.507170] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.508407] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.509050] Hardware name: linux,dummy-virt (DT) [ 27.509635] Call trace: [ 27.510757] show_stack+0x20/0x38 (C) [ 27.511542] dump_stack_lvl+0x8c/0xd0 [ 27.512021] print_report+0x118/0x5e0 [ 27.512526] kasan_report+0xc8/0x118 [ 27.513318] __asan_report_load8_noabort+0x20/0x30 [ 27.514152] kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 27.514931] kasan_bitops_generic+0x110/0x1c8 [ 27.515496] kunit_try_run_case+0x14c/0x3d0 [ 27.515852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.516769] kthread+0x24c/0x2d0 [ 27.517227] ret_from_fork+0x10/0x20 [ 27.517772] [ 27.518152] Allocated by task 249: [ 27.518814] kasan_save_stack+0x3c/0x68 [ 27.519457] kasan_save_track+0x20/0x40 [ 27.520128] kasan_save_alloc_info+0x40/0x58 [ 27.520825] __kasan_kmalloc+0xd4/0xd8 [ 27.521495] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.522218] kasan_bitops_generic+0xa0/0x1c8 [ 27.522898] kunit_try_run_case+0x14c/0x3d0 [ 27.523555] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.524303] kthread+0x24c/0x2d0 [ 27.524913] ret_from_fork+0x10/0x20 [ 27.525537] [ 27.525972] The buggy address belongs to the object at fff00000c11118e0 [ 27.525972] which belongs to the cache kmalloc-16 of size 16 [ 27.527376] The buggy address is located 8 bytes inside of [ 27.527376] allocated 9-byte region [fff00000c11118e0, fff00000c11118e9) [ 27.528802] [ 27.529230] The buggy address belongs to the physical page: [ 27.529939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111 [ 27.530896] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.531725] page_type: f5(slab) [ 27.532284] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.533239] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.534013] page dumped because: kasan: bad access detected [ 27.534788] [ 27.535075] Memory state around the buggy address: [ 27.535646] fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc [ 27.536426] fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.537176] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.538026] ^ [ 27.538855] fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.539789] fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.540666] ================================================================== [ 27.215994] ================================================================== [ 27.217114] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 27.218058] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249 [ 27.219646] [ 27.220171] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.221411] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.221996] Hardware name: linux,dummy-virt (DT) [ 27.222755] Call trace: [ 27.223132] show_stack+0x20/0x38 (C) [ 27.223650] dump_stack_lvl+0x8c/0xd0 [ 27.224570] print_report+0x118/0x5e0 [ 27.225200] kasan_report+0xc8/0x118 [ 27.225791] kasan_check_range+0x100/0x1a8 [ 27.226432] __kasan_check_write+0x20/0x30 [ 27.227162] kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 27.227755] kasan_bitops_generic+0x110/0x1c8 [ 27.228432] kunit_try_run_case+0x14c/0x3d0 [ 27.229717] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.230474] kthread+0x24c/0x2d0 [ 27.231303] ret_from_fork+0x10/0x20 [ 27.231765] [ 27.232137] Allocated by task 249: [ 27.232682] kasan_save_stack+0x3c/0x68 [ 27.233328] kasan_save_track+0x20/0x40 [ 27.233942] kasan_save_alloc_info+0x40/0x58 [ 27.234627] __kasan_kmalloc+0xd4/0xd8 [ 27.235494] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.235963] kasan_bitops_generic+0xa0/0x1c8 [ 27.236854] kunit_try_run_case+0x14c/0x3d0 [ 27.237567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.238439] kthread+0x24c/0x2d0 [ 27.239136] ret_from_fork+0x10/0x20 [ 27.240025] [ 27.240264] The buggy address belongs to the object at fff00000c11118e0 [ 27.240264] which belongs to the cache kmalloc-16 of size 16 [ 27.241811] The buggy address is located 8 bytes inside of [ 27.241811] allocated 9-byte region [fff00000c11118e0, fff00000c11118e9) [ 27.243140] [ 27.243521] The buggy address belongs to the physical page: [ 27.244683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111 [ 27.245442] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.246282] page_type: f5(slab) [ 27.246502] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.247239] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.247995] page dumped because: kasan: bad access detected [ 27.248644] [ 27.249305] Memory state around the buggy address: [ 27.250004] fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc [ 27.250775] fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.251526] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.252687] ^ [ 27.253421] fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.254413] fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.255406] ================================================================== [ 27.256783] ================================================================== [ 27.258052] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 27.258892] Read of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249 [ 27.259615] [ 27.260759] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.261804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.262297] Hardware name: linux,dummy-virt (DT) [ 27.263056] Call trace: [ 27.263842] show_stack+0x20/0x38 (C) [ 27.264373] dump_stack_lvl+0x8c/0xd0 [ 27.264918] print_report+0x118/0x5e0 [ 27.265397] kasan_report+0xc8/0x118 [ 27.266052] __asan_report_load8_noabort+0x20/0x30 [ 27.266687] kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 27.267505] kasan_bitops_generic+0x110/0x1c8 [ 27.268128] kunit_try_run_case+0x14c/0x3d0 [ 27.268689] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.269957] kthread+0x24c/0x2d0 [ 27.270516] ret_from_fork+0x10/0x20 [ 27.271001] [ 27.271585] Allocated by task 249: [ 27.272060] kasan_save_stack+0x3c/0x68 [ 27.272788] kasan_save_track+0x20/0x40 [ 27.273320] kasan_save_alloc_info+0x40/0x58 [ 27.273878] __kasan_kmalloc+0xd4/0xd8 [ 27.274544] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.275241] kasan_bitops_generic+0xa0/0x1c8 [ 27.276021] kunit_try_run_case+0x14c/0x3d0 [ 27.276622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.277283] kthread+0x24c/0x2d0 [ 27.278056] ret_from_fork+0x10/0x20 [ 27.278531] [ 27.279331] The buggy address belongs to the object at fff00000c11118e0 [ 27.279331] which belongs to the cache kmalloc-16 of size 16 [ 27.280779] The buggy address is located 8 bytes inside of [ 27.280779] allocated 9-byte region [fff00000c11118e0, fff00000c11118e9) [ 27.282076] [ 27.282412] The buggy address belongs to the physical page: [ 27.283530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111 [ 27.284730] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.285472] page_type: f5(slab) [ 27.286043] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.287396] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.288224] page dumped because: kasan: bad access detected [ 27.288879] [ 27.289188] Memory state around the buggy address: [ 27.289764] fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc [ 27.290581] fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.291666] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.292471] ^ [ 27.293441] fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.293822] fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.294735] ================================================================== [ 27.379832] ================================================================== [ 27.380520] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 27.381778] Read of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249 [ 27.383316] [ 27.383745] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.384915] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.385540] Hardware name: linux,dummy-virt (DT) [ 27.386246] Call trace: [ 27.386747] show_stack+0x20/0x38 (C) [ 27.387440] dump_stack_lvl+0x8c/0xd0 [ 27.388041] print_report+0x118/0x5e0 [ 27.388724] kasan_report+0xc8/0x118 [ 27.389377] __asan_report_load8_noabort+0x20/0x30 [ 27.390267] kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 27.391644] kasan_bitops_generic+0x110/0x1c8 [ 27.392257] kunit_try_run_case+0x14c/0x3d0 [ 27.392826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.393885] kthread+0x24c/0x2d0 [ 27.394437] ret_from_fork+0x10/0x20 [ 27.394685] [ 27.395306] Allocated by task 249: [ 27.395673] kasan_save_stack+0x3c/0x68 [ 27.396516] kasan_save_track+0x20/0x40 [ 27.397179] kasan_save_alloc_info+0x40/0x58 [ 27.397797] __kasan_kmalloc+0xd4/0xd8 [ 27.398402] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.399154] kasan_bitops_generic+0xa0/0x1c8 [ 27.399961] kunit_try_run_case+0x14c/0x3d0 [ 27.400713] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.401529] kthread+0x24c/0x2d0 [ 27.402049] ret_from_fork+0x10/0x20 [ 27.402991] [ 27.403448] The buggy address belongs to the object at fff00000c11118e0 [ 27.403448] which belongs to the cache kmalloc-16 of size 16 [ 27.404938] The buggy address is located 8 bytes inside of [ 27.404938] allocated 9-byte region [fff00000c11118e0, fff00000c11118e9) [ 27.406399] [ 27.407340] The buggy address belongs to the physical page: [ 27.407899] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111 [ 27.408897] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.409778] page_type: f5(slab) [ 27.410403] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.411533] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.412691] page dumped because: kasan: bad access detected [ 27.413329] [ 27.413852] Memory state around the buggy address: [ 27.414559] fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc [ 27.415470] fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.416540] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.417436] ^ [ 27.418258] fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.419178] fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.420453] ================================================================== [ 27.336231] ================================================================== [ 27.337385] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 27.338228] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249 [ 27.339577] [ 27.339913] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.341033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.342005] Hardware name: linux,dummy-virt (DT) [ 27.342664] Call trace: [ 27.343220] show_stack+0x20/0x38 (C) [ 27.344249] dump_stack_lvl+0x8c/0xd0 [ 27.345007] print_report+0x118/0x5e0 [ 27.345608] kasan_report+0xc8/0x118 [ 27.346234] kasan_check_range+0x100/0x1a8 [ 27.346934] __kasan_check_write+0x20/0x30 [ 27.347588] kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 27.348308] kasan_bitops_generic+0x110/0x1c8 [ 27.349407] kunit_try_run_case+0x14c/0x3d0 [ 27.350027] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.350774] kthread+0x24c/0x2d0 [ 27.351492] ret_from_fork+0x10/0x20 [ 27.352230] [ 27.352561] Allocated by task 249: [ 27.353178] kasan_save_stack+0x3c/0x68 [ 27.353831] kasan_save_track+0x20/0x40 [ 27.354408] kasan_save_alloc_info+0x40/0x58 [ 27.355627] __kasan_kmalloc+0xd4/0xd8 [ 27.356184] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.356798] kasan_bitops_generic+0xa0/0x1c8 [ 27.357517] kunit_try_run_case+0x14c/0x3d0 [ 27.358148] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.358868] kthread+0x24c/0x2d0 [ 27.359370] ret_from_fork+0x10/0x20 [ 27.359968] [ 27.360301] The buggy address belongs to the object at fff00000c11118e0 [ 27.360301] which belongs to the cache kmalloc-16 of size 16 [ 27.361940] The buggy address is located 8 bytes inside of [ 27.361940] allocated 9-byte region [fff00000c11118e0, fff00000c11118e9) [ 27.363311] [ 27.364223] The buggy address belongs to the physical page: [ 27.365112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111 [ 27.366121] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.367279] page_type: f5(slab) [ 27.367723] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.368598] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.369525] page dumped because: kasan: bad access detected [ 27.370133] [ 27.370416] Memory state around the buggy address: [ 27.371827] fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc [ 27.372692] fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.373517] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.374503] ^ [ 27.375574] fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.376342] fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.377077] ================================================================== [ 27.134544] ================================================================== [ 27.135784] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 27.137489] Write of size 8 at addr fff00000c11118e8 by task kunit_try_catch/249 [ 27.138264] [ 27.138620] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.140009] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.140500] Hardware name: linux,dummy-virt (DT) [ 27.141128] Call trace: [ 27.141850] show_stack+0x20/0x38 (C) [ 27.142562] dump_stack_lvl+0x8c/0xd0 [ 27.143363] print_report+0x118/0x5e0 [ 27.144120] kasan_report+0xc8/0x118 [ 27.144736] kasan_check_range+0x100/0x1a8 [ 27.145339] __kasan_check_write+0x20/0x30 [ 27.145912] kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 27.146759] kasan_bitops_generic+0x110/0x1c8 [ 27.147571] kunit_try_run_case+0x14c/0x3d0 [ 27.148330] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.149068] kthread+0x24c/0x2d0 [ 27.149608] ret_from_fork+0x10/0x20 [ 27.150261] [ 27.150647] Allocated by task 249: [ 27.151648] kasan_save_stack+0x3c/0x68 [ 27.152250] kasan_save_track+0x20/0x40 [ 27.152791] kasan_save_alloc_info+0x40/0x58 [ 27.153387] __kasan_kmalloc+0xd4/0xd8 [ 27.153986] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.154557] kasan_bitops_generic+0xa0/0x1c8 [ 27.155260] kunit_try_run_case+0x14c/0x3d0 [ 27.155986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.156717] kthread+0x24c/0x2d0 [ 27.157263] ret_from_fork+0x10/0x20 [ 27.157955] [ 27.158278] The buggy address belongs to the object at fff00000c11118e0 [ 27.158278] which belongs to the cache kmalloc-16 of size 16 [ 27.159738] The buggy address is located 8 bytes inside of [ 27.159738] allocated 9-byte region [fff00000c11118e0, fff00000c11118e9) [ 27.160913] [ 27.161218] The buggy address belongs to the physical page: [ 27.161872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101111 [ 27.162763] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.163541] page_type: f5(slab) [ 27.164523] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.165523] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 27.166472] page dumped because: kasan: bad access detected [ 27.167561] [ 27.167743] Memory state around the buggy address: [ 27.168396] fff00000c1111780: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc [ 27.169341] fff00000c1111800: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 27.170256] >fff00000c1111880: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 27.171169] ^ [ 27.172221] fff00000c1111900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.173130] fff00000c1111980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.173987] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 24.872837] ================================================================== [ 24.873522] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750 [ 24.874329] Read of size 1 at addr fff00000c63a3278 by task kunit_try_catch/182 [ 24.876189] [ 24.876514] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 24.877550] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.878252] Hardware name: linux,dummy-virt (DT) [ 24.879054] Call trace: [ 24.879399] show_stack+0x20/0x38 (C) [ 24.880023] dump_stack_lvl+0x8c/0xd0 [ 24.880562] print_report+0x118/0x5e0 [ 24.881130] kasan_report+0xc8/0x118 [ 24.881642] __asan_report_load1_noabort+0x20/0x30 [ 24.882274] ksize_unpoisons_memory+0x628/0x750 [ 24.883156] kunit_try_run_case+0x14c/0x3d0 [ 24.883938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.884729] kthread+0x24c/0x2d0 [ 24.885241] ret_from_fork+0x10/0x20 [ 24.885885] [ 24.886232] Allocated by task 182: [ 24.886725] kasan_save_stack+0x3c/0x68 [ 24.887558] kasan_save_track+0x20/0x40 [ 24.888169] kasan_save_alloc_info+0x40/0x58 [ 24.888844] __kasan_kmalloc+0xd4/0xd8 [ 24.889358] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.889892] ksize_unpoisons_memory+0xc0/0x750 [ 24.890448] kunit_try_run_case+0x14c/0x3d0 [ 24.891345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.892025] kthread+0x24c/0x2d0 [ 24.892512] ret_from_fork+0x10/0x20 [ 24.893042] [ 24.893371] The buggy address belongs to the object at fff00000c63a3200 [ 24.893371] which belongs to the cache kmalloc-128 of size 128 [ 24.894610] The buggy address is located 5 bytes to the right of [ 24.894610] allocated 115-byte region [fff00000c63a3200, fff00000c63a3273) [ 24.896306] [ 24.896849] The buggy address belongs to the physical page: [ 24.897571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063a3 [ 24.898459] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.899306] page_type: f5(slab) [ 24.899770] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.900632] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.901524] page dumped because: kasan: bad access detected [ 24.902197] [ 24.902487] Memory state around the buggy address: [ 24.903282] fff00000c63a3100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 24.904060] fff00000c63a3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.904860] >fff00000c63a3200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.905639] ^ [ 24.906459] fff00000c63a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.907501] fff00000c63a3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.908260] ================================================================== [ 24.836191] ================================================================== [ 24.837333] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750 [ 24.838289] Read of size 1 at addr fff00000c63a3273 by task kunit_try_catch/182 [ 24.839186] [ 24.839921] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 24.841094] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.841497] Hardware name: linux,dummy-virt (DT) [ 24.841939] Call trace: [ 24.842219] show_stack+0x20/0x38 (C) [ 24.842612] dump_stack_lvl+0x8c/0xd0 [ 24.843219] print_report+0x118/0x5e0 [ 24.843892] kasan_report+0xc8/0x118 [ 24.844645] __asan_report_load1_noabort+0x20/0x30 [ 24.845186] ksize_unpoisons_memory+0x638/0x750 [ 24.845980] kunit_try_run_case+0x14c/0x3d0 [ 24.846753] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.847991] kthread+0x24c/0x2d0 [ 24.848551] ret_from_fork+0x10/0x20 [ 24.849148] [ 24.849503] Allocated by task 182: [ 24.850132] kasan_save_stack+0x3c/0x68 [ 24.850855] kasan_save_track+0x20/0x40 [ 24.851689] kasan_save_alloc_info+0x40/0x58 [ 24.852351] __kasan_kmalloc+0xd4/0xd8 [ 24.853027] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.853667] ksize_unpoisons_memory+0xc0/0x750 [ 24.854310] kunit_try_run_case+0x14c/0x3d0 [ 24.855181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.855858] kthread+0x24c/0x2d0 [ 24.856352] ret_from_fork+0x10/0x20 [ 24.856886] [ 24.857230] The buggy address belongs to the object at fff00000c63a3200 [ 24.857230] which belongs to the cache kmalloc-128 of size 128 [ 24.858429] The buggy address is located 0 bytes to the right of [ 24.858429] allocated 115-byte region [fff00000c63a3200, fff00000c63a3273) [ 24.860488] [ 24.860767] The buggy address belongs to the physical page: [ 24.861097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063a3 [ 24.861460] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.861901] page_type: f5(slab) [ 24.862369] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.863085] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.864202] page dumped because: kasan: bad access detected [ 24.865006] [ 24.865324] Memory state around the buggy address: [ 24.866101] fff00000c63a3100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 24.867106] fff00000c63a3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.867876] >fff00000c63a3200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.868544] ^ [ 24.869404] fff00000c63a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.870285] fff00000c63a3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.871383] ================================================================== [ 24.909393] ================================================================== [ 24.910158] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750 [ 24.912040] Read of size 1 at addr fff00000c63a327f by task kunit_try_catch/182 [ 24.912824] [ 24.913112] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 24.914375] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.915080] Hardware name: linux,dummy-virt (DT) [ 24.915755] Call trace: [ 24.916157] show_stack+0x20/0x38 (C) [ 24.916789] dump_stack_lvl+0x8c/0xd0 [ 24.917358] print_report+0x118/0x5e0 [ 24.917936] kasan_report+0xc8/0x118 [ 24.918527] __asan_report_load1_noabort+0x20/0x30 [ 24.919403] ksize_unpoisons_memory+0x6a0/0x750 [ 24.920048] kunit_try_run_case+0x14c/0x3d0 [ 24.920633] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.921445] kthread+0x24c/0x2d0 [ 24.922118] ret_from_fork+0x10/0x20 [ 24.922653] [ 24.923270] Allocated by task 182: [ 24.923761] kasan_save_stack+0x3c/0x68 [ 24.924308] kasan_save_track+0x20/0x40 [ 24.924888] kasan_save_alloc_info+0x40/0x58 [ 24.925539] __kasan_kmalloc+0xd4/0xd8 [ 24.926033] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.926752] ksize_unpoisons_memory+0xc0/0x750 [ 24.927577] kunit_try_run_case+0x14c/0x3d0 [ 24.928173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.928863] kthread+0x24c/0x2d0 [ 24.929350] ret_from_fork+0x10/0x20 [ 24.929842] [ 24.930191] The buggy address belongs to the object at fff00000c63a3200 [ 24.930191] which belongs to the cache kmalloc-128 of size 128 [ 24.931405] The buggy address is located 12 bytes to the right of [ 24.931405] allocated 115-byte region [fff00000c63a3200, fff00000c63a3273) [ 24.933278] [ 24.933619] The buggy address belongs to the physical page: [ 24.934231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063a3 [ 24.935052] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.935905] page_type: f5(slab) [ 24.936363] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.937510] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.938262] page dumped because: kasan: bad access detected [ 24.939057] [ 24.939407] Memory state around the buggy address: [ 24.939969] fff00000c63a3100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 24.940712] fff00000c63a3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.941451] >fff00000c63a3200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 24.942292] ^ [ 24.943174] fff00000c63a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.944156] fff00000c63a3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.944871] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 27.080969] ================================================================== [ 27.081625] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 27.082201] Read of size 1 at addr fff00000c1204c50 by task kunit_try_catch/247 [ 27.082872] [ 27.083213] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.084325] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.085083] Hardware name: linux,dummy-virt (DT) [ 27.085674] Call trace: [ 27.086158] show_stack+0x20/0x38 (C) [ 27.086678] dump_stack_lvl+0x8c/0xd0 [ 27.088116] print_report+0x118/0x5e0 [ 27.088716] kasan_report+0xc8/0x118 [ 27.089268] __asan_report_load1_noabort+0x20/0x30 [ 27.089999] strnlen+0x80/0x88 [ 27.090560] kasan_strings+0x364/0x8d8 [ 27.091184] kunit_try_run_case+0x14c/0x3d0 [ 27.091656] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.092417] kthread+0x24c/0x2d0 [ 27.093165] ret_from_fork+0x10/0x20 [ 27.093713] [ 27.094033] Allocated by task 247: [ 27.094572] kasan_save_stack+0x3c/0x68 [ 27.095194] kasan_save_track+0x20/0x40 [ 27.096489] kasan_save_alloc_info+0x40/0x58 [ 27.097083] __kasan_kmalloc+0xd4/0xd8 [ 27.097595] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.098205] kasan_strings+0xb0/0x8d8 [ 27.098771] kunit_try_run_case+0x14c/0x3d0 [ 27.099366] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.100233] kthread+0x24c/0x2d0 [ 27.100788] ret_from_fork+0x10/0x20 [ 27.101327] [ 27.101687] Freed by task 247: [ 27.102160] kasan_save_stack+0x3c/0x68 [ 27.102839] kasan_save_track+0x20/0x40 [ 27.104142] kasan_save_free_info+0x4c/0x78 [ 27.104741] __kasan_slab_free+0x6c/0x98 [ 27.105296] kfree+0x114/0x3c8 [ 27.105985] kasan_strings+0x124/0x8d8 [ 27.106460] kunit_try_run_case+0x14c/0x3d0 [ 27.107106] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.108100] kthread+0x24c/0x2d0 [ 27.108615] ret_from_fork+0x10/0x20 [ 27.109160] [ 27.109515] The buggy address belongs to the object at fff00000c1204c40 [ 27.109515] which belongs to the cache kmalloc-32 of size 32 [ 27.110817] The buggy address is located 16 bytes inside of [ 27.110817] freed 32-byte region [fff00000c1204c40, fff00000c1204c60) [ 27.112670] [ 27.112988] The buggy address belongs to the physical page: [ 27.113682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101204 [ 27.114620] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.115793] page_type: f5(slab) [ 27.116262] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 27.117124] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 27.117958] page dumped because: kasan: bad access detected [ 27.118615] [ 27.119646] Memory state around the buggy address: [ 27.120243] fff00000c1204b00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 27.121122] fff00000c1204b80: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc [ 27.121920] >fff00000c1204c00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 27.122718] ^ [ 27.123357] fff00000c1204c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 27.124306] fff00000c1204d00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 27.125235] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[ 27.030890] ================================================================== [ 27.032777] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 27.033332] Read of size 1 at addr fff00000c1204c50 by task kunit_try_catch/247 [ 27.034615] [ 27.035048] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.036226] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.037123] Hardware name: linux,dummy-virt (DT) [ 27.037812] Call trace: [ 27.038170] show_stack+0x20/0x38 (C) [ 27.038652] dump_stack_lvl+0x8c/0xd0 [ 27.039529] print_report+0x118/0x5e0 [ 27.040176] kasan_report+0xc8/0x118 [ 27.041047] __asan_report_load1_noabort+0x20/0x30 [ 27.041997] strlen+0xa8/0xb0 [ 27.042758] kasan_strings+0x304/0x8d8 [ 27.043562] kunit_try_run_case+0x14c/0x3d0 [ 27.044304] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.045151] kthread+0x24c/0x2d0 [ 27.045678] ret_from_fork+0x10/0x20 [ 27.046447] [ 27.046778] Allocated by task 247: [ 27.047725] kasan_save_stack+0x3c/0x68 [ 27.048252] kasan_save_track+0x20/0x40 [ 27.048768] kasan_save_alloc_info+0x40/0x58 [ 27.049292] __kasan_kmalloc+0xd4/0xd8 [ 27.050328] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.051529] kasan_strings+0xb0/0x8d8 [ 27.052034] kunit_try_run_case+0x14c/0x3d0 [ 27.052672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.053409] kthread+0x24c/0x2d0 [ 27.053954] ret_from_fork+0x10/0x20 [ 27.054433] [ 27.054752] Freed by task 247: [ 27.055893] kasan_save_stack+0x3c/0x68 [ 27.056482] kasan_save_track+0x20/0x40 [ 27.057037] kasan_save_free_info+0x4c/0x78 [ 27.057611] __kasan_slab_free+0x6c/0x98 [ 27.058162] kfree+0x114/0x3c8 [ 27.058616] kasan_strings+0x124/0x8d8 [ 27.059196] kunit_try_run_case+0x14c/0x3d0 [ 27.060256] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.060982] kthread+0x24c/0x2d0 [ 27.061486] ret_from_fork+0x10/0x20 [ 27.062015] [ 27.062392] The buggy address belongs to the object at fff00000c1204c40 [ 27.062392] which belongs to the cache kmalloc-32 of size 32 [ 27.064116] The buggy address is located 16 bytes inside of [ 27.064116] freed 32-byte region [fff00000c1204c40, fff00000c1204c60) [ 27.065177] [ 27.065515] The buggy address belongs to the physical page: [ 27.066653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101204 [ 27.067881] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.068774] page_type: f5(slab) [ 27.069382] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 27.070330] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 27.071077] page dumped because: kasan: bad access detected [ 27.071692] [ 27.072770] Memory state around the buggy address: [ 27.073453] fff00000c1204b00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 27.074456] fff00000c1204b80: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc [ 27.075734] >fff00000c1204c00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 27.076437] ^ [ 27.077196] fff00000c1204c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 27.077976] fff00000c1204d00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 27.078731] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 26.986058] ================================================================== [ 26.986659] BUG: KASAN: slab-use-after-free in kasan_strings+0x838/0x8d8 [ 26.988048] Read of size 1 at addr fff00000c1204c50 by task kunit_try_catch/247 [ 26.988768] [ 26.989110] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 26.990173] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.990652] Hardware name: linux,dummy-virt (DT) [ 26.991673] Call trace: [ 26.992042] show_stack+0x20/0x38 (C) [ 26.992580] dump_stack_lvl+0x8c/0xd0 [ 26.993380] print_report+0x118/0x5e0 [ 26.993967] kasan_report+0xc8/0x118 [ 26.994474] __asan_report_load1_noabort+0x20/0x30 [ 26.995338] kasan_strings+0x838/0x8d8 [ 26.996034] kunit_try_run_case+0x14c/0x3d0 [ 26.996809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.997113] kthread+0x24c/0x2d0 [ 26.997341] ret_from_fork+0x10/0x20 [ 26.997579] [ 26.997755] Allocated by task 247: [ 26.998086] kasan_save_stack+0x3c/0x68 [ 26.998749] kasan_save_track+0x20/0x40 [ 26.999580] kasan_save_alloc_info+0x40/0x58 [ 27.000792] __kasan_kmalloc+0xd4/0xd8 [ 27.001863] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.002625] kasan_strings+0xb0/0x8d8 [ 27.003384] kunit_try_run_case+0x14c/0x3d0 [ 27.004007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.004959] kthread+0x24c/0x2d0 [ 27.005439] ret_from_fork+0x10/0x20 [ 27.005892] [ 27.006264] Freed by task 247: [ 27.006738] kasan_save_stack+0x3c/0x68 [ 27.007631] kasan_save_track+0x20/0x40 [ 27.008588] kasan_save_free_info+0x4c/0x78 [ 27.009146] __kasan_slab_free+0x6c/0x98 [ 27.009640] kfree+0x114/0x3c8 [ 27.010109] kasan_strings+0x124/0x8d8 [ 27.010609] kunit_try_run_case+0x14c/0x3d0 [ 27.011681] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.012365] kthread+0x24c/0x2d0 [ 27.012849] ret_from_fork+0x10/0x20 [ 27.013416] [ 27.013720] The buggy address belongs to the object at fff00000c1204c40 [ 27.013720] which belongs to the cache kmalloc-32 of size 32 [ 27.014906] The buggy address is located 16 bytes inside of [ 27.014906] freed 32-byte region [fff00000c1204c40, fff00000c1204c60) [ 27.016931] [ 27.017250] The buggy address belongs to the physical page: [ 27.017878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101204 [ 27.018805] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.019508] page_type: f5(slab) [ 27.020018] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 27.021119] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 27.022019] page dumped because: kasan: bad access detected [ 27.022716] [ 27.023054] Memory state around the buggy address: [ 27.024314] fff00000c1204b00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 27.025171] fff00000c1204b80: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc [ 27.025899] >fff00000c1204c00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 27.026731] ^ [ 27.027593] fff00000c1204c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 27.028412] fff00000c1204d00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 27.029366] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 26.938403] ================================================================== [ 26.940726] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 26.941254] Read of size 1 at addr fff00000c1204c50 by task kunit_try_catch/247 [ 26.941929] [ 26.942523] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 26.943633] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.944279] Hardware name: linux,dummy-virt (DT) [ 26.945564] Call trace: [ 26.946368] show_stack+0x20/0x38 (C) [ 26.947327] dump_stack_lvl+0x8c/0xd0 [ 26.947858] print_report+0x118/0x5e0 [ 26.948426] kasan_report+0xc8/0x118 [ 26.949113] __asan_report_load1_noabort+0x20/0x30 [ 26.949828] strcmp+0xc0/0xc8 [ 26.950358] kasan_strings+0x228/0x8d8 [ 26.951576] kunit_try_run_case+0x14c/0x3d0 [ 26.952240] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.952962] kthread+0x24c/0x2d0 [ 26.953511] ret_from_fork+0x10/0x20 [ 26.954122] [ 26.954449] Allocated by task 247: [ 26.955050] kasan_save_stack+0x3c/0x68 [ 26.955819] kasan_save_track+0x20/0x40 [ 26.956590] kasan_save_alloc_info+0x40/0x58 [ 26.957215] __kasan_kmalloc+0xd4/0xd8 [ 26.957740] __kmalloc_cache_noprof+0x15c/0x3c0 [ 26.958424] kasan_strings+0xb0/0x8d8 [ 26.959077] kunit_try_run_case+0x14c/0x3d0 [ 26.960322] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.960647] kthread+0x24c/0x2d0 [ 26.961346] ret_from_fork+0x10/0x20 [ 26.961976] [ 26.962341] Freed by task 247: [ 26.962905] kasan_save_stack+0x3c/0x68 [ 26.963556] kasan_save_track+0x20/0x40 [ 26.964403] kasan_save_free_info+0x4c/0x78 [ 26.964946] __kasan_slab_free+0x6c/0x98 [ 26.965435] kfree+0x114/0x3c8 [ 26.965887] kasan_strings+0x124/0x8d8 [ 26.966381] kunit_try_run_case+0x14c/0x3d0 [ 26.967108] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.968244] kthread+0x24c/0x2d0 [ 26.968640] ret_from_fork+0x10/0x20 [ 26.969133] [ 26.969486] The buggy address belongs to the object at fff00000c1204c40 [ 26.969486] which belongs to the cache kmalloc-32 of size 32 [ 26.970635] The buggy address is located 16 bytes inside of [ 26.970635] freed 32-byte region [fff00000c1204c40, fff00000c1204c60) [ 26.971854] [ 26.972151] The buggy address belongs to the physical page: [ 26.973169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101204 [ 26.974133] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.975251] page_type: f5(slab) [ 26.975950] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 26.977007] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 26.977815] page dumped because: kasan: bad access detected [ 26.978471] [ 26.978796] Memory state around the buggy address: [ 26.979675] fff00000c1204b00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 26.980424] fff00000c1204b80: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc [ 26.981155] >fff00000c1204c00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 26.981997] ^ [ 26.982679] fff00000c1204c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 26.983722] fff00000c1204d00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 26.984460] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 26.877071] ================================================================== [ 26.878180] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2e4/0x348 [ 26.879429] Read of size 1 at addr ffff800080b77bea by task kunit_try_catch/241 [ 26.880846] [ 26.881158] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 26.882510] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.883161] Hardware name: linux,dummy-virt (DT) [ 26.883813] Call trace: [ 26.884286] show_stack+0x20/0x38 (C) [ 26.884939] dump_stack_lvl+0x8c/0xd0 [ 26.885581] print_report+0x2fc/0x5e0 [ 26.886244] kasan_report+0xc8/0x118 [ 26.886881] __asan_report_load1_noabort+0x20/0x30 [ 26.887637] kasan_alloca_oob_right+0x2e4/0x348 [ 26.888340] kunit_try_run_case+0x14c/0x3d0 [ 26.889046] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.889856] kthread+0x24c/0x2d0 [ 26.890300] ret_from_fork+0x10/0x20 [ 26.890789] [ 26.891076] The buggy address belongs to stack of task kunit_try_catch/241 [ 26.891882] [ 26.892172] The buggy address belongs to the virtual mapping at [ 26.892172] [ffff800080b70000, ffff800080b79000) created by: [ 26.892172] kernel_clone+0x140/0x788 [ 26.894184] [ 26.894578] The buggy address belongs to the physical page: [ 26.895341] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e6 [ 26.896398] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.897304] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 26.898260] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 26.899160] page dumped because: kasan: bad access detected [ 26.899886] [ 26.900320] Memory state around the buggy address: [ 26.901023] ffff800080b77a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.901876] ffff800080b77b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.902739] >ffff800080b77b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 26.903558] ^ [ 26.904343] ffff800080b77c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 [ 26.905241] ffff800080b77c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 [ 26.906084] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 26.842155] ================================================================== [ 26.843615] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 26.844365] Read of size 1 at addr ffff800080b57bdf by task kunit_try_catch/239 [ 26.845034] [ 26.845267] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 26.846102] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.846767] Hardware name: linux,dummy-virt (DT) [ 26.847475] Call trace: [ 26.848589] show_stack+0x20/0x38 (C) [ 26.849104] dump_stack_lvl+0x8c/0xd0 [ 26.849727] print_report+0x2fc/0x5e0 [ 26.850233] kasan_report+0xc8/0x118 [ 26.851082] __asan_report_load1_noabort+0x20/0x30 [ 26.851801] kasan_alloca_oob_left+0x2b8/0x310 [ 26.852385] kunit_try_run_case+0x14c/0x3d0 [ 26.853037] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.853744] kthread+0x24c/0x2d0 [ 26.854268] ret_from_fork+0x10/0x20 [ 26.855005] [ 26.855401] The buggy address belongs to stack of task kunit_try_catch/239 [ 26.856154] [ 26.856515] The buggy address belongs to the virtual mapping at [ 26.856515] [ffff800080b50000, ffff800080b59000) created by: [ 26.856515] kernel_clone+0x140/0x788 [ 26.858018] [ 26.858358] The buggy address belongs to the physical page: [ 26.859159] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012d1 [ 26.860016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.860869] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 26.861733] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 26.862553] page dumped because: kasan: bad access detected [ 26.863387] [ 26.863815] Memory state around the buggy address: [ 26.864403] ffff800080b57a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.865145] ffff800080b57b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.865980] >ffff800080b57b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 26.866627] ^ [ 26.868069] ffff800080b57c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 [ 26.868682] ffff800080b57c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 [ 26.869392] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 26.796593] ================================================================== [ 26.798312] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x230/0x268 [ 26.800045] Read of size 1 at addr ffff800080b37cba by task kunit_try_catch/237 [ 26.800764] [ 26.801107] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 26.802261] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.802888] Hardware name: linux,dummy-virt (DT) [ 26.803541] Call trace: [ 26.803939] show_stack+0x20/0x38 (C) [ 26.804572] dump_stack_lvl+0x8c/0xd0 [ 26.805434] print_report+0x2fc/0x5e0 [ 26.806088] kasan_report+0xc8/0x118 [ 26.806713] __asan_report_load1_noabort+0x20/0x30 [ 26.807387] kasan_stack_oob+0x230/0x268 [ 26.808071] kunit_try_run_case+0x14c/0x3d0 [ 26.808856] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.809602] kthread+0x24c/0x2d0 [ 26.810228] ret_from_fork+0x10/0x20 [ 26.811123] [ 26.811456] The buggy address belongs to stack of task kunit_try_catch/237 [ 26.812399] and is located at offset 138 in frame: [ 26.813102] kasan_stack_oob+0x0/0x268 [ 26.813935] [ 26.814252] This frame has 4 objects: [ 26.815188] [48, 49) '__assertion' [ 26.815289] [64, 72) 'array' [ 26.815691] [96, 112) '__assertion' [ 26.816227] [128, 138) 'stack_array' [ 26.816886] [ 26.817650] The buggy address belongs to the virtual mapping at [ 26.817650] [ffff800080b30000, ffff800080b39000) created by: [ 26.817650] kernel_clone+0x140/0x788 [ 26.820087] [ 26.820478] The buggy address belongs to the physical page: [ 26.821187] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012bd [ 26.822181] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.823494] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 26.824321] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 26.825286] page dumped because: kasan: bad access detected [ 26.826000] [ 26.826328] Memory state around the buggy address: [ 26.827055] ffff800080b37b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.828095] ffff800080b37c00: 00 00 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 [ 26.829022] >ffff800080b37c80: f2 f2 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 [ 26.829828] ^ [ 26.830527] ffff800080b37d00: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 [ 26.831545] ffff800080b37d80: f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 [ 26.832361] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 26.752751] ================================================================== [ 26.753839] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 26.754525] Read of size 1 at addr ffffa2c369d21fed by task kunit_try_catch/233 [ 26.755370] [ 26.755772] CPU: 1 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 26.757093] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.757653] Hardware name: linux,dummy-virt (DT) [ 26.758229] Call trace: [ 26.758646] show_stack+0x20/0x38 (C) [ 26.759649] dump_stack_lvl+0x8c/0xd0 [ 26.760277] print_report+0x2fc/0x5e0 [ 26.760878] kasan_report+0xc8/0x118 [ 26.761350] __asan_report_load1_noabort+0x20/0x30 [ 26.762103] kasan_global_oob_right+0x230/0x270 [ 26.762732] kunit_try_run_case+0x14c/0x3d0 [ 26.763562] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.764266] kthread+0x24c/0x2d0 [ 26.764806] ret_from_fork+0x10/0x20 [ 26.765339] [ 26.765766] The buggy address belongs to the variable: [ 26.766326] global_array+0xd/0x40 [ 26.767315] [ 26.767823] The buggy address belongs to the virtual mapping at [ 26.767823] [ffffa2c368050000, ffffa2c369dd1000) created by: [ 26.767823] paging_init+0x668/0x7c8 [ 26.769235] [ 26.769914] The buggy address belongs to the physical page: [ 26.770586] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47921 [ 26.771678] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 26.772411] raw: 03fffe0000002000 ffffc1ffc01e4848 ffffc1ffc01e4848 0000000000000000 [ 26.773231] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 26.774078] page dumped because: kasan: bad access detected [ 26.774758] [ 26.775801] Memory state around the buggy address: [ 26.776593] ffffa2c369d21e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.777553] ffffa2c369d21f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.778434] >ffffa2c369d21f80: 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 [ 26.779622] ^ [ 26.780541] ffffa2c369d22000: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 [ 26.781380] ffffa2c369d22080: f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 [ 26.782185] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 26.666005] ================================================================== [ 26.667024] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 26.667927] Free of addr fff00000c1244101 by task kunit_try_catch/229 [ 26.668618] [ 26.668983] CPU: 1 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 26.670659] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.671192] Hardware name: linux,dummy-virt (DT) [ 26.671801] Call trace: [ 26.672157] show_stack+0x20/0x38 (C) [ 26.672820] dump_stack_lvl+0x8c/0xd0 [ 26.673336] print_report+0x118/0x5e0 [ 26.673897] kasan_report_invalid_free+0xb0/0xd8 [ 26.674512] check_slab_allocation+0xfc/0x108 [ 26.675122] __kasan_mempool_poison_object+0x78/0x150 [ 26.675777] mempool_free+0x28c/0x328 [ 26.676396] mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 26.677122] mempool_kmalloc_invalid_free+0xb8/0x110 [ 26.677790] kunit_try_run_case+0x14c/0x3d0 [ 26.678455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.679183] kthread+0x24c/0x2d0 [ 26.679768] ret_from_fork+0x10/0x20 [ 26.680248] [ 26.680574] Allocated by task 229: [ 26.681109] kasan_save_stack+0x3c/0x68 [ 26.681655] kasan_save_track+0x20/0x40 [ 26.682235] kasan_save_alloc_info+0x40/0x58 [ 26.682767] __kasan_mempool_unpoison_object+0x11c/0x180 [ 26.683466] remove_element+0x130/0x1f8 [ 26.684058] mempool_alloc_preallocated+0x58/0xc0 [ 26.684637] mempool_kmalloc_invalid_free_helper+0x94/0x2a0 [ 26.685300] mempool_kmalloc_invalid_free+0xb8/0x110 [ 26.685930] kunit_try_run_case+0x14c/0x3d0 [ 26.686567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.687226] kthread+0x24c/0x2d0 [ 26.687742] ret_from_fork+0x10/0x20 [ 26.688232] [ 26.688599] The buggy address belongs to the object at fff00000c1244100 [ 26.688599] which belongs to the cache kmalloc-128 of size 128 [ 26.689889] The buggy address is located 1 bytes inside of [ 26.689889] 128-byte region [fff00000c1244100, fff00000c1244180) [ 26.691034] [ 26.691404] The buggy address belongs to the physical page: [ 26.692062] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101244 [ 26.693004] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.693712] page_type: f5(slab) [ 26.694231] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 26.695049] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.695930] page dumped because: kasan: bad access detected [ 26.696553] [ 26.696906] Memory state around the buggy address: [ 26.697468] fff00000c1244000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.698230] fff00000c1244080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.698995] >fff00000c1244100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.699785] ^ [ 26.700234] fff00000c1244180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.701007] fff00000c1244200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.701790] ================================================================== [ 26.712862] ================================================================== [ 26.713868] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 26.714659] Free of addr fff00000c658c001 by task kunit_try_catch/231 [ 26.715744] [ 26.716794] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 26.717873] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.718457] Hardware name: linux,dummy-virt (DT) [ 26.719302] Call trace: [ 26.719671] show_stack+0x20/0x38 (C) [ 26.720279] dump_stack_lvl+0x8c/0xd0 [ 26.720886] print_report+0x118/0x5e0 [ 26.721562] kasan_report_invalid_free+0xb0/0xd8 [ 26.722282] __kasan_mempool_poison_object+0xfc/0x150 [ 26.723050] mempool_free+0x28c/0x328 [ 26.724095] mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 26.725060] mempool_kmalloc_large_invalid_free+0xb8/0x110 [ 26.725791] kunit_try_run_case+0x14c/0x3d0 [ 26.726437] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.727206] kthread+0x24c/0x2d0 [ 26.728195] ret_from_fork+0x10/0x20 [ 26.728793] [ 26.728943] The buggy address belongs to the physical page: [ 26.729209] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10658c [ 26.729569] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.730179] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.731195] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.732524] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 26.733217] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.733759] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 26.734922] head: 0bfffe0000000002 ffffc1ffc3196301 ffffffffffffffff 0000000000000000 [ 26.736538] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 26.737529] page dumped because: kasan: bad access detected [ 26.738322] [ 26.738687] Memory state around the buggy address: [ 26.739265] fff00000c658bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.740514] fff00000c658bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.741152] >fff00000c658c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.742184] ^ [ 26.742752] fff00000c658c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.743931] fff00000c658c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.744668] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 26.592596] ================================================================== [ 26.593834] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 26.594496] Free of addr fff00000c657c000 by task kunit_try_catch/225 [ 26.595093] [ 26.595909] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 26.597043] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.597607] Hardware name: linux,dummy-virt (DT) [ 26.598228] Call trace: [ 26.598627] show_stack+0x20/0x38 (C) [ 26.599292] dump_stack_lvl+0x8c/0xd0 [ 26.599964] print_report+0x118/0x5e0 [ 26.600567] kasan_report_invalid_free+0xb0/0xd8 [ 26.601261] __kasan_mempool_poison_object+0x14c/0x150 [ 26.602026] mempool_free+0x28c/0x328 [ 26.602684] mempool_double_free_helper+0x150/0x2e0 [ 26.603580] mempool_kmalloc_large_double_free+0xb8/0x110 [ 26.604312] kunit_try_run_case+0x14c/0x3d0 [ 26.604968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.605743] kthread+0x24c/0x2d0 [ 26.606294] ret_from_fork+0x10/0x20 [ 26.607063] [ 26.607368] The buggy address belongs to the physical page: [ 26.608029] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10657c [ 26.609030] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.609864] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.610733] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.611730] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 26.612552] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.613460] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 26.614298] head: 0bfffe0000000002 ffffc1ffc3195f01 ffffffffffffffff 0000000000000000 [ 26.615319] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 26.616452] page dumped because: kasan: bad access detected [ 26.617128] [ 26.617421] Memory state around the buggy address: [ 26.618074] fff00000c657bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.619100] fff00000c657bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.619829] >fff00000c657c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.620769] ^ [ 26.621181] fff00000c657c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.621941] fff00000c657c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.622642] ================================================================== [ 26.632154] ================================================================== [ 26.633269] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 26.634147] Free of addr fff00000c657c000 by task kunit_try_catch/227 [ 26.634904] [ 26.635509] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 26.636904] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.637431] Hardware name: linux,dummy-virt (DT) [ 26.638052] Call trace: [ 26.638515] show_stack+0x20/0x38 (C) [ 26.639152] dump_stack_lvl+0x8c/0xd0 [ 26.639869] print_report+0x118/0x5e0 [ 26.640452] kasan_report_invalid_free+0xb0/0xd8 [ 26.641171] __kasan_mempool_poison_pages+0xe0/0xe8 [ 26.641783] mempool_free+0x24c/0x328 [ 26.642200] mempool_double_free_helper+0x150/0x2e0 [ 26.643135] mempool_page_alloc_double_free+0xb4/0x110 [ 26.643781] kunit_try_run_case+0x14c/0x3d0 [ 26.644438] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.645102] kthread+0x24c/0x2d0 [ 26.645714] ret_from_fork+0x10/0x20 [ 26.646204] [ 26.646526] The buggy address belongs to the physical page: [ 26.647381] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10657c [ 26.648463] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.649278] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 26.650121] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 26.650997] page dumped because: kasan: bad access detected [ 26.651565] [ 26.651892] Memory state around the buggy address: [ 26.652463] fff00000c657bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.653659] fff00000c657bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.654437] >fff00000c657c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.655374] ^ [ 26.655760] fff00000c657c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.657028] fff00000c657c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.657771] ================================================================== [ 26.532676] ================================================================== [ 26.533975] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 26.534664] Free of addr fff00000c1288000 by task kunit_try_catch/223 [ 26.536543] [ 26.536913] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 26.538048] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.538799] Hardware name: linux,dummy-virt (DT) [ 26.539379] Call trace: [ 26.539672] show_stack+0x20/0x38 (C) [ 26.540135] dump_stack_lvl+0x8c/0xd0 [ 26.540535] print_report+0x118/0x5e0 [ 26.541476] kasan_report_invalid_free+0xb0/0xd8 [ 26.542347] check_slab_allocation+0xd4/0x108 [ 26.543174] __kasan_mempool_poison_object+0x78/0x150 [ 26.543992] mempool_free+0x28c/0x328 [ 26.544662] mempool_double_free_helper+0x150/0x2e0 [ 26.545391] mempool_kmalloc_double_free+0xb8/0x110 [ 26.546131] kunit_try_run_case+0x14c/0x3d0 [ 26.546882] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.547807] kthread+0x24c/0x2d0 [ 26.548821] ret_from_fork+0x10/0x20 [ 26.549474] [ 26.549938] Allocated by task 223: [ 26.550541] kasan_save_stack+0x3c/0x68 [ 26.551260] kasan_save_track+0x20/0x40 [ 26.552114] kasan_save_alloc_info+0x40/0x58 [ 26.552740] __kasan_mempool_unpoison_object+0x11c/0x180 [ 26.553466] remove_element+0x130/0x1f8 [ 26.553965] mempool_alloc_preallocated+0x58/0xc0 [ 26.554670] mempool_double_free_helper+0x94/0x2e0 [ 26.555356] mempool_kmalloc_double_free+0xb8/0x110 [ 26.556518] kunit_try_run_case+0x14c/0x3d0 [ 26.557120] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.557784] kthread+0x24c/0x2d0 [ 26.558310] ret_from_fork+0x10/0x20 [ 26.558875] [ 26.559224] Freed by task 223: [ 26.559835] kasan_save_stack+0x3c/0x68 [ 26.560470] kasan_save_track+0x20/0x40 [ 26.561006] kasan_save_free_info+0x4c/0x78 [ 26.561500] __kasan_mempool_poison_object+0xc0/0x150 [ 26.562234] mempool_free+0x28c/0x328 [ 26.563533] mempool_double_free_helper+0x100/0x2e0 [ 26.564136] mempool_kmalloc_double_free+0xb8/0x110 [ 26.564845] kunit_try_run_case+0x14c/0x3d0 [ 26.565486] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.566213] kthread+0x24c/0x2d0 [ 26.566781] ret_from_fork+0x10/0x20 [ 26.567604] [ 26.567969] The buggy address belongs to the object at fff00000c1288000 [ 26.567969] which belongs to the cache kmalloc-128 of size 128 [ 26.569268] The buggy address is located 0 bytes inside of [ 26.569268] 128-byte region [fff00000c1288000, fff00000c1288080) [ 26.570579] [ 26.570960] The buggy address belongs to the physical page: [ 26.572315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101288 [ 26.573247] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.574059] page_type: f5(slab) [ 26.574653] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 26.575598] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.576713] page dumped because: kasan: bad access detected [ 26.577365] [ 26.577743] Memory state around the buggy address: [ 26.578290] fff00000c1287f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.579288] fff00000c1287f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.580397] >fff00000c1288000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.581403] ^ [ 26.582332] fff00000c1288080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.583139] fff00000c1288100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.584293] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[ 23.342605] ================================================================== [ 23.344225] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 23.344754] Free of addr fff00000c64a8001 by task kunit_try_catch/138 [ 23.345310] [ 23.345572] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 23.348019] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.348555] Hardware name: linux,dummy-virt (DT) [ 23.349254] Call trace: [ 23.349773] show_stack+0x20/0x38 (C) [ 23.350267] dump_stack_lvl+0x8c/0xd0 [ 23.350796] print_report+0x118/0x5e0 [ 23.351445] kasan_report_invalid_free+0xb0/0xd8 [ 23.352199] __kasan_kfree_large+0x5c/0xa8 [ 23.352869] free_large_kmalloc+0x58/0x140 [ 23.353403] kfree+0x270/0x3c8 [ 23.353917] kmalloc_large_invalid_free+0x108/0x270 [ 23.354532] kunit_try_run_case+0x14c/0x3d0 [ 23.355162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.356138] kthread+0x24c/0x2d0 [ 23.356797] ret_from_fork+0x10/0x20 [ 23.357336] [ 23.357728] The buggy address belongs to the physical page: [ 23.358355] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064a8 [ 23.359423] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.360577] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.361573] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.362447] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.363820] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.364752] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.365637] head: 0bfffe0000000002 ffffc1ffc3192a01 ffffffffffffffff 0000000000000000 [ 23.366531] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 23.367629] page dumped because: kasan: bad access detected [ 23.368190] [ 23.368557] Memory state around the buggy address: [ 23.369364] fff00000c64a7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.370188] fff00000c64a7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.371020] >fff00000c64a8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.372210] ^ [ 23.372732] fff00000c64a8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.373446] fff00000c64a8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.374531] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 26.398728] ================================================================== [ 26.400744] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 26.401441] Read of size 1 at addr fff00000c6574000 by task kunit_try_catch/217 [ 26.402383] [ 26.402776] CPU: 1 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 26.404209] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.404807] Hardware name: linux,dummy-virt (DT) [ 26.405442] Call trace: [ 26.405989] show_stack+0x20/0x38 (C) [ 26.406646] dump_stack_lvl+0x8c/0xd0 [ 26.407401] print_report+0x118/0x5e0 [ 26.407906] kasan_report+0xc8/0x118 [ 26.408563] __asan_report_load1_noabort+0x20/0x30 [ 26.409228] mempool_uaf_helper+0x314/0x340 [ 26.409929] mempool_kmalloc_large_uaf+0xbc/0x118 [ 26.410674] kunit_try_run_case+0x14c/0x3d0 [ 26.411435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.412120] kthread+0x24c/0x2d0 [ 26.412648] ret_from_fork+0x10/0x20 [ 26.413218] [ 26.413561] The buggy address belongs to the physical page: [ 26.414183] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106574 [ 26.415229] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.416040] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.416834] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.417683] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 26.418509] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.419436] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 26.420208] head: 0bfffe0000000002 ffffc1ffc3195d01 ffffffffffffffff 0000000000000000 [ 26.420873] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 26.421561] page dumped because: kasan: bad access detected [ 26.422207] [ 26.422522] Memory state around the buggy address: [ 26.423520] fff00000c6573f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.424294] fff00000c6573f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.425213] >fff00000c6574000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.426113] ^ [ 26.426541] fff00000c6574080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.427501] fff00000c6574100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.428289] ================================================================== [ 26.500632] ================================================================== [ 26.501679] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 26.502474] Read of size 1 at addr fff00000c657c000 by task kunit_try_catch/221 [ 26.503160] [ 26.503523] CPU: 1 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 26.504674] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.505254] Hardware name: linux,dummy-virt (DT) [ 26.506275] Call trace: [ 26.506749] show_stack+0x20/0x38 (C) [ 26.507574] dump_stack_lvl+0x8c/0xd0 [ 26.508051] print_report+0x118/0x5e0 [ 26.508598] kasan_report+0xc8/0x118 [ 26.509165] __asan_report_load1_noabort+0x20/0x30 [ 26.509828] mempool_uaf_helper+0x314/0x340 [ 26.510407] mempool_page_alloc_uaf+0xb8/0x118 [ 26.511181] kunit_try_run_case+0x14c/0x3d0 [ 26.511816] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.512501] kthread+0x24c/0x2d0 [ 26.513040] ret_from_fork+0x10/0x20 [ 26.513540] [ 26.513899] The buggy address belongs to the physical page: [ 26.514499] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10657c [ 26.515372] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.516168] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 26.517278] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 26.518149] page dumped because: kasan: bad access detected [ 26.518868] [ 26.519632] Memory state around the buggy address: [ 26.520148] fff00000c657bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.521077] fff00000c657bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.521927] >fff00000c657c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.522675] ^ [ 26.523475] fff00000c657c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.524271] fff00000c657c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.525037] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 26.438473] ================================================================== [ 26.439590] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 26.440760] Read of size 1 at addr fff00000c1287240 by task kunit_try_catch/219 [ 26.441401] [ 26.441733] CPU: 0 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 26.443605] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.444353] Hardware name: linux,dummy-virt (DT) [ 26.445138] Call trace: [ 26.445420] show_stack+0x20/0x38 (C) [ 26.446063] dump_stack_lvl+0x8c/0xd0 [ 26.446747] print_report+0x118/0x5e0 [ 26.447675] kasan_report+0xc8/0x118 [ 26.448296] __asan_report_load1_noabort+0x20/0x30 [ 26.449008] mempool_uaf_helper+0x314/0x340 [ 26.449627] mempool_slab_uaf+0xb8/0x110 [ 26.450248] kunit_try_run_case+0x14c/0x3d0 [ 26.450947] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.451780] kthread+0x24c/0x2d0 [ 26.452509] ret_from_fork+0x10/0x20 [ 26.453167] [ 26.453553] Allocated by task 219: [ 26.454133] kasan_save_stack+0x3c/0x68 [ 26.454717] kasan_save_track+0x20/0x40 [ 26.455589] kasan_save_alloc_info+0x40/0x58 [ 26.456137] __kasan_mempool_unpoison_object+0xbc/0x180 [ 26.456794] remove_element+0x16c/0x1f8 [ 26.457358] mempool_alloc_preallocated+0x58/0xc0 [ 26.458066] mempool_uaf_helper+0xa4/0x340 [ 26.458662] mempool_slab_uaf+0xb8/0x110 [ 26.459407] kunit_try_run_case+0x14c/0x3d0 [ 26.459865] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.460158] kthread+0x24c/0x2d0 [ 26.460371] ret_from_fork+0x10/0x20 [ 26.460596] [ 26.460826] Freed by task 219: [ 26.461971] kasan_save_stack+0x3c/0x68 [ 26.462548] kasan_save_track+0x20/0x40 [ 26.463424] kasan_save_free_info+0x4c/0x78 [ 26.464100] __kasan_mempool_poison_object+0xc0/0x150 [ 26.464779] mempool_free+0x28c/0x328 [ 26.465334] mempool_uaf_helper+0x104/0x340 [ 26.465944] mempool_slab_uaf+0xb8/0x110 [ 26.466541] kunit_try_run_case+0x14c/0x3d0 [ 26.467354] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.468188] kthread+0x24c/0x2d0 [ 26.468681] ret_from_fork+0x10/0x20 [ 26.469290] [ 26.469927] The buggy address belongs to the object at fff00000c1287240 [ 26.469927] which belongs to the cache test_cache of size 123 [ 26.471150] The buggy address is located 0 bytes inside of [ 26.471150] freed 123-byte region [fff00000c1287240, fff00000c12872bb) [ 26.472555] [ 26.472874] The buggy address belongs to the physical page: [ 26.473503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101287 [ 26.474637] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.475923] page_type: f5(slab) [ 26.476405] raw: 0bfffe0000000000 fff00000c1162780 dead000000000122 0000000000000000 [ 26.477184] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 26.478176] page dumped because: kasan: bad access detected [ 26.478791] [ 26.479131] Memory state around the buggy address: [ 26.480076] fff00000c1287100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.481005] fff00000c1287180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.481798] >fff00000c1287200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 26.482613] ^ [ 26.483889] fff00000c1287280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.484716] fff00000c1287300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.485484] ================================================================== [ 26.342230] ================================================================== [ 26.343792] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 26.344923] Read of size 1 at addr fff00000c648b900 by task kunit_try_catch/215 [ 26.346091] [ 26.346395] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 26.347555] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.348060] Hardware name: linux,dummy-virt (DT) [ 26.348850] Call trace: [ 26.349427] show_stack+0x20/0x38 (C) [ 26.349927] dump_stack_lvl+0x8c/0xd0 [ 26.350542] print_report+0x118/0x5e0 [ 26.351175] kasan_report+0xc8/0x118 [ 26.351828] __asan_report_load1_noabort+0x20/0x30 [ 26.352508] mempool_uaf_helper+0x314/0x340 [ 26.353082] mempool_kmalloc_uaf+0xbc/0x118 [ 26.353750] kunit_try_run_case+0x14c/0x3d0 [ 26.354362] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.355444] kthread+0x24c/0x2d0 [ 26.355997] ret_from_fork+0x10/0x20 [ 26.356521] [ 26.356836] Allocated by task 215: [ 26.357298] kasan_save_stack+0x3c/0x68 [ 26.358134] kasan_save_track+0x20/0x40 [ 26.358691] kasan_save_alloc_info+0x40/0x58 [ 26.359219] __kasan_mempool_unpoison_object+0x11c/0x180 [ 26.360252] remove_element+0x130/0x1f8 [ 26.360812] mempool_alloc_preallocated+0x58/0xc0 [ 26.361486] mempool_uaf_helper+0xa4/0x340 [ 26.362125] mempool_kmalloc_uaf+0xbc/0x118 [ 26.362800] kunit_try_run_case+0x14c/0x3d0 [ 26.363755] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.364559] kthread+0x24c/0x2d0 [ 26.365190] ret_from_fork+0x10/0x20 [ 26.365860] [ 26.366304] Freed by task 215: [ 26.366886] kasan_save_stack+0x3c/0x68 [ 26.367635] kasan_save_track+0x20/0x40 [ 26.368279] kasan_save_free_info+0x4c/0x78 [ 26.368929] __kasan_mempool_poison_object+0xc0/0x150 [ 26.369613] mempool_free+0x28c/0x328 [ 26.370023] mempool_uaf_helper+0x104/0x340 [ 26.371128] mempool_kmalloc_uaf+0xbc/0x118 [ 26.371645] kunit_try_run_case+0x14c/0x3d0 [ 26.372242] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.372895] kthread+0x24c/0x2d0 [ 26.373427] ret_from_fork+0x10/0x20 [ 26.374088] [ 26.374436] The buggy address belongs to the object at fff00000c648b900 [ 26.374436] which belongs to the cache kmalloc-128 of size 128 [ 26.375963] The buggy address is located 0 bytes inside of [ 26.375963] freed 128-byte region [fff00000c648b900, fff00000c648b980) [ 26.377032] [ 26.377365] The buggy address belongs to the physical page: [ 26.377929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10648b [ 26.378894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.379840] page_type: f5(slab) [ 26.380517] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 26.381228] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.382181] page dumped because: kasan: bad access detected [ 26.382774] [ 26.383142] Memory state around the buggy address: [ 26.384024] fff00000c648b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.385081] fff00000c648b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.385989] >fff00000c648b900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.386720] ^ [ 26.387295] fff00000c648b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.388254] fff00000c648ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.389067] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 26.247313] ================================================================== [ 26.248393] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 26.249095] Read of size 1 at addr fff00000c6576001 by task kunit_try_catch/211 [ 26.250171] [ 26.250583] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 26.252180] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.253012] Hardware name: linux,dummy-virt (DT) [ 26.253581] Call trace: [ 26.253943] show_stack+0x20/0x38 (C) [ 26.254415] dump_stack_lvl+0x8c/0xd0 [ 26.255217] print_report+0x118/0x5e0 [ 26.255871] kasan_report+0xc8/0x118 [ 26.256626] __asan_report_load1_noabort+0x20/0x30 [ 26.257325] mempool_oob_right_helper+0x2ac/0x2f0 [ 26.258047] mempool_kmalloc_large_oob_right+0xbc/0x118 [ 26.258850] kunit_try_run_case+0x14c/0x3d0 [ 26.259638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.260481] kthread+0x24c/0x2d0 [ 26.260964] ret_from_fork+0x10/0x20 [ 26.261447] [ 26.261800] The buggy address belongs to the physical page: [ 26.262403] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106574 [ 26.263880] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.264634] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.265633] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.266613] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 26.267569] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.268682] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 26.269604] head: 0bfffe0000000002 ffffc1ffc3195d01 ffffffffffffffff 0000000000000000 [ 26.270574] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 26.272079] page dumped because: kasan: bad access detected [ 26.272825] [ 26.273219] Memory state around the buggy address: [ 26.273943] fff00000c6575f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.274849] fff00000c6575f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.275658] >fff00000c6576000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.276376] ^ [ 26.276842] fff00000c6576080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.277585] fff00000c6576100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.278362] ================================================================== [ 26.199638] ================================================================== [ 26.200659] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 26.201484] Read of size 1 at addr fff00000c6514673 by task kunit_try_catch/209 [ 26.202181] [ 26.202520] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 26.204041] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.204584] Hardware name: linux,dummy-virt (DT) [ 26.205135] Call trace: [ 26.205530] show_stack+0x20/0x38 (C) [ 26.206126] dump_stack_lvl+0x8c/0xd0 [ 26.206676] print_report+0x118/0x5e0 [ 26.207410] kasan_report+0xc8/0x118 [ 26.207978] __asan_report_load1_noabort+0x20/0x30 [ 26.208657] mempool_oob_right_helper+0x2ac/0x2f0 [ 26.209355] mempool_kmalloc_oob_right+0xbc/0x118 [ 26.209966] kunit_try_run_case+0x14c/0x3d0 [ 26.210596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.211461] kthread+0x24c/0x2d0 [ 26.211990] ret_from_fork+0x10/0x20 [ 26.212541] [ 26.212937] Allocated by task 209: [ 26.213389] kasan_save_stack+0x3c/0x68 [ 26.213959] kasan_save_track+0x20/0x40 [ 26.214483] kasan_save_alloc_info+0x40/0x58 [ 26.215599] __kasan_mempool_unpoison_object+0x11c/0x180 [ 26.216201] remove_element+0x130/0x1f8 [ 26.216757] mempool_alloc_preallocated+0x58/0xc0 [ 26.217393] mempool_oob_right_helper+0x98/0x2f0 [ 26.218030] mempool_kmalloc_oob_right+0xbc/0x118 [ 26.218645] kunit_try_run_case+0x14c/0x3d0 [ 26.219508] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.220187] kthread+0x24c/0x2d0 [ 26.220721] ret_from_fork+0x10/0x20 [ 26.221226] [ 26.221528] The buggy address belongs to the object at fff00000c6514600 [ 26.221528] which belongs to the cache kmalloc-128 of size 128 [ 26.222772] The buggy address is located 0 bytes to the right of [ 26.222772] allocated 115-byte region [fff00000c6514600, fff00000c6514673) [ 26.224300] [ 26.224658] The buggy address belongs to the physical page: [ 26.225199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106514 [ 26.226189] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.226889] page_type: f5(slab) [ 26.227725] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 26.228555] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.229397] page dumped because: kasan: bad access detected [ 26.230038] [ 26.230374] Memory state around the buggy address: [ 26.230980] fff00000c6514500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.231995] fff00000c6514580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.232642] >fff00000c6514600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.233291] ^ [ 26.234563] fff00000c6514680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.235518] fff00000c6514700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.236395] ================================================================== [ 26.288955] ================================================================== [ 26.290269] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 26.291238] Read of size 1 at addr fff00000c12042bb by task kunit_try_catch/213 [ 26.292213] [ 26.292687] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 26.293855] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.294510] Hardware name: linux,dummy-virt (DT) [ 26.295112] Call trace: [ 26.295463] show_stack+0x20/0x38 (C) [ 26.296193] dump_stack_lvl+0x8c/0xd0 [ 26.296762] print_report+0x118/0x5e0 [ 26.297411] kasan_report+0xc8/0x118 [ 26.298078] __asan_report_load1_noabort+0x20/0x30 [ 26.298722] mempool_oob_right_helper+0x2ac/0x2f0 [ 26.299341] mempool_slab_oob_right+0xb8/0x110 [ 26.299981] kunit_try_run_case+0x14c/0x3d0 [ 26.300571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.301348] kthread+0x24c/0x2d0 [ 26.301884] ret_from_fork+0x10/0x20 [ 26.302409] [ 26.302743] Allocated by task 213: [ 26.303190] kasan_save_stack+0x3c/0x68 [ 26.303856] kasan_save_track+0x20/0x40 [ 26.304393] kasan_save_alloc_info+0x40/0x58 [ 26.305046] __kasan_mempool_unpoison_object+0xbc/0x180 [ 26.305648] remove_element+0x16c/0x1f8 [ 26.306281] mempool_alloc_preallocated+0x58/0xc0 [ 26.306901] mempool_oob_right_helper+0x98/0x2f0 [ 26.307486] mempool_slab_oob_right+0xb8/0x110 [ 26.308052] kunit_try_run_case+0x14c/0x3d0 [ 26.308630] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.309306] kthread+0x24c/0x2d0 [ 26.309790] ret_from_fork+0x10/0x20 [ 26.310342] [ 26.310625] The buggy address belongs to the object at fff00000c1204240 [ 26.310625] which belongs to the cache test_cache of size 123 [ 26.311793] The buggy address is located 0 bytes to the right of [ 26.311793] allocated 123-byte region [fff00000c1204240, fff00000c12042bb) [ 26.313077] [ 26.313422] The buggy address belongs to the physical page: [ 26.314050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101204 [ 26.314979] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.315732] page_type: f5(slab) [ 26.316191] raw: 0bfffe0000000000 fff00000c5798640 dead000000000122 0000000000000000 [ 26.316995] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 26.317874] page dumped because: kasan: bad access detected [ 26.318527] [ 26.318885] Memory state around the buggy address: [ 26.319436] fff00000c1204180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.320210] fff00000c1204200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 26.321004] >fff00000c1204280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 26.321773] ^ [ 26.322357] fff00000c1204300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.323184] fff00000c1204380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.323959] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 25.589538] ================================================================== [ 25.590748] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x17c/0x2f8 [ 25.591895] Read of size 1 at addr fff00000c5798500 by task kunit_try_catch/203 [ 25.592638] [ 25.593021] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 25.594065] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.594743] Hardware name: linux,dummy-virt (DT) [ 25.595671] Call trace: [ 25.595992] show_stack+0x20/0x38 (C) [ 25.596529] dump_stack_lvl+0x8c/0xd0 [ 25.597268] print_report+0x118/0x5e0 [ 25.597844] kasan_report+0xc8/0x118 [ 25.598459] __kasan_check_byte+0x54/0x70 [ 25.599076] kmem_cache_destroy+0x34/0x218 [ 25.599725] kmem_cache_double_destroy+0x17c/0x2f8 [ 25.600377] kunit_try_run_case+0x14c/0x3d0 [ 25.601359] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.602178] kthread+0x24c/0x2d0 [ 25.602670] ret_from_fork+0x10/0x20 [ 25.603732] [ 25.604021] Allocated by task 203: [ 25.604463] kasan_save_stack+0x3c/0x68 [ 25.605030] kasan_save_track+0x20/0x40 [ 25.605533] kasan_save_alloc_info+0x40/0x58 [ 25.606125] __kasan_slab_alloc+0xa8/0xb0 [ 25.606668] kmem_cache_alloc_noprof+0x108/0x398 [ 25.607803] __kmem_cache_create_args+0x18c/0x2b0 [ 25.608539] kmem_cache_double_destroy+0xc8/0x2f8 [ 25.609566] kunit_try_run_case+0x14c/0x3d0 [ 25.610157] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.611194] kthread+0x24c/0x2d0 [ 25.611758] ret_from_fork+0x10/0x20 [ 25.612293] [ 25.612662] Freed by task 203: [ 25.613117] kasan_save_stack+0x3c/0x68 [ 25.613688] kasan_save_track+0x20/0x40 [ 25.614195] kasan_save_free_info+0x4c/0x78 [ 25.614862] __kasan_slab_free+0x6c/0x98 [ 25.615394] kmem_cache_free+0x118/0x470 [ 25.615962] slab_kmem_cache_release+0x38/0x50 [ 25.616649] kmem_cache_release+0x1c/0x30 [ 25.617853] kobject_put+0x17c/0x430 [ 25.618452] sysfs_slab_release+0x1c/0x30 [ 25.619202] kmem_cache_destroy+0x118/0x218 [ 25.619920] kmem_cache_double_destroy+0x130/0x2f8 [ 25.620396] kunit_try_run_case+0x14c/0x3d0 [ 25.620848] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.621355] kthread+0x24c/0x2d0 [ 25.621766] ret_from_fork+0x10/0x20 [ 25.622725] [ 25.623451] The buggy address belongs to the object at fff00000c5798500 [ 25.623451] which belongs to the cache kmem_cache of size 208 [ 25.625328] The buggy address is located 0 bytes inside of [ 25.625328] freed 208-byte region [fff00000c5798500, fff00000c57985d0) [ 25.626471] [ 25.626900] The buggy address belongs to the physical page: [ 25.627722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105798 [ 25.628589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.629302] page_type: f5(slab) [ 25.630033] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 25.630982] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 25.631739] page dumped because: kasan: bad access detected [ 25.632324] [ 25.632686] Memory state around the buggy address: [ 25.633837] fff00000c5798400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.634565] fff00000c5798480: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.635759] >fff00000c5798500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.636458] ^ [ 25.636987] fff00000c5798580: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 25.637788] fff00000c5798600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.638589] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 25.499364] ================================================================== [ 25.500570] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x390/0x468 [ 25.501328] Read of size 1 at addr fff00000c6524000 by task kunit_try_catch/201 [ 25.502298] [ 25.502828] CPU: 1 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 25.504018] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.504738] Hardware name: linux,dummy-virt (DT) [ 25.505411] Call trace: [ 25.505813] show_stack+0x20/0x38 (C) [ 25.506290] dump_stack_lvl+0x8c/0xd0 [ 25.506852] print_report+0x118/0x5e0 [ 25.507420] kasan_report+0xc8/0x118 [ 25.507985] __asan_report_load1_noabort+0x20/0x30 [ 25.508794] kmem_cache_rcu_uaf+0x390/0x468 [ 25.509438] kunit_try_run_case+0x14c/0x3d0 [ 25.510126] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.510934] kthread+0x24c/0x2d0 [ 25.511521] ret_from_fork+0x10/0x20 [ 25.512157] [ 25.512533] Allocated by task 201: [ 25.513107] kasan_save_stack+0x3c/0x68 [ 25.513755] kasan_save_track+0x20/0x40 [ 25.514362] kasan_save_alloc_info+0x40/0x58 [ 25.515036] __kasan_slab_alloc+0xa8/0xb0 [ 25.515663] kmem_cache_alloc_noprof+0x108/0x398 [ 25.516363] kmem_cache_rcu_uaf+0x12c/0x468 [ 25.517018] kunit_try_run_case+0x14c/0x3d0 [ 25.517678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.518418] kthread+0x24c/0x2d0 [ 25.519030] ret_from_fork+0x10/0x20 [ 25.519692] [ 25.520087] Freed by task 0: [ 25.520632] kasan_save_stack+0x3c/0x68 [ 25.521282] kasan_save_track+0x20/0x40 [ 25.521917] kasan_save_free_info+0x4c/0x78 [ 25.522550] __kasan_slab_free+0x6c/0x98 [ 25.523172] slab_free_after_rcu_debug+0xd4/0x2f8 [ 25.523864] rcu_core+0x9f4/0x1e20 [ 25.524445] rcu_core_si+0x18/0x30 [ 25.525023] handle_softirqs+0x374/0xb20 [ 25.525650] __do_softirq+0x1c/0x28 [ 25.526244] [ 25.526618] Last potentially related work creation: [ 25.527348] kasan_save_stack+0x3c/0x68 [ 25.527996] kasan_record_aux_stack+0xb4/0xc8 [ 25.528658] kmem_cache_free+0x28c/0x470 [ 25.529295] kmem_cache_rcu_uaf+0x16c/0x468 [ 25.529946] kunit_try_run_case+0x14c/0x3d0 [ 25.530600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.531349] kthread+0x24c/0x2d0 [ 25.531934] ret_from_fork+0x10/0x20 [ 25.532549] [ 25.532860] The buggy address belongs to the object at fff00000c6524000 [ 25.532860] which belongs to the cache test_cache of size 200 [ 25.534053] The buggy address is located 0 bytes inside of [ 25.534053] freed 200-byte region [fff00000c6524000, fff00000c65240c8) [ 25.535530] [ 25.535958] The buggy address belongs to the physical page: [ 25.536822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106524 [ 25.537806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.538638] page_type: f5(slab) [ 25.539194] raw: 0bfffe0000000000 fff00000c57983c0 dead000000000122 0000000000000000 [ 25.540159] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 25.541023] page dumped because: kasan: bad access detected [ 25.541748] [ 25.542134] Memory state around the buggy address: [ 25.542835] fff00000c6523f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.543676] fff00000c6523f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.544515] >fff00000c6524000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.545388] ^ [ 25.545929] fff00000c6524080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 25.546799] fff00000c6524100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.547639] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 25.394358] ================================================================== [ 25.395953] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3b8 [ 25.396878] Free of addr fff00000c650b001 by task kunit_try_catch/199 [ 25.397976] [ 25.398250] CPU: 0 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 25.400138] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.400749] Hardware name: linux,dummy-virt (DT) [ 25.401351] Call trace: [ 25.401745] show_stack+0x20/0x38 (C) [ 25.402262] dump_stack_lvl+0x8c/0xd0 [ 25.402869] print_report+0x118/0x5e0 [ 25.403423] kasan_report_invalid_free+0xb0/0xd8 [ 25.404047] check_slab_allocation+0xfc/0x108 [ 25.404647] __kasan_slab_pre_free+0x2c/0x48 [ 25.405510] kmem_cache_free+0xf0/0x470 [ 25.406101] kmem_cache_invalid_free+0x184/0x3b8 [ 25.406742] kunit_try_run_case+0x14c/0x3d0 [ 25.407906] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.408627] kthread+0x24c/0x2d0 [ 25.409137] ret_from_fork+0x10/0x20 [ 25.409677] [ 25.410029] Allocated by task 199: [ 25.410525] kasan_save_stack+0x3c/0x68 [ 25.411320] kasan_save_track+0x20/0x40 [ 25.411905] kasan_save_alloc_info+0x40/0x58 [ 25.412618] __kasan_slab_alloc+0xa8/0xb0 [ 25.413209] kmem_cache_alloc_noprof+0x108/0x398 [ 25.413879] kmem_cache_invalid_free+0x12c/0x3b8 [ 25.414469] kunit_try_run_case+0x14c/0x3d0 [ 25.415014] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.416288] kthread+0x24c/0x2d0 [ 25.416821] ret_from_fork+0x10/0x20 [ 25.417385] [ 25.417692] The buggy address belongs to the object at fff00000c650b000 [ 25.417692] which belongs to the cache test_cache of size 200 [ 25.418828] The buggy address is located 1 bytes inside of [ 25.418828] 200-byte region [fff00000c650b000, fff00000c650b0c8) [ 25.420540] [ 25.420798] The buggy address belongs to the physical page: [ 25.421305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10650b [ 25.422728] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.424466] page_type: f5(slab) [ 25.425191] raw: 0bfffe0000000000 fff00000c11623c0 dead000000000122 0000000000000000 [ 25.426049] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 25.427371] page dumped because: kasan: bad access detected [ 25.428003] [ 25.428323] Memory state around the buggy address: [ 25.428886] fff00000c650af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.429617] fff00000c650af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.430518] >fff00000c650b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.431425] ^ [ 25.431812] fff00000c650b080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 25.432409] fff00000c650b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.434534] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 25.332219] ================================================================== [ 25.333093] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 25.333948] Free of addr fff00000c6519000 by task kunit_try_catch/197 [ 25.334744] [ 25.335509] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 25.336979] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.337587] Hardware name: linux,dummy-virt (DT) [ 25.338299] Call trace: [ 25.338660] show_stack+0x20/0x38 (C) [ 25.339395] dump_stack_lvl+0x8c/0xd0 [ 25.340204] print_report+0x118/0x5e0 [ 25.340749] kasan_report_invalid_free+0xb0/0xd8 [ 25.341401] check_slab_allocation+0xd4/0x108 [ 25.342020] __kasan_slab_pre_free+0x2c/0x48 [ 25.342632] kmem_cache_free+0xf0/0x470 [ 25.343227] kmem_cache_double_free+0x190/0x3c8 [ 25.344070] kunit_try_run_case+0x14c/0x3d0 [ 25.344795] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.345544] kthread+0x24c/0x2d0 [ 25.346106] ret_from_fork+0x10/0x20 [ 25.346736] [ 25.347046] Allocated by task 197: [ 25.347543] kasan_save_stack+0x3c/0x68 [ 25.348084] kasan_save_track+0x20/0x40 [ 25.348663] kasan_save_alloc_info+0x40/0x58 [ 25.349489] __kasan_slab_alloc+0xa8/0xb0 [ 25.350116] kmem_cache_alloc_noprof+0x108/0x398 [ 25.350768] kmem_cache_double_free+0x12c/0x3c8 [ 25.351974] kunit_try_run_case+0x14c/0x3d0 [ 25.352591] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.353322] kthread+0x24c/0x2d0 [ 25.353840] ret_from_fork+0x10/0x20 [ 25.354380] [ 25.354770] Freed by task 197: [ 25.355521] kasan_save_stack+0x3c/0x68 [ 25.356063] kasan_save_track+0x20/0x40 [ 25.356737] kasan_save_free_info+0x4c/0x78 [ 25.357296] __kasan_slab_free+0x6c/0x98 [ 25.357960] kmem_cache_free+0x118/0x470 [ 25.358575] kmem_cache_double_free+0x140/0x3c8 [ 25.359469] kunit_try_run_case+0x14c/0x3d0 [ 25.360087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.360823] kthread+0x24c/0x2d0 [ 25.361350] ret_from_fork+0x10/0x20 [ 25.361933] [ 25.362282] The buggy address belongs to the object at fff00000c6519000 [ 25.362282] which belongs to the cache test_cache of size 200 [ 25.363849] The buggy address is located 0 bytes inside of [ 25.363849] 200-byte region [fff00000c6519000, fff00000c65190c8) [ 25.365050] [ 25.365470] The buggy address belongs to the physical page: [ 25.366148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106519 [ 25.367184] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.368043] page_type: f5(slab) [ 25.368575] raw: 0bfffe0000000000 fff00000c5798280 dead000000000122 0000000000000000 [ 25.369458] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 25.370381] page dumped because: kasan: bad access detected [ 25.371449] [ 25.371857] Memory state around the buggy address: [ 25.372382] fff00000c6518f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.373233] fff00000c6518f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.374045] >fff00000c6519000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.374890] ^ [ 25.375510] fff00000c6519080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 25.376553] fff00000c6519100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.377418] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 25.257485] ================================================================== [ 25.258740] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x33c/0x428 [ 25.259734] Read of size 1 at addr fff00000c648b0c8 by task kunit_try_catch/195 [ 25.260972] [ 25.261453] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 25.262600] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.263335] Hardware name: linux,dummy-virt (DT) [ 25.263910] Call trace: [ 25.264258] show_stack+0x20/0x38 (C) [ 25.264887] dump_stack_lvl+0x8c/0xd0 [ 25.265446] print_report+0x118/0x5e0 [ 25.266047] kasan_report+0xc8/0x118 [ 25.266550] __asan_report_load1_noabort+0x20/0x30 [ 25.267478] kmem_cache_oob+0x33c/0x428 [ 25.268058] kunit_try_run_case+0x14c/0x3d0 [ 25.268756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.269420] kthread+0x24c/0x2d0 [ 25.269958] ret_from_fork+0x10/0x20 [ 25.270572] [ 25.270903] Allocated by task 195: [ 25.271451] kasan_save_stack+0x3c/0x68 [ 25.272276] kasan_save_track+0x20/0x40 [ 25.272868] kasan_save_alloc_info+0x40/0x58 [ 25.273527] __kasan_slab_alloc+0xa8/0xb0 [ 25.274076] kmem_cache_alloc_noprof+0x108/0x398 [ 25.275484] kmem_cache_oob+0x12c/0x428 [ 25.276090] kunit_try_run_case+0x14c/0x3d0 [ 25.276578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.277247] kthread+0x24c/0x2d0 [ 25.277756] ret_from_fork+0x10/0x20 [ 25.278278] [ 25.278576] The buggy address belongs to the object at fff00000c648b000 [ 25.278576] which belongs to the cache test_cache of size 200 [ 25.280225] The buggy address is located 0 bytes to the right of [ 25.280225] allocated 200-byte region [fff00000c648b000, fff00000c648b0c8) [ 25.281480] [ 25.281806] The buggy address belongs to the physical page: [ 25.282405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10648b [ 25.283575] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.284402] page_type: f5(slab) [ 25.284867] raw: 0bfffe0000000000 fff00000c5798140 dead000000000122 0000000000000000 [ 25.285673] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 25.286505] page dumped because: kasan: bad access detected [ 25.287166] [ 25.287509] Memory state around the buggy address: [ 25.288281] fff00000c648af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.288992] fff00000c648b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.289867] >fff00000c648b080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 25.290638] ^ [ 25.291357] fff00000c648b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.292393] fff00000c648b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.293186] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[ 24.781801] ================================================================== [ 24.782489] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 24.783059] Free of addr fff00000c6361200 by task kunit_try_catch/180 [ 24.783366] [ 24.783511] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 24.784602] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.785625] Hardware name: linux,dummy-virt (DT) [ 24.786354] Call trace: [ 24.786808] show_stack+0x20/0x38 (C) [ 24.787668] dump_stack_lvl+0x8c/0xd0 [ 24.788285] print_report+0x118/0x5e0 [ 24.788874] kasan_report_invalid_free+0xb0/0xd8 [ 24.789607] check_slab_allocation+0xd4/0x108 [ 24.790307] __kasan_slab_pre_free+0x2c/0x48 [ 24.790940] kfree+0xe8/0x3c8 [ 24.791635] kfree_sensitive+0x3c/0xb0 [ 24.792252] kmalloc_double_kzfree+0x168/0x308 [ 24.792944] kunit_try_run_case+0x14c/0x3d0 [ 24.793585] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.794297] kthread+0x24c/0x2d0 [ 24.794874] ret_from_fork+0x10/0x20 [ 24.795535] [ 24.795837] Allocated by task 180: [ 24.796321] kasan_save_stack+0x3c/0x68 [ 24.797396] kasan_save_track+0x20/0x40 [ 24.797980] kasan_save_alloc_info+0x40/0x58 [ 24.798519] __kasan_kmalloc+0xd4/0xd8 [ 24.799092] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.799765] kmalloc_double_kzfree+0xb8/0x308 [ 24.800429] kunit_try_run_case+0x14c/0x3d0 [ 24.801017] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.802289] kthread+0x24c/0x2d0 [ 24.802799] ret_from_fork+0x10/0x20 [ 24.803397] [ 24.803834] Freed by task 180: [ 24.804442] kasan_save_stack+0x3c/0x68 [ 24.805133] kasan_save_track+0x20/0x40 [ 24.805623] kasan_save_free_info+0x4c/0x78 [ 24.806174] __kasan_slab_free+0x6c/0x98 [ 24.806695] kfree+0x114/0x3c8 [ 24.807389] kfree_sensitive+0x80/0xb0 [ 24.807947] kmalloc_double_kzfree+0x11c/0x308 [ 24.808568] kunit_try_run_case+0x14c/0x3d0 [ 24.809176] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.809843] kthread+0x24c/0x2d0 [ 24.810370] ret_from_fork+0x10/0x20 [ 24.810885] [ 24.811370] The buggy address belongs to the object at fff00000c6361200 [ 24.811370] which belongs to the cache kmalloc-16 of size 16 [ 24.812734] The buggy address is located 0 bytes inside of [ 24.812734] 16-byte region [fff00000c6361200, fff00000c6361210) [ 24.813945] [ 24.814256] The buggy address belongs to the physical page: [ 24.815097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361 [ 24.816171] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.816960] page_type: f5(slab) [ 24.817377] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.818223] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.819275] page dumped because: kasan: bad access detected [ 24.819911] [ 24.820152] Memory state around the buggy address: [ 24.820658] fff00000c6361100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.821773] fff00000c6361180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.822466] >fff00000c6361200: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.823452] ^ [ 24.824006] fff00000c6361280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.824890] fff00000c6361300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.825560] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 24.736064] ================================================================== [ 24.737018] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 24.737864] Read of size 1 at addr fff00000c6361200 by task kunit_try_catch/180 [ 24.738754] [ 24.739087] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 24.740033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.740644] Hardware name: linux,dummy-virt (DT) [ 24.742008] Call trace: [ 24.742370] show_stack+0x20/0x38 (C) [ 24.743206] dump_stack_lvl+0x8c/0xd0 [ 24.743736] print_report+0x118/0x5e0 [ 24.744267] kasan_report+0xc8/0x118 [ 24.744828] __kasan_check_byte+0x54/0x70 [ 24.745373] kfree_sensitive+0x30/0xb0 [ 24.746009] kmalloc_double_kzfree+0x168/0x308 [ 24.746626] kunit_try_run_case+0x14c/0x3d0 [ 24.747503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.748210] kthread+0x24c/0x2d0 [ 24.748747] ret_from_fork+0x10/0x20 [ 24.749265] [ 24.749627] Allocated by task 180: [ 24.750121] kasan_save_stack+0x3c/0x68 [ 24.750714] kasan_save_track+0x20/0x40 [ 24.751486] kasan_save_alloc_info+0x40/0x58 [ 24.752068] __kasan_kmalloc+0xd4/0xd8 [ 24.752641] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.753225] kmalloc_double_kzfree+0xb8/0x308 [ 24.753756] kunit_try_run_case+0x14c/0x3d0 [ 24.754395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.755280] kthread+0x24c/0x2d0 [ 24.755756] ret_from_fork+0x10/0x20 [ 24.756301] [ 24.756625] Freed by task 180: [ 24.757068] kasan_save_stack+0x3c/0x68 [ 24.757580] kasan_save_track+0x20/0x40 [ 24.758171] kasan_save_free_info+0x4c/0x78 [ 24.758686] __kasan_slab_free+0x6c/0x98 [ 24.760018] kfree+0x114/0x3c8 [ 24.760460] kfree_sensitive+0x80/0xb0 [ 24.761043] kmalloc_double_kzfree+0x11c/0x308 [ 24.761627] kunit_try_run_case+0x14c/0x3d0 [ 24.762252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.763103] kthread+0x24c/0x2d0 [ 24.763655] ret_from_fork+0x10/0x20 [ 24.764200] [ 24.764496] The buggy address belongs to the object at fff00000c6361200 [ 24.764496] which belongs to the cache kmalloc-16 of size 16 [ 24.765746] The buggy address is located 0 bytes inside of [ 24.765746] freed 16-byte region [fff00000c6361200, fff00000c6361210) [ 24.767151] [ 24.767503] The buggy address belongs to the physical page: [ 24.768094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361 [ 24.768976] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.769816] page_type: f5(slab) [ 24.770322] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.771301] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.772210] page dumped because: kasan: bad access detected [ 24.772946] [ 24.773307] Memory state around the buggy address: [ 24.773893] fff00000c6361100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.774718] fff00000c6361180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.775778] >fff00000c6361200: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.776572] ^ [ 24.777075] fff00000c6361280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.777932] fff00000c6361300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.778850] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 24.625111] ================================================================== [ 24.626102] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 24.626913] Write of size 33 at addr fff00000c125ae00 by task kunit_try_catch/174 [ 24.628855] [ 24.629216] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 24.630396] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.631001] Hardware name: linux,dummy-virt (DT) [ 24.631549] Call trace: [ 24.632011] show_stack+0x20/0x38 (C) [ 24.632575] dump_stack_lvl+0x8c/0xd0 [ 24.633583] print_report+0x118/0x5e0 [ 24.634365] kasan_report+0xc8/0x118 [ 24.634916] kasan_check_range+0x100/0x1a8 [ 24.635594] __asan_memset+0x34/0x78 [ 24.636210] kmalloc_uaf_memset+0x170/0x310 [ 24.636916] kunit_try_run_case+0x14c/0x3d0 [ 24.637507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.638379] kthread+0x24c/0x2d0 [ 24.639110] ret_from_fork+0x10/0x20 [ 24.639640] [ 24.639935] Allocated by task 174: [ 24.640495] kasan_save_stack+0x3c/0x68 [ 24.641214] kasan_save_track+0x20/0x40 [ 24.641844] kasan_save_alloc_info+0x40/0x58 [ 24.642428] __kasan_kmalloc+0xd4/0xd8 [ 24.643046] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.643722] kmalloc_uaf_memset+0xb8/0x310 [ 24.644301] kunit_try_run_case+0x14c/0x3d0 [ 24.644969] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.645675] kthread+0x24c/0x2d0 [ 24.646220] ret_from_fork+0x10/0x20 [ 24.646835] [ 24.647161] Freed by task 174: [ 24.647694] kasan_save_stack+0x3c/0x68 [ 24.648289] kasan_save_track+0x20/0x40 [ 24.648911] kasan_save_free_info+0x4c/0x78 [ 24.649529] __kasan_slab_free+0x6c/0x98 [ 24.650145] kfree+0x114/0x3c8 [ 24.650637] kmalloc_uaf_memset+0x11c/0x310 [ 24.651294] kunit_try_run_case+0x14c/0x3d0 [ 24.651909] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.652670] kthread+0x24c/0x2d0 [ 24.653237] ret_from_fork+0x10/0x20 [ 24.653845] [ 24.654166] The buggy address belongs to the object at fff00000c125ae00 [ 24.654166] which belongs to the cache kmalloc-64 of size 64 [ 24.655448] The buggy address is located 0 bytes inside of [ 24.655448] freed 64-byte region [fff00000c125ae00, fff00000c125ae40) [ 24.656576] [ 24.656978] The buggy address belongs to the physical page: [ 24.657562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10125a [ 24.658687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.659603] page_type: f5(slab) [ 24.660120] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.661088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.661957] page dumped because: kasan: bad access detected [ 24.662652] [ 24.662993] Memory state around the buggy address: [ 24.663642] fff00000c125ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.664520] fff00000c125ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.665412] >fff00000c125ae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.666254] ^ [ 24.666759] fff00000c125ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.667573] fff00000c125af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.668377] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 24.489809] ================================================================== [ 24.491235] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e8 [ 24.492285] Read of size 64 at addr fff00000c6487184 by task kunit_try_catch/170 [ 24.493285] [ 24.493615] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 24.495656] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.496207] Hardware name: linux,dummy-virt (DT) [ 24.497250] Call trace: [ 24.497828] show_stack+0x20/0x38 (C) [ 24.498488] dump_stack_lvl+0x8c/0xd0 [ 24.499270] print_report+0x118/0x5e0 [ 24.499978] kasan_report+0xc8/0x118 [ 24.500784] kasan_check_range+0x100/0x1a8 [ 24.501334] __asan_memmove+0x3c/0x98 [ 24.501909] kmalloc_memmove_invalid_size+0x154/0x2e8 [ 24.502680] kunit_try_run_case+0x14c/0x3d0 [ 24.503669] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.504692] kthread+0x24c/0x2d0 [ 24.505276] ret_from_fork+0x10/0x20 [ 24.505887] [ 24.506250] Allocated by task 170: [ 24.506797] kasan_save_stack+0x3c/0x68 [ 24.507608] kasan_save_track+0x20/0x40 [ 24.508654] kasan_save_alloc_info+0x40/0x58 [ 24.509274] __kasan_kmalloc+0xd4/0xd8 [ 24.509911] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.510621] kmalloc_memmove_invalid_size+0xb0/0x2e8 [ 24.511313] kunit_try_run_case+0x14c/0x3d0 [ 24.512218] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.512981] kthread+0x24c/0x2d0 [ 24.513549] ret_from_fork+0x10/0x20 [ 24.514128] [ 24.514494] The buggy address belongs to the object at fff00000c6487180 [ 24.514494] which belongs to the cache kmalloc-64 of size 64 [ 24.516029] The buggy address is located 4 bytes inside of [ 24.516029] allocated 64-byte region [fff00000c6487180, fff00000c64871c0) [ 24.517336] [ 24.517758] The buggy address belongs to the physical page: [ 24.518534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106487 [ 24.519503] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.520493] page_type: f5(slab) [ 24.521011] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.521612] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.522227] page dumped because: kasan: bad access detected [ 24.524010] [ 24.524460] Memory state around the buggy address: [ 24.525255] fff00000c6487080: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.526332] fff00000c6487100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.527101] >fff00000c6487180: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 24.527811] ^ [ 24.528866] fff00000c6487200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.529951] fff00000c6487280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.531104] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 24.441590] ================================================================== [ 24.442578] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 24.444277] Read of size 18446744073709551614 at addr fff00000c125ad04 by task kunit_try_catch/168 [ 24.445239] [ 24.445602] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 24.447580] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.447970] Hardware name: linux,dummy-virt (DT) [ 24.448481] Call trace: [ 24.448910] show_stack+0x20/0x38 (C) [ 24.449479] dump_stack_lvl+0x8c/0xd0 [ 24.450277] print_report+0x118/0x5e0 [ 24.451014] kasan_report+0xc8/0x118 [ 24.451603] kasan_check_range+0x100/0x1a8 [ 24.452216] __asan_memmove+0x3c/0x98 [ 24.452468] kmalloc_memmove_negative_size+0x154/0x2e0 [ 24.452868] kunit_try_run_case+0x14c/0x3d0 [ 24.453683] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.454455] kthread+0x24c/0x2d0 [ 24.455015] ret_from_fork+0x10/0x20 [ 24.455625] [ 24.456029] Allocated by task 168: [ 24.456534] kasan_save_stack+0x3c/0x68 [ 24.457155] kasan_save_track+0x20/0x40 [ 24.457788] kasan_save_alloc_info+0x40/0x58 [ 24.458442] __kasan_kmalloc+0xd4/0xd8 [ 24.459221] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.459864] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 24.460485] kunit_try_run_case+0x14c/0x3d0 [ 24.461127] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.461781] kthread+0x24c/0x2d0 [ 24.462371] ret_from_fork+0x10/0x20 [ 24.462963] [ 24.463477] The buggy address belongs to the object at fff00000c125ad00 [ 24.463477] which belongs to the cache kmalloc-64 of size 64 [ 24.464810] The buggy address is located 4 bytes inside of [ 24.464810] 64-byte region [fff00000c125ad00, fff00000c125ad40) [ 24.466013] [ 24.466412] The buggy address belongs to the physical page: [ 24.467385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10125a [ 24.468338] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.469180] page_type: f5(slab) [ 24.469773] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.470613] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.471719] page dumped because: kasan: bad access detected [ 24.472389] [ 24.472798] Memory state around the buggy address: [ 24.473406] fff00000c125ac00: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 24.474197] fff00000c125ac80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.475181] >fff00000c125ad00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 24.476534] ^ [ 24.476930] fff00000c125ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.477488] fff00000c125ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.478188] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset
[ 24.300837] ================================================================== [ 24.301769] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 24.302474] Write of size 4 at addr fff00000c639f875 by task kunit_try_catch/162 [ 24.303433] [ 24.303827] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 24.305167] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.305664] Hardware name: linux,dummy-virt (DT) [ 24.306275] Call trace: [ 24.307988] show_stack+0x20/0x38 (C) [ 24.308497] dump_stack_lvl+0x8c/0xd0 [ 24.309052] print_report+0x118/0x5e0 [ 24.309620] kasan_report+0xc8/0x118 [ 24.310237] kasan_check_range+0x100/0x1a8 [ 24.311220] __asan_memset+0x34/0x78 [ 24.311758] kmalloc_oob_memset_4+0x150/0x300 [ 24.312357] kunit_try_run_case+0x14c/0x3d0 [ 24.313010] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.313632] kthread+0x24c/0x2d0 [ 24.314198] ret_from_fork+0x10/0x20 [ 24.314780] [ 24.315779] Allocated by task 162: [ 24.316354] kasan_save_stack+0x3c/0x68 [ 24.317074] kasan_save_track+0x20/0x40 [ 24.317685] kasan_save_alloc_info+0x40/0x58 [ 24.318357] __kasan_kmalloc+0xd4/0xd8 [ 24.318874] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.319390] kmalloc_oob_memset_4+0xb0/0x300 [ 24.319953] kunit_try_run_case+0x14c/0x3d0 [ 24.320548] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.321369] kthread+0x24c/0x2d0 [ 24.322196] ret_from_fork+0x10/0x20 [ 24.322726] [ 24.323068] The buggy address belongs to the object at fff00000c639f800 [ 24.323068] which belongs to the cache kmalloc-128 of size 128 [ 24.325021] The buggy address is located 117 bytes inside of [ 24.325021] allocated 120-byte region [fff00000c639f800, fff00000c639f878) [ 24.326337] [ 24.326690] The buggy address belongs to the physical page: [ 24.327807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10639f [ 24.328718] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.329482] page_type: f5(slab) [ 24.330010] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.330791] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.332246] page dumped because: kasan: bad access detected [ 24.333013] [ 24.333320] Memory state around the buggy address: [ 24.333890] fff00000c639f700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.334619] fff00000c639f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.335508] >fff00000c639f800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.336742] ^ [ 24.337420] fff00000c639f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.338095] fff00000c639f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.339180] ================================================================== [ 24.349716] ================================================================== [ 24.350798] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 24.352573] Write of size 8 at addr fff00000c6387b71 by task kunit_try_catch/164 [ 24.353288] [ 24.353688] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 24.354814] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.355551] Hardware name: linux,dummy-virt (DT) [ 24.356185] Call trace: [ 24.356617] show_stack+0x20/0x38 (C) [ 24.357139] dump_stack_lvl+0x8c/0xd0 [ 24.357812] print_report+0x118/0x5e0 [ 24.358455] kasan_report+0xc8/0x118 [ 24.359284] kasan_check_range+0x100/0x1a8 [ 24.360057] __asan_memset+0x34/0x78 [ 24.360632] kmalloc_oob_memset_8+0x150/0x2f8 [ 24.361302] kunit_try_run_case+0x14c/0x3d0 [ 24.361930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.362680] kthread+0x24c/0x2d0 [ 24.363381] ret_from_fork+0x10/0x20 [ 24.363961] [ 24.364249] Allocated by task 164: [ 24.364678] kasan_save_stack+0x3c/0x68 [ 24.365303] kasan_save_track+0x20/0x40 [ 24.365820] kasan_save_alloc_info+0x40/0x58 [ 24.366387] __kasan_kmalloc+0xd4/0xd8 [ 24.367071] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.368063] kmalloc_oob_memset_8+0xb0/0x2f8 [ 24.368721] kunit_try_run_case+0x14c/0x3d0 [ 24.369298] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.370069] kthread+0x24c/0x2d0 [ 24.370557] ret_from_fork+0x10/0x20 [ 24.371368] [ 24.371692] The buggy address belongs to the object at fff00000c6387b00 [ 24.371692] which belongs to the cache kmalloc-128 of size 128 [ 24.372798] The buggy address is located 113 bytes inside of [ 24.372798] allocated 120-byte region [fff00000c6387b00, fff00000c6387b78) [ 24.374659] [ 24.375125] The buggy address belongs to the physical page: [ 24.376381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106387 [ 24.377166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.377766] page_type: f5(slab) [ 24.378263] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.379453] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.380267] page dumped because: kasan: bad access detected [ 24.380961] [ 24.381288] Memory state around the buggy address: [ 24.381939] fff00000c6387a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 24.383076] fff00000c6387a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.383802] >fff00000c6387b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.384614] ^ [ 24.385416] fff00000c6387b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.386291] fff00000c6387c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.387239] ================================================================== [ 24.394876] ================================================================== [ 24.396278] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 24.397056] Write of size 16 at addr fff00000c639fb69 by task kunit_try_catch/166 [ 24.398390] [ 24.398715] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 24.399789] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.400313] Hardware name: linux,dummy-virt (DT) [ 24.401119] Call trace: [ 24.401461] show_stack+0x20/0x38 (C) [ 24.402287] dump_stack_lvl+0x8c/0xd0 [ 24.403237] print_report+0x118/0x5e0 [ 24.403774] kasan_report+0xc8/0x118 [ 24.404278] kasan_check_range+0x100/0x1a8 [ 24.404924] __asan_memset+0x34/0x78 [ 24.405444] kmalloc_oob_memset_16+0x150/0x2f8 [ 24.406031] kunit_try_run_case+0x14c/0x3d0 [ 24.406684] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.408056] kthread+0x24c/0x2d0 [ 24.408546] ret_from_fork+0x10/0x20 [ 24.409168] [ 24.409452] Allocated by task 166: [ 24.409955] kasan_save_stack+0x3c/0x68 [ 24.410559] kasan_save_track+0x20/0x40 [ 24.411469] kasan_save_alloc_info+0x40/0x58 [ 24.411895] __kasan_kmalloc+0xd4/0xd8 [ 24.412434] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.413012] kmalloc_oob_memset_16+0xb0/0x2f8 [ 24.413561] kunit_try_run_case+0x14c/0x3d0 [ 24.414274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.415417] kthread+0x24c/0x2d0 [ 24.415793] ret_from_fork+0x10/0x20 [ 24.416390] [ 24.416763] The buggy address belongs to the object at fff00000c639fb00 [ 24.416763] which belongs to the cache kmalloc-128 of size 128 [ 24.418002] The buggy address is located 105 bytes inside of [ 24.418002] allocated 120-byte region [fff00000c639fb00, fff00000c639fb78) [ 24.419241] [ 24.419605] The buggy address belongs to the physical page: [ 24.420180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10639f [ 24.421090] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.422112] page_type: f5(slab) [ 24.422665] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.424255] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.425206] page dumped because: kasan: bad access detected [ 24.425889] [ 24.426206] Memory state around the buggy address: [ 24.426963] fff00000c639fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 24.427869] fff00000c639fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.428654] >fff00000c639fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.429566] ^ [ 24.430427] fff00000c639fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.431416] fff00000c639fc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.431967] ================================================================== [ 24.252155] ================================================================== [ 24.253347] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 24.254071] Write of size 2 at addr fff00000c639f777 by task kunit_try_catch/160 [ 24.254670] [ 24.255764] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 24.257092] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.257782] Hardware name: linux,dummy-virt (DT) [ 24.258499] Call trace: [ 24.259387] show_stack+0x20/0x38 (C) [ 24.259911] dump_stack_lvl+0x8c/0xd0 [ 24.260485] print_report+0x118/0x5e0 [ 24.261364] kasan_report+0xc8/0x118 [ 24.262035] kasan_check_range+0x100/0x1a8 [ 24.262557] __asan_memset+0x34/0x78 [ 24.263595] kmalloc_oob_memset_2+0x150/0x2f8 [ 24.264225] kunit_try_run_case+0x14c/0x3d0 [ 24.265094] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.266126] kthread+0x24c/0x2d0 [ 24.266782] ret_from_fork+0x10/0x20 [ 24.267492] [ 24.268057] Allocated by task 160: [ 24.268590] kasan_save_stack+0x3c/0x68 [ 24.269141] kasan_save_track+0x20/0x40 [ 24.269787] kasan_save_alloc_info+0x40/0x58 [ 24.270454] __kasan_kmalloc+0xd4/0xd8 [ 24.270945] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.272201] kmalloc_oob_memset_2+0xb0/0x2f8 [ 24.272912] kunit_try_run_case+0x14c/0x3d0 [ 24.273512] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.274209] kthread+0x24c/0x2d0 [ 24.274780] ret_from_fork+0x10/0x20 [ 24.275445] [ 24.275790] The buggy address belongs to the object at fff00000c639f700 [ 24.275790] which belongs to the cache kmalloc-128 of size 128 [ 24.277084] The buggy address is located 119 bytes inside of [ 24.277084] allocated 120-byte region [fff00000c639f700, fff00000c639f778) [ 24.278733] [ 24.279752] The buggy address belongs to the physical page: [ 24.280252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10639f [ 24.281106] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.281865] page_type: f5(slab) [ 24.282325] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.283269] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.284144] page dumped because: kasan: bad access detected [ 24.284805] [ 24.285108] Memory state around the buggy address: [ 24.285643] fff00000c639f600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.286445] fff00000c639f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.287588] >fff00000c639f700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.288317] ^ [ 24.289224] fff00000c639f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.290282] fff00000c639f800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.291164] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 24.206563] ================================================================== [ 24.207779] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 24.208548] Write of size 128 at addr fff00000c639f600 by task kunit_try_catch/158 [ 24.210220] [ 24.210649] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 24.212092] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.212740] Hardware name: linux,dummy-virt (DT) [ 24.213408] Call trace: [ 24.213841] show_stack+0x20/0x38 (C) [ 24.214431] dump_stack_lvl+0x8c/0xd0 [ 24.215140] print_report+0x118/0x5e0 [ 24.215664] kasan_report+0xc8/0x118 [ 24.216198] kasan_check_range+0x100/0x1a8 [ 24.216780] __asan_memset+0x34/0x78 [ 24.217487] kmalloc_oob_in_memset+0x144/0x2d0 [ 24.218238] kunit_try_run_case+0x14c/0x3d0 [ 24.219018] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.219767] kthread+0x24c/0x2d0 [ 24.220262] ret_from_fork+0x10/0x20 [ 24.220822] [ 24.221129] Allocated by task 158: [ 24.221612] kasan_save_stack+0x3c/0x68 [ 24.222129] kasan_save_track+0x20/0x40 [ 24.222693] kasan_save_alloc_info+0x40/0x58 [ 24.223327] __kasan_kmalloc+0xd4/0xd8 [ 24.224254] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.224825] kmalloc_oob_in_memset+0xb0/0x2d0 [ 24.225399] kunit_try_run_case+0x14c/0x3d0 [ 24.225986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.226585] kthread+0x24c/0x2d0 [ 24.227369] ret_from_fork+0x10/0x20 [ 24.227834] [ 24.228164] The buggy address belongs to the object at fff00000c639f600 [ 24.228164] which belongs to the cache kmalloc-128 of size 128 [ 24.229509] The buggy address is located 0 bytes inside of [ 24.229509] allocated 120-byte region [fff00000c639f600, fff00000c639f678) [ 24.230782] [ 24.231456] The buggy address belongs to the physical page: [ 24.232099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10639f [ 24.233030] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.233764] page_type: f5(slab) [ 24.234222] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.235308] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.236148] page dumped because: kasan: bad access detected [ 24.236829] [ 24.237125] Memory state around the buggy address: [ 24.237760] fff00000c639f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 24.238479] fff00000c639f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.239724] >fff00000c639f600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.240515] ^ [ 24.241303] fff00000c639f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.242117] fff00000c639f700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.242891] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 24.154123] ================================================================== [ 24.155481] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 24.156991] Read of size 16 at addr fff00000c63611c0 by task kunit_try_catch/156 [ 24.157781] [ 24.158111] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 24.159693] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.160198] Hardware name: linux,dummy-virt (DT) [ 24.160896] Call trace: [ 24.161253] show_stack+0x20/0x38 (C) [ 24.162321] dump_stack_lvl+0x8c/0xd0 [ 24.163257] print_report+0x118/0x5e0 [ 24.163924] kasan_report+0xc8/0x118 [ 24.164590] __asan_report_load16_noabort+0x20/0x30 [ 24.165217] kmalloc_uaf_16+0x3bc/0x438 [ 24.165752] kunit_try_run_case+0x14c/0x3d0 [ 24.166380] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.167021] kthread+0x24c/0x2d0 [ 24.167781] ret_from_fork+0x10/0x20 [ 24.168300] [ 24.168681] Allocated by task 156: [ 24.169139] kasan_save_stack+0x3c/0x68 [ 24.169772] kasan_save_track+0x20/0x40 [ 24.170298] kasan_save_alloc_info+0x40/0x58 [ 24.170927] __kasan_kmalloc+0xd4/0xd8 [ 24.171442] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.171936] kmalloc_uaf_16+0x140/0x438 [ 24.172895] kunit_try_run_case+0x14c/0x3d0 [ 24.173467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.174078] kthread+0x24c/0x2d0 [ 24.174499] ret_from_fork+0x10/0x20 [ 24.175013] [ 24.175284] Freed by task 156: [ 24.176239] kasan_save_stack+0x3c/0x68 [ 24.176882] kasan_save_track+0x20/0x40 [ 24.177511] kasan_save_free_info+0x4c/0x78 [ 24.178170] __kasan_slab_free+0x6c/0x98 [ 24.179097] kfree+0x114/0x3c8 [ 24.179579] kmalloc_uaf_16+0x190/0x438 [ 24.180164] kunit_try_run_case+0x14c/0x3d0 [ 24.180851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.181610] kthread+0x24c/0x2d0 [ 24.182148] ret_from_fork+0x10/0x20 [ 24.182378] [ 24.182515] The buggy address belongs to the object at fff00000c63611c0 [ 24.182515] which belongs to the cache kmalloc-16 of size 16 [ 24.183890] The buggy address is located 0 bytes inside of [ 24.183890] freed 16-byte region [fff00000c63611c0, fff00000c63611d0) [ 24.185319] [ 24.185686] The buggy address belongs to the physical page: [ 24.186326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361 [ 24.187516] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.188263] page_type: f5(slab) [ 24.188804] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.189630] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.190449] page dumped because: kasan: bad access detected [ 24.191288] [ 24.191595] Memory state around the buggy address: [ 24.192285] fff00000c6361080: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.193175] fff00000c6361100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.193928] >fff00000c6361180: fa fb fc fc 00 00 fc fc fa fb fc fc fc fc fc fc [ 24.194748] ^ [ 24.195674] fff00000c6361200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.196499] fff00000c6361280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.197292] ================================================================== [ 24.678121] ================================================================== [ 24.679154] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 24.679944] Read of size 1 at addr fff00000c125aea8 by task kunit_try_catch/176 [ 24.680794] [ 24.681234] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 24.682508] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.683072] Hardware name: linux,dummy-virt (DT) [ 24.683762] Call trace: [ 24.684201] show_stack+0x20/0x38 (C) [ 24.684868] dump_stack_lvl+0x8c/0xd0 [ 24.685468] print_report+0x118/0x5e0 [ 24.686073] kasan_report+0xc8/0x118 [ 24.686628] __asan_report_load1_noabort+0x20/0x30 [ 24.687325] kmalloc_uaf2+0x3f4/0x468 [ 24.687906] kunit_try_run_case+0x14c/0x3d0 [ 24.688535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.689269] kthread+0x24c/0x2d0 [ 24.689835] ret_from_fork+0x10/0x20 [ 24.690402] [ 24.690776] Allocated by task 176: [ 24.691296] kasan_save_stack+0x3c/0x68 [ 24.691962] kasan_save_track+0x20/0x40 [ 24.692577] kasan_save_alloc_info+0x40/0x58 [ 24.693228] __kasan_kmalloc+0xd4/0xd8 [ 24.693869] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.694560] kmalloc_uaf2+0xc4/0x468 [ 24.695113] kunit_try_run_case+0x14c/0x3d0 [ 24.695756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.696450] kthread+0x24c/0x2d0 [ 24.697015] ret_from_fork+0x10/0x20 [ 24.697576] [ 24.697893] Freed by task 176: [ 24.698406] kasan_save_stack+0x3c/0x68 [ 24.699036] kasan_save_track+0x20/0x40 [ 24.699574] kasan_save_free_info+0x4c/0x78 [ 24.700232] __kasan_slab_free+0x6c/0x98 [ 24.700856] kfree+0x114/0x3c8 [ 24.701348] kmalloc_uaf2+0x134/0x468 [ 24.701946] kunit_try_run_case+0x14c/0x3d0 [ 24.702585] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.703277] kthread+0x24c/0x2d0 [ 24.703817] ret_from_fork+0x10/0x20 [ 24.704404] [ 24.704824] The buggy address belongs to the object at fff00000c125ae80 [ 24.704824] which belongs to the cache kmalloc-64 of size 64 [ 24.706104] The buggy address is located 40 bytes inside of [ 24.706104] freed 64-byte region [fff00000c125ae80, fff00000c125aec0) [ 24.707402] [ 24.707774] The buggy address belongs to the physical page: [ 24.708420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10125a [ 24.709345] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.710159] page_type: f5(slab) [ 24.710689] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.711621] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.712456] page dumped because: kasan: bad access detected [ 24.713149] [ 24.713473] Memory state around the buggy address: [ 24.714179] fff00000c125ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.715042] fff00000c125ae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.715886] >fff00000c125ae80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.716681] ^ [ 24.717327] fff00000c125af00: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 24.718185] fff00000c125af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.718990] ================================================================== [ 24.550411] ================================================================== [ 24.554020] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 24.556388] Read of size 1 at addr fff00000c63611e8 by task kunit_try_catch/172 [ 24.559018] [ 24.559609] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 24.561976] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.563221] Hardware name: linux,dummy-virt (DT) [ 24.564912] Call trace: [ 24.566019] show_stack+0x20/0x38 (C) [ 24.566654] dump_stack_lvl+0x8c/0xd0 [ 24.569204] print_report+0x118/0x5e0 [ 24.570373] kasan_report+0xc8/0x118 [ 24.570799] __asan_report_load1_noabort+0x20/0x30 [ 24.571270] kmalloc_uaf+0x300/0x338 [ 24.571655] kunit_try_run_case+0x14c/0x3d0 [ 24.573632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.575551] kthread+0x24c/0x2d0 [ 24.576969] ret_from_fork+0x10/0x20 [ 24.579079] [ 24.579547] Allocated by task 172: [ 24.580884] kasan_save_stack+0x3c/0x68 [ 24.582322] kasan_save_track+0x20/0x40 [ 24.583626] kasan_save_alloc_info+0x40/0x58 [ 24.584223] __kasan_kmalloc+0xd4/0xd8 [ 24.584819] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.585484] kmalloc_uaf+0xb8/0x338 [ 24.586058] kunit_try_run_case+0x14c/0x3d0 [ 24.586529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.588581] kthread+0x24c/0x2d0 [ 24.589080] ret_from_fork+0x10/0x20 [ 24.589754] [ 24.590118] Freed by task 172: [ 24.590665] kasan_save_stack+0x3c/0x68 [ 24.591364] kasan_save_track+0x20/0x40 [ 24.592011] kasan_save_free_info+0x4c/0x78 [ 24.592983] __kasan_slab_free+0x6c/0x98 [ 24.593643] kfree+0x114/0x3c8 [ 24.594211] kmalloc_uaf+0x11c/0x338 [ 24.595081] kunit_try_run_case+0x14c/0x3d0 [ 24.595829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.596554] kthread+0x24c/0x2d0 [ 24.597079] ret_from_fork+0x10/0x20 [ 24.597692] [ 24.598085] The buggy address belongs to the object at fff00000c63611e0 [ 24.598085] which belongs to the cache kmalloc-16 of size 16 [ 24.600102] The buggy address is located 8 bytes inside of [ 24.600102] freed 16-byte region [fff00000c63611e0, fff00000c63611f0) [ 24.600960] [ 24.601201] The buggy address belongs to the physical page: [ 24.601650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361 [ 24.602377] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.603088] page_type: f5(slab) [ 24.603965] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.604874] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.605909] page dumped because: kasan: bad access detected [ 24.606590] [ 24.608288] Memory state around the buggy address: [ 24.609047] fff00000c6361080: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.610251] fff00000c6361100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.611234] >fff00000c6361180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.611794] ^ [ 24.612311] fff00000c6361200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.612954] fff00000c6361280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.613664] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob
[ 24.108995] ================================================================== [ 24.109990] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 24.110746] Write of size 16 at addr fff00000c6361160 by task kunit_try_catch/154 [ 24.111716] [ 24.112479] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 24.114036] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.114998] Hardware name: linux,dummy-virt (DT) [ 24.115650] Call trace: [ 24.116112] show_stack+0x20/0x38 (C) [ 24.116732] dump_stack_lvl+0x8c/0xd0 [ 24.117317] print_report+0x118/0x5e0 [ 24.117866] kasan_report+0xc8/0x118 [ 24.118389] __asan_report_store16_noabort+0x20/0x30 [ 24.119130] kmalloc_oob_16+0x3a0/0x3f8 [ 24.119600] kunit_try_run_case+0x14c/0x3d0 [ 24.120265] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.121076] kthread+0x24c/0x2d0 [ 24.121623] ret_from_fork+0x10/0x20 [ 24.122208] [ 24.122598] Allocated by task 154: [ 24.123186] kasan_save_stack+0x3c/0x68 [ 24.123824] kasan_save_track+0x20/0x40 [ 24.124469] kasan_save_alloc_info+0x40/0x58 [ 24.125164] __kasan_kmalloc+0xd4/0xd8 [ 24.125788] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.126436] kmalloc_oob_16+0xb4/0x3f8 [ 24.127193] kunit_try_run_case+0x14c/0x3d0 [ 24.127984] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.128775] kthread+0x24c/0x2d0 [ 24.129247] ret_from_fork+0x10/0x20 [ 24.130034] [ 24.130352] The buggy address belongs to the object at fff00000c6361160 [ 24.130352] which belongs to the cache kmalloc-16 of size 16 [ 24.132107] The buggy address is located 0 bytes inside of [ 24.132107] allocated 13-byte region [fff00000c6361160, fff00000c636116d) [ 24.133417] [ 24.133641] The buggy address belongs to the physical page: [ 24.134651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361 [ 24.135882] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.136629] page_type: f5(slab) [ 24.137112] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.137940] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 24.138775] page dumped because: kasan: bad access detected [ 24.139346] [ 24.139661] Memory state around the buggy address: [ 24.140519] fff00000c6361000: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 24.141292] fff00000c6361080: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.142117] >fff00000c6361100: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 24.143081] ^ [ 24.143824] fff00000c6361180: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.144603] fff00000c6361200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.145376] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 23.995981] ================================================================== [ 23.997118] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 23.997942] Read of size 1 at addr fff00000c0973600 by task kunit_try_catch/152 [ 23.998813] [ 23.999646] CPU: 0 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 24.000922] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.001489] Hardware name: linux,dummy-virt (DT) [ 24.002361] Call trace: [ 24.003298] show_stack+0x20/0x38 (C) [ 24.003879] dump_stack_lvl+0x8c/0xd0 [ 24.004440] print_report+0x118/0x5e0 [ 24.005025] kasan_report+0xc8/0x118 [ 24.005561] __kasan_check_byte+0x54/0x70 [ 24.006192] krealloc_noprof+0x44/0x360 [ 24.006770] krealloc_uaf+0x180/0x520 [ 24.007336] kunit_try_run_case+0x14c/0x3d0 [ 24.008323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.008998] kthread+0x24c/0x2d0 [ 24.009399] ret_from_fork+0x10/0x20 [ 24.010406] [ 24.010792] Allocated by task 152: [ 24.011353] kasan_save_stack+0x3c/0x68 [ 24.012212] kasan_save_track+0x20/0x40 [ 24.012811] kasan_save_alloc_info+0x40/0x58 [ 24.013482] __kasan_kmalloc+0xd4/0xd8 [ 24.014091] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.014733] krealloc_uaf+0xc8/0x520 [ 24.015343] kunit_try_run_case+0x14c/0x3d0 [ 24.016006] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.017427] kthread+0x24c/0x2d0 [ 24.017870] ret_from_fork+0x10/0x20 [ 24.018380] [ 24.018722] Freed by task 152: [ 24.019532] kasan_save_stack+0x3c/0x68 [ 24.020079] kasan_save_track+0x20/0x40 [ 24.020613] kasan_save_free_info+0x4c/0x78 [ 24.021176] __kasan_slab_free+0x6c/0x98 [ 24.021753] kfree+0x114/0x3c8 [ 24.022210] krealloc_uaf+0x12c/0x520 [ 24.022748] kunit_try_run_case+0x14c/0x3d0 [ 24.024037] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.024729] kthread+0x24c/0x2d0 [ 24.025238] ret_from_fork+0x10/0x20 [ 24.025795] [ 24.026143] The buggy address belongs to the object at fff00000c0973600 [ 24.026143] which belongs to the cache kmalloc-256 of size 256 [ 24.027517] The buggy address is located 0 bytes inside of [ 24.027517] freed 256-byte region [fff00000c0973600, fff00000c0973700) [ 24.029198] [ 24.029428] The buggy address belongs to the physical page: [ 24.030181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100972 [ 24.031647] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.032786] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.033523] page_type: f5(slab) [ 24.034062] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.035269] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.036017] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.036901] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.037808] head: 0bfffe0000000001 ffffc1ffc3025c81 ffffffffffffffff 0000000000000000 [ 24.038650] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 24.040087] page dumped because: kasan: bad access detected [ 24.040721] [ 24.041041] Memory state around the buggy address: [ 24.041635] fff00000c0973500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.042436] fff00000c0973580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.043634] >fff00000c0973600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.044534] ^ [ 24.045154] fff00000c0973680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.046195] fff00000c0973700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.047950] ================================================================== [ 24.051410] ================================================================== [ 24.052269] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 24.052933] Read of size 1 at addr fff00000c0973600 by task kunit_try_catch/152 [ 24.053535] [ 24.053938] CPU: 0 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 24.055123] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.055833] Hardware name: linux,dummy-virt (DT) [ 24.057181] Call trace: [ 24.057613] show_stack+0x20/0x38 (C) [ 24.058284] dump_stack_lvl+0x8c/0xd0 [ 24.059193] print_report+0x118/0x5e0 [ 24.059662] kasan_report+0xc8/0x118 [ 24.060084] __asan_report_load1_noabort+0x20/0x30 [ 24.060579] krealloc_uaf+0x4c8/0x520 [ 24.061454] kunit_try_run_case+0x14c/0x3d0 [ 24.062027] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.062799] kthread+0x24c/0x2d0 [ 24.063651] ret_from_fork+0x10/0x20 [ 24.064100] [ 24.064503] Allocated by task 152: [ 24.065285] kasan_save_stack+0x3c/0x68 [ 24.065870] kasan_save_track+0x20/0x40 [ 24.066409] kasan_save_alloc_info+0x40/0x58 [ 24.067027] __kasan_kmalloc+0xd4/0xd8 [ 24.067569] __kmalloc_cache_noprof+0x15c/0x3c0 [ 24.068566] krealloc_uaf+0xc8/0x520 [ 24.069121] kunit_try_run_case+0x14c/0x3d0 [ 24.069686] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.070368] kthread+0x24c/0x2d0 [ 24.070936] ret_from_fork+0x10/0x20 [ 24.072070] [ 24.072390] Freed by task 152: [ 24.072858] kasan_save_stack+0x3c/0x68 [ 24.073387] kasan_save_track+0x20/0x40 [ 24.073964] kasan_save_free_info+0x4c/0x78 [ 24.074523] __kasan_slab_free+0x6c/0x98 [ 24.075149] kfree+0x114/0x3c8 [ 24.075597] krealloc_uaf+0x12c/0x520 [ 24.076113] kunit_try_run_case+0x14c/0x3d0 [ 24.076652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.077725] kthread+0x24c/0x2d0 [ 24.078208] ret_from_fork+0x10/0x20 [ 24.078753] [ 24.079082] The buggy address belongs to the object at fff00000c0973600 [ 24.079082] which belongs to the cache kmalloc-256 of size 256 [ 24.081009] The buggy address is located 0 bytes inside of [ 24.081009] freed 256-byte region [fff00000c0973600, fff00000c0973700) [ 24.082166] [ 24.082479] The buggy address belongs to the physical page: [ 24.083441] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100972 [ 24.084165] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 24.084972] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 24.085799] page_type: f5(slab) [ 24.086233] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.087887] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.088603] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 24.089471] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.090365] head: 0bfffe0000000001 ffffc1ffc3025c81 ffffffffffffffff 0000000000000000 [ 24.091428] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 24.092575] page dumped because: kasan: bad access detected [ 24.093455] [ 24.093762] Memory state around the buggy address: [ 24.094291] fff00000c0973500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.095203] fff00000c0973580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.096239] >fff00000c0973600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.097255] ^ [ 24.097888] fff00000c0973680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.098762] fff00000c0973700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.099798] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 23.568856] ================================================================== [ 23.569591] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 23.570339] Write of size 1 at addr fff00000c09734d0 by task kunit_try_catch/146 [ 23.571130] [ 23.571890] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 23.573107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.573660] Hardware name: linux,dummy-virt (DT) [ 23.574261] Call trace: [ 23.574743] show_stack+0x20/0x38 (C) [ 23.575806] dump_stack_lvl+0x8c/0xd0 [ 23.576314] print_report+0x118/0x5e0 [ 23.576856] kasan_report+0xc8/0x118 [ 23.577391] __asan_report_store1_noabort+0x20/0x30 [ 23.578106] krealloc_less_oob_helper+0xb9c/0xc50 [ 23.578785] krealloc_less_oob+0x20/0x38 [ 23.579607] kunit_try_run_case+0x14c/0x3d0 [ 23.580185] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.580894] kthread+0x24c/0x2d0 [ 23.581462] ret_from_fork+0x10/0x20 [ 23.581976] [ 23.582301] Allocated by task 146: [ 23.583608] kasan_save_stack+0x3c/0x68 [ 23.584061] kasan_save_track+0x20/0x40 [ 23.584596] kasan_save_alloc_info+0x40/0x58 [ 23.585213] __kasan_krealloc+0x118/0x178 [ 23.585786] krealloc_noprof+0x128/0x360 [ 23.586356] krealloc_less_oob_helper+0x168/0xc50 [ 23.587220] krealloc_less_oob+0x20/0x38 [ 23.587772] kunit_try_run_case+0x14c/0x3d0 [ 23.588311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.589194] kthread+0x24c/0x2d0 [ 23.589682] ret_from_fork+0x10/0x20 [ 23.590203] [ 23.590513] The buggy address belongs to the object at fff00000c0973400 [ 23.590513] which belongs to the cache kmalloc-256 of size 256 [ 23.592344] The buggy address is located 7 bytes to the right of [ 23.592344] allocated 201-byte region [fff00000c0973400, fff00000c09734c9) [ 23.593536] [ 23.593901] The buggy address belongs to the physical page: [ 23.594472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100972 [ 23.595329] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.596235] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.597016] page_type: f5(slab) [ 23.598104] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 23.600331] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.601389] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 23.602246] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.603153] head: 0bfffe0000000001 ffffc1ffc3025c81 ffffffffffffffff 0000000000000000 [ 23.604057] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 23.605106] page dumped because: kasan: bad access detected [ 23.605690] [ 23.606014] Memory state around the buggy address: [ 23.606578] fff00000c0973380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.608120] fff00000c0973400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.608956] >fff00000c0973480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.609766] ^ [ 23.610390] fff00000c0973500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.611273] fff00000c0973580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.612338] ================================================================== [ 23.829668] ================================================================== [ 23.830717] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 23.831491] Write of size 1 at addr fff00000c64620c9 by task kunit_try_catch/150 [ 23.832629] [ 23.832957] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 23.834264] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.835145] Hardware name: linux,dummy-virt (DT) [ 23.835687] Call trace: [ 23.836077] show_stack+0x20/0x38 (C) [ 23.836661] dump_stack_lvl+0x8c/0xd0 [ 23.837209] print_report+0x118/0x5e0 [ 23.837809] kasan_report+0xc8/0x118 [ 23.838353] __asan_report_store1_noabort+0x20/0x30 [ 23.839278] krealloc_less_oob_helper+0xa48/0xc50 [ 23.839869] krealloc_large_less_oob+0x20/0x38 [ 23.840513] kunit_try_run_case+0x14c/0x3d0 [ 23.841181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.841931] kthread+0x24c/0x2d0 [ 23.842518] ret_from_fork+0x10/0x20 [ 23.843274] [ 23.843595] The buggy address belongs to the physical page: [ 23.844144] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106460 [ 23.845093] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.845865] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.846744] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.847804] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.848628] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.849502] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.850384] head: 0bfffe0000000002 ffffc1ffc3191801 ffffffffffffffff 0000000000000000 [ 23.851455] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 23.852321] page dumped because: kasan: bad access detected [ 23.852974] [ 23.853281] Memory state around the buggy address: [ 23.853860] fff00000c6461f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.854630] fff00000c6462000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.855657] >fff00000c6462080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.856365] ^ [ 23.857085] fff00000c6462100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.857931] fff00000c6462180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.858685] ================================================================== [ 23.860405] ================================================================== [ 23.861161] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 23.862518] Write of size 1 at addr fff00000c64620d0 by task kunit_try_catch/150 [ 23.863949] [ 23.864265] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 23.865248] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.865884] Hardware name: linux,dummy-virt (DT) [ 23.866472] Call trace: [ 23.866872] show_stack+0x20/0x38 (C) [ 23.868001] dump_stack_lvl+0x8c/0xd0 [ 23.868511] print_report+0x118/0x5e0 [ 23.869100] kasan_report+0xc8/0x118 [ 23.869714] __asan_report_store1_noabort+0x20/0x30 [ 23.870314] krealloc_less_oob_helper+0xb9c/0xc50 [ 23.871258] krealloc_large_less_oob+0x20/0x38 [ 23.871820] kunit_try_run_case+0x14c/0x3d0 [ 23.872478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.873176] kthread+0x24c/0x2d0 [ 23.873659] ret_from_fork+0x10/0x20 [ 23.874259] [ 23.874566] The buggy address belongs to the physical page: [ 23.875404] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106460 [ 23.876274] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.877118] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.877986] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.878803] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.879611] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.880515] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.881485] head: 0bfffe0000000002 ffffc1ffc3191801 ffffffffffffffff 0000000000000000 [ 23.882451] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 23.883459] page dumped because: kasan: bad access detected [ 23.884117] [ 23.884395] Memory state around the buggy address: [ 23.884939] fff00000c6461f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.885642] fff00000c6462000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.887109] >fff00000c6462080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.887762] ^ [ 23.888362] fff00000c6462100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.889746] fff00000c6462180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.890508] ================================================================== [ 23.523683] ================================================================== [ 23.524812] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 23.525507] Write of size 1 at addr fff00000c09734c9 by task kunit_try_catch/146 [ 23.526407] [ 23.526748] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 23.527996] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.528483] Hardware name: linux,dummy-virt (DT) [ 23.528974] Call trace: [ 23.529359] show_stack+0x20/0x38 (C) [ 23.530219] dump_stack_lvl+0x8c/0xd0 [ 23.530873] print_report+0x118/0x5e0 [ 23.531504] kasan_report+0xc8/0x118 [ 23.532131] __asan_report_store1_noabort+0x20/0x30 [ 23.533059] krealloc_less_oob_helper+0xa48/0xc50 [ 23.533671] krealloc_less_oob+0x20/0x38 [ 23.534264] kunit_try_run_case+0x14c/0x3d0 [ 23.534790] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.536419] kthread+0x24c/0x2d0 [ 23.536953] ret_from_fork+0x10/0x20 [ 23.537622] [ 23.537984] Allocated by task 146: [ 23.538451] kasan_save_stack+0x3c/0x68 [ 23.539318] kasan_save_track+0x20/0x40 [ 23.539797] kasan_save_alloc_info+0x40/0x58 [ 23.540309] __kasan_krealloc+0x118/0x178 [ 23.541025] krealloc_noprof+0x128/0x360 [ 23.541647] krealloc_less_oob_helper+0x168/0xc50 [ 23.542338] krealloc_less_oob+0x20/0x38 [ 23.543431] kunit_try_run_case+0x14c/0x3d0 [ 23.544051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.544746] kthread+0x24c/0x2d0 [ 23.545305] ret_from_fork+0x10/0x20 [ 23.545920] [ 23.546264] The buggy address belongs to the object at fff00000c0973400 [ 23.546264] which belongs to the cache kmalloc-256 of size 256 [ 23.548246] The buggy address is located 0 bytes to the right of [ 23.548246] allocated 201-byte region [fff00000c0973400, fff00000c09734c9) [ 23.549695] [ 23.550177] The buggy address belongs to the physical page: [ 23.550953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100972 [ 23.552052] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.553302] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.554148] page_type: f5(slab) [ 23.554651] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 23.555553] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.556326] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 23.557485] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.558362] head: 0bfffe0000000001 ffffc1ffc3025c81 ffffffffffffffff 0000000000000000 [ 23.559315] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 23.559883] page dumped because: kasan: bad access detected [ 23.560152] [ 23.560283] Memory state around the buggy address: [ 23.560523] fff00000c0973380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.561260] fff00000c0973400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.562319] >fff00000c0973480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.563721] ^ [ 23.564450] fff00000c0973500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.565379] fff00000c0973580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.566362] ================================================================== [ 23.705291] ================================================================== [ 23.705936] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 23.707829] Write of size 1 at addr fff00000c09734eb by task kunit_try_catch/146 [ 23.708660] [ 23.709007] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 23.710081] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.710637] Hardware name: linux,dummy-virt (DT) [ 23.711992] Call trace: [ 23.712412] show_stack+0x20/0x38 (C) [ 23.713037] dump_stack_lvl+0x8c/0xd0 [ 23.713577] print_report+0x118/0x5e0 [ 23.714104] kasan_report+0xc8/0x118 [ 23.714717] __asan_report_store1_noabort+0x20/0x30 [ 23.715734] krealloc_less_oob_helper+0xa58/0xc50 [ 23.716224] krealloc_less_oob+0x20/0x38 [ 23.716861] kunit_try_run_case+0x14c/0x3d0 [ 23.717413] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.718359] kthread+0x24c/0x2d0 [ 23.719143] ret_from_fork+0x10/0x20 [ 23.719660] [ 23.719984] Allocated by task 146: [ 23.720421] kasan_save_stack+0x3c/0x68 [ 23.720949] kasan_save_track+0x20/0x40 [ 23.721527] kasan_save_alloc_info+0x40/0x58 [ 23.722104] __kasan_krealloc+0x118/0x178 [ 23.722603] krealloc_noprof+0x128/0x360 [ 23.723307] krealloc_less_oob_helper+0x168/0xc50 [ 23.724544] krealloc_less_oob+0x20/0x38 [ 23.725079] kunit_try_run_case+0x14c/0x3d0 [ 23.725659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.726376] kthread+0x24c/0x2d0 [ 23.727199] ret_from_fork+0x10/0x20 [ 23.727560] [ 23.727950] The buggy address belongs to the object at fff00000c0973400 [ 23.727950] which belongs to the cache kmalloc-256 of size 256 [ 23.729117] The buggy address is located 34 bytes to the right of [ 23.729117] allocated 201-byte region [fff00000c0973400, fff00000c09734c9) [ 23.730380] [ 23.730721] The buggy address belongs to the physical page: [ 23.731437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100972 [ 23.732518] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.733759] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.735078] page_type: f5(slab) [ 23.735684] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 23.736558] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.737454] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 23.738335] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.739516] head: 0bfffe0000000001 ffffc1ffc3025c81 ffffffffffffffff 0000000000000000 [ 23.740355] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 23.741123] page dumped because: kasan: bad access detected [ 23.741687] [ 23.742658] Memory state around the buggy address: [ 23.743211] fff00000c0973380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.744012] fff00000c0973400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.744935] >fff00000c0973480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.746178] ^ [ 23.746881] fff00000c0973500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.748274] fff00000c0973580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.749149] ================================================================== [ 23.614559] ================================================================== [ 23.615389] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 23.616152] Write of size 1 at addr fff00000c09734da by task kunit_try_catch/146 [ 23.617593] [ 23.617899] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 23.619425] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.619874] Hardware name: linux,dummy-virt (DT) [ 23.620517] Call trace: [ 23.620992] show_stack+0x20/0x38 (C) [ 23.621607] dump_stack_lvl+0x8c/0xd0 [ 23.622202] print_report+0x118/0x5e0 [ 23.622795] kasan_report+0xc8/0x118 [ 23.623357] __asan_report_store1_noabort+0x20/0x30 [ 23.624561] krealloc_less_oob_helper+0xa80/0xc50 [ 23.625245] krealloc_less_oob+0x20/0x38 [ 23.625956] kunit_try_run_case+0x14c/0x3d0 [ 23.626664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.627504] kthread+0x24c/0x2d0 [ 23.628398] ret_from_fork+0x10/0x20 [ 23.628970] [ 23.629479] Allocated by task 146: [ 23.630051] kasan_save_stack+0x3c/0x68 [ 23.630769] kasan_save_track+0x20/0x40 [ 23.631209] kasan_save_alloc_info+0x40/0x58 [ 23.631661] __kasan_krealloc+0x118/0x178 [ 23.632157] krealloc_noprof+0x128/0x360 [ 23.633075] krealloc_less_oob_helper+0x168/0xc50 [ 23.633745] krealloc_less_oob+0x20/0x38 [ 23.634396] kunit_try_run_case+0x14c/0x3d0 [ 23.635060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.635909] kthread+0x24c/0x2d0 [ 23.636415] ret_from_fork+0x10/0x20 [ 23.636971] [ 23.637333] The buggy address belongs to the object at fff00000c0973400 [ 23.637333] which belongs to the cache kmalloc-256 of size 256 [ 23.639315] The buggy address is located 17 bytes to the right of [ 23.639315] allocated 201-byte region [fff00000c0973400, fff00000c09734c9) [ 23.640718] [ 23.641041] The buggy address belongs to the physical page: [ 23.641694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100972 [ 23.642716] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.643842] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.644222] page_type: f5(slab) [ 23.644426] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 23.644891] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.646128] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 23.647367] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.648488] head: 0bfffe0000000001 ffffc1ffc3025c81 ffffffffffffffff 0000000000000000 [ 23.649504] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 23.651285] page dumped because: kasan: bad access detected [ 23.652147] [ 23.652363] Memory state around the buggy address: [ 23.653140] fff00000c0973380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.653979] fff00000c0973400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.654847] >fff00000c0973480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.656033] ^ [ 23.657150] fff00000c0973500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.658122] fff00000c0973580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.659039] ================================================================== [ 23.891782] ================================================================== [ 23.892590] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 23.893403] Write of size 1 at addr fff00000c64620da by task kunit_try_catch/150 [ 23.894215] [ 23.894533] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 23.897156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.897721] Hardware name: linux,dummy-virt (DT) [ 23.898271] Call trace: [ 23.898737] show_stack+0x20/0x38 (C) [ 23.899501] dump_stack_lvl+0x8c/0xd0 [ 23.899956] print_report+0x118/0x5e0 [ 23.900362] kasan_report+0xc8/0x118 [ 23.900776] __asan_report_store1_noabort+0x20/0x30 [ 23.901269] krealloc_less_oob_helper+0xa80/0xc50 [ 23.902325] krealloc_large_less_oob+0x20/0x38 [ 23.903418] kunit_try_run_case+0x14c/0x3d0 [ 23.903948] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.904743] kthread+0x24c/0x2d0 [ 23.905278] ret_from_fork+0x10/0x20 [ 23.905803] [ 23.906154] The buggy address belongs to the physical page: [ 23.906749] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106460 [ 23.907690] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.908506] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.909549] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.910405] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.911297] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.912314] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.913168] head: 0bfffe0000000002 ffffc1ffc3191801 ffffffffffffffff 0000000000000000 [ 23.913963] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 23.914781] page dumped because: kasan: bad access detected [ 23.916026] [ 23.916318] Memory state around the buggy address: [ 23.916876] fff00000c6461f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.917684] fff00000c6462000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.918475] >fff00000c6462080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.919452] ^ [ 23.920043] fff00000c6462100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.920893] fff00000c6462180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.921627] ================================================================== [ 23.956447] ================================================================== [ 23.957129] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 23.958068] Write of size 1 at addr fff00000c64620eb by task kunit_try_catch/150 [ 23.959074] [ 23.959346] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 23.961444] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.962167] Hardware name: linux,dummy-virt (DT) [ 23.963348] Call trace: [ 23.963827] show_stack+0x20/0x38 (C) [ 23.964510] dump_stack_lvl+0x8c/0xd0 [ 23.965198] print_report+0x118/0x5e0 [ 23.965829] kasan_report+0xc8/0x118 [ 23.966473] __asan_report_store1_noabort+0x20/0x30 [ 23.967480] krealloc_less_oob_helper+0xa58/0xc50 [ 23.967958] krealloc_large_less_oob+0x20/0x38 [ 23.968770] kunit_try_run_case+0x14c/0x3d0 [ 23.969354] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.970208] kthread+0x24c/0x2d0 [ 23.970743] ret_from_fork+0x10/0x20 [ 23.971549] [ 23.971906] The buggy address belongs to the physical page: [ 23.972552] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106460 [ 23.973470] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.974374] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.975390] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.976161] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.977062] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.977977] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.978856] head: 0bfffe0000000002 ffffc1ffc3191801 ffffffffffffffff 0000000000000000 [ 23.980077] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 23.981177] page dumped because: kasan: bad access detected [ 23.981448] [ 23.981580] Memory state around the buggy address: [ 23.982005] fff00000c6461f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.983446] fff00000c6462000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.984342] >fff00000c6462080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.985192] ^ [ 23.985961] fff00000c6462100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.986773] fff00000c6462180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.987726] ================================================================== [ 23.661481] ================================================================== [ 23.662166] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 23.663155] Write of size 1 at addr fff00000c09734ea by task kunit_try_catch/146 [ 23.664765] [ 23.665033] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 23.665545] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.665844] Hardware name: linux,dummy-virt (DT) [ 23.666369] Call trace: [ 23.666785] show_stack+0x20/0x38 (C) [ 23.667944] dump_stack_lvl+0x8c/0xd0 [ 23.668556] print_report+0x118/0x5e0 [ 23.669224] kasan_report+0xc8/0x118 [ 23.669910] __asan_report_store1_noabort+0x20/0x30 [ 23.670652] krealloc_less_oob_helper+0xae4/0xc50 [ 23.671466] krealloc_less_oob+0x20/0x38 [ 23.672442] kunit_try_run_case+0x14c/0x3d0 [ 23.672834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.673779] kthread+0x24c/0x2d0 [ 23.674388] ret_from_fork+0x10/0x20 [ 23.675281] [ 23.675626] Allocated by task 146: [ 23.676280] kasan_save_stack+0x3c/0x68 [ 23.676904] kasan_save_track+0x20/0x40 [ 23.677481] kasan_save_alloc_info+0x40/0x58 [ 23.678135] __kasan_krealloc+0x118/0x178 [ 23.678763] krealloc_noprof+0x128/0x360 [ 23.679472] krealloc_less_oob_helper+0x168/0xc50 [ 23.680346] krealloc_less_oob+0x20/0x38 [ 23.680590] kunit_try_run_case+0x14c/0x3d0 [ 23.681282] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.681919] kthread+0x24c/0x2d0 [ 23.682337] ret_from_fork+0x10/0x20 [ 23.682903] [ 23.683541] The buggy address belongs to the object at fff00000c0973400 [ 23.683541] which belongs to the cache kmalloc-256 of size 256 [ 23.685323] The buggy address is located 33 bytes to the right of [ 23.685323] allocated 201-byte region [fff00000c0973400, fff00000c09734c9) [ 23.686578] [ 23.686877] The buggy address belongs to the physical page: [ 23.687538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100972 [ 23.688401] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.689671] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.690118] page_type: f5(slab) [ 23.690325] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 23.690667] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.691838] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 23.692632] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.693545] head: 0bfffe0000000001 ffffc1ffc3025c81 ffffffffffffffff 0000000000000000 [ 23.694560] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 23.695694] page dumped because: kasan: bad access detected [ 23.696336] [ 23.696649] Memory state around the buggy address: [ 23.697205] fff00000c0973380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.698418] fff00000c0973400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.699727] >fff00000c0973480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 23.700696] ^ [ 23.701411] fff00000c0973500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.702297] fff00000c0973580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.703196] ================================================================== [ 23.922757] ================================================================== [ 23.924569] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 23.925449] Write of size 1 at addr fff00000c64620ea by task kunit_try_catch/150 [ 23.926804] [ 23.927362] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 23.928446] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.928949] Hardware name: linux,dummy-virt (DT) [ 23.929470] Call trace: [ 23.929866] show_stack+0x20/0x38 (C) [ 23.930455] dump_stack_lvl+0x8c/0xd0 [ 23.930935] print_report+0x118/0x5e0 [ 23.931848] kasan_report+0xc8/0x118 [ 23.932439] __asan_report_store1_noabort+0x20/0x30 [ 23.933185] krealloc_less_oob_helper+0xae4/0xc50 [ 23.933895] krealloc_large_less_oob+0x20/0x38 [ 23.934540] kunit_try_run_case+0x14c/0x3d0 [ 23.935281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.936245] kthread+0x24c/0x2d0 [ 23.936909] ret_from_fork+0x10/0x20 [ 23.937585] [ 23.938039] The buggy address belongs to the physical page: [ 23.938753] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106460 [ 23.939809] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.940565] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.941608] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.942395] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.943475] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.944556] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.945730] head: 0bfffe0000000002 ffffc1ffc3191801 ffffffffffffffff 0000000000000000 [ 23.946490] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 23.947247] page dumped because: kasan: bad access detected [ 23.947721] [ 23.947974] Memory state around the buggy address: [ 23.948395] fff00000c6461f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.949878] fff00000c6462000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.950829] >fff00000c6462080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 23.951874] ^ [ 23.952571] fff00000c6462100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.953338] fff00000c6462180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.954315] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 23.789585] ================================================================== [ 23.790358] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680 [ 23.791280] Write of size 1 at addr fff00000c645e0f0 by task kunit_try_catch/148 [ 23.792492] [ 23.792842] CPU: 0 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 23.794530] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.795493] Hardware name: linux,dummy-virt (DT) [ 23.796094] Call trace: [ 23.796550] show_stack+0x20/0x38 (C) [ 23.797214] dump_stack_lvl+0x8c/0xd0 [ 23.797903] print_report+0x118/0x5e0 [ 23.798562] kasan_report+0xc8/0x118 [ 23.799497] __asan_report_store1_noabort+0x20/0x30 [ 23.800090] krealloc_more_oob_helper+0x5c8/0x680 [ 23.800754] krealloc_large_more_oob+0x20/0x38 [ 23.801347] kunit_try_run_case+0x14c/0x3d0 [ 23.802034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.802719] kthread+0x24c/0x2d0 [ 23.803329] ret_from_fork+0x10/0x20 [ 23.804158] [ 23.804528] The buggy address belongs to the physical page: [ 23.805185] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10645c [ 23.806036] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.807318] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.808210] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.809047] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.809918] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.810759] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.811885] head: 0bfffe0000000002 ffffc1ffc3191701 ffffffffffffffff 0000000000000000 [ 23.812737] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 23.813447] page dumped because: kasan: bad access detected [ 23.813768] [ 23.814052] Memory state around the buggy address: [ 23.814562] fff00000c645df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.815858] fff00000c645e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.816458] >fff00000c645e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 23.817337] ^ [ 23.818372] fff00000c645e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.819518] fff00000c645e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.820690] ================================================================== [ 23.472019] ================================================================== [ 23.472715] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680 [ 23.473663] Write of size 1 at addr fff00000c4598af0 by task kunit_try_catch/144 [ 23.474550] [ 23.474972] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 23.477115] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.477623] Hardware name: linux,dummy-virt (DT) [ 23.478272] Call trace: [ 23.478659] show_stack+0x20/0x38 (C) [ 23.479410] dump_stack_lvl+0x8c/0xd0 [ 23.479972] print_report+0x118/0x5e0 [ 23.480474] kasan_report+0xc8/0x118 [ 23.481085] __asan_report_store1_noabort+0x20/0x30 [ 23.482284] krealloc_more_oob_helper+0x5c8/0x680 [ 23.483018] krealloc_more_oob+0x20/0x38 [ 23.483565] kunit_try_run_case+0x14c/0x3d0 [ 23.484242] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.484955] kthread+0x24c/0x2d0 [ 23.485529] ret_from_fork+0x10/0x20 [ 23.486068] [ 23.486382] Allocated by task 144: [ 23.487156] kasan_save_stack+0x3c/0x68 [ 23.487656] kasan_save_track+0x20/0x40 [ 23.488181] kasan_save_alloc_info+0x40/0x58 [ 23.488764] __kasan_krealloc+0x118/0x178 [ 23.489273] krealloc_noprof+0x128/0x360 [ 23.489889] krealloc_more_oob_helper+0x168/0x680 [ 23.490458] krealloc_more_oob+0x20/0x38 [ 23.491015] kunit_try_run_case+0x14c/0x3d0 [ 23.492223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.492945] kthread+0x24c/0x2d0 [ 23.493509] ret_from_fork+0x10/0x20 [ 23.494150] [ 23.494421] The buggy address belongs to the object at fff00000c4598a00 [ 23.494421] which belongs to the cache kmalloc-256 of size 256 [ 23.496044] The buggy address is located 5 bytes to the right of [ 23.496044] allocated 235-byte region [fff00000c4598a00, fff00000c4598aeb) [ 23.497769] [ 23.498116] The buggy address belongs to the physical page: [ 23.498854] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104598 [ 23.500023] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.500904] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.501738] page_type: f5(slab) [ 23.502173] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 23.503039] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.503965] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 23.504828] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.505757] head: 0bfffe0000000001 ffffc1ffc3116601 ffffffffffffffff 0000000000000000 [ 23.506614] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 23.507509] page dumped because: kasan: bad access detected [ 23.508174] [ 23.508461] Memory state around the buggy address: [ 23.509244] fff00000c4598980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.509982] fff00000c4598a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.510780] >fff00000c4598a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 23.512024] ^ [ 23.512752] fff00000c4598b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.513606] fff00000c4598b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.514471] ================================================================== [ 23.425666] ================================================================== [ 23.426719] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680 [ 23.427931] Write of size 1 at addr fff00000c4598aeb by task kunit_try_catch/144 [ 23.428728] [ 23.429150] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 23.430299] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.430939] Hardware name: linux,dummy-virt (DT) [ 23.431952] Call trace: [ 23.432446] show_stack+0x20/0x38 (C) [ 23.433130] dump_stack_lvl+0x8c/0xd0 [ 23.433773] print_report+0x118/0x5e0 [ 23.434426] kasan_report+0xc8/0x118 [ 23.435071] __asan_report_store1_noabort+0x20/0x30 [ 23.435770] krealloc_more_oob_helper+0x614/0x680 [ 23.436883] krealloc_more_oob+0x20/0x38 [ 23.437554] kunit_try_run_case+0x14c/0x3d0 [ 23.438184] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.439100] kthread+0x24c/0x2d0 [ 23.439721] ret_from_fork+0x10/0x20 [ 23.440363] [ 23.440801] Allocated by task 144: [ 23.441363] kasan_save_stack+0x3c/0x68 [ 23.442066] kasan_save_track+0x20/0x40 [ 23.442676] kasan_save_alloc_info+0x40/0x58 [ 23.443536] __kasan_krealloc+0x118/0x178 [ 23.444176] krealloc_noprof+0x128/0x360 [ 23.444911] krealloc_more_oob_helper+0x168/0x680 [ 23.445649] krealloc_more_oob+0x20/0x38 [ 23.446286] kunit_try_run_case+0x14c/0x3d0 [ 23.447249] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.448002] kthread+0x24c/0x2d0 [ 23.448581] ret_from_fork+0x10/0x20 [ 23.449216] [ 23.449568] The buggy address belongs to the object at fff00000c4598a00 [ 23.449568] which belongs to the cache kmalloc-256 of size 256 [ 23.451076] The buggy address is located 0 bytes to the right of [ 23.451076] allocated 235-byte region [fff00000c4598a00, fff00000c4598aeb) [ 23.452436] [ 23.453000] The buggy address belongs to the physical page: [ 23.453527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104598 [ 23.454672] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.455862] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.456838] page_type: f5(slab) [ 23.457460] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 23.458466] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.459565] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 23.460602] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.461496] head: 0bfffe0000000001 ffffc1ffc3116601 ffffffffffffffff 0000000000000000 [ 23.462390] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 23.463455] page dumped because: kasan: bad access detected [ 23.463984] [ 23.464200] Memory state around the buggy address: [ 23.464651] fff00000c4598980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.465461] fff00000c4598a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.466353] >fff00000c4598a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 23.467279] ^ [ 23.468347] fff00000c4598b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.469131] fff00000c4598b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.469905] ================================================================== [ 23.756469] ================================================================== [ 23.757907] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680 [ 23.758612] Write of size 1 at addr fff00000c645e0eb by task kunit_try_catch/148 [ 23.760588] [ 23.761024] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 23.762170] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.763251] Hardware name: linux,dummy-virt (DT) [ 23.763931] Call trace: [ 23.764314] show_stack+0x20/0x38 (C) [ 23.764841] dump_stack_lvl+0x8c/0xd0 [ 23.765389] print_report+0x118/0x5e0 [ 23.766000] kasan_report+0xc8/0x118 [ 23.766511] __asan_report_store1_noabort+0x20/0x30 [ 23.767146] krealloc_more_oob_helper+0x614/0x680 [ 23.767943] krealloc_large_more_oob+0x20/0x38 [ 23.768521] kunit_try_run_case+0x14c/0x3d0 [ 23.769218] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.769918] kthread+0x24c/0x2d0 [ 23.770431] ret_from_fork+0x10/0x20 [ 23.771241] [ 23.771543] The buggy address belongs to the physical page: [ 23.772159] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10645c [ 23.773008] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.773878] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.774665] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.775504] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.776331] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.777301] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.778232] head: 0bfffe0000000002 ffffc1ffc3191701 ffffffffffffffff 0000000000000000 [ 23.779300] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 23.780334] page dumped because: kasan: bad access detected [ 23.780971] [ 23.781456] Memory state around the buggy address: [ 23.782201] fff00000c645df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.783244] fff00000c645e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.783966] >fff00000c645e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 23.784692] ^ [ 23.785382] fff00000c645e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.786142] fff00000c645e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.787109] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 23.390388] ================================================================== [ 23.392097] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 23.392754] Read of size 1 at addr fff00000c64c0000 by task kunit_try_catch/142 [ 23.393444] [ 23.393787] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 23.394868] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.395520] Hardware name: linux,dummy-virt (DT) [ 23.397194] Call trace: [ 23.397586] show_stack+0x20/0x38 (C) [ 23.398137] dump_stack_lvl+0x8c/0xd0 [ 23.398678] print_report+0x118/0x5e0 [ 23.399660] kasan_report+0xc8/0x118 [ 23.400357] __asan_report_load1_noabort+0x20/0x30 [ 23.400995] page_alloc_uaf+0x328/0x350 [ 23.401539] kunit_try_run_case+0x14c/0x3d0 [ 23.402132] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.402849] kthread+0x24c/0x2d0 [ 23.403421] ret_from_fork+0x10/0x20 [ 23.404014] [ 23.404331] The buggy address belongs to the physical page: [ 23.405363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064c0 [ 23.406205] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.407053] page_type: f0(buddy) [ 23.407542] raw: 0bfffe0000000000 fff00000ff6151b0 fff00000ff6151b0 0000000000000000 [ 23.408338] raw: 0000000000000000 0000000000000006 00000000f0000000 0000000000000000 [ 23.409539] page dumped because: kasan: bad access detected [ 23.410190] [ 23.410521] Memory state around the buggy address: [ 23.411214] fff00000c64bff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.412387] fff00000c64bff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.413455] >fff00000c64c0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.414161] ^ [ 23.414603] fff00000c64c0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.415769] fff00000c64c0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.416684] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 23.309940] ================================================================== [ 23.311541] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 23.312839] Read of size 1 at addr fff00000c6454000 by task kunit_try_catch/136 [ 23.313943] [ 23.314393] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 23.315135] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.315661] Hardware name: linux,dummy-virt (DT) [ 23.316545] Call trace: [ 23.316988] show_stack+0x20/0x38 (C) [ 23.317579] dump_stack_lvl+0x8c/0xd0 [ 23.318202] print_report+0x118/0x5e0 [ 23.319017] kasan_report+0xc8/0x118 [ 23.319570] __asan_report_load1_noabort+0x20/0x30 [ 23.320266] kmalloc_large_uaf+0x2cc/0x2f8 [ 23.320909] kunit_try_run_case+0x14c/0x3d0 [ 23.321532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.322291] kthread+0x24c/0x2d0 [ 23.322859] ret_from_fork+0x10/0x20 [ 23.323609] [ 23.323966] The buggy address belongs to the physical page: [ 23.324681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106454 [ 23.325590] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.326407] raw: 0bfffe0000000000 ffffc1ffc3191608 fff00000da4ff040 0000000000000000 [ 23.327308] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 23.328118] page dumped because: kasan: bad access detected [ 23.329156] [ 23.329491] Memory state around the buggy address: [ 23.330012] fff00000c6453f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.330733] fff00000c6453f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.332043] >fff00000c6454000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.332859] ^ [ 23.333310] fff00000c6454080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.334095] fff00000c6454100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.334925] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 23.273190] ================================================================== [ 23.274161] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 23.274881] Write of size 1 at addr fff00000c645600a by task kunit_try_catch/134 [ 23.276043] [ 23.276384] CPU: 1 UID: 0 PID: 134 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 23.277170] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.277813] Hardware name: linux,dummy-virt (DT) [ 23.278310] Call trace: [ 23.278803] show_stack+0x20/0x38 (C) [ 23.279325] dump_stack_lvl+0x8c/0xd0 [ 23.279897] print_report+0x118/0x5e0 [ 23.280429] kasan_report+0xc8/0x118 [ 23.281030] __asan_report_store1_noabort+0x20/0x30 [ 23.281652] kmalloc_large_oob_right+0x278/0x2b8 [ 23.282411] kunit_try_run_case+0x14c/0x3d0 [ 23.283358] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.284035] kthread+0x24c/0x2d0 [ 23.284570] ret_from_fork+0x10/0x20 [ 23.285133] [ 23.285490] The buggy address belongs to the physical page: [ 23.286193] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106454 [ 23.287177] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.288061] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.288912] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.289766] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.290566] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.291589] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.292344] head: 0bfffe0000000002 ffffc1ffc3191501 ffffffffffffffff 0000000000000000 [ 23.293154] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 23.294003] page dumped because: kasan: bad access detected [ 23.294634] [ 23.294943] Memory state around the buggy address: [ 23.295896] fff00000c6455f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.296687] fff00000c6455f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.297468] >fff00000c6456000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.298243] ^ [ 23.298676] fff00000c6456080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.299689] fff00000c6456100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.300541] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 23.223996] ================================================================== [ 23.225058] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 23.225865] Write of size 1 at addr fff00000c5dc5f00 by task kunit_try_catch/132 [ 23.226751] [ 23.227176] CPU: 1 UID: 0 PID: 132 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 23.228493] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.229266] Hardware name: linux,dummy-virt (DT) [ 23.229757] Call trace: [ 23.230144] show_stack+0x20/0x38 (C) [ 23.230853] dump_stack_lvl+0x8c/0xd0 [ 23.232208] print_report+0x118/0x5e0 [ 23.232785] kasan_report+0xc8/0x118 [ 23.233440] __asan_report_store1_noabort+0x20/0x30 [ 23.234269] kmalloc_big_oob_right+0x2a4/0x2f0 [ 23.235231] kunit_try_run_case+0x14c/0x3d0 [ 23.235815] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.236620] kthread+0x24c/0x2d0 [ 23.237209] ret_from_fork+0x10/0x20 [ 23.237792] [ 23.238093] Allocated by task 132: [ 23.238609] kasan_save_stack+0x3c/0x68 [ 23.239464] kasan_save_track+0x20/0x40 [ 23.240047] kasan_save_alloc_info+0x40/0x58 [ 23.240720] __kasan_kmalloc+0xd4/0xd8 [ 23.241317] __kmalloc_cache_noprof+0x15c/0x3c0 [ 23.241956] kmalloc_big_oob_right+0xb8/0x2f0 [ 23.242587] kunit_try_run_case+0x14c/0x3d0 [ 23.243378] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.243882] kthread+0x24c/0x2d0 [ 23.244241] ret_from_fork+0x10/0x20 [ 23.244656] [ 23.245132] The buggy address belongs to the object at fff00000c5dc4000 [ 23.245132] which belongs to the cache kmalloc-8k of size 8192 [ 23.246738] The buggy address is located 0 bytes to the right of [ 23.246738] allocated 7936-byte region [fff00000c5dc4000, fff00000c5dc5f00) [ 23.248356] [ 23.248749] The buggy address belongs to the physical page: [ 23.249383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105dc0 [ 23.250412] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.251567] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.252475] page_type: f5(slab) [ 23.253293] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 23.254241] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 23.255214] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 23.256063] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 23.257003] head: 0bfffe0000000003 ffffc1ffc3177001 ffffffffffffffff 0000000000000000 [ 23.257743] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000 [ 23.258797] page dumped because: kasan: bad access detected [ 23.259517] [ 23.259816] Memory state around the buggy address: [ 23.260472] fff00000c5dc5e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.261265] fff00000c5dc5e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.262175] >fff00000c5dc5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.262937] ^ [ 23.263889] fff00000c5dc5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.264534] fff00000c5dc6000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.265421] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 23.178797] ================================================================== [ 23.179763] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x420/0x490 [ 23.180482] Write of size 1 at addr fff00000c6391578 by task kunit_try_catch/130 [ 23.181322] [ 23.181730] CPU: 0 UID: 0 PID: 130 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 23.182835] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.183868] Hardware name: linux,dummy-virt (DT) [ 23.184446] Call trace: [ 23.184889] show_stack+0x20/0x38 (C) [ 23.185468] dump_stack_lvl+0x8c/0xd0 [ 23.186351] print_report+0x118/0x5e0 [ 23.187214] kasan_report+0xc8/0x118 [ 23.187883] __asan_report_store1_noabort+0x20/0x30 [ 23.188594] kmalloc_track_caller_oob_right+0x420/0x490 [ 23.189197] kunit_try_run_case+0x14c/0x3d0 [ 23.189954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.190731] kthread+0x24c/0x2d0 [ 23.191429] ret_from_fork+0x10/0x20 [ 23.191976] [ 23.192308] Allocated by task 130: [ 23.193365] kasan_save_stack+0x3c/0x68 [ 23.193868] kasan_save_track+0x20/0x40 [ 23.194356] kasan_save_alloc_info+0x40/0x58 [ 23.195203] __kasan_kmalloc+0xd4/0xd8 [ 23.195626] __kmalloc_node_track_caller_noprof+0x184/0x4b8 [ 23.196293] kmalloc_track_caller_oob_right+0x184/0x490 [ 23.196941] kunit_try_run_case+0x14c/0x3d0 [ 23.197552] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.198249] kthread+0x24c/0x2d0 [ 23.198723] ret_from_fork+0x10/0x20 [ 23.199880] [ 23.200206] The buggy address belongs to the object at fff00000c6391500 [ 23.200206] which belongs to the cache kmalloc-128 of size 128 [ 23.201410] The buggy address is located 0 bytes to the right of [ 23.201410] allocated 120-byte region [fff00000c6391500, fff00000c6391578) [ 23.202693] [ 23.203057] The buggy address belongs to the physical page: [ 23.204042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106391 [ 23.204919] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.205676] page_type: f5(slab) [ 23.206253] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 23.207717] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.208493] page dumped because: kasan: bad access detected [ 23.209187] [ 23.209487] Memory state around the buggy address: [ 23.210573] fff00000c6391400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.211607] fff00000c6391480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.212406] >fff00000c6391500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 23.213178] ^ [ 23.214076] fff00000c6391580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.214751] fff00000c6391600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.215880] ================================================================== [ 23.140034] ================================================================== [ 23.141098] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x414/0x490 [ 23.141898] Write of size 1 at addr fff00000c6391478 by task kunit_try_catch/130 [ 23.142671] [ 23.143496] CPU: 0 UID: 0 PID: 130 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 23.144955] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.145660] Hardware name: linux,dummy-virt (DT) [ 23.146420] Call trace: [ 23.147382] show_stack+0x20/0x38 (C) [ 23.148190] dump_stack_lvl+0x8c/0xd0 [ 23.148907] print_report+0x118/0x5e0 [ 23.149396] kasan_report+0xc8/0x118 [ 23.149911] __asan_report_store1_noabort+0x20/0x30 [ 23.150580] kmalloc_track_caller_oob_right+0x414/0x490 [ 23.151791] kunit_try_run_case+0x14c/0x3d0 [ 23.152290] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.153161] kthread+0x24c/0x2d0 [ 23.153738] ret_from_fork+0x10/0x20 [ 23.154271] [ 23.154583] Allocated by task 130: [ 23.155172] kasan_save_stack+0x3c/0x68 [ 23.155691] kasan_save_track+0x20/0x40 [ 23.156212] kasan_save_alloc_info+0x40/0x58 [ 23.156836] __kasan_kmalloc+0xd4/0xd8 [ 23.157556] __kmalloc_node_track_caller_noprof+0x184/0x4b8 [ 23.158128] kmalloc_track_caller_oob_right+0xa8/0x490 [ 23.158881] kunit_try_run_case+0x14c/0x3d0 [ 23.159429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.160162] kthread+0x24c/0x2d0 [ 23.160666] ret_from_fork+0x10/0x20 [ 23.161732] [ 23.162063] The buggy address belongs to the object at fff00000c6391400 [ 23.162063] which belongs to the cache kmalloc-128 of size 128 [ 23.163605] The buggy address is located 0 bytes to the right of [ 23.163605] allocated 120-byte region [fff00000c6391400, fff00000c6391478) [ 23.164815] [ 23.165141] The buggy address belongs to the physical page: [ 23.165801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106391 [ 23.166682] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.168101] page_type: f5(slab) [ 23.168556] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 23.169359] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.170264] page dumped because: kasan: bad access detected [ 23.170910] [ 23.171228] Memory state around the buggy address: [ 23.171814] fff00000c6391300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 23.172547] fff00000c6391380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.173393] >fff00000c6391400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 23.174483] ^ [ 23.175588] fff00000c6391480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.176341] fff00000c6391500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.177125] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 23.090193] ================================================================== [ 23.091452] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 23.092672] Read of size 1 at addr fff00000c63cf000 by task kunit_try_catch/128 [ 23.093542] [ 23.093951] CPU: 1 UID: 0 PID: 128 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 23.095090] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.095819] Hardware name: linux,dummy-virt (DT) [ 23.096348] Call trace: [ 23.096782] show_stack+0x20/0x38 (C) [ 23.097311] dump_stack_lvl+0x8c/0xd0 [ 23.097841] print_report+0x118/0x5e0 [ 23.098390] kasan_report+0xc8/0x118 [ 23.099229] __asan_report_load1_noabort+0x20/0x30 [ 23.100077] kmalloc_node_oob_right+0x2f4/0x330 [ 23.100781] kunit_try_run_case+0x14c/0x3d0 [ 23.101426] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.102156] kthread+0x24c/0x2d0 [ 23.102648] ret_from_fork+0x10/0x20 [ 23.103185] [ 23.103506] Allocated by task 128: [ 23.104390] kasan_save_stack+0x3c/0x68 [ 23.104922] kasan_save_track+0x20/0x40 [ 23.105518] kasan_save_alloc_info+0x40/0x58 [ 23.106123] __kasan_kmalloc+0xd4/0xd8 [ 23.106580] __kmalloc_cache_node_noprof+0x168/0x3d0 [ 23.107445] kmalloc_node_oob_right+0xbc/0x330 [ 23.108078] kunit_try_run_case+0x14c/0x3d0 [ 23.108631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.109316] kthread+0x24c/0x2d0 [ 23.109847] ret_from_fork+0x10/0x20 [ 23.110352] [ 23.110646] The buggy address belongs to the object at fff00000c63ce000 [ 23.110646] which belongs to the cache kmalloc-4k of size 4096 [ 23.112388] The buggy address is located 0 bytes to the right of [ 23.112388] allocated 4096-byte region [fff00000c63ce000, fff00000c63cf000) [ 23.114044] [ 23.114506] The buggy address belongs to the physical page: [ 23.115442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063c8 [ 23.116713] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.117422] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.118281] page_type: f5(slab) [ 23.118798] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 23.119860] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 23.120672] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 23.121609] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 23.122501] head: 0bfffe0000000003 ffffc1ffc318f201 ffffffffffffffff 0000000000000000 [ 23.123553] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000 [ 23.124388] page dumped because: kasan: bad access detected [ 23.125031] [ 23.125351] Memory state around the buggy address: [ 23.125914] fff00000c63cef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.126614] fff00000c63cef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.127485] >fff00000c63cf000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.128577] ^ [ 23.129140] fff00000c63cf080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.130061] fff00000c63cf100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.131058] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 23.014117] ================================================================== [ 23.015596] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 23.016787] Read of size 1 at addr fff00000c636113f by task kunit_try_catch/126 [ 23.017559] [ 23.018089] CPU: 1 UID: 0 PID: 126 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 23.019378] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.020090] Hardware name: linux,dummy-virt (DT) [ 23.020621] Call trace: [ 23.021075] show_stack+0x20/0x38 (C) [ 23.021602] dump_stack_lvl+0x8c/0xd0 [ 23.022146] print_report+0x118/0x5e0 [ 23.022775] kasan_report+0xc8/0x118 [ 23.023727] __asan_report_load1_noabort+0x20/0x30 [ 23.024347] kmalloc_oob_left+0x2ec/0x320 [ 23.024911] kunit_try_run_case+0x14c/0x3d0 [ 23.025545] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.026254] kthread+0x24c/0x2d0 [ 23.026768] ret_from_fork+0x10/0x20 [ 23.027283] [ 23.027572] Allocated by task 1: [ 23.028251] kasan_save_stack+0x3c/0x68 [ 23.028730] kasan_save_track+0x20/0x40 [ 23.029280] kasan_save_alloc_info+0x40/0x58 [ 23.029893] __kasan_kmalloc+0xd4/0xd8 [ 23.030415] __kmalloc_node_track_caller_noprof+0x184/0x4b8 [ 23.031506] kvasprintf+0xcc/0x170 [ 23.031973] kasprintf+0xa8/0xe8 [ 23.032422] input_devnode+0x84/0xb8 [ 23.033021] device_get_devnode+0x114/0x258 [ 23.033578] dev_uevent+0x334/0x5b8 [ 23.034118] kobject_uevent_env+0x424/0xc98 [ 23.034649] kobject_uevent+0x14/0x20 [ 23.035342] device_add+0xc00/0x12b8 [ 23.035855] cdev_device_add+0xdc/0x208 [ 23.036453] evdev_connect+0x2e0/0x410 [ 23.037079] input_attach_handler.isra.0+0xec/0x1d8 [ 23.037788] input_register_device+0x48c/0x9d8 [ 23.038351] gpio_keys_probe+0xabc/0x1ec8 [ 23.039079] platform_probe+0xcc/0x198 [ 23.039628] really_probe+0x188/0x7f0 [ 23.040163] __driver_probe_device+0x164/0x378 [ 23.040759] driver_probe_device+0x64/0x180 [ 23.041456] __driver_attach+0x1cc/0x478 [ 23.042034] bus_for_each_dev+0x104/0x198 [ 23.042568] driver_attach+0x44/0x68 [ 23.043047] bus_add_driver+0x23c/0x4e8 [ 23.043882] driver_register+0xf8/0x3d0 [ 23.044448] __platform_driver_register+0x64/0x98 [ 23.045126] gpio_keys_init+0x24/0x38 [ 23.045609] do_one_initcall+0xcc/0x628 [ 23.046253] kernel_init_freeable+0x3e0/0x8b0 [ 23.046871] kernel_init+0x2c/0x1f8 [ 23.047527] ret_from_fork+0x10/0x20 [ 23.048043] [ 23.048416] Freed by task 1: [ 23.048912] kasan_save_stack+0x3c/0x68 [ 23.049467] kasan_save_track+0x20/0x40 [ 23.049999] kasan_save_free_info+0x4c/0x78 [ 23.050589] __kasan_slab_free+0x6c/0x98 [ 23.051649] kfree+0x114/0x3c8 [ 23.052198] dev_uevent+0x368/0x5b8 [ 23.052756] kobject_uevent_env+0x424/0xc98 [ 23.053321] kobject_uevent+0x14/0x20 [ 23.053831] device_add+0xc00/0x12b8 [ 23.054361] cdev_device_add+0xdc/0x208 [ 23.055334] evdev_connect+0x2e0/0x410 [ 23.055967] input_attach_handler.isra.0+0xec/0x1d8 [ 23.056560] input_register_device+0x48c/0x9d8 [ 23.057262] gpio_keys_probe+0xabc/0x1ec8 [ 23.057805] platform_probe+0xcc/0x198 [ 23.058323] really_probe+0x188/0x7f0 [ 23.058820] __driver_probe_device+0x164/0x378 [ 23.059419] driver_probe_device+0x64/0x180 [ 23.060220] __driver_attach+0x1cc/0x478 [ 23.060865] bus_for_each_dev+0x104/0x198 [ 23.061378] driver_attach+0x44/0x68 [ 23.061956] bus_add_driver+0x23c/0x4e8 [ 23.062518] driver_register+0xf8/0x3d0 [ 23.062998] __platform_driver_register+0x64/0x98 [ 23.063759] gpio_keys_init+0x24/0x38 [ 23.064537] do_one_initcall+0xcc/0x628 [ 23.065040] kernel_init_freeable+0x3e0/0x8b0 [ 23.065611] kernel_init+0x2c/0x1f8 [ 23.066133] ret_from_fork+0x10/0x20 [ 23.066725] [ 23.067257] The buggy address belongs to the object at fff00000c6361120 [ 23.067257] which belongs to the cache kmalloc-16 of size 16 [ 23.068479] The buggy address is located 15 bytes to the right of [ 23.068479] allocated 16-byte region [fff00000c6361120, fff00000c6361130) [ 23.069756] [ 23.070096] The buggy address belongs to the physical page: [ 23.070681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106361 [ 23.071691] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.072816] page_type: f5(slab) [ 23.073275] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 23.074120] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.075293] page dumped because: kasan: bad access detected [ 23.076028] [ 23.076348] Memory state around the buggy address: [ 23.076998] fff00000c6361000: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc [ 23.077765] fff00000c6361080: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.078492] >fff00000c6361100: fa fb fc fc fa fb fc fc 00 07 fc fc fc fc fc fc [ 23.079509] ^ [ 23.080116] fff00000c6361180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.081030] fff00000c6361200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.081948] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 22.886487] ================================================================== [ 22.887918] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 22.889451] Write of size 1 at addr fff00000c126df73 by task kunit_try_catch/124 [ 22.890326] [ 22.891847] CPU: 0 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G N 6.13.0-rc2-next-20241209 #1 [ 22.893059] Tainted: [N]=TEST [ 22.893522] Hardware name: linux,dummy-virt (DT) [ 22.894469] Call trace: [ 22.895130] show_stack+0x20/0x38 (C) [ 22.895990] dump_stack_lvl+0x8c/0xd0 [ 22.896499] print_report+0x118/0x5e0 [ 22.897020] kasan_report+0xc8/0x118 [ 22.897578] __asan_report_store1_noabort+0x20/0x30 [ 22.898217] kmalloc_oob_right+0x5a4/0x660 [ 22.898877] kunit_try_run_case+0x14c/0x3d0 [ 22.899504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.900564] kthread+0x24c/0x2d0 [ 22.901093] ret_from_fork+0x10/0x20 [ 22.901926] [ 22.902344] Allocated by task 124: [ 22.903266] kasan_save_stack+0x3c/0x68 [ 22.903818] kasan_save_track+0x20/0x40 [ 22.904366] kasan_save_alloc_info+0x40/0x58 [ 22.904989] __kasan_kmalloc+0xd4/0xd8 [ 22.905484] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.906118] kmalloc_oob_right+0xb0/0x660 [ 22.906665] kunit_try_run_case+0x14c/0x3d0 [ 22.907328] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.907946] kthread+0x24c/0x2d0 [ 22.908798] ret_from_fork+0x10/0x20 [ 22.909537] [ 22.910109] The buggy address belongs to the object at fff00000c126df00 [ 22.910109] which belongs to the cache kmalloc-128 of size 128 [ 22.912031] The buggy address is located 0 bytes to the right of [ 22.912031] allocated 115-byte region [fff00000c126df00, fff00000c126df73) [ 22.913300] [ 22.913822] The buggy address belongs to the physical page: [ 22.914806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10126d [ 22.916028] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.917013] page_type: f5(slab) [ 22.918097] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.918893] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.920054] page dumped because: kasan: bad access detected [ 22.920777] [ 22.921084] Memory state around the buggy address: [ 22.922113] fff00000c126de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 22.923198] fff00000c126de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.924339] >fff00000c126df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 22.925216] ^ [ 22.926076] fff00000c126df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.926847] fff00000c126e000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.927944] ================================================================== [ 22.930691] ================================================================== [ 22.931811] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 22.932440] Write of size 1 at addr fff00000c126df78 by task kunit_try_catch/124 [ 22.933032] [ 22.933420] CPU: 0 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 22.934801] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.935554] Hardware name: linux,dummy-virt (DT) [ 22.936153] Call trace: [ 22.936632] show_stack+0x20/0x38 (C) [ 22.937917] dump_stack_lvl+0x8c/0xd0 [ 22.938639] print_report+0x118/0x5e0 [ 22.939440] kasan_report+0xc8/0x118 [ 22.940152] __asan_report_store1_noabort+0x20/0x30 [ 22.940791] kmalloc_oob_right+0x538/0x660 [ 22.941273] kunit_try_run_case+0x14c/0x3d0 [ 22.941970] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.942631] kthread+0x24c/0x2d0 [ 22.943559] ret_from_fork+0x10/0x20 [ 22.944009] [ 22.944286] Allocated by task 124: [ 22.944632] kasan_save_stack+0x3c/0x68 [ 22.945237] kasan_save_track+0x20/0x40 [ 22.945918] kasan_save_alloc_info+0x40/0x58 [ 22.946483] __kasan_kmalloc+0xd4/0xd8 [ 22.947051] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.947932] kmalloc_oob_right+0xb0/0x660 [ 22.948499] kunit_try_run_case+0x14c/0x3d0 [ 22.949084] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.949789] kthread+0x24c/0x2d0 [ 22.950155] ret_from_fork+0x10/0x20 [ 22.950815] [ 22.951159] The buggy address belongs to the object at fff00000c126df00 [ 22.951159] which belongs to the cache kmalloc-128 of size 128 [ 22.953294] The buggy address is located 5 bytes to the right of [ 22.953294] allocated 115-byte region [fff00000c126df00, fff00000c126df73) [ 22.954639] [ 22.955192] The buggy address belongs to the physical page: [ 22.956004] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10126d [ 22.956755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.957478] page_type: f5(slab) [ 22.958028] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.958886] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.959687] page dumped because: kasan: bad access detected [ 22.960358] [ 22.961018] Memory state around the buggy address: [ 22.961614] fff00000c126de00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.962673] fff00000c126de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.964099] >fff00000c126df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 22.965099] ^ [ 22.965879] fff00000c126df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.966783] fff00000c126e000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.967584] ================================================================== [ 22.969889] ================================================================== [ 22.970841] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 22.972105] Read of size 1 at addr fff00000c126df80 by task kunit_try_catch/124 [ 22.973248] [ 22.973551] CPU: 0 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 22.975023] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.975633] Hardware name: linux,dummy-virt (DT) [ 22.976131] Call trace: [ 22.976642] show_stack+0x20/0x38 (C) [ 22.977416] dump_stack_lvl+0x8c/0xd0 [ 22.977963] print_report+0x118/0x5e0 [ 22.978718] kasan_report+0xc8/0x118 [ 22.979367] __asan_report_load1_noabort+0x20/0x30 [ 22.980158] kmalloc_oob_right+0x5d0/0x660 [ 22.980824] kunit_try_run_case+0x14c/0x3d0 [ 22.981089] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.981379] kthread+0x24c/0x2d0 [ 22.981599] ret_from_fork+0x10/0x20 [ 22.981855] [ 22.981993] Allocated by task 124: [ 22.982190] kasan_save_stack+0x3c/0x68 [ 22.982425] kasan_save_track+0x20/0x40 [ 22.982649] kasan_save_alloc_info+0x40/0x58 [ 22.984179] __kasan_kmalloc+0xd4/0xd8 [ 22.984667] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.985184] kmalloc_oob_right+0xb0/0x660 [ 22.986013] kunit_try_run_case+0x14c/0x3d0 [ 22.986920] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.987607] kthread+0x24c/0x2d0 [ 22.988463] ret_from_fork+0x10/0x20 [ 22.989019] [ 22.989545] The buggy address belongs to the object at fff00000c126df00 [ 22.989545] which belongs to the cache kmalloc-128 of size 128 [ 22.991110] The buggy address is located 13 bytes to the right of [ 22.991110] allocated 115-byte region [fff00000c126df00, fff00000c126df73) [ 22.992447] [ 22.993058] The buggy address belongs to the physical page: [ 22.993723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10126d [ 22.994780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.995680] page_type: f5(slab) [ 22.996501] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.997342] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.998156] page dumped because: kasan: bad access detected [ 22.998820] [ 22.999164] Memory state around the buggy address: [ 22.999877] fff00000c126de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.001411] fff00000c126df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 23.002259] >fff00000c126df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.003107] ^ [ 23.003521] fff00000c126e000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.004803] fff00000c126e080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.005631] ==================================================================
Failure - kunit - check_workingset_xarray
(no logs available)
Failure - kunit - check_xas_conflict_get_order_check_xa_alloc
(no logs available)
Failure - log-parser-boot - internal-error-oops-oops-preempt-smp
KNOWN ISSUE - kunit_test_null_dereference internal oops on qemu-arm64 KUNIT KASAN
[ 126.876783] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP [ 126.877817] Modules linked in: [ 126.878671] CPU: 0 UID: 0 PID: 620 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 126.880116] Tainted: [B]=BAD_PAGE, [N]=TEST [ 126.881152] Hardware name: linux,dummy-virt (DT) [ 126.882002] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 126.882880] pc : kunit_test_null_dereference+0x70/0x170 [ 126.883668] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 126.884387] sp : ffff800080fe7dc0 [ 126.884862] x29: ffff800080fe7e20 x28: 0000000000000000 x27: 0000000000000000 [ 126.885871] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000c7987d80 [ 126.887182] x23: ffffa2c3637c5840 x22: ffffa2c3637ce400 x21: fff00000c7987d88 [ 126.888534] x20: 1ffff000101fcfb8 x19: ffff8000800879f0 x18: 00000000b00261a5 [ 126.889587] x17: 0000000000000001 x16: fff00000da4d8d60 x15: 0000000000000000 [ 126.890591] x14: 1ffe00001b49b190 x13: 0000000000000000 x12: fffd800018e7911b [ 126.891665] x11: 1ffe000018e7911a x10: fffd800018e7911a x9 : ffffa2c3637c58c8 [ 126.892958] x8 : ffff800080fe7cb8 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 126.894090] x5 : ffff7000101fcfb8 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 126.895405] x2 : dfff800000000000 x1 : fff00000c73c8000 x0 : ffff8000800879f0 [ 126.896288] Call trace: [ 126.896928] kunit_test_null_dereference+0x70/0x170 (P) [ 126.897679] kunit_generic_run_threadfn_adapter+0x88/0x100 (L) [ 126.898561] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 126.899420] kthread+0x24c/0x2d0 [ 126.900150] ret_from_fork+0x10/0x20 [ 126.901202] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 126.902546] ---[ end trace 0000000000000000 ]---