Date
July 15, 2025, 2:10 p.m.
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 75.408920] ================================================================== [ 75.409822] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xc0/0x310 [ 75.410674] Read of size 1 at addr ffff8000080fb7f3 by task kunit_try_catch/169 [ 75.411162] [ 75.411356] CPU: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.412506] Hardware name: linux,dummy-virt (DT) [ 75.413105] Call trace: [ 75.413498] dump_backtrace.part.0+0xdc/0xf0 [ 75.414278] show_stack+0x18/0x30 [ 75.414941] dump_stack_lvl+0x64/0x80 [ 75.415555] print_report+0x158/0x438 [ 75.416171] kasan_report+0xb4/0xf4 [ 75.416733] __asan_load1+0x68/0x74 [ 75.417288] vmalloc_oob+0xc0/0x310 [ 75.417931] kunit_try_run_case+0x84/0x120 [ 75.418595] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.419334] kthread+0x180/0x190 [ 75.419680] ret_from_fork+0x10/0x20 [ 75.420030] [ 75.420212] The buggy address ffff8000080fb7f3 belongs to a vmalloc virtual mapping [ 75.421073] The buggy address belongs to the physical page: [ 75.421766] page:0000000068235c0c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a7c [ 75.423008] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 75.423898] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000 [ 75.424851] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 75.425735] page dumped because: kasan: bad access detected [ 75.426497] [ 75.426763] Memory state around the buggy address: [ 75.427570] ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.428459] ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.429171] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 75.429910] ^ [ 75.430788] ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 75.431738] ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 75.432640] ================================================================== [ 75.434063] ================================================================== [ 75.434950] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xe0/0x310 [ 75.435628] Read of size 1 at addr ffff8000080fb7f8 by task kunit_try_catch/169 [ 75.436242] [ 75.436449] CPU: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.437100] Hardware name: linux,dummy-virt (DT) [ 75.437566] Call trace: [ 75.437834] dump_backtrace.part.0+0xdc/0xf0 [ 75.438539] show_stack+0x18/0x30 [ 75.438970] dump_stack_lvl+0x64/0x80 [ 75.439412] print_report+0x158/0x438 [ 75.439883] kasan_report+0xb4/0xf4 [ 75.440280] __asan_load1+0x68/0x74 [ 75.440681] vmalloc_oob+0xe0/0x310 [ 75.441066] kunit_try_run_case+0x84/0x120 [ 75.441546] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.442095] kthread+0x180/0x190 [ 75.442524] ret_from_fork+0x10/0x20 [ 75.443130] [ 75.443321] The buggy address ffff8000080fb7f8 belongs to a vmalloc virtual mapping [ 75.443806] The buggy address belongs to the physical page: [ 75.444164] page:0000000068235c0c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a7c [ 75.444747] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 75.445242] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000 [ 75.446323] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 75.447286] page dumped because: kasan: bad access detected [ 75.447966] [ 75.448237] Memory state around the buggy address: [ 75.448863] ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.449738] ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.450762] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 75.451607] ^ [ 75.452455] ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 75.453321] ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 75.454914] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree
[ 75.367597] ================================================================== [ 75.368147] BUG: KASAN: double-free in kfree+0x58/0x80 [ 75.368844] Free of addr ffff0000c5938e00 by task kunit_try_catch/167 [ 75.369327] [ 75.369589] CPU: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.370378] Hardware name: linux,dummy-virt (DT) [ 75.370793] Call trace: [ 75.371061] dump_backtrace.part.0+0xdc/0xf0 [ 75.371591] show_stack+0x18/0x30 [ 75.372017] dump_stack_lvl+0x64/0x80 [ 75.372510] print_report+0x158/0x438 [ 75.372916] kasan_report_invalid_free+0x9c/0xc0 [ 75.373384] __kasan_slab_free+0x118/0x150 [ 75.374457] __kmem_cache_free+0x130/0x2a4 [ 75.375070] kfree+0x58/0x80 [ 75.375786] kfree_sensitive+0x24/0x5c [ 75.376213] kmalloc_double_kzfree+0xc4/0x1d0 [ 75.376720] kunit_try_run_case+0x84/0x120 [ 75.377178] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.377749] kthread+0x180/0x190 [ 75.378135] ret_from_fork+0x10/0x20 [ 75.378568] [ 75.378748] Allocated by task 167: [ 75.379114] kasan_save_stack+0x3c/0x70 [ 75.379513] kasan_set_track+0x2c/0x40 [ 75.379944] kasan_save_alloc_info+0x24/0x34 [ 75.380432] __kasan_kmalloc+0xb8/0xc0 [ 75.380833] kmalloc_trace+0x58/0x6c [ 75.381254] kmalloc_double_kzfree+0x94/0x1d0 [ 75.381725] kunit_try_run_case+0x84/0x120 [ 75.382937] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.383515] kthread+0x180/0x190 [ 75.383876] ret_from_fork+0x10/0x20 [ 75.384307] [ 75.384495] Freed by task 167: [ 75.384830] kasan_save_stack+0x3c/0x70 [ 75.385211] kasan_set_track+0x2c/0x40 [ 75.385660] kasan_save_free_info+0x38/0x5c [ 75.386087] __kasan_slab_free+0xe4/0x150 [ 75.386532] __kmem_cache_free+0x130/0x2a4 [ 75.387017] kfree+0x58/0x80 [ 75.387374] kfree_sensitive+0x4c/0x5c [ 75.387828] kmalloc_double_kzfree+0xb4/0x1d0 [ 75.388283] kunit_try_run_case+0x84/0x120 [ 75.388756] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.389290] kthread+0x180/0x190 [ 75.389679] ret_from_fork+0x10/0x20 [ 75.390086] [ 75.390274] The buggy address belongs to the object at ffff0000c5938e00 [ 75.390274] which belongs to the cache kmalloc-128 of size 128 [ 75.391207] The buggy address is located 0 bytes inside of [ 75.391207] 128-byte region [ffff0000c5938e00, ffff0000c5938e80) [ 75.392083] [ 75.392282] The buggy address belongs to the physical page: [ 75.393457] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938 [ 75.394065] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.394624] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.395636] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.396255] page dumped because: kasan: bad access detected [ 75.396810] [ 75.397123] Memory state around the buggy address: [ 75.397643] ffff0000c5938d00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.398951] ffff0000c5938d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.399629] >ffff0000c5938e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.400277] ^ [ 75.400702] ffff0000c5938e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.401383] ffff0000c5938f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.402019] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kfree_sensitive
[ 75.326116] ================================================================== [ 75.327374] BUG: KASAN: use-after-free in kfree_sensitive+0x18/0x5c [ 75.328032] Read of size 1 at addr ffff0000c5938e00 by task kunit_try_catch/167 [ 75.328733] [ 75.329029] CPU: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.329855] Hardware name: linux,dummy-virt (DT) [ 75.330320] Call trace: [ 75.330637] dump_backtrace.part.0+0xdc/0xf0 [ 75.331155] show_stack+0x18/0x30 [ 75.331750] dump_stack_lvl+0x64/0x80 [ 75.332348] print_report+0x158/0x438 [ 75.332965] kasan_report+0xb4/0xf4 [ 75.333420] __kasan_check_byte+0x54/0x70 [ 75.334795] ksize+0x3c/0x94 [ 75.335281] kfree_sensitive+0x18/0x5c [ 75.335673] kmalloc_double_kzfree+0xc4/0x1d0 [ 75.336082] kunit_try_run_case+0x84/0x120 [ 75.336482] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.336951] kthread+0x180/0x190 [ 75.337271] ret_from_fork+0x10/0x20 [ 75.338053] [ 75.338246] Allocated by task 167: [ 75.338534] kasan_save_stack+0x3c/0x70 [ 75.338889] kasan_set_track+0x2c/0x40 [ 75.339225] kasan_save_alloc_info+0x24/0x34 [ 75.341016] __kasan_kmalloc+0xb8/0xc0 [ 75.341737] kmalloc_trace+0x58/0x6c [ 75.343082] kmalloc_double_kzfree+0x94/0x1d0 [ 75.344123] kunit_try_run_case+0x84/0x120 [ 75.345198] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.347550] kthread+0x180/0x190 [ 75.348469] ret_from_fork+0x10/0x20 [ 75.348863] [ 75.349046] Freed by task 167: [ 75.349671] kasan_save_stack+0x3c/0x70 [ 75.350187] kasan_set_track+0x2c/0x40 [ 75.351216] kasan_save_free_info+0x38/0x5c [ 75.351706] __kasan_slab_free+0xe4/0x150 [ 75.352138] __kmem_cache_free+0x130/0x2a4 [ 75.352623] kfree+0x58/0x80 [ 75.353012] kfree_sensitive+0x4c/0x5c [ 75.353419] kmalloc_double_kzfree+0xb4/0x1d0 [ 75.353880] kunit_try_run_case+0x84/0x120 [ 75.354342] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.354866] kthread+0x180/0x190 [ 75.355235] ret_from_fork+0x10/0x20 [ 75.355676] [ 75.355871] The buggy address belongs to the object at ffff0000c5938e00 [ 75.355871] which belongs to the cache kmalloc-128 of size 128 [ 75.356769] The buggy address is located 0 bytes inside of [ 75.356769] 128-byte region [ffff0000c5938e00, ffff0000c5938e80) [ 75.357662] [ 75.357869] The buggy address belongs to the physical page: [ 75.358326] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938 [ 75.359071] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.360298] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.360978] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.361476] page dumped because: kasan: bad access detected [ 75.361994] [ 75.362257] Memory state around the buggy address: [ 75.362759] ffff0000c5938d00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.363387] ffff0000c5938d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.364007] >ffff0000c5938e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.364556] ^ [ 75.364895] ffff0000c5938e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.365362] ffff0000c5938f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.366709] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 75.168600] ================================================================== [ 75.169128] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x130/0x760 [ 75.170032] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 75.171317] [ 75.171563] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.172257] Hardware name: linux,dummy-virt (DT) [ 75.172670] Call trace: [ 75.172925] dump_backtrace.part.0+0xdc/0xf0 [ 75.173418] show_stack+0x18/0x30 [ 75.173826] dump_stack_lvl+0x64/0x80 [ 75.174218] print_report+0x158/0x438 [ 75.174679] kasan_report+0xb4/0xf4 [ 75.175060] kasan_check_range+0xe4/0x190 [ 75.175512] __kasan_check_write+0x28/0x3c [ 75.175967] kasan_bitops_test_and_modify.constprop.0+0x130/0x760 [ 75.176561] kasan_bitops_generic+0xb8/0x13c [ 75.177037] kunit_try_run_case+0x84/0x120 [ 75.177497] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.178011] kthread+0x180/0x190 [ 75.178379] ret_from_fork+0x10/0x20 [ 75.178792] [ 75.178993] Allocated by task 165: [ 75.179323] kasan_save_stack+0x3c/0x70 [ 75.179760] kasan_set_track+0x2c/0x40 [ 75.180180] kasan_save_alloc_info+0x24/0x34 [ 75.180665] __kasan_kmalloc+0xb8/0xc0 [ 75.181055] kmalloc_trace+0x58/0x6c [ 75.181474] kasan_bitops_generic+0x90/0x13c [ 75.181914] kunit_try_run_case+0x84/0x120 [ 75.182354] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.182901] kthread+0x180/0x190 [ 75.183251] ret_from_fork+0x10/0x20 [ 75.183704] [ 75.183881] The buggy address belongs to the object at ffff0000c5840b00 [ 75.183881] which belongs to the cache kmalloc-128 of size 128 [ 75.184796] The buggy address is located 8 bytes inside of [ 75.184796] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 75.185666] [ 75.185854] The buggy address belongs to the physical page: [ 75.186310] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 75.187084] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.187744] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.188378] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.188982] page dumped because: kasan: bad access detected [ 75.189430] [ 75.189618] Memory state around the buggy address: [ 75.190015] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.190633] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.191219] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.191809] ^ [ 75.192158] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.192775] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.193344] ================================================================== [ 75.219513] ================================================================== [ 75.220040] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x188/0x760 [ 75.220882] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 75.221502] [ 75.221714] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.222450] Hardware name: linux,dummy-virt (DT) [ 75.222880] Call trace: [ 75.223100] dump_backtrace.part.0+0xdc/0xf0 [ 75.223648] show_stack+0x18/0x30 [ 75.224062] dump_stack_lvl+0x64/0x80 [ 75.224519] print_report+0x158/0x438 [ 75.224984] kasan_report+0xb4/0xf4 [ 75.225401] kasan_check_range+0xe4/0x190 [ 75.225886] __kasan_check_write+0x28/0x3c [ 75.226332] kasan_bitops_test_and_modify.constprop.0+0x188/0x760 [ 75.226948] kasan_bitops_generic+0xb8/0x13c [ 75.227435] kunit_try_run_case+0x84/0x120 [ 75.227910] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.228472] kthread+0x180/0x190 [ 75.228847] ret_from_fork+0x10/0x20 [ 75.229262] [ 75.229477] Allocated by task 165: [ 75.229772] kasan_save_stack+0x3c/0x70 [ 75.230216] kasan_set_track+0x2c/0x40 [ 75.230642] kasan_save_alloc_info+0x24/0x34 [ 75.231101] __kasan_kmalloc+0xb8/0xc0 [ 75.231515] kmalloc_trace+0x58/0x6c [ 75.231929] kasan_bitops_generic+0x90/0x13c [ 75.232381] kunit_try_run_case+0x84/0x120 [ 75.232843] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.233389] kthread+0x180/0x190 [ 75.233769] ret_from_fork+0x10/0x20 [ 75.234176] [ 75.234358] The buggy address belongs to the object at ffff0000c5840b00 [ 75.234358] which belongs to the cache kmalloc-128 of size 128 [ 75.235284] The buggy address is located 8 bytes inside of [ 75.235284] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 75.236152] [ 75.236338] The buggy address belongs to the physical page: [ 75.236820] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 75.237588] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.238232] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.238870] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.239483] page dumped because: kasan: bad access detected [ 75.239946] [ 75.240138] Memory state around the buggy address: [ 75.240567] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.241154] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.241745] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.242317] ^ [ 75.242653] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.243265] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.243882] ================================================================== [ 75.245017] ================================================================== [ 75.245597] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1b4/0x760 [ 75.246451] Read of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 75.246989] [ 75.247224] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.247928] Hardware name: linux,dummy-virt (DT) [ 75.248341] Call trace: [ 75.248599] dump_backtrace.part.0+0xdc/0xf0 [ 75.249154] show_stack+0x18/0x30 [ 75.249582] dump_stack_lvl+0x64/0x80 [ 75.249963] print_report+0x158/0x438 [ 75.250401] kasan_report+0xb4/0xf4 [ 75.250794] __asan_load8+0x80/0xac [ 75.251184] kasan_bitops_test_and_modify.constprop.0+0x1b4/0x760 [ 75.251771] kasan_bitops_generic+0xb8/0x13c [ 75.252224] kunit_try_run_case+0x84/0x120 [ 75.252692] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.253218] kthread+0x180/0x190 [ 75.253611] ret_from_fork+0x10/0x20 [ 75.254017] [ 75.254190] Allocated by task 165: [ 75.254553] kasan_save_stack+0x3c/0x70 [ 75.254973] kasan_set_track+0x2c/0x40 [ 75.255361] kasan_save_alloc_info+0x24/0x34 [ 75.255826] __kasan_kmalloc+0xb8/0xc0 [ 75.256210] kmalloc_trace+0x58/0x6c [ 75.256626] kasan_bitops_generic+0x90/0x13c [ 75.257107] kunit_try_run_case+0x84/0x120 [ 75.257550] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.258064] kthread+0x180/0x190 [ 75.258438] ret_from_fork+0x10/0x20 [ 75.258837] [ 75.259022] The buggy address belongs to the object at ffff0000c5840b00 [ 75.259022] which belongs to the cache kmalloc-128 of size 128 [ 75.259915] The buggy address is located 8 bytes inside of [ 75.259915] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 75.260767] [ 75.260962] The buggy address belongs to the physical page: [ 75.261402] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 75.262122] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.262771] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.263374] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.263987] page dumped because: kasan: bad access detected [ 75.264439] [ 75.264624] Memory state around the buggy address: [ 75.265034] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.265637] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.266189] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.266786] ^ [ 75.267127] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.267759] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.268333] ================================================================== [ 75.293915] ================================================================== [ 75.294496] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x208/0x760 [ 75.295271] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 75.295889] [ 75.296080] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.296751] Hardware name: linux,dummy-virt (DT) [ 75.297169] Call trace: [ 75.297450] dump_backtrace.part.0+0xdc/0xf0 [ 75.297991] show_stack+0x18/0x30 [ 75.298440] dump_stack_lvl+0x64/0x80 [ 75.298867] print_report+0x158/0x438 [ 75.299283] kasan_report+0xb4/0xf4 [ 75.299681] kasan_check_range+0xe4/0x190 [ 75.300116] __kasan_check_write+0x28/0x3c [ 75.300566] kasan_bitops_test_and_modify.constprop.0+0x208/0x760 [ 75.301162] kasan_bitops_generic+0xb8/0x13c [ 75.301656] kunit_try_run_case+0x84/0x120 [ 75.302080] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.302626] kthread+0x180/0x190 [ 75.302999] ret_from_fork+0x10/0x20 [ 75.303405] [ 75.303598] Allocated by task 165: [ 75.303937] kasan_save_stack+0x3c/0x70 [ 75.304354] kasan_set_track+0x2c/0x40 [ 75.304771] kasan_save_alloc_info+0x24/0x34 [ 75.305227] __kasan_kmalloc+0xb8/0xc0 [ 75.305643] kmalloc_trace+0x58/0x6c [ 75.306044] kasan_bitops_generic+0x90/0x13c [ 75.306505] kunit_try_run_case+0x84/0x120 [ 75.306948] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.307471] kthread+0x180/0x190 [ 75.307852] ret_from_fork+0x10/0x20 [ 75.308258] [ 75.308468] The buggy address belongs to the object at ffff0000c5840b00 [ 75.308468] which belongs to the cache kmalloc-128 of size 128 [ 75.309361] The buggy address is located 8 bytes inside of [ 75.309361] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 75.310228] [ 75.310462] The buggy address belongs to the physical page: [ 75.310890] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 75.311658] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.312311] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.312963] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.313580] page dumped because: kasan: bad access detected [ 75.314034] [ 75.314229] Memory state around the buggy address: [ 75.314675] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.315235] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.315862] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.316444] ^ [ 75.316796] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.317412] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.317976] ================================================================== [ 75.140836] ================================================================== [ 75.141361] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xf8/0x760 [ 75.142266] Read of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 75.142955] [ 75.143185] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.143935] Hardware name: linux,dummy-virt (DT) [ 75.144344] Call trace: [ 75.144607] dump_backtrace.part.0+0xdc/0xf0 [ 75.145117] show_stack+0x18/0x30 [ 75.145588] dump_stack_lvl+0x64/0x80 [ 75.146797] print_report+0x158/0x438 [ 75.147219] kasan_report+0xb4/0xf4 [ 75.147644] __asan_load8+0x80/0xac [ 75.148042] kasan_bitops_test_and_modify.constprop.0+0xf8/0x760 [ 75.148694] kasan_bitops_generic+0xb8/0x13c [ 75.149170] kunit_try_run_case+0x84/0x120 [ 75.149634] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.150359] kthread+0x180/0x190 [ 75.150756] ret_from_fork+0x10/0x20 [ 75.151147] [ 75.151317] Allocated by task 165: [ 75.151674] kasan_save_stack+0x3c/0x70 [ 75.152076] kasan_set_track+0x2c/0x40 [ 75.152609] kasan_save_alloc_info+0x24/0x34 [ 75.153090] __kasan_kmalloc+0xb8/0xc0 [ 75.153501] kmalloc_trace+0x58/0x6c [ 75.154457] kasan_bitops_generic+0x90/0x13c [ 75.154960] kunit_try_run_case+0x84/0x120 [ 75.155421] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.155948] kthread+0x180/0x190 [ 75.156327] ret_from_fork+0x10/0x20 [ 75.156732] [ 75.156927] The buggy address belongs to the object at ffff0000c5840b00 [ 75.156927] which belongs to the cache kmalloc-128 of size 128 [ 75.158154] The buggy address is located 8 bytes inside of [ 75.158154] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 75.159040] [ 75.159245] The buggy address belongs to the physical page: [ 75.159688] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 75.160451] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.161116] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.162371] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.162973] page dumped because: kasan: bad access detected [ 75.163470] [ 75.163663] Memory state around the buggy address: [ 75.164060] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.164657] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.165269] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.166156] ^ [ 75.166517] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.167080] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.167696] ================================================================== [ 75.053567] ================================================================== [ 75.054173] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x9c/0x760 [ 75.055269] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 75.055839] [ 75.056072] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.056749] Hardware name: linux,dummy-virt (DT) [ 75.057134] Call trace: [ 75.057388] dump_backtrace.part.0+0xdc/0xf0 [ 75.058469] show_stack+0x18/0x30 [ 75.058906] dump_stack_lvl+0x64/0x80 [ 75.059289] print_report+0x158/0x438 [ 75.059743] kasan_report+0xb4/0xf4 [ 75.060141] kasan_check_range+0xe4/0x190 [ 75.060605] __kasan_check_write+0x28/0x3c [ 75.061063] kasan_bitops_test_and_modify.constprop.0+0x9c/0x760 [ 75.061652] kasan_bitops_generic+0xb8/0x13c [ 75.062146] kunit_try_run_case+0x84/0x120 [ 75.062591] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.063155] kthread+0x180/0x190 [ 75.063890] ret_from_fork+0x10/0x20 [ 75.064297] [ 75.064512] Allocated by task 165: [ 75.064869] kasan_save_stack+0x3c/0x70 [ 75.065279] kasan_set_track+0x2c/0x40 [ 75.065685] kasan_save_alloc_info+0x24/0x34 [ 75.066416] __kasan_kmalloc+0xb8/0xc0 [ 75.066841] kmalloc_trace+0x58/0x6c [ 75.067261] kasan_bitops_generic+0x90/0x13c [ 75.067693] kunit_try_run_case+0x84/0x120 [ 75.068190] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.068815] kthread+0x180/0x190 [ 75.069176] ret_from_fork+0x10/0x20 [ 75.069605] [ 75.069823] The buggy address belongs to the object at ffff0000c5840b00 [ 75.069823] which belongs to the cache kmalloc-128 of size 128 [ 75.071154] The buggy address is located 8 bytes inside of [ 75.071154] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 75.072115] [ 75.072335] The buggy address belongs to the physical page: [ 75.072805] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 75.073558] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.074901] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.075560] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.076218] page dumped because: kasan: bad access detected [ 75.076688] [ 75.076859] Memory state around the buggy address: [ 75.077290] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.078305] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.078911] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.079348] ^ [ 75.079998] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.081204] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.081666] ================================================================== [ 75.194690] ================================================================== [ 75.195264] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x15c/0x760 [ 75.196085] Read of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 75.196619] [ 75.196847] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.197563] Hardware name: linux,dummy-virt (DT) [ 75.197961] Call trace: [ 75.198223] dump_backtrace.part.0+0xdc/0xf0 [ 75.198765] show_stack+0x18/0x30 [ 75.199174] dump_stack_lvl+0x64/0x80 [ 75.199608] print_report+0x158/0x438 [ 75.200037] kasan_report+0xb4/0xf4 [ 75.200468] __asan_load8+0x80/0xac [ 75.200872] kasan_bitops_test_and_modify.constprop.0+0x15c/0x760 [ 75.201475] kasan_bitops_generic+0xb8/0x13c [ 75.201953] kunit_try_run_case+0x84/0x120 [ 75.202415] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.202977] kthread+0x180/0x190 [ 75.203356] ret_from_fork+0x10/0x20 [ 75.203778] [ 75.203958] Allocated by task 165: [ 75.204281] kasan_save_stack+0x3c/0x70 [ 75.204698] kasan_set_track+0x2c/0x40 [ 75.205100] kasan_save_alloc_info+0x24/0x34 [ 75.205587] __kasan_kmalloc+0xb8/0xc0 [ 75.205991] kmalloc_trace+0x58/0x6c [ 75.206422] kasan_bitops_generic+0x90/0x13c [ 75.207035] kunit_try_run_case+0x84/0x120 [ 75.207482] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.208050] kthread+0x180/0x190 [ 75.208447] ret_from_fork+0x10/0x20 [ 75.208871] [ 75.209096] The buggy address belongs to the object at ffff0000c5840b00 [ 75.209096] which belongs to the cache kmalloc-128 of size 128 [ 75.210009] The buggy address is located 8 bytes inside of [ 75.210009] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 75.210900] [ 75.211084] The buggy address belongs to the physical page: [ 75.211566] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 75.212304] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.212958] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.213621] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.214224] page dumped because: kasan: bad access detected [ 75.214695] [ 75.214890] Memory state around the buggy address: [ 75.215305] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.215920] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.216514] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.217114] ^ [ 75.217463] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.218078] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.218646] ================================================================== [ 75.269352] ================================================================== [ 75.269881] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1dc/0x760 [ 75.270698] Read of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 75.271240] [ 75.271494] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.272209] Hardware name: linux,dummy-virt (DT) [ 75.272644] Call trace: [ 75.272900] dump_backtrace.part.0+0xdc/0xf0 [ 75.273410] show_stack+0x18/0x30 [ 75.273830] dump_stack_lvl+0x64/0x80 [ 75.274240] print_report+0x158/0x438 [ 75.274653] kasan_report+0xb4/0xf4 [ 75.275044] __asan_load8+0x80/0xac [ 75.275445] kasan_bitops_test_and_modify.constprop.0+0x1dc/0x760 [ 75.276029] kasan_bitops_generic+0xb8/0x13c [ 75.276489] kunit_try_run_case+0x84/0x120 [ 75.276958] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.277480] kthread+0x180/0x190 [ 75.277845] ret_from_fork+0x10/0x20 [ 75.278243] [ 75.278433] Allocated by task 165: [ 75.278768] kasan_save_stack+0x3c/0x70 [ 75.279192] kasan_set_track+0x2c/0x40 [ 75.279616] kasan_save_alloc_info+0x24/0x34 [ 75.280069] __kasan_kmalloc+0xb8/0xc0 [ 75.280465] kmalloc_trace+0x58/0x6c [ 75.280878] kasan_bitops_generic+0x90/0x13c [ 75.281357] kunit_try_run_case+0x84/0x120 [ 75.281819] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.282329] kthread+0x180/0x190 [ 75.282719] ret_from_fork+0x10/0x20 [ 75.283125] [ 75.283301] The buggy address belongs to the object at ffff0000c5840b00 [ 75.283301] which belongs to the cache kmalloc-128 of size 128 [ 75.284233] The buggy address is located 8 bytes inside of [ 75.284233] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 75.285090] [ 75.285293] The buggy address belongs to the physical page: [ 75.285744] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 75.286486] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.287132] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.287782] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.288374] page dumped because: kasan: bad access detected [ 75.288820] [ 75.289013] Memory state around the buggy address: [ 75.289454] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.290043] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.290626] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.291180] ^ [ 75.291512] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.292116] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.292681] ================================================================== [ 75.082331] ================================================================== [ 75.082925] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xc4/0x760 [ 75.083614] Read of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 75.086014] [ 75.086293] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.086860] Hardware name: linux,dummy-virt (DT) [ 75.087182] Call trace: [ 75.087410] dump_backtrace.part.0+0xdc/0xf0 [ 75.088017] show_stack+0x18/0x30 [ 75.088577] dump_stack_lvl+0x64/0x80 [ 75.089046] print_report+0x158/0x438 [ 75.089706] kasan_report+0xb4/0xf4 [ 75.090280] __asan_load8+0x80/0xac [ 75.090830] kasan_bitops_test_and_modify.constprop.0+0xc4/0x760 [ 75.091565] kasan_bitops_generic+0xb8/0x13c [ 75.092137] kunit_try_run_case+0x84/0x120 [ 75.092597] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.093140] kthread+0x180/0x190 [ 75.093545] ret_from_fork+0x10/0x20 [ 75.094204] [ 75.094442] Allocated by task 165: [ 75.094898] kasan_save_stack+0x3c/0x70 [ 75.095340] kasan_set_track+0x2c/0x40 [ 75.095796] kasan_save_alloc_info+0x24/0x34 [ 75.096292] __kasan_kmalloc+0xb8/0xc0 [ 75.096729] kmalloc_trace+0x58/0x6c [ 75.097166] kasan_bitops_generic+0x90/0x13c [ 75.097629] kunit_try_run_case+0x84/0x120 [ 75.098637] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.099185] kthread+0x180/0x190 [ 75.099613] ret_from_fork+0x10/0x20 [ 75.100024] [ 75.100246] The buggy address belongs to the object at ffff0000c5840b00 [ 75.100246] which belongs to the cache kmalloc-128 of size 128 [ 75.101245] The buggy address is located 8 bytes inside of [ 75.101245] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 75.102465] [ 75.102714] The buggy address belongs to the physical page: [ 75.103203] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 75.104032] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.104725] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.105237] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.106429] page dumped because: kasan: bad access detected [ 75.106935] [ 75.107148] Memory state around the buggy address: [ 75.107609] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.108218] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.108861] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.109474] ^ [ 75.110208] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.110851] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.111458] ================================================================== [ 75.112420] ================================================================== [ 75.112956] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xf0/0x760 [ 75.113705] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 75.114857] [ 75.115052] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.115791] Hardware name: linux,dummy-virt (DT) [ 75.116187] Call trace: [ 75.116441] dump_backtrace.part.0+0xdc/0xf0 [ 75.116963] show_stack+0x18/0x30 [ 75.117348] dump_stack_lvl+0x64/0x80 [ 75.117827] print_report+0x158/0x438 [ 75.118256] kasan_report+0xb4/0xf4 [ 75.119030] kasan_check_range+0xe4/0x190 [ 75.119490] __kasan_check_write+0x28/0x3c [ 75.119960] kasan_bitops_test_and_modify.constprop.0+0xf0/0x760 [ 75.120550] kasan_bitops_generic+0xb8/0x13c [ 75.121006] kunit_try_run_case+0x84/0x120 [ 75.121472] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.122650] kthread+0x180/0x190 [ 75.123052] ret_from_fork+0x10/0x20 [ 75.123494] [ 75.123685] Allocated by task 165: [ 75.124043] kasan_save_stack+0x3c/0x70 [ 75.124478] kasan_set_track+0x2c/0x40 [ 75.124882] kasan_save_alloc_info+0x24/0x34 [ 75.125326] __kasan_kmalloc+0xb8/0xc0 [ 75.125932] kmalloc_trace+0x58/0x6c [ 75.126335] kasan_bitops_generic+0x90/0x13c [ 75.126828] kunit_try_run_case+0x84/0x120 [ 75.127282] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.127857] kthread+0x180/0x190 [ 75.128422] ret_from_fork+0x10/0x20 [ 75.128842] [ 75.129021] The buggy address belongs to the object at ffff0000c5840b00 [ 75.129021] which belongs to the cache kmalloc-128 of size 128 [ 75.130494] The buggy address is located 8 bytes inside of [ 75.130494] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 75.131372] [ 75.131575] The buggy address belongs to the physical page: [ 75.131992] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 75.132788] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.133430] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.134344] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.134995] page dumped because: kasan: bad access detected [ 75.135472] [ 75.135675] Memory state around the buggy address: [ 75.136083] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.136705] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.137294] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.138473] ^ [ 75.138842] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.139405] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.140004] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 74.882452] ================================================================== [ 74.882994] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x148/0x684 [ 74.884043] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 74.884604] [ 74.884859] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.885620] Hardware name: linux,dummy-virt (DT) [ 74.886246] Call trace: [ 74.886630] dump_backtrace.part.0+0xdc/0xf0 [ 74.887519] show_stack+0x18/0x30 [ 74.887945] dump_stack_lvl+0x64/0x80 [ 74.888355] print_report+0x158/0x438 [ 74.888823] kasan_report+0xb4/0xf4 [ 74.889197] kasan_check_range+0xe4/0x190 [ 74.889674] __kasan_check_write+0x28/0x3c [ 74.890161] kasan_bitops_modify.constprop.0+0x148/0x684 [ 74.891351] kasan_bitops_generic+0xac/0x13c [ 74.891863] kunit_try_run_case+0x84/0x120 [ 74.892364] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.892952] kthread+0x180/0x190 [ 74.893339] ret_from_fork+0x10/0x20 [ 74.893737] [ 74.893978] Allocated by task 165: [ 74.894656] kasan_save_stack+0x3c/0x70 [ 74.895099] kasan_set_track+0x2c/0x40 [ 74.895510] kasan_save_alloc_info+0x24/0x34 [ 74.896033] __kasan_kmalloc+0xb8/0xc0 [ 74.896423] kmalloc_trace+0x58/0x6c [ 74.896868] kasan_bitops_generic+0x90/0x13c [ 74.897359] kunit_try_run_case+0x84/0x120 [ 74.897992] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.898572] kthread+0x180/0x190 [ 74.899403] ret_from_fork+0x10/0x20 [ 74.899842] [ 74.900044] The buggy address belongs to the object at ffff0000c5840b00 [ 74.900044] which belongs to the cache kmalloc-128 of size 128 [ 74.901000] The buggy address is located 8 bytes inside of [ 74.901000] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 74.902152] [ 74.902368] The buggy address belongs to the physical page: [ 74.902953] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 74.903738] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.904423] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.905105] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.905733] page dumped because: kasan: bad access detected [ 74.906762] [ 74.906976] Memory state around the buggy address: [ 74.907421] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.908060] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.908660] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.909256] ^ [ 74.909641] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.910272] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.911169] ================================================================== [ 74.851621] ================================================================== [ 74.852081] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x11c/0x684 [ 74.852873] Read of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 74.853500] [ 74.853692] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.854739] Hardware name: linux,dummy-virt (DT) [ 74.855326] Call trace: [ 74.855727] dump_backtrace.part.0+0xdc/0xf0 [ 74.856417] show_stack+0x18/0x30 [ 74.857032] dump_stack_lvl+0x64/0x80 [ 74.857447] print_report+0x158/0x438 [ 74.857900] kasan_report+0xb4/0xf4 [ 74.858365] __asan_load8+0x80/0xac [ 74.858852] kasan_bitops_modify.constprop.0+0x11c/0x684 [ 74.859454] kasan_bitops_generic+0xac/0x13c [ 74.860048] kunit_try_run_case+0x84/0x120 [ 74.860606] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.861299] kthread+0x180/0x190 [ 74.861947] ret_from_fork+0x10/0x20 [ 74.862623] [ 74.862919] Allocated by task 165: [ 74.863405] kasan_save_stack+0x3c/0x70 [ 74.863879] kasan_set_track+0x2c/0x40 [ 74.864212] kasan_save_alloc_info+0x24/0x34 [ 74.864882] __kasan_kmalloc+0xb8/0xc0 [ 74.865466] kmalloc_trace+0x58/0x6c [ 74.866228] kasan_bitops_generic+0x90/0x13c [ 74.867332] kunit_try_run_case+0x84/0x120 [ 74.867983] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.868773] kthread+0x180/0x190 [ 74.869287] ret_from_fork+0x10/0x20 [ 74.869725] [ 74.870057] The buggy address belongs to the object at ffff0000c5840b00 [ 74.870057] which belongs to the cache kmalloc-128 of size 128 [ 74.871074] The buggy address is located 8 bytes inside of [ 74.871074] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 74.872017] [ 74.872255] The buggy address belongs to the physical page: [ 74.872738] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 74.873527] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.874352] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.874991] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.875592] page dumped because: kasan: bad access detected [ 74.876055] [ 74.876265] Memory state around the buggy address: [ 74.877159] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.877808] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.878737] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.879293] ^ [ 74.879685] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.880353] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.880967] ================================================================== [ 74.912145] ================================================================== [ 74.912935] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x178/0x684 [ 74.913903] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 74.915053] [ 74.915287] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.916010] Hardware name: linux,dummy-virt (DT) [ 74.916445] Call trace: [ 74.916756] dump_backtrace.part.0+0xdc/0xf0 [ 74.917311] show_stack+0x18/0x30 [ 74.917764] dump_stack_lvl+0x64/0x80 [ 74.918211] print_report+0x158/0x438 [ 74.918955] kasan_report+0xb4/0xf4 [ 74.919366] kasan_check_range+0xe4/0x190 [ 74.919842] __kasan_check_write+0x28/0x3c [ 74.920330] kasan_bitops_modify.constprop.0+0x178/0x684 [ 74.920912] kasan_bitops_generic+0xac/0x13c [ 74.921434] kunit_try_run_case+0x84/0x120 [ 74.922139] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.922708] kthread+0x180/0x190 [ 74.923579] ret_from_fork+0x10/0x20 [ 74.924015] [ 74.924236] Allocated by task 165: [ 74.924555] kasan_save_stack+0x3c/0x70 [ 74.924992] kasan_set_track+0x2c/0x40 [ 74.925417] kasan_save_alloc_info+0x24/0x34 [ 74.926059] __kasan_kmalloc+0xb8/0xc0 [ 74.926762] kmalloc_trace+0x58/0x6c [ 74.927224] kasan_bitops_generic+0x90/0x13c [ 74.927739] kunit_try_run_case+0x84/0x120 [ 74.928259] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.928812] kthread+0x180/0x190 [ 74.929200] ret_from_fork+0x10/0x20 [ 74.929595] [ 74.930361] The buggy address belongs to the object at ffff0000c5840b00 [ 74.930361] which belongs to the cache kmalloc-128 of size 128 [ 74.931317] The buggy address is located 8 bytes inside of [ 74.931317] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 74.932219] [ 74.932425] The buggy address belongs to the physical page: [ 74.932907] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 74.933672] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.934350] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.935026] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.935653] page dumped because: kasan: bad access detected [ 74.936123] [ 74.936299] Memory state around the buggy address: [ 74.936758] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.937347] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.938661] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.939239] ^ [ 74.939621] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.940197] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.940802] ================================================================== [ 74.746964] ================================================================== [ 74.747776] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x9c/0x684 [ 74.748602] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 74.749187] [ 74.749415] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.750191] Hardware name: linux,dummy-virt (DT) [ 74.750648] Call trace: [ 74.751089] dump_backtrace.part.0+0xdc/0xf0 [ 74.751579] show_stack+0x18/0x30 [ 74.752140] dump_stack_lvl+0x64/0x80 [ 74.752508] print_report+0x158/0x438 [ 74.752884] kasan_report+0xb4/0xf4 [ 74.753209] kasan_check_range+0xe4/0x190 [ 74.753587] __kasan_check_write+0x28/0x3c [ 74.753964] kasan_bitops_modify.constprop.0+0x9c/0x684 [ 74.754748] kasan_bitops_generic+0xac/0x13c [ 74.755699] kunit_try_run_case+0x84/0x120 [ 74.756596] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.757565] kthread+0x180/0x190 [ 74.758339] ret_from_fork+0x10/0x20 [ 74.759094] [ 74.759497] Allocated by task 165: [ 74.760137] kasan_save_stack+0x3c/0x70 [ 74.760963] kasan_set_track+0x2c/0x40 [ 74.761610] kasan_save_alloc_info+0x24/0x34 [ 74.762573] __kasan_kmalloc+0xb8/0xc0 [ 74.763484] kmalloc_trace+0x58/0x6c [ 74.764151] kasan_bitops_generic+0x90/0x13c [ 74.764990] kunit_try_run_case+0x84/0x120 [ 74.765864] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.766861] kthread+0x180/0x190 [ 74.767582] ret_from_fork+0x10/0x20 [ 74.768378] [ 74.768711] The buggy address belongs to the object at ffff0000c5840b00 [ 74.768711] which belongs to the cache kmalloc-128 of size 128 [ 74.770521] The buggy address is located 8 bytes inside of [ 74.770521] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 74.772341] [ 74.772789] The buggy address belongs to the physical page: [ 74.773663] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 74.775218] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.776316] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.777501] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.778765] page dumped because: kasan: bad access detected [ 74.779718] [ 74.780123] Memory state around the buggy address: [ 74.780794] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.781286] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.781925] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.782478] ^ [ 74.782829] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.783430] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.784015] ================================================================== [ 74.784867] ================================================================== [ 74.785383] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xc4/0x684 [ 74.786355] Read of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 74.786968] [ 74.787186] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.787890] Hardware name: linux,dummy-virt (DT) [ 74.788308] Call trace: [ 74.788968] dump_backtrace.part.0+0xdc/0xf0 [ 74.789500] show_stack+0x18/0x30 [ 74.790199] dump_stack_lvl+0x64/0x80 [ 74.790654] print_report+0x158/0x438 [ 74.791068] kasan_report+0xb4/0xf4 [ 74.791460] __asan_load8+0x80/0xac [ 74.791872] kasan_bitops_modify.constprop.0+0xc4/0x684 [ 74.792459] kasan_bitops_generic+0xac/0x13c [ 74.792910] kunit_try_run_case+0x84/0x120 [ 74.793356] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.794408] kthread+0x180/0x190 [ 74.794784] ret_from_fork+0x10/0x20 [ 74.795243] [ 74.795460] Allocated by task 165: [ 74.795799] kasan_save_stack+0x3c/0x70 [ 74.796225] kasan_set_track+0x2c/0x40 [ 74.796662] kasan_save_alloc_info+0x24/0x34 [ 74.797128] __kasan_kmalloc+0xb8/0xc0 [ 74.797550] kmalloc_trace+0x58/0x6c [ 74.798219] kasan_bitops_generic+0x90/0x13c [ 74.798755] kunit_try_run_case+0x84/0x120 [ 74.799212] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.799777] kthread+0x180/0x190 [ 74.800129] ret_from_fork+0x10/0x20 [ 74.800560] [ 74.800761] The buggy address belongs to the object at ffff0000c5840b00 [ 74.800761] which belongs to the cache kmalloc-128 of size 128 [ 74.801682] The buggy address is located 8 bytes inside of [ 74.801682] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 74.803111] [ 74.803290] The buggy address belongs to the physical page: [ 74.803761] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 74.804516] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.805149] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.806119] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.806723] page dumped because: kasan: bad access detected [ 74.807182] [ 74.807363] Memory state around the buggy address: [ 74.807831] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.808421] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.809021] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.809587] ^ [ 74.810480] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.811017] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.811476] ================================================================== [ 74.968739] ================================================================== [ 74.969352] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x190/0x684 [ 74.970715] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 74.971332] [ 74.971552] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.972280] Hardware name: linux,dummy-virt (DT) [ 74.972695] Call trace: [ 74.972963] dump_backtrace.part.0+0xdc/0xf0 [ 74.973480] show_stack+0x18/0x30 [ 74.974185] dump_stack_lvl+0x64/0x80 [ 74.974635] print_report+0x158/0x438 [ 74.975079] kasan_report+0xb4/0xf4 [ 74.975463] kasan_check_range+0xe4/0x190 [ 74.975922] __kasan_check_write+0x28/0x3c [ 74.976370] kasan_bitops_modify.constprop.0+0x190/0x684 [ 74.976925] kasan_bitops_generic+0xac/0x13c [ 74.977360] kunit_try_run_case+0x84/0x120 [ 74.978305] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.978866] kthread+0x180/0x190 [ 74.979241] ret_from_fork+0x10/0x20 [ 74.979695] [ 74.979874] Allocated by task 165: [ 74.980245] kasan_save_stack+0x3c/0x70 [ 74.980664] kasan_set_track+0x2c/0x40 [ 74.981077] kasan_save_alloc_info+0x24/0x34 [ 74.981562] __kasan_kmalloc+0xb8/0xc0 [ 74.982030] kmalloc_trace+0x58/0x6c [ 74.982466] kasan_bitops_generic+0x90/0x13c [ 74.982914] kunit_try_run_case+0x84/0x120 [ 74.983376] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.983898] kthread+0x180/0x190 [ 74.984273] ret_from_fork+0x10/0x20 [ 74.985324] [ 74.985537] The buggy address belongs to the object at ffff0000c5840b00 [ 74.985537] which belongs to the cache kmalloc-128 of size 128 [ 74.986903] The buggy address is located 8 bytes inside of [ 74.986903] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 74.987786] [ 74.987977] The buggy address belongs to the physical page: [ 74.988442] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 74.989166] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.989824] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.990649] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.991248] page dumped because: kasan: bad access detected [ 74.991729] [ 74.991905] Memory state around the buggy address: [ 74.992499] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.993086] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.993676] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.994842] ^ [ 74.995191] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.995830] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.996386] ================================================================== [ 75.026704] ================================================================== [ 75.027281] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1e8/0x684 [ 75.028038] Read of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 75.028582] [ 75.028824] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.029515] Hardware name: linux,dummy-virt (DT) [ 75.030231] Call trace: [ 75.030484] dump_backtrace.part.0+0xdc/0xf0 [ 75.030995] show_stack+0x18/0x30 [ 75.031454] dump_stack_lvl+0x64/0x80 [ 75.031876] print_report+0x158/0x438 [ 75.032277] kasan_report+0xb4/0xf4 [ 75.032676] __asan_load8+0x80/0xac [ 75.033087] kasan_bitops_modify.constprop.0+0x1e8/0x684 [ 75.033668] kasan_bitops_generic+0xac/0x13c [ 75.034165] kunit_try_run_case+0x84/0x120 [ 75.035116] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.035680] kthread+0x180/0x190 [ 75.036057] ret_from_fork+0x10/0x20 [ 75.036492] [ 75.036682] Allocated by task 165: [ 75.037010] kasan_save_stack+0x3c/0x70 [ 75.037420] kasan_set_track+0x2c/0x40 [ 75.038090] kasan_save_alloc_info+0x24/0x34 [ 75.038553] __kasan_kmalloc+0xb8/0xc0 [ 75.038966] kmalloc_trace+0x58/0x6c [ 75.039345] kasan_bitops_generic+0x90/0x13c [ 75.039849] kunit_try_run_case+0x84/0x120 [ 75.040305] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.040903] kthread+0x180/0x190 [ 75.041290] ret_from_fork+0x10/0x20 [ 75.041711] [ 75.042414] The buggy address belongs to the object at ffff0000c5840b00 [ 75.042414] which belongs to the cache kmalloc-128 of size 128 [ 75.043300] The buggy address is located 8 bytes inside of [ 75.043300] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 75.044179] [ 75.044364] The buggy address belongs to the physical page: [ 75.044820] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 75.045583] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.046505] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.047160] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.047788] page dumped because: kasan: bad access detected [ 75.048242] [ 75.048437] Memory state around the buggy address: [ 75.048858] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.049455] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.050280] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.050840] ^ [ 75.051172] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.051785] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.052349] ================================================================== [ 74.812696] ================================================================== [ 74.813156] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xf0/0x684 [ 74.813897] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 74.815447] [ 74.815665] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.816211] Hardware name: linux,dummy-virt (DT) [ 74.816544] Call trace: [ 74.816771] dump_backtrace.part.0+0xdc/0xf0 [ 74.817212] show_stack+0x18/0x30 [ 74.818888] dump_stack_lvl+0x64/0x80 [ 74.819446] print_report+0x158/0x438 [ 74.819887] kasan_report+0xb4/0xf4 [ 74.820267] kasan_check_range+0xe4/0x190 [ 74.820992] __kasan_check_write+0x28/0x3c [ 74.821598] kasan_bitops_modify.constprop.0+0xf0/0x684 [ 74.822864] kasan_bitops_generic+0xac/0x13c [ 74.823617] kunit_try_run_case+0x84/0x120 [ 74.824024] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.824584] kthread+0x180/0x190 [ 74.825382] ret_from_fork+0x10/0x20 [ 74.826683] [ 74.827197] Allocated by task 165: [ 74.828073] kasan_save_stack+0x3c/0x70 [ 74.828932] kasan_set_track+0x2c/0x40 [ 74.829530] kasan_save_alloc_info+0x24/0x34 [ 74.830367] __kasan_kmalloc+0xb8/0xc0 [ 74.830962] kmalloc_trace+0x58/0x6c [ 74.831804] kasan_bitops_generic+0x90/0x13c [ 74.832564] kunit_try_run_case+0x84/0x120 [ 74.832971] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.833475] kthread+0x180/0x190 [ 74.834031] ret_from_fork+0x10/0x20 [ 74.834683] [ 74.835111] The buggy address belongs to the object at ffff0000c5840b00 [ 74.835111] which belongs to the cache kmalloc-128 of size 128 [ 74.836811] The buggy address is located 8 bytes inside of [ 74.836811] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 74.838206] [ 74.838489] The buggy address belongs to the physical page: [ 74.839258] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 74.840322] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.840867] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.841373] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.842586] page dumped because: kasan: bad access detected [ 74.843616] [ 74.843883] Memory state around the buggy address: [ 74.844749] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.845633] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.846815] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.847677] ^ [ 74.848190] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.849060] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.850487] ================================================================== [ 74.941566] ================================================================== [ 74.942154] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x180/0x684 [ 74.942957] Read of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 74.943555] [ 74.943774] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.944758] Hardware name: linux,dummy-virt (DT) [ 74.945145] Call trace: [ 74.945420] dump_backtrace.part.0+0xdc/0xf0 [ 74.946390] show_stack+0x18/0x30 [ 74.946852] dump_stack_lvl+0x64/0x80 [ 74.947270] print_report+0x158/0x438 [ 74.947716] kasan_report+0xb4/0xf4 [ 74.948111] __asan_load8+0x80/0xac [ 74.948523] kasan_bitops_modify.constprop.0+0x180/0x684 [ 74.949069] kasan_bitops_generic+0xac/0x13c [ 74.949532] kunit_try_run_case+0x84/0x120 [ 74.950064] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.950606] kthread+0x180/0x190 [ 74.950987] ret_from_fork+0x10/0x20 [ 74.951405] [ 74.951590] Allocated by task 165: [ 74.951912] kasan_save_stack+0x3c/0x70 [ 74.952338] kasan_set_track+0x2c/0x40 [ 74.953028] kasan_save_alloc_info+0x24/0x34 [ 74.953468] __kasan_kmalloc+0xb8/0xc0 [ 74.954390] kmalloc_trace+0x58/0x6c [ 74.954819] kasan_bitops_generic+0x90/0x13c [ 74.955292] kunit_try_run_case+0x84/0x120 [ 74.955760] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.956268] kthread+0x180/0x190 [ 74.956650] ret_from_fork+0x10/0x20 [ 74.957062] [ 74.957244] The buggy address belongs to the object at ffff0000c5840b00 [ 74.957244] which belongs to the cache kmalloc-128 of size 128 [ 74.958536] The buggy address is located 8 bytes inside of [ 74.958536] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 74.959346] [ 74.959565] The buggy address belongs to the physical page: [ 74.960001] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 74.960783] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.961439] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.962566] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.963173] page dumped because: kasan: bad access detected [ 74.963642] [ 74.963847] Memory state around the buggy address: [ 74.964257] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.964848] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.965444] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.966181] ^ [ 74.966548] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.967171] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.967747] ================================================================== [ 74.997195] ================================================================== [ 74.997743] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1bc/0x684 [ 74.998875] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165 [ 74.999509] [ 74.999722] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.000403] Hardware name: linux,dummy-virt (DT) [ 75.000817] Call trace: [ 75.001110] dump_backtrace.part.0+0xdc/0xf0 [ 75.001615] show_stack+0x18/0x30 [ 75.002627] dump_stack_lvl+0x64/0x80 [ 75.003036] print_report+0x158/0x438 [ 75.003456] kasan_report+0xb4/0xf4 [ 75.003857] kasan_check_range+0xe4/0x190 [ 75.004305] __kasan_check_write+0x28/0x3c [ 75.004756] kasan_bitops_modify.constprop.0+0x1bc/0x684 [ 75.005331] kasan_bitops_generic+0xac/0x13c [ 75.006108] kunit_try_run_case+0x84/0x120 [ 75.006575] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.007094] kthread+0x180/0x190 [ 75.007478] ret_from_fork+0x10/0x20 [ 75.007892] [ 75.008070] Allocated by task 165: [ 75.008405] kasan_save_stack+0x3c/0x70 [ 75.008863] kasan_set_track+0x2c/0x40 [ 75.009268] kasan_save_alloc_info+0x24/0x34 [ 75.009732] __kasan_kmalloc+0xb8/0xc0 [ 75.010133] kmalloc_trace+0x58/0x6c [ 75.011067] kasan_bitops_generic+0x90/0x13c [ 75.011600] kunit_try_run_case+0x84/0x120 [ 75.012058] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.012594] kthread+0x180/0x190 [ 75.012965] ret_from_fork+0x10/0x20 [ 75.013369] [ 75.013564] The buggy address belongs to the object at ffff0000c5840b00 [ 75.013564] which belongs to the cache kmalloc-128 of size 128 [ 75.014941] The buggy address is located 8 bytes inside of [ 75.014941] 128-byte region [ffff0000c5840b00, ffff0000c5840b80) [ 75.015813] [ 75.016017] The buggy address belongs to the physical page: [ 75.016495] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 75.017246] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.018066] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.018731] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.019344] page dumped because: kasan: bad access detected [ 75.019806] [ 75.019983] Memory state around the buggy address: [ 75.020859] ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.021444] ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.022366] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.022934] ^ [ 75.023281] ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.023889] ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.024487] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-strnlen
[ 74.711153] ================================================================== [ 74.711700] BUG: KASAN: use-after-free in strnlen+0x3c/0x6c [ 74.712304] Read of size 1 at addr ffff0000c5938710 by task kunit_try_catch/164 [ 74.712943] [ 74.713178] CPU: 1 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.713813] Hardware name: linux,dummy-virt (DT) [ 74.714966] Call trace: [ 74.715219] dump_backtrace.part.0+0xdc/0xf0 [ 74.715744] show_stack+0x18/0x30 [ 74.716136] dump_stack_lvl+0x64/0x80 [ 74.716587] print_report+0x158/0x438 [ 74.716999] kasan_report+0xb4/0xf4 [ 74.717402] __asan_load1+0x68/0x74 [ 74.717989] strnlen+0x3c/0x6c [ 74.718390] kasan_strings+0x18c/0x520 [ 74.718834] kunit_try_run_case+0x84/0x120 [ 74.719303] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.719840] kthread+0x180/0x190 [ 74.720217] ret_from_fork+0x10/0x20 [ 74.720646] [ 74.720821] Allocated by task 164: [ 74.721161] kasan_save_stack+0x3c/0x70 [ 74.721615] kasan_set_track+0x2c/0x40 [ 74.722166] kasan_save_alloc_info+0x24/0x34 [ 74.722651] __kasan_kmalloc+0xb8/0xc0 [ 74.723047] kmalloc_trace+0x58/0x6c [ 74.723465] kasan_strings+0x98/0x520 [ 74.723900] kunit_try_run_case+0x84/0x120 [ 74.724352] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.724952] kthread+0x180/0x190 [ 74.725321] ret_from_fork+0x10/0x20 [ 74.725733] [ 74.726180] Freed by task 164: [ 74.726505] kasan_save_stack+0x3c/0x70 [ 74.726924] kasan_set_track+0x2c/0x40 [ 74.727287] kasan_save_free_info+0x38/0x5c [ 74.727801] __kasan_slab_free+0xe4/0x150 [ 74.728210] __kmem_cache_free+0x130/0x2a4 [ 74.728700] kfree+0x58/0x80 [ 74.729057] kasan_strings+0xb8/0x520 [ 74.729477] kunit_try_run_case+0x84/0x120 [ 74.730072] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.730664] kthread+0x180/0x190 [ 74.731041] ret_from_fork+0x10/0x20 [ 74.731432] [ 74.731640] The buggy address belongs to the object at ffff0000c5938700 [ 74.731640] which belongs to the cache kmalloc-128 of size 128 [ 74.732616] The buggy address is located 16 bytes inside of [ 74.732616] 128-byte region [ffff0000c5938700, ffff0000c5938780) [ 74.733484] [ 74.733684] The buggy address belongs to the physical page: [ 74.734956] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938 [ 74.735716] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.736422] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.737070] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.737695] page dumped because: kasan: bad access detected [ 74.738315] [ 74.738509] Memory state around the buggy address: [ 74.738932] ffff0000c5938600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 74.739570] ffff0000c5938680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.740187] >ffff0000c5938700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.740748] ^ [ 74.741081] ffff0000c5938780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.741692] ffff0000c5938800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.742420] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-strlen
[ 74.674820] ================================================================== [ 74.675701] BUG: KASAN: use-after-free in strlen+0x18/0x64 [ 74.676477] Read of size 1 at addr ffff0000c5938710 by task kunit_try_catch/164 [ 74.677320] [ 74.677602] CPU: 1 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.679059] Hardware name: linux,dummy-virt (DT) [ 74.679659] Call trace: [ 74.680020] dump_backtrace.part.0+0xdc/0xf0 [ 74.680702] show_stack+0x18/0x30 [ 74.681248] dump_stack_lvl+0x64/0x80 [ 74.681947] print_report+0x158/0x438 [ 74.682581] kasan_report+0xb4/0xf4 [ 74.683111] __asan_load1+0x68/0x74 [ 74.683662] strlen+0x18/0x64 [ 74.684159] kasan_strings+0x168/0x520 [ 74.684739] kunit_try_run_case+0x84/0x120 [ 74.685346] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.686147] kthread+0x180/0x190 [ 74.686831] ret_from_fork+0x10/0x20 [ 74.687376] [ 74.687651] Allocated by task 164: [ 74.688102] kasan_save_stack+0x3c/0x70 [ 74.688485] kasan_set_track+0x2c/0x40 [ 74.688820] kasan_save_alloc_info+0x24/0x34 [ 74.689198] __kasan_kmalloc+0xb8/0xc0 [ 74.689565] kmalloc_trace+0x58/0x6c [ 74.690087] kasan_strings+0x98/0x520 [ 74.690720] kunit_try_run_case+0x84/0x120 [ 74.691243] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.691813] kthread+0x180/0x190 [ 74.692213] ret_from_fork+0x10/0x20 [ 74.692645] [ 74.692848] Freed by task 164: [ 74.693142] kasan_save_stack+0x3c/0x70 [ 74.693555] kasan_set_track+0x2c/0x40 [ 74.694739] kasan_save_free_info+0x38/0x5c [ 74.695562] __kasan_slab_free+0xe4/0x150 [ 74.696205] __kmem_cache_free+0x130/0x2a4 [ 74.696695] kfree+0x58/0x80 [ 74.697086] kasan_strings+0xb8/0x520 [ 74.697565] kunit_try_run_case+0x84/0x120 [ 74.698175] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.698806] kthread+0x180/0x190 [ 74.699222] ret_from_fork+0x10/0x20 [ 74.699669] [ 74.699867] The buggy address belongs to the object at ffff0000c5938700 [ 74.699867] which belongs to the cache kmalloc-128 of size 128 [ 74.700807] The buggy address is located 16 bytes inside of [ 74.700807] 128-byte region [ffff0000c5938700, ffff0000c5938780) [ 74.701634] [ 74.701879] The buggy address belongs to the physical page: [ 74.702410] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938 [ 74.703323] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.703992] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.704689] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.705246] page dumped because: kasan: bad access detected [ 74.705703] [ 74.706079] Memory state around the buggy address: [ 74.706527] ffff0000c5938600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 74.707162] ffff0000c5938680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.707863] >ffff0000c5938700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.708446] ^ [ 74.708800] ffff0000c5938780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.709368] ffff0000c5938800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.710196] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-strncmp
[ 74.638244] ================================================================== [ 74.639101] BUG: KASAN: use-after-free in strncmp+0x3c/0x90 [ 74.639897] Read of size 1 at addr ffff0000c5938710 by task kunit_try_catch/164 [ 74.640749] [ 74.641018] CPU: 1 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.642161] Hardware name: linux,dummy-virt (DT) [ 74.643262] Call trace: [ 74.643645] dump_backtrace.part.0+0xdc/0xf0 [ 74.644315] show_stack+0x18/0x30 [ 74.644867] dump_stack_lvl+0x64/0x80 [ 74.645431] print_report+0x158/0x438 [ 74.646043] kasan_report+0xb4/0xf4 [ 74.646593] __asan_load1+0x68/0x74 [ 74.647194] strncmp+0x3c/0x90 [ 74.647730] kasan_strings+0x148/0x520 [ 74.648316] kunit_try_run_case+0x84/0x120 [ 74.648937] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.649535] kthread+0x180/0x190 [ 74.650032] ret_from_fork+0x10/0x20 [ 74.650408] [ 74.650575] Allocated by task 164: [ 74.650843] kasan_save_stack+0x3c/0x70 [ 74.651185] kasan_set_track+0x2c/0x40 [ 74.651528] kasan_save_alloc_info+0x24/0x34 [ 74.652052] __kasan_kmalloc+0xb8/0xc0 [ 74.652526] kmalloc_trace+0x58/0x6c [ 74.652932] kasan_strings+0x98/0x520 [ 74.653382] kunit_try_run_case+0x84/0x120 [ 74.653835] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.654565] kthread+0x180/0x190 [ 74.654932] ret_from_fork+0x10/0x20 [ 74.655330] [ 74.655543] Freed by task 164: [ 74.655840] kasan_save_stack+0x3c/0x70 [ 74.656266] kasan_set_track+0x2c/0x40 [ 74.656688] kasan_save_free_info+0x38/0x5c [ 74.657131] __kasan_slab_free+0xe4/0x150 [ 74.657560] __kmem_cache_free+0x130/0x2a4 [ 74.658153] kfree+0x58/0x80 [ 74.658562] kasan_strings+0xb8/0x520 [ 74.658924] kunit_try_run_case+0x84/0x120 [ 74.659299] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.660073] kthread+0x180/0x190 [ 74.660573] ret_from_fork+0x10/0x20 [ 74.661108] [ 74.661362] The buggy address belongs to the object at ffff0000c5938700 [ 74.661362] which belongs to the cache kmalloc-128 of size 128 [ 74.662863] The buggy address is located 16 bytes inside of [ 74.662863] 128-byte region [ffff0000c5938700, ffff0000c5938780) [ 74.664843] [ 74.665117] The buggy address belongs to the physical page: [ 74.665790] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938 [ 74.666694] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.667220] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.667990] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.668509] page dumped because: kasan: bad access detected [ 74.669159] [ 74.669418] Memory state around the buggy address: [ 74.670042] ffff0000c5938600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 74.671055] ffff0000c5938680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.671716] >ffff0000c5938700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.672156] ^ [ 74.672463] ffff0000c5938780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.672927] ffff0000c5938800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.673361] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-strcmp
[ 74.601507] ================================================================== [ 74.602347] BUG: KASAN: use-after-free in strcmp+0x2c/0x80 [ 74.602898] Read of size 1 at addr ffff0000c5938710 by task kunit_try_catch/164 [ 74.603531] [ 74.603780] CPU: 1 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.604453] Hardware name: linux,dummy-virt (DT) [ 74.604842] Call trace: [ 74.605118] dump_backtrace.part.0+0xdc/0xf0 [ 74.605651] show_stack+0x18/0x30 [ 74.606083] dump_stack_lvl+0x64/0x80 [ 74.606525] print_report+0x158/0x438 [ 74.607011] kasan_report+0xb4/0xf4 [ 74.607457] __asan_load1+0x68/0x74 [ 74.607891] strcmp+0x2c/0x80 [ 74.608323] kasan_strings+0x120/0x520 [ 74.608949] kunit_try_run_case+0x84/0x120 [ 74.609430] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.610105] kthread+0x180/0x190 [ 74.610542] ret_from_fork+0x10/0x20 [ 74.610966] [ 74.611151] Allocated by task 164: [ 74.611483] kasan_save_stack+0x3c/0x70 [ 74.611868] kasan_set_track+0x2c/0x40 [ 74.612310] kasan_save_alloc_info+0x24/0x34 [ 74.612798] __kasan_kmalloc+0xb8/0xc0 [ 74.613203] kmalloc_trace+0x58/0x6c [ 74.613648] kasan_strings+0x98/0x520 [ 74.614231] kunit_try_run_case+0x84/0x120 [ 74.614758] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.615314] kthread+0x180/0x190 [ 74.615833] ret_from_fork+0x10/0x20 [ 74.616369] [ 74.616636] Freed by task 164: [ 74.617053] kasan_save_stack+0x3c/0x70 [ 74.617618] kasan_set_track+0x2c/0x40 [ 74.618366] kasan_save_free_info+0x38/0x5c [ 74.619065] __kasan_slab_free+0xe4/0x150 [ 74.619678] __kmem_cache_free+0x130/0x2a4 [ 74.620337] kfree+0x58/0x80 [ 74.620839] kasan_strings+0xb8/0x520 [ 74.621434] kunit_try_run_case+0x84/0x120 [ 74.622208] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.622697] kthread+0x180/0x190 [ 74.623009] ret_from_fork+0x10/0x20 [ 74.623344] [ 74.624162] The buggy address belongs to the object at ffff0000c5938700 [ 74.624162] which belongs to the cache kmalloc-128 of size 128 [ 74.625536] The buggy address is located 16 bytes inside of [ 74.625536] 128-byte region [ffff0000c5938700, ffff0000c5938780) [ 74.627234] [ 74.627534] The buggy address belongs to the physical page: [ 74.628226] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938 [ 74.629321] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.630430] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.631351] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.632011] page dumped because: kasan: bad access detected [ 74.632360] [ 74.632629] Memory state around the buggy address: [ 74.633229] ffff0000c5938600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 74.634293] ffff0000c5938680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.635162] >ffff0000c5938700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.635988] ^ [ 74.636450] ffff0000c5938780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.636920] ffff0000c5938800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.637354] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-strrchr
[ 74.555188] ================================================================== [ 74.556071] BUG: KASAN: use-after-free in strrchr+0x28/0x54 [ 74.556858] Read of size 1 at addr ffff0000c5938710 by task kunit_try_catch/164 [ 74.558526] [ 74.558932] CPU: 1 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.559710] Hardware name: linux,dummy-virt (DT) [ 74.560038] Call trace: [ 74.560251] dump_backtrace.part.0+0xdc/0xf0 [ 74.561341] show_stack+0x18/0x30 [ 74.562146] dump_stack_lvl+0x64/0x80 [ 74.563132] print_report+0x158/0x438 [ 74.564077] kasan_report+0xb4/0xf4 [ 74.564799] __asan_load1+0x68/0x74 [ 74.565562] strrchr+0x28/0x54 [ 74.566299] kasan_strings+0xf4/0x520 [ 74.567118] kunit_try_run_case+0x84/0x120 [ 74.567993] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.568954] kthread+0x180/0x190 [ 74.569471] ret_from_fork+0x10/0x20 [ 74.570249] [ 74.570804] Allocated by task 164: [ 74.571331] kasan_save_stack+0x3c/0x70 [ 74.571711] kasan_set_track+0x2c/0x40 [ 74.572057] kasan_save_alloc_info+0x24/0x34 [ 74.572703] __kasan_kmalloc+0xb8/0xc0 [ 74.573521] kmalloc_trace+0x58/0x6c [ 74.574537] kasan_strings+0x98/0x520 [ 74.575315] kunit_try_run_case+0x84/0x120 [ 74.576201] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.577224] kthread+0x180/0x190 [ 74.577983] ret_from_fork+0x10/0x20 [ 74.578761] [ 74.579167] Freed by task 164: [ 74.579787] kasan_save_stack+0x3c/0x70 [ 74.580569] kasan_set_track+0x2c/0x40 [ 74.581335] kasan_save_free_info+0x38/0x5c [ 74.582303] __kasan_slab_free+0xe4/0x150 [ 74.583038] __kmem_cache_free+0x130/0x2a4 [ 74.583856] kfree+0x58/0x80 [ 74.584548] kasan_strings+0xb8/0x520 [ 74.585066] kunit_try_run_case+0x84/0x120 [ 74.585927] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.586926] kthread+0x180/0x190 [ 74.587431] ret_from_fork+0x10/0x20 [ 74.587788] [ 74.587954] The buggy address belongs to the object at ffff0000c5938700 [ 74.587954] which belongs to the cache kmalloc-128 of size 128 [ 74.589002] The buggy address is located 16 bytes inside of [ 74.589002] 128-byte region [ffff0000c5938700, ffff0000c5938780) [ 74.590453] [ 74.590719] The buggy address belongs to the physical page: [ 74.591401] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938 [ 74.592488] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.593411] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.594451] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.595699] page dumped because: kasan: bad access detected [ 74.596066] [ 74.596238] Memory state around the buggy address: [ 74.596618] ffff0000c5938600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 74.597207] ffff0000c5938680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.597893] >ffff0000c5938700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.598617] ^ [ 74.599333] ffff0000c5938780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.599954] ffff0000c5938800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.600534] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-strchr
[ 74.513034] ================================================================== [ 74.514487] BUG: KASAN: use-after-free in strchr+0x20/0x80 [ 74.515310] Read of size 1 at addr ffff0000c5938710 by task kunit_try_catch/164 [ 74.516309] [ 74.516649] CPU: 1 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.518659] Hardware name: linux,dummy-virt (DT) [ 74.519414] Call trace: [ 74.519830] dump_backtrace.part.0+0xdc/0xf0 [ 74.520551] show_stack+0x18/0x30 [ 74.521150] dump_stack_lvl+0x64/0x80 [ 74.521753] print_report+0x158/0x438 [ 74.522414] kasan_report+0xb4/0xf4 [ 74.522971] __asan_load1+0x68/0x74 [ 74.523547] strchr+0x20/0x80 [ 74.523926] kasan_strings+0xd0/0x520 [ 74.524294] kunit_try_run_case+0x84/0x120 [ 74.524801] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.525331] kthread+0x180/0x190 [ 74.525744] ret_from_fork+0x10/0x20 [ 74.526202] [ 74.526446] Allocated by task 164: [ 74.526838] kasan_save_stack+0x3c/0x70 [ 74.527317] kasan_set_track+0x2c/0x40 [ 74.527908] kasan_save_alloc_info+0x24/0x34 [ 74.528572] __kasan_kmalloc+0xb8/0xc0 [ 74.529139] kmalloc_trace+0x58/0x6c [ 74.529538] kasan_strings+0x98/0x520 [ 74.530080] kunit_try_run_case+0x84/0x120 [ 74.530492] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.530951] kthread+0x180/0x190 [ 74.531266] ret_from_fork+0x10/0x20 [ 74.531845] [ 74.532104] Freed by task 164: [ 74.532535] kasan_save_stack+0x3c/0x70 [ 74.533089] kasan_set_track+0x2c/0x40 [ 74.533640] kasan_save_free_info+0x38/0x5c [ 74.534983] __kasan_slab_free+0xe4/0x150 [ 74.535591] __kmem_cache_free+0x130/0x2a4 [ 74.536233] kfree+0x58/0x80 [ 74.536708] kasan_strings+0xb8/0x520 [ 74.537263] kunit_try_run_case+0x84/0x120 [ 74.538019] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.538836] kthread+0x180/0x190 [ 74.539334] ret_from_fork+0x10/0x20 [ 74.539892] [ 74.540152] The buggy address belongs to the object at ffff0000c5938700 [ 74.540152] which belongs to the cache kmalloc-128 of size 128 [ 74.541515] The buggy address is located 16 bytes inside of [ 74.541515] 128-byte region [ffff0000c5938700, ffff0000c5938780) [ 74.542482] [ 74.542667] The buggy address belongs to the physical page: [ 74.543027] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938 [ 74.543827] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.544733] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.545651] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.546818] page dumped because: kasan: bad access detected [ 74.547512] [ 74.547775] Memory state around the buggy address: [ 74.548366] ffff0000c5938600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 74.549224] ffff0000c5938680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.550125] >ffff0000c5938700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.551050] ^ [ 74.551605] ffff0000c5938780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.552712] ffff0000c5938800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.553161] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 74.474977] ================================================================== [ 74.476084] BUG: KASAN: slab-out-of-bounds in memcmp+0x44/0xd0 [ 74.476949] Read of size 1 at addr ffff0000c5840618 by task kunit_try_catch/163 [ 74.477609] [ 74.478410] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.479119] Hardware name: linux,dummy-virt (DT) [ 74.479556] Call trace: [ 74.479816] dump_backtrace.part.0+0xdc/0xf0 [ 74.480332] show_stack+0x18/0x30 [ 74.480765] dump_stack_lvl+0x64/0x80 [ 74.481198] print_report+0x158/0x438 [ 74.481654] kasan_report+0xb4/0xf4 [ 74.482331] __asan_load1+0x68/0x74 [ 74.482760] memcmp+0x44/0xd0 [ 74.483145] kasan_memcmp+0xf4/0x200 [ 74.483617] kunit_try_run_case+0x84/0x120 [ 74.484229] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.484749] kthread+0x180/0x190 [ 74.485069] ret_from_fork+0x10/0x20 [ 74.485435] [ 74.485692] Allocated by task 163: [ 74.486687] kasan_save_stack+0x3c/0x70 [ 74.487263] kasan_set_track+0x2c/0x40 [ 74.487820] kasan_save_alloc_info+0x24/0x34 [ 74.488452] __kasan_kmalloc+0xb8/0xc0 [ 74.488998] kmalloc_trace+0x58/0x6c [ 74.489552] kasan_memcmp+0xb0/0x200 [ 74.490426] kunit_try_run_case+0x84/0x120 [ 74.491046] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.491803] kthread+0x180/0x190 [ 74.492301] ret_from_fork+0x10/0x20 [ 74.492665] [ 74.492836] The buggy address belongs to the object at ffff0000c5840600 [ 74.492836] which belongs to the cache kmalloc-128 of size 128 [ 74.493696] The buggy address is located 24 bytes inside of [ 74.493696] 128-byte region [ffff0000c5840600, ffff0000c5840680) [ 74.495544] [ 74.495819] The buggy address belongs to the physical page: [ 74.496490] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840 [ 74.497553] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.498735] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.499844] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.500320] page dumped because: kasan: bad access detected [ 74.501228] [ 74.501565] Memory state around the buggy address: [ 74.502307] ffff0000c5840500: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.503445] ffff0000c5840580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.504368] >ffff0000c5840600: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.505244] ^ [ 74.506108] ffff0000c5840680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.506774] ffff0000c5840700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.507267] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memchr
[ 74.433459] ================================================================== [ 74.434376] BUG: KASAN: slab-out-of-bounds in memchr+0x28/0x80 [ 74.435023] Read of size 1 at addr ffff0000c5938418 by task kunit_try_catch/162 [ 74.435743] [ 74.436250] CPU: 1 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.437035] Hardware name: linux,dummy-virt (DT) [ 74.437525] Call trace: [ 74.438611] dump_backtrace.part.0+0xdc/0xf0 [ 74.439388] show_stack+0x18/0x30 [ 74.440121] dump_stack_lvl+0x64/0x80 [ 74.440779] print_report+0x158/0x438 [ 74.441618] kasan_report+0xb4/0xf4 [ 74.442361] __asan_load1+0x68/0x74 [ 74.443132] memchr+0x28/0x80 [ 74.443778] kasan_memchr+0xcc/0x200 [ 74.444627] kunit_try_run_case+0x84/0x120 [ 74.445178] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.446248] kthread+0x180/0x190 [ 74.447104] ret_from_fork+0x10/0x20 [ 74.447940] [ 74.448302] Allocated by task 162: [ 74.448863] kasan_save_stack+0x3c/0x70 [ 74.449237] kasan_set_track+0x2c/0x40 [ 74.450050] kasan_save_alloc_info+0x24/0x34 [ 74.450963] __kasan_kmalloc+0xb8/0xc0 [ 74.451806] kmalloc_trace+0x58/0x6c [ 74.452587] kasan_memchr+0x98/0x200 [ 74.453380] kunit_try_run_case+0x84/0x120 [ 74.454362] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.455455] kthread+0x180/0x190 [ 74.456242] ret_from_fork+0x10/0x20 [ 74.456833] [ 74.457016] The buggy address belongs to the object at ffff0000c5938400 [ 74.457016] which belongs to the cache kmalloc-128 of size 128 [ 74.458669] The buggy address is located 24 bytes inside of [ 74.458669] 128-byte region [ffff0000c5938400, ffff0000c5938480) [ 74.460327] [ 74.460786] The buggy address belongs to the physical page: [ 74.461660] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938 [ 74.462254] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.463092] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.463878] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.464908] page dumped because: kasan: bad access detected [ 74.465447] [ 74.465615] Memory state around the buggy address: [ 74.465958] ffff0000c5938300: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.466434] ffff0000c5938380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.467060] >ffff0000c5938400: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.467621] ^ [ 74.467931] ffff0000c5938480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.468387] ffff0000c5938500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.468951] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmem_cache_double_destroy
[ 74.375684] ================================================================== [ 74.376904] BUG: KASAN: use-after-free in kmem_cache_double_destroy+0xcc/0x1d0 [ 74.378988] Read of size 1 at addr ffff0000c15bb500 by task kunit_try_catch/161 [ 74.380211] [ 74.380797] CPU: 1 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.381903] Hardware name: linux,dummy-virt (DT) [ 74.382732] Call trace: [ 74.382976] dump_backtrace.part.0+0xdc/0xf0 [ 74.383425] show_stack+0x18/0x30 [ 74.383799] dump_stack_lvl+0x64/0x80 [ 74.384152] print_report+0x158/0x438 [ 74.385101] kasan_report+0xb4/0xf4 [ 74.385792] __kasan_check_byte+0x54/0x70 [ 74.386633] kmem_cache_destroy+0xf0/0x194 [ 74.387508] kmem_cache_double_destroy+0xcc/0x1d0 [ 74.388477] kunit_try_run_case+0x84/0x120 [ 74.389348] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.390390] kthread+0x180/0x190 [ 74.391143] ret_from_fork+0x10/0x20 [ 74.391902] [ 74.392341] Allocated by task 161: [ 74.393011] kasan_save_stack+0x3c/0x70 [ 74.393830] kasan_set_track+0x2c/0x40 [ 74.394634] kasan_save_alloc_info+0x24/0x34 [ 74.395502] __kasan_slab_alloc+0x8c/0x90 [ 74.396360] kmem_cache_alloc+0x170/0x2c4 [ 74.397243] kmem_cache_create_usercopy+0x144/0x26c [ 74.398218] kmem_cache_create+0x1c/0x30 [ 74.399071] kmem_cache_double_destroy+0x9c/0x1d0 [ 74.400017] kunit_try_run_case+0x84/0x120 [ 74.400841] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.401791] kthread+0x180/0x190 [ 74.402421] ret_from_fork+0x10/0x20 [ 74.402772] [ 74.402942] Freed by task 161: [ 74.403190] kasan_save_stack+0x3c/0x70 [ 74.404097] kasan_set_track+0x2c/0x40 [ 74.404827] kasan_save_free_info+0x38/0x5c [ 74.405735] __kasan_slab_free+0xe4/0x150 [ 74.406595] kmem_cache_free+0x1b8/0x38c [ 74.407463] slab_kmem_cache_release+0x30/0x40 [ 74.408352] kmem_cache_release+0x14/0x20 [ 74.409198] kobject_put+0xe0/0x170 [ 74.409850] sysfs_slab_release+0x28/0x34 [ 74.410631] kmem_cache_destroy+0xc8/0x194 [ 74.411369] kmem_cache_double_destroy+0xbc/0x1d0 [ 74.412371] kunit_try_run_case+0x84/0x120 [ 74.413089] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.413802] kthread+0x180/0x190 [ 74.414135] ret_from_fork+0x10/0x20 [ 74.414871] [ 74.415347] The buggy address belongs to the object at ffff0000c15bb500 [ 74.415347] which belongs to the cache kmem_cache of size 216 [ 74.417180] The buggy address is located 0 bytes inside of [ 74.417180] 216-byte region [ffff0000c15bb500, ffff0000c15bb5d8) [ 74.418826] [ 74.419290] The buggy address belongs to the physical page: [ 74.420140] page:000000002d0224d4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1015ba [ 74.421229] head:000000002d0224d4 order:1 compound_mapcount:0 compound_pincount:0 [ 74.421714] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 74.422275] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002000 [ 74.423317] raw: 0000000000000000 0000000080150015 00000001ffffffff 0000000000000000 [ 74.424218] page dumped because: kasan: bad access detected [ 74.424791] [ 74.425206] Memory state around the buggy address: [ 74.425875] ffff0000c15bb400: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc [ 74.426632] ffff0000c15bb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.427220] >ffff0000c15bb500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.427885] ^ [ 74.428359] ffff0000c15bb580: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc [ 74.429037] ffff0000c15bb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.429488] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 74.334862] ================================================================== [ 74.335841] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xd8/0x230 [ 74.336562] Free of addr ffff0000c58d3001 by task kunit_try_catch/160 [ 74.337101] [ 74.337333] CPU: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.338102] Hardware name: linux,dummy-virt (DT) [ 74.339057] Call trace: [ 74.339353] dump_backtrace.part.0+0xdc/0xf0 [ 74.339864] show_stack+0x18/0x30 [ 74.340286] dump_stack_lvl+0x64/0x80 [ 74.340713] print_report+0x158/0x438 [ 74.341214] kasan_report_invalid_free+0x9c/0xc0 [ 74.341687] __kasan_slab_free+0x140/0x150 [ 74.342144] kmem_cache_free+0x1b8/0x38c [ 74.342606] kmem_cache_invalid_free+0xd8/0x230 [ 74.343374] kunit_try_run_case+0x84/0x120 [ 74.343847] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.344407] kthread+0x180/0x190 [ 74.344877] ret_from_fork+0x10/0x20 [ 74.345305] [ 74.345514] Allocated by task 160: [ 74.345837] kasan_save_stack+0x3c/0x70 [ 74.346389] kasan_set_track+0x2c/0x40 [ 74.347177] kasan_save_alloc_info+0x24/0x34 [ 74.347669] __kasan_slab_alloc+0x8c/0x90 [ 74.348086] kmem_cache_alloc+0x170/0x2c4 [ 74.348556] kmem_cache_invalid_free+0xb4/0x230 [ 74.349050] kunit_try_run_case+0x84/0x120 [ 74.349511] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.350342] kthread+0x180/0x190 [ 74.350747] ret_from_fork+0x10/0x20 [ 74.351149] [ 74.351346] The buggy address belongs to the object at ffff0000c58d3000 [ 74.351346] which belongs to the cache test_cache of size 200 [ 74.352257] The buggy address is located 1 bytes inside of [ 74.352257] 200-byte region [ffff0000c58d3000, ffff0000c58d30c8) [ 74.353253] [ 74.353488] The buggy address belongs to the physical page: [ 74.354515] page:0000000038ae0fdf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d3 [ 74.355253] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.355936] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c1398900 [ 74.356597] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000 [ 74.357203] page dumped because: kasan: bad access detected [ 74.357659] [ 74.357856] Memory state around the buggy address: [ 74.358574] ffff0000c58d2f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.359173] ffff0000c58d2f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.359795] >ffff0000c58d3000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.360425] ^ [ 74.360755] ffff0000c58d3080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 74.361357] ffff0000c58d3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.361952] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 74.285056] ================================================================== [ 74.286023] BUG: KASAN: double-free in kmem_cache_double_free+0xe4/0x244 [ 74.286745] Free of addr ffff0000c5900000 by task kunit_try_catch/159 [ 74.287254] [ 74.287520] CPU: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.288254] Hardware name: linux,dummy-virt (DT) [ 74.288690] Call trace: [ 74.288964] dump_backtrace.part.0+0xdc/0xf0 [ 74.289435] show_stack+0x18/0x30 [ 74.291028] dump_stack_lvl+0x64/0x80 [ 74.292347] print_report+0x158/0x438 [ 74.292924] kasan_report_invalid_free+0x9c/0xc0 [ 74.294102] __kasan_slab_free+0x118/0x150 [ 74.294517] kmem_cache_free+0x1b8/0x38c [ 74.295004] kmem_cache_double_free+0xe4/0x244 [ 74.295474] kunit_try_run_case+0x84/0x120 [ 74.295877] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.296335] kthread+0x180/0x190 [ 74.296948] ret_from_fork+0x10/0x20 [ 74.297742] [ 74.297958] Allocated by task 159: [ 74.298528] kasan_save_stack+0x3c/0x70 [ 74.298900] kasan_set_track+0x2c/0x40 [ 74.299467] kasan_save_alloc_info+0x24/0x34 [ 74.299915] __kasan_slab_alloc+0x8c/0x90 [ 74.300273] kmem_cache_alloc+0x170/0x2c4 [ 74.300693] kmem_cache_double_free+0xb4/0x244 [ 74.301344] kunit_try_run_case+0x84/0x120 [ 74.302127] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.303466] kthread+0x180/0x190 [ 74.303957] ret_from_fork+0x10/0x20 [ 74.304463] [ 74.304675] Freed by task 159: [ 74.305116] kasan_save_stack+0x3c/0x70 [ 74.305657] kasan_set_track+0x2c/0x40 [ 74.306116] kasan_save_free_info+0x38/0x5c [ 74.306801] __kasan_slab_free+0xe4/0x150 [ 74.307334] kmem_cache_free+0x1b8/0x38c [ 74.307919] kmem_cache_double_free+0xd0/0x244 [ 74.308514] kunit_try_run_case+0x84/0x120 [ 74.309046] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.309619] kthread+0x180/0x190 [ 74.310052] ret_from_fork+0x10/0x20 [ 74.310599] [ 74.310836] The buggy address belongs to the object at ffff0000c5900000 [ 74.310836] which belongs to the cache test_cache of size 200 [ 74.311825] The buggy address is located 0 bytes inside of [ 74.311825] 200-byte region [ffff0000c5900000, ffff0000c59000c8) [ 74.312768] [ 74.312989] The buggy address belongs to the physical page: [ 74.313519] page:00000000d0a07206 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105900 [ 74.314431] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.315152] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c1398780 [ 74.315841] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000 [ 74.316508] page dumped because: kasan: bad access detected [ 74.317022] [ 74.317232] Memory state around the buggy address: [ 74.317700] ffff0000c58fff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.318333] ffff0000c58fff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.319091] >ffff0000c5900000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.319714] ^ [ 74.320040] ffff0000c5900080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 74.320670] ffff0000c5900100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.321258] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-ksize_uaf
[ 74.244424] ================================================================== [ 74.244981] BUG: KASAN: use-after-free in ksize_uaf+0x100/0x32c [ 74.245628] Read of size 1 at addr ffff0000c5938278 by task kunit_try_catch/158 [ 74.246935] [ 74.247138] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.247943] Hardware name: linux,dummy-virt (DT) [ 74.248379] Call trace: [ 74.248667] dump_backtrace.part.0+0xdc/0xf0 [ 74.249174] show_stack+0x18/0x30 [ 74.249645] dump_stack_lvl+0x64/0x80 [ 74.250054] print_report+0x158/0x438 [ 74.250822] kasan_report+0xb4/0xf4 [ 74.251212] __asan_load1+0x68/0x74 [ 74.251671] ksize_uaf+0x100/0x32c [ 74.252099] kunit_try_run_case+0x84/0x120 [ 74.252608] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.253178] kthread+0x180/0x190 [ 74.253594] ret_from_fork+0x10/0x20 [ 74.254597] [ 74.254806] Allocated by task 158: [ 74.255163] kasan_save_stack+0x3c/0x70 [ 74.255633] kasan_set_track+0x2c/0x40 [ 74.256022] kasan_save_alloc_info+0x24/0x34 [ 74.256520] __kasan_kmalloc+0xb8/0xc0 [ 74.256952] kmalloc_trace+0x58/0x6c [ 74.257388] ksize_uaf+0x94/0x32c [ 74.257922] kunit_try_run_case+0x84/0x120 [ 74.258360] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.259157] kthread+0x180/0x190 [ 74.259578] ret_from_fork+0x10/0x20 [ 74.259966] [ 74.260193] Freed by task 158: [ 74.260521] kasan_save_stack+0x3c/0x70 [ 74.260997] kasan_set_track+0x2c/0x40 [ 74.261379] kasan_save_free_info+0x38/0x5c [ 74.262031] __kasan_slab_free+0xe4/0x150 [ 74.262495] __kmem_cache_free+0x130/0x2a4 [ 74.263510] kfree+0x58/0x80 [ 74.263914] ksize_uaf+0xb4/0x32c [ 74.264306] kunit_try_run_case+0x84/0x120 [ 74.264816] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.265416] kthread+0x180/0x190 [ 74.266156] ret_from_fork+0x10/0x20 [ 74.266584] [ 74.266803] The buggy address belongs to the object at ffff0000c5938200 [ 74.266803] which belongs to the cache kmalloc-128 of size 128 [ 74.267794] The buggy address is located 120 bytes inside of [ 74.267794] 128-byte region [ffff0000c5938200, ffff0000c5938280) [ 74.268747] [ 74.268992] The buggy address belongs to the physical page: [ 74.269485] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938 [ 74.270577] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.271721] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.272421] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.273022] page dumped because: kasan: bad access detected [ 74.273489] [ 74.273693] Memory state around the buggy address: [ 74.274240] ffff0000c5938100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.275151] ffff0000c5938180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.275802] >ffff0000c5938200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.276359] ^ [ 74.276934] ffff0000c5938280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.277527] ffff0000c5938300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.278370] ================================================================== [ 74.169142] ================================================================== [ 74.170260] BUG: KASAN: use-after-free in ksize_uaf+0xc4/0x32c [ 74.170937] Read of size 1 at addr ffff0000c5938200 by task kunit_try_catch/158 [ 74.171875] [ 74.172200] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.173306] Hardware name: linux,dummy-virt (DT) [ 74.174100] Call trace: [ 74.174590] dump_backtrace.part.0+0xdc/0xf0 [ 74.175480] show_stack+0x18/0x30 [ 74.176012] dump_stack_lvl+0x64/0x80 [ 74.176703] print_report+0x158/0x438 [ 74.177341] kasan_report+0xb4/0xf4 [ 74.177694] __kasan_check_byte+0x54/0x70 [ 74.178558] ksize+0x3c/0x94 [ 74.179237] ksize_uaf+0xc4/0x32c [ 74.179965] kunit_try_run_case+0x84/0x120 [ 74.180740] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.181638] kthread+0x180/0x190 [ 74.182445] ret_from_fork+0x10/0x20 [ 74.183057] [ 74.183236] Allocated by task 158: [ 74.183519] kasan_save_stack+0x3c/0x70 [ 74.183881] kasan_set_track+0x2c/0x40 [ 74.184214] kasan_save_alloc_info+0x24/0x34 [ 74.185160] __kasan_kmalloc+0xb8/0xc0 [ 74.185895] kmalloc_trace+0x58/0x6c [ 74.186700] ksize_uaf+0x94/0x32c [ 74.187388] kunit_try_run_case+0x84/0x120 [ 74.188220] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.189127] kthread+0x180/0x190 [ 74.189805] ret_from_fork+0x10/0x20 [ 74.190553] [ 74.190998] Freed by task 158: [ 74.191571] kasan_save_stack+0x3c/0x70 [ 74.192280] kasan_set_track+0x2c/0x40 [ 74.192858] kasan_save_free_info+0x38/0x5c [ 74.193503] __kasan_slab_free+0xe4/0x150 [ 74.194165] __kmem_cache_free+0x130/0x2a4 [ 74.195087] kfree+0x58/0x80 [ 74.195700] ksize_uaf+0xb4/0x32c [ 74.196352] kunit_try_run_case+0x84/0x120 [ 74.197083] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.197934] kthread+0x180/0x190 [ 74.198575] ret_from_fork+0x10/0x20 [ 74.198924] [ 74.199091] The buggy address belongs to the object at ffff0000c5938200 [ 74.199091] which belongs to the cache kmalloc-128 of size 128 [ 74.199926] The buggy address is located 0 bytes inside of [ 74.199926] 128-byte region [ffff0000c5938200, ffff0000c5938280) [ 74.200821] [ 74.201046] The buggy address belongs to the physical page: [ 74.201464] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938 [ 74.202605] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.203275] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.203943] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.204556] page dumped because: kasan: bad access detected [ 74.204998] [ 74.205225] Memory state around the buggy address: [ 74.205686] ffff0000c5938100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.206843] ffff0000c5938180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.207471] >ffff0000c5938200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.208068] ^ [ 74.208429] ffff0000c5938280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.209078] ffff0000c5938300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.209666] ================================================================== [ 74.211038] ================================================================== [ 74.211618] BUG: KASAN: use-after-free in ksize_uaf+0xe0/0x32c [ 74.212208] Read of size 1 at addr ffff0000c5938200 by task kunit_try_catch/158 [ 74.212829] [ 74.213070] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.213835] Hardware name: linux,dummy-virt (DT) [ 74.214292] Call trace: [ 74.215082] dump_backtrace.part.0+0xdc/0xf0 [ 74.215625] show_stack+0x18/0x30 [ 74.216051] dump_stack_lvl+0x64/0x80 [ 74.216462] print_report+0x158/0x438 [ 74.216943] kasan_report+0xb4/0xf4 [ 74.217325] __asan_load1+0x68/0x74 [ 74.217766] ksize_uaf+0xe0/0x32c [ 74.218165] kunit_try_run_case+0x84/0x120 [ 74.218901] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.219468] kthread+0x180/0x190 [ 74.219887] ret_from_fork+0x10/0x20 [ 74.220288] [ 74.220512] Allocated by task 158: [ 74.220880] kasan_save_stack+0x3c/0x70 [ 74.221316] kasan_set_track+0x2c/0x40 [ 74.221710] kasan_save_alloc_info+0x24/0x34 [ 74.222292] __kasan_kmalloc+0xb8/0xc0 [ 74.223060] kmalloc_trace+0x58/0x6c [ 74.223550] ksize_uaf+0x94/0x32c [ 74.223956] kunit_try_run_case+0x84/0x120 [ 74.224440] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.224994] kthread+0x180/0x190 [ 74.225381] ret_from_fork+0x10/0x20 [ 74.225905] [ 74.226107] Freed by task 158: [ 74.226646] kasan_save_stack+0x3c/0x70 [ 74.227085] kasan_set_track+0x2c/0x40 [ 74.227484] kasan_save_free_info+0x38/0x5c [ 74.227965] __kasan_slab_free+0xe4/0x150 [ 74.228416] __kmem_cache_free+0x130/0x2a4 [ 74.228931] kfree+0x58/0x80 [ 74.229311] ksize_uaf+0xb4/0x32c [ 74.229754] kunit_try_run_case+0x84/0x120 [ 74.230290] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.231230] kthread+0x180/0x190 [ 74.231637] ret_from_fork+0x10/0x20 [ 74.232031] [ 74.232252] The buggy address belongs to the object at ffff0000c5938200 [ 74.232252] which belongs to the cache kmalloc-128 of size 128 [ 74.233221] The buggy address is located 0 bytes inside of [ 74.233221] 128-byte region [ffff0000c5938200, ffff0000c5938280) [ 74.234274] [ 74.234487] The buggy address belongs to the physical page: [ 74.235160] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938 [ 74.235949] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.236651] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.237344] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.238082] page dumped because: kasan: bad access detected [ 74.238580] [ 74.238755] Memory state around the buggy address: [ 74.239172] ffff0000c5938100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.239831] ffff0000c5938180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.241007] >ffff0000c5938200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.241584] ^ [ 74.242101] ffff0000c5938280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.242788] ffff0000c5938300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.243556] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 74.134671] ================================================================== [ 74.135414] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0xdc/0x1e0 [ 74.136132] Read of size 1 at addr ffff0000c5938180 by task kunit_try_catch/157 [ 74.137058] [ 74.137252] CPU: 1 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.137970] Hardware name: linux,dummy-virt (DT) [ 74.138805] Call trace: [ 74.139251] dump_backtrace.part.0+0xdc/0xf0 [ 74.139966] show_stack+0x18/0x30 [ 74.140570] dump_stack_lvl+0x64/0x80 [ 74.141151] print_report+0x158/0x438 [ 74.141790] kasan_report+0xb4/0xf4 [ 74.142445] __asan_load1+0x68/0x74 [ 74.143020] ksize_unpoisons_memory+0xdc/0x1e0 [ 74.143719] kunit_try_run_case+0x84/0x120 [ 74.144360] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.145147] kthread+0x180/0x190 [ 74.145624] ret_from_fork+0x10/0x20 [ 74.145977] [ 74.146148] Allocated by task 157: [ 74.146455] kasan_save_stack+0x3c/0x70 [ 74.147070] kasan_set_track+0x2c/0x40 [ 74.147652] kasan_save_alloc_info+0x24/0x34 [ 74.148302] __kasan_kmalloc+0xb8/0xc0 [ 74.148874] kmalloc_trace+0x58/0x6c [ 74.149451] ksize_unpoisons_memory+0x98/0x1e0 [ 74.150227] kunit_try_run_case+0x84/0x120 [ 74.150915] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.151726] kthread+0x180/0x190 [ 74.152257] ret_from_fork+0x10/0x20 [ 74.152837] [ 74.153134] The buggy address belongs to the object at ffff0000c5938100 [ 74.153134] which belongs to the cache kmalloc-128 of size 128 [ 74.154564] The buggy address is located 0 bytes to the right of [ 74.154564] 128-byte region [ffff0000c5938100, ffff0000c5938180) [ 74.155857] [ 74.156142] The buggy address belongs to the physical page: [ 74.156648] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938 [ 74.157213] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.157898] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.158570] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.159154] page dumped because: kasan: bad access detected [ 74.159690] [ 74.159888] Memory state around the buggy address: [ 74.160356] ffff0000c5938080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.160997] ffff0000c5938100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.161603] >ffff0000c5938180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.162379] ^ [ 74.162791] ffff0000c5938200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.163461] ffff0000c5938280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.164068] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 74.107145] ================================================================== [ 74.107914] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x10c/0x1f4 [ 74.108788] Read of size 1 at addr ffff8000087c7cca by task kunit_try_catch/156 [ 74.109786] [ 74.110161] CPU: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.111375] Hardware name: linux,dummy-virt (DT) [ 74.112035] Call trace: [ 74.112463] dump_backtrace.part.0+0xdc/0xf0 [ 74.113190] show_stack+0x18/0x30 [ 74.113866] dump_stack_lvl+0x64/0x80 [ 74.114535] print_report+0x158/0x438 [ 74.115179] kasan_report+0xb4/0xf4 [ 74.115775] __asan_load1+0x68/0x74 [ 74.116359] kasan_alloca_oob_right+0x10c/0x1f4 [ 74.117083] kunit_try_run_case+0x84/0x120 [ 74.117901] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.118554] kthread+0x180/0x190 [ 74.118889] ret_from_fork+0x10/0x20 [ 74.119235] [ 74.119413] The buggy address belongs to stack of task kunit_try_catch/156 [ 74.119970] [ 74.120204] The buggy address ffff8000087c7cca belongs to a vmalloc virtual mapping [ 74.120849] The buggy address belongs to the physical page: [ 74.121375] page:000000002f688418 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105934 [ 74.122381] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 74.123053] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000 [ 74.123839] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 74.124741] page dumped because: kasan: bad access detected [ 74.125430] [ 74.125703] Memory state around the buggy address: [ 74.127079] ffff8000087c7b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.127737] ffff8000087c7c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.128203] >ffff8000087c7c80: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 74.128726] ^ [ 74.129232] ffff8000087c7d00: f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00 00 f3 f3 [ 74.130101] ffff8000087c7d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.130731] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 74.071545] ================================================================== [ 74.072272] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x100/0x1dc [ 74.072877] Read of size 1 at addr ffff8000087b7cbf by task kunit_try_catch/155 [ 74.073341] [ 74.074336] CPU: 1 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.075701] Hardware name: linux,dummy-virt (DT) [ 74.076702] Call trace: [ 74.077167] dump_backtrace.part.0+0xdc/0xf0 [ 74.078215] show_stack+0x18/0x30 [ 74.079075] dump_stack_lvl+0x64/0x80 [ 74.079931] print_report+0x158/0x438 [ 74.080794] kasan_report+0xb4/0xf4 [ 74.081607] __asan_load1+0x68/0x74 [ 74.082511] kasan_alloca_oob_left+0x100/0x1dc [ 74.083435] kunit_try_run_case+0x84/0x120 [ 74.084345] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.085436] kthread+0x180/0x190 [ 74.086320] ret_from_fork+0x10/0x20 [ 74.087173] [ 74.087809] The buggy address belongs to stack of task kunit_try_catch/155 [ 74.088809] [ 74.089359] The buggy address ffff8000087b7cbf belongs to a vmalloc virtual mapping [ 74.090616] The buggy address belongs to the physical page: [ 74.091218] page:00000000b2a89bce refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105956 [ 74.091820] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 74.092321] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000 [ 74.093947] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 74.094614] page dumped because: kasan: bad access detected [ 74.095048] [ 74.095266] Memory state around the buggy address: [ 74.095904] ffff8000087b7b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.096598] ffff8000087b7c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.097194] >ffff8000087b7c80: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 74.098140] ^ [ 74.098600] ffff8000087b7d00: 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00 00 [ 74.099187] ffff8000087b7d80: f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.099760] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 74.044968] ================================================================== [ 74.045892] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0xb4/0x170 [ 74.046870] Read of size 1 at addr ffff8000087b7d9a by task kunit_try_catch/154 [ 74.047418] [ 74.047670] CPU: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.048354] Hardware name: linux,dummy-virt (DT) [ 74.048775] Call trace: [ 74.049070] dump_backtrace.part.0+0xdc/0xf0 [ 74.049577] show_stack+0x18/0x30 [ 74.050139] dump_stack_lvl+0x64/0x80 [ 74.050575] print_report+0x158/0x438 [ 74.050980] kasan_report+0xb4/0xf4 [ 74.051335] __asan_load1+0x68/0x74 [ 74.051755] kasan_stack_oob+0xb4/0x170 [ 74.052184] kunit_try_run_case+0x84/0x120 [ 74.052660] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.053211] kthread+0x180/0x190 [ 74.053600] ret_from_fork+0x10/0x20 [ 74.054186] [ 74.054446] The buggy address belongs to stack of task kunit_try_catch/154 [ 74.055101] and is located at offset 138 in frame: [ 74.055547] kasan_stack_oob+0x0/0x170 [ 74.056076] [ 74.056289] This frame has 4 objects: [ 74.056732] [48, 49) '__assertion' [ 74.056822] [64, 72) 'array' [ 74.057157] [96, 112) '__assertion' [ 74.057503] [128, 138) 'stack_array' [ 74.058020] [ 74.058496] The buggy address ffff8000087b7d9a belongs to a vmalloc virtual mapping [ 74.059104] The buggy address belongs to the physical page: [ 74.059576] page:00000000b2a89bce refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105956 [ 74.060346] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 74.060963] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000 [ 74.061619] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 74.062372] page dumped because: kasan: bad access detected [ 74.062848] [ 74.063035] Memory state around the buggy address: [ 74.063481] ffff8000087b7c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.064045] ffff8000087b7d00: 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 00 00 [ 74.064671] >ffff8000087b7d80: f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 00 00 [ 74.065217] ^ [ 74.065601] ffff8000087b7e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.066815] ffff8000087b7e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.067413] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 74.011700] ================================================================== [ 74.012572] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0xa0/0x150 [ 74.013283] Read of size 1 at addr ffffc778ac5a6eed by task kunit_try_catch/152 [ 74.014218] [ 74.014492] CPU: 1 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.015250] Hardware name: linux,dummy-virt (DT) [ 74.015686] Call trace: [ 74.015962] dump_backtrace.part.0+0xdc/0xf0 [ 74.016471] show_stack+0x18/0x30 [ 74.016883] dump_stack_lvl+0x64/0x80 [ 74.017326] print_report+0x158/0x438 [ 74.018085] kasan_report+0xb4/0xf4 [ 74.018497] __asan_load1+0x68/0x74 [ 74.018887] kasan_global_oob_right+0xa0/0x150 [ 74.019350] kunit_try_run_case+0x84/0x120 [ 74.019812] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.020363] kthread+0x180/0x190 [ 74.020764] ret_from_fork+0x10/0x20 [ 74.021193] [ 74.021439] The buggy address belongs to the variable: [ 74.022182] global_array+0xd/0x40 [ 74.022651] [ 74.022899] The buggy address ffffc778ac5a6eed belongs to a vmalloc virtual mapping [ 74.023564] The buggy address belongs to the physical page: [ 74.024067] page:00000000841dc02e refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x455a6 [ 74.024834] flags: 0x3fffc0000001000(reserved|node=0|zone=0|lastcpupid=0xffff) [ 74.025567] raw: 03fffc0000001000 fffffc0000156988 fffffc0000156988 0000000000000000 [ 74.026335] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 74.027082] page dumped because: kasan: bad access detected [ 74.027956] [ 74.028136] Memory state around the buggy address: [ 74.028486] ffffc778ac5a6d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.028942] ffffc778ac5a6e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.029497] >ffffc778ac5a6e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9 [ 74.030557] ^ [ 74.031025] ffffc778ac5a6f00: f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 [ 74.031709] ffffc778ac5a6f80: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 [ 74.032252] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 73.406015] ================================================================== [ 73.407006] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0xd4/0x250 [ 73.407835] Read of size 1 at addr ffff0000c59440c8 by task kunit_try_catch/149 [ 73.408804] [ 73.409128] CPU: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 73.409888] Hardware name: linux,dummy-virt (DT) [ 73.410331] Call trace: [ 73.410564] dump_backtrace.part.0+0xdc/0xf0 [ 73.410991] show_stack+0x18/0x30 [ 73.411348] dump_stack_lvl+0x64/0x80 [ 73.411711] print_report+0x158/0x438 [ 73.412077] kasan_report+0xb4/0xf4 [ 73.412426] __asan_load1+0x68/0x74 [ 73.413128] kmem_cache_oob+0xd4/0x250 [ 73.413724] kunit_try_run_case+0x84/0x120 [ 73.414715] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 73.415447] kthread+0x180/0x190 [ 73.415785] ret_from_fork+0x10/0x20 [ 73.416133] [ 73.416299] Allocated by task 149: [ 73.416791] kasan_save_stack+0x3c/0x70 [ 73.417375] kasan_set_track+0x2c/0x40 [ 73.417948] kasan_save_alloc_info+0x24/0x34 [ 73.418834] __kasan_slab_alloc+0x8c/0x90 [ 73.419666] kmem_cache_alloc+0x170/0x2c4 [ 73.420608] kmem_cache_oob+0xb4/0x250 [ 73.421310] kunit_try_run_case+0x84/0x120 [ 73.422468] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 73.423472] kthread+0x180/0x190 [ 73.424157] ret_from_fork+0x10/0x20 [ 73.424907] [ 73.425308] The buggy address belongs to the object at ffff0000c5944000 [ 73.425308] which belongs to the cache test_cache of size 200 [ 73.426448] The buggy address is located 0 bytes to the right of [ 73.426448] 200-byte region [ffff0000c5944000, ffff0000c59440c8) [ 73.427350] [ 73.427570] The buggy address belongs to the physical page: [ 73.428004] page:00000000b23089e8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105944 [ 73.428770] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 73.429420] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c1398480 [ 73.430086] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000 [ 73.430688] page dumped because: kasan: bad access detected [ 73.431125] [ 73.431306] Memory state around the buggy address: [ 73.431741] ffff0000c5943f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.432342] ffff0000c5944000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 73.433008] >ffff0000c5944080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 73.433588] ^ [ 73.434225] ffff0000c5944100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.434843] ffff0000c5944180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.435426] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_uaf2
[ 73.357743] ================================================================== [ 73.358837] BUG: KASAN: use-after-free in kmalloc_uaf2+0x104/0x290 [ 73.359501] Read of size 1 at addr ffff0000c589dc28 by task kunit_try_catch/145 [ 73.360122] [ 73.360359] CPU: 1 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 73.361108] Hardware name: linux,dummy-virt (DT) [ 73.361567] Call trace: [ 73.362181] dump_backtrace.part.0+0xdc/0xf0 [ 73.362738] show_stack+0x18/0x30 [ 73.363201] dump_stack_lvl+0x64/0x80 [ 73.363666] print_report+0x158/0x438 [ 73.364142] kasan_report+0xb4/0xf4 [ 73.364559] __asan_load1+0x68/0x74 [ 73.364972] kmalloc_uaf2+0x104/0x290 [ 73.365437] kunit_try_run_case+0x84/0x120 [ 73.366119] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 73.366691] kthread+0x180/0x190 [ 73.367236] ret_from_fork+0x10/0x20 [ 73.367692] [ 73.367892] Allocated by task 145: [ 73.368236] kasan_save_stack+0x3c/0x70 [ 73.368677] kasan_set_track+0x2c/0x40 [ 73.369111] kasan_save_alloc_info+0x24/0x34 [ 73.369609] __kasan_kmalloc+0xb8/0xc0 [ 73.370284] kmalloc_trace+0x58/0x6c [ 73.370737] kmalloc_uaf2+0xac/0x290 [ 73.371153] kunit_try_run_case+0x84/0x120 [ 73.371655] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 73.372249] kthread+0x180/0x190 [ 73.372663] ret_from_fork+0x10/0x20 [ 73.373053] [ 73.373280] Freed by task 145: [ 73.373626] kasan_save_stack+0x3c/0x70 [ 73.374038] kasan_set_track+0x2c/0x40 [ 73.374490] kasan_save_free_info+0x38/0x5c [ 73.374935] __kasan_slab_free+0xe4/0x150 [ 73.375312] __kmem_cache_free+0x130/0x2a4 [ 73.376148] kfree+0x58/0x80 [ 73.376528] kmalloc_uaf2+0xc4/0x290 [ 73.376990] kunit_try_run_case+0x84/0x120 [ 73.377443] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 73.378317] kthread+0x180/0x190 [ 73.378711] ret_from_fork+0x10/0x20 [ 73.379153] [ 73.379412] The buggy address belongs to the object at ffff0000c589dc00 [ 73.379412] which belongs to the cache kmalloc-128 of size 128 [ 73.380378] The buggy address is located 40 bytes inside of [ 73.380378] 128-byte region [ffff0000c589dc00, ffff0000c589dc80) [ 73.381270] [ 73.381512] The buggy address belongs to the physical page: [ 73.382160] page:00000000b8b1210d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10589d [ 73.382902] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 73.383825] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 73.384510] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 73.385106] page dumped because: kasan: bad access detected [ 73.385599] [ 73.385787] Memory state around the buggy address: [ 73.386382] ffff0000c589db00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 73.387167] ffff0000c589db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.387798] >ffff0000c589dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 73.388382] ^ [ 73.388858] ffff0000c589dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.389507] ffff0000c589dd00: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 73.390299] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_uaf_memset
[ 73.314952] ================================================================== [ 73.315785] BUG: KASAN: use-after-free in kmalloc_uaf_memset+0xcc/0x1f0 [ 73.316428] Write of size 33 at addr ffff0000c589da00 by task kunit_try_catch/144 [ 73.316965] [ 73.317198] CPU: 1 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 73.318116] Hardware name: linux,dummy-virt (DT) [ 73.318572] Call trace: [ 73.318832] dump_backtrace.part.0+0xdc/0xf0 [ 73.319352] show_stack+0x18/0x30 [ 73.319767] dump_stack_lvl+0x64/0x80 [ 73.320186] print_report+0x158/0x438 [ 73.321414] kasan_report+0xb4/0xf4 [ 73.321884] kasan_check_range+0xe4/0x190 [ 73.322434] memset+0x40/0x70 [ 73.322869] kmalloc_uaf_memset+0xcc/0x1f0 [ 73.323619] kunit_try_run_case+0x84/0x120 [ 73.324296] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 73.324961] kthread+0x180/0x190 [ 73.325468] ret_from_fork+0x10/0x20 [ 73.326067] [ 73.326240] Allocated by task 144: [ 73.326851] kasan_save_stack+0x3c/0x70 [ 73.327412] kasan_set_track+0x2c/0x40 [ 73.327938] kasan_save_alloc_info+0x24/0x34 [ 73.328533] __kasan_kmalloc+0xb8/0xc0 [ 73.329045] kmalloc_trace+0x58/0x6c [ 73.329573] kmalloc_uaf_memset+0x94/0x1f0 [ 73.330238] kunit_try_run_case+0x84/0x120 [ 73.330811] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 73.331472] kthread+0x180/0x190 [ 73.331867] ret_from_fork+0x10/0x20 [ 73.332291] [ 73.332493] Freed by task 144: [ 73.332788] kasan_save_stack+0x3c/0x70 [ 73.333232] kasan_set_track+0x2c/0x40 [ 73.333620] kasan_save_free_info+0x38/0x5c [ 73.334110] __kasan_slab_free+0xe4/0x150 [ 73.334532] __kmem_cache_free+0x130/0x2a4 [ 73.335012] kfree+0x58/0x80 [ 73.335356] kmalloc_uaf_memset+0xb4/0x1f0 [ 73.336117] kunit_try_run_case+0x84/0x120 [ 73.336613] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 73.337178] kthread+0x180/0x190 [ 73.337589] ret_from_fork+0x10/0x20 [ 73.338194] [ 73.338808] The buggy address belongs to the object at ffff0000c589da00 [ 73.338808] which belongs to the cache kmalloc-128 of size 128 [ 73.339773] The buggy address is located 0 bytes inside of [ 73.339773] 128-byte region [ffff0000c589da00, ffff0000c589da80) [ 73.340696] [ 73.340895] The buggy address belongs to the physical page: [ 73.341374] page:00000000b8b1210d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10589d [ 73.342441] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 73.343272] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 73.343919] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 73.344541] page dumped because: kasan: bad access detected [ 73.345045] [ 73.345245] Memory state around the buggy address: [ 73.345714] ffff0000c589d900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 73.346853] ffff0000c589d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.347484] >ffff0000c589da00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 73.348051] ^ [ 73.348371] ffff0000c589da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.349028] ffff0000c589db00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.349611] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_pagealloc_uaf
[ 72.333163] ================================================================== [ 72.334193] BUG: KASAN: use-after-free in kmalloc_pagealloc_uaf+0xa8/0x1d0 [ 72.335243] Read of size 1 at addr ffff0000c5a04000 by task kunit_try_catch/124 [ 72.335836] [ 72.336080] CPU: 1 PID: 124 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 72.336865] Hardware name: linux,dummy-virt (DT) [ 72.337294] Call trace: [ 72.337592] dump_backtrace.part.0+0xdc/0xf0 [ 72.338118] show_stack+0x18/0x30 [ 72.338810] dump_stack_lvl+0x64/0x80 [ 72.339216] print_report+0x158/0x438 [ 72.339653] kasan_report+0xb4/0xf4 [ 72.340028] __asan_load1+0x68/0x74 [ 72.340446] kmalloc_pagealloc_uaf+0xa8/0x1d0 [ 72.340934] kunit_try_run_case+0x84/0x120 [ 72.341435] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.342270] kthread+0x180/0x190 [ 72.342702] ret_from_fork+0x10/0x20 [ 72.343101] [ 72.343310] The buggy address belongs to the physical page: [ 72.343846] page:00000000275a55ef refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a04 [ 72.344594] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 72.345213] raw: 0bfffc0000000000 fffffc0003168208 ffff0000dac48ff8 0000000000000000 [ 72.346059] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 72.346682] page dumped because: kasan: bad access detected [ 72.347097] [ 72.347269] Memory state around the buggy address: [ 72.347726] ffff0000c5a03f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.348296] ffff0000c5a03f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.349105] >ffff0000c5a04000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 72.349720] ^ [ 72.350280] ffff0000c5a04080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 72.350900] ffff0000c5a04100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 72.351484] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_uaf
[ 73.271251] ================================================================== [ 73.272777] BUG: KASAN: use-after-free in kmalloc_uaf+0xc4/0x1e0 [ 73.273908] Read of size 1 at addr ffff0000c589d808 by task kunit_try_catch/143 [ 73.275193] [ 73.275683] CPU: 1 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 73.276681] Hardware name: linux,dummy-virt (DT) [ 73.277381] Call trace: [ 73.277940] dump_backtrace.part.0+0xdc/0xf0 [ 73.278796] show_stack+0x18/0x30 [ 73.279479] dump_stack_lvl+0x64/0x80 [ 73.280171] print_report+0x158/0x438 [ 73.280865] kasan_report+0xb4/0xf4 [ 73.281513] __asan_load1+0x68/0x74 [ 73.282221] kmalloc_uaf+0xc4/0x1e0 [ 73.283003] kunit_try_run_case+0x84/0x120 [ 73.283764] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 73.284660] kthread+0x180/0x190 [ 73.285193] ret_from_fork+0x10/0x20 [ 73.285788] [ 73.286064] Allocated by task 143: [ 73.286644] kasan_save_stack+0x3c/0x70 [ 73.287233] kasan_set_track+0x2c/0x40 [ 73.287801] kasan_save_alloc_info+0x24/0x34 [ 73.288443] __kasan_kmalloc+0xb8/0xc0 [ 73.288946] kmalloc_trace+0x58/0x6c [ 73.289294] kmalloc_uaf+0x94/0x1e0 [ 73.289652] kunit_try_run_case+0x84/0x120 [ 73.290346] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 73.291185] kthread+0x180/0x190 [ 73.291808] ret_from_fork+0x10/0x20 [ 73.292377] [ 73.292651] Freed by task 143: [ 73.293098] kasan_save_stack+0x3c/0x70 [ 73.293681] kasan_set_track+0x2c/0x40 [ 73.294343] kasan_save_free_info+0x38/0x5c [ 73.295078] __kasan_slab_free+0xe4/0x150 [ 73.295717] __kmem_cache_free+0x130/0x2a4 [ 73.296389] kfree+0x58/0x80 [ 73.296900] kmalloc_uaf+0xb4/0x1e0 [ 73.297473] kunit_try_run_case+0x84/0x120 [ 73.298291] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 73.298927] kthread+0x180/0x190 [ 73.299244] ret_from_fork+0x10/0x20 [ 73.299601] [ 73.299844] The buggy address belongs to the object at ffff0000c589d800 [ 73.299844] which belongs to the cache kmalloc-128 of size 128 [ 73.300812] The buggy address is located 8 bytes inside of [ 73.300812] 128-byte region [ffff0000c589d800, ffff0000c589d880) [ 73.301705] [ 73.302292] The buggy address belongs to the physical page: [ 73.302787] page:00000000b8b1210d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10589d [ 73.303569] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 73.304233] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 73.304929] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 73.305549] page dumped because: kasan: bad access detected [ 73.305988] [ 73.306267] Memory state around the buggy address: [ 73.307255] ffff0000c589d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 73.307908] ffff0000c589d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.308544] >ffff0000c589d800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 73.309123] ^ [ 73.309505] ffff0000c589d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.310158] ffff0000c589d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.310919] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 73.231542] ================================================================== [ 73.232300] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0xdc/0x1e0 [ 73.232920] Read of size 64 at addr ffff0000c5915c04 by task kunit_try_catch/142 [ 73.233381] [ 73.234061] CPU: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 73.235807] Hardware name: linux,dummy-virt (DT) [ 73.236454] Call trace: [ 73.236866] dump_backtrace.part.0+0xdc/0xf0 [ 73.237591] show_stack+0x18/0x30 [ 73.238262] dump_stack_lvl+0x64/0x80 [ 73.238877] print_report+0x158/0x438 [ 73.239489] kasan_report+0xb4/0xf4 [ 73.240037] kasan_check_range+0xe4/0x190 [ 73.240649] memmove+0x44/0xc0 [ 73.241163] kmalloc_memmove_invalid_size+0xdc/0x1e0 [ 73.241960] kunit_try_run_case+0x84/0x120 [ 73.242635] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 73.243422] kthread+0x180/0x190 [ 73.243948] ret_from_fork+0x10/0x20 [ 73.244515] [ 73.244795] Allocated by task 142: [ 73.245270] kasan_save_stack+0x3c/0x70 [ 73.245905] kasan_set_track+0x2c/0x40 [ 73.246506] kasan_save_alloc_info+0x24/0x34 [ 73.247152] __kasan_kmalloc+0xb8/0xc0 [ 73.247715] kmalloc_trace+0x58/0x6c [ 73.248280] kmalloc_memmove_invalid_size+0x98/0x1e0 [ 73.248809] kunit_try_run_case+0x84/0x120 [ 73.249185] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 73.249865] kthread+0x180/0x190 [ 73.250248] ret_from_fork+0x10/0x20 [ 73.250808] [ 73.251083] The buggy address belongs to the object at ffff0000c5915c00 [ 73.251083] which belongs to the cache kmalloc-128 of size 128 [ 73.251917] The buggy address is located 4 bytes inside of [ 73.251917] 128-byte region [ffff0000c5915c00, ffff0000c5915c80) [ 73.252586] [ 73.252755] The buggy address belongs to the physical page: [ 73.253106] page:0000000033330a0d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105915 [ 73.255194] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 73.256100] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 73.257327] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 73.258782] page dumped because: kasan: bad access detected [ 73.259157] [ 73.259325] Memory state around the buggy address: [ 73.259695] ffff0000c5915b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 73.260161] ffff0000c5915b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.261942] >ffff0000c5915c00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 73.263423] ^ [ 73.264313] ffff0000c5915c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.265588] ffff0000c5915d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.266952] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 73.193216] ================================================================== [ 73.194866] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0xdc/0x1f0 [ 73.196478] Read of size 18446744073709551614 at addr ffff0000c589d304 by task kunit_try_catch/141 [ 73.197747] [ 73.197951] CPU: 1 PID: 141 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 73.199055] Hardware name: linux,dummy-virt (DT) [ 73.199843] Call trace: [ 73.200472] dump_backtrace.part.0+0xdc/0xf0 [ 73.201571] show_stack+0x18/0x30 [ 73.202177] dump_stack_lvl+0x64/0x80 [ 73.202648] print_report+0x158/0x438 [ 73.203091] kasan_report+0xb4/0xf4 [ 73.203533] kasan_check_range+0xe4/0x190 [ 73.203982] memmove+0x44/0xc0 [ 73.204361] kmalloc_memmove_negative_size+0xdc/0x1f0 [ 73.205425] kunit_try_run_case+0x84/0x120 [ 73.205861] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 73.206747] kthread+0x180/0x190 [ 73.207134] ret_from_fork+0x10/0x20 [ 73.207567] [ 73.207755] Allocated by task 141: [ 73.208076] kasan_save_stack+0x3c/0x70 [ 73.208514] kasan_set_track+0x2c/0x40 [ 73.208942] kasan_save_alloc_info+0x24/0x34 [ 73.209386] __kasan_kmalloc+0xb8/0xc0 [ 73.210373] kmalloc_trace+0x58/0x6c [ 73.210790] kmalloc_memmove_negative_size+0x98/0x1f0 [ 73.211336] kunit_try_run_case+0x84/0x120 [ 73.211812] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 73.212342] kthread+0x180/0x190 [ 73.212713] ret_from_fork+0x10/0x20 [ 73.213113] [ 73.213318] The buggy address belongs to the object at ffff0000c589d300 [ 73.213318] which belongs to the cache kmalloc-128 of size 128 [ 73.214420] The buggy address is located 4 bytes inside of [ 73.214420] 128-byte region [ffff0000c589d300, ffff0000c589d380) [ 73.215324] [ 73.215517] The buggy address belongs to the physical page: [ 73.216054] page:00000000b8b1210d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10589d [ 73.217018] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 73.217712] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 73.218850] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 73.219444] page dumped because: kasan: bad access detected [ 73.219900] [ 73.220098] Memory state around the buggy address: [ 73.220523] ffff0000c589d200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 73.221105] ffff0000c589d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.221724] >ffff0000c589d300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 73.222565] ^ [ 73.222913] ffff0000c589d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.223512] ffff0000c589d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.224066] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 73.159096] ================================================================== [ 73.159829] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xd0/0x200 [ 73.160385] Write of size 16 at addr ffff0000c5915869 by task kunit_try_catch/140 [ 73.161413] [ 73.161729] CPU: 0 PID: 140 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 73.163101] Hardware name: linux,dummy-virt (DT) [ 73.163708] Call trace: [ 73.164069] dump_backtrace.part.0+0xdc/0xf0 [ 73.164739] show_stack+0x18/0x30 [ 73.165292] dump_stack_lvl+0x64/0x80 [ 73.166292] print_report+0x158/0x438 [ 73.166892] kasan_report+0xb4/0xf4 [ 73.167430] kasan_check_range+0xe4/0x190 [ 73.168028] memset+0x40/0x70 [ 73.168527] kmalloc_oob_memset_16+0xd0/0x200 [ 73.169166] kunit_try_run_case+0x84/0x120 [ 73.169928] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 73.170514] kthread+0x180/0x190 [ 73.170841] ret_from_fork+0x10/0x20 [ 73.171183] [ 73.171348] Allocated by task 140: [ 73.171820] kasan_save_stack+0x3c/0x70 [ 73.172382] kasan_set_track+0x2c/0x40 [ 73.172942] kasan_save_alloc_info+0x24/0x34 [ 73.173570] __kasan_kmalloc+0xb8/0xc0 [ 73.174270] kmalloc_trace+0x58/0x6c [ 73.174848] kmalloc_oob_memset_16+0x98/0x200 [ 73.175504] kunit_try_run_case+0x84/0x120 [ 73.176109] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 73.176853] kthread+0x180/0x190 [ 73.177353] ret_from_fork+0x10/0x20 [ 73.178078] [ 73.178843] The buggy address belongs to the object at ffff0000c5915800 [ 73.178843] which belongs to the cache kmalloc-128 of size 128 [ 73.179893] The buggy address is located 105 bytes inside of [ 73.179893] 128-byte region [ffff0000c5915800, ffff0000c5915880) [ 73.180586] [ 73.180799] The buggy address belongs to the physical page: [ 73.181301] page:0000000033330a0d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105915 [ 73.182357] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 73.183012] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 73.183675] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 73.184271] page dumped because: kasan: bad access detected [ 73.184670] [ 73.184889] Memory state around the buggy address: [ 73.185334] ffff0000c5915700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 73.186133] ffff0000c5915780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.186752] >ffff0000c5915800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 73.187327] ^ [ 73.187918] ffff0000c5915880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.188518] ffff0000c5915900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.189081] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 73.121147] ================================================================== [ 73.122270] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xd0/0x200 [ 73.123404] Write of size 8 at addr ffff0000c5916f71 by task kunit_try_catch/139 [ 73.124335] [ 73.124547] CPU: 1 PID: 139 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 73.125081] Hardware name: linux,dummy-virt (DT) [ 73.125418] Call trace: [ 73.125926] dump_backtrace.part.0+0xdc/0xf0 [ 73.126744] show_stack+0x18/0x30 [ 73.127358] dump_stack_lvl+0x64/0x80 [ 73.127982] print_report+0x158/0x438 [ 73.128610] kasan_report+0xb4/0xf4 [ 73.129178] kasan_check_range+0xe4/0x190 [ 73.129850] memset+0x40/0x70 [ 73.130463] kmalloc_oob_memset_8+0xd0/0x200 [ 73.131141] kunit_try_run_case+0x84/0x120 [ 73.131802] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 73.132579] kthread+0x180/0x190 [ 73.133098] ret_from_fork+0x10/0x20 [ 73.133665] [ 73.133994] Allocated by task 139: [ 73.134557] kasan_save_stack+0x3c/0x70 [ 73.135213] kasan_set_track+0x2c/0x40 [ 73.135858] kasan_save_alloc_info+0x24/0x34 [ 73.136513] __kasan_kmalloc+0xb8/0xc0 [ 73.137065] kmalloc_trace+0x58/0x6c [ 73.137640] kmalloc_oob_memset_8+0x98/0x200 [ 73.138321] kunit_try_run_case+0x84/0x120 [ 73.139010] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 73.139786] kthread+0x180/0x190 [ 73.140171] ret_from_fork+0x10/0x20 [ 73.140522] [ 73.140687] The buggy address belongs to the object at ffff0000c5916f00 [ 73.140687] which belongs to the cache kmalloc-128 of size 128 [ 73.141368] The buggy address is located 113 bytes inside of [ 73.141368] 128-byte region [ffff0000c5916f00, ffff0000c5916f80) [ 73.142913] [ 73.143207] The buggy address belongs to the physical page: [ 73.143975] page:00000000a76cf208 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105916 [ 73.145069] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 73.146002] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 73.147061] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 73.147986] page dumped because: kasan: bad access detected [ 73.148660] [ 73.148934] Memory state around the buggy address: [ 73.149552] ffff0000c5916e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 73.150553] ffff0000c5916e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.151540] >ffff0000c5916f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 73.152380] ^ [ 73.153165] ffff0000c5916f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.153641] ffff0000c5917000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 73.154618] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 73.089956] ================================================================== [ 73.091443] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xd0/0x200 [ 73.092116] Write of size 4 at addr ffff0000c5916e75 by task kunit_try_catch/138 [ 73.092766] [ 73.093088] CPU: 1 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 73.093812] Hardware name: linux,dummy-virt (DT) [ 73.094662] Call trace: [ 73.094905] dump_backtrace.part.0+0xdc/0xf0 [ 73.095402] show_stack+0x18/0x30 [ 73.095865] dump_stack_lvl+0x64/0x80 [ 73.096326] print_report+0x158/0x438 [ 73.096765] kasan_report+0xb4/0xf4 [ 73.097143] kasan_check_range+0xe4/0x190 [ 73.097587] memset+0x40/0x70 [ 73.097999] kmalloc_oob_memset_4+0xd0/0x200 [ 73.098540] kunit_try_run_case+0x84/0x120 [ 73.099012] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 73.099579] kthread+0x180/0x190 [ 73.099952] ret_from_fork+0x10/0x20 [ 73.100344] [ 73.100800] Allocated by task 138: [ 73.101126] kasan_save_stack+0x3c/0x70 [ 73.101536] kasan_set_track+0x2c/0x40 [ 73.102091] kasan_save_alloc_info+0x24/0x34 [ 73.102541] __kasan_kmalloc+0xb8/0xc0 [ 73.102945] kmalloc_trace+0x58/0x6c [ 73.103361] kmalloc_oob_memset_4+0x98/0x200 [ 73.103863] kunit_try_run_case+0x84/0x120 [ 73.104306] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 73.105011] kthread+0x180/0x190 [ 73.105378] ret_from_fork+0x10/0x20 [ 73.105787] [ 73.106175] The buggy address belongs to the object at ffff0000c5916e00 [ 73.106175] which belongs to the cache kmalloc-128 of size 128 [ 73.107107] The buggy address is located 117 bytes inside of [ 73.107107] 128-byte region [ffff0000c5916e00, ffff0000c5916e80) [ 73.108003] [ 73.108174] The buggy address belongs to the physical page: [ 73.108806] page:00000000a76cf208 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105916 [ 73.109575] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 73.110499] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 73.111143] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 73.111754] page dumped because: kasan: bad access detected [ 73.112173] [ 73.112377] Memory state around the buggy address: [ 73.112758] ffff0000c5916d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 73.113389] ffff0000c5916d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.114020] >ffff0000c5916e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 73.114565] ^ [ 73.115118] ffff0000c5916e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.115698] ffff0000c5916f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.116263] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 73.053373] ================================================================== [ 73.054926] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0xd0/0x200 [ 73.055941] Write of size 2 at addr ffff0000c5915177 by task kunit_try_catch/137 [ 73.056682] [ 73.056875] CPU: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 73.057429] Hardware name: linux,dummy-virt (DT) [ 73.058031] Call trace: [ 73.058504] dump_backtrace.part.0+0xdc/0xf0 [ 73.059205] show_stack+0x18/0x30 [ 73.059795] dump_stack_lvl+0x64/0x80 [ 73.060381] print_report+0x158/0x438 [ 73.060986] kasan_report+0xb4/0xf4 [ 73.061547] kasan_check_range+0xe4/0x190 [ 73.062246] memset+0x40/0x70 [ 73.062794] kmalloc_oob_memset_2+0xd0/0x200 [ 73.063456] kunit_try_run_case+0x84/0x120 [ 73.064088] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 73.064845] kthread+0x180/0x190 [ 73.065224] ret_from_fork+0x10/0x20 [ 73.065578] [ 73.065777] Allocated by task 137: [ 73.066266] kasan_save_stack+0x3c/0x70 [ 73.066860] kasan_set_track+0x2c/0x40 [ 73.067391] kasan_save_alloc_info+0x24/0x34 [ 73.068021] __kasan_kmalloc+0xb8/0xc0 [ 73.068563] kmalloc_trace+0x58/0x6c [ 73.069105] kmalloc_oob_memset_2+0x98/0x200 [ 73.069739] kunit_try_run_case+0x84/0x120 [ 73.070442] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 73.071273] kthread+0x180/0x190 [ 73.071734] ret_from_fork+0x10/0x20 [ 73.072071] [ 73.072238] The buggy address belongs to the object at ffff0000c5915100 [ 73.072238] which belongs to the cache kmalloc-128 of size 128 [ 73.072940] The buggy address is located 119 bytes inside of [ 73.072940] 128-byte region [ffff0000c5915100, ffff0000c5915180) [ 73.073872] [ 73.074142] The buggy address belongs to the physical page: [ 73.074989] page:0000000033330a0d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105915 [ 73.076221] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 73.077200] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 73.078229] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 73.079250] page dumped because: kasan: bad access detected [ 73.079922] [ 73.080174] Memory state around the buggy address: [ 73.080782] ffff0000c5915000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 73.081625] ffff0000c5915080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.082467] >ffff0000c5915100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 73.083275] ^ [ 73.084112] ffff0000c5915180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.084953] ffff0000c5915200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.085768] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 73.014362] ================================================================== [ 73.015734] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0xcc/0x1f0 [ 73.016373] Write of size 128 at addr ffff0000c5915000 by task kunit_try_catch/136 [ 73.016859] [ 73.017043] CPU: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 73.017590] Hardware name: linux,dummy-virt (DT) [ 73.018468] Call trace: [ 73.019370] dump_backtrace.part.0+0xdc/0xf0 [ 73.020176] show_stack+0x18/0x30 [ 73.020981] dump_stack_lvl+0x64/0x80 [ 73.021436] print_report+0x158/0x438 [ 73.021850] kasan_report+0xb4/0xf4 [ 73.022278] kasan_check_range+0xe4/0x190 [ 73.023390] memset+0x40/0x70 [ 73.023753] kmalloc_oob_in_memset+0xcc/0x1f0 [ 73.024165] kunit_try_run_case+0x84/0x120 [ 73.024570] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 73.025033] kthread+0x180/0x190 [ 73.025352] ret_from_fork+0x10/0x20 [ 73.026429] [ 73.026903] Allocated by task 136: [ 73.027525] kasan_save_stack+0x3c/0x70 [ 73.028299] kasan_set_track+0x2c/0x40 [ 73.029054] kasan_save_alloc_info+0x24/0x34 [ 73.029933] __kasan_kmalloc+0xb8/0xc0 [ 73.030675] kmalloc_trace+0x58/0x6c [ 73.031444] kmalloc_oob_in_memset+0x98/0x1f0 [ 73.032259] kunit_try_run_case+0x84/0x120 [ 73.033014] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 73.033917] kthread+0x180/0x190 [ 73.034610] ret_from_fork+0x10/0x20 [ 73.035267] [ 73.035586] The buggy address belongs to the object at ffff0000c5915000 [ 73.035586] which belongs to the cache kmalloc-128 of size 128 [ 73.037005] The buggy address is located 0 bytes inside of [ 73.037005] 128-byte region [ffff0000c5915000, ffff0000c5915080) [ 73.038490] [ 73.038829] The buggy address belongs to the physical page: [ 73.039595] page:0000000033330a0d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105915 [ 73.040701] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 73.041422] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 73.042359] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 73.043241] page dumped because: kasan: bad access detected [ 73.043891] [ 73.044142] Memory state around the buggy address: [ 73.044584] ffff0000c5914f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.045050] ffff0000c5914f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.045603] >ffff0000c5915000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 73.046578] ^ [ 73.047494] ffff0000c5915080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.048443] ffff0000c5915100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.049340] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[ 72.356152] ================================================================== [ 72.356952] BUG: KASAN: invalid-free in kfree+0x74/0x80 [ 72.357443] Free of addr ffff0000c5a04001 by task kunit_try_catch/125 [ 72.358499] [ 72.358865] CPU: 1 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 72.360061] Hardware name: linux,dummy-virt (DT) [ 72.360726] Call trace: [ 72.361108] dump_backtrace.part.0+0xdc/0xf0 [ 72.361820] show_stack+0x18/0x30 [ 72.362458] dump_stack_lvl+0x64/0x80 [ 72.363031] print_report+0x158/0x438 [ 72.363621] kasan_report_invalid_free+0x9c/0xc0 [ 72.364267] __kasan_kfree_large+0x54/0xa0 [ 72.364871] free_large_kmalloc+0x5c/0xf0 [ 72.365464] kfree+0x74/0x80 [ 72.365824] kmalloc_pagealloc_invalid_free+0xa0/0x1b0 [ 72.366642] kunit_try_run_case+0x84/0x120 [ 72.367317] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.368159] kthread+0x180/0x190 [ 72.368674] ret_from_fork+0x10/0x20 [ 72.369220] [ 72.369475] The buggy address belongs to the physical page: [ 72.369848] page:00000000275a55ef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a04 [ 72.370419] head:00000000275a55ef order:2 compound_mapcount:0 compound_pincount:0 [ 72.370876] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff) [ 72.371432] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000 [ 72.372558] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 72.373600] page dumped because: kasan: bad access detected [ 72.374429] [ 72.374715] Memory state around the buggy address: [ 72.375425] ffff0000c5a03f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.376418] ffff0000c5a03f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.377323] >ffff0000c5a04000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.378249] ^ [ 72.378817] ffff0000c5a04080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.379840] ffff0000c5a04100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.380720] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_uaf_16
[ 72.967443] ================================================================== [ 72.968303] BUG: KASAN: use-after-free in kmalloc_uaf_16+0xfc/0x290 [ 72.968955] Read of size 16 at addr ffff0000c5952f00 by task kunit_try_catch/135 [ 72.969478] [ 72.969663] CPU: 0 PID: 135 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 72.970979] Hardware name: linux,dummy-virt (DT) [ 72.971604] Call trace: [ 72.971981] dump_backtrace.part.0+0xdc/0xf0 [ 72.972673] show_stack+0x18/0x30 [ 72.973235] dump_stack_lvl+0x64/0x80 [ 72.973866] print_report+0x158/0x438 [ 72.974521] kasan_report+0xb4/0xf4 [ 72.975055] __asan_load16+0x68/0x9c [ 72.975406] kmalloc_uaf_16+0xfc/0x290 [ 72.975779] kunit_try_run_case+0x84/0x120 [ 72.976157] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.976891] kthread+0x180/0x190 [ 72.977413] ret_from_fork+0x10/0x20 [ 72.978193] [ 72.978484] Allocated by task 135: [ 72.979020] kasan_save_stack+0x3c/0x70 [ 72.979623] kasan_set_track+0x2c/0x40 [ 72.980190] kasan_save_alloc_info+0x24/0x34 [ 72.980839] __kasan_kmalloc+0xb8/0xc0 [ 72.981406] kmalloc_trace+0x58/0x6c [ 72.982058] kmalloc_uaf_16+0xc4/0x290 [ 72.982739] kunit_try_run_case+0x84/0x120 [ 72.983362] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.984143] kthread+0x180/0x190 [ 72.984662] ret_from_fork+0x10/0x20 [ 72.985223] [ 72.985512] Freed by task 135: [ 72.986045] kasan_save_stack+0x3c/0x70 [ 72.986809] kasan_set_track+0x2c/0x40 [ 72.987389] kasan_save_free_info+0x38/0x5c [ 72.988039] __kasan_slab_free+0xe4/0x150 [ 72.988662] __kmem_cache_free+0x130/0x2a4 [ 72.989208] kfree+0x58/0x80 [ 72.989537] kmalloc_uaf_16+0xe4/0x290 [ 72.990176] kunit_try_run_case+0x84/0x120 [ 72.990907] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.991696] kthread+0x180/0x190 [ 72.992301] ret_from_fork+0x10/0x20 [ 72.992951] [ 72.993217] The buggy address belongs to the object at ffff0000c5952f00 [ 72.993217] which belongs to the cache kmalloc-128 of size 128 [ 72.994838] The buggy address is located 0 bytes inside of [ 72.994838] 128-byte region [ffff0000c5952f00, ffff0000c5952f80) [ 72.996791] [ 72.996989] The buggy address belongs to the physical page: [ 72.997525] page:000000000a751a16 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105952 [ 72.998747] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 72.999285] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 72.999802] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 73.000253] page dumped because: kasan: bad access detected [ 73.001220] [ 73.001571] Memory state around the buggy address: [ 73.002479] ffff0000c5952e00: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.003361] ffff0000c5952e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.004262] >ffff0000c5952f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 73.005241] ^ [ 73.006015] ffff0000c5952f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.007045] ffff0000c5953000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 73.007909] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 72.932298] ================================================================== [ 72.933147] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0xf0/0x290 [ 72.933764] Write of size 16 at addr ffff0000c5952c00 by task kunit_try_catch/134 [ 72.934441] [ 72.934682] CPU: 0 PID: 134 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 72.935305] Hardware name: linux,dummy-virt (DT) [ 72.936510] Call trace: [ 72.936751] dump_backtrace.part.0+0xdc/0xf0 [ 72.937185] show_stack+0x18/0x30 [ 72.937558] dump_stack_lvl+0x64/0x80 [ 72.938643] print_report+0x158/0x438 [ 72.939331] kasan_report+0xb4/0xf4 [ 72.939922] __asan_store16+0x68/0x94 [ 72.940513] kmalloc_oob_16+0xf0/0x290 [ 72.941144] kunit_try_run_case+0x84/0x120 [ 72.941850] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.942738] kthread+0x180/0x190 [ 72.943283] ret_from_fork+0x10/0x20 [ 72.943897] [ 72.944171] Allocated by task 134: [ 72.944657] kasan_save_stack+0x3c/0x70 [ 72.945255] kasan_set_track+0x2c/0x40 [ 72.945878] kasan_save_alloc_info+0x24/0x34 [ 72.946594] __kasan_kmalloc+0xb8/0xc0 [ 72.947170] kmalloc_trace+0x58/0x6c [ 72.947759] kmalloc_oob_16+0x9c/0x290 [ 72.948368] kunit_try_run_case+0x84/0x120 [ 72.949014] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.949811] kthread+0x180/0x190 [ 72.950459] ret_from_fork+0x10/0x20 [ 72.951039] [ 72.951257] The buggy address belongs to the object at ffff0000c5952c00 [ 72.951257] which belongs to the cache kmalloc-128 of size 128 [ 72.952140] The buggy address is located 0 bytes inside of [ 72.952140] 128-byte region [ffff0000c5952c00, ffff0000c5952c80) [ 72.953345] [ 72.953624] The buggy address belongs to the physical page: [ 72.954448] page:000000000a751a16 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105952 [ 72.955678] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 72.956720] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 72.957666] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 72.958677] page dumped because: kasan: bad access detected [ 72.959383] [ 72.959637] Memory state around the buggy address: [ 72.960328] ffff0000c5952b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 72.960993] ffff0000c5952b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.961473] >ffff0000c5952c00: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.962373] ^ [ 72.962867] ffff0000c5952c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.963330] ffff0000c5952d00: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.963867] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-krealloc_uaf
[ 72.896921] ================================================================== [ 72.897455] BUG: KASAN: use-after-free in krealloc_uaf+0x104/0x2f0 [ 72.898165] Read of size 1 at addr ffff0000c55e6400 by task kunit_try_catch/133 [ 72.898789] [ 72.899129] CPU: 1 PID: 133 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 72.899920] Hardware name: linux,dummy-virt (DT) [ 72.900305] Call trace: [ 72.901161] dump_backtrace.part.0+0xdc/0xf0 [ 72.901691] show_stack+0x18/0x30 [ 72.902554] dump_stack_lvl+0x64/0x80 [ 72.902978] print_report+0x158/0x438 [ 72.903425] kasan_report+0xb4/0xf4 [ 72.903853] __asan_load1+0x68/0x74 [ 72.904261] krealloc_uaf+0x104/0x2f0 [ 72.904705] kunit_try_run_case+0x84/0x120 [ 72.905162] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.905696] kthread+0x180/0x190 [ 72.906229] ret_from_fork+0x10/0x20 [ 72.906658] [ 72.906868] Allocated by task 133: [ 72.907217] kasan_save_stack+0x3c/0x70 [ 72.907649] kasan_set_track+0x2c/0x40 [ 72.908056] kasan_save_alloc_info+0x24/0x34 [ 72.908547] __kasan_kmalloc+0xb8/0xc0 [ 72.908985] kmalloc_trace+0x58/0x6c [ 72.909405] krealloc_uaf+0xa8/0x2f0 [ 72.909987] kunit_try_run_case+0x84/0x120 [ 72.910438] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.910963] kthread+0x180/0x190 [ 72.911342] ret_from_fork+0x10/0x20 [ 72.911758] [ 72.911944] Freed by task 133: [ 72.912267] kasan_save_stack+0x3c/0x70 [ 72.912679] kasan_set_track+0x2c/0x40 [ 72.913063] kasan_save_free_info+0x38/0x5c [ 72.913528] __kasan_slab_free+0xe4/0x150 [ 72.914598] __kmem_cache_free+0x130/0x2a4 [ 72.915066] kfree+0x58/0x80 [ 72.915448] krealloc_uaf+0xc8/0x2f0 [ 72.915881] kunit_try_run_case+0x84/0x120 [ 72.916339] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.916871] kthread+0x180/0x190 [ 72.917256] ret_from_fork+0x10/0x20 [ 72.917682] [ 72.917897] The buggy address belongs to the object at ffff0000c55e6400 [ 72.917897] which belongs to the cache kmalloc-256 of size 256 [ 72.918820] The buggy address is located 0 bytes inside of [ 72.918820] 256-byte region [ffff0000c55e6400, ffff0000c55e6500) [ 72.919695] [ 72.919901] The buggy address belongs to the physical page: [ 72.920351] page:0000000087736949 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055e6 [ 72.921298] head:0000000087736949 order:1 compound_mapcount:0 compound_pincount:0 [ 72.922044] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 72.922762] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480 [ 72.923432] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 72.924084] page dumped because: kasan: bad access detected [ 72.924533] [ 72.924729] Memory state around the buggy address: [ 72.925139] ffff0000c55e6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.925733] ffff0000c55e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.926333] >ffff0000c55e6400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 72.927079] ^ [ 72.927435] ffff0000c55e6480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 72.928028] ffff0000c55e6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.928611] ================================================================== [ 72.860314] ================================================================== [ 72.861222] BUG: KASAN: use-after-free in krealloc_uaf+0xe0/0x2f0 [ 72.861845] Read of size 1 at addr ffff0000c55e6400 by task kunit_try_catch/133 [ 72.862376] [ 72.862621] CPU: 1 PID: 133 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 72.863275] Hardware name: linux,dummy-virt (DT) [ 72.863911] Call trace: [ 72.864180] dump_backtrace.part.0+0xdc/0xf0 [ 72.864712] show_stack+0x18/0x30 [ 72.865117] dump_stack_lvl+0x64/0x80 [ 72.865611] print_report+0x158/0x438 [ 72.866205] kasan_report+0xb4/0xf4 [ 72.866635] __kasan_check_byte+0x54/0x70 [ 72.867062] krealloc+0xe0/0x1a0 [ 72.867457] krealloc_uaf+0xe0/0x2f0 [ 72.867898] kunit_try_run_case+0x84/0x120 [ 72.868362] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.868948] kthread+0x180/0x190 [ 72.869344] ret_from_fork+0x10/0x20 [ 72.869816] [ 72.870034] Allocated by task 133: [ 72.870345] kasan_save_stack+0x3c/0x70 [ 72.870760] kasan_set_track+0x2c/0x40 [ 72.871175] kasan_save_alloc_info+0x24/0x34 [ 72.871786] __kasan_kmalloc+0xb8/0xc0 [ 72.872203] kmalloc_trace+0x58/0x6c [ 72.872642] krealloc_uaf+0xa8/0x2f0 [ 72.873078] kunit_try_run_case+0x84/0x120 [ 72.873557] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.874255] kthread+0x180/0x190 [ 72.874662] ret_from_fork+0x10/0x20 [ 72.875072] [ 72.875301] Freed by task 133: [ 72.875636] kasan_save_stack+0x3c/0x70 [ 72.876061] kasan_set_track+0x2c/0x40 [ 72.876480] kasan_save_free_info+0x38/0x5c [ 72.876922] __kasan_slab_free+0xe4/0x150 [ 72.877349] __kmem_cache_free+0x130/0x2a4 [ 72.877883] kfree+0x58/0x80 [ 72.878248] krealloc_uaf+0xc8/0x2f0 [ 72.878677] kunit_try_run_case+0x84/0x120 [ 72.879124] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.879959] kthread+0x180/0x190 [ 72.880363] ret_from_fork+0x10/0x20 [ 72.880799] [ 72.880976] The buggy address belongs to the object at ffff0000c55e6400 [ 72.880976] which belongs to the cache kmalloc-256 of size 256 [ 72.882242] The buggy address is located 0 bytes inside of [ 72.882242] 256-byte region [ffff0000c55e6400, ffff0000c55e6500) [ 72.883101] [ 72.883294] The buggy address belongs to the physical page: [ 72.883766] page:0000000087736949 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055e6 [ 72.884732] head:0000000087736949 order:1 compound_mapcount:0 compound_pincount:0 [ 72.885412] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 72.886307] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480 [ 72.887097] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 72.887828] page dumped because: kasan: bad access detected [ 72.888344] [ 72.888642] Memory state around the buggy address: [ 72.889176] ffff0000c55e6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.889923] ffff0000c55e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.890764] >ffff0000c55e6400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 72.891332] ^ [ 72.891692] ffff0000c55e6480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 72.892271] ffff0000c55e6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.892827] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 72.795260] ================================================================== [ 72.795800] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x180/0x5b0 [ 72.796872] Write of size 1 at addr ffff0000c5a360da by task kunit_try_catch/132 [ 72.797462] [ 72.797664] CPU: 0 PID: 132 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 72.798841] Hardware name: linux,dummy-virt (DT) [ 72.799231] Call trace: [ 72.799494] dump_backtrace.part.0+0xdc/0xf0 [ 72.800029] show_stack+0x18/0x30 [ 72.800452] dump_stack_lvl+0x64/0x80 [ 72.800905] print_report+0x158/0x438 [ 72.801339] kasan_report+0xb4/0xf4 [ 72.801737] __asan_store1+0x68/0x7c [ 72.802124] krealloc_less_oob_helper+0x180/0x5b0 [ 72.802917] krealloc_pagealloc_less_oob+0x18/0x24 [ 72.803460] kunit_try_run_case+0x84/0x120 [ 72.803932] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.804481] kthread+0x180/0x190 [ 72.804847] ret_from_fork+0x10/0x20 [ 72.805243] [ 72.805436] The buggy address belongs to the physical page: [ 72.806378] page:00000000172f0408 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a34 [ 72.807109] head:00000000172f0408 order:2 compound_mapcount:0 compound_pincount:0 [ 72.807712] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff) [ 72.808357] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000 [ 72.809007] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 72.809598] page dumped because: kasan: bad access detected [ 72.810106] [ 72.810314] Memory state around the buggy address: [ 72.810762] ffff0000c5a35f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.811364] ffff0000c5a36000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.811973] >ffff0000c5a36080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 72.812814] ^ [ 72.813310] ffff0000c5a36100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 72.814384] ffff0000c5a36180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 72.814930] ================================================================== [ 72.815645] ================================================================== [ 72.816115] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1a8/0x5b0 [ 72.816905] Write of size 1 at addr ffff0000c5a360ea by task kunit_try_catch/132 [ 72.817508] [ 72.817696] CPU: 0 PID: 132 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 72.818628] Hardware name: linux,dummy-virt (DT) [ 72.819017] Call trace: [ 72.819313] dump_backtrace.part.0+0xdc/0xf0 [ 72.819832] show_stack+0x18/0x30 [ 72.820287] dump_stack_lvl+0x64/0x80 [ 72.820736] print_report+0x158/0x438 [ 72.821173] kasan_report+0xb4/0xf4 [ 72.821577] __asan_store1+0x68/0x7c [ 72.822574] krealloc_less_oob_helper+0x1a8/0x5b0 [ 72.823078] krealloc_pagealloc_less_oob+0x18/0x24 [ 72.823573] kunit_try_run_case+0x84/0x120 [ 72.824041] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.824653] kthread+0x180/0x190 [ 72.825024] ret_from_fork+0x10/0x20 [ 72.825439] [ 72.825614] The buggy address belongs to the physical page: [ 72.826424] page:00000000172f0408 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a34 [ 72.827150] head:00000000172f0408 order:2 compound_mapcount:0 compound_pincount:0 [ 72.827760] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff) [ 72.828430] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000 [ 72.829109] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 72.829722] page dumped because: kasan: bad access detected [ 72.830709] [ 72.830899] Memory state around the buggy address: [ 72.831332] ffff0000c5a35f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.831940] ffff0000c5a36000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.832548] >ffff0000c5a36080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 72.833099] ^ [ 72.833651] ffff0000c5a36100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 72.834542] ffff0000c5a36180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 72.835107] ================================================================== [ 72.744269] ================================================================== [ 72.745740] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x10c/0x5b0 [ 72.747075] Write of size 1 at addr ffff0000c5a360c9 by task kunit_try_catch/132 [ 72.747572] [ 72.747762] CPU: 0 PID: 132 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 72.748297] Hardware name: linux,dummy-virt (DT) [ 72.749065] Call trace: [ 72.749726] dump_backtrace.part.0+0xdc/0xf0 [ 72.750622] show_stack+0x18/0x30 [ 72.751346] dump_stack_lvl+0x64/0x80 [ 72.752049] print_report+0x158/0x438 [ 72.752792] kasan_report+0xb4/0xf4 [ 72.753454] __asan_store1+0x68/0x7c [ 72.754175] krealloc_less_oob_helper+0x10c/0x5b0 [ 72.755114] krealloc_pagealloc_less_oob+0x18/0x24 [ 72.755961] kunit_try_run_case+0x84/0x120 [ 72.756699] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.757570] kthread+0x180/0x190 [ 72.758112] ret_from_fork+0x10/0x20 [ 72.758856] [ 72.759237] The buggy address belongs to the physical page: [ 72.759642] page:00000000172f0408 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a34 [ 72.760213] head:00000000172f0408 order:2 compound_mapcount:0 compound_pincount:0 [ 72.761298] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff) [ 72.762406] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000 [ 72.763572] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 72.764505] page dumped because: kasan: bad access detected [ 72.765201] [ 72.765514] Memory state around the buggy address: [ 72.766220] ffff0000c5a35f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.767333] ffff0000c5a36000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.768450] >ffff0000c5a36080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 72.769425] ^ [ 72.770187] ffff0000c5a36100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 72.771281] ffff0000c5a36180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 72.772284] ================================================================== [ 72.566922] ================================================================== [ 72.567869] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x138/0x5b0 [ 72.568933] Write of size 1 at addr ffff0000c55e62d0 by task kunit_try_catch/130 [ 72.570108] [ 72.570426] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 72.571817] Hardware name: linux,dummy-virt (DT) [ 72.572428] Call trace: [ 72.572809] dump_backtrace.part.0+0xdc/0xf0 [ 72.573513] show_stack+0x18/0x30 [ 72.574493] dump_stack_lvl+0x64/0x80 [ 72.575089] print_report+0x158/0x438 [ 72.575709] kasan_report+0xb4/0xf4 [ 72.576263] __asan_store1+0x68/0x7c [ 72.576823] krealloc_less_oob_helper+0x138/0x5b0 [ 72.577533] krealloc_less_oob+0x18/0x2c [ 72.578366] kunit_try_run_case+0x84/0x120 [ 72.579525] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.580127] kthread+0x180/0x190 [ 72.580456] ret_from_fork+0x10/0x20 [ 72.580800] [ 72.580964] Allocated by task 130: [ 72.581227] kasan_save_stack+0x3c/0x70 [ 72.581800] kasan_set_track+0x2c/0x40 [ 72.582583] kasan_save_alloc_info+0x24/0x34 [ 72.583292] __kasan_krealloc+0xf0/0x120 [ 72.583961] krealloc+0x154/0x1a0 [ 72.584517] krealloc_less_oob_helper+0xd0/0x5b0 [ 72.585220] krealloc_less_oob+0x18/0x2c [ 72.585867] kunit_try_run_case+0x84/0x120 [ 72.586592] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.587547] kthread+0x180/0x190 [ 72.588101] ret_from_fork+0x10/0x20 [ 72.588666] [ 72.588945] The buggy address belongs to the object at ffff0000c55e6200 [ 72.588945] which belongs to the cache kmalloc-256 of size 256 [ 72.590472] The buggy address is located 208 bytes inside of [ 72.590472] 256-byte region [ffff0000c55e6200, ffff0000c55e6300) [ 72.591928] [ 72.592232] The buggy address belongs to the physical page: [ 72.592597] page:0000000087736949 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055e6 [ 72.593146] head:0000000087736949 order:1 compound_mapcount:0 compound_pincount:0 [ 72.593962] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 72.595067] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480 [ 72.596056] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 72.596979] page dumped because: kasan: bad access detected [ 72.597679] [ 72.598029] Memory state around the buggy address: [ 72.598799] ffff0000c55e6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.599708] ffff0000c55e6200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.600592] >ffff0000c55e6280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 72.601242] ^ [ 72.601632] ffff0000c55e6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.602499] ffff0000c55e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.603003] ================================================================== [ 72.604176] ================================================================== [ 72.605072] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x180/0x5b0 [ 72.606173] Write of size 1 at addr ffff0000c55e62da by task kunit_try_catch/130 [ 72.607107] [ 72.607292] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 72.607839] Hardware name: linux,dummy-virt (DT) [ 72.608148] Call trace: [ 72.608359] dump_backtrace.part.0+0xdc/0xf0 [ 72.609113] show_stack+0x18/0x30 [ 72.609689] dump_stack_lvl+0x64/0x80 [ 72.610318] print_report+0x158/0x438 [ 72.610975] kasan_report+0xb4/0xf4 [ 72.611665] __asan_store1+0x68/0x7c [ 72.612233] krealloc_less_oob_helper+0x180/0x5b0 [ 72.612952] krealloc_less_oob+0x18/0x2c [ 72.613589] kunit_try_run_case+0x84/0x120 [ 72.614271] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.615248] kthread+0x180/0x190 [ 72.615811] ret_from_fork+0x10/0x20 [ 72.616377] [ 72.616665] Allocated by task 130: [ 72.617139] kasan_save_stack+0x3c/0x70 [ 72.617735] kasan_set_track+0x2c/0x40 [ 72.618389] kasan_save_alloc_info+0x24/0x34 [ 72.619055] __kasan_krealloc+0xf0/0x120 [ 72.619660] krealloc+0x154/0x1a0 [ 72.620236] krealloc_less_oob_helper+0xd0/0x5b0 [ 72.620949] krealloc_less_oob+0x18/0x2c [ 72.621589] kunit_try_run_case+0x84/0x120 [ 72.621990] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.622594] kthread+0x180/0x190 [ 72.623084] ret_from_fork+0x10/0x20 [ 72.623644] [ 72.623867] The buggy address belongs to the object at ffff0000c55e6200 [ 72.623867] which belongs to the cache kmalloc-256 of size 256 [ 72.624701] The buggy address is located 218 bytes inside of [ 72.624701] 256-byte region [ffff0000c55e6200, ffff0000c55e6300) [ 72.626072] [ 72.626360] The buggy address belongs to the physical page: [ 72.627241] page:0000000087736949 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055e6 [ 72.628347] head:0000000087736949 order:1 compound_mapcount:0 compound_pincount:0 [ 72.629195] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 72.630179] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480 [ 72.631250] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 72.631879] page dumped because: kasan: bad access detected [ 72.632232] [ 72.632404] Memory state around the buggy address: [ 72.632938] ffff0000c55e6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.633575] ffff0000c55e6200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.634269] >ffff0000c55e6280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 72.634818] ^ [ 72.635288] ffff0000c55e6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.635926] ffff0000c55e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.636978] ================================================================== [ 72.667172] ================================================================== [ 72.667836] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1cc/0x5b0 [ 72.668581] Write of size 1 at addr ffff0000c55e62eb by task kunit_try_catch/130 [ 72.669052] [ 72.669235] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 72.670101] Hardware name: linux,dummy-virt (DT) [ 72.670627] Call trace: [ 72.671036] dump_backtrace.part.0+0xdc/0xf0 [ 72.671595] show_stack+0x18/0x30 [ 72.672078] dump_stack_lvl+0x64/0x80 [ 72.672527] print_report+0x158/0x438 [ 72.673012] kasan_report+0xb4/0xf4 [ 72.673427] __asan_store1+0x68/0x7c [ 72.673840] krealloc_less_oob_helper+0x1cc/0x5b0 [ 72.674426] krealloc_less_oob+0x18/0x2c [ 72.675009] kunit_try_run_case+0x84/0x120 [ 72.675478] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.676067] kthread+0x180/0x190 [ 72.676464] ret_from_fork+0x10/0x20 [ 72.676878] [ 72.677085] Allocated by task 130: [ 72.677446] kasan_save_stack+0x3c/0x70 [ 72.677887] kasan_set_track+0x2c/0x40 [ 72.678294] kasan_save_alloc_info+0x24/0x34 [ 72.678875] __kasan_krealloc+0xf0/0x120 [ 72.679440] krealloc+0x154/0x1a0 [ 72.679861] krealloc_less_oob_helper+0xd0/0x5b0 [ 72.680419] krealloc_less_oob+0x18/0x2c [ 72.680868] kunit_try_run_case+0x84/0x120 [ 72.681347] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.681955] kthread+0x180/0x190 [ 72.682357] ret_from_fork+0x10/0x20 [ 72.682794] [ 72.683019] The buggy address belongs to the object at ffff0000c55e6200 [ 72.683019] which belongs to the cache kmalloc-256 of size 256 [ 72.683997] The buggy address is located 235 bytes inside of [ 72.683997] 256-byte region [ffff0000c55e6200, ffff0000c55e6300) [ 72.684974] [ 72.685148] The buggy address belongs to the physical page: [ 72.685520] page:0000000087736949 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055e6 [ 72.686453] head:0000000087736949 order:1 compound_mapcount:0 compound_pincount:0 [ 72.687215] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 72.688079] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480 [ 72.688754] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 72.689367] page dumped because: kasan: bad access detected [ 72.689894] [ 72.690087] Memory state around the buggy address: [ 72.690597] ffff0000c55e6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.691240] ffff0000c55e6200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.691913] >ffff0000c55e6280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 72.692522] ^ [ 72.693072] ffff0000c55e6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.693681] ffff0000c55e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.694411] ================================================================== [ 72.773183] ================================================================== [ 72.773837] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x138/0x5b0 [ 72.774679] Write of size 1 at addr ffff0000c5a360d0 by task kunit_try_catch/132 [ 72.775634] [ 72.776013] CPU: 0 PID: 132 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 72.776809] Hardware name: linux,dummy-virt (DT) [ 72.777144] Call trace: [ 72.777362] dump_backtrace.part.0+0xdc/0xf0 [ 72.778374] show_stack+0x18/0x30 [ 72.778797] dump_stack_lvl+0x64/0x80 [ 72.779284] print_report+0x158/0x438 [ 72.779856] kasan_report+0xb4/0xf4 [ 72.780332] __asan_store1+0x68/0x7c [ 72.780823] krealloc_less_oob_helper+0x138/0x5b0 [ 72.781422] krealloc_pagealloc_less_oob+0x18/0x24 [ 72.782052] kunit_try_run_case+0x84/0x120 [ 72.782619] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.783302] kthread+0x180/0x190 [ 72.783772] ret_from_fork+0x10/0x20 [ 72.784264] [ 72.784577] The buggy address belongs to the physical page: [ 72.785106] page:00000000172f0408 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a34 [ 72.785984] head:00000000172f0408 order:2 compound_mapcount:0 compound_pincount:0 [ 72.786551] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff) [ 72.787172] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000 [ 72.788049] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 72.788800] page dumped because: kasan: bad access detected [ 72.789351] [ 72.789693] Memory state around the buggy address: [ 72.790311] ffff0000c5a35f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.790940] ffff0000c5a36000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.791717] >ffff0000c5a36080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 72.792270] ^ [ 72.792773] ffff0000c5a36100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 72.793363] ffff0000c5a36180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 72.794407] ================================================================== [ 72.530299] ================================================================== [ 72.531671] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x10c/0x5b0 [ 72.532738] Write of size 1 at addr ffff0000c55e62c9 by task kunit_try_catch/130 [ 72.533646] [ 72.534024] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 72.535224] Hardware name: linux,dummy-virt (DT) [ 72.535834] Call trace: [ 72.536237] dump_backtrace.part.0+0xdc/0xf0 [ 72.536955] show_stack+0x18/0x30 [ 72.537502] dump_stack_lvl+0x64/0x80 [ 72.537857] print_report+0x158/0x438 [ 72.538233] kasan_report+0xb4/0xf4 [ 72.538573] __asan_store1+0x68/0x7c [ 72.538905] krealloc_less_oob_helper+0x10c/0x5b0 [ 72.539329] krealloc_less_oob+0x18/0x2c [ 72.539990] kunit_try_run_case+0x84/0x120 [ 72.540792] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.541682] kthread+0x180/0x190 [ 72.542282] ret_from_fork+0x10/0x20 [ 72.542913] [ 72.543192] Allocated by task 130: [ 72.543746] kasan_save_stack+0x3c/0x70 [ 72.544339] kasan_set_track+0x2c/0x40 [ 72.544920] kasan_save_alloc_info+0x24/0x34 [ 72.545561] __kasan_krealloc+0xf0/0x120 [ 72.546230] krealloc+0x154/0x1a0 [ 72.546837] krealloc_less_oob_helper+0xd0/0x5b0 [ 72.547643] krealloc_less_oob+0x18/0x2c [ 72.548300] kunit_try_run_case+0x84/0x120 [ 72.548937] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.549722] kthread+0x180/0x190 [ 72.550314] ret_from_fork+0x10/0x20 [ 72.550948] [ 72.551271] The buggy address belongs to the object at ffff0000c55e6200 [ 72.551271] which belongs to the cache kmalloc-256 of size 256 [ 72.552668] The buggy address is located 201 bytes inside of [ 72.552668] 256-byte region [ffff0000c55e6200, ffff0000c55e6300) [ 72.554033] [ 72.554322] The buggy address belongs to the physical page: [ 72.555135] page:0000000087736949 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055e6 [ 72.556312] head:0000000087736949 order:1 compound_mapcount:0 compound_pincount:0 [ 72.557193] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 72.557977] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480 [ 72.559020] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 72.559706] page dumped because: kasan: bad access detected [ 72.560060] [ 72.560222] Memory state around the buggy address: [ 72.560571] ffff0000c55e6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.561032] ffff0000c55e6200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.561559] >ffff0000c55e6280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 72.562523] ^ [ 72.563422] ffff0000c55e6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.564411] ffff0000c55e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.565354] ================================================================== [ 72.835940] ================================================================== [ 72.836492] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1cc/0x5b0 [ 72.837207] Write of size 1 at addr ffff0000c5a360eb by task kunit_try_catch/132 [ 72.838460] [ 72.838766] CPU: 0 PID: 132 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 72.839308] Hardware name: linux,dummy-virt (DT) [ 72.839814] Call trace: [ 72.840189] dump_backtrace.part.0+0xdc/0xf0 [ 72.840770] show_stack+0x18/0x30 [ 72.841130] dump_stack_lvl+0x64/0x80 [ 72.841490] print_report+0x158/0x438 [ 72.842286] kasan_report+0xb4/0xf4 [ 72.842784] __asan_store1+0x68/0x7c [ 72.843177] krealloc_less_oob_helper+0x1cc/0x5b0 [ 72.843782] krealloc_pagealloc_less_oob+0x18/0x24 [ 72.844311] kunit_try_run_case+0x84/0x120 [ 72.844805] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.845265] kthread+0x180/0x190 [ 72.845642] ret_from_fork+0x10/0x20 [ 72.846695] [ 72.846898] The buggy address belongs to the physical page: [ 72.847328] page:00000000172f0408 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a34 [ 72.848122] head:00000000172f0408 order:2 compound_mapcount:0 compound_pincount:0 [ 72.848754] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff) [ 72.849405] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000 [ 72.850050] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 72.850927] page dumped because: kasan: bad access detected [ 72.851384] [ 72.851591] Memory state around the buggy address: [ 72.852023] ffff0000c5a35f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.852658] ffff0000c5a36000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.853219] >ffff0000c5a36080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 72.853792] ^ [ 72.854890] ffff0000c5a36100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 72.855500] ffff0000c5a36180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 72.856052] ================================================================== [ 72.638069] ================================================================== [ 72.638621] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1a8/0x5b0 [ 72.639360] Write of size 1 at addr ffff0000c55e62ea by task kunit_try_catch/130 [ 72.640287] [ 72.640508] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 72.641208] Hardware name: linux,dummy-virt (DT) [ 72.641585] Call trace: [ 72.642360] dump_backtrace.part.0+0xdc/0xf0 [ 72.642869] show_stack+0x18/0x30 [ 72.643288] dump_stack_lvl+0x64/0x80 [ 72.643738] print_report+0x158/0x438 [ 72.644177] kasan_report+0xb4/0xf4 [ 72.644578] __asan_store1+0x68/0x7c [ 72.644957] krealloc_less_oob_helper+0x1a8/0x5b0 [ 72.645446] krealloc_less_oob+0x18/0x2c [ 72.645964] kunit_try_run_case+0x84/0x120 [ 72.646431] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.646957] kthread+0x180/0x190 [ 72.647326] ret_from_fork+0x10/0x20 [ 72.647754] [ 72.647932] Allocated by task 130: [ 72.648276] kasan_save_stack+0x3c/0x70 [ 72.648941] kasan_set_track+0x2c/0x40 [ 72.649350] kasan_save_alloc_info+0x24/0x34 [ 72.650294] __kasan_krealloc+0xf0/0x120 [ 72.650753] krealloc+0x154/0x1a0 [ 72.651138] krealloc_less_oob_helper+0xd0/0x5b0 [ 72.651623] krealloc_less_oob+0x18/0x2c [ 72.652084] kunit_try_run_case+0x84/0x120 [ 72.652552] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.653059] kthread+0x180/0x190 [ 72.653435] ret_from_fork+0x10/0x20 [ 72.654133] [ 72.654338] The buggy address belongs to the object at ffff0000c55e6200 [ 72.654338] which belongs to the cache kmalloc-256 of size 256 [ 72.655230] The buggy address is located 234 bytes inside of [ 72.655230] 256-byte region [ffff0000c55e6200, ffff0000c55e6300) [ 72.656139] [ 72.656322] The buggy address belongs to the physical page: [ 72.656759] page:0000000087736949 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055e6 [ 72.657536] head:0000000087736949 order:1 compound_mapcount:0 compound_pincount:0 [ 72.658945] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 72.659635] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480 [ 72.660275] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 72.660883] page dumped because: kasan: bad access detected [ 72.661323] [ 72.661520] Memory state around the buggy address: [ 72.662002] ffff0000c55e6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.662559] ffff0000c55e6200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.663158] >ffff0000c55e6280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 72.664067] ^ [ 72.664635] ffff0000c55e6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.665248] ffff0000c55e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.665824] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 72.489703] ================================================================== [ 72.490576] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x160/0x370 [ 72.491816] Write of size 1 at addr ffff0000c3c44ef0 by task kunit_try_catch/129 [ 72.492718] [ 72.492913] CPU: 0 PID: 129 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 72.493460] Hardware name: linux,dummy-virt (DT) [ 72.493855] Call trace: [ 72.494432] dump_backtrace.part.0+0xdc/0xf0 [ 72.495181] show_stack+0x18/0x30 [ 72.495813] dump_stack_lvl+0x64/0x80 [ 72.496388] print_report+0x158/0x438 [ 72.496988] kasan_report+0xb4/0xf4 [ 72.497545] __asan_store1+0x68/0x7c [ 72.498177] krealloc_more_oob_helper+0x160/0x370 [ 72.498975] krealloc_more_oob+0x18/0x2c [ 72.499623] kunit_try_run_case+0x84/0x120 [ 72.500247] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.501023] kthread+0x180/0x190 [ 72.501553] ret_from_fork+0x10/0x20 [ 72.502207] [ 72.502522] Allocated by task 129: [ 72.502995] kasan_save_stack+0x3c/0x70 [ 72.503592] kasan_set_track+0x2c/0x40 [ 72.504161] kasan_save_alloc_info+0x24/0x34 [ 72.504637] __kasan_krealloc+0xf0/0x120 [ 72.504985] krealloc+0x154/0x1a0 [ 72.505316] krealloc_more_oob_helper+0xd0/0x370 [ 72.505816] krealloc_more_oob+0x18/0x2c [ 72.506325] kunit_try_run_case+0x84/0x120 [ 72.507053] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.507935] kthread+0x180/0x190 [ 72.508500] ret_from_fork+0x10/0x20 [ 72.509055] [ 72.509337] The buggy address belongs to the object at ffff0000c3c44e00 [ 72.509337] which belongs to the cache kmalloc-256 of size 256 [ 72.510988] The buggy address is located 240 bytes inside of [ 72.510988] 256-byte region [ffff0000c3c44e00, ffff0000c3c44f00) [ 72.511963] [ 72.512141] The buggy address belongs to the physical page: [ 72.512623] page:000000003b9e76ea refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103c44 [ 72.513707] head:000000003b9e76ea order:1 compound_mapcount:0 compound_pincount:0 [ 72.514747] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 72.515723] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480 [ 72.516669] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 72.517561] page dumped because: kasan: bad access detected [ 72.518035] [ 72.518201] Memory state around the buggy address: [ 72.518548] ffff0000c3c44d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.519293] ffff0000c3c44e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.520075] >ffff0000c3c44e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 72.520750] ^ [ 72.521183] ffff0000c3c44f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.521655] ffff0000c3c44f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.522685] ================================================================== [ 72.448326] ================================================================== [ 72.449087] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x134/0x370 [ 72.449694] Write of size 1 at addr ffff0000c3c44eeb by task kunit_try_catch/129 [ 72.451222] [ 72.451679] CPU: 0 PID: 129 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 72.452947] Hardware name: linux,dummy-virt (DT) [ 72.453727] Call trace: [ 72.454387] dump_backtrace.part.0+0xdc/0xf0 [ 72.455318] show_stack+0x18/0x30 [ 72.455994] dump_stack_lvl+0x64/0x80 [ 72.456735] print_report+0x158/0x438 [ 72.457515] kasan_report+0xb4/0xf4 [ 72.458274] __asan_store1+0x68/0x7c [ 72.459009] krealloc_more_oob_helper+0x134/0x370 [ 72.459907] krealloc_more_oob+0x18/0x2c [ 72.460701] kunit_try_run_case+0x84/0x120 [ 72.461497] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.462671] kthread+0x180/0x190 [ 72.463303] ret_from_fork+0x10/0x20 [ 72.463856] [ 72.464035] Allocated by task 129: [ 72.464305] kasan_save_stack+0x3c/0x70 [ 72.465222] kasan_set_track+0x2c/0x40 [ 72.465951] kasan_save_alloc_info+0x24/0x34 [ 72.466864] __kasan_krealloc+0xf0/0x120 [ 72.467635] krealloc+0x154/0x1a0 [ 72.468365] krealloc_more_oob_helper+0xd0/0x370 [ 72.469318] krealloc_more_oob+0x18/0x2c [ 72.470355] kunit_try_run_case+0x84/0x120 [ 72.471675] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.472920] kthread+0x180/0x190 [ 72.474869] ret_from_fork+0x10/0x20 [ 72.475253] [ 72.475441] The buggy address belongs to the object at ffff0000c3c44e00 [ 72.475441] which belongs to the cache kmalloc-256 of size 256 [ 72.476322] The buggy address is located 235 bytes inside of [ 72.476322] 256-byte region [ffff0000c3c44e00, ffff0000c3c44f00) [ 72.477123] [ 72.477312] The buggy address belongs to the physical page: [ 72.478576] page:000000003b9e76ea refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103c44 [ 72.479550] head:000000003b9e76ea order:1 compound_mapcount:0 compound_pincount:0 [ 72.480131] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 72.480879] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480 [ 72.481544] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 72.482297] page dumped because: kasan: bad access detected [ 72.482797] [ 72.482973] Memory state around the buggy address: [ 72.483426] ffff0000c3c44d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.484072] ffff0000c3c44e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.484691] >ffff0000c3c44e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 72.485257] ^ [ 72.485809] ffff0000c3c44f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.486391] ffff0000c3c44f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.487286] ================================================================== [ 72.718881] ================================================================== [ 72.719511] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x160/0x370 [ 72.720335] Write of size 1 at addr ffff0000c5a320f0 by task kunit_try_catch/131 [ 72.720948] [ 72.721191] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 72.721974] Hardware name: linux,dummy-virt (DT) [ 72.722476] Call trace: [ 72.722775] dump_backtrace.part.0+0xdc/0xf0 [ 72.723314] show_stack+0x18/0x30 [ 72.723809] dump_stack_lvl+0x64/0x80 [ 72.724253] print_report+0x158/0x438 [ 72.724791] kasan_report+0xb4/0xf4 [ 72.725219] __asan_store1+0x68/0x7c [ 72.725623] krealloc_more_oob_helper+0x160/0x370 [ 72.726152] krealloc_pagealloc_more_oob+0x18/0x24 [ 72.726694] kunit_try_run_case+0x84/0x120 [ 72.727175] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.727750] kthread+0x180/0x190 [ 72.728141] ret_from_fork+0x10/0x20 [ 72.728550] [ 72.728757] The buggy address belongs to the physical page: [ 72.729234] page:00000000a668a8fd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a30 [ 72.730350] head:00000000a668a8fd order:2 compound_mapcount:0 compound_pincount:0 [ 72.730841] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff) [ 72.731356] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000 [ 72.732441] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 72.733155] page dumped because: kasan: bad access detected [ 72.733532] [ 72.733699] Memory state around the buggy address: [ 72.734544] ffff0000c5a31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.736115] ffff0000c5a32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.737146] >ffff0000c5a32080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 72.737608] ^ [ 72.738664] ffff0000c5a32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 72.739499] ffff0000c5a32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 72.740286] ================================================================== [ 72.698851] ================================================================== [ 72.699728] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x134/0x370 [ 72.700419] Write of size 1 at addr ffff0000c5a320eb by task kunit_try_catch/131 [ 72.701074] [ 72.701324] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 72.702104] Hardware name: linux,dummy-virt (DT) [ 72.702585] Call trace: [ 72.702826] dump_backtrace.part.0+0xdc/0xf0 [ 72.703410] show_stack+0x18/0x30 [ 72.703907] dump_stack_lvl+0x64/0x80 [ 72.704361] print_report+0x158/0x438 [ 72.704836] kasan_report+0xb4/0xf4 [ 72.705227] __asan_store1+0x68/0x7c [ 72.705675] krealloc_more_oob_helper+0x134/0x370 [ 72.706277] krealloc_pagealloc_more_oob+0x18/0x24 [ 72.706916] kunit_try_run_case+0x84/0x120 [ 72.707376] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.707965] kthread+0x180/0x190 [ 72.708372] ret_from_fork+0x10/0x20 [ 72.708813] [ 72.709056] The buggy address belongs to the physical page: [ 72.709571] page:00000000a668a8fd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a30 [ 72.710321] head:00000000a668a8fd order:2 compound_mapcount:0 compound_pincount:0 [ 72.710955] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff) [ 72.711639] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000 [ 72.712301] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 72.712916] page dumped because: kasan: bad access detected [ 72.713402] [ 72.713597] Memory state around the buggy address: [ 72.714101] ffff0000c5a31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.714763] ffff0000c5a32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.715346] >ffff0000c5a32080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 72.716009] ^ [ 72.716588] ffff0000c5a32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 72.717269] ffff0000c5a32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 72.717889] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 72.413249] ================================================================== [ 72.414217] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0xc0/0x1f0 [ 72.414915] Write of size 1 at addr ffff0000c5a19f00 by task kunit_try_catch/128 [ 72.415525] [ 72.415729] CPU: 1 PID: 128 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 72.416851] Hardware name: linux,dummy-virt (DT) [ 72.417256] Call trace: [ 72.417540] dump_backtrace.part.0+0xdc/0xf0 [ 72.418597] show_stack+0x18/0x30 [ 72.419097] dump_stack_lvl+0x64/0x80 [ 72.419581] print_report+0x158/0x438 [ 72.420029] kasan_report+0xb4/0xf4 [ 72.420496] __asan_store1+0x68/0x7c [ 72.420922] kmalloc_large_oob_right+0xc0/0x1f0 [ 72.421449] kunit_try_run_case+0x84/0x120 [ 72.422546] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.423158] kthread+0x180/0x190 [ 72.423579] ret_from_fork+0x10/0x20 [ 72.424017] [ 72.424211] Allocated by task 128: [ 72.424587] kasan_save_stack+0x3c/0x70 [ 72.425060] kasan_set_track+0x2c/0x40 [ 72.425485] kasan_save_alloc_info+0x24/0x34 [ 72.426144] __kasan_kmalloc+0xb8/0xc0 [ 72.426596] kmalloc_trace+0x58/0x6c [ 72.427210] kmalloc_large_oob_right+0x94/0x1f0 [ 72.427759] kunit_try_run_case+0x84/0x120 [ 72.428243] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.428800] kthread+0x180/0x190 [ 72.429197] ret_from_fork+0x10/0x20 [ 72.429628] [ 72.429977] The buggy address belongs to the object at ffff0000c5a18000 [ 72.429977] which belongs to the cache kmalloc-8k of size 8192 [ 72.431343] The buggy address is located 7936 bytes inside of [ 72.431343] 8192-byte region [ffff0000c5a18000, ffff0000c5a1a000) [ 72.432313] [ 72.432564] The buggy address belongs to the physical page: [ 72.433037] page:00000000873a2410 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a18 [ 72.433776] head:00000000873a2410 order:3 compound_mapcount:0 compound_pincount:0 [ 72.434425] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 72.435378] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002c00 [ 72.436082] raw: 0000000000000000 0000000080020002 00000001ffffffff 0000000000000000 [ 72.436711] page dumped because: kasan: bad access detected [ 72.437190] [ 72.437382] Memory state around the buggy address: [ 72.437815] ffff0000c5a19e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.438602] ffff0000c5a19e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.439590] >ffff0000c5a19f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.440186] ^ [ 72.440513] ffff0000c5a19f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.441125] ffff0000c5a1a000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.441714] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-pagealloc_uaf
[ 72.388821] ================================================================== [ 72.390690] BUG: KASAN: use-after-free in pagealloc_uaf+0xcc/0x200 [ 72.391692] Read of size 1 at addr ffff0000c5a50000 by task kunit_try_catch/127 [ 72.392645] [ 72.392965] CPU: 1 PID: 127 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 72.394041] Hardware name: linux,dummy-virt (DT) [ 72.394552] Call trace: [ 72.394774] dump_backtrace.part.0+0xdc/0xf0 [ 72.395193] show_stack+0x18/0x30 [ 72.395683] dump_stack_lvl+0x64/0x80 [ 72.396182] print_report+0x158/0x438 [ 72.396660] kasan_report+0xb4/0xf4 [ 72.397107] __asan_load1+0x68/0x74 [ 72.397549] pagealloc_uaf+0xcc/0x200 [ 72.398031] kunit_try_run_case+0x84/0x120 [ 72.399049] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.399646] kthread+0x180/0x190 [ 72.400084] ret_from_fork+0x10/0x20 [ 72.400562] [ 72.400793] The buggy address belongs to the physical page: [ 72.401259] page:000000004d85e480 refcount:0 mapcount:-128 mapping:0000000000000000 index:0x0 pfn:0x105a50 [ 72.402225] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 72.403030] raw: 0bfffc0000000000 ffff0000ff7f59a0 ffff0000ff7f59a0 0000000000000000 [ 72.403590] raw: 0000000000000000 0000000000000004 00000000ffffff7f 0000000000000000 [ 72.404043] page dumped because: kasan: bad access detected [ 72.404389] [ 72.404564] Memory state around the buggy address: [ 72.404918] ffff0000c5a4ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 72.405621] ffff0000c5a4ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 72.406783] >ffff0000c5a50000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 72.407416] ^ [ 72.407706] ffff0000c5a50080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 72.408161] ffff0000c5a50100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 72.408722] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_pagealloc_oob_right
[ 72.310417] ================================================================== [ 72.311291] BUG: KASAN: slab-out-of-bounds in kmalloc_pagealloc_oob_right+0xa4/0x1e0 [ 72.312080] Write of size 1 at addr ffff0000c5a3200a by task kunit_try_catch/123 [ 72.312622] [ 72.312837] CPU: 0 PID: 123 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 72.313508] Hardware name: linux,dummy-virt (DT) [ 72.313893] Call trace: [ 72.314962] dump_backtrace.part.0+0xdc/0xf0 [ 72.315494] show_stack+0x18/0x30 [ 72.315919] dump_stack_lvl+0x64/0x80 [ 72.316332] print_report+0x158/0x438 [ 72.316800] kasan_report+0xb4/0xf4 [ 72.317185] __asan_store1+0x68/0x7c [ 72.317599] kmalloc_pagealloc_oob_right+0xa4/0x1e0 [ 72.318114] kunit_try_run_case+0x84/0x120 [ 72.318592] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.319307] kthread+0x180/0x190 [ 72.319769] ret_from_fork+0x10/0x20 [ 72.320219] [ 72.320457] The buggy address belongs to the physical page: [ 72.320978] page:00000000a668a8fd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a30 [ 72.321740] head:00000000a668a8fd order:2 compound_mapcount:0 compound_pincount:0 [ 72.322372] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff) [ 72.322996] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000 [ 72.323821] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 72.324434] page dumped because: kasan: bad access detected [ 72.324930] [ 72.325119] Memory state around the buggy address: [ 72.325583] ffff0000c5a31f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.326326] ffff0000c5a31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.326968] >ffff0000c5a32000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 72.327564] ^ [ 72.327935] ffff0000c5a32080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 72.328573] ffff0000c5a32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 72.329165] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 72.273728] ================================================================== [ 72.274613] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0xc8/0x1e4 [ 72.275343] Read of size 1 at addr ffff0000c599b000 by task kunit_try_catch/122 [ 72.276433] [ 72.276670] CPU: 1 PID: 122 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 72.277369] Hardware name: linux,dummy-virt (DT) [ 72.277794] Call trace: [ 72.278448] dump_backtrace.part.0+0xdc/0xf0 [ 72.278966] show_stack+0x18/0x30 [ 72.279358] dump_stack_lvl+0x64/0x80 [ 72.279775] print_report+0x158/0x438 [ 72.280218] kasan_report+0xb4/0xf4 [ 72.280621] __asan_load1+0x68/0x74 [ 72.281012] kmalloc_node_oob_right+0xc8/0x1e4 [ 72.281487] kunit_try_run_case+0x84/0x120 [ 72.282122] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.282675] kthread+0x180/0x190 [ 72.283050] ret_from_fork+0x10/0x20 [ 72.283471] [ 72.283651] Allocated by task 122: [ 72.283980] kasan_save_stack+0x3c/0x70 [ 72.284784] kasan_set_track+0x2c/0x40 [ 72.285184] kasan_save_alloc_info+0x24/0x34 [ 72.285661] __kasan_kmalloc+0xb8/0xc0 [ 72.286326] kmalloc_node_trace+0x54/0x70 [ 72.286816] kmalloc_node_oob_right+0x9c/0x1e4 [ 72.287267] kunit_try_run_case+0x84/0x120 [ 72.287723] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.288289] kthread+0x180/0x190 [ 72.288665] ret_from_fork+0x10/0x20 [ 72.289072] [ 72.289269] The buggy address belongs to the object at ffff0000c599a000 [ 72.289269] which belongs to the cache kmalloc-4k of size 4096 [ 72.290708] The buggy address is located 0 bytes to the right of [ 72.290708] 4096-byte region [ffff0000c599a000, ffff0000c599b000) [ 72.291622] [ 72.291800] The buggy address belongs to the physical page: [ 72.292322] page:000000006c8790c3 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105998 [ 72.293095] head:000000006c8790c3 order:3 compound_mapcount:0 compound_pincount:0 [ 72.293703] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 72.294409] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002a80 [ 72.295047] raw: 0000000000000000 0000000080040004 00000001ffffffff 0000000000000000 [ 72.295655] page dumped because: kasan: bad access detected [ 72.296100] [ 72.296282] Memory state around the buggy address: [ 72.297081] ffff0000c599af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.297717] ffff0000c599af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.298813] >ffff0000c599b000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.299402] ^ [ 72.299710] ffff0000c599b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.300317] ffff0000c599b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.300902] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 72.247949] ================================================================== [ 72.248958] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0xc0/0x200 [ 72.249744] Read of size 1 at addr ffff0000c596cfff by task kunit_try_catch/121 [ 72.250672] [ 72.251128] CPU: 1 PID: 121 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 72.251825] Hardware name: linux,dummy-virt (DT) [ 72.252331] Call trace: [ 72.252709] dump_backtrace.part.0+0xdc/0xf0 [ 72.253305] show_stack+0x18/0x30 [ 72.253876] dump_stack_lvl+0x64/0x80 [ 72.254290] print_report+0x158/0x438 [ 72.254749] kasan_report+0xb4/0xf4 [ 72.255149] __asan_load1+0x68/0x74 [ 72.255638] kmalloc_oob_left+0xc0/0x200 [ 72.256115] kunit_try_run_case+0x84/0x120 [ 72.256575] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.257148] kthread+0x180/0x190 [ 72.257516] ret_from_fork+0x10/0x20 [ 72.257936] [ 72.258149] The buggy address belongs to the object at ffff0000c596cf00 [ 72.258149] which belongs to the cache cred_jar of size 176 [ 72.259311] The buggy address is located 79 bytes to the right of [ 72.259311] 176-byte region [ffff0000c596cf00, ffff0000c596cfb0) [ 72.260199] [ 72.260406] The buggy address belongs to the physical page: [ 72.260871] page:000000008af61330 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596c [ 72.261591] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 72.262534] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c02ce000 [ 72.263205] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 72.263804] page dumped because: kasan: bad access detected [ 72.264239] [ 72.264428] Memory state around the buggy address: [ 72.264879] ffff0000c596ce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.265472] ffff0000c596cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.266319] >ffff0000c596cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.266904] ^ [ 72.267472] ffff0000c596d000: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.268064] ffff0000c596d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.268634] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 72.148829] ================================================================== [ 72.150409] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xc0/0x340 [ 72.151968] Write of size 1 at addr ffff0000c5966d73 by task kunit_try_catch/120 [ 72.152886] [ 72.153376] CPU: 0 PID: 120 Comm: kunit_try_catch Tainted: G N 6.1.146-rc1 #1 [ 72.154702] Hardware name: linux,dummy-virt (DT) [ 72.155509] Call trace: [ 72.155911] dump_backtrace.part.0+0xdc/0xf0 [ 72.156425] show_stack+0x18/0x30 [ 72.156790] dump_stack_lvl+0x64/0x80 [ 72.157133] print_report+0x158/0x438 [ 72.157505] kasan_report+0xb4/0xf4 [ 72.158048] __asan_store1+0x68/0x7c [ 72.158642] kmalloc_oob_right+0xc0/0x340 [ 72.159252] kunit_try_run_case+0x84/0x120 [ 72.159877] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.160635] kthread+0x180/0x190 [ 72.161135] ret_from_fork+0x10/0x20 [ 72.161802] [ 72.162274] Allocated by task 120: [ 72.162825] kasan_save_stack+0x3c/0x70 [ 72.163507] kasan_set_track+0x2c/0x40 [ 72.164079] kasan_save_alloc_info+0x24/0x34 [ 72.164704] __kasan_kmalloc+0xb8/0xc0 [ 72.165240] kmalloc_trace+0x58/0x6c [ 72.165797] kmalloc_oob_right+0x98/0x340 [ 72.167165] kunit_try_run_case+0x84/0x120 [ 72.167818] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.168403] kthread+0x180/0x190 [ 72.168725] ret_from_fork+0x10/0x20 [ 72.169100] [ 72.169315] The buggy address belongs to the object at ffff0000c5966d00 [ 72.169315] which belongs to the cache kmalloc-128 of size 128 [ 72.170551] The buggy address is located 115 bytes inside of [ 72.170551] 128-byte region [ffff0000c5966d00, ffff0000c5966d80) [ 72.171890] [ 72.172257] The buggy address belongs to the physical page: [ 72.173081] page:00000000797bbbfa refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105966 [ 72.174736] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 72.176028] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 72.177012] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 72.178127] page dumped because: kasan: bad access detected [ 72.178833] [ 72.179064] Memory state around the buggy address: [ 72.179599] ffff0000c5966c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 72.180096] ffff0000c5966c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.180736] >ffff0000c5966d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 72.181578] ^ [ 72.182693] ffff0000c5966d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.183587] ffff0000c5966e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.184450] ================================================================== [ 72.219228] ================================================================== [ 72.219836] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x108/0x340 [ 72.220532] Read of size 1 at addr ffff0000c5966d80 by task kunit_try_catch/120 [ 72.221096] [ 72.221327] CPU: 0 PID: 120 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 72.222664] Hardware name: linux,dummy-virt (DT) [ 72.223067] Call trace: [ 72.223370] dump_backtrace.part.0+0xdc/0xf0 [ 72.223937] show_stack+0x18/0x30 [ 72.224349] dump_stack_lvl+0x64/0x80 [ 72.224793] print_report+0x158/0x438 [ 72.225242] kasan_report+0xb4/0xf4 [ 72.225647] __asan_load1+0x68/0x74 [ 72.226194] kmalloc_oob_right+0x108/0x340 [ 72.226686] kunit_try_run_case+0x84/0x120 [ 72.227123] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.227703] kthread+0x180/0x190 [ 72.228076] ret_from_fork+0x10/0x20 [ 72.228485] [ 72.228657] Allocated by task 120: [ 72.228992] kasan_save_stack+0x3c/0x70 [ 72.229440] kasan_set_track+0x2c/0x40 [ 72.229828] kasan_save_alloc_info+0x24/0x34 [ 72.230288] __kasan_kmalloc+0xb8/0xc0 [ 72.230849] kmalloc_trace+0x58/0x6c [ 72.231271] kmalloc_oob_right+0x98/0x340 [ 72.231700] kunit_try_run_case+0x84/0x120 [ 72.232154] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.232691] kthread+0x180/0x190 [ 72.233079] ret_from_fork+0x10/0x20 [ 72.233485] [ 72.233698] The buggy address belongs to the object at ffff0000c5966d00 [ 72.233698] which belongs to the cache kmalloc-128 of size 128 [ 72.234773] The buggy address is located 0 bytes to the right of [ 72.234773] 128-byte region [ffff0000c5966d00, ffff0000c5966d80) [ 72.235714] [ 72.235930] The buggy address belongs to the physical page: [ 72.236375] page:00000000797bbbfa refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105966 [ 72.237144] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 72.237775] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 72.238540] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 72.239114] page dumped because: kasan: bad access detected [ 72.239583] [ 72.239786] Memory state around the buggy address: [ 72.240212] ffff0000c5966c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.240786] ffff0000c5966d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 72.241408] >ffff0000c5966d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.242644] ^ [ 72.242943] ffff0000c5966e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.243419] ffff0000c5966e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.244021] ================================================================== [ 72.187391] ================================================================== [ 72.188233] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xe4/0x340 [ 72.189146] Write of size 1 at addr ffff0000c5966d78 by task kunit_try_catch/120 [ 72.189745] [ 72.190295] CPU: 0 PID: 120 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 72.191294] Hardware name: linux,dummy-virt (DT) [ 72.191645] Call trace: [ 72.191861] dump_backtrace.part.0+0xdc/0xf0 [ 72.192282] show_stack+0x18/0x30 [ 72.192836] dump_stack_lvl+0x64/0x80 [ 72.193392] print_report+0x158/0x438 [ 72.194125] kasan_report+0xb4/0xf4 [ 72.194665] __asan_store1+0x68/0x7c [ 72.195192] kmalloc_oob_right+0xe4/0x340 [ 72.195813] kunit_try_run_case+0x84/0x120 [ 72.196431] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.197173] kthread+0x180/0x190 [ 72.197672] ret_from_fork+0x10/0x20 [ 72.198359] [ 72.198638] Allocated by task 120: [ 72.198999] kasan_save_stack+0x3c/0x70 [ 72.199345] kasan_set_track+0x2c/0x40 [ 72.199756] kasan_save_alloc_info+0x24/0x34 [ 72.200183] __kasan_kmalloc+0xb8/0xc0 [ 72.200616] kmalloc_trace+0x58/0x6c [ 72.201059] kmalloc_oob_right+0x98/0x340 [ 72.201537] kunit_try_run_case+0x84/0x120 [ 72.202255] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 72.202802] kthread+0x180/0x190 [ 72.203174] ret_from_fork+0x10/0x20 [ 72.203595] [ 72.203812] The buggy address belongs to the object at ffff0000c5966d00 [ 72.203812] which belongs to the cache kmalloc-128 of size 128 [ 72.204723] The buggy address is located 120 bytes inside of [ 72.204723] 128-byte region [ffff0000c5966d00, ffff0000c5966d80) [ 72.205582] [ 72.205777] The buggy address belongs to the physical page: [ 72.206881] page:00000000797bbbfa refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105966 [ 72.207638] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 72.208289] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 72.208945] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 72.209496] page dumped because: kasan: bad access detected [ 72.210370] [ 72.211638] Memory state around the buggy address: [ 72.211983] ffff0000c5966c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 72.212459] ffff0000c5966c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.212913] >ffff0000c5966d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 72.213338] ^ [ 72.215198] ffff0000c5966d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.216546] ffff0000c5966e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.217961] ==================================================================