Date
July 15, 2025, 2:10 p.m.
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_generic
[ 76.226381] ================================================================== [ 76.226950] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x14c/0xb68 [ 76.227648] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.229982] [ 76.230215] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.231035] Hardware name: linux,dummy-virt (DT) [ 76.231500] Call trace: [ 76.231966] dump_backtrace+0xf4/0x114 [ 76.233723] show_stack+0x18/0x24 [ 76.234159] __dump_stack+0x28/0x38 [ 76.234640] dump_stack_lvl+0x50/0x68 [ 76.235132] print_address_description+0x7c/0x1ec [ 76.236033] print_report+0x50/0x68 [ 76.236662] kasan_report+0xac/0xfc [ 76.237836] kasan_check_range+0x258/0x290 [ 76.239275] __kasan_check_write+0x2c/0x3c [ 76.240297] kasan_bitops_generic+0x14c/0xb68 [ 76.241015] kunit_try_run_case+0x80/0x184 [ 76.241685] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.242514] kthread+0x16c/0x21c [ 76.243120] ret_from_fork+0x10/0x20 [ 76.243715] [ 76.244304] Allocated by task 165: [ 76.244830] kasan_set_track+0x4c/0x80 [ 76.245435] kasan_save_alloc_info+0x28/0x34 [ 76.245973] __kasan_kmalloc+0x88/0xa0 [ 76.246606] kmalloc_trace+0x54/0x68 [ 76.247209] kasan_bitops_generic+0x4c/0xb68 [ 76.248377] kunit_try_run_case+0x80/0x184 [ 76.249068] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.249731] kthread+0x16c/0x21c [ 76.250128] ret_from_fork+0x10/0x20 [ 76.250500] [ 76.250684] The buggy address belongs to the object at ffff0000c58a7700 [ 76.250684] which belongs to the cache kmalloc-128 of size 128 [ 76.251431] The buggy address is located 8 bytes inside of [ 76.251431] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.253102] [ 76.253404] The buggy address belongs to the physical page: [ 76.254087] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.255220] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.256661] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.257665] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.258590] page dumped because: kasan: bad access detected [ 76.259277] [ 76.259547] Memory state around the buggy address: [ 76.260479] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.261403] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.262294] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.263157] ^ [ 76.264144] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.265072] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.265942] ================================================================== [ 76.599169] ================================================================== [ 76.599811] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x458/0xb68 [ 76.600523] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.601092] [ 76.601345] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.602084] Hardware name: linux,dummy-virt (DT) [ 76.602527] Call trace: [ 76.602815] dump_backtrace+0xf4/0x114 [ 76.603319] show_stack+0x18/0x24 [ 76.603784] __dump_stack+0x28/0x38 [ 76.604189] dump_stack_lvl+0x50/0x68 [ 76.604639] print_address_description+0x7c/0x1ec [ 76.605204] print_report+0x50/0x68 [ 76.605647] kasan_report+0xac/0xfc [ 76.606093] kasan_check_range+0x258/0x290 [ 76.606575] __kasan_check_write+0x2c/0x3c [ 76.607022] kasan_bitops_generic+0x458/0xb68 [ 76.607509] kunit_try_run_case+0x80/0x184 [ 76.607984] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.608570] kthread+0x16c/0x21c [ 76.608986] ret_from_fork+0x10/0x20 [ 76.609445] [ 76.609639] Allocated by task 165: [ 76.609990] kasan_set_track+0x4c/0x80 [ 76.610475] kasan_save_alloc_info+0x28/0x34 [ 76.610962] __kasan_kmalloc+0x88/0xa0 [ 76.611410] kmalloc_trace+0x54/0x68 [ 76.611832] kasan_bitops_generic+0x4c/0xb68 [ 76.612315] kunit_try_run_case+0x80/0x184 [ 76.612783] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.613394] kthread+0x16c/0x21c [ 76.613854] ret_from_fork+0x10/0x20 [ 76.614251] [ 76.614467] The buggy address belongs to the object at ffff0000c58a7700 [ 76.614467] which belongs to the cache kmalloc-128 of size 128 [ 76.615423] The buggy address is located 8 bytes inside of [ 76.615423] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.616342] [ 76.616570] The buggy address belongs to the physical page: [ 76.617066] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.617835] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.618525] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.619243] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.619848] page dumped because: kasan: bad access detected [ 76.620324] [ 76.620520] Memory state around the buggy address: [ 76.620954] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.621582] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.622217] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.623021] ^ [ 76.623437] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.624101] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.624745] ================================================================== [ 76.300665] ================================================================== [ 76.301584] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1f0/0xb68 [ 76.302625] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.303624] [ 76.304011] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.305372] Hardware name: linux,dummy-virt (DT) [ 76.306122] Call trace: [ 76.306551] dump_backtrace+0xf4/0x114 [ 76.307138] show_stack+0x18/0x24 [ 76.307534] __dump_stack+0x28/0x38 [ 76.308238] dump_stack_lvl+0x50/0x68 [ 76.308914] print_address_description+0x7c/0x1ec [ 76.309720] print_report+0x50/0x68 [ 76.310387] kasan_report+0xac/0xfc [ 76.311029] kasan_check_range+0x258/0x290 [ 76.311808] __kasan_check_write+0x2c/0x3c [ 76.312551] kasan_bitops_generic+0x1f0/0xb68 [ 76.313272] kunit_try_run_case+0x80/0x184 [ 76.313962] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.314499] kthread+0x16c/0x21c [ 76.314895] ret_from_fork+0x10/0x20 [ 76.315276] [ 76.315457] Allocated by task 165: [ 76.315784] kasan_set_track+0x4c/0x80 [ 76.316216] kasan_save_alloc_info+0x28/0x34 [ 76.316991] __kasan_kmalloc+0x88/0xa0 [ 76.317670] kmalloc_trace+0x54/0x68 [ 76.318275] kasan_bitops_generic+0x4c/0xb68 [ 76.318950] kunit_try_run_case+0x80/0x184 [ 76.319609] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.320571] kthread+0x16c/0x21c [ 76.321163] ret_from_fork+0x10/0x20 [ 76.321763] [ 76.322042] The buggy address belongs to the object at ffff0000c58a7700 [ 76.322042] which belongs to the cache kmalloc-128 of size 128 [ 76.323151] The buggy address is located 8 bytes inside of [ 76.323151] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.324522] [ 76.324978] The buggy address belongs to the physical page: [ 76.325594] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.326237] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.326826] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.327810] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.328939] page dumped because: kasan: bad access detected [ 76.329789] [ 76.330079] Memory state around the buggy address: [ 76.330857] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.331769] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.332824] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.333684] ^ [ 76.334208] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.335103] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.335772] ================================================================== [ 76.198020] ================================================================== [ 76.198547] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0xf8/0xb68 [ 76.199288] Read of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.200354] [ 76.200589] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.201357] Hardware name: linux,dummy-virt (DT) [ 76.201793] Call trace: [ 76.202054] dump_backtrace+0xf4/0x114 [ 76.202509] show_stack+0x18/0x24 [ 76.202938] __dump_stack+0x28/0x38 [ 76.203377] dump_stack_lvl+0x50/0x68 [ 76.204095] print_address_description+0x7c/0x1ec [ 76.204633] print_report+0x50/0x68 [ 76.205085] kasan_report+0xac/0xfc [ 76.205559] __asan_load8+0xa8/0xac [ 76.205993] kasan_bitops_generic+0xf8/0xb68 [ 76.206503] kunit_try_run_case+0x80/0x184 [ 76.207023] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.207598] kthread+0x16c/0x21c [ 76.208074] ret_from_fork+0x10/0x20 [ 76.208513] [ 76.208727] Allocated by task 165: [ 76.209081] kasan_set_track+0x4c/0x80 [ 76.209593] kasan_save_alloc_info+0x28/0x34 [ 76.210532] __kasan_kmalloc+0x88/0xa0 [ 76.211009] kmalloc_trace+0x54/0x68 [ 76.211463] kasan_bitops_generic+0x4c/0xb68 [ 76.212199] kunit_try_run_case+0x80/0x184 [ 76.212685] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.213264] kthread+0x16c/0x21c [ 76.213687] ret_from_fork+0x10/0x20 [ 76.214155] [ 76.214347] The buggy address belongs to the object at ffff0000c58a7700 [ 76.214347] which belongs to the cache kmalloc-128 of size 128 [ 76.215329] The buggy address is located 8 bytes inside of [ 76.215329] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.216734] [ 76.216971] The buggy address belongs to the physical page: [ 76.217461] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.218259] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.218939] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.219601] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.220235] page dumped because: kasan: bad access detected [ 76.220706] [ 76.221175] Memory state around the buggy address: [ 76.221629] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.222260] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.222871] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.223474] ^ [ 76.224359] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.224980] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.225595] ================================================================== [ 76.168971] ================================================================== [ 76.169844] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0xa8/0xb68 [ 76.170520] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.171157] [ 76.171364] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.172253] Hardware name: linux,dummy-virt (DT) [ 76.172751] Call trace: [ 76.173057] dump_backtrace+0xf4/0x114 [ 76.173634] show_stack+0x18/0x24 [ 76.174129] __dump_stack+0x28/0x38 [ 76.174569] dump_stack_lvl+0x50/0x68 [ 76.175030] print_address_description+0x7c/0x1ec [ 76.175590] print_report+0x50/0x68 [ 76.176083] kasan_report+0xac/0xfc [ 76.176804] kasan_check_range+0x258/0x290 [ 76.177335] __kasan_check_write+0x2c/0x3c [ 76.177831] kasan_bitops_generic+0xa8/0xb68 [ 76.178341] kunit_try_run_case+0x80/0x184 [ 76.178829] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.179396] kthread+0x16c/0x21c [ 76.179821] ret_from_fork+0x10/0x20 [ 76.180272] [ 76.180520] Allocated by task 165: [ 76.180909] kasan_set_track+0x4c/0x80 [ 76.181372] kasan_save_alloc_info+0x28/0x34 [ 76.181903] __kasan_kmalloc+0x88/0xa0 [ 76.182362] kmalloc_trace+0x54/0x68 [ 76.182778] kasan_bitops_generic+0x4c/0xb68 [ 76.183291] kunit_try_run_case+0x80/0x184 [ 76.184255] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.184868] kthread+0x16c/0x21c [ 76.185292] ret_from_fork+0x10/0x20 [ 76.185757] [ 76.185950] The buggy address belongs to the object at ffff0000c58a7700 [ 76.185950] which belongs to the cache kmalloc-128 of size 128 [ 76.186924] The buggy address is located 8 bytes inside of [ 76.186924] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.187887] [ 76.188081] The buggy address belongs to the physical page: [ 76.188558] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.189359] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.190351] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.191040] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.191675] page dumped because: kasan: bad access detected [ 76.192619] [ 76.192860] Memory state around the buggy address: [ 76.193277] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.193964] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.194589] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.195196] ^ [ 76.195554] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.196430] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.197033] ================================================================== [ 76.518665] ================================================================== [ 76.519235] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x3a0/0xb68 [ 76.520542] Read of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.521184] [ 76.521409] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.522183] Hardware name: linux,dummy-virt (DT) [ 76.522611] Call trace: [ 76.522891] dump_backtrace+0xf4/0x114 [ 76.523388] show_stack+0x18/0x24 [ 76.523848] __dump_stack+0x28/0x38 [ 76.524297] dump_stack_lvl+0x50/0x68 [ 76.524721] print_address_description+0x7c/0x1ec [ 76.525314] print_report+0x50/0x68 [ 76.525773] kasan_report+0xac/0xfc [ 76.526228] __asan_load8+0xa8/0xac [ 76.526640] kasan_bitops_generic+0x3a0/0xb68 [ 76.527158] kunit_try_run_case+0x80/0x184 [ 76.527677] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.528271] kthread+0x16c/0x21c [ 76.528683] ret_from_fork+0x10/0x20 [ 76.529141] [ 76.529346] Allocated by task 165: [ 76.529677] kasan_set_track+0x4c/0x80 [ 76.530709] kasan_save_alloc_info+0x28/0x34 [ 76.531181] __kasan_kmalloc+0x88/0xa0 [ 76.531628] kmalloc_trace+0x54/0x68 [ 76.532070] kasan_bitops_generic+0x4c/0xb68 [ 76.532584] kunit_try_run_case+0x80/0x184 [ 76.533051] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.533624] kthread+0x16c/0x21c [ 76.534063] ret_from_fork+0x10/0x20 [ 76.534508] [ 76.534713] The buggy address belongs to the object at ffff0000c58a7700 [ 76.534713] which belongs to the cache kmalloc-128 of size 128 [ 76.535644] The buggy address is located 8 bytes inside of [ 76.535644] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.537121] [ 76.537382] The buggy address belongs to the physical page: [ 76.537896] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.538712] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.539413] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.540137] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.540763] page dumped because: kasan: bad access detected [ 76.541251] [ 76.541441] Memory state around the buggy address: [ 76.541883] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.542533] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.543159] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.544325] ^ [ 76.544713] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.545342] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.545949] ================================================================== [ 76.737504] ================================================================== [ 76.738068] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x5f4/0xb68 [ 76.738761] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.739388] [ 76.739632] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.740472] Hardware name: linux,dummy-virt (DT) [ 76.740930] Call trace: [ 76.741200] dump_backtrace+0xf4/0x114 [ 76.741690] show_stack+0x18/0x24 [ 76.742155] __dump_stack+0x28/0x38 [ 76.742609] dump_stack_lvl+0x50/0x68 [ 76.743079] print_address_description+0x7c/0x1ec [ 76.743625] print_report+0x50/0x68 [ 76.744083] kasan_report+0xac/0xfc [ 76.744526] kasan_check_range+0x258/0x290 [ 76.745026] __kasan_check_write+0x2c/0x3c [ 76.745486] kasan_bitops_generic+0x5f4/0xb68 [ 76.746019] kunit_try_run_case+0x80/0x184 [ 76.746498] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.747086] kthread+0x16c/0x21c [ 76.747507] ret_from_fork+0x10/0x20 [ 76.747961] [ 76.748163] Allocated by task 165: [ 76.749979] kasan_set_track+0x4c/0x80 [ 76.750445] kasan_save_alloc_info+0x28/0x34 [ 76.751021] __kasan_kmalloc+0x88/0xa0 [ 76.751575] kmalloc_trace+0x54/0x68 [ 76.752535] kasan_bitops_generic+0x4c/0xb68 [ 76.753428] kunit_try_run_case+0x80/0x184 [ 76.754142] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.755113] kthread+0x16c/0x21c [ 76.755853] ret_from_fork+0x10/0x20 [ 76.756612] [ 76.757055] The buggy address belongs to the object at ffff0000c58a7700 [ 76.757055] which belongs to the cache kmalloc-128 of size 128 [ 76.758620] The buggy address is located 8 bytes inside of [ 76.758620] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.760370] [ 76.760764] The buggy address belongs to the physical page: [ 76.761347] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.762449] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.763556] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.764704] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.765659] page dumped because: kasan: bad access detected [ 76.766556] [ 76.766958] Memory state around the buggy address: [ 76.767609] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.768679] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.769757] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.770388] ^ [ 76.770723] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.771248] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.771717] ================================================================== [ 76.625792] ================================================================== [ 76.626370] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x4a8/0xb68 [ 76.627081] Read of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.627674] [ 76.627887] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.628664] Hardware name: linux,dummy-virt (DT) [ 76.629133] Call trace: [ 76.629424] dump_backtrace+0xf4/0x114 [ 76.629929] show_stack+0x18/0x24 [ 76.630393] __dump_stack+0x28/0x38 [ 76.630832] dump_stack_lvl+0x50/0x68 [ 76.631264] print_address_description+0x7c/0x1ec [ 76.631853] print_report+0x50/0x68 [ 76.632295] kasan_report+0xac/0xfc [ 76.632752] __asan_load8+0xa8/0xac [ 76.633183] kasan_bitops_generic+0x4a8/0xb68 [ 76.633692] kunit_try_run_case+0x80/0x184 [ 76.634189] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.634766] kthread+0x16c/0x21c [ 76.635184] ret_from_fork+0x10/0x20 [ 76.635623] [ 76.635844] Allocated by task 165: [ 76.636212] kasan_set_track+0x4c/0x80 [ 76.636731] kasan_save_alloc_info+0x28/0x34 [ 76.637207] __kasan_kmalloc+0x88/0xa0 [ 76.637666] kmalloc_trace+0x54/0x68 [ 76.638098] kasan_bitops_generic+0x4c/0xb68 [ 76.638576] kunit_try_run_case+0x80/0x184 [ 76.639065] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.639644] kthread+0x16c/0x21c [ 76.640099] ret_from_fork+0x10/0x20 [ 76.640503] [ 76.640724] The buggy address belongs to the object at ffff0000c58a7700 [ 76.640724] which belongs to the cache kmalloc-128 of size 128 [ 76.641649] The buggy address is located 8 bytes inside of [ 76.641649] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.642559] [ 76.642774] The buggy address belongs to the physical page: [ 76.643254] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.644016] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.644720] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.645447] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.646058] page dumped because: kasan: bad access detected [ 76.646543] [ 76.646783] Memory state around the buggy address: [ 76.647234] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.647895] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.648531] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.649140] ^ [ 76.649548] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.650185] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.650805] ================================================================== [ 76.337148] ================================================================== [ 76.337633] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x244/0xb68 [ 76.338237] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.338774] [ 76.339066] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.340174] Hardware name: linux,dummy-virt (DT) [ 76.340858] Call trace: [ 76.341363] dump_backtrace+0xf4/0x114 [ 76.342029] show_stack+0x18/0x24 [ 76.342616] __dump_stack+0x28/0x38 [ 76.343211] dump_stack_lvl+0x50/0x68 [ 76.343821] print_address_description+0x7c/0x1ec [ 76.344585] print_report+0x50/0x68 [ 76.345207] kasan_report+0xac/0xfc [ 76.345830] kasan_check_range+0x258/0x290 [ 76.346509] __kasan_check_write+0x2c/0x3c [ 76.347151] kasan_bitops_generic+0x244/0xb68 [ 76.347842] kunit_try_run_case+0x80/0x184 [ 76.348508] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.349312] kthread+0x16c/0x21c [ 76.349901] ret_from_fork+0x10/0x20 [ 76.350475] [ 76.350758] Allocated by task 165: [ 76.351249] kasan_set_track+0x4c/0x80 [ 76.351888] kasan_save_alloc_info+0x28/0x34 [ 76.352544] __kasan_kmalloc+0x88/0xa0 [ 76.353182] kmalloc_trace+0x54/0x68 [ 76.353795] kasan_bitops_generic+0x4c/0xb68 [ 76.354463] kunit_try_run_case+0x80/0x184 [ 76.355129] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.355951] kthread+0x16c/0x21c [ 76.356525] ret_from_fork+0x10/0x20 [ 76.357038] [ 76.357223] The buggy address belongs to the object at ffff0000c58a7700 [ 76.357223] which belongs to the cache kmalloc-128 of size 128 [ 76.357982] The buggy address is located 8 bytes inside of [ 76.357982] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.358951] [ 76.359141] The buggy address belongs to the physical page: [ 76.359646] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.360435] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.361139] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.361800] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.362390] page dumped because: kasan: bad access detected [ 76.362863] [ 76.363052] Memory state around the buggy address: [ 76.363502] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.364161] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.364832] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.365428] ^ [ 76.365810] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.366449] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.367018] ================================================================== [ 76.368319] ================================================================== [ 76.368856] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x24c/0xb68 [ 76.369558] Read of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.370157] [ 76.370374] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.371122] Hardware name: linux,dummy-virt (DT) [ 76.371589] Call trace: [ 76.371872] dump_backtrace+0xf4/0x114 [ 76.372383] show_stack+0x18/0x24 [ 76.372826] __dump_stack+0x28/0x38 [ 76.373236] dump_stack_lvl+0x50/0x68 [ 76.373692] print_address_description+0x7c/0x1ec [ 76.374232] print_report+0x50/0x68 [ 76.374705] kasan_report+0xac/0xfc [ 76.375195] __asan_load8+0xa8/0xac [ 76.375611] kasan_bitops_generic+0x24c/0xb68 [ 76.376164] kunit_try_run_case+0x80/0x184 [ 76.376614] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.377182] kthread+0x16c/0x21c [ 76.377599] ret_from_fork+0x10/0x20 [ 76.378050] [ 76.378247] Allocated by task 165: [ 76.378578] kasan_set_track+0x4c/0x80 [ 76.379113] kasan_save_alloc_info+0x28/0x34 [ 76.379573] __kasan_kmalloc+0x88/0xa0 [ 76.380023] kmalloc_trace+0x54/0x68 [ 76.380429] kasan_bitops_generic+0x4c/0xb68 [ 76.380942] kunit_try_run_case+0x80/0x184 [ 76.381422] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.382002] kthread+0x16c/0x21c [ 76.382422] ret_from_fork+0x10/0x20 [ 76.382859] [ 76.383057] The buggy address belongs to the object at ffff0000c58a7700 [ 76.383057] which belongs to the cache kmalloc-128 of size 128 [ 76.383990] The buggy address is located 8 bytes inside of [ 76.383990] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.384899] [ 76.385115] The buggy address belongs to the physical page: [ 76.385565] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.386372] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.387081] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.387730] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.388328] page dumped because: kasan: bad access detected [ 76.388798] [ 76.389014] Memory state around the buggy address: [ 76.389432] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.390082] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.390712] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.391306] ^ [ 76.391687] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.392335] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.392937] ================================================================== [ 76.711007] ================================================================== [ 76.711548] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x59c/0xb68 [ 76.712435] Read of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.713069] [ 76.713313] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.714064] Hardware name: linux,dummy-virt (DT) [ 76.714514] Call trace: [ 76.714805] dump_backtrace+0xf4/0x114 [ 76.715312] show_stack+0x18/0x24 [ 76.715824] __dump_stack+0x28/0x38 [ 76.716250] dump_stack_lvl+0x50/0x68 [ 76.716680] print_address_description+0x7c/0x1ec [ 76.717241] print_report+0x50/0x68 [ 76.717697] kasan_report+0xac/0xfc [ 76.718167] __asan_load8+0xa8/0xac [ 76.718590] kasan_bitops_generic+0x59c/0xb68 [ 76.719075] kunit_try_run_case+0x80/0x184 [ 76.719593] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.720182] kthread+0x16c/0x21c [ 76.720627] ret_from_fork+0x10/0x20 [ 76.721122] [ 76.721314] Allocated by task 165: [ 76.721688] kasan_set_track+0x4c/0x80 [ 76.722158] kasan_save_alloc_info+0x28/0x34 [ 76.722638] __kasan_kmalloc+0x88/0xa0 [ 76.723105] kmalloc_trace+0x54/0x68 [ 76.723536] kasan_bitops_generic+0x4c/0xb68 [ 76.724073] kunit_try_run_case+0x80/0x184 [ 76.724617] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.725204] kthread+0x16c/0x21c [ 76.725664] ret_from_fork+0x10/0x20 [ 76.726092] [ 76.726314] The buggy address belongs to the object at ffff0000c58a7700 [ 76.726314] which belongs to the cache kmalloc-128 of size 128 [ 76.727237] The buggy address is located 8 bytes inside of [ 76.727237] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.728151] [ 76.728382] The buggy address belongs to the physical page: [ 76.728866] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.729661] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.730330] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.731017] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.731638] page dumped because: kasan: bad access detected [ 76.732136] [ 76.732344] Memory state around the buggy address: [ 76.732791] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.733426] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.734069] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.734671] ^ [ 76.735047] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.735691] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.736320] ================================================================== [ 76.449509] ================================================================== [ 76.450141] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x2fc/0xb68 [ 76.450916] Read of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.451505] [ 76.452456] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.453140] Hardware name: linux,dummy-virt (DT) [ 76.453507] Call trace: [ 76.453760] dump_backtrace+0xf4/0x114 [ 76.454381] show_stack+0x18/0x24 [ 76.454900] __dump_stack+0x28/0x38 [ 76.455349] dump_stack_lvl+0x50/0x68 [ 76.455847] print_address_description+0x7c/0x1ec [ 76.456485] print_report+0x50/0x68 [ 76.456984] kasan_report+0xac/0xfc [ 76.457536] __asan_load8+0xa8/0xac [ 76.457997] kasan_bitops_generic+0x2fc/0xb68 [ 76.458513] kunit_try_run_case+0x80/0x184 [ 76.459073] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.459654] kthread+0x16c/0x21c [ 76.460099] ret_from_fork+0x10/0x20 [ 76.460525] [ 76.460756] Allocated by task 165: [ 76.461132] kasan_set_track+0x4c/0x80 [ 76.461615] kasan_save_alloc_info+0x28/0x34 [ 76.462127] __kasan_kmalloc+0x88/0xa0 [ 76.462596] kmalloc_trace+0x54/0x68 [ 76.463045] kasan_bitops_generic+0x4c/0xb68 [ 76.463507] kunit_try_run_case+0x80/0x184 [ 76.464547] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.465191] kthread+0x16c/0x21c [ 76.465602] ret_from_fork+0x10/0x20 [ 76.466079] [ 76.466273] The buggy address belongs to the object at ffff0000c58a7700 [ 76.466273] which belongs to the cache kmalloc-128 of size 128 [ 76.467222] The buggy address is located 8 bytes inside of [ 76.467222] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.468128] [ 76.468359] The buggy address belongs to the physical page: [ 76.468875] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.469673] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.470371] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.471013] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.471505] page dumped because: kasan: bad access detected [ 76.472840] [ 76.473125] Memory state around the buggy address: [ 76.473772] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.474667] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.475568] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.476478] ^ [ 76.476998] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.477914] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.478778] ================================================================== [ 76.267061] ================================================================== [ 76.268249] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x19c/0xb68 [ 76.268945] Read of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.269855] [ 76.270122] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.270716] Hardware name: linux,dummy-virt (DT) [ 76.271137] Call trace: [ 76.271416] dump_backtrace+0xf4/0x114 [ 76.272109] show_stack+0x18/0x24 [ 76.272530] __dump_stack+0x28/0x38 [ 76.273055] dump_stack_lvl+0x50/0x68 [ 76.273548] print_address_description+0x7c/0x1ec [ 76.274120] print_report+0x50/0x68 [ 76.274569] kasan_report+0xac/0xfc [ 76.275054] __asan_load8+0xa8/0xac [ 76.275415] kasan_bitops_generic+0x19c/0xb68 [ 76.276125] kunit_try_run_case+0x80/0x184 [ 76.276817] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.277438] kthread+0x16c/0x21c [ 76.277844] ret_from_fork+0x10/0x20 [ 76.278224] [ 76.278407] Allocated by task 165: [ 76.278699] kasan_set_track+0x4c/0x80 [ 76.279348] kasan_save_alloc_info+0x28/0x34 [ 76.280081] __kasan_kmalloc+0x88/0xa0 [ 76.280872] kmalloc_trace+0x54/0x68 [ 76.281499] kasan_bitops_generic+0x4c/0xb68 [ 76.282180] kunit_try_run_case+0x80/0x184 [ 76.282852] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.283678] kthread+0x16c/0x21c [ 76.284431] ret_from_fork+0x10/0x20 [ 76.285056] [ 76.285343] The buggy address belongs to the object at ffff0000c58a7700 [ 76.285343] which belongs to the cache kmalloc-128 of size 128 [ 76.286770] The buggy address is located 8 bytes inside of [ 76.286770] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.288207] [ 76.288542] The buggy address belongs to the physical page: [ 76.289296] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.290458] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.291442] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.292514] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.293370] page dumped because: kasan: bad access detected [ 76.293762] [ 76.293946] Memory state around the buggy address: [ 76.294302] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.294801] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.295687] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.296987] ^ [ 76.297638] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.298566] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.299455] ================================================================== [ 76.678180] ================================================================== [ 76.678775] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x54c/0xb68 [ 76.679439] Read of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.680143] [ 76.680451] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.681549] Hardware name: linux,dummy-virt (DT) [ 76.682180] Call trace: [ 76.682566] dump_backtrace+0xf4/0x114 [ 76.683227] show_stack+0x18/0x24 [ 76.683839] __dump_stack+0x28/0x38 [ 76.684427] dump_stack_lvl+0x50/0x68 [ 76.685092] print_address_description+0x7c/0x1ec [ 76.685872] print_report+0x50/0x68 [ 76.686494] kasan_report+0xac/0xfc [ 76.687125] __asan_load8+0xa8/0xac [ 76.687687] kasan_bitops_generic+0x54c/0xb68 [ 76.688378] kunit_try_run_case+0x80/0x184 [ 76.689060] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.689893] kthread+0x16c/0x21c [ 76.690474] ret_from_fork+0x10/0x20 [ 76.690978] [ 76.691170] Allocated by task 165: [ 76.691475] kasan_set_track+0x4c/0x80 [ 76.691918] kasan_save_alloc_info+0x28/0x34 [ 76.692331] __kasan_kmalloc+0x88/0xa0 [ 76.692779] kmalloc_trace+0x54/0x68 [ 76.693376] kasan_bitops_generic+0x4c/0xb68 [ 76.694075] kunit_try_run_case+0x80/0x184 [ 76.694736] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.695557] kthread+0x16c/0x21c [ 76.696188] ret_from_fork+0x10/0x20 [ 76.696787] [ 76.697066] The buggy address belongs to the object at ffff0000c58a7700 [ 76.697066] which belongs to the cache kmalloc-128 of size 128 [ 76.698484] The buggy address is located 8 bytes inside of [ 76.698484] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.699840] [ 76.700125] The buggy address belongs to the physical page: [ 76.700807] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.701949] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.702916] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.703906] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.704840] page dumped because: kasan: bad access detected [ 76.705537] [ 76.705833] Memory state around the buggy address: [ 76.706473] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.707385] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.708099] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.708574] ^ [ 76.708918] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.709541] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.710162] ================================================================== [ 76.421500] ================================================================== [ 76.422039] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x2ac/0xb68 [ 76.422833] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.423484] [ 76.423688] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.425005] Hardware name: linux,dummy-virt (DT) [ 76.425454] Call trace: [ 76.425770] dump_backtrace+0xf4/0x114 [ 76.426233] show_stack+0x18/0x24 [ 76.426670] __dump_stack+0x28/0x38 [ 76.427123] dump_stack_lvl+0x50/0x68 [ 76.427543] print_address_description+0x7c/0x1ec [ 76.428083] print_report+0x50/0x68 [ 76.428545] kasan_report+0xac/0xfc [ 76.428991] kasan_check_range+0x258/0x290 [ 76.429483] __kasan_check_write+0x2c/0x3c [ 76.429969] kasan_bitops_generic+0x2ac/0xb68 [ 76.430442] kunit_try_run_case+0x80/0x184 [ 76.430911] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.431484] kthread+0x16c/0x21c [ 76.432456] ret_from_fork+0x10/0x20 [ 76.432906] [ 76.433096] Allocated by task 165: [ 76.433465] kasan_set_track+0x4c/0x80 [ 76.433968] kasan_save_alloc_info+0x28/0x34 [ 76.434430] __kasan_kmalloc+0x88/0xa0 [ 76.434894] kmalloc_trace+0x54/0x68 [ 76.435307] kasan_bitops_generic+0x4c/0xb68 [ 76.435779] kunit_try_run_case+0x80/0x184 [ 76.436270] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.436849] kthread+0x16c/0x21c [ 76.437258] ret_from_fork+0x10/0x20 [ 76.437658] [ 76.437878] The buggy address belongs to the object at ffff0000c58a7700 [ 76.437878] which belongs to the cache kmalloc-128 of size 128 [ 76.438831] The buggy address is located 8 bytes inside of [ 76.438831] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.440298] [ 76.440507] The buggy address belongs to the physical page: [ 76.440969] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.441829] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.442520] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.443185] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.443951] page dumped because: kasan: bad access detected [ 76.444440] [ 76.444630] Memory state around the buggy address: [ 76.445088] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.445728] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.446359] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.446974] ^ [ 76.447334] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.448100] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.448707] ================================================================== [ 76.573513] ================================================================== [ 76.574098] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x3fc/0xb68 [ 76.574789] Read of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.575398] [ 76.575626] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.576569] Hardware name: linux,dummy-virt (DT) [ 76.576987] Call trace: [ 76.577249] dump_backtrace+0xf4/0x114 [ 76.577751] show_stack+0x18/0x24 [ 76.578192] __dump_stack+0x28/0x38 [ 76.578594] dump_stack_lvl+0x50/0x68 [ 76.579051] print_address_description+0x7c/0x1ec [ 76.579578] print_report+0x50/0x68 [ 76.580051] kasan_report+0xac/0xfc [ 76.580494] __asan_load8+0xa8/0xac [ 76.580918] kasan_bitops_generic+0x3fc/0xb68 [ 76.581439] kunit_try_run_case+0x80/0x184 [ 76.581908] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.582496] kthread+0x16c/0x21c [ 76.582908] ret_from_fork+0x10/0x20 [ 76.583319] [ 76.583519] Allocated by task 165: [ 76.583880] kasan_set_track+0x4c/0x80 [ 76.584362] kasan_save_alloc_info+0x28/0x34 [ 76.584839] __kasan_kmalloc+0x88/0xa0 [ 76.585352] kmalloc_trace+0x54/0x68 [ 76.585774] kasan_bitops_generic+0x4c/0xb68 [ 76.586261] kunit_try_run_case+0x80/0x184 [ 76.586720] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.587317] kthread+0x16c/0x21c [ 76.587753] ret_from_fork+0x10/0x20 [ 76.588193] [ 76.588381] The buggy address belongs to the object at ffff0000c58a7700 [ 76.588381] which belongs to the cache kmalloc-128 of size 128 [ 76.589203] The buggy address is located 8 bytes inside of [ 76.589203] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.590143] [ 76.590371] The buggy address belongs to the physical page: [ 76.590827] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.591616] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.592318] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.592985] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.593620] page dumped because: kasan: bad access detected [ 76.594104] [ 76.594304] Memory state around the buggy address: [ 76.594765] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.595359] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.595986] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.596548] ^ [ 76.596938] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.597577] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.598206] ================================================================== [ 76.546834] ================================================================== [ 76.547396] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x3f4/0xb68 [ 76.548461] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.549109] [ 76.549380] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.550126] Hardware name: linux,dummy-virt (DT) [ 76.550549] Call trace: [ 76.550806] dump_backtrace+0xf4/0x114 [ 76.551318] show_stack+0x18/0x24 [ 76.551807] __dump_stack+0x28/0x38 [ 76.552304] dump_stack_lvl+0x50/0x68 [ 76.552730] print_address_description+0x7c/0x1ec [ 76.553263] print_report+0x50/0x68 [ 76.553707] kasan_report+0xac/0xfc [ 76.554183] kasan_check_range+0x258/0x290 [ 76.554673] __kasan_check_write+0x2c/0x3c [ 76.555129] kasan_bitops_generic+0x3f4/0xb68 [ 76.555604] kunit_try_run_case+0x80/0x184 [ 76.556086] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.556673] kthread+0x16c/0x21c [ 76.557127] ret_from_fork+0x10/0x20 [ 76.557540] [ 76.557755] Allocated by task 165: [ 76.558095] kasan_set_track+0x4c/0x80 [ 76.558576] kasan_save_alloc_info+0x28/0x34 [ 76.559036] __kasan_kmalloc+0x88/0xa0 [ 76.559490] kmalloc_trace+0x54/0x68 [ 76.559936] kasan_bitops_generic+0x4c/0xb68 [ 76.560446] kunit_try_run_case+0x80/0x184 [ 76.560952] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.561535] kthread+0x16c/0x21c [ 76.561981] ret_from_fork+0x10/0x20 [ 76.562391] [ 76.562588] The buggy address belongs to the object at ffff0000c58a7700 [ 76.562588] which belongs to the cache kmalloc-128 of size 128 [ 76.563561] The buggy address is located 8 bytes inside of [ 76.563561] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.564477] [ 76.564715] The buggy address belongs to the physical page: [ 76.565195] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.565965] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.566657] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.567321] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.567957] page dumped because: kasan: bad access detected [ 76.568432] [ 76.568620] Memory state around the buggy address: [ 76.569091] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.569728] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.570335] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.570923] ^ [ 76.571297] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.571932] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.572539] ================================================================== [ 76.479537] ================================================================== [ 76.481011] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x350/0xb68 [ 76.482014] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.482938] [ 76.483233] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.484300] Hardware name: linux,dummy-virt (DT) [ 76.484847] Call trace: [ 76.485092] dump_backtrace+0xf4/0x114 [ 76.485535] show_stack+0x18/0x24 [ 76.485952] __dump_stack+0x28/0x38 [ 76.486413] dump_stack_lvl+0x50/0x68 [ 76.486926] print_address_description+0x7c/0x1ec [ 76.487490] print_report+0x50/0x68 [ 76.487992] kasan_report+0xac/0xfc [ 76.489001] kasan_check_range+0x258/0x290 [ 76.489478] __kasan_check_write+0x2c/0x3c [ 76.491158] kasan_bitops_generic+0x350/0xb68 [ 76.491606] kunit_try_run_case+0x80/0x184 [ 76.492057] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.492558] kthread+0x16c/0x21c [ 76.494044] ret_from_fork+0x10/0x20 [ 76.494656] [ 76.495022] Allocated by task 165: [ 76.496454] kasan_set_track+0x4c/0x80 [ 76.497311] kasan_save_alloc_info+0x28/0x34 [ 76.498263] __kasan_kmalloc+0x88/0xa0 [ 76.499091] kmalloc_trace+0x54/0x68 [ 76.499854] kasan_bitops_generic+0x4c/0xb68 [ 76.500687] kunit_try_run_case+0x80/0x184 [ 76.501520] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.502501] kthread+0x16c/0x21c [ 76.503147] ret_from_fork+0x10/0x20 [ 76.503835] [ 76.504178] The buggy address belongs to the object at ffff0000c58a7700 [ 76.504178] which belongs to the cache kmalloc-128 of size 128 [ 76.505962] The buggy address is located 8 bytes inside of [ 76.505962] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.506871] [ 76.507066] The buggy address belongs to the physical page: [ 76.507439] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.508446] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.509418] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.510424] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.511341] page dumped because: kasan: bad access detected [ 76.512102] [ 76.512968] Memory state around the buggy address: [ 76.513624] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.514561] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.515455] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.516328] ^ [ 76.516808] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.517303] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.517806] ================================================================== [ 76.651644] ================================================================== [ 76.652253] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x4fc/0xb68 [ 76.652983] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.653590] [ 76.653831] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.654577] Hardware name: linux,dummy-virt (DT) [ 76.655050] Call trace: [ 76.655335] dump_backtrace+0xf4/0x114 [ 76.655820] show_stack+0x18/0x24 [ 76.656267] __dump_stack+0x28/0x38 [ 76.656717] dump_stack_lvl+0x50/0x68 [ 76.657199] print_address_description+0x7c/0x1ec [ 76.657746] print_report+0x50/0x68 [ 76.658205] kasan_report+0xac/0xfc [ 76.658662] kasan_check_range+0x258/0x290 [ 76.659159] __kasan_check_write+0x2c/0x3c [ 76.659648] kasan_bitops_generic+0x4fc/0xb68 [ 76.660176] kunit_try_run_case+0x80/0x184 [ 76.660664] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.661253] kthread+0x16c/0x21c [ 76.661679] ret_from_fork+0x10/0x20 [ 76.662142] [ 76.662350] Allocated by task 165: [ 76.662706] kasan_set_track+0x4c/0x80 [ 76.663174] kasan_save_alloc_info+0x28/0x34 [ 76.663619] __kasan_kmalloc+0x88/0xa0 [ 76.664129] kmalloc_trace+0x54/0x68 [ 76.664546] kasan_bitops_generic+0x4c/0xb68 [ 76.665022] kunit_try_run_case+0x80/0x184 [ 76.665489] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.666072] kthread+0x16c/0x21c [ 76.666480] ret_from_fork+0x10/0x20 [ 76.666903] [ 76.667125] The buggy address belongs to the object at ffff0000c58a7700 [ 76.667125] which belongs to the cache kmalloc-128 of size 128 [ 76.668052] The buggy address is located 8 bytes inside of [ 76.668052] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.668926] [ 76.669151] The buggy address belongs to the physical page: [ 76.669623] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.670413] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.671127] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.671849] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.672442] page dumped because: kasan: bad access detected [ 76.672936] [ 76.673136] Memory state around the buggy address: [ 76.673591] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.674243] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.674850] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.675438] ^ [ 76.675814] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.676422] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.677036] ================================================================== [ 76.393959] ================================================================== [ 76.394613] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x260/0xb68 [ 76.395385] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165 [ 76.396174] [ 76.396433] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.397195] Hardware name: linux,dummy-virt (DT) [ 76.397551] Call trace: [ 76.397888] dump_backtrace+0xf4/0x114 [ 76.398449] show_stack+0x18/0x24 [ 76.398899] __dump_stack+0x28/0x38 [ 76.399313] dump_stack_lvl+0x50/0x68 [ 76.399812] print_address_description+0x7c/0x1ec [ 76.400349] print_report+0x50/0x68 [ 76.400890] kasan_report+0xac/0xfc [ 76.401417] kasan_check_range+0x258/0x290 [ 76.401950] __kasan_check_write+0x2c/0x3c [ 76.402399] kasan_bitops_generic+0x260/0xb68 [ 76.402932] kunit_try_run_case+0x80/0x184 [ 76.403409] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.404017] kthread+0x16c/0x21c [ 76.404423] ret_from_fork+0x10/0x20 [ 76.404863] [ 76.405052] Allocated by task 165: [ 76.405414] kasan_set_track+0x4c/0x80 [ 76.405948] kasan_save_alloc_info+0x28/0x34 [ 76.406399] __kasan_kmalloc+0x88/0xa0 [ 76.406906] kmalloc_trace+0x54/0x68 [ 76.407331] kasan_bitops_generic+0x4c/0xb68 [ 76.407889] kunit_try_run_case+0x80/0x184 [ 76.408395] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.408977] kthread+0x16c/0x21c [ 76.409460] ret_from_fork+0x10/0x20 [ 76.409960] [ 76.410194] The buggy address belongs to the object at ffff0000c58a7700 [ 76.410194] which belongs to the cache kmalloc-128 of size 128 [ 76.411123] The buggy address is located 8 bytes inside of [ 76.411123] 128-byte region [ffff0000c58a7700, ffff0000c58a7780) [ 76.412033] [ 76.412252] The buggy address belongs to the physical page: [ 76.412706] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.413502] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.414186] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.414869] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.415484] page dumped because: kasan: bad access detected [ 76.415970] [ 76.416170] Memory state around the buggy address: [ 76.416748] ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 76.417341] ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.417981] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.418580] ^ [ 76.419281] ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.419939] ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.420546] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 76.899514] ================================================================== [ 76.900507] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xe4/0x25c [ 76.901187] Read of size 1 at addr ffff8000080fb7f8 by task kunit_try_catch/169 [ 76.901721] [ 76.901964] CPU: 1 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.902684] Hardware name: linux,dummy-virt (DT) [ 76.903149] Call trace: [ 76.903435] dump_backtrace+0xf4/0x114 [ 76.904053] show_stack+0x18/0x24 [ 76.904583] __dump_stack+0x28/0x38 [ 76.905039] dump_stack_lvl+0x50/0x68 [ 76.905520] print_address_description+0x7c/0x1ec [ 76.906122] print_report+0x50/0x68 [ 76.906647] kasan_report+0xac/0xfc [ 76.907127] __asan_load1+0x6c/0x70 [ 76.907581] vmalloc_oob+0xe4/0x25c [ 76.908067] kunit_try_run_case+0x80/0x184 [ 76.908830] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.909440] kthread+0x16c/0x21c [ 76.909955] ret_from_fork+0x10/0x20 [ 76.910474] [ 76.910700] The buggy address ffff8000080fb7f8 belongs to a vmalloc virtual mapping [ 76.911340] The buggy address belongs to the physical page: [ 76.911876] page:000000006e24e2fe refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105916 [ 76.912867] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 76.913752] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000 [ 76.914517] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 76.915109] page dumped because: kasan: bad access detected [ 76.915568] [ 76.915913] Memory state around the buggy address: [ 76.916565] ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 76.917475] ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 76.918376] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 76.919244] ^ [ 76.920181] ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 76.921341] ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 76.922270] ================================================================== [ 76.865914] ================================================================== [ 76.867155] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x9c/0x25c [ 76.868249] Read of size 1 at addr ffff8000080fb7f3 by task kunit_try_catch/169 [ 76.869479] [ 76.870003] CPU: 1 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.871217] Hardware name: linux,dummy-virt (DT) [ 76.872147] Call trace: [ 76.872798] dump_backtrace+0xf4/0x114 [ 76.873722] show_stack+0x18/0x24 [ 76.874602] __dump_stack+0x28/0x38 [ 76.875481] dump_stack_lvl+0x50/0x68 [ 76.876407] print_address_description+0x7c/0x1ec [ 76.877566] print_report+0x50/0x68 [ 76.878348] kasan_report+0xac/0xfc [ 76.879256] __asan_load1+0x6c/0x70 [ 76.880328] vmalloc_oob+0x9c/0x25c [ 76.881051] kunit_try_run_case+0x80/0x184 [ 76.881499] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.882654] kthread+0x16c/0x21c [ 76.883539] ret_from_fork+0x10/0x20 [ 76.884527] [ 76.885018] The buggy address ffff8000080fb7f3 belongs to a vmalloc virtual mapping [ 76.886213] The buggy address belongs to the physical page: [ 76.887181] page:000000006e24e2fe refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105916 [ 76.888831] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 76.890023] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000 [ 76.890950] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 76.892202] page dumped because: kasan: bad access detected [ 76.893167] [ 76.893379] Memory state around the buggy address: [ 76.894002] ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 76.894730] ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 76.895516] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 76.896291] ^ [ 76.897012] ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 76.897694] ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 76.898288] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[ 76.824030] ================================================================== [ 76.825059] BUG: KASAN: double-free in kfree_sensitive+0x88/0xa4 [ 76.825939] Free of addr ffff0000c58a7b00 by task kunit_try_catch/167 [ 76.826756] [ 76.827054] CPU: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.828243] Hardware name: linux,dummy-virt (DT) [ 76.828892] Call trace: [ 76.829283] dump_backtrace+0xf4/0x114 [ 76.829860] show_stack+0x18/0x24 [ 76.830273] __dump_stack+0x28/0x38 [ 76.830664] dump_stack_lvl+0x50/0x68 [ 76.831134] print_address_description+0x7c/0x1ec [ 76.831729] print_report+0x50/0x68 [ 76.832246] kasan_report_invalid_free+0x9c/0xe4 [ 76.832830] ____kasan_slab_free+0x108/0x140 [ 76.833356] __kasan_slab_free+0x18/0x28 [ 76.833861] __kmem_cache_free+0xdc/0x27c [ 76.834346] kfree_sensitive+0x88/0xa4 [ 76.834795] kmalloc_double_kzfree+0xa4/0x144 [ 76.835286] kunit_try_run_case+0x80/0x184 [ 76.835814] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.836509] kthread+0x16c/0x21c [ 76.836958] ret_from_fork+0x10/0x20 [ 76.837392] [ 76.837595] Allocated by task 167: [ 76.837946] kasan_set_track+0x4c/0x80 [ 76.838413] kasan_save_alloc_info+0x28/0x34 [ 76.838917] __kasan_kmalloc+0x88/0xa0 [ 76.839423] kmalloc_trace+0x54/0x68 [ 76.839967] kmalloc_double_kzfree+0x48/0x144 [ 76.840512] kunit_try_run_case+0x80/0x184 [ 76.841044] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.841630] kthread+0x16c/0x21c [ 76.842066] ret_from_fork+0x10/0x20 [ 76.842520] [ 76.842715] Freed by task 167: [ 76.843069] kasan_set_track+0x4c/0x80 [ 76.843530] kasan_save_free_info+0x3c/0x60 [ 76.844140] ____kasan_slab_free+0xe8/0x140 [ 76.844733] __kasan_slab_free+0x18/0x28 [ 76.845241] __kmem_cache_free+0xdc/0x27c [ 76.845757] kfree_sensitive+0x88/0xa4 [ 76.846242] kmalloc_double_kzfree+0x90/0x144 [ 76.846768] kunit_try_run_case+0x80/0x184 [ 76.847251] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.847933] kthread+0x16c/0x21c [ 76.848409] ret_from_fork+0x10/0x20 [ 76.848859] [ 76.849077] The buggy address belongs to the object at ffff0000c58a7b00 [ 76.849077] which belongs to the cache kmalloc-128 of size 128 [ 76.850013] The buggy address is located 0 bytes inside of [ 76.850013] 128-byte region [ffff0000c58a7b00, ffff0000c58a7b80) [ 76.850916] [ 76.851130] The buggy address belongs to the physical page: [ 76.851586] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.852671] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.853391] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.854066] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.854677] page dumped because: kasan: bad access detected [ 76.855172] [ 76.855372] Memory state around the buggy address: [ 76.855886] ffff0000c58a7a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.856569] ffff0000c58a7a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.857251] >ffff0000c58a7b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.857863] ^ [ 76.858236] ffff0000c58a7b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.858889] ffff0000c58a7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.859500] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kfree_sensitive
[ 76.778528] ================================================================== [ 76.780377] BUG: KASAN: use-after-free in kfree_sensitive+0x1c/0xa4 [ 76.781366] Read of size 1 at addr ffff0000c58a7b00 by task kunit_try_catch/167 [ 76.782309] [ 76.782638] CPU: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.783792] Hardware name: linux,dummy-virt (DT) [ 76.784537] Call trace: [ 76.784958] dump_backtrace+0xf4/0x114 [ 76.785646] show_stack+0x18/0x24 [ 76.786285] __dump_stack+0x28/0x38 [ 76.786907] dump_stack_lvl+0x50/0x68 [ 76.787534] print_address_description+0x7c/0x1ec [ 76.788260] print_report+0x50/0x68 [ 76.788686] kasan_report+0xac/0xfc [ 76.789214] __kasan_check_byte+0x3c/0x54 [ 76.789714] ksize+0x34/0x13c [ 76.790152] kfree_sensitive+0x1c/0xa4 [ 76.790556] kmalloc_double_kzfree+0xa4/0x144 [ 76.791309] kunit_try_run_case+0x80/0x184 [ 76.792092] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.792965] kthread+0x16c/0x21c [ 76.793578] ret_from_fork+0x10/0x20 [ 76.794206] [ 76.794503] Allocated by task 167: [ 76.795025] kasan_set_track+0x4c/0x80 [ 76.795757] kasan_save_alloc_info+0x28/0x34 [ 76.796462] __kasan_kmalloc+0x88/0xa0 [ 76.796981] kmalloc_trace+0x54/0x68 [ 76.797384] kmalloc_double_kzfree+0x48/0x144 [ 76.797921] kunit_try_run_case+0x80/0x184 [ 76.798597] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.799437] kthread+0x16c/0x21c [ 76.800109] ret_from_fork+0x10/0x20 [ 76.800792] [ 76.801167] Freed by task 167: [ 76.801651] kasan_set_track+0x4c/0x80 [ 76.802319] kasan_save_free_info+0x3c/0x60 [ 76.803003] ____kasan_slab_free+0xe8/0x140 [ 76.803782] __kasan_slab_free+0x18/0x28 [ 76.804498] __kmem_cache_free+0xdc/0x27c [ 76.805172] kfree_sensitive+0x88/0xa4 [ 76.805735] kmalloc_double_kzfree+0x90/0x144 [ 76.806196] kunit_try_run_case+0x80/0x184 [ 76.806619] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.807140] kthread+0x16c/0x21c [ 76.807532] ret_from_fork+0x10/0x20 [ 76.808307] [ 76.808655] The buggy address belongs to the object at ffff0000c58a7b00 [ 76.808655] which belongs to the cache kmalloc-128 of size 128 [ 76.810120] The buggy address is located 0 bytes inside of [ 76.810120] 128-byte region [ffff0000c58a7b00, ffff0000c58a7b80) [ 76.811477] [ 76.811824] The buggy address belongs to the physical page: [ 76.812616] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.813772] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.814725] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.815734] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.816686] page dumped because: kasan: bad access detected [ 76.817390] [ 76.817675] Memory state around the buggy address: [ 76.818315] ffff0000c58a7a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.819239] ffff0000c58a7a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.820262] >ffff0000c58a7b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.821241] ^ [ 76.821793] ffff0000c58a7b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.822697] ffff0000c58a7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.823238] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-strnlen
[ 76.130871] ================================================================== [ 76.131485] BUG: KASAN: use-after-free in strnlen+0x3c/0x74 [ 76.132344] Read of size 1 at addr ffff0000c58a7510 by task kunit_try_catch/164 [ 76.133237] [ 76.133575] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.134412] Hardware name: linux,dummy-virt (DT) [ 76.134864] Call trace: [ 76.135137] dump_backtrace+0xf4/0x114 [ 76.135654] show_stack+0x18/0x24 [ 76.136187] __dump_stack+0x28/0x38 [ 76.136794] dump_stack_lvl+0x50/0x68 [ 76.137233] print_address_description+0x7c/0x1ec [ 76.137812] print_report+0x50/0x68 [ 76.138277] kasan_report+0xac/0xfc [ 76.138747] __asan_load1+0x6c/0x70 [ 76.139189] strnlen+0x3c/0x74 [ 76.139582] kasan_strings+0x234/0x404 [ 76.140111] kunit_try_run_case+0x80/0x184 [ 76.140701] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.141360] kthread+0x16c/0x21c [ 76.141819] ret_from_fork+0x10/0x20 [ 76.142348] [ 76.142574] Allocated by task 164: [ 76.142924] kasan_set_track+0x4c/0x80 [ 76.143444] kasan_save_alloc_info+0x28/0x34 [ 76.144016] __kasan_kmalloc+0x88/0xa0 [ 76.144594] kmalloc_trace+0x54/0x68 [ 76.145091] kasan_strings+0x48/0x404 [ 76.145566] kunit_try_run_case+0x80/0x184 [ 76.146065] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.146647] kthread+0x16c/0x21c [ 76.147096] ret_from_fork+0x10/0x20 [ 76.147544] [ 76.147767] Freed by task 164: [ 76.148145] kasan_set_track+0x4c/0x80 [ 76.148689] kasan_save_free_info+0x3c/0x60 [ 76.149161] ____kasan_slab_free+0xe8/0x140 [ 76.149714] __kasan_slab_free+0x18/0x28 [ 76.150265] __kmem_cache_free+0xdc/0x27c [ 76.150754] kfree+0x60/0x74 [ 76.151131] kasan_strings+0x90/0x404 [ 76.151610] kunit_try_run_case+0x80/0x184 [ 76.152356] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.152972] kthread+0x16c/0x21c [ 76.153384] ret_from_fork+0x10/0x20 [ 76.153838] [ 76.154037] The buggy address belongs to the object at ffff0000c58a7500 [ 76.154037] which belongs to the cache kmalloc-128 of size 128 [ 76.154984] The buggy address is located 16 bytes inside of [ 76.154984] 128-byte region [ffff0000c58a7500, ffff0000c58a7580) [ 76.155954] [ 76.156243] The buggy address belongs to the physical page: [ 76.156795] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.157748] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.158513] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.159227] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.159929] page dumped because: kasan: bad access detected [ 76.160538] [ 76.160922] Memory state around the buggy address: [ 76.161357] ffff0000c58a7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.161981] ffff0000c58a7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.162616] >ffff0000c58a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.163191] ^ [ 76.163562] ffff0000c58a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.164148] ffff0000c58a7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.164816] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-strlen
[ 76.094900] ================================================================== [ 76.095487] BUG: KASAN: use-after-free in strlen+0x28/0x50 [ 76.096123] Read of size 1 at addr ffff0000c58a7510 by task kunit_try_catch/164 [ 76.096815] [ 76.097132] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.098028] Hardware name: linux,dummy-virt (DT) [ 76.098510] Call trace: [ 76.098803] dump_backtrace+0xf4/0x114 [ 76.099322] show_stack+0x18/0x24 [ 76.099876] __dump_stack+0x28/0x38 [ 76.100362] dump_stack_lvl+0x50/0x68 [ 76.100874] print_address_description+0x7c/0x1ec [ 76.101518] print_report+0x50/0x68 [ 76.102012] kasan_report+0xac/0xfc [ 76.102501] __asan_load1+0x6c/0x70 [ 76.103039] strlen+0x28/0x50 [ 76.103457] kasan_strings+0x1e8/0x404 [ 76.104052] kunit_try_run_case+0x80/0x184 [ 76.104607] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.105206] kthread+0x16c/0x21c [ 76.105645] ret_from_fork+0x10/0x20 [ 76.106086] [ 76.106308] Allocated by task 164: [ 76.106672] kasan_set_track+0x4c/0x80 [ 76.107157] kasan_save_alloc_info+0x28/0x34 [ 76.107635] __kasan_kmalloc+0x88/0xa0 [ 76.108215] kmalloc_trace+0x54/0x68 [ 76.108796] kasan_strings+0x48/0x404 [ 76.109462] kunit_try_run_case+0x80/0x184 [ 76.110066] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.110767] kthread+0x16c/0x21c [ 76.111313] ret_from_fork+0x10/0x20 [ 76.111956] [ 76.112164] Freed by task 164: [ 76.112692] kasan_set_track+0x4c/0x80 [ 76.113197] kasan_save_free_info+0x3c/0x60 [ 76.113722] ____kasan_slab_free+0xe8/0x140 [ 76.114251] __kasan_slab_free+0x18/0x28 [ 76.114748] __kmem_cache_free+0xdc/0x27c [ 76.115214] kfree+0x60/0x74 [ 76.115632] kasan_strings+0x90/0x404 [ 76.116178] kunit_try_run_case+0x80/0x184 [ 76.116659] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.117363] kthread+0x16c/0x21c [ 76.117833] ret_from_fork+0x10/0x20 [ 76.118288] [ 76.118520] The buggy address belongs to the object at ffff0000c58a7500 [ 76.118520] which belongs to the cache kmalloc-128 of size 128 [ 76.119474] The buggy address is located 16 bytes inside of [ 76.119474] 128-byte region [ffff0000c58a7500, ffff0000c58a7580) [ 76.120557] [ 76.120809] The buggy address belongs to the physical page: [ 76.121569] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.122365] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.123113] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.123792] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.124526] page dumped because: kasan: bad access detected [ 76.125034] [ 76.125279] Memory state around the buggy address: [ 76.125682] ffff0000c58a7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.126501] ffff0000c58a7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.127177] >ffff0000c58a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.127890] ^ [ 76.128475] ffff0000c58a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.129198] ffff0000c58a7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.129864] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-strncmp
[ 76.057400] ================================================================== [ 76.057892] BUG: KASAN: use-after-free in strncmp+0x3c/0xa0 [ 76.058480] Read of size 1 at addr ffff0000c58a7510 by task kunit_try_catch/164 [ 76.059117] [ 76.059332] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.060284] Hardware name: linux,dummy-virt (DT) [ 76.060958] Call trace: [ 76.061237] dump_backtrace+0xf4/0x114 [ 76.061771] show_stack+0x18/0x24 [ 76.062224] __dump_stack+0x28/0x38 [ 76.062732] dump_stack_lvl+0x50/0x68 [ 76.063205] print_address_description+0x7c/0x1ec [ 76.064304] print_report+0x50/0x68 [ 76.064838] kasan_report+0xac/0xfc [ 76.065325] __asan_load1+0x6c/0x70 [ 76.065830] strncmp+0x3c/0xa0 [ 76.066272] kasan_strings+0x1a0/0x404 [ 76.066695] kunit_try_run_case+0x80/0x184 [ 76.067180] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.068013] kthread+0x16c/0x21c [ 76.068448] ret_from_fork+0x10/0x20 [ 76.068920] [ 76.069137] Allocated by task 164: [ 76.069492] kasan_set_track+0x4c/0x80 [ 76.070005] kasan_save_alloc_info+0x28/0x34 [ 76.070462] __kasan_kmalloc+0x88/0xa0 [ 76.070956] kmalloc_trace+0x54/0x68 [ 76.071380] kasan_strings+0x48/0x404 [ 76.072335] kunit_try_run_case+0x80/0x184 [ 76.072876] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.073440] kthread+0x16c/0x21c [ 76.073867] ret_from_fork+0x10/0x20 [ 76.074318] [ 76.074509] Freed by task 164: [ 76.074874] kasan_set_track+0x4c/0x80 [ 76.075377] kasan_save_free_info+0x3c/0x60 [ 76.076102] ____kasan_slab_free+0xe8/0x140 [ 76.076644] __kasan_slab_free+0x18/0x28 [ 76.077129] __kmem_cache_free+0xdc/0x27c [ 76.077581] kfree+0x60/0x74 [ 76.077975] kasan_strings+0x90/0x404 [ 76.078422] kunit_try_run_case+0x80/0x184 [ 76.078925] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.079480] kthread+0x16c/0x21c [ 76.080450] ret_from_fork+0x10/0x20 [ 76.080924] [ 76.081152] The buggy address belongs to the object at ffff0000c58a7500 [ 76.081152] which belongs to the cache kmalloc-128 of size 128 [ 76.082112] The buggy address is located 16 bytes inside of [ 76.082112] 128-byte region [ffff0000c58a7500, ffff0000c58a7580) [ 76.082847] [ 76.083039] The buggy address belongs to the physical page: [ 76.083409] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.084884] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.085848] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.086838] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.088250] page dumped because: kasan: bad access detected [ 76.088962] [ 76.089242] Memory state around the buggy address: [ 76.089877] ffff0000c58a7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.090771] ffff0000c58a7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.091382] >ffff0000c58a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.092230] ^ [ 76.092656] ffff0000c58a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.093315] ffff0000c58a7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.093920] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-strcmp
[ 76.011985] ================================================================== [ 76.012888] BUG: KASAN: use-after-free in strcmp+0x30/0x84 [ 76.013662] Read of size 1 at addr ffff0000c58a7510 by task kunit_try_catch/164 [ 76.014575] [ 76.014872] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.016001] Hardware name: linux,dummy-virt (DT) [ 76.016837] Call trace: [ 76.017317] dump_backtrace+0xf4/0x114 [ 76.018022] show_stack+0x18/0x24 [ 76.018667] __dump_stack+0x28/0x38 [ 76.019272] dump_stack_lvl+0x50/0x68 [ 76.019975] print_address_description+0x7c/0x1ec [ 76.020885] print_report+0x50/0x68 [ 76.021555] kasan_report+0xac/0xfc [ 76.022196] __asan_load1+0x6c/0x70 [ 76.022692] strcmp+0x30/0x84 [ 76.023039] kasan_strings+0x148/0x404 [ 76.023436] kunit_try_run_case+0x80/0x184 [ 76.023940] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.024833] kthread+0x16c/0x21c [ 76.025453] ret_from_fork+0x10/0x20 [ 76.025929] [ 76.026119] Allocated by task 164: [ 76.026409] kasan_set_track+0x4c/0x80 [ 76.026985] kasan_save_alloc_info+0x28/0x34 [ 76.027705] __kasan_kmalloc+0x88/0xa0 [ 76.028431] kmalloc_trace+0x54/0x68 [ 76.029096] kasan_strings+0x48/0x404 [ 76.029783] kunit_try_run_case+0x80/0x184 [ 76.030508] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.031376] kthread+0x16c/0x21c [ 76.032177] ret_from_fork+0x10/0x20 [ 76.032962] [ 76.033247] Freed by task 164: [ 76.033798] kasan_set_track+0x4c/0x80 [ 76.034463] kasan_save_free_info+0x3c/0x60 [ 76.035134] ____kasan_slab_free+0xe8/0x140 [ 76.035906] __kasan_slab_free+0x18/0x28 [ 76.036420] __kmem_cache_free+0xdc/0x27c [ 76.036846] kfree+0x60/0x74 [ 76.037184] kasan_strings+0x90/0x404 [ 76.037575] kunit_try_run_case+0x80/0x184 [ 76.037999] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.038494] kthread+0x16c/0x21c [ 76.039032] ret_from_fork+0x10/0x20 [ 76.039613] [ 76.039900] The buggy address belongs to the object at ffff0000c58a7500 [ 76.039900] which belongs to the cache kmalloc-128 of size 128 [ 76.041499] The buggy address is located 16 bytes inside of [ 76.041499] 128-byte region [ffff0000c58a7500, ffff0000c58a7580) [ 76.042973] [ 76.043271] The buggy address belongs to the physical page: [ 76.044286] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.045468] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.046415] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.047408] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.048466] page dumped because: kasan: bad access detected [ 76.049524] [ 76.049831] Memory state around the buggy address: [ 76.050463] ffff0000c58a7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.051365] ffff0000c58a7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.052376] >ffff0000c58a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.053508] ^ [ 76.054055] ffff0000c58a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.054955] ffff0000c58a7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.055858] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-strrchr
[ 75.963529] ================================================================== [ 75.964659] BUG: KASAN: use-after-free in strrchr+0x34/0x68 [ 75.965472] Read of size 1 at addr ffff0000c58a7510 by task kunit_try_catch/164 [ 75.966388] [ 75.966681] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.968242] Hardware name: linux,dummy-virt (DT) [ 75.969280] Call trace: [ 75.969684] dump_backtrace+0xf4/0x114 [ 75.970428] show_stack+0x18/0x24 [ 75.971042] __dump_stack+0x28/0x38 [ 75.971995] dump_stack_lvl+0x50/0x68 [ 75.972421] print_address_description+0x7c/0x1ec [ 75.972942] print_report+0x50/0x68 [ 75.973363] kasan_report+0xac/0xfc [ 75.974411] __asan_load1+0x6c/0x70 [ 75.975195] strrchr+0x34/0x68 [ 75.975944] kasan_strings+0xf8/0x404 [ 75.976536] kunit_try_run_case+0x80/0x184 [ 75.977796] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.978638] kthread+0x16c/0x21c [ 75.979583] ret_from_fork+0x10/0x20 [ 75.980593] [ 75.981084] Allocated by task 164: [ 75.981661] kasan_set_track+0x4c/0x80 [ 75.982602] kasan_save_alloc_info+0x28/0x34 [ 75.983218] __kasan_kmalloc+0x88/0xa0 [ 75.983888] kmalloc_trace+0x54/0x68 [ 75.984611] kasan_strings+0x48/0x404 [ 75.985495] kunit_try_run_case+0x80/0x184 [ 75.986407] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.987490] kthread+0x16c/0x21c [ 75.988373] ret_from_fork+0x10/0x20 [ 75.989096] [ 75.989291] Freed by task 164: [ 75.989572] kasan_set_track+0x4c/0x80 [ 75.990330] kasan_save_free_info+0x3c/0x60 [ 75.991025] ____kasan_slab_free+0xe8/0x140 [ 75.991798] __kasan_slab_free+0x18/0x28 [ 75.992601] __kmem_cache_free+0xdc/0x27c [ 75.993307] kfree+0x60/0x74 [ 75.993875] kasan_strings+0x90/0x404 [ 75.994518] kunit_try_run_case+0x80/0x184 [ 75.995208] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.995882] kthread+0x16c/0x21c [ 75.996279] ret_from_fork+0x10/0x20 [ 75.996653] [ 75.996883] The buggy address belongs to the object at ffff0000c58a7500 [ 75.996883] which belongs to the cache kmalloc-128 of size 128 [ 75.998530] The buggy address is located 16 bytes inside of [ 75.998530] 128-byte region [ffff0000c58a7500, ffff0000c58a7580) [ 76.000003] [ 76.000331] The buggy address belongs to the physical page: [ 76.001133] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 76.002316] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.003149] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.003699] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.004876] page dumped because: kasan: bad access detected [ 76.005596] [ 76.005882] Memory state around the buggy address: [ 76.006505] ffff0000c58a7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.007396] ffff0000c58a7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.008408] >ffff0000c58a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.009425] ^ [ 76.010047] ffff0000c58a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.010758] ffff0000c58a7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.011219] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-strchr
[ 75.916364] ================================================================== [ 75.917414] BUG: KASAN: use-after-free in strchr+0x20/0x6c [ 75.917907] Read of size 1 at addr ffff0000c58a7510 by task kunit_try_catch/164 [ 75.918414] [ 75.918621] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.920393] Hardware name: linux,dummy-virt (DT) [ 75.921313] Call trace: [ 75.921916] dump_backtrace+0xf4/0x114 [ 75.922717] show_stack+0x18/0x24 [ 75.923508] __dump_stack+0x28/0x38 [ 75.924303] dump_stack_lvl+0x50/0x68 [ 75.925032] print_address_description+0x7c/0x1ec [ 75.925926] print_report+0x50/0x68 [ 75.926650] kasan_report+0xac/0xfc [ 75.927390] __asan_load1+0x6c/0x70 [ 75.928202] strchr+0x20/0x6c [ 75.928795] kasan_strings+0xa8/0x404 [ 75.929602] kunit_try_run_case+0x80/0x184 [ 75.930430] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.931376] kthread+0x16c/0x21c [ 75.932582] ret_from_fork+0x10/0x20 [ 75.933236] [ 75.933552] Allocated by task 164: [ 75.934084] kasan_set_track+0x4c/0x80 [ 75.934775] kasan_save_alloc_info+0x28/0x34 [ 75.935341] __kasan_kmalloc+0x88/0xa0 [ 75.936354] kmalloc_trace+0x54/0x68 [ 75.936983] kasan_strings+0x48/0x404 [ 75.937589] kunit_try_run_case+0x80/0x184 [ 75.938254] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.939069] kthread+0x16c/0x21c [ 75.939525] ret_from_fork+0x10/0x20 [ 75.940144] [ 75.940612] Freed by task 164: [ 75.941093] kasan_set_track+0x4c/0x80 [ 75.941733] kasan_save_free_info+0x3c/0x60 [ 75.942194] ____kasan_slab_free+0xe8/0x140 [ 75.942639] __kasan_slab_free+0x18/0x28 [ 75.943076] __kmem_cache_free+0xdc/0x27c [ 75.943484] kfree+0x60/0x74 [ 75.944500] kasan_strings+0x90/0x404 [ 75.945136] kunit_try_run_case+0x80/0x184 [ 75.945810] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.946616] kthread+0x16c/0x21c [ 75.947209] ret_from_fork+0x10/0x20 [ 75.947857] [ 75.948078] The buggy address belongs to the object at ffff0000c58a7500 [ 75.948078] which belongs to the cache kmalloc-128 of size 128 [ 75.949024] The buggy address is located 16 bytes inside of [ 75.949024] 128-byte region [ffff0000c58a7500, ffff0000c58a7580) [ 75.950197] [ 75.950401] The buggy address belongs to the physical page: [ 75.950866] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 75.952127] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.953100] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.954089] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.955002] page dumped because: kasan: bad access detected [ 75.955958] [ 75.956252] Memory state around the buggy address: [ 75.956887] ffff0000c58a7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.957789] ffff0000c58a7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.958679] >ffff0000c58a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.959375] ^ [ 75.959719] ffff0000c58a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.961129] ffff0000c58a7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.962030] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 75.877435] ================================================================== [ 75.878180] BUG: KASAN: slab-out-of-bounds in memcmp+0x8c/0xd8 [ 75.878666] Read of size 1 at addr ffff0000c58a3b18 by task kunit_try_catch/163 [ 75.879775] [ 75.880121] CPU: 1 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.881222] Hardware name: linux,dummy-virt (DT) [ 75.881873] Call trace: [ 75.882276] dump_backtrace+0xf4/0x114 [ 75.882957] show_stack+0x18/0x24 [ 75.883578] __dump_stack+0x28/0x38 [ 75.884347] dump_stack_lvl+0x50/0x68 [ 75.884986] print_address_description+0x7c/0x1ec [ 75.885772] print_report+0x50/0x68 [ 75.886409] kasan_report+0xac/0xfc [ 75.887047] __asan_load1+0x6c/0x70 [ 75.887685] memcmp+0x8c/0xd8 [ 75.888272] kasan_memcmp+0xc8/0x178 [ 75.888888] kunit_try_run_case+0x80/0x184 [ 75.889432] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.890195] kthread+0x16c/0x21c [ 75.890779] ret_from_fork+0x10/0x20 [ 75.891362] [ 75.891634] Allocated by task 163: [ 75.892221] kasan_set_track+0x4c/0x80 [ 75.892894] kasan_save_alloc_info+0x28/0x34 [ 75.893547] __kasan_kmalloc+0x88/0xa0 [ 75.894189] kmalloc_trace+0x54/0x68 [ 75.894615] kasan_memcmp+0x58/0x178 [ 75.895020] kunit_try_run_case+0x80/0x184 [ 75.895441] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.896342] kthread+0x16c/0x21c [ 75.896954] ret_from_fork+0x10/0x20 [ 75.897547] [ 75.897834] The buggy address belongs to the object at ffff0000c58a3b00 [ 75.897834] which belongs to the cache kmalloc-128 of size 128 [ 75.899235] The buggy address is located 24 bytes inside of [ 75.899235] 128-byte region [ffff0000c58a3b00, ffff0000c58a3b80) [ 75.900731] [ 75.901135] The buggy address belongs to the physical page: [ 75.901871] page:000000002b58a59c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a3 [ 75.902999] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.904045] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.905044] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.905779] page dumped because: kasan: bad access detected [ 75.906459] [ 75.906730] Memory state around the buggy address: [ 75.907258] ffff0000c58a3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.908029] ffff0000c58a3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.909021] >ffff0000c58a3b00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.909907] ^ [ 75.910471] ffff0000c58a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.911370] ffff0000c58a3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.912285] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memchr
[ 75.837771] ================================================================== [ 75.838719] BUG: KASAN: slab-out-of-bounds in memchr+0x34/0x64 [ 75.839322] Read of size 1 at addr ffff0000c58a7118 by task kunit_try_catch/162 [ 75.840487] [ 75.840708] CPU: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.841555] Hardware name: linux,dummy-virt (DT) [ 75.841930] Call trace: [ 75.842174] dump_backtrace+0xf4/0x114 [ 75.842601] show_stack+0x18/0x24 [ 75.843584] __dump_stack+0x28/0x38 [ 75.844464] dump_stack_lvl+0x50/0x68 [ 75.845237] print_address_description+0x7c/0x1ec [ 75.846142] print_report+0x50/0x68 [ 75.846919] kasan_report+0xac/0xfc [ 75.847711] __asan_load1+0x6c/0x70 [ 75.848599] memchr+0x34/0x64 [ 75.849263] kasan_memchr+0xa8/0x158 [ 75.849918] kunit_try_run_case+0x80/0x184 [ 75.850597] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.851429] kthread+0x16c/0x21c [ 75.852260] ret_from_fork+0x10/0x20 [ 75.852902] [ 75.853201] Allocated by task 162: [ 75.853703] kasan_set_track+0x4c/0x80 [ 75.854373] kasan_save_alloc_info+0x28/0x34 [ 75.854854] __kasan_kmalloc+0x88/0xa0 [ 75.855280] kmalloc_trace+0x54/0x68 [ 75.855663] kasan_memchr+0x48/0x158 [ 75.856377] kunit_try_run_case+0x80/0x184 [ 75.857180] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.858069] kthread+0x16c/0x21c [ 75.858656] ret_from_fork+0x10/0x20 [ 75.859269] [ 75.859566] The buggy address belongs to the object at ffff0000c58a7100 [ 75.859566] which belongs to the cache kmalloc-128 of size 128 [ 75.861204] The buggy address is located 24 bytes inside of [ 75.861204] 128-byte region [ffff0000c58a7100, ffff0000c58a7180) [ 75.862625] [ 75.862936] The buggy address belongs to the physical page: [ 75.863638] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 75.864930] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.865993] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.866995] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.867584] page dumped because: kasan: bad access detected [ 75.868307] [ 75.868662] Memory state around the buggy address: [ 75.869331] ffff0000c58a7000: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.870257] ffff0000c58a7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.871178] >ffff0000c58a7100: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.871998] ^ [ 75.872684] ffff0000c58a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.873385] ffff0000c58a7200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.873872] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmem_cache_double_destroy
[ 75.792417] ================================================================== [ 75.793732] BUG: KASAN: use-after-free in kmem_cache_double_destroy+0xa4/0x144 [ 75.794496] Read of size 1 at addr ffff0000c159ed80 by task kunit_try_catch/161 [ 75.795134] [ 75.795379] CPU: 1 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.797193] Hardware name: linux,dummy-virt (DT) [ 75.797570] Call trace: [ 75.797824] dump_backtrace+0xf4/0x114 [ 75.798602] show_stack+0x18/0x24 [ 75.799037] __dump_stack+0x28/0x38 [ 75.799430] dump_stack_lvl+0x50/0x68 [ 75.800230] print_address_description+0x7c/0x1ec [ 75.801191] print_report+0x50/0x68 [ 75.802015] kasan_report+0xac/0xfc [ 75.802798] __kasan_check_byte+0x3c/0x54 [ 75.803609] kmem_cache_destroy+0x3c/0x14c [ 75.804469] kmem_cache_double_destroy+0xa4/0x144 [ 75.805180] kunit_try_run_case+0x80/0x184 [ 75.805617] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.806325] kthread+0x16c/0x21c [ 75.806825] ret_from_fork+0x10/0x20 [ 75.807303] [ 75.807566] Allocated by task 161: [ 75.807997] kasan_set_track+0x4c/0x80 [ 75.808544] kasan_save_alloc_info+0x28/0x34 [ 75.809049] __kasan_slab_alloc+0x58/0x70 [ 75.809554] slab_post_alloc_hook+0x70/0x2e8 [ 75.810032] kmem_cache_alloc+0x164/0x254 [ 75.810549] kmem_cache_create_usercopy+0x108/0x2a0 [ 75.811065] kmem_cache_create+0x1c/0x28 [ 75.811495] kmem_cache_double_destroy+0x48/0x144 [ 75.812071] kunit_try_run_case+0x80/0x184 [ 75.812639] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.813313] kthread+0x16c/0x21c [ 75.813748] ret_from_fork+0x10/0x20 [ 75.814166] [ 75.814404] Freed by task 161: [ 75.814758] kasan_set_track+0x4c/0x80 [ 75.815261] kasan_save_free_info+0x3c/0x60 [ 75.815759] ____kasan_slab_free+0xe8/0x140 [ 75.816418] __kasan_slab_free+0x18/0x28 [ 75.816926] kmem_cache_free+0xe0/0x34c [ 75.817406] slab_kmem_cache_release+0x30/0x40 [ 75.817888] kmem_cache_release+0x14/0x20 [ 75.818379] kobject_put+0xd8/0x13c [ 75.818788] sysfs_slab_release+0x28/0x34 [ 75.819232] kmem_cache_destroy+0x148/0x14c [ 75.819883] kmem_cache_double_destroy+0x90/0x144 [ 75.820389] kunit_try_run_case+0x80/0x184 [ 75.820873] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.821437] kthread+0x16c/0x21c [ 75.821884] ret_from_fork+0x10/0x20 [ 75.822308] [ 75.822511] The buggy address belongs to the object at ffff0000c159ed80 [ 75.822511] which belongs to the cache kmem_cache of size 216 [ 75.823460] The buggy address is located 0 bytes inside of [ 75.823460] 216-byte region [ffff0000c159ed80, ffff0000c159ee58) [ 75.824508] [ 75.824761] The buggy address belongs to the physical page: [ 75.825260] page:00000000acb072d7 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10159e [ 75.826064] head:00000000acb072d7 order:1 compound_mapcount:0 compound_pincount:0 [ 75.826707] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 75.827486] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002000 [ 75.828372] raw: 0000000000000000 0000000080150015 00000001ffffffff 0000000000000000 [ 75.829028] page dumped because: kasan: bad access detected [ 75.829519] [ 75.829711] Memory state around the buggy address: [ 75.830168] ffff0000c159ec80: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc [ 75.830812] ffff0000c159ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.831432] >ffff0000c159ed80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.832513] ^ [ 75.832914] ffff0000c159ee00: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc [ 75.833556] ffff0000c159ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.834167] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 75.743415] ================================================================== [ 75.745480] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xb0/0x1b8 [ 75.746468] Free of addr ffff0000c58a7001 by task kunit_try_catch/160 [ 75.747280] [ 75.747573] CPU: 1 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.748777] Hardware name: linux,dummy-virt (DT) [ 75.749474] Call trace: [ 75.749894] dump_backtrace+0xf4/0x114 [ 75.750542] show_stack+0x18/0x24 [ 75.751143] __dump_stack+0x28/0x38 [ 75.751782] dump_stack_lvl+0x50/0x68 [ 75.752260] print_address_description+0x7c/0x1ec [ 75.752776] print_report+0x50/0x68 [ 75.753221] kasan_report_invalid_free+0x9c/0xe4 [ 75.753836] ____kasan_slab_free+0x108/0x140 [ 75.754409] __kasan_slab_free+0x18/0x28 [ 75.754900] kmem_cache_free+0xe0/0x34c [ 75.755360] kmem_cache_invalid_free+0xb0/0x1b8 [ 75.755863] kunit_try_run_case+0x80/0x184 [ 75.756324] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.756909] kthread+0x16c/0x21c [ 75.757366] ret_from_fork+0x10/0x20 [ 75.757815] [ 75.758013] Allocated by task 160: [ 75.758351] kasan_set_track+0x4c/0x80 [ 75.758811] kasan_save_alloc_info+0x28/0x34 [ 75.759263] __kasan_slab_alloc+0x58/0x70 [ 75.759815] slab_post_alloc_hook+0x70/0x2e8 [ 75.760326] kmem_cache_alloc+0x164/0x254 [ 75.760765] kmem_cache_invalid_free+0x90/0x1b8 [ 75.761258] kunit_try_run_case+0x80/0x184 [ 75.762341] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.762958] kthread+0x16c/0x21c [ 75.763375] ret_from_fork+0x10/0x20 [ 75.763827] [ 75.764027] The buggy address belongs to the object at ffff0000c58a7000 [ 75.764027] which belongs to the cache test_cache of size 200 [ 75.764974] The buggy address is located 1 bytes inside of [ 75.764974] 200-byte region [ffff0000c58a7000, ffff0000c58a70c8) [ 75.765916] [ 75.766123] The buggy address belongs to the physical page: [ 75.766590] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7 [ 75.767306] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.768595] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c159ec00 [ 75.769301] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000 [ 75.769951] page dumped because: kasan: bad access detected [ 75.770427] [ 75.770616] Memory state around the buggy address: [ 75.771105] ffff0000c58a6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.771727] ffff0000c58a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.772342] >ffff0000c58a7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.772963] ^ [ 75.773336] ffff0000c58a7080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 75.774004] ffff0000c58a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.774570] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 75.684303] ================================================================== [ 75.685401] BUG: KASAN: double-free in kmem_cache_double_free+0xbc/0x1b8 [ 75.686442] Free of addr ffff0000c58a5000 by task kunit_try_catch/159 [ 75.687272] [ 75.687486] CPU: 1 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.688665] Hardware name: linux,dummy-virt (DT) [ 75.689317] Call trace: [ 75.689726] dump_backtrace+0xf4/0x114 [ 75.690415] show_stack+0x18/0x24 [ 75.691039] __dump_stack+0x28/0x38 [ 75.691641] dump_stack_lvl+0x50/0x68 [ 75.692376] print_address_description+0x7c/0x1ec [ 75.693178] print_report+0x50/0x68 [ 75.693824] kasan_report_invalid_free+0x9c/0xe4 [ 75.694464] ____kasan_slab_free+0x108/0x140 [ 75.694932] __kasan_slab_free+0x18/0x28 [ 75.695374] kmem_cache_free+0xe0/0x34c [ 75.696108] kmem_cache_double_free+0xbc/0x1b8 [ 75.696856] kunit_try_run_case+0x80/0x184 [ 75.697548] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.698388] kthread+0x16c/0x21c [ 75.698998] ret_from_fork+0x10/0x20 [ 75.699612] [ 75.699945] Allocated by task 159: [ 75.700477] kasan_set_track+0x4c/0x80 [ 75.701138] kasan_save_alloc_info+0x28/0x34 [ 75.701824] __kasan_slab_alloc+0x58/0x70 [ 75.702507] slab_post_alloc_hook+0x70/0x2e8 [ 75.703192] kmem_cache_alloc+0x164/0x254 [ 75.703932] kmem_cache_double_free+0x90/0x1b8 [ 75.704694] kunit_try_run_case+0x80/0x184 [ 75.705452] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.706288] kthread+0x16c/0x21c [ 75.706892] ret_from_fork+0x10/0x20 [ 75.707496] [ 75.707825] Freed by task 159: [ 75.708365] kasan_set_track+0x4c/0x80 [ 75.709563] kasan_save_free_info+0x3c/0x60 [ 75.710073] ____kasan_slab_free+0xe8/0x140 [ 75.710530] __kasan_slab_free+0x18/0x28 [ 75.711349] kmem_cache_free+0xe0/0x34c [ 75.712444] kmem_cache_double_free+0xa4/0x1b8 [ 75.713673] kunit_try_run_case+0x80/0x184 [ 75.714163] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.714665] kthread+0x16c/0x21c [ 75.715120] ret_from_fork+0x10/0x20 [ 75.715536] [ 75.716862] The buggy address belongs to the object at ffff0000c58a5000 [ 75.716862] which belongs to the cache test_cache of size 200 [ 75.717709] The buggy address is located 0 bytes inside of [ 75.717709] 200-byte region [ffff0000c58a5000, ffff0000c58a50c8) [ 75.719110] [ 75.719317] The buggy address belongs to the physical page: [ 75.719708] page:000000004e985ca6 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a5 [ 75.720985] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.721952] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c159ea80 [ 75.722940] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000 [ 75.723915] page dumped because: kasan: bad access detected [ 75.725073] [ 75.725269] Memory state around the buggy address: [ 75.725640] ffff0000c58a4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.726152] ffff0000c58a4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.726650] >ffff0000c58a5000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.727514] ^ [ 75.728235] ffff0000c58a5080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 75.729184] ffff0000c58a5100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.730063] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-ksize_uaf
[ 75.590434] ================================================================== [ 75.591328] BUG: KASAN: use-after-free in ksize_uaf+0xe8/0x24c [ 75.592119] Read of size 1 at addr ffff0000c5a06600 by task kunit_try_catch/158 [ 75.593131] [ 75.593456] CPU: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.594523] Hardware name: linux,dummy-virt (DT) [ 75.594936] Call trace: [ 75.595176] dump_backtrace+0xf4/0x114 [ 75.595599] show_stack+0x18/0x24 [ 75.596287] __dump_stack+0x28/0x38 [ 75.596910] dump_stack_lvl+0x50/0x68 [ 75.597562] print_address_description+0x7c/0x1ec [ 75.598314] print_report+0x50/0x68 [ 75.598927] kasan_report+0xac/0xfc [ 75.599540] __asan_load1+0x6c/0x70 [ 75.600273] ksize_uaf+0xe8/0x24c [ 75.600852] kunit_try_run_case+0x80/0x184 [ 75.601521] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.602337] kthread+0x16c/0x21c [ 75.602921] ret_from_fork+0x10/0x20 [ 75.603526] [ 75.603870] Allocated by task 158: [ 75.604367] kasan_set_track+0x4c/0x80 [ 75.604808] kasan_save_alloc_info+0x28/0x34 [ 75.605214] __kasan_kmalloc+0x88/0xa0 [ 75.605640] kmalloc_trace+0x54/0x68 [ 75.606238] ksize_uaf+0x48/0x24c [ 75.606805] kunit_try_run_case+0x80/0x184 [ 75.607468] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.608382] kthread+0x16c/0x21c [ 75.608999] ret_from_fork+0x10/0x20 [ 75.609599] [ 75.609884] Freed by task 158: [ 75.610337] kasan_set_track+0x4c/0x80 [ 75.610974] kasan_save_free_info+0x3c/0x60 [ 75.611620] ____kasan_slab_free+0xe8/0x140 [ 75.612411] __kasan_slab_free+0x18/0x28 [ 75.613113] __kmem_cache_free+0xdc/0x27c [ 75.613759] kfree+0x60/0x74 [ 75.614273] ksize_uaf+0x90/0x24c [ 75.614841] kunit_try_run_case+0x80/0x184 [ 75.615500] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.616414] kthread+0x16c/0x21c [ 75.617058] ret_from_fork+0x10/0x20 [ 75.617652] [ 75.617937] The buggy address belongs to the object at ffff0000c5a06600 [ 75.617937] which belongs to the cache kmalloc-128 of size 128 [ 75.619330] The buggy address is located 0 bytes inside of [ 75.619330] 128-byte region [ffff0000c5a06600, ffff0000c5a06680) [ 75.620760] [ 75.621067] The buggy address belongs to the physical page: [ 75.621772] page:00000000cc3fd307 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a06 [ 75.622674] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.623252] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.623947] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.624950] page dumped because: kasan: bad access detected [ 75.625652] [ 75.625935] Memory state around the buggy address: [ 75.626565] ffff0000c5a06500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.627459] ffff0000c5a06580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.628479] >ffff0000c5a06600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.629518] ^ [ 75.630062] ffff0000c5a06680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.630983] ffff0000c5a06700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.631926] ================================================================== [ 75.545296] ================================================================== [ 75.546698] BUG: KASAN: use-after-free in ksize_uaf+0xa4/0x24c [ 75.547537] Read of size 1 at addr ffff0000c5a06600 by task kunit_try_catch/158 [ 75.548619] [ 75.548967] CPU: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.550167] Hardware name: linux,dummy-virt (DT) [ 75.550780] Call trace: [ 75.551159] dump_backtrace+0xf4/0x114 [ 75.551872] show_stack+0x18/0x24 [ 75.552554] __dump_stack+0x28/0x38 [ 75.553153] dump_stack_lvl+0x50/0x68 [ 75.553773] print_address_description+0x7c/0x1ec [ 75.554301] print_report+0x50/0x68 [ 75.554712] kasan_report+0xac/0xfc [ 75.555348] __kasan_check_byte+0x3c/0x54 [ 75.556123] ksize+0x34/0x13c [ 75.556716] ksize_uaf+0xa4/0x24c [ 75.557299] kunit_try_run_case+0x80/0x184 [ 75.557984] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.558803] kthread+0x16c/0x21c [ 75.559375] ret_from_fork+0x10/0x20 [ 75.560061] [ 75.560488] Allocated by task 158: [ 75.561004] kasan_set_track+0x4c/0x80 [ 75.561624] kasan_save_alloc_info+0x28/0x34 [ 75.562047] __kasan_kmalloc+0x88/0xa0 [ 75.562469] kmalloc_trace+0x54/0x68 [ 75.562983] ksize_uaf+0x48/0x24c [ 75.563539] kunit_try_run_case+0x80/0x184 [ 75.564346] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.565219] kthread+0x16c/0x21c [ 75.565812] ret_from_fork+0x10/0x20 [ 75.566399] [ 75.566672] Freed by task 158: [ 75.567138] kasan_set_track+0x4c/0x80 [ 75.567828] kasan_save_free_info+0x3c/0x60 [ 75.568489] ____kasan_slab_free+0xe8/0x140 [ 75.569185] __kasan_slab_free+0x18/0x28 [ 75.569848] __kmem_cache_free+0xdc/0x27c [ 75.570483] kfree+0x60/0x74 [ 75.571011] ksize_uaf+0x90/0x24c [ 75.571578] kunit_try_run_case+0x80/0x184 [ 75.572341] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.573225] kthread+0x16c/0x21c [ 75.573822] ret_from_fork+0x10/0x20 [ 75.574254] [ 75.574442] The buggy address belongs to the object at ffff0000c5a06600 [ 75.574442] which belongs to the cache kmalloc-128 of size 128 [ 75.575173] The buggy address is located 0 bytes inside of [ 75.575173] 128-byte region [ffff0000c5a06600, ffff0000c5a06680) [ 75.576223] [ 75.576508] The buggy address belongs to the physical page: [ 75.577338] page:00000000cc3fd307 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a06 [ 75.578485] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.579463] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.580531] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.581556] page dumped because: kasan: bad access detected [ 75.582346] [ 75.582635] Memory state around the buggy address: [ 75.583280] ffff0000c5a06500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.584296] ffff0000c5a06580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.585287] >ffff0000c5a06600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.586165] ^ [ 75.586652] ffff0000c5a06680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.587548] ffff0000c5a06700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.588492] ================================================================== [ 75.633076] ================================================================== [ 75.633723] BUG: KASAN: use-after-free in ksize_uaf+0x130/0x24c [ 75.634576] Read of size 1 at addr ffff0000c5a06678 by task kunit_try_catch/158 [ 75.635491] [ 75.635806] CPU: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.636958] Hardware name: linux,dummy-virt (DT) [ 75.637411] Call trace: [ 75.637647] dump_backtrace+0xf4/0x114 [ 75.638093] show_stack+0x18/0x24 [ 75.638492] __dump_stack+0x28/0x38 [ 75.639031] dump_stack_lvl+0x50/0x68 [ 75.639624] print_address_description+0x7c/0x1ec [ 75.640505] print_report+0x50/0x68 [ 75.641134] kasan_report+0xac/0xfc [ 75.641748] __asan_load1+0x6c/0x70 [ 75.642361] ksize_uaf+0x130/0x24c [ 75.642947] kunit_try_run_case+0x80/0x184 [ 75.643620] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.644569] kthread+0x16c/0x21c [ 75.645226] ret_from_fork+0x10/0x20 [ 75.645828] [ 75.646103] Allocated by task 158: [ 75.646592] kasan_set_track+0x4c/0x80 [ 75.647236] kasan_save_alloc_info+0x28/0x34 [ 75.647970] __kasan_kmalloc+0x88/0xa0 [ 75.648689] kmalloc_trace+0x54/0x68 [ 75.649301] ksize_uaf+0x48/0x24c [ 75.649880] kunit_try_run_case+0x80/0x184 [ 75.650543] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.651361] kthread+0x16c/0x21c [ 75.652017] ret_from_fork+0x10/0x20 [ 75.652659] [ 75.652964] Freed by task 158: [ 75.653439] kasan_set_track+0x4c/0x80 [ 75.654006] kasan_save_free_info+0x3c/0x60 [ 75.654419] ____kasan_slab_free+0xe8/0x140 [ 75.654876] __kasan_slab_free+0x18/0x28 [ 75.655310] __kmem_cache_free+0xdc/0x27c [ 75.655825] kfree+0x60/0x74 [ 75.656351] ksize_uaf+0x90/0x24c [ 75.656975] kunit_try_run_case+0x80/0x184 [ 75.657632] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.658457] kthread+0x16c/0x21c [ 75.659031] ret_from_fork+0x10/0x20 [ 75.659613] [ 75.659928] The buggy address belongs to the object at ffff0000c5a06600 [ 75.659928] which belongs to the cache kmalloc-128 of size 128 [ 75.661483] The buggy address is located 120 bytes inside of [ 75.661483] 128-byte region [ffff0000c5a06600, ffff0000c5a06680) [ 75.662850] [ 75.663130] The buggy address belongs to the physical page: [ 75.663851] page:00000000cc3fd307 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a06 [ 75.664999] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.665951] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.666941] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.667930] page dumped because: kasan: bad access detected [ 75.668668] [ 75.668962] Memory state around the buggy address: [ 75.669596] ffff0000c5a06500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.670346] ffff0000c5a06580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.670863] >ffff0000c5a06600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.671489] ^ [ 75.672172] ffff0000c5a06680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.672785] ffff0000c5a06700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.673387] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 75.502787] ================================================================== [ 75.503684] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0xb8/0x164 [ 75.505192] Read of size 1 at addr ffff0000c5a06580 by task kunit_try_catch/157 [ 75.506517] [ 75.506990] CPU: 0 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.508343] Hardware name: linux,dummy-virt (DT) [ 75.508985] Call trace: [ 75.509674] dump_backtrace+0xf4/0x114 [ 75.510494] show_stack+0x18/0x24 [ 75.511181] __dump_stack+0x28/0x38 [ 75.511578] dump_stack_lvl+0x50/0x68 [ 75.512409] print_address_description+0x7c/0x1ec [ 75.513342] print_report+0x50/0x68 [ 75.514061] kasan_report+0xac/0xfc [ 75.514757] __asan_load1+0x6c/0x70 [ 75.515481] ksize_unpoisons_memory+0xb8/0x164 [ 75.516448] kunit_try_run_case+0x80/0x184 [ 75.517175] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.517851] kthread+0x16c/0x21c [ 75.518249] ret_from_fork+0x10/0x20 [ 75.518629] [ 75.518899] Allocated by task 157: [ 75.519434] kasan_set_track+0x4c/0x80 [ 75.520218] kasan_save_alloc_info+0x28/0x34 [ 75.520996] __kasan_kmalloc+0x88/0xa0 [ 75.521691] kmalloc_trace+0x54/0x68 [ 75.522341] ksize_unpoisons_memory+0x48/0x164 [ 75.523082] kunit_try_run_case+0x80/0x184 [ 75.523812] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.524887] kthread+0x16c/0x21c [ 75.525613] ret_from_fork+0x10/0x20 [ 75.526278] [ 75.526610] The buggy address belongs to the object at ffff0000c5a06500 [ 75.526610] which belongs to the cache kmalloc-128 of size 128 [ 75.528219] The buggy address is located 0 bytes to the right of [ 75.528219] 128-byte region [ffff0000c5a06500, ffff0000c5a06580) [ 75.529951] [ 75.530150] The buggy address belongs to the physical page: [ 75.530528] page:00000000cc3fd307 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a06 [ 75.531780] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.532923] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.533992] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.534948] page dumped because: kasan: bad access detected [ 75.535665] [ 75.536058] Memory state around the buggy address: [ 75.536867] ffff0000c5a06480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.537852] ffff0000c5a06500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.538628] >ffff0000c5a06580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.539110] ^ [ 75.539415] ffff0000c5a06600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.540186] ffff0000c5a06680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.541244] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_left
[ 75.466244] ================================================================== [ 75.467109] BUG: KASAN: global-out-of-bounds in kasan_global_oob_left+0x50/0xf4 [ 75.467934] Read of size 1 at addr ffffa980ac4c15bd by task kunit_try_catch/153 [ 75.468712] [ 75.468940] CPU: 1 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.469646] Hardware name: linux,dummy-virt (DT) [ 75.470185] Call trace: [ 75.470458] dump_backtrace+0xf4/0x114 [ 75.470948] show_stack+0x18/0x24 [ 75.471369] __dump_stack+0x28/0x38 [ 75.471956] dump_stack_lvl+0x50/0x68 [ 75.472403] print_address_description+0x7c/0x1ec [ 75.472959] print_report+0x50/0x68 [ 75.473476] kasan_report+0xac/0xfc [ 75.473967] __asan_load1+0x6c/0x70 [ 75.474412] kasan_global_oob_left+0x50/0xf4 [ 75.474934] kunit_try_run_case+0x80/0x184 [ 75.475412] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.476151] kthread+0x16c/0x21c [ 75.476579] ret_from_fork+0x10/0x20 [ 75.477032] [ 75.477234] The buggy address belongs to the variable: [ 75.477675] resource+0x5d/0x60 [ 75.478119] [ 75.478318] The buggy address ffffa980ac4c15bd belongs to a vmalloc virtual mapping [ 75.478933] The buggy address belongs to the physical page: [ 75.479388] page:0000000009454da2 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x43cc1 [ 75.480368] flags: 0x3fffc0000001000(reserved|node=0|zone=0|lastcpupid=0xffff) [ 75.481095] raw: 03fffc0000001000 fffffc00000f3048 fffffc00000f3048 0000000000000000 [ 75.481771] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 75.482412] page dumped because: kasan: bad access detected [ 75.482919] [ 75.483106] Memory state around the buggy address: [ 75.483548] ffffa980ac4c1480: 00 00 00 00 00 00 00 00 00 00 00 00 00 f9 f9 f9 [ 75.484347] ffffa980ac4c1500: 04 f9 f9 f9 01 f9 f9 f9 02 f9 f9 f9 00 00 00 00 [ 75.484992] >ffffa980ac4c1580: 00 00 00 f9 f9 f9 f9 f9 00 02 f9 f9 04 f9 f9 f9 [ 75.485600] ^ [ 75.486116] ffffa980ac4c1600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.486753] ffffa980ac4c1680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.487337] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 75.437504] ================================================================== [ 75.438414] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x4c/0xf0 [ 75.439140] Read of size 1 at addr ffffa980ac4c15cd by task kunit_try_catch/152 [ 75.439760] [ 75.440110] CPU: 1 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.441380] Hardware name: linux,dummy-virt (DT) [ 75.441800] Call trace: [ 75.442217] dump_backtrace+0xf4/0x114 [ 75.442791] show_stack+0x18/0x24 [ 75.443304] __dump_stack+0x28/0x38 [ 75.443896] dump_stack_lvl+0x50/0x68 [ 75.444453] print_address_description+0x7c/0x1ec [ 75.445126] print_report+0x50/0x68 [ 75.445662] kasan_report+0xac/0xfc [ 75.446153] __asan_load1+0x6c/0x70 [ 75.446633] kasan_global_oob_right+0x4c/0xf0 [ 75.447522] kunit_try_run_case+0x80/0x184 [ 75.447978] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.448486] kthread+0x16c/0x21c [ 75.448977] ret_from_fork+0x10/0x20 [ 75.449422] [ 75.449697] The buggy address belongs to the variable: [ 75.450170] global_array+0xd/0x20 [ 75.450663] [ 75.450951] The buggy address ffffa980ac4c15cd belongs to a vmalloc virtual mapping [ 75.451571] The buggy address belongs to the physical page: [ 75.452193] page:0000000009454da2 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x43cc1 [ 75.453890] flags: 0x3fffc0000001000(reserved|node=0|zone=0|lastcpupid=0xffff) [ 75.454923] raw: 03fffc0000001000 fffffc00000f3048 fffffc00000f3048 0000000000000000 [ 75.455606] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 75.457023] page dumped because: kasan: bad access detected [ 75.457853] [ 75.458283] Memory state around the buggy address: [ 75.458982] ffffa980ac4c1480: 00 00 00 00 00 00 00 00 00 00 00 00 00 f9 f9 f9 [ 75.459593] ffffa980ac4c1500: 04 f9 f9 f9 01 f9 f9 f9 02 f9 f9 f9 00 00 00 00 [ 75.460770] >ffffa980ac4c1580: 00 00 00 f9 f9 f9 f9 f9 00 02 f9 f9 04 f9 f9 f9 [ 75.461391] ^ [ 75.461898] ffffa980ac4c1600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.462531] ffffa980ac4c1680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.463141] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 74.821072] ================================================================== [ 74.821972] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0xb0/0x1cc [ 74.823215] Read of size 1 at addr ffff0000c3c320c8 by task kunit_try_catch/149 [ 74.824376] [ 74.824592] CPU: 1 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.825204] Hardware name: linux,dummy-virt (DT) [ 74.825554] Call trace: [ 74.826122] dump_backtrace+0xf4/0x114 [ 74.827007] show_stack+0x18/0x24 [ 74.827894] __dump_stack+0x28/0x38 [ 74.828902] dump_stack_lvl+0x50/0x68 [ 74.829622] print_address_description+0x7c/0x1ec [ 74.830609] print_report+0x50/0x68 [ 74.831417] kasan_report+0xac/0xfc [ 74.832320] __asan_load1+0x6c/0x70 [ 74.833193] kmem_cache_oob+0xb0/0x1cc [ 74.834054] kunit_try_run_case+0x80/0x184 [ 74.834965] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.836245] kthread+0x16c/0x21c [ 74.836985] ret_from_fork+0x10/0x20 [ 74.837879] [ 74.838343] Allocated by task 149: [ 74.838971] kasan_set_track+0x4c/0x80 [ 74.840245] kasan_save_alloc_info+0x28/0x34 [ 74.841079] __kasan_slab_alloc+0x58/0x70 [ 74.842005] slab_post_alloc_hook+0x70/0x2e8 [ 74.842927] kmem_cache_alloc+0x164/0x254 [ 74.843874] kmem_cache_oob+0x94/0x1cc [ 74.844647] kunit_try_run_case+0x80/0x184 [ 74.845341] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.846269] kthread+0x16c/0x21c [ 74.847008] ret_from_fork+0x10/0x20 [ 74.847905] [ 74.848493] The buggy address belongs to the object at ffff0000c3c32000 [ 74.848493] which belongs to the cache test_cache of size 200 [ 74.850267] The buggy address is located 0 bytes to the right of [ 74.850267] 200-byte region [ffff0000c3c32000, ffff0000c3c320c8) [ 74.851919] [ 74.852443] The buggy address belongs to the physical page: [ 74.853250] page:00000000cdc41bd8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103c32 [ 74.853917] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.854674] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c159e780 [ 74.855388] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000 [ 74.856276] page dumped because: kasan: bad access detected [ 74.857085] [ 74.857395] Memory state around the buggy address: [ 74.858055] ffff0000c3c31f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.858678] ffff0000c3c32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.859596] >ffff0000c3c32080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 74.860611] ^ [ 74.861747] ffff0000c3c32100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.862325] ffff0000c3c32180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.862851] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_uaf2
[ 74.770299] ================================================================== [ 74.771175] BUG: KASAN: use-after-free in kmalloc_uaf2+0xfc/0x1e8 [ 74.771813] Read of size 1 at addr ffff0000c5a14228 by task kunit_try_catch/145 [ 74.772671] [ 74.773021] CPU: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.773842] Hardware name: linux,dummy-virt (DT) [ 74.774364] Call trace: [ 74.774763] dump_backtrace+0xf4/0x114 [ 74.775331] show_stack+0x18/0x24 [ 74.776010] __dump_stack+0x28/0x38 [ 74.776440] dump_stack_lvl+0x50/0x68 [ 74.776886] print_address_description+0x7c/0x1ec [ 74.777509] print_report+0x50/0x68 [ 74.778036] kasan_report+0xac/0xfc [ 74.778469] __asan_load1+0x6c/0x70 [ 74.778911] kmalloc_uaf2+0xfc/0x1e8 [ 74.779315] kunit_try_run_case+0x80/0x184 [ 74.779818] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.780400] kthread+0x16c/0x21c [ 74.780848] ret_from_fork+0x10/0x20 [ 74.781263] [ 74.781469] Allocated by task 145: [ 74.781816] kasan_set_track+0x4c/0x80 [ 74.782309] kasan_save_alloc_info+0x28/0x34 [ 74.782785] __kasan_kmalloc+0x88/0xa0 [ 74.783287] kmalloc_trace+0x54/0x68 [ 74.783746] kmalloc_uaf2+0x48/0x1e8 [ 74.784169] kunit_try_run_case+0x80/0x184 [ 74.784675] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.785286] kthread+0x16c/0x21c [ 74.785748] ret_from_fork+0x10/0x20 [ 74.786200] [ 74.786386] Freed by task 145: [ 74.786721] kasan_set_track+0x4c/0x80 [ 74.787379] kasan_save_free_info+0x3c/0x60 [ 74.787869] ____kasan_slab_free+0xe8/0x140 [ 74.788372] __kasan_slab_free+0x18/0x28 [ 74.788847] __kmem_cache_free+0xdc/0x27c [ 74.789283] kfree+0x60/0x74 [ 74.789684] kmalloc_uaf2+0x90/0x1e8 [ 74.790094] kunit_try_run_case+0x80/0x184 [ 74.790551] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.791147] kthread+0x16c/0x21c [ 74.791576] ret_from_fork+0x10/0x20 [ 74.792545] [ 74.792761] The buggy address belongs to the object at ffff0000c5a14200 [ 74.792761] which belongs to the cache kmalloc-128 of size 128 [ 74.793703] The buggy address is located 40 bytes inside of [ 74.793703] 128-byte region [ffff0000c5a14200, ffff0000c5a14280) [ 74.794595] [ 74.794826] The buggy address belongs to the physical page: [ 74.795268] page:000000002a39f223 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a14 [ 74.796067] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.796768] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.797472] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.798114] page dumped because: kasan: bad access detected [ 74.798586] [ 74.798788] Memory state around the buggy address: [ 74.799285] ffff0000c5a14100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.800503] ffff0000c5a14180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.801165] >ffff0000c5a14200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.801780] ^ [ 74.802208] ffff0000c5a14280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.802832] ffff0000c5a14300: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 74.803302] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_uaf_memset
[ 74.730064] ================================================================== [ 74.730927] BUG: KASAN: use-after-free in kmalloc_uaf_memset+0xac/0x14c [ 74.731565] Write of size 33 at addr ffff0000c5a14100 by task kunit_try_catch/144 [ 74.732799] [ 74.733266] CPU: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.733928] Hardware name: linux,dummy-virt (DT) [ 74.734275] Call trace: [ 74.734509] dump_backtrace+0xf4/0x114 [ 74.735167] show_stack+0x18/0x24 [ 74.735631] __dump_stack+0x28/0x38 [ 74.736076] dump_stack_lvl+0x50/0x68 [ 74.736528] print_address_description+0x7c/0x1ec [ 74.737067] print_report+0x50/0x68 [ 74.737507] kasan_report+0xac/0xfc [ 74.737963] kasan_check_range+0x258/0x290 [ 74.738437] memset+0x40/0x70 [ 74.738847] kmalloc_uaf_memset+0xac/0x14c [ 74.739301] kunit_try_run_case+0x80/0x184 [ 74.739771] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.740323] kthread+0x16c/0x21c [ 74.740731] ret_from_fork+0x10/0x20 [ 74.741179] [ 74.741390] Allocated by task 144: [ 74.741716] kasan_set_track+0x4c/0x80 [ 74.742172] kasan_save_alloc_info+0x28/0x34 [ 74.742607] __kasan_kmalloc+0x88/0xa0 [ 74.743111] kmalloc_trace+0x54/0x68 [ 74.743533] kmalloc_uaf_memset+0x48/0x14c [ 74.744033] kunit_try_run_case+0x80/0x184 [ 74.744492] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.745103] kthread+0x16c/0x21c [ 74.745551] ret_from_fork+0x10/0x20 [ 74.746009] [ 74.746196] Freed by task 144: [ 74.746533] kasan_set_track+0x4c/0x80 [ 74.747071] kasan_save_free_info+0x3c/0x60 [ 74.747506] ____kasan_slab_free+0xe8/0x140 [ 74.748041] __kasan_slab_free+0x18/0x28 [ 74.748497] __kmem_cache_free+0xdc/0x27c [ 74.748983] kfree+0x60/0x74 [ 74.749383] kmalloc_uaf_memset+0x90/0x14c [ 74.749888] kunit_try_run_case+0x80/0x184 [ 74.750344] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.750941] kthread+0x16c/0x21c [ 74.751355] ret_from_fork+0x10/0x20 [ 74.751801] [ 74.752000] The buggy address belongs to the object at ffff0000c5a14100 [ 74.752000] which belongs to the cache kmalloc-128 of size 128 [ 74.752958] The buggy address is located 0 bytes inside of [ 74.752958] 128-byte region [ffff0000c5a14100, ffff0000c5a14180) [ 74.753843] [ 74.754066] The buggy address belongs to the physical page: [ 74.754544] page:000000002a39f223 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a14 [ 74.755338] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.756029] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.756721] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.757354] page dumped because: kasan: bad access detected [ 74.757832] [ 74.758025] Memory state around the buggy address: [ 74.758456] ffff0000c5a14000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.759096] ffff0000c5a14080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.759720] >ffff0000c5a14100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.760338] ^ [ 74.760682] ffff0000c5a14180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.761339] ffff0000c5a14200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.761985] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_uaf
[ 74.682106] ================================================================== [ 74.683766] BUG: KASAN: use-after-free in kmalloc_uaf+0xa4/0x148 [ 74.684987] Read of size 1 at addr ffff0000c5a14008 by task kunit_try_catch/143 [ 74.685506] [ 74.685707] CPU: 0 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.687262] Hardware name: linux,dummy-virt (DT) [ 74.688076] Call trace: [ 74.688721] dump_backtrace+0xf4/0x114 [ 74.689594] show_stack+0x18/0x24 [ 74.690246] __dump_stack+0x28/0x38 [ 74.690864] dump_stack_lvl+0x50/0x68 [ 74.691484] print_address_description+0x7c/0x1ec [ 74.692262] print_report+0x50/0x68 [ 74.692871] kasan_report+0xac/0xfc [ 74.693281] __asan_load1+0x6c/0x70 [ 74.693696] kmalloc_uaf+0xa4/0x148 [ 74.694328] kunit_try_run_case+0x80/0x184 [ 74.695020] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.695926] kthread+0x16c/0x21c [ 74.696533] ret_from_fork+0x10/0x20 [ 74.697269] [ 74.697639] Allocated by task 143: [ 74.698160] kasan_set_track+0x4c/0x80 [ 74.698829] kasan_save_alloc_info+0x28/0x34 [ 74.699499] __kasan_kmalloc+0x88/0xa0 [ 74.700160] kmalloc_trace+0x54/0x68 [ 74.700785] kmalloc_uaf+0x48/0x148 [ 74.701381] kunit_try_run_case+0x80/0x184 [ 74.702066] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.702887] kthread+0x16c/0x21c [ 74.703274] ret_from_fork+0x10/0x20 [ 74.703646] [ 74.703969] Freed by task 143: [ 74.704470] kasan_set_track+0x4c/0x80 [ 74.705177] kasan_save_free_info+0x3c/0x60 [ 74.705934] ____kasan_slab_free+0xe8/0x140 [ 74.706649] __kasan_slab_free+0x18/0x28 [ 74.707337] __kmem_cache_free+0xdc/0x27c [ 74.708001] kfree+0x60/0x74 [ 74.708533] kmalloc_uaf+0x90/0x148 [ 74.709132] kunit_try_run_case+0x80/0x184 [ 74.709820] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.710650] kthread+0x16c/0x21c [ 74.711250] ret_from_fork+0x10/0x20 [ 74.711927] [ 74.712158] The buggy address belongs to the object at ffff0000c5a14000 [ 74.712158] which belongs to the cache kmalloc-128 of size 128 [ 74.713861] The buggy address is located 8 bytes inside of [ 74.713861] 128-byte region [ffff0000c5a14000, ffff0000c5a14080) [ 74.714666] [ 74.715015] The buggy address belongs to the physical page: [ 74.715746] page:000000002a39f223 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a14 [ 74.716937] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.717921] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.718898] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.719381] page dumped because: kasan: bad access detected [ 74.719959] [ 74.720240] Memory state around the buggy address: [ 74.720996] ffff0000c5a13f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.722053] ffff0000c5a13f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.723075] >ffff0000c5a14000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.723979] ^ [ 74.724514] ffff0000c5a14080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.725454] ffff0000c5a14100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.726337] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 74.643094] ================================================================== [ 74.644249] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0xb8/0x160 [ 74.645201] Read of size 64 at addr ffff0000c5a09f04 by task kunit_try_catch/142 [ 74.645882] [ 74.646148] CPU: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.646919] Hardware name: linux,dummy-virt (DT) [ 74.647356] Call trace: [ 74.647653] dump_backtrace+0xf4/0x114 [ 74.648289] show_stack+0x18/0x24 [ 74.649189] __dump_stack+0x28/0x38 [ 74.649676] dump_stack_lvl+0x50/0x68 [ 74.650125] print_address_description+0x7c/0x1ec [ 74.650685] print_report+0x50/0x68 [ 74.651151] kasan_report+0xac/0xfc [ 74.651613] kasan_check_range+0x258/0x290 [ 74.652125] memmove+0x48/0x90 [ 74.652530] kmalloc_memmove_invalid_size+0xb8/0x160 [ 74.653060] kunit_try_run_case+0x80/0x184 [ 74.653595] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.654188] kthread+0x16c/0x21c [ 74.654623] ret_from_fork+0x10/0x20 [ 74.655063] [ 74.655255] Allocated by task 142: [ 74.655612] kasan_set_track+0x4c/0x80 [ 74.656106] kasan_save_alloc_info+0x28/0x34 [ 74.656592] __kasan_kmalloc+0x88/0xa0 [ 74.657057] kmalloc_trace+0x54/0x68 [ 74.657484] kmalloc_memmove_invalid_size+0x48/0x160 [ 74.658506] kunit_try_run_case+0x80/0x184 [ 74.659045] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.659629] kthread+0x16c/0x21c [ 74.660090] ret_from_fork+0x10/0x20 [ 74.660546] [ 74.660748] The buggy address belongs to the object at ffff0000c5a09f00 [ 74.660748] which belongs to the cache kmalloc-128 of size 128 [ 74.661690] The buggy address is located 4 bytes inside of [ 74.661690] 128-byte region [ffff0000c5a09f00, ffff0000c5a09f80) [ 74.662638] [ 74.662884] The buggy address belongs to the physical page: [ 74.663326] page:000000009f2754ee refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a09 [ 74.664768] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.665478] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.666147] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.666784] page dumped because: kasan: bad access detected [ 74.667268] [ 74.667467] Memory state around the buggy address: [ 74.667913] ffff0000c5a09e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.668553] ffff0000c5a09e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.669194] >ffff0000c5a09f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 74.669933] ^ [ 74.670609] ffff0000c5a09f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.671493] ffff0000c5a0a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.673423] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 74.598943] ================================================================== [ 74.599692] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0xb4/0x164 [ 74.601381] Read of size 18446744073709551614 at addr ffff0000c5a09e04 by task kunit_try_catch/141 [ 74.602954] [ 74.603415] CPU: 0 PID: 141 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.604690] Hardware name: linux,dummy-virt (DT) [ 74.605058] Call trace: [ 74.605294] dump_backtrace+0xf4/0x114 [ 74.605728] show_stack+0x18/0x24 [ 74.606700] __dump_stack+0x28/0x38 [ 74.607531] dump_stack_lvl+0x50/0x68 [ 74.608465] print_address_description+0x7c/0x1ec [ 74.609575] print_report+0x50/0x68 [ 74.610333] kasan_report+0xac/0xfc [ 74.611164] kasan_check_range+0x258/0x290 [ 74.612130] memmove+0x48/0x90 [ 74.613012] kmalloc_memmove_negative_size+0xb4/0x164 [ 74.613925] kunit_try_run_case+0x80/0x184 [ 74.614849] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.616170] kthread+0x16c/0x21c [ 74.616939] ret_from_fork+0x10/0x20 [ 74.617906] [ 74.618393] Allocated by task 141: [ 74.618825] kasan_set_track+0x4c/0x80 [ 74.619254] kasan_save_alloc_info+0x28/0x34 [ 74.619871] __kasan_kmalloc+0x88/0xa0 [ 74.620706] kmalloc_trace+0x54/0x68 [ 74.621610] kmalloc_memmove_negative_size+0x48/0x164 [ 74.622704] kunit_try_run_case+0x80/0x184 [ 74.623609] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.624776] kthread+0x16c/0x21c [ 74.625587] ret_from_fork+0x10/0x20 [ 74.626456] [ 74.626893] The buggy address belongs to the object at ffff0000c5a09e00 [ 74.626893] which belongs to the cache kmalloc-128 of size 128 [ 74.628829] The buggy address is located 4 bytes inside of [ 74.628829] 128-byte region [ffff0000c5a09e00, ffff0000c5a09e80) [ 74.630092] [ 74.630288] The buggy address belongs to the physical page: [ 74.630658] page:000000009f2754ee refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a09 [ 74.631886] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.633198] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.634207] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.635136] page dumped because: kasan: bad access detected [ 74.635899] [ 74.636205] Memory state around the buggy address: [ 74.636990] ffff0000c5a09d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.637569] ffff0000c5a09d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.638078] >ffff0000c5a09e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 74.638545] ^ [ 74.638862] ffff0000c5a09e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.639504] ffff0000c5a09f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.640092] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 74.558770] ================================================================== [ 74.559523] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xac/0x154 [ 74.560403] Write of size 16 at addr ffff0000c5a09d69 by task kunit_try_catch/140 [ 74.560946] [ 74.561146] CPU: 0 PID: 140 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.561761] Hardware name: linux,dummy-virt (DT) [ 74.562978] Call trace: [ 74.563571] dump_backtrace+0xf4/0x114 [ 74.564430] show_stack+0x18/0x24 [ 74.565201] __dump_stack+0x28/0x38 [ 74.565944] dump_stack_lvl+0x50/0x68 [ 74.566594] print_address_description+0x7c/0x1ec [ 74.567391] print_report+0x50/0x68 [ 74.568158] kasan_report+0xac/0xfc [ 74.568937] kasan_check_range+0x258/0x290 [ 74.569658] memset+0x40/0x70 [ 74.570217] kmalloc_oob_memset_16+0xac/0x154 [ 74.570946] kunit_try_run_case+0x80/0x184 [ 74.571649] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.572624] kthread+0x16c/0x21c [ 74.573254] ret_from_fork+0x10/0x20 [ 74.573902] [ 74.574217] Allocated by task 140: [ 74.574756] kasan_set_track+0x4c/0x80 [ 74.575439] kasan_save_alloc_info+0x28/0x34 [ 74.576191] __kasan_kmalloc+0x88/0xa0 [ 74.576921] kmalloc_trace+0x54/0x68 [ 74.577505] kmalloc_oob_memset_16+0x48/0x154 [ 74.577945] kunit_try_run_case+0x80/0x184 [ 74.578364] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.579049] kthread+0x16c/0x21c [ 74.579661] ret_from_fork+0x10/0x20 [ 74.580338] [ 74.580628] The buggy address belongs to the object at ffff0000c5a09d00 [ 74.580628] which belongs to the cache kmalloc-128 of size 128 [ 74.582073] The buggy address is located 105 bytes inside of [ 74.582073] 128-byte region [ffff0000c5a09d00, ffff0000c5a09d80) [ 74.583470] [ 74.583827] The buggy address belongs to the physical page: [ 74.584578] page:000000009f2754ee refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a09 [ 74.585744] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.586706] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.587686] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.588713] page dumped because: kasan: bad access detected [ 74.589437] [ 74.589731] Memory state around the buggy address: [ 74.590265] ffff0000c5a09c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.590777] ffff0000c5a09c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.591674] >ffff0000c5a09d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 74.592694] ^ [ 74.593820] ffff0000c5a09d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.594719] ffff0000c5a09e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.595599] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 74.524566] ================================================================== [ 74.525467] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xac/0x154 [ 74.526121] Write of size 8 at addr ffff0000c5a09c71 by task kunit_try_catch/139 [ 74.526747] [ 74.526961] CPU: 0 PID: 139 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.527708] Hardware name: linux,dummy-virt (DT) [ 74.528480] Call trace: [ 74.528879] dump_backtrace+0xf4/0x114 [ 74.529460] show_stack+0x18/0x24 [ 74.530006] __dump_stack+0x28/0x38 [ 74.530530] dump_stack_lvl+0x50/0x68 [ 74.531067] print_address_description+0x7c/0x1ec [ 74.531877] print_report+0x50/0x68 [ 74.532468] kasan_report+0xac/0xfc [ 74.532896] kasan_check_range+0x258/0x290 [ 74.533574] memset+0x40/0x70 [ 74.534043] kmalloc_oob_memset_8+0xac/0x154 [ 74.534590] kunit_try_run_case+0x80/0x184 [ 74.535110] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.535729] kthread+0x16c/0x21c [ 74.536341] ret_from_fork+0x10/0x20 [ 74.536838] [ 74.537056] Allocated by task 139: [ 74.537430] kasan_set_track+0x4c/0x80 [ 74.537973] kasan_save_alloc_info+0x28/0x34 [ 74.538462] __kasan_kmalloc+0x88/0xa0 [ 74.538944] kmalloc_trace+0x54/0x68 [ 74.539350] kmalloc_oob_memset_8+0x48/0x154 [ 74.539850] kunit_try_run_case+0x80/0x184 [ 74.540556] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.541170] kthread+0x16c/0x21c [ 74.541578] ret_from_fork+0x10/0x20 [ 74.542004] [ 74.542203] The buggy address belongs to the object at ffff0000c5a09c00 [ 74.542203] which belongs to the cache kmalloc-128 of size 128 [ 74.543092] The buggy address is located 113 bytes inside of [ 74.543092] 128-byte region [ffff0000c5a09c00, ffff0000c5a09c80) [ 74.544098] [ 74.544291] The buggy address belongs to the physical page: [ 74.544817] page:000000009f2754ee refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a09 [ 74.545575] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.546388] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.547075] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.547858] page dumped because: kasan: bad access detected [ 74.548308] [ 74.548526] Memory state around the buggy address: [ 74.548952] ffff0000c5a09b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.549591] ffff0000c5a09b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.550411] >ffff0000c5a09c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 74.551008] ^ [ 74.551586] ffff0000c5a09c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.552685] ffff0000c5a09d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.553304] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 74.482558] ================================================================== [ 74.483303] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xac/0x154 [ 74.484685] Write of size 4 at addr ffff0000c5919d75 by task kunit_try_catch/138 [ 74.485829] [ 74.486299] CPU: 1 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.487528] Hardware name: linux,dummy-virt (DT) [ 74.488397] Call trace: [ 74.488959] dump_backtrace+0xf4/0x114 [ 74.489761] show_stack+0x18/0x24 [ 74.490503] __dump_stack+0x28/0x38 [ 74.491264] dump_stack_lvl+0x50/0x68 [ 74.492102] print_address_description+0x7c/0x1ec [ 74.493006] print_report+0x50/0x68 [ 74.493433] kasan_report+0xac/0xfc [ 74.494134] kasan_check_range+0x258/0x290 [ 74.494986] memset+0x40/0x70 [ 74.495609] kmalloc_oob_memset_4+0xac/0x154 [ 74.496460] kunit_try_run_case+0x80/0x184 [ 74.497244] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.498092] kthread+0x16c/0x21c [ 74.498687] ret_from_fork+0x10/0x20 [ 74.499307] [ 74.499604] Allocated by task 138: [ 74.500345] kasan_set_track+0x4c/0x80 [ 74.501023] kasan_save_alloc_info+0x28/0x34 [ 74.501706] __kasan_kmalloc+0x88/0xa0 [ 74.502239] kmalloc_trace+0x54/0x68 [ 74.502617] kmalloc_oob_memset_4+0x48/0x154 [ 74.503321] kunit_try_run_case+0x80/0x184 [ 74.504098] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.504958] kthread+0x16c/0x21c [ 74.505554] ret_from_fork+0x10/0x20 [ 74.506164] [ 74.506460] The buggy address belongs to the object at ffff0000c5919d00 [ 74.506460] which belongs to the cache kmalloc-128 of size 128 [ 74.507981] The buggy address is located 117 bytes inside of [ 74.507981] 128-byte region [ffff0000c5919d00, ffff0000c5919d80) [ 74.508983] [ 74.509171] The buggy address belongs to the physical page: [ 74.509539] page:0000000087a007df refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105919 [ 74.510677] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.511641] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.512777] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.513692] page dumped because: kasan: bad access detected [ 74.514377] [ 74.514656] Memory state around the buggy address: [ 74.515286] ffff0000c5919c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.516259] ffff0000c5919c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.517170] >ffff0000c5919d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 74.518030] ^ [ 74.518609] ffff0000c5919d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.519494] ffff0000c5919e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.520513] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 74.446923] ================================================================== [ 74.447671] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0xac/0x154 [ 74.448661] Write of size 2 at addr ffff0000c5a09877 by task kunit_try_catch/137 [ 74.449601] [ 74.449876] CPU: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.451047] Hardware name: linux,dummy-virt (DT) [ 74.451588] Call trace: [ 74.451916] dump_backtrace+0xf4/0x114 [ 74.452580] show_stack+0x18/0x24 [ 74.453172] __dump_stack+0x28/0x38 [ 74.453783] dump_stack_lvl+0x50/0x68 [ 74.454361] print_address_description+0x7c/0x1ec [ 74.455060] print_report+0x50/0x68 [ 74.455827] kasan_report+0xac/0xfc [ 74.456522] kasan_check_range+0x258/0x290 [ 74.457000] memset+0x40/0x70 [ 74.457353] kmalloc_oob_memset_2+0xac/0x154 [ 74.457786] kunit_try_run_case+0x80/0x184 [ 74.458208] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.458714] kthread+0x16c/0x21c [ 74.459253] ret_from_fork+0x10/0x20 [ 74.459671] [ 74.459928] Allocated by task 137: [ 74.460338] kasan_set_track+0x4c/0x80 [ 74.461143] kasan_save_alloc_info+0x28/0x34 [ 74.461704] __kasan_kmalloc+0x88/0xa0 [ 74.462278] kmalloc_trace+0x54/0x68 [ 74.462685] kmalloc_oob_memset_2+0x48/0x154 [ 74.463210] kunit_try_run_case+0x80/0x184 [ 74.463939] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.464520] kthread+0x16c/0x21c [ 74.465083] ret_from_fork+0x10/0x20 [ 74.465668] [ 74.465962] The buggy address belongs to the object at ffff0000c5a09800 [ 74.465962] which belongs to the cache kmalloc-128 of size 128 [ 74.466828] The buggy address is located 119 bytes inside of [ 74.466828] 128-byte region [ffff0000c5a09800, ffff0000c5a09880) [ 74.467539] [ 74.468035] The buggy address belongs to the physical page: [ 74.468717] page:000000009f2754ee refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a09 [ 74.469850] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.470794] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.472059] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.472978] page dumped because: kasan: bad access detected [ 74.473656] [ 74.473941] Memory state around the buggy address: [ 74.474565] ffff0000c5a09700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.475449] ffff0000c5a09780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.476613] >ffff0000c5a09800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 74.477230] ^ [ 74.477707] ffff0000c5a09880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.478304] ffff0000c5a09900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.478946] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 74.410404] ================================================================== [ 74.411356] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0xa8/0x150 [ 74.412340] Write of size 128 at addr ffff0000c5919900 by task kunit_try_catch/136 [ 74.413849] [ 74.414156] CPU: 1 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.415140] Hardware name: linux,dummy-virt (DT) [ 74.416523] Call trace: [ 74.417475] dump_backtrace+0xf4/0x114 [ 74.417951] show_stack+0x18/0x24 [ 74.418352] __dump_stack+0x28/0x38 [ 74.418772] dump_stack_lvl+0x50/0x68 [ 74.419166] print_address_description+0x7c/0x1ec [ 74.419643] print_report+0x50/0x68 [ 74.421615] kasan_report+0xac/0xfc [ 74.422124] kasan_check_range+0x258/0x290 [ 74.422772] memset+0x40/0x70 [ 74.423284] kmalloc_oob_in_memset+0xa8/0x150 [ 74.424062] kunit_try_run_case+0x80/0x184 [ 74.424651] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.425356] kthread+0x16c/0x21c [ 74.425912] ret_from_fork+0x10/0x20 [ 74.426446] [ 74.426769] Allocated by task 136: [ 74.427089] kasan_set_track+0x4c/0x80 [ 74.427713] kasan_save_alloc_info+0x28/0x34 [ 74.428296] __kasan_kmalloc+0x88/0xa0 [ 74.428979] kmalloc_trace+0x54/0x68 [ 74.429479] kmalloc_oob_in_memset+0x48/0x150 [ 74.430039] kunit_try_run_case+0x80/0x184 [ 74.430517] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.431134] kthread+0x16c/0x21c [ 74.431552] ret_from_fork+0x10/0x20 [ 74.432134] [ 74.432346] The buggy address belongs to the object at ffff0000c5919900 [ 74.432346] which belongs to the cache kmalloc-128 of size 128 [ 74.433287] The buggy address is located 0 bytes inside of [ 74.433287] 128-byte region [ffff0000c5919900, ffff0000c5919980) [ 74.434206] [ 74.434424] The buggy address belongs to the physical page: [ 74.434905] page:0000000087a007df refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105919 [ 74.435697] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.436406] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.437108] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.437718] page dumped because: kasan: bad access detected [ 74.438330] [ 74.438526] Memory state around the buggy address: [ 74.438973] ffff0000c5919800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.439606] ffff0000c5919880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.440360] >ffff0000c5919900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 74.440966] ^ [ 74.441599] ffff0000c5919980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.442243] ffff0000c5919a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.442847] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_uaf_16
[ 74.360677] ================================================================== [ 74.361479] BUG: KASAN: use-after-free in kmalloc_uaf_16+0x104/0x1ac [ 74.362050] Read of size 16 at addr ffff0000c5919800 by task kunit_try_catch/135 [ 74.363382] [ 74.363897] CPU: 1 PID: 135 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.364662] Hardware name: linux,dummy-virt (DT) [ 74.365026] Call trace: [ 74.365260] dump_backtrace+0xf4/0x114 [ 74.365697] show_stack+0x18/0x24 [ 74.366686] __dump_stack+0x28/0x38 [ 74.367440] dump_stack_lvl+0x50/0x68 [ 74.368260] print_address_description+0x7c/0x1ec [ 74.369129] print_report+0x50/0x68 [ 74.369908] kasan_report+0xac/0xfc [ 74.370628] kasan_check_range+0x258/0x290 [ 74.371426] memcpy+0x48/0x90 [ 74.372109] kmalloc_uaf_16+0x104/0x1ac [ 74.372841] kunit_try_run_case+0x80/0x184 [ 74.373614] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.374530] kthread+0x16c/0x21c [ 74.375224] ret_from_fork+0x10/0x20 [ 74.375901] [ 74.376247] Allocated by task 135: [ 74.376786] kasan_set_track+0x4c/0x80 [ 74.377467] kasan_save_alloc_info+0x28/0x34 [ 74.378166] __kasan_kmalloc+0x88/0xa0 [ 74.378853] kmalloc_trace+0x54/0x68 [ 74.379483] kmalloc_uaf_16+0xa0/0x1ac [ 74.380198] kunit_try_run_case+0x80/0x184 [ 74.380866] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.381378] kthread+0x16c/0x21c [ 74.381769] ret_from_fork+0x10/0x20 [ 74.382467] [ 74.382818] Freed by task 135: [ 74.383139] kasan_set_track+0x4c/0x80 [ 74.383934] kasan_save_free_info+0x3c/0x60 [ 74.384449] ____kasan_slab_free+0xe8/0x140 [ 74.384915] __kasan_slab_free+0x18/0x28 [ 74.385456] __kmem_cache_free+0xdc/0x27c [ 74.386003] kfree+0x60/0x74 [ 74.386440] kmalloc_uaf_16+0xe8/0x1ac [ 74.386947] kunit_try_run_case+0x80/0x184 [ 74.387410] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.388187] kthread+0x16c/0x21c [ 74.388599] ret_from_fork+0x10/0x20 [ 74.389079] [ 74.389278] The buggy address belongs to the object at ffff0000c5919800 [ 74.389278] which belongs to the cache kmalloc-128 of size 128 [ 74.390244] The buggy address is located 0 bytes inside of [ 74.390244] 128-byte region [ffff0000c5919800, ffff0000c5919880) [ 74.391077] [ 74.391264] The buggy address belongs to the physical page: [ 74.391634] page:0000000087a007df refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105919 [ 74.393204] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.394455] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.395718] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.397018] page dumped because: kasan: bad access detected [ 74.397941] [ 74.398359] Memory state around the buggy address: [ 74.399229] ffff0000c5919700: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.400530] ffff0000c5919780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.401208] >ffff0000c5919800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.401684] ^ [ 74.401998] ffff0000c5919880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.402491] ffff0000c5919900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.403474] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 74.324555] ================================================================== [ 74.325410] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0xfc/0x1ac [ 74.326046] Write of size 16 at addr ffff0000c5a07e00 by task kunit_try_catch/134 [ 74.326593] [ 74.326852] CPU: 0 PID: 134 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.327580] Hardware name: linux,dummy-virt (DT) [ 74.328365] Call trace: [ 74.328638] dump_backtrace+0xf4/0x114 [ 74.329168] show_stack+0x18/0x24 [ 74.329615] __dump_stack+0x28/0x38 [ 74.330059] dump_stack_lvl+0x50/0x68 [ 74.330507] print_address_description+0x7c/0x1ec [ 74.331059] print_report+0x50/0x68 [ 74.331493] kasan_report+0xac/0xfc [ 74.331978] kasan_check_range+0x258/0x290 [ 74.332456] memcpy+0x60/0x90 [ 74.332846] kmalloc_oob_16+0xfc/0x1ac [ 74.333269] kunit_try_run_case+0x80/0x184 [ 74.334009] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.334596] kthread+0x16c/0x21c [ 74.335027] ret_from_fork+0x10/0x20 [ 74.335473] [ 74.335668] Allocated by task 134: [ 74.336264] kasan_set_track+0x4c/0x80 [ 74.336711] kasan_save_alloc_info+0x28/0x34 [ 74.337208] __kasan_kmalloc+0x88/0xa0 [ 74.337656] kmalloc_trace+0x54/0x68 [ 74.338090] kmalloc_oob_16+0x48/0x1ac [ 74.338532] kunit_try_run_case+0x80/0x184 [ 74.339006] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.339563] kthread+0x16c/0x21c [ 74.340257] ret_from_fork+0x10/0x20 [ 74.340701] [ 74.340945] The buggy address belongs to the object at ffff0000c5a07e00 [ 74.340945] which belongs to the cache kmalloc-128 of size 128 [ 74.341925] The buggy address is located 0 bytes inside of [ 74.341925] 128-byte region [ffff0000c5a07e00, ffff0000c5a07e80) [ 74.342850] [ 74.343075] The buggy address belongs to the physical page: [ 74.343539] page:0000000022d5f3f2 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a07 [ 74.344630] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.345345] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.346013] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.346595] page dumped because: kasan: bad access detected [ 74.347075] [ 74.347275] Memory state around the buggy address: [ 74.347710] ffff0000c5a07d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.348330] ffff0000c5a07d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.349217] >ffff0000c5a07e00: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.349848] ^ [ 74.350223] ffff0000c5a07e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.350872] ffff0000c5a07f00: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.351458] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-krealloc_uaf
[ 74.282637] ================================================================== [ 74.283184] BUG: KASAN: use-after-free in krealloc_uaf+0xd0/0x21c [ 74.283865] Read of size 1 at addr ffff0000c4b2bc00 by task kunit_try_catch/133 [ 74.284517] [ 74.284723] CPU: 1 PID: 133 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.285450] Hardware name: linux,dummy-virt (DT) [ 74.286402] Call trace: [ 74.286688] dump_backtrace+0xf4/0x114 [ 74.287227] show_stack+0x18/0x24 [ 74.287655] __dump_stack+0x28/0x38 [ 74.288071] dump_stack_lvl+0x50/0x68 [ 74.288518] print_address_description+0x7c/0x1ec [ 74.289054] print_report+0x50/0x68 [ 74.289537] kasan_report+0xac/0xfc [ 74.289984] __asan_load1+0x6c/0x70 [ 74.290417] krealloc_uaf+0xd0/0x21c [ 74.290863] kunit_try_run_case+0x80/0x184 [ 74.291360] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.292483] kthread+0x16c/0x21c [ 74.292924] ret_from_fork+0x10/0x20 [ 74.293380] [ 74.293575] Allocated by task 133: [ 74.293953] kasan_set_track+0x4c/0x80 [ 74.294472] kasan_save_alloc_info+0x28/0x34 [ 74.294946] __kasan_kmalloc+0x88/0xa0 [ 74.295399] kmalloc_trace+0x54/0x68 [ 74.295851] krealloc_uaf+0x48/0x21c [ 74.296298] kunit_try_run_case+0x80/0x184 [ 74.296813] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.297393] kthread+0x16c/0x21c [ 74.297830] ret_from_fork+0x10/0x20 [ 74.298267] [ 74.298469] Freed by task 133: [ 74.298782] kasan_set_track+0x4c/0x80 [ 74.299273] kasan_save_free_info+0x3c/0x60 [ 74.300283] ____kasan_slab_free+0xe8/0x140 [ 74.300803] __kasan_slab_free+0x18/0x28 [ 74.301273] __kmem_cache_free+0xdc/0x27c [ 74.301725] kfree+0x60/0x74 [ 74.302129] krealloc_uaf+0x90/0x21c [ 74.302565] kunit_try_run_case+0x80/0x184 [ 74.303049] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.303603] kthread+0x16c/0x21c [ 74.304063] ret_from_fork+0x10/0x20 [ 74.304535] [ 74.304718] The buggy address belongs to the object at ffff0000c4b2bc00 [ 74.304718] which belongs to the cache kmalloc-256 of size 256 [ 74.305673] The buggy address is located 0 bytes inside of [ 74.305673] 256-byte region [ffff0000c4b2bc00, ffff0000c4b2bd00) [ 74.306566] [ 74.306783] The buggy address belongs to the physical page: [ 74.307230] page:00000000c9970dfc refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b2a [ 74.308564] head:00000000c9970dfc order:1 compound_mapcount:0 compound_pincount:0 [ 74.309223] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 74.309928] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480 [ 74.310585] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.311206] page dumped because: kasan: bad access detected [ 74.311673] [ 74.311908] Memory state around the buggy address: [ 74.312369] ffff0000c4b2bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.312998] ffff0000c4b2bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.313604] >ffff0000c4b2bc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.314186] ^ [ 74.314542] ffff0000c4b2bc80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.315150] ffff0000c4b2bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.316297] ================================================================== [ 74.247602] ================================================================== [ 74.248472] BUG: KASAN: use-after-free in krealloc_uaf+0xac/0x21c [ 74.249022] Read of size 1 at addr ffff0000c4b2bc00 by task kunit_try_catch/133 [ 74.249698] [ 74.250066] CPU: 1 PID: 133 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.250838] Hardware name: linux,dummy-virt (DT) [ 74.251295] Call trace: [ 74.251531] dump_backtrace+0xf4/0x114 [ 74.251986] show_stack+0x18/0x24 [ 74.252506] __dump_stack+0x28/0x38 [ 74.253003] dump_stack_lvl+0x50/0x68 [ 74.253556] print_address_description+0x7c/0x1ec [ 74.254122] print_report+0x50/0x68 [ 74.254586] kasan_report+0xac/0xfc [ 74.255146] __kasan_check_byte+0x3c/0x54 [ 74.255635] krealloc+0x54/0x26c [ 74.256146] krealloc_uaf+0xac/0x21c [ 74.256630] kunit_try_run_case+0x80/0x184 [ 74.257123] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.257704] kthread+0x16c/0x21c [ 74.258240] ret_from_fork+0x10/0x20 [ 74.258682] [ 74.258918] Allocated by task 133: [ 74.259302] kasan_set_track+0x4c/0x80 [ 74.260103] kasan_save_alloc_info+0x28/0x34 [ 74.260553] __kasan_kmalloc+0x88/0xa0 [ 74.261014] kmalloc_trace+0x54/0x68 [ 74.261460] krealloc_uaf+0x48/0x21c [ 74.261886] kunit_try_run_case+0x80/0x184 [ 74.262341] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.262942] kthread+0x16c/0x21c [ 74.263377] ret_from_fork+0x10/0x20 [ 74.263965] [ 74.264168] Freed by task 133: [ 74.264508] kasan_set_track+0x4c/0x80 [ 74.264963] kasan_save_free_info+0x3c/0x60 [ 74.265443] ____kasan_slab_free+0xe8/0x140 [ 74.265952] __kasan_slab_free+0x18/0x28 [ 74.266420] __kmem_cache_free+0xdc/0x27c [ 74.266889] kfree+0x60/0x74 [ 74.267252] krealloc_uaf+0x90/0x21c [ 74.268327] kunit_try_run_case+0x80/0x184 [ 74.268826] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.269395] kthread+0x16c/0x21c [ 74.269809] ret_from_fork+0x10/0x20 [ 74.270245] [ 74.270449] The buggy address belongs to the object at ffff0000c4b2bc00 [ 74.270449] which belongs to the cache kmalloc-256 of size 256 [ 74.271373] The buggy address is located 0 bytes inside of [ 74.271373] 256-byte region [ffff0000c4b2bc00, ffff0000c4b2bd00) [ 74.272294] [ 74.272508] The buggy address belongs to the physical page: [ 74.272972] page:00000000c9970dfc refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b2a [ 74.273778] head:00000000c9970dfc order:1 compound_mapcount:0 compound_pincount:0 [ 74.274400] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 74.275138] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480 [ 74.276407] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.277034] page dumped because: kasan: bad access detected [ 74.277504] [ 74.277697] Memory state around the buggy address: [ 74.278152] ffff0000c4b2bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.278803] ffff0000c4b2bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.279419] >ffff0000c4b2bc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.280023] ^ [ 74.280375] ffff0000c4b2bc80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.281013] ffff0000c4b2bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.281628] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 73.915408] ================================================================== [ 73.916609] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x104/0x4b8 [ 73.917359] Write of size 1 at addr ffff0000c4b2bac9 by task kunit_try_catch/130 [ 73.918007] [ 73.918268] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 73.919023] Hardware name: linux,dummy-virt (DT) [ 73.919501] Call trace: [ 73.919950] dump_backtrace+0xf4/0x114 [ 73.920428] show_stack+0x18/0x24 [ 73.921078] __dump_stack+0x28/0x38 [ 73.921525] dump_stack_lvl+0x50/0x68 [ 73.921982] print_address_description+0x7c/0x1ec [ 73.922549] print_report+0x50/0x68 [ 73.923015] kasan_report+0xac/0xfc [ 73.923480] __asan_store1+0x6c/0x70 [ 73.924225] krealloc_less_oob_helper+0x104/0x4b8 [ 73.924770] krealloc_less_oob+0x18/0x24 [ 73.925227] kunit_try_run_case+0x80/0x184 [ 73.925722] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 73.926315] kthread+0x16c/0x21c [ 73.926756] ret_from_fork+0x10/0x20 [ 73.927182] [ 73.927386] Allocated by task 130: [ 73.927912] kasan_set_track+0x4c/0x80 [ 73.928376] kasan_save_alloc_info+0x28/0x34 [ 73.929044] __kasan_krealloc+0xcc/0xf8 [ 73.929533] krealloc+0x14c/0x26c [ 73.930015] krealloc_less_oob_helper+0x9c/0x4b8 [ 73.930526] krealloc_less_oob+0x18/0x24 [ 73.930990] kunit_try_run_case+0x80/0x184 [ 73.931474] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 73.932331] kthread+0x16c/0x21c [ 73.932786] ret_from_fork+0x10/0x20 [ 73.933211] [ 73.933423] The buggy address belongs to the object at ffff0000c4b2ba00 [ 73.933423] which belongs to the cache kmalloc-256 of size 256 [ 73.934422] The buggy address is located 201 bytes inside of [ 73.934422] 256-byte region [ffff0000c4b2ba00, ffff0000c4b2bb00) [ 73.935395] [ 73.935643] The buggy address belongs to the physical page: [ 73.936383] page:00000000c9970dfc refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b2a [ 73.937175] head:00000000c9970dfc order:1 compound_mapcount:0 compound_pincount:0 [ 73.937824] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 73.938663] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480 [ 73.939334] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 73.939978] page dumped because: kasan: bad access detected [ 73.940515] [ 73.940989] Memory state around the buggy address: [ 73.941428] ffff0000c4b2b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.942064] ffff0000c4b2ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 73.942725] >ffff0000c4b2ba80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 73.943300] ^ [ 73.943841] ffff0000c4b2bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.944690] ffff0000c4b2bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.945304] ================================================================== [ 74.222734] ================================================================== [ 74.223267] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x260/0x4b8 [ 74.224053] Write of size 1 at addr ffff0000c58ca0eb by task kunit_try_catch/132 [ 74.224702] [ 74.224919] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.225643] Hardware name: linux,dummy-virt (DT) [ 74.226581] Call trace: [ 74.226883] dump_backtrace+0xf4/0x114 [ 74.227356] show_stack+0x18/0x24 [ 74.227784] __dump_stack+0x28/0x38 [ 74.228194] dump_stack_lvl+0x50/0x68 [ 74.228607] print_address_description+0x7c/0x1ec [ 74.229165] print_report+0x50/0x68 [ 74.229605] kasan_report+0xac/0xfc [ 74.230067] __asan_store1+0x6c/0x70 [ 74.230519] krealloc_less_oob_helper+0x260/0x4b8 [ 74.231025] krealloc_pagealloc_less_oob+0x18/0x24 [ 74.231571] kunit_try_run_case+0x80/0x184 [ 74.232620] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.233216] kthread+0x16c/0x21c [ 74.233655] ret_from_fork+0x10/0x20 [ 74.234114] [ 74.234300] The buggy address belongs to the physical page: [ 74.234799] page:000000000dfb6053 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c8 [ 74.235622] head:000000000dfb6053 order:2 compound_mapcount:0 compound_pincount:0 [ 74.236253] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff) [ 74.236942] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000 [ 74.237607] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 74.238249] page dumped because: kasan: bad access detected [ 74.238746] [ 74.238936] Memory state around the buggy address: [ 74.239401] ffff0000c58c9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.240312] ffff0000c58ca000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.240927] >ffff0000c58ca080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 74.241527] ^ [ 74.242099] ffff0000c58ca100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 74.242718] ffff0000c58ca180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 74.243761] ================================================================== [ 74.052025] ================================================================== [ 74.052611] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x260/0x4b8 [ 74.053416] Write of size 1 at addr ffff0000c4b2baeb by task kunit_try_catch/130 [ 74.054032] [ 74.054249] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.055017] Hardware name: linux,dummy-virt (DT) [ 74.055427] Call trace: [ 74.055709] dump_backtrace+0xf4/0x114 [ 74.056735] show_stack+0x18/0x24 [ 74.057182] __dump_stack+0x28/0x38 [ 74.057596] dump_stack_lvl+0x50/0x68 [ 74.058039] print_address_description+0x7c/0x1ec [ 74.058579] print_report+0x50/0x68 [ 74.059065] kasan_report+0xac/0xfc [ 74.059512] __asan_store1+0x6c/0x70 [ 74.060358] krealloc_less_oob_helper+0x260/0x4b8 [ 74.060903] krealloc_less_oob+0x18/0x24 [ 74.061337] kunit_try_run_case+0x80/0x184 [ 74.061818] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.062397] kthread+0x16c/0x21c [ 74.062851] ret_from_fork+0x10/0x20 [ 74.063287] [ 74.063473] Allocated by task 130: [ 74.064349] kasan_set_track+0x4c/0x80 [ 74.064843] kasan_save_alloc_info+0x28/0x34 [ 74.065312] __kasan_krealloc+0xcc/0xf8 [ 74.065841] krealloc+0x14c/0x26c [ 74.066246] krealloc_less_oob_helper+0x9c/0x4b8 [ 74.066752] krealloc_less_oob+0x18/0x24 [ 74.067228] kunit_try_run_case+0x80/0x184 [ 74.067954] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.068551] kthread+0x16c/0x21c [ 74.068974] ret_from_fork+0x10/0x20 [ 74.069420] [ 74.069617] The buggy address belongs to the object at ffff0000c4b2ba00 [ 74.069617] which belongs to the cache kmalloc-256 of size 256 [ 74.070577] The buggy address is located 235 bytes inside of [ 74.070577] 256-byte region [ffff0000c4b2ba00, ffff0000c4b2bb00) [ 74.071473] [ 74.072178] The buggy address belongs to the physical page: [ 74.072634] page:00000000c9970dfc refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b2a [ 74.073403] head:00000000c9970dfc order:1 compound_mapcount:0 compound_pincount:0 [ 74.074085] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 74.074812] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480 [ 74.075478] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.076396] page dumped because: kasan: bad access detected [ 74.076916] [ 74.077111] Memory state around the buggy address: [ 74.077604] ffff0000c4b2b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.078246] ffff0000c4b2ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.078890] >ffff0000c4b2ba80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 74.079479] ^ [ 74.080604] ffff0000c4b2bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.081233] ffff0000c4b2bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.081883] ================================================================== [ 73.984169] ================================================================== [ 73.985072] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1c4/0x4b8 [ 73.986090] Write of size 1 at addr ffff0000c4b2bada by task kunit_try_catch/130 [ 73.987014] [ 73.987304] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 73.988444] Hardware name: linux,dummy-virt (DT) [ 73.989006] Call trace: [ 73.989254] dump_backtrace+0xf4/0x114 [ 73.989695] show_stack+0x18/0x24 [ 73.990151] __dump_stack+0x28/0x38 [ 73.990626] dump_stack_lvl+0x50/0x68 [ 73.991115] print_address_description+0x7c/0x1ec [ 73.991661] print_report+0x50/0x68 [ 73.992138] kasan_report+0xac/0xfc [ 73.992562] __asan_store1+0x6c/0x70 [ 73.993104] krealloc_less_oob_helper+0x1c4/0x4b8 [ 73.993703] krealloc_less_oob+0x18/0x24 [ 73.994195] kunit_try_run_case+0x80/0x184 [ 73.994754] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 73.995560] kthread+0x16c/0x21c [ 73.996368] ret_from_fork+0x10/0x20 [ 73.996774] [ 73.996958] Allocated by task 130: [ 73.997250] kasan_set_track+0x4c/0x80 [ 73.997671] kasan_save_alloc_info+0x28/0x34 [ 73.998336] __kasan_krealloc+0xcc/0xf8 [ 73.998987] krealloc+0x14c/0x26c [ 73.999544] krealloc_less_oob_helper+0x9c/0x4b8 [ 74.000763] krealloc_less_oob+0x18/0x24 [ 74.001400] kunit_try_run_case+0x80/0x184 [ 74.002062] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.002870] kthread+0x16c/0x21c [ 74.003437] ret_from_fork+0x10/0x20 [ 74.004322] [ 74.004605] The buggy address belongs to the object at ffff0000c4b2ba00 [ 74.004605] which belongs to the cache kmalloc-256 of size 256 [ 74.006015] The buggy address is located 218 bytes inside of [ 74.006015] 256-byte region [ffff0000c4b2ba00, ffff0000c4b2bb00) [ 74.007371] [ 74.007647] The buggy address belongs to the physical page: [ 74.008864] page:00000000c9970dfc refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b2a [ 74.009691] head:00000000c9970dfc order:1 compound_mapcount:0 compound_pincount:0 [ 74.010198] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 74.010792] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480 [ 74.011479] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.012138] page dumped because: kasan: bad access detected [ 74.013478] [ 74.013725] Memory state around the buggy address: [ 74.014213] ffff0000c4b2b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.014836] ffff0000c4b2ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.015474] >ffff0000c4b2ba80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 74.016613] ^ [ 74.017211] ffff0000c4b2bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.017840] ffff0000c4b2bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.018449] ================================================================== [ 74.201152] ================================================================== [ 74.202125] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x214/0x4b8 [ 74.202933] Write of size 1 at addr ffff0000c58ca0ea by task kunit_try_catch/132 [ 74.203497] [ 74.203719] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.204489] Hardware name: linux,dummy-virt (DT) [ 74.204897] Call trace: [ 74.205184] dump_backtrace+0xf4/0x114 [ 74.205708] show_stack+0x18/0x24 [ 74.206152] __dump_stack+0x28/0x38 [ 74.206594] dump_stack_lvl+0x50/0x68 [ 74.207026] print_address_description+0x7c/0x1ec [ 74.207594] print_report+0x50/0x68 [ 74.208037] kasan_report+0xac/0xfc [ 74.208470] __asan_store1+0x6c/0x70 [ 74.208918] krealloc_less_oob_helper+0x214/0x4b8 [ 74.209421] krealloc_pagealloc_less_oob+0x18/0x24 [ 74.210540] kunit_try_run_case+0x80/0x184 [ 74.211031] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.211607] kthread+0x16c/0x21c [ 74.212055] ret_from_fork+0x10/0x20 [ 74.212475] [ 74.212664] The buggy address belongs to the physical page: [ 74.213155] page:000000000dfb6053 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c8 [ 74.213913] head:000000000dfb6053 order:2 compound_mapcount:0 compound_pincount:0 [ 74.214530] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff) [ 74.215224] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000 [ 74.216479] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 74.217126] page dumped because: kasan: bad access detected [ 74.217605] [ 74.217827] Memory state around the buggy address: [ 74.218266] ffff0000c58c9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.218889] ffff0000c58ca000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.219515] >ffff0000c58ca080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 74.220119] ^ [ 74.220688] ffff0000c58ca100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 74.221331] ffff0000c58ca180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 74.221926] ================================================================== [ 74.179197] ================================================================== [ 74.179769] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1c4/0x4b8 [ 74.180489] Write of size 1 at addr ffff0000c58ca0da by task kunit_try_catch/132 [ 74.181157] [ 74.181425] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.182218] Hardware name: linux,dummy-virt (DT) [ 74.182656] Call trace: [ 74.182968] dump_backtrace+0xf4/0x114 [ 74.183444] show_stack+0x18/0x24 [ 74.184506] __dump_stack+0x28/0x38 [ 74.184971] dump_stack_lvl+0x50/0x68 [ 74.185444] print_address_description+0x7c/0x1ec [ 74.185987] print_report+0x50/0x68 [ 74.186417] kasan_report+0xac/0xfc [ 74.186854] __asan_store1+0x6c/0x70 [ 74.187293] krealloc_less_oob_helper+0x1c4/0x4b8 [ 74.187817] krealloc_pagealloc_less_oob+0x18/0x24 [ 74.188301] kunit_try_run_case+0x80/0x184 [ 74.188771] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.189360] kthread+0x16c/0x21c [ 74.189771] ret_from_fork+0x10/0x20 [ 74.190224] [ 74.190408] The buggy address belongs to the physical page: [ 74.190867] page:000000000dfb6053 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c8 [ 74.191640] head:000000000dfb6053 order:2 compound_mapcount:0 compound_pincount:0 [ 74.192300] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff) [ 74.193540] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000 [ 74.194222] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 74.194847] page dumped because: kasan: bad access detected [ 74.195351] [ 74.195544] Memory state around the buggy address: [ 74.196010] ffff0000c58c9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.196623] ffff0000c58ca000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.197238] >ffff0000c58ca080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 74.197855] ^ [ 74.198385] ffff0000c58ca100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 74.199021] ffff0000c58ca180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 74.199593] ================================================================== [ 73.946940] ================================================================== [ 73.947440] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x158/0x4b8 [ 73.948713] Write of size 1 at addr ffff0000c4b2bad0 by task kunit_try_catch/130 [ 73.949658] [ 73.949992] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 73.951036] Hardware name: linux,dummy-virt (DT) [ 73.951389] Call trace: [ 73.951630] dump_backtrace+0xf4/0x114 [ 73.952457] show_stack+0x18/0x24 [ 73.953137] __dump_stack+0x28/0x38 [ 73.953767] dump_stack_lvl+0x50/0x68 [ 73.954406] print_address_description+0x7c/0x1ec [ 73.955172] print_report+0x50/0x68 [ 73.955869] kasan_report+0xac/0xfc [ 73.956580] __asan_store1+0x6c/0x70 [ 73.957236] krealloc_less_oob_helper+0x158/0x4b8 [ 73.957991] krealloc_less_oob+0x18/0x24 [ 73.958640] kunit_try_run_case+0x80/0x184 [ 73.959236] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 73.959950] kthread+0x16c/0x21c [ 73.960566] ret_from_fork+0x10/0x20 [ 73.961222] [ 73.961522] Allocated by task 130: [ 73.962032] kasan_set_track+0x4c/0x80 [ 73.962693] kasan_save_alloc_info+0x28/0x34 [ 73.963376] __kasan_krealloc+0xcc/0xf8 [ 73.964172] krealloc+0x14c/0x26c [ 73.964808] krealloc_less_oob_helper+0x9c/0x4b8 [ 73.965336] krealloc_less_oob+0x18/0x24 [ 73.965748] kunit_try_run_case+0x80/0x184 [ 73.966340] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 73.966987] kthread+0x16c/0x21c [ 73.967587] ret_from_fork+0x10/0x20 [ 73.968289] [ 73.968568] The buggy address belongs to the object at ffff0000c4b2ba00 [ 73.968568] which belongs to the cache kmalloc-256 of size 256 [ 73.970070] The buggy address is located 208 bytes inside of [ 73.970070] 256-byte region [ffff0000c4b2ba00, ffff0000c4b2bb00) [ 73.970994] [ 73.971180] The buggy address belongs to the physical page: [ 73.971546] page:00000000c9970dfc refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b2a [ 73.972183] head:00000000c9970dfc order:1 compound_mapcount:0 compound_pincount:0 [ 73.972678] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 73.973769] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480 [ 73.974796] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 73.975753] page dumped because: kasan: bad access detected [ 73.976529] [ 73.976829] Memory state around the buggy address: [ 73.977485] ffff0000c4b2b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.978390] ffff0000c4b2ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 73.979298] >ffff0000c4b2ba80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 73.980308] ^ [ 73.981153] ffff0000c4b2bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.982088] ffff0000c4b2bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.982973] ================================================================== [ 74.154369] ================================================================== [ 74.154889] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x158/0x4b8 [ 74.156821] Write of size 1 at addr ffff0000c58ca0d0 by task kunit_try_catch/132 [ 74.157375] [ 74.157575] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.158179] Hardware name: linux,dummy-virt (DT) [ 74.158522] Call trace: [ 74.159915] dump_backtrace+0xf4/0x114 [ 74.161076] show_stack+0x18/0x24 [ 74.162501] __dump_stack+0x28/0x38 [ 74.163247] dump_stack_lvl+0x50/0x68 [ 74.163712] print_address_description+0x7c/0x1ec [ 74.164283] print_report+0x50/0x68 [ 74.164751] kasan_report+0xac/0xfc [ 74.165214] __asan_store1+0x6c/0x70 [ 74.165684] krealloc_less_oob_helper+0x158/0x4b8 [ 74.166217] krealloc_pagealloc_less_oob+0x18/0x24 [ 74.166728] kunit_try_run_case+0x80/0x184 [ 74.167220] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.167817] kthread+0x16c/0x21c [ 74.168284] ret_from_fork+0x10/0x20 [ 74.168780] [ 74.168997] The buggy address belongs to the physical page: [ 74.169526] page:000000000dfb6053 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c8 [ 74.170301] head:000000000dfb6053 order:2 compound_mapcount:0 compound_pincount:0 [ 74.170969] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff) [ 74.171678] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000 [ 74.172342] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 74.172974] page dumped because: kasan: bad access detected [ 74.173466] [ 74.173673] Memory state around the buggy address: [ 74.174147] ffff0000c58c9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.174797] ffff0000c58ca000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.175446] >ffff0000c58ca080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 74.176054] ^ [ 74.176617] ffff0000c58ca100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 74.177269] ffff0000c58ca180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 74.177879] ================================================================== [ 74.019627] ================================================================== [ 74.020472] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x214/0x4b8 [ 74.021220] Write of size 1 at addr ffff0000c4b2baea by task kunit_try_catch/130 [ 74.021984] [ 74.022226] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.023138] Hardware name: linux,dummy-virt (DT) [ 74.023648] Call trace: [ 74.023998] dump_backtrace+0xf4/0x114 [ 74.025002] show_stack+0x18/0x24 [ 74.025507] __dump_stack+0x28/0x38 [ 74.026061] dump_stack_lvl+0x50/0x68 [ 74.026604] print_address_description+0x7c/0x1ec [ 74.027258] print_report+0x50/0x68 [ 74.028124] kasan_report+0xac/0xfc [ 74.028706] __asan_store1+0x6c/0x70 [ 74.029282] krealloc_less_oob_helper+0x214/0x4b8 [ 74.029921] krealloc_less_oob+0x18/0x24 [ 74.030396] kunit_try_run_case+0x80/0x184 [ 74.030896] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.031452] kthread+0x16c/0x21c [ 74.031995] ret_from_fork+0x10/0x20 [ 74.032471] [ 74.032664] Allocated by task 130: [ 74.033024] kasan_set_track+0x4c/0x80 [ 74.033540] kasan_save_alloc_info+0x28/0x34 [ 74.034441] __kasan_krealloc+0xcc/0xf8 [ 74.034964] krealloc+0x14c/0x26c [ 74.035406] krealloc_less_oob_helper+0x9c/0x4b8 [ 74.036209] krealloc_less_oob+0x18/0x24 [ 74.036695] kunit_try_run_case+0x80/0x184 [ 74.037174] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.037752] kthread+0x16c/0x21c [ 74.038162] ret_from_fork+0x10/0x20 [ 74.038576] [ 74.038798] The buggy address belongs to the object at ffff0000c4b2ba00 [ 74.038798] which belongs to the cache kmalloc-256 of size 256 [ 74.039702] The buggy address is located 234 bytes inside of [ 74.039702] 256-byte region [ffff0000c4b2ba00, ffff0000c4b2bb00) [ 74.040622] [ 74.040857] The buggy address belongs to the physical page: [ 74.041331] page:00000000c9970dfc refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b2a [ 74.042569] head:00000000c9970dfc order:1 compound_mapcount:0 compound_pincount:0 [ 74.043255] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 74.044273] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480 [ 74.044978] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.045576] page dumped because: kasan: bad access detected [ 74.046108] [ 74.046311] Memory state around the buggy address: [ 74.046756] ffff0000c4b2b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.047403] ffff0000c4b2ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.048599] >ffff0000c4b2ba80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 74.049216] ^ [ 74.049805] ffff0000c4b2bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.050440] ffff0000c4b2bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.051060] ================================================================== [ 74.133654] ================================================================== [ 74.134527] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x104/0x4b8 [ 74.135243] Write of size 1 at addr ffff0000c58ca0c9 by task kunit_try_catch/132 [ 74.135819] [ 74.136060] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.136816] Hardware name: linux,dummy-virt (DT) [ 74.137237] Call trace: [ 74.137539] dump_backtrace+0xf4/0x114 [ 74.138033] show_stack+0x18/0x24 [ 74.138460] __dump_stack+0x28/0x38 [ 74.138897] dump_stack_lvl+0x50/0x68 [ 74.139345] print_address_description+0x7c/0x1ec [ 74.139901] print_report+0x50/0x68 [ 74.140402] kasan_report+0xac/0xfc [ 74.140861] __asan_store1+0x6c/0x70 [ 74.141303] krealloc_less_oob_helper+0x104/0x4b8 [ 74.141820] krealloc_pagealloc_less_oob+0x18/0x24 [ 74.142346] kunit_try_run_case+0x80/0x184 [ 74.142831] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.143394] kthread+0x16c/0x21c [ 74.143820] ret_from_fork+0x10/0x20 [ 74.144255] [ 74.144444] The buggy address belongs to the physical page: [ 74.144926] page:000000000dfb6053 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c8 [ 74.145712] head:000000000dfb6053 order:2 compound_mapcount:0 compound_pincount:0 [ 74.146352] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff) [ 74.147050] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000 [ 74.147701] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 74.148343] page dumped because: kasan: bad access detected [ 74.148816] [ 74.149002] Memory state around the buggy address: [ 74.149462] ffff0000c58c9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.150079] ffff0000c58ca000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.150686] >ffff0000c58ca080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 74.151316] ^ [ 74.151834] ffff0000c58ca100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 74.152439] ffff0000c58ca180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 74.153031] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 73.879183] ================================================================== [ 73.880287] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x17c/0x2a4 [ 73.881008] Write of size 1 at addr ffff0000c4b2b8f0 by task kunit_try_catch/129 [ 73.881599] [ 73.881834] CPU: 1 PID: 129 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 73.882613] Hardware name: linux,dummy-virt (DT) [ 73.883032] Call trace: [ 73.883329] dump_backtrace+0xf4/0x114 [ 73.884160] show_stack+0x18/0x24 [ 73.884601] __dump_stack+0x28/0x38 [ 73.885021] dump_stack_lvl+0x50/0x68 [ 73.885451] print_address_description+0x7c/0x1ec [ 73.886006] print_report+0x50/0x68 [ 73.886446] kasan_report+0xac/0xfc [ 73.886890] __asan_store1+0x6c/0x70 [ 73.887332] krealloc_more_oob_helper+0x17c/0x2a4 [ 73.888336] krealloc_more_oob+0x18/0x24 [ 73.888841] kunit_try_run_case+0x80/0x184 [ 73.889376] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 73.889966] kthread+0x16c/0x21c [ 73.890383] ret_from_fork+0x10/0x20 [ 73.890835] [ 73.891068] Allocated by task 129: [ 73.891432] kasan_set_track+0x4c/0x80 [ 73.891863] kasan_save_alloc_info+0x28/0x34 [ 73.892420] __kasan_krealloc+0xcc/0xf8 [ 73.892906] krealloc+0x14c/0x26c [ 73.893328] krealloc_more_oob_helper+0x9c/0x2a4 [ 73.894065] krealloc_more_oob+0x18/0x24 [ 73.894475] kunit_try_run_case+0x80/0x184 [ 73.894990] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 73.895613] kthread+0x16c/0x21c [ 73.897729] ret_from_fork+0x10/0x20 [ 73.898313] [ 73.898501] The buggy address belongs to the object at ffff0000c4b2b800 [ 73.898501] which belongs to the cache kmalloc-256 of size 256 [ 73.899713] The buggy address is located 240 bytes inside of [ 73.899713] 256-byte region [ffff0000c4b2b800, ffff0000c4b2b900) [ 73.901310] [ 73.901558] The buggy address belongs to the physical page: [ 73.902041] page:00000000c9970dfc refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b2a [ 73.903198] head:00000000c9970dfc order:1 compound_mapcount:0 compound_pincount:0 [ 73.904089] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 73.905290] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480 [ 73.905969] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 73.906533] page dumped because: kasan: bad access detected [ 73.907035] [ 73.907238] Memory state around the buggy address: [ 73.907655] ffff0000c4b2b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.908306] ffff0000c4b2b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 73.909224] >ffff0000c4b2b880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 73.909865] ^ [ 73.910450] ffff0000c4b2b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.911059] ffff0000c4b2b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.911664] ================================================================== [ 73.849006] ================================================================== [ 73.849892] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x12c/0x2a4 [ 73.850594] Write of size 1 at addr ffff0000c4b2b8eb by task kunit_try_catch/129 [ 73.851194] [ 73.851419] CPU: 1 PID: 129 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 73.852321] Hardware name: linux,dummy-virt (DT) [ 73.852843] Call trace: [ 73.853089] dump_backtrace+0xf4/0x114 [ 73.853653] show_stack+0x18/0x24 [ 73.854155] __dump_stack+0x28/0x38 [ 73.854607] dump_stack_lvl+0x50/0x68 [ 73.855057] print_address_description+0x7c/0x1ec [ 73.855636] print_report+0x50/0x68 [ 73.856196] kasan_report+0xac/0xfc [ 73.856665] __asan_store1+0x6c/0x70 [ 73.857142] krealloc_more_oob_helper+0x12c/0x2a4 [ 73.857664] krealloc_more_oob+0x18/0x24 [ 73.858153] kunit_try_run_case+0x80/0x184 [ 73.858627] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 73.859226] kthread+0x16c/0x21c [ 73.859659] ret_from_fork+0x10/0x20 [ 73.860329] [ 73.860530] Allocated by task 129: [ 73.860884] kasan_set_track+0x4c/0x80 [ 73.861352] kasan_save_alloc_info+0x28/0x34 [ 73.861809] __kasan_krealloc+0xcc/0xf8 [ 73.862300] krealloc+0x14c/0x26c [ 73.862691] krealloc_more_oob_helper+0x9c/0x2a4 [ 73.863233] krealloc_more_oob+0x18/0x24 [ 73.863846] kunit_try_run_case+0x80/0x184 [ 73.864319] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 73.864890] kthread+0x16c/0x21c [ 73.865301] ret_from_fork+0x10/0x20 [ 73.866100] [ 73.866320] The buggy address belongs to the object at ffff0000c4b2b800 [ 73.866320] which belongs to the cache kmalloc-256 of size 256 [ 73.867278] The buggy address is located 235 bytes inside of [ 73.867278] 256-byte region [ffff0000c4b2b800, ffff0000c4b2b900) [ 73.868438] [ 73.868675] The buggy address belongs to the physical page: [ 73.869147] page:00000000c9970dfc refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b2a [ 73.869966] head:00000000c9970dfc order:1 compound_mapcount:0 compound_pincount:0 [ 73.870590] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 73.871315] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480 [ 73.872550] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 73.873182] page dumped because: kasan: bad access detected [ 73.873669] [ 73.873870] Memory state around the buggy address: [ 73.874331] ffff0000c4b2b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.874996] ffff0000c4b2b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 73.875608] >ffff0000c4b2b880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 73.876203] ^ [ 73.877051] ffff0000c4b2b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.877653] ffff0000c4b2b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.878249] ================================================================== [ 74.109619] ================================================================== [ 74.110188] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x17c/0x2a4 [ 74.110899] Write of size 1 at addr ffff0000c58ca0f0 by task kunit_try_catch/131 [ 74.111506] [ 74.111765] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.112502] Hardware name: linux,dummy-virt (DT) [ 74.112965] Call trace: [ 74.113244] dump_backtrace+0xf4/0x114 [ 74.113746] show_stack+0x18/0x24 [ 74.114175] __dump_stack+0x28/0x38 [ 74.114595] dump_stack_lvl+0x50/0x68 [ 74.115058] print_address_description+0x7c/0x1ec [ 74.115578] print_report+0x50/0x68 [ 74.116188] kasan_report+0xac/0xfc [ 74.116630] __asan_store1+0x6c/0x70 [ 74.117081] krealloc_more_oob_helper+0x17c/0x2a4 [ 74.117588] krealloc_pagealloc_more_oob+0x18/0x24 [ 74.118456] kunit_try_run_case+0x80/0x184 [ 74.118984] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.119553] kthread+0x16c/0x21c [ 74.119984] ret_from_fork+0x10/0x20 [ 74.120405] [ 74.120592] The buggy address belongs to the physical page: [ 74.121096] page:000000000dfb6053 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c8 [ 74.121888] head:000000000dfb6053 order:2 compound_mapcount:0 compound_pincount:0 [ 74.122514] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff) [ 74.123227] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000 [ 74.124442] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 74.125096] page dumped because: kasan: bad access detected [ 74.125609] [ 74.125833] Memory state around the buggy address: [ 74.126312] ffff0000c58c9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.126942] ffff0000c58ca000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.127580] >ffff0000c58ca080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 74.128173] ^ [ 74.128770] ffff0000c58ca100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 74.129452] ffff0000c58ca180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 74.130070] ================================================================== [ 74.086636] ================================================================== [ 74.087508] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x12c/0x2a4 [ 74.088638] Write of size 1 at addr ffff0000c58ca0eb by task kunit_try_catch/131 [ 74.089260] [ 74.089517] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.090278] Hardware name: linux,dummy-virt (DT) [ 74.090680] Call trace: [ 74.090973] dump_backtrace+0xf4/0x114 [ 74.091437] show_stack+0x18/0x24 [ 74.092425] __dump_stack+0x28/0x38 [ 74.093007] dump_stack_lvl+0x50/0x68 [ 74.093448] print_address_description+0x7c/0x1ec [ 74.093948] print_report+0x50/0x68 [ 74.094445] kasan_report+0xac/0xfc [ 74.094974] __asan_store1+0x6c/0x70 [ 74.095443] krealloc_more_oob_helper+0x12c/0x2a4 [ 74.095959] krealloc_pagealloc_more_oob+0x18/0x24 [ 74.096498] kunit_try_run_case+0x80/0x184 [ 74.096965] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.097527] kthread+0x16c/0x21c [ 74.097959] ret_from_fork+0x10/0x20 [ 74.098368] [ 74.098556] The buggy address belongs to the physical page: [ 74.099032] page:000000000dfb6053 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c8 [ 74.099794] head:000000000dfb6053 order:2 compound_mapcount:0 compound_pincount:0 [ 74.100414] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff) [ 74.101155] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000 [ 74.101848] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 74.102464] page dumped because: kasan: bad access detected [ 74.103489] [ 74.103713] Memory state around the buggy address: [ 74.104159] ffff0000c58c9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.104819] ffff0000c58ca000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.105460] >ffff0000c58ca080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 74.106065] ^ [ 74.106624] ffff0000c58ca100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 74.107248] ffff0000c58ca180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 74.108370] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 73.806788] ================================================================== [ 73.808479] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0xa0/0x14c [ 73.809964] Write of size 1 at addr ffff0000c59f1f00 by task kunit_try_catch/128 [ 73.811476] [ 73.811875] CPU: 0 PID: 128 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 73.813204] Hardware name: linux,dummy-virt (DT) [ 73.813992] Call trace: [ 73.814508] dump_backtrace+0xf4/0x114 [ 73.815321] show_stack+0x18/0x24 [ 73.816043] __dump_stack+0x28/0x38 [ 73.816902] dump_stack_lvl+0x50/0x68 [ 73.817795] print_address_description+0x7c/0x1ec [ 73.818843] print_report+0x50/0x68 [ 73.819611] kasan_report+0xac/0xfc [ 73.820051] __asan_store1+0x6c/0x70 [ 73.820473] kmalloc_large_oob_right+0xa0/0x14c [ 73.821147] kunit_try_run_case+0x80/0x184 [ 73.821848] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 73.822672] kthread+0x16c/0x21c [ 73.823278] ret_from_fork+0x10/0x20 [ 73.823935] [ 73.824252] Allocated by task 128: [ 73.824776] kasan_set_track+0x4c/0x80 [ 73.825442] kasan_save_alloc_info+0x28/0x34 [ 73.826119] __kasan_kmalloc+0x88/0xa0 [ 73.826778] kmalloc_trace+0x54/0x68 [ 73.827389] kmalloc_large_oob_right+0x48/0x14c [ 73.828197] kunit_try_run_case+0x80/0x184 [ 73.828934] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 73.829791] kthread+0x16c/0x21c [ 73.830379] ret_from_fork+0x10/0x20 [ 73.830770] [ 73.831121] The buggy address belongs to the object at ffff0000c59f0000 [ 73.831121] which belongs to the cache kmalloc-8k of size 8192 [ 73.832780] The buggy address is located 7936 bytes inside of [ 73.832780] 8192-byte region [ffff0000c59f0000, ffff0000c59f2000) [ 73.834073] [ 73.834259] The buggy address belongs to the physical page: [ 73.834620] page:000000007696d2f2 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f0 [ 73.835900] head:000000007696d2f2 order:3 compound_mapcount:0 compound_pincount:0 [ 73.837070] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 73.838099] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002c00 [ 73.839097] raw: 0000000000000000 0000000080020002 00000001ffffffff 0000000000000000 [ 73.840124] page dumped because: kasan: bad access detected [ 73.840829] [ 73.841014] Memory state around the buggy address: [ 73.841380] ffff0000c59f1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 73.841878] ffff0000c59f1e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 73.842367] >ffff0000c59f1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.842911] ^ [ 73.843422] ffff0000c59f1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.844458] ffff0000c59f2000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.845351] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-pagealloc_uaf
[ 73.770390] ================================================================== [ 73.771629] BUG: KASAN: use-after-free in pagealloc_uaf+0x90/0x134 [ 73.773529] Read of size 1 at addr ffff0000c5a20000 by task kunit_try_catch/127 [ 73.774954] [ 73.775471] CPU: 0 PID: 127 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 73.776891] Hardware name: linux,dummy-virt (DT) [ 73.777253] Call trace: [ 73.777493] dump_backtrace+0xf4/0x114 [ 73.778422] show_stack+0x18/0x24 [ 73.779255] __dump_stack+0x28/0x38 [ 73.780317] dump_stack_lvl+0x50/0x68 [ 73.781056] print_address_description+0x7c/0x1ec [ 73.782038] print_report+0x50/0x68 [ 73.782878] kasan_report+0xac/0xfc [ 73.783717] __asan_load1+0x6c/0x70 [ 73.784584] pagealloc_uaf+0x90/0x134 [ 73.785433] kunit_try_run_case+0x80/0x184 [ 73.786348] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 73.787384] kthread+0x16c/0x21c [ 73.788254] ret_from_fork+0x10/0x20 [ 73.788937] [ 73.789132] The buggy address belongs to the physical page: [ 73.789515] page:00000000ef861166 refcount:0 mapcount:-128 mapping:0000000000000000 index:0x0 pfn:0x105a20 [ 73.791106] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 73.792559] raw: 0bfffc0000000000 ffff0000ff7f4a08 ffff0000ff7f4a08 0000000000000000 [ 73.793706] raw: 0000000000000000 0000000000000005 00000000ffffff7f 0000000000000000 [ 73.794921] page dumped because: kasan: bad access detected [ 73.795885] [ 73.796445] Memory state around the buggy address: [ 73.797163] ffff0000c5a1ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.797671] ffff0000c5a1ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.798952] >ffff0000c5a20000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.800231] ^ [ 73.800974] ffff0000c5a20080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.802164] ffff0000c5a20100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.803006] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[ 73.735527] ================================================================== [ 73.737412] BUG: KASAN: invalid-free in kfree+0x70/0x74 [ 73.738250] Free of addr ffff0000c58c8001 by task kunit_try_catch/125 [ 73.739118] [ 73.739443] CPU: 1 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 73.740832] Hardware name: linux,dummy-virt (DT) [ 73.741475] Call trace: [ 73.741881] dump_backtrace+0xf4/0x114 [ 73.742550] show_stack+0x18/0x24 [ 73.743170] __dump_stack+0x28/0x38 [ 73.743956] dump_stack_lvl+0x50/0x68 [ 73.744653] print_address_description+0x7c/0x1ec [ 73.745475] print_report+0x50/0x68 [ 73.746100] kasan_report_invalid_free+0x9c/0xe4 [ 73.746572] __kasan_kfree_large+0x68/0x78 [ 73.747105] free_large_kmalloc+0x60/0xe4 [ 73.747588] kfree+0x70/0x74 [ 73.747993] kmalloc_pagealloc_invalid_free+0x80/0x120 [ 73.748538] kunit_try_run_case+0x80/0x184 [ 73.749104] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 73.749701] kthread+0x16c/0x21c [ 73.750161] ret_from_fork+0x10/0x20 [ 73.750574] [ 73.750790] The buggy address belongs to the physical page: [ 73.751245] page:000000000dfb6053 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c8 [ 73.752122] head:000000000dfb6053 order:2 compound_mapcount:0 compound_pincount:0 [ 73.752760] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff) [ 73.753448] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000 [ 73.754579] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 73.755185] page dumped because: kasan: bad access detected [ 73.755633] [ 73.756107] Memory state around the buggy address: [ 73.756545] ffff0000c58c7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.757192] ffff0000c58c7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.757834] >ffff0000c58c8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 73.758422] ^ [ 73.758795] ffff0000c58c8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 73.759441] ffff0000c58c8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 73.760563] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_pagealloc_uaf
[ 73.702692] ================================================================== [ 73.703603] BUG: KASAN: use-after-free in kmalloc_pagealloc_uaf+0x88/0x12c [ 73.705547] Read of size 1 at addr ffff0000c58c8000 by task kunit_try_catch/124 [ 73.707400] [ 73.708179] CPU: 1 PID: 124 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 73.709421] Hardware name: linux,dummy-virt (DT) [ 73.710162] Call trace: [ 73.710940] dump_backtrace+0xf4/0x114 [ 73.711952] show_stack+0x18/0x24 [ 73.712644] __dump_stack+0x28/0x38 [ 73.713499] dump_stack_lvl+0x50/0x68 [ 73.714311] print_address_description+0x7c/0x1ec [ 73.715174] print_report+0x50/0x68 [ 73.716039] kasan_report+0xac/0xfc [ 73.716847] __asan_load1+0x6c/0x70 [ 73.717277] kmalloc_pagealloc_uaf+0x88/0x12c [ 73.717703] kunit_try_run_case+0x80/0x184 [ 73.718503] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 73.719294] kthread+0x16c/0x21c [ 73.720021] ret_from_fork+0x10/0x20 [ 73.720569] [ 73.720774] The buggy address belongs to the physical page: [ 73.721419] page:000000000dfb6053 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c8 [ 73.722124] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 73.722677] raw: 0bfffc0000000000 ffff0000daf64fb8 ffff0000daf64fb8 0000000000000000 [ 73.723696] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 73.724728] page dumped because: kasan: bad access detected [ 73.725461] [ 73.725768] Memory state around the buggy address: [ 73.726413] ffff0000c58c7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.727320] ffff0000c58c7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.728351] >ffff0000c58c8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.729171] ^ [ 73.729575] ffff0000c58c8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.730072] ffff0000c58c8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.730525] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_pagealloc_oob_right
[ 73.677896] ================================================================== [ 73.678825] BUG: KASAN: slab-out-of-bounds in kmalloc_pagealloc_oob_right+0x84/0x130 [ 73.679561] Write of size 1 at addr ffff0000c59d600a by task kunit_try_catch/123 [ 73.680450] [ 73.680732] CPU: 0 PID: 123 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 73.681551] Hardware name: linux,dummy-virt (DT) [ 73.682016] Call trace: [ 73.682322] dump_backtrace+0xf4/0x114 [ 73.682827] show_stack+0x18/0x24 [ 73.683272] __dump_stack+0x28/0x38 [ 73.683756] dump_stack_lvl+0x50/0x68 [ 73.684383] print_address_description+0x7c/0x1ec [ 73.684972] print_report+0x50/0x68 [ 73.685445] kasan_report+0xac/0xfc [ 73.685913] __asan_store1+0x6c/0x70 [ 73.686380] kmalloc_pagealloc_oob_right+0x84/0x130 [ 73.686921] kunit_try_run_case+0x80/0x184 [ 73.687402] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 73.688194] kthread+0x16c/0x21c [ 73.688638] ret_from_fork+0x10/0x20 [ 73.689121] [ 73.689344] The buggy address belongs to the physical page: [ 73.689931] page:000000008cac2150 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d4 [ 73.690703] head:000000008cac2150 order:2 compound_mapcount:0 compound_pincount:0 [ 73.691368] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff) [ 73.692296] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000 [ 73.692986] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 73.693651] page dumped because: kasan: bad access detected [ 73.694170] [ 73.694386] Memory state around the buggy address: [ 73.694866] ffff0000c59d5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 73.695564] ffff0000c59d5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 73.696370] >ffff0000c59d6000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 73.697011] ^ [ 73.697415] ffff0000c59d6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 73.698078] ffff0000c59d6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 73.698692] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 73.638861] ================================================================== [ 73.641959] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0xa4/0x15c [ 73.642854] Read of size 1 at addr ffff0000c593f000 by task kunit_try_catch/122 [ 73.643526] [ 73.643776] CPU: 1 PID: 122 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 73.644598] Hardware name: linux,dummy-virt (DT) [ 73.645269] Call trace: [ 73.645588] dump_backtrace+0xf4/0x114 [ 73.646148] show_stack+0x18/0x24 [ 73.646945] __dump_stack+0x28/0x38 [ 73.647400] dump_stack_lvl+0x50/0x68 [ 73.647885] print_address_description+0x7c/0x1ec [ 73.648727] print_report+0x50/0x68 [ 73.649214] kasan_report+0xac/0xfc [ 73.649722] __asan_load1+0x6c/0x70 [ 73.650199] kmalloc_node_oob_right+0xa4/0x15c [ 73.650720] kunit_try_run_case+0x80/0x184 [ 73.651220] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 73.651876] kthread+0x16c/0x21c [ 73.652833] ret_from_fork+0x10/0x20 [ 73.653284] [ 73.653504] Allocated by task 122: [ 73.653897] kasan_set_track+0x4c/0x80 [ 73.654379] kasan_save_alloc_info+0x28/0x34 [ 73.654873] __kasan_kmalloc+0x88/0xa0 [ 73.655353] kmalloc_node_trace+0x4c/0x60 [ 73.655884] kmalloc_node_oob_right+0x4c/0x15c [ 73.656673] kunit_try_run_case+0x80/0x184 [ 73.657205] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 73.657801] kthread+0x16c/0x21c [ 73.658234] ret_from_fork+0x10/0x20 [ 73.658706] [ 73.658930] The buggy address belongs to the object at ffff0000c593e000 [ 73.658930] which belongs to the cache kmalloc-4k of size 4096 [ 73.660389] The buggy address is located 0 bytes to the right of [ 73.660389] 4096-byte region [ffff0000c593e000, ffff0000c593f000) [ 73.661397] [ 73.661658] The buggy address belongs to the physical page: [ 73.662259] page:00000000949663e6 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938 [ 73.663108] head:00000000949663e6 order:3 compound_mapcount:0 compound_pincount:0 [ 73.664073] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 73.664875] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002a80 [ 73.665608] raw: 0000000000000000 0000000080040004 00000001ffffffff 0000000000000000 [ 73.666257] page dumped because: kasan: bad access detected [ 73.666757] [ 73.666979] Memory state around the buggy address: [ 73.667460] ffff0000c593ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 73.668583] ffff0000c593ef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 73.669307] >ffff0000c593f000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.669941] ^ [ 73.670283] ffff0000c593f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.670922] ffff0000c593f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.671545] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 73.584537] ================================================================== [ 73.585273] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x9c/0x154 [ 73.586507] Read of size 1 at addr ffff0000c54ff4ff by task kunit_try_catch/121 [ 73.588266] [ 73.588688] CPU: 1 PID: 121 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 73.590154] Hardware name: linux,dummy-virt (DT) [ 73.591228] Call trace: [ 73.591889] dump_backtrace+0xf4/0x114 [ 73.593065] show_stack+0x18/0x24 [ 73.593935] __dump_stack+0x28/0x38 [ 73.594901] dump_stack_lvl+0x50/0x68 [ 73.596079] print_address_description+0x7c/0x1ec [ 73.597179] print_report+0x50/0x68 [ 73.597962] kasan_report+0xac/0xfc [ 73.598394] __asan_load1+0x6c/0x70 [ 73.599003] kmalloc_oob_left+0x9c/0x154 [ 73.599929] kunit_try_run_case+0x80/0x184 [ 73.600792] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 73.601653] kthread+0x16c/0x21c [ 73.602282] ret_from_fork+0x10/0x20 [ 73.602922] [ 73.603225] Allocated by task 1: [ 73.603760] kasan_set_track+0x4c/0x80 [ 73.604451] kasan_save_alloc_info+0x28/0x34 [ 73.605139] __kasan_kmalloc+0x88/0xa0 [ 73.605834] kmalloc_trace+0x54/0x68 [ 73.606468] __kthread_create_on_node+0x90/0x28c [ 73.607219] kthread_create_on_node+0x8c/0xbc [ 73.608048] kunit_try_catch_run+0xac/0x30c [ 73.608490] kunit_run_tests+0x2f8/0xa3c [ 73.608907] __kunit_test_suites_init+0x74/0xa8 [ 73.609351] kunit_exec_run_tests+0x64/0x74 [ 73.609854] kunit_run_all_tests+0x88/0x1e0 [ 73.610380] kernel_init_freeable+0x174/0x1e4 [ 73.610832] kernel_init+0x20/0x138 [ 73.611372] ret_from_fork+0x10/0x20 [ 73.612018] [ 73.612255] Freed by task 1: [ 73.612591] kasan_set_track+0x4c/0x80 [ 73.613094] kasan_save_free_info+0x3c/0x60 [ 73.613622] ____kasan_slab_free+0xe8/0x140 [ 73.614134] __kasan_slab_free+0x18/0x28 [ 73.614636] __kmem_cache_free+0xdc/0x27c [ 73.615119] kfree+0x60/0x74 [ 73.615533] __kthread_create_on_node+0x204/0x28c [ 73.616307] kthread_create_on_node+0x8c/0xbc [ 73.616802] kunit_try_catch_run+0xac/0x30c [ 73.617316] kunit_run_tests+0x2f8/0xa3c [ 73.617776] __kunit_test_suites_init+0x74/0xa8 [ 73.618291] kunit_exec_run_tests+0x64/0x74 [ 73.618769] kunit_run_all_tests+0x88/0x1e0 [ 73.619271] kernel_init_freeable+0x174/0x1e4 [ 73.619769] kernel_init+0x20/0x138 [ 73.620219] ret_from_fork+0x10/0x20 [ 73.620647] [ 73.620897] The buggy address belongs to the object at ffff0000c54ff400 [ 73.620897] which belongs to the cache kmalloc-128 of size 128 [ 73.621812] The buggy address is located 127 bytes to the right of [ 73.621812] 128-byte region [ffff0000c54ff400, ffff0000c54ff480) [ 73.622734] [ 73.622963] The buggy address belongs to the physical page: [ 73.623415] page:00000000a33f1f12 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1054ff [ 73.624401] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 73.625127] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 73.625884] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 73.626497] page dumped because: kasan: bad access detected [ 73.626989] [ 73.627178] Memory state around the buggy address: [ 73.627638] ffff0000c54ff380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.628504] ffff0000c54ff400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 73.629148] >ffff0000c54ff480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.629757] ^ [ 73.630336] ffff0000c54ff500: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.630931] ffff0000c54ff580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.631530] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 73.526441] ================================================================== [ 73.527022] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xe8/0x264 [ 73.528556] Write of size 1 at addr ffff0000c5926278 by task kunit_try_catch/120 [ 73.529124] [ 73.529347] CPU: 0 PID: 120 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 73.530417] Hardware name: linux,dummy-virt (DT) [ 73.530780] Call trace: [ 73.531018] dump_backtrace+0xf4/0x114 [ 73.531565] show_stack+0x18/0x24 [ 73.532278] __dump_stack+0x28/0x38 [ 73.532821] dump_stack_lvl+0x50/0x68 [ 73.533280] print_address_description+0x7c/0x1ec [ 73.533829] print_report+0x50/0x68 [ 73.534298] kasan_report+0xac/0xfc [ 73.534755] __asan_store1+0x6c/0x70 [ 73.535196] kmalloc_oob_right+0xe8/0x264 [ 73.535634] kunit_try_run_case+0x80/0x184 [ 73.536129] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 73.536752] kthread+0x16c/0x21c [ 73.537157] ret_from_fork+0x10/0x20 [ 73.537595] [ 73.537791] Allocated by task 120: [ 73.538143] kasan_set_track+0x4c/0x80 [ 73.538607] kasan_save_alloc_info+0x28/0x34 [ 73.539107] __kasan_kmalloc+0x88/0xa0 [ 73.539548] kmalloc_trace+0x54/0x68 [ 73.539971] kmalloc_oob_right+0x48/0x264 [ 73.540485] kunit_try_run_case+0x80/0x184 [ 73.540993] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 73.541580] kthread+0x16c/0x21c [ 73.542023] ret_from_fork+0x10/0x20 [ 73.542416] [ 73.542629] The buggy address belongs to the object at ffff0000c5926200 [ 73.542629] which belongs to the cache kmalloc-128 of size 128 [ 73.543495] The buggy address is located 120 bytes inside of [ 73.543495] 128-byte region [ffff0000c5926200, ffff0000c5926280) [ 73.544629] [ 73.544919] The buggy address belongs to the physical page: [ 73.545400] page:000000009e191ffb refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 73.546088] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 73.546829] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 73.547481] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 73.548229] page dumped because: kasan: bad access detected [ 73.548723] [ 73.548978] Memory state around the buggy address: [ 73.549384] ffff0000c5926100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 73.550088] ffff0000c5926180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.550683] >ffff0000c5926200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 73.551306] ^ [ 73.551966] ffff0000c5926280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.552644] ffff0000c5926300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.553403] ================================================================== [ 73.487546] ================================================================== [ 73.488859] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x9c/0x264 [ 73.490373] Write of size 1 at addr ffff0000c5926273 by task kunit_try_catch/120 [ 73.491229] [ 73.491652] CPU: 0 PID: 120 Comm: kunit_try_catch Tainted: G N 6.1.146-rc1 #1 [ 73.493002] Hardware name: linux,dummy-virt (DT) [ 73.493833] Call trace: [ 73.494268] dump_backtrace+0xf4/0x114 [ 73.494978] show_stack+0x18/0x24 [ 73.495564] __dump_stack+0x28/0x38 [ 73.496206] dump_stack_lvl+0x50/0x68 [ 73.496816] print_address_description+0x7c/0x1ec [ 73.497563] print_report+0x50/0x68 [ 73.498178] kasan_report+0xac/0xfc [ 73.498681] __asan_store1+0x6c/0x70 [ 73.499362] kmalloc_oob_right+0x9c/0x264 [ 73.500123] kunit_try_run_case+0x80/0x184 [ 73.500714] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 73.501236] kthread+0x16c/0x21c [ 73.501632] ret_from_fork+0x10/0x20 [ 73.502324] [ 73.502650] Allocated by task 120: [ 73.503224] kasan_set_track+0x4c/0x80 [ 73.504082] kasan_save_alloc_info+0x28/0x34 [ 73.504772] __kasan_kmalloc+0x88/0xa0 [ 73.505408] kmalloc_trace+0x54/0x68 [ 73.506003] kmalloc_oob_right+0x48/0x264 [ 73.506627] kunit_try_run_case+0x80/0x184 [ 73.507284] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 73.508193] kthread+0x16c/0x21c [ 73.508829] ret_from_fork+0x10/0x20 [ 73.509455] [ 73.509798] The buggy address belongs to the object at ffff0000c5926200 [ 73.509798] which belongs to the cache kmalloc-128 of size 128 [ 73.511256] The buggy address is located 115 bytes inside of [ 73.511256] 128-byte region [ffff0000c5926200, ffff0000c5926280) [ 73.512698] [ 73.513158] The buggy address belongs to the physical page: [ 73.514036] page:000000009e191ffb refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 73.515033] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 73.516223] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 73.517252] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 73.518225] page dumped because: kasan: bad access detected [ 73.518949] [ 73.519260] Memory state around the buggy address: [ 73.520112] ffff0000c5926100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 73.521060] ffff0000c5926180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.521995] >ffff0000c5926200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 73.522885] ^ [ 73.523848] ffff0000c5926280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.524693] ffff0000c5926300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.525216] ================================================================== [ 73.554437] ================================================================== [ 73.554988] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x134/0x264 [ 73.555647] Read of size 1 at addr ffff0000c5926280 by task kunit_try_catch/120 [ 73.556425] [ 73.556647] CPU: 0 PID: 120 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 73.557399] Hardware name: linux,dummy-virt (DT) [ 73.557956] Call trace: [ 73.558237] dump_backtrace+0xf4/0x114 [ 73.558749] show_stack+0x18/0x24 [ 73.559170] __dump_stack+0x28/0x38 [ 73.559603] dump_stack_lvl+0x50/0x68 [ 73.560191] print_address_description+0x7c/0x1ec [ 73.560723] print_report+0x50/0x68 [ 73.561173] kasan_report+0xac/0xfc [ 73.561662] __asan_load1+0x6c/0x70 [ 73.562123] kmalloc_oob_right+0x134/0x264 [ 73.562567] kunit_try_run_case+0x80/0x184 [ 73.563031] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 73.563595] kthread+0x16c/0x21c [ 73.564191] ret_from_fork+0x10/0x20 [ 73.564598] [ 73.564813] Allocated by task 120: [ 73.565179] kasan_set_track+0x4c/0x80 [ 73.565682] kasan_save_alloc_info+0x28/0x34 [ 73.566180] __kasan_kmalloc+0x88/0xa0 [ 73.566681] kmalloc_trace+0x54/0x68 [ 73.567106] kmalloc_oob_right+0x48/0x264 [ 73.567544] kunit_try_run_case+0x80/0x184 [ 73.568176] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 73.568751] kthread+0x16c/0x21c [ 73.569243] ret_from_fork+0x10/0x20 [ 73.569658] [ 73.569887] The buggy address belongs to the object at ffff0000c5926200 [ 73.569887] which belongs to the cache kmalloc-128 of size 128 [ 73.570793] The buggy address is located 0 bytes to the right of [ 73.570793] 128-byte region [ffff0000c5926200, ffff0000c5926280) [ 73.571902] [ 73.572134] The buggy address belongs to the physical page: [ 73.572599] page:000000009e191ffb refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926 [ 73.573382] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 73.574072] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 73.574750] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 73.575338] page dumped because: kasan: bad access detected [ 73.576342] [ 73.576568] Memory state around the buggy address: [ 73.577020] ffff0000c5926180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.577688] ffff0000c5926200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 73.578334] >ffff0000c5926280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.578934] ^ [ 73.579283] ffff0000c5926300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.580083] ffff0000c5926380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.580703] ==================================================================