Date
March 19, 2025, 10:35 a.m.
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 38.435183] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 38.665798] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 38.681590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 38.446557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 38.470098] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 38.406875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 38.002138] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-memcmp
[ 37.851399] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 68.078268] ================================================================== [ 68.078374] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 68.078374] [ 68.078495] Use-after-free read at 0x0000000042c83b8e (in kfence-#230): [ 68.078581] test_krealloc+0x51c/0x830 [ 68.078652] kunit_try_run_case+0x14c/0x3d0 [ 68.078727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.078804] kthread+0x318/0x618 [ 68.078875] ret_from_fork+0x10/0x20 [ 68.078953] [ 68.078995] kfence-#230: 0x0000000042c83b8e-0x000000000c343837, size=32, cache=kmalloc-32 [ 68.078995] [ 68.079099] allocated by task 339 on cpu 1 at 68.077155s (0.001938s ago): [ 68.079205] test_alloc+0x298/0x620 [ 68.079272] test_krealloc+0xc0/0x830 [ 68.079336] kunit_try_run_case+0x14c/0x3d0 [ 68.079405] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.079481] kthread+0x318/0x618 [ 68.079545] ret_from_fork+0x10/0x20 [ 68.079611] [ 68.079652] freed by task 339 on cpu 1 at 68.077618s (0.002029s ago): [ 68.079755] krealloc_noprof+0x148/0x360 [ 68.079818] test_krealloc+0x1dc/0x830 [ 68.079879] kunit_try_run_case+0x14c/0x3d0 [ 68.079948] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.080020] kthread+0x318/0x618 [ 68.080096] ret_from_fork+0x10/0x20 [ 68.080165] [ 68.080225] CPU: 1 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 68.080354] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.080435] Hardware name: linux,dummy-virt (DT) [ 68.080492] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 67.885200] ================================================================== [ 67.885325] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 67.885325] [ 67.885462] Use-after-free read at 0x000000004da0d609 (in kfence-#228): [ 67.885549] test_memcache_typesafe_by_rcu+0x280/0x560 [ 67.885629] kunit_try_run_case+0x14c/0x3d0 [ 67.885703] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.885780] kthread+0x318/0x618 [ 67.885850] ret_from_fork+0x10/0x20 [ 67.885918] [ 67.885957] kfence-#228: 0x000000004da0d609-0x00000000f4718c24, size=32, cache=test [ 67.885957] [ 67.886043] allocated by task 337 on cpu 1 at 67.875717s (0.010321s ago): [ 67.886173] test_alloc+0x22c/0x620 [ 67.886240] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 67.886311] kunit_try_run_case+0x14c/0x3d0 [ 67.886378] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.886455] kthread+0x318/0x618 [ 67.886521] ret_from_fork+0x10/0x20 [ 67.886585] [ 67.886624] freed by task 337 on cpu 1 at 67.875939s (0.010680s ago): [ 67.886717] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 67.886788] kunit_try_run_case+0x14c/0x3d0 [ 67.886855] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.886939] kthread+0x318/0x618 [ 67.887007] ret_from_fork+0x10/0x20 [ 67.887090] [ 67.887157] CPU: 1 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 67.887289] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.887337] Hardware name: linux,dummy-virt (DT) [ 67.887392] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 48.556968] ================================================================== [ 48.557263] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 48.557263] [ 48.557524] Invalid read at 0x00000000db67ee06: [ 48.557713] test_invalid_access+0xdc/0x1f0 [ 48.557880] kunit_try_run_case+0x14c/0x3d0 [ 48.558069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.558232] kthread+0x318/0x618 [ 48.558413] ret_from_fork+0x10/0x20 [ 48.558560] [ 48.558691] CPU: 1 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 48.559374] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.559554] Hardware name: linux,dummy-virt (DT) [ 48.559740] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 48.313721] ================================================================== [ 48.313838] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 48.313838] [ 48.313935] Corrupted memory at 0x000000006ffbdfe0 [ ! . . . . . . . . . . . . . . . ] (in kfence-#224): [ 48.314455] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 48.314557] kunit_try_run_case+0x14c/0x3d0 [ 48.314636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.314710] kthread+0x318/0x618 [ 48.314783] ret_from_fork+0x10/0x20 [ 48.314847] [ 48.314887] kfence-#224: 0x00000000d47ad599-0x000000005a949bcd, size=73, cache=kmalloc-96 [ 48.314887] [ 48.314988] allocated by task 327 on cpu 0 at 48.313207s (0.001775s ago): [ 48.315102] test_alloc+0x298/0x620 [ 48.315171] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 48.315242] kunit_try_run_case+0x14c/0x3d0 [ 48.315311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.315388] kthread+0x318/0x618 [ 48.315452] ret_from_fork+0x10/0x20 [ 48.315518] [ 48.315559] freed by task 327 on cpu 0 at 48.313486s (0.002068s ago): [ 48.315659] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 48.315730] kunit_try_run_case+0x14c/0x3d0 [ 48.315799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.315875] kthread+0x318/0x618 [ 48.315938] ret_from_fork+0x10/0x20 [ 48.316006] [ 48.316080] CPU: 0 UID: 0 PID: 327 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 48.316215] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.316266] Hardware name: linux,dummy-virt (DT) [ 48.316322] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 47.897817] ================================================================== [ 47.897907] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 47.897907] [ 47.898040] Out-of-bounds read at 0x0000000083b8ee9c (105B right of kfence-#220): [ 47.898164] test_kmalloc_aligned_oob_read+0x238/0x468 [ 47.898241] kunit_try_run_case+0x14c/0x3d0 [ 47.898315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.898392] kthread+0x318/0x618 [ 47.898461] ret_from_fork+0x10/0x20 [ 47.898526] [ 47.898566] kfence-#220: 0x00000000f0ea748d-0x00000000d42ecf70, size=73, cache=kmalloc-96 [ 47.898566] [ 47.898657] allocated by task 325 on cpu 0 at 47.897368s (0.001284s ago): [ 47.898755] test_alloc+0x298/0x620 [ 47.898820] test_kmalloc_aligned_oob_read+0x100/0x468 [ 47.898891] kunit_try_run_case+0x14c/0x3d0 [ 47.898970] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.899043] kthread+0x318/0x618 [ 47.899125] ret_from_fork+0x10/0x20 [ 47.899189] [ 47.899255] CPU: 0 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 47.899392] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.899443] Hardware name: linux,dummy-virt (DT) [ 47.899500] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[ 41.917856] ================================================================== [ 41.918158] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 41.918158] [ 41.918347] Corrupted memory at 0x00000000cc1884b8 [ ! . . . . . . . . . . . . . . . ] (in kfence-#163): [ 41.922564] test_corruption+0x278/0x378 [ 41.922724] kunit_try_run_case+0x14c/0x3d0 [ 41.922876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.923044] kthread+0x318/0x618 [ 41.923203] ret_from_fork+0x10/0x20 [ 41.923347] [ 41.923461] kfence-#163: 0x00000000b0a78912-0x00000000669b60e3, size=32, cache=kmalloc-32 [ 41.923461] [ 41.923744] allocated by task 313 on cpu 0 at 41.917205s (0.006521s ago): [ 41.923964] test_alloc+0x298/0x620 [ 41.924172] test_corruption+0xdc/0x378 [ 41.924366] kunit_try_run_case+0x14c/0x3d0 [ 41.924510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.924646] kthread+0x318/0x618 [ 41.924843] ret_from_fork+0x10/0x20 [ 41.925258] [ 41.925445] freed by task 313 on cpu 0 at 41.917361s (0.008074s ago): [ 41.925651] test_corruption+0x278/0x378 [ 41.925791] kunit_try_run_case+0x14c/0x3d0 [ 41.925944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.926161] kthread+0x318/0x618 [ 41.926297] ret_from_fork+0x10/0x20 [ 41.926426] [ 41.926538] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 41.926781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.926875] Hardware name: linux,dummy-virt (DT) [ 41.926987] ================================================================== [ 42.238757] ================================================================== [ 42.240101] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 42.240101] [ 42.240793] Corrupted memory at 0x00000000eb06b1f7 [ ! . . . . . . . . . . . . . . . ] (in kfence-#166): [ 42.244563] test_corruption+0x120/0x378 [ 42.244718] kunit_try_run_case+0x14c/0x3d0 [ 42.244865] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.244997] kthread+0x318/0x618 [ 42.245145] ret_from_fork+0x10/0x20 [ 42.245271] [ 42.245343] kfence-#166: 0x000000008f2e9ee5-0x00000000c7e3dfc9, size=32, cache=test [ 42.245343] [ 42.245504] allocated by task 315 on cpu 0 at 42.237367s (0.008128s ago): [ 42.245697] test_alloc+0x22c/0x620 [ 42.245822] test_corruption+0xdc/0x378 [ 42.246325] kunit_try_run_case+0x14c/0x3d0 [ 42.247149] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.248358] kthread+0x318/0x618 [ 42.248506] ret_from_fork+0x10/0x20 [ 42.248775] [ 42.249672] freed by task 315 on cpu 0 at 42.237469s (0.012191s ago): [ 42.250127] test_corruption+0x120/0x378 [ 42.250298] kunit_try_run_case+0x14c/0x3d0 [ 42.250845] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.251845] kthread+0x318/0x618 [ 42.253119] ret_from_fork+0x10/0x20 [ 42.253297] [ 42.253419] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 42.253657] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.254207] Hardware name: linux,dummy-virt (DT) [ 42.254350] ================================================================== [ 42.345944] ================================================================== [ 42.346105] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 42.346105] [ 42.346267] Corrupted memory at 0x00000000618b69a2 [ ! ] (in kfence-#167): [ 42.346574] test_corruption+0x1d8/0x378 [ 42.346702] kunit_try_run_case+0x14c/0x3d0 [ 42.346844] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.346995] kthread+0x318/0x618 [ 42.347527] ret_from_fork+0x10/0x20 [ 42.347716] [ 42.347800] kfence-#167: 0x0000000017095a8c-0x00000000e9a73b56, size=32, cache=test [ 42.347800] [ 42.347964] allocated by task 315 on cpu 0 at 42.345707s (0.002248s ago): [ 42.348582] test_alloc+0x22c/0x620 [ 42.348773] test_corruption+0x198/0x378 [ 42.348910] kunit_try_run_case+0x14c/0x3d0 [ 42.349084] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.349423] kthread+0x318/0x618 [ 42.349575] ret_from_fork+0x10/0x20 [ 42.349964] [ 42.350129] freed by task 315 on cpu 0 at 42.345804s (0.004293s ago): [ 42.350456] test_corruption+0x1d8/0x378 [ 42.350879] kunit_try_run_case+0x14c/0x3d0 [ 42.351646] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.351821] kthread+0x318/0x618 [ 42.351947] ret_from_fork+0x10/0x20 [ 42.352969] [ 42.353959] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 42.354773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.355739] Hardware name: linux,dummy-virt (DT) [ 42.356044] ================================================================== [ 42.022428] ================================================================== [ 42.022569] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 42.022569] [ 42.023289] Corrupted memory at 0x000000006fab689a [ ! ] (in kfence-#164): [ 42.024973] test_corruption+0x284/0x378 [ 42.025674] kunit_try_run_case+0x14c/0x3d0 [ 42.025809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.026118] kthread+0x318/0x618 [ 42.026357] ret_from_fork+0x10/0x20 [ 42.026611] [ 42.027224] kfence-#164: 0x0000000080f9e31e-0x000000008c664082, size=32, cache=kmalloc-32 [ 42.027224] [ 42.027556] allocated by task 313 on cpu 0 at 42.021891s (0.005654s ago): [ 42.028242] test_alloc+0x298/0x620 [ 42.028395] test_corruption+0x198/0x378 [ 42.029035] kunit_try_run_case+0x14c/0x3d0 [ 42.029240] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.029480] kthread+0x318/0x618 [ 42.029660] ret_from_fork+0x10/0x20 [ 42.029887] [ 42.030250] freed by task 313 on cpu 0 at 42.022088s (0.008149s ago): [ 42.030808] test_corruption+0x284/0x378 [ 42.030978] kunit_try_run_case+0x14c/0x3d0 [ 42.031408] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.031585] kthread+0x318/0x618 [ 42.031717] ret_from_fork+0x10/0x20 [ 42.032104] [ 42.032227] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 42.033373] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.033496] Hardware name: linux,dummy-virt (DT) [ 42.033691] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 41.809688] ================================================================== [ 41.809822] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 41.809822] [ 41.809978] Invalid free of 0x00000000e84cb757 (in kfence-#162): [ 41.810160] test_invalid_addr_free+0xec/0x238 [ 41.810295] kunit_try_run_case+0x14c/0x3d0 [ 41.810426] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.810573] kthread+0x318/0x618 [ 41.810705] ret_from_fork+0x10/0x20 [ 41.810828] [ 41.810907] kfence-#162: 0x0000000016a406cf-0x000000002631468c, size=32, cache=test [ 41.810907] [ 41.811863] allocated by task 311 on cpu 0 at 41.809526s (0.002308s ago): [ 41.813517] test_alloc+0x22c/0x620 [ 41.813648] test_invalid_addr_free+0xd4/0x238 [ 41.814660] kunit_try_run_case+0x14c/0x3d0 [ 41.815345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.816098] kthread+0x318/0x618 [ 41.816963] ret_from_fork+0x10/0x20 [ 41.817700] [ 41.818233] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 41.819985] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.820567] Hardware name: linux,dummy-virt (DT) [ 41.821545] ================================================================== [ 41.702459] ================================================================== [ 41.702675] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 41.702675] [ 41.702950] Invalid free of 0x0000000031ae2540 (in kfence-#161): [ 41.703128] test_invalid_addr_free+0x1ac/0x238 [ 41.703333] kunit_try_run_case+0x14c/0x3d0 [ 41.703514] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.703735] kthread+0x318/0x618 [ 41.703878] ret_from_fork+0x10/0x20 [ 41.704015] [ 41.704116] kfence-#161: 0x00000000bdd62e94-0x00000000013364ca, size=32, cache=kmalloc-32 [ 41.704116] [ 41.704358] allocated by task 309 on cpu 0 at 41.702179s (0.002168s ago): [ 41.704605] test_alloc+0x298/0x620 [ 41.704852] test_invalid_addr_free+0xd4/0x238 [ 41.705000] kunit_try_run_case+0x14c/0x3d0 [ 41.705171] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.705313] kthread+0x318/0x618 [ 41.705530] ret_from_fork+0x10/0x20 [ 41.705659] [ 41.705787] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 41.706041] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.706159] Hardware name: linux,dummy-virt (DT) [ 41.706263] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[ 41.594850] ================================================================== [ 41.595374] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 41.595374] [ 41.595595] Invalid free of 0x00000000444fb7a2 (in kfence-#160): [ 41.595798] test_double_free+0x100/0x238 [ 41.595971] kunit_try_run_case+0x14c/0x3d0 [ 41.596176] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.596462] kthread+0x318/0x618 [ 41.596662] ret_from_fork+0x10/0x20 [ 41.596932] [ 41.597064] kfence-#160: 0x00000000444fb7a2-0x00000000a768b5c5, size=32, cache=test [ 41.597064] [ 41.597251] allocated by task 307 on cpu 0 at 41.594429s (0.002812s ago): [ 41.597727] test_alloc+0x22c/0x620 [ 41.597859] test_double_free+0xd4/0x238 [ 41.597979] kunit_try_run_case+0x14c/0x3d0 [ 41.598352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.598512] kthread+0x318/0x618 [ 41.598638] ret_from_fork+0x10/0x20 [ 41.598764] [ 41.598842] freed by task 307 on cpu 0 at 41.594560s (0.004274s ago): [ 41.599093] test_double_free+0xf0/0x238 [ 41.599218] kunit_try_run_case+0x14c/0x3d0 [ 41.599364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.599596] kthread+0x318/0x618 [ 41.599793] ret_from_fork+0x10/0x20 [ 41.599988] [ 41.600150] CPU: 0 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 41.600673] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.600791] Hardware name: linux,dummy-virt (DT) [ 41.600898] ================================================================== [ 41.493190] ================================================================== [ 41.493767] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 41.493767] [ 41.494288] Invalid free of 0x000000006303b7ed (in kfence-#159): [ 41.494636] test_double_free+0x1bc/0x238 [ 41.495031] kunit_try_run_case+0x14c/0x3d0 [ 41.495526] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.496006] kthread+0x318/0x618 [ 41.496189] ret_from_fork+0x10/0x20 [ 41.496853] [ 41.497164] kfence-#159: 0x000000006303b7ed-0x00000000bc7a5bc1, size=32, cache=kmalloc-32 [ 41.497164] [ 41.497477] allocated by task 305 on cpu 0 at 41.488478s (0.008988s ago): [ 41.497668] test_alloc+0x298/0x620 [ 41.498335] test_double_free+0xd4/0x238 [ 41.498862] kunit_try_run_case+0x14c/0x3d0 [ 41.499454] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.499617] kthread+0x318/0x618 [ 41.499749] ret_from_fork+0x10/0x20 [ 41.499878] [ 41.500243] freed by task 305 on cpu 0 at 41.488599s (0.011628s ago): [ 41.501161] test_double_free+0x1ac/0x238 [ 41.501758] kunit_try_run_case+0x14c/0x3d0 [ 41.501848] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.501925] kthread+0x318/0x618 [ 41.501994] ret_from_fork+0x10/0x20 [ 41.502087] [ 41.502200] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 41.502470] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.502619] Hardware name: linux,dummy-virt (DT) [ 41.503045] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 41.062641] ================================================================== [ 41.063194] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 41.063194] [ 41.063588] Use-after-free read at 0x0000000089d90ef1 (in kfence-#155): [ 41.063785] test_use_after_free_read+0x114/0x248 [ 41.064016] kunit_try_run_case+0x14c/0x3d0 [ 41.064271] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.064494] kthread+0x318/0x618 [ 41.064674] ret_from_fork+0x10/0x20 [ 41.064881] [ 41.065001] kfence-#155: 0x0000000089d90ef1-0x000000000670ad60, size=32, cache=kmalloc-32 [ 41.065001] [ 41.065254] allocated by task 297 on cpu 0 at 41.059939s (0.005303s ago): [ 41.066040] test_alloc+0x298/0x620 [ 41.066193] test_use_after_free_read+0xd0/0x248 [ 41.066341] kunit_try_run_case+0x14c/0x3d0 [ 41.066506] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.066664] kthread+0x318/0x618 [ 41.066865] ret_from_fork+0x10/0x20 [ 41.067015] [ 41.068376] freed by task 297 on cpu 0 at 41.060170s (0.007450s ago): [ 41.068930] test_use_after_free_read+0x1c0/0x248 [ 41.069093] kunit_try_run_case+0x14c/0x3d0 [ 41.069322] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.069561] kthread+0x318/0x618 [ 41.069763] ret_from_fork+0x10/0x20 [ 41.069940] [ 41.070106] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 41.070357] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.070457] Hardware name: linux,dummy-virt (DT) [ 41.070562] ================================================================== [ 41.166764] ================================================================== [ 41.166906] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 41.166906] [ 41.167142] Use-after-free read at 0x000000006fd3fbbf (in kfence-#156): [ 41.167294] test_use_after_free_read+0x114/0x248 [ 41.167433] kunit_try_run_case+0x14c/0x3d0 [ 41.167571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.167717] kthread+0x318/0x618 [ 41.167844] ret_from_fork+0x10/0x20 [ 41.167967] [ 41.168041] kfence-#156: 0x000000006fd3fbbf-0x00000000ede2df9e, size=32, cache=test [ 41.168041] [ 41.168230] allocated by task 299 on cpu 0 at 41.166410s (0.001811s ago): [ 41.168471] test_alloc+0x22c/0x620 [ 41.168807] test_use_after_free_read+0xd0/0x248 [ 41.169088] kunit_try_run_case+0x14c/0x3d0 [ 41.169308] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.169486] kthread+0x318/0x618 [ 41.169691] ret_from_fork+0x10/0x20 [ 41.169892] [ 41.169981] freed by task 299 on cpu 0 at 41.166507s (0.003462s ago): [ 41.170264] test_use_after_free_read+0xf0/0x248 [ 41.170429] kunit_try_run_case+0x14c/0x3d0 [ 41.170568] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.170718] kthread+0x318/0x618 [ 41.170888] ret_from_fork+0x10/0x20 [ 41.171079] [ 41.171188] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 41.171435] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.171586] Hardware name: linux,dummy-virt (DT) [ 41.171768] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 40.941009] ================================================================== [ 40.941192] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 40.941192] [ 40.941425] Out-of-bounds write at 0x00000000eb976bfc (1B left of kfence-#154): [ 40.941633] test_out_of_bounds_write+0x100/0x240 [ 40.942038] kunit_try_run_case+0x14c/0x3d0 [ 40.942442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.942600] kthread+0x318/0x618 [ 40.942737] ret_from_fork+0x10/0x20 [ 40.942868] [ 40.943296] kfence-#154: 0x000000008d4b1103-0x00000000b8245fd3, size=32, cache=test [ 40.943296] [ 40.944188] allocated by task 295 on cpu 0 at 40.940816s (0.003315s ago): [ 40.944538] test_alloc+0x22c/0x620 [ 40.944671] test_out_of_bounds_write+0xc8/0x240 [ 40.944981] kunit_try_run_case+0x14c/0x3d0 [ 40.945446] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.945939] kthread+0x318/0x618 [ 40.946109] ret_from_fork+0x10/0x20 [ 40.946606] [ 40.946773] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 40.947483] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.947585] Hardware name: linux,dummy-virt (DT) [ 40.948197] ================================================================== [ 40.522135] ================================================================== [ 40.522275] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 40.522275] [ 40.522505] Out-of-bounds write at 0x0000000004dc7420 (1B left of kfence-#150): [ 40.522685] test_out_of_bounds_write+0x100/0x240 [ 40.522834] kunit_try_run_case+0x14c/0x3d0 [ 40.522991] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.523150] kthread+0x318/0x618 [ 40.523576] ret_from_fork+0x10/0x20 [ 40.523723] [ 40.523799] kfence-#150: 0x00000000017a868f-0x00000000fdb0b66f, size=32, cache=kmalloc-32 [ 40.523799] [ 40.523975] allocated by task 293 on cpu 0 at 40.521839s (0.002125s ago): [ 40.524230] test_alloc+0x298/0x620 [ 40.524403] test_out_of_bounds_write+0xc8/0x240 [ 40.524621] kunit_try_run_case+0x14c/0x3d0 [ 40.524760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.525168] kthread+0x318/0x618 [ 40.525356] ret_from_fork+0x10/0x20 [ 40.525476] [ 40.525592] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 40.525860] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.525997] Hardware name: linux,dummy-virt (DT) [ 40.526152] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 40.417676] ================================================================== [ 40.417869] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 40.417869] [ 40.418155] Out-of-bounds read at 0x00000000ebc050fe (32B right of kfence-#149): [ 40.418411] test_out_of_bounds_read+0x1c8/0x3e0 [ 40.418623] kunit_try_run_case+0x14c/0x3d0 [ 40.418786] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.418965] kthread+0x318/0x618 [ 40.419196] ret_from_fork+0x10/0x20 [ 40.419403] [ 40.419524] kfence-#149: 0x0000000099d47695-0x0000000012fe5537, size=32, cache=test [ 40.419524] [ 40.419780] allocated by task 291 on cpu 0 at 40.417520s (0.002251s ago): [ 40.419991] test_alloc+0x22c/0x620 [ 40.420148] test_out_of_bounds_read+0x198/0x3e0 [ 40.420279] kunit_try_run_case+0x14c/0x3d0 [ 40.420427] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.420619] kthread+0x318/0x618 [ 40.420763] ret_from_fork+0x10/0x20 [ 40.420882] [ 40.421120] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 40.421448] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.421544] Hardware name: linux,dummy-virt (DT) [ 40.421648] ================================================================== [ 40.207800] ================================================================== [ 40.208023] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 40.208023] [ 40.208303] Out-of-bounds read at 0x00000000ab6c582c (32B right of kfence-#147): [ 40.208505] test_out_of_bounds_read+0x1c8/0x3e0 [ 40.208663] kunit_try_run_case+0x14c/0x3d0 [ 40.208844] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.209023] kthread+0x318/0x618 [ 40.209233] ret_from_fork+0x10/0x20 [ 40.209496] [ 40.209584] kfence-#147: 0x00000000ae095a5f-0x00000000d809cb0a, size=32, cache=kmalloc-32 [ 40.209584] [ 40.209750] allocated by task 289 on cpu 0 at 40.207171s (0.002569s ago): [ 40.209943] test_alloc+0x298/0x620 [ 40.210099] test_out_of_bounds_read+0x198/0x3e0 [ 40.210347] kunit_try_run_case+0x14c/0x3d0 [ 40.210620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.210773] kthread+0x318/0x618 [ 40.210896] ret_from_fork+0x10/0x20 [ 40.211035] [ 40.211172] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 40.211485] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.211594] Hardware name: linux,dummy-virt (DT) [ 40.211709] ================================================================== [ 40.311563] ================================================================== [ 40.311701] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 40.311701] [ 40.311895] Out-of-bounds read at 0x000000001c1cd4cc (1B left of kfence-#148): [ 40.312484] test_out_of_bounds_read+0x114/0x3e0 [ 40.312648] kunit_try_run_case+0x14c/0x3d0 [ 40.312792] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.312941] kthread+0x318/0x618 [ 40.313163] ret_from_fork+0x10/0x20 [ 40.314104] [ 40.314189] kfence-#148: 0x00000000167cf887-0x00000000f1bf76ae, size=32, cache=test [ 40.314189] [ 40.314352] allocated by task 291 on cpu 0 at 40.311399s (0.002943s ago): [ 40.314650] test_alloc+0x22c/0x620 [ 40.314777] test_out_of_bounds_read+0xdc/0x3e0 [ 40.315396] kunit_try_run_case+0x14c/0x3d0 [ 40.315576] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.316213] kthread+0x318/0x618 [ 40.316739] ret_from_fork+0x10/0x20 [ 40.317029] [ 40.317168] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 40.318222] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.318326] Hardware name: linux,dummy-virt (DT) [ 40.318406] ================================================================== [ 40.109228] ================================================================== [ 40.109499] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 40.109499] [ 40.110674] Out-of-bounds read at 0x00000000d7551bd5 (1B left of kfence-#146): [ 40.112780] test_out_of_bounds_read+0x114/0x3e0 [ 40.113041] kunit_try_run_case+0x14c/0x3d0 [ 40.113367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.113522] kthread+0x318/0x618 [ 40.113982] ret_from_fork+0x10/0x20 [ 40.114472] [ 40.115464] kfence-#146: 0x00000000a327dc9e-0x0000000036fc93b0, size=32, cache=kmalloc-32 [ 40.115464] [ 40.116084] allocated by task 289 on cpu 0 at 40.104994s (0.010813s ago): [ 40.117078] test_alloc+0x298/0x620 [ 40.117436] test_out_of_bounds_read+0xdc/0x3e0 [ 40.117608] kunit_try_run_case+0x14c/0x3d0 [ 40.117747] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.117891] kthread+0x318/0x618 [ 40.118024] ret_from_fork+0x10/0x20 [ 40.118330] [ 40.118530] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 40.119074] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.119252] Hardware name: linux,dummy-virt (DT) [ 40.119385] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-cs_dsp_mock_bin_add_name_or_infoisra
[ 282.695757] ================================================================== [ 282.695848] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info.isra.0+0x19c/0x348 [ 282.695960] Read of size 12 at addr ffffaabf7d176120 by task kunit_try_catch/3334 [ 282.696022] [ 282.696104] CPU: 1 UID: 0 PID: 3334 Comm: kunit_try_catch Tainted: G B D W N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 282.696221] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 282.696261] Hardware name: linux,dummy-virt (DT) [ 282.696311] Call trace: [ 282.696358] show_stack+0x20/0x38 (C) [ 282.696538] dump_stack_lvl+0x8c/0xd0 [ 282.696685] print_report+0x2fc/0x5f0 [ 282.696813] kasan_report+0xc8/0x118 [ 282.696890] kasan_check_range+0x100/0x1a8 [ 282.696963] __asan_memcpy+0x3c/0x98 [ 282.697036] cs_dsp_mock_bin_add_name_or_info.isra.0+0x19c/0x348 [ 282.697135] cs_dsp_mock_bin_add_info+0x18/0x30 [ 282.697206] bin_patch_name_and_info+0x164/0x6b0 [ 282.697278] kunit_try_run_case+0x14c/0x3d0 [ 282.697357] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 282.697438] kthread+0x318/0x618 [ 282.697514] ret_from_fork+0x10/0x20 [ 282.697594] [ 282.697628] The buggy address belongs to the variable: [ 282.697665] __loc.0+0x2c0/0x3a0 [ 282.697733] [ 282.697779] The buggy address belongs to the virtual mapping at [ 282.697779] [ffffaabf7be30000, ffffaabf7dba0000) created by: [ 282.697779] paging_init+0x618/0x7c8 [ 282.697860] [ 282.697957] The buggy address belongs to the physical page: [ 282.698002] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x44f76 [ 282.698108] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 282.698207] raw: 03fffe0000002000 ffffc1ffc013dd88 ffffc1ffc013dd88 0000000000000000 [ 282.698271] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 282.698318] page dumped because: kasan: bad access detected [ 282.698358] [ 282.698390] Memory state around the buggy address: [ 282.698439] ffffaabf7d176000: f9 f9 f9 f9 03 f9 f9 f9 f9 f9 f9 f9 00 00 06 f9 [ 282.698489] ffffaabf7d176080: f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 00 01 f9 f9 [ 282.698539] >ffffaabf7d176100: f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 00 00 00 00 [ 282.698581] ^ [ 282.698627] ffffaabf7d176180: 00 07 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 282.698680] ffffaabf7d176200: 00 00 f9 f9 f9 f9 f9 f9 00 06 f9 f9 f9 f9 f9 f9 [ 282.698723] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 39.922603] ================================================================== [ 39.922752] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 39.924429] Write of size 1 at addr fff00000c5dbd078 by task kunit_try_catch/287 [ 39.925075] [ 39.925188] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.925893] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.926012] Hardware name: linux,dummy-virt (DT) [ 39.926488] Call trace: [ 39.926649] show_stack+0x20/0x38 (C) [ 39.927132] dump_stack_lvl+0x8c/0xd0 [ 39.927353] print_report+0x118/0x5f0 [ 39.927534] kasan_report+0xc8/0x118 [ 39.927688] __asan_report_store1_noabort+0x20/0x30 [ 39.928419] strncpy_from_user+0x270/0x2a0 [ 39.928727] copy_user_test_oob+0x5c0/0xec0 [ 39.929434] kunit_try_run_case+0x14c/0x3d0 [ 39.929874] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.930205] kthread+0x318/0x618 [ 39.930454] ret_from_fork+0x10/0x20 [ 39.930636] [ 39.930703] Allocated by task 287: [ 39.930790] kasan_save_stack+0x3c/0x68 [ 39.930958] kasan_save_track+0x20/0x40 [ 39.931112] kasan_save_alloc_info+0x40/0x58 [ 39.931540] __kasan_kmalloc+0xd4/0xd8 [ 39.931693] __kmalloc_noprof+0x188/0x4c8 [ 39.931823] kunit_kmalloc_array+0x34/0x88 [ 39.931972] copy_user_test_oob+0xac/0xec0 [ 39.932131] kunit_try_run_case+0x14c/0x3d0 [ 39.932468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.932930] kthread+0x318/0x618 [ 39.933176] ret_from_fork+0x10/0x20 [ 39.933355] [ 39.933425] The buggy address belongs to the object at fff00000c5dbd000 [ 39.933425] which belongs to the cache kmalloc-128 of size 128 [ 39.933640] The buggy address is located 0 bytes to the right of [ 39.933640] allocated 120-byte region [fff00000c5dbd000, fff00000c5dbd078) [ 39.933858] [ 39.933936] The buggy address belongs to the physical page: [ 39.934040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105dbd [ 39.934715] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.934960] page_type: f5(slab) [ 39.935137] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 39.935313] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 39.935469] page dumped because: kasan: bad access detected [ 39.935603] [ 39.935667] Memory state around the buggy address: [ 39.935776] fff00000c5dbcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.935982] fff00000c5dbcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.936576] >fff00000c5dbd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 39.937180] ^ [ 39.937688] fff00000c5dbd080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.938008] fff00000c5dbd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.938243] ================================================================== [ 39.900088] ================================================================== [ 39.900242] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 39.901186] Write of size 121 at addr fff00000c5dbd000 by task kunit_try_catch/287 [ 39.901752] [ 39.902088] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.902618] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.903124] Hardware name: linux,dummy-virt (DT) [ 39.903267] Call trace: [ 39.903344] show_stack+0x20/0x38 (C) [ 39.903509] dump_stack_lvl+0x8c/0xd0 [ 39.903666] print_report+0x118/0x5f0 [ 39.905503] kasan_report+0xc8/0x118 [ 39.906266] kasan_check_range+0x100/0x1a8 [ 39.906456] __kasan_check_write+0x20/0x30 [ 39.906625] strncpy_from_user+0x3c/0x2a0 [ 39.906789] copy_user_test_oob+0x5c0/0xec0 [ 39.907273] kunit_try_run_case+0x14c/0x3d0 [ 39.908105] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.908632] kthread+0x318/0x618 [ 39.909085] ret_from_fork+0x10/0x20 [ 39.909294] [ 39.909829] Allocated by task 287: [ 39.909957] kasan_save_stack+0x3c/0x68 [ 39.910379] kasan_save_track+0x20/0x40 [ 39.910772] kasan_save_alloc_info+0x40/0x58 [ 39.910960] __kasan_kmalloc+0xd4/0xd8 [ 39.911406] __kmalloc_noprof+0x188/0x4c8 [ 39.911553] kunit_kmalloc_array+0x34/0x88 [ 39.911977] copy_user_test_oob+0xac/0xec0 [ 39.912710] kunit_try_run_case+0x14c/0x3d0 [ 39.912920] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.913097] kthread+0x318/0x618 [ 39.913218] ret_from_fork+0x10/0x20 [ 39.913342] [ 39.913410] The buggy address belongs to the object at fff00000c5dbd000 [ 39.913410] which belongs to the cache kmalloc-128 of size 128 [ 39.913615] The buggy address is located 0 bytes inside of [ 39.913615] allocated 120-byte region [fff00000c5dbd000, fff00000c5dbd078) [ 39.914817] [ 39.914898] The buggy address belongs to the physical page: [ 39.915595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105dbd [ 39.916067] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.916237] page_type: f5(slab) [ 39.917093] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 39.917717] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 39.918175] page dumped because: kasan: bad access detected [ 39.918302] [ 39.918364] Memory state around the buggy address: [ 39.918729] fff00000c5dbcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.919384] fff00000c5dbcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.919553] >fff00000c5dbd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 39.919698] ^ [ 39.919838] fff00000c5dbd080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.919994] fff00000c5dbd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.920419] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 39.832123] ================================================================== [ 39.832386] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0 [ 39.832971] Read of size 121 at addr fff00000c5dbd000 by task kunit_try_catch/287 [ 39.833161] [ 39.833257] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.833996] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.834116] Hardware name: linux,dummy-virt (DT) [ 39.834998] Call trace: [ 39.835134] show_stack+0x20/0x38 (C) [ 39.835668] dump_stack_lvl+0x8c/0xd0 [ 39.835847] print_report+0x118/0x5f0 [ 39.836479] kasan_report+0xc8/0x118 [ 39.836935] kasan_check_range+0x100/0x1a8 [ 39.837114] __kasan_check_read+0x20/0x30 [ 39.837276] copy_user_test_oob+0x3c8/0xec0 [ 39.837430] kunit_try_run_case+0x14c/0x3d0 [ 39.837582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.837752] kthread+0x318/0x618 [ 39.838384] ret_from_fork+0x10/0x20 [ 39.839592] [ 39.839904] Allocated by task 287: [ 39.840198] kasan_save_stack+0x3c/0x68 [ 39.840587] kasan_save_track+0x20/0x40 [ 39.840881] kasan_save_alloc_info+0x40/0x58 [ 39.841638] __kasan_kmalloc+0xd4/0xd8 [ 39.841847] __kmalloc_noprof+0x188/0x4c8 [ 39.842018] kunit_kmalloc_array+0x34/0x88 [ 39.842173] copy_user_test_oob+0xac/0xec0 [ 39.842759] kunit_try_run_case+0x14c/0x3d0 [ 39.843449] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.844011] kthread+0x318/0x618 [ 39.844743] ret_from_fork+0x10/0x20 [ 39.844885] [ 39.845070] The buggy address belongs to the object at fff00000c5dbd000 [ 39.845070] which belongs to the cache kmalloc-128 of size 128 [ 39.845383] The buggy address is located 0 bytes inside of [ 39.845383] allocated 120-byte region [fff00000c5dbd000, fff00000c5dbd078) [ 39.846144] [ 39.846532] The buggy address belongs to the physical page: [ 39.847125] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105dbd [ 39.847310] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.848037] page_type: f5(slab) [ 39.848208] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 39.848391] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 39.848542] page dumped because: kasan: bad access detected [ 39.848654] [ 39.848714] Memory state around the buggy address: [ 39.849385] fff00000c5dbcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.850208] fff00000c5dbcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.851001] >fff00000c5dbd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 39.851196] ^ [ 39.851341] fff00000c5dbd080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.851497] fff00000c5dbd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.851633] ================================================================== [ 39.780418] ================================================================== [ 39.780569] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0 [ 39.780775] Read of size 121 at addr fff00000c5dbd000 by task kunit_try_catch/287 [ 39.780989] [ 39.781155] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.781340] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.781460] Hardware name: linux,dummy-virt (DT) [ 39.781571] Call trace: [ 39.781642] show_stack+0x20/0x38 (C) [ 39.781902] dump_stack_lvl+0x8c/0xd0 [ 39.782079] print_report+0x118/0x5f0 [ 39.782370] kasan_report+0xc8/0x118 [ 39.782629] kasan_check_range+0x100/0x1a8 [ 39.782892] __kasan_check_read+0x20/0x30 [ 39.783172] copy_user_test_oob+0x728/0xec0 [ 39.783441] kunit_try_run_case+0x14c/0x3d0 [ 39.783697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.783977] kthread+0x318/0x618 [ 39.784143] ret_from_fork+0x10/0x20 [ 39.784440] [ 39.784518] Allocated by task 287: [ 39.784629] kasan_save_stack+0x3c/0x68 [ 39.784765] kasan_save_track+0x20/0x40 [ 39.784918] kasan_save_alloc_info+0x40/0x58 [ 39.785077] __kasan_kmalloc+0xd4/0xd8 [ 39.785265] __kmalloc_noprof+0x188/0x4c8 [ 39.785430] kunit_kmalloc_array+0x34/0x88 [ 39.785575] copy_user_test_oob+0xac/0xec0 [ 39.785732] kunit_try_run_case+0x14c/0x3d0 [ 39.785924] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.786134] kthread+0x318/0x618 [ 39.786287] ret_from_fork+0x10/0x20 [ 39.786444] [ 39.786552] The buggy address belongs to the object at fff00000c5dbd000 [ 39.786552] which belongs to the cache kmalloc-128 of size 128 [ 39.786753] The buggy address is located 0 bytes inside of [ 39.786753] allocated 120-byte region [fff00000c5dbd000, fff00000c5dbd078) [ 39.786980] [ 39.787076] The buggy address belongs to the physical page: [ 39.787741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105dbd [ 39.787924] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.788116] page_type: f5(slab) [ 39.788255] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 39.788504] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 39.788720] page dumped because: kasan: bad access detected [ 39.788881] [ 39.789020] Memory state around the buggy address: [ 39.789241] fff00000c5dbcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.789409] fff00000c5dbcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.789579] >fff00000c5dbd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 39.789718] ^ [ 39.789855] fff00000c5dbd080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.790010] fff00000c5dbd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.790295] ================================================================== [ 39.810571] ================================================================== [ 39.811151] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0 [ 39.811399] Write of size 121 at addr fff00000c5dbd000 by task kunit_try_catch/287 [ 39.811694] [ 39.811803] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.812618] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.812816] Hardware name: linux,dummy-virt (DT) [ 39.812963] Call trace: [ 39.813192] show_stack+0x20/0x38 (C) [ 39.813460] dump_stack_lvl+0x8c/0xd0 [ 39.813639] print_report+0x118/0x5f0 [ 39.814097] kasan_report+0xc8/0x118 [ 39.814550] kasan_check_range+0x100/0x1a8 [ 39.814758] __kasan_check_write+0x20/0x30 [ 39.814937] copy_user_test_oob+0x35c/0xec0 [ 39.815125] kunit_try_run_case+0x14c/0x3d0 [ 39.815286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.815568] kthread+0x318/0x618 [ 39.815826] ret_from_fork+0x10/0x20 [ 39.816664] [ 39.816855] Allocated by task 287: [ 39.816982] kasan_save_stack+0x3c/0x68 [ 39.817138] kasan_save_track+0x20/0x40 [ 39.817266] kasan_save_alloc_info+0x40/0x58 [ 39.817396] __kasan_kmalloc+0xd4/0xd8 [ 39.817523] __kmalloc_noprof+0x188/0x4c8 [ 39.817636] kunit_kmalloc_array+0x34/0x88 [ 39.818214] copy_user_test_oob+0xac/0xec0 [ 39.818499] kunit_try_run_case+0x14c/0x3d0 [ 39.818664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.818824] kthread+0x318/0x618 [ 39.819579] ret_from_fork+0x10/0x20 [ 39.820293] [ 39.820386] The buggy address belongs to the object at fff00000c5dbd000 [ 39.820386] which belongs to the cache kmalloc-128 of size 128 [ 39.820851] The buggy address is located 0 bytes inside of [ 39.820851] allocated 120-byte region [fff00000c5dbd000, fff00000c5dbd078) [ 39.821129] [ 39.821203] The buggy address belongs to the physical page: [ 39.821313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105dbd [ 39.822762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.823356] page_type: f5(slab) [ 39.823701] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 39.824078] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 39.824230] page dumped because: kasan: bad access detected [ 39.825187] [ 39.825589] Memory state around the buggy address: [ 39.826310] fff00000c5dbcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.826561] fff00000c5dbcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.826742] >fff00000c5dbd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 39.826883] ^ [ 39.827900] fff00000c5dbd080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.828077] fff00000c5dbd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.828931] ================================================================== [ 39.855163] ================================================================== [ 39.855454] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0 [ 39.855605] Write of size 121 at addr fff00000c5dbd000 by task kunit_try_catch/287 [ 39.855775] [ 39.855868] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.856178] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.856270] Hardware name: linux,dummy-virt (DT) [ 39.856987] Call trace: [ 39.857389] show_stack+0x20/0x38 (C) [ 39.857733] dump_stack_lvl+0x8c/0xd0 [ 39.857894] print_report+0x118/0x5f0 [ 39.858076] kasan_report+0xc8/0x118 [ 39.858264] kasan_check_range+0x100/0x1a8 [ 39.858444] __kasan_check_write+0x20/0x30 [ 39.858661] copy_user_test_oob+0x434/0xec0 [ 39.858827] kunit_try_run_case+0x14c/0x3d0 [ 39.859000] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.859429] kthread+0x318/0x618 [ 39.859629] ret_from_fork+0x10/0x20 [ 39.859844] [ 39.859940] Allocated by task 287: [ 39.860102] kasan_save_stack+0x3c/0x68 [ 39.860545] kasan_save_track+0x20/0x40 [ 39.860685] kasan_save_alloc_info+0x40/0x58 [ 39.860829] __kasan_kmalloc+0xd4/0xd8 [ 39.861001] __kmalloc_noprof+0x188/0x4c8 [ 39.861375] kunit_kmalloc_array+0x34/0x88 [ 39.862001] copy_user_test_oob+0xac/0xec0 [ 39.862357] kunit_try_run_case+0x14c/0x3d0 [ 39.862508] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.862667] kthread+0x318/0x618 [ 39.862792] ret_from_fork+0x10/0x20 [ 39.862945] [ 39.863080] The buggy address belongs to the object at fff00000c5dbd000 [ 39.863080] which belongs to the cache kmalloc-128 of size 128 [ 39.863356] The buggy address is located 0 bytes inside of [ 39.863356] allocated 120-byte region [fff00000c5dbd000, fff00000c5dbd078) [ 39.863602] [ 39.863681] The buggy address belongs to the physical page: [ 39.863858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105dbd [ 39.864034] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.864206] page_type: f5(slab) [ 39.864331] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 39.864581] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 39.864790] page dumped because: kasan: bad access detected [ 39.864967] [ 39.865041] Memory state around the buggy address: [ 39.865177] fff00000c5dbcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.865333] fff00000c5dbcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.865510] >fff00000c5dbd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 39.865714] ^ [ 39.865869] fff00000c5dbd080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.866075] fff00000c5dbd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.866209] ================================================================== [ 39.750745] ================================================================== [ 39.751074] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0 [ 39.751363] Write of size 121 at addr fff00000c5dbd000 by task kunit_try_catch/287 [ 39.751592] [ 39.751714] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.752088] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.752227] Hardware name: linux,dummy-virt (DT) [ 39.752373] Call trace: [ 39.752553] show_stack+0x20/0x38 (C) [ 39.752733] dump_stack_lvl+0x8c/0xd0 [ 39.753396] print_report+0x118/0x5f0 [ 39.753672] kasan_report+0xc8/0x118 [ 39.754229] kasan_check_range+0x100/0x1a8 [ 39.754549] __kasan_check_write+0x20/0x30 [ 39.755164] copy_user_test_oob+0x234/0xec0 [ 39.755754] kunit_try_run_case+0x14c/0x3d0 [ 39.756506] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.756873] kthread+0x318/0x618 [ 39.757356] ret_from_fork+0x10/0x20 [ 39.757939] [ 39.758019] Allocated by task 287: [ 39.758151] kasan_save_stack+0x3c/0x68 [ 39.758290] kasan_save_track+0x20/0x40 [ 39.758413] kasan_save_alloc_info+0x40/0x58 [ 39.758548] __kasan_kmalloc+0xd4/0xd8 [ 39.758667] __kmalloc_noprof+0x188/0x4c8 [ 39.758797] kunit_kmalloc_array+0x34/0x88 [ 39.758934] copy_user_test_oob+0xac/0xec0 [ 39.759089] kunit_try_run_case+0x14c/0x3d0 [ 39.759229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.759379] kthread+0x318/0x618 [ 39.759504] ret_from_fork+0x10/0x20 [ 39.759623] [ 39.759695] The buggy address belongs to the object at fff00000c5dbd000 [ 39.759695] which belongs to the cache kmalloc-128 of size 128 [ 39.759904] The buggy address is located 0 bytes inside of [ 39.759904] allocated 120-byte region [fff00000c5dbd000, fff00000c5dbd078) [ 39.761022] [ 39.761139] The buggy address belongs to the physical page: [ 39.761256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105dbd [ 39.761519] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.761932] page_type: f5(slab) [ 39.762772] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 39.764036] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 39.764262] page dumped because: kasan: bad access detected [ 39.764384] [ 39.764490] Memory state around the buggy address: [ 39.764772] fff00000c5dbcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.765182] fff00000c5dbcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.765698] >fff00000c5dbd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 39.765859] ^ [ 39.766237] fff00000c5dbd080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.766397] fff00000c5dbd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.766531] ================================================================== [ 39.869221] ================================================================== [ 39.869498] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0 [ 39.869666] Read of size 121 at addr fff00000c5dbd000 by task kunit_try_catch/287 [ 39.869829] [ 39.869926] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.870225] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.870323] Hardware name: linux,dummy-virt (DT) [ 39.870434] Call trace: [ 39.871351] show_stack+0x20/0x38 (C) [ 39.871644] dump_stack_lvl+0x8c/0xd0 [ 39.871912] print_report+0x118/0x5f0 [ 39.872590] kasan_report+0xc8/0x118 [ 39.873205] kasan_check_range+0x100/0x1a8 [ 39.873394] __kasan_check_read+0x20/0x30 [ 39.873592] copy_user_test_oob+0x4a0/0xec0 [ 39.873768] kunit_try_run_case+0x14c/0x3d0 [ 39.873935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.874336] kthread+0x318/0x618 [ 39.875489] ret_from_fork+0x10/0x20 [ 39.875745] [ 39.875921] Allocated by task 287: [ 39.876025] kasan_save_stack+0x3c/0x68 [ 39.876274] kasan_save_track+0x20/0x40 [ 39.876418] kasan_save_alloc_info+0x40/0x58 [ 39.876547] __kasan_kmalloc+0xd4/0xd8 [ 39.877169] __kmalloc_noprof+0x188/0x4c8 [ 39.877348] kunit_kmalloc_array+0x34/0x88 [ 39.878107] copy_user_test_oob+0xac/0xec0 [ 39.878271] kunit_try_run_case+0x14c/0x3d0 [ 39.878405] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.879349] kthread+0x318/0x618 [ 39.879722] ret_from_fork+0x10/0x20 [ 39.879870] [ 39.879939] The buggy address belongs to the object at fff00000c5dbd000 [ 39.879939] which belongs to the cache kmalloc-128 of size 128 [ 39.880479] The buggy address is located 0 bytes inside of [ 39.880479] allocated 120-byte region [fff00000c5dbd000, fff00000c5dbd078) [ 39.881377] [ 39.881466] The buggy address belongs to the physical page: [ 39.881588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105dbd [ 39.881754] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.881916] page_type: f5(slab) [ 39.883136] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 39.883343] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 39.883491] page dumped because: kasan: bad access detected [ 39.883609] [ 39.883927] Memory state around the buggy address: [ 39.884618] fff00000c5dbcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.885378] fff00000c5dbcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.885849] >fff00000c5dbd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 39.886650] ^ [ 39.887499] fff00000c5dbd080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.888035] fff00000c5dbd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.888200] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 39.648123] ================================================================== [ 39.648300] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 39.648733] Read of size 8 at addr fff00000c5da6f78 by task kunit_try_catch/283 [ 39.648995] [ 39.649194] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.649507] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.649608] Hardware name: linux,dummy-virt (DT) [ 39.649717] Call trace: [ 39.649799] show_stack+0x20/0x38 (C) [ 39.649950] dump_stack_lvl+0x8c/0xd0 [ 39.650544] print_report+0x118/0x5f0 [ 39.650716] kasan_report+0xc8/0x118 [ 39.650882] __asan_report_load8_noabort+0x20/0x30 [ 39.651089] copy_to_kernel_nofault+0x204/0x250 [ 39.651255] copy_to_kernel_nofault_oob+0x158/0x418 [ 39.651431] kunit_try_run_case+0x14c/0x3d0 [ 39.651605] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.651880] kthread+0x318/0x618 [ 39.652043] ret_from_fork+0x10/0x20 [ 39.652228] [ 39.652460] Allocated by task 283: [ 39.652779] kasan_save_stack+0x3c/0x68 [ 39.652915] kasan_save_track+0x20/0x40 [ 39.653033] kasan_save_alloc_info+0x40/0x58 [ 39.653626] __kasan_kmalloc+0xd4/0xd8 [ 39.653781] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.653954] copy_to_kernel_nofault_oob+0xc8/0x418 [ 39.654108] kunit_try_run_case+0x14c/0x3d0 [ 39.654245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.654832] kthread+0x318/0x618 [ 39.654966] ret_from_fork+0x10/0x20 [ 39.655525] [ 39.655608] The buggy address belongs to the object at fff00000c5da6f00 [ 39.655608] which belongs to the cache kmalloc-128 of size 128 [ 39.655802] The buggy address is located 0 bytes to the right of [ 39.655802] allocated 120-byte region [fff00000c5da6f00, fff00000c5da6f78) [ 39.656622] [ 39.656706] The buggy address belongs to the physical page: [ 39.656827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105da6 [ 39.657010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.657207] page_type: f5(slab) [ 39.657420] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 39.657695] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 39.657926] page dumped because: kasan: bad access detected [ 39.658101] [ 39.658179] Memory state around the buggy address: [ 39.658695] fff00000c5da6e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 39.658941] fff00000c5da6e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.659163] >fff00000c5da6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 39.659316] ^ [ 39.659523] fff00000c5da6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.659742] fff00000c5da7000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.659919] ================================================================== [ 39.661982] ================================================================== [ 39.662154] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 39.662298] Write of size 8 at addr fff00000c5da6f78 by task kunit_try_catch/283 [ 39.662468] [ 39.662568] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.662846] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.662950] Hardware name: linux,dummy-virt (DT) [ 39.663553] Call trace: [ 39.663961] show_stack+0x20/0x38 (C) [ 39.664565] dump_stack_lvl+0x8c/0xd0 [ 39.665006] print_report+0x118/0x5f0 [ 39.665179] kasan_report+0xc8/0x118 [ 39.665334] kasan_check_range+0x100/0x1a8 [ 39.665724] __kasan_check_write+0x20/0x30 [ 39.665945] copy_to_kernel_nofault+0x8c/0x250 [ 39.666150] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 39.666337] kunit_try_run_case+0x14c/0x3d0 [ 39.666612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.666820] kthread+0x318/0x618 [ 39.666975] ret_from_fork+0x10/0x20 [ 39.667196] [ 39.667268] Allocated by task 283: [ 39.667368] kasan_save_stack+0x3c/0x68 [ 39.667555] kasan_save_track+0x20/0x40 [ 39.668027] kasan_save_alloc_info+0x40/0x58 [ 39.668217] __kasan_kmalloc+0xd4/0xd8 [ 39.668341] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.668491] copy_to_kernel_nofault_oob+0xc8/0x418 [ 39.668636] kunit_try_run_case+0x14c/0x3d0 [ 39.669894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.670140] kthread+0x318/0x618 [ 39.670382] ret_from_fork+0x10/0x20 [ 39.670793] [ 39.670888] The buggy address belongs to the object at fff00000c5da6f00 [ 39.670888] which belongs to the cache kmalloc-128 of size 128 [ 39.671125] The buggy address is located 0 bytes to the right of [ 39.671125] allocated 120-byte region [fff00000c5da6f00, fff00000c5da6f78) [ 39.671355] [ 39.672101] The buggy address belongs to the physical page: [ 39.672391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105da6 [ 39.672586] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.672746] page_type: f5(slab) [ 39.672866] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 39.673128] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 39.673484] page dumped because: kasan: bad access detected [ 39.673642] [ 39.673764] Memory state around the buggy address: [ 39.673881] fff00000c5da6e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 39.674037] fff00000c5da6e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.674624] >fff00000c5da6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 39.675033] ^ [ 39.675211] fff00000c5da6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.675912] fff00000c5da7000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.676486] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 39.498451] ================================================================== [ 39.498714] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 39.499458] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/271 [ 39.500353] [ 39.500656] CPU: 1 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.500960] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.501208] Hardware name: linux,dummy-virt (DT) [ 39.501451] Call trace: [ 39.501567] show_stack+0x20/0x38 (C) [ 39.501720] dump_stack_lvl+0x8c/0xd0 [ 39.501874] print_report+0x2fc/0x5f0 [ 39.502023] kasan_report+0xc8/0x118 [ 39.502905] __asan_report_load1_noabort+0x20/0x30 [ 39.503142] vmalloc_oob+0x51c/0x5d0 [ 39.503765] kunit_try_run_case+0x14c/0x3d0 [ 39.504632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.505182] kthread+0x318/0x618 [ 39.505694] ret_from_fork+0x10/0x20 [ 39.506032] [ 39.506146] The buggy address belongs to the virtual mapping at [ 39.506146] [ffff80008010b000, ffff80008010d000) created by: [ 39.506146] vmalloc_oob+0x98/0x5d0 [ 39.506407] [ 39.506475] The buggy address belongs to the physical page: [ 39.506580] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db7 [ 39.507120] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.507691] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 39.508726] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.508967] page dumped because: kasan: bad access detected [ 39.509110] [ 39.509973] Memory state around the buggy address: [ 39.510272] ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.510732] ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.511259] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 39.511974] ^ [ 39.512167] ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 39.512853] ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 39.513044] ================================================================== [ 39.482580] ================================================================== [ 39.482777] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 39.482957] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/271 [ 39.483142] [ 39.484591] CPU: 1 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.485245] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.485476] Hardware name: linux,dummy-virt (DT) [ 39.485868] Call trace: [ 39.486084] show_stack+0x20/0x38 (C) [ 39.486397] dump_stack_lvl+0x8c/0xd0 [ 39.486576] print_report+0x2fc/0x5f0 [ 39.487266] kasan_report+0xc8/0x118 [ 39.487433] __asan_report_load1_noabort+0x20/0x30 [ 39.488553] vmalloc_oob+0x578/0x5d0 [ 39.488750] kunit_try_run_case+0x14c/0x3d0 [ 39.488906] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.489109] kthread+0x318/0x618 [ 39.490152] ret_from_fork+0x10/0x20 [ 39.490880] [ 39.491010] The buggy address belongs to the virtual mapping at [ 39.491010] [ffff80008010b000, ffff80008010d000) created by: [ 39.491010] vmalloc_oob+0x98/0x5d0 [ 39.491306] [ 39.491505] The buggy address belongs to the physical page: [ 39.491951] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105db7 [ 39.492622] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.493197] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 39.493774] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.494046] page dumped because: kasan: bad access detected [ 39.494204] [ 39.494272] Memory state around the buggy address: [ 39.494385] ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.494535] ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.494681] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 39.494818] ^ [ 39.494968] ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 39.495138] ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 39.495274] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 39.286388] ================================================================== [ 39.286537] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 39.286683] Read of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.286846] [ 39.286946] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.287245] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.287340] Hardware name: linux,dummy-virt (DT) [ 39.287451] Call trace: [ 39.287526] show_stack+0x20/0x38 (C) [ 39.287687] dump_stack_lvl+0x8c/0xd0 [ 39.287837] print_report+0x118/0x5f0 [ 39.287994] kasan_report+0xc8/0x118 [ 39.288161] __asan_report_load8_noabort+0x20/0x30 [ 39.288358] kasan_atomics_helper+0x3db0/0x4858 [ 39.288620] kasan_atomics+0x198/0x2e8 [ 39.288796] kunit_try_run_case+0x14c/0x3d0 [ 39.288979] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.289202] kthread+0x318/0x618 [ 39.289364] ret_from_fork+0x10/0x20 [ 39.289517] [ 39.289577] Allocated by task 267: [ 39.289670] kasan_save_stack+0x3c/0x68 [ 39.289789] kasan_save_track+0x20/0x40 [ 39.289910] kasan_save_alloc_info+0x40/0x58 [ 39.290041] __kasan_kmalloc+0xd4/0xd8 [ 39.290198] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.290338] kasan_atomics+0xb8/0x2e8 [ 39.290539] kunit_try_run_case+0x14c/0x3d0 [ 39.290726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.291005] kthread+0x318/0x618 [ 39.291173] ret_from_fork+0x10/0x20 [ 39.291308] [ 39.291377] The buggy address belongs to the object at fff00000c5dafc80 [ 39.291377] which belongs to the cache kmalloc-64 of size 64 [ 39.291581] The buggy address is located 0 bytes to the right of [ 39.291581] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.291803] [ 39.291876] The buggy address belongs to the physical page: [ 39.291979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.292179] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.292333] page_type: f5(slab) [ 39.292451] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.292631] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.292828] page dumped because: kasan: bad access detected [ 39.292971] [ 39.293034] Memory state around the buggy address: [ 39.293213] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.293410] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.293578] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.293732] ^ [ 39.293916] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.294135] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.294264] ================================================================== [ 39.295702] ================================================================== [ 39.295872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 39.296133] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.296388] [ 39.296500] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.296939] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.297074] Hardware name: linux,dummy-virt (DT) [ 39.297176] Call trace: [ 39.297256] show_stack+0x20/0x38 (C) [ 39.297405] dump_stack_lvl+0x8c/0xd0 [ 39.297610] print_report+0x118/0x5f0 [ 39.297772] kasan_report+0xc8/0x118 [ 39.297917] kasan_check_range+0x100/0x1a8 [ 39.298084] __kasan_check_write+0x20/0x30 [ 39.298229] kasan_atomics_helper+0x1644/0x4858 [ 39.298395] kasan_atomics+0x198/0x2e8 [ 39.298547] kunit_try_run_case+0x14c/0x3d0 [ 39.298705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.298888] kthread+0x318/0x618 [ 39.299145] ret_from_fork+0x10/0x20 [ 39.299364] [ 39.299431] Allocated by task 267: [ 39.299533] kasan_save_stack+0x3c/0x68 [ 39.299664] kasan_save_track+0x20/0x40 [ 39.299792] kasan_save_alloc_info+0x40/0x58 [ 39.299926] __kasan_kmalloc+0xd4/0xd8 [ 39.300071] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.300217] kasan_atomics+0xb8/0x2e8 [ 39.300337] kunit_try_run_case+0x14c/0x3d0 [ 39.300468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.300644] kthread+0x318/0x618 [ 39.300842] ret_from_fork+0x10/0x20 [ 39.301047] [ 39.301186] The buggy address belongs to the object at fff00000c5dafc80 [ 39.301186] which belongs to the cache kmalloc-64 of size 64 [ 39.301482] The buggy address is located 0 bytes to the right of [ 39.301482] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.301696] [ 39.301764] The buggy address belongs to the physical page: [ 39.302363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.302738] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.303017] page_type: f5(slab) [ 39.303157] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.303349] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.303518] page dumped because: kasan: bad access detected [ 39.303707] [ 39.303811] Memory state around the buggy address: [ 39.303978] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.304237] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.304804] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.304953] ^ [ 39.305159] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.305326] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.305476] ================================================================== [ 39.131540] ================================================================== [ 39.131712] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 39.131807] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.131895] [ 39.131948] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.132144] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.132198] Hardware name: linux,dummy-virt (DT) [ 39.132253] Call trace: [ 39.132307] show_stack+0x20/0x38 (C) [ 39.132531] dump_stack_lvl+0x8c/0xd0 [ 39.132765] print_report+0x118/0x5f0 [ 39.132918] kasan_report+0xc8/0x118 [ 39.133148] kasan_check_range+0x100/0x1a8 [ 39.133898] __kasan_check_write+0x20/0x30 [ 39.134108] kasan_atomics_helper+0x11f8/0x4858 [ 39.134719] kasan_atomics+0x198/0x2e8 [ 39.135144] kunit_try_run_case+0x14c/0x3d0 [ 39.135562] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.135771] kthread+0x318/0x618 [ 39.136215] ret_from_fork+0x10/0x20 [ 39.136777] [ 39.136856] Allocated by task 267: [ 39.137245] kasan_save_stack+0x3c/0x68 [ 39.137393] kasan_save_track+0x20/0x40 [ 39.137523] kasan_save_alloc_info+0x40/0x58 [ 39.137747] __kasan_kmalloc+0xd4/0xd8 [ 39.137890] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.138032] kasan_atomics+0xb8/0x2e8 [ 39.138172] kunit_try_run_case+0x14c/0x3d0 [ 39.138299] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.138452] kthread+0x318/0x618 [ 39.138578] ret_from_fork+0x10/0x20 [ 39.138705] [ 39.138831] The buggy address belongs to the object at fff00000c5dafc80 [ 39.138831] which belongs to the cache kmalloc-64 of size 64 [ 39.139174] The buggy address is located 0 bytes to the right of [ 39.139174] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.139518] [ 39.139606] The buggy address belongs to the physical page: [ 39.139713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.139890] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.140044] page_type: f5(slab) [ 39.140172] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.140336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.140482] page dumped because: kasan: bad access detected [ 39.140616] [ 39.140708] Memory state around the buggy address: [ 39.140818] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.140970] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.141147] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.141340] ^ [ 39.141661] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.141825] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.142006] ================================================================== [ 39.270530] ================================================================== [ 39.270676] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 39.270829] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.271006] [ 39.271448] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.271748] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.271842] Hardware name: linux,dummy-virt (DT) [ 39.272411] Call trace: [ 39.272525] show_stack+0x20/0x38 (C) [ 39.272710] dump_stack_lvl+0x8c/0xd0 [ 39.272854] print_report+0x118/0x5f0 [ 39.273021] kasan_report+0xc8/0x118 [ 39.273198] kasan_check_range+0x100/0x1a8 [ 39.273861] __kasan_check_write+0x20/0x30 [ 39.274192] kasan_atomics_helper+0x15b4/0x4858 [ 39.274590] kasan_atomics+0x198/0x2e8 [ 39.274784] kunit_try_run_case+0x14c/0x3d0 [ 39.274954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.275655] kthread+0x318/0x618 [ 39.275840] ret_from_fork+0x10/0x20 [ 39.276005] [ 39.276093] Allocated by task 267: [ 39.276193] kasan_save_stack+0x3c/0x68 [ 39.276342] kasan_save_track+0x20/0x40 [ 39.277147] kasan_save_alloc_info+0x40/0x58 [ 39.277536] __kasan_kmalloc+0xd4/0xd8 [ 39.277860] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.278340] kasan_atomics+0xb8/0x2e8 [ 39.278525] kunit_try_run_case+0x14c/0x3d0 [ 39.278860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.279651] kthread+0x318/0x618 [ 39.279822] ret_from_fork+0x10/0x20 [ 39.280086] [ 39.280277] The buggy address belongs to the object at fff00000c5dafc80 [ 39.280277] which belongs to the cache kmalloc-64 of size 64 [ 39.280768] The buggy address is located 0 bytes to the right of [ 39.280768] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.281179] [ 39.281370] The buggy address belongs to the physical page: [ 39.281528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.281939] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.282377] page_type: f5(slab) [ 39.282525] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.283014] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.283348] page dumped because: kasan: bad access detected [ 39.283852] [ 39.284011] Memory state around the buggy address: [ 39.284379] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.284580] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.284736] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.284874] ^ [ 39.285662] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.285769] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.285885] ================================================================== [ 38.727139] ================================================================== [ 38.727294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 38.727451] Write of size 4 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 38.727620] [ 38.727715] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 38.727992] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.729739] Hardware name: linux,dummy-virt (DT) [ 38.729966] Call trace: [ 38.730535] show_stack+0x20/0x38 (C) [ 38.730958] dump_stack_lvl+0x8c/0xd0 [ 38.731260] print_report+0x118/0x5f0 [ 38.731884] kasan_report+0xc8/0x118 [ 38.732179] kasan_check_range+0x100/0x1a8 [ 38.732356] __kasan_check_write+0x20/0x30 [ 38.732957] kasan_atomics_helper+0x99c/0x4858 [ 38.733429] kasan_atomics+0x198/0x2e8 [ 38.733659] kunit_try_run_case+0x14c/0x3d0 [ 38.733926] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.734450] kthread+0x318/0x618 [ 38.734877] ret_from_fork+0x10/0x20 [ 38.735047] [ 38.735141] Allocated by task 267: [ 38.735241] kasan_save_stack+0x3c/0x68 [ 38.735373] kasan_save_track+0x20/0x40 [ 38.735493] kasan_save_alloc_info+0x40/0x58 [ 38.735639] __kasan_kmalloc+0xd4/0xd8 [ 38.735754] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.735893] kasan_atomics+0xb8/0x2e8 [ 38.736029] kunit_try_run_case+0x14c/0x3d0 [ 38.736183] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.736333] kthread+0x318/0x618 [ 38.736925] ret_from_fork+0x10/0x20 [ 38.737098] [ 38.737165] The buggy address belongs to the object at fff00000c5dafc80 [ 38.737165] which belongs to the cache kmalloc-64 of size 64 [ 38.737628] The buggy address is located 0 bytes to the right of [ 38.737628] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 38.737867] [ 38.737950] The buggy address belongs to the physical page: [ 38.738070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 38.738250] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.738423] page_type: f5(slab) [ 38.738595] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.738822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.738989] page dumped because: kasan: bad access detected [ 38.739166] [ 38.739251] Memory state around the buggy address: [ 38.739393] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.739539] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.739717] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.740104] ^ [ 38.740312] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.740488] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.740585] ================================================================== [ 38.912813] ================================================================== [ 38.912951] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 38.913122] Read of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 38.913283] [ 38.913383] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 38.913667] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.913769] Hardware name: linux,dummy-virt (DT) [ 38.913869] Call trace: [ 38.913937] show_stack+0x20/0x38 (C) [ 38.914110] dump_stack_lvl+0x8c/0xd0 [ 38.914256] print_report+0x118/0x5f0 [ 38.914435] kasan_report+0xc8/0x118 [ 38.914593] kasan_check_range+0x100/0x1a8 [ 38.914752] __kasan_check_read+0x20/0x30 [ 38.914911] kasan_atomics_helper+0xdd4/0x4858 [ 38.915135] kasan_atomics+0x198/0x2e8 [ 38.915472] kunit_try_run_case+0x14c/0x3d0 [ 38.915665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.915851] kthread+0x318/0x618 [ 38.916005] ret_from_fork+0x10/0x20 [ 38.918378] [ 38.918479] Allocated by task 267: [ 38.918612] kasan_save_stack+0x3c/0x68 [ 38.918775] kasan_save_track+0x20/0x40 [ 38.918917] kasan_save_alloc_info+0x40/0x58 [ 38.919082] __kasan_kmalloc+0xd4/0xd8 [ 38.919738] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.920521] kasan_atomics+0xb8/0x2e8 [ 38.920733] kunit_try_run_case+0x14c/0x3d0 [ 38.920886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.921041] kthread+0x318/0x618 [ 38.921732] ret_from_fork+0x10/0x20 [ 38.922441] [ 38.922551] The buggy address belongs to the object at fff00000c5dafc80 [ 38.922551] which belongs to the cache kmalloc-64 of size 64 [ 38.922752] The buggy address is located 0 bytes to the right of [ 38.922752] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 38.923690] [ 38.924204] The buggy address belongs to the physical page: [ 38.924438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 38.925026] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.925502] page_type: f5(slab) [ 38.925853] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.926045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.926206] page dumped because: kasan: bad access detected [ 38.926319] [ 38.926860] Memory state around the buggy address: [ 38.927440] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.927917] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.928479] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.929042] ^ [ 38.929655] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.929831] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.929972] ================================================================== [ 39.229611] ================================================================== [ 39.230010] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 39.230398] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.230803] [ 39.230963] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.231353] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.231439] Hardware name: linux,dummy-virt (DT) [ 39.231546] Call trace: [ 39.231619] show_stack+0x20/0x38 (C) [ 39.231850] dump_stack_lvl+0x8c/0xd0 [ 39.232129] print_report+0x118/0x5f0 [ 39.232482] kasan_report+0xc8/0x118 [ 39.233296] kasan_check_range+0x100/0x1a8 [ 39.233561] __kasan_check_write+0x20/0x30 [ 39.233829] kasan_atomics_helper+0x147c/0x4858 [ 39.234007] kasan_atomics+0x198/0x2e8 [ 39.234188] kunit_try_run_case+0x14c/0x3d0 [ 39.234353] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.234576] kthread+0x318/0x618 [ 39.234730] ret_from_fork+0x10/0x20 [ 39.236251] [ 39.236356] Allocated by task 267: [ 39.236990] kasan_save_stack+0x3c/0x68 [ 39.237555] kasan_save_track+0x20/0x40 [ 39.237690] kasan_save_alloc_info+0x40/0x58 [ 39.238044] __kasan_kmalloc+0xd4/0xd8 [ 39.238344] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.239296] kasan_atomics+0xb8/0x2e8 [ 39.239675] kunit_try_run_case+0x14c/0x3d0 [ 39.239848] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.240073] kthread+0x318/0x618 [ 39.240205] ret_from_fork+0x10/0x20 [ 39.240327] [ 39.240674] The buggy address belongs to the object at fff00000c5dafc80 [ 39.240674] which belongs to the cache kmalloc-64 of size 64 [ 39.240901] The buggy address is located 0 bytes to the right of [ 39.240901] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.241162] [ 39.241250] The buggy address belongs to the physical page: [ 39.241429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.241701] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.241941] page_type: f5(slab) [ 39.242069] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.242238] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.242390] page dumped because: kasan: bad access detected [ 39.242542] [ 39.242610] Memory state around the buggy address: [ 39.242722] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.242877] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.243113] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.243248] ^ [ 39.243369] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.243522] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.243754] ================================================================== [ 39.041858] ================================================================== [ 39.042015] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 39.042193] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.044822] [ 39.044931] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.045929] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.046233] Hardware name: linux,dummy-virt (DT) [ 39.046342] Call trace: [ 39.046919] show_stack+0x20/0x38 (C) [ 39.048017] dump_stack_lvl+0x8c/0xd0 [ 39.048665] print_report+0x118/0x5f0 [ 39.048825] kasan_report+0xc8/0x118 [ 39.048970] kasan_check_range+0x100/0x1a8 [ 39.049566] __kasan_check_write+0x20/0x30 [ 39.050165] kasan_atomics_helper+0xff0/0x4858 [ 39.050347] kasan_atomics+0x198/0x2e8 [ 39.051068] kunit_try_run_case+0x14c/0x3d0 [ 39.051245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.051433] kthread+0x318/0x618 [ 39.051581] ret_from_fork+0x10/0x20 [ 39.051740] [ 39.052391] Allocated by task 267: [ 39.052678] kasan_save_stack+0x3c/0x68 [ 39.052936] kasan_save_track+0x20/0x40 [ 39.053547] kasan_save_alloc_info+0x40/0x58 [ 39.054103] __kasan_kmalloc+0xd4/0xd8 [ 39.054244] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.054389] kasan_atomics+0xb8/0x2e8 [ 39.054557] kunit_try_run_case+0x14c/0x3d0 [ 39.055586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.056244] kthread+0x318/0x618 [ 39.056550] ret_from_fork+0x10/0x20 [ 39.056953] [ 39.057211] The buggy address belongs to the object at fff00000c5dafc80 [ 39.057211] which belongs to the cache kmalloc-64 of size 64 [ 39.057826] The buggy address is located 0 bytes to the right of [ 39.057826] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.058069] [ 39.058384] The buggy address belongs to the physical page: [ 39.058669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.058990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.059513] page_type: f5(slab) [ 39.059644] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.060462] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.060619] page dumped because: kasan: bad access detected [ 39.060756] [ 39.060870] Memory state around the buggy address: [ 39.060989] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.061176] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.061361] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.061502] ^ [ 39.061619] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.061771] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.061910] ================================================================== [ 38.903471] ================================================================== [ 38.903701] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 38.903941] Read of size 4 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 38.904137] [ 38.904243] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 38.904588] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.904720] Hardware name: linux,dummy-virt (DT) [ 38.904828] Call trace: [ 38.904905] show_stack+0x20/0x38 (C) [ 38.905095] dump_stack_lvl+0x8c/0xd0 [ 38.905434] print_report+0x118/0x5f0 [ 38.905698] kasan_report+0xc8/0x118 [ 38.905938] __asan_report_load4_noabort+0x20/0x30 [ 38.906136] kasan_atomics_helper+0x3e04/0x4858 [ 38.906303] kasan_atomics+0x198/0x2e8 [ 38.906458] kunit_try_run_case+0x14c/0x3d0 [ 38.906636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.906855] kthread+0x318/0x618 [ 38.907046] ret_from_fork+0x10/0x20 [ 38.907229] [ 38.907297] Allocated by task 267: [ 38.907407] kasan_save_stack+0x3c/0x68 [ 38.907597] kasan_save_track+0x20/0x40 [ 38.907718] kasan_save_alloc_info+0x40/0x58 [ 38.907886] __kasan_kmalloc+0xd4/0xd8 [ 38.908091] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.908244] kasan_atomics+0xb8/0x2e8 [ 38.908415] kunit_try_run_case+0x14c/0x3d0 [ 38.908541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.908723] kthread+0x318/0x618 [ 38.908860] ret_from_fork+0x10/0x20 [ 38.909009] [ 38.909144] The buggy address belongs to the object at fff00000c5dafc80 [ 38.909144] which belongs to the cache kmalloc-64 of size 64 [ 38.909352] The buggy address is located 0 bytes to the right of [ 38.909352] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 38.909574] [ 38.909650] The buggy address belongs to the physical page: [ 38.909747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 38.910163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.910281] page_type: f5(slab) [ 38.910351] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.910508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.910653] page dumped because: kasan: bad access detected [ 38.910760] [ 38.910826] Memory state around the buggy address: [ 38.910992] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.911166] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.911352] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.911571] ^ [ 38.911699] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.911852] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.911993] ================================================================== [ 38.850904] ================================================================== [ 38.851075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 38.851420] Read of size 4 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 38.852608] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.852917] show_stack+0x20/0x38 (C) [ 38.853851] kasan_atomics_helper+0x3de4/0x4858 [ 38.855564] kasan_save_stack+0x3c/0x68 [ 38.856416] kunit_try_run_case+0x14c/0x3d0 [ 38.858562] The buggy address is located 0 bytes to the right of [ 38.858562] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 38.860215] page dumped because: kasan: bad access detected [ 38.860546] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.861888] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.863413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 38.864219] Hardware name: linux,dummy-virt (DT) [ 38.870524] kasan_save_alloc_info+0x40/0x58 [ 38.872417] The buggy address is located 0 bytes to the right of [ 38.872417] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 38.873766] page dumped because: kasan: bad access detected [ 38.873888] [ 38.874004] Memory state around the buggy address: [ 38.874166] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.874552] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.874795] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.875018] ^ [ 38.875221] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.875466] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.875673] ================================================================== [ 39.245848] ================================================================== [ 39.246001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 39.246174] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.246338] [ 39.246433] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.246719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.246811] Hardware name: linux,dummy-virt (DT) [ 39.246922] Call trace: [ 39.247007] show_stack+0x20/0x38 (C) [ 39.247187] dump_stack_lvl+0x8c/0xd0 [ 39.247335] print_report+0x118/0x5f0 [ 39.247491] kasan_report+0xc8/0x118 [ 39.247656] kasan_check_range+0x100/0x1a8 [ 39.247804] __kasan_check_write+0x20/0x30 [ 39.248026] kasan_atomics_helper+0x14e4/0x4858 [ 39.248233] kasan_atomics+0x198/0x2e8 [ 39.248618] kunit_try_run_case+0x14c/0x3d0 [ 39.249531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.249800] kthread+0x318/0x618 [ 39.249992] ret_from_fork+0x10/0x20 [ 39.250182] [ 39.250314] Allocated by task 267: [ 39.250508] kasan_save_stack+0x3c/0x68 [ 39.250692] kasan_save_track+0x20/0x40 [ 39.250838] kasan_save_alloc_info+0x40/0x58 [ 39.251086] __kasan_kmalloc+0xd4/0xd8 [ 39.251288] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.251482] kasan_atomics+0xb8/0x2e8 [ 39.251612] kunit_try_run_case+0x14c/0x3d0 [ 39.251792] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.252029] kthread+0x318/0x618 [ 39.252259] ret_from_fork+0x10/0x20 [ 39.252657] [ 39.252740] The buggy address belongs to the object at fff00000c5dafc80 [ 39.252740] which belongs to the cache kmalloc-64 of size 64 [ 39.252931] The buggy address is located 0 bytes to the right of [ 39.252931] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.253987] [ 39.254083] The buggy address belongs to the physical page: [ 39.254185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.254335] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.254474] page_type: f5(slab) [ 39.254579] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.254716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.254853] page dumped because: kasan: bad access detected [ 39.254965] [ 39.255021] Memory state around the buggy address: [ 39.255146] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.255275] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.255418] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.255538] ^ [ 39.255642] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.255781] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.255904] ================================================================== [ 39.011336] ================================================================== [ 39.011575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 39.011818] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.012526] [ 39.012679] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.013044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.013160] Hardware name: linux,dummy-virt (DT) [ 39.013323] Call trace: [ 39.013398] show_stack+0x20/0x38 (C) [ 39.013608] dump_stack_lvl+0x8c/0xd0 [ 39.013760] print_report+0x118/0x5f0 [ 39.014009] kasan_report+0xc8/0x118 [ 39.014185] kasan_check_range+0x100/0x1a8 [ 39.014647] __kasan_check_write+0x20/0x30 [ 39.015232] kasan_atomics_helper+0xf20/0x4858 [ 39.015511] kasan_atomics+0x198/0x2e8 [ 39.015771] kunit_try_run_case+0x14c/0x3d0 [ 39.015978] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.016302] kthread+0x318/0x618 [ 39.016466] ret_from_fork+0x10/0x20 [ 39.016677] [ 39.016789] Allocated by task 267: [ 39.016889] kasan_save_stack+0x3c/0x68 [ 39.017022] kasan_save_track+0x20/0x40 [ 39.017159] kasan_save_alloc_info+0x40/0x58 [ 39.017281] __kasan_kmalloc+0xd4/0xd8 [ 39.017774] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.017947] kasan_atomics+0xb8/0x2e8 [ 39.018518] kunit_try_run_case+0x14c/0x3d0 [ 39.018853] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.019113] kthread+0x318/0x618 [ 39.019250] ret_from_fork+0x10/0x20 [ 39.019422] [ 39.019492] The buggy address belongs to the object at fff00000c5dafc80 [ 39.019492] which belongs to the cache kmalloc-64 of size 64 [ 39.019834] The buggy address is located 0 bytes to the right of [ 39.019834] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.020240] [ 39.020366] The buggy address belongs to the physical page: [ 39.020484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.020652] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.020810] page_type: f5(slab) [ 39.020924] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.021118] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.021265] page dumped because: kasan: bad access detected [ 39.021379] [ 39.021445] Memory state around the buggy address: [ 39.021583] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.021769] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.021932] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.022127] ^ [ 39.022239] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.022705] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.023070] ================================================================== [ 39.112194] ================================================================== [ 39.112349] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 39.113446] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.114342] [ 39.114449] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.114744] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.114836] Hardware name: linux,dummy-virt (DT) [ 39.114957] Call trace: [ 39.116313] show_stack+0x20/0x38 (C) [ 39.117294] dump_stack_lvl+0x8c/0xd0 [ 39.117755] print_report+0x118/0x5f0 [ 39.118449] kasan_report+0xc8/0x118 [ 39.118935] kasan_check_range+0x100/0x1a8 [ 39.119297] __kasan_check_write+0x20/0x30 [ 39.119452] kasan_atomics_helper+0x1190/0x4858 [ 39.119682] kasan_atomics+0x198/0x2e8 [ 39.119858] kunit_try_run_case+0x14c/0x3d0 [ 39.120023] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.120436] kthread+0x318/0x618 [ 39.120639] ret_from_fork+0x10/0x20 [ 39.120941] [ 39.121021] Allocated by task 267: [ 39.121437] kasan_save_stack+0x3c/0x68 [ 39.121584] kasan_save_track+0x20/0x40 [ 39.121703] kasan_save_alloc_info+0x40/0x58 [ 39.122219] __kasan_kmalloc+0xd4/0xd8 [ 39.122627] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.122787] kasan_atomics+0xb8/0x2e8 [ 39.122914] kunit_try_run_case+0x14c/0x3d0 [ 39.123085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.123380] kthread+0x318/0x618 [ 39.123545] ret_from_fork+0x10/0x20 [ 39.123969] [ 39.124626] The buggy address belongs to the object at fff00000c5dafc80 [ 39.124626] which belongs to the cache kmalloc-64 of size 64 [ 39.125126] The buggy address is located 0 bytes to the right of [ 39.125126] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.126098] [ 39.126220] The buggy address belongs to the physical page: [ 39.126339] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.126532] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.126703] page_type: f5(slab) [ 39.126826] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.127020] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.127339] page dumped because: kasan: bad access detected [ 39.127681] [ 39.127772] Memory state around the buggy address: [ 39.127889] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.128041] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.128204] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.128439] ^ [ 39.128565] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.128925] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.129153] ================================================================== [ 39.198133] ================================================================== [ 39.198572] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 39.199013] Read of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.199480] [ 39.199598] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.200030] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.200144] Hardware name: linux,dummy-virt (DT) [ 39.200261] Call trace: [ 39.200335] show_stack+0x20/0x38 (C) [ 39.200511] dump_stack_lvl+0x8c/0xd0 [ 39.200660] print_report+0x118/0x5f0 [ 39.200817] kasan_report+0xc8/0x118 [ 39.200965] __asan_report_load8_noabort+0x20/0x30 [ 39.201150] kasan_atomics_helper+0x3f04/0x4858 [ 39.201325] kasan_atomics+0x198/0x2e8 [ 39.201487] kunit_try_run_case+0x14c/0x3d0 [ 39.203432] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.203644] kthread+0x318/0x618 [ 39.203806] ret_from_fork+0x10/0x20 [ 39.204216] [ 39.204332] Allocated by task 267: [ 39.204458] kasan_save_stack+0x3c/0x68 [ 39.204590] kasan_save_track+0x20/0x40 [ 39.204770] kasan_save_alloc_info+0x40/0x58 [ 39.204987] __kasan_kmalloc+0xd4/0xd8 [ 39.205488] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.206412] kasan_atomics+0xb8/0x2e8 [ 39.206548] kunit_try_run_case+0x14c/0x3d0 [ 39.206679] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.207186] kthread+0x318/0x618 [ 39.207403] ret_from_fork+0x10/0x20 [ 39.207586] [ 39.207687] The buggy address belongs to the object at fff00000c5dafc80 [ 39.207687] which belongs to the cache kmalloc-64 of size 64 [ 39.207968] The buggy address is located 0 bytes to the right of [ 39.207968] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.208683] [ 39.208795] The buggy address belongs to the physical page: [ 39.208997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.209198] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.211411] page_type: f5(slab) [ 39.211541] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.211714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.211865] page dumped because: kasan: bad access detected [ 39.211979] [ 39.212045] Memory state around the buggy address: [ 39.213163] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.213310] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.213444] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.213585] ^ [ 39.213693] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.213824] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.213944] ================================================================== [ 39.025638] ================================================================== [ 39.025725] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 39.025809] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.025895] [ 39.025944] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.026137] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.026233] Hardware name: linux,dummy-virt (DT) [ 39.026383] Call trace: [ 39.026476] show_stack+0x20/0x38 (C) [ 39.026629] dump_stack_lvl+0x8c/0xd0 [ 39.026780] print_report+0x118/0x5f0 [ 39.026943] kasan_report+0xc8/0x118 [ 39.027109] kasan_check_range+0x100/0x1a8 [ 39.027279] __kasan_check_write+0x20/0x30 [ 39.027433] kasan_atomics_helper+0xf88/0x4858 [ 39.027720] kasan_atomics+0x198/0x2e8 [ 39.028209] kunit_try_run_case+0x14c/0x3d0 [ 39.028433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.028797] kthread+0x318/0x618 [ 39.029410] ret_from_fork+0x10/0x20 [ 39.029667] [ 39.029922] Allocated by task 267: [ 39.030699] kasan_save_stack+0x3c/0x68 [ 39.030978] kasan_save_track+0x20/0x40 [ 39.031140] kasan_save_alloc_info+0x40/0x58 [ 39.031308] __kasan_kmalloc+0xd4/0xd8 [ 39.031511] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.031745] kasan_atomics+0xb8/0x2e8 [ 39.031954] kunit_try_run_case+0x14c/0x3d0 [ 39.032142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.032285] kthread+0x318/0x618 [ 39.032913] ret_from_fork+0x10/0x20 [ 39.033142] [ 39.033260] The buggy address belongs to the object at fff00000c5dafc80 [ 39.033260] which belongs to the cache kmalloc-64 of size 64 [ 39.033493] The buggy address is located 0 bytes to the right of [ 39.033493] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.033750] [ 39.033822] The buggy address belongs to the physical page: [ 39.033950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.034158] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.034332] page_type: f5(slab) [ 39.034448] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.034609] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.034753] page dumped because: kasan: bad access detected [ 39.034871] [ 39.035014] Memory state around the buggy address: [ 39.035389] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.036241] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.037074] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.037295] ^ [ 39.037422] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.037566] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.039207] ================================================================== [ 39.412250] ================================================================== [ 39.412512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 39.413015] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.413295] [ 39.413700] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.414225] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.414839] Hardware name: linux,dummy-virt (DT) [ 39.415180] Call trace: [ 39.415366] show_stack+0x20/0x38 (C) [ 39.415534] dump_stack_lvl+0x8c/0xd0 [ 39.415677] print_report+0x118/0x5f0 [ 39.415827] kasan_report+0xc8/0x118 [ 39.415977] kasan_check_range+0x100/0x1a8 [ 39.416845] __kasan_check_write+0x20/0x30 [ 39.417257] kasan_atomics_helper+0x17ec/0x4858 [ 39.417418] kasan_atomics+0x198/0x2e8 [ 39.417551] kunit_try_run_case+0x14c/0x3d0 [ 39.417692] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.417855] kthread+0x318/0x618 [ 39.418135] ret_from_fork+0x10/0x20 [ 39.418316] [ 39.418387] Allocated by task 267: [ 39.418489] kasan_save_stack+0x3c/0x68 [ 39.418620] kasan_save_track+0x20/0x40 [ 39.422164] kasan_save_alloc_info+0x40/0x58 [ 39.422318] __kasan_kmalloc+0xd4/0xd8 [ 39.422440] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.422571] kasan_atomics+0xb8/0x2e8 [ 39.424036] kunit_try_run_case+0x14c/0x3d0 [ 39.424307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.425048] kthread+0x318/0x618 [ 39.425805] ret_from_fork+0x10/0x20 [ 39.425933] [ 39.426001] The buggy address belongs to the object at fff00000c5dafc80 [ 39.426001] which belongs to the cache kmalloc-64 of size 64 [ 39.428490] The buggy address is located 0 bytes to the right of [ 39.428490] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.431044] [ 39.431142] The buggy address belongs to the physical page: [ 39.431251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.431417] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.431578] page_type: f5(slab) [ 39.434081] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.434501] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.434677] page dumped because: kasan: bad access detected [ 39.434790] [ 39.434863] Memory state around the buggy address: [ 39.434983] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.436230] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.436557] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.436994] ^ [ 39.437201] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.437651] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.438118] ================================================================== [ 38.876110] ================================================================== [ 38.876249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 38.876416] Read of size 4 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 38.876585] [ 38.876680] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 38.876956] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.877136] Hardware name: linux,dummy-virt (DT) [ 38.877253] Call trace: [ 38.877335] show_stack+0x20/0x38 (C) [ 38.877496] dump_stack_lvl+0x8c/0xd0 [ 38.877646] print_report+0x118/0x5f0 [ 38.878313] kasan_report+0xc8/0x118 [ 38.878486] __asan_report_load4_noabort+0x20/0x30 [ 38.878669] kasan_atomics_helper+0x3dd8/0x4858 [ 38.878861] kasan_atomics+0x198/0x2e8 [ 38.879152] kunit_try_run_case+0x14c/0x3d0 [ 38.879419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.879628] kthread+0x318/0x618 [ 38.879841] ret_from_fork+0x10/0x20 [ 38.880001] [ 38.880088] Allocated by task 267: [ 38.880182] kasan_save_stack+0x3c/0x68 [ 38.880308] kasan_save_track+0x20/0x40 [ 38.880433] kasan_save_alloc_info+0x40/0x58 [ 38.880565] __kasan_kmalloc+0xd4/0xd8 [ 38.880690] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.880834] kasan_atomics+0xb8/0x2e8 [ 38.880984] kunit_try_run_case+0x14c/0x3d0 [ 38.881139] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.881292] kthread+0x318/0x618 [ 38.881413] ret_from_fork+0x10/0x20 [ 38.881535] [ 38.881618] The buggy address belongs to the object at fff00000c5dafc80 [ 38.881618] which belongs to the cache kmalloc-64 of size 64 [ 38.881956] The buggy address is located 0 bytes to the right of [ 38.881956] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 38.882253] [ 38.882329] The buggy address belongs to the physical page: [ 38.882426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 38.882613] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.882768] page_type: f5(slab) [ 38.882861] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.883013] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.883153] page dumped because: kasan: bad access detected [ 38.883249] [ 38.883478] Memory state around the buggy address: [ 38.883594] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.884888] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.885047] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.885204] ^ [ 38.885316] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.885459] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.885579] ================================================================== [ 39.256689] ================================================================== [ 39.256833] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 39.256983] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.257189] [ 39.257298] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.257674] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.257811] Hardware name: linux,dummy-virt (DT) [ 39.257958] Call trace: [ 39.258084] show_stack+0x20/0x38 (C) [ 39.258243] dump_stack_lvl+0x8c/0xd0 [ 39.258431] print_report+0x118/0x5f0 [ 39.258694] kasan_report+0xc8/0x118 [ 39.258918] kasan_check_range+0x100/0x1a8 [ 39.259097] __kasan_check_write+0x20/0x30 [ 39.259262] kasan_atomics_helper+0x154c/0x4858 [ 39.259433] kasan_atomics+0x198/0x2e8 [ 39.259588] kunit_try_run_case+0x14c/0x3d0 [ 39.259746] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.259933] kthread+0x318/0x618 [ 39.260576] ret_from_fork+0x10/0x20 [ 39.261007] [ 39.261206] Allocated by task 267: [ 39.261375] kasan_save_stack+0x3c/0x68 [ 39.261576] kasan_save_track+0x20/0x40 [ 39.261691] kasan_save_alloc_info+0x40/0x58 [ 39.261852] __kasan_kmalloc+0xd4/0xd8 [ 39.261973] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.262135] kasan_atomics+0xb8/0x2e8 [ 39.262267] kunit_try_run_case+0x14c/0x3d0 [ 39.262676] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.262949] kthread+0x318/0x618 [ 39.263187] ret_from_fork+0x10/0x20 [ 39.263396] [ 39.263517] The buggy address belongs to the object at fff00000c5dafc80 [ 39.263517] which belongs to the cache kmalloc-64 of size 64 [ 39.263786] The buggy address is located 0 bytes to the right of [ 39.263786] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.264133] [ 39.264208] The buggy address belongs to the physical page: [ 39.264313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.264964] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.265146] page_type: f5(slab) [ 39.265261] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.265414] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.265556] page dumped because: kasan: bad access detected [ 39.265662] [ 39.265726] Memory state around the buggy address: [ 39.265832] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.266680] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.266856] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.266995] ^ [ 39.267162] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.267316] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.267662] ================================================================== [ 38.993563] ================================================================== [ 38.994151] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 38.994839] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 38.995316] [ 38.995435] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 38.995725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.995814] Hardware name: linux,dummy-virt (DT) [ 38.995921] Call trace: [ 38.995996] show_stack+0x20/0x38 (C) [ 38.997257] dump_stack_lvl+0x8c/0xd0 [ 38.997616] print_report+0x118/0x5f0 [ 38.997793] kasan_report+0xc8/0x118 [ 38.997938] kasan_check_range+0x100/0x1a8 [ 38.998942] __kasan_check_write+0x20/0x30 [ 38.999473] kasan_atomics_helper+0xeb8/0x4858 [ 38.999665] kasan_atomics+0x198/0x2e8 [ 38.999850] kunit_try_run_case+0x14c/0x3d0 [ 39.000021] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.000233] kthread+0x318/0x618 [ 39.001303] ret_from_fork+0x10/0x20 [ 39.001534] [ 39.002352] Allocated by task 267: [ 39.002498] kasan_save_stack+0x3c/0x68 [ 39.002969] kasan_save_track+0x20/0x40 [ 39.003147] kasan_save_alloc_info+0x40/0x58 [ 39.003316] __kasan_kmalloc+0xd4/0xd8 [ 39.003443] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.003939] kasan_atomics+0xb8/0x2e8 [ 39.004158] kunit_try_run_case+0x14c/0x3d0 [ 39.004321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.004894] kthread+0x318/0x618 [ 39.005035] ret_from_fork+0x10/0x20 [ 39.005179] [ 39.005244] The buggy address belongs to the object at fff00000c5dafc80 [ 39.005244] which belongs to the cache kmalloc-64 of size 64 [ 39.005473] The buggy address is located 0 bytes to the right of [ 39.005473] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.005694] [ 39.006129] The buggy address belongs to the physical page: [ 39.006618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.007033] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.007233] page_type: f5(slab) [ 39.007393] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.007638] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.007784] page dumped because: kasan: bad access detected [ 39.007940] [ 39.008077] Memory state around the buggy address: [ 39.008260] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.008476] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.008656] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.008799] ^ [ 39.008938] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.009109] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.009234] ================================================================== [ 39.370310] ================================================================== [ 39.370834] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 39.371317] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.371663] [ 39.372068] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.372356] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.372460] Hardware name: linux,dummy-virt (DT) [ 39.372568] Call trace: [ 39.372842] show_stack+0x20/0x38 (C) [ 39.373728] dump_stack_lvl+0x8c/0xd0 [ 39.373920] print_report+0x118/0x5f0 [ 39.374095] kasan_report+0xc8/0x118 [ 39.374721] kasan_check_range+0x100/0x1a8 [ 39.375627] __kasan_check_write+0x20/0x30 [ 39.376169] kasan_atomics_helper+0x175c/0x4858 [ 39.377098] kasan_atomics+0x198/0x2e8 [ 39.377750] kunit_try_run_case+0x14c/0x3d0 [ 39.377941] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.378478] kthread+0x318/0x618 [ 39.378671] ret_from_fork+0x10/0x20 [ 39.378833] [ 39.378901] Allocated by task 267: [ 39.379008] kasan_save_stack+0x3c/0x68 [ 39.379153] kasan_save_track+0x20/0x40 [ 39.379276] kasan_save_alloc_info+0x40/0x58 [ 39.379412] __kasan_kmalloc+0xd4/0xd8 [ 39.380339] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.381084] kasan_atomics+0xb8/0x2e8 [ 39.381404] kunit_try_run_case+0x14c/0x3d0 [ 39.381718] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.382321] kthread+0x318/0x618 [ 39.382887] ret_from_fork+0x10/0x20 [ 39.383041] [ 39.383567] The buggy address belongs to the object at fff00000c5dafc80 [ 39.383567] which belongs to the cache kmalloc-64 of size 64 [ 39.384186] The buggy address is located 0 bytes to the right of [ 39.384186] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.384733] [ 39.384815] The buggy address belongs to the physical page: [ 39.385342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.386178] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.386538] page_type: f5(slab) [ 39.386692] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.386854] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.387005] page dumped because: kasan: bad access detected [ 39.387964] [ 39.388410] Memory state around the buggy address: [ 39.388599] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.389152] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.389792] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.390417] ^ [ 39.390689] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.390841] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.390985] ================================================================== [ 38.741789] ================================================================== [ 38.741940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 38.742181] Write of size 4 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 38.742465] [ 38.742574] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 38.742844] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.742952] Hardware name: linux,dummy-virt (DT) [ 38.743081] Call trace: [ 38.743163] show_stack+0x20/0x38 (C) [ 38.743468] dump_stack_lvl+0x8c/0xd0 [ 38.743643] print_report+0x118/0x5f0 [ 38.743813] kasan_report+0xc8/0x118 [ 38.744087] kasan_check_range+0x100/0x1a8 [ 38.744342] __kasan_check_write+0x20/0x30 [ 38.744549] kasan_atomics_helper+0xa04/0x4858 [ 38.744814] kasan_atomics+0x198/0x2e8 [ 38.744973] kunit_try_run_case+0x14c/0x3d0 [ 38.745487] kthread+0x318/0x618 [ 38.747630] ret_from_fork+0x10/0x20 [ 38.748273] [ 38.748451] The buggy address belongs to the physical page: [ 38.748564] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 38.748757] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.749010] page_type: f5(slab) [ 38.749154] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.749328] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.749462] page dumped because: kasan: bad access detected [ 38.749612] [ 38.749738] Memory state around the buggy address: [ 38.749857] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.750013] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.750186] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.750324] ^ [ 38.750508] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.750746] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.750976] ================================================================== [ 39.393495] ================================================================== [ 39.393675] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 39.394010] Read of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.394264] [ 39.394369] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.394676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.394774] Hardware name: linux,dummy-virt (DT) [ 39.394880] Call trace: [ 39.394968] show_stack+0x20/0x38 (C) [ 39.396283] dump_stack_lvl+0x8c/0xd0 [ 39.396858] print_report+0x118/0x5f0 [ 39.397029] kasan_report+0xc8/0x118 [ 39.397365] __asan_report_load8_noabort+0x20/0x30 [ 39.397625] kasan_atomics_helper+0x3e20/0x4858 [ 39.397868] kasan_atomics+0x198/0x2e8 [ 39.398015] kunit_try_run_case+0x14c/0x3d0 [ 39.398630] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.398836] kthread+0x318/0x618 [ 39.399433] ret_from_fork+0x10/0x20 [ 39.399642] [ 39.399711] Allocated by task 267: [ 39.399812] kasan_save_stack+0x3c/0x68 [ 39.399935] kasan_save_track+0x20/0x40 [ 39.400079] kasan_save_alloc_info+0x40/0x58 [ 39.401086] __kasan_kmalloc+0xd4/0xd8 [ 39.401581] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.401758] kasan_atomics+0xb8/0x2e8 [ 39.401898] kunit_try_run_case+0x14c/0x3d0 [ 39.402035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.402214] kthread+0x318/0x618 [ 39.402516] ret_from_fork+0x10/0x20 [ 39.403463] [ 39.403900] The buggy address belongs to the object at fff00000c5dafc80 [ 39.403900] which belongs to the cache kmalloc-64 of size 64 [ 39.404386] The buggy address is located 0 bytes to the right of [ 39.404386] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.405133] [ 39.405210] The buggy address belongs to the physical page: [ 39.405317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.406035] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.406783] page_type: f5(slab) [ 39.406934] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.407626] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.408174] page dumped because: kasan: bad access detected [ 39.408296] [ 39.408369] Memory state around the buggy address: [ 39.408481] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.408776] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.409481] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.409815] ^ [ 39.410182] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.410402] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.410533] ================================================================== [ 39.214502] ================================================================== [ 39.214727] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 39.214985] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.215270] [ 39.215432] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.215818] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.215916] Hardware name: linux,dummy-virt (DT) [ 39.216021] Call trace: [ 39.216410] show_stack+0x20/0x38 (C) [ 39.216659] dump_stack_lvl+0x8c/0xd0 [ 39.218253] print_report+0x118/0x5f0 [ 39.218389] kasan_report+0xc8/0x118 [ 39.218526] kasan_check_range+0x100/0x1a8 [ 39.218676] __kasan_check_write+0x20/0x30 [ 39.218810] kasan_atomics_helper+0x1414/0x4858 [ 39.219890] kasan_atomics+0x198/0x2e8 [ 39.220187] kunit_try_run_case+0x14c/0x3d0 [ 39.220397] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.220945] kthread+0x318/0x618 [ 39.221267] ret_from_fork+0x10/0x20 [ 39.221540] [ 39.221623] Allocated by task 267: [ 39.221780] kasan_save_stack+0x3c/0x68 [ 39.221934] kasan_save_track+0x20/0x40 [ 39.222046] kasan_save_alloc_info+0x40/0x58 [ 39.222239] __kasan_kmalloc+0xd4/0xd8 [ 39.222398] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.222989] kasan_atomics+0xb8/0x2e8 [ 39.223165] kunit_try_run_case+0x14c/0x3d0 [ 39.223358] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.223804] kthread+0x318/0x618 [ 39.224102] ret_from_fork+0x10/0x20 [ 39.224248] [ 39.224398] The buggy address belongs to the object at fff00000c5dafc80 [ 39.224398] which belongs to the cache kmalloc-64 of size 64 [ 39.224651] The buggy address is located 0 bytes to the right of [ 39.224651] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.224954] [ 39.225026] The buggy address belongs to the physical page: [ 39.225152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.225319] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.225498] page_type: f5(slab) [ 39.225937] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.226233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.226482] page dumped because: kasan: bad access detected [ 39.226645] [ 39.226708] Memory state around the buggy address: [ 39.226815] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.227118] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.227278] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.227493] ^ [ 39.227986] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.228179] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.228315] ================================================================== [ 38.695124] ================================================================== [ 38.695262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 38.695417] Read of size 4 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 38.695584] [ 38.695685] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 38.695959] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.696077] Hardware name: linux,dummy-virt (DT) [ 38.696178] Call trace: [ 38.696248] show_stack+0x20/0x38 (C) [ 38.696989] dump_stack_lvl+0x8c/0xd0 [ 38.697219] print_report+0x118/0x5f0 [ 38.697538] kasan_report+0xc8/0x118 [ 38.698029] __asan_report_load4_noabort+0x20/0x30 [ 38.698258] kasan_atomics_helper+0x42d8/0x4858 [ 38.698429] kasan_atomics+0x198/0x2e8 [ 38.698625] kunit_try_run_case+0x14c/0x3d0 [ 38.698890] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.699281] kthread+0x318/0x618 [ 38.699978] ret_from_fork+0x10/0x20 [ 38.700237] [ 38.700306] Allocated by task 267: [ 38.700414] kasan_save_stack+0x3c/0x68 [ 38.700547] kasan_save_track+0x20/0x40 [ 38.700668] kasan_save_alloc_info+0x40/0x58 [ 38.701871] __kasan_kmalloc+0xd4/0xd8 [ 38.701977] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.702074] kasan_atomics+0xb8/0x2e8 [ 38.702178] kunit_try_run_case+0x14c/0x3d0 [ 38.702250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.702388] kthread+0x318/0x618 [ 38.702520] ret_from_fork+0x10/0x20 [ 38.702637] [ 38.702699] The buggy address belongs to the object at fff00000c5dafc80 [ 38.702699] which belongs to the cache kmalloc-64 of size 64 [ 38.702942] The buggy address is located 0 bytes to the right of [ 38.702942] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 38.703304] [ 38.703515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 38.703711] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.704075] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.705150] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.705556] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.709130] [ 38.709706] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.710319] print_report+0x118/0x5f0 [ 38.711422] kasan_atomics+0x198/0x2e8 [ 38.712801] Allocated by task 267: [ 38.713422] __kasan_kmalloc+0xd4/0xd8 [ 38.713541] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.713675] kasan_atomics+0xb8/0x2e8 [ 38.713795] kunit_try_run_case+0x14c/0x3d0 [ 38.713958] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.714194] kthread+0x318/0x618 [ 38.714386] ret_from_fork+0x10/0x20 [ 38.715042] [ 38.715590] The buggy address belongs to the object at fff00000c5dafc80 [ 38.715590] which belongs to the cache kmalloc-64 of size 64 [ 38.716674] The buggy address is located 0 bytes to the right of [ 38.716674] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 38.717555] [ 38.718166] The buggy address belongs to the physical page: [ 38.718363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 38.718819] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.719044] page_type: f5(slab) [ 38.720303] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.720923] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.721343] page dumped because: kasan: bad access detected [ 38.721742] [ 38.722238] Memory state around the buggy address: [ 38.722588] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.723640] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.724223] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.724381] ^ [ 38.724622] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.724803] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.725570] ================================================================== [ 39.089657] ================================================================== [ 39.090117] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 39.090278] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.090446] [ 39.090540] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.090826] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.090922] Hardware name: linux,dummy-virt (DT) [ 39.091036] Call trace: [ 39.091131] show_stack+0x20/0x38 (C) [ 39.091279] dump_stack_lvl+0x8c/0xd0 [ 39.091432] print_report+0x118/0x5f0 [ 39.091579] kasan_report+0xc8/0x118 [ 39.091724] kasan_check_range+0x100/0x1a8 [ 39.091873] __kasan_check_write+0x20/0x30 [ 39.092039] kasan_atomics_helper+0x1128/0x4858 [ 39.092234] kasan_atomics+0x198/0x2e8 [ 39.092916] kunit_try_run_case+0x14c/0x3d0 [ 39.093288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.093507] kthread+0x318/0x618 [ 39.094170] ret_from_fork+0x10/0x20 [ 39.094443] [ 39.094562] Allocated by task 267: [ 39.094664] kasan_save_stack+0x3c/0x68 [ 39.094806] kasan_save_track+0x20/0x40 [ 39.095015] kasan_save_alloc_info+0x40/0x58 [ 39.095338] __kasan_kmalloc+0xd4/0xd8 [ 39.095472] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.095646] kasan_atomics+0xb8/0x2e8 [ 39.095854] kunit_try_run_case+0x14c/0x3d0 [ 39.096274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.097104] kthread+0x318/0x618 [ 39.097260] ret_from_fork+0x10/0x20 [ 39.097391] [ 39.098347] The buggy address belongs to the object at fff00000c5dafc80 [ 39.098347] which belongs to the cache kmalloc-64 of size 64 [ 39.099018] The buggy address is located 0 bytes to the right of [ 39.099018] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.100015] [ 39.100116] The buggy address belongs to the physical page: [ 39.100228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.101424] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.102305] page_type: f5(slab) [ 39.102513] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.103684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.104268] page dumped because: kasan: bad access detected [ 39.104697] [ 39.105541] Memory state around the buggy address: [ 39.106015] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.106235] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.106396] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.107796] ^ [ 39.108426] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.109267] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.110156] ================================================================== [ 39.325945] ================================================================== [ 39.326194] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 39.326418] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.326585] [ 39.326679] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.326972] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.327086] Hardware name: linux,dummy-virt (DT) [ 39.327189] Call trace: [ 39.327259] show_stack+0x20/0x38 (C) [ 39.327519] dump_stack_lvl+0x8c/0xd0 [ 39.327938] print_report+0x118/0x5f0 [ 39.328130] kasan_report+0xc8/0x118 [ 39.328282] kasan_check_range+0x100/0x1a8 [ 39.328484] __kasan_check_write+0x20/0x30 [ 39.329580] kasan_atomics_helper+0x16d0/0x4858 [ 39.329762] kasan_atomics+0x198/0x2e8 [ 39.330500] kunit_try_run_case+0x14c/0x3d0 [ 39.331076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.331514] kthread+0x318/0x618 [ 39.331700] ret_from_fork+0x10/0x20 [ 39.332799] [ 39.332966] Allocated by task 267: [ 39.333101] kasan_save_stack+0x3c/0x68 [ 39.333420] kasan_save_track+0x20/0x40 [ 39.333569] kasan_save_alloc_info+0x40/0x58 [ 39.333704] __kasan_kmalloc+0xd4/0xd8 [ 39.333830] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.334588] kasan_atomics+0xb8/0x2e8 [ 39.335184] kunit_try_run_case+0x14c/0x3d0 [ 39.335417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.336218] kthread+0x318/0x618 [ 39.336366] ret_from_fork+0x10/0x20 [ 39.336493] [ 39.336565] The buggy address belongs to the object at fff00000c5dafc80 [ 39.336565] which belongs to the cache kmalloc-64 of size 64 [ 39.336765] The buggy address is located 0 bytes to the right of [ 39.336765] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.336989] [ 39.338659] The buggy address belongs to the physical page: [ 39.339434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.340000] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.340930] page_type: f5(slab) [ 39.341075] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.341242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.342626] page dumped because: kasan: bad access detected [ 39.342808] [ 39.342879] Memory state around the buggy address: [ 39.342991] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.344514] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.344861] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.346186] ^ [ 39.346648] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.346853] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.347890] ================================================================== [ 39.177949] ================================================================== [ 39.178218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 39.178496] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.178650] [ 39.178741] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.179506] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.179741] Hardware name: linux,dummy-virt (DT) [ 39.180588] Call trace: [ 39.180939] show_stack+0x20/0x38 (C) [ 39.181174] dump_stack_lvl+0x8c/0xd0 [ 39.181663] print_report+0x118/0x5f0 [ 39.181996] kasan_report+0xc8/0x118 [ 39.182194] kasan_check_range+0x100/0x1a8 [ 39.182831] __kasan_check_write+0x20/0x30 [ 39.184133] kasan_atomics_helper+0x1384/0x4858 [ 39.184494] kasan_atomics+0x198/0x2e8 [ 39.184664] kunit_try_run_case+0x14c/0x3d0 [ 39.184830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.185286] kthread+0x318/0x618 [ 39.185778] ret_from_fork+0x10/0x20 [ 39.185944] [ 39.186013] Allocated by task 267: [ 39.186277] kasan_save_stack+0x3c/0x68 [ 39.186621] kasan_save_track+0x20/0x40 [ 39.187101] kasan_save_alloc_info+0x40/0x58 [ 39.187250] __kasan_kmalloc+0xd4/0xd8 [ 39.187365] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.187934] kasan_atomics+0xb8/0x2e8 [ 39.188315] kunit_try_run_case+0x14c/0x3d0 [ 39.189008] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.189441] kthread+0x318/0x618 [ 39.189568] ret_from_fork+0x10/0x20 [ 39.189969] [ 39.190289] The buggy address belongs to the object at fff00000c5dafc80 [ 39.190289] which belongs to the cache kmalloc-64 of size 64 [ 39.190624] The buggy address is located 0 bytes to the right of [ 39.190624] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.191344] [ 39.191594] The buggy address belongs to the physical page: [ 39.192121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.192621] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.192927] page_type: f5(slab) [ 39.193459] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.193968] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.194199] page dumped because: kasan: bad access detected [ 39.194312] [ 39.195119] Memory state around the buggy address: [ 39.195310] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.195489] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.195642] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.195840] ^ [ 39.195963] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.196144] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.196293] ================================================================== [ 39.076925] ================================================================== [ 39.077086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 39.077547] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.077821] [ 39.077977] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.078437] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.078547] Hardware name: linux,dummy-virt (DT) [ 39.078650] Call trace: [ 39.078746] show_stack+0x20/0x38 (C) [ 39.078948] dump_stack_lvl+0x8c/0xd0 [ 39.079112] print_report+0x118/0x5f0 [ 39.079253] kasan_report+0xc8/0x118 [ 39.079397] kasan_check_range+0x100/0x1a8 [ 39.079550] __kasan_check_write+0x20/0x30 [ 39.079720] kasan_atomics_helper+0x10c0/0x4858 [ 39.079892] kasan_atomics+0x198/0x2e8 [ 39.080047] kunit_try_run_case+0x14c/0x3d0 [ 39.080907] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.081198] kthread+0x318/0x618 [ 39.081362] ret_from_fork+0x10/0x20 [ 39.081519] [ 39.081588] Allocated by task 267: [ 39.081674] kasan_save_stack+0x3c/0x68 [ 39.081871] kasan_save_track+0x20/0x40 [ 39.082389] kasan_save_alloc_info+0x40/0x58 [ 39.082612] __kasan_kmalloc+0xd4/0xd8 [ 39.082803] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.083034] kasan_atomics+0xb8/0x2e8 [ 39.083275] kunit_try_run_case+0x14c/0x3d0 [ 39.083493] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.083662] kthread+0x318/0x618 [ 39.083787] ret_from_fork+0x10/0x20 [ 39.083914] [ 39.083989] The buggy address belongs to the object at fff00000c5dafc80 [ 39.083989] which belongs to the cache kmalloc-64 of size 64 [ 39.084196] The buggy address is located 0 bytes to the right of [ 39.084196] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.084478] [ 39.085011] The buggy address belongs to the physical page: [ 39.085438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.085642] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.085866] page_type: f5(slab) [ 39.086086] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.086495] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.086940] page dumped because: kasan: bad access detected [ 39.087156] [ 39.087266] Memory state around the buggy address: [ 39.087451] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.087690] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.087929] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.088158] ^ [ 39.088342] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.088541] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.088965] ================================================================== [ 39.155389] ================================================================== [ 39.155543] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 39.155697] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.155863] [ 39.155962] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.156268] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.156365] Hardware name: linux,dummy-virt (DT) [ 39.159149] Call trace: [ 39.159235] show_stack+0x20/0x38 (C) [ 39.159395] dump_stack_lvl+0x8c/0xd0 [ 39.159540] print_report+0x118/0x5f0 [ 39.159691] kasan_report+0xc8/0x118 [ 39.159841] kasan_check_range+0x100/0x1a8 [ 39.159988] __kasan_check_write+0x20/0x30 [ 39.160162] kasan_atomics_helper+0x12d8/0x4858 [ 39.160326] kasan_atomics+0x198/0x2e8 [ 39.160484] kunit_try_run_case+0x14c/0x3d0 [ 39.160652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.160827] kthread+0x318/0x618 [ 39.160983] ret_from_fork+0x10/0x20 [ 39.164688] [ 39.164766] Allocated by task 267: [ 39.165262] kasan_save_stack+0x3c/0x68 [ 39.166081] kasan_save_track+0x20/0x40 [ 39.166228] kasan_save_alloc_info+0x40/0x58 [ 39.166356] __kasan_kmalloc+0xd4/0xd8 [ 39.166482] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.166656] kasan_atomics+0xb8/0x2e8 [ 39.166786] kunit_try_run_case+0x14c/0x3d0 [ 39.166915] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.167294] kthread+0x318/0x618 [ 39.167735] ret_from_fork+0x10/0x20 [ 39.168246] [ 39.168560] The buggy address belongs to the object at fff00000c5dafc80 [ 39.168560] which belongs to the cache kmalloc-64 of size 64 [ 39.169145] The buggy address is located 0 bytes to the right of [ 39.169145] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.169362] [ 39.169441] The buggy address belongs to the physical page: [ 39.169651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.170680] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.171241] page_type: f5(slab) [ 39.171648] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.172563] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.173272] page dumped because: kasan: bad access detected [ 39.173735] [ 39.174110] Memory state around the buggy address: [ 39.174305] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.174624] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.174772] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.174902] ^ [ 39.175030] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.175214] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.176476] ================================================================== [ 38.806575] ================================================================== [ 38.807088] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 38.808240] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.808453] Call trace: [ 38.810316] __kasan_check_write+0x20/0x30 [ 38.813092] ret_from_fork+0x10/0x20 [ 38.815267] kthread+0x318/0x618 [ 38.815535] [ 38.817087] page_type: f5(slab) [ 38.817208] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.817522] page dumped because: kasan: bad access detected [ 38.819488] ^ [ 38.822411] [ 38.822869] Hardware name: linux,dummy-virt (DT) [ 38.826574] kthread+0x318/0x618 [ 38.830355] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.830971] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.831553] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.834288] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 38.835197] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.835678] dump_stack_lvl+0x8c/0xd0 [ 38.836478] __kasan_check_write+0x20/0x30 [ 38.842812] __kasan_kmalloc+0xd4/0xd8 [ 38.844248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.845481] The buggy address is located 0 bytes to the right of [ 38.845481] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 38.847641] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.848262] page dumped because: kasan: bad access detected [ 38.848390] [ 38.848462] Memory state around the buggy address: [ 38.848569] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.848712] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.848861] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.848998] ^ [ 38.849138] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.849289] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.850323] ================================================================== [ 39.349606] ================================================================== [ 39.350108] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 39.351010] Read of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.351443] [ 39.351558] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.351829] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.351924] Hardware name: linux,dummy-virt (DT) [ 39.352036] Call trace: [ 39.352132] show_stack+0x20/0x38 (C) [ 39.352294] dump_stack_lvl+0x8c/0xd0 [ 39.353530] print_report+0x118/0x5f0 [ 39.353860] kasan_report+0xc8/0x118 [ 39.354318] __asan_report_load8_noabort+0x20/0x30 [ 39.354916] kasan_atomics_helper+0x3e10/0x4858 [ 39.355288] kasan_atomics+0x198/0x2e8 [ 39.355982] kunit_try_run_case+0x14c/0x3d0 [ 39.356510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.357095] kthread+0x318/0x618 [ 39.357534] ret_from_fork+0x10/0x20 [ 39.358018] [ 39.358110] Allocated by task 267: [ 39.358214] kasan_save_stack+0x3c/0x68 [ 39.358473] kasan_save_track+0x20/0x40 [ 39.359135] kasan_save_alloc_info+0x40/0x58 [ 39.359764] __kasan_kmalloc+0xd4/0xd8 [ 39.360097] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.360250] kasan_atomics+0xb8/0x2e8 [ 39.360436] kunit_try_run_case+0x14c/0x3d0 [ 39.361152] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.361638] kthread+0x318/0x618 [ 39.361766] ret_from_fork+0x10/0x20 [ 39.361889] [ 39.361957] The buggy address belongs to the object at fff00000c5dafc80 [ 39.361957] which belongs to the cache kmalloc-64 of size 64 [ 39.362582] The buggy address is located 0 bytes to the right of [ 39.362582] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.363459] [ 39.363717] The buggy address belongs to the physical page: [ 39.363838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.364376] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.364974] page_type: f5(slab) [ 39.365269] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.365736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.365874] page dumped because: kasan: bad access detected [ 39.365982] [ 39.366045] Memory state around the buggy address: [ 39.366179] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.366329] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.366486] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.367244] ^ [ 39.367585] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.368400] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.368556] ================================================================== [ 39.142796] ================================================================== [ 39.143000] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 39.143177] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.143335] [ 39.143431] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.143696] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.143849] Hardware name: linux,dummy-virt (DT) [ 39.143976] Call trace: [ 39.144075] show_stack+0x20/0x38 (C) [ 39.144264] dump_stack_lvl+0x8c/0xd0 [ 39.144449] print_report+0x118/0x5f0 [ 39.144658] kasan_report+0xc8/0x118 [ 39.144901] kasan_check_range+0x100/0x1a8 [ 39.145126] __kasan_check_write+0x20/0x30 [ 39.145322] kasan_atomics_helper+0x126c/0x4858 [ 39.145614] kasan_atomics+0x198/0x2e8 [ 39.145862] kunit_try_run_case+0x14c/0x3d0 [ 39.146137] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.146433] kthread+0x318/0x618 [ 39.146622] ret_from_fork+0x10/0x20 [ 39.146773] [ 39.146840] Allocated by task 267: [ 39.146947] kasan_save_stack+0x3c/0x68 [ 39.147138] kasan_save_track+0x20/0x40 [ 39.147293] kasan_save_alloc_info+0x40/0x58 [ 39.147507] __kasan_kmalloc+0xd4/0xd8 [ 39.147641] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.147780] kasan_atomics+0xb8/0x2e8 [ 39.147911] kunit_try_run_case+0x14c/0x3d0 [ 39.148048] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.148215] kthread+0x318/0x618 [ 39.148333] ret_from_fork+0x10/0x20 [ 39.148449] [ 39.148509] The buggy address belongs to the object at fff00000c5dafc80 [ 39.148509] which belongs to the cache kmalloc-64 of size 64 [ 39.148684] The buggy address is located 0 bytes to the right of [ 39.148684] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.149026] [ 39.149126] The buggy address belongs to the physical page: [ 39.150149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.150358] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.150517] page_type: f5(slab) [ 39.151527] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.152149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.152742] page dumped because: kasan: bad access detected [ 39.152861] [ 39.152926] Memory state around the buggy address: [ 39.153036] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.153238] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.153387] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.153523] ^ [ 39.153638] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.153789] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.153924] ================================================================== [ 39.062870] ================================================================== [ 39.063030] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 39.063206] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.063371] [ 39.063462] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.063746] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.063844] Hardware name: linux,dummy-virt (DT) [ 39.063949] Call trace: [ 39.064024] show_stack+0x20/0x38 (C) [ 39.064877] dump_stack_lvl+0x8c/0xd0 [ 39.065021] print_report+0x118/0x5f0 [ 39.065201] kasan_report+0xc8/0x118 [ 39.065349] kasan_check_range+0x100/0x1a8 [ 39.065507] __kasan_check_write+0x20/0x30 [ 39.065730] kasan_atomics_helper+0x1058/0x4858 [ 39.065945] kasan_atomics+0x198/0x2e8 [ 39.066327] kunit_try_run_case+0x14c/0x3d0 [ 39.066502] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.066736] kthread+0x318/0x618 [ 39.067223] ret_from_fork+0x10/0x20 [ 39.067406] [ 39.067495] Allocated by task 267: [ 39.067745] kasan_save_stack+0x3c/0x68 [ 39.067933] kasan_save_track+0x20/0x40 [ 39.068617] kasan_save_alloc_info+0x40/0x58 [ 39.068768] __kasan_kmalloc+0xd4/0xd8 [ 39.068884] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.069027] kasan_atomics+0xb8/0x2e8 [ 39.069213] kunit_try_run_case+0x14c/0x3d0 [ 39.069574] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.070298] kthread+0x318/0x618 [ 39.070989] ret_from_fork+0x10/0x20 [ 39.071233] [ 39.071309] The buggy address belongs to the object at fff00000c5dafc80 [ 39.071309] which belongs to the cache kmalloc-64 of size 64 [ 39.071510] The buggy address is located 0 bytes to the right of [ 39.071510] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.071725] [ 39.071794] The buggy address belongs to the physical page: [ 39.071905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.072098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.072262] page_type: f5(slab) [ 39.072461] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.072616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.073178] page dumped because: kasan: bad access detected [ 39.073639] [ 39.073864] Memory state around the buggy address: [ 39.073997] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.074167] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.074320] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.074487] ^ [ 39.074610] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.075374] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.075908] ================================================================== [ 39.306628] ================================================================== [ 39.306841] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 39.307000] Read of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.307191] [ 39.307762] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.308797] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.309036] Hardware name: linux,dummy-virt (DT) [ 39.309423] Call trace: [ 39.309572] show_stack+0x20/0x38 (C) [ 39.309726] dump_stack_lvl+0x8c/0xd0 [ 39.309878] print_report+0x118/0x5f0 [ 39.310025] kasan_report+0xc8/0x118 [ 39.310208] __asan_report_load8_noabort+0x20/0x30 [ 39.310377] kasan_atomics_helper+0x3df4/0x4858 [ 39.310545] kasan_atomics+0x198/0x2e8 [ 39.310705] kunit_try_run_case+0x14c/0x3d0 [ 39.310868] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.312270] kthread+0x318/0x618 [ 39.312588] ret_from_fork+0x10/0x20 [ 39.312757] [ 39.312826] Allocated by task 267: [ 39.312926] kasan_save_stack+0x3c/0x68 [ 39.313159] kasan_save_track+0x20/0x40 [ 39.314140] kasan_save_alloc_info+0x40/0x58 [ 39.314836] __kasan_kmalloc+0xd4/0xd8 [ 39.315014] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.315336] kasan_atomics+0xb8/0x2e8 [ 39.315915] kunit_try_run_case+0x14c/0x3d0 [ 39.316466] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.316911] kthread+0x318/0x618 [ 39.317126] ret_from_fork+0x10/0x20 [ 39.317457] [ 39.317703] The buggy address belongs to the object at fff00000c5dafc80 [ 39.317703] which belongs to the cache kmalloc-64 of size 64 [ 39.318557] The buggy address is located 0 bytes to the right of [ 39.318557] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.318880] [ 39.319506] The buggy address belongs to the physical page: [ 39.319711] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.320409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.321003] page_type: f5(slab) [ 39.321276] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.321611] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.321972] page dumped because: kasan: bad access detected [ 39.322355] [ 39.322733] Memory state around the buggy address: [ 39.323229] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.324284] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.324544] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.324707] ^ [ 39.324854] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.325041] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.325287] ================================================================== [ 38.752819] ================================================================== [ 38.752968] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 38.753197] Write of size 4 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 38.753459] [ 38.753629] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 38.754089] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.754231] Hardware name: linux,dummy-virt (DT) [ 38.754328] Call trace: [ 38.754402] show_stack+0x20/0x38 (C) [ 38.754554] dump_stack_lvl+0x8c/0xd0 [ 38.754719] print_report+0x118/0x5f0 [ 38.754977] kasan_report+0xc8/0x118 [ 38.755221] kasan_check_range+0x100/0x1a8 [ 38.755394] __kasan_check_write+0x20/0x30 [ 38.755691] kasan_atomics_helper+0xa6c/0x4858 [ 38.755881] kasan_atomics+0x198/0x2e8 [ 38.756046] kunit_try_run_case+0x14c/0x3d0 [ 38.756294] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.756543] kthread+0x318/0x618 [ 38.756795] ret_from_fork+0x10/0x20 [ 38.756953] [ 38.757024] Allocated by task 267: [ 38.757140] kasan_save_stack+0x3c/0x68 [ 38.757309] kasan_save_track+0x20/0x40 [ 38.757444] kasan_save_alloc_info+0x40/0x58 [ 38.757570] __kasan_kmalloc+0xd4/0xd8 [ 38.757686] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.757832] kasan_atomics+0xb8/0x2e8 [ 38.758048] kunit_try_run_case+0x14c/0x3d0 [ 38.758742] The buggy address belongs to the object at fff00000c5dafc80 [ 38.758742] which belongs to the cache kmalloc-64 of size 64 [ 38.759455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 38.759626] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.759785] page_type: f5(slab) [ 38.759903] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.760085] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.760817] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.763508] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 38.782068] [ 38.783450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 38.783690] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.785166] page_type: f5(slab) [ 38.785999] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.786346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.787636] page dumped because: kasan: bad access detected [ 38.787986] [ 38.788343] Memory state around the buggy address: [ 38.788889] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.789042] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.789494] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.790463] ^ [ 38.791263] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.791592] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.791788] ================================================================== [ 38.954965] ================================================================== [ 38.955146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 38.955302] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 38.955469] [ 38.955562] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 38.957523] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.957709] Hardware name: linux,dummy-virt (DT) [ 38.958016] Call trace: [ 38.958165] show_stack+0x20/0x38 (C) [ 38.958503] dump_stack_lvl+0x8c/0xd0 [ 38.958665] print_report+0x118/0x5f0 [ 38.958820] kasan_report+0xc8/0x118 [ 38.959040] kasan_check_range+0x100/0x1a8 [ 38.959927] __kasan_check_write+0x20/0x30 [ 38.960601] kasan_atomics_helper+0xe44/0x4858 [ 38.961613] kasan_atomics+0x198/0x2e8 [ 38.961857] kunit_try_run_case+0x14c/0x3d0 [ 38.962460] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.963258] kthread+0x318/0x618 [ 38.963452] ret_from_fork+0x10/0x20 [ 38.964091] [ 38.964172] Allocated by task 267: [ 38.964278] kasan_save_stack+0x3c/0x68 [ 38.964430] kasan_save_track+0x20/0x40 [ 38.965731] kasan_save_alloc_info+0x40/0x58 [ 38.965910] __kasan_kmalloc+0xd4/0xd8 [ 38.966837] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.967352] kasan_atomics+0xb8/0x2e8 [ 38.967968] kunit_try_run_case+0x14c/0x3d0 [ 38.968142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.969362] kthread+0x318/0x618 [ 38.969520] ret_from_fork+0x10/0x20 [ 38.969711] [ 38.970337] The buggy address belongs to the object at fff00000c5dafc80 [ 38.970337] which belongs to the cache kmalloc-64 of size 64 [ 38.971030] The buggy address is located 0 bytes to the right of [ 38.971030] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 38.971364] [ 38.972421] The buggy address belongs to the physical page: [ 38.972712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 38.972909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.973092] page_type: f5(slab) [ 38.974097] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.974491] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.975468] page dumped because: kasan: bad access detected [ 38.975967] [ 38.976076] Memory state around the buggy address: [ 38.976351] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.976588] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.976739] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.977270] ^ [ 38.978073] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.978427] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.978641] ================================================================== [ 38.886171] ================================================================== [ 38.886304] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 38.886454] Write of size 4 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 38.886611] [ 38.886707] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 38.886996] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.889335] Hardware name: linux,dummy-virt (DT) [ 38.889752] Call trace: [ 38.890514] show_stack+0x20/0x38 (C) [ 38.890688] dump_stack_lvl+0x8c/0xd0 [ 38.890843] print_report+0x118/0x5f0 [ 38.891012] kasan_report+0xc8/0x118 [ 38.891183] kasan_check_range+0x100/0x1a8 [ 38.891340] __kasan_check_write+0x20/0x30 [ 38.891495] kasan_atomics_helper+0xd3c/0x4858 [ 38.891656] kasan_atomics+0x198/0x2e8 [ 38.891806] kunit_try_run_case+0x14c/0x3d0 [ 38.891964] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.894597] kthread+0x318/0x618 [ 38.894770] ret_from_fork+0x10/0x20 [ 38.894942] [ 38.895010] Allocated by task 267: [ 38.895130] kasan_save_stack+0x3c/0x68 [ 38.895253] kasan_save_track+0x20/0x40 [ 38.895384] kasan_save_alloc_info+0x40/0x58 [ 38.895522] __kasan_kmalloc+0xd4/0xd8 [ 38.895645] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.895783] kasan_atomics+0xb8/0x2e8 [ 38.895912] kunit_try_run_case+0x14c/0x3d0 [ 38.896046] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.898021] kthread+0x318/0x618 [ 38.898941] ret_from_fork+0x10/0x20 [ 38.899205] [ 38.899280] The buggy address belongs to the object at fff00000c5dafc80 [ 38.899280] which belongs to the cache kmalloc-64 of size 64 [ 38.899542] The buggy address is located 0 bytes to the right of [ 38.899542] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 38.899880] [ 38.900000] The buggy address belongs to the physical page: [ 38.900137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 38.900400] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.900551] page_type: f5(slab) [ 38.900668] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.900880] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.901028] page dumped because: kasan: bad access detected [ 38.901168] [ 38.901236] Memory state around the buggy address: [ 38.901350] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.901500] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.901688] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.901823] ^ [ 38.901933] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.902146] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.902287] ================================================================== [ 38.980267] ================================================================== [ 38.980561] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 38.980748] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 38.980982] [ 38.981209] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 38.981588] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.981709] Hardware name: linux,dummy-virt (DT) [ 38.981887] Call trace: [ 38.981998] show_stack+0x20/0x38 (C) [ 38.982189] dump_stack_lvl+0x8c/0xd0 [ 38.982340] print_report+0x118/0x5f0 [ 38.982486] kasan_report+0xc8/0x118 [ 38.982673] __asan_report_store8_noabort+0x20/0x30 [ 38.982857] kasan_atomics_helper+0x3e5c/0x4858 [ 38.983037] kasan_atomics+0x198/0x2e8 [ 38.983214] kunit_try_run_case+0x14c/0x3d0 [ 38.983375] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.983572] kthread+0x318/0x618 [ 38.983787] ret_from_fork+0x10/0x20 [ 38.983967] [ 38.984078] Allocated by task 267: [ 38.984177] kasan_save_stack+0x3c/0x68 [ 38.984358] kasan_save_track+0x20/0x40 [ 38.984510] kasan_save_alloc_info+0x40/0x58 [ 38.984696] __kasan_kmalloc+0xd4/0xd8 [ 38.984826] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.984985] kasan_atomics+0xb8/0x2e8 [ 38.985158] kunit_try_run_case+0x14c/0x3d0 [ 38.985283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.985739] kthread+0x318/0x618 [ 38.985898] ret_from_fork+0x10/0x20 [ 38.986037] [ 38.986132] The buggy address belongs to the object at fff00000c5dafc80 [ 38.986132] which belongs to the cache kmalloc-64 of size 64 [ 38.986366] The buggy address is located 0 bytes to the right of [ 38.986366] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 38.986586] [ 38.986659] The buggy address belongs to the physical page: [ 38.986768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 38.987408] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.987615] page_type: f5(slab) [ 38.987742] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.988419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.988595] page dumped because: kasan: bad access detected [ 38.988711] [ 38.989398] Memory state around the buggy address: [ 38.989793] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.990305] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.990481] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.990626] ^ [ 38.991435] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.992177] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.992758] ================================================================== [ 38.931930] ================================================================== [ 38.932110] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 38.932271] Read of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 38.932976] [ 38.933287] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 38.933955] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.934401] Hardware name: linux,dummy-virt (DT) [ 38.934882] Call trace: [ 38.935363] show_stack+0x20/0x38 (C) [ 38.935622] dump_stack_lvl+0x8c/0xd0 [ 38.935835] print_report+0x118/0x5f0 [ 38.936157] kasan_report+0xc8/0x118 [ 38.936342] __asan_report_load8_noabort+0x20/0x30 [ 38.936655] kasan_atomics_helper+0x3f58/0x4858 [ 38.936871] kasan_atomics+0x198/0x2e8 [ 38.937041] kunit_try_run_case+0x14c/0x3d0 [ 38.937231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.937407] kthread+0x318/0x618 [ 38.938985] ret_from_fork+0x10/0x20 [ 38.939647] [ 38.939762] Allocated by task 267: [ 38.939868] kasan_save_stack+0x3c/0x68 [ 38.940005] kasan_save_track+0x20/0x40 [ 38.940153] kasan_save_alloc_info+0x40/0x58 [ 38.940284] __kasan_kmalloc+0xd4/0xd8 [ 38.942099] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.942369] kasan_atomics+0xb8/0x2e8 [ 38.943139] kunit_try_run_case+0x14c/0x3d0 [ 38.943530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.943709] kthread+0x318/0x618 [ 38.944451] ret_from_fork+0x10/0x20 [ 38.944605] [ 38.944674] The buggy address belongs to the object at fff00000c5dafc80 [ 38.944674] which belongs to the cache kmalloc-64 of size 64 [ 38.945575] The buggy address is located 0 bytes to the right of [ 38.945575] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 38.946703] [ 38.946822] The buggy address belongs to the physical page: [ 38.946952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 38.947678] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.948271] page_type: f5(slab) [ 38.948695] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.948935] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.949522] page dumped because: kasan: bad access detected [ 38.950081] [ 38.950175] Memory state around the buggy address: [ 38.950819] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.951012] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.951193] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.951332] ^ [ 38.952030] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.952776] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.953295] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 37.756273] ================================================================== [ 37.756575] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 37.757153] Read of size 1 at addr ffff800080947b5f by task kunit_try_catch/253 [ 37.757350] [ 37.757502] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 37.757795] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.757883] Hardware name: linux,dummy-virt (DT) [ 37.757993] Call trace: [ 37.758125] show_stack+0x20/0x38 (C) [ 37.758299] dump_stack_lvl+0x8c/0xd0 [ 37.758884] print_report+0x2fc/0x5f0 [ 37.759109] kasan_report+0xc8/0x118 [ 37.759268] __asan_report_load1_noabort+0x20/0x30 [ 37.759444] kasan_alloca_oob_left+0x2b8/0x310 [ 37.759682] kunit_try_run_case+0x14c/0x3d0 [ 37.759877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.760078] kthread+0x318/0x618 [ 37.760655] ret_from_fork+0x10/0x20 [ 37.760850] [ 37.760924] The buggy address belongs to stack of task kunit_try_catch/253 [ 37.761147] [ 37.761236] The buggy address belongs to the virtual mapping at [ 37.761236] [ffff800080940000, ffff800080949000) created by: [ 37.761236] kernel_clone+0x140/0x788 [ 37.762007] [ 37.762140] The buggy address belongs to the physical page: [ 37.762274] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10693d [ 37.762455] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.762691] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 37.762903] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 37.763120] page dumped because: kasan: bad access detected [ 37.763234] [ 37.763639] Memory state around the buggy address: [ 37.763784] ffff800080947a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.763999] ffff800080947a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.764219] >ffff800080947b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 37.764423] ^ [ 37.764566] ffff800080947b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 37.764996] ffff800080947c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 37.765143] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 37.714312] ================================================================== [ 37.714572] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x230/0x268 [ 37.714740] Read of size 1 at addr ffff800080947c2a by task kunit_try_catch/251 [ 37.714899] [ 37.715010] CPU: 1 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 37.715705] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.715871] Hardware name: linux,dummy-virt (DT) [ 37.716163] Call trace: [ 37.716265] show_stack+0x20/0x38 (C) [ 37.716440] dump_stack_lvl+0x8c/0xd0 [ 37.716601] print_report+0x2fc/0x5f0 [ 37.716756] kasan_report+0xc8/0x118 [ 37.716901] __asan_report_load1_noabort+0x20/0x30 [ 37.717222] kasan_stack_oob+0x230/0x268 [ 37.717406] kunit_try_run_case+0x14c/0x3d0 [ 37.717580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.717756] kthread+0x318/0x618 [ 37.718141] ret_from_fork+0x10/0x20 [ 37.718319] [ 37.718498] The buggy address belongs to stack of task kunit_try_catch/251 [ 37.719037] and is located at offset 138 in frame: [ 37.719184] kasan_stack_oob+0x0/0x268 [ 37.719540] [ 37.719667] This frame has 4 objects: [ 37.720073] [48, 49) '__assertion' [ 37.720772] [64, 72) 'array' [ 37.720929] [96, 112) '__assertion' [ 37.721102] [128, 138) 'stack_array' [ 37.721242] [ 37.721354] The buggy address belongs to the virtual mapping at [ 37.721354] [ffff800080940000, ffff800080949000) created by: [ 37.721354] kernel_clone+0x140/0x788 [ 37.721972] [ 37.722085] The buggy address belongs to the physical page: [ 37.722201] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10693d [ 37.722734] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.723353] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 37.723632] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 37.724027] page dumped because: kasan: bad access detected [ 37.724247] [ 37.724326] Memory state around the buggy address: [ 37.724484] ffff800080947b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.725009] ffff800080947b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 37.725234] >ffff800080947c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 37.725379] ^ [ 37.725490] ffff800080947c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 37.725747] ffff800080947d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 37.726338] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 37.673267] ================================================================== [ 37.673436] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 37.673623] Read of size 1 at addr ffffaabf8001704d by task kunit_try_catch/247 [ 37.673789] [ 37.673900] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 37.674186] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.674276] Hardware name: linux,dummy-virt (DT) [ 37.674413] Call trace: [ 37.674489] show_stack+0x20/0x38 (C) [ 37.674642] dump_stack_lvl+0x8c/0xd0 [ 37.674832] print_report+0x2fc/0x5f0 [ 37.674985] kasan_report+0xc8/0x118 [ 37.675386] __asan_report_load1_noabort+0x20/0x30 [ 37.675905] kasan_global_oob_right+0x230/0x270 [ 37.676109] kunit_try_run_case+0x14c/0x3d0 [ 37.676662] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.676867] kthread+0x318/0x618 [ 37.677018] ret_from_fork+0x10/0x20 [ 37.677245] [ 37.677458] The buggy address belongs to the variable: [ 37.677598] global_array+0xd/0x40 [ 37.677748] [ 37.678323] The buggy address belongs to the virtual mapping at [ 37.678323] [ffffaabf7e160000, ffffaabf800d1000) created by: [ 37.678323] paging_init+0x668/0x7c8 [ 37.678705] [ 37.679257] The buggy address belongs to the physical page: [ 37.679435] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47e17 [ 37.679627] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 37.679959] raw: 03fffe0000002000 ffffc1ffc01f85c8 ffffc1ffc01f85c8 0000000000000000 [ 37.680224] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 37.680412] page dumped because: kasan: bad access detected [ 37.680515] [ 37.680570] Memory state around the buggy address: [ 37.681162] ffffaabf80016f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.681457] ffffaabf80016f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.681609] >ffffaabf80017000: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 [ 37.681732] ^ [ 37.681880] ffffaabf80017080: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 37.682394] ffffaabf80017100: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 37.682578] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 37.631733] ================================================================== [ 37.631965] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 37.632305] Free of addr fff00000c780c001 by task kunit_try_catch/245 [ 37.632743] [ 37.633166] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 37.634248] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.634717] Hardware name: linux,dummy-virt (DT) [ 37.634835] Call trace: [ 37.634905] show_stack+0x20/0x38 (C) [ 37.635095] dump_stack_lvl+0x8c/0xd0 [ 37.635243] print_report+0x118/0x5f0 [ 37.635387] kasan_report_invalid_free+0xb0/0xd8 [ 37.637718] __kasan_mempool_poison_object+0xfc/0x150 [ 37.638300] mempool_free+0x28c/0x328 [ 37.639028] mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 37.640661] mempool_kmalloc_large_invalid_free+0xb8/0x110 [ 37.641067] kunit_try_run_case+0x14c/0x3d0 [ 37.641657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.642266] kthread+0x318/0x618 [ 37.643324] ret_from_fork+0x10/0x20 [ 37.643914] [ 37.643983] The buggy address belongs to the physical page: [ 37.644104] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10780c [ 37.644290] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 37.646180] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 37.646739] page_type: f8(unknown) [ 37.647993] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.648382] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 37.649075] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.649259] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 37.649427] head: 0bfffe0000000002 ffffc1ffc31e0301 00000000ffffffff 00000000ffffffff [ 37.649593] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 37.649714] page dumped because: kasan: bad access detected [ 37.651113] [ 37.651660] Memory state around the buggy address: [ 37.652114] fff00000c780bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.653210] fff00000c780bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.653691] >fff00000c780c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.654072] ^ [ 37.654759] fff00000c780c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.655120] fff00000c780c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.655237] ================================================================== [ 37.593705] ================================================================== [ 37.593919] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 37.594161] Free of addr fff00000c5da6c01 by task kunit_try_catch/243 [ 37.594311] [ 37.594439] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 37.594733] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.594830] Hardware name: linux,dummy-virt (DT) [ 37.595159] Call trace: [ 37.595246] show_stack+0x20/0x38 (C) [ 37.595404] dump_stack_lvl+0x8c/0xd0 [ 37.595651] print_report+0x118/0x5f0 [ 37.595973] kasan_report_invalid_free+0xb0/0xd8 [ 37.596503] check_slab_allocation+0xfc/0x108 [ 37.596802] __kasan_mempool_poison_object+0x78/0x150 [ 37.596966] mempool_free+0x28c/0x328 [ 37.597128] mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 37.597306] mempool_kmalloc_invalid_free+0xb8/0x110 [ 37.597479] kunit_try_run_case+0x14c/0x3d0 [ 37.598349] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.598674] kthread+0x318/0x618 [ 37.599336] ret_from_fork+0x10/0x20 [ 37.599816] [ 37.599883] Allocated by task 243: [ 37.600227] kasan_save_stack+0x3c/0x68 [ 37.600649] kasan_save_track+0x20/0x40 [ 37.601045] kasan_save_alloc_info+0x40/0x58 [ 37.601643] __kasan_mempool_unpoison_object+0x11c/0x180 [ 37.601793] remove_element+0x130/0x1f8 [ 37.601952] mempool_alloc_preallocated+0x58/0xc0 [ 37.602376] mempool_kmalloc_invalid_free_helper+0x94/0x2a0 [ 37.602809] mempool_kmalloc_invalid_free+0xb8/0x110 [ 37.603297] kunit_try_run_case+0x14c/0x3d0 [ 37.603439] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.603907] kthread+0x318/0x618 [ 37.604324] ret_from_fork+0x10/0x20 [ 37.604853] [ 37.604928] The buggy address belongs to the object at fff00000c5da6c00 [ 37.604928] which belongs to the cache kmalloc-128 of size 128 [ 37.605423] The buggy address is located 1 bytes inside of [ 37.605423] 128-byte region [fff00000c5da6c00, fff00000c5da6c80) [ 37.606178] [ 37.606650] The buggy address belongs to the physical page: [ 37.606762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105da6 [ 37.608127] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.608300] page_type: f5(slab) [ 37.608689] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.608917] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.609079] page dumped because: kasan: bad access detected [ 37.609184] [ 37.609236] Memory state around the buggy address: [ 37.609329] fff00000c5da6b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.609467] fff00000c5da6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.610387] >fff00000c5da6c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.610492] ^ [ 37.610544] fff00000c5da6c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.610654] fff00000c5da6d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.610832] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 37.563087] ================================================================== [ 37.563277] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 37.563453] Free of addr fff00000c7804000 by task kunit_try_catch/241 [ 37.563597] [ 37.563733] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 37.564453] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.564545] Hardware name: linux,dummy-virt (DT) [ 37.564670] Call trace: [ 37.564745] show_stack+0x20/0x38 (C) [ 37.564895] dump_stack_lvl+0x8c/0xd0 [ 37.565044] print_report+0x118/0x5f0 [ 37.565201] kasan_report_invalid_free+0xb0/0xd8 [ 37.565727] __kasan_mempool_poison_pages+0xe0/0xe8 [ 37.566003] mempool_free+0x24c/0x328 [ 37.566189] mempool_double_free_helper+0x150/0x2e0 [ 37.566381] mempool_page_alloc_double_free+0xb4/0x110 [ 37.566659] kunit_try_run_case+0x14c/0x3d0 [ 37.566822] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.567084] kthread+0x318/0x618 [ 37.567230] ret_from_fork+0x10/0x20 [ 37.567938] [ 37.568070] The buggy address belongs to the physical page: [ 37.568199] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107804 [ 37.568402] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.568636] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 37.568873] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 37.569011] page dumped because: kasan: bad access detected [ 37.569131] [ 37.569442] Memory state around the buggy address: [ 37.569593] fff00000c7803f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.569805] fff00000c7803f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.569952] >fff00000c7804000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.570160] ^ [ 37.570256] fff00000c7804080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.570443] fff00000c7804100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.570578] ================================================================== [ 37.441570] ================================================================== [ 37.442412] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 37.442665] Free of addr fff00000c5da6800 by task kunit_try_catch/237 [ 37.442908] [ 37.443095] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 37.443378] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.443470] Hardware name: linux,dummy-virt (DT) [ 37.443647] Call trace: [ 37.444329] show_stack+0x20/0x38 (C) [ 37.444617] dump_stack_lvl+0x8c/0xd0 [ 37.444853] print_report+0x118/0x5f0 [ 37.444999] kasan_report_invalid_free+0xb0/0xd8 [ 37.445173] check_slab_allocation+0xd4/0x108 [ 37.445901] __kasan_mempool_poison_object+0x78/0x150 [ 37.446678] mempool_free+0x28c/0x328 [ 37.446866] mempool_double_free_helper+0x150/0x2e0 [ 37.447047] mempool_kmalloc_double_free+0xb8/0x110 [ 37.447247] kunit_try_run_case+0x14c/0x3d0 [ 37.448350] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.448662] kthread+0x318/0x618 [ 37.449083] ret_from_fork+0x10/0x20 [ 37.449674] [ 37.449754] Allocated by task 237: [ 37.449940] kasan_save_stack+0x3c/0x68 [ 37.450594] kasan_save_track+0x20/0x40 [ 37.450764] kasan_save_alloc_info+0x40/0x58 [ 37.450891] __kasan_mempool_unpoison_object+0x11c/0x180 [ 37.451636] remove_element+0x130/0x1f8 [ 37.452048] mempool_alloc_preallocated+0x58/0xc0 [ 37.452511] mempool_double_free_helper+0x94/0x2e0 [ 37.452705] mempool_kmalloc_double_free+0xb8/0x110 [ 37.452832] kunit_try_run_case+0x14c/0x3d0 [ 37.452946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.453093] kthread+0x318/0x618 [ 37.453842] ret_from_fork+0x10/0x20 [ 37.454093] [ 37.454157] Freed by task 237: [ 37.454753] kasan_save_stack+0x3c/0x68 [ 37.454890] kasan_save_track+0x20/0x40 [ 37.455126] kasan_save_free_info+0x4c/0x78 [ 37.455817] __kasan_mempool_poison_object+0xc0/0x150 [ 37.455979] mempool_free+0x28c/0x328 [ 37.456127] mempool_double_free_helper+0x100/0x2e0 [ 37.456267] mempool_kmalloc_double_free+0xb8/0x110 [ 37.457006] kunit_try_run_case+0x14c/0x3d0 [ 37.457285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.458042] kthread+0x318/0x618 [ 37.458324] ret_from_fork+0x10/0x20 [ 37.458521] [ 37.458585] The buggy address belongs to the object at fff00000c5da6800 [ 37.458585] which belongs to the cache kmalloc-128 of size 128 [ 37.459087] The buggy address is located 0 bytes inside of [ 37.459087] 128-byte region [fff00000c5da6800, fff00000c5da6880) [ 37.459282] [ 37.459346] The buggy address belongs to the physical page: [ 37.459939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105da6 [ 37.460258] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.460866] page_type: f5(slab) [ 37.460993] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.461182] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.461437] page dumped because: kasan: bad access detected [ 37.461643] [ 37.461719] Memory state around the buggy address: [ 37.462329] fff00000c5da6700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.462507] fff00000c5da6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.463314] >fff00000c5da6800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.463567] ^ [ 37.463935] fff00000c5da6880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.464370] fff00000c5da6900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.464613] ================================================================== [ 37.524177] ================================================================== [ 37.524359] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 37.524544] Free of addr fff00000c7804000 by task kunit_try_catch/239 [ 37.524684] [ 37.525354] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 37.525720] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.525820] Hardware name: linux,dummy-virt (DT) [ 37.525923] Call trace: [ 37.525990] show_stack+0x20/0x38 (C) [ 37.526431] dump_stack_lvl+0x8c/0xd0 [ 37.527032] print_report+0x118/0x5f0 [ 37.527209] kasan_report_invalid_free+0xb0/0xd8 [ 37.527922] __kasan_mempool_poison_object+0x14c/0x150 [ 37.528146] mempool_free+0x28c/0x328 [ 37.528563] mempool_double_free_helper+0x150/0x2e0 [ 37.529269] mempool_kmalloc_large_double_free+0xb8/0x110 [ 37.529463] kunit_try_run_case+0x14c/0x3d0 [ 37.529615] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.529769] kthread+0x318/0x618 [ 37.531116] ret_from_fork+0x10/0x20 [ 37.531298] [ 37.531366] The buggy address belongs to the physical page: [ 37.531473] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107804 [ 37.531650] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 37.531807] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 37.531994] page_type: f8(unknown) [ 37.532229] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.532485] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 37.533115] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.533389] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 37.533569] head: 0bfffe0000000002 ffffc1ffc31e0101 00000000ffffffff 00000000ffffffff [ 37.534006] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 37.534166] page dumped because: kasan: bad access detected [ 37.534344] [ 37.534517] Memory state around the buggy address: [ 37.534744] fff00000c7803f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.534956] fff00000c7803f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.535136] >fff00000c7804000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.535257] ^ [ 37.535351] fff00000c7804080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.535499] fff00000c7804100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.535639] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 37.258304] ================================================================== [ 37.258486] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 37.259041] Read of size 1 at addr fff00000c7800000 by task kunit_try_catch/231 [ 37.259736] [ 37.259855] CPU: 1 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 37.261012] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.261517] Hardware name: linux,dummy-virt (DT) [ 37.261820] Call trace: [ 37.262098] show_stack+0x20/0x38 (C) [ 37.262825] dump_stack_lvl+0x8c/0xd0 [ 37.263122] print_report+0x118/0x5f0 [ 37.263340] kasan_report+0xc8/0x118 [ 37.263501] __asan_report_load1_noabort+0x20/0x30 [ 37.263668] mempool_uaf_helper+0x314/0x340 [ 37.263828] mempool_kmalloc_large_uaf+0xbc/0x118 [ 37.263985] kunit_try_run_case+0x14c/0x3d0 [ 37.264702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.264929] kthread+0x318/0x618 [ 37.265342] ret_from_fork+0x10/0x20 [ 37.265845] [ 37.266030] The buggy address belongs to the physical page: [ 37.266236] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107800 [ 37.266428] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 37.266580] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 37.266751] page_type: f8(unknown) [ 37.266877] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.267920] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 37.268456] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.269087] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 37.269625] head: 0bfffe0000000002 ffffc1ffc31e0001 00000000ffffffff 00000000ffffffff [ 37.269811] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 37.269949] page dumped because: kasan: bad access detected [ 37.270332] [ 37.270823] Memory state around the buggy address: [ 37.271045] fff00000c77fff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.271283] fff00000c77fff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.271963] >fff00000c7800000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.272388] ^ [ 37.272745] fff00000c7800080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.272978] fff00000c7800100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.273237] ================================================================== [ 37.402469] ================================================================== [ 37.402665] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 37.402860] Read of size 1 at addr fff00000c7804000 by task kunit_try_catch/235 [ 37.403028] [ 37.403160] CPU: 1 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 37.403553] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.403651] Hardware name: linux,dummy-virt (DT) [ 37.404216] Call trace: [ 37.404376] show_stack+0x20/0x38 (C) [ 37.404856] dump_stack_lvl+0x8c/0xd0 [ 37.405382] print_report+0x118/0x5f0 [ 37.406088] kasan_report+0xc8/0x118 [ 37.406242] __asan_report_load1_noabort+0x20/0x30 [ 37.407318] mempool_uaf_helper+0x314/0x340 [ 37.407815] mempool_page_alloc_uaf+0xb8/0x118 [ 37.408492] kunit_try_run_case+0x14c/0x3d0 [ 37.409078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.409302] kthread+0x318/0x618 [ 37.410245] ret_from_fork+0x10/0x20 [ 37.410570] [ 37.411141] The buggy address belongs to the physical page: [ 37.411543] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107804 [ 37.411902] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.412129] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 37.412303] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 37.412487] page dumped because: kasan: bad access detected [ 37.412589] [ 37.412645] Memory state around the buggy address: [ 37.412811] fff00000c7803f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.412949] fff00000c7803f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.413109] >fff00000c7804000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.413302] ^ [ 37.413470] fff00000c7804080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.413702] fff00000c7804100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.413903] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 37.203804] ================================================================== [ 37.204087] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 37.204268] Read of size 1 at addr fff00000c5da6400 by task kunit_try_catch/229 [ 37.204547] [ 37.204665] CPU: 1 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 37.204951] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.205088] Hardware name: linux,dummy-virt (DT) [ 37.205242] Call trace: [ 37.205347] show_stack+0x20/0x38 (C) [ 37.205549] dump_stack_lvl+0x8c/0xd0 [ 37.205707] print_report+0x118/0x5f0 [ 37.205837] kasan_report+0xc8/0x118 [ 37.205974] __asan_report_load1_noabort+0x20/0x30 [ 37.206158] mempool_uaf_helper+0x314/0x340 [ 37.206310] mempool_kmalloc_uaf+0xbc/0x118 [ 37.206470] kunit_try_run_case+0x14c/0x3d0 [ 37.206639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.206821] kthread+0x318/0x618 [ 37.207043] ret_from_fork+0x10/0x20 [ 37.207226] [ 37.207286] Allocated by task 229: [ 37.207515] kasan_save_stack+0x3c/0x68 [ 37.207648] kasan_save_track+0x20/0x40 [ 37.207846] kasan_save_alloc_info+0x40/0x58 [ 37.208070] __kasan_mempool_unpoison_object+0x11c/0x180 [ 37.208226] remove_element+0x130/0x1f8 [ 37.208418] mempool_alloc_preallocated+0x58/0xc0 [ 37.208554] mempool_uaf_helper+0xa4/0x340 [ 37.209112] mempool_kmalloc_uaf+0xbc/0x118 [ 37.209369] kunit_try_run_case+0x14c/0x3d0 [ 37.209715] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.209864] kthread+0x318/0x618 [ 37.210137] ret_from_fork+0x10/0x20 [ 37.210269] [ 37.210326] Freed by task 229: [ 37.210463] kasan_save_stack+0x3c/0x68 [ 37.210667] kasan_save_track+0x20/0x40 [ 37.210850] kasan_save_free_info+0x4c/0x78 [ 37.211021] __kasan_mempool_poison_object+0xc0/0x150 [ 37.211189] mempool_free+0x28c/0x328 [ 37.211385] mempool_uaf_helper+0x104/0x340 [ 37.211578] mempool_kmalloc_uaf+0xbc/0x118 [ 37.211787] kunit_try_run_case+0x14c/0x3d0 [ 37.211951] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.212114] kthread+0x318/0x618 [ 37.212224] ret_from_fork+0x10/0x20 [ 37.212406] [ 37.212571] The buggy address belongs to the object at fff00000c5da6400 [ 37.212571] which belongs to the cache kmalloc-128 of size 128 [ 37.212766] The buggy address is located 0 bytes inside of [ 37.212766] freed 128-byte region [fff00000c5da6400, fff00000c5da6480) [ 37.212967] [ 37.213036] The buggy address belongs to the physical page: [ 37.213180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105da6 [ 37.213460] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.213715] page_type: f5(slab) [ 37.213878] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.214037] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.214179] page dumped because: kasan: bad access detected [ 37.214277] [ 37.214333] Memory state around the buggy address: [ 37.214439] fff00000c5da6300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.214624] fff00000c5da6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.214852] >fff00000c5da6400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.215078] ^ [ 37.215165] fff00000c5da6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.215358] fff00000c5da6500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.215494] ================================================================== [ 37.312457] ================================================================== [ 37.312805] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 37.312969] Read of size 1 at addr fff00000c5dab240 by task kunit_try_catch/233 [ 37.313152] [ 37.313408] CPU: 1 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 37.313850] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.313953] Hardware name: linux,dummy-virt (DT) [ 37.314080] Call trace: [ 37.314157] show_stack+0x20/0x38 (C) [ 37.314320] dump_stack_lvl+0x8c/0xd0 [ 37.314476] print_report+0x118/0x5f0 [ 37.314627] kasan_report+0xc8/0x118 [ 37.314772] __asan_report_load1_noabort+0x20/0x30 [ 37.314943] mempool_uaf_helper+0x314/0x340 [ 37.315611] mempool_slab_uaf+0xb8/0x110 [ 37.315805] kunit_try_run_case+0x14c/0x3d0 [ 37.315971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.316532] kthread+0x318/0x618 [ 37.316794] ret_from_fork+0x10/0x20 [ 37.317044] [ 37.317169] Allocated by task 233: [ 37.317294] kasan_save_stack+0x3c/0x68 [ 37.317411] kasan_save_track+0x20/0x40 [ 37.317551] kasan_save_alloc_info+0x40/0x58 [ 37.317672] __kasan_mempool_unpoison_object+0xbc/0x180 [ 37.317803] remove_element+0x16c/0x1f8 [ 37.317935] mempool_alloc_preallocated+0x58/0xc0 [ 37.318134] mempool_uaf_helper+0xa4/0x340 [ 37.318270] mempool_slab_uaf+0xb8/0x110 [ 37.318418] kunit_try_run_case+0x14c/0x3d0 [ 37.318555] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.318713] kthread+0x318/0x618 [ 37.318891] ret_from_fork+0x10/0x20 [ 37.319035] [ 37.319143] Freed by task 233: [ 37.319227] kasan_save_stack+0x3c/0x68 [ 37.319384] kasan_save_track+0x20/0x40 [ 37.319491] kasan_save_free_info+0x4c/0x78 [ 37.319605] __kasan_mempool_poison_object+0xc0/0x150 [ 37.319740] mempool_free+0x28c/0x328 [ 37.319851] mempool_uaf_helper+0x104/0x340 [ 37.319979] mempool_slab_uaf+0xb8/0x110 [ 37.320186] kunit_try_run_case+0x14c/0x3d0 [ 37.320419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.320618] kthread+0x318/0x618 [ 37.320774] ret_from_fork+0x10/0x20 [ 37.320893] [ 37.320962] The buggy address belongs to the object at fff00000c5dab240 [ 37.320962] which belongs to the cache test_cache of size 123 [ 37.321184] The buggy address is located 0 bytes inside of [ 37.321184] freed 123-byte region [fff00000c5dab240, fff00000c5dab2bb) [ 37.321391] [ 37.321466] The buggy address belongs to the physical page: [ 37.321615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105dab [ 37.321777] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.321928] page_type: f5(slab) [ 37.322042] raw: 0bfffe0000000000 fff00000c5d9a780 dead000000000122 0000000000000000 [ 37.322218] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 37.322382] page dumped because: kasan: bad access detected [ 37.322484] [ 37.322546] Memory state around the buggy address: [ 37.322645] fff00000c5dab100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.322844] fff00000c5dab180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.323031] >fff00000c5dab200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 37.323253] ^ [ 37.323434] fff00000c5dab280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.323657] fff00000c5dab300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.323866] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 37.063660] ================================================================== [ 37.063934] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 37.064205] Read of size 1 at addr fff00000c5da6073 by task kunit_try_catch/223 [ 37.064418] [ 37.064536] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 37.065076] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.065212] Hardware name: linux,dummy-virt (DT) [ 37.065271] Call trace: [ 37.065314] show_stack+0x20/0x38 (C) [ 37.065407] dump_stack_lvl+0x8c/0xd0 [ 37.065491] print_report+0x118/0x5f0 [ 37.065565] kasan_report+0xc8/0x118 [ 37.065642] __asan_report_load1_noabort+0x20/0x30 [ 37.065726] mempool_oob_right_helper+0x2ac/0x2f0 [ 37.065807] mempool_kmalloc_oob_right+0xbc/0x118 [ 37.065892] kunit_try_run_case+0x14c/0x3d0 [ 37.065977] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.066095] kthread+0x318/0x618 [ 37.066260] ret_from_fork+0x10/0x20 [ 37.066439] [ 37.066536] Allocated by task 223: [ 37.066632] kasan_save_stack+0x3c/0x68 [ 37.066762] kasan_save_track+0x20/0x40 [ 37.066878] kasan_save_alloc_info+0x40/0x58 [ 37.067015] __kasan_mempool_unpoison_object+0x11c/0x180 [ 37.067165] remove_element+0x130/0x1f8 [ 37.067319] mempool_alloc_preallocated+0x58/0xc0 [ 37.067543] mempool_oob_right_helper+0x98/0x2f0 [ 37.067765] mempool_kmalloc_oob_right+0xbc/0x118 [ 37.067975] kunit_try_run_case+0x14c/0x3d0 [ 37.068141] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.068275] kthread+0x318/0x618 [ 37.068795] ret_from_fork+0x10/0x20 [ 37.068962] [ 37.069083] The buggy address belongs to the object at fff00000c5da6000 [ 37.069083] which belongs to the cache kmalloc-128 of size 128 [ 37.069278] The buggy address is located 0 bytes to the right of [ 37.069278] allocated 115-byte region [fff00000c5da6000, fff00000c5da6073) [ 37.069475] [ 37.069565] The buggy address belongs to the physical page: [ 37.069672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105da6 [ 37.069850] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.070021] page_type: f5(slab) [ 37.070244] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.070509] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.070704] page dumped because: kasan: bad access detected [ 37.070806] [ 37.070898] Memory state around the buggy address: [ 37.071088] fff00000c5da5f00: fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 37.071232] fff00000c5da5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.071366] >fff00000c5da6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 37.071491] ^ [ 37.071979] fff00000c5da6080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.072379] fff00000c5da6100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 37.072555] ================================================================== [ 37.141797] ================================================================== [ 37.142021] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 37.142249] Read of size 1 at addr fff00000c5daa2bb by task kunit_try_catch/227 [ 37.142450] [ 37.142592] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 37.142940] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.143038] Hardware name: linux,dummy-virt (DT) [ 37.143176] Call trace: [ 37.143284] show_stack+0x20/0x38 (C) [ 37.143466] dump_stack_lvl+0x8c/0xd0 [ 37.143669] print_report+0x118/0x5f0 [ 37.143890] kasan_report+0xc8/0x118 [ 37.144109] __asan_report_load1_noabort+0x20/0x30 [ 37.144258] mempool_oob_right_helper+0x2ac/0x2f0 [ 37.144650] mempool_slab_oob_right+0xb8/0x110 [ 37.144845] kunit_try_run_case+0x14c/0x3d0 [ 37.145012] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.145209] kthread+0x318/0x618 [ 37.145432] ret_from_fork+0x10/0x20 [ 37.145578] [ 37.145634] Allocated by task 227: [ 37.145930] kasan_save_stack+0x3c/0x68 [ 37.146080] kasan_save_track+0x20/0x40 [ 37.146206] kasan_save_alloc_info+0x40/0x58 [ 37.146352] __kasan_mempool_unpoison_object+0xbc/0x180 [ 37.146495] remove_element+0x16c/0x1f8 [ 37.146698] mempool_alloc_preallocated+0x58/0xc0 [ 37.146837] mempool_oob_right_helper+0x98/0x2f0 [ 37.146976] mempool_slab_oob_right+0xb8/0x110 [ 37.147126] kunit_try_run_case+0x14c/0x3d0 [ 37.147248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.147390] kthread+0x318/0x618 [ 37.147515] ret_from_fork+0x10/0x20 [ 37.147631] [ 37.147688] The buggy address belongs to the object at fff00000c5daa240 [ 37.147688] which belongs to the cache test_cache of size 123 [ 37.147901] The buggy address is located 0 bytes to the right of [ 37.147901] allocated 123-byte region [fff00000c5daa240, fff00000c5daa2bb) [ 37.148441] [ 37.148553] The buggy address belongs to the physical page: [ 37.148764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daa [ 37.149002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.149288] page_type: f5(slab) [ 37.149450] raw: 0bfffe0000000000 fff00000c5d9a640 dead000000000122 0000000000000000 [ 37.149628] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 37.149755] page dumped because: kasan: bad access detected [ 37.150544] [ 37.150637] Memory state around the buggy address: [ 37.150913] fff00000c5daa180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.151127] fff00000c5daa200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 37.151285] >fff00000c5daa280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 37.151437] ^ [ 37.151630] fff00000c5daa300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.151857] fff00000c5daa380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.152006] ================================================================== [ 37.099859] ================================================================== [ 37.100040] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 37.100225] Read of size 1 at addr fff00000c7802001 by task kunit_try_catch/225 [ 37.100473] [ 37.100577] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 37.101129] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.101255] Hardware name: linux,dummy-virt (DT) [ 37.101352] Call trace: [ 37.101396] show_stack+0x20/0x38 (C) [ 37.101480] dump_stack_lvl+0x8c/0xd0 [ 37.101560] print_report+0x118/0x5f0 [ 37.101632] kasan_report+0xc8/0x118 [ 37.101705] __asan_report_load1_noabort+0x20/0x30 [ 37.101784] mempool_oob_right_helper+0x2ac/0x2f0 [ 37.101868] mempool_kmalloc_large_oob_right+0xbc/0x118 [ 37.101951] kunit_try_run_case+0x14c/0x3d0 [ 37.102030] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.102229] kthread+0x318/0x618 [ 37.103280] ret_from_fork+0x10/0x20 [ 37.103485] [ 37.103553] The buggy address belongs to the physical page: [ 37.103657] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107800 [ 37.104125] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 37.104305] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 37.104965] page_type: f8(unknown) [ 37.105141] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.105770] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 37.105949] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.106135] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 37.106303] head: 0bfffe0000000002 ffffc1ffc31e0001 00000000ffffffff 00000000ffffffff [ 37.106468] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 37.106609] page dumped because: kasan: bad access detected [ 37.106706] [ 37.106771] Memory state around the buggy address: [ 37.106877] fff00000c7801f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.107035] fff00000c7801f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.109164] >fff00000c7802000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 37.109419] ^ [ 37.109644] fff00000c7802080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 37.110183] fff00000c7802100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 37.110549] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 36.334639] ================================================================== [ 36.335282] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x17c/0x2f8 [ 36.336122] Read of size 1 at addr fff00000c5d9a280 by task kunit_try_catch/217 [ 36.336294] [ 36.336575] CPU: 1 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 36.337507] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.337725] Hardware name: linux,dummy-virt (DT) [ 36.338003] Call trace: [ 36.338128] show_stack+0x20/0x38 (C) [ 36.338863] dump_stack_lvl+0x8c/0xd0 [ 36.339246] print_report+0x118/0x5f0 [ 36.339852] kasan_report+0xc8/0x118 [ 36.340041] __kasan_check_byte+0x54/0x70 [ 36.340211] kmem_cache_destroy+0x34/0x220 [ 36.341070] kmem_cache_double_destroy+0x17c/0x2f8 [ 36.341186] kunit_try_run_case+0x14c/0x3d0 [ 36.341276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.341366] kthread+0x318/0x618 [ 36.341442] ret_from_fork+0x10/0x20 [ 36.341523] [ 36.341557] Allocated by task 217: [ 36.341606] kasan_save_stack+0x3c/0x68 [ 36.341673] kasan_save_track+0x20/0x40 [ 36.341730] kasan_save_alloc_info+0x40/0x58 [ 36.341795] __kasan_slab_alloc+0xa8/0xb0 [ 36.341856] kmem_cache_alloc_noprof+0x108/0x398 [ 36.341918] __kmem_cache_create_args+0x178/0x280 [ 36.341988] kmem_cache_double_destroy+0xc8/0x2f8 [ 36.342077] kunit_try_run_case+0x14c/0x3d0 [ 36.342280] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.342470] kthread+0x318/0x618 [ 36.342571] ret_from_fork+0x10/0x20 [ 36.342673] [ 36.342729] Freed by task 217: [ 36.342808] kasan_save_stack+0x3c/0x68 [ 36.343010] kasan_save_track+0x20/0x40 [ 36.343217] kasan_save_free_info+0x4c/0x78 [ 36.343415] __kasan_slab_free+0x6c/0x98 [ 36.343593] kmem_cache_free+0x260/0x490 [ 36.343772] slab_kmem_cache_release+0x38/0x50 [ 36.343888] kmem_cache_release+0x1c/0x30 [ 36.344015] kobject_put+0x17c/0x428 [ 36.344149] sysfs_slab_release+0x1c/0x30 [ 36.344300] kmem_cache_destroy+0x118/0x220 [ 36.344777] kmem_cache_double_destroy+0x130/0x2f8 [ 36.344924] kunit_try_run_case+0x14c/0x3d0 [ 36.345133] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.345302] kthread+0x318/0x618 [ 36.345422] ret_from_fork+0x10/0x20 [ 36.345543] [ 36.345619] The buggy address belongs to the object at fff00000c5d9a280 [ 36.345619] which belongs to the cache kmem_cache of size 208 [ 36.345855] The buggy address is located 0 bytes inside of [ 36.345855] freed 208-byte region [fff00000c5d9a280, fff00000c5d9a350) [ 36.346104] [ 36.346171] The buggy address belongs to the physical page: [ 36.346394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d9a [ 36.346724] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.348349] page_type: f5(slab) [ 36.348514] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 36.348688] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 36.348830] page dumped because: kasan: bad access detected [ 36.348938] [ 36.349001] Memory state around the buggy address: [ 36.349129] fff00000c5d9a180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.349284] fff00000c5d9a200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.349423] >fff00000c5d9a280: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.349553] ^ [ 36.349642] fff00000c5d9a300: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 36.350491] fff00000c5d9a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.350625] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 35.917584] ================================================================== [ 35.917812] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x390/0x468 [ 35.918003] Read of size 1 at addr fff00000c5d9e000 by task kunit_try_catch/215 [ 35.918176] [ 35.918286] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 35.918571] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.918661] Hardware name: linux,dummy-virt (DT) [ 35.918766] Call trace: [ 35.918844] show_stack+0x20/0x38 (C) [ 35.919018] dump_stack_lvl+0x8c/0xd0 [ 35.920528] print_report+0x118/0x5f0 [ 35.920684] kasan_report+0xc8/0x118 [ 35.920831] __asan_report_load1_noabort+0x20/0x30 [ 35.921072] kmem_cache_rcu_uaf+0x390/0x468 [ 35.921268] kunit_try_run_case+0x14c/0x3d0 [ 35.921444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.921607] kthread+0x318/0x618 [ 35.921757] ret_from_fork+0x10/0x20 [ 35.921913] [ 35.922296] Allocated by task 215: [ 35.922407] kasan_save_stack+0x3c/0x68 [ 35.922859] kasan_save_track+0x20/0x40 [ 35.923155] kasan_save_alloc_info+0x40/0x58 [ 35.923434] __kasan_slab_alloc+0xa8/0xb0 [ 35.923569] kmem_cache_alloc_noprof+0x108/0x398 [ 35.923700] kmem_cache_rcu_uaf+0x12c/0x468 [ 35.923826] kunit_try_run_case+0x14c/0x3d0 [ 35.924549] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.924870] kthread+0x318/0x618 [ 35.925004] ret_from_fork+0x10/0x20 [ 35.925291] [ 35.925368] Freed by task 0: [ 35.925453] kasan_save_stack+0x3c/0x68 [ 35.925570] kasan_save_track+0x20/0x40 [ 35.925675] kasan_save_free_info+0x4c/0x78 [ 35.926047] __kasan_slab_free+0x6c/0x98 [ 35.926988] slab_free_after_rcu_debug+0xd4/0x2f8 [ 35.927170] rcu_core+0x9f4/0x1e58 [ 35.927293] rcu_core_si+0x18/0x30 [ 35.927404] handle_softirqs+0x374/0xb20 [ 35.927531] __do_softirq+0x1c/0x28 [ 35.927908] [ 35.928251] Last potentially related work creation: [ 35.928350] kasan_save_stack+0x3c/0x68 [ 35.928480] kasan_record_aux_stack+0xb4/0xc8 [ 35.928611] kmem_cache_free+0x120/0x490 [ 35.928724] kmem_cache_rcu_uaf+0x16c/0x468 [ 35.928853] kunit_try_run_case+0x14c/0x3d0 [ 35.929080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.929326] kthread+0x318/0x618 [ 35.929839] ret_from_fork+0x10/0x20 [ 35.929977] [ 35.930072] The buggy address belongs to the object at fff00000c5d9e000 [ 35.930072] which belongs to the cache test_cache of size 200 [ 35.930491] The buggy address is located 0 bytes inside of [ 35.930491] freed 200-byte region [fff00000c5d9e000, fff00000c5d9e0c8) [ 35.931259] [ 35.931427] The buggy address belongs to the physical page: [ 35.931556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d9e [ 35.932040] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.932254] page_type: f5(slab) [ 35.933268] raw: 0bfffe0000000000 fff00000c5d9a140 dead000000000122 0000000000000000 [ 35.933454] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 35.933599] page dumped because: kasan: bad access detected [ 35.933708] [ 35.933760] Memory state around the buggy address: [ 35.933858] fff00000c5d9df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.933994] fff00000c5d9df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.938119] >fff00000c5d9e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.938644] ^ [ 35.938769] fff00000c5d9e080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 35.938932] fff00000c5d9e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.939078] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 35.499526] ================================================================== [ 35.500797] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3b8 [ 35.501549] Free of addr fff00000c5d9c001 by task kunit_try_catch/213 [ 35.502270] [ 35.502760] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 35.504536] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.504657] Hardware name: linux,dummy-virt (DT) [ 35.504758] Call trace: [ 35.505570] show_stack+0x20/0x38 (C) [ 35.506346] dump_stack_lvl+0x8c/0xd0 [ 35.507144] print_report+0x118/0x5f0 [ 35.507429] kasan_report_invalid_free+0xb0/0xd8 [ 35.507591] check_slab_allocation+0xfc/0x108 [ 35.507748] __kasan_slab_pre_free+0x2c/0x48 [ 35.507905] kmem_cache_free+0xf0/0x490 [ 35.509215] kmem_cache_invalid_free+0x184/0x3b8 [ 35.510184] kunit_try_run_case+0x14c/0x3d0 [ 35.511279] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.512267] kthread+0x318/0x618 [ 35.512448] ret_from_fork+0x10/0x20 [ 35.512613] [ 35.512677] Allocated by task 213: [ 35.513911] kasan_save_stack+0x3c/0x68 [ 35.514369] kasan_save_track+0x20/0x40 [ 35.514500] kasan_save_alloc_info+0x40/0x58 [ 35.514900] __kasan_slab_alloc+0xa8/0xb0 [ 35.515868] kmem_cache_alloc_noprof+0x108/0x398 [ 35.516562] kmem_cache_invalid_free+0x12c/0x3b8 [ 35.517149] kunit_try_run_case+0x14c/0x3d0 [ 35.517649] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.517823] kthread+0x318/0x618 [ 35.517938] ret_from_fork+0x10/0x20 [ 35.518074] [ 35.518315] The buggy address belongs to the object at fff00000c5d9c000 [ 35.518315] which belongs to the cache test_cache of size 200 [ 35.519120] The buggy address is located 1 bytes inside of [ 35.519120] 200-byte region [fff00000c5d9c000, fff00000c5d9c0c8) [ 35.519346] [ 35.519412] The buggy address belongs to the physical page: [ 35.519516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d9c [ 35.520336] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.520762] page_type: f5(slab) [ 35.521086] raw: 0bfffe0000000000 fff00000c5d9a000 dead000000000122 0000000000000000 [ 35.521248] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 35.521380] page dumped because: kasan: bad access detected [ 35.521483] [ 35.522113] Memory state around the buggy address: [ 35.522243] fff00000c5d9bf00: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc [ 35.522637] fff00000c5d9bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.523314] >fff00000c5d9c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.523648] ^ [ 35.523964] fff00000c5d9c080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 35.524245] fff00000c5d9c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.524401] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 35.394572] ================================================================== [ 35.394839] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 35.395133] Free of addr fff00000c5d9a000 by task kunit_try_catch/211 [ 35.395326] [ 35.395512] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 35.396041] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.396405] Hardware name: linux,dummy-virt (DT) [ 35.396574] Call trace: [ 35.396665] show_stack+0x20/0x38 (C) [ 35.397704] dump_stack_lvl+0x8c/0xd0 [ 35.397870] print_report+0x118/0x5f0 [ 35.398032] kasan_report_invalid_free+0xb0/0xd8 [ 35.398206] check_slab_allocation+0xd4/0x108 [ 35.398353] __kasan_slab_pre_free+0x2c/0x48 [ 35.398499] kmem_cache_free+0xf0/0x490 [ 35.398649] kmem_cache_double_free+0x190/0x3c8 [ 35.398801] kunit_try_run_case+0x14c/0x3d0 [ 35.398971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.399510] kthread+0x318/0x618 [ 35.399661] ret_from_fork+0x10/0x20 [ 35.399812] [ 35.399869] Allocated by task 211: [ 35.399962] kasan_save_stack+0x3c/0x68 [ 35.400126] kasan_save_track+0x20/0x40 [ 35.400399] kasan_save_alloc_info+0x40/0x58 [ 35.400771] __kasan_slab_alloc+0xa8/0xb0 [ 35.400915] kmem_cache_alloc_noprof+0x108/0x398 [ 35.401041] kmem_cache_double_free+0x12c/0x3c8 [ 35.401187] kunit_try_run_case+0x14c/0x3d0 [ 35.401313] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.401455] kthread+0x318/0x618 [ 35.401566] ret_from_fork+0x10/0x20 [ 35.401682] [ 35.401739] Freed by task 211: [ 35.401826] kasan_save_stack+0x3c/0x68 [ 35.401936] kasan_save_track+0x20/0x40 [ 35.402073] kasan_save_free_info+0x4c/0x78 [ 35.402201] __kasan_slab_free+0x6c/0x98 [ 35.402304] kmem_cache_free+0x260/0x490 [ 35.402537] kmem_cache_double_free+0x140/0x3c8 [ 35.402741] kunit_try_run_case+0x14c/0x3d0 [ 35.402870] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.403019] kthread+0x318/0x618 [ 35.403257] ret_from_fork+0x10/0x20 [ 35.403390] [ 35.403453] The buggy address belongs to the object at fff00000c5d9a000 [ 35.403453] which belongs to the cache test_cache of size 200 [ 35.403656] The buggy address is located 0 bytes inside of [ 35.403656] 200-byte region [fff00000c5d9a000, fff00000c5d9a0c8) [ 35.404134] [ 35.404927] The buggy address belongs to the physical page: [ 35.405036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d9a [ 35.405940] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.406239] page_type: f5(slab) [ 35.406383] raw: 0bfffe0000000000 fff00000c10a5dc0 dead000000000122 0000000000000000 [ 35.406774] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 35.409027] page dumped because: kasan: bad access detected [ 35.411164] [ 35.411639] Memory state around the buggy address: [ 35.412142] fff00000c5d99f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.412302] fff00000c5d99f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.412444] >fff00000c5d9a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.412572] ^ [ 35.412654] fff00000c5d9a080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 35.412791] fff00000c5d9a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.412914] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 35.177567] ================================================================== [ 35.178245] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x33c/0x428 [ 35.178432] Read of size 1 at addr fff00000c5d980c8 by task kunit_try_catch/209 [ 35.178592] [ 35.178730] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 35.179019] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.179134] Hardware name: linux,dummy-virt (DT) [ 35.179349] Call trace: [ 35.179438] show_stack+0x20/0x38 (C) [ 35.179609] dump_stack_lvl+0x8c/0xd0 [ 35.179758] print_report+0x118/0x5f0 [ 35.179906] kasan_report+0xc8/0x118 [ 35.180046] __asan_report_load1_noabort+0x20/0x30 [ 35.180230] kmem_cache_oob+0x33c/0x428 [ 35.181035] kunit_try_run_case+0x14c/0x3d0 [ 35.182072] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.183319] kthread+0x318/0x618 [ 35.184316] ret_from_fork+0x10/0x20 [ 35.185121] [ 35.185188] Allocated by task 209: [ 35.185274] kasan_save_stack+0x3c/0x68 [ 35.185401] kasan_save_track+0x20/0x40 [ 35.186474] kasan_save_alloc_info+0x40/0x58 [ 35.186741] __kasan_slab_alloc+0xa8/0xb0 [ 35.186877] kmem_cache_alloc_noprof+0x108/0x398 [ 35.187008] kmem_cache_oob+0x12c/0x428 [ 35.187578] kunit_try_run_case+0x14c/0x3d0 [ 35.187745] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.187897] kthread+0x318/0x618 [ 35.188010] ret_from_fork+0x10/0x20 [ 35.188151] [ 35.188218] The buggy address belongs to the object at fff00000c5d98000 [ 35.188218] which belongs to the cache test_cache of size 200 [ 35.188677] The buggy address is located 0 bytes to the right of [ 35.188677] allocated 200-byte region [fff00000c5d98000, fff00000c5d980c8) [ 35.189688] [ 35.189783] The buggy address belongs to the physical page: [ 35.190000] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d98 [ 35.190316] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.190589] page_type: f5(slab) [ 35.190727] raw: 0bfffe0000000000 fff00000c10a5c80 dead000000000122 0000000000000000 [ 35.191196] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 35.191652] page dumped because: kasan: bad access detected [ 35.191789] [ 35.192182] Memory state around the buggy address: [ 35.192629] fff00000c5d97f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.192787] fff00000c5d98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.192933] >fff00000c5d98080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 35.193418] ^ [ 35.193671] fff00000c5d98100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.194044] fff00000c5d98180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.194212] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 35.073664] ================================================================== [ 35.074110] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 35.074282] Read of size 8 at addr fff00000c5d93440 by task kunit_try_catch/202 [ 35.074455] [ 35.074564] CPU: 1 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 35.074846] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.074939] Hardware name: linux,dummy-virt (DT) [ 35.075034] Call trace: [ 35.075119] show_stack+0x20/0x38 (C) [ 35.075273] dump_stack_lvl+0x8c/0xd0 [ 35.075425] print_report+0x118/0x5f0 [ 35.075566] kasan_report+0xc8/0x118 [ 35.076085] __asan_report_load8_noabort+0x20/0x30 [ 35.077104] workqueue_uaf+0x480/0x4a8 [ 35.077289] kunit_try_run_case+0x14c/0x3d0 [ 35.077449] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.077615] kthread+0x318/0x618 [ 35.077774] ret_from_fork+0x10/0x20 [ 35.078158] [ 35.078280] Allocated by task 202: [ 35.078624] kasan_save_stack+0x3c/0x68 [ 35.079358] kasan_save_track+0x20/0x40 [ 35.079520] kasan_save_alloc_info+0x40/0x58 [ 35.079739] __kasan_kmalloc+0xd4/0xd8 [ 35.079873] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.080016] workqueue_uaf+0x13c/0x4a8 [ 35.080158] kunit_try_run_case+0x14c/0x3d0 [ 35.080290] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.080511] kthread+0x318/0x618 [ 35.080722] ret_from_fork+0x10/0x20 [ 35.080943] [ 35.081018] Freed by task 50: [ 35.081148] kasan_save_stack+0x3c/0x68 [ 35.081963] kasan_save_track+0x20/0x40 [ 35.082485] kasan_save_free_info+0x4c/0x78 [ 35.083138] __kasan_slab_free+0x6c/0x98 [ 35.083339] kfree+0x214/0x3c8 [ 35.084395] workqueue_uaf_work+0x18/0x30 [ 35.085797] process_one_work+0x530/0xf98 [ 35.086722] worker_thread+0x644/0xf48 [ 35.086799] kthread+0x318/0x618 [ 35.086859] ret_from_fork+0x10/0x20 [ 35.087030] [ 35.087117] Last potentially related work creation: [ 35.087217] kasan_save_stack+0x3c/0x68 [ 35.087614] kasan_record_aux_stack+0xb4/0xc8 [ 35.087749] __queue_work+0x65c/0x1018 [ 35.087867] queue_work_on+0xbc/0xf8 [ 35.087983] workqueue_uaf+0x210/0x4a8 [ 35.088120] kunit_try_run_case+0x14c/0x3d0 [ 35.088307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.088913] kthread+0x318/0x618 [ 35.089192] ret_from_fork+0x10/0x20 [ 35.089580] [ 35.089635] The buggy address belongs to the object at fff00000c5d93440 [ 35.089635] which belongs to the cache kmalloc-32 of size 32 [ 35.089741] The buggy address is located 0 bytes inside of [ 35.089741] freed 32-byte region [fff00000c5d93440, fff00000c5d93460) [ 35.089841] [ 35.089875] The buggy address belongs to the physical page: [ 35.089929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d93 [ 35.090015] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.090157] page_type: f5(slab) [ 35.090645] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 35.090872] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 35.091093] page dumped because: kasan: bad access detected [ 35.091259] [ 35.091321] Memory state around the buggy address: [ 35.091432] fff00000c5d93300: 00 00 00 fc fc fc fc fc 00 00 03 fc fc fc fc fc [ 35.091599] fff00000c5d93380: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 35.091747] >fff00000c5d93400: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc [ 35.091880] ^ [ 35.091993] fff00000c5d93480: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.092146] fff00000c5d93500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.092270] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 34.984165] ================================================================== [ 34.985304] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 34.985478] Read of size 4 at addr fff00000c5d93200 by task swapper/1/0 [ 34.985628] [ 34.985731] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 34.986008] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.988113] Hardware name: linux,dummy-virt (DT) [ 34.988380] Call trace: [ 34.988997] show_stack+0x20/0x38 (C) [ 34.989562] dump_stack_lvl+0x8c/0xd0 [ 34.990035] print_report+0x118/0x5f0 [ 34.990289] kasan_report+0xc8/0x118 [ 34.990840] __asan_report_load4_noabort+0x20/0x30 [ 34.991363] rcu_uaf_reclaim+0x64/0x70 [ 34.991523] rcu_core+0x9f4/0x1e58 [ 34.991667] rcu_core_si+0x18/0x30 [ 34.991797] handle_softirqs+0x374/0xb20 [ 34.991954] __do_softirq+0x1c/0x28 [ 34.993357] ____do_softirq+0x18/0x30 [ 34.994482] call_on_irq_stack+0x24/0x58 [ 34.994961] do_softirq_own_stack+0x24/0x38 [ 34.995152] __irq_exit_rcu+0x1fc/0x318 [ 34.995303] irq_exit_rcu+0x1c/0x80 [ 34.995448] el1_interrupt+0x38/0x58 [ 34.996485] el1h_64_irq_handler+0x18/0x28 [ 34.996866] el1h_64_irq+0x6c/0x70 [ 34.999933] finish_task_switch.isra.0+0x120/0x5f8 (P) [ 35.000385] __schedule+0xa90/0x2628 [ 35.000546] schedule_idle+0x60/0xa8 [ 35.000692] do_idle+0x2c4/0x4e8 [ 35.000830] cpu_startup_entry+0x64/0x80 [ 35.000969] secondary_start_kernel+0x288/0x340 [ 35.003228] __secondary_switched+0xc0/0xc8 [ 35.003633] [ 35.003723] Allocated by task 200: [ 35.004022] kasan_save_stack+0x3c/0x68 [ 35.004517] kasan_save_track+0x20/0x40 [ 35.004648] kasan_save_alloc_info+0x40/0x58 [ 35.005151] __kasan_kmalloc+0xd4/0xd8 [ 35.005308] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.005442] rcu_uaf+0xb0/0x2d0 [ 35.005546] kunit_try_run_case+0x14c/0x3d0 [ 35.005666] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.006328] kthread+0x318/0x618 [ 35.006930] ret_from_fork+0x10/0x20 [ 35.007324] [ 35.007410] Freed by task 0: [ 35.007490] kasan_save_stack+0x3c/0x68 [ 35.007622] kasan_save_track+0x20/0x40 [ 35.008252] kasan_save_free_info+0x4c/0x78 [ 35.008559] __kasan_slab_free+0x6c/0x98 [ 35.008899] kfree+0x214/0x3c8 [ 35.009770] rcu_uaf_reclaim+0x28/0x70 [ 35.010244] rcu_core+0x9f4/0x1e58 [ 35.011100] rcu_core_si+0x18/0x30 [ 35.011247] handle_softirqs+0x374/0xb20 [ 35.011314] __do_softirq+0x1c/0x28 [ 35.011376] [ 35.011425] Last potentially related work creation: [ 35.011482] kasan_save_stack+0x3c/0x68 [ 35.011543] kasan_record_aux_stack+0xb4/0xc8 [ 35.011609] __call_rcu_common.constprop.0+0x70/0x8b0 [ 35.011676] call_rcu+0x18/0x30 [ 35.011730] rcu_uaf+0x14c/0x2d0 [ 35.011787] kunit_try_run_case+0x14c/0x3d0 [ 35.011852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.011923] kthread+0x318/0x618 [ 35.011982] ret_from_fork+0x10/0x20 [ 35.012078] [ 35.012306] The buggy address belongs to the object at fff00000c5d93200 [ 35.012306] which belongs to the cache kmalloc-32 of size 32 [ 35.012872] The buggy address is located 0 bytes inside of [ 35.012872] freed 32-byte region [fff00000c5d93200, fff00000c5d93220) [ 35.013472] [ 35.013546] The buggy address belongs to the physical page: [ 35.014254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d93 [ 35.014524] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.015122] page_type: f5(slab) [ 35.015301] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 35.015475] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 35.015746] page dumped because: kasan: bad access detected [ 35.016013] [ 35.016242] Memory state around the buggy address: [ 35.016478] fff00000c5d93100: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 35.016922] fff00000c5d93180: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 35.017476] >fff00000c5d93200: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 35.017747] ^ [ 35.018036] fff00000c5d93280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.018346] fff00000c5d93300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.018495] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 34.775216] ================================================================== [ 34.775362] BUG: KASAN: slab-use-after-free in ksize_uaf+0x59c/0x600 [ 34.775525] Read of size 1 at addr fff00000c6818d00 by task kunit_try_catch/198 [ 34.775684] [ 34.775771] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 34.776043] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.776153] Hardware name: linux,dummy-virt (DT) [ 34.776252] Call trace: [ 34.776320] show_stack+0x20/0x38 (C) [ 34.776472] dump_stack_lvl+0x8c/0xd0 [ 34.776614] print_report+0x118/0x5f0 [ 34.776758] kasan_report+0xc8/0x118 [ 34.776898] __asan_report_load1_noabort+0x20/0x30 [ 34.777119] ksize_uaf+0x59c/0x600 [ 34.777515] kunit_try_run_case+0x14c/0x3d0 [ 34.777722] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.777896] kthread+0x318/0x618 [ 34.778049] ret_from_fork+0x10/0x20 [ 34.778319] [ 34.778417] Allocated by task 198: [ 34.778522] kasan_save_stack+0x3c/0x68 [ 34.778637] kasan_save_track+0x20/0x40 [ 34.778750] kasan_save_alloc_info+0x40/0x58 [ 34.778907] __kasan_kmalloc+0xd4/0xd8 [ 34.779137] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.779284] ksize_uaf+0xb8/0x600 [ 34.779399] kunit_try_run_case+0x14c/0x3d0 [ 34.779524] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.779686] kthread+0x318/0x618 [ 34.779860] ret_from_fork+0x10/0x20 [ 34.779977] [ 34.780312] Freed by task 198: [ 34.780453] kasan_save_stack+0x3c/0x68 [ 34.780583] kasan_save_track+0x20/0x40 [ 34.780701] kasan_save_free_info+0x4c/0x78 [ 34.780832] __kasan_slab_free+0x6c/0x98 [ 34.780993] kfree+0x214/0x3c8 [ 34.781129] ksize_uaf+0x11c/0x600 [ 34.781250] kunit_try_run_case+0x14c/0x3d0 [ 34.781379] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.781636] kthread+0x318/0x618 [ 34.781812] ret_from_fork+0x10/0x20 [ 34.782005] [ 34.782111] The buggy address belongs to the object at fff00000c6818d00 [ 34.782111] which belongs to the cache kmalloc-128 of size 128 [ 34.782329] The buggy address is located 0 bytes inside of [ 34.782329] freed 128-byte region [fff00000c6818d00, fff00000c6818d80) [ 34.782565] [ 34.782630] The buggy address belongs to the physical page: [ 34.782729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106818 [ 34.782892] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.783095] page_type: f5(slab) [ 34.783244] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.783459] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.783635] page dumped because: kasan: bad access detected [ 34.783762] [ 34.783863] Memory state around the buggy address: [ 34.783986] fff00000c6818c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.784167] fff00000c6818c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.784303] >fff00000c6818d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.784481] ^ [ 34.784617] fff00000c6818d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.784755] fff00000c6818e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.784883] ================================================================== [ 34.759404] ================================================================== [ 34.759560] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x600 [ 34.759740] Read of size 1 at addr fff00000c6818d00 by task kunit_try_catch/198 [ 34.759954] [ 34.760112] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 34.760549] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.760737] Hardware name: linux,dummy-virt (DT) [ 34.760866] Call trace: [ 34.760938] show_stack+0x20/0x38 (C) [ 34.761103] dump_stack_lvl+0x8c/0xd0 [ 34.761252] print_report+0x118/0x5f0 [ 34.761409] kasan_report+0xc8/0x118 [ 34.761656] __kasan_check_byte+0x54/0x70 [ 34.761837] ksize+0x30/0x88 [ 34.761977] ksize_uaf+0x168/0x600 [ 34.762200] kunit_try_run_case+0x14c/0x3d0 [ 34.762433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.762708] kthread+0x318/0x618 [ 34.762941] ret_from_fork+0x10/0x20 [ 34.763660] [ 34.763730] Allocated by task 198: [ 34.763817] kasan_save_stack+0x3c/0x68 [ 34.763945] kasan_save_track+0x20/0x40 [ 34.764080] kasan_save_alloc_info+0x40/0x58 [ 34.764582] __kasan_kmalloc+0xd4/0xd8 [ 34.764717] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.764848] ksize_uaf+0xb8/0x600 [ 34.764959] kunit_try_run_case+0x14c/0x3d0 [ 34.765145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.765366] kthread+0x318/0x618 [ 34.765497] ret_from_fork+0x10/0x20 [ 34.765680] [ 34.765786] Freed by task 198: [ 34.765878] kasan_save_stack+0x3c/0x68 [ 34.766031] kasan_save_track+0x20/0x40 [ 34.766244] kasan_save_free_info+0x4c/0x78 [ 34.766452] __kasan_slab_free+0x6c/0x98 [ 34.766590] kfree+0x214/0x3c8 [ 34.766702] ksize_uaf+0x11c/0x600 [ 34.766815] kunit_try_run_case+0x14c/0x3d0 [ 34.766954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.767115] kthread+0x318/0x618 [ 34.767233] ret_from_fork+0x10/0x20 [ 34.768022] [ 34.768116] The buggy address belongs to the object at fff00000c6818d00 [ 34.768116] which belongs to the cache kmalloc-128 of size 128 [ 34.768310] The buggy address is located 0 bytes inside of [ 34.768310] freed 128-byte region [fff00000c6818d00, fff00000c6818d80) [ 34.769374] [ 34.769448] The buggy address belongs to the physical page: [ 34.769547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106818 [ 34.769740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.769965] page_type: f5(slab) [ 34.770105] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.770277] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.770428] page dumped because: kasan: bad access detected [ 34.770574] [ 34.770630] Memory state around the buggy address: [ 34.770744] fff00000c6818c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.770980] fff00000c6818c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.771154] >fff00000c6818d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.771282] ^ [ 34.771373] fff00000c6818d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.772075] fff00000c6818e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.772326] ================================================================== [ 34.786873] ================================================================== [ 34.787025] BUG: KASAN: slab-use-after-free in ksize_uaf+0x548/0x600 [ 34.787191] Read of size 1 at addr fff00000c6818d78 by task kunit_try_catch/198 [ 34.787351] [ 34.787437] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 34.788657] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.788788] Hardware name: linux,dummy-virt (DT) [ 34.789527] Call trace: [ 34.789678] show_stack+0x20/0x38 (C) [ 34.789888] dump_stack_lvl+0x8c/0xd0 [ 34.790067] print_report+0x118/0x5f0 [ 34.790217] kasan_report+0xc8/0x118 [ 34.790354] __asan_report_load1_noabort+0x20/0x30 [ 34.790513] ksize_uaf+0x548/0x600 [ 34.790661] kunit_try_run_case+0x14c/0x3d0 [ 34.790825] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.791046] kthread+0x318/0x618 [ 34.791279] ret_from_fork+0x10/0x20 [ 34.791476] [ 34.791536] Allocated by task 198: [ 34.791680] kasan_save_stack+0x3c/0x68 [ 34.791862] kasan_save_track+0x20/0x40 [ 34.791977] kasan_save_alloc_info+0x40/0x58 [ 34.792140] __kasan_kmalloc+0xd4/0xd8 [ 34.792254] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.792495] ksize_uaf+0xb8/0x600 [ 34.792649] kunit_try_run_case+0x14c/0x3d0 [ 34.792779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.792926] kthread+0x318/0x618 [ 34.793047] ret_from_fork+0x10/0x20 [ 34.793203] [ 34.793290] Freed by task 198: [ 34.793434] kasan_save_stack+0x3c/0x68 [ 34.793618] kasan_save_track+0x20/0x40 [ 34.793808] kasan_save_free_info+0x4c/0x78 [ 34.794006] __kasan_slab_free+0x6c/0x98 [ 34.794154] kfree+0x214/0x3c8 [ 34.794267] ksize_uaf+0x11c/0x600 [ 34.794380] kunit_try_run_case+0x14c/0x3d0 [ 34.794533] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.794726] kthread+0x318/0x618 [ 34.794917] ret_from_fork+0x10/0x20 [ 34.795148] [ 34.795209] The buggy address belongs to the object at fff00000c6818d00 [ 34.795209] which belongs to the cache kmalloc-128 of size 128 [ 34.795773] The buggy address is located 120 bytes inside of [ 34.795773] freed 128-byte region [fff00000c6818d00, fff00000c6818d80) [ 34.796086] [ 34.796157] The buggy address belongs to the physical page: [ 34.796253] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106818 [ 34.796447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.796619] page_type: f5(slab) [ 34.796847] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.797121] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.797764] page dumped because: kasan: bad access detected [ 34.797945] [ 34.798008] Memory state around the buggy address: [ 34.798129] fff00000c6818c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.798276] fff00000c6818c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.798422] >fff00000c6818d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.798554] ^ [ 34.798705] fff00000c6818d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.798840] fff00000c6818e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.799390] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 34.684488] ================================================================== [ 34.684656] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750 [ 34.684918] Read of size 1 at addr fff00000c6818c73 by task kunit_try_catch/196 [ 34.685111] [ 34.685207] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 34.685485] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.685578] Hardware name: linux,dummy-virt (DT) [ 34.685681] Call trace: [ 34.685747] show_stack+0x20/0x38 (C) [ 34.685906] dump_stack_lvl+0x8c/0xd0 [ 34.686069] print_report+0x118/0x5f0 [ 34.686736] kasan_report+0xc8/0x118 [ 34.686876] __asan_report_load1_noabort+0x20/0x30 [ 34.688845] ksize_unpoisons_memory+0x638/0x750 [ 34.689954] kunit_try_run_case+0x14c/0x3d0 [ 34.690677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.691173] kthread+0x318/0x618 [ 34.691386] ret_from_fork+0x10/0x20 [ 34.691544] [ 34.691600] Allocated by task 196: [ 34.692260] kasan_save_stack+0x3c/0x68 [ 34.692745] kasan_save_track+0x20/0x40 [ 34.693209] kasan_save_alloc_info+0x40/0x58 [ 34.693908] __kasan_kmalloc+0xd4/0xd8 [ 34.694078] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.694217] ksize_unpoisons_memory+0xc0/0x750 [ 34.694375] kunit_try_run_case+0x14c/0x3d0 [ 34.695341] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.695527] kthread+0x318/0x618 [ 34.695640] ret_from_fork+0x10/0x20 [ 34.696043] [ 34.696466] The buggy address belongs to the object at fff00000c6818c00 [ 34.696466] which belongs to the cache kmalloc-128 of size 128 [ 34.696677] The buggy address is located 0 bytes to the right of [ 34.696677] allocated 115-byte region [fff00000c6818c00, fff00000c6818c73) [ 34.696878] [ 34.697278] The buggy address belongs to the physical page: [ 34.697811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106818 [ 34.697990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.698525] page_type: f5(slab) [ 34.698773] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.699044] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.699208] page dumped because: kasan: bad access detected [ 34.699319] [ 34.699376] Memory state around the buggy address: [ 34.699841] fff00000c6818b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.700187] fff00000c6818b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.700339] >fff00000c6818c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 34.700539] ^ [ 34.700691] fff00000c6818c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.700887] fff00000c6818d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.701020] ================================================================== [ 34.703110] ================================================================== [ 34.703243] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750 [ 34.703393] Read of size 1 at addr fff00000c6818c78 by task kunit_try_catch/196 [ 34.703580] [ 34.703895] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 34.704196] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.704281] Hardware name: linux,dummy-virt (DT) [ 34.704683] Call trace: [ 34.704826] show_stack+0x20/0x38 (C) [ 34.705460] dump_stack_lvl+0x8c/0xd0 [ 34.705704] print_report+0x118/0x5f0 [ 34.706398] kasan_report+0xc8/0x118 [ 34.706905] __asan_report_load1_noabort+0x20/0x30 [ 34.707225] ksize_unpoisons_memory+0x628/0x750 [ 34.707499] kunit_try_run_case+0x14c/0x3d0 [ 34.707997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.708220] kthread+0x318/0x618 [ 34.708878] ret_from_fork+0x10/0x20 [ 34.708994] [ 34.709028] Allocated by task 196: [ 34.709472] kasan_save_stack+0x3c/0x68 [ 34.709630] kasan_save_track+0x20/0x40 [ 34.709753] kasan_save_alloc_info+0x40/0x58 [ 34.709880] __kasan_kmalloc+0xd4/0xd8 [ 34.709990] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.710286] ksize_unpoisons_memory+0xc0/0x750 [ 34.710430] kunit_try_run_case+0x14c/0x3d0 [ 34.710564] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.710717] kthread+0x318/0x618 [ 34.710845] ret_from_fork+0x10/0x20 [ 34.711005] [ 34.711091] The buggy address belongs to the object at fff00000c6818c00 [ 34.711091] which belongs to the cache kmalloc-128 of size 128 [ 34.711374] The buggy address is located 5 bytes to the right of [ 34.711374] allocated 115-byte region [fff00000c6818c00, fff00000c6818c73) [ 34.711719] [ 34.711821] The buggy address belongs to the physical page: [ 34.711974] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106818 [ 34.712189] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.712390] page_type: f5(slab) [ 34.712506] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.712681] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.712845] page dumped because: kasan: bad access detected [ 34.712949] [ 34.713004] Memory state around the buggy address: [ 34.713147] fff00000c6818b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.713445] fff00000c6818b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.713627] >fff00000c6818c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 34.713754] ^ [ 34.713882] fff00000c6818c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.714026] fff00000c6818d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.714197] ================================================================== [ 34.716776] ================================================================== [ 34.716920] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750 [ 34.717095] Read of size 1 at addr fff00000c6818c7f by task kunit_try_catch/196 [ 34.717253] [ 34.717477] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 34.717808] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.717949] Hardware name: linux,dummy-virt (DT) [ 34.718085] Call trace: [ 34.718182] show_stack+0x20/0x38 (C) [ 34.718372] dump_stack_lvl+0x8c/0xd0 [ 34.718531] print_report+0x118/0x5f0 [ 34.718907] kasan_report+0xc8/0x118 [ 34.719114] __asan_report_load1_noabort+0x20/0x30 [ 34.719363] ksize_unpoisons_memory+0x6a0/0x750 [ 34.719617] kunit_try_run_case+0x14c/0x3d0 [ 34.719861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.720157] kthread+0x318/0x618 [ 34.720390] ret_from_fork+0x10/0x20 [ 34.720602] [ 34.720658] Allocated by task 196: [ 34.720767] kasan_save_stack+0x3c/0x68 [ 34.720961] kasan_save_track+0x20/0x40 [ 34.721121] kasan_save_alloc_info+0x40/0x58 [ 34.721240] __kasan_kmalloc+0xd4/0xd8 [ 34.721795] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.722020] ksize_unpoisons_memory+0xc0/0x750 [ 34.722213] kunit_try_run_case+0x14c/0x3d0 [ 34.722377] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.722664] kthread+0x318/0x618 [ 34.722873] ret_from_fork+0x10/0x20 [ 34.723021] [ 34.723098] The buggy address belongs to the object at fff00000c6818c00 [ 34.723098] which belongs to the cache kmalloc-128 of size 128 [ 34.723338] The buggy address is located 12 bytes to the right of [ 34.723338] allocated 115-byte region [fff00000c6818c00, fff00000c6818c73) [ 34.723593] [ 34.723660] The buggy address belongs to the physical page: [ 34.723764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106818 [ 34.723923] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.724153] page_type: f5(slab) [ 34.724544] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.724737] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.725492] page dumped because: kasan: bad access detected [ 34.725606] [ 34.725666] Memory state around the buggy address: [ 34.726638] fff00000c6818b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.727192] fff00000c6818b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.727490] >fff00000c6818c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 34.727756] ^ [ 34.728260] fff00000c6818c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.728846] fff00000c6818d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.729130] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[ 34.643350] ================================================================== [ 34.643532] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 34.643670] Free of addr fff00000c5d8b060 by task kunit_try_catch/194 [ 34.643810] [ 34.643904] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 34.644237] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.644329] Hardware name: linux,dummy-virt (DT) [ 34.644734] Call trace: [ 34.645041] show_stack+0x20/0x38 (C) [ 34.645357] dump_stack_lvl+0x8c/0xd0 [ 34.645574] print_report+0x118/0x5f0 [ 34.645757] kasan_report_invalid_free+0xb0/0xd8 [ 34.645919] check_slab_allocation+0xd4/0x108 [ 34.646089] __kasan_slab_pre_free+0x2c/0x48 [ 34.646270] kfree+0xe8/0x3c8 [ 34.646420] kfree_sensitive+0x3c/0xb0 [ 34.646556] kmalloc_double_kzfree+0x168/0x308 [ 34.646716] kunit_try_run_case+0x14c/0x3d0 [ 34.647244] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.647441] kthread+0x318/0x618 [ 34.647589] ret_from_fork+0x10/0x20 [ 34.647743] [ 34.647803] Allocated by task 194: [ 34.647904] kasan_save_stack+0x3c/0x68 [ 34.648074] kasan_save_track+0x20/0x40 [ 34.648185] kasan_save_alloc_info+0x40/0x58 [ 34.648612] __kasan_kmalloc+0xd4/0xd8 [ 34.648892] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.649218] kmalloc_double_kzfree+0xb8/0x308 [ 34.649382] kunit_try_run_case+0x14c/0x3d0 [ 34.649516] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.649665] kthread+0x318/0x618 [ 34.650246] ret_from_fork+0x10/0x20 [ 34.650745] [ 34.650952] Freed by task 194: [ 34.651178] kasan_save_stack+0x3c/0x68 [ 34.651365] kasan_save_track+0x20/0x40 [ 34.651588] kasan_save_free_info+0x4c/0x78 [ 34.652357] __kasan_slab_free+0x6c/0x98 [ 34.652869] kfree+0x214/0x3c8 [ 34.653391] kfree_sensitive+0x80/0xb0 [ 34.653540] kmalloc_double_kzfree+0x11c/0x308 [ 34.653672] kunit_try_run_case+0x14c/0x3d0 [ 34.654213] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.654827] kthread+0x318/0x618 [ 34.654995] ret_from_fork+0x10/0x20 [ 34.655140] [ 34.655211] The buggy address belongs to the object at fff00000c5d8b060 [ 34.655211] which belongs to the cache kmalloc-16 of size 16 [ 34.655421] The buggy address is located 0 bytes inside of [ 34.655421] 16-byte region [fff00000c5d8b060, fff00000c5d8b070) [ 34.655730] [ 34.655839] The buggy address belongs to the physical page: [ 34.655972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d8b [ 34.656161] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.656332] page_type: f5(slab) [ 34.656520] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.656730] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.656907] page dumped because: kasan: bad access detected [ 34.657421] [ 34.657491] Memory state around the buggy address: [ 34.657594] fff00000c5d8af00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.657730] fff00000c5d8af80: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 34.658092] >fff00000c5d8b000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.658227] ^ [ 34.658352] fff00000c5d8b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.658559] fff00000c5d8b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.658764] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 34.620096] ================================================================== [ 34.620279] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 34.621414] Read of size 1 at addr fff00000c5d8b060 by task kunit_try_catch/194 [ 34.621689] [ 34.621857] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 34.622568] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.622677] Hardware name: linux,dummy-virt (DT) [ 34.622789] Call trace: [ 34.623133] show_stack+0x20/0x38 (C) [ 34.623799] dump_stack_lvl+0x8c/0xd0 [ 34.624020] print_report+0x118/0x5f0 [ 34.624408] kasan_report+0xc8/0x118 [ 34.624865] __kasan_check_byte+0x54/0x70 [ 34.625080] kfree_sensitive+0x30/0xb0 [ 34.625667] kmalloc_double_kzfree+0x168/0x308 [ 34.626072] kunit_try_run_case+0x14c/0x3d0 [ 34.626265] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.626434] kthread+0x318/0x618 [ 34.627354] ret_from_fork+0x10/0x20 [ 34.627524] [ 34.627713] Allocated by task 194: [ 34.628308] kasan_save_stack+0x3c/0x68 [ 34.628721] kasan_save_track+0x20/0x40 [ 34.629089] kasan_save_alloc_info+0x40/0x58 [ 34.629293] __kasan_kmalloc+0xd4/0xd8 [ 34.629786] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.629974] kmalloc_double_kzfree+0xb8/0x308 [ 34.630503] kunit_try_run_case+0x14c/0x3d0 [ 34.630804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.631329] kthread+0x318/0x618 [ 34.631790] ret_from_fork+0x10/0x20 [ 34.632178] [ 34.632252] Freed by task 194: [ 34.632534] kasan_save_stack+0x3c/0x68 [ 34.632754] kasan_save_track+0x20/0x40 [ 34.632880] kasan_save_free_info+0x4c/0x78 [ 34.633006] __kasan_slab_free+0x6c/0x98 [ 34.633453] kfree+0x214/0x3c8 [ 34.633705] kfree_sensitive+0x80/0xb0 [ 34.633903] kmalloc_double_kzfree+0x11c/0x308 [ 34.634073] kunit_try_run_case+0x14c/0x3d0 [ 34.634373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.634780] kthread+0x318/0x618 [ 34.634985] ret_from_fork+0x10/0x20 [ 34.635258] [ 34.635329] The buggy address belongs to the object at fff00000c5d8b060 [ 34.635329] which belongs to the cache kmalloc-16 of size 16 [ 34.635810] The buggy address is located 0 bytes inside of [ 34.635810] freed 16-byte region [fff00000c5d8b060, fff00000c5d8b070) [ 34.636188] [ 34.636367] The buggy address belongs to the physical page: [ 34.636485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d8b [ 34.636813] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.637313] page_type: f5(slab) [ 34.637467] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.637624] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.637756] page dumped because: kasan: bad access detected [ 34.638004] [ 34.638221] Memory state around the buggy address: [ 34.638451] fff00000c5d8af00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.638629] fff00000c5d8af80: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 34.639282] >fff00000c5d8b000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 34.639573] ^ [ 34.639832] fff00000c5d8b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.640010] fff00000c5d8b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.640269] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 34.548774] ================================================================== [ 34.549098] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 34.549255] Read of size 1 at addr fff00000c5d89da8 by task kunit_try_catch/190 [ 34.549420] [ 34.549510] CPU: 1 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 34.550110] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.550367] Hardware name: linux,dummy-virt (DT) [ 34.550610] Call trace: [ 34.550856] show_stack+0x20/0x38 (C) [ 34.551196] dump_stack_lvl+0x8c/0xd0 [ 34.551467] print_report+0x118/0x5f0 [ 34.551980] kasan_report+0xc8/0x118 [ 34.552430] __asan_report_load1_noabort+0x20/0x30 [ 34.552699] kmalloc_uaf2+0x3f4/0x468 [ 34.553147] kunit_try_run_case+0x14c/0x3d0 [ 34.553660] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.554268] kthread+0x318/0x618 [ 34.554651] ret_from_fork+0x10/0x20 [ 34.555232] [ 34.555323] Allocated by task 190: [ 34.555426] kasan_save_stack+0x3c/0x68 [ 34.555919] kasan_save_track+0x20/0x40 [ 34.556338] kasan_save_alloc_info+0x40/0x58 [ 34.557103] __kasan_kmalloc+0xd4/0xd8 [ 34.557225] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.557378] kmalloc_uaf2+0xc4/0x468 [ 34.557495] kunit_try_run_case+0x14c/0x3d0 [ 34.557624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.557763] kthread+0x318/0x618 [ 34.557865] ret_from_fork+0x10/0x20 [ 34.558566] [ 34.558643] Freed by task 190: [ 34.558895] kasan_save_stack+0x3c/0x68 [ 34.559047] kasan_save_track+0x20/0x40 [ 34.559191] kasan_save_free_info+0x4c/0x78 [ 34.559312] __kasan_slab_free+0x6c/0x98 [ 34.559572] kfree+0x214/0x3c8 [ 34.560012] kmalloc_uaf2+0x134/0x468 [ 34.560530] kunit_try_run_case+0x14c/0x3d0 [ 34.560688] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.560842] kthread+0x318/0x618 [ 34.561144] ret_from_fork+0x10/0x20 [ 34.561417] [ 34.561482] The buggy address belongs to the object at fff00000c5d89d80 [ 34.561482] which belongs to the cache kmalloc-64 of size 64 [ 34.561981] The buggy address is located 40 bytes inside of [ 34.561981] freed 64-byte region [fff00000c5d89d80, fff00000c5d89dc0) [ 34.562613] [ 34.562707] The buggy address belongs to the physical page: [ 34.562859] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d89 [ 34.563403] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.563590] page_type: f5(slab) [ 34.563712] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.564264] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.564575] page dumped because: kasan: bad access detected [ 34.564986] [ 34.565297] Memory state around the buggy address: [ 34.565546] fff00000c5d89c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.565706] fff00000c5d89d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.565897] >fff00000c5d89d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.566220] ^ [ 34.566496] fff00000c5d89e00: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 34.566663] fff00000c5d89e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.566793] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 34.499710] ================================================================== [ 34.499870] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 34.500025] Write of size 33 at addr fff00000c5d89c00 by task kunit_try_catch/188 [ 34.501976] [ 34.503044] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 34.504820] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.505477] Hardware name: linux,dummy-virt (DT) [ 34.505779] Call trace: [ 34.506046] show_stack+0x20/0x38 (C) [ 34.506834] dump_stack_lvl+0x8c/0xd0 [ 34.507563] print_report+0x118/0x5f0 [ 34.508272] kasan_report+0xc8/0x118 [ 34.509550] kasan_check_range+0x100/0x1a8 [ 34.509819] __asan_memset+0x34/0x78 [ 34.509967] kmalloc_uaf_memset+0x170/0x310 [ 34.510145] kunit_try_run_case+0x14c/0x3d0 [ 34.510785] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.511886] kthread+0x318/0x618 [ 34.512583] ret_from_fork+0x10/0x20 [ 34.513281] [ 34.513605] Allocated by task 188: [ 34.513701] kasan_save_stack+0x3c/0x68 [ 34.514558] kasan_save_track+0x20/0x40 [ 34.514693] kasan_save_alloc_info+0x40/0x58 [ 34.515425] __kasan_kmalloc+0xd4/0xd8 [ 34.515869] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.516832] kmalloc_uaf_memset+0xb8/0x310 [ 34.516985] kunit_try_run_case+0x14c/0x3d0 [ 34.517860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.518398] kthread+0x318/0x618 [ 34.518547] ret_from_fork+0x10/0x20 [ 34.518668] [ 34.518729] Freed by task 188: [ 34.519415] kasan_save_stack+0x3c/0x68 [ 34.519784] kasan_save_track+0x20/0x40 [ 34.520648] kasan_save_free_info+0x4c/0x78 [ 34.521617] __kasan_slab_free+0x6c/0x98 [ 34.521831] kfree+0x214/0x3c8 [ 34.522208] kmalloc_uaf_memset+0x11c/0x310 [ 34.522686] kunit_try_run_case+0x14c/0x3d0 [ 34.522990] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.523757] kthread+0x318/0x618 [ 34.524689] ret_from_fork+0x10/0x20 [ 34.525314] [ 34.525590] The buggy address belongs to the object at fff00000c5d89c00 [ 34.525590] which belongs to the cache kmalloc-64 of size 64 [ 34.526081] The buggy address is located 0 bytes inside of [ 34.526081] freed 64-byte region [fff00000c5d89c00, fff00000c5d89c40) [ 34.526299] [ 34.526373] The buggy address belongs to the physical page: [ 34.527396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d89 [ 34.528268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.528459] page_type: f5(slab) [ 34.528583] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.528746] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.529506] page dumped because: kasan: bad access detected [ 34.529867] [ 34.530163] Memory state around the buggy address: [ 34.530320] fff00000c5d89b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.530464] fff00000c5d89b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.530606] >fff00000c5d89c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.530728] ^ [ 34.530815] fff00000c5d89c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.531032] fff00000c5d89d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.531230] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 34.456239] ================================================================== [ 34.456499] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 34.456673] Read of size 1 at addr fff00000c5d8b048 by task kunit_try_catch/186 [ 34.456921] [ 34.457097] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 34.457529] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.457679] Hardware name: linux,dummy-virt (DT) [ 34.457782] Call trace: [ 34.457852] show_stack+0x20/0x38 (C) [ 34.458003] dump_stack_lvl+0x8c/0xd0 [ 34.458166] print_report+0x118/0x5f0 [ 34.458302] kasan_report+0xc8/0x118 [ 34.458462] __asan_report_load1_noabort+0x20/0x30 [ 34.458617] kmalloc_uaf+0x300/0x338 [ 34.458759] kunit_try_run_case+0x14c/0x3d0 [ 34.458914] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.459129] kthread+0x318/0x618 [ 34.459435] ret_from_fork+0x10/0x20 [ 34.459607] [ 34.459683] Allocated by task 186: [ 34.459819] kasan_save_stack+0x3c/0x68 [ 34.459952] kasan_save_track+0x20/0x40 [ 34.460129] kasan_save_alloc_info+0x40/0x58 [ 34.460299] __kasan_kmalloc+0xd4/0xd8 [ 34.460460] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.460617] kmalloc_uaf+0xb8/0x338 [ 34.460870] kunit_try_run_case+0x14c/0x3d0 [ 34.461170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.461375] kthread+0x318/0x618 [ 34.461492] ret_from_fork+0x10/0x20 [ 34.461599] [ 34.461662] Freed by task 186: [ 34.461760] kasan_save_stack+0x3c/0x68 [ 34.461889] kasan_save_track+0x20/0x40 [ 34.462558] kasan_save_free_info+0x4c/0x78 [ 34.462719] __kasan_slab_free+0x6c/0x98 [ 34.462843] kfree+0x214/0x3c8 [ 34.463047] kmalloc_uaf+0x11c/0x338 [ 34.463746] kunit_try_run_case+0x14c/0x3d0 [ 34.463897] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.464152] kthread+0x318/0x618 [ 34.464521] ret_from_fork+0x10/0x20 [ 34.464792] [ 34.464878] The buggy address belongs to the object at fff00000c5d8b040 [ 34.464878] which belongs to the cache kmalloc-16 of size 16 [ 34.465078] The buggy address is located 8 bytes inside of [ 34.465078] freed 16-byte region [fff00000c5d8b040, fff00000c5d8b050) [ 34.465849] [ 34.465918] The buggy address belongs to the physical page: [ 34.466025] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d8b [ 34.466215] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.466425] page_type: f5(slab) [ 34.466542] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.466706] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.466849] page dumped because: kasan: bad access detected [ 34.466964] [ 34.467024] Memory state around the buggy address: [ 34.467727] fff00000c5d8af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.468015] fff00000c5d8af80: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc [ 34.468878] >fff00000c5d8b000: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 34.469186] ^ [ 34.469317] fff00000c5d8b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.469497] fff00000c5d8b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.469634] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 34.415293] ================================================================== [ 34.415970] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e8 [ 34.416178] Read of size 64 at addr fff00000c5d89904 by task kunit_try_catch/184 [ 34.416340] [ 34.416436] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 34.417342] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.417451] Hardware name: linux,dummy-virt (DT) [ 34.417555] Call trace: [ 34.417629] show_stack+0x20/0x38 (C) [ 34.417779] dump_stack_lvl+0x8c/0xd0 [ 34.417928] print_report+0x118/0x5f0 [ 34.418676] kasan_report+0xc8/0x118 [ 34.418952] kasan_check_range+0x100/0x1a8 [ 34.419153] __asan_memmove+0x3c/0x98 [ 34.419374] kmalloc_memmove_invalid_size+0x154/0x2e8 [ 34.419579] kunit_try_run_case+0x14c/0x3d0 [ 34.419739] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.419982] kthread+0x318/0x618 [ 34.420217] ret_from_fork+0x10/0x20 [ 34.420423] [ 34.420517] Allocated by task 184: [ 34.420667] kasan_save_stack+0x3c/0x68 [ 34.420872] kasan_save_track+0x20/0x40 [ 34.420984] kasan_save_alloc_info+0x40/0x58 [ 34.421154] __kasan_kmalloc+0xd4/0xd8 [ 34.421270] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.421445] kmalloc_memmove_invalid_size+0xb0/0x2e8 [ 34.421583] kunit_try_run_case+0x14c/0x3d0 [ 34.421785] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.421945] kthread+0x318/0x618 [ 34.422142] ret_from_fork+0x10/0x20 [ 34.422304] [ 34.422408] The buggy address belongs to the object at fff00000c5d89900 [ 34.422408] which belongs to the cache kmalloc-64 of size 64 [ 34.422712] The buggy address is located 4 bytes inside of [ 34.422712] allocated 64-byte region [fff00000c5d89900, fff00000c5d89940) [ 34.422942] [ 34.423016] The buggy address belongs to the physical page: [ 34.423134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d89 [ 34.423305] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.423460] page_type: f5(slab) [ 34.423571] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.423734] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.423878] page dumped because: kasan: bad access detected [ 34.423984] [ 34.424047] Memory state around the buggy address: [ 34.424600] fff00000c5d89800: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 34.425044] fff00000c5d89880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.425392] >fff00000c5d89900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 34.425884] ^ [ 34.426278] fff00000c5d89980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.427220] fff00000c5d89a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.427755] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 34.356211] ================================================================== [ 34.356413] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 34.356568] Read of size 18446744073709551614 at addr fff00000c5d89704 by task kunit_try_catch/182 [ 34.356883] [ 34.356998] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 34.357335] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.357422] Hardware name: linux,dummy-virt (DT) [ 34.358016] Call trace: [ 34.358114] show_stack+0x20/0x38 (C) [ 34.358272] dump_stack_lvl+0x8c/0xd0 [ 34.358415] print_report+0x118/0x5f0 [ 34.358610] kasan_report+0xc8/0x118 [ 34.358749] kasan_check_range+0x100/0x1a8 [ 34.358910] __asan_memmove+0x3c/0x98 [ 34.359095] kmalloc_memmove_negative_size+0x154/0x2e0 [ 34.359270] kunit_try_run_case+0x14c/0x3d0 [ 34.359444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.359670] kthread+0x318/0x618 [ 34.359813] ret_from_fork+0x10/0x20 [ 34.360034] [ 34.360117] Allocated by task 182: [ 34.360203] kasan_save_stack+0x3c/0x68 [ 34.360459] kasan_save_track+0x20/0x40 [ 34.360611] kasan_save_alloc_info+0x40/0x58 [ 34.360912] __kasan_kmalloc+0xd4/0xd8 [ 34.361267] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.361523] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 34.361665] kunit_try_run_case+0x14c/0x3d0 [ 34.362315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.362670] kthread+0x318/0x618 [ 34.362811] ret_from_fork+0x10/0x20 [ 34.363415] [ 34.363488] The buggy address belongs to the object at fff00000c5d89700 [ 34.363488] which belongs to the cache kmalloc-64 of size 64 [ 34.364008] The buggy address is located 4 bytes inside of [ 34.364008] 64-byte region [fff00000c5d89700, fff00000c5d89740) [ 34.364541] [ 34.364940] The buggy address belongs to the physical page: [ 34.365082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d89 [ 34.365610] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.365781] page_type: f5(slab) [ 34.366107] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.366590] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.366745] page dumped because: kasan: bad access detected [ 34.366851] [ 34.367531] Memory state around the buggy address: [ 34.367790] fff00000c5d89600: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 34.368217] fff00000c5d89680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.368569] >fff00000c5d89700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 34.368692] ^ [ 34.368784] fff00000c5d89780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.369478] fff00000c5d89800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.369891] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 34.311864] ================================================================== [ 34.312019] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 34.312819] Write of size 16 at addr fff00000c6818b69 by task kunit_try_catch/180 [ 34.313185] [ 34.313464] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 34.313848] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.314274] Hardware name: linux,dummy-virt (DT) [ 34.314398] Call trace: [ 34.314471] show_stack+0x20/0x38 (C) [ 34.314623] dump_stack_lvl+0x8c/0xd0 [ 34.314817] print_report+0x118/0x5f0 [ 34.314978] kasan_report+0xc8/0x118 [ 34.315134] kasan_check_range+0x100/0x1a8 [ 34.315370] __asan_memset+0x34/0x78 [ 34.315813] kmalloc_oob_memset_16+0x150/0x2f8 [ 34.316124] kunit_try_run_case+0x14c/0x3d0 [ 34.316629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.317102] kthread+0x318/0x618 [ 34.317489] ret_from_fork+0x10/0x20 [ 34.317637] [ 34.319114] Allocated by task 180: [ 34.319212] kasan_save_stack+0x3c/0x68 [ 34.319335] kasan_save_track+0x20/0x40 [ 34.319444] kasan_save_alloc_info+0x40/0x58 [ 34.319562] __kasan_kmalloc+0xd4/0xd8 [ 34.319671] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.319785] kmalloc_oob_memset_16+0xb0/0x2f8 [ 34.319901] kunit_try_run_case+0x14c/0x3d0 [ 34.320012] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.320175] kthread+0x318/0x618 [ 34.320427] ret_from_fork+0x10/0x20 [ 34.320614] [ 34.320743] The buggy address belongs to the object at fff00000c6818b00 [ 34.320743] which belongs to the cache kmalloc-128 of size 128 [ 34.320930] The buggy address is located 105 bytes inside of [ 34.320930] allocated 120-byte region [fff00000c6818b00, fff00000c6818b78) [ 34.321218] [ 34.321481] The buggy address belongs to the physical page: [ 34.323412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106818 [ 34.323589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.324524] page_type: f5(slab) [ 34.324631] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.324806] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.324939] page dumped because: kasan: bad access detected [ 34.325036] [ 34.325117] Memory state around the buggy address: [ 34.325216] fff00000c6818a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.325353] fff00000c6818a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.325488] >fff00000c6818b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.325604] ^ [ 34.325727] fff00000c6818b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.325856] fff00000c6818c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.325973] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 34.267400] ================================================================== [ 34.267680] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 34.267838] Write of size 8 at addr fff00000c6818a71 by task kunit_try_catch/178 [ 34.267994] [ 34.268104] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 34.268603] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.268935] Hardware name: linux,dummy-virt (DT) [ 34.269399] Call trace: [ 34.269479] show_stack+0x20/0x38 (C) [ 34.269747] dump_stack_lvl+0x8c/0xd0 [ 34.269997] print_report+0x118/0x5f0 [ 34.270522] kasan_report+0xc8/0x118 [ 34.270696] kasan_check_range+0x100/0x1a8 [ 34.270846] __asan_memset+0x34/0x78 [ 34.271204] kmalloc_oob_memset_8+0x150/0x2f8 [ 34.271841] kunit_try_run_case+0x14c/0x3d0 [ 34.272025] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.272649] kthread+0x318/0x618 [ 34.272977] ret_from_fork+0x10/0x20 [ 34.273554] [ 34.273666] Allocated by task 178: [ 34.273756] kasan_save_stack+0x3c/0x68 [ 34.274184] kasan_save_track+0x20/0x40 [ 34.274307] kasan_save_alloc_info+0x40/0x58 [ 34.274439] __kasan_kmalloc+0xd4/0xd8 [ 34.274706] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.275293] kmalloc_oob_memset_8+0xb0/0x2f8 [ 34.275787] kunit_try_run_case+0x14c/0x3d0 [ 34.275925] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.276085] kthread+0x318/0x618 [ 34.276203] ret_from_fork+0x10/0x20 [ 34.276450] [ 34.276770] The buggy address belongs to the object at fff00000c6818a00 [ 34.276770] which belongs to the cache kmalloc-128 of size 128 [ 34.277421] The buggy address is located 113 bytes inside of [ 34.277421] allocated 120-byte region [fff00000c6818a00, fff00000c6818a78) [ 34.277759] [ 34.277821] The buggy address belongs to the physical page: [ 34.278197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106818 [ 34.278480] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.278633] page_type: f5(slab) [ 34.278878] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.279428] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.279794] page dumped because: kasan: bad access detected [ 34.280025] [ 34.280109] Memory state around the buggy address: [ 34.280553] fff00000c6818900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.280709] fff00000c6818980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.280851] >fff00000c6818a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.281335] ^ [ 34.281675] fff00000c6818a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.281963] fff00000c6818b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.282108] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 34.227938] ================================================================== [ 34.228111] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 34.228257] Write of size 4 at addr fff00000c6818975 by task kunit_try_catch/176 [ 34.228420] [ 34.228512] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 34.228787] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.228874] Hardware name: linux,dummy-virt (DT) [ 34.228972] Call trace: [ 34.229039] show_stack+0x20/0x38 (C) [ 34.229345] dump_stack_lvl+0x8c/0xd0 [ 34.229529] print_report+0x118/0x5f0 [ 34.229667] kasan_report+0xc8/0x118 [ 34.229803] kasan_check_range+0x100/0x1a8 [ 34.230027] __asan_memset+0x34/0x78 [ 34.230203] kmalloc_oob_memset_4+0x150/0x300 [ 34.230355] kunit_try_run_case+0x14c/0x3d0 [ 34.230499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.230700] kthread+0x318/0x618 [ 34.230843] ret_from_fork+0x10/0x20 [ 34.231072] [ 34.231232] Allocated by task 176: [ 34.231387] kasan_save_stack+0x3c/0x68 [ 34.231542] kasan_save_track+0x20/0x40 [ 34.231657] kasan_save_alloc_info+0x40/0x58 [ 34.231774] __kasan_kmalloc+0xd4/0xd8 [ 34.231885] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.232015] kmalloc_oob_memset_4+0xb0/0x300 [ 34.232163] kunit_try_run_case+0x14c/0x3d0 [ 34.232286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.232440] kthread+0x318/0x618 [ 34.232556] ret_from_fork+0x10/0x20 [ 34.232671] [ 34.232769] The buggy address belongs to the object at fff00000c6818900 [ 34.232769] which belongs to the cache kmalloc-128 of size 128 [ 34.233027] The buggy address is located 117 bytes inside of [ 34.233027] allocated 120-byte region [fff00000c6818900, fff00000c6818978) [ 34.233299] [ 34.233397] The buggy address belongs to the physical page: [ 34.233498] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106818 [ 34.233659] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.233796] page_type: f5(slab) [ 34.233930] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.234621] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.234864] page dumped because: kasan: bad access detected [ 34.234974] [ 34.235528] Memory state around the buggy address: [ 34.235733] fff00000c6818800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.236395] fff00000c6818880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.237410] >fff00000c6818900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.237710] ^ [ 34.238103] fff00000c6818980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.239264] fff00000c6818a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.239745] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 33.667873] ================================================================== [ 33.669300] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 33.669601] Read of size 1 at addr fff00000c7760000 by task kunit_try_catch/156 [ 33.671038] [ 33.671296] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.672131] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.672349] Hardware name: linux,dummy-virt (DT) [ 33.672571] Call trace: [ 33.672682] show_stack+0x20/0x38 (C) [ 33.672860] dump_stack_lvl+0x8c/0xd0 [ 33.673150] print_report+0x118/0x5f0 [ 33.673848] kasan_report+0xc8/0x118 [ 33.674006] __asan_report_load1_noabort+0x20/0x30 [ 33.674277] page_alloc_uaf+0x328/0x350 [ 33.674750] kunit_try_run_case+0x14c/0x3d0 [ 33.675038] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.675250] kthread+0x318/0x618 [ 33.675404] ret_from_fork+0x10/0x20 [ 33.676193] [ 33.676300] The buggy address belongs to the physical page: [ 33.676509] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107760 [ 33.677198] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.677507] page_type: f0(buddy) [ 33.678172] raw: 0bfffe0000000000 fff00000ff6160c8 fff00000ff6160c8 0000000000000000 [ 33.678433] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000 [ 33.678590] page dumped because: kasan: bad access detected [ 33.678796] [ 33.678856] Memory state around the buggy address: [ 33.679096] fff00000c775ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.679260] fff00000c775ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.679398] >fff00000c7760000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.679524] ^ [ 33.680280] fff00000c7760080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.680558] fff00000c7760100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.680746] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 34.201802] ================================================================== [ 34.201946] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 34.202119] Write of size 2 at addr fff00000c6818877 by task kunit_try_catch/174 [ 34.202261] [ 34.202346] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 34.202580] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.202660] Hardware name: linux,dummy-virt (DT) [ 34.202756] Call trace: [ 34.202821] show_stack+0x20/0x38 (C) [ 34.202985] dump_stack_lvl+0x8c/0xd0 [ 34.203155] print_report+0x118/0x5f0 [ 34.203308] kasan_report+0xc8/0x118 [ 34.203533] kasan_check_range+0x100/0x1a8 [ 34.203766] __asan_memset+0x34/0x78 [ 34.203991] kmalloc_oob_memset_2+0x150/0x2f8 [ 34.204163] kunit_try_run_case+0x14c/0x3d0 [ 34.204303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.204872] kthread+0x318/0x618 [ 34.205172] ret_from_fork+0x10/0x20 [ 34.205457] [ 34.205556] Allocated by task 174: [ 34.205645] kasan_save_stack+0x3c/0x68 [ 34.205765] kasan_save_track+0x20/0x40 [ 34.206170] kasan_save_alloc_info+0x40/0x58 [ 34.206297] __kasan_kmalloc+0xd4/0xd8 [ 34.206655] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.206857] kmalloc_oob_memset_2+0xb0/0x2f8 [ 34.207084] kunit_try_run_case+0x14c/0x3d0 [ 34.207209] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.207363] kthread+0x318/0x618 [ 34.207543] ret_from_fork+0x10/0x20 [ 34.207722] [ 34.207826] The buggy address belongs to the object at fff00000c6818800 [ 34.207826] which belongs to the cache kmalloc-128 of size 128 [ 34.208106] The buggy address is located 119 bytes inside of [ 34.208106] allocated 120-byte region [fff00000c6818800, fff00000c6818878) [ 34.208291] [ 34.208421] The buggy address belongs to the physical page: [ 34.209402] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106818 [ 34.209562] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.209715] page_type: f5(slab) [ 34.209799] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.209881] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.209947] page dumped because: kasan: bad access detected [ 34.209999] [ 34.210028] Memory state around the buggy address: [ 34.210118] fff00000c6818700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.210262] fff00000c6818780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.210464] >fff00000c6818800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.210608] ^ [ 34.210740] fff00000c6818880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.211141] fff00000c6818900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.211478] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 34.161965] ================================================================== [ 34.162148] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 34.162299] Write of size 128 at addr fff00000c6818700 by task kunit_try_catch/172 [ 34.162487] [ 34.162596] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 34.162877] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.162973] Hardware name: linux,dummy-virt (DT) [ 34.163093] Call trace: [ 34.163162] show_stack+0x20/0x38 (C) [ 34.163315] dump_stack_lvl+0x8c/0xd0 [ 34.163457] print_report+0x118/0x5f0 [ 34.163591] kasan_report+0xc8/0x118 [ 34.163729] kasan_check_range+0x100/0x1a8 [ 34.164468] __asan_memset+0x34/0x78 [ 34.164712] kmalloc_oob_in_memset+0x144/0x2d0 [ 34.164940] kunit_try_run_case+0x14c/0x3d0 [ 34.165299] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.165864] kthread+0x318/0x618 [ 34.166035] ret_from_fork+0x10/0x20 [ 34.166202] [ 34.166258] Allocated by task 172: [ 34.166343] kasan_save_stack+0x3c/0x68 [ 34.166643] kasan_save_track+0x20/0x40 [ 34.167254] kasan_save_alloc_info+0x40/0x58 [ 34.167594] __kasan_kmalloc+0xd4/0xd8 [ 34.167862] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.168307] kmalloc_oob_in_memset+0xb0/0x2d0 [ 34.168762] kunit_try_run_case+0x14c/0x3d0 [ 34.168922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.169088] kthread+0x318/0x618 [ 34.169197] ret_from_fork+0x10/0x20 [ 34.169301] [ 34.169362] The buggy address belongs to the object at fff00000c6818700 [ 34.169362] which belongs to the cache kmalloc-128 of size 128 [ 34.169531] The buggy address is located 0 bytes inside of [ 34.169531] allocated 120-byte region [fff00000c6818700, fff00000c6818778) [ 34.170427] [ 34.170564] The buggy address belongs to the physical page: [ 34.170670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106818 [ 34.170825] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.170984] page_type: f5(slab) [ 34.171118] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.171746] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.171971] page dumped because: kasan: bad access detected [ 34.172097] [ 34.172156] Memory state around the buggy address: [ 34.172402] fff00000c6818600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.172510] fff00000c6818680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.172582] >fff00000c6818700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.172687] ^ [ 34.172818] fff00000c6818780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.173038] fff00000c6818800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.173376] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 34.123367] ================================================================== [ 34.123581] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 34.123737] Read of size 16 at addr fff00000c5d8b020 by task kunit_try_catch/170 [ 34.123892] [ 34.124044] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 34.124419] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.124556] Hardware name: linux,dummy-virt (DT) [ 34.124671] Call trace: [ 34.124778] show_stack+0x20/0x38 (C) [ 34.124979] dump_stack_lvl+0x8c/0xd0 [ 34.125193] print_report+0x118/0x5f0 [ 34.125375] kasan_report+0xc8/0x118 [ 34.125558] __asan_report_load16_noabort+0x20/0x30 [ 34.125719] kmalloc_uaf_16+0x3bc/0x438 [ 34.125859] kunit_try_run_case+0x14c/0x3d0 [ 34.126006] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.126204] kthread+0x318/0x618 [ 34.126365] ret_from_fork+0x10/0x20 [ 34.126509] [ 34.126642] Allocated by task 170: [ 34.126763] kasan_save_stack+0x3c/0x68 [ 34.126899] kasan_save_track+0x20/0x40 [ 34.127173] kasan_save_alloc_info+0x40/0x58 [ 34.127312] __kasan_kmalloc+0xd4/0xd8 [ 34.127439] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.127631] kmalloc_uaf_16+0x140/0x438 [ 34.127750] kunit_try_run_case+0x14c/0x3d0 [ 34.127890] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.128026] kthread+0x318/0x618 [ 34.128205] ret_from_fork+0x10/0x20 [ 34.128383] [ 34.128444] Freed by task 170: [ 34.128519] kasan_save_stack+0x3c/0x68 [ 34.128708] kasan_save_track+0x20/0x40 [ 34.128860] kasan_save_free_info+0x4c/0x78 [ 34.129040] __kasan_slab_free+0x6c/0x98 [ 34.129179] kfree+0x214/0x3c8 [ 34.129287] kmalloc_uaf_16+0x190/0x438 [ 34.129402] kunit_try_run_case+0x14c/0x3d0 [ 34.129619] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.129771] kthread+0x318/0x618 [ 34.129884] ret_from_fork+0x10/0x20 [ 34.130161] [ 34.130278] The buggy address belongs to the object at fff00000c5d8b020 [ 34.130278] which belongs to the cache kmalloc-16 of size 16 [ 34.131010] The buggy address is located 0 bytes inside of [ 34.131010] freed 16-byte region [fff00000c5d8b020, fff00000c5d8b030) [ 34.131721] [ 34.131973] The buggy address belongs to the physical page: [ 34.132320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d8b [ 34.133298] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.133576] page_type: f5(slab) [ 34.133777] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.133944] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.134091] page dumped because: kasan: bad access detected [ 34.134195] [ 34.134816] Memory state around the buggy address: [ 34.135295] fff00000c5d8af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.136168] fff00000c5d8af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.136483] >fff00000c5d8b000: 00 00 fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 34.136981] ^ [ 34.137507] fff00000c5d8b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.137667] fff00000c5d8b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.138103] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 34.082424] ================================================================== [ 34.082613] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 34.082772] Write of size 16 at addr fff00000c5c8efc0 by task kunit_try_catch/168 [ 34.082937] [ 34.083232] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 34.083600] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.083681] Hardware name: linux,dummy-virt (DT) [ 34.083987] Call trace: [ 34.084406] show_stack+0x20/0x38 (C) [ 34.084668] dump_stack_lvl+0x8c/0xd0 [ 34.084914] print_report+0x118/0x5f0 [ 34.085079] kasan_report+0xc8/0x118 [ 34.085234] __asan_report_store16_noabort+0x20/0x30 [ 34.085486] kmalloc_oob_16+0x3a0/0x3f8 [ 34.085699] kunit_try_run_case+0x14c/0x3d0 [ 34.086072] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.086606] kthread+0x318/0x618 [ 34.086803] ret_from_fork+0x10/0x20 [ 34.087114] [ 34.087222] Allocated by task 168: [ 34.087806] kasan_save_stack+0x3c/0x68 [ 34.087943] kasan_save_track+0x20/0x40 [ 34.088076] kasan_save_alloc_info+0x40/0x58 [ 34.088192] __kasan_kmalloc+0xd4/0xd8 [ 34.088304] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.088442] kmalloc_oob_16+0xb4/0x3f8 [ 34.089926] kunit_try_run_case+0x14c/0x3d0 [ 34.090078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.090227] kthread+0x318/0x618 [ 34.090342] ret_from_fork+0x10/0x20 [ 34.090457] [ 34.090519] The buggy address belongs to the object at fff00000c5c8efc0 [ 34.090519] which belongs to the cache kmalloc-16 of size 16 [ 34.090975] The buggy address is located 0 bytes inside of [ 34.090975] allocated 13-byte region [fff00000c5c8efc0, fff00000c5c8efcd) [ 34.091629] [ 34.092029] The buggy address belongs to the physical page: [ 34.092236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c8e [ 34.092522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.092731] page_type: f5(slab) [ 34.092863] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 34.093027] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 34.093169] page dumped because: kasan: bad access detected [ 34.093261] [ 34.093316] Memory state around the buggy address: [ 34.093430] fff00000c5c8ee80: 00 04 fc fc fa fb fc fc 00 05 fc fc 00 05 fc fc [ 34.093572] fff00000c5c8ef00: 00 00 fc fc 00 06 fc fc 00 06 fc fc 00 00 fc fc [ 34.093712] >fff00000c5c8ef80: fa fb fc fc fa fb fc fc 00 05 fc fc 00 00 fc fc [ 34.094137] ^ [ 34.094696] fff00000c5c8f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.095347] fff00000c5c8f080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 34.095733] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 34.017497] ================================================================== [ 34.017670] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 34.017814] Read of size 1 at addr fff00000c4a4a800 by task kunit_try_catch/166 [ 34.017966] [ 34.018076] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 34.018348] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.018433] Hardware name: linux,dummy-virt (DT) [ 34.018531] Call trace: [ 34.018597] show_stack+0x20/0x38 (C) [ 34.018744] dump_stack_lvl+0x8c/0xd0 [ 34.019262] print_report+0x118/0x5f0 [ 34.019456] kasan_report+0xc8/0x118 [ 34.019668] __kasan_check_byte+0x54/0x70 [ 34.019895] krealloc_noprof+0x44/0x360 [ 34.020140] krealloc_uaf+0x180/0x520 [ 34.020501] kunit_try_run_case+0x14c/0x3d0 [ 34.020901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.021435] kthread+0x318/0x618 [ 34.022112] ret_from_fork+0x10/0x20 [ 34.022314] [ 34.022374] Allocated by task 166: [ 34.022459] kasan_save_stack+0x3c/0x68 [ 34.022579] kasan_save_track+0x20/0x40 [ 34.023005] kasan_save_alloc_info+0x40/0x58 [ 34.023170] __kasan_kmalloc+0xd4/0xd8 [ 34.023355] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.023539] krealloc_uaf+0xc8/0x520 [ 34.023711] kunit_try_run_case+0x14c/0x3d0 [ 34.023885] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.024089] kthread+0x318/0x618 [ 34.024264] ret_from_fork+0x10/0x20 [ 34.024419] [ 34.024480] Freed by task 166: [ 34.024566] kasan_save_stack+0x3c/0x68 [ 34.024678] kasan_save_track+0x20/0x40 [ 34.024786] kasan_save_free_info+0x4c/0x78 [ 34.024919] __kasan_slab_free+0x6c/0x98 [ 34.025032] kfree+0x214/0x3c8 [ 34.025514] krealloc_uaf+0x12c/0x520 [ 34.025677] kunit_try_run_case+0x14c/0x3d0 [ 34.025840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.025989] kthread+0x318/0x618 [ 34.026429] ret_from_fork+0x10/0x20 [ 34.026642] [ 34.026745] The buggy address belongs to the object at fff00000c4a4a800 [ 34.026745] which belongs to the cache kmalloc-256 of size 256 [ 34.027014] The buggy address is located 0 bytes inside of [ 34.027014] freed 256-byte region [fff00000c4a4a800, fff00000c4a4a900) [ 34.027239] [ 34.027304] The buggy address belongs to the physical page: [ 34.027404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a4a [ 34.027564] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.027727] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.027933] page_type: f5(slab) [ 34.028065] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 34.028217] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.028626] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 34.028966] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.029249] head: 0bfffe0000000001 ffffc1ffc3129281 00000000ffffffff 00000000ffffffff [ 34.029515] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 34.029644] page dumped because: kasan: bad access detected [ 34.029743] [ 34.029836] Memory state around the buggy address: [ 34.029931] fff00000c4a4a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.030307] fff00000c4a4a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.030514] >fff00000c4a4a800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.030710] ^ [ 34.030807] fff00000c4a4a880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.030954] fff00000c4a4a900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.031101] ================================================================== [ 34.032255] ================================================================== [ 34.032403] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 34.032542] Read of size 1 at addr fff00000c4a4a800 by task kunit_try_catch/166 [ 34.032693] [ 34.032781] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 34.033024] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.033127] Hardware name: linux,dummy-virt (DT) [ 34.033223] Call trace: [ 34.033341] show_stack+0x20/0x38 (C) [ 34.033953] dump_stack_lvl+0x8c/0xd0 [ 34.034514] print_report+0x118/0x5f0 [ 34.034702] kasan_report+0xc8/0x118 [ 34.034847] __asan_report_load1_noabort+0x20/0x30 [ 34.035023] krealloc_uaf+0x4c8/0x520 [ 34.035191] kunit_try_run_case+0x14c/0x3d0 [ 34.035437] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.035705] kthread+0x318/0x618 [ 34.035905] ret_from_fork+0x10/0x20 [ 34.036088] [ 34.036143] Allocated by task 166: [ 34.036230] kasan_save_stack+0x3c/0x68 [ 34.036394] kasan_save_track+0x20/0x40 [ 34.036581] kasan_save_alloc_info+0x40/0x58 [ 34.036736] __kasan_kmalloc+0xd4/0xd8 [ 34.037092] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.037624] krealloc_uaf+0xc8/0x520 [ 34.037911] kunit_try_run_case+0x14c/0x3d0 [ 34.038037] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.038540] kthread+0x318/0x618 [ 34.038687] ret_from_fork+0x10/0x20 [ 34.038819] [ 34.038880] Freed by task 166: [ 34.038975] kasan_save_stack+0x3c/0x68 [ 34.039129] kasan_save_track+0x20/0x40 [ 34.039290] kasan_save_free_info+0x4c/0x78 [ 34.039421] __kasan_slab_free+0x6c/0x98 [ 34.039538] kfree+0x214/0x3c8 [ 34.039645] krealloc_uaf+0x12c/0x520 [ 34.039763] kunit_try_run_case+0x14c/0x3d0 [ 34.039887] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.040029] kthread+0x318/0x618 [ 34.040163] ret_from_fork+0x10/0x20 [ 34.040288] [ 34.040342] The buggy address belongs to the object at fff00000c4a4a800 [ 34.040342] which belongs to the cache kmalloc-256 of size 256 [ 34.040549] The buggy address is located 0 bytes inside of [ 34.040549] freed 256-byte region [fff00000c4a4a800, fff00000c4a4a900) [ 34.040768] [ 34.041195] The buggy address belongs to the physical page: [ 34.041347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a4a [ 34.041548] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.041698] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.041860] page_type: f5(slab) [ 34.041971] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 34.042172] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.042352] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 34.042539] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.042698] head: 0bfffe0000000001 ffffc1ffc3129281 00000000ffffffff 00000000ffffffff [ 34.043087] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 34.043418] page dumped because: kasan: bad access detected [ 34.043578] [ 34.043635] Memory state around the buggy address: [ 34.043749] fff00000c4a4a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.043883] fff00000c4a4a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.044075] >fff00000c4a4a800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.044506] ^ [ 34.044564] fff00000c4a4a880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.044694] fff00000c4a4a900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.044818] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 33.801744] ================================================================== [ 33.802080] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 33.802227] Write of size 1 at addr fff00000c4a4a6da by task kunit_try_catch/160 [ 33.802684] [ 33.802955] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.803475] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.803557] Hardware name: linux,dummy-virt (DT) [ 33.803687] Call trace: [ 33.803753] show_stack+0x20/0x38 (C) [ 33.804007] dump_stack_lvl+0x8c/0xd0 [ 33.804178] print_report+0x118/0x5f0 [ 33.804439] kasan_report+0xc8/0x118 [ 33.804651] __asan_report_store1_noabort+0x20/0x30 [ 33.804898] krealloc_less_oob_helper+0xa80/0xc50 [ 33.805085] krealloc_less_oob+0x20/0x38 [ 33.805255] kunit_try_run_case+0x14c/0x3d0 [ 33.805476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.805686] kthread+0x318/0x618 [ 33.805865] ret_from_fork+0x10/0x20 [ 33.806016] [ 33.806124] Allocated by task 160: [ 33.806218] kasan_save_stack+0x3c/0x68 [ 33.806339] kasan_save_track+0x20/0x40 [ 33.806453] kasan_save_alloc_info+0x40/0x58 [ 33.806573] __kasan_krealloc+0x118/0x178 [ 33.806687] krealloc_noprof+0x128/0x360 [ 33.806795] krealloc_less_oob_helper+0x168/0xc50 [ 33.806932] krealloc_less_oob+0x20/0x38 [ 33.807075] kunit_try_run_case+0x14c/0x3d0 [ 33.807202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.807338] kthread+0x318/0x618 [ 33.807449] ret_from_fork+0x10/0x20 [ 33.807564] [ 33.807624] The buggy address belongs to the object at fff00000c4a4a600 [ 33.807624] which belongs to the cache kmalloc-256 of size 256 [ 33.807808] The buggy address is located 17 bytes to the right of [ 33.807808] allocated 201-byte region [fff00000c4a4a600, fff00000c4a4a6c9) [ 33.808014] [ 33.808098] The buggy address belongs to the physical page: [ 33.808191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a4a [ 33.808574] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.808724] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.808885] page_type: f5(slab) [ 33.808997] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 33.809241] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.809459] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 33.809678] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.809889] head: 0bfffe0000000001 ffffc1ffc3129281 00000000ffffffff 00000000ffffffff [ 33.810048] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 33.810190] page dumped because: kasan: bad access detected [ 33.810323] [ 33.810381] Memory state around the buggy address: [ 33.810582] fff00000c4a4a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.810722] fff00000c4a4a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.810859] >fff00000c4a4a680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 33.811120] ^ [ 33.811257] fff00000c4a4a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.811398] fff00000c4a4a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.811526] ================================================================== [ 33.813265] ================================================================== [ 33.813391] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 33.813639] Write of size 1 at addr fff00000c4a4a6ea by task kunit_try_catch/160 [ 33.813787] [ 33.813876] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.814209] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.814469] Hardware name: linux,dummy-virt (DT) [ 33.814737] Call trace: [ 33.814849] show_stack+0x20/0x38 (C) [ 33.815034] dump_stack_lvl+0x8c/0xd0 [ 33.815195] print_report+0x118/0x5f0 [ 33.815467] kasan_report+0xc8/0x118 [ 33.815608] __asan_report_store1_noabort+0x20/0x30 [ 33.815793] krealloc_less_oob_helper+0xae4/0xc50 [ 33.815987] krealloc_less_oob+0x20/0x38 [ 33.816185] kunit_try_run_case+0x14c/0x3d0 [ 33.816417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.816795] kthread+0x318/0x618 [ 33.817550] ret_from_fork+0x10/0x20 [ 33.817742] [ 33.817877] Allocated by task 160: [ 33.817975] kasan_save_stack+0x3c/0x68 [ 33.818118] kasan_save_track+0x20/0x40 [ 33.820109] kasan_save_alloc_info+0x40/0x58 [ 33.820219] __kasan_krealloc+0x118/0x178 [ 33.820282] krealloc_noprof+0x128/0x360 [ 33.820387] krealloc_less_oob_helper+0x168/0xc50 [ 33.820516] krealloc_less_oob+0x20/0x38 [ 33.820639] kunit_try_run_case+0x14c/0x3d0 [ 33.820763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.820951] kthread+0x318/0x618 [ 33.821196] ret_from_fork+0x10/0x20 [ 33.821455] [ 33.821535] The buggy address belongs to the object at fff00000c4a4a600 [ 33.821535] which belongs to the cache kmalloc-256 of size 256 [ 33.822030] The buggy address is located 33 bytes to the right of [ 33.822030] allocated 201-byte region [fff00000c4a4a600, fff00000c4a4a6c9) [ 33.823575] [ 33.823640] The buggy address belongs to the physical page: [ 33.824287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a4a [ 33.824520] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.824661] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.824812] page_type: f5(slab) [ 33.824921] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 33.827035] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.827899] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 33.828638] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.828840] head: 0bfffe0000000001 ffffc1ffc3129281 00000000ffffffff 00000000ffffffff [ 33.828988] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 33.829963] page dumped because: kasan: bad access detected [ 33.830144] [ 33.830202] Memory state around the buggy address: [ 33.831688] fff00000c4a4a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.831916] fff00000c4a4a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.832441] >fff00000c4a4a680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 33.833360] ^ [ 33.833503] fff00000c4a4a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.833642] fff00000c4a4a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.833905] ================================================================== [ 33.978871] ================================================================== [ 33.979013] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 33.979173] Write of size 1 at addr fff00000c774e0eb by task kunit_try_catch/164 [ 33.979329] [ 33.979416] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.980524] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.980659] Hardware name: linux,dummy-virt (DT) [ 33.980874] Call trace: [ 33.981535] show_stack+0x20/0x38 (C) [ 33.981706] dump_stack_lvl+0x8c/0xd0 [ 33.981858] print_report+0x118/0x5f0 [ 33.982000] kasan_report+0xc8/0x118 [ 33.982160] __asan_report_store1_noabort+0x20/0x30 [ 33.984250] krealloc_less_oob_helper+0xa58/0xc50 [ 33.985300] krealloc_large_less_oob+0x20/0x38 [ 33.985675] kunit_try_run_case+0x14c/0x3d0 [ 33.986612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.987027] kthread+0x318/0x618 [ 33.987207] ret_from_fork+0x10/0x20 [ 33.987356] [ 33.987416] The buggy address belongs to the physical page: [ 33.988704] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10774c [ 33.990194] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.990547] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.991079] page_type: f8(unknown) [ 33.991421] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.991971] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 33.992694] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.992971] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 33.993657] head: 0bfffe0000000002 ffffc1ffc31dd301 00000000ffffffff 00000000ffffffff [ 33.994457] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 33.994599] page dumped because: kasan: bad access detected [ 33.994694] [ 33.994749] Memory state around the buggy address: [ 33.994849] fff00000c774df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.995003] fff00000c774e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.996877] >fff00000c774e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 33.997266] ^ [ 33.997652] fff00000c774e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.997856] fff00000c774e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.997971] ================================================================== [ 33.931629] ================================================================== [ 33.931776] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 33.931914] Write of size 1 at addr fff00000c774e0d0 by task kunit_try_catch/164 [ 33.932108] [ 33.932196] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.932951] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.933045] Hardware name: linux,dummy-virt (DT) [ 33.933168] Call trace: [ 33.933235] show_stack+0x20/0x38 (C) [ 33.933412] dump_stack_lvl+0x8c/0xd0 [ 33.933645] print_report+0x118/0x5f0 [ 33.933796] kasan_report+0xc8/0x118 [ 33.933966] __asan_report_store1_noabort+0x20/0x30 [ 33.934143] krealloc_less_oob_helper+0xb9c/0xc50 [ 33.934461] krealloc_large_less_oob+0x20/0x38 [ 33.934939] kunit_try_run_case+0x14c/0x3d0 [ 33.935229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.935467] kthread+0x318/0x618 [ 33.935671] ret_from_fork+0x10/0x20 [ 33.935887] [ 33.935960] The buggy address belongs to the physical page: [ 33.936141] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10774c [ 33.936423] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.936588] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.936743] page_type: f8(unknown) [ 33.936852] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.937461] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 33.937637] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.937883] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 33.938164] head: 0bfffe0000000002 ffffc1ffc31dd301 00000000ffffffff 00000000ffffffff [ 33.938409] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 33.938556] page dumped because: kasan: bad access detected [ 33.938651] [ 33.938707] Memory state around the buggy address: [ 33.938805] fff00000c774df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.938954] fff00000c774e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.939112] >fff00000c774e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 33.939243] ^ [ 33.939357] fff00000c774e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.939499] fff00000c774e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.939637] ================================================================== [ 33.957712] ================================================================== [ 33.957835] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 33.957972] Write of size 1 at addr fff00000c774e0ea by task kunit_try_catch/164 [ 33.960352] [ 33.960487] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.960736] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.960821] Hardware name: linux,dummy-virt (DT) [ 33.960916] Call trace: [ 33.960980] show_stack+0x20/0x38 (C) [ 33.961463] dump_stack_lvl+0x8c/0xd0 [ 33.961648] print_report+0x118/0x5f0 [ 33.962785] kasan_report+0xc8/0x118 [ 33.962960] __asan_report_store1_noabort+0x20/0x30 [ 33.963543] krealloc_less_oob_helper+0xae4/0xc50 [ 33.964500] krealloc_large_less_oob+0x20/0x38 [ 33.964657] kunit_try_run_case+0x14c/0x3d0 [ 33.964808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.964978] kthread+0x318/0x618 [ 33.966302] ret_from_fork+0x10/0x20 [ 33.966545] [ 33.966646] The buggy address belongs to the physical page: [ 33.966832] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10774c [ 33.967025] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.967190] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.967351] page_type: f8(unknown) [ 33.967466] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.967985] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 33.968981] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.969217] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 33.969636] head: 0bfffe0000000002 ffffc1ffc31dd301 00000000ffffffff 00000000ffffffff [ 33.970136] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 33.970797] page dumped because: kasan: bad access detected [ 33.970909] [ 33.971433] Memory state around the buggy address: [ 33.971640] fff00000c774df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.971880] fff00000c774e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.972569] >fff00000c774e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 33.972714] ^ [ 33.973370] fff00000c774e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.973633] fff00000c774e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.973791] ================================================================== [ 33.763945] ================================================================== [ 33.764045] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 33.764503] Write of size 1 at addr fff00000c4a4a6c9 by task kunit_try_catch/160 [ 33.764678] [ 33.764776] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.765044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.765149] Hardware name: linux,dummy-virt (DT) [ 33.765240] Call trace: [ 33.765300] show_stack+0x20/0x38 (C) [ 33.765493] dump_stack_lvl+0x8c/0xd0 [ 33.765640] print_report+0x118/0x5f0 [ 33.765783] kasan_report+0xc8/0x118 [ 33.765916] __asan_report_store1_noabort+0x20/0x30 [ 33.766371] krealloc_less_oob_helper+0xa48/0xc50 [ 33.766605] krealloc_less_oob+0x20/0x38 [ 33.766811] kunit_try_run_case+0x14c/0x3d0 [ 33.767028] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.767265] kthread+0x318/0x618 [ 33.767447] ret_from_fork+0x10/0x20 [ 33.767684] [ 33.767787] Allocated by task 160: [ 33.767880] kasan_save_stack+0x3c/0x68 [ 33.767998] kasan_save_track+0x20/0x40 [ 33.768128] kasan_save_alloc_info+0x40/0x58 [ 33.768249] __kasan_krealloc+0x118/0x178 [ 33.768422] krealloc_noprof+0x128/0x360 [ 33.768534] krealloc_less_oob_helper+0x168/0xc50 [ 33.768662] krealloc_less_oob+0x20/0x38 [ 33.769080] kunit_try_run_case+0x14c/0x3d0 [ 33.769250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.769416] kthread+0x318/0x618 [ 33.769579] ret_from_fork+0x10/0x20 [ 33.769712] [ 33.769775] The buggy address belongs to the object at fff00000c4a4a600 [ 33.769775] which belongs to the cache kmalloc-256 of size 256 [ 33.769962] The buggy address is located 0 bytes to the right of [ 33.769962] allocated 201-byte region [fff00000c4a4a600, fff00000c4a4a6c9) [ 33.770178] [ 33.770238] The buggy address belongs to the physical page: [ 33.770369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a4a [ 33.770722] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.770912] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.771150] page_type: f5(slab) [ 33.771312] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 33.771467] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.771627] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 33.771789] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.771950] head: 0bfffe0000000001 ffffc1ffc3129281 00000000ffffffff 00000000ffffffff [ 33.772144] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 33.772272] page dumped because: kasan: bad access detected [ 33.772411] [ 33.772474] Memory state around the buggy address: [ 33.772885] fff00000c4a4a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.773082] fff00000c4a4a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.773219] >fff00000c4a4a680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 33.773335] ^ [ 33.773450] fff00000c4a4a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.773581] fff00000c4a4a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.773986] ================================================================== [ 33.778390] ================================================================== [ 33.778520] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 33.778659] Write of size 1 at addr fff00000c4a4a6d0 by task kunit_try_catch/160 [ 33.778816] [ 33.778902] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.779905] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.779998] Hardware name: linux,dummy-virt (DT) [ 33.780803] Call trace: [ 33.781214] show_stack+0x20/0x38 (C) [ 33.781614] dump_stack_lvl+0x8c/0xd0 [ 33.782242] print_report+0x118/0x5f0 [ 33.782419] kasan_report+0xc8/0x118 [ 33.782564] __asan_report_store1_noabort+0x20/0x30 [ 33.782725] krealloc_less_oob_helper+0xb9c/0xc50 [ 33.782901] krealloc_less_oob+0x20/0x38 [ 33.784404] kunit_try_run_case+0x14c/0x3d0 [ 33.784593] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.784769] kthread+0x318/0x618 [ 33.784911] ret_from_fork+0x10/0x20 [ 33.785075] [ 33.785131] Allocated by task 160: [ 33.785213] kasan_save_stack+0x3c/0x68 [ 33.785324] kasan_save_track+0x20/0x40 [ 33.785427] kasan_save_alloc_info+0x40/0x58 [ 33.785536] __kasan_krealloc+0x118/0x178 [ 33.785638] krealloc_noprof+0x128/0x360 [ 33.785734] krealloc_less_oob_helper+0x168/0xc50 [ 33.785857] krealloc_less_oob+0x20/0x38 [ 33.785975] kunit_try_run_case+0x14c/0x3d0 [ 33.789398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.789579] kthread+0x318/0x618 [ 33.789692] ret_from_fork+0x10/0x20 [ 33.789803] [ 33.789862] The buggy address belongs to the object at fff00000c4a4a600 [ 33.789862] which belongs to the cache kmalloc-256 of size 256 [ 33.790031] The buggy address is located 7 bytes to the right of [ 33.790031] allocated 201-byte region [fff00000c4a4a600, fff00000c4a4a6c9) [ 33.790224] [ 33.790276] The buggy address belongs to the physical page: [ 33.790357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a4a [ 33.790495] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.790629] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.790776] page_type: f5(slab) [ 33.790887] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 33.794003] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.794724] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 33.794906] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.795100] head: 0bfffe0000000001 ffffc1ffc3129281 00000000ffffffff 00000000ffffffff [ 33.795253] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 33.795380] page dumped because: kasan: bad access detected [ 33.795480] [ 33.795536] Memory state around the buggy address: [ 33.795631] fff00000c4a4a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.795762] fff00000c4a4a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.795893] >fff00000c4a4a680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 33.796018] ^ [ 33.796144] fff00000c4a4a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.796284] fff00000c4a4a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.796414] ================================================================== [ 33.921551] ================================================================== [ 33.921695] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 33.921874] Write of size 1 at addr fff00000c774e0c9 by task kunit_try_catch/164 [ 33.922027] [ 33.922143] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.922917] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.923087] Hardware name: linux,dummy-virt (DT) [ 33.923248] Call trace: [ 33.923355] show_stack+0x20/0x38 (C) [ 33.923603] dump_stack_lvl+0x8c/0xd0 [ 33.923748] print_report+0x118/0x5f0 [ 33.923888] kasan_report+0xc8/0x118 [ 33.924028] __asan_report_store1_noabort+0x20/0x30 [ 33.924201] krealloc_less_oob_helper+0xa48/0xc50 [ 33.924463] krealloc_large_less_oob+0x20/0x38 [ 33.925130] kunit_try_run_case+0x14c/0x3d0 [ 33.925410] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.925584] kthread+0x318/0x618 [ 33.925762] ret_from_fork+0x10/0x20 [ 33.926031] [ 33.926121] The buggy address belongs to the physical page: [ 33.926457] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10774c [ 33.926685] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.926863] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.927034] page_type: f8(unknown) [ 33.927234] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.927431] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 33.927634] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.927881] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 33.928085] head: 0bfffe0000000002 ffffc1ffc31dd301 00000000ffffffff 00000000ffffffff [ 33.928236] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 33.928457] page dumped because: kasan: bad access detected [ 33.928883] [ 33.929018] Memory state around the buggy address: [ 33.929180] fff00000c774df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.929312] fff00000c774e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.929477] >fff00000c774e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 33.929655] ^ [ 33.929784] fff00000c774e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.929924] fff00000c774e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.930048] ================================================================== [ 33.837027] ================================================================== [ 33.837209] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 33.837354] Write of size 1 at addr fff00000c4a4a6eb by task kunit_try_catch/160 [ 33.837497] [ 33.837579] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.837811] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.837892] Hardware name: linux,dummy-virt (DT) [ 33.837978] Call trace: [ 33.838041] show_stack+0x20/0x38 (C) [ 33.838244] dump_stack_lvl+0x8c/0xd0 [ 33.838481] print_report+0x118/0x5f0 [ 33.838634] kasan_report+0xc8/0x118 [ 33.838774] __asan_report_store1_noabort+0x20/0x30 [ 33.838942] krealloc_less_oob_helper+0xa58/0xc50 [ 33.839115] krealloc_less_oob+0x20/0x38 [ 33.839265] kunit_try_run_case+0x14c/0x3d0 [ 33.839415] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.839582] kthread+0x318/0x618 [ 33.839728] ret_from_fork+0x10/0x20 [ 33.839876] [ 33.839934] Allocated by task 160: [ 33.840020] kasan_save_stack+0x3c/0x68 [ 33.840166] kasan_save_track+0x20/0x40 [ 33.840316] kasan_save_alloc_info+0x40/0x58 [ 33.840446] __kasan_krealloc+0x118/0x178 [ 33.840578] krealloc_noprof+0x128/0x360 [ 33.840697] krealloc_less_oob_helper+0x168/0xc50 [ 33.840863] krealloc_less_oob+0x20/0x38 [ 33.841032] kunit_try_run_case+0x14c/0x3d0 [ 33.841201] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.841347] kthread+0x318/0x618 [ 33.841469] ret_from_fork+0x10/0x20 [ 33.841585] [ 33.841677] The buggy address belongs to the object at fff00000c4a4a600 [ 33.841677] which belongs to the cache kmalloc-256 of size 256 [ 33.841855] The buggy address is located 34 bytes to the right of [ 33.841855] allocated 201-byte region [fff00000c4a4a600, fff00000c4a4a6c9) [ 33.842048] [ 33.842130] The buggy address belongs to the physical page: [ 33.842216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a4a [ 33.842373] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.842523] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.842681] page_type: f5(slab) [ 33.842786] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 33.843007] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.843241] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 33.843393] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.843546] head: 0bfffe0000000001 ffffc1ffc3129281 00000000ffffffff 00000000ffffffff [ 33.843698] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 33.843876] page dumped because: kasan: bad access detected [ 33.843979] [ 33.844037] Memory state around the buggy address: [ 33.844201] fff00000c4a4a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.844483] fff00000c4a4a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.844591] >fff00000c4a4a680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 33.844708] ^ [ 33.845010] fff00000c4a4a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.845405] fff00000c4a4a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.845732] ================================================================== [ 33.943313] ================================================================== [ 33.943497] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 33.943956] Write of size 1 at addr fff00000c774e0da by task kunit_try_catch/164 [ 33.944146] [ 33.944235] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.945197] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.945798] Hardware name: linux,dummy-virt (DT) [ 33.945916] Call trace: [ 33.945981] show_stack+0x20/0x38 (C) [ 33.946227] dump_stack_lvl+0x8c/0xd0 [ 33.946521] print_report+0x118/0x5f0 [ 33.946805] kasan_report+0xc8/0x118 [ 33.947028] __asan_report_store1_noabort+0x20/0x30 [ 33.947216] krealloc_less_oob_helper+0xa80/0xc50 [ 33.947975] krealloc_large_less_oob+0x20/0x38 [ 33.948335] kunit_try_run_case+0x14c/0x3d0 [ 33.948666] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.948909] kthread+0x318/0x618 [ 33.949377] ret_from_fork+0x10/0x20 [ 33.949546] [ 33.949605] The buggy address belongs to the physical page: [ 33.949697] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10774c [ 33.949852] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.950448] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.950758] page_type: f8(unknown) [ 33.951014] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.951315] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 33.951995] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.952481] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 33.953110] head: 0bfffe0000000002 ffffc1ffc31dd301 00000000ffffffff 00000000ffffffff [ 33.953306] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 33.953441] page dumped because: kasan: bad access detected [ 33.954237] [ 33.954300] Memory state around the buggy address: [ 33.954395] fff00000c774df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.954538] fff00000c774e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.954678] >fff00000c774e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 33.954843] ^ [ 33.955144] fff00000c774e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.955453] fff00000c774e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.955610] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 33.863989] ================================================================== [ 33.865666] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680 [ 33.865845] Write of size 1 at addr fff00000c774e0eb by task kunit_try_catch/162 [ 33.865995] [ 33.866104] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.868702] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.869150] Hardware name: linux,dummy-virt (DT) [ 33.869454] Call trace: [ 33.869725] show_stack+0x20/0x38 (C) [ 33.870105] dump_stack_lvl+0x8c/0xd0 [ 33.870629] print_report+0x118/0x5f0 [ 33.870947] kasan_report+0xc8/0x118 [ 33.872037] __asan_report_store1_noabort+0x20/0x30 [ 33.873146] krealloc_more_oob_helper+0x614/0x680 [ 33.873486] krealloc_large_more_oob+0x20/0x38 [ 33.874831] kunit_try_run_case+0x14c/0x3d0 [ 33.875042] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.875655] kthread+0x318/0x618 [ 33.875844] ret_from_fork+0x10/0x20 [ 33.875995] [ 33.876074] The buggy address belongs to the physical page: [ 33.876172] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10774c [ 33.876338] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.877783] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.878089] page_type: f8(unknown) [ 33.878208] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.878839] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 33.879016] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.879192] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 33.879349] head: 0bfffe0000000002 ffffc1ffc31dd301 00000000ffffffff 00000000ffffffff [ 33.879500] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 33.879643] page dumped because: kasan: bad access detected [ 33.879753] [ 33.879865] Memory state around the buggy address: [ 33.880014] fff00000c774df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.880178] fff00000c774e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.880318] >fff00000c774e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 33.880579] ^ [ 33.881002] fff00000c774e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.881907] fff00000c774e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.882048] ================================================================== [ 33.698289] ================================================================== [ 33.698468] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680 [ 33.698619] Write of size 1 at addr fff00000c4a4a4eb by task kunit_try_catch/158 [ 33.698795] [ 33.698887] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.699235] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.699375] Hardware name: linux,dummy-virt (DT) [ 33.699480] Call trace: [ 33.699550] show_stack+0x20/0x38 (C) [ 33.699707] dump_stack_lvl+0x8c/0xd0 [ 33.699851] print_report+0x118/0x5f0 [ 33.699987] kasan_report+0xc8/0x118 [ 33.700165] __asan_report_store1_noabort+0x20/0x30 [ 33.700438] krealloc_more_oob_helper+0x614/0x680 [ 33.700621] krealloc_more_oob+0x20/0x38 [ 33.700825] kunit_try_run_case+0x14c/0x3d0 [ 33.701360] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.701985] kthread+0x318/0x618 [ 33.702174] ret_from_fork+0x10/0x20 [ 33.702470] [ 33.702533] Allocated by task 158: [ 33.702662] kasan_save_stack+0x3c/0x68 [ 33.702964] kasan_save_track+0x20/0x40 [ 33.703378] kasan_save_alloc_info+0x40/0x58 [ 33.703752] __kasan_krealloc+0x118/0x178 [ 33.704202] krealloc_noprof+0x128/0x360 [ 33.705028] krealloc_more_oob_helper+0x168/0x680 [ 33.705733] krealloc_more_oob+0x20/0x38 [ 33.706529] kunit_try_run_case+0x14c/0x3d0 [ 33.707044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.707225] kthread+0x318/0x618 [ 33.707521] ret_from_fork+0x10/0x20 [ 33.708026] [ 33.708158] The buggy address belongs to the object at fff00000c4a4a400 [ 33.708158] which belongs to the cache kmalloc-256 of size 256 [ 33.708582] The buggy address is located 0 bytes to the right of [ 33.708582] allocated 235-byte region [fff00000c4a4a400, fff00000c4a4a4eb) [ 33.708807] [ 33.709001] The buggy address belongs to the physical page: [ 33.709256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a4a [ 33.709803] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.709969] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.710153] page_type: f5(slab) [ 33.710424] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 33.710590] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.710880] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 33.711344] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.712001] head: 0bfffe0000000001 ffffc1ffc3129281 00000000ffffffff 00000000ffffffff [ 33.712447] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 33.712596] page dumped because: kasan: bad access detected [ 33.712722] [ 33.712810] Memory state around the buggy address: [ 33.712933] fff00000c4a4a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.713096] fff00000c4a4a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.713239] >fff00000c4a4a480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 33.713366] ^ [ 33.713491] fff00000c4a4a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.713629] fff00000c4a4a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.713865] ================================================================== [ 33.883979] ================================================================== [ 33.885940] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680 [ 33.886335] Write of size 1 at addr fff00000c774e0f0 by task kunit_try_catch/162 [ 33.886567] [ 33.886671] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.887468] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.887558] Hardware name: linux,dummy-virt (DT) [ 33.887659] Call trace: [ 33.887727] show_stack+0x20/0x38 (C) [ 33.887877] dump_stack_lvl+0x8c/0xd0 [ 33.888021] print_report+0x118/0x5f0 [ 33.888185] kasan_report+0xc8/0x118 [ 33.888323] __asan_report_store1_noabort+0x20/0x30 [ 33.888479] krealloc_more_oob_helper+0x5c8/0x680 [ 33.890087] krealloc_large_more_oob+0x20/0x38 [ 33.890314] kunit_try_run_case+0x14c/0x3d0 [ 33.890568] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.890775] kthread+0x318/0x618 [ 33.890933] ret_from_fork+0x10/0x20 [ 33.891103] [ 33.891164] The buggy address belongs to the physical page: [ 33.891275] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10774c [ 33.891462] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.891608] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.891765] page_type: f8(unknown) [ 33.891893] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.892194] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 33.892438] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.892653] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 33.892870] head: 0bfffe0000000002 ffffc1ffc31dd301 00000000ffffffff 00000000ffffffff [ 33.893072] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 33.893196] page dumped because: kasan: bad access detected [ 33.893353] [ 33.893414] Memory state around the buggy address: [ 33.893502] fff00000c774df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.893639] fff00000c774e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.893836] >fff00000c774e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 33.893987] ^ [ 33.894152] fff00000c774e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.894345] fff00000c774e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.894537] ================================================================== [ 33.718320] ================================================================== [ 33.718592] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680 [ 33.719093] Write of size 1 at addr fff00000c4a4a4f0 by task kunit_try_catch/158 [ 33.719684] [ 33.719809] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.720221] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.720340] Hardware name: linux,dummy-virt (DT) [ 33.720991] Call trace: [ 33.721334] show_stack+0x20/0x38 (C) [ 33.721484] dump_stack_lvl+0x8c/0xd0 [ 33.721622] print_report+0x118/0x5f0 [ 33.721760] kasan_report+0xc8/0x118 [ 33.721898] __asan_report_store1_noabort+0x20/0x30 [ 33.722079] krealloc_more_oob_helper+0x5c8/0x680 [ 33.722523] krealloc_more_oob+0x20/0x38 [ 33.723769] kunit_try_run_case+0x14c/0x3d0 [ 33.724003] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.724728] kthread+0x318/0x618 [ 33.724905] ret_from_fork+0x10/0x20 [ 33.725627] [ 33.725760] Allocated by task 158: [ 33.725962] kasan_save_stack+0x3c/0x68 [ 33.726254] kasan_save_track+0x20/0x40 [ 33.726379] kasan_save_alloc_info+0x40/0x58 [ 33.726615] __kasan_krealloc+0x118/0x178 [ 33.726730] krealloc_noprof+0x128/0x360 [ 33.726847] krealloc_more_oob_helper+0x168/0x680 [ 33.726995] krealloc_more_oob+0x20/0x38 [ 33.727143] kunit_try_run_case+0x14c/0x3d0 [ 33.727266] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.727406] kthread+0x318/0x618 [ 33.727587] ret_from_fork+0x10/0x20 [ 33.727697] [ 33.727756] The buggy address belongs to the object at fff00000c4a4a400 [ 33.727756] which belongs to the cache kmalloc-256 of size 256 [ 33.727941] The buggy address is located 5 bytes to the right of [ 33.727941] allocated 235-byte region [fff00000c4a4a400, fff00000c4a4a4eb) [ 33.728440] [ 33.728511] The buggy address belongs to the physical page: [ 33.728599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104a4a [ 33.728758] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.728902] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.729099] page_type: f5(slab) [ 33.729398] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 33.729559] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.729771] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 33.730024] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.730269] head: 0bfffe0000000001 ffffc1ffc3129281 00000000ffffffff 00000000ffffffff [ 33.730429] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 33.730560] page dumped because: kasan: bad access detected [ 33.730656] [ 33.730715] Memory state around the buggy address: [ 33.730815] fff00000c4a4a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.730966] fff00000c4a4a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.731122] >fff00000c4a4a480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 33.731233] ^ [ 33.731361] fff00000c4a4a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.731501] fff00000c4a4a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.731620] ==================================================================
Failure - kunit/wmfw_too_short_for_block_header_wmfw_too_short_for_block_header
(no logs available)
Failure - kunit/wmfw_too_short_for_block_header_block_type0xc0
(no logs available)
Failure - kunit/wmfw_too_short_for_block_header_block_type0xf5
(no logs available)
Failure - kunit/wmfw_too_short_for_block_header_block_type0x33
(no logs available)
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[ 33.598337] ================================================================== [ 33.598572] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 33.598749] Free of addr fff00000c7748001 by task kunit_try_catch/152 [ 33.598887] [ 33.598988] CPU: 1 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.599564] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.599684] Hardware name: linux,dummy-virt (DT) [ 33.599792] Call trace: [ 33.599905] show_stack+0x20/0x38 (C) [ 33.600099] dump_stack_lvl+0x8c/0xd0 [ 33.600248] print_report+0x118/0x5f0 [ 33.600393] kasan_report_invalid_free+0xb0/0xd8 [ 33.600611] __kasan_kfree_large+0x5c/0xa8 [ 33.600766] free_large_kmalloc+0x64/0x190 [ 33.600927] kfree+0x270/0x3c8 [ 33.601119] kmalloc_large_invalid_free+0x108/0x270 [ 33.601684] kunit_try_run_case+0x14c/0x3d0 [ 33.601930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.602147] kthread+0x318/0x618 [ 33.602296] ret_from_fork+0x10/0x20 [ 33.602785] [ 33.603043] The buggy address belongs to the physical page: [ 33.603320] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107748 [ 33.603816] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.604223] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.604417] page_type: f8(unknown) [ 33.604538] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.604753] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 33.604921] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.605088] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 33.605270] head: 0bfffe0000000002 ffffc1ffc31dd201 00000000ffffffff 00000000ffffffff [ 33.605506] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 33.605722] page dumped because: kasan: bad access detected [ 33.605883] [ 33.605977] Memory state around the buggy address: [ 33.606151] fff00000c7747f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.606372] fff00000c7747f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.606619] >fff00000c7748000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.607029] ^ [ 33.607143] fff00000c7748080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.607615] fff00000c7748100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.608160] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 33.567126] ================================================================== [ 33.567542] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 33.567957] Read of size 1 at addr fff00000c7748000 by task kunit_try_catch/150 [ 33.568164] [ 33.568263] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.568529] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.568617] Hardware name: linux,dummy-virt (DT) [ 33.568718] Call trace: [ 33.568785] show_stack+0x20/0x38 (C) [ 33.568931] dump_stack_lvl+0x8c/0xd0 [ 33.569893] print_report+0x118/0x5f0 [ 33.570174] kasan_report+0xc8/0x118 [ 33.570320] __asan_report_load1_noabort+0x20/0x30 [ 33.570477] kmalloc_large_uaf+0x2cc/0x2f8 [ 33.570917] kunit_try_run_case+0x14c/0x3d0 [ 33.571861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.572463] kthread+0x318/0x618 [ 33.572619] ret_from_fork+0x10/0x20 [ 33.572938] [ 33.573273] The buggy address belongs to the physical page: [ 33.573723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107748 [ 33.574071] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.574572] raw: 0bfffe0000000000 ffffc1ffc31dd308 fff00000da45ec40 0000000000000000 [ 33.575110] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 33.575478] page dumped because: kasan: bad access detected [ 33.575670] [ 33.576072] Memory state around the buggy address: [ 33.576339] fff00000c7747f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.576660] fff00000c7747f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.576821] >fff00000c7748000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.576934] ^ [ 33.577020] fff00000c7748080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.578142] fff00000c7748100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.578518] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 33.531222] ================================================================== [ 33.532656] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 33.532821] Write of size 1 at addr fff00000c76e600a by task kunit_try_catch/148 [ 33.532975] [ 33.533154] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.534038] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.534230] Hardware name: linux,dummy-virt (DT) [ 33.534433] Call trace: [ 33.534550] show_stack+0x20/0x38 (C) [ 33.534804] dump_stack_lvl+0x8c/0xd0 [ 33.535046] print_report+0x118/0x5f0 [ 33.535295] kasan_report+0xc8/0x118 [ 33.535432] __asan_report_store1_noabort+0x20/0x30 [ 33.535603] kmalloc_large_oob_right+0x278/0x2b8 [ 33.535858] kunit_try_run_case+0x14c/0x3d0 [ 33.536018] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.536809] kthread+0x318/0x618 [ 33.536981] ret_from_fork+0x10/0x20 [ 33.537397] [ 33.537577] The buggy address belongs to the physical page: [ 33.537689] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076e4 [ 33.537855] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.538001] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.538212] page_type: f8(unknown) [ 33.538320] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.538504] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 33.538763] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.538933] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 33.539128] head: 0bfffe0000000002 ffffc1ffc31db901 00000000ffffffff 00000000ffffffff [ 33.539274] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 33.539850] page dumped because: kasan: bad access detected [ 33.540018] [ 33.540100] Memory state around the buggy address: [ 33.540206] fff00000c76e5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.540340] fff00000c76e5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.540524] >fff00000c76e6000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.540967] ^ [ 33.541220] fff00000c76e6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.541443] fff00000c76e6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.541646] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 33.487545] ================================================================== [ 33.488256] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 33.488708] Write of size 1 at addr fff00000c68a5f00 by task kunit_try_catch/146 [ 33.488857] [ 33.489169] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.489527] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.489884] Hardware name: linux,dummy-virt (DT) [ 33.490149] Call trace: [ 33.490222] show_stack+0x20/0x38 (C) [ 33.490794] dump_stack_lvl+0x8c/0xd0 [ 33.490981] print_report+0x118/0x5f0 [ 33.491352] kasan_report+0xc8/0x118 [ 33.491899] __asan_report_store1_noabort+0x20/0x30 [ 33.492111] kmalloc_big_oob_right+0x2a4/0x2f0 [ 33.492266] kunit_try_run_case+0x14c/0x3d0 [ 33.492421] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.492593] kthread+0x318/0x618 [ 33.493267] ret_from_fork+0x10/0x20 [ 33.493540] [ 33.493606] Allocated by task 146: [ 33.493692] kasan_save_stack+0x3c/0x68 [ 33.494085] kasan_save_track+0x20/0x40 [ 33.494399] kasan_save_alloc_info+0x40/0x58 [ 33.494639] __kasan_kmalloc+0xd4/0xd8 [ 33.495280] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.495764] kmalloc_big_oob_right+0xb8/0x2f0 [ 33.496160] kunit_try_run_case+0x14c/0x3d0 [ 33.496292] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.496909] kthread+0x318/0x618 [ 33.497046] ret_from_fork+0x10/0x20 [ 33.497193] [ 33.497542] The buggy address belongs to the object at fff00000c68a4000 [ 33.497542] which belongs to the cache kmalloc-8k of size 8192 [ 33.497747] The buggy address is located 0 bytes to the right of [ 33.497747] allocated 7936-byte region [fff00000c68a4000, fff00000c68a5f00) [ 33.498200] [ 33.498461] The buggy address belongs to the physical page: [ 33.498659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068a0 [ 33.498829] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.498984] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.499166] page_type: f5(slab) [ 33.499281] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 33.499441] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 33.499602] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 33.499760] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 33.499921] head: 0bfffe0000000003 ffffc1ffc31a2801 00000000ffffffff 00000000ffffffff [ 33.501118] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 33.501274] page dumped because: kasan: bad access detected [ 33.501370] [ 33.501448] Memory state around the buggy address: [ 33.501547] fff00000c68a5e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.501683] fff00000c68a5e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.501823] >fff00000c68a5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.502279] ^ [ 33.502397] fff00000c68a5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.502675] fff00000c68a6000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.502804] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 33.438189] ================================================================== [ 33.438343] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x414/0x490 [ 33.438503] Write of size 1 at addr fff00000c6818578 by task kunit_try_catch/144 [ 33.438824] [ 33.438967] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.439259] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.439346] Hardware name: linux,dummy-virt (DT) [ 33.439446] Call trace: [ 33.439539] show_stack+0x20/0x38 (C) [ 33.439710] dump_stack_lvl+0x8c/0xd0 [ 33.439876] print_report+0x118/0x5f0 [ 33.440081] kasan_report+0xc8/0x118 [ 33.440217] __asan_report_store1_noabort+0x20/0x30 [ 33.440467] kmalloc_track_caller_oob_right+0x414/0x490 [ 33.440653] kunit_try_run_case+0x14c/0x3d0 [ 33.440854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.441197] kthread+0x318/0x618 [ 33.441426] ret_from_fork+0x10/0x20 [ 33.441656] [ 33.441719] Allocated by task 144: [ 33.441812] kasan_save_stack+0x3c/0x68 [ 33.441932] kasan_save_track+0x20/0x40 [ 33.442046] kasan_save_alloc_info+0x40/0x58 [ 33.442182] __kasan_kmalloc+0xd4/0xd8 [ 33.442282] __kmalloc_node_track_caller_noprof+0x184/0x4b8 [ 33.442412] kmalloc_track_caller_oob_right+0xa8/0x490 [ 33.442548] kunit_try_run_case+0x14c/0x3d0 [ 33.442689] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.442822] kthread+0x318/0x618 [ 33.443097] ret_from_fork+0x10/0x20 [ 33.443221] [ 33.443279] The buggy address belongs to the object at fff00000c6818500 [ 33.443279] which belongs to the cache kmalloc-128 of size 128 [ 33.443559] The buggy address is located 0 bytes to the right of [ 33.443559] allocated 120-byte region [fff00000c6818500, fff00000c6818578) [ 33.443803] [ 33.443920] The buggy address belongs to the physical page: [ 33.444022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106818 [ 33.444212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.444391] page_type: f5(slab) [ 33.444501] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.444652] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.444783] page dumped because: kasan: bad access detected [ 33.444893] [ 33.444948] Memory state around the buggy address: [ 33.445043] fff00000c6818400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.445197] fff00000c6818480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.445410] >fff00000c6818500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.445563] ^ [ 33.445695] fff00000c6818580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.445863] fff00000c6818600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.446072] ================================================================== [ 33.447881] ================================================================== [ 33.448007] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x420/0x490 [ 33.448297] Write of size 1 at addr fff00000c6818678 by task kunit_try_catch/144 [ 33.448524] [ 33.448678] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.449158] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.449262] Hardware name: linux,dummy-virt (DT) [ 33.449366] Call trace: [ 33.449425] show_stack+0x20/0x38 (C) [ 33.449639] dump_stack_lvl+0x8c/0xd0 [ 33.449825] print_report+0x118/0x5f0 [ 33.449965] kasan_report+0xc8/0x118 [ 33.450178] __asan_report_store1_noabort+0x20/0x30 [ 33.450352] kmalloc_track_caller_oob_right+0x420/0x490 [ 33.450612] kunit_try_run_case+0x14c/0x3d0 [ 33.450851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.451375] kthread+0x318/0x618 [ 33.451540] ret_from_fork+0x10/0x20 [ 33.451681] [ 33.451772] Allocated by task 144: [ 33.452098] kasan_save_stack+0x3c/0x68 [ 33.452431] kasan_save_track+0x20/0x40 [ 33.452602] kasan_save_alloc_info+0x40/0x58 [ 33.452735] __kasan_kmalloc+0xd4/0xd8 [ 33.452899] __kmalloc_node_track_caller_noprof+0x184/0x4b8 [ 33.453080] kmalloc_track_caller_oob_right+0x184/0x490 [ 33.453308] kunit_try_run_case+0x14c/0x3d0 [ 33.453467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.453632] kthread+0x318/0x618 [ 33.453746] ret_from_fork+0x10/0x20 [ 33.453859] [ 33.453922] The buggy address belongs to the object at fff00000c6818600 [ 33.453922] which belongs to the cache kmalloc-128 of size 128 [ 33.454135] The buggy address is located 0 bytes to the right of [ 33.454135] allocated 120-byte region [fff00000c6818600, fff00000c6818678) [ 33.454503] [ 33.454568] The buggy address belongs to the physical page: [ 33.454661] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106818 [ 33.455129] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.455323] page_type: f5(slab) [ 33.455485] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.455690] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.455897] page dumped because: kasan: bad access detected [ 33.456074] [ 33.456166] Memory state around the buggy address: [ 33.456316] fff00000c6818500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.456584] fff00000c6818580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.456741] >fff00000c6818600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.456858] ^ [ 33.457307] fff00000c6818680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.457525] fff00000c6818700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.457673] ==================================================================
Failure - kunit/_wmfw_too_short_for_block_payload
_wmfw_too_short_for_block_payload fail
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 33.387013] ================================================================== [ 33.387214] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 33.387762] Read of size 1 at addr fff00000c687d000 by task kunit_try_catch/142 [ 33.387998] [ 33.388145] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.388510] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.388647] Hardware name: linux,dummy-virt (DT) [ 33.388751] Call trace: [ 33.388818] show_stack+0x20/0x38 (C) [ 33.389171] dump_stack_lvl+0x8c/0xd0 [ 33.389376] print_report+0x118/0x5f0 [ 33.389898] kasan_report+0xc8/0x118 [ 33.390087] __asan_report_load1_noabort+0x20/0x30 [ 33.390354] kmalloc_node_oob_right+0x2f4/0x330 [ 33.390561] kunit_try_run_case+0x14c/0x3d0 [ 33.390720] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.390890] kthread+0x318/0x618 [ 33.391068] ret_from_fork+0x10/0x20 [ 33.391215] [ 33.391641] Allocated by task 142: [ 33.391862] kasan_save_stack+0x3c/0x68 [ 33.391944] kasan_save_track+0x20/0x40 [ 33.392008] kasan_save_alloc_info+0x40/0x58 [ 33.392188] __kasan_kmalloc+0xd4/0xd8 [ 33.392362] __kmalloc_cache_node_noprof+0x168/0x3d0 [ 33.392502] kmalloc_node_oob_right+0xbc/0x330 [ 33.392626] kunit_try_run_case+0x14c/0x3d0 [ 33.392746] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.393208] kthread+0x318/0x618 [ 33.393380] ret_from_fork+0x10/0x20 [ 33.393533] [ 33.393623] The buggy address belongs to the object at fff00000c687c000 [ 33.393623] which belongs to the cache kmalloc-4k of size 4096 [ 33.393866] The buggy address is located 0 bytes to the right of [ 33.393866] allocated 4096-byte region [fff00000c687c000, fff00000c687d000) [ 33.394183] [ 33.394286] The buggy address belongs to the physical page: [ 33.394512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106878 [ 33.395145] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.395303] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.395523] page_type: f5(slab) [ 33.395714] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 33.395892] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 33.396134] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 33.396348] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 33.396512] head: 0bfffe0000000003 ffffc1ffc31a1e01 00000000ffffffff 00000000ffffffff [ 33.397214] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 33.397496] page dumped because: kasan: bad access detected [ 33.397602] [ 33.397657] Memory state around the buggy address: [ 33.397750] fff00000c687cf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.397881] fff00000c687cf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.398011] >fff00000c687d000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.398144] ^ [ 33.398226] fff00000c687d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.398354] fff00000c687d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.399101] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 33.349940] ================================================================== [ 33.350189] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 33.350340] Read of size 1 at addr fff00000c5c8ef9f by task kunit_try_catch/140 [ 33.350497] [ 33.350587] CPU: 1 UID: 0 PID: 140 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.350847] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.350941] Hardware name: linux,dummy-virt (DT) [ 33.351040] Call trace: [ 33.351154] show_stack+0x20/0x38 (C) [ 33.351303] dump_stack_lvl+0x8c/0xd0 [ 33.351562] print_report+0x118/0x5f0 [ 33.351744] kasan_report+0xc8/0x118 [ 33.351988] __asan_report_load1_noabort+0x20/0x30 [ 33.352162] kmalloc_oob_left+0x2ec/0x320 [ 33.352316] kunit_try_run_case+0x14c/0x3d0 [ 33.352531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.352857] kthread+0x318/0x618 [ 33.353117] ret_from_fork+0x10/0x20 [ 33.353270] [ 33.353362] Allocated by task 26: [ 33.353448] kasan_save_stack+0x3c/0x68 [ 33.353674] kasan_save_track+0x20/0x40 [ 33.353860] kasan_save_alloc_info+0x40/0x58 [ 33.354066] __kasan_kmalloc+0xd4/0xd8 [ 33.354227] __kmalloc_node_track_caller_noprof+0x184/0x4b8 [ 33.354398] kstrdup+0x54/0xc8 [ 33.354532] devtmpfs_work_loop+0x38c/0x5a0 [ 33.354703] devtmpfsd+0x50/0x58 [ 33.354835] kthread+0x318/0x618 [ 33.355025] ret_from_fork+0x10/0x20 [ 33.355154] [ 33.355235] Freed by task 26: [ 33.355465] kasan_save_stack+0x3c/0x68 [ 33.355603] kasan_save_track+0x20/0x40 [ 33.355719] kasan_save_free_info+0x4c/0x78 [ 33.355856] __kasan_slab_free+0x6c/0x98 [ 33.356021] kfree+0x214/0x3c8 [ 33.356194] devtmpfs_work_loop+0x484/0x5a0 [ 33.356340] devtmpfsd+0x50/0x58 [ 33.356472] kthread+0x318/0x618 [ 33.356594] ret_from_fork+0x10/0x20 [ 33.356907] [ 33.357164] The buggy address belongs to the object at fff00000c5c8ef80 [ 33.357164] which belongs to the cache kmalloc-16 of size 16 [ 33.357572] The buggy address is located 15 bytes to the right of [ 33.357572] allocated 16-byte region [fff00000c5c8ef80, fff00000c5c8ef90) [ 33.357770] [ 33.357832] The buggy address belongs to the physical page: [ 33.358708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c8e [ 33.358901] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.359086] page_type: f5(slab) [ 33.359197] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 33.359356] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.359490] page dumped because: kasan: bad access detected [ 33.359590] [ 33.359647] Memory state around the buggy address: [ 33.359744] fff00000c5c8ee80: 00 04 fc fc fa fb fc fc 00 05 fc fc 00 05 fc fc [ 33.359880] fff00000c5c8ef00: 00 00 fc fc 00 06 fc fc 00 06 fc fc 00 00 fc fc [ 33.361000] >fff00000c5c8ef80: fa fb fc fc 00 07 fc fc fc fc fc fc fc fc fc fc [ 33.361348] ^ [ 33.362129] fff00000c5c8f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.362294] fff00000c5c8f080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 33.362408] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 33.292935] ================================================================== [ 33.293660] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 33.295071] Write of size 1 at addr fff00000c6818473 by task kunit_try_catch/138 [ 33.295256] [ 33.296557] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.296984] Tainted: [N]=TEST [ 33.297108] Hardware name: linux,dummy-virt (DT) [ 33.297611] Call trace: [ 33.297857] show_stack+0x20/0x38 (C) [ 33.298107] dump_stack_lvl+0x8c/0xd0 [ 33.298218] print_report+0x118/0x5f0 [ 33.298295] kasan_report+0xc8/0x118 [ 33.298368] __asan_report_store1_noabort+0x20/0x30 [ 33.298449] kmalloc_oob_right+0x5a4/0x660 [ 33.298527] kunit_try_run_case+0x14c/0x3d0 [ 33.298609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.298696] kthread+0x318/0x618 [ 33.298771] ret_from_fork+0x10/0x20 [ 33.299028] [ 33.299108] Allocated by task 138: [ 33.299301] kasan_save_stack+0x3c/0x68 [ 33.299406] kasan_save_track+0x20/0x40 [ 33.299469] kasan_save_alloc_info+0x40/0x58 [ 33.299532] __kasan_kmalloc+0xd4/0xd8 [ 33.299589] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.299658] kmalloc_oob_right+0xb0/0x660 [ 33.299719] kunit_try_run_case+0x14c/0x3d0 [ 33.299783] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.299855] kthread+0x318/0x618 [ 33.299912] ret_from_fork+0x10/0x20 [ 33.300006] [ 33.300120] The buggy address belongs to the object at fff00000c6818400 [ 33.300120] which belongs to the cache kmalloc-128 of size 128 [ 33.300274] The buggy address is located 0 bytes to the right of [ 33.300274] allocated 115-byte region [fff00000c6818400, fff00000c6818473) [ 33.300459] [ 33.300684] The buggy address belongs to the physical page: [ 33.301191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106818 [ 33.301870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.302375] page_type: f5(slab) [ 33.302854] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.302970] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.303168] page dumped because: kasan: bad access detected [ 33.303242] [ 33.303285] Memory state around the buggy address: [ 33.303647] fff00000c6818300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.303769] fff00000c6818380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.303863] >fff00000c6818400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 33.303954] ^ [ 33.304102] fff00000c6818480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.304175] fff00000c6818500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.304281] ================================================================== [ 33.305688] ================================================================== [ 33.305929] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 33.306091] Write of size 1 at addr fff00000c6818478 by task kunit_try_catch/138 [ 33.306247] [ 33.306333] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.306593] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.306678] Hardware name: linux,dummy-virt (DT) [ 33.306776] Call trace: [ 33.306842] show_stack+0x20/0x38 (C) [ 33.307001] dump_stack_lvl+0x8c/0xd0 [ 33.310020] print_report+0x118/0x5f0 [ 33.310190] kasan_report+0xc8/0x118 [ 33.310330] __asan_report_store1_noabort+0x20/0x30 [ 33.310481] kmalloc_oob_right+0x538/0x660 [ 33.310629] kunit_try_run_case+0x14c/0x3d0 [ 33.311653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.312133] kthread+0x318/0x618 [ 33.312590] ret_from_fork+0x10/0x20 [ 33.312763] [ 33.312820] Allocated by task 138: [ 33.312901] kasan_save_stack+0x3c/0x68 [ 33.313394] kasan_save_track+0x20/0x40 [ 33.313537] kasan_save_alloc_info+0x40/0x58 [ 33.313662] __kasan_kmalloc+0xd4/0xd8 [ 33.313957] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.314313] kmalloc_oob_right+0xb0/0x660 [ 33.314703] kunit_try_run_case+0x14c/0x3d0 [ 33.315154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.315319] kthread+0x318/0x618 [ 33.315447] ret_from_fork+0x10/0x20 [ 33.315576] [ 33.315636] The buggy address belongs to the object at fff00000c6818400 [ 33.315636] which belongs to the cache kmalloc-128 of size 128 [ 33.315878] The buggy address is located 5 bytes to the right of [ 33.315878] allocated 115-byte region [fff00000c6818400, fff00000c6818473) [ 33.316206] [ 33.316266] The buggy address belongs to the physical page: [ 33.316412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106818 [ 33.316572] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.316720] page_type: f5(slab) [ 33.316831] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.316979] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.317133] page dumped because: kasan: bad access detected [ 33.317248] [ 33.317341] Memory state around the buggy address: [ 33.317470] fff00000c6818300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.317624] fff00000c6818380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.317815] >fff00000c6818400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 33.317988] ^ [ 33.318170] fff00000c6818480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.318304] fff00000c6818500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.318421] ================================================================== [ 33.319152] ================================================================== [ 33.319277] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 33.319470] Read of size 1 at addr fff00000c6818480 by task kunit_try_catch/138 [ 33.319794] [ 33.319945] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 33.320918] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.321247] Hardware name: linux,dummy-virt (DT) [ 33.321367] Call trace: [ 33.321549] show_stack+0x20/0x38 (C) [ 33.321716] dump_stack_lvl+0x8c/0xd0 [ 33.321860] print_report+0x118/0x5f0 [ 33.322001] kasan_report+0xc8/0x118 [ 33.322158] __asan_report_load1_noabort+0x20/0x30 [ 33.323224] kmalloc_oob_right+0x5d0/0x660 [ 33.323389] kunit_try_run_case+0x14c/0x3d0 [ 33.323540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.323709] kthread+0x318/0x618 [ 33.323852] ret_from_fork+0x10/0x20 [ 33.324006] [ 33.324121] Allocated by task 138: [ 33.324226] kasan_save_stack+0x3c/0x68 [ 33.324399] kasan_save_track+0x20/0x40 [ 33.324582] kasan_save_alloc_info+0x40/0x58 [ 33.324708] __kasan_kmalloc+0xd4/0xd8 [ 33.324817] __kmalloc_cache_noprof+0x15c/0x3c0 [ 33.324935] kmalloc_oob_right+0xb0/0x660 [ 33.325112] kunit_try_run_case+0x14c/0x3d0 [ 33.325236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.325374] kthread+0x318/0x618 [ 33.325486] ret_from_fork+0x10/0x20 [ 33.325650] [ 33.325723] The buggy address belongs to the object at fff00000c6818400 [ 33.325723] which belongs to the cache kmalloc-128 of size 128 [ 33.326007] The buggy address is located 13 bytes to the right of [ 33.326007] allocated 115-byte region [fff00000c6818400, fff00000c6818473) [ 33.326271] [ 33.326329] The buggy address belongs to the physical page: [ 33.326423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106818 [ 33.326585] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.326733] page_type: f5(slab) [ 33.326888] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.327302] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.327714] page dumped because: kasan: bad access detected [ 33.327835] [ 33.327890] Memory state around the buggy address: [ 33.327984] fff00000c6818380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.328349] fff00000c6818400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 33.328552] >fff00000c6818480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.328685] ^ [ 33.328775] fff00000c6818500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.328944] fff00000c6818580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.329122] ==================================================================
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------ [ 147.125253] WARNING: CPU: 1 PID: 668 at lib/math/int_log.c:120 intlog10+0x38/0x48 [ 147.127173] Modules linked in: [ 147.128226] CPU: 1 UID: 0 PID: 668 Comm: kunit_try_catch Tainted: G B D W N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 147.129284] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 147.129999] Hardware name: linux,dummy-virt (DT) [ 147.131236] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 147.132185] pc : intlog10+0x38/0x48 [ 147.133095] lr : intlog10_test+0xe4/0x200 [ 147.134158] sp : ffff8000823b7c10 [ 147.134750] x29: ffff8000823b7c90 x28: 0000000000000000 x27: 0000000000000000 [ 147.135874] x26: 1ffe000019182ea1 x25: 0000000000000000 x24: ffff8000800879a8 [ 147.136993] x23: fff00000c1933cc0 x22: 0000000000000000 x21: 1ffff00010476f82 [ 147.138486] x20: ffffaabf7c0d66e0 x19: ffff800080087990 x18: 0000000053f3a723 [ 147.139496] x17: 00000000f3c6eb01 x16: fff00000c096e03c x15: fff00000ff616b48 [ 147.140543] x14: fff00000ff615dc0 x13: 1ffe00001b48720d x12: ffff7557efffc361 [ 147.141843] x11: 1ffff557efffc360 x10: ffff7557efffc360 x9 : ffffaabf7960233c [ 147.142834] x8 : ffffaabf7ffe1b03 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 147.143826] x5 : ffff700010476f82 x4 : 1ffff00010010f3a x3 : 1ffff557ef81acdc [ 147.144969] x2 : 1ffff557ef81acdc x1 : 0000000000000003 x0 : 0000000000000000 [ 147.145796] Call trace: [ 147.146489] intlog10+0x38/0x48 (P) [ 147.147221] kunit_try_run_case+0x14c/0x3d0 [ 147.148017] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 147.148771] kthread+0x318/0x618 [ 147.149375] ret_from_fork+0x10/0x20 [ 147.149836] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------ [ 147.001025] WARNING: CPU: 1 PID: 650 at lib/math/int_log.c:63 intlog2+0xd8/0xf8 [ 147.003255] Modules linked in: [ 147.003963] CPU: 1 UID: 0 PID: 650 Comm: kunit_try_catch Tainted: G B D N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 147.005685] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 147.006406] Hardware name: linux,dummy-virt (DT) [ 147.006908] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 147.007786] pc : intlog2+0xd8/0xf8 [ 147.008412] lr : intlog2_test+0xe4/0x200 [ 147.009429] sp : ffff8000822d7c10 [ 147.009906] x29: ffff8000822d7c90 x28: 0000000000000000 x27: 0000000000000000 [ 147.010908] x26: 1ffe000018b9f061 x25: 0000000000000000 x24: ffff8000800879a8 [ 147.011975] x23: fff00000c14ebcc0 x22: 0000000000000000 x21: 1ffff0001045af82 [ 147.013311] x20: ffffaabf7c0d65e0 x19: ffff800080087990 x18: 00000000445304d0 [ 147.014340] x17: 000000001464bfbd x16: fff00000c096e03c x15: fff00000ff616b48 [ 147.015372] x14: fff00000ff615dc0 x13: 1ffe00001b48720d x12: ffff7557efffc361 [ 147.016461] x11: 1ffff557efffc360 x10: ffff7557efffc360 x9 : ffffaabf7960253c [ 147.017738] x8 : ffffaabf7ffe1b03 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 147.018753] x5 : ffff70001045af82 x4 : 1ffff00010010f3a x3 : 1ffff557ef81acbc [ 147.019781] x2 : 1ffff557ef81acbc x1 : 0000000000000003 x0 : 0000000000000000 [ 147.020845] Call trace: [ 147.021242] intlog2+0xd8/0xf8 (P) [ 147.021826] kunit_try_run_case+0x14c/0x3d0 [ 147.022854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 147.023556] kthread+0x318/0x618 [ 147.024076] ret_from_fork+0x10/0x20 [ 147.025016] ---[ end trace 0000000000000000 ]---
Failure - kunit/wmfw_too_short_for_block_header_cs_dsp_wmfwV2_err_adsp2_16bit
(no logs available)
Failure - kunit/wmfw_block_payload_len_garbage_wmfw_block_payload_len_garbage
(no logs available)
Failure - kunit/wmfw_block_payload_len_garbage_block_type0xff
(no logs available)
Failure - log-parser-boot/internal-error-oops-oops-smp
KNOWN ISSUE - qemu-arm64: Internal error: Oops at kunit_test_null_dereference - kunit_generic_run_threadfn_adapter
[ 145.105875] Internal error: Oops: 0000000096000005 [#1] SMP [ 145.113693] Modules linked in: [ 145.114848] CPU: 1 UID: 0 PID: 534 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 145.116422] Tainted: [B]=BAD_PAGE, [N]=TEST [ 145.117072] Hardware name: linux,dummy-virt (DT) [ 145.118045] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 145.119292] pc : kunit_test_null_dereference+0x70/0x170 [ 145.120102] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 145.121152] sp : ffff800081f77d30 [ 145.121658] x29: ffff800081f77d90 x28: 0000000000000000 x27: 0000000000000000 [ 145.122939] x26: 1ffe000018b8ab41 x25: 0000000000000000 x24: fff00000c5bc8900 [ 145.123850] x23: ffffaabf795e5b88 x22: ffffaabf795eea38 x21: fff00000c5bc8908 [ 145.125283] x20: 1ffff000103eefa6 x19: ffff800080087990 x18: 000000008f402c82 [ 145.126326] x17: 00000000d9987b92 x16: 00000000cb7f1d0d x15: 1ffe00001b48b5d0 [ 145.127320] x14: dfff800000000000 x13: 0000000000000000 x12: fffd8000196b811c [ 145.128323] x11: 1ffe0000196b811b x10: fffd8000196b811b x9 : ffffaabf795e5c10 [ 145.129569] x8 : ffff800081f77c28 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 145.130667] x5 : ffff7000103eefa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 145.131656] x2 : dfff800000000000 x1 : fff00000cb5c0000 x0 : ffff800080087990 [ 145.132796] Call trace: [ 145.133304] kunit_test_null_dereference+0x70/0x170 (P) [ 145.133986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 145.134706] kthread+0x318/0x618 [ 145.135280] ret_from_fork+0x10/0x20 [ 145.136442] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 145.137683] ---[ end trace 0000000000000000 ]---