Date
July 15, 2025, 2:10 p.m.
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 77.683739] ================================================================== [ 77.684315] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xe4/0x25c [ 77.685192] Read of size 1 at addr ffff8000080fb7f8 by task kunit_try_catch/169 [ 77.686015] [ 77.686316] CPU: 1 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.687795] Hardware name: linux,dummy-virt (DT) [ 77.688235] Call trace: [ 77.688513] dump_backtrace+0xf8/0x118 [ 77.689037] show_stack+0x18/0x24 [ 77.689640] __dump_stack+0x28/0x38 [ 77.690094] dump_stack_lvl+0x54/0x6c [ 77.690519] print_address_description+0x7c/0x1ec [ 77.691064] print_report+0x50/0x68 [ 77.691507] kasan_report+0xac/0x100 [ 77.691962] __asan_load1+0x6c/0x70 [ 77.692416] vmalloc_oob+0xe4/0x25c [ 77.692946] kunit_try_run_case+0x80/0x184 [ 77.693456] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.694038] kthread+0x16c/0x21c [ 77.694467] ret_from_fork+0x10/0x20 [ 77.694929] [ 77.695133] The buggy address ffff8000080fb7f8 belongs to a vmalloc virtual mapping [ 77.695771] The buggy address belongs to the physical page: [ 77.696240] page:00000000471b2048 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ace [ 77.697173] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 77.697926] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000 [ 77.698596] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 77.699196] page dumped because: kasan: bad access detected [ 77.699695] [ 77.699912] Memory state around the buggy address: [ 77.700355] ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 77.701130] ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 77.701895] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 77.702581] ^ [ 77.703196] ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 77.703868] ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 77.704440] ================================================================== [ 77.662520] ================================================================== [ 77.663655] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x9c/0x25c [ 77.664476] Read of size 1 at addr ffff8000080fb7f3 by task kunit_try_catch/169 [ 77.665444] [ 77.665684] CPU: 1 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.666426] Hardware name: linux,dummy-virt (DT) [ 77.666890] Call trace: [ 77.667158] dump_backtrace+0xf8/0x118 [ 77.667615] show_stack+0x18/0x24 [ 77.668047] __dump_stack+0x28/0x38 [ 77.668501] dump_stack_lvl+0x54/0x6c [ 77.668971] print_address_description+0x7c/0x1ec [ 77.669554] print_report+0x50/0x68 [ 77.670000] kasan_report+0xac/0x100 [ 77.670461] __asan_load1+0x6c/0x70 [ 77.670921] vmalloc_oob+0x9c/0x25c [ 77.671341] kunit_try_run_case+0x80/0x184 [ 77.671851] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.672430] kthread+0x16c/0x21c [ 77.672950] ret_from_fork+0x10/0x20 [ 77.673418] [ 77.673652] The buggy address ffff8000080fb7f3 belongs to a vmalloc virtual mapping [ 77.674294] The buggy address belongs to the physical page: [ 77.674787] page:00000000471b2048 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ace [ 77.675533] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 77.676201] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000 [ 77.676954] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 77.677597] page dumped because: kasan: bad access detected [ 77.678113] [ 77.678310] Memory state around the buggy address: [ 77.678748] ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 77.679409] ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 77.680040] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 77.680637] ^ [ 77.681382] ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 77.682211] ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 77.682846] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[ 77.621130] ================================================================== [ 77.621718] BUG: KASAN: double-free in kfree_sensitive+0x88/0xa4 [ 77.622341] Free of addr ffff0000c5ad0000 by task kunit_try_catch/167 [ 77.622908] [ 77.623137] CPU: 1 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.623914] Hardware name: linux,dummy-virt (DT) [ 77.624359] Call trace: [ 77.624829] dump_backtrace+0xf8/0x118 [ 77.625308] show_stack+0x18/0x24 [ 77.625778] __dump_stack+0x28/0x38 [ 77.626225] dump_stack_lvl+0x54/0x6c [ 77.626651] print_address_description+0x7c/0x1ec [ 77.627462] print_report+0x50/0x68 [ 77.627919] kasan_report_invalid_free+0x9c/0xe8 [ 77.628452] ____kasan_slab_free+0x108/0x140 [ 77.629430] __kasan_slab_free+0x18/0x28 [ 77.629925] __kmem_cache_free+0xdc/0x284 [ 77.630373] kfree_sensitive+0x88/0xa4 [ 77.630849] kmalloc_double_kzfree+0xa4/0x144 [ 77.631340] kunit_try_run_case+0x80/0x184 [ 77.631825] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.632422] kthread+0x16c/0x21c [ 77.633266] ret_from_fork+0x10/0x20 [ 77.633729] [ 77.633964] Allocated by task 167: [ 77.634305] kasan_set_track+0x4c/0x80 [ 77.634764] kasan_save_alloc_info+0x28/0x34 [ 77.635209] __kasan_kmalloc+0x88/0xa0 [ 77.635663] kmalloc_trace+0x54/0x68 [ 77.636092] kmalloc_double_kzfree+0x48/0x144 [ 77.636584] kunit_try_run_case+0x80/0x184 [ 77.637237] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.637856] kthread+0x16c/0x21c [ 77.638302] ret_from_fork+0x10/0x20 [ 77.638722] [ 77.638931] Freed by task 167: [ 77.639238] kasan_set_track+0x4c/0x80 [ 77.639686] kasan_save_free_info+0x3c/0x60 [ 77.640180] ____kasan_slab_free+0xe8/0x140 [ 77.641190] __kasan_slab_free+0x18/0x28 [ 77.641685] __kmem_cache_free+0xdc/0x284 [ 77.642154] kfree_sensitive+0x88/0xa4 [ 77.642617] kmalloc_double_kzfree+0x90/0x144 [ 77.643117] kunit_try_run_case+0x80/0x184 [ 77.643587] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.644172] kthread+0x16c/0x21c [ 77.644748] ret_from_fork+0x10/0x20 [ 77.645221] [ 77.645423] The buggy address belongs to the object at ffff0000c5ad0000 [ 77.645423] which belongs to the cache kmalloc-128 of size 128 [ 77.646377] The buggy address is located 0 bytes inside of [ 77.646377] 128-byte region [ffff0000c5ad0000, ffff0000c5ad0080) [ 77.647338] [ 77.647569] The buggy address belongs to the physical page: [ 77.648054] page:000000001efa35a5 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ad0 [ 77.649055] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.649790] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.650504] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.651108] page dumped because: kasan: bad access detected [ 77.651584] [ 77.651784] Memory state around the buggy address: [ 77.652252] ffff0000c5acff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 77.653122] ffff0000c5acff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 77.653768] >ffff0000c5ad0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 77.654387] ^ [ 77.654729] ffff0000c5ad0080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.655362] ffff0000c5ad0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.655953] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kfree_sensitive
[ 77.586541] ================================================================== [ 77.587632] BUG: KASAN: use-after-free in kfree_sensitive+0x1c/0xa4 [ 77.588282] Read of size 1 at addr ffff0000c5ad0000 by task kunit_try_catch/167 [ 77.588908] [ 77.589125] CPU: 1 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.589900] Hardware name: linux,dummy-virt (DT) [ 77.590347] Call trace: [ 77.590624] dump_backtrace+0xf8/0x118 [ 77.591164] show_stack+0x18/0x24 [ 77.591626] __dump_stack+0x28/0x38 [ 77.592095] dump_stack_lvl+0x54/0x6c [ 77.592543] print_address_description+0x7c/0x1ec [ 77.593194] print_report+0x50/0x68 [ 77.593664] kasan_report+0xac/0x100 [ 77.594156] __kasan_check_byte+0x3c/0x54 [ 77.594646] ksize+0x34/0x13c [ 77.595055] kfree_sensitive+0x1c/0xa4 [ 77.595506] kmalloc_double_kzfree+0xa4/0x144 [ 77.596013] kunit_try_run_case+0x80/0x184 [ 77.596523] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.597236] kthread+0x16c/0x21c [ 77.597653] ret_from_fork+0x10/0x20 [ 77.598113] [ 77.598303] Allocated by task 167: [ 77.598638] kasan_set_track+0x4c/0x80 [ 77.599129] kasan_save_alloc_info+0x28/0x34 [ 77.599627] __kasan_kmalloc+0x88/0xa0 [ 77.600129] kmalloc_trace+0x54/0x68 [ 77.600555] kmalloc_double_kzfree+0x48/0x144 [ 77.601063] kunit_try_run_case+0x80/0x184 [ 77.601677] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.602280] kthread+0x16c/0x21c [ 77.602695] ret_from_fork+0x10/0x20 [ 77.603139] [ 77.603339] Freed by task 167: [ 77.603659] kasan_set_track+0x4c/0x80 [ 77.604198] kasan_save_free_info+0x3c/0x60 [ 77.604678] ____kasan_slab_free+0xe8/0x140 [ 77.605262] __kasan_slab_free+0x18/0x28 [ 77.605771] __kmem_cache_free+0xdc/0x284 [ 77.606250] kfree_sensitive+0x88/0xa4 [ 77.606697] kmalloc_double_kzfree+0x90/0x144 [ 77.607225] kunit_try_run_case+0x80/0x184 [ 77.607726] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.608294] kthread+0x16c/0x21c [ 77.608826] ret_from_fork+0x10/0x20 [ 77.609272] [ 77.609489] The buggy address belongs to the object at ffff0000c5ad0000 [ 77.609489] which belongs to the cache kmalloc-128 of size 128 [ 77.610422] The buggy address is located 0 bytes inside of [ 77.610422] 128-byte region [ffff0000c5ad0000, ffff0000c5ad0080) [ 77.611346] [ 77.611561] The buggy address belongs to the physical page: [ 77.612048] page:000000001efa35a5 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ad0 [ 77.612923] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.613794] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.614500] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.615153] page dumped because: kasan: bad access detected [ 77.615633] [ 77.615836] Memory state around the buggy address: [ 77.616314] ffff0000c5acff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 77.617058] ffff0000c5acff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 77.617719] >ffff0000c5ad0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 77.618361] ^ [ 77.618726] ffff0000c5ad0080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.619367] ffff0000c5ad0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.619969] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_generic
[ 77.133585] ================================================================== [ 77.134168] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1f0/0xb8c [ 77.134906] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.135524] [ 77.135750] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.136545] Hardware name: linux,dummy-virt (DT) [ 77.137223] Call trace: [ 77.137495] dump_backtrace+0xf8/0x118 [ 77.138001] show_stack+0x18/0x24 [ 77.138493] __dump_stack+0x28/0x38 [ 77.138923] dump_stack_lvl+0x54/0x6c [ 77.139375] print_address_description+0x7c/0x1ec [ 77.139925] print_report+0x50/0x68 [ 77.140368] kasan_report+0xac/0x100 [ 77.140868] kasan_check_range+0x260/0x2a0 [ 77.141357] __kasan_check_write+0x2c/0x3c [ 77.141807] kasan_bitops_generic+0x1f0/0xb8c [ 77.142271] kunit_try_run_case+0x80/0x184 [ 77.142725] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.143458] kthread+0x16c/0x21c [ 77.143876] ret_from_fork+0x10/0x20 [ 77.144331] [ 77.144522] Allocated by task 165: [ 77.144913] kasan_set_track+0x4c/0x80 [ 77.145535] kasan_save_alloc_info+0x28/0x34 [ 77.146028] __kasan_kmalloc+0x88/0xa0 [ 77.146469] kmalloc_trace+0x54/0x68 [ 77.146933] kasan_bitops_generic+0x4c/0xb8c [ 77.147394] kunit_try_run_case+0x80/0x184 [ 77.147873] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.148447] kthread+0x16c/0x21c [ 77.149014] ret_from_fork+0x10/0x20 [ 77.149468] [ 77.149659] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.149659] which belongs to the cache kmalloc-128 of size 128 [ 77.150611] The buggy address is located 8 bytes inside of [ 77.150611] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.151503] [ 77.151724] The buggy address belongs to the physical page: [ 77.152187] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.153137] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.153844] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.154527] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.155155] page dumped because: kasan: bad access detected [ 77.155635] [ 77.155851] Memory state around the buggy address: [ 77.156319] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.157615] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.158233] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.158846] ^ [ 77.159199] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.159838] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.160431] ================================================================== [ 77.328315] ================================================================== [ 77.329131] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x3a0/0xb8c [ 77.329836] Read of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.330428] [ 77.330674] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.331422] Hardware name: linux,dummy-virt (DT) [ 77.331877] Call trace: [ 77.332156] dump_backtrace+0xf8/0x118 [ 77.332629] show_stack+0x18/0x24 [ 77.333098] __dump_stack+0x28/0x38 [ 77.333531] dump_stack_lvl+0x54/0x6c [ 77.333966] print_address_description+0x7c/0x1ec [ 77.334506] print_report+0x50/0x68 [ 77.335149] kasan_report+0xac/0x100 [ 77.335606] __asan_load8+0xa8/0xac [ 77.336017] kasan_bitops_generic+0x3a0/0xb8c [ 77.336534] kunit_try_run_case+0x80/0x184 [ 77.337175] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.337747] kthread+0x16c/0x21c [ 77.338175] ret_from_fork+0x10/0x20 [ 77.338628] [ 77.338882] Allocated by task 165: [ 77.339236] kasan_set_track+0x4c/0x80 [ 77.339735] kasan_save_alloc_info+0x28/0x34 [ 77.340203] __kasan_kmalloc+0x88/0xa0 [ 77.340843] kmalloc_trace+0x54/0x68 [ 77.341267] kasan_bitops_generic+0x4c/0xb8c [ 77.341733] kunit_try_run_case+0x80/0x184 [ 77.342195] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.342781] kthread+0x16c/0x21c [ 77.343186] ret_from_fork+0x10/0x20 [ 77.343615] [ 77.343828] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.343828] which belongs to the cache kmalloc-128 of size 128 [ 77.344732] The buggy address is located 8 bytes inside of [ 77.344732] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.345640] [ 77.345866] The buggy address belongs to the physical page: [ 77.346321] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.347257] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.347963] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.349185] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.349810] page dumped because: kasan: bad access detected [ 77.350289] [ 77.350481] Memory state around the buggy address: [ 77.350955] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.351567] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.352243] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.353030] ^ [ 77.353406] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.354034] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.354634] ================================================================== [ 77.529113] ================================================================== [ 77.529847] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x59c/0xb8c [ 77.530531] Read of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.531160] [ 77.531378] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.532147] Hardware name: linux,dummy-virt (DT) [ 77.532561] Call trace: [ 77.532877] dump_backtrace+0xf8/0x118 [ 77.533357] show_stack+0x18/0x24 [ 77.533801] __dump_stack+0x28/0x38 [ 77.534213] dump_stack_lvl+0x54/0x6c [ 77.534691] print_address_description+0x7c/0x1ec [ 77.535247] print_report+0x50/0x68 [ 77.535705] kasan_report+0xac/0x100 [ 77.536159] __asan_load8+0xa8/0xac [ 77.536558] kasan_bitops_generic+0x59c/0xb8c [ 77.537065] kunit_try_run_case+0x80/0x184 [ 77.537536] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.538108] kthread+0x16c/0x21c [ 77.538542] ret_from_fork+0x10/0x20 [ 77.538971] [ 77.539166] Allocated by task 165: [ 77.539514] kasan_set_track+0x4c/0x80 [ 77.539987] kasan_save_alloc_info+0x28/0x34 [ 77.540450] __kasan_kmalloc+0x88/0xa0 [ 77.540931] kmalloc_trace+0x54/0x68 [ 77.541342] kasan_bitops_generic+0x4c/0xb8c [ 77.541804] kunit_try_run_case+0x80/0x184 [ 77.542288] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.542861] kthread+0x16c/0x21c [ 77.543273] ret_from_fork+0x10/0x20 [ 77.543713] [ 77.543945] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.543945] which belongs to the cache kmalloc-128 of size 128 [ 77.544858] The buggy address is located 8 bytes inside of [ 77.544858] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.545802] [ 77.546026] The buggy address belongs to the physical page: [ 77.546491] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.547281] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.547993] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.548683] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.549333] page dumped because: kasan: bad access detected [ 77.549814] [ 77.550033] Memory state around the buggy address: [ 77.550475] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.551117] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.551749] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.552319] ^ [ 77.552697] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.553324] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.553946] ================================================================== [ 77.355424] ================================================================== [ 77.355968] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x3f4/0xb8c [ 77.356965] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.357607] [ 77.357876] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.358631] Hardware name: linux,dummy-virt (DT) [ 77.359060] Call trace: [ 77.359355] dump_backtrace+0xf8/0x118 [ 77.359851] show_stack+0x18/0x24 [ 77.360276] __dump_stack+0x28/0x38 [ 77.360878] dump_stack_lvl+0x54/0x6c [ 77.361331] print_address_description+0x7c/0x1ec [ 77.361975] print_report+0x50/0x68 [ 77.362408] kasan_report+0xac/0x100 [ 77.362877] kasan_check_range+0x260/0x2a0 [ 77.363436] __kasan_check_write+0x2c/0x3c [ 77.363929] kasan_bitops_generic+0x3f4/0xb8c [ 77.364404] kunit_try_run_case+0x80/0x184 [ 77.364884] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.365531] kthread+0x16c/0x21c [ 77.365959] ret_from_fork+0x10/0x20 [ 77.366405] [ 77.366635] Allocated by task 165: [ 77.367228] kasan_set_track+0x4c/0x80 [ 77.367685] kasan_save_alloc_info+0x28/0x34 [ 77.368143] __kasan_kmalloc+0x88/0xa0 [ 77.368728] kmalloc_trace+0x54/0x68 [ 77.369155] kasan_bitops_generic+0x4c/0xb8c [ 77.369706] kunit_try_run_case+0x80/0x184 [ 77.370220] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.371822] kthread+0x16c/0x21c [ 77.372471] ret_from_fork+0x10/0x20 [ 77.372878] [ 77.373061] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.373061] which belongs to the cache kmalloc-128 of size 128 [ 77.374474] The buggy address is located 8 bytes inside of [ 77.374474] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.376540] [ 77.377274] The buggy address belongs to the physical page: [ 77.378459] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.379463] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.380389] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.381700] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.382342] page dumped because: kasan: bad access detected [ 77.382875] [ 77.383076] Memory state around the buggy address: [ 77.383472] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.384115] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.384830] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.385385] ^ [ 77.385725] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.386388] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.387009] ================================================================== [ 77.554786] ================================================================== [ 77.555326] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x5f4/0xb8c [ 77.556054] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.556734] [ 77.556981] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.557727] Hardware name: linux,dummy-virt (DT) [ 77.558168] Call trace: [ 77.558473] dump_backtrace+0xf8/0x118 [ 77.558963] show_stack+0x18/0x24 [ 77.559432] __dump_stack+0x28/0x38 [ 77.559882] dump_stack_lvl+0x54/0x6c [ 77.560315] print_address_description+0x7c/0x1ec [ 77.560867] print_report+0x50/0x68 [ 77.561328] kasan_report+0xac/0x100 [ 77.561783] kasan_check_range+0x260/0x2a0 [ 77.562288] __kasan_check_write+0x2c/0x3c [ 77.562730] kasan_bitops_generic+0x5f4/0xb8c [ 77.563226] kunit_try_run_case+0x80/0x184 [ 77.563693] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.564303] kthread+0x16c/0x21c [ 77.564713] ret_from_fork+0x10/0x20 [ 77.565166] [ 77.565354] Allocated by task 165: [ 77.565701] kasan_set_track+0x4c/0x80 [ 77.566164] kasan_save_alloc_info+0x28/0x34 [ 77.566647] __kasan_kmalloc+0x88/0xa0 [ 77.567153] kmalloc_trace+0x54/0x68 [ 77.567578] kasan_bitops_generic+0x4c/0xb8c [ 77.568060] kunit_try_run_case+0x80/0x184 [ 77.568568] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.569143] kthread+0x16c/0x21c [ 77.569546] ret_from_fork+0x10/0x20 [ 77.569997] [ 77.570190] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.570190] which belongs to the cache kmalloc-128 of size 128 [ 77.571146] The buggy address is located 8 bytes inside of [ 77.571146] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.572032] [ 77.572265] The buggy address belongs to the physical page: [ 77.572727] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.573536] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.574229] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.574913] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.575543] page dumped because: kasan: bad access detected [ 77.576015] [ 77.576229] Memory state around the buggy address: [ 77.576640] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.577297] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.577915] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.578522] ^ [ 77.578899] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.579539] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.580091] ================================================================== [ 77.051122] ================================================================== [ 77.051648] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0xf8/0xb8c [ 77.052343] Read of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.053031] [ 77.053273] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.054021] Hardware name: linux,dummy-virt (DT) [ 77.054472] Call trace: [ 77.054751] dump_backtrace+0xf8/0x118 [ 77.055713] show_stack+0x18/0x24 [ 77.056159] __dump_stack+0x28/0x38 [ 77.056743] dump_stack_lvl+0x54/0x6c [ 77.057199] print_address_description+0x7c/0x1ec [ 77.057791] print_report+0x50/0x68 [ 77.058261] kasan_report+0xac/0x100 [ 77.058705] __asan_load8+0xa8/0xac [ 77.059144] kasan_bitops_generic+0xf8/0xb8c [ 77.059609] kunit_try_run_case+0x80/0x184 [ 77.060089] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.060837] kthread+0x16c/0x21c [ 77.061265] ret_from_fork+0x10/0x20 [ 77.061712] [ 77.061911] Allocated by task 165: [ 77.062288] kasan_set_track+0x4c/0x80 [ 77.062754] kasan_save_alloc_info+0x28/0x34 [ 77.063257] __kasan_kmalloc+0x88/0xa0 [ 77.063787] kmalloc_trace+0x54/0x68 [ 77.064210] kasan_bitops_generic+0x4c/0xb8c [ 77.064872] kunit_try_run_case+0x80/0x184 [ 77.065357] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.065949] kthread+0x16c/0x21c [ 77.066363] ret_from_fork+0x10/0x20 [ 77.066804] [ 77.067001] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.067001] which belongs to the cache kmalloc-128 of size 128 [ 77.067945] The buggy address is located 8 bytes inside of [ 77.067945] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.069039] [ 77.069271] The buggy address belongs to the physical page: [ 77.069733] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.070524] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.071210] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.071910] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.072516] page dumped because: kasan: bad access detected [ 77.073000] [ 77.073207] Memory state around the buggy address: [ 77.073655] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.074273] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.075401] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.076020] ^ [ 77.076398] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.077160] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.077768] ================================================================== [ 77.299899] ================================================================== [ 77.300401] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x350/0xb8c [ 77.300999] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.301503] [ 77.301697] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.303215] Hardware name: linux,dummy-virt (DT) [ 77.303622] Call trace: [ 77.303896] dump_backtrace+0xf8/0x118 [ 77.304374] show_stack+0x18/0x24 [ 77.304971] __dump_stack+0x28/0x38 [ 77.305397] dump_stack_lvl+0x54/0x6c [ 77.305855] print_address_description+0x7c/0x1ec [ 77.306376] print_report+0x50/0x68 [ 77.307140] kasan_report+0xac/0x100 [ 77.307636] kasan_check_range+0x260/0x2a0 [ 77.308126] __kasan_check_write+0x2c/0x3c [ 77.308589] kasan_bitops_generic+0x350/0xb8c [ 77.309249] kunit_try_run_case+0x80/0x184 [ 77.309767] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.310362] kthread+0x16c/0x21c [ 77.310814] ret_from_fork+0x10/0x20 [ 77.311260] [ 77.311447] Allocated by task 165: [ 77.311828] kasan_set_track+0x4c/0x80 [ 77.312294] kasan_save_alloc_info+0x28/0x34 [ 77.312980] __kasan_kmalloc+0x88/0xa0 [ 77.313493] kmalloc_trace+0x54/0x68 [ 77.313946] kasan_bitops_generic+0x4c/0xb8c [ 77.314427] kunit_try_run_case+0x80/0x184 [ 77.314911] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.315496] kthread+0x16c/0x21c [ 77.315936] ret_from_fork+0x10/0x20 [ 77.316378] [ 77.316577] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.316577] which belongs to the cache kmalloc-128 of size 128 [ 77.317614] The buggy address is located 8 bytes inside of [ 77.317614] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.318537] [ 77.318764] The buggy address belongs to the physical page: [ 77.319218] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.319993] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.321222] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.321892] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.322488] page dumped because: kasan: bad access detected [ 77.322973] [ 77.323166] Memory state around the buggy address: [ 77.323586] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.324249] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.325061] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.325674] ^ [ 77.326057] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.326690] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.327305] ================================================================== [ 77.447241] ================================================================== [ 77.447881] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x4a8/0xb8c [ 77.448571] Read of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.449317] [ 77.449568] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.450305] Hardware name: linux,dummy-virt (DT) [ 77.450742] Call trace: [ 77.451315] dump_backtrace+0xf8/0x118 [ 77.451802] show_stack+0x18/0x24 [ 77.452230] __dump_stack+0x28/0x38 [ 77.452658] dump_stack_lvl+0x54/0x6c [ 77.453131] print_address_description+0x7c/0x1ec [ 77.453666] print_report+0x50/0x68 [ 77.454355] kasan_report+0xac/0x100 [ 77.454852] __asan_load8+0xa8/0xac [ 77.455249] kasan_bitops_generic+0x4a8/0xb8c [ 77.455741] kunit_try_run_case+0x80/0x184 [ 77.456259] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.456848] kthread+0x16c/0x21c [ 77.457300] ret_from_fork+0x10/0x20 [ 77.457717] [ 77.457921] Allocated by task 165: [ 77.458285] kasan_set_track+0x4c/0x80 [ 77.458767] kasan_save_alloc_info+0x28/0x34 [ 77.459226] __kasan_kmalloc+0x88/0xa0 [ 77.459734] kmalloc_trace+0x54/0x68 [ 77.460154] kasan_bitops_generic+0x4c/0xb8c [ 77.460646] kunit_try_run_case+0x80/0x184 [ 77.461118] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.461710] kthread+0x16c/0x21c [ 77.462133] ret_from_fork+0x10/0x20 [ 77.462585] [ 77.462810] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.462810] which belongs to the cache kmalloc-128 of size 128 [ 77.463748] The buggy address is located 8 bytes inside of [ 77.463748] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.464643] [ 77.464878] The buggy address belongs to the physical page: [ 77.465364] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.466188] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.466862] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.467518] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.468150] page dumped because: kasan: bad access detected [ 77.468666] [ 77.468889] Memory state around the buggy address: [ 77.469337] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.469983] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.470632] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.471235] ^ [ 77.471630] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.472284] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.472885] ================================================================== [ 77.502968] ================================================================== [ 77.503478] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x54c/0xb8c [ 77.504260] Read of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.504870] [ 77.505135] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.505896] Hardware name: linux,dummy-virt (DT) [ 77.506336] Call trace: [ 77.506608] dump_backtrace+0xf8/0x118 [ 77.507105] show_stack+0x18/0x24 [ 77.507533] __dump_stack+0x28/0x38 [ 77.507954] dump_stack_lvl+0x54/0x6c [ 77.508416] print_address_description+0x7c/0x1ec [ 77.508962] print_report+0x50/0x68 [ 77.509441] kasan_report+0xac/0x100 [ 77.509903] __asan_load8+0xa8/0xac [ 77.510323] kasan_bitops_generic+0x54c/0xb8c [ 77.510812] kunit_try_run_case+0x80/0x184 [ 77.511324] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.511901] kthread+0x16c/0x21c [ 77.512321] ret_from_fork+0x10/0x20 [ 77.512785] [ 77.512992] Allocated by task 165: [ 77.513336] kasan_set_track+0x4c/0x80 [ 77.513810] kasan_save_alloc_info+0x28/0x34 [ 77.514293] __kasan_kmalloc+0x88/0xa0 [ 77.514791] kmalloc_trace+0x54/0x68 [ 77.515239] kasan_bitops_generic+0x4c/0xb8c [ 77.515706] kunit_try_run_case+0x80/0x184 [ 77.516190] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.516768] kthread+0x16c/0x21c [ 77.517215] ret_from_fork+0x10/0x20 [ 77.517659] [ 77.517877] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.517877] which belongs to the cache kmalloc-128 of size 128 [ 77.518811] The buggy address is located 8 bytes inside of [ 77.518811] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.519688] [ 77.519923] The buggy address belongs to the physical page: [ 77.520390] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.521217] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.521896] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.522553] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.523147] page dumped because: kasan: bad access detected [ 77.523625] [ 77.523857] Memory state around the buggy address: [ 77.524315] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.524942] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.525579] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.526178] ^ [ 77.526554] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.527206] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.527818] ================================================================== [ 77.022844] ================================================================== [ 77.023726] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0xa8/0xb8c [ 77.024415] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.025160] [ 77.025657] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.026431] Hardware name: linux,dummy-virt (DT) [ 77.026850] Call trace: [ 77.027114] dump_backtrace+0xf8/0x118 [ 77.027651] show_stack+0x18/0x24 [ 77.028125] __dump_stack+0x28/0x38 [ 77.028601] dump_stack_lvl+0x54/0x6c [ 77.029074] print_address_description+0x7c/0x1ec [ 77.029642] print_report+0x50/0x68 [ 77.030141] kasan_report+0xac/0x100 [ 77.030584] kasan_check_range+0x260/0x2a0 [ 77.031068] __kasan_check_write+0x2c/0x3c [ 77.031542] kasan_bitops_generic+0xa8/0xb8c [ 77.032025] kunit_try_run_case+0x80/0x184 [ 77.032497] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.033071] kthread+0x16c/0x21c [ 77.033483] ret_from_fork+0x10/0x20 [ 77.033938] [ 77.034121] Allocated by task 165: [ 77.034467] kasan_set_track+0x4c/0x80 [ 77.035154] kasan_save_alloc_info+0x28/0x34 [ 77.035629] __kasan_kmalloc+0x88/0xa0 [ 77.036096] kmalloc_trace+0x54/0x68 [ 77.036519] kasan_bitops_generic+0x4c/0xb8c [ 77.037145] kunit_try_run_case+0x80/0x184 [ 77.037613] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.038193] kthread+0x16c/0x21c [ 77.038599] ret_from_fork+0x10/0x20 [ 77.039051] [ 77.039243] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.039243] which belongs to the cache kmalloc-128 of size 128 [ 77.040214] The buggy address is located 8 bytes inside of [ 77.040214] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.041690] [ 77.041934] The buggy address belongs to the physical page: [ 77.042387] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.043173] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.043846] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.044508] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.045265] page dumped because: kasan: bad access detected [ 77.045738] [ 77.045950] Memory state around the buggy address: [ 77.046420] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.047061] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.047682] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.048338] ^ [ 77.048888] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.049497] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.050103] ================================================================== [ 77.078629] ================================================================== [ 77.079206] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x14c/0xb8c [ 77.079947] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.080559] [ 77.081080] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.081812] Hardware name: linux,dummy-virt (DT) [ 77.082244] Call trace: [ 77.082515] dump_backtrace+0xf8/0x118 [ 77.082987] show_stack+0x18/0x24 [ 77.083408] __dump_stack+0x28/0x38 [ 77.083845] dump_stack_lvl+0x54/0x6c [ 77.084272] print_address_description+0x7c/0x1ec [ 77.084971] print_report+0x50/0x68 [ 77.085418] kasan_report+0xac/0x100 [ 77.085875] kasan_check_range+0x260/0x2a0 [ 77.086351] __kasan_check_write+0x2c/0x3c [ 77.086807] kasan_bitops_generic+0x14c/0xb8c [ 77.087278] kunit_try_run_case+0x80/0x184 [ 77.087729] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.088316] kthread+0x16c/0x21c [ 77.088827] ret_from_fork+0x10/0x20 [ 77.089277] [ 77.089472] Allocated by task 165: [ 77.089848] kasan_set_track+0x4c/0x80 [ 77.090335] kasan_save_alloc_info+0x28/0x34 [ 77.090944] __kasan_kmalloc+0x88/0xa0 [ 77.091411] kmalloc_trace+0x54/0x68 [ 77.091834] kasan_bitops_generic+0x4c/0xb8c [ 77.092317] kunit_try_run_case+0x80/0x184 [ 77.092944] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.093518] kthread+0x16c/0x21c [ 77.093941] ret_from_fork+0x10/0x20 [ 77.094384] [ 77.094572] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.094572] which belongs to the cache kmalloc-128 of size 128 [ 77.095493] The buggy address is located 8 bytes inside of [ 77.095493] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.096403] [ 77.096624] The buggy address belongs to the physical page: [ 77.097088] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.097867] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.098554] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.099425] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.100043] page dumped because: kasan: bad access detected [ 77.100529] [ 77.101252] Memory state around the buggy address: [ 77.101695] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.102367] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.102987] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.103561] ^ [ 77.103931] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.104563] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.105286] ================================================================== [ 77.473981] ================================================================== [ 77.474512] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x4fc/0xb8c [ 77.475252] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.475868] [ 77.476100] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.476964] Hardware name: linux,dummy-virt (DT) [ 77.477410] Call trace: [ 77.477670] dump_backtrace+0xf8/0x118 [ 77.478134] show_stack+0x18/0x24 [ 77.478572] __dump_stack+0x28/0x38 [ 77.479038] dump_stack_lvl+0x54/0x6c [ 77.479514] print_address_description+0x7c/0x1ec [ 77.480065] print_report+0x50/0x68 [ 77.480522] kasan_report+0xac/0x100 [ 77.481018] kasan_check_range+0x260/0x2a0 [ 77.481495] __kasan_check_write+0x2c/0x3c [ 77.481942] kasan_bitops_generic+0x4fc/0xb8c [ 77.482448] kunit_try_run_case+0x80/0x184 [ 77.482947] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.483507] kthread+0x16c/0x21c [ 77.483937] ret_from_fork+0x10/0x20 [ 77.484354] [ 77.484554] Allocated by task 165: [ 77.484942] kasan_set_track+0x4c/0x80 [ 77.485432] kasan_save_alloc_info+0x28/0x34 [ 77.485902] __kasan_kmalloc+0x88/0xa0 [ 77.486356] kmalloc_trace+0x54/0x68 [ 77.486818] kasan_bitops_generic+0x4c/0xb8c [ 77.487288] kunit_try_run_case+0x80/0x184 [ 77.487740] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.488321] kthread+0x16c/0x21c [ 77.488737] ret_from_fork+0x10/0x20 [ 77.489173] [ 77.489393] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.489393] which belongs to the cache kmalloc-128 of size 128 [ 77.490314] The buggy address is located 8 bytes inside of [ 77.490314] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.491219] [ 77.491414] The buggy address belongs to the physical page: [ 77.491884] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.492659] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.493349] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.494006] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.494603] page dumped because: kasan: bad access detected [ 77.495084] [ 77.495278] Memory state around the buggy address: [ 77.495699] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.496343] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.497030] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.497600] ^ [ 77.497967] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.498587] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.499194] ================================================================== [ 77.216777] ================================================================== [ 77.217329] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x260/0xb8c [ 77.218332] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.218998] [ 77.219243] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.219990] Hardware name: linux,dummy-virt (DT) [ 77.220431] Call trace: [ 77.220876] dump_backtrace+0xf8/0x118 [ 77.221344] show_stack+0x18/0x24 [ 77.221783] __dump_stack+0x28/0x38 [ 77.222203] dump_stack_lvl+0x54/0x6c [ 77.222633] print_address_description+0x7c/0x1ec [ 77.223173] print_report+0x50/0x68 [ 77.223609] kasan_report+0xac/0x100 [ 77.224070] kasan_check_range+0x260/0x2a0 [ 77.224603] __kasan_check_write+0x2c/0x3c [ 77.225213] kasan_bitops_generic+0x260/0xb8c [ 77.225726] kunit_try_run_case+0x80/0x184 [ 77.226195] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.226789] kthread+0x16c/0x21c [ 77.227237] ret_from_fork+0x10/0x20 [ 77.227645] [ 77.227848] Allocated by task 165: [ 77.228217] kasan_set_track+0x4c/0x80 [ 77.228906] kasan_save_alloc_info+0x28/0x34 [ 77.229366] __kasan_kmalloc+0x88/0xa0 [ 77.229886] kmalloc_trace+0x54/0x68 [ 77.230292] kasan_bitops_generic+0x4c/0xb8c [ 77.230797] kunit_try_run_case+0x80/0x184 [ 77.231262] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.231874] kthread+0x16c/0x21c [ 77.232289] ret_from_fork+0x10/0x20 [ 77.232860] [ 77.233088] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.233088] which belongs to the cache kmalloc-128 of size 128 [ 77.234051] The buggy address is located 8 bytes inside of [ 77.234051] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.234975] [ 77.235215] The buggy address belongs to the physical page: [ 77.235678] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.236451] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.237657] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.238324] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.238920] page dumped because: kasan: bad access detected [ 77.239396] [ 77.239597] Memory state around the buggy address: [ 77.240022] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.240798] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.241397] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.241987] ^ [ 77.242364] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.243008] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.243603] ================================================================== [ 77.244485] ================================================================== [ 77.245384] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x2ac/0xb8c [ 77.246116] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.246743] [ 77.246962] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.247724] Hardware name: linux,dummy-virt (DT) [ 77.248149] Call trace: [ 77.248428] dump_backtrace+0xf8/0x118 [ 77.249050] show_stack+0x18/0x24 [ 77.249502] __dump_stack+0x28/0x38 [ 77.249929] dump_stack_lvl+0x54/0x6c [ 77.250389] print_address_description+0x7c/0x1ec [ 77.250939] print_report+0x50/0x68 [ 77.251400] kasan_report+0xac/0x100 [ 77.251851] kasan_check_range+0x260/0x2a0 [ 77.252342] __kasan_check_write+0x2c/0x3c [ 77.253039] kasan_bitops_generic+0x2ac/0xb8c [ 77.253573] kunit_try_run_case+0x80/0x184 [ 77.254050] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.254638] kthread+0x16c/0x21c [ 77.255052] ret_from_fork+0x10/0x20 [ 77.255490] [ 77.255679] Allocated by task 165: [ 77.256052] kasan_set_track+0x4c/0x80 [ 77.256568] kasan_save_alloc_info+0x28/0x34 [ 77.257094] __kasan_kmalloc+0x88/0xa0 [ 77.257544] kmalloc_trace+0x54/0x68 [ 77.258006] kasan_bitops_generic+0x4c/0xb8c [ 77.258466] kunit_try_run_case+0x80/0x184 [ 77.258940] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.259501] kthread+0x16c/0x21c [ 77.259949] ret_from_fork+0x10/0x20 [ 77.260358] [ 77.260575] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.260575] which belongs to the cache kmalloc-128 of size 128 [ 77.261665] The buggy address is located 8 bytes inside of [ 77.261665] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.262542] [ 77.262765] The buggy address belongs to the physical page: [ 77.263196] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.264044] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.264882] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.265557] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.266200] page dumped because: kasan: bad access detected [ 77.266678] [ 77.266874] Memory state around the buggy address: [ 77.267340] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.267988] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.268630] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.269239] ^ [ 77.269605] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.270227] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.271352] ================================================================== [ 77.387870] ================================================================== [ 77.388406] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x3fc/0xb8c [ 77.389226] Read of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.389839] [ 77.390078] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.390951] Hardware name: linux,dummy-virt (DT) [ 77.391365] Call trace: [ 77.391649] dump_backtrace+0xf8/0x118 [ 77.392141] show_stack+0x18/0x24 [ 77.392567] __dump_stack+0x28/0x38 [ 77.393131] dump_stack_lvl+0x54/0x6c [ 77.393542] print_address_description+0x7c/0x1ec [ 77.394091] print_report+0x50/0x68 [ 77.394568] kasan_report+0xac/0x100 [ 77.395010] __asan_load8+0xa8/0xac [ 77.395431] kasan_bitops_generic+0x3fc/0xb8c [ 77.395928] kunit_try_run_case+0x80/0x184 [ 77.396388] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.397107] kthread+0x16c/0x21c [ 77.397549] ret_from_fork+0x10/0x20 [ 77.397978] [ 77.398184] Allocated by task 165: [ 77.398521] kasan_set_track+0x4c/0x80 [ 77.398969] kasan_save_alloc_info+0x28/0x34 [ 77.399426] __kasan_kmalloc+0x88/0xa0 [ 77.399894] kmalloc_trace+0x54/0x68 [ 77.400338] kasan_bitops_generic+0x4c/0xb8c [ 77.401035] kunit_try_run_case+0x80/0x184 [ 77.401501] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.402089] kthread+0x16c/0x21c [ 77.402557] ret_from_fork+0x10/0x20 [ 77.403135] [ 77.403411] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.403411] which belongs to the cache kmalloc-128 of size 128 [ 77.404261] The buggy address is located 8 bytes inside of [ 77.404261] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.405617] [ 77.405910] The buggy address belongs to the physical page: [ 77.406577] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.407694] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.408634] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.410022] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.410813] page dumped because: kasan: bad access detected [ 77.411183] [ 77.411366] Memory state around the buggy address: [ 77.411715] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.412321] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.413160] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.413921] ^ [ 77.414279] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.414924] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.415507] ================================================================== [ 77.189507] ================================================================== [ 77.190106] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x24c/0xb8c [ 77.190879] Read of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.191499] [ 77.191720] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.192460] Hardware name: linux,dummy-virt (DT) [ 77.193197] Call trace: [ 77.193474] dump_backtrace+0xf8/0x118 [ 77.193962] show_stack+0x18/0x24 [ 77.194392] __dump_stack+0x28/0x38 [ 77.194812] dump_stack_lvl+0x54/0x6c [ 77.195231] print_address_description+0x7c/0x1ec [ 77.195772] print_report+0x50/0x68 [ 77.196216] kasan_report+0xac/0x100 [ 77.196832] __asan_load8+0xa8/0xac [ 77.197237] kasan_bitops_generic+0x24c/0xb8c [ 77.197707] kunit_try_run_case+0x80/0x184 [ 77.198176] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.198742] kthread+0x16c/0x21c [ 77.199229] ret_from_fork+0x10/0x20 [ 77.199673] [ 77.199897] Allocated by task 165: [ 77.200246] kasan_set_track+0x4c/0x80 [ 77.200949] kasan_save_alloc_info+0x28/0x34 [ 77.201451] __kasan_kmalloc+0x88/0xa0 [ 77.201908] kmalloc_trace+0x54/0x68 [ 77.202321] kasan_bitops_generic+0x4c/0xb8c [ 77.202813] kunit_try_run_case+0x80/0x184 [ 77.203290] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.203884] kthread+0x16c/0x21c [ 77.204294] ret_from_fork+0x10/0x20 [ 77.204875] [ 77.205073] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.205073] which belongs to the cache kmalloc-128 of size 128 [ 77.206023] The buggy address is located 8 bytes inside of [ 77.206023] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.206922] [ 77.207154] The buggy address belongs to the physical page: [ 77.207614] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.208414] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.209376] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.210063] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.210686] page dumped because: kasan: bad access detected [ 77.211163] [ 77.211358] Memory state around the buggy address: [ 77.211828] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.212477] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.213774] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.214352] ^ [ 77.214728] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.215376] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.216007] ================================================================== [ 77.416309] ================================================================== [ 77.417005] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x458/0xb8c [ 77.417713] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.418321] [ 77.418558] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.419467] Hardware name: linux,dummy-virt (DT) [ 77.419895] Call trace: [ 77.420159] dump_backtrace+0xf8/0x118 [ 77.420831] show_stack+0x18/0x24 [ 77.421302] __dump_stack+0x28/0x38 [ 77.421739] dump_stack_lvl+0x54/0x6c [ 77.422180] print_address_description+0x7c/0x1ec [ 77.422714] print_report+0x50/0x68 [ 77.423156] kasan_report+0xac/0x100 [ 77.423627] kasan_check_range+0x260/0x2a0 [ 77.424107] __kasan_check_write+0x2c/0x3c [ 77.424554] kasan_bitops_generic+0x458/0xb8c [ 77.425074] kunit_try_run_case+0x80/0x184 [ 77.425527] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.426150] kthread+0x16c/0x21c [ 77.426565] ret_from_fork+0x10/0x20 [ 77.427022] [ 77.427215] Allocated by task 165: [ 77.427549] kasan_set_track+0x4c/0x80 [ 77.428152] kasan_save_alloc_info+0x28/0x34 [ 77.428645] __kasan_kmalloc+0x88/0xa0 [ 77.429290] kmalloc_trace+0x54/0x68 [ 77.429726] kasan_bitops_generic+0x4c/0xb8c [ 77.430220] kunit_try_run_case+0x80/0x184 [ 77.430671] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.431258] kthread+0x16c/0x21c [ 77.431664] ret_from_fork+0x10/0x20 [ 77.432108] [ 77.432316] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.432316] which belongs to the cache kmalloc-128 of size 128 [ 77.433413] The buggy address is located 8 bytes inside of [ 77.433413] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.434335] [ 77.434560] The buggy address belongs to the physical page: [ 77.435042] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.435804] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.436481] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.437196] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.437822] page dumped because: kasan: bad access detected [ 77.438291] [ 77.438486] Memory state around the buggy address: [ 77.439445] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.440092] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.440775] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.441479] ^ [ 77.441868] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.442494] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.443136] ================================================================== [ 77.161489] ================================================================== [ 77.162034] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x244/0xb8c [ 77.163119] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.163784] [ 77.163999] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.165137] Hardware name: linux,dummy-virt (DT) [ 77.165544] Call trace: [ 77.165812] dump_backtrace+0xf8/0x118 [ 77.166346] show_stack+0x18/0x24 [ 77.166791] __dump_stack+0x28/0x38 [ 77.167202] dump_stack_lvl+0x54/0x6c [ 77.167622] print_address_description+0x7c/0x1ec [ 77.168166] print_report+0x50/0x68 [ 77.168781] kasan_report+0xac/0x100 [ 77.169239] kasan_check_range+0x260/0x2a0 [ 77.169739] __kasan_check_write+0x2c/0x3c [ 77.170185] kasan_bitops_generic+0x244/0xb8c [ 77.170666] kunit_try_run_case+0x80/0x184 [ 77.171149] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.171718] kthread+0x16c/0x21c [ 77.172132] ret_from_fork+0x10/0x20 [ 77.172566] [ 77.172792] Allocated by task 165: [ 77.173140] kasan_set_track+0x4c/0x80 [ 77.173629] kasan_save_alloc_info+0x28/0x34 [ 77.174168] __kasan_kmalloc+0x88/0xa0 [ 77.174610] kmalloc_trace+0x54/0x68 [ 77.175225] kasan_bitops_generic+0x4c/0xb8c [ 77.175691] kunit_try_run_case+0x80/0x184 [ 77.176170] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.176934] kthread+0x16c/0x21c [ 77.177354] ret_from_fork+0x10/0x20 [ 77.177809] [ 77.178034] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.178034] which belongs to the cache kmalloc-128 of size 128 [ 77.179004] The buggy address is located 8 bytes inside of [ 77.179004] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.179877] [ 77.180111] The buggy address belongs to the physical page: [ 77.180569] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.181367] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.182062] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.182738] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.183497] page dumped because: kasan: bad access detected [ 77.183989] [ 77.184180] Memory state around the buggy address: [ 77.184615] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.185737] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.186377] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.186980] ^ [ 77.187353] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.187980] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.188691] ================================================================== [ 77.106406] ================================================================== [ 77.107224] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x19c/0xb8c [ 77.107916] Read of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.108499] [ 77.108959] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.109741] Hardware name: linux,dummy-virt (DT) [ 77.110166] Call trace: [ 77.110438] dump_backtrace+0xf8/0x118 [ 77.110917] show_stack+0x18/0x24 [ 77.111342] __dump_stack+0x28/0x38 [ 77.111801] dump_stack_lvl+0x54/0x6c [ 77.112220] print_address_description+0x7c/0x1ec [ 77.112942] print_report+0x50/0x68 [ 77.113437] kasan_report+0xac/0x100 [ 77.113933] __asan_load8+0xa8/0xac [ 77.114358] kasan_bitops_generic+0x19c/0xb8c [ 77.114836] kunit_try_run_case+0x80/0x184 [ 77.115306] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.115881] kthread+0x16c/0x21c [ 77.116307] ret_from_fork+0x10/0x20 [ 77.116931] [ 77.117138] Allocated by task 165: [ 77.117463] kasan_set_track+0x4c/0x80 [ 77.117930] kasan_save_alloc_info+0x28/0x34 [ 77.118374] __kasan_kmalloc+0x88/0xa0 [ 77.118887] kmalloc_trace+0x54/0x68 [ 77.119304] kasan_bitops_generic+0x4c/0xb8c [ 77.119767] kunit_try_run_case+0x80/0x184 [ 77.120238] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.120952] kthread+0x16c/0x21c [ 77.121374] ret_from_fork+0x10/0x20 [ 77.121824] [ 77.122060] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.122060] which belongs to the cache kmalloc-128 of size 128 [ 77.122988] The buggy address is located 8 bytes inside of [ 77.122988] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.123915] [ 77.124135] The buggy address belongs to the physical page: [ 77.124597] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.125376] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.126054] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.126725] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.127494] page dumped because: kasan: bad access detected [ 77.127989] [ 77.128203] Memory state around the buggy address: [ 77.128638] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.129785] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.130419] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.131034] ^ [ 77.131409] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.132034] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.132802] ================================================================== [ 77.272130] ================================================================== [ 77.272675] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x2fc/0xb8c [ 77.273589] Read of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165 [ 77.274213] [ 77.274438] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.275174] Hardware name: linux,dummy-virt (DT) [ 77.275608] Call trace: [ 77.275898] dump_backtrace+0xf8/0x118 [ 77.276394] show_stack+0x18/0x24 [ 77.276980] __dump_stack+0x28/0x38 [ 77.277407] dump_stack_lvl+0x54/0x6c [ 77.277841] print_address_description+0x7c/0x1ec [ 77.278375] print_report+0x50/0x68 [ 77.278818] kasan_report+0xac/0x100 [ 77.279256] __asan_load8+0xa8/0xac [ 77.279676] kasan_bitops_generic+0x2fc/0xb8c [ 77.280159] kunit_try_run_case+0x80/0x184 [ 77.280779] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.281381] kthread+0x16c/0x21c [ 77.281795] ret_from_fork+0x10/0x20 [ 77.282234] [ 77.282430] Allocated by task 165: [ 77.282796] kasan_set_track+0x4c/0x80 [ 77.283286] kasan_save_alloc_info+0x28/0x34 [ 77.283731] __kasan_kmalloc+0x88/0xa0 [ 77.284229] kmalloc_trace+0x54/0x68 [ 77.284825] kasan_bitops_generic+0x4c/0xb8c [ 77.285302] kunit_try_run_case+0x80/0x184 [ 77.285773] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.286343] kthread+0x16c/0x21c [ 77.286753] ret_from_fork+0x10/0x20 [ 77.287203] [ 77.287407] The buggy address belongs to the object at ffff0000c5a87c00 [ 77.287407] which belongs to the cache kmalloc-128 of size 128 [ 77.288379] The buggy address is located 8 bytes inside of [ 77.288379] 128-byte region [ffff0000c5a87c00, ffff0000c5a87c80) [ 77.289952] [ 77.290191] The buggy address belongs to the physical page: [ 77.290630] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 77.291460] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.292127] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.293050] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.293644] page dumped because: kasan: bad access detected [ 77.294097] [ 77.294291] Memory state around the buggy address: [ 77.294717] ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.295368] ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.296003] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.296601] ^ [ 77.296955] ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.297588] ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.298203] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-strnlen
[ 76.985504] ================================================================== [ 76.986007] BUG: KASAN: use-after-free in strnlen+0x3c/0x74 [ 76.986632] Read of size 1 at addr ffff0000c5abca10 by task kunit_try_catch/164 [ 76.987233] [ 76.987475] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.988262] Hardware name: linux,dummy-virt (DT) [ 76.988674] Call trace: [ 76.989439] dump_backtrace+0xf8/0x118 [ 76.989922] show_stack+0x18/0x24 [ 76.990369] __dump_stack+0x28/0x38 [ 76.990819] dump_stack_lvl+0x54/0x6c [ 76.991268] print_address_description+0x7c/0x1ec [ 76.991802] print_report+0x50/0x68 [ 76.992244] kasan_report+0xac/0x100 [ 76.992979] __asan_load1+0x6c/0x70 [ 76.993443] strnlen+0x3c/0x74 [ 76.993869] kasan_strings+0x234/0x404 [ 76.994306] kunit_try_run_case+0x80/0x184 [ 76.994818] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.995402] kthread+0x16c/0x21c [ 76.995856] ret_from_fork+0x10/0x20 [ 76.996274] [ 76.996480] Allocated by task 164: [ 76.997354] kasan_set_track+0x4c/0x80 [ 76.997840] kasan_save_alloc_info+0x28/0x34 [ 76.998335] __kasan_kmalloc+0x88/0xa0 [ 76.998831] kmalloc_trace+0x54/0x68 [ 76.999287] kasan_strings+0x48/0x404 [ 76.999716] kunit_try_run_case+0x80/0x184 [ 77.000180] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.000959] kthread+0x16c/0x21c [ 77.001380] ret_from_fork+0x10/0x20 [ 77.001833] [ 77.002015] Freed by task 164: [ 77.002366] kasan_set_track+0x4c/0x80 [ 77.002978] kasan_save_free_info+0x3c/0x60 [ 77.003433] ____kasan_slab_free+0xe8/0x140 [ 77.003919] __kasan_slab_free+0x18/0x28 [ 77.004391] __kmem_cache_free+0xdc/0x284 [ 77.005281] kfree+0x60/0x74 [ 77.005679] kasan_strings+0x90/0x404 [ 77.006113] kunit_try_run_case+0x80/0x184 [ 77.006561] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.007128] kthread+0x16c/0x21c [ 77.007527] ret_from_fork+0x10/0x20 [ 77.007992] [ 77.008176] The buggy address belongs to the object at ffff0000c5abca00 [ 77.008176] which belongs to the cache kmalloc-128 of size 128 [ 77.009355] The buggy address is located 16 bytes inside of [ 77.009355] 128-byte region [ffff0000c5abca00, ffff0000c5abca80) [ 77.010237] [ 77.010461] The buggy address belongs to the physical page: [ 77.010918] page:00000000b0163b2b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abc [ 77.011702] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 77.012524] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 77.013654] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 77.014305] page dumped because: kasan: bad access detected [ 77.014785] [ 77.014970] Memory state around the buggy address: [ 77.015424] ffff0000c5abc900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 77.016066] ffff0000c5abc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.016984] >ffff0000c5abca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 77.017552] ^ [ 77.017952] ffff0000c5abca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.018585] ffff0000c5abcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.019181] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-strlen
[ 76.947148] ================================================================== [ 76.947685] BUG: KASAN: use-after-free in strlen+0x28/0x50 [ 76.948285] Read of size 1 at addr ffff0000c5abca10 by task kunit_try_catch/164 [ 76.949009] [ 76.949210] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.950482] Hardware name: linux,dummy-virt (DT) [ 76.950935] Call trace: [ 76.951200] dump_backtrace+0xf8/0x118 [ 76.951695] show_stack+0x18/0x24 [ 76.952133] __dump_stack+0x28/0x38 [ 76.952567] dump_stack_lvl+0x54/0x6c [ 76.953043] print_address_description+0x7c/0x1ec [ 76.953564] print_report+0x50/0x68 [ 76.954004] kasan_report+0xac/0x100 [ 76.954441] __asan_load1+0x6c/0x70 [ 76.955909] strlen+0x28/0x50 [ 76.956270] kasan_strings+0x1e8/0x404 [ 76.956677] kunit_try_run_case+0x80/0x184 [ 76.957153] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.958319] kthread+0x16c/0x21c [ 76.958715] ret_from_fork+0x10/0x20 [ 76.959491] [ 76.959895] Allocated by task 164: [ 76.960190] kasan_set_track+0x4c/0x80 [ 76.960632] kasan_save_alloc_info+0x28/0x34 [ 76.961670] __kasan_kmalloc+0x88/0xa0 [ 76.962382] kmalloc_trace+0x54/0x68 [ 76.963010] kasan_strings+0x48/0x404 [ 76.963642] kunit_try_run_case+0x80/0x184 [ 76.964335] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.965954] kthread+0x16c/0x21c [ 76.966563] ret_from_fork+0x10/0x20 [ 76.967178] [ 76.967482] Freed by task 164: [ 76.967909] kasan_set_track+0x4c/0x80 [ 76.968341] kasan_save_free_info+0x3c/0x60 [ 76.968784] ____kasan_slab_free+0xe8/0x140 [ 76.969345] __kasan_slab_free+0x18/0x28 [ 76.969863] __kmem_cache_free+0xdc/0x284 [ 76.970333] kfree+0x60/0x74 [ 76.970744] kasan_strings+0x90/0x404 [ 76.971201] kunit_try_run_case+0x80/0x184 [ 76.971746] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.972369] kthread+0x16c/0x21c [ 76.972785] ret_from_fork+0x10/0x20 [ 76.973267] [ 76.973475] The buggy address belongs to the object at ffff0000c5abca00 [ 76.973475] which belongs to the cache kmalloc-128 of size 128 [ 76.974848] The buggy address is located 16 bytes inside of [ 76.974848] 128-byte region [ffff0000c5abca00, ffff0000c5abca80) [ 76.975738] [ 76.975972] The buggy address belongs to the physical page: [ 76.976447] page:00000000b0163b2b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abc [ 76.977439] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.978166] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.978824] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.979431] page dumped because: kasan: bad access detected [ 76.979888] [ 76.980095] Memory state around the buggy address: [ 76.980510] ffff0000c5abc900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.981305] ffff0000c5abc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.982274] >ffff0000c5abca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.982890] ^ [ 76.983271] ffff0000c5abca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.983872] ffff0000c5abcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.984494] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-strncmp
[ 76.912309] ================================================================== [ 76.913153] BUG: KASAN: use-after-free in strncmp+0x3c/0xa0 [ 76.913747] Read of size 1 at addr ffff0000c5abca10 by task kunit_try_catch/164 [ 76.914334] [ 76.914567] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.915298] Hardware name: linux,dummy-virt (DT) [ 76.915698] Call trace: [ 76.916001] dump_backtrace+0xf8/0x118 [ 76.916462] show_stack+0x18/0x24 [ 76.916908] __dump_stack+0x28/0x38 [ 76.917324] dump_stack_lvl+0x54/0x6c [ 76.917744] print_address_description+0x7c/0x1ec [ 76.918286] print_report+0x50/0x68 [ 76.918724] kasan_report+0xac/0x100 [ 76.919680] __asan_load1+0x6c/0x70 [ 76.920137] strncmp+0x3c/0xa0 [ 76.920535] kasan_strings+0x1a0/0x404 [ 76.921218] kunit_try_run_case+0x80/0x184 [ 76.921720] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.922317] kthread+0x16c/0x21c [ 76.922749] ret_from_fork+0x10/0x20 [ 76.923167] [ 76.923372] Allocated by task 164: [ 76.923693] kasan_set_track+0x4c/0x80 [ 76.924144] kasan_save_alloc_info+0x28/0x34 [ 76.925091] __kasan_kmalloc+0x88/0xa0 [ 76.925561] kmalloc_trace+0x54/0x68 [ 76.926018] kasan_strings+0x48/0x404 [ 76.926447] kunit_try_run_case+0x80/0x184 [ 76.926947] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.927510] kthread+0x16c/0x21c [ 76.927924] ret_from_fork+0x10/0x20 [ 76.928368] [ 76.928551] Freed by task 164: [ 76.928926] kasan_set_track+0x4c/0x80 [ 76.929416] kasan_save_free_info+0x3c/0x60 [ 76.929860] ____kasan_slab_free+0xe8/0x140 [ 76.930329] __kasan_slab_free+0x18/0x28 [ 76.931052] __kmem_cache_free+0xdc/0x284 [ 76.931515] kfree+0x60/0x74 [ 76.931894] kasan_strings+0x90/0x404 [ 76.932364] kunit_try_run_case+0x80/0x184 [ 76.933293] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.933941] kthread+0x16c/0x21c [ 76.934388] ret_from_fork+0x10/0x20 [ 76.934840] [ 76.935058] The buggy address belongs to the object at ffff0000c5abca00 [ 76.935058] which belongs to the cache kmalloc-128 of size 128 [ 76.936045] The buggy address is located 16 bytes inside of [ 76.936045] 128-byte region [ffff0000c5abca00, ffff0000c5abca80) [ 76.937262] [ 76.937483] The buggy address belongs to the physical page: [ 76.937946] page:00000000b0163b2b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abc [ 76.938720] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.939421] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.940109] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.941278] page dumped because: kasan: bad access detected [ 76.941720] [ 76.941952] Memory state around the buggy address: [ 76.942360] ffff0000c5abc900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.943025] ffff0000c5abc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.943645] >ffff0000c5abca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.944259] ^ [ 76.944876] ffff0000c5abca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.945492] ffff0000c5abcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.946128] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-strcmp
[ 76.877662] ================================================================== [ 76.878250] BUG: KASAN: use-after-free in strcmp+0x30/0x84 [ 76.878793] Read of size 1 at addr ffff0000c5abca10 by task kunit_try_catch/164 [ 76.879388] [ 76.879614] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.880360] Hardware name: linux,dummy-virt (DT) [ 76.881042] Call trace: [ 76.881320] dump_backtrace+0xf8/0x118 [ 76.881790] show_stack+0x18/0x24 [ 76.882248] __dump_stack+0x28/0x38 [ 76.882657] dump_stack_lvl+0x54/0x6c [ 76.883129] print_address_description+0x7c/0x1ec [ 76.883697] print_report+0x50/0x68 [ 76.884178] kasan_report+0xac/0x100 [ 76.884634] __asan_load1+0x6c/0x70 [ 76.885161] strcmp+0x30/0x84 [ 76.885551] kasan_strings+0x148/0x404 [ 76.885992] kunit_try_run_case+0x80/0x184 [ 76.886460] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.887537] kthread+0x16c/0x21c [ 76.887982] ret_from_fork+0x10/0x20 [ 76.888446] [ 76.888636] Allocated by task 164: [ 76.889221] kasan_set_track+0x4c/0x80 [ 76.889718] kasan_save_alloc_info+0x28/0x34 [ 76.890181] __kasan_kmalloc+0x88/0xa0 [ 76.890683] kmalloc_trace+0x54/0x68 [ 76.891110] kasan_strings+0x48/0x404 [ 76.891571] kunit_try_run_case+0x80/0x184 [ 76.892047] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.893088] kthread+0x16c/0x21c [ 76.893522] ret_from_fork+0x10/0x20 [ 76.893995] [ 76.894181] Freed by task 164: [ 76.894516] kasan_set_track+0x4c/0x80 [ 76.895013] kasan_save_free_info+0x3c/0x60 [ 76.895457] ____kasan_slab_free+0xe8/0x140 [ 76.895983] __kasan_slab_free+0x18/0x28 [ 76.896455] __kmem_cache_free+0xdc/0x284 [ 76.897077] kfree+0x60/0x74 [ 76.897496] kasan_strings+0x90/0x404 [ 76.897974] kunit_try_run_case+0x80/0x184 [ 76.898453] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.899187] kthread+0x16c/0x21c [ 76.899603] ret_from_fork+0x10/0x20 [ 76.900057] [ 76.900248] The buggy address belongs to the object at ffff0000c5abca00 [ 76.900248] which belongs to the cache kmalloc-128 of size 128 [ 76.901686] The buggy address is located 16 bytes inside of [ 76.901686] 128-byte region [ffff0000c5abca00, ffff0000c5abca80) [ 76.902588] [ 76.902819] The buggy address belongs to the physical page: [ 76.903270] page:00000000b0163b2b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abc [ 76.904055] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.905013] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.905705] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.906362] page dumped because: kasan: bad access detected [ 76.906846] [ 76.907043] Memory state around the buggy address: [ 76.907475] ffff0000c5abc900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.908123] ffff0000c5abc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.909241] >ffff0000c5abca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.909825] ^ [ 76.910230] ffff0000c5abca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.910890] ffff0000c5abcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.911512] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-strrchr
[ 76.842082] ================================================================== [ 76.842651] BUG: KASAN: use-after-free in strrchr+0x34/0x68 [ 76.843365] Read of size 1 at addr ffff0000c5abca10 by task kunit_try_catch/164 [ 76.843990] [ 76.844232] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.845009] Hardware name: linux,dummy-virt (DT) [ 76.845601] Call trace: [ 76.845888] dump_backtrace+0xf8/0x118 [ 76.846381] show_stack+0x18/0x24 [ 76.847208] __dump_stack+0x28/0x38 [ 76.847660] dump_stack_lvl+0x54/0x6c [ 76.848145] print_address_description+0x7c/0x1ec [ 76.848974] print_report+0x50/0x68 [ 76.849426] kasan_report+0xac/0x100 [ 76.849886] __asan_load1+0x6c/0x70 [ 76.850363] strrchr+0x34/0x68 [ 76.850721] kasan_strings+0xf8/0x404 [ 76.851156] kunit_try_run_case+0x80/0x184 [ 76.851608] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.852193] kthread+0x16c/0x21c [ 76.853052] ret_from_fork+0x10/0x20 [ 76.853490] [ 76.853678] Allocated by task 164: [ 76.854061] kasan_set_track+0x4c/0x80 [ 76.854511] kasan_save_alloc_info+0x28/0x34 [ 76.854994] __kasan_kmalloc+0x88/0xa0 [ 76.855441] kmalloc_trace+0x54/0x68 [ 76.855901] kasan_strings+0x48/0x404 [ 76.856368] kunit_try_run_case+0x80/0x184 [ 76.857119] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.857705] kthread+0x16c/0x21c [ 76.858159] ret_from_fork+0x10/0x20 [ 76.858630] [ 76.858858] Freed by task 164: [ 76.859201] kasan_set_track+0x4c/0x80 [ 76.859689] kasan_save_free_info+0x3c/0x60 [ 76.860146] ____kasan_slab_free+0xe8/0x140 [ 76.860686] __kasan_slab_free+0x18/0x28 [ 76.861163] __kmem_cache_free+0xdc/0x284 [ 76.861625] kfree+0x60/0x74 [ 76.862000] kasan_strings+0x90/0x404 [ 76.862463] kunit_try_run_case+0x80/0x184 [ 76.863420] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.864060] kthread+0x16c/0x21c [ 76.864472] ret_from_fork+0x10/0x20 [ 76.865158] [ 76.865357] The buggy address belongs to the object at ffff0000c5abca00 [ 76.865357] which belongs to the cache kmalloc-128 of size 128 [ 76.866348] The buggy address is located 16 bytes inside of [ 76.866348] 128-byte region [ffff0000c5abca00, ffff0000c5abca80) [ 76.867276] [ 76.867517] The buggy address belongs to the physical page: [ 76.867988] page:00000000b0163b2b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abc [ 76.869332] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.870010] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.870701] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.871346] page dumped because: kasan: bad access detected [ 76.871826] [ 76.872025] Memory state around the buggy address: [ 76.872471] ffff0000c5abc900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.873118] ffff0000c5abc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.873751] >ffff0000c5abca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.874590] ^ [ 76.874967] ffff0000c5abca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.875609] ffff0000c5abcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.876242] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-strchr
[ 76.803113] ================================================================== [ 76.803852] BUG: KASAN: use-after-free in strchr+0x20/0x6c [ 76.804333] Read of size 1 at addr ffff0000c5abca10 by task kunit_try_catch/164 [ 76.805669] [ 76.805998] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.807301] Hardware name: linux,dummy-virt (DT) [ 76.808117] Call trace: [ 76.808561] dump_backtrace+0xf8/0x118 [ 76.809335] show_stack+0x18/0x24 [ 76.809984] __dump_stack+0x28/0x38 [ 76.810609] dump_stack_lvl+0x54/0x6c [ 76.811256] print_address_description+0x7c/0x1ec [ 76.812046] print_report+0x50/0x68 [ 76.812753] kasan_report+0xac/0x100 [ 76.813691] __asan_load1+0x6c/0x70 [ 76.814381] strchr+0x20/0x6c [ 76.814942] kasan_strings+0xa8/0x404 [ 76.815589] kunit_try_run_case+0x80/0x184 [ 76.816308] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.817309] kthread+0x16c/0x21c [ 76.818101] ret_from_fork+0x10/0x20 [ 76.818501] [ 76.818688] Allocated by task 164: [ 76.818990] kasan_set_track+0x4c/0x80 [ 76.819408] kasan_save_alloc_info+0x28/0x34 [ 76.819831] __kasan_kmalloc+0x88/0xa0 [ 76.820339] kmalloc_trace+0x54/0x68 [ 76.820880] kasan_strings+0x48/0x404 [ 76.821329] kunit_try_run_case+0x80/0x184 [ 76.822047] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.822643] kthread+0x16c/0x21c [ 76.823113] ret_from_fork+0x10/0x20 [ 76.823488] [ 76.823667] Freed by task 164: [ 76.824125] kasan_set_track+0x4c/0x80 [ 76.824629] kasan_save_free_info+0x3c/0x60 [ 76.825129] ____kasan_slab_free+0xe8/0x140 [ 76.825686] __kasan_slab_free+0x18/0x28 [ 76.826203] __kmem_cache_free+0xdc/0x284 [ 76.826682] kfree+0x60/0x74 [ 76.827106] kasan_strings+0x90/0x404 [ 76.827580] kunit_try_run_case+0x80/0x184 [ 76.828041] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.828619] kthread+0x16c/0x21c [ 76.829066] ret_from_fork+0x10/0x20 [ 76.829500] [ 76.829698] The buggy address belongs to the object at ffff0000c5abca00 [ 76.829698] which belongs to the cache kmalloc-128 of size 128 [ 76.830656] The buggy address is located 16 bytes inside of [ 76.830656] 128-byte region [ffff0000c5abca00, ffff0000c5abca80) [ 76.832021] [ 76.832232] The buggy address belongs to the physical page: [ 76.832890] page:00000000b0163b2b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abc [ 76.833649] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.834325] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.835171] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.835818] page dumped because: kasan: bad access detected [ 76.836293] [ 76.836483] Memory state around the buggy address: [ 76.837456] ffff0000c5abc900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.838118] ffff0000c5abc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.838778] >ffff0000c5abca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.839411] ^ [ 76.839812] ffff0000c5abca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.840442] ffff0000c5abcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.841202] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 76.766266] ================================================================== [ 76.766988] BUG: KASAN: slab-out-of-bounds in memcmp+0x8c/0xd8 [ 76.768004] Read of size 1 at addr ffff0000c5a87618 by task kunit_try_catch/163 [ 76.768806] [ 76.769166] CPU: 1 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.770046] Hardware name: linux,dummy-virt (DT) [ 76.770625] Call trace: [ 76.770958] dump_backtrace+0xf8/0x118 [ 76.771482] show_stack+0x18/0x24 [ 76.771984] __dump_stack+0x28/0x38 [ 76.772488] dump_stack_lvl+0x54/0x6c [ 76.773135] print_address_description+0x7c/0x1ec [ 76.773953] print_report+0x50/0x68 [ 76.774432] kasan_report+0xac/0x100 [ 76.774914] __asan_load1+0x6c/0x70 [ 76.775346] memcmp+0x8c/0xd8 [ 76.775719] kasan_memcmp+0xc8/0x178 [ 76.776169] kunit_try_run_case+0x80/0x184 [ 76.776654] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.777228] kthread+0x16c/0x21c [ 76.777631] ret_from_fork+0x10/0x20 [ 76.778109] [ 76.778378] Allocated by task 163: [ 76.778798] kasan_set_track+0x4c/0x80 [ 76.779225] kasan_save_alloc_info+0x28/0x34 [ 76.779632] __kasan_kmalloc+0x88/0xa0 [ 76.780288] kmalloc_trace+0x54/0x68 [ 76.780924] kasan_memcmp+0x58/0x178 [ 76.781558] kunit_try_run_case+0x80/0x184 [ 76.782471] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.783296] kthread+0x16c/0x21c [ 76.783875] ret_from_fork+0x10/0x20 [ 76.784458] [ 76.784734] The buggy address belongs to the object at ffff0000c5a87600 [ 76.784734] which belongs to the cache kmalloc-128 of size 128 [ 76.786132] The buggy address is located 24 bytes inside of [ 76.786132] 128-byte region [ffff0000c5a87600, ffff0000c5a87680) [ 76.787464] [ 76.787737] The buggy address belongs to the physical page: [ 76.788301] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 76.789885] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.790847] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.791809] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.792302] page dumped because: kasan: bad access detected [ 76.792674] [ 76.792955] Memory state around the buggy address: [ 76.793566] ffff0000c5a87500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.794447] ffff0000c5a87580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.795345] >ffff0000c5a87600: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.796206] ^ [ 76.797360] ffff0000c5a87680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.798271] ffff0000c5a87700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.799130] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memchr
[ 76.728121] ================================================================== [ 76.728973] BUG: KASAN: slab-out-of-bounds in memchr+0x34/0x64 [ 76.730182] Read of size 1 at addr ffff0000c5a87518 by task kunit_try_catch/162 [ 76.731070] [ 76.731276] CPU: 1 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.732056] Hardware name: linux,dummy-virt (DT) [ 76.732753] Call trace: [ 76.733289] dump_backtrace+0xf8/0x118 [ 76.734001] show_stack+0x18/0x24 [ 76.734637] __dump_stack+0x28/0x38 [ 76.735269] dump_stack_lvl+0x54/0x6c [ 76.735900] print_address_description+0x7c/0x1ec [ 76.736664] print_report+0x50/0x68 [ 76.737435] kasan_report+0xac/0x100 [ 76.738096] __asan_load1+0x6c/0x70 [ 76.738729] memchr+0x34/0x64 [ 76.739264] kasan_memchr+0xa8/0x158 [ 76.739795] kunit_try_run_case+0x80/0x184 [ 76.740235] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.740736] kthread+0x16c/0x21c [ 76.741142] ret_from_fork+0x10/0x20 [ 76.741607] [ 76.741869] Allocated by task 162: [ 76.742268] kasan_set_track+0x4c/0x80 [ 76.742769] kasan_save_alloc_info+0x28/0x34 [ 76.743264] __kasan_kmalloc+0x88/0xa0 [ 76.743753] kmalloc_trace+0x54/0x68 [ 76.744285] kasan_memchr+0x48/0x158 [ 76.745116] kunit_try_run_case+0x80/0x184 [ 76.746321] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.747166] kthread+0x16c/0x21c [ 76.747779] ret_from_fork+0x10/0x20 [ 76.748378] [ 76.748669] The buggy address belongs to the object at ffff0000c5a87500 [ 76.748669] which belongs to the cache kmalloc-128 of size 128 [ 76.749411] The buggy address is located 24 bytes inside of [ 76.749411] 128-byte region [ffff0000c5a87500, ffff0000c5a87580) [ 76.750289] [ 76.750529] The buggy address belongs to the physical page: [ 76.751040] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 76.751947] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.752659] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.753386] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.754018] page dumped because: kasan: bad access detected [ 76.754491] [ 76.754675] Memory state around the buggy address: [ 76.755636] ffff0000c5a87400: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.756307] ffff0000c5a87480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.756950] >ffff0000c5a87500: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.757546] ^ [ 76.757969] ffff0000c5a87580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.758589] ffff0000c5a87600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.759207] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmem_cache_double_destroy
[ 76.684091] ================================================================== [ 76.685048] BUG: KASAN: use-after-free in kmem_cache_double_destroy+0xa4/0x144 [ 76.685797] Read of size 1 at addr ffff0000c546a180 by task kunit_try_catch/161 [ 76.686448] [ 76.686692] CPU: 1 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.687432] Hardware name: linux,dummy-virt (DT) [ 76.687846] Call trace: [ 76.688103] dump_backtrace+0xf8/0x118 [ 76.688806] show_stack+0x18/0x24 [ 76.689261] __dump_stack+0x28/0x38 [ 76.689672] dump_stack_lvl+0x54/0x6c [ 76.690123] print_address_description+0x7c/0x1ec [ 76.690660] print_report+0x50/0x68 [ 76.691695] kasan_report+0xac/0x100 [ 76.692163] __kasan_check_byte+0x3c/0x54 [ 76.692664] kmem_cache_destroy+0x3c/0x14c [ 76.693144] kmem_cache_double_destroy+0xa4/0x144 [ 76.693679] kunit_try_run_case+0x80/0x184 [ 76.694146] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.694710] kthread+0x16c/0x21c [ 76.695169] ret_from_fork+0x10/0x20 [ 76.695588] [ 76.695794] Allocated by task 161: [ 76.696176] kasan_set_track+0x4c/0x80 [ 76.697296] kasan_save_alloc_info+0x28/0x34 [ 76.697772] __kasan_slab_alloc+0x58/0x70 [ 76.698242] slab_post_alloc_hook+0x70/0x2f4 [ 76.698716] kmem_cache_alloc+0x168/0x260 [ 76.699201] kmem_cache_create_usercopy+0x108/0x29c [ 76.699732] kmem_cache_create+0x1c/0x28 [ 76.700178] kmem_cache_double_destroy+0x48/0x144 [ 76.700691] kunit_try_run_case+0x80/0x184 [ 76.701158] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.701715] kthread+0x16c/0x21c [ 76.702161] ret_from_fork+0x10/0x20 [ 76.702552] [ 76.702770] Freed by task 161: [ 76.703112] kasan_set_track+0x4c/0x80 [ 76.703588] kasan_save_free_info+0x3c/0x60 [ 76.704054] ____kasan_slab_free+0xe8/0x140 [ 76.704547] __kasan_slab_free+0x18/0x28 [ 76.705623] kmem_cache_free+0xe0/0x358 [ 76.706117] slab_kmem_cache_release+0x30/0x40 [ 76.706616] kmem_cache_release+0x14/0x20 [ 76.707130] kobject_put+0xd8/0x140 [ 76.707573] sysfs_slab_release+0x28/0x34 [ 76.708088] kmem_cache_destroy+0x148/0x14c [ 76.708550] kmem_cache_double_destroy+0x90/0x144 [ 76.709064] kunit_try_run_case+0x80/0x184 [ 76.709559] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.710152] kthread+0x16c/0x21c [ 76.710593] ret_from_fork+0x10/0x20 [ 76.711084] [ 76.711291] The buggy address belongs to the object at ffff0000c546a180 [ 76.711291] which belongs to the cache kmem_cache of size 216 [ 76.712220] The buggy address is located 0 bytes inside of [ 76.712220] 216-byte region [ffff0000c546a180, ffff0000c546a258) [ 76.713902] [ 76.714126] The buggy address belongs to the physical page: [ 76.714593] page:000000005b065639 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10546a [ 76.715397] head:000000005b065639 order:1 compound_mapcount:0 compound_pincount:0 [ 76.716117] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 76.716859] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002000 [ 76.717542] raw: 0000000000000000 0000000080150015 00000001ffffffff 0000000000000000 [ 76.718151] page dumped because: kasan: bad access detected [ 76.718642] [ 76.718846] Memory state around the buggy address: [ 76.719324] ffff0000c546a080: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc [ 76.719987] ffff0000c546a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.720629] >ffff0000c546a180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.721743] ^ [ 76.722099] ffff0000c546a200: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc [ 76.722743] ffff0000c546a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.723371] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 76.640493] ================================================================== [ 76.641589] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xb0/0x1b8 [ 76.642267] Free of addr ffff0000c5a99001 by task kunit_try_catch/160 [ 76.642814] [ 76.643052] CPU: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.643744] Hardware name: linux,dummy-virt (DT) [ 76.644213] Call trace: [ 76.644495] dump_backtrace+0xf8/0x118 [ 76.645051] show_stack+0x18/0x24 [ 76.645479] __dump_stack+0x28/0x38 [ 76.645952] dump_stack_lvl+0x54/0x6c [ 76.646422] print_address_description+0x7c/0x1ec [ 76.647476] print_report+0x50/0x68 [ 76.647958] kasan_report_invalid_free+0x9c/0xe8 [ 76.648497] ____kasan_slab_free+0x108/0x140 [ 76.649270] __kasan_slab_free+0x18/0x28 [ 76.649767] kmem_cache_free+0xe0/0x358 [ 76.650204] kmem_cache_invalid_free+0xb0/0x1b8 [ 76.650699] kunit_try_run_case+0x80/0x184 [ 76.651177] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.651772] kthread+0x16c/0x21c [ 76.652196] ret_from_fork+0x10/0x20 [ 76.652605] [ 76.652813] Allocated by task 160: [ 76.653188] kasan_set_track+0x4c/0x80 [ 76.653684] kasan_save_alloc_info+0x28/0x34 [ 76.654154] __kasan_slab_alloc+0x58/0x70 [ 76.654628] slab_post_alloc_hook+0x70/0x2f4 [ 76.655600] kmem_cache_alloc+0x168/0x260 [ 76.656060] kmem_cache_invalid_free+0x90/0x1b8 [ 76.656558] kunit_try_run_case+0x80/0x184 [ 76.657286] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.657876] kthread+0x16c/0x21c [ 76.658281] ret_from_fork+0x10/0x20 [ 76.658736] [ 76.658935] The buggy address belongs to the object at ffff0000c5a99000 [ 76.658935] which belongs to the cache test_cache of size 200 [ 76.659902] The buggy address is located 1 bytes inside of [ 76.659902] 200-byte region [ffff0000c5a99000, ffff0000c5a990c8) [ 76.661339] [ 76.661565] The buggy address belongs to the physical page: [ 76.662035] page:000000003fed45ed refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a99 [ 76.662866] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.663557] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c1483c80 [ 76.664244] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000 [ 76.664943] page dumped because: kasan: bad access detected [ 76.665409] [ 76.665617] Memory state around the buggy address: [ 76.666394] ffff0000c5a98f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 76.667063] ffff0000c5a98f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.667707] >ffff0000c5a99000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 76.668326] ^ [ 76.668692] ffff0000c5a99080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 76.669498] ffff0000c5a99100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.670450] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 76.595241] ================================================================== [ 76.596073] BUG: KASAN: double-free in kmem_cache_double_free+0xbc/0x1b8 [ 76.597109] Free of addr ffff0000c5a8d000 by task kunit_try_catch/159 [ 76.597669] [ 76.597900] CPU: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.598658] Hardware name: linux,dummy-virt (DT) [ 76.599070] Call trace: [ 76.599341] dump_backtrace+0xf8/0x118 [ 76.599851] show_stack+0x18/0x24 [ 76.600289] __dump_stack+0x28/0x38 [ 76.600940] dump_stack_lvl+0x54/0x6c [ 76.601379] print_address_description+0x7c/0x1ec [ 76.601924] print_report+0x50/0x68 [ 76.602370] kasan_report_invalid_free+0x9c/0xe8 [ 76.602918] ____kasan_slab_free+0x108/0x140 [ 76.603413] __kasan_slab_free+0x18/0x28 [ 76.603889] kmem_cache_free+0xe0/0x358 [ 76.604335] kmem_cache_double_free+0xbc/0x1b8 [ 76.605069] kunit_try_run_case+0x80/0x184 [ 76.605545] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.606123] kthread+0x16c/0x21c [ 76.606535] ret_from_fork+0x10/0x20 [ 76.607008] [ 76.607196] Allocated by task 159: [ 76.607578] kasan_set_track+0x4c/0x80 [ 76.608089] kasan_save_alloc_info+0x28/0x34 [ 76.608558] __kasan_slab_alloc+0x58/0x70 [ 76.609027] slab_post_alloc_hook+0x70/0x2f4 [ 76.609501] kmem_cache_alloc+0x168/0x260 [ 76.609965] kmem_cache_double_free+0x90/0x1b8 [ 76.610469] kunit_try_run_case+0x80/0x184 [ 76.611098] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.611676] kthread+0x16c/0x21c [ 76.612090] ret_from_fork+0x10/0x20 [ 76.612528] [ 76.612712] Freed by task 159: [ 76.613532] kasan_set_track+0x4c/0x80 [ 76.614028] kasan_save_free_info+0x3c/0x60 [ 76.614518] ____kasan_slab_free+0xe8/0x140 [ 76.615017] __kasan_slab_free+0x18/0x28 [ 76.615490] kmem_cache_free+0xe0/0x358 [ 76.615951] kmem_cache_double_free+0xa4/0x1b8 [ 76.616455] kunit_try_run_case+0x80/0x184 [ 76.617078] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.617635] kthread+0x16c/0x21c [ 76.618046] ret_from_fork+0x10/0x20 [ 76.618489] [ 76.618684] The buggy address belongs to the object at ffff0000c5a8d000 [ 76.618684] which belongs to the cache test_cache of size 200 [ 76.619632] The buggy address is located 0 bytes inside of [ 76.619632] 200-byte region [ffff0000c5a8d000, ffff0000c5a8d0c8) [ 76.620544] [ 76.620942] The buggy address belongs to the physical page: [ 76.621426] page:00000000691911c3 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8d [ 76.622193] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.622887] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c1483b00 [ 76.623546] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000 [ 76.624177] page dumped because: kasan: bad access detected [ 76.624823] [ 76.625049] Memory state around the buggy address: [ 76.625491] ffff0000c5a8cf00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.626139] ffff0000c5a8cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.626768] >ffff0000c5a8d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.627387] ^ [ 76.627752] ffff0000c5a8d080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 76.628384] ffff0000c5a8d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.629258] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-ksize_uaf
[ 76.552483] ================================================================== [ 76.553361] BUG: KASAN: use-after-free in ksize_uaf+0x130/0x24c [ 76.553907] Read of size 1 at addr ffff0000c5a87178 by task kunit_try_catch/158 [ 76.554643] [ 76.554856] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.555589] Hardware name: linux,dummy-virt (DT) [ 76.555998] Call trace: [ 76.556314] dump_backtrace+0xf8/0x118 [ 76.557264] show_stack+0x18/0x24 [ 76.557740] __dump_stack+0x28/0x38 [ 76.558157] dump_stack_lvl+0x54/0x6c [ 76.558614] print_address_description+0x7c/0x1ec [ 76.559160] print_report+0x50/0x68 [ 76.559593] kasan_report+0xac/0x100 [ 76.560042] __asan_load1+0x6c/0x70 [ 76.560518] ksize_uaf+0x130/0x24c [ 76.560967] kunit_try_run_case+0x80/0x184 [ 76.561428] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.562010] kthread+0x16c/0x21c [ 76.562452] ret_from_fork+0x10/0x20 [ 76.563150] [ 76.563370] Allocated by task 158: [ 76.563708] kasan_set_track+0x4c/0x80 [ 76.564220] kasan_save_alloc_info+0x28/0x34 [ 76.565161] __kasan_kmalloc+0x88/0xa0 [ 76.565642] kmalloc_trace+0x54/0x68 [ 76.566116] ksize_uaf+0x48/0x24c [ 76.566513] kunit_try_run_case+0x80/0x184 [ 76.567023] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.567583] kthread+0x16c/0x21c [ 76.567996] ret_from_fork+0x10/0x20 [ 76.568447] [ 76.568952] Freed by task 158: [ 76.569266] kasan_set_track+0x4c/0x80 [ 76.569773] kasan_save_free_info+0x3c/0x60 [ 76.570233] ____kasan_slab_free+0xe8/0x140 [ 76.570703] __kasan_slab_free+0x18/0x28 [ 76.571228] __kmem_cache_free+0xdc/0x284 [ 76.571706] kfree+0x60/0x74 [ 76.572110] ksize_uaf+0x90/0x24c [ 76.572520] kunit_try_run_case+0x80/0x184 [ 76.573020] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.573575] kthread+0x16c/0x21c [ 76.574022] ret_from_fork+0x10/0x20 [ 76.574419] [ 76.574630] The buggy address belongs to the object at ffff0000c5a87100 [ 76.574630] which belongs to the cache kmalloc-128 of size 128 [ 76.576011] The buggy address is located 120 bytes inside of [ 76.576011] 128-byte region [ffff0000c5a87100, ffff0000c5a87180) [ 76.577135] [ 76.577366] The buggy address belongs to the physical page: [ 76.577829] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 76.578614] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.579429] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.580096] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.581175] page dumped because: kasan: bad access detected [ 76.581640] [ 76.581858] Memory state around the buggy address: [ 76.582273] ffff0000c5a87000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.582931] ffff0000c5a87080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.583567] >ffff0000c5a87100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.584180] ^ [ 76.585080] ffff0000c5a87180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.585680] ffff0000c5a87200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.586287] ================================================================== [ 76.474519] ================================================================== [ 76.475275] BUG: KASAN: use-after-free in ksize_uaf+0xa4/0x24c [ 76.475789] Read of size 1 at addr ffff0000c5a87100 by task kunit_try_catch/158 [ 76.476303] [ 76.476495] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.478661] Hardware name: linux,dummy-virt (DT) [ 76.479890] Call trace: [ 76.480338] dump_backtrace+0xf8/0x118 [ 76.481358] show_stack+0x18/0x24 [ 76.482338] __dump_stack+0x28/0x38 [ 76.483302] dump_stack_lvl+0x54/0x6c [ 76.484278] print_address_description+0x7c/0x1ec [ 76.485449] print_report+0x50/0x68 [ 76.486450] kasan_report+0xac/0x100 [ 76.487452] __kasan_check_byte+0x3c/0x54 [ 76.488505] ksize+0x34/0x13c [ 76.489210] ksize_uaf+0xa4/0x24c [ 76.489802] kunit_try_run_case+0x80/0x184 [ 76.490277] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.490927] kthread+0x16c/0x21c [ 76.491348] ret_from_fork+0x10/0x20 [ 76.491817] [ 76.492027] Allocated by task 158: [ 76.492371] kasan_set_track+0x4c/0x80 [ 76.492928] kasan_save_alloc_info+0x28/0x34 [ 76.493397] __kasan_kmalloc+0x88/0xa0 [ 76.493867] kmalloc_trace+0x54/0x68 [ 76.494296] ksize_uaf+0x48/0x24c [ 76.494725] kunit_try_run_case+0x80/0x184 [ 76.495481] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.496100] kthread+0x16c/0x21c [ 76.496521] ret_from_fork+0x10/0x20 [ 76.497216] [ 76.497403] Freed by task 158: [ 76.497767] kasan_set_track+0x4c/0x80 [ 76.498259] kasan_save_free_info+0x3c/0x60 [ 76.498752] ____kasan_slab_free+0xe8/0x140 [ 76.499313] __kasan_slab_free+0x18/0x28 [ 76.499787] __kmem_cache_free+0xdc/0x284 [ 76.500299] kfree+0x60/0x74 [ 76.500961] ksize_uaf+0x90/0x24c [ 76.501418] kunit_try_run_case+0x80/0x184 [ 76.501903] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.502455] kthread+0x16c/0x21c [ 76.502877] ret_from_fork+0x10/0x20 [ 76.503301] [ 76.503501] The buggy address belongs to the object at ffff0000c5a87100 [ 76.503501] which belongs to the cache kmalloc-128 of size 128 [ 76.504473] The buggy address is located 0 bytes inside of [ 76.504473] 128-byte region [ffff0000c5a87100, ffff0000c5a87180) [ 76.505627] [ 76.505852] The buggy address belongs to the physical page: [ 76.506342] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 76.507127] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.507835] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.508538] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.509427] page dumped because: kasan: bad access detected [ 76.509920] [ 76.510107] Memory state around the buggy address: [ 76.510573] ffff0000c5a87000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.511214] ffff0000c5a87080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.511857] >ffff0000c5a87100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.512438] ^ [ 76.513087] ffff0000c5a87180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.513707] ffff0000c5a87200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.514329] ================================================================== [ 76.516368] ================================================================== [ 76.517434] BUG: KASAN: use-after-free in ksize_uaf+0xe8/0x24c [ 76.517966] Read of size 1 at addr ffff0000c5a87100 by task kunit_try_catch/158 [ 76.518478] [ 76.518674] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.519678] Hardware name: linux,dummy-virt (DT) [ 76.520045] Call trace: [ 76.520282] dump_backtrace+0xf8/0x118 [ 76.521816] show_stack+0x18/0x24 [ 76.522268] __dump_stack+0x28/0x38 [ 76.522739] dump_stack_lvl+0x54/0x6c [ 76.523208] print_address_description+0x7c/0x1ec [ 76.523787] print_report+0x50/0x68 [ 76.524286] kasan_report+0xac/0x100 [ 76.524961] __asan_load1+0x6c/0x70 [ 76.525593] ksize_uaf+0xe8/0x24c [ 76.526033] kunit_try_run_case+0x80/0x184 [ 76.526542] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.527176] kthread+0x16c/0x21c [ 76.527616] ret_from_fork+0x10/0x20 [ 76.528098] [ 76.528314] Allocated by task 158: [ 76.528925] kasan_set_track+0x4c/0x80 [ 76.529433] kasan_save_alloc_info+0x28/0x34 [ 76.529914] __kasan_kmalloc+0x88/0xa0 [ 76.530386] kmalloc_trace+0x54/0x68 [ 76.530884] ksize_uaf+0x48/0x24c [ 76.531330] kunit_try_run_case+0x80/0x184 [ 76.531840] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.532425] kthread+0x16c/0x21c [ 76.532841] ret_from_fork+0x10/0x20 [ 76.533272] [ 76.533453] Freed by task 158: [ 76.534315] kasan_set_track+0x4c/0x80 [ 76.534824] kasan_save_free_info+0x3c/0x60 [ 76.535291] ____kasan_slab_free+0xe8/0x140 [ 76.535805] __kasan_slab_free+0x18/0x28 [ 76.536303] __kmem_cache_free+0xdc/0x284 [ 76.537054] kfree+0x60/0x74 [ 76.537468] ksize_uaf+0x90/0x24c [ 76.537941] kunit_try_run_case+0x80/0x184 [ 76.538443] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.539099] kthread+0x16c/0x21c [ 76.539510] ret_from_fork+0x10/0x20 [ 76.539966] [ 76.540172] The buggy address belongs to the object at ffff0000c5a87100 [ 76.540172] which belongs to the cache kmalloc-128 of size 128 [ 76.541356] The buggy address is located 0 bytes inside of [ 76.541356] 128-byte region [ffff0000c5a87100, ffff0000c5a87180) [ 76.542244] [ 76.542451] The buggy address belongs to the physical page: [ 76.543307] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87 [ 76.544115] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.545099] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.545786] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.546411] page dumped because: kasan: bad access detected [ 76.546923] [ 76.547123] Memory state around the buggy address: [ 76.547555] ffff0000c5a87000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.548209] ffff0000c5a87080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.549027] >ffff0000c5a87100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.549626] ^ [ 76.549989] ffff0000c5a87180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.550611] ffff0000c5a87200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.551491] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 76.443052] ================================================================== [ 76.443936] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0xb8/0x164 [ 76.444885] Read of size 1 at addr ffff0000c5a88280 by task kunit_try_catch/157 [ 76.445641] [ 76.446149] CPU: 0 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.446982] Hardware name: linux,dummy-virt (DT) [ 76.447501] Call trace: [ 76.447792] dump_backtrace+0xf8/0x118 [ 76.448255] show_stack+0x18/0x24 [ 76.448863] __dump_stack+0x28/0x38 [ 76.449297] dump_stack_lvl+0x54/0x6c [ 76.449742] print_address_description+0x7c/0x1ec [ 76.450286] print_report+0x50/0x68 [ 76.450732] kasan_report+0xac/0x100 [ 76.451185] __asan_load1+0x6c/0x70 [ 76.451620] ksize_unpoisons_memory+0xb8/0x164 [ 76.452113] kunit_try_run_case+0x80/0x184 [ 76.452586] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.453151] kthread+0x16c/0x21c [ 76.453558] ret_from_fork+0x10/0x20 [ 76.453986] [ 76.454178] Allocated by task 157: [ 76.454513] kasan_set_track+0x4c/0x80 [ 76.455163] kasan_save_alloc_info+0x28/0x34 [ 76.455626] __kasan_kmalloc+0x88/0xa0 [ 76.456092] kmalloc_trace+0x54/0x68 [ 76.456558] ksize_unpoisons_memory+0x48/0x164 [ 76.457209] kunit_try_run_case+0x80/0x184 [ 76.457668] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.458270] kthread+0x16c/0x21c [ 76.458674] ret_from_fork+0x10/0x20 [ 76.459109] [ 76.459328] The buggy address belongs to the object at ffff0000c5a88200 [ 76.459328] which belongs to the cache kmalloc-128 of size 128 [ 76.460273] The buggy address is located 0 bytes to the right of [ 76.460273] 128-byte region [ffff0000c5a88200, ffff0000c5a88280) [ 76.461470] [ 76.461685] The buggy address belongs to the physical page: [ 76.462158] page:00000000927d1208 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a88 [ 76.462976] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 76.463635] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 76.465221] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 76.465841] page dumped because: kasan: bad access detected [ 76.466313] [ 76.466501] Memory state around the buggy address: [ 76.466964] ffff0000c5a88180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.467615] ffff0000c5a88200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 76.468271] >ffff0000c5a88280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.469297] ^ [ 76.469637] ffff0000c5a88300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.470299] ffff0000c5a88380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.470913] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_left
[ 76.408582] ================================================================== [ 76.409530] BUG: KASAN: global-out-of-bounds in kasan_global_oob_left+0x50/0xf4 [ 76.410263] Read of size 1 at addr ffffa664876d15bd by task kunit_try_catch/153 [ 76.411025] [ 76.411264] CPU: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.411998] Hardware name: linux,dummy-virt (DT) [ 76.412388] Call trace: [ 76.412838] dump_backtrace+0xf8/0x118 [ 76.413315] show_stack+0x18/0x24 [ 76.413775] __dump_stack+0x28/0x38 [ 76.414189] dump_stack_lvl+0x54/0x6c [ 76.414627] print_address_description+0x7c/0x1ec [ 76.415212] print_report+0x50/0x68 [ 76.415646] kasan_report+0xac/0x100 [ 76.416095] __asan_load1+0x6c/0x70 [ 76.416547] kasan_global_oob_left+0x50/0xf4 [ 76.417193] kunit_try_run_case+0x80/0x184 [ 76.417654] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.418228] kthread+0x16c/0x21c [ 76.418634] ret_from_fork+0x10/0x20 [ 76.419073] [ 76.419267] The buggy address belongs to the variable: [ 76.419690] resource+0x5d/0x60 [ 76.420165] [ 76.420360] The buggy address ffffa664876d15bd belongs to a vmalloc virtual mapping [ 76.421277] The buggy address belongs to the physical page: [ 76.421770] page:0000000092fb1506 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x43cd1 [ 76.422507] flags: 0x3fffc0000001000(reserved|node=0|zone=0|lastcpupid=0xffff) [ 76.423255] raw: 03fffc0000001000 fffffc00000f3448 fffffc00000f3448 0000000000000000 [ 76.423918] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 76.424547] page dumped because: kasan: bad access detected [ 76.425003] [ 76.425225] Memory state around the buggy address: [ 76.425667] ffffa664876d1480: 00 00 00 00 00 00 00 00 00 00 00 00 00 f9 f9 f9 [ 76.426296] ffffa664876d1500: 04 f9 f9 f9 01 f9 f9 f9 02 f9 f9 f9 00 00 00 00 [ 76.427181] >ffffa664876d1580: 00 00 00 f9 f9 f9 f9 f9 00 02 f9 f9 04 f9 f9 f9 [ 76.427796] ^ [ 76.428266] ffffa664876d1600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 76.429062] ffffa664876d1680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 76.429668] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 76.382577] ================================================================== [ 76.383528] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x4c/0xf0 [ 76.384304] Read of size 1 at addr ffffa664876d15cd by task kunit_try_catch/152 [ 76.385199] [ 76.385513] CPU: 1 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.386354] Hardware name: linux,dummy-virt (DT) [ 76.386876] Call trace: [ 76.387147] dump_backtrace+0xf8/0x118 [ 76.387709] show_stack+0x18/0x24 [ 76.388193] __dump_stack+0x28/0x38 [ 76.388743] dump_stack_lvl+0x54/0x6c [ 76.389199] print_address_description+0x7c/0x1ec [ 76.389819] print_report+0x50/0x68 [ 76.390324] kasan_report+0xac/0x100 [ 76.390817] __asan_load1+0x6c/0x70 [ 76.391292] kasan_global_oob_right+0x4c/0xf0 [ 76.391770] kunit_try_run_case+0x80/0x184 [ 76.392288] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.393360] kthread+0x16c/0x21c [ 76.393824] ret_from_fork+0x10/0x20 [ 76.394273] [ 76.394496] The buggy address belongs to the variable: [ 76.394973] global_array+0xd/0x20 [ 76.395386] [ 76.395612] The buggy address ffffa664876d15cd belongs to a vmalloc virtual mapping [ 76.396247] The buggy address belongs to the physical page: [ 76.396984] page:0000000092fb1506 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x43cd1 [ 76.397773] flags: 0x3fffc0000001000(reserved|node=0|zone=0|lastcpupid=0xffff) [ 76.398461] raw: 03fffc0000001000 fffffc00000f3448 fffffc00000f3448 0000000000000000 [ 76.399150] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 76.399776] page dumped because: kasan: bad access detected [ 76.400231] [ 76.400437] Memory state around the buggy address: [ 76.400903] ffffa664876d1480: 00 00 00 00 00 00 00 00 00 00 00 00 00 f9 f9 f9 [ 76.401528] ffffa664876d1500: 04 f9 f9 f9 01 f9 f9 f9 02 f9 f9 f9 00 00 00 00 [ 76.402157] >ffffa664876d1580: 00 00 00 f9 f9 f9 f9 f9 00 02 f9 f9 04 f9 f9 f9 [ 76.402724] ^ [ 76.403716] ffffa664876d1600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 76.404359] ffffa664876d1680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 76.405265] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 75.775864] ================================================================== [ 75.776789] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0xb0/0x1cc [ 75.777554] Read of size 1 at addr ffff0000c59b50c8 by task kunit_try_catch/149 [ 75.778144] [ 75.778392] CPU: 1 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.779145] Hardware name: linux,dummy-virt (DT) [ 75.779554] Call trace: [ 75.779847] dump_backtrace+0xf8/0x118 [ 75.780352] show_stack+0x18/0x24 [ 75.781465] __dump_stack+0x28/0x38 [ 75.781945] dump_stack_lvl+0x54/0x6c [ 75.782386] print_address_description+0x7c/0x1ec [ 75.782921] print_report+0x50/0x68 [ 75.783354] kasan_report+0xac/0x100 [ 75.783837] __asan_load1+0x6c/0x70 [ 75.784291] kmem_cache_oob+0xb0/0x1cc [ 75.784750] kunit_try_run_case+0x80/0x184 [ 75.785222] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.785842] kthread+0x16c/0x21c [ 75.786284] ret_from_fork+0x10/0x20 [ 75.786696] [ 75.786911] Allocated by task 149: [ 75.787220] kasan_set_track+0x4c/0x80 [ 75.787767] kasan_save_alloc_info+0x28/0x34 [ 75.788227] __kasan_slab_alloc+0x58/0x70 [ 75.789338] slab_post_alloc_hook+0x70/0x2f4 [ 75.789842] kmem_cache_alloc+0x168/0x260 [ 75.790302] kmem_cache_oob+0x94/0x1cc [ 75.790728] kunit_try_run_case+0x80/0x184 [ 75.791236] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.791813] kthread+0x16c/0x21c [ 75.792225] ret_from_fork+0x10/0x20 [ 75.792655] [ 75.792856] The buggy address belongs to the object at ffff0000c59b5000 [ 75.792856] which belongs to the cache test_cache of size 200 [ 75.793774] The buggy address is located 0 bytes to the right of [ 75.793774] 200-byte region [ffff0000c59b5000, ffff0000c59b50c8) [ 75.794704] [ 75.794951] The buggy address belongs to the physical page: [ 75.795615] page:000000006008d4ec refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059b5 [ 75.796413] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.797829] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0f61c80 [ 75.798508] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000 [ 75.799126] page dumped because: kasan: bad access detected [ 75.799595] [ 75.799811] Memory state around the buggy address: [ 75.800249] ffff0000c59b4f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 75.800935] ffff0000c59b5000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.801519] >ffff0000c59b5080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 75.802124] ^ [ 75.802625] ffff0000c59b5100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.803268] ffff0000c59b5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.803863] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_uaf2
[ 75.724399] ================================================================== [ 75.725890] BUG: KASAN: use-after-free in kmalloc_uaf2+0xfc/0x1e8 [ 75.726816] Read of size 1 at addr ffff0000c5a46f28 by task kunit_try_catch/145 [ 75.727722] [ 75.728030] CPU: 1 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.729070] Hardware name: linux,dummy-virt (DT) [ 75.729783] Call trace: [ 75.730098] dump_backtrace+0xf8/0x118 [ 75.730728] show_stack+0x18/0x24 [ 75.731317] __dump_stack+0x28/0x38 [ 75.731899] dump_stack_lvl+0x54/0x6c [ 75.732497] print_address_description+0x7c/0x1ec [ 75.733458] print_report+0x50/0x68 [ 75.733975] kasan_report+0xac/0x100 [ 75.734389] __asan_load1+0x6c/0x70 [ 75.734802] kmalloc_uaf2+0xfc/0x1e8 [ 75.735224] kunit_try_run_case+0x80/0x184 [ 75.735709] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.736331] kthread+0x16c/0x21c [ 75.736841] ret_from_fork+0x10/0x20 [ 75.737287] [ 75.737655] Allocated by task 145: [ 75.738064] kasan_set_track+0x4c/0x80 [ 75.738562] kasan_save_alloc_info+0x28/0x34 [ 75.739032] __kasan_kmalloc+0x88/0xa0 [ 75.739480] kmalloc_trace+0x54/0x68 [ 75.739901] kmalloc_uaf2+0x48/0x1e8 [ 75.740339] kunit_try_run_case+0x80/0x184 [ 75.741092] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.741689] kthread+0x16c/0x21c [ 75.742140] ret_from_fork+0x10/0x20 [ 75.742567] [ 75.742767] Freed by task 145: [ 75.743108] kasan_set_track+0x4c/0x80 [ 75.743591] kasan_save_free_info+0x3c/0x60 [ 75.744102] ____kasan_slab_free+0xe8/0x140 [ 75.745100] __kasan_slab_free+0x18/0x28 [ 75.745588] __kmem_cache_free+0xdc/0x284 [ 75.746062] kfree+0x60/0x74 [ 75.746433] kmalloc_uaf2+0x90/0x1e8 [ 75.746848] kunit_try_run_case+0x80/0x184 [ 75.747313] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.747926] kthread+0x16c/0x21c [ 75.748332] ret_from_fork+0x10/0x20 [ 75.748972] [ 75.749178] The buggy address belongs to the object at ffff0000c5a46f00 [ 75.749178] which belongs to the cache kmalloc-128 of size 128 [ 75.750117] The buggy address is located 40 bytes inside of [ 75.750117] 128-byte region [ffff0000c5a46f00, ffff0000c5a46f80) [ 75.750997] [ 75.751214] The buggy address belongs to the physical page: [ 75.751667] page:00000000e850444c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a46 [ 75.752480] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.753308] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.754011] raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000 [ 75.754635] page dumped because: kasan: bad access detected [ 75.755161] [ 75.755351] Memory state around the buggy address: [ 75.755817] ffff0000c5a46e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.756464] ffff0000c5a46e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.757400] >ffff0000c5a46f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.758017] ^ [ 75.758437] ffff0000c5a46f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.759079] ffff0000c5a47000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.759660] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_uaf_memset
[ 75.674540] ================================================================== [ 75.676406] BUG: KASAN: use-after-free in kmalloc_uaf_memset+0xac/0x14c [ 75.677884] Write of size 33 at addr ffff0000c5a46e00 by task kunit_try_catch/144 [ 75.679638] [ 75.680306] CPU: 1 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.681665] Hardware name: linux,dummy-virt (DT) [ 75.682038] Call trace: [ 75.682274] dump_backtrace+0xf8/0x118 [ 75.682703] show_stack+0x18/0x24 [ 75.683104] __dump_stack+0x28/0x38 [ 75.683479] dump_stack_lvl+0x54/0x6c [ 75.684113] print_address_description+0x7c/0x1ec [ 75.685346] print_report+0x50/0x68 [ 75.686145] kasan_report+0xac/0x100 [ 75.686931] kasan_check_range+0x260/0x2a0 [ 75.687773] memset+0x40/0x70 [ 75.688425] kmalloc_uaf_memset+0xac/0x14c [ 75.689279] kunit_try_run_case+0x80/0x184 [ 75.690085] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.691038] kthread+0x16c/0x21c [ 75.691661] ret_from_fork+0x10/0x20 [ 75.692289] [ 75.693143] Allocated by task 144: [ 75.693684] kasan_set_track+0x4c/0x80 [ 75.694383] kasan_save_alloc_info+0x28/0x34 [ 75.695061] __kasan_kmalloc+0x88/0xa0 [ 75.695703] kmalloc_trace+0x54/0x68 [ 75.696311] kmalloc_uaf_memset+0x48/0x14c [ 75.697029] kunit_try_run_case+0x80/0x184 [ 75.697817] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.698698] kthread+0x16c/0x21c [ 75.699356] ret_from_fork+0x10/0x20 [ 75.699944] [ 75.700218] Freed by task 144: [ 75.700671] kasan_set_track+0x4c/0x80 [ 75.701413] kasan_save_free_info+0x3c/0x60 [ 75.702161] ____kasan_slab_free+0xe8/0x140 [ 75.702844] __kasan_slab_free+0x18/0x28 [ 75.703494] __kmem_cache_free+0xdc/0x284 [ 75.703910] kfree+0x60/0x74 [ 75.704263] kmalloc_uaf_memset+0x90/0x14c [ 75.704698] kunit_try_run_case+0x80/0x184 [ 75.705362] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.706167] kthread+0x16c/0x21c [ 75.706734] ret_from_fork+0x10/0x20 [ 75.707309] [ 75.707577] The buggy address belongs to the object at ffff0000c5a46e00 [ 75.707577] which belongs to the cache kmalloc-128 of size 128 [ 75.708417] The buggy address is located 0 bytes inside of [ 75.708417] 128-byte region [ffff0000c5a46e00, ffff0000c5a46e80) [ 75.709942] [ 75.710382] The buggy address belongs to the physical page: [ 75.711060] page:00000000e850444c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a46 [ 75.712173] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.713189] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.714291] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.714793] page dumped because: kasan: bad access detected [ 75.715163] [ 75.715340] Memory state around the buggy address: [ 75.715690] ffff0000c5a46d00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.716580] ffff0000c5a46d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.717547] >ffff0000c5a46e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.718447] ^ [ 75.718944] ffff0000c5a46e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.719824] ffff0000c5a46f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.720700] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_uaf
[ 75.629573] ================================================================== [ 75.630348] BUG: KASAN: use-after-free in kmalloc_uaf+0xa4/0x148 [ 75.631053] Read of size 1 at addr ffff0000c5a77308 by task kunit_try_catch/143 [ 75.632345] [ 75.632717] CPU: 0 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.633908] Hardware name: linux,dummy-virt (DT) [ 75.634671] Call trace: [ 75.635169] dump_backtrace+0xf8/0x118 [ 75.635923] show_stack+0x18/0x24 [ 75.636680] __dump_stack+0x28/0x38 [ 75.637342] dump_stack_lvl+0x54/0x6c [ 75.637967] print_address_description+0x7c/0x1ec [ 75.638744] print_report+0x50/0x68 [ 75.639365] kasan_report+0xac/0x100 [ 75.639988] __asan_load1+0x6c/0x70 [ 75.640618] kmalloc_uaf+0xa4/0x148 [ 75.641252] kunit_try_run_case+0x80/0x184 [ 75.641735] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.642247] kthread+0x16c/0x21c [ 75.642629] ret_from_fork+0x10/0x20 [ 75.643225] [ 75.643495] Allocated by task 143: [ 75.643985] kasan_set_track+0x4c/0x80 [ 75.644658] kasan_save_alloc_info+0x28/0x34 [ 75.645355] __kasan_kmalloc+0x88/0xa0 [ 75.645996] kmalloc_trace+0x54/0x68 [ 75.646574] kmalloc_uaf+0x48/0x148 [ 75.647150] kunit_try_run_case+0x80/0x184 [ 75.647799] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.648619] kthread+0x16c/0x21c [ 75.649206] ret_from_fork+0x10/0x20 [ 75.649835] [ 75.650103] Freed by task 143: [ 75.650548] kasan_set_track+0x4c/0x80 [ 75.651174] kasan_save_free_info+0x3c/0x60 [ 75.651812] ____kasan_slab_free+0xe8/0x140 [ 75.652483] __kasan_slab_free+0x18/0x28 [ 75.653202] __kmem_cache_free+0xdc/0x284 [ 75.653913] kfree+0x60/0x74 [ 75.654413] kmalloc_uaf+0x90/0x148 [ 75.654991] kunit_try_run_case+0x80/0x184 [ 75.655630] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.656392] kthread+0x16c/0x21c [ 75.657051] ret_from_fork+0x10/0x20 [ 75.657710] [ 75.657998] The buggy address belongs to the object at ffff0000c5a77300 [ 75.657998] which belongs to the cache kmalloc-128 of size 128 [ 75.659319] The buggy address is located 8 bytes inside of [ 75.659319] 128-byte region [ffff0000c5a77300, ffff0000c5a77380) [ 75.660109] [ 75.660319] The buggy address belongs to the physical page: [ 75.660818] page:00000000495fea3c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a77 [ 75.661582] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.662262] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.663303] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.664219] page dumped because: kasan: bad access detected [ 75.665387] [ 75.665667] Memory state around the buggy address: [ 75.666301] ffff0000c5a77200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.667181] ffff0000c5a77280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.668056] >ffff0000c5a77300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.669159] ^ [ 75.669717] ffff0000c5a77380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.670334] ffff0000c5a77400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.670812] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 75.595895] ================================================================== [ 75.597068] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0xb8/0x160 [ 75.597814] Read of size 64 at addr ffff0000c5a46804 by task kunit_try_catch/142 [ 75.598397] [ 75.598604] CPU: 1 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.599366] Hardware name: linux,dummy-virt (DT) [ 75.599804] Call trace: [ 75.600080] dump_backtrace+0xf8/0x118 [ 75.600574] show_stack+0x18/0x24 [ 75.601034] __dump_stack+0x28/0x38 [ 75.601511] dump_stack_lvl+0x54/0x6c [ 75.601973] print_address_description+0x7c/0x1ec [ 75.602502] print_report+0x50/0x68 [ 75.603151] kasan_report+0xac/0x100 [ 75.603604] kasan_check_range+0x260/0x2a0 [ 75.604108] memmove+0x48/0x90 [ 75.604499] kmalloc_memmove_invalid_size+0xb8/0x160 [ 75.605170] kunit_try_run_case+0x80/0x184 [ 75.605643] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.606210] kthread+0x16c/0x21c [ 75.606622] ret_from_fork+0x10/0x20 [ 75.607056] [ 75.607254] Allocated by task 142: [ 75.607613] kasan_set_track+0x4c/0x80 [ 75.608138] kasan_save_alloc_info+0x28/0x34 [ 75.608587] __kasan_kmalloc+0x88/0xa0 [ 75.609201] kmalloc_trace+0x54/0x68 [ 75.609608] kmalloc_memmove_invalid_size+0x48/0x160 [ 75.610180] kunit_try_run_case+0x80/0x184 [ 75.610625] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.611212] kthread+0x16c/0x21c [ 75.611616] ret_from_fork+0x10/0x20 [ 75.612019] [ 75.612238] The buggy address belongs to the object at ffff0000c5a46800 [ 75.612238] which belongs to the cache kmalloc-128 of size 128 [ 75.613460] The buggy address is located 4 bytes inside of [ 75.613460] 128-byte region [ffff0000c5a46800, ffff0000c5a46880) [ 75.614351] [ 75.614546] The buggy address belongs to the physical page: [ 75.614989] page:00000000e850444c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a46 [ 75.615807] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.616504] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.617711] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.618352] page dumped because: kasan: bad access detected [ 75.618850] [ 75.619054] Memory state around the buggy address: [ 75.619507] ffff0000c5a46700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.620151] ffff0000c5a46780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.620843] >ffff0000c5a46800: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 75.621552] ^ [ 75.622059] ffff0000c5a46880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.622676] ffff0000c5a46900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.623244] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 75.560813] ================================================================== [ 75.561579] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0xb4/0x164 [ 75.562650] Read of size 18446744073709551614 at addr ffff0000c5a76f04 by task kunit_try_catch/141 [ 75.563279] [ 75.563477] CPU: 0 PID: 141 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.564112] Hardware name: linux,dummy-virt (DT) [ 75.564573] Call trace: [ 75.565272] dump_backtrace+0xf8/0x118 [ 75.565779] show_stack+0x18/0x24 [ 75.566215] __dump_stack+0x28/0x38 [ 75.566615] dump_stack_lvl+0x54/0x6c [ 75.567065] print_address_description+0x7c/0x1ec [ 75.567587] print_report+0x50/0x68 [ 75.568037] kasan_report+0xac/0x100 [ 75.568515] kasan_check_range+0x260/0x2a0 [ 75.569043] memmove+0x48/0x90 [ 75.569447] kmalloc_memmove_negative_size+0xb4/0x164 [ 75.569979] kunit_try_run_case+0x80/0x184 [ 75.570442] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.571494] kthread+0x16c/0x21c [ 75.571937] ret_from_fork+0x10/0x20 [ 75.572388] [ 75.572573] Allocated by task 141: [ 75.573144] kasan_set_track+0x4c/0x80 [ 75.573650] kasan_save_alloc_info+0x28/0x34 [ 75.574149] __kasan_kmalloc+0x88/0xa0 [ 75.574589] kmalloc_trace+0x54/0x68 [ 75.575038] kmalloc_memmove_negative_size+0x48/0x164 [ 75.575585] kunit_try_run_case+0x80/0x184 [ 75.576039] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.577079] kthread+0x16c/0x21c [ 75.577512] ret_from_fork+0x10/0x20 [ 75.577955] [ 75.578145] The buggy address belongs to the object at ffff0000c5a76f00 [ 75.578145] which belongs to the cache kmalloc-128 of size 128 [ 75.579105] The buggy address is located 4 bytes inside of [ 75.579105] 128-byte region [ffff0000c5a76f00, ffff0000c5a76f80) [ 75.580023] [ 75.580252] The buggy address belongs to the physical page: [ 75.580700] page:00000000e5b61371 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a76 [ 75.581709] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.582394] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.583067] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.583652] page dumped because: kasan: bad access detected [ 75.584142] [ 75.584359] Memory state around the buggy address: [ 75.585281] ffff0000c5a76e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.585901] ffff0000c5a76e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.586524] >ffff0000c5a76f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 75.587140] ^ [ 75.587489] ffff0000c5a76f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.588129] ffff0000c5a77000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 75.589072] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 75.528059] ================================================================== [ 75.529016] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xac/0x154 [ 75.530085] Write of size 16 at addr ffff0000c5a46469 by task kunit_try_catch/140 [ 75.530932] [ 75.531199] CPU: 1 PID: 140 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.532018] Hardware name: linux,dummy-virt (DT) [ 75.532545] Call trace: [ 75.532997] dump_backtrace+0xf8/0x118 [ 75.533601] show_stack+0x18/0x24 [ 75.534180] __dump_stack+0x28/0x38 [ 75.534637] dump_stack_lvl+0x54/0x6c [ 75.535147] print_address_description+0x7c/0x1ec [ 75.535704] print_report+0x50/0x68 [ 75.536281] kasan_report+0xac/0x100 [ 75.537018] kasan_check_range+0x260/0x2a0 [ 75.537619] memset+0x40/0x70 [ 75.538111] kmalloc_oob_memset_16+0xac/0x154 [ 75.538590] kunit_try_run_case+0x80/0x184 [ 75.539182] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.539878] kthread+0x16c/0x21c [ 75.540422] ret_from_fork+0x10/0x20 [ 75.541012] [ 75.541342] Allocated by task 140: [ 75.541699] kasan_set_track+0x4c/0x80 [ 75.542366] kasan_save_alloc_info+0x28/0x34 [ 75.542926] __kasan_kmalloc+0x88/0xa0 [ 75.543387] kmalloc_trace+0x54/0x68 [ 75.543920] kmalloc_oob_memset_16+0x48/0x154 [ 75.544418] kunit_try_run_case+0x80/0x184 [ 75.545079] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.545814] kthread+0x16c/0x21c [ 75.546221] ret_from_fork+0x10/0x20 [ 75.546629] [ 75.546849] The buggy address belongs to the object at ffff0000c5a46400 [ 75.546849] which belongs to the cache kmalloc-128 of size 128 [ 75.547729] The buggy address is located 105 bytes inside of [ 75.547729] 128-byte region [ffff0000c5a46400, ffff0000c5a46480) [ 75.548628] [ 75.549104] The buggy address belongs to the physical page: [ 75.549555] page:00000000e850444c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a46 [ 75.550346] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.551076] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.551774] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.552444] page dumped because: kasan: bad access detected [ 75.553011] [ 75.553201] Memory state around the buggy address: [ 75.553558] ffff0000c5a46300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.554089] ffff0000c5a46380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.554661] >ffff0000c5a46400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 75.555331] ^ [ 75.555933] ffff0000c5a46480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.556559] ffff0000c5a46500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.557145] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 75.489407] ================================================================== [ 75.490172] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xac/0x154 [ 75.490741] Write of size 8 at addr ffff0000c5a46371 by task kunit_try_catch/139 [ 75.491788] [ 75.492117] CPU: 1 PID: 139 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.493342] Hardware name: linux,dummy-virt (DT) [ 75.494078] Call trace: [ 75.494488] dump_backtrace+0xf8/0x118 [ 75.495169] show_stack+0x18/0x24 [ 75.495813] __dump_stack+0x28/0x38 [ 75.496454] dump_stack_lvl+0x54/0x6c [ 75.497136] print_address_description+0x7c/0x1ec [ 75.497917] print_report+0x50/0x68 [ 75.498541] kasan_report+0xac/0x100 [ 75.499160] kasan_check_range+0x260/0x2a0 [ 75.499841] memset+0x40/0x70 [ 75.500356] kmalloc_oob_memset_8+0xac/0x154 [ 75.501115] kunit_try_run_case+0x80/0x184 [ 75.501889] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.502708] kthread+0x16c/0x21c [ 75.503310] ret_from_fork+0x10/0x20 [ 75.503841] [ 75.504133] Allocated by task 139: [ 75.504680] kasan_set_track+0x4c/0x80 [ 75.505144] kasan_save_alloc_info+0x28/0x34 [ 75.505545] __kasan_kmalloc+0x88/0xa0 [ 75.506020] kmalloc_trace+0x54/0x68 [ 75.506402] kmalloc_oob_memset_8+0x48/0x154 [ 75.506882] kunit_try_run_case+0x80/0x184 [ 75.507550] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.508375] kthread+0x16c/0x21c [ 75.509061] ret_from_fork+0x10/0x20 [ 75.509673] [ 75.509979] The buggy address belongs to the object at ffff0000c5a46300 [ 75.509979] which belongs to the cache kmalloc-128 of size 128 [ 75.511406] The buggy address is located 113 bytes inside of [ 75.511406] 128-byte region [ffff0000c5a46300, ffff0000c5a46380) [ 75.512870] [ 75.513206] The buggy address belongs to the physical page: [ 75.513985] page:00000000e850444c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a46 [ 75.514884] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.515441] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.516218] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.517269] page dumped because: kasan: bad access detected [ 75.518064] [ 75.518356] Memory state around the buggy address: [ 75.519004] ffff0000c5a46200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.519921] ffff0000c5a46280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.520906] >ffff0000c5a46300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 75.521954] ^ [ 75.522824] ffff0000c5a46380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.523739] ffff0000c5a46400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.524637] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 75.450912] ================================================================== [ 75.451633] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xac/0x154 [ 75.452673] Write of size 4 at addr ffff0000c5a76875 by task kunit_try_catch/138 [ 75.453655] [ 75.453878] CPU: 0 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.454695] Hardware name: linux,dummy-virt (DT) [ 75.455157] Call trace: [ 75.455392] dump_backtrace+0xf8/0x118 [ 75.455833] show_stack+0x18/0x24 [ 75.456490] __dump_stack+0x28/0x38 [ 75.457018] dump_stack_lvl+0x54/0x6c [ 75.457641] print_address_description+0x7c/0x1ec [ 75.458237] print_report+0x50/0x68 [ 75.458695] kasan_report+0xac/0x100 [ 75.459161] kasan_check_range+0x260/0x2a0 [ 75.459646] memset+0x40/0x70 [ 75.460058] kmalloc_oob_memset_4+0xac/0x154 [ 75.460560] kunit_try_run_case+0x80/0x184 [ 75.461157] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.461719] kthread+0x16c/0x21c [ 75.462164] ret_from_fork+0x10/0x20 [ 75.462598] [ 75.462847] Allocated by task 138: [ 75.463223] kasan_set_track+0x4c/0x80 [ 75.463725] kasan_save_alloc_info+0x28/0x34 [ 75.464209] __kasan_kmalloc+0x88/0xa0 [ 75.464718] kmalloc_trace+0x54/0x68 [ 75.465174] kmalloc_oob_memset_4+0x48/0x154 [ 75.465649] kunit_try_run_case+0x80/0x184 [ 75.466227] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.466823] kthread+0x16c/0x21c [ 75.467254] ret_from_fork+0x10/0x20 [ 75.467707] [ 75.467928] The buggy address belongs to the object at ffff0000c5a76800 [ 75.467928] which belongs to the cache kmalloc-128 of size 128 [ 75.468944] The buggy address is located 117 bytes inside of [ 75.468944] 128-byte region [ffff0000c5a76800, ffff0000c5a76880) [ 75.470042] [ 75.470243] The buggy address belongs to the physical page: [ 75.470714] page:00000000e5b61371 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a76 [ 75.471789] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.473172] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.473876] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.474603] page dumped because: kasan: bad access detected [ 75.475165] [ 75.475472] Memory state around the buggy address: [ 75.476057] ffff0000c5a76700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.477008] ffff0000c5a76780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.477606] >ffff0000c5a76800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 75.478451] ^ [ 75.479147] ffff0000c5a76880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.479857] ffff0000c5a76900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.480527] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 75.418564] ================================================================== [ 75.419412] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0xac/0x154 [ 75.420103] Write of size 2 at addr ffff0000c5a76777 by task kunit_try_catch/137 [ 75.420649] [ 75.420898] CPU: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.421823] Hardware name: linux,dummy-virt (DT) [ 75.422251] Call trace: [ 75.422515] dump_backtrace+0xf8/0x118 [ 75.423176] show_stack+0x18/0x24 [ 75.423605] __dump_stack+0x28/0x38 [ 75.424072] dump_stack_lvl+0x54/0x6c [ 75.424497] print_address_description+0x7c/0x1ec [ 75.425507] print_report+0x50/0x68 [ 75.425958] kasan_report+0xac/0x100 [ 75.426415] kasan_check_range+0x260/0x2a0 [ 75.426904] memset+0x40/0x70 [ 75.427299] kmalloc_oob_memset_2+0xac/0x154 [ 75.427774] kunit_try_run_case+0x80/0x184 [ 75.428243] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.429310] kthread+0x16c/0x21c [ 75.429778] ret_from_fork+0x10/0x20 [ 75.430219] [ 75.430408] Allocated by task 137: [ 75.430752] kasan_set_track+0x4c/0x80 [ 75.431234] kasan_save_alloc_info+0x28/0x34 [ 75.431721] __kasan_kmalloc+0x88/0xa0 [ 75.432171] kmalloc_trace+0x54/0x68 [ 75.432629] kmalloc_oob_memset_2+0x48/0x154 [ 75.433140] kunit_try_run_case+0x80/0x184 [ 75.433625] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.434190] kthread+0x16c/0x21c [ 75.434590] ret_from_fork+0x10/0x20 [ 75.435483] [ 75.435681] The buggy address belongs to the object at ffff0000c5a76700 [ 75.435681] which belongs to the cache kmalloc-128 of size 128 [ 75.436939] The buggy address is located 119 bytes inside of [ 75.436939] 128-byte region [ffff0000c5a76700, ffff0000c5a76780) [ 75.437814] [ 75.438035] The buggy address belongs to the physical page: [ 75.438514] page:00000000e5b61371 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a76 [ 75.439308] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.440006] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.441200] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.441822] page dumped because: kasan: bad access detected [ 75.442289] [ 75.442499] Memory state around the buggy address: [ 75.442970] ffff0000c5a76600: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.443608] ffff0000c5a76680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.444242] >ffff0000c5a76700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 75.445143] ^ [ 75.445713] ffff0000c5a76780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.446357] ffff0000c5a76800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.446960] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 75.381535] ================================================================== [ 75.382260] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0xa8/0x150 [ 75.382915] Write of size 128 at addr ffff0000c5a47e00 by task kunit_try_catch/136 [ 75.384282] [ 75.384817] CPU: 1 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.385983] Hardware name: linux,dummy-virt (DT) [ 75.386625] Call trace: [ 75.387063] dump_backtrace+0xf8/0x118 [ 75.387751] show_stack+0x18/0x24 [ 75.388367] __dump_stack+0x28/0x38 [ 75.389051] dump_stack_lvl+0x54/0x6c [ 75.389686] print_address_description+0x7c/0x1ec [ 75.390452] print_report+0x50/0x68 [ 75.391092] kasan_report+0xac/0x100 [ 75.391725] kasan_check_range+0x260/0x2a0 [ 75.392428] memset+0x40/0x70 [ 75.393126] kmalloc_oob_in_memset+0xa8/0x150 [ 75.393827] kunit_try_run_case+0x80/0x184 [ 75.394297] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.394822] kthread+0x16c/0x21c [ 75.395330] ret_from_fork+0x10/0x20 [ 75.395814] [ 75.395997] Allocated by task 136: [ 75.396292] kasan_set_track+0x4c/0x80 [ 75.397058] kasan_save_alloc_info+0x28/0x34 [ 75.397741] __kasan_kmalloc+0x88/0xa0 [ 75.398426] kmalloc_trace+0x54/0x68 [ 75.399064] kmalloc_oob_in_memset+0x48/0x150 [ 75.399782] kunit_try_run_case+0x80/0x184 [ 75.400478] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.401393] kthread+0x16c/0x21c [ 75.402047] ret_from_fork+0x10/0x20 [ 75.402658] [ 75.402975] The buggy address belongs to the object at ffff0000c5a47e00 [ 75.402975] which belongs to the cache kmalloc-128 of size 128 [ 75.404355] The buggy address is located 0 bytes inside of [ 75.404355] 128-byte region [ffff0000c5a47e00, ffff0000c5a47e80) [ 75.405691] [ 75.406023] The buggy address belongs to the physical page: [ 75.406626] page:000000003f689bbf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a47 [ 75.407363] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.407943] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.408820] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.409867] page dumped because: kasan: bad access detected [ 75.410561] [ 75.410837] Memory state around the buggy address: [ 75.411382] ffff0000c5a47d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.411918] ffff0000c5a47d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.412409] >ffff0000c5a47e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 75.413181] ^ [ 75.413834] ffff0000c5a47e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.414425] ffff0000c5a47f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.415029] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_uaf_16
[ 75.343257] ================================================================== [ 75.343987] BUG: KASAN: use-after-free in kmalloc_uaf_16+0x104/0x1ac [ 75.344530] Read of size 16 at addr ffff0000c5a76100 by task kunit_try_catch/135 [ 75.345885] [ 75.346136] CPU: 0 PID: 135 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.346988] Hardware name: linux,dummy-virt (DT) [ 75.347439] Call trace: [ 75.347697] dump_backtrace+0xf8/0x118 [ 75.348213] show_stack+0x18/0x24 [ 75.348795] __dump_stack+0x28/0x38 [ 75.349256] dump_stack_lvl+0x54/0x6c [ 75.349712] print_address_description+0x7c/0x1ec [ 75.350251] print_report+0x50/0x68 [ 75.350777] kasan_report+0xac/0x100 [ 75.351296] kasan_check_range+0x260/0x2a0 [ 75.351786] memcpy+0x48/0x90 [ 75.352151] kmalloc_uaf_16+0x104/0x1ac [ 75.352629] kunit_try_run_case+0x80/0x184 [ 75.353156] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.353778] kthread+0x16c/0x21c [ 75.354223] ret_from_fork+0x10/0x20 [ 75.354665] [ 75.354886] Allocated by task 135: [ 75.355220] kasan_set_track+0x4c/0x80 [ 75.355699] kasan_save_alloc_info+0x28/0x34 [ 75.356188] __kasan_kmalloc+0x88/0xa0 [ 75.356886] kmalloc_trace+0x54/0x68 [ 75.357327] kmalloc_uaf_16+0xa0/0x1ac [ 75.357786] kunit_try_run_case+0x80/0x184 [ 75.358251] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.359125] kthread+0x16c/0x21c [ 75.359569] ret_from_fork+0x10/0x20 [ 75.360035] [ 75.360231] Freed by task 135: [ 75.360581] kasan_set_track+0x4c/0x80 [ 75.361297] kasan_save_free_info+0x3c/0x60 [ 75.361781] ____kasan_slab_free+0xe8/0x140 [ 75.362268] __kasan_slab_free+0x18/0x28 [ 75.362723] __kmem_cache_free+0xdc/0x284 [ 75.363194] kfree+0x60/0x74 [ 75.363552] kmalloc_uaf_16+0xe8/0x1ac [ 75.364012] kunit_try_run_case+0x80/0x184 [ 75.364486] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.365552] kthread+0x16c/0x21c [ 75.365975] ret_from_fork+0x10/0x20 [ 75.366405] [ 75.366618] The buggy address belongs to the object at ffff0000c5a76100 [ 75.366618] which belongs to the cache kmalloc-128 of size 128 [ 75.367525] The buggy address is located 0 bytes inside of [ 75.367525] 128-byte region [ffff0000c5a76100, ffff0000c5a76180) [ 75.368472] [ 75.368916] The buggy address belongs to the physical page: [ 75.369418] page:00000000e5b61371 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a76 [ 75.370187] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.370984] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.371645] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.372248] page dumped because: kasan: bad access detected [ 75.372713] [ 75.373102] Memory state around the buggy address: [ 75.373554] ffff0000c5a76000: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.374176] ffff0000c5a76080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.375135] >ffff0000c5a76100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.375703] ^ [ 75.376066] ffff0000c5a76180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.376950] ffff0000c5a76200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.377530] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 75.306674] ================================================================== [ 75.307583] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0xfc/0x1ac [ 75.308248] Write of size 16 at addr ffff0000c5a47900 by task kunit_try_catch/134 [ 75.309389] [ 75.309729] CPU: 1 PID: 134 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.311036] Hardware name: linux,dummy-virt (DT) [ 75.311831] Call trace: [ 75.312074] dump_backtrace+0xf8/0x118 [ 75.312507] show_stack+0x18/0x24 [ 75.313434] __dump_stack+0x28/0x38 [ 75.313868] dump_stack_lvl+0x54/0x6c [ 75.314292] print_address_description+0x7c/0x1ec [ 75.314840] print_report+0x50/0x68 [ 75.315285] kasan_report+0xac/0x100 [ 75.315762] kasan_check_range+0x260/0x2a0 [ 75.316257] memcpy+0x60/0x90 [ 75.316612] kmalloc_oob_16+0xfc/0x1ac [ 75.317232] kunit_try_run_case+0x80/0x184 [ 75.317738] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.318308] kthread+0x16c/0x21c [ 75.318741] ret_from_fork+0x10/0x20 [ 75.319189] [ 75.319374] Allocated by task 134: [ 75.319723] kasan_set_track+0x4c/0x80 [ 75.320173] kasan_save_alloc_info+0x28/0x34 [ 75.320807] __kasan_kmalloc+0x88/0xa0 [ 75.321279] kmalloc_trace+0x54/0x68 [ 75.321737] kmalloc_oob_16+0x48/0x1ac [ 75.322207] kunit_try_run_case+0x80/0x184 [ 75.322663] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.323228] kthread+0x16c/0x21c [ 75.323655] ret_from_fork+0x10/0x20 [ 75.324089] [ 75.324281] The buggy address belongs to the object at ffff0000c5a47900 [ 75.324281] which belongs to the cache kmalloc-128 of size 128 [ 75.325368] The buggy address is located 0 bytes inside of [ 75.325368] 128-byte region [ffff0000c5a47900, ffff0000c5a47980) [ 75.326246] [ 75.326472] The buggy address belongs to the physical page: [ 75.327418] page:000000003f689bbf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a47 [ 75.328234] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 75.329150] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 75.329814] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.330427] page dumped because: kasan: bad access detected [ 75.330901] [ 75.331082] Memory state around the buggy address: [ 75.331539] ffff0000c5a47800: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.332165] ffff0000c5a47880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.332963] >ffff0000c5a47900: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.333560] ^ [ 75.333942] ffff0000c5a47980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.334556] ffff0000c5a47a00: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.335151] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-krealloc_uaf
[ 75.268508] ================================================================== [ 75.269367] BUG: KASAN: use-after-free in krealloc_uaf+0xd0/0x21c [ 75.270019] Read of size 1 at addr ffff0000c56f1800 by task kunit_try_catch/133 [ 75.270646] [ 75.270870] CPU: 0 PID: 133 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.271574] Hardware name: linux,dummy-virt (DT) [ 75.272027] Call trace: [ 75.272302] dump_backtrace+0xf8/0x118 [ 75.273431] show_stack+0x18/0x24 [ 75.273909] __dump_stack+0x28/0x38 [ 75.274358] dump_stack_lvl+0x54/0x6c [ 75.274790] print_address_description+0x7c/0x1ec [ 75.275319] print_report+0x50/0x68 [ 75.275763] kasan_report+0xac/0x100 [ 75.276211] __asan_load1+0x6c/0x70 [ 75.276933] krealloc_uaf+0xd0/0x21c [ 75.277376] kunit_try_run_case+0x80/0x184 [ 75.277893] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.278457] kthread+0x16c/0x21c [ 75.278874] ret_from_fork+0x10/0x20 [ 75.279305] [ 75.279498] Allocated by task 133: [ 75.279860] kasan_set_track+0x4c/0x80 [ 75.280329] kasan_save_alloc_info+0x28/0x34 [ 75.281356] __kasan_kmalloc+0x88/0xa0 [ 75.281851] kmalloc_trace+0x54/0x68 [ 75.282286] krealloc_uaf+0x48/0x21c [ 75.282682] kunit_try_run_case+0x80/0x184 [ 75.283148] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.283708] kthread+0x16c/0x21c [ 75.284144] ret_from_fork+0x10/0x20 [ 75.284558] [ 75.285009] Freed by task 133: [ 75.285325] kasan_set_track+0x4c/0x80 [ 75.285799] kasan_save_free_info+0x3c/0x60 [ 75.286313] ____kasan_slab_free+0xe8/0x140 [ 75.286885] __kasan_slab_free+0x18/0x28 [ 75.287388] __kmem_cache_free+0xdc/0x284 [ 75.287842] kfree+0x60/0x74 [ 75.288235] krealloc_uaf+0x90/0x21c [ 75.288929] kunit_try_run_case+0x80/0x184 [ 75.289415] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.290045] kthread+0x16c/0x21c [ 75.290453] ret_from_fork+0x10/0x20 [ 75.291160] [ 75.291352] The buggy address belongs to the object at ffff0000c56f1800 [ 75.291352] which belongs to the cache kmalloc-256 of size 256 [ 75.292324] The buggy address is located 0 bytes inside of [ 75.292324] 256-byte region [ffff0000c56f1800, ffff0000c56f1900) [ 75.293456] [ 75.293690] The buggy address belongs to the physical page: [ 75.294166] page:00000000b1c7ebef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f0 [ 75.294961] head:00000000b1c7ebef order:1 compound_mapcount:0 compound_pincount:0 [ 75.295596] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 75.296320] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480 [ 75.297459] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.298090] page dumped because: kasan: bad access detected [ 75.298563] [ 75.298767] Memory state around the buggy address: [ 75.299199] ffff0000c56f1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.299834] ffff0000c56f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.300463] >ffff0000c56f1800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.301299] ^ [ 75.301658] ffff0000c56f1880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.302284] ffff0000c56f1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.302894] ================================================================== [ 75.232336] ================================================================== [ 75.233840] BUG: KASAN: use-after-free in krealloc_uaf+0xac/0x21c [ 75.234437] Read of size 1 at addr ffff0000c56f1800 by task kunit_try_catch/133 [ 75.235077] [ 75.235302] CPU: 0 PID: 133 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.236034] Hardware name: linux,dummy-virt (DT) [ 75.236495] Call trace: [ 75.236774] dump_backtrace+0xf8/0x118 [ 75.237291] show_stack+0x18/0x24 [ 75.237723] __dump_stack+0x28/0x38 [ 75.238149] dump_stack_lvl+0x54/0x6c [ 75.238565] print_address_description+0x7c/0x1ec [ 75.239406] print_report+0x50/0x68 [ 75.239889] kasan_report+0xac/0x100 [ 75.240332] __kasan_check_byte+0x3c/0x54 [ 75.241327] krealloc+0x54/0x270 [ 75.241773] krealloc_uaf+0xac/0x21c [ 75.242217] kunit_try_run_case+0x80/0x184 [ 75.242671] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.243242] kthread+0x16c/0x21c [ 75.243686] ret_from_fork+0x10/0x20 [ 75.244114] [ 75.244329] Allocated by task 133: [ 75.244654] kasan_set_track+0x4c/0x80 [ 75.245177] kasan_save_alloc_info+0x28/0x34 [ 75.245620] __kasan_kmalloc+0x88/0xa0 [ 75.246078] kmalloc_trace+0x54/0x68 [ 75.246518] krealloc_uaf+0x48/0x21c [ 75.247206] kunit_try_run_case+0x80/0x184 [ 75.247666] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.248243] kthread+0x16c/0x21c [ 75.249126] ret_from_fork+0x10/0x20 [ 75.249547] [ 75.249786] Freed by task 133: [ 75.250125] kasan_set_track+0x4c/0x80 [ 75.250558] kasan_save_free_info+0x3c/0x60 [ 75.251053] ____kasan_slab_free+0xe8/0x140 [ 75.251536] __kasan_slab_free+0x18/0x28 [ 75.252048] __kmem_cache_free+0xdc/0x284 [ 75.252539] kfree+0x60/0x74 [ 75.252947] krealloc_uaf+0x90/0x21c [ 75.253399] kunit_try_run_case+0x80/0x184 [ 75.253872] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.254427] kthread+0x16c/0x21c [ 75.255110] ret_from_fork+0x10/0x20 [ 75.255568] [ 75.255780] The buggy address belongs to the object at ffff0000c56f1800 [ 75.255780] which belongs to the cache kmalloc-256 of size 256 [ 75.256720] The buggy address is located 0 bytes inside of [ 75.256720] 256-byte region [ffff0000c56f1800, ffff0000c56f1900) [ 75.258083] [ 75.258280] The buggy address belongs to the physical page: [ 75.258708] page:00000000b1c7ebef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f0 [ 75.259551] head:00000000b1c7ebef order:1 compound_mapcount:0 compound_pincount:0 [ 75.260239] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 75.261147] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480 [ 75.261844] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.262432] page dumped because: kasan: bad access detected [ 75.262917] [ 75.263104] Memory state around the buggy address: [ 75.263538] ffff0000c56f1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.264190] ffff0000c56f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.264890] >ffff0000c56f1800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.265483] ^ [ 75.265837] ffff0000c56f1880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.266472] ffff0000c56f1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.267497] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 75.141585] ================================================================== [ 75.142449] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x158/0x4b8 [ 75.143460] Write of size 1 at addr ffff0000c5a260d0 by task kunit_try_catch/132 [ 75.144319] [ 75.144514] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.145824] Hardware name: linux,dummy-virt (DT) [ 75.146439] Call trace: [ 75.146823] dump_backtrace+0xf8/0x118 [ 75.147454] show_stack+0x18/0x24 [ 75.147939] __dump_stack+0x28/0x38 [ 75.148322] dump_stack_lvl+0x54/0x6c [ 75.149031] print_address_description+0x7c/0x1ec [ 75.149793] print_report+0x50/0x68 [ 75.150400] kasan_report+0xac/0x100 [ 75.151016] __asan_store1+0x6c/0x70 [ 75.151622] krealloc_less_oob_helper+0x158/0x4b8 [ 75.152339] krealloc_pagealloc_less_oob+0x18/0x24 [ 75.153233] kunit_try_run_case+0x80/0x184 [ 75.153911] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.154705] kthread+0x16c/0x21c [ 75.155240] ret_from_fork+0x10/0x20 [ 75.155617] [ 75.155812] The buggy address belongs to the physical page: [ 75.156296] page:0000000021e95fe4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a24 [ 75.157256] head:0000000021e95fe4 order:2 compound_mapcount:0 compound_pincount:0 [ 75.157883] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff) [ 75.158564] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000 [ 75.159262] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 75.159858] page dumped because: kasan: bad access detected [ 75.160305] [ 75.160521] Memory state around the buggy address: [ 75.160954] ffff0000c5a25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.161570] ffff0000c5a26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.162228] >ffff0000c5a26080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 75.162977] ^ [ 75.163509] ffff0000c5a26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 75.164150] ffff0000c5a26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 75.165285] ================================================================== [ 74.907949] ================================================================== [ 74.908812] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x104/0x4b8 [ 74.909829] Write of size 1 at addr ffff0000c56f16c9 by task kunit_try_catch/130 [ 74.910500] [ 74.910856] CPU: 0 PID: 130 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.911931] Hardware name: linux,dummy-virt (DT) [ 74.912556] Call trace: [ 74.913033] dump_backtrace+0xf8/0x118 [ 74.913774] show_stack+0x18/0x24 [ 74.914398] __dump_stack+0x28/0x38 [ 74.915018] dump_stack_lvl+0x54/0x6c [ 74.915481] print_address_description+0x7c/0x1ec [ 74.916252] print_report+0x50/0x68 [ 74.916979] kasan_report+0xac/0x100 [ 74.917651] __asan_store1+0x6c/0x70 [ 74.918322] krealloc_less_oob_helper+0x104/0x4b8 [ 74.919068] krealloc_less_oob+0x18/0x24 [ 74.919701] kunit_try_run_case+0x80/0x184 [ 74.920362] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.921263] kthread+0x16c/0x21c [ 74.922059] ret_from_fork+0x10/0x20 [ 74.922750] [ 74.923151] Allocated by task 130: [ 74.923689] kasan_set_track+0x4c/0x80 [ 74.924384] kasan_save_alloc_info+0x28/0x34 [ 74.925139] __kasan_krealloc+0xcc/0xf8 [ 74.925884] krealloc+0x150/0x270 [ 74.926296] krealloc_less_oob_helper+0x9c/0x4b8 [ 74.926739] krealloc_less_oob+0x18/0x24 [ 74.927173] kunit_try_run_case+0x80/0x184 [ 74.927587] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.928401] kthread+0x16c/0x21c [ 74.929461] ret_from_fork+0x10/0x20 [ 74.930056] [ 74.930327] The buggy address belongs to the object at ffff0000c56f1600 [ 74.930327] which belongs to the cache kmalloc-256 of size 256 [ 74.931710] The buggy address is located 201 bytes inside of [ 74.931710] 256-byte region [ffff0000c56f1600, ffff0000c56f1700) [ 74.933204] [ 74.933400] The buggy address belongs to the physical page: [ 74.933784] page:00000000b1c7ebef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f0 [ 74.934719] head:00000000b1c7ebef order:1 compound_mapcount:0 compound_pincount:0 [ 74.935365] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 74.936067] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480 [ 74.936735] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.937384] page dumped because: kasan: bad access detected [ 74.937845] [ 74.938037] Memory state around the buggy address: [ 74.938441] ffff0000c56f1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.939445] ffff0000c56f1600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.940147] >ffff0000c56f1680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 74.940735] ^ [ 74.941280] ffff0000c56f1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.941932] ffff0000c56f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.942848] ================================================================== [ 75.114913] ================================================================== [ 75.115663] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x104/0x4b8 [ 75.117179] Write of size 1 at addr ffff0000c5a260c9 by task kunit_try_catch/132 [ 75.118273] [ 75.118567] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.119647] Hardware name: linux,dummy-virt (DT) [ 75.120295] Call trace: [ 75.120780] dump_backtrace+0xf8/0x118 [ 75.121484] show_stack+0x18/0x24 [ 75.122122] __dump_stack+0x28/0x38 [ 75.122711] dump_stack_lvl+0x54/0x6c [ 75.123105] print_address_description+0x7c/0x1ec [ 75.123576] print_report+0x50/0x68 [ 75.124113] kasan_report+0xac/0x100 [ 75.124703] __asan_store1+0x6c/0x70 [ 75.125268] krealloc_less_oob_helper+0x104/0x4b8 [ 75.125827] krealloc_pagealloc_less_oob+0x18/0x24 [ 75.126356] kunit_try_run_case+0x80/0x184 [ 75.126862] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.127415] kthread+0x16c/0x21c [ 75.127857] ret_from_fork+0x10/0x20 [ 75.128294] [ 75.128489] The buggy address belongs to the physical page: [ 75.129098] page:0000000021e95fe4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a24 [ 75.130222] head:0000000021e95fe4 order:2 compound_mapcount:0 compound_pincount:0 [ 75.131119] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff) [ 75.132051] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000 [ 75.133125] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 75.134025] page dumped because: kasan: bad access detected [ 75.134695] [ 75.134975] Memory state around the buggy address: [ 75.135412] ffff0000c5a25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.136022] ffff0000c5a26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.136977] >ffff0000c5a26080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 75.138225] ^ [ 75.138965] ffff0000c5a26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 75.139869] ffff0000c5a26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 75.140531] ================================================================== [ 75.035662] ================================================================== [ 75.036215] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x260/0x4b8 [ 75.037336] Write of size 1 at addr ffff0000c56f16eb by task kunit_try_catch/130 [ 75.037991] [ 75.038209] CPU: 0 PID: 130 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.038938] Hardware name: linux,dummy-virt (DT) [ 75.039380] Call trace: [ 75.039650] dump_backtrace+0xf8/0x118 [ 75.040119] show_stack+0x18/0x24 [ 75.040557] __dump_stack+0x28/0x38 [ 75.041446] dump_stack_lvl+0x54/0x6c [ 75.041897] print_address_description+0x7c/0x1ec [ 75.042419] print_report+0x50/0x68 [ 75.042868] kasan_report+0xac/0x100 [ 75.043301] __asan_store1+0x6c/0x70 [ 75.043743] krealloc_less_oob_helper+0x260/0x4b8 [ 75.044288] krealloc_less_oob+0x18/0x24 [ 75.045023] kunit_try_run_case+0x80/0x184 [ 75.045510] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.046130] kthread+0x16c/0x21c [ 75.046533] ret_from_fork+0x10/0x20 [ 75.046959] [ 75.047144] Allocated by task 130: [ 75.047478] kasan_set_track+0x4c/0x80 [ 75.047946] kasan_save_alloc_info+0x28/0x34 [ 75.048446] __kasan_krealloc+0xcc/0xf8 [ 75.048939] krealloc+0x150/0x270 [ 75.049355] krealloc_less_oob_helper+0x9c/0x4b8 [ 75.049860] krealloc_less_oob+0x18/0x24 [ 75.050329] kunit_try_run_case+0x80/0x184 [ 75.051281] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.051878] kthread+0x16c/0x21c [ 75.052291] ret_from_fork+0x10/0x20 [ 75.053007] [ 75.053227] The buggy address belongs to the object at ffff0000c56f1600 [ 75.053227] which belongs to the cache kmalloc-256 of size 256 [ 75.054145] The buggy address is located 235 bytes inside of [ 75.054145] 256-byte region [ffff0000c56f1600, ffff0000c56f1700) [ 75.055043] [ 75.055262] The buggy address belongs to the physical page: [ 75.055731] page:00000000b1c7ebef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f0 [ 75.056526] head:00000000b1c7ebef order:1 compound_mapcount:0 compound_pincount:0 [ 75.057616] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 75.058329] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480 [ 75.059030] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.059647] page dumped because: kasan: bad access detected [ 75.060119] [ 75.060306] Memory state around the buggy address: [ 75.061059] ffff0000c56f1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.061660] ffff0000c56f1600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.062253] >ffff0000c56f1680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 75.062857] ^ [ 75.063434] ffff0000c56f1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.064064] ffff0000c56f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.065146] ================================================================== [ 75.165986] ================================================================== [ 75.166536] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1c4/0x4b8 [ 75.167318] Write of size 1 at addr ffff0000c5a260da by task kunit_try_catch/132 [ 75.167970] [ 75.168189] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.169115] Hardware name: linux,dummy-virt (DT) [ 75.169558] Call trace: [ 75.169851] dump_backtrace+0xf8/0x118 [ 75.170379] show_stack+0x18/0x24 [ 75.170821] __dump_stack+0x28/0x38 [ 75.171246] dump_stack_lvl+0x54/0x6c [ 75.171677] print_address_description+0x7c/0x1ec [ 75.172227] print_report+0x50/0x68 [ 75.172844] kasan_report+0xac/0x100 [ 75.173301] __asan_store1+0x6c/0x70 [ 75.173736] krealloc_less_oob_helper+0x1c4/0x4b8 [ 75.174255] krealloc_pagealloc_less_oob+0x18/0x24 [ 75.174752] kunit_try_run_case+0x80/0x184 [ 75.175222] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.175798] kthread+0x16c/0x21c [ 75.176244] ret_from_fork+0x10/0x20 [ 75.176803] [ 75.177039] The buggy address belongs to the physical page: [ 75.177510] page:0000000021e95fe4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a24 [ 75.178295] head:0000000021e95fe4 order:2 compound_mapcount:0 compound_pincount:0 [ 75.178963] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff) [ 75.179645] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000 [ 75.180304] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 75.181047] page dumped because: kasan: bad access detected [ 75.181651] [ 75.181867] Memory state around the buggy address: [ 75.182262] ffff0000c5a25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.182902] ffff0000c5a26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.183557] >ffff0000c5a26080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 75.184142] ^ [ 75.185225] ffff0000c5a26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 75.185822] ffff0000c5a26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 75.186444] ================================================================== [ 75.005533] ================================================================== [ 75.006060] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x214/0x4b8 [ 75.006891] Write of size 1 at addr ffff0000c56f16ea by task kunit_try_catch/130 [ 75.007516] [ 75.007732] CPU: 0 PID: 130 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.008469] Hardware name: linux,dummy-virt (DT) [ 75.009062] Call trace: [ 75.009350] dump_backtrace+0xf8/0x118 [ 75.009816] show_stack+0x18/0x24 [ 75.010244] __dump_stack+0x28/0x38 [ 75.010671] dump_stack_lvl+0x54/0x6c [ 75.011491] print_address_description+0x7c/0x1ec [ 75.012032] print_report+0x50/0x68 [ 75.012473] kasan_report+0xac/0x100 [ 75.013166] __asan_store1+0x6c/0x70 [ 75.013613] krealloc_less_oob_helper+0x214/0x4b8 [ 75.014167] krealloc_less_oob+0x18/0x24 [ 75.014600] kunit_try_run_case+0x80/0x184 [ 75.015072] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.015623] kthread+0x16c/0x21c [ 75.016084] ret_from_fork+0x10/0x20 [ 75.016557] [ 75.017238] Allocated by task 130: [ 75.017586] kasan_set_track+0x4c/0x80 [ 75.018047] kasan_save_alloc_info+0x28/0x34 [ 75.018545] __kasan_krealloc+0xcc/0xf8 [ 75.019002] krealloc+0x150/0x270 [ 75.019424] krealloc_less_oob_helper+0x9c/0x4b8 [ 75.019940] krealloc_less_oob+0x18/0x24 [ 75.020379] kunit_try_run_case+0x80/0x184 [ 75.021113] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.021741] kthread+0x16c/0x21c [ 75.022195] ret_from_fork+0x10/0x20 [ 75.022637] [ 75.022849] The buggy address belongs to the object at ffff0000c56f1600 [ 75.022849] which belongs to the cache kmalloc-256 of size 256 [ 75.023783] The buggy address is located 234 bytes inside of [ 75.023783] 256-byte region [ffff0000c56f1600, ffff0000c56f1700) [ 75.024667] [ 75.025367] The buggy address belongs to the physical page: [ 75.025852] page:00000000b1c7ebef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f0 [ 75.026645] head:00000000b1c7ebef order:1 compound_mapcount:0 compound_pincount:0 [ 75.027290] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 75.027995] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480 [ 75.028648] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 75.029289] page dumped because: kasan: bad access detected [ 75.029769] [ 75.029978] Memory state around the buggy address: [ 75.030405] ffff0000c56f1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.031295] ffff0000c56f1600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.031949] >ffff0000c56f1680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 75.032547] ^ [ 75.033570] ffff0000c56f1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.034253] ffff0000c56f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.034827] ================================================================== [ 75.187158] ================================================================== [ 75.187671] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x214/0x4b8 [ 75.188403] Write of size 1 at addr ffff0000c5a260ea by task kunit_try_catch/132 [ 75.189246] [ 75.189503] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.190222] Hardware name: linux,dummy-virt (DT) [ 75.190608] Call trace: [ 75.190927] dump_backtrace+0xf8/0x118 [ 75.191436] show_stack+0x18/0x24 [ 75.191865] __dump_stack+0x28/0x38 [ 75.192304] dump_stack_lvl+0x54/0x6c [ 75.192896] print_address_description+0x7c/0x1ec [ 75.193479] print_report+0x50/0x68 [ 75.193953] kasan_report+0xac/0x100 [ 75.194396] __asan_store1+0x6c/0x70 [ 75.194853] krealloc_less_oob_helper+0x214/0x4b8 [ 75.195360] krealloc_pagealloc_less_oob+0x18/0x24 [ 75.195906] kunit_try_run_case+0x80/0x184 [ 75.196387] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.197097] kthread+0x16c/0x21c [ 75.197516] ret_from_fork+0x10/0x20 [ 75.197942] [ 75.198139] The buggy address belongs to the physical page: [ 75.198616] page:0000000021e95fe4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a24 [ 75.199393] head:0000000021e95fe4 order:2 compound_mapcount:0 compound_pincount:0 [ 75.200023] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff) [ 75.200900] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000 [ 75.201574] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 75.202176] page dumped because: kasan: bad access detected [ 75.202647] [ 75.202839] Memory state around the buggy address: [ 75.203309] ffff0000c5a25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.203942] ffff0000c5a26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.204560] >ffff0000c5a26080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 75.205649] ^ [ 75.206241] ffff0000c5a26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 75.206881] ffff0000c5a26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 75.207427] ================================================================== [ 75.208258] ================================================================== [ 75.208816] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x260/0x4b8 [ 75.209543] Write of size 1 at addr ffff0000c5a260eb by task kunit_try_catch/132 [ 75.210235] [ 75.210432] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.211255] Hardware name: linux,dummy-virt (DT) [ 75.211712] Call trace: [ 75.211997] dump_backtrace+0xf8/0x118 [ 75.212521] show_stack+0x18/0x24 [ 75.213085] __dump_stack+0x28/0x38 [ 75.213498] dump_stack_lvl+0x54/0x6c [ 75.213925] print_address_description+0x7c/0x1ec [ 75.214444] print_report+0x50/0x68 [ 75.214913] kasan_report+0xac/0x100 [ 75.215384] __asan_store1+0x6c/0x70 [ 75.215834] krealloc_less_oob_helper+0x260/0x4b8 [ 75.216355] krealloc_pagealloc_less_oob+0x18/0x24 [ 75.217002] kunit_try_run_case+0x80/0x184 [ 75.217477] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.218058] kthread+0x16c/0x21c [ 75.218463] ret_from_fork+0x10/0x20 [ 75.218911] [ 75.219105] The buggy address belongs to the physical page: [ 75.219563] page:0000000021e95fe4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a24 [ 75.220377] head:0000000021e95fe4 order:2 compound_mapcount:0 compound_pincount:0 [ 75.221240] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff) [ 75.221943] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000 [ 75.222627] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 75.223217] page dumped because: kasan: bad access detected [ 75.223663] [ 75.223892] Memory state around the buggy address: [ 75.224308] ffff0000c5a25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.225494] ffff0000c5a26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.226117] >ffff0000c5a26080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 75.226700] ^ [ 75.227262] ffff0000c5a26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 75.227870] ffff0000c5a26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 75.228459] ================================================================== [ 74.943949] ================================================================== [ 74.944470] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x158/0x4b8 [ 74.945214] Write of size 1 at addr ffff0000c56f16d0 by task kunit_try_catch/130 [ 74.946372] [ 74.946605] CPU: 0 PID: 130 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.947346] Hardware name: linux,dummy-virt (DT) [ 74.947802] Call trace: [ 74.948109] dump_backtrace+0xf8/0x118 [ 74.948594] show_stack+0x18/0x24 [ 74.949046] __dump_stack+0x28/0x38 [ 74.949753] dump_stack_lvl+0x54/0x6c [ 74.950215] print_address_description+0x7c/0x1ec [ 74.950773] print_report+0x50/0x68 [ 74.951230] kasan_report+0xac/0x100 [ 74.951691] __asan_store1+0x6c/0x70 [ 74.952162] krealloc_less_oob_helper+0x158/0x4b8 [ 74.952840] krealloc_less_oob+0x18/0x24 [ 74.953282] kunit_try_run_case+0x80/0x184 [ 74.954187] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.954780] kthread+0x16c/0x21c [ 74.955209] ret_from_fork+0x10/0x20 [ 74.955639] [ 74.955872] Allocated by task 130: [ 74.956248] kasan_set_track+0x4c/0x80 [ 74.956881] kasan_save_alloc_info+0x28/0x34 [ 74.957329] __kasan_krealloc+0xcc/0xf8 [ 74.958026] krealloc+0x150/0x270 [ 74.958485] krealloc_less_oob_helper+0x9c/0x4b8 [ 74.959008] krealloc_less_oob+0x18/0x24 [ 74.959461] kunit_try_run_case+0x80/0x184 [ 74.960007] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.960594] kthread+0x16c/0x21c [ 74.961511] ret_from_fork+0x10/0x20 [ 74.961968] [ 74.962178] The buggy address belongs to the object at ffff0000c56f1600 [ 74.962178] which belongs to the cache kmalloc-256 of size 256 [ 74.963156] The buggy address is located 208 bytes inside of [ 74.963156] 256-byte region [ffff0000c56f1600, ffff0000c56f1700) [ 74.964115] [ 74.964377] The buggy address belongs to the physical page: [ 74.965118] page:00000000b1c7ebef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f0 [ 74.965890] head:00000000b1c7ebef order:1 compound_mapcount:0 compound_pincount:0 [ 74.966527] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 74.967255] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480 [ 74.967948] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.968618] page dumped because: kasan: bad access detected [ 74.969119] [ 74.969306] Memory state around the buggy address: [ 74.969745] ffff0000c56f1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.970381] ffff0000c56f1600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.971516] >ffff0000c56f1680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 74.972123] ^ [ 74.972902] ffff0000c56f1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.973517] ffff0000c56f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.974165] ================================================================== [ 74.974973] ================================================================== [ 74.975510] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1c4/0x4b8 [ 74.976300] Write of size 1 at addr ffff0000c56f16da by task kunit_try_catch/130 [ 74.977395] [ 74.977624] CPU: 0 PID: 130 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.978409] Hardware name: linux,dummy-virt (DT) [ 74.978839] Call trace: [ 74.979115] dump_backtrace+0xf8/0x118 [ 74.979569] show_stack+0x18/0x24 [ 74.980022] __dump_stack+0x28/0x38 [ 74.980433] dump_stack_lvl+0x54/0x6c [ 74.980901] print_address_description+0x7c/0x1ec [ 74.981422] print_report+0x50/0x68 [ 74.981869] kasan_report+0xac/0x100 [ 74.982301] __asan_store1+0x6c/0x70 [ 74.982734] krealloc_less_oob_helper+0x1c4/0x4b8 [ 74.983525] krealloc_less_oob+0x18/0x24 [ 74.984022] kunit_try_run_case+0x80/0x184 [ 74.984488] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.985538] kthread+0x16c/0x21c [ 74.986002] ret_from_fork+0x10/0x20 [ 74.986443] [ 74.986627] Allocated by task 130: [ 74.986986] kasan_set_track+0x4c/0x80 [ 74.987503] kasan_save_alloc_info+0x28/0x34 [ 74.987995] __kasan_krealloc+0xcc/0xf8 [ 74.988505] krealloc+0x150/0x270 [ 74.989166] krealloc_less_oob_helper+0x9c/0x4b8 [ 74.989718] krealloc_less_oob+0x18/0x24 [ 74.990193] kunit_try_run_case+0x80/0x184 [ 74.990685] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.991278] kthread+0x16c/0x21c [ 74.991673] ret_from_fork+0x10/0x20 [ 74.992113] [ 74.992308] The buggy address belongs to the object at ffff0000c56f1600 [ 74.992308] which belongs to the cache kmalloc-256 of size 256 [ 74.993896] The buggy address is located 218 bytes inside of [ 74.993896] 256-byte region [ffff0000c56f1600, ffff0000c56f1700) [ 74.994791] [ 74.994982] The buggy address belongs to the physical page: [ 74.995414] page:00000000b1c7ebef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f0 [ 74.996266] head:00000000b1c7ebef order:1 compound_mapcount:0 compound_pincount:0 [ 74.997204] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 74.997942] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480 [ 74.998582] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.999182] page dumped because: kasan: bad access detected [ 74.999648] [ 74.999853] Memory state around the buggy address: [ 75.000307] ffff0000c56f1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.001410] ffff0000c56f1600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.002022] >ffff0000c56f1680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 75.002636] ^ [ 75.003178] ffff0000c56f1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.003837] ffff0000c56f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.004434] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 74.833831] ================================================================== [ 74.834568] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x12c/0x2a4 [ 74.835176] Write of size 1 at addr ffff0000c56f14eb by task kunit_try_catch/129 [ 74.835676] [ 74.835936] CPU: 0 PID: 129 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.837076] Hardware name: linux,dummy-virt (DT) [ 74.837829] Call trace: [ 74.838212] dump_backtrace+0xf8/0x118 [ 74.838651] show_stack+0x18/0x24 [ 74.839056] __dump_stack+0x28/0x38 [ 74.839763] dump_stack_lvl+0x54/0x6c [ 74.840196] print_address_description+0x7c/0x1ec [ 74.840715] print_report+0x50/0x68 [ 74.841290] kasan_report+0xac/0x100 [ 74.841830] __asan_store1+0x6c/0x70 [ 74.842332] krealloc_more_oob_helper+0x12c/0x2a4 [ 74.842942] krealloc_more_oob+0x18/0x24 [ 74.843405] kunit_try_run_case+0x80/0x184 [ 74.843891] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.844474] kthread+0x16c/0x21c [ 74.845181] ret_from_fork+0x10/0x20 [ 74.845616] [ 74.845854] Allocated by task 129: [ 74.846233] kasan_set_track+0x4c/0x80 [ 74.846717] kasan_save_alloc_info+0x28/0x34 [ 74.847196] __kasan_krealloc+0xcc/0xf8 [ 74.847666] krealloc+0x150/0x270 [ 74.848091] krealloc_more_oob_helper+0x9c/0x2a4 [ 74.848619] krealloc_more_oob+0x18/0x24 [ 74.849159] kunit_try_run_case+0x80/0x184 [ 74.849781] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.850385] kthread+0x16c/0x21c [ 74.850870] ret_from_fork+0x10/0x20 [ 74.851281] [ 74.851491] The buggy address belongs to the object at ffff0000c56f1400 [ 74.851491] which belongs to the cache kmalloc-256 of size 256 [ 74.852400] The buggy address is located 235 bytes inside of [ 74.852400] 256-byte region [ffff0000c56f1400, ffff0000c56f1500) [ 74.853680] [ 74.853925] The buggy address belongs to the physical page: [ 74.854382] page:00000000b1c7ebef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f0 [ 74.855319] head:00000000b1c7ebef order:1 compound_mapcount:0 compound_pincount:0 [ 74.855930] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 74.856908] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480 [ 74.857565] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.858194] page dumped because: kasan: bad access detected [ 74.858668] [ 74.858883] Memory state around the buggy address: [ 74.859309] ffff0000c56f1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.859959] ffff0000c56f1400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.860578] >ffff0000c56f1480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 74.861425] ^ [ 74.861979] ffff0000c56f1500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.862612] ffff0000c56f1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.863215] ================================================================== [ 74.866155] ================================================================== [ 74.866911] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x17c/0x2a4 [ 74.867510] Write of size 1 at addr ffff0000c56f14f0 by task kunit_try_catch/129 [ 74.868365] [ 74.869002] CPU: 0 PID: 129 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.869980] Hardware name: linux,dummy-virt (DT) [ 74.870336] Call trace: [ 74.870569] dump_backtrace+0xf8/0x118 [ 74.871008] show_stack+0x18/0x24 [ 74.871399] __dump_stack+0x28/0x38 [ 74.871788] dump_stack_lvl+0x54/0x6c [ 74.872780] print_address_description+0x7c/0x1ec [ 74.873636] print_report+0x50/0x68 [ 74.874293] kasan_report+0xac/0x100 [ 74.874968] __asan_store1+0x6c/0x70 [ 74.875603] krealloc_more_oob_helper+0x17c/0x2a4 [ 74.876351] krealloc_more_oob+0x18/0x24 [ 74.877090] kunit_try_run_case+0x80/0x184 [ 74.877912] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.878731] kthread+0x16c/0x21c [ 74.879324] ret_from_fork+0x10/0x20 [ 74.879930] [ 74.880235] Allocated by task 129: [ 74.880791] kasan_set_track+0x4c/0x80 [ 74.881496] kasan_save_alloc_info+0x28/0x34 [ 74.882170] __kasan_krealloc+0xcc/0xf8 [ 74.882836] krealloc+0x150/0x270 [ 74.883409] krealloc_more_oob_helper+0x9c/0x2a4 [ 74.884149] krealloc_more_oob+0x18/0x24 [ 74.884860] kunit_try_run_case+0x80/0x184 [ 74.885632] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.886459] kthread+0x16c/0x21c [ 74.887047] ret_from_fork+0x10/0x20 [ 74.887641] [ 74.887938] The buggy address belongs to the object at ffff0000c56f1400 [ 74.887938] which belongs to the cache kmalloc-256 of size 256 [ 74.889612] The buggy address is located 240 bytes inside of [ 74.889612] 256-byte region [ffff0000c56f1400, ffff0000c56f1500) [ 74.891430] [ 74.891873] The buggy address belongs to the physical page: [ 74.892463] page:00000000b1c7ebef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f0 [ 74.893715] head:00000000b1c7ebef order:1 compound_mapcount:0 compound_pincount:0 [ 74.894835] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 74.895839] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480 [ 74.897232] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.897717] page dumped because: kasan: bad access detected [ 74.898203] [ 74.898451] Memory state around the buggy address: [ 74.898969] ffff0000c56f1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.899618] ffff0000c56f1400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.900223] >ffff0000c56f1480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 74.901076] ^ [ 74.901662] ffff0000c56f1500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.902284] ffff0000c56f1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.902869] ================================================================== [ 75.069551] ================================================================== [ 75.070411] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x12c/0x2a4 [ 75.071144] Write of size 1 at addr ffff0000c5a260eb by task kunit_try_catch/131 [ 75.071791] [ 75.071995] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.072683] Hardware name: linux,dummy-virt (DT) [ 75.073232] Call trace: [ 75.073517] dump_backtrace+0xf8/0x118 [ 75.074407] show_stack+0x18/0x24 [ 75.074853] __dump_stack+0x28/0x38 [ 75.075285] dump_stack_lvl+0x54/0x6c [ 75.075703] print_address_description+0x7c/0x1ec [ 75.076251] print_report+0x50/0x68 [ 75.077156] kasan_report+0xac/0x100 [ 75.077648] __asan_store1+0x6c/0x70 [ 75.078110] krealloc_more_oob_helper+0x12c/0x2a4 [ 75.078636] krealloc_pagealloc_more_oob+0x18/0x24 [ 75.079159] kunit_try_run_case+0x80/0x184 [ 75.079632] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.080218] kthread+0x16c/0x21c [ 75.080777] ret_from_fork+0x10/0x20 [ 75.081205] [ 75.081399] The buggy address belongs to the physical page: [ 75.081882] page:0000000021e95fe4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a24 [ 75.082648] head:0000000021e95fe4 order:2 compound_mapcount:0 compound_pincount:0 [ 75.083264] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff) [ 75.083953] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000 [ 75.084632] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 75.085251] page dumped because: kasan: bad access detected [ 75.085712] [ 75.085919] Memory state around the buggy address: [ 75.086392] ffff0000c5a25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.087179] ffff0000c5a26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.087808] >ffff0000c5a26080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 75.088401] ^ [ 75.089038] ffff0000c5a26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 75.089803] ffff0000c5a26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 75.090384] ================================================================== [ 75.091254] ================================================================== [ 75.091799] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x17c/0x2a4 [ 75.092527] Write of size 1 at addr ffff0000c5a260f0 by task kunit_try_catch/131 [ 75.093597] [ 75.093841] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.094546] Hardware name: linux,dummy-virt (DT) [ 75.094986] Call trace: [ 75.095254] dump_backtrace+0xf8/0x118 [ 75.095707] show_stack+0x18/0x24 [ 75.096135] __dump_stack+0x28/0x38 [ 75.096585] dump_stack_lvl+0x54/0x6c [ 75.097047] print_address_description+0x7c/0x1ec [ 75.097569] print_report+0x50/0x68 [ 75.098046] kasan_report+0xac/0x100 [ 75.098519] __asan_store1+0x6c/0x70 [ 75.099185] krealloc_more_oob_helper+0x17c/0x2a4 [ 75.099701] krealloc_pagealloc_more_oob+0x18/0x24 [ 75.100211] kunit_try_run_case+0x80/0x184 [ 75.100842] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.101419] kthread+0x16c/0x21c [ 75.101844] ret_from_fork+0x10/0x20 [ 75.102247] [ 75.102461] The buggy address belongs to the physical page: [ 75.102937] page:0000000021e95fe4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a24 [ 75.103661] head:0000000021e95fe4 order:2 compound_mapcount:0 compound_pincount:0 [ 75.104307] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff) [ 75.105179] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000 [ 75.105877] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 75.106505] page dumped because: kasan: bad access detected [ 75.106986] [ 75.107167] Memory state around the buggy address: [ 75.107606] ffff0000c5a25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.108243] ffff0000c5a26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.109110] >ffff0000c5a26080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 75.109717] ^ [ 75.110246] ffff0000c5a26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 75.110895] ffff0000c5a26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 75.111514] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 74.795207] ================================================================== [ 74.795920] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0xa0/0x14c [ 74.796505] Write of size 1 at addr ffff0000c4085f00 by task kunit_try_catch/128 [ 74.797712] [ 74.798035] CPU: 1 PID: 128 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.799088] Hardware name: linux,dummy-virt (DT) [ 74.799678] Call trace: [ 74.800059] dump_backtrace+0xf8/0x118 [ 74.800765] show_stack+0x18/0x24 [ 74.801457] __dump_stack+0x28/0x38 [ 74.802039] dump_stack_lvl+0x54/0x6c [ 74.802630] print_address_description+0x7c/0x1ec [ 74.803377] print_report+0x50/0x68 [ 74.803993] kasan_report+0xac/0x100 [ 74.804437] __asan_store1+0x6c/0x70 [ 74.805148] kmalloc_large_oob_right+0xa0/0x14c [ 74.805864] kunit_try_run_case+0x80/0x184 [ 74.806511] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.807311] kthread+0x16c/0x21c [ 74.807804] ret_from_fork+0x10/0x20 [ 74.808180] [ 74.808367] Allocated by task 128: [ 74.808653] kasan_set_track+0x4c/0x80 [ 74.809453] kasan_save_alloc_info+0x28/0x34 [ 74.810116] __kasan_kmalloc+0x88/0xa0 [ 74.810742] kmalloc_trace+0x54/0x68 [ 74.811335] kmalloc_large_oob_right+0x48/0x14c [ 74.812027] kunit_try_run_case+0x80/0x184 [ 74.812724] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.813540] kthread+0x16c/0x21c [ 74.814117] ret_from_fork+0x10/0x20 [ 74.814694] [ 74.814972] The buggy address belongs to the object at ffff0000c4084000 [ 74.814972] which belongs to the cache kmalloc-8k of size 8192 [ 74.816354] The buggy address is located 7936 bytes inside of [ 74.816354] 8192-byte region [ffff0000c4084000, ffff0000c4086000) [ 74.817971] [ 74.818289] The buggy address belongs to the physical page: [ 74.819054] page:000000002acc5e88 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104080 [ 74.819781] head:000000002acc5e88 order:3 compound_mapcount:0 compound_pincount:0 [ 74.820278] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 74.821134] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002c00 [ 74.822130] raw: 0000000000000000 0000000080020002 00000001ffffffff 0000000000000000 [ 74.823028] page dumped because: kasan: bad access detected [ 74.823694] [ 74.823972] Memory state around the buggy address: [ 74.824608] ffff0000c4085e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.825525] ffff0000c4085e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.826401] >ffff0000c4085f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.827248] ^ [ 74.827730] ffff0000c4085f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.828628] ffff0000c4086000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.829578] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-pagealloc_uaf
[ 74.771656] ================================================================== [ 74.772849] BUG: KASAN: use-after-free in pagealloc_uaf+0x90/0x134 [ 74.773613] Read of size 1 at addr ffff0000c5a80000 by task kunit_try_catch/127 [ 74.774359] [ 74.774638] CPU: 0 PID: 127 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.775365] Hardware name: linux,dummy-virt (DT) [ 74.775830] Call trace: [ 74.776124] dump_backtrace+0xf8/0x118 [ 74.776694] show_stack+0x18/0x24 [ 74.777261] __dump_stack+0x28/0x38 [ 74.777733] dump_stack_lvl+0x54/0x6c [ 74.778229] print_address_description+0x7c/0x1ec [ 74.778835] print_report+0x50/0x68 [ 74.779344] kasan_report+0xac/0x100 [ 74.779872] __asan_load1+0x6c/0x70 [ 74.780393] pagealloc_uaf+0x90/0x134 [ 74.780964] kunit_try_run_case+0x80/0x184 [ 74.781438] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.782044] kthread+0x16c/0x21c [ 74.782545] ret_from_fork+0x10/0x20 [ 74.783014] [ 74.783256] The buggy address belongs to the physical page: [ 74.783796] page:000000003f79304c refcount:0 mapcount:-128 mapping:0000000000000000 index:0x0 pfn:0x105a80 [ 74.784670] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 74.785552] raw: 0bfffc0000000000 ffff0000ff7f4ad8 ffff0000ff7f4ad8 0000000000000000 [ 74.786332] raw: 0000000000000000 0000000000000007 00000000ffffff7f 0000000000000000 [ 74.786947] page dumped because: kasan: bad access detected [ 74.787382] [ 74.787574] Memory state around the buggy address: [ 74.787998] ffff0000c5a7ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.788700] ffff0000c5a7ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.789479] >ffff0000c5a80000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.790133] ^ [ 74.790552] ffff0000c5a80080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.791220] ffff0000c5a80100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.791861] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[ 74.743076] ================================================================== [ 74.744449] BUG: KASAN: invalid-free in kfree+0x70/0x74 [ 74.745446] Free of addr ffff0000c5a24001 by task kunit_try_catch/125 [ 74.745948] [ 74.746184] CPU: 1 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.746952] Hardware name: linux,dummy-virt (DT) [ 74.747347] Call trace: [ 74.747642] dump_backtrace+0xf8/0x118 [ 74.748165] show_stack+0x18/0x24 [ 74.748611] __dump_stack+0x28/0x38 [ 74.749097] dump_stack_lvl+0x54/0x6c [ 74.749514] print_address_description+0x7c/0x1ec [ 74.750044] print_report+0x50/0x68 [ 74.750474] kasan_report_invalid_free+0x9c/0xe8 [ 74.751017] __kasan_kfree_large+0x68/0x78 [ 74.751486] free_large_kmalloc+0x60/0xe8 [ 74.751947] kfree+0x70/0x74 [ 74.752342] kmalloc_pagealloc_invalid_free+0x80/0x120 [ 74.752881] kunit_try_run_case+0x80/0x184 [ 74.753338] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.753920] kthread+0x16c/0x21c [ 74.754367] ret_from_fork+0x10/0x20 [ 74.754780] [ 74.755009] The buggy address belongs to the physical page: [ 74.755448] page:0000000021e95fe4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a24 [ 74.756226] head:0000000021e95fe4 order:2 compound_mapcount:0 compound_pincount:0 [ 74.756862] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff) [ 74.757561] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000 [ 74.758249] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 74.758875] page dumped because: kasan: bad access detected [ 74.759360] [ 74.759584] Memory state around the buggy address: [ 74.759996] ffff0000c5a23f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.760648] ffff0000c5a23f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.761272] >ffff0000c5a24000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.761872] ^ [ 74.762208] ffff0000c5a24080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.762850] ffff0000c5a24100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.763449] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_pagealloc_uaf
[ 74.718669] ================================================================== [ 74.719590] BUG: KASAN: use-after-free in kmalloc_pagealloc_uaf+0x88/0x12c [ 74.720338] Read of size 1 at addr ffff0000c5a24000 by task kunit_try_catch/124 [ 74.720894] [ 74.721135] CPU: 1 PID: 124 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.721904] Hardware name: linux,dummy-virt (DT) [ 74.722329] Call trace: [ 74.722604] dump_backtrace+0xf8/0x118 [ 74.723147] show_stack+0x18/0x24 [ 74.723699] __dump_stack+0x28/0x38 [ 74.724143] dump_stack_lvl+0x54/0x6c [ 74.724622] print_address_description+0x7c/0x1ec [ 74.725210] print_report+0x50/0x68 [ 74.725697] kasan_report+0xac/0x100 [ 74.726178] __asan_load1+0x6c/0x70 [ 74.726618] kmalloc_pagealloc_uaf+0x88/0x12c [ 74.727096] kunit_try_run_case+0x80/0x184 [ 74.727588] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.728162] kthread+0x16c/0x21c [ 74.728606] ret_from_fork+0x10/0x20 [ 74.729074] [ 74.729301] The buggy address belongs to the physical page: [ 74.729781] page:0000000021e95fe4 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a24 [ 74.730570] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 74.731219] raw: 0bfffc0000000000 ffff0000daf62fb8 ffff0000daf62fb8 0000000000000000 [ 74.731910] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 74.732493] page dumped because: kasan: bad access detected [ 74.732994] [ 74.733260] Memory state around the buggy address: [ 74.733697] ffff0000c5a23f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.734302] ffff0000c5a23f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.734990] >ffff0000c5a24000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.735841] ^ [ 74.736330] ffff0000c5a24080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.737325] ffff0000c5a24100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.738307] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_pagealloc_oob_right
[ 74.689959] ================================================================== [ 74.690710] BUG: KASAN: slab-out-of-bounds in kmalloc_pagealloc_oob_right+0x84/0x130 [ 74.691885] Write of size 1 at addr ffff0000c5a2600a by task kunit_try_catch/123 [ 74.693071] [ 74.693436] CPU: 1 PID: 123 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.694594] Hardware name: linux,dummy-virt (DT) [ 74.695330] Call trace: [ 74.695752] dump_backtrace+0xf8/0x118 [ 74.696398] show_stack+0x18/0x24 [ 74.697064] __dump_stack+0x28/0x38 [ 74.697689] dump_stack_lvl+0x54/0x6c [ 74.698338] print_address_description+0x7c/0x1ec [ 74.699113] print_report+0x50/0x68 [ 74.699717] kasan_report+0xac/0x100 [ 74.700286] __asan_store1+0x6c/0x70 [ 74.700736] kmalloc_pagealloc_oob_right+0x84/0x130 [ 74.701674] kunit_try_run_case+0x80/0x184 [ 74.702130] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.702632] kthread+0x16c/0x21c [ 74.703211] ret_from_fork+0x10/0x20 [ 74.703799] [ 74.704071] The buggy address belongs to the physical page: [ 74.704895] page:0000000021e95fe4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a24 [ 74.706034] head:0000000021e95fe4 order:2 compound_mapcount:0 compound_pincount:0 [ 74.706953] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff) [ 74.707894] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000 [ 74.708919] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 74.709955] page dumped because: kasan: bad access detected [ 74.710578] [ 74.710770] Memory state around the buggy address: [ 74.711125] ffff0000c5a25f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.711613] ffff0000c5a25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.712155] >ffff0000c5a26000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 74.712781] ^ [ 74.713215] ffff0000c5a26080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 74.713997] ffff0000c5a26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 74.714688] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 74.658047] ================================================================== [ 74.658874] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0xa4/0x15c [ 74.659648] Read of size 1 at addr ffff0000c58cf000 by task kunit_try_catch/122 [ 74.660289] [ 74.660547] CPU: 1 PID: 122 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.661258] Hardware name: linux,dummy-virt (DT) [ 74.661676] Call trace: [ 74.661986] dump_backtrace+0xf8/0x118 [ 74.662459] show_stack+0x18/0x24 [ 74.662884] __dump_stack+0x28/0x38 [ 74.663338] dump_stack_lvl+0x54/0x6c [ 74.663945] print_address_description+0x7c/0x1ec [ 74.664498] print_report+0x50/0x68 [ 74.665134] kasan_report+0xac/0x100 [ 74.665571] __asan_load1+0x6c/0x70 [ 74.666021] kmalloc_node_oob_right+0xa4/0x15c [ 74.666496] kunit_try_run_case+0x80/0x184 [ 74.666961] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.667520] kthread+0x16c/0x21c [ 74.667947] ret_from_fork+0x10/0x20 [ 74.668365] [ 74.668564] Allocated by task 122: [ 74.669089] kasan_set_track+0x4c/0x80 [ 74.669596] kasan_save_alloc_info+0x28/0x34 [ 74.670090] __kasan_kmalloc+0x88/0xa0 [ 74.670536] kmalloc_node_trace+0x4c/0x60 [ 74.671028] kmalloc_node_oob_right+0x4c/0x15c [ 74.671500] kunit_try_run_case+0x80/0x184 [ 74.672002] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.672560] kthread+0x16c/0x21c [ 74.673171] ret_from_fork+0x10/0x20 [ 74.673626] [ 74.673843] The buggy address belongs to the object at ffff0000c58ce000 [ 74.673843] which belongs to the cache kmalloc-4k of size 4096 [ 74.674789] The buggy address is located 0 bytes to the right of [ 74.674789] 4096-byte region [ffff0000c58ce000, ffff0000c58cf000) [ 74.675722] [ 74.675937] The buggy address belongs to the physical page: [ 74.676443] page:00000000de932318 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c8 [ 74.677839] head:00000000de932318 order:3 compound_mapcount:0 compound_pincount:0 [ 74.678442] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff) [ 74.679205] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002a80 [ 74.679901] raw: 0000000000000000 0000000080040004 00000001ffffffff 0000000000000000 [ 74.680528] page dumped because: kasan: bad access detected [ 74.681154] [ 74.681354] Memory state around the buggy address: [ 74.681792] ffff0000c58cef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.682432] ffff0000c58cef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.683046] >ffff0000c58cf000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.683632] ^ [ 74.684035] ffff0000c58cf080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.684866] ffff0000c58cf100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.685453] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 74.622957] ================================================================== [ 74.623870] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x9c/0x154 [ 74.624600] Read of size 1 at addr ffff0000c59e1dff by task kunit_try_catch/121 [ 74.625383] [ 74.625668] CPU: 0 PID: 121 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.626737] Hardware name: linux,dummy-virt (DT) [ 74.627158] Call trace: [ 74.627478] dump_backtrace+0xf8/0x118 [ 74.627992] show_stack+0x18/0x24 [ 74.628475] __dump_stack+0x28/0x38 [ 74.628936] dump_stack_lvl+0x54/0x6c [ 74.629363] print_address_description+0x7c/0x1ec [ 74.629933] print_report+0x50/0x68 [ 74.630388] kasan_report+0xac/0x100 [ 74.630841] __asan_load1+0x6c/0x70 [ 74.631318] kmalloc_oob_left+0x9c/0x154 [ 74.631841] kunit_try_run_case+0x80/0x184 [ 74.632440] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.633047] kthread+0x16c/0x21c [ 74.633790] ret_from_fork+0x10/0x20 [ 74.634235] [ 74.634444] Allocated by task 1: [ 74.634768] kasan_set_track+0x4c/0x80 [ 74.635281] kasan_save_alloc_info+0x28/0x34 [ 74.635782] __kasan_kmalloc+0x88/0xa0 [ 74.636250] __kmalloc_node_track_caller+0xc4/0xf0 [ 74.636840] kvasprintf+0xac/0x138 [ 74.637430] __kthread_create_on_node+0x1dc/0x28c [ 74.638018] kthread_create_on_node+0x8c/0xbc [ 74.638502] kunit_try_catch_run+0xac/0x314 [ 74.638992] kunit_run_tests+0x2fc/0xa40 [ 74.639431] __kunit_test_suites_init+0x74/0xa8 [ 74.639939] kunit_exec_run_tests+0x64/0x74 [ 74.640417] kunit_run_all_tests+0x88/0x1e0 [ 74.640950] kernel_init_freeable+0x174/0x1ec [ 74.641661] kernel_init+0x20/0x138 [ 74.642098] ret_from_fork+0x10/0x20 [ 74.642490] [ 74.642696] The buggy address belongs to the object at ffff0000c59e1d00 [ 74.642696] which belongs to the cache kmalloc-128 of size 128 [ 74.643601] The buggy address is located 127 bytes to the right of [ 74.643601] 128-byte region [ffff0000c59e1d00, ffff0000c59e1d80) [ 74.644559] [ 74.644774] The buggy address belongs to the physical page: [ 74.645312] page:000000000015983b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e1 [ 74.646245] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.646951] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.647566] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.648237] page dumped because: kasan: bad access detected [ 74.648711] [ 74.648936] Memory state around the buggy address: [ 74.649434] ffff0000c59e1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.650267] ffff0000c59e1d00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.650899] >ffff0000c59e1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.651518] ^ [ 74.652109] ffff0000c59e1e00: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.653274] ffff0000c59e1e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.653892] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 74.520063] ================================================================== [ 74.520901] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x9c/0x264 [ 74.522261] Write of size 1 at addr ffff0000c598a973 by task kunit_try_catch/120 [ 74.523270] [ 74.524001] CPU: 1 PID: 120 Comm: kunit_try_catch Tainted: G N 6.1.146-rc1 #1 [ 74.524860] Hardware name: linux,dummy-virt (DT) [ 74.525694] Call trace: [ 74.526030] dump_backtrace+0xf8/0x118 [ 74.526676] show_stack+0x18/0x24 [ 74.527244] __dump_stack+0x28/0x38 [ 74.527700] dump_stack_lvl+0x54/0x6c [ 74.528205] print_address_description+0x7c/0x1ec [ 74.528952] print_report+0x50/0x68 [ 74.529406] kasan_report+0xac/0x100 [ 74.529841] __asan_store1+0x6c/0x70 [ 74.530308] kmalloc_oob_right+0x9c/0x264 [ 74.530712] kunit_try_run_case+0x80/0x184 [ 74.531146] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.531637] kthread+0x16c/0x21c [ 74.532027] ret_from_fork+0x10/0x20 [ 74.532581] [ 74.532965] Allocated by task 120: [ 74.533450] kasan_set_track+0x4c/0x80 [ 74.533992] kasan_save_alloc_info+0x28/0x34 [ 74.534449] __kasan_kmalloc+0x88/0xa0 [ 74.534996] kmalloc_trace+0x54/0x68 [ 74.535577] kmalloc_oob_right+0x48/0x264 [ 74.536203] kunit_try_run_case+0x80/0x184 [ 74.536911] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.537840] kthread+0x16c/0x21c [ 74.538414] ret_from_fork+0x10/0x20 [ 74.538869] [ 74.539108] The buggy address belongs to the object at ffff0000c598a900 [ 74.539108] which belongs to the cache kmalloc-128 of size 128 [ 74.539886] The buggy address is located 115 bytes inside of [ 74.539886] 128-byte region [ffff0000c598a900, ffff0000c598a980) [ 74.541421] [ 74.541833] The buggy address belongs to the physical page: [ 74.542824] page:00000000c3a27766 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10598a [ 74.544199] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.545980] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.547001] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.547955] page dumped because: kasan: bad access detected [ 74.548696] [ 74.549153] Memory state around the buggy address: [ 74.549862] ffff0000c598a800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.550398] ffff0000c598a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.551035] >ffff0000c598a900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 74.551932] ^ [ 74.552904] ffff0000c598a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.553876] ffff0000c598aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.554770] ================================================================== [ 74.556988] ================================================================== [ 74.557978] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xe8/0x264 [ 74.558898] Write of size 1 at addr ffff0000c598a978 by task kunit_try_catch/120 [ 74.559796] [ 74.560074] CPU: 1 PID: 120 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.561374] Hardware name: linux,dummy-virt (DT) [ 74.561722] Call trace: [ 74.561967] dump_backtrace+0xf8/0x118 [ 74.562392] show_stack+0x18/0x24 [ 74.562801] __dump_stack+0x28/0x38 [ 74.563367] dump_stack_lvl+0x54/0x6c [ 74.563960] print_address_description+0x7c/0x1ec [ 74.564894] print_report+0x50/0x68 [ 74.565521] kasan_report+0xac/0x100 [ 74.566144] __asan_store1+0x6c/0x70 [ 74.566768] kmalloc_oob_right+0xe8/0x264 [ 74.567390] kunit_try_run_case+0x80/0x184 [ 74.568043] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.569029] kthread+0x16c/0x21c [ 74.569608] ret_from_fork+0x10/0x20 [ 74.570195] [ 74.570464] Allocated by task 120: [ 74.570942] kasan_set_track+0x4c/0x80 [ 74.571563] kasan_save_alloc_info+0x28/0x34 [ 74.572225] __kasan_kmalloc+0x88/0xa0 [ 74.573042] kmalloc_trace+0x54/0x68 [ 74.573638] kmalloc_oob_right+0x48/0x264 [ 74.574264] kunit_try_run_case+0x80/0x184 [ 74.574899] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.575402] kthread+0x16c/0x21c [ 74.575786] ret_from_fork+0x10/0x20 [ 74.576158] [ 74.576342] The buggy address belongs to the object at ffff0000c598a900 [ 74.576342] which belongs to the cache kmalloc-128 of size 128 [ 74.578133] The buggy address is located 120 bytes inside of [ 74.578133] 128-byte region [ffff0000c598a900, ffff0000c598a980) [ 74.579037] [ 74.579223] The buggy address belongs to the physical page: [ 74.579582] page:00000000c3a27766 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10598a [ 74.580311] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.580947] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.581748] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.582630] page dumped because: kasan: bad access detected [ 74.583137] [ 74.583316] Memory state around the buggy address: [ 74.583982] ffff0000c598a800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 74.584934] ffff0000c598a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.585862] >ffff0000c598a900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 74.586357] ^ [ 74.586829] ffff0000c598a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.587310] ffff0000c598aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.587784] ================================================================== [ 74.589225] ================================================================== [ 74.590090] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x134/0x264 [ 74.591017] Read of size 1 at addr ffff0000c598a980 by task kunit_try_catch/120 [ 74.591921] [ 74.592224] CPU: 1 PID: 120 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.593377] Hardware name: linux,dummy-virt (DT) [ 74.594008] Call trace: [ 74.594376] dump_backtrace+0xf8/0x118 [ 74.595015] show_stack+0x18/0x24 [ 74.595590] __dump_stack+0x28/0x38 [ 74.596166] dump_stack_lvl+0x54/0x6c [ 74.596953] print_address_description+0x7c/0x1ec [ 74.597702] print_report+0x50/0x68 [ 74.598319] kasan_report+0xac/0x100 [ 74.598946] __asan_load1+0x6c/0x70 [ 74.599549] kmalloc_oob_right+0x134/0x264 [ 74.600192] kunit_try_run_case+0x80/0x184 [ 74.601020] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.601882] kthread+0x16c/0x21c [ 74.602450] ret_from_fork+0x10/0x20 [ 74.602877] [ 74.603061] Allocated by task 120: [ 74.603347] kasan_set_track+0x4c/0x80 [ 74.603773] kasan_save_alloc_info+0x28/0x34 [ 74.604196] __kasan_kmalloc+0x88/0xa0 [ 74.604714] kmalloc_trace+0x54/0x68 [ 74.605386] kmalloc_oob_right+0x48/0x264 [ 74.605872] kunit_try_run_case+0x80/0x184 [ 74.606349] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 74.606930] kthread+0x16c/0x21c [ 74.607342] ret_from_fork+0x10/0x20 [ 74.607774] [ 74.607970] The buggy address belongs to the object at ffff0000c598a900 [ 74.607970] which belongs to the cache kmalloc-128 of size 128 [ 74.609708] The buggy address is located 0 bytes to the right of [ 74.609708] 128-byte region [ffff0000c598a900, ffff0000c598a980) [ 74.610645] [ 74.610871] The buggy address belongs to the physical page: [ 74.611322] page:00000000c3a27766 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10598a [ 74.612149] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff) [ 74.612986] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300 [ 74.613664] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 74.614267] page dumped because: kasan: bad access detected [ 74.614726] [ 74.614983] Memory state around the buggy address: [ 74.615420] ffff0000c598a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.616079] ffff0000c598a900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 74.616929] >ffff0000c598a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.617537] ^ [ 74.617906] ffff0000c598aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.618527] ffff0000c598aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.619145] ==================================================================