Date
June 2, 2025, 2:10 p.m.
Failure - log-parser-boot - internal-error-oops-oops-preempt-smp
[ 104.242170] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP [ 104.243203] Modules linked in: [ 104.244055] CPU: 0 UID: 0 PID: 615 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 104.244748] Tainted: [B]=BAD_PAGE, [N]=TEST [ 104.245051] Hardware name: linux,dummy-virt (DT) [ 104.246308] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 104.247031] pc : kunit_test_null_dereference+0x70/0x170 [ 104.247861] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 104.248289] sp : ffff800083407dc0 [ 104.248762] x29: ffff800083407e20 x28: 0000000000000000 x27: 0000000000000000 [ 104.249998] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000c6dded00 [ 104.250763] x23: ffff93d53abb2730 x22: ffff93d53abbb300 x21: fff00000c6dded08 [ 104.251550] x20: 1ffff00010680fb8 x19: ffff8000800879f0 x18: 00000000333a7fe5 [ 104.252509] x17: 0000000000000001 x16: fff00000da4faee0 x15: ffff93d53ab6f678 [ 104.253223] x14: 1ffe00001b49f5c0 x13: 0000000000000000 x12: fffd80001b49f481 [ 104.253967] x11: 1ffe00001b49f480 x10: fffd80001b49f480 x9 : ffff93d53abb27b8 [ 104.254783] x8 : ffff800083407c88 x7 : 0000000000000000 x6 : 0000000041b58ab3 [ 104.255503] x5 : ffff700010680fb8 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 104.256379] x2 : dfff800000000000 x1 : fff00000cbce6400 x0 : ffff8000800879f0 [ 104.257013] Call trace: [ 104.257256] kunit_test_null_dereference+0x70/0x170 [ 104.257671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 104.258256] kthread+0x24c/0x2d0 [ 104.258695] ret_from_fork+0x10/0x20 [ 104.259754] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 104.260862] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 53.356874] ================================================================== [ 53.357340] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 53.357340] [ 53.357856] Use-after-free read at 0x0000000084d8593f (in kfence-#165): [ 53.358292] test_krealloc+0x51c/0x830 [ 53.358804] kunit_try_run_case+0x170/0x3f0 [ 53.359362] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.359626] kthread+0x24c/0x2d0 [ 53.360038] ret_from_fork+0x10/0x20 [ 53.360467] [ 53.360703] kfence-#165: 0x0000000084d8593f-0x00000000934a97e3, size=32, cache=kmalloc-32 [ 53.360703] [ 53.361676] allocated by task 316 on cpu 0 at 53.356005s (0.005662s ago): [ 53.362187] test_alloc+0x29c/0x628 [ 53.362502] test_krealloc+0xc0/0x830 [ 53.362776] kunit_try_run_case+0x170/0x3f0 [ 53.363201] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.363680] kthread+0x24c/0x2d0 [ 53.363884] ret_from_fork+0x10/0x20 [ 53.364171] [ 53.364327] freed by task 316 on cpu 0 at 53.356361s (0.007959s ago): [ 53.364707] krealloc_noprof+0xa8/0x1a0 [ 53.364930] test_krealloc+0x1dc/0x830 [ 53.365156] kunit_try_run_case+0x170/0x3f0 [ 53.365403] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.365918] kthread+0x24c/0x2d0 [ 53.366110] ret_from_fork+0x10/0x20 [ 53.366380] [ 53.366522] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 53.367171] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.367684] Hardware name: linux,dummy-virt (DT) [ 53.368136] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 20.628790] ================================================================== [ 20.629915] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 20.630296] Read of size 4 at addr fff00000c5c7fb00 by task ksoftirqd/1/26 [ 20.630741] [ 20.630924] CPU: 1 UID: 0 PID: 26 Comm: ksoftirqd/1 Tainted: G B N 6.12.32-rc1 #1 [ 20.631036] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.631082] Hardware name: linux,dummy-virt (DT) [ 20.631126] Call trace: [ 20.631170] dump_backtrace+0x9c/0x128 [ 20.631227] show_stack+0x20/0x38 [ 20.631284] dump_stack_lvl+0x8c/0xd0 [ 20.631371] print_report+0x118/0x5f0 [ 20.631424] kasan_report+0xdc/0x128 [ 20.631483] __asan_report_load4_noabort+0x20/0x30 [ 20.631539] rcu_uaf_reclaim+0x64/0x70 [ 20.631588] rcu_core+0xa54/0x1df8 [ 20.631641] rcu_core_si+0x18/0x30 [ 20.631688] handle_softirqs+0x36c/0xb18 [ 20.631736] run_ksoftirqd+0x80/0xb0 [ 20.631777] smpboot_thread_fn+0x42c/0x6b8 [ 20.631828] kthread+0x24c/0x2d0 [ 20.631870] ret_from_fork+0x10/0x20 [ 20.631922] [ 20.635987] Allocated by task 185: [ 20.636299] kasan_save_stack+0x3c/0x68 [ 20.636686] kasan_save_track+0x20/0x40 [ 20.636882] kasan_save_alloc_info+0x40/0x58 [ 20.637299] __kasan_kmalloc+0xd4/0xd8 [ 20.637664] __kmalloc_cache_noprof+0x154/0x320 [ 20.637986] rcu_uaf+0xb8/0x2e0 [ 20.638253] kunit_try_run_case+0x170/0x3f0 [ 20.638491] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.638997] kthread+0x24c/0x2d0 [ 20.639315] ret_from_fork+0x10/0x20 [ 20.639599] [ 20.639817] Freed by task 26: [ 20.640063] kasan_save_stack+0x3c/0x68 [ 20.640326] kasan_save_track+0x20/0x40 [ 20.640645] kasan_save_free_info+0x4c/0x78 [ 20.640894] __kasan_slab_free+0x6c/0x98 [ 20.641249] kfree+0x110/0x3b8 [ 20.641503] rcu_uaf_reclaim+0x28/0x70 [ 20.641762] rcu_core+0xa54/0x1df8 [ 20.642094] rcu_core_si+0x18/0x30 [ 20.642351] handle_softirqs+0x36c/0xb18 [ 20.642587] run_ksoftirqd+0x80/0xb0 [ 20.642890] smpboot_thread_fn+0x42c/0x6b8 [ 20.643226] kthread+0x24c/0x2d0 [ 20.643463] ret_from_fork+0x10/0x20 [ 20.643643] [ 20.643914] Last potentially related work creation: [ 20.644285] kasan_save_stack+0x3c/0x68 [ 20.644658] __kasan_record_aux_stack+0xbc/0xe8 [ 20.644922] kasan_record_aux_stack_noalloc+0x14/0x20 [ 20.645148] __call_rcu_common.constprop.0+0x74/0xa18 [ 20.645524] call_rcu+0x18/0x30 [ 20.645796] rcu_uaf+0x150/0x2e0 [ 20.646604] kunit_try_run_case+0x170/0x3f0 [ 20.647172] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.647428] kthread+0x24c/0x2d0 [ 20.647603] ret_from_fork+0x10/0x20 [ 20.647805] [ 20.647941] The buggy address belongs to the object at fff00000c5c7fb00 [ 20.647941] which belongs to the cache kmalloc-32 of size 32 [ 20.649672] The buggy address is located 0 bytes inside of [ 20.649672] freed 32-byte region [fff00000c5c7fb00, fff00000c5c7fb20) [ 20.650880] [ 20.651366] The buggy address belongs to the physical page: [ 20.652069] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c7f [ 20.653019] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.653988] page_type: f5(slab) [ 20.654633] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 20.655307] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 20.655773] page dumped because: kasan: bad access detected [ 20.656040] [ 20.656251] Memory state around the buggy address: [ 20.656552] fff00000c5c7fa00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.656965] fff00000c5c7fa80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.657348] >fff00000c5c7fb00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 20.657865] ^ [ 20.658200] fff00000c5c7fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.658643] fff00000c5c7fc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.659079] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 20.529409] ================================================================== [ 20.529976] BUG: KASAN: slab-use-after-free in ksize_uaf+0x578/0x5d0 [ 20.530529] Read of size 1 at addr fff00000c6492d00 by task kunit_try_catch/183 [ 20.530961] [ 20.531576] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 20.531804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.531877] Hardware name: linux,dummy-virt (DT) [ 20.531957] Call trace: [ 20.532010] dump_backtrace+0x9c/0x128 [ 20.532894] show_stack+0x20/0x38 [ 20.532962] dump_stack_lvl+0x8c/0xd0 [ 20.533014] print_report+0x118/0x5f0 [ 20.533057] kasan_report+0xdc/0x128 [ 20.533099] __asan_report_load1_noabort+0x20/0x30 [ 20.533145] ksize_uaf+0x578/0x5d0 [ 20.533189] kunit_try_run_case+0x170/0x3f0 [ 20.533233] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.533319] kthread+0x24c/0x2d0 [ 20.533363] ret_from_fork+0x10/0x20 [ 20.533411] [ 20.538819] Allocated by task 183: [ 20.539535] kasan_save_stack+0x3c/0x68 [ 20.540171] kasan_save_track+0x20/0x40 [ 20.540619] kasan_save_alloc_info+0x40/0x58 [ 20.541128] __kasan_kmalloc+0xd4/0xd8 [ 20.541523] __kmalloc_cache_noprof+0x154/0x320 [ 20.542072] ksize_uaf+0xb8/0x5d0 [ 20.542545] kunit_try_run_case+0x170/0x3f0 [ 20.542907] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.543752] kthread+0x24c/0x2d0 [ 20.544151] ret_from_fork+0x10/0x20 [ 20.544567] [ 20.544885] Freed by task 183: [ 20.545221] kasan_save_stack+0x3c/0x68 [ 20.545732] kasan_save_track+0x20/0x40 [ 20.546191] kasan_save_free_info+0x4c/0x78 [ 20.546733] __kasan_slab_free+0x6c/0x98 [ 20.547553] kfree+0x110/0x3b8 [ 20.547958] ksize_uaf+0x120/0x5d0 [ 20.548205] kunit_try_run_case+0x170/0x3f0 [ 20.548477] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.548853] kthread+0x24c/0x2d0 [ 20.549326] ret_from_fork+0x10/0x20 [ 20.549809] [ 20.550346] The buggy address belongs to the object at fff00000c6492d00 [ 20.550346] which belongs to the cache kmalloc-128 of size 128 [ 20.551898] The buggy address is located 0 bytes inside of [ 20.551898] freed 128-byte region [fff00000c6492d00, fff00000c6492d80) [ 20.552786] [ 20.553060] The buggy address belongs to the physical page: [ 20.553674] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106492 [ 20.554274] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.554848] page_type: f5(slab) [ 20.555598] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.556285] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.556816] page dumped because: kasan: bad access detected [ 20.557318] [ 20.557603] Memory state around the buggy address: [ 20.557989] fff00000c6492c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.558639] fff00000c6492c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.559169] >fff00000c6492d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.560011] ^ [ 20.560445] fff00000c6492d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.561084] fff00000c6492e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.561661] ================================================================== [ 20.493577] ================================================================== [ 20.494341] BUG: KASAN: slab-use-after-free in ksize_uaf+0x174/0x5d0 [ 20.495138] Read of size 1 at addr fff00000c6492d00 by task kunit_try_catch/183 [ 20.496223] [ 20.496597] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 20.496834] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.496920] Hardware name: linux,dummy-virt (DT) [ 20.497004] Call trace: [ 20.497060] dump_backtrace+0x9c/0x128 [ 20.497143] show_stack+0x20/0x38 [ 20.497188] dump_stack_lvl+0x8c/0xd0 [ 20.497256] print_report+0x118/0x5f0 [ 20.497325] kasan_report+0xdc/0x128 [ 20.497368] __kasan_check_byte+0x54/0x70 [ 20.497411] ksize+0x30/0x88 [ 20.497451] ksize_uaf+0x174/0x5d0 [ 20.497508] kunit_try_run_case+0x170/0x3f0 [ 20.497559] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.497611] kthread+0x24c/0x2d0 [ 20.497653] ret_from_fork+0x10/0x20 [ 20.497701] [ 20.503536] Allocated by task 183: [ 20.504041] kasan_save_stack+0x3c/0x68 [ 20.504505] kasan_save_track+0x20/0x40 [ 20.504998] kasan_save_alloc_info+0x40/0x58 [ 20.505540] __kasan_kmalloc+0xd4/0xd8 [ 20.506007] __kmalloc_cache_noprof+0x154/0x320 [ 20.506438] ksize_uaf+0xb8/0x5d0 [ 20.506925] kunit_try_run_case+0x170/0x3f0 [ 20.507724] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.508266] kthread+0x24c/0x2d0 [ 20.508694] ret_from_fork+0x10/0x20 [ 20.509114] [ 20.509421] Freed by task 183: [ 20.509806] kasan_save_stack+0x3c/0x68 [ 20.510249] kasan_save_track+0x20/0x40 [ 20.510755] kasan_save_free_info+0x4c/0x78 [ 20.511568] __kasan_slab_free+0x6c/0x98 [ 20.511968] kfree+0x110/0x3b8 [ 20.512443] ksize_uaf+0x120/0x5d0 [ 20.512839] kunit_try_run_case+0x170/0x3f0 [ 20.513282] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.513882] kthread+0x24c/0x2d0 [ 20.514284] ret_from_fork+0x10/0x20 [ 20.514759] [ 20.515035] The buggy address belongs to the object at fff00000c6492d00 [ 20.515035] which belongs to the cache kmalloc-128 of size 128 [ 20.516102] The buggy address is located 0 bytes inside of [ 20.516102] freed 128-byte region [fff00000c6492d00, fff00000c6492d80) [ 20.517014] [ 20.517342] The buggy address belongs to the physical page: [ 20.517869] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106492 [ 20.518659] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.519310] page_type: f5(slab) [ 20.520120] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.520800] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.521314] page dumped because: kasan: bad access detected [ 20.521885] [ 20.522166] Memory state around the buggy address: [ 20.522627] fff00000c6492c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.523278] fff00000c6492c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.524088] >fff00000c6492d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.524640] ^ [ 20.525072] fff00000c6492d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.525639] fff00000c6492e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.526161] ================================================================== [ 20.564889] ================================================================== [ 20.565334] BUG: KASAN: slab-use-after-free in ksize_uaf+0x53c/0x5d0 [ 20.565896] Read of size 1 at addr fff00000c6492d78 by task kunit_try_catch/183 [ 20.566461] [ 20.566770] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 20.566969] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.567039] Hardware name: linux,dummy-virt (DT) [ 20.567542] Call trace: [ 20.567632] dump_backtrace+0x9c/0x128 [ 20.567753] show_stack+0x20/0x38 [ 20.567801] dump_stack_lvl+0x8c/0xd0 [ 20.567849] print_report+0x118/0x5f0 [ 20.567893] kasan_report+0xdc/0x128 [ 20.567935] __asan_report_load1_noabort+0x20/0x30 [ 20.567983] ksize_uaf+0x53c/0x5d0 [ 20.568025] kunit_try_run_case+0x170/0x3f0 [ 20.568074] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.568124] kthread+0x24c/0x2d0 [ 20.568165] ret_from_fork+0x10/0x20 [ 20.568213] [ 20.573405] Allocated by task 183: [ 20.573897] kasan_save_stack+0x3c/0x68 [ 20.574453] kasan_save_track+0x20/0x40 [ 20.574957] kasan_save_alloc_info+0x40/0x58 [ 20.575869] __kasan_kmalloc+0xd4/0xd8 [ 20.576323] __kmalloc_cache_noprof+0x154/0x320 [ 20.576921] ksize_uaf+0xb8/0x5d0 [ 20.577385] kunit_try_run_case+0x170/0x3f0 [ 20.577848] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.578388] kthread+0x24c/0x2d0 [ 20.578843] ret_from_fork+0x10/0x20 [ 20.579527] [ 20.579841] Freed by task 183: [ 20.580208] kasan_save_stack+0x3c/0x68 [ 20.580654] kasan_save_track+0x20/0x40 [ 20.581125] kasan_save_free_info+0x4c/0x78 [ 20.581541] __kasan_slab_free+0x6c/0x98 [ 20.582043] kfree+0x110/0x3b8 [ 20.582391] ksize_uaf+0x120/0x5d0 [ 20.582877] kunit_try_run_case+0x170/0x3f0 [ 20.583546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.584202] kthread+0x24c/0x2d0 [ 20.584598] ret_from_fork+0x10/0x20 [ 20.585033] [ 20.585321] The buggy address belongs to the object at fff00000c6492d00 [ 20.585321] which belongs to the cache kmalloc-128 of size 128 [ 20.586286] The buggy address is located 120 bytes inside of [ 20.586286] freed 128-byte region [fff00000c6492d00, fff00000c6492d80) [ 20.588261] [ 20.588582] The buggy address belongs to the physical page: [ 20.588988] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106492 [ 20.589761] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.590424] page_type: f5(slab) [ 20.590885] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.591629] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.592463] page dumped because: kasan: bad access detected [ 20.592965] [ 20.593229] Memory state around the buggy address: [ 20.593786] fff00000c6492c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.594321] fff00000c6492c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.594987] >fff00000c6492d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.595536] ^ [ 20.596320] fff00000c6492d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.596941] fff00000c6492e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.597595] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 20.398381] ================================================================== [ 20.399093] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x630/0x720 [ 20.400492] Read of size 1 at addr fff00000c6492c73 by task kunit_try_catch/181 [ 20.401393] [ 20.401785] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 20.402080] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.402165] Hardware name: linux,dummy-virt (DT) [ 20.402281] Call trace: [ 20.402339] dump_backtrace+0x9c/0x128 [ 20.402409] show_stack+0x20/0x38 [ 20.402454] dump_stack_lvl+0x8c/0xd0 [ 20.402503] print_report+0x118/0x5f0 [ 20.402546] kasan_report+0xdc/0x128 [ 20.402588] __asan_report_load1_noabort+0x20/0x30 [ 20.402636] ksize_unpoisons_memory+0x630/0x720 [ 20.402683] kunit_try_run_case+0x170/0x3f0 [ 20.402730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.402780] kthread+0x24c/0x2d0 [ 20.402823] ret_from_fork+0x10/0x20 [ 20.402870] [ 20.408893] Allocated by task 181: [ 20.409369] kasan_save_stack+0x3c/0x68 [ 20.409916] kasan_save_track+0x20/0x40 [ 20.410440] kasan_save_alloc_info+0x40/0x58 [ 20.410921] __kasan_kmalloc+0xd4/0xd8 [ 20.411652] __kmalloc_cache_noprof+0x154/0x320 [ 20.412114] ksize_unpoisons_memory+0xc0/0x720 [ 20.412654] kunit_try_run_case+0x170/0x3f0 [ 20.413194] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.413751] kthread+0x24c/0x2d0 [ 20.414160] ret_from_fork+0x10/0x20 [ 20.414585] [ 20.414888] The buggy address belongs to the object at fff00000c6492c00 [ 20.414888] which belongs to the cache kmalloc-128 of size 128 [ 20.416616] The buggy address is located 0 bytes to the right of [ 20.416616] allocated 115-byte region [fff00000c6492c00, fff00000c6492c73) [ 20.417700] [ 20.417984] The buggy address belongs to the physical page: [ 20.418591] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106492 [ 20.419165] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.419957] page_type: f5(slab) [ 20.420334] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.420925] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.421782] page dumped because: kasan: bad access detected [ 20.422432] [ 20.422760] Memory state around the buggy address: [ 20.423798] fff00000c6492b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 20.424398] fff00000c6492b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.425141] >fff00000c6492c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.425858] ^ [ 20.426424] fff00000c6492c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.427457] fff00000c6492d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.427912] ================================================================== [ 20.456677] ================================================================== [ 20.457378] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x720 [ 20.457988] Read of size 1 at addr fff00000c6492c7f by task kunit_try_catch/181 [ 20.458720] [ 20.459611] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 20.459860] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.459936] Hardware name: linux,dummy-virt (DT) [ 20.460022] Call trace: [ 20.460084] dump_backtrace+0x9c/0x128 [ 20.460211] show_stack+0x20/0x38 [ 20.460299] dump_stack_lvl+0x8c/0xd0 [ 20.460348] print_report+0x118/0x5f0 [ 20.460393] kasan_report+0xdc/0x128 [ 20.460433] __asan_report_load1_noabort+0x20/0x30 [ 20.460478] ksize_unpoisons_memory+0x690/0x720 [ 20.460527] kunit_try_run_case+0x170/0x3f0 [ 20.460574] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.460622] kthread+0x24c/0x2d0 [ 20.460665] ret_from_fork+0x10/0x20 [ 20.460713] [ 20.465649] Allocated by task 181: [ 20.466200] kasan_save_stack+0x3c/0x68 [ 20.466720] kasan_save_track+0x20/0x40 [ 20.467326] kasan_save_alloc_info+0x40/0x58 [ 20.467760] __kasan_kmalloc+0xd4/0xd8 [ 20.468192] __kmalloc_cache_noprof+0x154/0x320 [ 20.468620] ksize_unpoisons_memory+0xc0/0x720 [ 20.469015] kunit_try_run_case+0x170/0x3f0 [ 20.469708] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.470253] kthread+0x24c/0x2d0 [ 20.470574] ret_from_fork+0x10/0x20 [ 20.471088] [ 20.471719] The buggy address belongs to the object at fff00000c6492c00 [ 20.471719] which belongs to the cache kmalloc-128 of size 128 [ 20.472902] The buggy address is located 12 bytes to the right of [ 20.472902] allocated 115-byte region [fff00000c6492c00, fff00000c6492c73) [ 20.473962] [ 20.474324] The buggy address belongs to the physical page: [ 20.474801] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106492 [ 20.475793] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.476561] page_type: f5(slab) [ 20.477118] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.477933] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.478663] page dumped because: kasan: bad access detected [ 20.480222] [ 20.480578] Memory state around the buggy address: [ 20.481082] fff00000c6492b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.481717] fff00000c6492b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.482276] >fff00000c6492c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.482805] ^ [ 20.483646] fff00000c6492c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.484370] fff00000c6492d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.485003] ================================================================== [ 20.429962] ================================================================== [ 20.430460] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x720 [ 20.430968] Read of size 1 at addr fff00000c6492c78 by task kunit_try_catch/181 [ 20.432057] [ 20.432387] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 20.432603] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.432666] Hardware name: linux,dummy-virt (DT) [ 20.432751] Call trace: [ 20.432803] dump_backtrace+0x9c/0x128 [ 20.432922] show_stack+0x20/0x38 [ 20.433019] dump_stack_lvl+0x8c/0xd0 [ 20.433149] print_report+0x118/0x5f0 [ 20.433253] kasan_report+0xdc/0x128 [ 20.433352] __asan_report_load1_noabort+0x20/0x30 [ 20.433470] ksize_unpoisons_memory+0x628/0x720 [ 20.433595] kunit_try_run_case+0x170/0x3f0 [ 20.433704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.433795] kthread+0x24c/0x2d0 [ 20.433845] ret_from_fork+0x10/0x20 [ 20.433896] [ 20.438115] Allocated by task 181: [ 20.438390] kasan_save_stack+0x3c/0x68 [ 20.438758] kasan_save_track+0x20/0x40 [ 20.439097] kasan_save_alloc_info+0x40/0x58 [ 20.439644] __kasan_kmalloc+0xd4/0xd8 [ 20.440870] __kmalloc_cache_noprof+0x154/0x320 [ 20.441485] ksize_unpoisons_memory+0xc0/0x720 [ 20.441853] kunit_try_run_case+0x170/0x3f0 [ 20.442188] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.442658] kthread+0x24c/0x2d0 [ 20.443098] ret_from_fork+0x10/0x20 [ 20.443530] [ 20.443800] The buggy address belongs to the object at fff00000c6492c00 [ 20.443800] which belongs to the cache kmalloc-128 of size 128 [ 20.444569] The buggy address is located 5 bytes to the right of [ 20.444569] allocated 115-byte region [fff00000c6492c00, fff00000c6492c73) [ 20.445942] [ 20.446301] The buggy address belongs to the physical page: [ 20.446906] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106492 [ 20.447767] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.448460] page_type: f5(slab) [ 20.448842] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.449679] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.450383] page dumped because: kasan: bad access detected [ 20.451021] [ 20.451571] Memory state around the buggy address: [ 20.451893] fff00000c6492b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.452268] fff00000c6492b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.452631] >fff00000c6492c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.453691] ^ [ 20.454464] fff00000c6492c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.455306] fff00000c6492d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.455720] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 53.260817] ================================================================== [ 53.261422] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 53.261422] [ 53.262154] Use-after-free read at 0x00000000bde6dc28 (in kfence-#164): [ 53.262895] test_memcache_typesafe_by_rcu+0x280/0x560 [ 53.263556] kunit_try_run_case+0x170/0x3f0 [ 53.264068] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.264590] kthread+0x24c/0x2d0 [ 53.264937] ret_from_fork+0x10/0x20 [ 53.265453] [ 53.265785] kfence-#164: 0x00000000bde6dc28-0x000000000e9be907, size=32, cache=test [ 53.265785] [ 53.266461] allocated by task 314 on cpu 0 at 53.253334s (0.013114s ago): [ 53.267284] test_alloc+0x230/0x628 [ 53.267774] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 53.268340] kunit_try_run_case+0x170/0x3f0 [ 53.268820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.269372] kthread+0x24c/0x2d0 [ 53.269832] ret_from_fork+0x10/0x20 [ 53.270269] [ 53.270579] freed by task 314 on cpu 0 at 53.253551s (0.017016s ago): [ 53.271286] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 53.271786] kunit_try_run_case+0x170/0x3f0 [ 53.272276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.272802] kthread+0x24c/0x2d0 [ 53.273234] ret_from_fork+0x10/0x20 [ 53.273689] [ 53.274043] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 53.274861] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.275305] Hardware name: linux,dummy-virt (DT) [ 53.275712] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 31.954885] ================================================================== [ 31.956365] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 31.956365] [ 31.957231] Invalid read at 0x00000000c76e8775: [ 31.957916] test_invalid_access+0xdc/0x1f0 [ 31.958569] kunit_try_run_case+0x170/0x3f0 [ 31.959489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.960152] kthread+0x24c/0x2d0 [ 31.960563] ret_from_fork+0x10/0x20 [ 31.960949] [ 31.961353] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 31.962382] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.962804] Hardware name: linux,dummy-virt (DT) [ 31.963975] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 31.716369] ================================================================== [ 31.716983] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 31.716983] [ 31.718161] Corrupted memory at 0x000000005bf1344b [ ! . . . . . . . . . . . . . . . ] (in kfence-#160): [ 31.719864] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 31.720298] kunit_try_run_case+0x170/0x3f0 [ 31.720770] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.721274] kthread+0x24c/0x2d0 [ 31.721740] ret_from_fork+0x10/0x20 [ 31.722110] [ 31.722364] kfence-#160: 0x000000004cb80fab-0x00000000e37b1e1e, size=73, cache=kmalloc-96 [ 31.722364] [ 31.723208] allocated by task 304 on cpu 1 at 31.715943s (0.007252s ago): [ 31.723805] test_alloc+0x29c/0x628 [ 31.724171] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 31.724650] kunit_try_run_case+0x170/0x3f0 [ 31.725039] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.725545] kthread+0x24c/0x2d0 [ 31.725889] ret_from_fork+0x10/0x20 [ 31.726280] [ 31.726561] freed by task 304 on cpu 1 at 31.716177s (0.010372s ago): [ 31.727124] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 31.727689] kunit_try_run_case+0x170/0x3f0 [ 31.728084] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.728674] kthread+0x24c/0x2d0 [ 31.729057] ret_from_fork+0x10/0x20 [ 31.729406] [ 31.729726] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 31.730480] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.730944] Hardware name: linux,dummy-virt (DT) [ 31.731383] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 31.404624] ================================================================== [ 31.405212] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 31.405212] [ 31.406158] Out-of-bounds read at 0x0000000074f8621d (105B right of kfence-#157): [ 31.406971] test_kmalloc_aligned_oob_read+0x238/0x468 [ 31.407651] kunit_try_run_case+0x170/0x3f0 [ 31.408196] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.408732] kthread+0x24c/0x2d0 [ 31.409020] ret_from_fork+0x10/0x20 [ 31.409513] [ 31.409839] kfence-#157: 0x0000000062d6c62f-0x000000001f74509e, size=73, cache=kmalloc-96 [ 31.409839] [ 31.411550] allocated by task 302 on cpu 1 at 31.404226s (0.007310s ago): [ 31.412172] test_alloc+0x29c/0x628 [ 31.414070] test_kmalloc_aligned_oob_read+0x100/0x468 [ 31.414485] kunit_try_run_case+0x170/0x3f0 [ 31.414812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.415174] kthread+0x24c/0x2d0 [ 31.415566] ret_from_fork+0x10/0x20 [ 31.415888] [ 31.416151] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 31.417297] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.417763] Hardware name: linux,dummy-virt (DT) [ 31.418967] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[ 26.928507] ================================================================== [ 26.929147] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 26.929147] [ 26.929875] Corrupted memory at 0x000000009a522b7a [ ! . . . . . . . . . . . . . . . ] (in kfence-#114): [ 26.932819] test_corruption+0x278/0x378 [ 26.933220] kunit_try_run_case+0x170/0x3f0 [ 26.933747] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.934190] kthread+0x24c/0x2d0 [ 26.934582] ret_from_fork+0x10/0x20 [ 26.934958] [ 26.935224] kfence-#114: 0x00000000bb5bd880-0x000000003f047300, size=32, cache=kmalloc-32 [ 26.935224] [ 26.936132] allocated by task 290 on cpu 0 at 26.928007s (0.008112s ago): [ 26.936742] test_alloc+0x29c/0x628 [ 26.937223] test_corruption+0xdc/0x378 [ 26.937609] kunit_try_run_case+0x170/0x3f0 [ 26.937960] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.938544] kthread+0x24c/0x2d0 [ 26.938908] ret_from_fork+0x10/0x20 [ 26.939386] [ 26.939650] freed by task 290 on cpu 0 at 26.928178s (0.011461s ago): [ 26.940122] test_corruption+0x278/0x378 [ 26.940619] kunit_try_run_case+0x170/0x3f0 [ 26.941069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.941567] kthread+0x24c/0x2d0 [ 26.941942] ret_from_fork+0x10/0x20 [ 26.942344] [ 26.942607] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 26.943340] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.943806] Hardware name: linux,dummy-virt (DT) [ 26.944256] ================================================================== [ 27.136393] ================================================================== [ 27.137035] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 27.137035] [ 27.137676] Corrupted memory at 0x0000000002259677 [ ! ] (in kfence-#116): [ 27.138524] test_corruption+0x284/0x378 [ 27.139030] kunit_try_run_case+0x170/0x3f0 [ 27.139690] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.140400] kthread+0x24c/0x2d0 [ 27.140874] ret_from_fork+0x10/0x20 [ 27.141228] [ 27.141555] kfence-#116: 0x0000000073aef4e3-0x000000003bad5c25, size=32, cache=kmalloc-32 [ 27.141555] [ 27.142341] allocated by task 290 on cpu 0 at 27.135898s (0.006432s ago): [ 27.143038] test_alloc+0x29c/0x628 [ 27.143547] test_corruption+0x198/0x378 [ 27.144050] kunit_try_run_case+0x170/0x3f0 [ 27.144451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.144895] kthread+0x24c/0x2d0 [ 27.145212] ret_from_fork+0x10/0x20 [ 27.145587] [ 27.145830] freed by task 290 on cpu 0 at 27.136073s (0.009747s ago): [ 27.146424] test_corruption+0x284/0x378 [ 27.146764] kunit_try_run_case+0x170/0x3f0 [ 27.147108] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.147722] kthread+0x24c/0x2d0 [ 27.148165] ret_from_fork+0x10/0x20 [ 27.148659] [ 27.149012] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 27.149882] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.150300] Hardware name: linux,dummy-virt (DT) [ 27.150675] ================================================================== [ 27.448129] ================================================================== [ 27.448779] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 27.448779] [ 27.449355] Corrupted memory at 0x00000000a5fe1565 [ ! ] (in kfence-#119): [ 27.450045] test_corruption+0x1d8/0x378 [ 27.450546] kunit_try_run_case+0x170/0x3f0 [ 27.451003] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.451636] kthread+0x24c/0x2d0 [ 27.452067] ret_from_fork+0x10/0x20 [ 27.452543] [ 27.452833] kfence-#119: 0x00000000cd452ccd-0x000000000102bb01, size=32, cache=test [ 27.452833] [ 27.453466] allocated by task 292 on cpu 0 at 27.447875s (0.005579s ago): [ 27.454065] test_alloc+0x230/0x628 [ 27.454534] test_corruption+0x198/0x378 [ 27.455013] kunit_try_run_case+0x170/0x3f0 [ 27.455523] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.456021] kthread+0x24c/0x2d0 [ 27.456456] ret_from_fork+0x10/0x20 [ 27.456845] [ 27.457049] freed by task 292 on cpu 0 at 27.447973s (0.009066s ago): [ 27.457669] test_corruption+0x1d8/0x378 [ 27.458064] kunit_try_run_case+0x170/0x3f0 [ 27.458452] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.458861] kthread+0x24c/0x2d0 [ 27.459289] ret_from_fork+0x10/0x20 [ 27.459740] [ 27.460035] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 27.460895] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.461286] Hardware name: linux,dummy-virt (DT) [ 27.461730] ================================================================== [ 27.344207] ================================================================== [ 27.344959] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 27.344959] [ 27.345635] Corrupted memory at 0x000000007fd83cb5 [ ! . . . . . . . . . . . . . . . ] (in kfence-#118): [ 27.347455] test_corruption+0x120/0x378 [ 27.347896] kunit_try_run_case+0x170/0x3f0 [ 27.348412] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.348996] kthread+0x24c/0x2d0 [ 27.349407] ret_from_fork+0x10/0x20 [ 27.349884] [ 27.350162] kfence-#118: 0x0000000003eac2cd-0x00000000f1bb26fe, size=32, cache=test [ 27.350162] [ 27.350909] allocated by task 292 on cpu 0 at 27.343945s (0.006951s ago): [ 27.351689] test_alloc+0x230/0x628 [ 27.352083] test_corruption+0xdc/0x378 [ 27.352610] kunit_try_run_case+0x170/0x3f0 [ 27.353017] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.353624] kthread+0x24c/0x2d0 [ 27.354026] ret_from_fork+0x10/0x20 [ 27.354480] [ 27.354759] freed by task 292 on cpu 0 at 27.344042s (0.010706s ago): [ 27.355485] test_corruption+0x120/0x378 [ 27.355910] kunit_try_run_case+0x170/0x3f0 [ 27.356345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.356959] kthread+0x24c/0x2d0 [ 27.357399] ret_from_fork+0x10/0x20 [ 27.357804] [ 27.358125] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 27.358964] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.359445] Hardware name: linux,dummy-virt (DT) [ 27.359897] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 26.720198] ================================================================== [ 26.720785] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 26.720785] [ 26.721376] Invalid free of 0x000000008e4b399f (in kfence-#112): [ 26.721797] test_invalid_addr_free+0x1ac/0x238 [ 26.722343] kunit_try_run_case+0x170/0x3f0 [ 26.722736] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.723373] kthread+0x24c/0x2d0 [ 26.723794] ret_from_fork+0x10/0x20 [ 26.724261] [ 26.724540] kfence-#112: 0x000000008fbd6be0-0x00000000f0ae0dc6, size=32, cache=kmalloc-32 [ 26.724540] [ 26.725373] allocated by task 286 on cpu 1 at 26.719947s (0.005414s ago): [ 26.726092] test_alloc+0x29c/0x628 [ 26.726569] test_invalid_addr_free+0xd4/0x238 [ 26.726989] kunit_try_run_case+0x170/0x3f0 [ 26.727455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.727951] kthread+0x24c/0x2d0 [ 26.728406] ret_from_fork+0x10/0x20 [ 26.728742] [ 26.729068] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 26.729765] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.730269] Hardware name: linux,dummy-virt (DT) [ 26.730806] ================================================================== [ 26.824149] ================================================================== [ 26.824755] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 26.824755] [ 26.825193] Invalid free of 0x00000000250b593f (in kfence-#113): [ 26.825816] test_invalid_addr_free+0xec/0x238 [ 26.826586] kunit_try_run_case+0x170/0x3f0 [ 26.827327] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.827831] kthread+0x24c/0x2d0 [ 26.828180] ret_from_fork+0x10/0x20 [ 26.828568] [ 26.828806] kfence-#113: 0x000000006f5f824b-0x00000000e4c1203b, size=32, cache=test [ 26.828806] [ 26.829968] allocated by task 288 on cpu 0 at 26.823918s (0.006037s ago): [ 26.830853] test_alloc+0x230/0x628 [ 26.831285] test_invalid_addr_free+0xd4/0x238 [ 26.831827] kunit_try_run_case+0x170/0x3f0 [ 26.832390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.833028] kthread+0x24c/0x2d0 [ 26.833553] ret_from_fork+0x10/0x20 [ 26.834098] [ 26.834501] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 26.835007] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.835320] Hardware name: linux,dummy-virt (DT) [ 26.835859] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[ 26.512439] ================================================================== [ 26.513055] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 26.513055] [ 26.513775] Invalid free of 0x00000000ac1ae79b (in kfence-#110): [ 26.514409] test_double_free+0x1bc/0x238 [ 26.514937] kunit_try_run_case+0x170/0x3f0 [ 26.515395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.516037] kthread+0x24c/0x2d0 [ 26.516487] ret_from_fork+0x10/0x20 [ 26.516879] [ 26.517102] kfence-#110: 0x00000000ac1ae79b-0x00000000db4a8637, size=32, cache=kmalloc-32 [ 26.517102] [ 26.518075] allocated by task 282 on cpu 1 at 26.511915s (0.006146s ago): [ 26.518722] test_alloc+0x29c/0x628 [ 26.519228] test_double_free+0xd4/0x238 [ 26.519707] kunit_try_run_case+0x170/0x3f0 [ 26.520233] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.520839] kthread+0x24c/0x2d0 [ 26.521377] ret_from_fork+0x10/0x20 [ 26.521758] [ 26.522079] freed by task 282 on cpu 1 at 26.512034s (0.010032s ago): [ 26.522640] test_double_free+0x1ac/0x238 [ 26.523060] kunit_try_run_case+0x170/0x3f0 [ 26.523539] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.524081] kthread+0x24c/0x2d0 [ 26.524490] ret_from_fork+0x10/0x20 [ 26.524887] [ 26.525264] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 26.526068] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.526475] Hardware name: linux,dummy-virt (DT) [ 26.526922] ================================================================== [ 26.616272] ================================================================== [ 26.616832] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 26.616832] [ 26.617322] Invalid free of 0x00000000de5f4e31 (in kfence-#111): [ 26.617877] test_double_free+0x100/0x238 [ 26.618256] kunit_try_run_case+0x170/0x3f0 [ 26.618727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.619146] kthread+0x24c/0x2d0 [ 26.619623] ret_from_fork+0x10/0x20 [ 26.620088] [ 26.620385] kfence-#111: 0x00000000de5f4e31-0x00000000742eb288, size=32, cache=test [ 26.620385] [ 26.621098] allocated by task 284 on cpu 1 at 26.615844s (0.005241s ago): [ 26.621810] test_alloc+0x230/0x628 [ 26.622287] test_double_free+0xd4/0x238 [ 26.622752] kunit_try_run_case+0x170/0x3f0 [ 26.623282] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.623753] kthread+0x24c/0x2d0 [ 26.624193] ret_from_fork+0x10/0x20 [ 26.624637] [ 26.624909] freed by task 284 on cpu 1 at 26.615968s (0.008928s ago): [ 26.625416] test_double_free+0xf0/0x238 [ 26.625908] kunit_try_run_case+0x170/0x3f0 [ 26.626359] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.626844] kthread+0x24c/0x2d0 [ 26.627268] ret_from_fork+0x10/0x20 [ 26.627713] [ 26.628023] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 26.628736] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.629123] Hardware name: linux,dummy-virt (DT) [ 26.629591] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 26.408253] ================================================================== [ 26.408904] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 26.408904] [ 26.409674] Use-after-free read at 0x00000000adb4cf78 (in kfence-#109): [ 26.410128] test_use_after_free_read+0x114/0x248 [ 26.410786] kunit_try_run_case+0x170/0x3f0 [ 26.411348] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.412182] kthread+0x24c/0x2d0 [ 26.412752] ret_from_fork+0x10/0x20 [ 26.413302] [ 26.413710] kfence-#109: 0x00000000adb4cf78-0x000000006474594f, size=32, cache=test [ 26.413710] [ 26.414428] allocated by task 280 on cpu 0 at 26.407895s (0.006521s ago): [ 26.415195] test_alloc+0x230/0x628 [ 26.415565] test_use_after_free_read+0xd0/0x248 [ 26.416041] kunit_try_run_case+0x170/0x3f0 [ 26.416434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.417013] kthread+0x24c/0x2d0 [ 26.417402] ret_from_fork+0x10/0x20 [ 26.417876] [ 26.418136] freed by task 280 on cpu 0 at 26.407994s (0.010130s ago): [ 26.418931] test_use_after_free_read+0xf0/0x248 [ 26.419412] kunit_try_run_case+0x170/0x3f0 [ 26.419784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.420315] kthread+0x24c/0x2d0 [ 26.420703] ret_from_fork+0x10/0x20 [ 26.421101] [ 26.421410] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 26.422249] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.422709] Hardware name: linux,dummy-virt (DT) [ 26.423127] ================================================================== [ 26.304467] ================================================================== [ 26.305083] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 26.305083] [ 26.305873] Use-after-free read at 0x00000000a0dc4f83 (in kfence-#108): [ 26.306601] test_use_after_free_read+0x114/0x248 [ 26.307129] kunit_try_run_case+0x170/0x3f0 [ 26.307700] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.308252] kthread+0x24c/0x2d0 [ 26.308700] ret_from_fork+0x10/0x20 [ 26.309031] [ 26.309341] kfence-#108: 0x00000000a0dc4f83-0x000000006d46ef31, size=32, cache=kmalloc-32 [ 26.309341] [ 26.310218] allocated by task 278 on cpu 0 at 26.303994s (0.006211s ago): [ 26.310969] test_alloc+0x29c/0x628 [ 26.311399] test_use_after_free_read+0xd0/0x248 [ 26.311775] kunit_try_run_case+0x170/0x3f0 [ 26.312262] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.312856] kthread+0x24c/0x2d0 [ 26.313313] ret_from_fork+0x10/0x20 [ 26.313825] [ 26.314371] freed by task 278 on cpu 0 at 26.304119s (0.010055s ago): [ 26.315168] test_use_after_free_read+0x1c0/0x248 [ 26.315710] kunit_try_run_case+0x170/0x3f0 [ 26.316068] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.316639] kthread+0x24c/0x2d0 [ 26.317099] ret_from_fork+0x10/0x20 [ 26.317619] [ 26.317960] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 26.318788] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.319130] Hardware name: linux,dummy-virt (DT) [ 26.319532] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 26.200116] ================================================================== [ 26.200823] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 26.200823] [ 26.202317] Out-of-bounds write at 0x000000003b66057a (1B left of kfence-#107): [ 26.203135] test_out_of_bounds_write+0x100/0x240 [ 26.203576] kunit_try_run_case+0x170/0x3f0 [ 26.204016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.204650] kthread+0x24c/0x2d0 [ 26.205078] ret_from_fork+0x10/0x20 [ 26.205454] [ 26.205768] kfence-#107: 0x00000000d5386841-0x00000000aabdda0a, size=32, cache=test [ 26.205768] [ 26.206439] allocated by task 276 on cpu 0 at 26.199961s (0.006466s ago): [ 26.207120] test_alloc+0x230/0x628 [ 26.207563] test_out_of_bounds_write+0xc8/0x240 [ 26.207977] kunit_try_run_case+0x170/0x3f0 [ 26.208421] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.209010] kthread+0x24c/0x2d0 [ 26.209410] ret_from_fork+0x10/0x20 [ 26.209895] [ 26.210232] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 26.210901] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.211287] Hardware name: linux,dummy-virt (DT) [ 26.211687] ================================================================== [ 26.096195] ================================================================== [ 26.097011] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 26.097011] [ 26.097437] Out-of-bounds write at 0x000000006e694128 (1B left of kfence-#106): [ 26.098379] test_out_of_bounds_write+0x100/0x240 [ 26.099000] kunit_try_run_case+0x170/0x3f0 [ 26.099467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.100168] kthread+0x24c/0x2d0 [ 26.100653] ret_from_fork+0x10/0x20 [ 26.101089] [ 26.101464] kfence-#106: 0x000000005ccfd0d2-0x00000000c267c60e, size=32, cache=kmalloc-32 [ 26.101464] [ 26.102342] allocated by task 274 on cpu 0 at 26.095919s (0.006378s ago): [ 26.103199] test_alloc+0x29c/0x628 [ 26.103590] test_out_of_bounds_write+0xc8/0x240 [ 26.104035] kunit_try_run_case+0x170/0x3f0 [ 26.104598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.105246] kthread+0x24c/0x2d0 [ 26.105742] ret_from_fork+0x10/0x20 [ 26.106131] [ 26.106539] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 26.107414] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.107707] Hardware name: linux,dummy-virt (DT) [ 26.108349] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 24.953511] ================================================================== [ 24.954039] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 24.954039] [ 24.954549] Out-of-bounds read at 0x0000000089429478 (1B left of kfence-#95): [ 24.955277] test_out_of_bounds_read+0x114/0x3e0 [ 24.955754] kunit_try_run_case+0x170/0x3f0 [ 24.956022] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.956387] kthread+0x24c/0x2d0 [ 24.956639] ret_from_fork+0x10/0x20 [ 24.956979] [ 24.957351] kfence-#95: 0x0000000039100144-0x000000001e68da30, size=32, cache=kmalloc-32 [ 24.957351] [ 24.957975] allocated by task 270 on cpu 0 at 24.951889s (0.006013s ago): [ 24.958713] test_alloc+0x29c/0x628 [ 24.958954] test_out_of_bounds_read+0xdc/0x3e0 [ 24.959148] kunit_try_run_case+0x170/0x3f0 [ 24.959445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.959799] kthread+0x24c/0x2d0 [ 24.960019] ret_from_fork+0x10/0x20 [ 24.960340] [ 24.960607] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.961056] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.961362] Hardware name: linux,dummy-virt (DT) [ 24.961654] ================================================================== [ 25.160261] ================================================================== [ 25.160912] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 25.160912] [ 25.162183] Out-of-bounds read at 0x00000000d8253473 (32B right of kfence-#97): [ 25.163247] test_out_of_bounds_read+0x1c8/0x3e0 [ 25.163763] kunit_try_run_case+0x170/0x3f0 [ 25.164452] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.165117] kthread+0x24c/0x2d0 [ 25.165648] ret_from_fork+0x10/0x20 [ 25.166023] [ 25.166329] kfence-#97: 0x00000000ea4efba0-0x000000009e1c4a00, size=32, cache=kmalloc-32 [ 25.166329] [ 25.167096] allocated by task 270 on cpu 0 at 25.159927s (0.007157s ago): [ 25.167737] test_alloc+0x29c/0x628 [ 25.168196] test_out_of_bounds_read+0x198/0x3e0 [ 25.168732] kunit_try_run_case+0x170/0x3f0 [ 25.169188] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.169724] kthread+0x24c/0x2d0 [ 25.170142] ret_from_fork+0x10/0x20 [ 25.170540] [ 25.170865] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 25.171697] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.172056] Hardware name: linux,dummy-virt (DT) [ 25.172535] ================================================================== [ 25.368218] ================================================================== [ 25.368875] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 25.368875] [ 25.369627] Out-of-bounds read at 0x00000000e367fd8c (1B left of kfence-#99): [ 25.370235] test_out_of_bounds_read+0x114/0x3e0 [ 25.370745] kunit_try_run_case+0x170/0x3f0 [ 25.371178] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.371614] kthread+0x24c/0x2d0 [ 25.371953] ret_from_fork+0x10/0x20 [ 25.372362] [ 25.372641] kfence-#99: 0x00000000b9ffe2b4-0x00000000ef23d120, size=32, cache=test [ 25.372641] [ 25.373510] allocated by task 272 on cpu 1 at 25.367895s (0.005602s ago): [ 25.374217] test_alloc+0x230/0x628 [ 25.374728] test_out_of_bounds_read+0xdc/0x3e0 [ 25.375209] kunit_try_run_case+0x170/0x3f0 [ 25.375671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.376159] kthread+0x24c/0x2d0 [ 25.376580] ret_from_fork+0x10/0x20 [ 25.376993] [ 25.377292] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 25.378117] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.378468] Hardware name: linux,dummy-virt (DT) [ 25.378968] ================================================================== [ 25.992083] ================================================================== [ 25.992799] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 25.992799] [ 25.993619] Out-of-bounds read at 0x0000000039cb244d (32B right of kfence-#105): [ 25.994081] test_out_of_bounds_read+0x1c8/0x3e0 [ 25.994616] kunit_try_run_case+0x170/0x3f0 [ 25.995133] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.995634] kthread+0x24c/0x2d0 [ 25.996047] ret_from_fork+0x10/0x20 [ 25.996526] [ 25.996824] kfence-#105: 0x0000000022d9c02e-0x000000004caa7b00, size=32, cache=test [ 25.996824] [ 25.997668] allocated by task 272 on cpu 1 at 25.991928s (0.005726s ago): [ 25.998427] test_alloc+0x230/0x628 [ 25.998884] test_out_of_bounds_read+0x198/0x3e0 [ 25.999347] kunit_try_run_case+0x170/0x3f0 [ 25.999724] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.000287] kthread+0x24c/0x2d0 [ 26.000712] ret_from_fork+0x10/0x20 [ 26.001142] [ 26.001470] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 26.002229] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.002580] Hardware name: linux,dummy-virt (DT) [ 26.003058] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 24.809091] ================================================================== [ 24.809664] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x50c/0x5b0 [ 24.810918] Read of size 1 at addr ffff8000801097f8 by task kunit_try_catch/256 [ 24.811504] [ 24.811686] CPU: 1 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.811794] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.811831] Hardware name: linux,dummy-virt (DT) [ 24.811873] Call trace: [ 24.811902] dump_backtrace+0x9c/0x128 [ 24.811965] show_stack+0x20/0x38 [ 24.812010] dump_stack_lvl+0x8c/0xd0 [ 24.812058] print_report+0x310/0x5f0 [ 24.812106] kasan_report+0xdc/0x128 [ 24.812149] __asan_report_load1_noabort+0x20/0x30 [ 24.812199] vmalloc_oob+0x50c/0x5b0 [ 24.812267] kunit_try_run_case+0x170/0x3f0 [ 24.812359] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.812470] kthread+0x24c/0x2d0 [ 24.812552] ret_from_fork+0x10/0x20 [ 24.812655] [ 24.817086] The buggy address belongs to the virtual mapping at [ 24.817086] [ffff800080109000, ffff80008010b000) created by: [ 24.817086] vmalloc_oob+0x98/0x5b0 [ 24.818510] [ 24.818803] The buggy address belongs to the physical page: [ 24.819200] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106d23 [ 24.820001] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.820759] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 24.821568] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 24.822156] page dumped because: kasan: bad access detected [ 24.822697] [ 24.822930] Memory state around the buggy address: [ 24.823461] ffff800080109680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.824195] ffff800080109700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.824720] >ffff800080109780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 24.825423] ^ [ 24.826059] ffff800080109800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 24.826673] ffff800080109880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 24.827218] ================================================================== [ 24.787738] ================================================================== [ 24.788771] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x560/0x5b0 [ 24.789467] Read of size 1 at addr ffff8000801097f3 by task kunit_try_catch/256 [ 24.789884] [ 24.790201] CPU: 1 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.790544] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.790641] Hardware name: linux,dummy-virt (DT) [ 24.790726] Call trace: [ 24.790784] dump_backtrace+0x9c/0x128 [ 24.790915] show_stack+0x20/0x38 [ 24.791021] dump_stack_lvl+0x8c/0xd0 [ 24.791125] print_report+0x310/0x5f0 [ 24.791293] kasan_report+0xdc/0x128 [ 24.791440] __asan_report_load1_noabort+0x20/0x30 [ 24.791514] vmalloc_oob+0x560/0x5b0 [ 24.791563] kunit_try_run_case+0x170/0x3f0 [ 24.791616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.791669] kthread+0x24c/0x2d0 [ 24.791715] ret_from_fork+0x10/0x20 [ 24.791766] [ 24.797029] The buggy address belongs to the virtual mapping at [ 24.797029] [ffff800080109000, ffff80008010b000) created by: [ 24.797029] vmalloc_oob+0x98/0x5b0 [ 24.798121] [ 24.798490] The buggy address belongs to the physical page: [ 24.799137] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106d23 [ 24.799813] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.800539] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 24.801232] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 24.801896] page dumped because: kasan: bad access detected [ 24.802421] [ 24.802678] Memory state around the buggy address: [ 24.803192] ffff800080109680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.803837] ffff800080109700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.804472] >ffff800080109780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 24.805029] ^ [ 24.805698] ffff800080109800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 24.806437] ffff800080109880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 24.807035] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 22.937218] ================================================================== [ 22.937719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f8/0x49c8 [ 22.938468] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 22.939036] [ 22.939793] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.939999] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.940073] Hardware name: linux,dummy-virt (DT) [ 22.940158] Call trace: [ 22.940205] dump_backtrace+0x9c/0x128 [ 22.940339] show_stack+0x20/0x38 [ 22.940425] dump_stack_lvl+0x8c/0xd0 [ 22.940533] print_report+0x118/0x5f0 [ 22.940647] kasan_report+0xdc/0x128 [ 22.940754] kasan_check_range+0x100/0x1a8 [ 22.940858] __kasan_check_read+0x20/0x30 [ 22.940921] kasan_atomics_helper+0x1f8/0x49c8 [ 22.940976] kasan_atomics+0x1a0/0x2e8 [ 22.941028] kunit_try_run_case+0x170/0x3f0 [ 22.941080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.941135] kthread+0x24c/0x2d0 [ 22.941182] ret_from_fork+0x10/0x20 [ 22.941253] [ 22.948528] Allocated by task 252: [ 22.948865] kasan_save_stack+0x3c/0x68 [ 22.949555] kasan_save_track+0x20/0x40 [ 22.950042] kasan_save_alloc_info+0x40/0x58 [ 22.950533] __kasan_kmalloc+0xd4/0xd8 [ 22.950976] __kmalloc_cache_noprof+0x154/0x320 [ 22.951804] kasan_atomics+0xb8/0x2e8 [ 22.952282] kunit_try_run_case+0x170/0x3f0 [ 22.952744] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.953218] kthread+0x24c/0x2d0 [ 22.953711] ret_from_fork+0x10/0x20 [ 22.954120] [ 22.954445] The buggy address belongs to the object at fff00000c6cc9e00 [ 22.954445] which belongs to the cache kmalloc-64 of size 64 [ 22.956246] The buggy address is located 0 bytes to the right of [ 22.956246] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 22.957162] [ 22.957517] The buggy address belongs to the physical page: [ 22.958016] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 22.958744] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.959724] page_type: f5(slab) [ 22.960149] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.960724] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 22.961484] page dumped because: kasan: bad access detected [ 22.962021] [ 22.962290] Memory state around the buggy address: [ 22.962745] fff00000c6cc9d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.963572] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.965048] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.965675] ^ [ 22.966394] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.967143] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.967725] ================================================================== [ 23.829306] ================================================================== [ 23.829882] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f40/0x49c8 [ 23.830838] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.831925] [ 23.832675] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.832947] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.832992] Hardware name: linux,dummy-virt (DT) [ 23.833039] Call trace: [ 23.833073] dump_backtrace+0x9c/0x128 [ 23.833142] show_stack+0x20/0x38 [ 23.833188] dump_stack_lvl+0x8c/0xd0 [ 23.833261] print_report+0x118/0x5f0 [ 23.833316] kasan_report+0xdc/0x128 [ 23.833364] __asan_report_load4_noabort+0x20/0x30 [ 23.833418] kasan_atomics_helper+0x3f40/0x49c8 [ 23.833472] kasan_atomics+0x1a0/0x2e8 [ 23.833544] kunit_try_run_case+0x170/0x3f0 [ 23.833594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.833649] kthread+0x24c/0x2d0 [ 23.833695] ret_from_fork+0x10/0x20 [ 23.833747] [ 23.838596] Allocated by task 252: [ 23.839077] kasan_save_stack+0x3c/0x68 [ 23.839693] kasan_save_track+0x20/0x40 [ 23.840214] kasan_save_alloc_info+0x40/0x58 [ 23.840630] __kasan_kmalloc+0xd4/0xd8 [ 23.841112] __kmalloc_cache_noprof+0x154/0x320 [ 23.841688] kasan_atomics+0xb8/0x2e8 [ 23.842181] kunit_try_run_case+0x170/0x3f0 [ 23.842601] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.843096] kthread+0x24c/0x2d0 [ 23.843573] ret_from_fork+0x10/0x20 [ 23.844037] [ 23.844350] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.844350] which belongs to the cache kmalloc-64 of size 64 [ 23.845314] The buggy address is located 0 bytes to the right of [ 23.845314] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.846310] [ 23.846654] The buggy address belongs to the physical page: [ 23.847129] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.847946] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.848499] page_type: f5(slab) [ 23.848965] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.849691] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.850331] page dumped because: kasan: bad access detected [ 23.850797] [ 23.851086] Memory state around the buggy address: [ 23.851508] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.852082] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.852815] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.853363] ^ [ 23.853877] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.854548] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.855044] ================================================================== [ 23.794824] ================================================================== [ 23.795382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd00/0x49c8 [ 23.796172] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.796895] [ 23.797255] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.797496] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.797577] Hardware name: linux,dummy-virt (DT) [ 23.797661] Call trace: [ 23.797729] dump_backtrace+0x9c/0x128 [ 23.797856] show_stack+0x20/0x38 [ 23.797949] dump_stack_lvl+0x8c/0xd0 [ 23.798052] print_report+0x118/0x5f0 [ 23.798153] kasan_report+0xdc/0x128 [ 23.798264] kasan_check_range+0x100/0x1a8 [ 23.798369] __kasan_check_write+0x20/0x30 [ 23.798481] kasan_atomics_helper+0xd00/0x49c8 [ 23.798574] kasan_atomics+0x1a0/0x2e8 [ 23.798626] kunit_try_run_case+0x170/0x3f0 [ 23.798679] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.798735] kthread+0x24c/0x2d0 [ 23.798783] ret_from_fork+0x10/0x20 [ 23.798836] [ 23.804130] Allocated by task 252: [ 23.804633] kasan_save_stack+0x3c/0x68 [ 23.805169] kasan_save_track+0x20/0x40 [ 23.805646] kasan_save_alloc_info+0x40/0x58 [ 23.806197] __kasan_kmalloc+0xd4/0xd8 [ 23.807121] __kmalloc_cache_noprof+0x154/0x320 [ 23.807535] kasan_atomics+0xb8/0x2e8 [ 23.807901] kunit_try_run_case+0x170/0x3f0 [ 23.808279] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.810317] kthread+0x24c/0x2d0 [ 23.810935] ret_from_fork+0x10/0x20 [ 23.811998] [ 23.812601] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.812601] which belongs to the cache kmalloc-64 of size 64 [ 23.814599] The buggy address is located 0 bytes to the right of [ 23.814599] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.816175] [ 23.817586] The buggy address belongs to the physical page: [ 23.818693] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.819978] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.820616] page_type: f5(slab) [ 23.821012] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.821703] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.822306] page dumped because: kasan: bad access detected [ 23.822756] [ 23.823037] Memory state around the buggy address: [ 23.823599] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.824187] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.824928] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.825604] ^ [ 23.826001] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.826656] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.827303] ================================================================== [ 23.469306] ================================================================== [ 23.469875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8d8/0x49c8 [ 23.470494] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.471201] [ 23.471531] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.471761] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.471843] Hardware name: linux,dummy-virt (DT) [ 23.471935] Call trace: [ 23.472004] dump_backtrace+0x9c/0x128 [ 23.472135] show_stack+0x20/0x38 [ 23.472232] dump_stack_lvl+0x8c/0xd0 [ 23.472317] print_report+0x118/0x5f0 [ 23.472368] kasan_report+0xdc/0x128 [ 23.472414] kasan_check_range+0x100/0x1a8 [ 23.472463] __kasan_check_write+0x20/0x30 [ 23.472512] kasan_atomics_helper+0x8d8/0x49c8 [ 23.472565] kasan_atomics+0x1a0/0x2e8 [ 23.472614] kunit_try_run_case+0x170/0x3f0 [ 23.472665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.472720] kthread+0x24c/0x2d0 [ 23.472767] ret_from_fork+0x10/0x20 [ 23.472819] [ 23.477999] Allocated by task 252: [ 23.478494] kasan_save_stack+0x3c/0x68 [ 23.479048] kasan_save_track+0x20/0x40 [ 23.479559] kasan_save_alloc_info+0x40/0x58 [ 23.479969] __kasan_kmalloc+0xd4/0xd8 [ 23.480432] __kmalloc_cache_noprof+0x154/0x320 [ 23.480994] kasan_atomics+0xb8/0x2e8 [ 23.481471] kunit_try_run_case+0x170/0x3f0 [ 23.482011] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.482550] kthread+0x24c/0x2d0 [ 23.482944] ret_from_fork+0x10/0x20 [ 23.483434] [ 23.483745] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.483745] which belongs to the cache kmalloc-64 of size 64 [ 23.484587] The buggy address is located 0 bytes to the right of [ 23.484587] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.485592] [ 23.485911] The buggy address belongs to the physical page: [ 23.486454] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.487120] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.487644] page_type: f5(slab) [ 23.488107] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.488736] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.489402] page dumped because: kasan: bad access detected [ 23.489844] [ 23.490127] Memory state around the buggy address: [ 23.490600] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.491172] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.491848] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.492417] ^ [ 23.492852] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.493533] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.494010] ================================================================== [ 23.768345] ================================================================== [ 23.769136] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f4c/0x49c8 [ 23.769853] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.770527] [ 23.770891] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.771186] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.771287] Hardware name: linux,dummy-virt (DT) [ 23.771393] Call trace: [ 23.771459] dump_backtrace+0x9c/0x128 [ 23.771586] show_stack+0x20/0x38 [ 23.771687] dump_stack_lvl+0x8c/0xd0 [ 23.771791] print_report+0x118/0x5f0 [ 23.771893] kasan_report+0xdc/0x128 [ 23.771997] __asan_report_load4_noabort+0x20/0x30 [ 23.772087] kasan_atomics_helper+0x3f4c/0x49c8 [ 23.772145] kasan_atomics+0x1a0/0x2e8 [ 23.772195] kunit_try_run_case+0x170/0x3f0 [ 23.772278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.772337] kthread+0x24c/0x2d0 [ 23.772387] ret_from_fork+0x10/0x20 [ 23.772444] [ 23.777342] Allocated by task 252: [ 23.777828] kasan_save_stack+0x3c/0x68 [ 23.778265] kasan_save_track+0x20/0x40 [ 23.778632] kasan_save_alloc_info+0x40/0x58 [ 23.779163] __kasan_kmalloc+0xd4/0xd8 [ 23.779681] __kmalloc_cache_noprof+0x154/0x320 [ 23.780278] kasan_atomics+0xb8/0x2e8 [ 23.780758] kunit_try_run_case+0x170/0x3f0 [ 23.781253] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.781853] kthread+0x24c/0x2d0 [ 23.782252] ret_from_fork+0x10/0x20 [ 23.782670] [ 23.783021] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.783021] which belongs to the cache kmalloc-64 of size 64 [ 23.783867] The buggy address is located 0 bytes to the right of [ 23.783867] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.784751] [ 23.784932] The buggy address belongs to the physical page: [ 23.785273] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.786135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.786752] page_type: f5(slab) [ 23.787110] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.787921] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.788563] page dumped because: kasan: bad access detected [ 23.789052] [ 23.789306] Memory state around the buggy address: [ 23.789775] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.790438] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.791162] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.791788] ^ [ 23.792192] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.792745] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.793362] ================================================================== [ 23.911956] ================================================================== [ 23.912630] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe3c/0x49c8 [ 23.913297] Read of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.913931] [ 23.914266] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.914490] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.914575] Hardware name: linux,dummy-virt (DT) [ 23.914670] Call trace: [ 23.914738] dump_backtrace+0x9c/0x128 [ 23.914865] show_stack+0x20/0x38 [ 23.914964] dump_stack_lvl+0x8c/0xd0 [ 23.915048] print_report+0x118/0x5f0 [ 23.915142] kasan_report+0xdc/0x128 [ 23.915191] kasan_check_range+0x100/0x1a8 [ 23.915262] __kasan_check_read+0x20/0x30 [ 23.915318] kasan_atomics_helper+0xe3c/0x49c8 [ 23.915372] kasan_atomics+0x1a0/0x2e8 [ 23.915422] kunit_try_run_case+0x170/0x3f0 [ 23.915476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.915529] kthread+0x24c/0x2d0 [ 23.915576] ret_from_fork+0x10/0x20 [ 23.915630] [ 23.920822] Allocated by task 252: [ 23.922015] kasan_save_stack+0x3c/0x68 [ 23.922423] kasan_save_track+0x20/0x40 [ 23.923015] kasan_save_alloc_info+0x40/0x58 [ 23.923604] __kasan_kmalloc+0xd4/0xd8 [ 23.924218] __kmalloc_cache_noprof+0x154/0x320 [ 23.924868] kasan_atomics+0xb8/0x2e8 [ 23.925420] kunit_try_run_case+0x170/0x3f0 [ 23.926029] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.926652] kthread+0x24c/0x2d0 [ 23.927192] ret_from_fork+0x10/0x20 [ 23.927779] [ 23.928147] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.928147] which belongs to the cache kmalloc-64 of size 64 [ 23.928991] The buggy address is located 0 bytes to the right of [ 23.928991] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.929781] [ 23.930109] The buggy address belongs to the physical page: [ 23.930749] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.931381] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.932061] page_type: f5(slab) [ 23.932436] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.933151] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.933798] page dumped because: kasan: bad access detected [ 23.934259] [ 23.934552] Memory state around the buggy address: [ 23.935015] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.935652] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.936355] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.936937] ^ [ 23.937331] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.937901] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.938555] ================================================================== [ 23.441964] ================================================================== [ 23.442665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x810/0x49c8 [ 23.443366] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.443984] [ 23.444335] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.444572] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.444650] Hardware name: linux,dummy-virt (DT) [ 23.444739] Call trace: [ 23.444808] dump_backtrace+0x9c/0x128 [ 23.444943] show_stack+0x20/0x38 [ 23.445043] dump_stack_lvl+0x8c/0xd0 [ 23.445115] print_report+0x118/0x5f0 [ 23.445166] kasan_report+0xdc/0x128 [ 23.445212] kasan_check_range+0x100/0x1a8 [ 23.445293] __kasan_check_write+0x20/0x30 [ 23.445351] kasan_atomics_helper+0x810/0x49c8 [ 23.445405] kasan_atomics+0x1a0/0x2e8 [ 23.445455] kunit_try_run_case+0x170/0x3f0 [ 23.445525] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.445582] kthread+0x24c/0x2d0 [ 23.445631] ret_from_fork+0x10/0x20 [ 23.445684] [ 23.450983] Allocated by task 252: [ 23.451390] kasan_save_stack+0x3c/0x68 [ 23.451878] kasan_save_track+0x20/0x40 [ 23.452402] kasan_save_alloc_info+0x40/0x58 [ 23.452948] __kasan_kmalloc+0xd4/0xd8 [ 23.453461] __kmalloc_cache_noprof+0x154/0x320 [ 23.454024] kasan_atomics+0xb8/0x2e8 [ 23.454473] kunit_try_run_case+0x170/0x3f0 [ 23.454982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.455516] kthread+0x24c/0x2d0 [ 23.455856] ret_from_fork+0x10/0x20 [ 23.456341] [ 23.456643] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.456643] which belongs to the cache kmalloc-64 of size 64 [ 23.457586] The buggy address is located 0 bytes to the right of [ 23.457586] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.458496] [ 23.458828] The buggy address belongs to the physical page: [ 23.459344] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.460020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.460715] page_type: f5(slab) [ 23.461092] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.461807] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.462447] page dumped because: kasan: bad access detected [ 23.462913] [ 23.463197] Memory state around the buggy address: [ 23.463652] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.464306] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.464907] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.465525] ^ [ 23.465962] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.466663] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.467295] ================================================================== [ 24.053702] ================================================================== [ 24.054296] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf94/0x49c8 [ 24.055226] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.055900] [ 24.056228] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.056430] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.056491] Hardware name: linux,dummy-virt (DT) [ 24.056565] Call trace: [ 24.056618] dump_backtrace+0x9c/0x128 [ 24.056718] show_stack+0x20/0x38 [ 24.056790] dump_stack_lvl+0x8c/0xd0 [ 24.056874] print_report+0x118/0x5f0 [ 24.056960] kasan_report+0xdc/0x128 [ 24.057036] kasan_check_range+0x100/0x1a8 [ 24.057121] __kasan_check_write+0x20/0x30 [ 24.057267] kasan_atomics_helper+0xf94/0x49c8 [ 24.057384] kasan_atomics+0x1a0/0x2e8 [ 24.057493] kunit_try_run_case+0x170/0x3f0 [ 24.057617] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.057760] kthread+0x24c/0x2d0 [ 24.057835] ret_from_fork+0x10/0x20 [ 24.057891] [ 24.063839] Allocated by task 252: [ 24.064398] kasan_save_stack+0x3c/0x68 [ 24.064965] kasan_save_track+0x20/0x40 [ 24.065505] kasan_save_alloc_info+0x40/0x58 [ 24.065960] __kasan_kmalloc+0xd4/0xd8 [ 24.066484] __kmalloc_cache_noprof+0x154/0x320 [ 24.067105] kasan_atomics+0xb8/0x2e8 [ 24.067488] kunit_try_run_case+0x170/0x3f0 [ 24.068019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.068546] kthread+0x24c/0x2d0 [ 24.068960] ret_from_fork+0x10/0x20 [ 24.069448] [ 24.070175] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.070175] which belongs to the cache kmalloc-64 of size 64 [ 24.071601] The buggy address is located 0 bytes to the right of [ 24.071601] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.072230] [ 24.073973] The buggy address belongs to the physical page: [ 24.075090] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.076607] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.078021] page_type: f5(slab) [ 24.079067] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.080663] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.081907] page dumped because: kasan: bad access detected [ 24.082470] [ 24.082785] Memory state around the buggy address: [ 24.083184] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.084008] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.084738] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.085352] ^ [ 24.085870] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.086566] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.087192] ================================================================== [ 22.906969] ================================================================== [ 22.907729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40e4/0x49c8 [ 22.908336] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 22.908979] [ 22.910664] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.910804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.910843] Hardware name: linux,dummy-virt (DT) [ 22.910889] Call trace: [ 22.910921] dump_backtrace+0x9c/0x128 [ 22.910990] show_stack+0x20/0x38 [ 22.911036] dump_stack_lvl+0x8c/0xd0 [ 22.911086] print_report+0x118/0x5f0 [ 22.911202] kasan_report+0xdc/0x128 [ 22.911313] __asan_report_store4_noabort+0x20/0x30 [ 22.911417] kasan_atomics_helper+0x40e4/0x49c8 [ 22.911520] kasan_atomics+0x1a0/0x2e8 [ 22.911616] kunit_try_run_case+0x170/0x3f0 [ 22.911710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.911768] kthread+0x24c/0x2d0 [ 22.911815] ret_from_fork+0x10/0x20 [ 22.911869] [ 22.916767] Allocated by task 252: [ 22.916945] kasan_save_stack+0x3c/0x68 [ 22.917141] kasan_save_track+0x20/0x40 [ 22.917846] kasan_save_alloc_info+0x40/0x58 [ 22.918506] __kasan_kmalloc+0xd4/0xd8 [ 22.919107] __kmalloc_cache_noprof+0x154/0x320 [ 22.919710] kasan_atomics+0xb8/0x2e8 [ 22.920611] kunit_try_run_case+0x170/0x3f0 [ 22.921077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.921702] kthread+0x24c/0x2d0 [ 22.922096] ret_from_fork+0x10/0x20 [ 22.922523] [ 22.922790] The buggy address belongs to the object at fff00000c6cc9e00 [ 22.922790] which belongs to the cache kmalloc-64 of size 64 [ 22.923926] The buggy address is located 0 bytes to the right of [ 22.923926] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 22.924971] [ 22.926084] The buggy address belongs to the physical page: [ 22.926535] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 22.927126] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.928035] page_type: f5(slab) [ 22.928454] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.929060] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 22.929651] page dumped because: kasan: bad access detected [ 22.930146] [ 22.930452] Memory state around the buggy address: [ 22.930934] fff00000c6cc9d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.932402] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.933020] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.933662] ^ [ 22.934085] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.934711] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.935306] ================================================================== [ 24.635768] ================================================================== [ 24.636513] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x49c8 [ 24.637678] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.638498] [ 24.638842] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.639120] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.639208] Hardware name: linux,dummy-virt (DT) [ 24.639317] Call trace: [ 24.639365] dump_backtrace+0x9c/0x128 [ 24.639438] show_stack+0x20/0x38 [ 24.639485] dump_stack_lvl+0x8c/0xd0 [ 24.639538] print_report+0x118/0x5f0 [ 24.639587] kasan_report+0xdc/0x128 [ 24.639633] kasan_check_range+0x100/0x1a8 [ 24.639682] __kasan_check_write+0x20/0x30 [ 24.639730] kasan_atomics_helper+0x1780/0x49c8 [ 24.639784] kasan_atomics+0x1a0/0x2e8 [ 24.639833] kunit_try_run_case+0x170/0x3f0 [ 24.639884] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.639939] kthread+0x24c/0x2d0 [ 24.639986] ret_from_fork+0x10/0x20 [ 24.640038] [ 24.645316] Allocated by task 252: [ 24.645802] kasan_save_stack+0x3c/0x68 [ 24.646255] kasan_save_track+0x20/0x40 [ 24.646712] kasan_save_alloc_info+0x40/0x58 [ 24.647268] __kasan_kmalloc+0xd4/0xd8 [ 24.647670] __kmalloc_cache_noprof+0x154/0x320 [ 24.648215] kasan_atomics+0xb8/0x2e8 [ 24.648710] kunit_try_run_case+0x170/0x3f0 [ 24.649246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.649677] kthread+0x24c/0x2d0 [ 24.650154] ret_from_fork+0x10/0x20 [ 24.650644] [ 24.650895] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.650895] which belongs to the cache kmalloc-64 of size 64 [ 24.651779] The buggy address is located 0 bytes to the right of [ 24.651779] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.652821] [ 24.653130] The buggy address belongs to the physical page: [ 24.653534] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.654249] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.654942] page_type: f5(slab) [ 24.655391] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.656032] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.656703] page dumped because: kasan: bad access detected [ 24.657139] [ 24.657446] Memory state around the buggy address: [ 24.657912] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.658608] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.659234] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.659869] ^ [ 24.660375] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.660995] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.661633] ================================================================== [ 24.173875] ================================================================== [ 24.174414] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1144/0x49c8 [ 24.175299] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.176080] [ 24.176455] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.176649] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.176706] Hardware name: linux,dummy-virt (DT) [ 24.176775] Call trace: [ 24.176827] dump_backtrace+0x9c/0x128 [ 24.176936] show_stack+0x20/0x38 [ 24.177019] dump_stack_lvl+0x8c/0xd0 [ 24.177117] print_report+0x118/0x5f0 [ 24.177201] kasan_report+0xdc/0x128 [ 24.177300] kasan_check_range+0x100/0x1a8 [ 24.177382] __kasan_check_write+0x20/0x30 [ 24.177510] kasan_atomics_helper+0x1144/0x49c8 [ 24.177617] kasan_atomics+0x1a0/0x2e8 [ 24.177727] kunit_try_run_case+0x170/0x3f0 [ 24.177839] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.177951] kthread+0x24c/0x2d0 [ 24.178039] ret_from_fork+0x10/0x20 [ 24.178175] [ 24.183910] Allocated by task 252: [ 24.184654] kasan_save_stack+0x3c/0x68 [ 24.185270] kasan_save_track+0x20/0x40 [ 24.185868] kasan_save_alloc_info+0x40/0x58 [ 24.186506] __kasan_kmalloc+0xd4/0xd8 [ 24.187183] __kmalloc_cache_noprof+0x154/0x320 [ 24.187757] kasan_atomics+0xb8/0x2e8 [ 24.188308] kunit_try_run_case+0x170/0x3f0 [ 24.188822] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.189323] kthread+0x24c/0x2d0 [ 24.189646] ret_from_fork+0x10/0x20 [ 24.189988] [ 24.190721] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.190721] which belongs to the cache kmalloc-64 of size 64 [ 24.191731] The buggy address is located 0 bytes to the right of [ 24.191731] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.192623] [ 24.192981] The buggy address belongs to the physical page: [ 24.193525] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.194307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.194921] page_type: f5(slab) [ 24.195365] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.196066] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.196730] page dumped because: kasan: bad access detected [ 24.197233] [ 24.197519] Memory state around the buggy address: [ 24.198006] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.198741] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.199414] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.200012] ^ [ 24.200509] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.201180] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.201833] ================================================================== [ 24.689694] ================================================================== [ 24.690283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1810/0x49c8 [ 24.691151] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.692175] [ 24.692532] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.692789] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.692873] Hardware name: linux,dummy-virt (DT) [ 24.692931] Call trace: [ 24.692965] dump_backtrace+0x9c/0x128 [ 24.693033] show_stack+0x20/0x38 [ 24.693080] dump_stack_lvl+0x8c/0xd0 [ 24.693129] print_report+0x118/0x5f0 [ 24.693178] kasan_report+0xdc/0x128 [ 24.693224] kasan_check_range+0x100/0x1a8 [ 24.693300] __kasan_check_write+0x20/0x30 [ 24.693351] kasan_atomics_helper+0x1810/0x49c8 [ 24.693405] kasan_atomics+0x1a0/0x2e8 [ 24.693455] kunit_try_run_case+0x170/0x3f0 [ 24.693527] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.693584] kthread+0x24c/0x2d0 [ 24.693634] ret_from_fork+0x10/0x20 [ 24.693689] [ 24.699090] Allocated by task 252: [ 24.699487] kasan_save_stack+0x3c/0x68 [ 24.700042] kasan_save_track+0x20/0x40 [ 24.700579] kasan_save_alloc_info+0x40/0x58 [ 24.700996] __kasan_kmalloc+0xd4/0xd8 [ 24.701399] __kmalloc_cache_noprof+0x154/0x320 [ 24.701874] kasan_atomics+0xb8/0x2e8 [ 24.702431] kunit_try_run_case+0x170/0x3f0 [ 24.702854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.703502] kthread+0x24c/0x2d0 [ 24.703871] ret_from_fork+0x10/0x20 [ 24.704375] [ 24.704668] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.704668] which belongs to the cache kmalloc-64 of size 64 [ 24.705594] The buggy address is located 0 bytes to the right of [ 24.705594] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.706782] [ 24.707137] The buggy address belongs to the physical page: [ 24.707674] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.708432] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.709059] page_type: f5(slab) [ 24.709565] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.710257] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.710997] page dumped because: kasan: bad access detected [ 24.711536] [ 24.711828] Memory state around the buggy address: [ 24.712300] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.713019] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.713701] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.714374] ^ [ 24.714846] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.715515] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.716123] ================================================================== [ 23.260494] ================================================================== [ 23.260899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x578/0x49c8 [ 23.261939] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.262783] [ 23.263181] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.263430] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.263534] Hardware name: linux,dummy-virt (DT) [ 23.263620] Call trace: [ 23.263674] dump_backtrace+0x9c/0x128 [ 23.263805] show_stack+0x20/0x38 [ 23.263906] dump_stack_lvl+0x8c/0xd0 [ 23.264022] print_report+0x118/0x5f0 [ 23.264137] kasan_report+0xdc/0x128 [ 23.264233] kasan_check_range+0x100/0x1a8 [ 23.264333] __kasan_check_write+0x20/0x30 [ 23.264422] kasan_atomics_helper+0x578/0x49c8 [ 23.264524] kasan_atomics+0x1a0/0x2e8 [ 23.264652] kunit_try_run_case+0x170/0x3f0 [ 23.264771] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.264873] kthread+0x24c/0x2d0 [ 23.264975] ret_from_fork+0x10/0x20 [ 23.265090] [ 23.271859] Allocated by task 252: [ 23.272348] kasan_save_stack+0x3c/0x68 [ 23.272865] kasan_save_track+0x20/0x40 [ 23.273596] kasan_save_alloc_info+0x40/0x58 [ 23.274126] __kasan_kmalloc+0xd4/0xd8 [ 23.274480] __kmalloc_cache_noprof+0x154/0x320 [ 23.274828] kasan_atomics+0xb8/0x2e8 [ 23.276141] kunit_try_run_case+0x170/0x3f0 [ 23.276547] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.276938] kthread+0x24c/0x2d0 [ 23.277256] ret_from_fork+0x10/0x20 [ 23.277584] [ 23.277789] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.277789] which belongs to the cache kmalloc-64 of size 64 [ 23.280425] The buggy address is located 0 bytes to the right of [ 23.280425] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.282392] [ 23.282709] The buggy address belongs to the physical page: [ 23.283287] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.284006] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.285808] page_type: f5(slab) [ 23.286438] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.288081] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.288832] page dumped because: kasan: bad access detected [ 23.289663] [ 23.290137] Memory state around the buggy address: [ 23.290697] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.293563] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.294064] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.294773] ^ [ 23.295673] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.296326] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.296767] ================================================================== [ 23.329607] ================================================================== [ 23.330271] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x650/0x49c8 [ 23.330859] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.332276] [ 23.332857] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.333099] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.333150] Hardware name: linux,dummy-virt (DT) [ 23.333196] Call trace: [ 23.333230] dump_backtrace+0x9c/0x128 [ 23.333324] show_stack+0x20/0x38 [ 23.333372] dump_stack_lvl+0x8c/0xd0 [ 23.333424] print_report+0x118/0x5f0 [ 23.333473] kasan_report+0xdc/0x128 [ 23.333534] kasan_check_range+0x100/0x1a8 [ 23.333584] __kasan_check_write+0x20/0x30 [ 23.333634] kasan_atomics_helper+0x650/0x49c8 [ 23.333685] kasan_atomics+0x1a0/0x2e8 [ 23.333734] kunit_try_run_case+0x170/0x3f0 [ 23.333784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.333837] kthread+0x24c/0x2d0 [ 23.333885] ret_from_fork+0x10/0x20 [ 23.333937] [ 23.339769] Allocated by task 252: [ 23.340316] kasan_save_stack+0x3c/0x68 [ 23.340905] kasan_save_track+0x20/0x40 [ 23.341452] kasan_save_alloc_info+0x40/0x58 [ 23.341916] __kasan_kmalloc+0xd4/0xd8 [ 23.342516] __kmalloc_cache_noprof+0x154/0x320 [ 23.343137] kasan_atomics+0xb8/0x2e8 [ 23.343637] kunit_try_run_case+0x170/0x3f0 [ 23.344168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.344799] kthread+0x24c/0x2d0 [ 23.345280] ret_from_fork+0x10/0x20 [ 23.345769] [ 23.346102] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.346102] which belongs to the cache kmalloc-64 of size 64 [ 23.347067] The buggy address is located 0 bytes to the right of [ 23.347067] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.348147] [ 23.348536] The buggy address belongs to the physical page: [ 23.349085] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.349823] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.350457] page_type: f5(slab) [ 23.350956] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.351774] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.352577] page dumped because: kasan: bad access detected [ 23.353221] [ 23.353529] Memory state around the buggy address: [ 23.354034] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.354753] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.355452] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.356108] ^ [ 23.356709] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.357404] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.358046] ================================================================== [ 23.940313] ================================================================== [ 23.940887] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40c0/0x49c8 [ 23.941510] Read of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.942080] [ 23.942603] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.942806] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.942874] Hardware name: linux,dummy-virt (DT) [ 23.943097] Call trace: [ 23.943169] dump_backtrace+0x9c/0x128 [ 23.943318] show_stack+0x20/0x38 [ 23.943419] dump_stack_lvl+0x8c/0xd0 [ 23.943525] print_report+0x118/0x5f0 [ 23.943622] kasan_report+0xdc/0x128 [ 23.943724] __asan_report_load8_noabort+0x20/0x30 [ 23.943835] kasan_atomics_helper+0x40c0/0x49c8 [ 23.943949] kasan_atomics+0x1a0/0x2e8 [ 23.944060] kunit_try_run_case+0x170/0x3f0 [ 23.944164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.944301] kthread+0x24c/0x2d0 [ 23.944423] ret_from_fork+0x10/0x20 [ 23.944541] [ 23.949726] Allocated by task 252: [ 23.950130] kasan_save_stack+0x3c/0x68 [ 23.951265] kasan_save_track+0x20/0x40 [ 23.951690] kasan_save_alloc_info+0x40/0x58 [ 23.952112] __kasan_kmalloc+0xd4/0xd8 [ 23.952531] __kmalloc_cache_noprof+0x154/0x320 [ 23.953003] kasan_atomics+0xb8/0x2e8 [ 23.953405] kunit_try_run_case+0x170/0x3f0 [ 23.953950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.954496] kthread+0x24c/0x2d0 [ 23.954977] ret_from_fork+0x10/0x20 [ 23.955354] [ 23.955661] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.955661] which belongs to the cache kmalloc-64 of size 64 [ 23.956582] The buggy address is located 0 bytes to the right of [ 23.956582] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.957564] [ 23.957903] The buggy address belongs to the physical page: [ 23.958344] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.959112] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.959767] page_type: f5(slab) [ 23.960142] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.960817] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.961417] page dumped because: kasan: bad access detected [ 23.961941] [ 23.962247] Memory state around the buggy address: [ 23.962707] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.963272] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.963942] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.964524] ^ [ 23.964902] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.965604] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.966154] ================================================================== [ 24.117509] ================================================================== [ 24.118066] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x106c/0x49c8 [ 24.118780] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.119412] [ 24.119815] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.120068] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.120174] Hardware name: linux,dummy-virt (DT) [ 24.120282] Call trace: [ 24.120361] dump_backtrace+0x9c/0x128 [ 24.120509] show_stack+0x20/0x38 [ 24.120566] dump_stack_lvl+0x8c/0xd0 [ 24.120622] print_report+0x118/0x5f0 [ 24.120709] kasan_report+0xdc/0x128 [ 24.120759] kasan_check_range+0x100/0x1a8 [ 24.120810] __kasan_check_write+0x20/0x30 [ 24.120860] kasan_atomics_helper+0x106c/0x49c8 [ 24.120915] kasan_atomics+0x1a0/0x2e8 [ 24.120963] kunit_try_run_case+0x170/0x3f0 [ 24.121015] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.121069] kthread+0x24c/0x2d0 [ 24.121117] ret_from_fork+0x10/0x20 [ 24.121169] [ 24.126809] Allocated by task 252: [ 24.127363] kasan_save_stack+0x3c/0x68 [ 24.127926] kasan_save_track+0x20/0x40 [ 24.128456] kasan_save_alloc_info+0x40/0x58 [ 24.129028] __kasan_kmalloc+0xd4/0xd8 [ 24.129571] __kmalloc_cache_noprof+0x154/0x320 [ 24.130095] kasan_atomics+0xb8/0x2e8 [ 24.130632] kunit_try_run_case+0x170/0x3f0 [ 24.131159] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.131726] kthread+0x24c/0x2d0 [ 24.132151] ret_from_fork+0x10/0x20 [ 24.132557] [ 24.132889] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.132889] which belongs to the cache kmalloc-64 of size 64 [ 24.133705] The buggy address is located 0 bytes to the right of [ 24.133705] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.134763] [ 24.135126] The buggy address belongs to the physical page: [ 24.135706] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.136428] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.137061] page_type: f5(slab) [ 24.137513] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.138234] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.138877] page dumped because: kasan: bad access detected [ 24.139425] [ 24.139690] Memory state around the buggy address: [ 24.140107] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.140843] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.141447] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.142117] ^ [ 24.142569] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.143256] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.143863] ================================================================== [ 23.496626] ================================================================== [ 23.497270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4440/0x49c8 [ 23.497869] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.498474] [ 23.498809] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.499038] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.499142] Hardware name: linux,dummy-virt (DT) [ 23.499264] Call trace: [ 23.499338] dump_backtrace+0x9c/0x128 [ 23.499472] show_stack+0x20/0x38 [ 23.499580] dump_stack_lvl+0x8c/0xd0 [ 23.499709] print_report+0x118/0x5f0 [ 23.499803] kasan_report+0xdc/0x128 [ 23.499880] __asan_report_load4_noabort+0x20/0x30 [ 23.499973] kasan_atomics_helper+0x4440/0x49c8 [ 23.500053] kasan_atomics+0x1a0/0x2e8 [ 23.500130] kunit_try_run_case+0x170/0x3f0 [ 23.500216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.500323] kthread+0x24c/0x2d0 [ 23.500411] ret_from_fork+0x10/0x20 [ 23.500498] [ 23.506049] Allocated by task 252: [ 23.506551] kasan_save_stack+0x3c/0x68 [ 23.507023] kasan_save_track+0x20/0x40 [ 23.507478] kasan_save_alloc_info+0x40/0x58 [ 23.507946] __kasan_kmalloc+0xd4/0xd8 [ 23.508449] __kmalloc_cache_noprof+0x154/0x320 [ 23.509021] kasan_atomics+0xb8/0x2e8 [ 23.509469] kunit_try_run_case+0x170/0x3f0 [ 23.509925] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.510390] kthread+0x24c/0x2d0 [ 23.510866] ret_from_fork+0x10/0x20 [ 23.511303] [ 23.511596] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.511596] which belongs to the cache kmalloc-64 of size 64 [ 23.512466] The buggy address is located 0 bytes to the right of [ 23.512466] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.513359] [ 23.513707] The buggy address belongs to the physical page: [ 23.514255] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.515059] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.515636] page_type: f5(slab) [ 23.516105] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.516774] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.517446] page dumped because: kasan: bad access detected [ 23.517879] [ 23.518183] Memory state around the buggy address: [ 23.518686] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.519315] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.519933] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.520618] ^ [ 23.521072] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.521734] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.522277] ================================================================== [ 23.415559] ================================================================== [ 23.416941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7a0/0x49c8 [ 23.417563] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.417944] [ 23.418124] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.418233] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.418293] Hardware name: linux,dummy-virt (DT) [ 23.418338] Call trace: [ 23.418369] dump_backtrace+0x9c/0x128 [ 23.418432] show_stack+0x20/0x38 [ 23.418480] dump_stack_lvl+0x8c/0xd0 [ 23.418532] print_report+0x118/0x5f0 [ 23.418581] kasan_report+0xdc/0x128 [ 23.418627] kasan_check_range+0x100/0x1a8 [ 23.418676] __kasan_check_write+0x20/0x30 [ 23.418725] kasan_atomics_helper+0x7a0/0x49c8 [ 23.418777] kasan_atomics+0x1a0/0x2e8 [ 23.418825] kunit_try_run_case+0x170/0x3f0 [ 23.418875] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.418929] kthread+0x24c/0x2d0 [ 23.418976] ret_from_fork+0x10/0x20 [ 23.419031] [ 23.423662] Allocated by task 252: [ 23.424164] kasan_save_stack+0x3c/0x68 [ 23.424704] kasan_save_track+0x20/0x40 [ 23.425192] kasan_save_alloc_info+0x40/0x58 [ 23.425755] __kasan_kmalloc+0xd4/0xd8 [ 23.426149] __kmalloc_cache_noprof+0x154/0x320 [ 23.426642] kasan_atomics+0xb8/0x2e8 [ 23.427059] kunit_try_run_case+0x170/0x3f0 [ 23.427587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.428232] kthread+0x24c/0x2d0 [ 23.428687] ret_from_fork+0x10/0x20 [ 23.429035] [ 23.429373] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.429373] which belongs to the cache kmalloc-64 of size 64 [ 23.430401] The buggy address is located 0 bytes to the right of [ 23.430401] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.431566] [ 23.431910] The buggy address belongs to the physical page: [ 23.432364] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.433190] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.433828] page_type: f5(slab) [ 23.434190] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.434930] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.435595] page dumped because: kasan: bad access detected [ 23.436115] [ 23.436376] Memory state around the buggy address: [ 23.436923] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.437469] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.438165] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.438753] ^ [ 23.439178] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.439827] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.440407] ================================================================== [ 23.524381] ================================================================== [ 23.524942] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x978/0x49c8 [ 23.525604] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.526171] [ 23.526527] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.526748] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.526830] Hardware name: linux,dummy-virt (DT) [ 23.526922] Call trace: [ 23.526987] dump_backtrace+0x9c/0x128 [ 23.527123] show_stack+0x20/0x38 [ 23.527226] dump_stack_lvl+0x8c/0xd0 [ 23.527328] print_report+0x118/0x5f0 [ 23.527381] kasan_report+0xdc/0x128 [ 23.527429] kasan_check_range+0x100/0x1a8 [ 23.527476] __kasan_check_write+0x20/0x30 [ 23.527526] kasan_atomics_helper+0x978/0x49c8 [ 23.527579] kasan_atomics+0x1a0/0x2e8 [ 23.527627] kunit_try_run_case+0x170/0x3f0 [ 23.527679] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.527733] kthread+0x24c/0x2d0 [ 23.527783] ret_from_fork+0x10/0x20 [ 23.527839] [ 23.533150] Allocated by task 252: [ 23.533672] kasan_save_stack+0x3c/0x68 [ 23.534220] kasan_save_track+0x20/0x40 [ 23.534723] kasan_save_alloc_info+0x40/0x58 [ 23.535177] __kasan_kmalloc+0xd4/0xd8 [ 23.535638] __kmalloc_cache_noprof+0x154/0x320 [ 23.536164] kasan_atomics+0xb8/0x2e8 [ 23.536681] kunit_try_run_case+0x170/0x3f0 [ 23.537166] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.537683] kthread+0x24c/0x2d0 [ 23.538027] ret_from_fork+0x10/0x20 [ 23.538502] [ 23.538807] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.538807] which belongs to the cache kmalloc-64 of size 64 [ 23.539763] The buggy address is located 0 bytes to the right of [ 23.539763] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.540766] [ 23.541088] The buggy address belongs to the physical page: [ 23.541576] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.542315] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.542915] page_type: f5(slab) [ 23.543804] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.544499] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.544952] page dumped because: kasan: bad access detected [ 23.545325] [ 23.545536] Memory state around the buggy address: [ 23.545850] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.547619] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.548802] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.550069] ^ [ 23.550901] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.552502] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.554028] ================================================================== [ 23.583968] ================================================================== [ 23.584458] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa50/0x49c8 [ 23.585125] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.585620] [ 23.585979] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.586191] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.586282] Hardware name: linux,dummy-virt (DT) [ 23.586369] Call trace: [ 23.586430] dump_backtrace+0x9c/0x128 [ 23.586556] show_stack+0x20/0x38 [ 23.586652] dump_stack_lvl+0x8c/0xd0 [ 23.586736] print_report+0x118/0x5f0 [ 23.586789] kasan_report+0xdc/0x128 [ 23.586836] kasan_check_range+0x100/0x1a8 [ 23.586886] __kasan_check_write+0x20/0x30 [ 23.586933] kasan_atomics_helper+0xa50/0x49c8 [ 23.586987] kasan_atomics+0x1a0/0x2e8 [ 23.587036] kunit_try_run_case+0x170/0x3f0 [ 23.587126] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.587182] kthread+0x24c/0x2d0 [ 23.587231] ret_from_fork+0x10/0x20 [ 23.587312] [ 23.593038] Allocated by task 252: [ 23.593414] kasan_save_stack+0x3c/0x68 [ 23.593724] kasan_save_track+0x20/0x40 [ 23.593966] kasan_save_alloc_info+0x40/0x58 [ 23.594213] __kasan_kmalloc+0xd4/0xd8 [ 23.594901] __kmalloc_cache_noprof+0x154/0x320 [ 23.595336] kasan_atomics+0xb8/0x2e8 [ 23.595580] kunit_try_run_case+0x170/0x3f0 [ 23.595835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.596121] kthread+0x24c/0x2d0 [ 23.597070] ret_from_fork+0x10/0x20 [ 23.597631] [ 23.597904] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.597904] which belongs to the cache kmalloc-64 of size 64 [ 23.598839] The buggy address is located 0 bytes to the right of [ 23.598839] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.599874] [ 23.600223] The buggy address belongs to the physical page: [ 23.600796] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.601076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.601535] page_type: f5(slab) [ 23.602089] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.602857] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.603544] page dumped because: kasan: bad access detected [ 23.603755] [ 23.603870] Memory state around the buggy address: [ 23.604055] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.604312] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.604542] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.604762] ^ [ 23.604942] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.605169] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.605640] ================================================================== [ 23.556251] ================================================================== [ 23.556891] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x9e4/0x49c8 [ 23.557501] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.558310] [ 23.558659] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.558883] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.558962] Hardware name: linux,dummy-virt (DT) [ 23.559052] Call trace: [ 23.559252] dump_backtrace+0x9c/0x128 [ 23.559407] show_stack+0x20/0x38 [ 23.559502] dump_stack_lvl+0x8c/0xd0 [ 23.559561] print_report+0x118/0x5f0 [ 23.559611] kasan_report+0xdc/0x128 [ 23.559656] kasan_check_range+0x100/0x1a8 [ 23.559705] __kasan_check_write+0x20/0x30 [ 23.559753] kasan_atomics_helper+0x9e4/0x49c8 [ 23.559806] kasan_atomics+0x1a0/0x2e8 [ 23.559853] kunit_try_run_case+0x170/0x3f0 [ 23.559904] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.559958] kthread+0x24c/0x2d0 [ 23.560004] ret_from_fork+0x10/0x20 [ 23.560059] [ 23.564872] Allocated by task 252: [ 23.565309] kasan_save_stack+0x3c/0x68 [ 23.565883] kasan_save_track+0x20/0x40 [ 23.566293] kasan_save_alloc_info+0x40/0x58 [ 23.566977] __kasan_kmalloc+0xd4/0xd8 [ 23.567376] __kmalloc_cache_noprof+0x154/0x320 [ 23.568099] kasan_atomics+0xb8/0x2e8 [ 23.568608] kunit_try_run_case+0x170/0x3f0 [ 23.569147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.569742] kthread+0x24c/0x2d0 [ 23.570180] ret_from_fork+0x10/0x20 [ 23.570563] [ 23.570893] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.570893] which belongs to the cache kmalloc-64 of size 64 [ 23.571862] The buggy address is located 0 bytes to the right of [ 23.571862] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.572792] [ 23.573152] The buggy address belongs to the physical page: [ 23.573736] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.574471] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.575089] page_type: f5(slab) [ 23.575494] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.576120] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.576764] page dumped because: kasan: bad access detected [ 23.577345] [ 23.577656] Memory state around the buggy address: [ 23.578131] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.578828] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.579465] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.580054] ^ [ 23.580510] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.581234] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.581756] ================================================================== [ 23.069953] ================================================================== [ 23.070710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x344/0x49c8 [ 23.071296] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.072042] [ 23.072413] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.072652] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.072728] Hardware name: linux,dummy-virt (DT) [ 23.072814] Call trace: [ 23.072877] dump_backtrace+0x9c/0x128 [ 23.073002] show_stack+0x20/0x38 [ 23.073098] dump_stack_lvl+0x8c/0xd0 [ 23.073207] print_report+0x118/0x5f0 [ 23.073336] kasan_report+0xdc/0x128 [ 23.073432] kasan_check_range+0x100/0x1a8 [ 23.073537] __kasan_check_write+0x20/0x30 [ 23.073620] kasan_atomics_helper+0x344/0x49c8 [ 23.073746] kasan_atomics+0x1a0/0x2e8 [ 23.073832] kunit_try_run_case+0x170/0x3f0 [ 23.073911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.074005] kthread+0x24c/0x2d0 [ 23.074093] ret_from_fork+0x10/0x20 [ 23.074177] [ 23.081201] Allocated by task 252: [ 23.081618] kasan_save_stack+0x3c/0x68 [ 23.081995] kasan_save_track+0x20/0x40 [ 23.082843] kasan_save_alloc_info+0x40/0x58 [ 23.083306] __kasan_kmalloc+0xd4/0xd8 [ 23.083633] __kmalloc_cache_noprof+0x154/0x320 [ 23.084786] kasan_atomics+0xb8/0x2e8 [ 23.085112] kunit_try_run_case+0x170/0x3f0 [ 23.085623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.086293] kthread+0x24c/0x2d0 [ 23.086706] ret_from_fork+0x10/0x20 [ 23.087190] [ 23.087496] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.087496] which belongs to the cache kmalloc-64 of size 64 [ 23.088775] The buggy address is located 0 bytes to the right of [ 23.088775] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.089959] [ 23.090421] The buggy address belongs to the physical page: [ 23.091013] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.091814] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.093114] page_type: f5(slab) [ 23.093673] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.094651] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.095470] page dumped because: kasan: bad access detected [ 23.096361] [ 23.096650] Memory state around the buggy address: [ 23.097115] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.097700] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.098694] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.099424] ^ [ 23.099839] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.100200] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.101324] ================================================================== [ 23.883385] ================================================================== [ 23.883937] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f6c/0x49c8 [ 23.884753] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.885522] [ 23.885811] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.886047] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.886133] Hardware name: linux,dummy-virt (DT) [ 23.886232] Call trace: [ 23.886300] dump_backtrace+0x9c/0x128 [ 23.886372] show_stack+0x20/0x38 [ 23.886462] dump_stack_lvl+0x8c/0xd0 [ 23.886570] print_report+0x118/0x5f0 [ 23.886666] kasan_report+0xdc/0x128 [ 23.886764] __asan_report_load4_noabort+0x20/0x30 [ 23.886876] kasan_atomics_helper+0x3f6c/0x49c8 [ 23.886988] kasan_atomics+0x1a0/0x2e8 [ 23.887144] kunit_try_run_case+0x170/0x3f0 [ 23.887211] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.887298] kthread+0x24c/0x2d0 [ 23.887350] ret_from_fork+0x10/0x20 [ 23.887406] [ 23.894287] Allocated by task 252: [ 23.894650] kasan_save_stack+0x3c/0x68 [ 23.895018] kasan_save_track+0x20/0x40 [ 23.895641] kasan_save_alloc_info+0x40/0x58 [ 23.896088] __kasan_kmalloc+0xd4/0xd8 [ 23.896588] __kmalloc_cache_noprof+0x154/0x320 [ 23.896967] kasan_atomics+0xb8/0x2e8 [ 23.897498] kunit_try_run_case+0x170/0x3f0 [ 23.897955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.898558] kthread+0x24c/0x2d0 [ 23.898887] ret_from_fork+0x10/0x20 [ 23.899364] [ 23.899629] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.899629] which belongs to the cache kmalloc-64 of size 64 [ 23.900446] The buggy address is located 0 bytes to the right of [ 23.900446] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.901461] [ 23.901792] The buggy address belongs to the physical page: [ 23.902293] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.902991] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.903589] page_type: f5(slab) [ 23.903998] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.904723] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.905405] page dumped because: kasan: bad access detected [ 23.905908] [ 23.906173] Memory state around the buggy address: [ 23.906663] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.907285] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.907949] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.908588] ^ [ 23.909040] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.909673] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.910248] ================================================================== [ 23.994841] ================================================================== [ 23.995383] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3fc4/0x49c8 [ 23.996005] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.996593] [ 23.996949] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.997193] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.997293] Hardware name: linux,dummy-virt (DT) [ 23.997387] Call trace: [ 23.997462] dump_backtrace+0x9c/0x128 [ 23.997601] show_stack+0x20/0x38 [ 23.997673] dump_stack_lvl+0x8c/0xd0 [ 23.997729] print_report+0x118/0x5f0 [ 23.997779] kasan_report+0xdc/0x128 [ 23.997826] __asan_report_store8_noabort+0x20/0x30 [ 23.997880] kasan_atomics_helper+0x3fc4/0x49c8 [ 23.997933] kasan_atomics+0x1a0/0x2e8 [ 23.997982] kunit_try_run_case+0x170/0x3f0 [ 23.998033] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.998087] kthread+0x24c/0x2d0 [ 23.998135] ret_from_fork+0x10/0x20 [ 23.998189] [ 24.003175] Allocated by task 252: [ 24.003633] kasan_save_stack+0x3c/0x68 [ 24.004115] kasan_save_track+0x20/0x40 [ 24.004608] kasan_save_alloc_info+0x40/0x58 [ 24.005165] __kasan_kmalloc+0xd4/0xd8 [ 24.005644] __kmalloc_cache_noprof+0x154/0x320 [ 24.006189] kasan_atomics+0xb8/0x2e8 [ 24.006714] kunit_try_run_case+0x170/0x3f0 [ 24.007212] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.007752] kthread+0x24c/0x2d0 [ 24.008122] ret_from_fork+0x10/0x20 [ 24.008625] [ 24.008864] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.008864] which belongs to the cache kmalloc-64 of size 64 [ 24.009788] The buggy address is located 0 bytes to the right of [ 24.009788] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.010764] [ 24.011084] The buggy address belongs to the physical page: [ 24.011608] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.012408] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.012981] page_type: f5(slab) [ 24.013428] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.014132] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.014750] page dumped because: kasan: bad access detected [ 24.015191] [ 24.015491] Memory state around the buggy address: [ 24.015897] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.016560] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.017261] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.017877] ^ [ 24.018392] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.018965] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.019552] ================================================================== [ 23.635606] ================================================================== [ 23.636070] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb28/0x49c8 [ 23.636493] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.637210] [ 23.637607] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.637835] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.637919] Hardware name: linux,dummy-virt (DT) [ 23.638035] Call trace: [ 23.638098] dump_backtrace+0x9c/0x128 [ 23.638253] show_stack+0x20/0x38 [ 23.638356] dump_stack_lvl+0x8c/0xd0 [ 23.638460] print_report+0x118/0x5f0 [ 23.638579] kasan_report+0xdc/0x128 [ 23.638675] kasan_check_range+0x100/0x1a8 [ 23.638782] __kasan_check_write+0x20/0x30 [ 23.638897] kasan_atomics_helper+0xb28/0x49c8 [ 23.639007] kasan_atomics+0x1a0/0x2e8 [ 23.639138] kunit_try_run_case+0x170/0x3f0 [ 23.639214] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.639297] kthread+0x24c/0x2d0 [ 23.639351] ret_from_fork+0x10/0x20 [ 23.639404] [ 23.646471] Allocated by task 252: [ 23.646934] kasan_save_stack+0x3c/0x68 [ 23.647386] kasan_save_track+0x20/0x40 [ 23.647874] kasan_save_alloc_info+0x40/0x58 [ 23.648367] __kasan_kmalloc+0xd4/0xd8 [ 23.648778] __kmalloc_cache_noprof+0x154/0x320 [ 23.649294] kasan_atomics+0xb8/0x2e8 [ 23.649756] kunit_try_run_case+0x170/0x3f0 [ 23.650228] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.650774] kthread+0x24c/0x2d0 [ 23.651181] ret_from_fork+0x10/0x20 [ 23.651671] [ 23.651946] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.651946] which belongs to the cache kmalloc-64 of size 64 [ 23.652837] The buggy address is located 0 bytes to the right of [ 23.652837] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.653891] [ 23.654223] The buggy address belongs to the physical page: [ 23.654787] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.655226] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.655964] page_type: f5(slab) [ 23.656463] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.657168] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.657828] page dumped because: kasan: bad access detected [ 23.658360] [ 23.658603] Memory state around the buggy address: [ 23.659174] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.659831] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.660474] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.661086] ^ [ 23.661589] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.662206] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.662836] ================================================================== [ 23.716282] ================================================================== [ 23.716790] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f24/0x49c8 [ 23.717328] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.718608] [ 23.719108] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.719335] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.719423] Hardware name: linux,dummy-virt (DT) [ 23.719504] Call trace: [ 23.719542] dump_backtrace+0x9c/0x128 [ 23.719614] show_stack+0x20/0x38 [ 23.719662] dump_stack_lvl+0x8c/0xd0 [ 23.719711] print_report+0x118/0x5f0 [ 23.719759] kasan_report+0xdc/0x128 [ 23.719804] __asan_report_load4_noabort+0x20/0x30 [ 23.719855] kasan_atomics_helper+0x3f24/0x49c8 [ 23.719905] kasan_atomics+0x1a0/0x2e8 [ 23.719953] kunit_try_run_case+0x170/0x3f0 [ 23.720001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.720052] kthread+0x24c/0x2d0 [ 23.720102] ret_from_fork+0x10/0x20 [ 23.720152] [ 23.724957] Allocated by task 252: [ 23.725450] kasan_save_stack+0x3c/0x68 [ 23.725984] kasan_save_track+0x20/0x40 [ 23.726422] kasan_save_alloc_info+0x40/0x58 [ 23.726936] __kasan_kmalloc+0xd4/0xd8 [ 23.727451] __kmalloc_cache_noprof+0x154/0x320 [ 23.727977] kasan_atomics+0xb8/0x2e8 [ 23.728410] kunit_try_run_case+0x170/0x3f0 [ 23.728950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.729567] kthread+0x24c/0x2d0 [ 23.730041] ret_from_fork+0x10/0x20 [ 23.730527] [ 23.730843] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.730843] which belongs to the cache kmalloc-64 of size 64 [ 23.731746] The buggy address is located 0 bytes to the right of [ 23.731746] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.732667] [ 23.733006] The buggy address belongs to the physical page: [ 23.733463] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.734252] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.734856] page_type: f5(slab) [ 23.735293] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.735925] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.736587] page dumped because: kasan: bad access detected [ 23.737049] [ 23.737351] Memory state around the buggy address: [ 23.737792] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.738410] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.739018] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.739454] ^ [ 23.739882] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.740458] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.741122] ================================================================== [ 24.549555] ================================================================== [ 24.550181] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f18/0x49c8 [ 24.550960] Read of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.552340] [ 24.552714] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.552943] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.553005] Hardware name: linux,dummy-virt (DT) [ 24.553088] Call trace: [ 24.553146] dump_backtrace+0x9c/0x128 [ 24.553269] show_stack+0x20/0x38 [ 24.553345] dump_stack_lvl+0x8c/0xd0 [ 24.553426] print_report+0x118/0x5f0 [ 24.553520] kasan_report+0xdc/0x128 [ 24.553601] __asan_report_load8_noabort+0x20/0x30 [ 24.553696] kasan_atomics_helper+0x3f18/0x49c8 [ 24.553792] kasan_atomics+0x1a0/0x2e8 [ 24.553885] kunit_try_run_case+0x170/0x3f0 [ 24.554004] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.554136] kthread+0x24c/0x2d0 [ 24.554213] ret_from_fork+0x10/0x20 [ 24.554299] [ 24.559081] Allocated by task 252: [ 24.559555] kasan_save_stack+0x3c/0x68 [ 24.559974] kasan_save_track+0x20/0x40 [ 24.560511] kasan_save_alloc_info+0x40/0x58 [ 24.561055] __kasan_kmalloc+0xd4/0xd8 [ 24.561568] __kmalloc_cache_noprof+0x154/0x320 [ 24.561939] kasan_atomics+0xb8/0x2e8 [ 24.562377] kunit_try_run_case+0x170/0x3f0 [ 24.562882] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.563434] kthread+0x24c/0x2d0 [ 24.563792] ret_from_fork+0x10/0x20 [ 24.564199] [ 24.564522] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.564522] which belongs to the cache kmalloc-64 of size 64 [ 24.565396] The buggy address is located 0 bytes to the right of [ 24.565396] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.566327] [ 24.566645] The buggy address belongs to the physical page: [ 24.567246] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.567875] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.568507] page_type: f5(slab) [ 24.568901] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.569714] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.570472] page dumped because: kasan: bad access detected [ 24.571134] [ 24.571583] Memory state around the buggy address: [ 24.572017] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.572616] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.573202] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.574110] ^ [ 24.574568] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.575118] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.575947] ================================================================== [ 23.102833] ================================================================== [ 23.103415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x49c8 [ 23.104661] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.105762] [ 23.106097] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.106294] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.106364] Hardware name: linux,dummy-virt (DT) [ 23.106416] Call trace: [ 23.106452] dump_backtrace+0x9c/0x128 [ 23.106522] show_stack+0x20/0x38 [ 23.106570] dump_stack_lvl+0x8c/0xd0 [ 23.106622] print_report+0x118/0x5f0 [ 23.106671] kasan_report+0xdc/0x128 [ 23.106716] __asan_report_store4_noabort+0x20/0x30 [ 23.106769] kasan_atomics_helper+0x40fc/0x49c8 [ 23.106824] kasan_atomics+0x1a0/0x2e8 [ 23.106872] kunit_try_run_case+0x170/0x3f0 [ 23.106924] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.106978] kthread+0x24c/0x2d0 [ 23.107028] ret_from_fork+0x10/0x20 [ 23.107148] [ 23.113614] Allocated by task 252: [ 23.114141] kasan_save_stack+0x3c/0x68 [ 23.114725] kasan_save_track+0x20/0x40 [ 23.115419] kasan_save_alloc_info+0x40/0x58 [ 23.115966] __kasan_kmalloc+0xd4/0xd8 [ 23.116651] __kmalloc_cache_noprof+0x154/0x320 [ 23.116988] kasan_atomics+0xb8/0x2e8 [ 23.117283] kunit_try_run_case+0x170/0x3f0 [ 23.117816] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.118473] kthread+0x24c/0x2d0 [ 23.118986] ret_from_fork+0x10/0x20 [ 23.119969] [ 23.120324] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.120324] which belongs to the cache kmalloc-64 of size 64 [ 23.121431] The buggy address is located 0 bytes to the right of [ 23.121431] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.122476] [ 23.122809] The buggy address belongs to the physical page: [ 23.123440] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.124072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.125254] page_type: f5(slab) [ 23.125954] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.126656] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.127076] page dumped because: kasan: bad access detected [ 23.128025] [ 23.128345] Memory state around the buggy address: [ 23.128852] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.129387] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.130103] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.130669] ^ [ 23.131467] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.132286] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.132888] ================================================================== [ 24.203756] ================================================================== [ 24.204389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11b0/0x49c8 [ 24.205037] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.205657] [ 24.206030] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.206264] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.206361] Hardware name: linux,dummy-virt (DT) [ 24.206459] Call trace: [ 24.206530] dump_backtrace+0x9c/0x128 [ 24.206678] show_stack+0x20/0x38 [ 24.206778] dump_stack_lvl+0x8c/0xd0 [ 24.206865] print_report+0x118/0x5f0 [ 24.206918] kasan_report+0xdc/0x128 [ 24.206971] kasan_check_range+0x100/0x1a8 [ 24.207051] __kasan_check_write+0x20/0x30 [ 24.207154] kasan_atomics_helper+0x11b0/0x49c8 [ 24.207211] kasan_atomics+0x1a0/0x2e8 [ 24.207284] kunit_try_run_case+0x170/0x3f0 [ 24.207339] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.207396] kthread+0x24c/0x2d0 [ 24.207443] ret_from_fork+0x10/0x20 [ 24.207498] [ 24.212555] Allocated by task 252: [ 24.212964] kasan_save_stack+0x3c/0x68 [ 24.213549] kasan_save_track+0x20/0x40 [ 24.214721] kasan_save_alloc_info+0x40/0x58 [ 24.215293] __kasan_kmalloc+0xd4/0xd8 [ 24.215985] __kmalloc_cache_noprof+0x154/0x320 [ 24.216521] kasan_atomics+0xb8/0x2e8 [ 24.217141] kunit_try_run_case+0x170/0x3f0 [ 24.217751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.218330] kthread+0x24c/0x2d0 [ 24.218687] ret_from_fork+0x10/0x20 [ 24.219221] [ 24.219483] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.219483] which belongs to the cache kmalloc-64 of size 64 [ 24.220564] The buggy address is located 0 bytes to the right of [ 24.220564] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.221915] [ 24.222338] The buggy address belongs to the physical page: [ 24.222689] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.223480] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.224151] page_type: f5(slab) [ 24.224800] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.225515] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.226312] page dumped because: kasan: bad access detected [ 24.226775] [ 24.227030] Memory state around the buggy address: [ 24.227454] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.228265] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.228996] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.229675] ^ [ 24.230284] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.230921] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.231555] ================================================================== [ 23.689845] ================================================================== [ 23.690934] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xbc8/0x49c8 [ 23.691504] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.691873] [ 23.692053] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.692167] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.692204] Hardware name: linux,dummy-virt (DT) [ 23.692267] Call trace: [ 23.692305] dump_backtrace+0x9c/0x128 [ 23.692368] show_stack+0x20/0x38 [ 23.692416] dump_stack_lvl+0x8c/0xd0 [ 23.692467] print_report+0x118/0x5f0 [ 23.692514] kasan_report+0xdc/0x128 [ 23.692561] kasan_check_range+0x100/0x1a8 [ 23.692608] __kasan_check_write+0x20/0x30 [ 23.692655] kasan_atomics_helper+0xbc8/0x49c8 [ 23.692707] kasan_atomics+0x1a0/0x2e8 [ 23.692754] kunit_try_run_case+0x170/0x3f0 [ 23.692803] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.692858] kthread+0x24c/0x2d0 [ 23.692905] ret_from_fork+0x10/0x20 [ 23.692956] [ 23.698073] Allocated by task 252: [ 23.698487] kasan_save_stack+0x3c/0x68 [ 23.698949] kasan_save_track+0x20/0x40 [ 23.699363] kasan_save_alloc_info+0x40/0x58 [ 23.699841] __kasan_kmalloc+0xd4/0xd8 [ 23.700194] __kmalloc_cache_noprof+0x154/0x320 [ 23.700761] kasan_atomics+0xb8/0x2e8 [ 23.701278] kunit_try_run_case+0x170/0x3f0 [ 23.701810] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.702390] kthread+0x24c/0x2d0 [ 23.702824] ret_from_fork+0x10/0x20 [ 23.703307] [ 23.703614] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.703614] which belongs to the cache kmalloc-64 of size 64 [ 23.704537] The buggy address is located 0 bytes to the right of [ 23.704537] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.705486] [ 23.705803] The buggy address belongs to the physical page: [ 23.706282] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.706894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.707514] page_type: f5(slab) [ 23.707851] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.708654] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.709396] page dumped because: kasan: bad access detected [ 23.709877] [ 23.710183] Memory state around the buggy address: [ 23.710622] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.711258] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.711838] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.712520] ^ [ 23.712966] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.713548] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.714103] ================================================================== [ 23.000105] ================================================================== [ 23.000765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2c4/0x49c8 [ 23.001508] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.002478] [ 23.002848] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.003201] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.003855] Hardware name: linux,dummy-virt (DT) [ 23.003971] Call trace: [ 23.004025] dump_backtrace+0x9c/0x128 [ 23.004147] show_stack+0x20/0x38 [ 23.004254] dump_stack_lvl+0x8c/0xd0 [ 23.004354] print_report+0x118/0x5f0 [ 23.004444] kasan_report+0xdc/0x128 [ 23.004523] kasan_check_range+0x100/0x1a8 [ 23.004603] __kasan_check_read+0x20/0x30 [ 23.004692] kasan_atomics_helper+0x2c4/0x49c8 [ 23.004791] kasan_atomics+0x1a0/0x2e8 [ 23.004872] kunit_try_run_case+0x170/0x3f0 [ 23.004965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.005063] kthread+0x24c/0x2d0 [ 23.005195] ret_from_fork+0x10/0x20 [ 23.005346] [ 23.015644] Allocated by task 252: [ 23.016716] kasan_save_stack+0x3c/0x68 [ 23.017815] kasan_save_track+0x20/0x40 [ 23.018984] kasan_save_alloc_info+0x40/0x58 [ 23.020129] __kasan_kmalloc+0xd4/0xd8 [ 23.021259] __kmalloc_cache_noprof+0x154/0x320 [ 23.022173] kasan_atomics+0xb8/0x2e8 [ 23.022768] kunit_try_run_case+0x170/0x3f0 [ 23.023430] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.024333] kthread+0x24c/0x2d0 [ 23.024878] ret_from_fork+0x10/0x20 [ 23.025467] [ 23.025912] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.025912] which belongs to the cache kmalloc-64 of size 64 [ 23.027319] The buggy address is located 0 bytes to the right of [ 23.027319] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.028145] [ 23.028396] The buggy address belongs to the physical page: [ 23.028880] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.029926] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.030682] page_type: f5(slab) [ 23.031313] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.032362] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.033000] page dumped because: kasan: bad access detected [ 23.033440] [ 23.033745] Memory state around the buggy address: [ 23.034153] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.034859] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.035744] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.036150] ^ [ 23.036552] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.037355] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.038153] ================================================================== [ 23.742769] ================================================================== [ 23.743397] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc64/0x49c8 [ 23.744180] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.744684] [ 23.745035] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.745272] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.745357] Hardware name: linux,dummy-virt (DT) [ 23.745454] Call trace: [ 23.745536] dump_backtrace+0x9c/0x128 [ 23.745656] show_stack+0x20/0x38 [ 23.745756] dump_stack_lvl+0x8c/0xd0 [ 23.745830] print_report+0x118/0x5f0 [ 23.745881] kasan_report+0xdc/0x128 [ 23.745927] kasan_check_range+0x100/0x1a8 [ 23.745977] __kasan_check_write+0x20/0x30 [ 23.746025] kasan_atomics_helper+0xc64/0x49c8 [ 23.746076] kasan_atomics+0x1a0/0x2e8 [ 23.746125] kunit_try_run_case+0x170/0x3f0 [ 23.746174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.746228] kthread+0x24c/0x2d0 [ 23.746309] ret_from_fork+0x10/0x20 [ 23.746364] [ 23.751398] Allocated by task 252: [ 23.751870] kasan_save_stack+0x3c/0x68 [ 23.752396] kasan_save_track+0x20/0x40 [ 23.752823] kasan_save_alloc_info+0x40/0x58 [ 23.753268] __kasan_kmalloc+0xd4/0xd8 [ 23.753648] __kmalloc_cache_noprof+0x154/0x320 [ 23.754196] kasan_atomics+0xb8/0x2e8 [ 23.754724] kunit_try_run_case+0x170/0x3f0 [ 23.755247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.755749] kthread+0x24c/0x2d0 [ 23.756121] ret_from_fork+0x10/0x20 [ 23.756596] [ 23.756910] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.756910] which belongs to the cache kmalloc-64 of size 64 [ 23.757773] The buggy address is located 0 bytes to the right of [ 23.757773] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.758723] [ 23.759044] The buggy address belongs to the physical page: [ 23.759577] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.760349] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.760918] page_type: f5(slab) [ 23.761328] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.762010] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.762626] page dumped because: kasan: bad access detected [ 23.763104] [ 23.763345] Memory state around the buggy address: [ 23.763679] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.764407] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.764889] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.765434] ^ [ 23.765792] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.766508] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.767104] ================================================================== [ 23.967667] ================================================================== [ 23.968350] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb0/0x49c8 [ 23.968973] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.969664] [ 23.970014] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.970249] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.970332] Hardware name: linux,dummy-virt (DT) [ 23.970426] Call trace: [ 23.970489] dump_backtrace+0x9c/0x128 [ 23.970615] show_stack+0x20/0x38 [ 23.970719] dump_stack_lvl+0x8c/0xd0 [ 23.970825] print_report+0x118/0x5f0 [ 23.970926] kasan_report+0xdc/0x128 [ 23.971024] kasan_check_range+0x100/0x1a8 [ 23.971118] __kasan_check_write+0x20/0x30 [ 23.971182] kasan_atomics_helper+0xeb0/0x49c8 [ 23.971252] kasan_atomics+0x1a0/0x2e8 [ 23.971317] kunit_try_run_case+0x170/0x3f0 [ 23.971374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.971430] kthread+0x24c/0x2d0 [ 23.971480] ret_from_fork+0x10/0x20 [ 23.971532] [ 23.976757] Allocated by task 252: [ 23.977227] kasan_save_stack+0x3c/0x68 [ 23.977784] kasan_save_track+0x20/0x40 [ 23.978265] kasan_save_alloc_info+0x40/0x58 [ 23.978727] __kasan_kmalloc+0xd4/0xd8 [ 23.979148] __kmalloc_cache_noprof+0x154/0x320 [ 23.979627] kasan_atomics+0xb8/0x2e8 [ 23.980128] kunit_try_run_case+0x170/0x3f0 [ 23.980622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.981150] kthread+0x24c/0x2d0 [ 23.981542] ret_from_fork+0x10/0x20 [ 23.982024] [ 23.982354] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.982354] which belongs to the cache kmalloc-64 of size 64 [ 23.983150] The buggy address is located 0 bytes to the right of [ 23.983150] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.984090] [ 23.984429] The buggy address belongs to the physical page: [ 23.985032] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.985700] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.986383] page_type: f5(slab) [ 23.986787] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.987382] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.988086] page dumped because: kasan: bad access detected [ 23.988589] [ 23.988870] Memory state around the buggy address: [ 23.989386] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.989985] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.990642] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.991247] ^ [ 23.991659] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.992313] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.992922] ================================================================== [ 24.434292] ================================================================== [ 24.434998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1518/0x49c8 [ 24.435945] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.436726] [ 24.437080] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.437326] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.437402] Hardware name: linux,dummy-virt (DT) [ 24.437499] Call trace: [ 24.437569] dump_backtrace+0x9c/0x128 [ 24.437690] show_stack+0x20/0x38 [ 24.437786] dump_stack_lvl+0x8c/0xd0 [ 24.437865] print_report+0x118/0x5f0 [ 24.437933] kasan_report+0xdc/0x128 [ 24.437997] kasan_check_range+0x100/0x1a8 [ 24.438048] __kasan_check_write+0x20/0x30 [ 24.438097] kasan_atomics_helper+0x1518/0x49c8 [ 24.438151] kasan_atomics+0x1a0/0x2e8 [ 24.438200] kunit_try_run_case+0x170/0x3f0 [ 24.438277] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.438337] kthread+0x24c/0x2d0 [ 24.438386] ret_from_fork+0x10/0x20 [ 24.438441] [ 24.445532] Allocated by task 252: [ 24.446059] kasan_save_stack+0x3c/0x68 [ 24.446595] kasan_save_track+0x20/0x40 [ 24.446990] kasan_save_alloc_info+0x40/0x58 [ 24.447588] __kasan_kmalloc+0xd4/0xd8 [ 24.448018] __kmalloc_cache_noprof+0x154/0x320 [ 24.448560] kasan_atomics+0xb8/0x2e8 [ 24.449021] kunit_try_run_case+0x170/0x3f0 [ 24.449413] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.450068] kthread+0x24c/0x2d0 [ 24.450509] ret_from_fork+0x10/0x20 [ 24.450978] [ 24.451319] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.451319] which belongs to the cache kmalloc-64 of size 64 [ 24.452268] The buggy address is located 0 bytes to the right of [ 24.452268] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.453260] [ 24.453602] The buggy address belongs to the physical page: [ 24.454166] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.454888] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.455518] page_type: f5(slab) [ 24.455911] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.456571] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.457193] page dumped because: kasan: bad access detected [ 24.457708] [ 24.457974] Memory state around the buggy address: [ 24.458484] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.459173] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.460615] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.461173] ^ [ 24.461683] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.462305] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.462863] ================================================================== [ 23.608604] ================================================================== [ 23.609183] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xabc/0x49c8 [ 23.610024] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.610555] [ 23.610769] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.610944] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.611000] Hardware name: linux,dummy-virt (DT) [ 23.611072] Call trace: [ 23.611128] dump_backtrace+0x9c/0x128 [ 23.611281] show_stack+0x20/0x38 [ 23.611404] dump_stack_lvl+0x8c/0xd0 [ 23.612027] print_report+0x118/0x5f0 [ 23.612177] kasan_report+0xdc/0x128 [ 23.612284] kasan_check_range+0x100/0x1a8 [ 23.612396] __kasan_check_write+0x20/0x30 [ 23.612496] kasan_atomics_helper+0xabc/0x49c8 [ 23.612601] kasan_atomics+0x1a0/0x2e8 [ 23.612654] kunit_try_run_case+0x170/0x3f0 [ 23.612711] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.612768] kthread+0x24c/0x2d0 [ 23.612815] ret_from_fork+0x10/0x20 [ 23.612870] [ 23.617935] Allocated by task 252: [ 23.618415] kasan_save_stack+0x3c/0x68 [ 23.618944] kasan_save_track+0x20/0x40 [ 23.619440] kasan_save_alloc_info+0x40/0x58 [ 23.619892] __kasan_kmalloc+0xd4/0xd8 [ 23.620264] __kmalloc_cache_noprof+0x154/0x320 [ 23.620829] kasan_atomics+0xb8/0x2e8 [ 23.621294] kunit_try_run_case+0x170/0x3f0 [ 23.621840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.622386] kthread+0x24c/0x2d0 [ 23.622708] ret_from_fork+0x10/0x20 [ 23.623154] [ 23.623818] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.623818] which belongs to the cache kmalloc-64 of size 64 [ 23.624639] The buggy address is located 0 bytes to the right of [ 23.624639] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.625567] [ 23.625879] The buggy address belongs to the physical page: [ 23.626282] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.627054] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.627698] page_type: f5(slab) [ 23.628095] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.628776] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.629430] page dumped because: kasan: bad access detected [ 23.629874] [ 23.630153] Memory state around the buggy address: [ 23.630565] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.631223] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.631732] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.632425] ^ [ 23.632844] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.633511] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.634086] ================================================================== [ 24.578078] ================================================================== [ 24.578621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16f0/0x49c8 [ 24.579426] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.580129] [ 24.580495] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.580676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.580717] Hardware name: linux,dummy-virt (DT) [ 24.580789] Call trace: [ 24.580842] dump_backtrace+0x9c/0x128 [ 24.580969] show_stack+0x20/0x38 [ 24.581077] dump_stack_lvl+0x8c/0xd0 [ 24.581177] print_report+0x118/0x5f0 [ 24.581300] kasan_report+0xdc/0x128 [ 24.581362] kasan_check_range+0x100/0x1a8 [ 24.581414] __kasan_check_write+0x20/0x30 [ 24.581464] kasan_atomics_helper+0x16f0/0x49c8 [ 24.581534] kasan_atomics+0x1a0/0x2e8 [ 24.581584] kunit_try_run_case+0x170/0x3f0 [ 24.581637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.581692] kthread+0x24c/0x2d0 [ 24.581740] ret_from_fork+0x10/0x20 [ 24.581794] [ 24.586956] Allocated by task 252: [ 24.587438] kasan_save_stack+0x3c/0x68 [ 24.587950] kasan_save_track+0x20/0x40 [ 24.588335] kasan_save_alloc_info+0x40/0x58 [ 24.588812] __kasan_kmalloc+0xd4/0xd8 [ 24.589308] __kmalloc_cache_noprof+0x154/0x320 [ 24.589822] kasan_atomics+0xb8/0x2e8 [ 24.590217] kunit_try_run_case+0x170/0x3f0 [ 24.590677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.591193] kthread+0x24c/0x2d0 [ 24.591681] ret_from_fork+0x10/0x20 [ 24.592171] [ 24.592482] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.592482] which belongs to the cache kmalloc-64 of size 64 [ 24.593344] The buggy address is located 0 bytes to the right of [ 24.593344] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.594206] [ 24.594538] The buggy address belongs to the physical page: [ 24.595075] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.595795] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.596389] page_type: f5(slab) [ 24.596817] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.597371] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.599317] page dumped because: kasan: bad access detected [ 24.599912] [ 24.600156] Memory state around the buggy address: [ 24.600624] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.601180] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.601746] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.602172] ^ [ 24.602531] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.602937] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.603336] ================================================================== [ 23.228878] ================================================================== [ 23.229686] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50c/0x49c8 [ 23.230473] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.231275] [ 23.231667] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.231905] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.231987] Hardware name: linux,dummy-virt (DT) [ 23.232077] Call trace: [ 23.232143] dump_backtrace+0x9c/0x128 [ 23.232283] show_stack+0x20/0x38 [ 23.232381] dump_stack_lvl+0x8c/0xd0 [ 23.232494] print_report+0x118/0x5f0 [ 23.232592] kasan_report+0xdc/0x128 [ 23.232703] kasan_check_range+0x100/0x1a8 [ 23.232816] __kasan_check_write+0x20/0x30 [ 23.232913] kasan_atomics_helper+0x50c/0x49c8 [ 23.233042] kasan_atomics+0x1a0/0x2e8 [ 23.233157] kunit_try_run_case+0x170/0x3f0 [ 23.233275] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.233380] kthread+0x24c/0x2d0 [ 23.233458] ret_from_fork+0x10/0x20 [ 23.233599] [ 23.240379] Allocated by task 252: [ 23.240830] kasan_save_stack+0x3c/0x68 [ 23.241278] kasan_save_track+0x20/0x40 [ 23.241781] kasan_save_alloc_info+0x40/0x58 [ 23.242254] __kasan_kmalloc+0xd4/0xd8 [ 23.242659] __kmalloc_cache_noprof+0x154/0x320 [ 23.244040] kasan_atomics+0xb8/0x2e8 [ 23.244429] kunit_try_run_case+0x170/0x3f0 [ 23.244719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.245343] kthread+0x24c/0x2d0 [ 23.245777] ret_from_fork+0x10/0x20 [ 23.246293] [ 23.246604] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.246604] which belongs to the cache kmalloc-64 of size 64 [ 23.247762] The buggy address is located 0 bytes to the right of [ 23.247762] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.248669] [ 23.248994] The buggy address belongs to the physical page: [ 23.249612] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.250434] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.251892] page_type: f5(slab) [ 23.252378] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.253123] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.253924] page dumped because: kasan: bad access detected [ 23.254428] [ 23.254675] Memory state around the buggy address: [ 23.255110] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.255631] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.256171] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.257347] ^ [ 23.257832] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.258692] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.259477] ================================================================== [ 24.318009] ================================================================== [ 24.318450] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1370/0x49c8 [ 24.319274] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.319895] [ 24.320694] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.320949] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.321018] Hardware name: linux,dummy-virt (DT) [ 24.321068] Call trace: [ 24.321103] dump_backtrace+0x9c/0x128 [ 24.321173] show_stack+0x20/0x38 [ 24.321220] dump_stack_lvl+0x8c/0xd0 [ 24.321299] print_report+0x118/0x5f0 [ 24.321349] kasan_report+0xdc/0x128 [ 24.321395] kasan_check_range+0x100/0x1a8 [ 24.321444] __kasan_check_write+0x20/0x30 [ 24.321507] kasan_atomics_helper+0x1370/0x49c8 [ 24.321563] kasan_atomics+0x1a0/0x2e8 [ 24.321613] kunit_try_run_case+0x170/0x3f0 [ 24.321667] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.321723] kthread+0x24c/0x2d0 [ 24.321769] ret_from_fork+0x10/0x20 [ 24.321823] [ 24.327339] Allocated by task 252: [ 24.327832] kasan_save_stack+0x3c/0x68 [ 24.328314] kasan_save_track+0x20/0x40 [ 24.328844] kasan_save_alloc_info+0x40/0x58 [ 24.329347] __kasan_kmalloc+0xd4/0xd8 [ 24.329896] __kmalloc_cache_noprof+0x154/0x320 [ 24.330366] kasan_atomics+0xb8/0x2e8 [ 24.330876] kunit_try_run_case+0x170/0x3f0 [ 24.331468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.331995] kthread+0x24c/0x2d0 [ 24.332295] ret_from_fork+0x10/0x20 [ 24.334479] [ 24.334724] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.334724] which belongs to the cache kmalloc-64 of size 64 [ 24.335388] The buggy address is located 0 bytes to the right of [ 24.335388] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.336324] [ 24.336677] The buggy address belongs to the physical page: [ 24.337102] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.337670] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.338846] page_type: f5(slab) [ 24.340092] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.341271] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.341732] page dumped because: kasan: bad access detected [ 24.342071] [ 24.343005] Memory state around the buggy address: [ 24.343917] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.345151] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.346368] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.346789] ^ [ 24.347197] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.347987] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.348773] ================================================================== [ 22.970627] ================================================================== [ 22.971400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x25c/0x49c8 [ 22.972654] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 22.973170] [ 22.973545] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.973753] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.973832] Hardware name: linux,dummy-virt (DT) [ 22.973929] Call trace: [ 22.973980] dump_backtrace+0x9c/0x128 [ 22.974054] show_stack+0x20/0x38 [ 22.974100] dump_stack_lvl+0x8c/0xd0 [ 22.974154] print_report+0x118/0x5f0 [ 22.974202] kasan_report+0xdc/0x128 [ 22.974273] kasan_check_range+0x100/0x1a8 [ 22.974329] __kasan_check_write+0x20/0x30 [ 22.974380] kasan_atomics_helper+0x25c/0x49c8 [ 22.974434] kasan_atomics+0x1a0/0x2e8 [ 22.974484] kunit_try_run_case+0x170/0x3f0 [ 22.974536] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.974590] kthread+0x24c/0x2d0 [ 22.974638] ret_from_fork+0x10/0x20 [ 22.974689] [ 22.981270] Allocated by task 252: [ 22.981749] kasan_save_stack+0x3c/0x68 [ 22.982203] kasan_save_track+0x20/0x40 [ 22.982499] kasan_save_alloc_info+0x40/0x58 [ 22.982991] __kasan_kmalloc+0xd4/0xd8 [ 22.983818] __kmalloc_cache_noprof+0x154/0x320 [ 22.984551] kasan_atomics+0xb8/0x2e8 [ 22.984966] kunit_try_run_case+0x170/0x3f0 [ 22.985398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.985912] kthread+0x24c/0x2d0 [ 22.986305] ret_from_fork+0x10/0x20 [ 22.986754] [ 22.987022] The buggy address belongs to the object at fff00000c6cc9e00 [ 22.987022] which belongs to the cache kmalloc-64 of size 64 [ 22.987846] The buggy address is located 0 bytes to the right of [ 22.987846] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 22.989209] [ 22.989449] The buggy address belongs to the physical page: [ 22.989779] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 22.990342] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.990980] page_type: f5(slab) [ 22.991907] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.992570] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 22.993163] page dumped because: kasan: bad access detected [ 22.993739] [ 22.994041] Memory state around the buggy address: [ 22.994545] fff00000c6cc9d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.995123] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.996134] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.996647] ^ [ 22.997014] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.997954] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.998546] ================================================================== [ 24.290146] ================================================================== [ 24.290796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1300/0x49c8 [ 24.291733] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.292524] [ 24.292793] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.292953] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.292993] Hardware name: linux,dummy-virt (DT) [ 24.293066] Call trace: [ 24.293135] dump_backtrace+0x9c/0x128 [ 24.293285] show_stack+0x20/0x38 [ 24.293388] dump_stack_lvl+0x8c/0xd0 [ 24.293450] print_report+0x118/0x5f0 [ 24.293522] kasan_report+0xdc/0x128 [ 24.293572] kasan_check_range+0x100/0x1a8 [ 24.293623] __kasan_check_write+0x20/0x30 [ 24.293674] kasan_atomics_helper+0x1300/0x49c8 [ 24.293728] kasan_atomics+0x1a0/0x2e8 [ 24.293777] kunit_try_run_case+0x170/0x3f0 [ 24.293832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.293888] kthread+0x24c/0x2d0 [ 24.293935] ret_from_fork+0x10/0x20 [ 24.293988] [ 24.299414] Allocated by task 252: [ 24.299928] kasan_save_stack+0x3c/0x68 [ 24.300488] kasan_save_track+0x20/0x40 [ 24.301044] kasan_save_alloc_info+0x40/0x58 [ 24.301587] __kasan_kmalloc+0xd4/0xd8 [ 24.302091] __kmalloc_cache_noprof+0x154/0x320 [ 24.302699] kasan_atomics+0xb8/0x2e8 [ 24.303211] kunit_try_run_case+0x170/0x3f0 [ 24.303780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.304316] kthread+0x24c/0x2d0 [ 24.304702] ret_from_fork+0x10/0x20 [ 24.305197] [ 24.305493] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.305493] which belongs to the cache kmalloc-64 of size 64 [ 24.306366] The buggy address is located 0 bytes to the right of [ 24.306366] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.307387] [ 24.307736] The buggy address belongs to the physical page: [ 24.308266] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.308981] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.309630] page_type: f5(slab) [ 24.310049] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.310714] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.311353] page dumped because: kasan: bad access detected [ 24.311875] [ 24.312163] Memory state around the buggy address: [ 24.312654] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.313267] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.313911] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.314603] ^ [ 24.315068] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.315712] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.316324] ================================================================== [ 23.039864] ================================================================== [ 23.040643] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4264/0x49c8 [ 23.041468] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.042162] [ 23.042553] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.042836] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.042924] Hardware name: linux,dummy-virt (DT) [ 23.043028] Call trace: [ 23.043171] dump_backtrace+0x9c/0x128 [ 23.043305] show_stack+0x20/0x38 [ 23.043394] dump_stack_lvl+0x8c/0xd0 [ 23.043485] print_report+0x118/0x5f0 [ 23.043564] kasan_report+0xdc/0x128 [ 23.043657] __asan_report_load4_noabort+0x20/0x30 [ 23.043759] kasan_atomics_helper+0x4264/0x49c8 [ 23.043853] kasan_atomics+0x1a0/0x2e8 [ 23.043950] kunit_try_run_case+0x170/0x3f0 [ 23.044047] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.044141] kthread+0x24c/0x2d0 [ 23.044230] ret_from_fork+0x10/0x20 [ 23.044314] [ 23.049967] Allocated by task 252: [ 23.050471] kasan_save_stack+0x3c/0x68 [ 23.051038] kasan_save_track+0x20/0x40 [ 23.051449] kasan_save_alloc_info+0x40/0x58 [ 23.051882] __kasan_kmalloc+0xd4/0xd8 [ 23.052252] __kmalloc_cache_noprof+0x154/0x320 [ 23.052650] kasan_atomics+0xb8/0x2e8 [ 23.052979] kunit_try_run_case+0x170/0x3f0 [ 23.054451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.054847] kthread+0x24c/0x2d0 [ 23.055754] ret_from_fork+0x10/0x20 [ 23.056324] [ 23.056661] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.056661] which belongs to the cache kmalloc-64 of size 64 [ 23.057744] The buggy address is located 0 bytes to the right of [ 23.057744] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.059004] [ 23.059275] The buggy address belongs to the physical page: [ 23.059968] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.061163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.061906] page_type: f5(slab) [ 23.062158] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.062646] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.063801] page dumped because: kasan: bad access detected [ 23.064251] [ 23.064413] Memory state around the buggy address: [ 23.064678] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.065019] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.065821] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.066601] ^ [ 23.067016] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.068017] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.068657] ================================================================== [ 23.856518] ================================================================== [ 23.857171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xda0/0x49c8 [ 23.857792] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.858540] [ 23.858845] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.859140] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.859223] Hardware name: linux,dummy-virt (DT) [ 23.859314] Call trace: [ 23.859376] dump_backtrace+0x9c/0x128 [ 23.859506] show_stack+0x20/0x38 [ 23.859617] dump_stack_lvl+0x8c/0xd0 [ 23.859722] print_report+0x118/0x5f0 [ 23.859787] kasan_report+0xdc/0x128 [ 23.859835] kasan_check_range+0x100/0x1a8 [ 23.859885] __kasan_check_write+0x20/0x30 [ 23.859935] kasan_atomics_helper+0xda0/0x49c8 [ 23.859990] kasan_atomics+0x1a0/0x2e8 [ 23.860041] kunit_try_run_case+0x170/0x3f0 [ 23.860091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.860144] kthread+0x24c/0x2d0 [ 23.860191] ret_from_fork+0x10/0x20 [ 23.860266] [ 23.865532] Allocated by task 252: [ 23.866017] kasan_save_stack+0x3c/0x68 [ 23.866583] kasan_save_track+0x20/0x40 [ 23.866974] kasan_save_alloc_info+0x40/0x58 [ 23.867412] __kasan_kmalloc+0xd4/0xd8 [ 23.867888] __kmalloc_cache_noprof+0x154/0x320 [ 23.868434] kasan_atomics+0xb8/0x2e8 [ 23.868935] kunit_try_run_case+0x170/0x3f0 [ 23.869364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.870002] kthread+0x24c/0x2d0 [ 23.870394] ret_from_fork+0x10/0x20 [ 23.870775] [ 23.871082] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.871082] which belongs to the cache kmalloc-64 of size 64 [ 23.872026] The buggy address is located 0 bytes to the right of [ 23.872026] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.872978] [ 23.873261] The buggy address belongs to the physical page: [ 23.873802] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.874471] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.875143] page_type: f5(slab) [ 23.875622] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.876198] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.876901] page dumped because: kasan: bad access detected [ 23.877433] [ 23.877733] Memory state around the buggy address: [ 23.878199] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.878776] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.879459] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.880018] ^ [ 23.880450] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.881095] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.881762] ================================================================== [ 24.464310] ================================================================== [ 24.464854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1584/0x49c8 [ 24.465551] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.466102] [ 24.466453] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.466675] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.466754] Hardware name: linux,dummy-virt (DT) [ 24.466842] Call trace: [ 24.466901] dump_backtrace+0x9c/0x128 [ 24.467023] show_stack+0x20/0x38 [ 24.467118] dump_stack_lvl+0x8c/0xd0 [ 24.467220] print_report+0x118/0x5f0 [ 24.467384] kasan_report+0xdc/0x128 [ 24.467481] kasan_check_range+0x100/0x1a8 [ 24.467564] __kasan_check_write+0x20/0x30 [ 24.467617] kasan_atomics_helper+0x1584/0x49c8 [ 24.467672] kasan_atomics+0x1a0/0x2e8 [ 24.467722] kunit_try_run_case+0x170/0x3f0 [ 24.467779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.467835] kthread+0x24c/0x2d0 [ 24.467883] ret_from_fork+0x10/0x20 [ 24.467937] [ 24.473497] Allocated by task 252: [ 24.473971] kasan_save_stack+0x3c/0x68 [ 24.474432] kasan_save_track+0x20/0x40 [ 24.474950] kasan_save_alloc_info+0x40/0x58 [ 24.475867] __kasan_kmalloc+0xd4/0xd8 [ 24.476265] __kmalloc_cache_noprof+0x154/0x320 [ 24.476673] kasan_atomics+0xb8/0x2e8 [ 24.477017] kunit_try_run_case+0x170/0x3f0 [ 24.477995] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.478637] kthread+0x24c/0x2d0 [ 24.479006] ret_from_fork+0x10/0x20 [ 24.479376] [ 24.479633] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.479633] which belongs to the cache kmalloc-64 of size 64 [ 24.480514] The buggy address is located 0 bytes to the right of [ 24.480514] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.481522] [ 24.481886] The buggy address belongs to the physical page: [ 24.482464] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.483192] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.483777] page_type: f5(slab) [ 24.484305] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.484971] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.485688] page dumped because: kasan: bad access detected [ 24.486218] [ 24.486504] Memory state around the buggy address: [ 24.486992] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.487670] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.488301] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.488926] ^ [ 24.489411] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.490081] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.490719] ================================================================== [ 24.405756] ================================================================== [ 24.406332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14ac/0x49c8 [ 24.408002] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.408848] [ 24.409247] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.409509] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.409581] Hardware name: linux,dummy-virt (DT) [ 24.409631] Call trace: [ 24.409666] dump_backtrace+0x9c/0x128 [ 24.409734] show_stack+0x20/0x38 [ 24.409781] dump_stack_lvl+0x8c/0xd0 [ 24.409833] print_report+0x118/0x5f0 [ 24.409881] kasan_report+0xdc/0x128 [ 24.409927] kasan_check_range+0x100/0x1a8 [ 24.409977] __kasan_check_write+0x20/0x30 [ 24.410027] kasan_atomics_helper+0x14ac/0x49c8 [ 24.410079] kasan_atomics+0x1a0/0x2e8 [ 24.410129] kunit_try_run_case+0x170/0x3f0 [ 24.410180] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.410235] kthread+0x24c/0x2d0 [ 24.410314] ret_from_fork+0x10/0x20 [ 24.410370] [ 24.415875] Allocated by task 252: [ 24.416430] kasan_save_stack+0x3c/0x68 [ 24.416960] kasan_save_track+0x20/0x40 [ 24.417515] kasan_save_alloc_info+0x40/0x58 [ 24.418024] __kasan_kmalloc+0xd4/0xd8 [ 24.418560] __kmalloc_cache_noprof+0x154/0x320 [ 24.419019] kasan_atomics+0xb8/0x2e8 [ 24.419560] kunit_try_run_case+0x170/0x3f0 [ 24.419966] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.420606] kthread+0x24c/0x2d0 [ 24.421031] ret_from_fork+0x10/0x20 [ 24.421501] [ 24.421828] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.421828] which belongs to the cache kmalloc-64 of size 64 [ 24.422801] The buggy address is located 0 bytes to the right of [ 24.422801] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.423758] [ 24.424072] The buggy address belongs to the physical page: [ 24.424676] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.425387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.426005] page_type: f5(slab) [ 24.426431] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.427103] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.427727] page dumped because: kasan: bad access detected [ 24.428180] [ 24.428510] Memory state around the buggy address: [ 24.428973] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.429634] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.430377] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.430966] ^ [ 24.431470] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.432132] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.432689] ================================================================== [ 24.521235] ================================================================== [ 24.521833] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x165c/0x49c8 [ 24.522431] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.523109] [ 24.523492] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.523716] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.523801] Hardware name: linux,dummy-virt (DT) [ 24.523891] Call trace: [ 24.523934] dump_backtrace+0x9c/0x128 [ 24.524007] show_stack+0x20/0x38 [ 24.524056] dump_stack_lvl+0x8c/0xd0 [ 24.524114] print_report+0x118/0x5f0 [ 24.524164] kasan_report+0xdc/0x128 [ 24.524210] kasan_check_range+0x100/0x1a8 [ 24.524304] __kasan_check_write+0x20/0x30 [ 24.524398] kasan_atomics_helper+0x165c/0x49c8 [ 24.524510] kasan_atomics+0x1a0/0x2e8 [ 24.524622] kunit_try_run_case+0x170/0x3f0 [ 24.524684] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.524741] kthread+0x24c/0x2d0 [ 24.524790] ret_from_fork+0x10/0x20 [ 24.524845] [ 24.530058] Allocated by task 252: [ 24.530503] kasan_save_stack+0x3c/0x68 [ 24.530965] kasan_save_track+0x20/0x40 [ 24.531465] kasan_save_alloc_info+0x40/0x58 [ 24.531890] __kasan_kmalloc+0xd4/0xd8 [ 24.532324] __kmalloc_cache_noprof+0x154/0x320 [ 24.532853] kasan_atomics+0xb8/0x2e8 [ 24.533362] kunit_try_run_case+0x170/0x3f0 [ 24.533891] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.534343] kthread+0x24c/0x2d0 [ 24.534794] ret_from_fork+0x10/0x20 [ 24.535280] [ 24.535581] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.535581] which belongs to the cache kmalloc-64 of size 64 [ 24.536472] The buggy address is located 0 bytes to the right of [ 24.536472] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.537963] [ 24.538227] The buggy address belongs to the physical page: [ 24.538693] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.539601] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.540267] page_type: f5(slab) [ 24.540685] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.541352] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.541920] page dumped because: kasan: bad access detected [ 24.542441] [ 24.542740] Memory state around the buggy address: [ 24.543396] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.544214] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.544895] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.545602] ^ [ 24.546018] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.546880] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.547554] ================================================================== [ 24.145418] ================================================================== [ 24.146179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10d8/0x49c8 [ 24.147036] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.148094] [ 24.148448] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.148579] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.148634] Hardware name: linux,dummy-virt (DT) [ 24.148689] Call trace: [ 24.148726] dump_backtrace+0x9c/0x128 [ 24.148800] show_stack+0x20/0x38 [ 24.148847] dump_stack_lvl+0x8c/0xd0 [ 24.148896] print_report+0x118/0x5f0 [ 24.148945] kasan_report+0xdc/0x128 [ 24.148991] kasan_check_range+0x100/0x1a8 [ 24.149041] __kasan_check_write+0x20/0x30 [ 24.149091] kasan_atomics_helper+0x10d8/0x49c8 [ 24.149144] kasan_atomics+0x1a0/0x2e8 [ 24.149193] kunit_try_run_case+0x170/0x3f0 [ 24.149258] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.149319] kthread+0x24c/0x2d0 [ 24.149367] ret_from_fork+0x10/0x20 [ 24.149420] [ 24.154964] Allocated by task 252: [ 24.155466] kasan_save_stack+0x3c/0x68 [ 24.155985] kasan_save_track+0x20/0x40 [ 24.156422] kasan_save_alloc_info+0x40/0x58 [ 24.157010] __kasan_kmalloc+0xd4/0xd8 [ 24.157559] __kmalloc_cache_noprof+0x154/0x320 [ 24.158137] kasan_atomics+0xb8/0x2e8 [ 24.158568] kunit_try_run_case+0x170/0x3f0 [ 24.158995] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.159645] kthread+0x24c/0x2d0 [ 24.160113] ret_from_fork+0x10/0x20 [ 24.160575] [ 24.160882] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.160882] which belongs to the cache kmalloc-64 of size 64 [ 24.161824] The buggy address is located 0 bytes to the right of [ 24.161824] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.162935] [ 24.163296] The buggy address belongs to the physical page: [ 24.163779] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.164592] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.165213] page_type: f5(slab) [ 24.165636] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.166334] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.166984] page dumped because: kasan: bad access detected [ 24.167495] [ 24.167760] Memory state around the buggy address: [ 24.168202] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.168943] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.169622] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.170194] ^ [ 24.170562] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.171201] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.171849] ================================================================== [ 23.388540] ================================================================== [ 23.389328] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x728/0x49c8 [ 23.390187] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.390941] [ 23.391380] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.391622] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.391724] Hardware name: linux,dummy-virt (DT) [ 23.391781] Call trace: [ 23.391815] dump_backtrace+0x9c/0x128 [ 23.391903] show_stack+0x20/0x38 [ 23.391966] dump_stack_lvl+0x8c/0xd0 [ 23.392020] print_report+0x118/0x5f0 [ 23.392068] kasan_report+0xdc/0x128 [ 23.392114] kasan_check_range+0x100/0x1a8 [ 23.392164] __kasan_check_write+0x20/0x30 [ 23.392213] kasan_atomics_helper+0x728/0x49c8 [ 23.392290] kasan_atomics+0x1a0/0x2e8 [ 23.392342] kunit_try_run_case+0x170/0x3f0 [ 23.392396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.392452] kthread+0x24c/0x2d0 [ 23.392500] ret_from_fork+0x10/0x20 [ 23.392552] [ 23.397236] Allocated by task 252: [ 23.397776] kasan_save_stack+0x3c/0x68 [ 23.398352] kasan_save_track+0x20/0x40 [ 23.398882] kasan_save_alloc_info+0x40/0x58 [ 23.399490] __kasan_kmalloc+0xd4/0xd8 [ 23.399925] __kmalloc_cache_noprof+0x154/0x320 [ 23.400215] kasan_atomics+0xb8/0x2e8 [ 23.400809] kunit_try_run_case+0x170/0x3f0 [ 23.401435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.402109] kthread+0x24c/0x2d0 [ 23.402613] ret_from_fork+0x10/0x20 [ 23.403125] [ 23.403458] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.403458] which belongs to the cache kmalloc-64 of size 64 [ 23.404487] The buggy address is located 0 bytes to the right of [ 23.404487] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.405384] [ 23.405723] The buggy address belongs to the physical page: [ 23.406293] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.406985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.407545] page_type: f5(slab) [ 23.407990] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.408582] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.409318] page dumped because: kasan: bad access detected [ 23.409747] [ 23.410039] Memory state around the buggy address: [ 23.410543] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.411159] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.411762] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.412364] ^ [ 23.412826] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.413473] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.414110] ================================================================== [ 24.377766] ================================================================== [ 24.378879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x406c/0x49c8 [ 24.379585] Read of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.380184] [ 24.380582] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.380846] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.380935] Hardware name: linux,dummy-virt (DT) [ 24.381040] Call trace: [ 24.381102] dump_backtrace+0x9c/0x128 [ 24.381183] show_stack+0x20/0x38 [ 24.381233] dump_stack_lvl+0x8c/0xd0 [ 24.381317] print_report+0x118/0x5f0 [ 24.381369] kasan_report+0xdc/0x128 [ 24.381417] __asan_report_load8_noabort+0x20/0x30 [ 24.381473] kasan_atomics_helper+0x406c/0x49c8 [ 24.381542] kasan_atomics+0x1a0/0x2e8 [ 24.381593] kunit_try_run_case+0x170/0x3f0 [ 24.381645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.381701] kthread+0x24c/0x2d0 [ 24.381749] ret_from_fork+0x10/0x20 [ 24.381803] [ 24.387079] Allocated by task 252: [ 24.387625] kasan_save_stack+0x3c/0x68 [ 24.388087] kasan_save_track+0x20/0x40 [ 24.388604] kasan_save_alloc_info+0x40/0x58 [ 24.389150] __kasan_kmalloc+0xd4/0xd8 [ 24.389582] __kmalloc_cache_noprof+0x154/0x320 [ 24.390193] kasan_atomics+0xb8/0x2e8 [ 24.390607] kunit_try_run_case+0x170/0x3f0 [ 24.391194] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.391780] kthread+0x24c/0x2d0 [ 24.392274] ret_from_fork+0x10/0x20 [ 24.392699] [ 24.393005] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.393005] which belongs to the cache kmalloc-64 of size 64 [ 24.393896] The buggy address is located 0 bytes to the right of [ 24.393896] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.394939] [ 24.395254] The buggy address belongs to the physical page: [ 24.395865] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.396462] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.397058] page_type: f5(slab) [ 24.397488] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.398212] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.398857] page dumped because: kasan: bad access detected [ 24.399390] [ 24.399707] Memory state around the buggy address: [ 24.400182] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.400917] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.401459] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.402108] ^ [ 24.402598] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.403192] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.403824] ================================================================== [ 23.166080] ================================================================== [ 23.166581] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x434/0x49c8 [ 23.168266] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.168960] [ 23.169290] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.169529] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.169611] Hardware name: linux,dummy-virt (DT) [ 23.169692] Call trace: [ 23.169759] dump_backtrace+0x9c/0x128 [ 23.169838] show_stack+0x20/0x38 [ 23.169886] dump_stack_lvl+0x8c/0xd0 [ 23.169942] print_report+0x118/0x5f0 [ 23.169992] kasan_report+0xdc/0x128 [ 23.170038] kasan_check_range+0x100/0x1a8 [ 23.170086] __kasan_check_write+0x20/0x30 [ 23.170136] kasan_atomics_helper+0x434/0x49c8 [ 23.170187] kasan_atomics+0x1a0/0x2e8 [ 23.170254] kunit_try_run_case+0x170/0x3f0 [ 23.170320] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.170375] kthread+0x24c/0x2d0 [ 23.170423] ret_from_fork+0x10/0x20 [ 23.170478] [ 23.176609] Allocated by task 252: [ 23.177106] kasan_save_stack+0x3c/0x68 [ 23.178742] kasan_save_track+0x20/0x40 [ 23.179921] kasan_save_alloc_info+0x40/0x58 [ 23.180378] __kasan_kmalloc+0xd4/0xd8 [ 23.180713] __kmalloc_cache_noprof+0x154/0x320 [ 23.181298] kasan_atomics+0xb8/0x2e8 [ 23.181737] kunit_try_run_case+0x170/0x3f0 [ 23.182210] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.182728] kthread+0x24c/0x2d0 [ 23.183511] ret_from_fork+0x10/0x20 [ 23.184027] [ 23.184287] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.184287] which belongs to the cache kmalloc-64 of size 64 [ 23.185183] The buggy address is located 0 bytes to the right of [ 23.185183] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.186191] [ 23.186471] The buggy address belongs to the physical page: [ 23.187036] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.188087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.188584] page_type: f5(slab) [ 23.189380] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.190225] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.190869] page dumped because: kasan: bad access detected [ 23.191654] [ 23.191927] Memory state around the buggy address: [ 23.192674] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.193334] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.194168] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.194912] ^ [ 23.195712] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.196922] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.197558] ================================================================== [ 24.604934] ================================================================== [ 24.607420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f5c/0x49c8 [ 24.608461] Read of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.609938] [ 24.610328] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.610567] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.610649] Hardware name: linux,dummy-virt (DT) [ 24.610745] Call trace: [ 24.610814] dump_backtrace+0x9c/0x128 [ 24.610941] show_stack+0x20/0x38 [ 24.611039] dump_stack_lvl+0x8c/0xd0 [ 24.611130] print_report+0x118/0x5f0 [ 24.611213] kasan_report+0xdc/0x128 [ 24.611315] __asan_report_load8_noabort+0x20/0x30 [ 24.611422] kasan_atomics_helper+0x3f5c/0x49c8 [ 24.611530] kasan_atomics+0x1a0/0x2e8 [ 24.611627] kunit_try_run_case+0x170/0x3f0 [ 24.611789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.611906] kthread+0x24c/0x2d0 [ 24.611994] ret_from_fork+0x10/0x20 [ 24.612089] [ 24.617290] Allocated by task 252: [ 24.617862] kasan_save_stack+0x3c/0x68 [ 24.618458] kasan_save_track+0x20/0x40 [ 24.619035] kasan_save_alloc_info+0x40/0x58 [ 24.619529] __kasan_kmalloc+0xd4/0xd8 [ 24.620007] __kmalloc_cache_noprof+0x154/0x320 [ 24.620534] kasan_atomics+0xb8/0x2e8 [ 24.620814] kunit_try_run_case+0x170/0x3f0 [ 24.621396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.621946] kthread+0x24c/0x2d0 [ 24.622359] ret_from_fork+0x10/0x20 [ 24.622781] [ 24.623089] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.623089] which belongs to the cache kmalloc-64 of size 64 [ 24.623894] The buggy address is located 0 bytes to the right of [ 24.623894] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.624832] [ 24.625172] The buggy address belongs to the physical page: [ 24.625652] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.626344] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.627031] page_type: f5(slab) [ 24.627431] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.628135] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.628773] page dumped because: kasan: bad access detected [ 24.629282] [ 24.629529] Memory state around the buggy address: [ 24.629969] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.630620] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.631000] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.631728] ^ [ 24.632213] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.632693] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.633425] ================================================================== [ 24.088761] ================================================================== [ 24.089429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1000/0x49c8 [ 24.090124] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.090773] [ 24.091210] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.091473] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.091563] Hardware name: linux,dummy-virt (DT) [ 24.091649] Call trace: [ 24.091685] dump_backtrace+0x9c/0x128 [ 24.091760] show_stack+0x20/0x38 [ 24.091805] dump_stack_lvl+0x8c/0xd0 [ 24.091857] print_report+0x118/0x5f0 [ 24.091906] kasan_report+0xdc/0x128 [ 24.091952] kasan_check_range+0x100/0x1a8 [ 24.092003] __kasan_check_write+0x20/0x30 [ 24.092053] kasan_atomics_helper+0x1000/0x49c8 [ 24.092105] kasan_atomics+0x1a0/0x2e8 [ 24.092154] kunit_try_run_case+0x170/0x3f0 [ 24.092207] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.092293] kthread+0x24c/0x2d0 [ 24.092346] ret_from_fork+0x10/0x20 [ 24.092400] [ 24.098116] Allocated by task 252: [ 24.098662] kasan_save_stack+0x3c/0x68 [ 24.099253] kasan_save_track+0x20/0x40 [ 24.099763] kasan_save_alloc_info+0x40/0x58 [ 24.100256] __kasan_kmalloc+0xd4/0xd8 [ 24.100765] __kmalloc_cache_noprof+0x154/0x320 [ 24.101404] kasan_atomics+0xb8/0x2e8 [ 24.101839] kunit_try_run_case+0x170/0x3f0 [ 24.102368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.102907] kthread+0x24c/0x2d0 [ 24.103252] ret_from_fork+0x10/0x20 [ 24.103727] [ 24.103969] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.103969] which belongs to the cache kmalloc-64 of size 64 [ 24.104925] The buggy address is located 0 bytes to the right of [ 24.104925] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.106018] [ 24.106366] The buggy address belongs to the physical page: [ 24.106924] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.107584] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.108195] page_type: f5(slab) [ 24.108642] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.109352] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.110010] page dumped because: kasan: bad access detected [ 24.110557] [ 24.110857] Memory state around the buggy address: [ 24.111368] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.112009] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.112683] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.113306] ^ [ 24.113818] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.114457] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.115073] ================================================================== [ 24.022678] ================================================================== [ 24.023453] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf28/0x49c8 [ 24.023848] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.024204] [ 24.024422] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.024588] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.024661] Hardware name: linux,dummy-virt (DT) [ 24.024752] Call trace: [ 24.024819] dump_backtrace+0x9c/0x128 [ 24.024933] show_stack+0x20/0x38 [ 24.024987] dump_stack_lvl+0x8c/0xd0 [ 24.025042] print_report+0x118/0x5f0 [ 24.025121] kasan_report+0xdc/0x128 [ 24.025223] kasan_check_range+0x100/0x1a8 [ 24.025497] __kasan_check_write+0x20/0x30 [ 24.025621] kasan_atomics_helper+0xf28/0x49c8 [ 24.025752] kasan_atomics+0x1a0/0x2e8 [ 24.025874] kunit_try_run_case+0x170/0x3f0 [ 24.025994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.026078] kthread+0x24c/0x2d0 [ 24.026134] ret_from_fork+0x10/0x20 [ 24.026190] [ 24.033311] Allocated by task 252: [ 24.033951] kasan_save_stack+0x3c/0x68 [ 24.034395] kasan_save_track+0x20/0x40 [ 24.035019] kasan_save_alloc_info+0x40/0x58 [ 24.035645] __kasan_kmalloc+0xd4/0xd8 [ 24.036035] __kmalloc_cache_noprof+0x154/0x320 [ 24.036706] kasan_atomics+0xb8/0x2e8 [ 24.037088] kunit_try_run_case+0x170/0x3f0 [ 24.037734] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.038307] kthread+0x24c/0x2d0 [ 24.038674] ret_from_fork+0x10/0x20 [ 24.039217] [ 24.039472] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.039472] which belongs to the cache kmalloc-64 of size 64 [ 24.040488] The buggy address is located 0 bytes to the right of [ 24.040488] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.041851] [ 24.042360] The buggy address belongs to the physical page: [ 24.042835] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.043485] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.044025] page_type: f5(slab) [ 24.044459] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.045331] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.046127] page dumped because: kasan: bad access detected [ 24.046740] [ 24.047051] Memory state around the buggy address: [ 24.047648] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.048352] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.049044] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.049740] ^ [ 24.050399] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.051082] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.051755] ================================================================== [ 24.350732] ================================================================== [ 24.351396] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x141c/0x49c8 [ 24.351989] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.352700] [ 24.353075] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.353344] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.353442] Hardware name: linux,dummy-virt (DT) [ 24.353543] Call trace: [ 24.353608] dump_backtrace+0x9c/0x128 [ 24.353763] show_stack+0x20/0x38 [ 24.353837] dump_stack_lvl+0x8c/0xd0 [ 24.353893] print_report+0x118/0x5f0 [ 24.353950] kasan_report+0xdc/0x128 [ 24.354021] kasan_check_range+0x100/0x1a8 [ 24.354073] __kasan_check_write+0x20/0x30 [ 24.354122] kasan_atomics_helper+0x141c/0x49c8 [ 24.354175] kasan_atomics+0x1a0/0x2e8 [ 24.354224] kunit_try_run_case+0x170/0x3f0 [ 24.354303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.354359] kthread+0x24c/0x2d0 [ 24.354408] ret_from_fork+0x10/0x20 [ 24.354462] [ 24.359922] Allocated by task 252: [ 24.360391] kasan_save_stack+0x3c/0x68 [ 24.360939] kasan_save_track+0x20/0x40 [ 24.361509] kasan_save_alloc_info+0x40/0x58 [ 24.361972] __kasan_kmalloc+0xd4/0xd8 [ 24.362508] __kmalloc_cache_noprof+0x154/0x320 [ 24.362997] kasan_atomics+0xb8/0x2e8 [ 24.363500] kunit_try_run_case+0x170/0x3f0 [ 24.363941] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.364543] kthread+0x24c/0x2d0 [ 24.364975] ret_from_fork+0x10/0x20 [ 24.365420] [ 24.365755] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.365755] which belongs to the cache kmalloc-64 of size 64 [ 24.366683] The buggy address is located 0 bytes to the right of [ 24.366683] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.367642] [ 24.367974] The buggy address belongs to the physical page: [ 24.368450] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.369184] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.369784] page_type: f5(slab) [ 24.370151] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.370910] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.371480] page dumped because: kasan: bad access detected [ 24.371988] [ 24.372281] Memory state around the buggy address: [ 24.372759] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.373438] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.374082] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.374686] ^ [ 24.375170] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.375821] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.376439] ================================================================== [ 24.492714] ================================================================== [ 24.493304] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15f0/0x49c8 [ 24.494188] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.495280] [ 24.495616] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.495825] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.495868] Hardware name: linux,dummy-virt (DT) [ 24.495913] Call trace: [ 24.495961] dump_backtrace+0x9c/0x128 [ 24.496068] show_stack+0x20/0x38 [ 24.496167] dump_stack_lvl+0x8c/0xd0 [ 24.496273] print_report+0x118/0x5f0 [ 24.496333] kasan_report+0xdc/0x128 [ 24.496381] kasan_check_range+0x100/0x1a8 [ 24.496432] __kasan_check_write+0x20/0x30 [ 24.496482] kasan_atomics_helper+0x15f0/0x49c8 [ 24.496535] kasan_atomics+0x1a0/0x2e8 [ 24.496585] kunit_try_run_case+0x170/0x3f0 [ 24.496641] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.496701] kthread+0x24c/0x2d0 [ 24.496750] ret_from_fork+0x10/0x20 [ 24.496804] [ 24.501918] Allocated by task 252: [ 24.502411] kasan_save_stack+0x3c/0x68 [ 24.502894] kasan_save_track+0x20/0x40 [ 24.503314] kasan_save_alloc_info+0x40/0x58 [ 24.503778] __kasan_kmalloc+0xd4/0xd8 [ 24.504267] __kmalloc_cache_noprof+0x154/0x320 [ 24.504817] kasan_atomics+0xb8/0x2e8 [ 24.505307] kunit_try_run_case+0x170/0x3f0 [ 24.505742] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.506286] kthread+0x24c/0x2d0 [ 24.506624] ret_from_fork+0x10/0x20 [ 24.506982] [ 24.507228] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.507228] which belongs to the cache kmalloc-64 of size 64 [ 24.508566] The buggy address is located 0 bytes to the right of [ 24.508566] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.509595] [ 24.510091] The buggy address belongs to the physical page: [ 24.510422] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.511178] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.511816] page_type: f5(slab) [ 24.512182] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.512937] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.513632] page dumped because: kasan: bad access detected [ 24.514103] [ 24.514386] Memory state around the buggy address: [ 24.514853] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.515491] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.516127] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.516767] ^ [ 24.517086] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.517803] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.518306] ================================================================== [ 24.233155] ================================================================== [ 24.233774] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x121c/0x49c8 [ 24.234482] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.235182] [ 24.235481] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.235734] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.235823] Hardware name: linux,dummy-virt (DT) [ 24.235916] Call trace: [ 24.235986] dump_backtrace+0x9c/0x128 [ 24.236132] show_stack+0x20/0x38 [ 24.236231] dump_stack_lvl+0x8c/0xd0 [ 24.236353] print_report+0x118/0x5f0 [ 24.236488] kasan_report+0xdc/0x128 [ 24.236577] kasan_check_range+0x100/0x1a8 [ 24.236632] __kasan_check_write+0x20/0x30 [ 24.236686] kasan_atomics_helper+0x121c/0x49c8 [ 24.236776] kasan_atomics+0x1a0/0x2e8 [ 24.236828] kunit_try_run_case+0x170/0x3f0 [ 24.236884] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.236939] kthread+0x24c/0x2d0 [ 24.236988] ret_from_fork+0x10/0x20 [ 24.237043] [ 24.242624] Allocated by task 252: [ 24.243105] kasan_save_stack+0x3c/0x68 [ 24.243679] kasan_save_track+0x20/0x40 [ 24.244172] kasan_save_alloc_info+0x40/0x58 [ 24.244721] __kasan_kmalloc+0xd4/0xd8 [ 24.245150] __kmalloc_cache_noprof+0x154/0x320 [ 24.245737] kasan_atomics+0xb8/0x2e8 [ 24.246274] kunit_try_run_case+0x170/0x3f0 [ 24.246832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.247409] kthread+0x24c/0x2d0 [ 24.247815] ret_from_fork+0x10/0x20 [ 24.248167] [ 24.248479] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.248479] which belongs to the cache kmalloc-64 of size 64 [ 24.249373] The buggy address is located 0 bytes to the right of [ 24.249373] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.250460] [ 24.250819] The buggy address belongs to the physical page: [ 24.251327] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.252037] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.252742] page_type: f5(slab) [ 24.253116] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.253873] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.254609] page dumped because: kasan: bad access detected [ 24.255142] [ 24.255434] Memory state around the buggy address: [ 24.255925] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.256639] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.257248] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.257827] ^ [ 24.258220] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.258758] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.259316] ================================================================== [ 23.664437] ================================================================== [ 23.665095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f34/0x49c8 [ 23.665758] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.666269] [ 23.666618] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.666852] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.666932] Hardware name: linux,dummy-virt (DT) [ 23.667027] Call trace: [ 23.667093] dump_backtrace+0x9c/0x128 [ 23.667269] show_stack+0x20/0x38 [ 23.667372] dump_stack_lvl+0x8c/0xd0 [ 23.667477] print_report+0x118/0x5f0 [ 23.667532] kasan_report+0xdc/0x128 [ 23.667581] __asan_report_load4_noabort+0x20/0x30 [ 23.667633] kasan_atomics_helper+0x3f34/0x49c8 [ 23.667688] kasan_atomics+0x1a0/0x2e8 [ 23.667736] kunit_try_run_case+0x170/0x3f0 [ 23.667788] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.667844] kthread+0x24c/0x2d0 [ 23.667890] ret_from_fork+0x10/0x20 [ 23.667945] [ 23.672653] Allocated by task 252: [ 23.673156] kasan_save_stack+0x3c/0x68 [ 23.673701] kasan_save_track+0x20/0x40 [ 23.674165] kasan_save_alloc_info+0x40/0x58 [ 23.674611] __kasan_kmalloc+0xd4/0xd8 [ 23.675056] __kmalloc_cache_noprof+0x154/0x320 [ 23.675489] kasan_atomics+0xb8/0x2e8 [ 23.675959] kunit_try_run_case+0x170/0x3f0 [ 23.676432] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.676854] kthread+0x24c/0x2d0 [ 23.677325] ret_from_fork+0x10/0x20 [ 23.677810] [ 23.678055] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.678055] which belongs to the cache kmalloc-64 of size 64 [ 23.678968] The buggy address is located 0 bytes to the right of [ 23.678968] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.679890] [ 23.680208] The buggy address belongs to the physical page: [ 23.680823] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.681445] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.682092] page_type: f5(slab) [ 23.682491] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.683277] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.683854] page dumped because: kasan: bad access detected [ 23.684403] [ 23.684651] Memory state around the buggy address: [ 23.685009] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.685740] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.686301] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.686908] ^ [ 23.687355] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.687973] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.688469] ================================================================== [ 23.360454] ================================================================== [ 23.361022] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6bc/0x49c8 [ 23.361761] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.362515] [ 23.362891] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.363075] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.363155] Hardware name: linux,dummy-virt (DT) [ 23.363213] Call trace: [ 23.363266] dump_backtrace+0x9c/0x128 [ 23.363400] show_stack+0x20/0x38 [ 23.363502] dump_stack_lvl+0x8c/0xd0 [ 23.363598] print_report+0x118/0x5f0 [ 23.363650] kasan_report+0xdc/0x128 [ 23.363702] kasan_check_range+0x100/0x1a8 [ 23.363752] __kasan_check_write+0x20/0x30 [ 23.363798] kasan_atomics_helper+0x6bc/0x49c8 [ 23.363849] kasan_atomics+0x1a0/0x2e8 [ 23.363895] kunit_try_run_case+0x170/0x3f0 [ 23.363944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.364000] kthread+0x24c/0x2d0 [ 23.364047] ret_from_fork+0x10/0x20 [ 23.364098] [ 23.369565] Allocated by task 252: [ 23.370099] kasan_save_stack+0x3c/0x68 [ 23.370676] kasan_save_track+0x20/0x40 [ 23.371163] kasan_save_alloc_info+0x40/0x58 [ 23.371594] __kasan_kmalloc+0xd4/0xd8 [ 23.372113] __kmalloc_cache_noprof+0x154/0x320 [ 23.372541] kasan_atomics+0xb8/0x2e8 [ 23.373056] kunit_try_run_case+0x170/0x3f0 [ 23.373594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.374169] kthread+0x24c/0x2d0 [ 23.374662] ret_from_fork+0x10/0x20 [ 23.375182] [ 23.375493] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.375493] which belongs to the cache kmalloc-64 of size 64 [ 23.376358] The buggy address is located 0 bytes to the right of [ 23.376358] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.377394] [ 23.377746] The buggy address belongs to the physical page: [ 23.378221] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.378961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.379558] page_type: f5(slab) [ 23.379956] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.380617] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.381296] page dumped because: kasan: bad access detected [ 23.381745] [ 23.381997] Memory state around the buggy address: [ 23.382720] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.383356] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.383889] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.384550] ^ [ 23.385071] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.385721] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.386334] ================================================================== [ 24.744935] ================================================================== [ 24.745761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18a4/0x49c8 [ 24.746295] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.746731] [ 24.746945] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.747136] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.747200] Hardware name: linux,dummy-virt (DT) [ 24.747572] Call trace: [ 24.747655] dump_backtrace+0x9c/0x128 [ 24.747814] show_stack+0x20/0x38 [ 24.747934] dump_stack_lvl+0x8c/0xd0 [ 24.748049] print_report+0x118/0x5f0 [ 24.748162] kasan_report+0xdc/0x128 [ 24.748287] kasan_check_range+0x100/0x1a8 [ 24.748392] __kasan_check_write+0x20/0x30 [ 24.748499] kasan_atomics_helper+0x18a4/0x49c8 [ 24.748608] kasan_atomics+0x1a0/0x2e8 [ 24.748717] kunit_try_run_case+0x170/0x3f0 [ 24.748835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.748953] kthread+0x24c/0x2d0 [ 24.749052] ret_from_fork+0x10/0x20 [ 24.749139] [ 24.754291] Allocated by task 252: [ 24.754792] kasan_save_stack+0x3c/0x68 [ 24.755344] kasan_save_track+0x20/0x40 [ 24.755857] kasan_save_alloc_info+0x40/0x58 [ 24.756339] __kasan_kmalloc+0xd4/0xd8 [ 24.756820] __kmalloc_cache_noprof+0x154/0x320 [ 24.757402] kasan_atomics+0xb8/0x2e8 [ 24.757817] kunit_try_run_case+0x170/0x3f0 [ 24.758290] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.758752] kthread+0x24c/0x2d0 [ 24.759213] ret_from_fork+0x10/0x20 [ 24.759622] [ 24.759918] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.759918] which belongs to the cache kmalloc-64 of size 64 [ 24.760808] The buggy address is located 0 bytes to the right of [ 24.760808] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.762271] [ 24.762792] The buggy address belongs to the physical page: [ 24.763477] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.764133] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.764576] page_type: f5(slab) [ 24.765043] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.765685] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.766274] page dumped because: kasan: bad access detected [ 24.766852] [ 24.767131] Memory state around the buggy address: [ 24.767566] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.768110] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.768840] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.769410] ^ [ 24.769873] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.770545] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.771107] ================================================================== [ 24.260745] ================================================================== [ 24.261838] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1288/0x49c8 [ 24.262554] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.263403] [ 24.263759] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.264015] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.264097] Hardware name: linux,dummy-virt (DT) [ 24.264216] Call trace: [ 24.264301] dump_backtrace+0x9c/0x128 [ 24.264407] show_stack+0x20/0x38 [ 24.264459] dump_stack_lvl+0x8c/0xd0 [ 24.264513] print_report+0x118/0x5f0 [ 24.264560] kasan_report+0xdc/0x128 [ 24.264606] kasan_check_range+0x100/0x1a8 [ 24.264655] __kasan_check_write+0x20/0x30 [ 24.264705] kasan_atomics_helper+0x1288/0x49c8 [ 24.264757] kasan_atomics+0x1a0/0x2e8 [ 24.264806] kunit_try_run_case+0x170/0x3f0 [ 24.264856] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.264911] kthread+0x24c/0x2d0 [ 24.264959] ret_from_fork+0x10/0x20 [ 24.265014] [ 24.270440] Allocated by task 252: [ 24.270823] kasan_save_stack+0x3c/0x68 [ 24.271406] kasan_save_track+0x20/0x40 [ 24.271949] kasan_save_alloc_info+0x40/0x58 [ 24.272429] __kasan_kmalloc+0xd4/0xd8 [ 24.272959] __kmalloc_cache_noprof+0x154/0x320 [ 24.273497] kasan_atomics+0xb8/0x2e8 [ 24.273881] kunit_try_run_case+0x170/0x3f0 [ 24.274483] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.274999] kthread+0x24c/0x2d0 [ 24.275376] ret_from_fork+0x10/0x20 [ 24.275825] [ 24.276102] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.276102] which belongs to the cache kmalloc-64 of size 64 [ 24.277006] The buggy address is located 0 bytes to the right of [ 24.277006] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.278061] [ 24.278413] The buggy address belongs to the physical page: [ 24.278862] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.279654] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.280316] page_type: f5(slab) [ 24.280776] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.281514] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.282132] page dumped because: kasan: bad access detected [ 24.282686] [ 24.282998] Memory state around the buggy address: [ 24.283450] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.284163] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.284835] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.285595] ^ [ 24.286227] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.286984] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.287703] ================================================================== [ 23.198766] ================================================================== [ 23.199515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x49c8 [ 23.200158] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.201093] [ 23.201389] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.201621] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.201702] Hardware name: linux,dummy-virt (DT) [ 23.201799] Call trace: [ 23.201862] dump_backtrace+0x9c/0x128 [ 23.201989] show_stack+0x20/0x38 [ 23.202081] dump_stack_lvl+0x8c/0xd0 [ 23.202189] print_report+0x118/0x5f0 [ 23.202307] kasan_report+0xdc/0x128 [ 23.202404] kasan_check_range+0x100/0x1a8 [ 23.202513] __kasan_check_write+0x20/0x30 [ 23.202617] kasan_atomics_helper+0x4a0/0x49c8 [ 23.202732] kasan_atomics+0x1a0/0x2e8 [ 23.202785] kunit_try_run_case+0x170/0x3f0 [ 23.202843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.202898] kthread+0x24c/0x2d0 [ 23.202946] ret_from_fork+0x10/0x20 [ 23.202999] [ 23.209555] Allocated by task 252: [ 23.209797] kasan_save_stack+0x3c/0x68 [ 23.210058] kasan_save_track+0x20/0x40 [ 23.210301] kasan_save_alloc_info+0x40/0x58 [ 23.210782] __kasan_kmalloc+0xd4/0xd8 [ 23.211336] __kmalloc_cache_noprof+0x154/0x320 [ 23.212505] kasan_atomics+0xb8/0x2e8 [ 23.212848] kunit_try_run_case+0x170/0x3f0 [ 23.213284] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.214063] kthread+0x24c/0x2d0 [ 23.214607] ret_from_fork+0x10/0x20 [ 23.215317] [ 23.215695] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.215695] which belongs to the cache kmalloc-64 of size 64 [ 23.216581] The buggy address is located 0 bytes to the right of [ 23.216581] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.217367] [ 23.217729] The buggy address belongs to the physical page: [ 23.218287] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.219153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.219829] page_type: f5(slab) [ 23.220218] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.220756] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.221809] page dumped because: kasan: bad access detected [ 23.222802] [ 23.223019] Memory state around the buggy address: [ 23.223634] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.224539] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.225229] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.225827] ^ [ 23.226365] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.227116] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.227728] ================================================================== [ 23.298396] ================================================================== [ 23.299344] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5e4/0x49c8 [ 23.300478] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.301151] [ 23.301497] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.301974] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.302051] Hardware name: linux,dummy-virt (DT) [ 23.302141] Call trace: [ 23.302185] dump_backtrace+0x9c/0x128 [ 23.302281] show_stack+0x20/0x38 [ 23.302333] dump_stack_lvl+0x8c/0xd0 [ 23.302383] print_report+0x118/0x5f0 [ 23.302432] kasan_report+0xdc/0x128 [ 23.302476] kasan_check_range+0x100/0x1a8 [ 23.302526] __kasan_check_write+0x20/0x30 [ 23.302574] kasan_atomics_helper+0x5e4/0x49c8 [ 23.302628] kasan_atomics+0x1a0/0x2e8 [ 23.302678] kunit_try_run_case+0x170/0x3f0 [ 23.302730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.302785] kthread+0x24c/0x2d0 [ 23.302831] ret_from_fork+0x10/0x20 [ 23.302884] [ 23.309507] Allocated by task 252: [ 23.310084] kasan_save_stack+0x3c/0x68 [ 23.310787] kasan_save_track+0x20/0x40 [ 23.311257] kasan_save_alloc_info+0x40/0x58 [ 23.311904] __kasan_kmalloc+0xd4/0xd8 [ 23.312744] __kmalloc_cache_noprof+0x154/0x320 [ 23.313177] kasan_atomics+0xb8/0x2e8 [ 23.313525] kunit_try_run_case+0x170/0x3f0 [ 23.313894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.314526] kthread+0x24c/0x2d0 [ 23.314893] ret_from_fork+0x10/0x20 [ 23.315638] [ 23.316040] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.316040] which belongs to the cache kmalloc-64 of size 64 [ 23.317382] The buggy address is located 0 bytes to the right of [ 23.317382] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.318755] [ 23.319020] The buggy address belongs to the physical page: [ 23.319616] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.320668] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.321279] page_type: f5(slab) [ 23.321488] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.321742] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.321973] page dumped because: kasan: bad access detected [ 23.322161] [ 23.322346] Memory state around the buggy address: [ 23.323072] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.324328] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.325041] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.325842] ^ [ 23.326437] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.327067] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.327926] ================================================================== [ 22.874336] ================================================================== [ 22.876573] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4210/0x49c8 [ 22.877284] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 22.877831] [ 22.878191] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.878436] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.878512] Hardware name: linux,dummy-virt (DT) [ 22.878617] Call trace: [ 22.878691] dump_backtrace+0x9c/0x128 [ 22.878822] show_stack+0x20/0x38 [ 22.878895] dump_stack_lvl+0x8c/0xd0 [ 22.878956] print_report+0x118/0x5f0 [ 22.879008] kasan_report+0xdc/0x128 [ 22.879078] __asan_report_load4_noabort+0x20/0x30 [ 22.879176] kasan_atomics_helper+0x4210/0x49c8 [ 22.879281] kasan_atomics+0x1a0/0x2e8 [ 22.879371] kunit_try_run_case+0x170/0x3f0 [ 22.879491] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.879598] kthread+0x24c/0x2d0 [ 22.879682] ret_from_fork+0x10/0x20 [ 22.879778] [ 22.886033] Allocated by task 252: [ 22.886587] kasan_save_stack+0x3c/0x68 [ 22.887422] kasan_save_track+0x20/0x40 [ 22.887919] kasan_save_alloc_info+0x40/0x58 [ 22.888348] __kasan_kmalloc+0xd4/0xd8 [ 22.888853] __kmalloc_cache_noprof+0x154/0x320 [ 22.889434] kasan_atomics+0xb8/0x2e8 [ 22.889878] kunit_try_run_case+0x170/0x3f0 [ 22.890308] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.890914] kthread+0x24c/0x2d0 [ 22.891307] ret_from_fork+0x10/0x20 [ 22.891808] [ 22.892054] The buggy address belongs to the object at fff00000c6cc9e00 [ 22.892054] which belongs to the cache kmalloc-64 of size 64 [ 22.892908] The buggy address is located 0 bytes to the right of [ 22.892908] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 22.893892] [ 22.894223] The buggy address belongs to the physical page: [ 22.894759] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 22.895499] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.896325] page_type: f5(slab) [ 22.896799] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.897435] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 22.898102] page dumped because: kasan: bad access detected [ 22.898830] [ 22.899478] Memory state around the buggy address: [ 22.899997] fff00000c6cc9d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.900619] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.901248] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.901871] ^ [ 22.902415] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.903065] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.903950] ================================================================== [ 23.134508] ================================================================== [ 23.135769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3c8/0x49c8 [ 23.136473] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.137282] [ 23.137649] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.137885] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.137976] Hardware name: linux,dummy-virt (DT) [ 23.138070] Call trace: [ 23.138136] dump_backtrace+0x9c/0x128 [ 23.138276] show_stack+0x20/0x38 [ 23.138387] dump_stack_lvl+0x8c/0xd0 [ 23.138478] print_report+0x118/0x5f0 [ 23.138536] kasan_report+0xdc/0x128 [ 23.138585] kasan_check_range+0x100/0x1a8 [ 23.138633] __kasan_check_write+0x20/0x30 [ 23.138683] kasan_atomics_helper+0x3c8/0x49c8 [ 23.138734] kasan_atomics+0x1a0/0x2e8 [ 23.138783] kunit_try_run_case+0x170/0x3f0 [ 23.138832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.138886] kthread+0x24c/0x2d0 [ 23.138934] ret_from_fork+0x10/0x20 [ 23.138986] [ 23.145260] Allocated by task 252: [ 23.145770] kasan_save_stack+0x3c/0x68 [ 23.146899] kasan_save_track+0x20/0x40 [ 23.147510] kasan_save_alloc_info+0x40/0x58 [ 23.148298] __kasan_kmalloc+0xd4/0xd8 [ 23.148614] __kmalloc_cache_noprof+0x154/0x320 [ 23.149289] kasan_atomics+0xb8/0x2e8 [ 23.149656] kunit_try_run_case+0x170/0x3f0 [ 23.150338] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.150879] kthread+0x24c/0x2d0 [ 23.151744] ret_from_fork+0x10/0x20 [ 23.152125] [ 23.152444] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.152444] which belongs to the cache kmalloc-64 of size 64 [ 23.153318] The buggy address is located 0 bytes to the right of [ 23.153318] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.154315] [ 23.154585] The buggy address belongs to the physical page: [ 23.155573] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.156334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.156752] page_type: f5(slab) [ 23.157582] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.158390] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.159310] page dumped because: kasan: bad access detected [ 23.160029] [ 23.160311] Memory state around the buggy address: [ 23.160727] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.161342] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.161983] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.162589] ^ [ 23.163521] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.164219] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.164535] ================================================================== [ 24.717797] ================================================================== [ 24.718420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f88/0x49c8 [ 24.719161] Read of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.719628] [ 24.720017] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.720272] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.720359] Hardware name: linux,dummy-virt (DT) [ 24.720460] Call trace: [ 24.720553] dump_backtrace+0x9c/0x128 [ 24.720684] show_stack+0x20/0x38 [ 24.720775] dump_stack_lvl+0x8c/0xd0 [ 24.720835] print_report+0x118/0x5f0 [ 24.720884] kasan_report+0xdc/0x128 [ 24.720931] __asan_report_load8_noabort+0x20/0x30 [ 24.720984] kasan_atomics_helper+0x3f88/0x49c8 [ 24.721038] kasan_atomics+0x1a0/0x2e8 [ 24.721091] kunit_try_run_case+0x170/0x3f0 [ 24.721143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.721200] kthread+0x24c/0x2d0 [ 24.721273] ret_from_fork+0x10/0x20 [ 24.721331] [ 24.726641] Allocated by task 252: [ 24.727065] kasan_save_stack+0x3c/0x68 [ 24.727619] kasan_save_track+0x20/0x40 [ 24.728073] kasan_save_alloc_info+0x40/0x58 [ 24.728515] __kasan_kmalloc+0xd4/0xd8 [ 24.729051] __kmalloc_cache_noprof+0x154/0x320 [ 24.729537] kasan_atomics+0xb8/0x2e8 [ 24.730068] kunit_try_run_case+0x170/0x3f0 [ 24.730563] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.731146] kthread+0x24c/0x2d0 [ 24.731542] ret_from_fork+0x10/0x20 [ 24.732026] [ 24.732365] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.732365] which belongs to the cache kmalloc-64 of size 64 [ 24.733305] The buggy address is located 0 bytes to the right of [ 24.733305] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.734322] [ 24.734661] The buggy address belongs to the physical page: [ 24.735154] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.735933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.736550] page_type: f5(slab) [ 24.736970] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.737708] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.738355] page dumped because: kasan: bad access detected [ 24.738833] [ 24.739160] Memory state around the buggy address: [ 24.739647] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.740266] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.740930] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.741590] ^ [ 24.742003] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.742557] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.743072] ================================================================== [ 24.662916] ================================================================== [ 24.663620] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f78/0x49c8 [ 24.664311] Read of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.664904] [ 24.665261] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.665515] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.665605] Hardware name: linux,dummy-virt (DT) [ 24.665695] Call trace: [ 24.665767] dump_backtrace+0x9c/0x128 [ 24.665910] show_stack+0x20/0x38 [ 24.666012] dump_stack_lvl+0x8c/0xd0 [ 24.666096] print_report+0x118/0x5f0 [ 24.666148] kasan_report+0xdc/0x128 [ 24.666196] __asan_report_load8_noabort+0x20/0x30 [ 24.666277] kasan_atomics_helper+0x3f78/0x49c8 [ 24.666336] kasan_atomics+0x1a0/0x2e8 [ 24.666388] kunit_try_run_case+0x170/0x3f0 [ 24.666444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.666501] kthread+0x24c/0x2d0 [ 24.666550] ret_from_fork+0x10/0x20 [ 24.666605] [ 24.671523] Allocated by task 252: [ 24.672040] kasan_save_stack+0x3c/0x68 [ 24.672537] kasan_save_track+0x20/0x40 [ 24.672948] kasan_save_alloc_info+0x40/0x58 [ 24.673535] __kasan_kmalloc+0xd4/0xd8 [ 24.674040] __kmalloc_cache_noprof+0x154/0x320 [ 24.674548] kasan_atomics+0xb8/0x2e8 [ 24.675052] kunit_try_run_case+0x170/0x3f0 [ 24.675598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.676117] kthread+0x24c/0x2d0 [ 24.676551] ret_from_fork+0x10/0x20 [ 24.676901] [ 24.677203] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.677203] which belongs to the cache kmalloc-64 of size 64 [ 24.678105] The buggy address is located 0 bytes to the right of [ 24.678105] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.679085] [ 24.679427] The buggy address belongs to the physical page: [ 24.679998] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.680707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.681315] page_type: f5(slab) [ 24.681699] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.682394] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.682966] page dumped because: kasan: bad access detected [ 24.683408] [ 24.683709] Memory state around the buggy address: [ 24.684157] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.684819] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.685445] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.685992] ^ [ 24.686484] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.687202] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.687746] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 22.614037] ================================================================== [ 22.615018] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x104/0xc08 [ 22.616114] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248 [ 22.616663] [ 22.616885] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.617055] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.617111] Hardware name: linux,dummy-virt (DT) [ 22.617189] Call trace: [ 22.617258] dump_backtrace+0x9c/0x128 [ 22.617374] show_stack+0x20/0x38 [ 22.617503] dump_stack_lvl+0x8c/0xd0 [ 22.617639] print_report+0x118/0x5f0 [ 22.618053] kasan_report+0xdc/0x128 [ 22.618160] kasan_check_range+0x100/0x1a8 [ 22.618283] __kasan_check_write+0x20/0x30 [ 22.618341] kasan_bitops_test_and_modify.constprop.0+0x104/0xc08 [ 22.618405] kasan_bitops_generic+0x120/0x1d0 [ 22.618457] kunit_try_run_case+0x170/0x3f0 [ 22.618510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.618564] kthread+0x24c/0x2d0 [ 22.618612] ret_from_fork+0x10/0x20 [ 22.618665] [ 22.622189] Allocated by task 248: [ 22.622631] kasan_save_stack+0x3c/0x68 [ 22.623269] kasan_save_track+0x20/0x40 [ 22.623844] kasan_save_alloc_info+0x40/0x58 [ 22.625740] __kasan_kmalloc+0xd4/0xd8 [ 22.626337] __kmalloc_cache_noprof+0x154/0x320 [ 22.626932] kasan_bitops_generic+0xa0/0x1d0 [ 22.627431] kunit_try_run_case+0x170/0x3f0 [ 22.627968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.628381] kthread+0x24c/0x2d0 [ 22.628753] ret_from_fork+0x10/0x20 [ 22.629175] [ 22.629490] The buggy address belongs to the object at fff00000c5bb22a0 [ 22.629490] which belongs to the cache kmalloc-16 of size 16 [ 22.630346] The buggy address is located 8 bytes inside of [ 22.630346] allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9) [ 22.631232] [ 22.631535] The buggy address belongs to the physical page: [ 22.631987] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 22.632703] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.633226] page_type: f5(slab) [ 22.633684] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.634335] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 22.634985] page dumped because: kasan: bad access detected [ 22.635432] [ 22.635699] Memory state around the buggy address: [ 22.636102] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.636785] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 22.637361] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.637887] ^ [ 22.638338] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.638972] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.639499] ================================================================== [ 22.667778] ================================================================== [ 22.668434] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1e4/0xc08 [ 22.669129] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248 [ 22.670947] [ 22.671224] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.671494] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.671562] Hardware name: linux,dummy-virt (DT) [ 22.671612] Call trace: [ 22.671644] dump_backtrace+0x9c/0x128 [ 22.671743] show_stack+0x20/0x38 [ 22.671793] dump_stack_lvl+0x8c/0xd0 [ 22.671842] print_report+0x118/0x5f0 [ 22.671890] kasan_report+0xdc/0x128 [ 22.671934] kasan_check_range+0x100/0x1a8 [ 22.671982] __kasan_check_write+0x20/0x30 [ 22.672030] kasan_bitops_test_and_modify.constprop.0+0x1e4/0xc08 [ 22.672087] kasan_bitops_generic+0x120/0x1d0 [ 22.672138] kunit_try_run_case+0x170/0x3f0 [ 22.672188] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.672267] kthread+0x24c/0x2d0 [ 22.672348] ret_from_fork+0x10/0x20 [ 22.672446] [ 22.677583] Allocated by task 248: [ 22.677995] kasan_save_stack+0x3c/0x68 [ 22.678493] kasan_save_track+0x20/0x40 [ 22.678870] kasan_save_alloc_info+0x40/0x58 [ 22.679273] __kasan_kmalloc+0xd4/0xd8 [ 22.679719] __kmalloc_cache_noprof+0x154/0x320 [ 22.680176] kasan_bitops_generic+0xa0/0x1d0 [ 22.680700] kunit_try_run_case+0x170/0x3f0 [ 22.681126] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.681717] kthread+0x24c/0x2d0 [ 22.682163] ret_from_fork+0x10/0x20 [ 22.682644] [ 22.682925] The buggy address belongs to the object at fff00000c5bb22a0 [ 22.682925] which belongs to the cache kmalloc-16 of size 16 [ 22.683730] The buggy address is located 8 bytes inside of [ 22.683730] allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9) [ 22.684702] [ 22.685007] The buggy address belongs to the physical page: [ 22.685437] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 22.686212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.686906] page_type: f5(slab) [ 22.687340] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.687931] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 22.688486] page dumped because: kasan: bad access detected [ 22.688976] [ 22.689212] Memory state around the buggy address: [ 22.689661] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.690317] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 22.690859] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.691457] ^ [ 22.691876] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.692521] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.693059] ================================================================== [ 22.721347] ================================================================== [ 22.722409] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x26c/0xc08 [ 22.722992] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248 [ 22.724086] [ 22.724421] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.724708] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.724756] Hardware name: linux,dummy-virt (DT) [ 22.724802] Call trace: [ 22.724835] dump_backtrace+0x9c/0x128 [ 22.724902] show_stack+0x20/0x38 [ 22.724947] dump_stack_lvl+0x8c/0xd0 [ 22.724997] print_report+0x118/0x5f0 [ 22.725045] kasan_report+0xdc/0x128 [ 22.725088] kasan_check_range+0x100/0x1a8 [ 22.725135] __kasan_check_write+0x20/0x30 [ 22.725183] kasan_bitops_test_and_modify.constprop.0+0x26c/0xc08 [ 22.725265] kasan_bitops_generic+0x120/0x1d0 [ 22.725322] kunit_try_run_case+0x170/0x3f0 [ 22.725373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.725430] kthread+0x24c/0x2d0 [ 22.725483] ret_from_fork+0x10/0x20 [ 22.725547] [ 22.731280] Allocated by task 248: [ 22.731776] kasan_save_stack+0x3c/0x68 [ 22.732193] kasan_save_track+0x20/0x40 [ 22.732735] kasan_save_alloc_info+0x40/0x58 [ 22.733102] __kasan_kmalloc+0xd4/0xd8 [ 22.733608] __kmalloc_cache_noprof+0x154/0x320 [ 22.734033] kasan_bitops_generic+0xa0/0x1d0 [ 22.734456] kunit_try_run_case+0x170/0x3f0 [ 22.735010] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.735563] kthread+0x24c/0x2d0 [ 22.736062] ret_from_fork+0x10/0x20 [ 22.736586] [ 22.736908] The buggy address belongs to the object at fff00000c5bb22a0 [ 22.736908] which belongs to the cache kmalloc-16 of size 16 [ 22.737881] The buggy address is located 8 bytes inside of [ 22.737881] allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9) [ 22.738916] [ 22.739284] The buggy address belongs to the physical page: [ 22.740175] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 22.740869] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.741403] page_type: f5(slab) [ 22.741747] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.742508] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 22.743583] page dumped because: kasan: bad access detected [ 22.743958] [ 22.744432] Memory state around the buggy address: [ 22.744822] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.745258] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 22.745665] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.746038] ^ [ 22.747197] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.747912] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.748415] ================================================================== [ 22.695495] ================================================================== [ 22.696263] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa90/0xc08 [ 22.696581] Read of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248 [ 22.696814] [ 22.696944] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.697050] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.697086] Hardware name: linux,dummy-virt (DT) [ 22.697128] Call trace: [ 22.697157] dump_backtrace+0x9c/0x128 [ 22.697211] show_stack+0x20/0x38 [ 22.697284] dump_stack_lvl+0x8c/0xd0 [ 22.697375] print_report+0x118/0x5f0 [ 22.697457] kasan_report+0xdc/0x128 [ 22.697547] __asan_report_load8_noabort+0x20/0x30 [ 22.697643] kasan_bitops_test_and_modify.constprop.0+0xa90/0xc08 [ 22.697760] kasan_bitops_generic+0x120/0x1d0 [ 22.697866] kunit_try_run_case+0x170/0x3f0 [ 22.697976] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.698082] kthread+0x24c/0x2d0 [ 22.698180] ret_from_fork+0x10/0x20 [ 22.698304] [ 22.703602] Allocated by task 248: [ 22.703941] kasan_save_stack+0x3c/0x68 [ 22.704471] kasan_save_track+0x20/0x40 [ 22.704823] kasan_save_alloc_info+0x40/0x58 [ 22.705310] __kasan_kmalloc+0xd4/0xd8 [ 22.705779] __kmalloc_cache_noprof+0x154/0x320 [ 22.706332] kasan_bitops_generic+0xa0/0x1d0 [ 22.706779] kunit_try_run_case+0x170/0x3f0 [ 22.707170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.707720] kthread+0x24c/0x2d0 [ 22.708133] ret_from_fork+0x10/0x20 [ 22.708534] [ 22.708815] The buggy address belongs to the object at fff00000c5bb22a0 [ 22.708815] which belongs to the cache kmalloc-16 of size 16 [ 22.709817] The buggy address is located 8 bytes inside of [ 22.709817] allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9) [ 22.710651] [ 22.710934] The buggy address belongs to the physical page: [ 22.711501] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 22.712213] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.712932] page_type: f5(slab) [ 22.713369] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.713994] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 22.714606] page dumped because: kasan: bad access detected [ 22.715007] [ 22.715284] Memory state around the buggy address: [ 22.715750] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.716341] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 22.716933] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.717577] ^ [ 22.718073] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.718693] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.719235] ================================================================== [ 22.751895] ================================================================== [ 22.753088] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xb14/0xc08 [ 22.755161] Read of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248 [ 22.757290] [ 22.757630] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.757877] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.757961] Hardware name: linux,dummy-virt (DT) [ 22.758019] Call trace: [ 22.758053] dump_backtrace+0x9c/0x128 [ 22.758145] show_stack+0x20/0x38 [ 22.758207] dump_stack_lvl+0x8c/0xd0 [ 22.758283] print_report+0x118/0x5f0 [ 22.758336] kasan_report+0xdc/0x128 [ 22.758380] __asan_report_load8_noabort+0x20/0x30 [ 22.758431] kasan_bitops_test_and_modify.constprop.0+0xb14/0xc08 [ 22.758489] kasan_bitops_generic+0x120/0x1d0 [ 22.758539] kunit_try_run_case+0x170/0x3f0 [ 22.758589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.758643] kthread+0x24c/0x2d0 [ 22.758689] ret_from_fork+0x10/0x20 [ 22.758738] [ 22.763700] Allocated by task 248: [ 22.764079] kasan_save_stack+0x3c/0x68 [ 22.764486] kasan_save_track+0x20/0x40 [ 22.764933] kasan_save_alloc_info+0x40/0x58 [ 22.765449] __kasan_kmalloc+0xd4/0xd8 [ 22.765947] __kmalloc_cache_noprof+0x154/0x320 [ 22.766442] kasan_bitops_generic+0xa0/0x1d0 [ 22.766928] kunit_try_run_case+0x170/0x3f0 [ 22.767469] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.768087] kthread+0x24c/0x2d0 [ 22.768555] ret_from_fork+0x10/0x20 [ 22.768961] [ 22.769261] The buggy address belongs to the object at fff00000c5bb22a0 [ 22.769261] which belongs to the cache kmalloc-16 of size 16 [ 22.770135] The buggy address is located 8 bytes inside of [ 22.770135] allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9) [ 22.771018] [ 22.771340] The buggy address belongs to the physical page: [ 22.771826] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 22.772522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.773048] page_type: f5(slab) [ 22.773516] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.774181] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 22.774813] page dumped because: kasan: bad access detected [ 22.775286] [ 22.775557] Memory state around the buggy address: [ 22.776015] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.776615] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 22.777231] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.777827] ^ [ 22.778285] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.778902] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.779499] ================================================================== [ 22.832889] ================================================================== [ 22.833602] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xc08 [ 22.834313] Read of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248 [ 22.834926] [ 22.836415] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.836548] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.836586] Hardware name: linux,dummy-virt (DT) [ 22.836631] Call trace: [ 22.836661] dump_backtrace+0x9c/0x128 [ 22.836731] show_stack+0x20/0x38 [ 22.836776] dump_stack_lvl+0x8c/0xd0 [ 22.836825] print_report+0x118/0x5f0 [ 22.836870] kasan_report+0xdc/0x128 [ 22.836915] __asan_report_load8_noabort+0x20/0x30 [ 22.836965] kasan_bitops_test_and_modify.constprop.0+0xacc/0xc08 [ 22.837023] kasan_bitops_generic+0x120/0x1d0 [ 22.837075] kunit_try_run_case+0x170/0x3f0 [ 22.837125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.837178] kthread+0x24c/0x2d0 [ 22.837224] ret_from_fork+0x10/0x20 [ 22.837291] [ 22.842085] Allocated by task 248: [ 22.842562] kasan_save_stack+0x3c/0x68 [ 22.843055] kasan_save_track+0x20/0x40 [ 22.843536] kasan_save_alloc_info+0x40/0x58 [ 22.843897] __kasan_kmalloc+0xd4/0xd8 [ 22.844396] __kmalloc_cache_noprof+0x154/0x320 [ 22.844937] kasan_bitops_generic+0xa0/0x1d0 [ 22.845348] kunit_try_run_case+0x170/0x3f0 [ 22.845777] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.846205] kthread+0x24c/0x2d0 [ 22.846674] ret_from_fork+0x10/0x20 [ 22.847052] [ 22.847350] The buggy address belongs to the object at fff00000c5bb22a0 [ 22.847350] which belongs to the cache kmalloc-16 of size 16 [ 22.848034] The buggy address is located 8 bytes inside of [ 22.848034] allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9) [ 22.849060] [ 22.849353] The buggy address belongs to the physical page: [ 22.849801] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 22.850499] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.851077] page_type: f5(slab) [ 22.851538] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.852266] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 22.853000] page dumped because: kasan: bad access detected [ 22.853407] [ 22.853697] Memory state around the buggy address: [ 22.854211] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.854798] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 22.855485] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.856043] ^ [ 22.856437] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.857068] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.857538] ================================================================== [ 22.641810] ================================================================== [ 22.642337] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xc08 [ 22.643229] Read of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248 [ 22.643962] [ 22.644300] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.644512] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.644595] Hardware name: linux,dummy-virt (DT) [ 22.644672] Call trace: [ 22.644725] dump_backtrace+0x9c/0x128 [ 22.644854] show_stack+0x20/0x38 [ 22.644957] dump_stack_lvl+0x8c/0xd0 [ 22.645071] print_report+0x118/0x5f0 [ 22.645167] kasan_report+0xdc/0x128 [ 22.645230] __asan_report_load8_noabort+0x20/0x30 [ 22.645314] kasan_bitops_test_and_modify.constprop.0+0xa48/0xc08 [ 22.645375] kasan_bitops_generic+0x120/0x1d0 [ 22.645426] kunit_try_run_case+0x170/0x3f0 [ 22.645485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.645546] kthread+0x24c/0x2d0 [ 22.645592] ret_from_fork+0x10/0x20 [ 22.645646] [ 22.650361] Allocated by task 248: [ 22.650788] kasan_save_stack+0x3c/0x68 [ 22.651300] kasan_save_track+0x20/0x40 [ 22.651786] kasan_save_alloc_info+0x40/0x58 [ 22.652209] __kasan_kmalloc+0xd4/0xd8 [ 22.652671] __kmalloc_cache_noprof+0x154/0x320 [ 22.653197] kasan_bitops_generic+0xa0/0x1d0 [ 22.653729] kunit_try_run_case+0x170/0x3f0 [ 22.654086] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.654662] kthread+0x24c/0x2d0 [ 22.655024] ret_from_fork+0x10/0x20 [ 22.655485] [ 22.655771] The buggy address belongs to the object at fff00000c5bb22a0 [ 22.655771] which belongs to the cache kmalloc-16 of size 16 [ 22.656615] The buggy address is located 8 bytes inside of [ 22.656615] allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9) [ 22.657500] [ 22.657814] The buggy address belongs to the physical page: [ 22.658234] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 22.659053] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.659744] page_type: f5(slab) [ 22.660120] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.660710] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 22.661330] page dumped because: kasan: bad access detected [ 22.661880] [ 22.662167] Memory state around the buggy address: [ 22.662639] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.663202] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 22.663777] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.664253] ^ [ 22.664762] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.665347] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.665911] ================================================================== [ 22.807527] ================================================================== [ 22.808254] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xc08 [ 22.808948] Read of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248 [ 22.809491] [ 22.809802] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.810006] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.810083] Hardware name: linux,dummy-virt (DT) [ 22.810173] Call trace: [ 22.810248] dump_backtrace+0x9c/0x128 [ 22.810372] show_stack+0x20/0x38 [ 22.810463] dump_stack_lvl+0x8c/0xd0 [ 22.810570] print_report+0x118/0x5f0 [ 22.810665] kasan_report+0xdc/0x128 [ 22.810730] __asan_report_load8_noabort+0x20/0x30 [ 22.810786] kasan_bitops_test_and_modify.constprop.0+0xa84/0xc08 [ 22.810844] kasan_bitops_generic+0x120/0x1d0 [ 22.810894] kunit_try_run_case+0x170/0x3f0 [ 22.810945] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.810999] kthread+0x24c/0x2d0 [ 22.811046] ret_from_fork+0x10/0x20 [ 22.811163] [ 22.816082] Allocated by task 248: [ 22.816511] kasan_save_stack+0x3c/0x68 [ 22.816868] kasan_save_track+0x20/0x40 [ 22.817356] kasan_save_alloc_info+0x40/0x58 [ 22.817779] __kasan_kmalloc+0xd4/0xd8 [ 22.818196] __kmalloc_cache_noprof+0x154/0x320 [ 22.818590] kasan_bitops_generic+0xa0/0x1d0 [ 22.819100] kunit_try_run_case+0x170/0x3f0 [ 22.819480] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.819993] kthread+0x24c/0x2d0 [ 22.820366] ret_from_fork+0x10/0x20 [ 22.820713] [ 22.821007] The buggy address belongs to the object at fff00000c5bb22a0 [ 22.821007] which belongs to the cache kmalloc-16 of size 16 [ 22.821959] The buggy address is located 8 bytes inside of [ 22.821959] allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9) [ 22.822840] [ 22.823133] The buggy address belongs to the physical page: [ 22.823660] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 22.824363] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.825006] page_type: f5(slab) [ 22.825434] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.826156] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 22.826793] page dumped because: kasan: bad access detected [ 22.827083] [ 22.827226] Memory state around the buggy address: [ 22.827943] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.828544] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 22.828908] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.829594] ^ [ 22.829934] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.830665] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.831180] ================================================================== [ 22.781042] ================================================================== [ 22.781524] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x34c/0xc08 [ 22.782098] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248 [ 22.782603] [ 22.782958] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.783194] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.783520] Hardware name: linux,dummy-virt (DT) [ 22.783597] Call trace: [ 22.783634] dump_backtrace+0x9c/0x128 [ 22.783703] show_stack+0x20/0x38 [ 22.783749] dump_stack_lvl+0x8c/0xd0 [ 22.783799] print_report+0x118/0x5f0 [ 22.783847] kasan_report+0xdc/0x128 [ 22.783892] kasan_check_range+0x100/0x1a8 [ 22.783940] __kasan_check_write+0x20/0x30 [ 22.783987] kasan_bitops_test_and_modify.constprop.0+0x34c/0xc08 [ 22.784047] kasan_bitops_generic+0x120/0x1d0 [ 22.784097] kunit_try_run_case+0x170/0x3f0 [ 22.784148] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.784203] kthread+0x24c/0x2d0 [ 22.784278] ret_from_fork+0x10/0x20 [ 22.784336] [ 22.790208] Allocated by task 248: [ 22.790632] kasan_save_stack+0x3c/0x68 [ 22.790995] kasan_save_track+0x20/0x40 [ 22.791480] kasan_save_alloc_info+0x40/0x58 [ 22.791836] __kasan_kmalloc+0xd4/0xd8 [ 22.792307] __kmalloc_cache_noprof+0x154/0x320 [ 22.792686] kasan_bitops_generic+0xa0/0x1d0 [ 22.793190] kunit_try_run_case+0x170/0x3f0 [ 22.793561] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.794161] kthread+0x24c/0x2d0 [ 22.794490] ret_from_fork+0x10/0x20 [ 22.794948] [ 22.795214] The buggy address belongs to the object at fff00000c5bb22a0 [ 22.795214] which belongs to the cache kmalloc-16 of size 16 [ 22.796432] The buggy address is located 8 bytes inside of [ 22.796432] allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9) [ 22.797424] [ 22.797727] The buggy address belongs to the physical page: [ 22.798278] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 22.798973] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.799489] page_type: f5(slab) [ 22.799928] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.800605] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 22.801138] page dumped because: kasan: bad access detected [ 22.801688] [ 22.801959] Memory state around the buggy address: [ 22.802456] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.802999] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 22.803657] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.804308] ^ [ 22.804844] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.805431] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.806042] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 22.502949] ================================================================== [ 22.503674] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xb28/0xbf8 [ 22.504120] Read of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248 [ 22.504935] [ 22.505286] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.505534] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.505615] Hardware name: linux,dummy-virt (DT) [ 22.505697] Call trace: [ 22.505761] dump_backtrace+0x9c/0x128 [ 22.505886] show_stack+0x20/0x38 [ 22.505994] dump_stack_lvl+0x8c/0xd0 [ 22.506107] print_report+0x118/0x5f0 [ 22.506218] kasan_report+0xdc/0x128 [ 22.506320] __asan_report_load8_noabort+0x20/0x30 [ 22.506377] kasan_bitops_modify.constprop.0+0xb28/0xbf8 [ 22.506434] kasan_bitops_generic+0x114/0x1d0 [ 22.506486] kunit_try_run_case+0x170/0x3f0 [ 22.506537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.506591] kthread+0x24c/0x2d0 [ 22.506639] ret_from_fork+0x10/0x20 [ 22.506690] [ 22.512098] Allocated by task 248: [ 22.513882] kasan_save_stack+0x3c/0x68 [ 22.514308] kasan_save_track+0x20/0x40 [ 22.514735] kasan_save_alloc_info+0x40/0x58 [ 22.515142] __kasan_kmalloc+0xd4/0xd8 [ 22.515570] __kmalloc_cache_noprof+0x154/0x320 [ 22.516105] kasan_bitops_generic+0xa0/0x1d0 [ 22.516669] kunit_try_run_case+0x170/0x3f0 [ 22.516963] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.517573] kthread+0x24c/0x2d0 [ 22.518026] ret_from_fork+0x10/0x20 [ 22.518447] [ 22.518729] The buggy address belongs to the object at fff00000c5bb22a0 [ 22.518729] which belongs to the cache kmalloc-16 of size 16 [ 22.519576] The buggy address is located 8 bytes inside of [ 22.519576] allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9) [ 22.520632] [ 22.520935] The buggy address belongs to the physical page: [ 22.521548] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 22.522170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.522779] page_type: f5(slab) [ 22.523143] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.523869] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 22.524416] page dumped because: kasan: bad access detected [ 22.524946] [ 22.525230] Memory state around the buggy address: [ 22.525684] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.526224] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 22.526867] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.527443] ^ [ 22.527847] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.528462] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.529103] ================================================================== [ 22.530991] ================================================================== [ 22.531739] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x358/0xbf8 [ 22.532930] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248 [ 22.533344] [ 22.533612] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.533830] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.533911] Hardware name: linux,dummy-virt (DT) [ 22.533997] Call trace: [ 22.534059] dump_backtrace+0x9c/0x128 [ 22.534190] show_stack+0x20/0x38 [ 22.534299] dump_stack_lvl+0x8c/0xd0 [ 22.534368] print_report+0x118/0x5f0 [ 22.534417] kasan_report+0xdc/0x128 [ 22.534463] kasan_check_range+0x100/0x1a8 [ 22.534512] __kasan_check_write+0x20/0x30 [ 22.534560] kasan_bitops_modify.constprop.0+0x358/0xbf8 [ 22.534615] kasan_bitops_generic+0x114/0x1d0 [ 22.534665] kunit_try_run_case+0x170/0x3f0 [ 22.534714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.534765] kthread+0x24c/0x2d0 [ 22.534811] ret_from_fork+0x10/0x20 [ 22.534862] [ 22.539889] Allocated by task 248: [ 22.540375] kasan_save_stack+0x3c/0x68 [ 22.540894] kasan_save_track+0x20/0x40 [ 22.541336] kasan_save_alloc_info+0x40/0x58 [ 22.541859] __kasan_kmalloc+0xd4/0xd8 [ 22.542314] __kmalloc_cache_noprof+0x154/0x320 [ 22.542811] kasan_bitops_generic+0xa0/0x1d0 [ 22.543261] kunit_try_run_case+0x170/0x3f0 [ 22.543669] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.544258] kthread+0x24c/0x2d0 [ 22.544716] ret_from_fork+0x10/0x20 [ 22.545197] [ 22.545441] The buggy address belongs to the object at fff00000c5bb22a0 [ 22.545441] which belongs to the cache kmalloc-16 of size 16 [ 22.546343] The buggy address is located 8 bytes inside of [ 22.546343] allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9) [ 22.547282] [ 22.547583] The buggy address belongs to the physical page: [ 22.548106] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 22.549092] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.549735] page_type: f5(slab) [ 22.550057] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.550836] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 22.551532] page dumped because: kasan: bad access detected [ 22.552034] [ 22.552315] Memory state around the buggy address: [ 22.552847] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.553486] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 22.554134] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.554711] ^ [ 22.555175] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.555775] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.556355] ================================================================== [ 22.359259] ================================================================== [ 22.359927] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbf8 [ 22.361176] Read of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248 [ 22.361856] [ 22.362197] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.362444] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.362549] Hardware name: linux,dummy-virt (DT) [ 22.362644] Call trace: [ 22.362722] dump_backtrace+0x9c/0x128 [ 22.362837] show_stack+0x20/0x38 [ 22.362937] dump_stack_lvl+0x8c/0xd0 [ 22.363030] print_report+0x118/0x5f0 [ 22.363084] kasan_report+0xdc/0x128 [ 22.363129] __asan_report_load8_noabort+0x20/0x30 [ 22.363182] kasan_bitops_modify.constprop.0+0xa80/0xbf8 [ 22.363254] kasan_bitops_generic+0x114/0x1d0 [ 22.363318] kunit_try_run_case+0x170/0x3f0 [ 22.363370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.363422] kthread+0x24c/0x2d0 [ 22.363470] ret_from_fork+0x10/0x20 [ 22.363521] [ 22.368586] Allocated by task 248: [ 22.368758] kasan_save_stack+0x3c/0x68 [ 22.368943] kasan_save_track+0x20/0x40 [ 22.369105] kasan_save_alloc_info+0x40/0x58 [ 22.369361] __kasan_kmalloc+0xd4/0xd8 [ 22.369932] __kmalloc_cache_noprof+0x154/0x320 [ 22.370528] kasan_bitops_generic+0xa0/0x1d0 [ 22.371115] kunit_try_run_case+0x170/0x3f0 [ 22.371669] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.372279] kthread+0x24c/0x2d0 [ 22.372732] ret_from_fork+0x10/0x20 [ 22.373162] [ 22.373464] The buggy address belongs to the object at fff00000c5bb22a0 [ 22.373464] which belongs to the cache kmalloc-16 of size 16 [ 22.374461] The buggy address is located 8 bytes inside of [ 22.374461] allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9) [ 22.375427] [ 22.375738] The buggy address belongs to the physical page: [ 22.376170] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 22.376933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.377570] page_type: f5(slab) [ 22.377949] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.378628] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 22.379282] page dumped because: kasan: bad access detected [ 22.379795] [ 22.380065] Memory state around the buggy address: [ 22.380556] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.381181] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 22.381830] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.382409] ^ [ 22.382866] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.383589] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.384095] ================================================================== [ 22.387053] ================================================================== [ 22.387656] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1e4/0xbf8 [ 22.388326] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248 [ 22.388899] [ 22.389215] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.389463] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.389546] Hardware name: linux,dummy-virt (DT) [ 22.389632] Call trace: [ 22.389691] dump_backtrace+0x9c/0x128 [ 22.389836] show_stack+0x20/0x38 [ 22.389934] dump_stack_lvl+0x8c/0xd0 [ 22.390019] print_report+0x118/0x5f0 [ 22.390070] kasan_report+0xdc/0x128 [ 22.390113] kasan_check_range+0x100/0x1a8 [ 22.390283] __kasan_check_write+0x20/0x30 [ 22.390378] kasan_bitops_modify.constprop.0+0x1e4/0xbf8 [ 22.390476] kasan_bitops_generic+0x114/0x1d0 [ 22.390584] kunit_try_run_case+0x170/0x3f0 [ 22.390644] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.390699] kthread+0x24c/0x2d0 [ 22.390745] ret_from_fork+0x10/0x20 [ 22.390798] [ 22.394550] Allocated by task 248: [ 22.395023] kasan_save_stack+0x3c/0x68 [ 22.395668] kasan_save_track+0x20/0x40 [ 22.396586] kasan_save_alloc_info+0x40/0x58 [ 22.397534] __kasan_kmalloc+0xd4/0xd8 [ 22.398062] __kmalloc_cache_noprof+0x154/0x320 [ 22.398655] kasan_bitops_generic+0xa0/0x1d0 [ 22.399066] kunit_try_run_case+0x170/0x3f0 [ 22.399485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.400089] kthread+0x24c/0x2d0 [ 22.400542] ret_from_fork+0x10/0x20 [ 22.401003] [ 22.401308] The buggy address belongs to the object at fff00000c5bb22a0 [ 22.401308] which belongs to the cache kmalloc-16 of size 16 [ 22.402171] The buggy address is located 8 bytes inside of [ 22.402171] allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9) [ 22.403120] [ 22.403365] The buggy address belongs to the physical page: [ 22.403834] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 22.404494] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.405059] page_type: f5(slab) [ 22.405536] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.406176] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 22.406860] page dumped because: kasan: bad access detected [ 22.407356] [ 22.407618] Memory state around the buggy address: [ 22.408024] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.408643] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 22.409185] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.409852] ^ [ 22.410383] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.410935] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.411540] ================================================================== [ 22.560001] ================================================================== [ 22.560826] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3c8/0xbf8 [ 22.561431] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248 [ 22.561975] [ 22.562320] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.562538] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.562612] Hardware name: linux,dummy-virt (DT) [ 22.562688] Call trace: [ 22.562753] dump_backtrace+0x9c/0x128 [ 22.562873] show_stack+0x20/0x38 [ 22.562976] dump_stack_lvl+0x8c/0xd0 [ 22.563064] print_report+0x118/0x5f0 [ 22.563163] kasan_report+0xdc/0x128 [ 22.563271] kasan_check_range+0x100/0x1a8 [ 22.563325] __kasan_check_write+0x20/0x30 [ 22.563375] kasan_bitops_modify.constprop.0+0x3c8/0xbf8 [ 22.563431] kasan_bitops_generic+0x114/0x1d0 [ 22.563485] kunit_try_run_case+0x170/0x3f0 [ 22.563532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.563586] kthread+0x24c/0x2d0 [ 22.563633] ret_from_fork+0x10/0x20 [ 22.563683] [ 22.569132] Allocated by task 248: [ 22.569575] kasan_save_stack+0x3c/0x68 [ 22.570125] kasan_save_track+0x20/0x40 [ 22.570547] kasan_save_alloc_info+0x40/0x58 [ 22.571082] __kasan_kmalloc+0xd4/0xd8 [ 22.571552] __kmalloc_cache_noprof+0x154/0x320 [ 22.572062] kasan_bitops_generic+0xa0/0x1d0 [ 22.572611] kunit_try_run_case+0x170/0x3f0 [ 22.573129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.573765] kthread+0x24c/0x2d0 [ 22.574246] ret_from_fork+0x10/0x20 [ 22.574635] [ 22.574941] The buggy address belongs to the object at fff00000c5bb22a0 [ 22.574941] which belongs to the cache kmalloc-16 of size 16 [ 22.575864] The buggy address is located 8 bytes inside of [ 22.575864] allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9) [ 22.576856] [ 22.577160] The buggy address belongs to the physical page: [ 22.577750] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 22.578436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.578953] page_type: f5(slab) [ 22.579401] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.580029] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 22.580671] page dumped because: kasan: bad access detected [ 22.581120] [ 22.581396] Memory state around the buggy address: [ 22.581822] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.582551] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 22.583077] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.583687] ^ [ 22.584148] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.584768] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.585322] ================================================================== [ 22.470391] ================================================================== [ 22.470852] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x334/0xbf8 [ 22.471739] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248 [ 22.472515] [ 22.472880] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.473125] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.473206] Hardware name: linux,dummy-virt (DT) [ 22.473341] Call trace: [ 22.473410] dump_backtrace+0x9c/0x128 [ 22.473547] show_stack+0x20/0x38 [ 22.473654] dump_stack_lvl+0x8c/0xd0 [ 22.473747] print_report+0x118/0x5f0 [ 22.473802] kasan_report+0xdc/0x128 [ 22.473847] kasan_check_range+0x100/0x1a8 [ 22.473897] __kasan_check_write+0x20/0x30 [ 22.473946] kasan_bitops_modify.constprop.0+0x334/0xbf8 [ 22.474002] kasan_bitops_generic+0x114/0x1d0 [ 22.474052] kunit_try_run_case+0x170/0x3f0 [ 22.474102] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.474156] kthread+0x24c/0x2d0 [ 22.474202] ret_from_fork+0x10/0x20 [ 22.474277] [ 22.480382] Allocated by task 248: [ 22.480688] kasan_save_stack+0x3c/0x68 [ 22.481065] kasan_save_track+0x20/0x40 [ 22.481596] kasan_save_alloc_info+0x40/0x58 [ 22.482151] __kasan_kmalloc+0xd4/0xd8 [ 22.484746] __kmalloc_cache_noprof+0x154/0x320 [ 22.485692] kasan_bitops_generic+0xa0/0x1d0 [ 22.486544] kunit_try_run_case+0x170/0x3f0 [ 22.487442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.487849] kthread+0x24c/0x2d0 [ 22.488141] ret_from_fork+0x10/0x20 [ 22.488566] [ 22.488804] The buggy address belongs to the object at fff00000c5bb22a0 [ 22.488804] which belongs to the cache kmalloc-16 of size 16 [ 22.489526] The buggy address is located 8 bytes inside of [ 22.489526] allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9) [ 22.490670] [ 22.490962] The buggy address belongs to the physical page: [ 22.493033] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 22.493649] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.494346] page_type: f5(slab) [ 22.494668] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.495466] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 22.496135] page dumped because: kasan: bad access detected [ 22.496594] [ 22.496878] Memory state around the buggy address: [ 22.497449] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.498196] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 22.498830] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.499381] ^ [ 22.499809] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.500415] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.501001] ================================================================== [ 22.440669] ================================================================== [ 22.441167] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2c4/0xbf8 [ 22.442184] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248 [ 22.442650] [ 22.442887] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.443456] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.443566] Hardware name: linux,dummy-virt (DT) [ 22.443664] Call trace: [ 22.443719] dump_backtrace+0x9c/0x128 [ 22.443835] show_stack+0x20/0x38 [ 22.443958] dump_stack_lvl+0x8c/0xd0 [ 22.444084] print_report+0x118/0x5f0 [ 22.444179] kasan_report+0xdc/0x128 [ 22.444293] kasan_check_range+0x100/0x1a8 [ 22.444398] __kasan_check_write+0x20/0x30 [ 22.444456] kasan_bitops_modify.constprop.0+0x2c4/0xbf8 [ 22.444511] kasan_bitops_generic+0x114/0x1d0 [ 22.444562] kunit_try_run_case+0x170/0x3f0 [ 22.444611] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.444664] kthread+0x24c/0x2d0 [ 22.444711] ret_from_fork+0x10/0x20 [ 22.444763] [ 22.450229] Allocated by task 248: [ 22.451466] kasan_save_stack+0x3c/0x68 [ 22.452558] kasan_save_track+0x20/0x40 [ 22.453285] kasan_save_alloc_info+0x40/0x58 [ 22.453733] __kasan_kmalloc+0xd4/0xd8 [ 22.454115] __kmalloc_cache_noprof+0x154/0x320 [ 22.454688] kasan_bitops_generic+0xa0/0x1d0 [ 22.455131] kunit_try_run_case+0x170/0x3f0 [ 22.455623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.456183] kthread+0x24c/0x2d0 [ 22.456623] ret_from_fork+0x10/0x20 [ 22.457054] [ 22.457338] The buggy address belongs to the object at fff00000c5bb22a0 [ 22.457338] which belongs to the cache kmalloc-16 of size 16 [ 22.458224] The buggy address is located 8 bytes inside of [ 22.458224] allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9) [ 22.459167] [ 22.459501] The buggy address belongs to the physical page: [ 22.460042] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 22.460733] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.461356] page_type: f5(slab) [ 22.461752] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.462459] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 22.463107] page dumped because: kasan: bad access detected [ 22.463623] [ 22.463881] Memory state around the buggy address: [ 22.464381] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.465131] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 22.465775] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.466395] ^ [ 22.466877] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.467498] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.468114] ================================================================== [ 22.587180] ================================================================== [ 22.587859] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa5c/0xbf8 [ 22.588554] Read of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248 [ 22.589330] [ 22.589670] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.589869] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.589910] Hardware name: linux,dummy-virt (DT) [ 22.589967] Call trace: [ 22.590024] dump_backtrace+0x9c/0x128 [ 22.590130] show_stack+0x20/0x38 [ 22.590218] dump_stack_lvl+0x8c/0xd0 [ 22.590343] print_report+0x118/0x5f0 [ 22.590450] kasan_report+0xdc/0x128 [ 22.590554] __asan_report_load8_noabort+0x20/0x30 [ 22.590669] kasan_bitops_modify.constprop.0+0xa5c/0xbf8 [ 22.590755] kasan_bitops_generic+0x114/0x1d0 [ 22.590810] kunit_try_run_case+0x170/0x3f0 [ 22.590863] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.590918] kthread+0x24c/0x2d0 [ 22.590966] ret_from_fork+0x10/0x20 [ 22.591018] [ 22.595773] Allocated by task 248: [ 22.596226] kasan_save_stack+0x3c/0x68 [ 22.596612] kasan_save_track+0x20/0x40 [ 22.596946] kasan_save_alloc_info+0x40/0x58 [ 22.597473] __kasan_kmalloc+0xd4/0xd8 [ 22.597964] __kmalloc_cache_noprof+0x154/0x320 [ 22.598514] kasan_bitops_generic+0xa0/0x1d0 [ 22.598939] kunit_try_run_case+0x170/0x3f0 [ 22.599315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.599913] kthread+0x24c/0x2d0 [ 22.600348] ret_from_fork+0x10/0x20 [ 22.600782] [ 22.601069] The buggy address belongs to the object at fff00000c5bb22a0 [ 22.601069] which belongs to the cache kmalloc-16 of size 16 [ 22.601830] The buggy address is located 8 bytes inside of [ 22.601830] allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9) [ 22.602809] [ 22.603110] The buggy address belongs to the physical page: [ 22.603582] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 22.604190] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.604878] page_type: f5(slab) [ 22.605339] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.606024] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 22.606601] page dumped because: kasan: bad access detected [ 22.607148] [ 22.607414] Memory state around the buggy address: [ 22.607921] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.608507] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 22.609087] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.610091] ^ [ 22.610684] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.611396] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.612077] ================================================================== [ 22.413277] ================================================================== [ 22.413993] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xabc/0xbf8 [ 22.414519] Read of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248 [ 22.415277] [ 22.415650] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.415883] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.415965] Hardware name: linux,dummy-virt (DT) [ 22.416070] Call trace: [ 22.416154] dump_backtrace+0x9c/0x128 [ 22.416296] show_stack+0x20/0x38 [ 22.416407] dump_stack_lvl+0x8c/0xd0 [ 22.416505] print_report+0x118/0x5f0 [ 22.416600] kasan_report+0xdc/0x128 [ 22.416653] __asan_report_load8_noabort+0x20/0x30 [ 22.416705] kasan_bitops_modify.constprop.0+0xabc/0xbf8 [ 22.416760] kasan_bitops_generic+0x114/0x1d0 [ 22.416811] kunit_try_run_case+0x170/0x3f0 [ 22.416859] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.416914] kthread+0x24c/0x2d0 [ 22.416960] ret_from_fork+0x10/0x20 [ 22.417010] [ 22.422203] Allocated by task 248: [ 22.422719] kasan_save_stack+0x3c/0x68 [ 22.423184] kasan_save_track+0x20/0x40 [ 22.423657] kasan_save_alloc_info+0x40/0x58 [ 22.424194] __kasan_kmalloc+0xd4/0xd8 [ 22.424601] __kmalloc_cache_noprof+0x154/0x320 [ 22.425161] kasan_bitops_generic+0xa0/0x1d0 [ 22.425624] kunit_try_run_case+0x170/0x3f0 [ 22.426161] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.426679] kthread+0x24c/0x2d0 [ 22.427074] ret_from_fork+0x10/0x20 [ 22.427500] [ 22.427791] The buggy address belongs to the object at fff00000c5bb22a0 [ 22.427791] which belongs to the cache kmalloc-16 of size 16 [ 22.428727] The buggy address is located 8 bytes inside of [ 22.428727] allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9) [ 22.429699] [ 22.430040] The buggy address belongs to the physical page: [ 22.430571] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 22.431273] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.431873] page_type: f5(slab) [ 22.432290] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.432952] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 22.433594] page dumped because: kasan: bad access detected [ 22.434097] [ 22.434373] Memory state around the buggy address: [ 22.434825] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.435430] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 22.435951] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.436692] ^ [ 22.437089] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.437760] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.438332] ================================================================== [ 22.330925] ================================================================== [ 22.332074] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x104/0xbf8 [ 22.333202] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248 [ 22.333790] [ 22.334170] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.334434] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.334509] Hardware name: linux,dummy-virt (DT) [ 22.334592] Call trace: [ 22.334652] dump_backtrace+0x9c/0x128 [ 22.334781] show_stack+0x20/0x38 [ 22.334881] dump_stack_lvl+0x8c/0xd0 [ 22.334963] print_report+0x118/0x5f0 [ 22.335012] kasan_report+0xdc/0x128 [ 22.335056] kasan_check_range+0x100/0x1a8 [ 22.335104] __kasan_check_write+0x20/0x30 [ 22.335151] kasan_bitops_modify.constprop.0+0x104/0xbf8 [ 22.335207] kasan_bitops_generic+0x114/0x1d0 [ 22.335286] kunit_try_run_case+0x170/0x3f0 [ 22.335339] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.335394] kthread+0x24c/0x2d0 [ 22.335441] ret_from_fork+0x10/0x20 [ 22.335490] [ 22.340752] Allocated by task 248: [ 22.341254] kasan_save_stack+0x3c/0x68 [ 22.341737] kasan_save_track+0x20/0x40 [ 22.342265] kasan_save_alloc_info+0x40/0x58 [ 22.342758] __kasan_kmalloc+0xd4/0xd8 [ 22.343261] __kmalloc_cache_noprof+0x154/0x320 [ 22.343835] kasan_bitops_generic+0xa0/0x1d0 [ 22.344267] kunit_try_run_case+0x170/0x3f0 [ 22.344807] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.345382] kthread+0x24c/0x2d0 [ 22.345800] ret_from_fork+0x10/0x20 [ 22.346232] [ 22.346532] The buggy address belongs to the object at fff00000c5bb22a0 [ 22.346532] which belongs to the cache kmalloc-16 of size 16 [ 22.347330] The buggy address is located 8 bytes inside of [ 22.347330] allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9) [ 22.348219] [ 22.348525] The buggy address belongs to the physical page: [ 22.348981] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 22.349827] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.350436] page_type: f5(slab) [ 22.350915] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 22.351611] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 22.351986] page dumped because: kasan: bad access detected [ 22.352290] [ 22.352507] Memory state around the buggy address: [ 22.352995] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 22.353584] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 22.354328] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 22.354920] ^ [ 22.355465] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.356053] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.356633] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 22.284982] ================================================================== [ 22.286059] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 22.286815] Read of size 1 at addr fff00000c6cfdcd0 by task kunit_try_catch/246 [ 22.288233] [ 22.288710] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.289020] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.289060] Hardware name: linux,dummy-virt (DT) [ 22.289107] Call trace: [ 22.289140] dump_backtrace+0x9c/0x128 [ 22.289206] show_stack+0x20/0x38 [ 22.289277] dump_stack_lvl+0x8c/0xd0 [ 22.289330] print_report+0x118/0x5f0 [ 22.289378] kasan_report+0xdc/0x128 [ 22.289422] __asan_report_load1_noabort+0x20/0x30 [ 22.289474] strnlen+0x80/0x88 [ 22.289550] kasan_strings+0x398/0x938 [ 22.289597] kunit_try_run_case+0x170/0x3f0 [ 22.289648] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.289700] kthread+0x24c/0x2d0 [ 22.289747] ret_from_fork+0x10/0x20 [ 22.289798] [ 22.296306] Allocated by task 246: [ 22.297116] kasan_save_stack+0x3c/0x68 [ 22.297655] kasan_save_track+0x20/0x40 [ 22.298026] kasan_save_alloc_info+0x40/0x58 [ 22.298480] __kasan_kmalloc+0xd4/0xd8 [ 22.298906] __kmalloc_cache_noprof+0x154/0x320 [ 22.299496] kasan_strings+0xb0/0x938 [ 22.299971] kunit_try_run_case+0x170/0x3f0 [ 22.300483] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.300991] kthread+0x24c/0x2d0 [ 22.301725] ret_from_fork+0x10/0x20 [ 22.302644] [ 22.302893] Freed by task 246: [ 22.303219] kasan_save_stack+0x3c/0x68 [ 22.304102] kasan_save_track+0x20/0x40 [ 22.304427] kasan_save_free_info+0x4c/0x78 [ 22.304934] __kasan_slab_free+0x6c/0x98 [ 22.305371] kfree+0x110/0x3b8 [ 22.305790] kasan_strings+0x128/0x938 [ 22.306267] kunit_try_run_case+0x170/0x3f0 [ 22.306659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.307578] kthread+0x24c/0x2d0 [ 22.308455] ret_from_fork+0x10/0x20 [ 22.308920] [ 22.309468] The buggy address belongs to the object at fff00000c6cfdcc0 [ 22.309468] which belongs to the cache kmalloc-32 of size 32 [ 22.310469] The buggy address is located 16 bytes inside of [ 22.310469] freed 32-byte region [fff00000c6cfdcc0, fff00000c6cfdce0) [ 22.311385] [ 22.311619] The buggy address belongs to the physical page: [ 22.312075] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cfd [ 22.313362] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.313999] page_type: f5(slab) [ 22.314424] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 22.315033] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 22.315791] page dumped because: kasan: bad access detected [ 22.317017] [ 22.317320] Memory state around the buggy address: [ 22.317698] fff00000c6cfdb80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 22.318448] fff00000c6cfdc00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 22.319105] >fff00000c6cfdc80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 22.319693] ^ [ 22.320436] fff00000c6cfdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.321295] fff00000c6cfdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.321885] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[ 22.248172] ================================================================== [ 22.248795] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 22.249495] Read of size 1 at addr fff00000c6cfdcd0 by task kunit_try_catch/246 [ 22.250148] [ 22.250562] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.250799] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.250895] Hardware name: linux,dummy-virt (DT) [ 22.250994] Call trace: [ 22.251061] dump_backtrace+0x9c/0x128 [ 22.251219] show_stack+0x20/0x38 [ 22.251321] dump_stack_lvl+0x8c/0xd0 [ 22.251403] print_report+0x118/0x5f0 [ 22.251473] kasan_report+0xdc/0x128 [ 22.251543] __asan_report_load1_noabort+0x20/0x30 [ 22.251641] strlen+0xa8/0xb0 [ 22.251728] kasan_strings+0x334/0x938 [ 22.251810] kunit_try_run_case+0x170/0x3f0 [ 22.251888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.251991] kthread+0x24c/0x2d0 [ 22.252077] ret_from_fork+0x10/0x20 [ 22.252159] [ 22.258084] Allocated by task 246: [ 22.258427] kasan_save_stack+0x3c/0x68 [ 22.258814] kasan_save_track+0x20/0x40 [ 22.259571] kasan_save_alloc_info+0x40/0x58 [ 22.260289] __kasan_kmalloc+0xd4/0xd8 [ 22.261185] __kmalloc_cache_noprof+0x154/0x320 [ 22.262087] kasan_strings+0xb0/0x938 [ 22.262614] kunit_try_run_case+0x170/0x3f0 [ 22.263513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.264047] kthread+0x24c/0x2d0 [ 22.264533] ret_from_fork+0x10/0x20 [ 22.264918] [ 22.265222] Freed by task 246: [ 22.265563] kasan_save_stack+0x3c/0x68 [ 22.266061] kasan_save_track+0x20/0x40 [ 22.266475] kasan_save_free_info+0x4c/0x78 [ 22.266991] __kasan_slab_free+0x6c/0x98 [ 22.267508] kfree+0x110/0x3b8 [ 22.267943] kasan_strings+0x128/0x938 [ 22.268301] kunit_try_run_case+0x170/0x3f0 [ 22.268711] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.269160] kthread+0x24c/0x2d0 [ 22.270069] ret_from_fork+0x10/0x20 [ 22.270540] [ 22.271167] The buggy address belongs to the object at fff00000c6cfdcc0 [ 22.271167] which belongs to the cache kmalloc-32 of size 32 [ 22.272697] The buggy address is located 16 bytes inside of [ 22.272697] freed 32-byte region [fff00000c6cfdcc0, fff00000c6cfdce0) [ 22.273359] [ 22.273575] The buggy address belongs to the physical page: [ 22.274167] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cfd [ 22.275136] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.275573] page_type: f5(slab) [ 22.275895] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 22.276721] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 22.277428] page dumped because: kasan: bad access detected [ 22.278689] [ 22.278829] Memory state around the buggy address: [ 22.279009] fff00000c6cfdb80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 22.280128] fff00000c6cfdc00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 22.280964] >fff00000c6cfdc80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 22.281655] ^ [ 22.282258] fff00000c6cfdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.282820] fff00000c6cfdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.283638] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 22.204681] ================================================================== [ 22.205849] BUG: KASAN: slab-use-after-free in kasan_strings+0x894/0x938 [ 22.206376] Read of size 1 at addr fff00000c6cfdcd0 by task kunit_try_catch/246 [ 22.207033] [ 22.207867] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.208089] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.208164] Hardware name: linux,dummy-virt (DT) [ 22.208267] Call trace: [ 22.208327] dump_backtrace+0x9c/0x128 [ 22.208442] show_stack+0x20/0x38 [ 22.208537] dump_stack_lvl+0x8c/0xd0 [ 22.208636] print_report+0x118/0x5f0 [ 22.208727] kasan_report+0xdc/0x128 [ 22.208822] __asan_report_load1_noabort+0x20/0x30 [ 22.208909] kasan_strings+0x894/0x938 [ 22.208962] kunit_try_run_case+0x170/0x3f0 [ 22.209016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.209069] kthread+0x24c/0x2d0 [ 22.209115] ret_from_fork+0x10/0x20 [ 22.209167] [ 22.216905] Allocated by task 246: [ 22.218796] kasan_save_stack+0x3c/0x68 [ 22.219875] kasan_save_track+0x20/0x40 [ 22.220223] kasan_save_alloc_info+0x40/0x58 [ 22.221724] __kasan_kmalloc+0xd4/0xd8 [ 22.222586] __kmalloc_cache_noprof+0x154/0x320 [ 22.223821] kasan_strings+0xb0/0x938 [ 22.224905] kunit_try_run_case+0x170/0x3f0 [ 22.226107] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.226581] kthread+0x24c/0x2d0 [ 22.227006] ret_from_fork+0x10/0x20 [ 22.228030] [ 22.228440] Freed by task 246: [ 22.228722] kasan_save_stack+0x3c/0x68 [ 22.229349] kasan_save_track+0x20/0x40 [ 22.229970] kasan_save_free_info+0x4c/0x78 [ 22.230527] __kasan_slab_free+0x6c/0x98 [ 22.230869] kfree+0x110/0x3b8 [ 22.231545] kasan_strings+0x128/0x938 [ 22.232166] kunit_try_run_case+0x170/0x3f0 [ 22.232717] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.233228] kthread+0x24c/0x2d0 [ 22.233632] ret_from_fork+0x10/0x20 [ 22.234061] [ 22.234309] The buggy address belongs to the object at fff00000c6cfdcc0 [ 22.234309] which belongs to the cache kmalloc-32 of size 32 [ 22.235219] The buggy address is located 16 bytes inside of [ 22.235219] freed 32-byte region [fff00000c6cfdcc0, fff00000c6cfdce0) [ 22.236636] [ 22.236887] The buggy address belongs to the physical page: [ 22.237228] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cfd [ 22.237639] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.237968] page_type: f5(slab) [ 22.238196] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 22.239352] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 22.240351] page dumped because: kasan: bad access detected [ 22.240928] [ 22.241227] Memory state around the buggy address: [ 22.241793] fff00000c6cfdb80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 22.242502] fff00000c6cfdc00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 22.243334] >fff00000c6cfdc80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 22.244024] ^ [ 22.244394] fff00000c6cfdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.245169] fff00000c6cfdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.246020] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 22.169235] ================================================================== [ 22.169860] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 22.170535] Read of size 1 at addr fff00000c6cfdcd0 by task kunit_try_catch/246 [ 22.171272] [ 22.171827] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.172051] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.172122] Hardware name: linux,dummy-virt (DT) [ 22.172197] Call trace: [ 22.172273] dump_backtrace+0x9c/0x128 [ 22.172389] show_stack+0x20/0x38 [ 22.172470] dump_stack_lvl+0x8c/0xd0 [ 22.172571] print_report+0x118/0x5f0 [ 22.172672] kasan_report+0xdc/0x128 [ 22.172767] __asan_report_load1_noabort+0x20/0x30 [ 22.172872] strcmp+0xc0/0xc8 [ 22.172967] kasan_strings+0x254/0x938 [ 22.173063] kunit_try_run_case+0x170/0x3f0 [ 22.173162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.173286] kthread+0x24c/0x2d0 [ 22.173354] ret_from_fork+0x10/0x20 [ 22.173410] [ 22.178095] Allocated by task 246: [ 22.179583] kasan_save_stack+0x3c/0x68 [ 22.180045] kasan_save_track+0x20/0x40 [ 22.180336] kasan_save_alloc_info+0x40/0x58 [ 22.180706] __kasan_kmalloc+0xd4/0xd8 [ 22.181177] __kmalloc_cache_noprof+0x154/0x320 [ 22.181783] kasan_strings+0xb0/0x938 [ 22.182284] kunit_try_run_case+0x170/0x3f0 [ 22.182821] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.183328] kthread+0x24c/0x2d0 [ 22.183757] ret_from_fork+0x10/0x20 [ 22.184811] [ 22.185308] Freed by task 246: [ 22.185709] kasan_save_stack+0x3c/0x68 [ 22.186655] kasan_save_track+0x20/0x40 [ 22.187230] kasan_save_free_info+0x4c/0x78 [ 22.187680] __kasan_slab_free+0x6c/0x98 [ 22.188573] kfree+0x110/0x3b8 [ 22.188941] kasan_strings+0x128/0x938 [ 22.189461] kunit_try_run_case+0x170/0x3f0 [ 22.189940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.190489] kthread+0x24c/0x2d0 [ 22.190978] ret_from_fork+0x10/0x20 [ 22.191412] [ 22.192010] The buggy address belongs to the object at fff00000c6cfdcc0 [ 22.192010] which belongs to the cache kmalloc-32 of size 32 [ 22.193307] The buggy address is located 16 bytes inside of [ 22.193307] freed 32-byte region [fff00000c6cfdcc0, fff00000c6cfdce0) [ 22.194333] [ 22.194655] The buggy address belongs to the physical page: [ 22.195097] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cfd [ 22.195991] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.196371] page_type: f5(slab) [ 22.196595] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 22.196961] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 22.197958] page dumped because: kasan: bad access detected [ 22.198565] [ 22.198692] Memory state around the buggy address: [ 22.198875] fff00000c6cfdb80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 22.199504] fff00000c6cfdc00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 22.200696] >fff00000c6cfdc80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 22.201414] ^ [ 22.201833] fff00000c6cfdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.202374] fff00000c6cfdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.203019] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strrchr
[ 22.129932] ================================================================== [ 22.130711] BUG: KASAN: slab-use-after-free in strrchr+0x6c/0x78 [ 22.131343] Read of size 1 at addr fff00000c6cfdcd0 by task kunit_try_catch/246 [ 22.131794] [ 22.132131] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.132269] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.132333] Hardware name: linux,dummy-virt (DT) [ 22.132406] Call trace: [ 22.132455] dump_backtrace+0x9c/0x128 [ 22.132555] show_stack+0x20/0x38 [ 22.132623] dump_stack_lvl+0x8c/0xd0 [ 22.132700] print_report+0x118/0x5f0 [ 22.132784] kasan_report+0xdc/0x128 [ 22.132865] __asan_report_load1_noabort+0x20/0x30 [ 22.132949] strrchr+0x6c/0x78 [ 22.133025] kasan_strings+0x1f0/0x938 [ 22.133105] kunit_try_run_case+0x170/0x3f0 [ 22.133186] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.133327] kthread+0x24c/0x2d0 [ 22.133411] ret_from_fork+0x10/0x20 [ 22.133507] [ 22.140339] Allocated by task 246: [ 22.140582] kasan_save_stack+0x3c/0x68 [ 22.140843] kasan_save_track+0x20/0x40 [ 22.141072] kasan_save_alloc_info+0x40/0x58 [ 22.142473] __kasan_kmalloc+0xd4/0xd8 [ 22.142947] __kmalloc_cache_noprof+0x154/0x320 [ 22.143564] kasan_strings+0xb0/0x938 [ 22.144057] kunit_try_run_case+0x170/0x3f0 [ 22.144404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.144818] kthread+0x24c/0x2d0 [ 22.145256] ret_from_fork+0x10/0x20 [ 22.145738] [ 22.146020] Freed by task 246: [ 22.146450] kasan_save_stack+0x3c/0x68 [ 22.146966] kasan_save_track+0x20/0x40 [ 22.147817] kasan_save_free_info+0x4c/0x78 [ 22.148364] __kasan_slab_free+0x6c/0x98 [ 22.148968] kfree+0x110/0x3b8 [ 22.149533] kasan_strings+0x128/0x938 [ 22.150105] kunit_try_run_case+0x170/0x3f0 [ 22.150651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.151368] kthread+0x24c/0x2d0 [ 22.151650] ret_from_fork+0x10/0x20 [ 22.152643] [ 22.152983] The buggy address belongs to the object at fff00000c6cfdcc0 [ 22.152983] which belongs to the cache kmalloc-32 of size 32 [ 22.154384] The buggy address is located 16 bytes inside of [ 22.154384] freed 32-byte region [fff00000c6cfdcc0, fff00000c6cfdce0) [ 22.155369] [ 22.155692] The buggy address belongs to the physical page: [ 22.156605] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cfd [ 22.157147] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.157863] page_type: f5(slab) [ 22.158440] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 22.160021] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 22.160897] page dumped because: kasan: bad access detected [ 22.161358] [ 22.161595] Memory state around the buggy address: [ 22.162029] fff00000c6cfdb80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 22.162636] fff00000c6cfdc00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 22.163568] >fff00000c6cfdc80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 22.164358] ^ [ 22.165131] fff00000c6cfdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.165716] fff00000c6cfdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.166612] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strchr
[ 22.091561] ================================================================== [ 22.092786] BUG: KASAN: slab-use-after-free in strchr+0xcc/0xd8 [ 22.093532] Read of size 1 at addr fff00000c6cfdcd0 by task kunit_try_catch/246 [ 22.094284] [ 22.094629] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.094861] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.094934] Hardware name: linux,dummy-virt (DT) [ 22.095023] Call trace: [ 22.095087] dump_backtrace+0x9c/0x128 [ 22.095218] show_stack+0x20/0x38 [ 22.095333] dump_stack_lvl+0x8c/0xd0 [ 22.095491] print_report+0x118/0x5f0 [ 22.095586] kasan_report+0xdc/0x128 [ 22.095666] __asan_report_load1_noabort+0x20/0x30 [ 22.095765] strchr+0xcc/0xd8 [ 22.095841] kasan_strings+0x18c/0x938 [ 22.095931] kunit_try_run_case+0x170/0x3f0 [ 22.096022] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.096121] kthread+0x24c/0x2d0 [ 22.096212] ret_from_fork+0x10/0x20 [ 22.096326] [ 22.102812] Allocated by task 246: [ 22.103615] kasan_save_stack+0x3c/0x68 [ 22.104411] kasan_save_track+0x20/0x40 [ 22.105326] kasan_save_alloc_info+0x40/0x58 [ 22.105790] __kasan_kmalloc+0xd4/0xd8 [ 22.106188] __kmalloc_cache_noprof+0x154/0x320 [ 22.106752] kasan_strings+0xb0/0x938 [ 22.107257] kunit_try_run_case+0x170/0x3f0 [ 22.107814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.108457] kthread+0x24c/0x2d0 [ 22.108960] ret_from_fork+0x10/0x20 [ 22.109425] [ 22.109715] Freed by task 246: [ 22.110133] kasan_save_stack+0x3c/0x68 [ 22.110559] kasan_save_track+0x20/0x40 [ 22.110992] kasan_save_free_info+0x4c/0x78 [ 22.111662] __kasan_slab_free+0x6c/0x98 [ 22.111963] kfree+0x110/0x3b8 [ 22.112218] kasan_strings+0x128/0x938 [ 22.112900] kunit_try_run_case+0x170/0x3f0 [ 22.113490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.114131] kthread+0x24c/0x2d0 [ 22.114625] ret_from_fork+0x10/0x20 [ 22.115473] [ 22.115947] The buggy address belongs to the object at fff00000c6cfdcc0 [ 22.115947] which belongs to the cache kmalloc-32 of size 32 [ 22.116967] The buggy address is located 16 bytes inside of [ 22.116967] freed 32-byte region [fff00000c6cfdcc0, fff00000c6cfdce0) [ 22.117767] [ 22.118103] The buggy address belongs to the physical page: [ 22.118547] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cfd [ 22.119773] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.120418] page_type: f5(slab) [ 22.120696] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 22.121418] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 22.122021] page dumped because: kasan: bad access detected [ 22.122645] [ 22.122936] Memory state around the buggy address: [ 22.123741] fff00000c6cfdb80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 22.124317] fff00000c6cfdc00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 22.124854] >fff00000c6cfdc80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 22.125671] ^ [ 22.126176] fff00000c6cfdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.126945] fff00000c6cfdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.128356] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 22.053935] ================================================================== [ 22.054717] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 22.055423] Read of size 1 at addr fff00000c6cfdb58 by task kunit_try_catch/244 [ 22.056076] [ 22.056434] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.056653] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.056720] Hardware name: linux,dummy-virt (DT) [ 22.056821] Call trace: [ 22.056883] dump_backtrace+0x9c/0x128 [ 22.057019] show_stack+0x20/0x38 [ 22.057122] dump_stack_lvl+0x8c/0xd0 [ 22.057249] print_report+0x118/0x5f0 [ 22.057359] kasan_report+0xdc/0x128 [ 22.057447] __asan_report_load1_noabort+0x20/0x30 [ 22.057549] memcmp+0x198/0x1d8 [ 22.057628] kasan_memcmp+0x170/0x310 [ 22.057718] kunit_try_run_case+0x170/0x3f0 [ 22.057806] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.057910] kthread+0x24c/0x2d0 [ 22.057993] ret_from_fork+0x10/0x20 [ 22.058132] [ 22.064253] Allocated by task 244: [ 22.064752] kasan_save_stack+0x3c/0x68 [ 22.065187] kasan_save_track+0x20/0x40 [ 22.066068] kasan_save_alloc_info+0x40/0x58 [ 22.066714] __kasan_kmalloc+0xd4/0xd8 [ 22.067650] __kmalloc_cache_noprof+0x154/0x320 [ 22.068086] kasan_memcmp+0xbc/0x310 [ 22.068383] kunit_try_run_case+0x170/0x3f0 [ 22.068647] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.068936] kthread+0x24c/0x2d0 [ 22.069160] ret_from_fork+0x10/0x20 [ 22.069419] [ 22.069764] The buggy address belongs to the object at fff00000c6cfdb40 [ 22.069764] which belongs to the cache kmalloc-32 of size 32 [ 22.070995] The buggy address is located 0 bytes to the right of [ 22.070995] allocated 24-byte region [fff00000c6cfdb40, fff00000c6cfdb58) [ 22.072528] [ 22.072957] The buggy address belongs to the physical page: [ 22.073316] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cfd [ 22.074002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.074741] page_type: f5(slab) [ 22.075175] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 22.075849] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 22.076935] page dumped because: kasan: bad access detected [ 22.077664] [ 22.077961] Memory state around the buggy address: [ 22.078492] fff00000c6cfda00: 00 00 07 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 22.079605] fff00000c6cfda80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 22.080186] >fff00000c6cfdb00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 22.080866] ^ [ 22.081465] fff00000c6cfdb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.082085] fff00000c6cfdc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.082723] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memchr
[ 22.016480] ================================================================== [ 22.017421] BUG: KASAN: slab-out-of-bounds in memchr+0x78/0x88 [ 22.018170] Read of size 1 at addr fff00000c6cf8fd8 by task kunit_try_catch/242 [ 22.018568] [ 22.019351] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.019605] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.019649] Hardware name: linux,dummy-virt (DT) [ 22.019694] Call trace: [ 22.019728] dump_backtrace+0x9c/0x128 [ 22.019793] show_stack+0x20/0x38 [ 22.019839] dump_stack_lvl+0x8c/0xd0 [ 22.019888] print_report+0x118/0x5f0 [ 22.019936] kasan_report+0xdc/0x128 [ 22.019979] __asan_report_load1_noabort+0x20/0x30 [ 22.020028] memchr+0x78/0x88 [ 22.020070] kasan_memchr+0x150/0x2f0 [ 22.020115] kunit_try_run_case+0x170/0x3f0 [ 22.020163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.020217] kthread+0x24c/0x2d0 [ 22.020294] ret_from_fork+0x10/0x20 [ 22.020347] [ 22.025144] Allocated by task 242: [ 22.025764] kasan_save_stack+0x3c/0x68 [ 22.026359] kasan_save_track+0x20/0x40 [ 22.026929] kasan_save_alloc_info+0x40/0x58 [ 22.027468] __kasan_kmalloc+0xd4/0xd8 [ 22.028033] __kmalloc_cache_noprof+0x154/0x320 [ 22.028566] kasan_memchr+0xb0/0x2f0 [ 22.029071] kunit_try_run_case+0x170/0x3f0 [ 22.029630] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.030315] kthread+0x24c/0x2d0 [ 22.030744] ret_from_fork+0x10/0x20 [ 22.031268] [ 22.031603] The buggy address belongs to the object at fff00000c6cf8fc0 [ 22.031603] which belongs to the cache kmalloc-32 of size 32 [ 22.032710] The buggy address is located 0 bytes to the right of [ 22.032710] allocated 24-byte region [fff00000c6cf8fc0, fff00000c6cf8fd8) [ 22.033856] [ 22.034191] The buggy address belongs to the physical page: [ 22.034707] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cf8 [ 22.035549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.036218] page_type: f5(slab) [ 22.036692] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 22.037433] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 22.038114] page dumped because: kasan: bad access detected [ 22.038556] [ 22.038878] Memory state around the buggy address: [ 22.039426] fff00000c6cf8e80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 22.040035] fff00000c6cf8f00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 22.040663] >fff00000c6cf8f80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 22.041259] ^ [ 22.041759] fff00000c6cf9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.042362] fff00000c6cf9080: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 22.042961] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 21.984587] ================================================================== [ 21.985440] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2e4/0x348 [ 21.986364] Read of size 1 at addr ffff800080be7bea by task kunit_try_catch/240 [ 21.987022] [ 21.987464] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 21.987683] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.987761] Hardware name: linux,dummy-virt (DT) [ 21.987839] Call trace: [ 21.987899] dump_backtrace+0x9c/0x128 [ 21.988020] show_stack+0x20/0x38 [ 21.988114] dump_stack_lvl+0x8c/0xd0 [ 21.988644] print_report+0x310/0x5f0 [ 21.988694] kasan_report+0xdc/0x128 [ 21.988741] __asan_report_load1_noabort+0x20/0x30 [ 21.988793] kasan_alloca_oob_right+0x2e4/0x348 [ 21.988842] kunit_try_run_case+0x170/0x3f0 [ 21.988891] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.988945] kthread+0x24c/0x2d0 [ 21.988990] ret_from_fork+0x10/0x20 [ 21.989041] [ 21.994826] The buggy address belongs to stack of task kunit_try_catch/240 [ 21.996006] [ 21.996455] The buggy address belongs to the virtual mapping at [ 21.996455] [ffff800080be0000, ffff800080be9000) created by: [ 21.996455] kernel_clone+0x150/0x7a8 [ 21.997913] [ 21.998302] The buggy address belongs to the physical page: [ 21.998688] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106dcb [ 21.999606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.000344] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 22.001131] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 22.001730] page dumped because: kasan: bad access detected [ 22.002291] [ 22.002582] Memory state around the buggy address: [ 22.003060] ffff800080be7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.003684] ffff800080be7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.004063] >ffff800080be7b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 22.004428] ^ [ 22.004761] ffff800080be7c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 [ 22.005113] ffff800080be7c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 [ 22.006345] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 21.943888] ================================================================== [ 21.944817] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2c0/0x318 [ 21.945605] Read of size 1 at addr ffff800080bc7bdf by task kunit_try_catch/238 [ 21.946067] [ 21.946290] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 21.946483] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.946544] Hardware name: linux,dummy-virt (DT) [ 21.946614] Call trace: [ 21.946666] dump_backtrace+0x9c/0x128 [ 21.946772] show_stack+0x20/0x38 [ 21.946851] dump_stack_lvl+0x8c/0xd0 [ 21.946941] print_report+0x310/0x5f0 [ 21.947025] kasan_report+0xdc/0x128 [ 21.948517] __asan_report_load1_noabort+0x20/0x30 [ 21.948631] kasan_alloca_oob_left+0x2c0/0x318 [ 21.948730] kunit_try_run_case+0x170/0x3f0 [ 21.948823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.948926] kthread+0x24c/0x2d0 [ 21.949009] ret_from_fork+0x10/0x20 [ 21.949101] [ 21.958422] The buggy address belongs to stack of task kunit_try_catch/238 [ 21.959684] [ 21.960260] The buggy address belongs to the virtual mapping at [ 21.960260] [ffff800080bc0000, ffff800080bc9000) created by: [ 21.960260] kernel_clone+0x150/0x7a8 [ 21.961663] [ 21.962073] The buggy address belongs to the physical page: [ 21.962678] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106d9f [ 21.963428] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.964095] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 21.964813] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.965472] page dumped because: kasan: bad access detected [ 21.965911] [ 21.966207] Memory state around the buggy address: [ 21.966809] ffff800080bc7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.967481] ffff800080bc7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.968336] >ffff800080bc7b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 21.968948] ^ [ 21.969590] ffff800080bc7c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 [ 21.970252] ffff800080bc7c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 [ 21.970862] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 21.909180] ================================================================== [ 21.910404] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x240/0x278 [ 21.911102] Read of size 1 at addr ffff800080ba7cba by task kunit_try_catch/236 [ 21.912169] [ 21.912561] CPU: 1 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 21.912783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.912856] Hardware name: linux,dummy-virt (DT) [ 21.912937] Call trace: [ 21.913091] dump_backtrace+0x9c/0x128 [ 21.913235] show_stack+0x20/0x38 [ 21.913342] dump_stack_lvl+0x8c/0xd0 [ 21.913397] print_report+0x310/0x5f0 [ 21.913443] kasan_report+0xdc/0x128 [ 21.913533] __asan_report_load1_noabort+0x20/0x30 [ 21.913586] kasan_stack_oob+0x240/0x278 [ 21.913631] kunit_try_run_case+0x170/0x3f0 [ 21.913677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.913726] kthread+0x24c/0x2d0 [ 21.913769] ret_from_fork+0x10/0x20 [ 21.913817] [ 21.920040] The buggy address belongs to stack of task kunit_try_catch/236 [ 21.920782] and is located at offset 138 in frame: [ 21.921251] kasan_stack_oob+0x0/0x278 [ 21.921957] [ 21.922233] This frame has 4 objects: [ 21.922686] [48, 49) '__assertion' [ 21.922831] [64, 72) 'array' [ 21.923499] [96, 112) '__assertion' [ 21.923926] [128, 138) 'stack_array' [ 21.924445] [ 21.925090] The buggy address belongs to the virtual mapping at [ 21.925090] [ffff800080ba0000, ffff800080ba9000) created by: [ 21.925090] kernel_clone+0x150/0x7a8 [ 21.926209] [ 21.926502] The buggy address belongs to the physical page: [ 21.927044] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106d24 [ 21.928071] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.929080] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 21.929507] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.929862] page dumped because: kasan: bad access detected [ 21.930161] [ 21.930339] Memory state around the buggy address: [ 21.930626] ffff800080ba7b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.931579] ffff800080ba7c00: 00 00 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 [ 21.932619] >ffff800080ba7c80: f2 f2 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 [ 21.932874] ^ [ 21.933067] ffff800080ba7d00: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 [ 21.933395] ffff800080ba7d80: f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 [ 21.934267] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 21.875632] ================================================================== [ 21.876264] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x220/0x258 [ 21.876967] Read of size 1 at addr ffff93d5410046cd by task kunit_try_catch/232 [ 21.877492] [ 21.877743] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 21.877852] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.877916] Hardware name: linux,dummy-virt (DT) [ 21.878005] Call trace: [ 21.878036] dump_backtrace+0x9c/0x128 [ 21.878099] show_stack+0x20/0x38 [ 21.878141] dump_stack_lvl+0x8c/0xd0 [ 21.878188] print_report+0x310/0x5f0 [ 21.878234] kasan_report+0xdc/0x128 [ 21.878291] __asan_report_load1_noabort+0x20/0x30 [ 21.878340] kasan_global_oob_right+0x220/0x258 [ 21.878386] kunit_try_run_case+0x170/0x3f0 [ 21.878432] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.878483] kthread+0x24c/0x2d0 [ 21.878528] ret_from_fork+0x10/0x20 [ 21.878598] [ 21.882071] The buggy address belongs to the variable: [ 21.882358] global_array+0xd/0x40 [ 21.882672] [ 21.882961] The buggy address belongs to the virtual mapping at [ 21.882961] [ffff93d53f380000, ffff93d5410c1000) created by: [ 21.882961] paging_init+0x66c/0x7d0 [ 21.884217] [ 21.884648] The buggy address belongs to the physical page: [ 21.884965] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47804 [ 21.885406] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 21.885837] raw: 03fffe0000002000 ffffc1ffc01e0108 ffffc1ffc01e0108 0000000000000000 [ 21.886811] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.887614] page dumped because: kasan: bad access detected [ 21.887934] [ 21.888115] Memory state around the buggy address: [ 21.888465] ffff93d541004580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.888875] ffff93d541004600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.889518] >ffff93d541004680: 00 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 [ 21.889970] ^ [ 21.890294] ffff93d541004700: 02 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 21.890819] ffff93d541004780: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 21.891604] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 21.851838] ================================================================== [ 21.852375] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x124/0x2b0 [ 21.852912] Free of addr fff00000c6c7c001 by task kunit_try_catch/230 [ 21.853192] [ 21.853337] CPU: 1 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 21.853450] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.853504] Hardware name: linux,dummy-virt (DT) [ 21.853552] Call trace: [ 21.853580] dump_backtrace+0x9c/0x128 [ 21.853631] show_stack+0x20/0x38 [ 21.853673] dump_stack_lvl+0x8c/0xd0 [ 21.853721] print_report+0x118/0x5f0 [ 21.853765] kasan_report_invalid_free+0xc0/0xe8 [ 21.853811] __kasan_mempool_poison_object+0xfc/0x150 [ 21.853862] mempool_free+0x28c/0x328 [ 21.853910] mempool_kmalloc_invalid_free_helper+0x124/0x2b0 [ 21.853964] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 21.854016] kunit_try_run_case+0x170/0x3f0 [ 21.854063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.854115] kthread+0x24c/0x2d0 [ 21.854157] ret_from_fork+0x10/0x20 [ 21.854206] [ 21.859851] The buggy address belongs to the physical page: [ 21.860292] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c7c [ 21.860802] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.861076] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.861576] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.862035] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.862559] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.862979] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.863479] head: 0bfffe0000000002 ffffc1ffc31b1f01 ffffffffffffffff 0000000000000000 [ 21.864081] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 21.864418] page dumped because: kasan: bad access detected [ 21.864772] [ 21.864973] Memory state around the buggy address: [ 21.865275] fff00000c6c7bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.865797] fff00000c6c7bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.866052] >fff00000c6c7c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.866492] ^ [ 21.866759] fff00000c6c7c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.867534] fff00000c6c7c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.868019] ================================================================== [ 21.824093] ================================================================== [ 21.824616] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x124/0x2b0 [ 21.825026] Free of addr fff00000c6cf0801 by task kunit_try_catch/228 [ 21.825343] [ 21.825558] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 21.825674] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.825708] Hardware name: linux,dummy-virt (DT) [ 21.825760] Call trace: [ 21.825793] dump_backtrace+0x9c/0x128 [ 21.825860] show_stack+0x20/0x38 [ 21.825905] dump_stack_lvl+0x8c/0xd0 [ 21.825953] print_report+0x118/0x5f0 [ 21.825999] kasan_report_invalid_free+0xc0/0xe8 [ 21.826046] check_slab_allocation+0xfc/0x108 [ 21.826089] __kasan_mempool_poison_object+0x78/0x150 [ 21.826151] mempool_free+0x28c/0x328 [ 21.826203] mempool_kmalloc_invalid_free_helper+0x124/0x2b0 [ 21.826284] mempool_kmalloc_invalid_free+0xc0/0x118 [ 21.826350] kunit_try_run_case+0x170/0x3f0 [ 21.826413] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.826468] kthread+0x24c/0x2d0 [ 21.826510] ret_from_fork+0x10/0x20 [ 21.826560] [ 21.832537] Allocated by task 228: [ 21.832844] kasan_save_stack+0x3c/0x68 [ 21.833145] kasan_save_track+0x20/0x40 [ 21.833359] kasan_save_alloc_info+0x40/0x58 [ 21.833650] __kasan_mempool_unpoison_object+0x11c/0x180 [ 21.833943] remove_element+0x130/0x1f8 [ 21.834217] mempool_alloc_preallocated+0x58/0xc0 [ 21.834540] mempool_kmalloc_invalid_free_helper+0x94/0x2b0 [ 21.834964] mempool_kmalloc_invalid_free+0xc0/0x118 [ 21.835547] kunit_try_run_case+0x170/0x3f0 [ 21.835756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.836179] kthread+0x24c/0x2d0 [ 21.836444] ret_from_fork+0x10/0x20 [ 21.836739] [ 21.837451] The buggy address belongs to the object at fff00000c6cf0800 [ 21.837451] which belongs to the cache kmalloc-128 of size 128 [ 21.838564] The buggy address is located 1 bytes inside of [ 21.838564] 128-byte region [fff00000c6cf0800, fff00000c6cf0880) [ 21.839688] [ 21.839923] The buggy address belongs to the physical page: [ 21.840292] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cf0 [ 21.840756] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.841118] page_type: f5(slab) [ 21.841365] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.841786] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 21.842197] page dumped because: kasan: bad access detected [ 21.842492] [ 21.842691] Memory state around the buggy address: [ 21.842993] fff00000c6cf0700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.843417] fff00000c6cf0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.843858] >fff00000c6cf0800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.844488] ^ [ 21.844773] fff00000c6cf0880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.845130] fff00000c6cf0900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.845587] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 21.742604] ================================================================== [ 21.743247] BUG: KASAN: double-free in mempool_double_free_helper+0x15c/0x2f8 [ 21.743951] Free of addr fff00000c6cc8500 by task kunit_try_catch/222 [ 21.744849] [ 21.745113] CPU: 1 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 21.745315] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.745354] Hardware name: linux,dummy-virt (DT) [ 21.745394] Call trace: [ 21.745423] dump_backtrace+0x9c/0x128 [ 21.745523] show_stack+0x20/0x38 [ 21.745573] dump_stack_lvl+0x8c/0xd0 [ 21.745625] print_report+0x118/0x5f0 [ 21.745667] kasan_report_invalid_free+0xc0/0xe8 [ 21.745714] check_slab_allocation+0xd4/0x108 [ 21.745758] __kasan_mempool_poison_object+0x78/0x150 [ 21.745806] mempool_free+0x28c/0x328 [ 21.745853] mempool_double_free_helper+0x15c/0x2f8 [ 21.745905] mempool_kmalloc_double_free+0xc0/0x118 [ 21.745954] kunit_try_run_case+0x170/0x3f0 [ 21.746001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.746052] kthread+0x24c/0x2d0 [ 21.746096] ret_from_fork+0x10/0x20 [ 21.746148] [ 21.750806] Allocated by task 222: [ 21.751381] kasan_save_stack+0x3c/0x68 [ 21.751784] kasan_save_track+0x20/0x40 [ 21.752117] kasan_save_alloc_info+0x40/0x58 [ 21.752333] __kasan_mempool_unpoison_object+0x11c/0x180 [ 21.752812] remove_element+0x130/0x1f8 [ 21.753121] mempool_alloc_preallocated+0x58/0xc0 [ 21.753486] mempool_double_free_helper+0x94/0x2f8 [ 21.753768] mempool_kmalloc_double_free+0xc0/0x118 [ 21.754122] kunit_try_run_case+0x170/0x3f0 [ 21.754449] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.754829] kthread+0x24c/0x2d0 [ 21.755096] ret_from_fork+0x10/0x20 [ 21.755701] [ 21.755884] Freed by task 222: [ 21.756180] kasan_save_stack+0x3c/0x68 [ 21.756475] kasan_save_track+0x20/0x40 [ 21.756774] kasan_save_free_info+0x4c/0x78 [ 21.757082] __kasan_mempool_poison_object+0xc0/0x150 [ 21.757447] mempool_free+0x28c/0x328 [ 21.757728] mempool_double_free_helper+0x104/0x2f8 [ 21.758048] mempool_kmalloc_double_free+0xc0/0x118 [ 21.758411] kunit_try_run_case+0x170/0x3f0 [ 21.758839] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.759256] kthread+0x24c/0x2d0 [ 21.759762] ret_from_fork+0x10/0x20 [ 21.760165] [ 21.760460] The buggy address belongs to the object at fff00000c6cc8500 [ 21.760460] which belongs to the cache kmalloc-128 of size 128 [ 21.761052] The buggy address is located 0 bytes inside of [ 21.761052] 128-byte region [fff00000c6cc8500, fff00000c6cc8580) [ 21.761854] [ 21.762014] The buggy address belongs to the physical page: [ 21.762227] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc8 [ 21.762904] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.763275] page_type: f5(slab) [ 21.763462] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.763794] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 21.764705] page dumped because: kasan: bad access detected [ 21.765841] [ 21.765992] Memory state around the buggy address: [ 21.766440] fff00000c6cc8400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.766826] fff00000c6cc8480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.767276] >fff00000c6cc8500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.767677] ^ [ 21.767918] fff00000c6cc8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.768609] fff00000c6cc8600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.768941] ================================================================== [ 21.777222] ================================================================== [ 21.777919] BUG: KASAN: double-free in mempool_double_free_helper+0x15c/0x2f8 [ 21.778575] Free of addr fff00000c6d60000 by task kunit_try_catch/224 [ 21.779022] [ 21.779315] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 21.779434] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.779470] Hardware name: linux,dummy-virt (DT) [ 21.779571] Call trace: [ 21.779606] dump_backtrace+0x9c/0x128 [ 21.779678] show_stack+0x20/0x38 [ 21.779723] dump_stack_lvl+0x8c/0xd0 [ 21.779773] print_report+0x118/0x5f0 [ 21.779816] kasan_report_invalid_free+0xc0/0xe8 [ 21.779862] __kasan_mempool_poison_object+0x14c/0x150 [ 21.779911] mempool_free+0x28c/0x328 [ 21.779958] mempool_double_free_helper+0x15c/0x2f8 [ 21.780007] mempool_kmalloc_large_double_free+0xc0/0x118 [ 21.780057] kunit_try_run_case+0x170/0x3f0 [ 21.780103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.780154] kthread+0x24c/0x2d0 [ 21.780197] ret_from_fork+0x10/0x20 [ 21.780264] [ 21.786048] The buggy address belongs to the physical page: [ 21.786485] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106d60 [ 21.786937] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.787212] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.787810] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.788280] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.789070] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.789510] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.789825] head: 0bfffe0000000002 ffffc1ffc31b5801 ffffffffffffffff 0000000000000000 [ 21.790395] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 21.790794] page dumped because: kasan: bad access detected [ 21.791540] [ 21.791783] Memory state around the buggy address: [ 21.792125] fff00000c6d5ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.792914] fff00000c6d5ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.793289] >fff00000c6d60000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.793609] ^ [ 21.793926] fff00000c6d60080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.794312] fff00000c6d60100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.794810] ================================================================== [ 21.802325] ================================================================== [ 21.802999] BUG: KASAN: double-free in mempool_double_free_helper+0x15c/0x2f8 [ 21.803614] Free of addr fff00000c6c7c000 by task kunit_try_catch/226 [ 21.804039] [ 21.804252] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 21.804366] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.804401] Hardware name: linux,dummy-virt (DT) [ 21.804440] Call trace: [ 21.804466] dump_backtrace+0x9c/0x128 [ 21.804519] show_stack+0x20/0x38 [ 21.804588] dump_stack_lvl+0x8c/0xd0 [ 21.804658] print_report+0x118/0x5f0 [ 21.804701] kasan_report_invalid_free+0xc0/0xe8 [ 21.804748] __kasan_mempool_poison_pages+0xe0/0xe8 [ 21.804795] mempool_free+0x24c/0x328 [ 21.804841] mempool_double_free_helper+0x15c/0x2f8 [ 21.804890] mempool_page_alloc_double_free+0xbc/0x118 [ 21.804940] kunit_try_run_case+0x170/0x3f0 [ 21.804986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.805037] kthread+0x24c/0x2d0 [ 21.805079] ret_from_fork+0x10/0x20 [ 21.805125] [ 21.809737] The buggy address belongs to the physical page: [ 21.810057] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c7c [ 21.810379] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.810954] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 21.811980] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.812452] page dumped because: kasan: bad access detected [ 21.812903] [ 21.813071] Memory state around the buggy address: [ 21.813324] fff00000c6c7bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.813932] fff00000c6c7bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.814358] >fff00000c6c7c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.814898] ^ [ 21.815097] fff00000c6c7c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.815568] fff00000c6c7c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.816128] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 19.196596] ================================================================== [ 19.197272] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2d8/0x300 [ 19.198063] Read of size 1 at addr fff00000c6b40000 by task kunit_try_catch/135 [ 19.198725] [ 19.199550] CPU: 1 UID: 0 PID: 135 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 19.199934] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.199969] Hardware name: linux,dummy-virt (DT) [ 19.200009] Call trace: [ 19.200035] dump_backtrace+0x9c/0x128 [ 19.200100] show_stack+0x20/0x38 [ 19.200140] dump_stack_lvl+0x8c/0xd0 [ 19.200185] print_report+0x118/0x5f0 [ 19.200227] kasan_report+0xdc/0x128 [ 19.200298] __asan_report_load1_noabort+0x20/0x30 [ 19.200345] kmalloc_large_uaf+0x2d8/0x300 [ 19.200391] kunit_try_run_case+0x170/0x3f0 [ 19.200435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.200483] kthread+0x24c/0x2d0 [ 19.200525] ret_from_fork+0x10/0x20 [ 19.200572] [ 19.205377] The buggy address belongs to the physical page: [ 19.205856] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106b40 [ 19.206691] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.207987] raw: 0bfffe0000000000 fff00000da521200 fff00000da521200 0000000000000000 [ 19.208620] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 19.209235] page dumped because: kasan: bad access detected [ 19.209747] [ 19.210422] Memory state around the buggy address: [ 19.210774] fff00000c6b3ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.211662] fff00000c6b3ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.212457] >fff00000c6b40000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.213006] ^ [ 19.213508] fff00000c6b40080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.214264] fff00000c6b40100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.214977] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 21.660696] ================================================================== [ 21.661299] BUG: KASAN: use-after-free in mempool_uaf_helper+0x320/0x348 [ 21.661924] Read of size 1 at addr fff00000c6c78000 by task kunit_try_catch/216 [ 21.662247] [ 21.662448] CPU: 1 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 21.662554] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.662587] Hardware name: linux,dummy-virt (DT) [ 21.662626] Call trace: [ 21.662652] dump_backtrace+0x9c/0x128 [ 21.662708] show_stack+0x20/0x38 [ 21.662750] dump_stack_lvl+0x8c/0xd0 [ 21.662798] print_report+0x118/0x5f0 [ 21.662842] kasan_report+0xdc/0x128 [ 21.662885] __asan_report_load1_noabort+0x20/0x30 [ 21.662932] mempool_uaf_helper+0x320/0x348 [ 21.662977] mempool_kmalloc_large_uaf+0xc4/0x120 [ 21.663025] kunit_try_run_case+0x170/0x3f0 [ 21.663071] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.663313] kthread+0x24c/0x2d0 [ 21.663373] ret_from_fork+0x10/0x20 [ 21.663426] [ 21.665909] The buggy address belongs to the physical page: [ 21.666379] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c78 [ 21.666882] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.667713] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.668038] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.668306] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.668803] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.669099] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.669578] head: 0bfffe0000000002 ffffc1ffc31b1e01 ffffffffffffffff 0000000000000000 [ 21.669925] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 21.670356] page dumped because: kasan: bad access detected [ 21.670670] [ 21.670791] Memory state around the buggy address: [ 21.671394] fff00000c6c77f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.671712] fff00000c6c77f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.672142] >fff00000c6c78000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.672458] ^ [ 21.672776] fff00000c6c78080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.673142] fff00000c6c78100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.673518] ================================================================== [ 21.725271] ================================================================== [ 21.725800] BUG: KASAN: use-after-free in mempool_uaf_helper+0x320/0x348 [ 21.726250] Read of size 1 at addr fff00000c6c78000 by task kunit_try_catch/220 [ 21.726615] [ 21.726832] CPU: 1 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 21.726937] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.726970] Hardware name: linux,dummy-virt (DT) [ 21.727010] Call trace: [ 21.727037] dump_backtrace+0x9c/0x128 [ 21.727103] show_stack+0x20/0x38 [ 21.727146] dump_stack_lvl+0x8c/0xd0 [ 21.727194] print_report+0x118/0x5f0 [ 21.727244] kasan_report+0xdc/0x128 [ 21.727294] __asan_report_load1_noabort+0x20/0x30 [ 21.727342] mempool_uaf_helper+0x320/0x348 [ 21.727388] mempool_page_alloc_uaf+0xc0/0x118 [ 21.727436] kunit_try_run_case+0x170/0x3f0 [ 21.727484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.727535] kthread+0x24c/0x2d0 [ 21.727580] ret_from_fork+0x10/0x20 [ 21.727938] [ 21.731225] The buggy address belongs to the physical page: [ 21.731911] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c78 [ 21.732189] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.732726] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 21.733116] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.733501] page dumped because: kasan: bad access detected [ 21.733780] [ 21.733945] Memory state around the buggy address: [ 21.734138] fff00000c6c77f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.734491] fff00000c6c77f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.734883] >fff00000c6c78000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.735207] ^ [ 21.735442] fff00000c6c78080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.735884] fff00000c6c78100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 21.736215] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 21.632205] ================================================================== [ 21.632820] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x320/0x348 [ 21.633264] Read of size 1 at addr fff00000c5d36e00 by task kunit_try_catch/214 [ 21.633639] [ 21.633843] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 21.633955] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.633990] Hardware name: linux,dummy-virt (DT) [ 21.634030] Call trace: [ 21.634058] dump_backtrace+0x9c/0x128 [ 21.634116] show_stack+0x20/0x38 [ 21.634158] dump_stack_lvl+0x8c/0xd0 [ 21.634207] print_report+0x118/0x5f0 [ 21.634269] kasan_report+0xdc/0x128 [ 21.634316] __asan_report_load1_noabort+0x20/0x30 [ 21.634366] mempool_uaf_helper+0x320/0x348 [ 21.634412] mempool_kmalloc_uaf+0xc4/0x120 [ 21.634460] kunit_try_run_case+0x170/0x3f0 [ 21.634506] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.634556] kthread+0x24c/0x2d0 [ 21.634599] ret_from_fork+0x10/0x20 [ 21.634645] [ 21.638012] Allocated by task 214: [ 21.638273] kasan_save_stack+0x3c/0x68 [ 21.638647] kasan_save_track+0x20/0x40 [ 21.638928] kasan_save_alloc_info+0x40/0x58 [ 21.639490] __kasan_mempool_unpoison_object+0x11c/0x180 [ 21.639796] remove_element+0x130/0x1f8 [ 21.640383] mempool_alloc_preallocated+0x58/0xc0 [ 21.640645] mempool_uaf_helper+0xa4/0x348 [ 21.640864] mempool_kmalloc_uaf+0xc4/0x120 [ 21.641039] kunit_try_run_case+0x170/0x3f0 [ 21.641424] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.641752] kthread+0x24c/0x2d0 [ 21.641989] ret_from_fork+0x10/0x20 [ 21.642147] [ 21.642353] Freed by task 214: [ 21.642612] kasan_save_stack+0x3c/0x68 [ 21.642914] kasan_save_track+0x20/0x40 [ 21.643082] kasan_save_free_info+0x4c/0x78 [ 21.643587] __kasan_mempool_poison_object+0xc0/0x150 [ 21.644012] mempool_free+0x28c/0x328 [ 21.644296] mempool_uaf_helper+0x108/0x348 [ 21.644610] mempool_kmalloc_uaf+0xc4/0x120 [ 21.644825] kunit_try_run_case+0x170/0x3f0 [ 21.644998] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.645264] kthread+0x24c/0x2d0 [ 21.645586] ret_from_fork+0x10/0x20 [ 21.645909] [ 21.646086] The buggy address belongs to the object at fff00000c5d36e00 [ 21.646086] which belongs to the cache kmalloc-128 of size 128 [ 21.646625] The buggy address is located 0 bytes inside of [ 21.646625] freed 128-byte region [fff00000c5d36e00, fff00000c5d36e80) [ 21.647559] [ 21.647754] The buggy address belongs to the physical page: [ 21.647959] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d36 [ 21.648627] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.649013] page_type: f5(slab) [ 21.649362] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.649695] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 21.650215] page dumped because: kasan: bad access detected [ 21.650499] [ 21.650697] Memory state around the buggy address: [ 21.650954] fff00000c5d36d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.651376] fff00000c5d36d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.652052] >fff00000c5d36e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.652559] ^ [ 21.652816] fff00000c5d36e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.653141] fff00000c5d36f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.653391] ================================================================== [ 21.683917] ================================================================== [ 21.684610] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x320/0x348 [ 21.685080] Read of size 1 at addr fff00000c6d00240 by task kunit_try_catch/218 [ 21.685608] [ 21.685740] CPU: 0 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 21.685847] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.685881] Hardware name: linux,dummy-virt (DT) [ 21.685920] Call trace: [ 21.685946] dump_backtrace+0x9c/0x128 [ 21.686001] show_stack+0x20/0x38 [ 21.686044] dump_stack_lvl+0x8c/0xd0 [ 21.686094] print_report+0x118/0x5f0 [ 21.686137] kasan_report+0xdc/0x128 [ 21.686177] __asan_report_load1_noabort+0x20/0x30 [ 21.686225] mempool_uaf_helper+0x320/0x348 [ 21.686288] mempool_slab_uaf+0xc0/0x118 [ 21.686333] kunit_try_run_case+0x170/0x3f0 [ 21.686381] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.686433] kthread+0x24c/0x2d0 [ 21.686477] ret_from_fork+0x10/0x20 [ 21.686525] [ 21.690959] Allocated by task 218: [ 21.693149] kasan_save_stack+0x3c/0x68 [ 21.693987] kasan_save_track+0x20/0x40 [ 21.694694] kasan_save_alloc_info+0x40/0x58 [ 21.695647] __kasan_mempool_unpoison_object+0xbc/0x180 [ 21.695885] remove_element+0x16c/0x1f8 [ 21.696069] mempool_alloc_preallocated+0x58/0xc0 [ 21.696311] mempool_uaf_helper+0xa4/0x348 [ 21.696493] mempool_slab_uaf+0xc0/0x118 [ 21.696667] kunit_try_run_case+0x170/0x3f0 [ 21.696846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.697053] kthread+0x24c/0x2d0 [ 21.697208] ret_from_fork+0x10/0x20 [ 21.698323] [ 21.698503] Freed by task 218: [ 21.698790] kasan_save_stack+0x3c/0x68 [ 21.699284] kasan_save_track+0x20/0x40 [ 21.699535] kasan_save_free_info+0x4c/0x78 [ 21.700288] __kasan_mempool_poison_object+0xc0/0x150 [ 21.700584] mempool_free+0x28c/0x328 [ 21.700962] mempool_uaf_helper+0x108/0x348 [ 21.701226] mempool_slab_uaf+0xc0/0x118 [ 21.701549] kunit_try_run_case+0x170/0x3f0 [ 21.701760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.702097] kthread+0x24c/0x2d0 [ 21.702440] ret_from_fork+0x10/0x20 [ 21.702719] [ 21.702874] The buggy address belongs to the object at fff00000c6d00240 [ 21.702874] which belongs to the cache test_cache of size 123 [ 21.704016] The buggy address is located 0 bytes inside of [ 21.704016] freed 123-byte region [fff00000c6d00240, fff00000c6d002bb) [ 21.704865] [ 21.705083] The buggy address belongs to the physical page: [ 21.705362] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106d00 [ 21.705921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.706363] page_type: f5(slab) [ 21.706669] raw: 0bfffe0000000000 fff00000c6cca000 dead000000000122 0000000000000000 [ 21.707386] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000 [ 21.707879] page dumped because: kasan: bad access detected [ 21.708226] [ 21.708423] Memory state around the buggy address: [ 21.708683] fff00000c6d00100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.709154] fff00000c6d00180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.709894] >fff00000c6d00200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 21.710326] ^ [ 21.710614] fff00000c6d00280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.711005] fff00000c6d00300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.711615] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 21.597971] ================================================================== [ 21.598631] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2b8/0x2f8 [ 21.598923] Read of size 1 at addr fff00000c6cca2bb by task kunit_try_catch/212 [ 21.599531] [ 21.599725] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 21.599831] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.599864] Hardware name: linux,dummy-virt (DT) [ 21.599904] Call trace: [ 21.599930] dump_backtrace+0x9c/0x128 [ 21.599982] show_stack+0x20/0x38 [ 21.600021] dump_stack_lvl+0x8c/0xd0 [ 21.600070] print_report+0x118/0x5f0 [ 21.600112] kasan_report+0xdc/0x128 [ 21.600152] __asan_report_load1_noabort+0x20/0x30 [ 21.600200] mempool_oob_right_helper+0x2b8/0x2f8 [ 21.600260] mempool_slab_oob_right+0xc0/0x118 [ 21.600312] kunit_try_run_case+0x170/0x3f0 [ 21.600358] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.600438] kthread+0x24c/0x2d0 [ 21.600826] ret_from_fork+0x10/0x20 [ 21.600881] [ 21.604592] Allocated by task 212: [ 21.604782] kasan_save_stack+0x3c/0x68 [ 21.605078] kasan_save_track+0x20/0x40 [ 21.605634] kasan_save_alloc_info+0x40/0x58 [ 21.605905] __kasan_mempool_unpoison_object+0xbc/0x180 [ 21.606170] remove_element+0x16c/0x1f8 [ 21.606425] mempool_alloc_preallocated+0x58/0xc0 [ 21.606609] mempool_oob_right_helper+0x98/0x2f8 [ 21.606995] mempool_slab_oob_right+0xc0/0x118 [ 21.607571] kunit_try_run_case+0x170/0x3f0 [ 21.607789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.608082] kthread+0x24c/0x2d0 [ 21.608366] ret_from_fork+0x10/0x20 [ 21.608602] [ 21.608778] The buggy address belongs to the object at fff00000c6cca240 [ 21.608778] which belongs to the cache test_cache of size 123 [ 21.609246] The buggy address is located 0 bytes to the right of [ 21.609246] allocated 123-byte region [fff00000c6cca240, fff00000c6cca2bb) [ 21.609801] [ 21.609977] The buggy address belongs to the physical page: [ 21.610225] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cca [ 21.610651] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.611056] page_type: f5(slab) [ 21.611570] raw: 0bfffe0000000000 fff00000ffeaef00 dead000000000122 0000000000000000 [ 21.611961] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000 [ 21.612454] page dumped because: kasan: bad access detected [ 21.612771] [ 21.612940] Memory state around the buggy address: [ 21.613141] fff00000c6cca180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.613544] fff00000c6cca200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 21.613941] >fff00000c6cca280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 21.614428] ^ [ 21.614687] fff00000c6cca300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.615254] fff00000c6cca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.615596] ================================================================== [ 21.545148] ================================================================== [ 21.545823] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2b8/0x2f8 [ 21.546401] Read of size 1 at addr fff00000c6cf2873 by task kunit_try_catch/208 [ 21.546703] [ 21.546839] CPU: 0 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 21.546949] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.546983] Hardware name: linux,dummy-virt (DT) [ 21.547023] Call trace: [ 21.547065] dump_backtrace+0x9c/0x128 [ 21.547123] show_stack+0x20/0x38 [ 21.547167] dump_stack_lvl+0x8c/0xd0 [ 21.547215] print_report+0x118/0x5f0 [ 21.547274] kasan_report+0xdc/0x128 [ 21.547316] __asan_report_load1_noabort+0x20/0x30 [ 21.547363] mempool_oob_right_helper+0x2b8/0x2f8 [ 21.547413] mempool_kmalloc_oob_right+0xc4/0x120 [ 21.547460] kunit_try_run_case+0x170/0x3f0 [ 21.547510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.547560] kthread+0x24c/0x2d0 [ 21.547628] ret_from_fork+0x10/0x20 [ 21.547679] [ 21.551169] Allocated by task 208: [ 21.552331] kasan_save_stack+0x3c/0x68 [ 21.552644] kasan_save_track+0x20/0x40 [ 21.552875] kasan_save_alloc_info+0x40/0x58 [ 21.553198] __kasan_mempool_unpoison_object+0x11c/0x180 [ 21.553567] remove_element+0x130/0x1f8 [ 21.553866] mempool_alloc_preallocated+0x58/0xc0 [ 21.554246] mempool_oob_right_helper+0x98/0x2f8 [ 21.554488] mempool_kmalloc_oob_right+0xc4/0x120 [ 21.554876] kunit_try_run_case+0x170/0x3f0 [ 21.555349] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.555778] kthread+0x24c/0x2d0 [ 21.556139] ret_from_fork+0x10/0x20 [ 21.556422] [ 21.556692] The buggy address belongs to the object at fff00000c6cf2800 [ 21.556692] which belongs to the cache kmalloc-128 of size 128 [ 21.557403] The buggy address is located 0 bytes to the right of [ 21.557403] allocated 115-byte region [fff00000c6cf2800, fff00000c6cf2873) [ 21.558110] [ 21.558349] The buggy address belongs to the physical page: [ 21.558724] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cf2 [ 21.559176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.559656] page_type: f5(slab) [ 21.559899] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.560504] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 21.560868] page dumped because: kasan: bad access detected [ 21.561332] [ 21.561605] Memory state around the buggy address: [ 21.561874] fff00000c6cf2700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.562381] fff00000c6cf2780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.563806] >fff00000c6cf2800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.564256] ^ [ 21.564574] fff00000c6cf2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.565068] fff00000c6cf2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.565488] ================================================================== [ 21.573433] ================================================================== [ 21.574154] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2b8/0x2f8 [ 21.574749] Read of size 1 at addr fff00000c6c7a001 by task kunit_try_catch/210 [ 21.575092] [ 21.575232] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 21.575429] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.575465] Hardware name: linux,dummy-virt (DT) [ 21.575506] Call trace: [ 21.575535] dump_backtrace+0x9c/0x128 [ 21.575591] show_stack+0x20/0x38 [ 21.575632] dump_stack_lvl+0x8c/0xd0 [ 21.575682] print_report+0x118/0x5f0 [ 21.575724] kasan_report+0xdc/0x128 [ 21.575768] __asan_report_load1_noabort+0x20/0x30 [ 21.575832] mempool_oob_right_helper+0x2b8/0x2f8 [ 21.575902] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 21.576035] kunit_try_run_case+0x170/0x3f0 [ 21.576093] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.576147] kthread+0x24c/0x2d0 [ 21.576194] ret_from_fork+0x10/0x20 [ 21.576260] [ 21.580830] The buggy address belongs to the physical page: [ 21.581226] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c78 [ 21.581762] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.582183] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.582665] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.583085] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.584034] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.584338] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.584880] head: 0bfffe0000000002 ffffc1ffc31b1e01 ffffffffffffffff 0000000000000000 [ 21.585174] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 21.585680] page dumped because: kasan: bad access detected [ 21.586086] [ 21.586208] Memory state around the buggy address: [ 21.586508] fff00000c6c79f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.586900] fff00000c6c79f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.587276] >fff00000c6c7a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.587879] ^ [ 21.588161] fff00000c6c7a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.588581] fff00000c6c7a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.589000] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 20.962025] ================================================================== [ 20.962812] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x184/0x318 [ 20.963694] Read of size 1 at addr fff00000c5a6fc80 by task kunit_try_catch/202 [ 20.964531] [ 20.964735] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 20.964857] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.964892] Hardware name: linux,dummy-virt (DT) [ 20.964931] Call trace: [ 20.964962] dump_backtrace+0x9c/0x128 [ 20.965023] show_stack+0x20/0x38 [ 20.965080] dump_stack_lvl+0x8c/0xd0 [ 20.965150] print_report+0x118/0x5f0 [ 20.965197] kasan_report+0xdc/0x128 [ 20.965251] __kasan_check_byte+0x54/0x70 [ 20.965299] kmem_cache_destroy+0x34/0x218 [ 20.965345] kmem_cache_double_destroy+0x184/0x318 [ 20.965410] kunit_try_run_case+0x170/0x3f0 [ 20.965476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.965563] kthread+0x24c/0x2d0 [ 20.965609] ret_from_fork+0x10/0x20 [ 20.965657] [ 20.969375] Allocated by task 202: [ 20.969580] kasan_save_stack+0x3c/0x68 [ 20.969811] kasan_save_track+0x20/0x40 [ 20.970035] kasan_save_alloc_info+0x40/0x58 [ 20.970329] __kasan_slab_alloc+0xa8/0xb0 [ 20.970929] kmem_cache_alloc_noprof+0xf8/0x300 [ 20.972549] __kmem_cache_create_args+0x19c/0x2c8 [ 20.972994] kmem_cache_double_destroy+0xd0/0x318 [ 20.973421] kunit_try_run_case+0x170/0x3f0 [ 20.973660] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.974121] kthread+0x24c/0x2d0 [ 20.974334] ret_from_fork+0x10/0x20 [ 20.974690] [ 20.974879] Freed by task 202: [ 20.975420] kasan_save_stack+0x3c/0x68 [ 20.975791] kasan_save_track+0x20/0x40 [ 20.976073] kasan_save_free_info+0x4c/0x78 [ 20.976475] __kasan_slab_free+0x6c/0x98 [ 20.976801] kmem_cache_free+0x118/0x460 [ 20.977184] slab_kmem_cache_release+0x38/0x50 [ 20.977526] kmem_cache_release+0x1c/0x30 [ 20.977720] kobject_put+0x17c/0x420 [ 20.978116] sysfs_slab_release+0x1c/0x30 [ 20.978347] kmem_cache_destroy+0x118/0x218 [ 20.978764] kmem_cache_double_destroy+0x130/0x318 [ 20.979039] kunit_try_run_case+0x170/0x3f0 [ 20.979753] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.980214] kthread+0x24c/0x2d0 [ 20.980424] ret_from_fork+0x10/0x20 [ 20.980776] [ 20.981068] The buggy address belongs to the object at fff00000c5a6fc80 [ 20.981068] which belongs to the cache kmem_cache of size 208 [ 20.981760] The buggy address is located 0 bytes inside of [ 20.981760] freed 208-byte region [fff00000c5a6fc80, fff00000c5a6fd50) [ 20.982449] [ 20.982617] The buggy address belongs to the physical page: [ 20.982818] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a6f [ 20.983653] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.983946] page_type: f5(slab) [ 20.984457] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 20.984885] raw: 0000000000000000 00000000800c000c 00000001f5000000 0000000000000000 [ 20.985363] page dumped because: kasan: bad access detected [ 20.985744] [ 20.985848] Memory state around the buggy address: [ 20.986154] fff00000c5a6fb80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.986607] fff00000c5a6fc00: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.986949] >fff00000c5a6fc80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.987722] ^ [ 20.987923] fff00000c5a6fd00: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 20.988795] fff00000c5a6fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.989047] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 20.883906] ================================================================== [ 20.884712] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x3a4/0x488 [ 20.885251] Read of size 1 at addr fff00000c6cf8000 by task kunit_try_catch/200 [ 20.885673] [ 20.885906] CPU: 0 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 20.886023] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.886059] Hardware name: linux,dummy-virt (DT) [ 20.886103] Call trace: [ 20.886133] dump_backtrace+0x9c/0x128 [ 20.886190] show_stack+0x20/0x38 [ 20.886234] dump_stack_lvl+0x8c/0xd0 [ 20.886301] print_report+0x118/0x5f0 [ 20.886343] kasan_report+0xdc/0x128 [ 20.886385] __asan_report_load1_noabort+0x20/0x30 [ 20.886434] kmem_cache_rcu_uaf+0x3a4/0x488 [ 20.886481] kunit_try_run_case+0x170/0x3f0 [ 20.886530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.886580] kthread+0x24c/0x2d0 [ 20.886626] ret_from_fork+0x10/0x20 [ 20.886674] [ 20.890197] Allocated by task 200: [ 20.890698] kasan_save_stack+0x3c/0x68 [ 20.891236] kasan_save_track+0x20/0x40 [ 20.892741] kasan_save_alloc_info+0x40/0x58 [ 20.893347] __kasan_slab_alloc+0xa8/0xb0 [ 20.893825] kmem_cache_alloc_noprof+0xf8/0x300 [ 20.894291] kmem_cache_rcu_uaf+0x130/0x488 [ 20.894678] kunit_try_run_case+0x170/0x3f0 [ 20.895297] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.896190] kthread+0x24c/0x2d0 [ 20.896557] ret_from_fork+0x10/0x20 [ 20.896840] [ 20.897524] Freed by task 0: [ 20.898036] kasan_save_stack+0x3c/0x68 [ 20.898569] kasan_save_track+0x20/0x40 [ 20.899184] kasan_save_free_info+0x4c/0x78 [ 20.899829] __kasan_slab_free+0x6c/0x98 [ 20.900313] slab_free_after_rcu_debug+0xd0/0x2d0 [ 20.900777] rcu_core+0xa54/0x1df8 [ 20.901316] rcu_core_si+0x18/0x30 [ 20.901751] handle_softirqs+0x36c/0xb18 [ 20.902252] __do_softirq+0x1c/0x28 [ 20.902656] [ 20.902917] Last potentially related work creation: [ 20.903535] kasan_save_stack+0x3c/0x68 [ 20.903997] __kasan_record_aux_stack+0xbc/0xe8 [ 20.904440] kasan_record_aux_stack_noalloc+0x14/0x20 [ 20.904960] kmem_cache_free+0x28c/0x460 [ 20.907315] kmem_cache_rcu_uaf+0x170/0x488 [ 20.908673] kunit_try_run_case+0x170/0x3f0 [ 20.909591] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.910571] kthread+0x24c/0x2d0 [ 20.910898] ret_from_fork+0x10/0x20 [ 20.911225] [ 20.912692] The buggy address belongs to the object at fff00000c6cf8000 [ 20.912692] which belongs to the cache test_cache of size 200 [ 20.914563] The buggy address is located 0 bytes inside of [ 20.914563] freed 200-byte region [fff00000c6cf8000, fff00000c6cf80c8) [ 20.915320] [ 20.915534] The buggy address belongs to the physical page: [ 20.915940] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cf8 [ 20.918947] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.920213] page_type: f5(slab) [ 20.920728] raw: 0bfffe0000000000 fff00000c5a6fb40 dead000000000122 0000000000000000 [ 20.921596] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000 [ 20.922168] page dumped because: kasan: bad access detected [ 20.922789] [ 20.923060] Memory state around the buggy address: [ 20.923786] fff00000c6cf7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.924638] fff00000c6cf7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.925707] >fff00000c6cf8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.926490] ^ [ 20.926964] fff00000c6cf8080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 20.928065] fff00000c6cf8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.928719] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 20.805756] ================================================================== [ 20.806549] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x190/0x3d8 [ 20.806935] Free of addr fff00000c6cf6001 by task kunit_try_catch/198 [ 20.807604] [ 20.807826] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 20.807947] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.807983] Hardware name: linux,dummy-virt (DT) [ 20.808025] Call trace: [ 20.808055] dump_backtrace+0x9c/0x128 [ 20.808122] show_stack+0x20/0x38 [ 20.808165] dump_stack_lvl+0x8c/0xd0 [ 20.808218] print_report+0x118/0x5f0 [ 20.808278] kasan_report_invalid_free+0xc0/0xe8 [ 20.808327] check_slab_allocation+0xfc/0x108 [ 20.808372] __kasan_slab_pre_free+0x2c/0x48 [ 20.808417] kmem_cache_free+0xf0/0x460 [ 20.808462] kmem_cache_invalid_free+0x190/0x3d8 [ 20.808512] kunit_try_run_case+0x170/0x3f0 [ 20.808560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.808612] kthread+0x24c/0x2d0 [ 20.808657] ret_from_fork+0x10/0x20 [ 20.808707] [ 20.813111] Allocated by task 198: [ 20.813691] kasan_save_stack+0x3c/0x68 [ 20.814113] kasan_save_track+0x20/0x40 [ 20.814322] kasan_save_alloc_info+0x40/0x58 [ 20.814700] __kasan_slab_alloc+0xa8/0xb0 [ 20.814926] kmem_cache_alloc_noprof+0xf8/0x300 [ 20.815233] kmem_cache_invalid_free+0x130/0x3d8 [ 20.815608] kunit_try_run_case+0x170/0x3f0 [ 20.815883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.816290] kthread+0x24c/0x2d0 [ 20.816517] ret_from_fork+0x10/0x20 [ 20.816758] [ 20.816959] The buggy address belongs to the object at fff00000c6cf6000 [ 20.816959] which belongs to the cache test_cache of size 200 [ 20.817517] The buggy address is located 1 bytes inside of [ 20.817517] 200-byte region [fff00000c6cf6000, fff00000c6cf60c8) [ 20.818471] [ 20.818707] The buggy address belongs to the physical page: [ 20.819086] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cf6 [ 20.819741] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.820010] page_type: f5(slab) [ 20.820262] raw: 0bfffe0000000000 fff00000c5a6fa00 dead000000000122 0000000000000000 [ 20.820769] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000 [ 20.821214] page dumped because: kasan: bad access detected [ 20.821649] [ 20.821778] Memory state around the buggy address: [ 20.822085] fff00000c6cf5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.822547] fff00000c6cf5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.822978] >fff00000c6cf6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.823583] ^ [ 20.823782] fff00000c6cf6080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 20.824206] fff00000c6cf6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.824524] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 20.768102] ================================================================== [ 20.768896] BUG: KASAN: double-free in kmem_cache_double_free+0x19c/0x3e0 [ 20.769379] Free of addr fff00000c6cf4000 by task kunit_try_catch/196 [ 20.769900] [ 20.770099] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 20.770223] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.770272] Hardware name: linux,dummy-virt (DT) [ 20.770316] Call trace: [ 20.770343] dump_backtrace+0x9c/0x128 [ 20.770395] show_stack+0x20/0x38 [ 20.770438] dump_stack_lvl+0x8c/0xd0 [ 20.770485] print_report+0x118/0x5f0 [ 20.770530] kasan_report_invalid_free+0xc0/0xe8 [ 20.770575] check_slab_allocation+0xd4/0x108 [ 20.770619] __kasan_slab_pre_free+0x2c/0x48 [ 20.770663] kmem_cache_free+0xf0/0x460 [ 20.770706] kmem_cache_double_free+0x19c/0x3e0 [ 20.770754] kunit_try_run_case+0x170/0x3f0 [ 20.770798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.770848] kthread+0x24c/0x2d0 [ 20.770891] ret_from_fork+0x10/0x20 [ 20.770938] [ 20.775907] Allocated by task 196: [ 20.776270] kasan_save_stack+0x3c/0x68 [ 20.776651] kasan_save_track+0x20/0x40 [ 20.776868] kasan_save_alloc_info+0x40/0x58 [ 20.777056] __kasan_slab_alloc+0xa8/0xb0 [ 20.777218] kmem_cache_alloc_noprof+0xf8/0x300 [ 20.777707] kmem_cache_double_free+0x130/0x3e0 [ 20.777997] kunit_try_run_case+0x170/0x3f0 [ 20.778269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.778718] kthread+0x24c/0x2d0 [ 20.778957] ret_from_fork+0x10/0x20 [ 20.779612] [ 20.779889] Freed by task 196: [ 20.780125] kasan_save_stack+0x3c/0x68 [ 20.780429] kasan_save_track+0x20/0x40 [ 20.780619] kasan_save_free_info+0x4c/0x78 [ 20.780907] __kasan_slab_free+0x6c/0x98 [ 20.781162] kmem_cache_free+0x118/0x460 [ 20.781421] kmem_cache_double_free+0x144/0x3e0 [ 20.781691] kunit_try_run_case+0x170/0x3f0 [ 20.781948] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.782403] kthread+0x24c/0x2d0 [ 20.782661] ret_from_fork+0x10/0x20 [ 20.782937] [ 20.783113] The buggy address belongs to the object at fff00000c6cf4000 [ 20.783113] which belongs to the cache test_cache of size 200 [ 20.783940] The buggy address is located 0 bytes inside of [ 20.783940] 200-byte region [fff00000c6cf4000, fff00000c6cf40c8) [ 20.784561] [ 20.784754] The buggy address belongs to the physical page: [ 20.784969] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cf4 [ 20.785426] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.785749] page_type: f5(slab) [ 20.786014] raw: 0bfffe0000000000 fff00000c5a6f8c0 dead000000000122 0000000000000000 [ 20.786426] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000 [ 20.786785] page dumped because: kasan: bad access detected [ 20.787385] [ 20.787501] Memory state around the buggy address: [ 20.787679] fff00000c6cf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.787922] fff00000c6cf3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.788148] >fff00000c6cf4000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.788381] ^ [ 20.788533] fff00000c6cf4080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 20.788880] fff00000c6cf4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.789199] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 20.715893] ================================================================== [ 20.716474] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x350/0x440 [ 20.716933] Read of size 1 at addr fff00000c6ccf0c8 by task kunit_try_catch/194 [ 20.717448] [ 20.717700] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 20.717814] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.717862] Hardware name: linux,dummy-virt (DT) [ 20.717916] Call trace: [ 20.717958] dump_backtrace+0x9c/0x128 [ 20.718027] show_stack+0x20/0x38 [ 20.718074] dump_stack_lvl+0x8c/0xd0 [ 20.718121] print_report+0x118/0x5f0 [ 20.718165] kasan_report+0xdc/0x128 [ 20.718205] __asan_report_load1_noabort+0x20/0x30 [ 20.718265] kmem_cache_oob+0x350/0x440 [ 20.718312] kunit_try_run_case+0x170/0x3f0 [ 20.718371] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.718445] kthread+0x24c/0x2d0 [ 20.718493] ret_from_fork+0x10/0x20 [ 20.718541] [ 20.722095] Allocated by task 194: [ 20.722398] kasan_save_stack+0x3c/0x68 [ 20.722789] kasan_save_track+0x20/0x40 [ 20.723020] kasan_save_alloc_info+0x40/0x58 [ 20.723581] __kasan_slab_alloc+0xa8/0xb0 [ 20.724111] kmem_cache_alloc_noprof+0xf8/0x300 [ 20.724549] kmem_cache_oob+0x130/0x440 [ 20.725227] kunit_try_run_case+0x170/0x3f0 [ 20.725523] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.725900] kthread+0x24c/0x2d0 [ 20.726200] ret_from_fork+0x10/0x20 [ 20.726452] [ 20.726682] The buggy address belongs to the object at fff00000c6ccf000 [ 20.726682] which belongs to the cache test_cache of size 200 [ 20.727948] The buggy address is located 0 bytes to the right of [ 20.727948] allocated 200-byte region [fff00000c6ccf000, fff00000c6ccf0c8) [ 20.728596] [ 20.728826] The buggy address belongs to the physical page: [ 20.729148] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106ccf [ 20.729638] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.730081] page_type: f5(slab) [ 20.730380] raw: 0bfffe0000000000 fff00000c5a6f780 dead000000000122 0000000000000000 [ 20.730852] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000 [ 20.731426] page dumped because: kasan: bad access detected [ 20.731823] [ 20.732029] Memory state around the buggy address: [ 20.732442] fff00000c6ccef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.733086] fff00000c6ccf000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.733537] >fff00000c6ccf080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 20.734146] ^ [ 20.734387] fff00000c6ccf100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.734627] fff00000c6ccf180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.734858] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 20.670792] ================================================================== [ 20.671825] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x498/0x4c0 [ 20.672119] Read of size 8 at addr fff00000c5c7fbc0 by task kunit_try_catch/187 [ 20.672383] [ 20.672515] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 20.672619] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.672653] Hardware name: linux,dummy-virt (DT) [ 20.672694] Call trace: [ 20.672720] dump_backtrace+0x9c/0x128 [ 20.672769] show_stack+0x20/0x38 [ 20.672809] dump_stack_lvl+0x8c/0xd0 [ 20.672857] print_report+0x118/0x5f0 [ 20.672898] kasan_report+0xdc/0x128 [ 20.672937] __asan_report_load8_noabort+0x20/0x30 [ 20.672986] workqueue_uaf+0x498/0x4c0 [ 20.673029] kunit_try_run_case+0x170/0x3f0 [ 20.673076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.673125] kthread+0x24c/0x2d0 [ 20.673168] ret_from_fork+0x10/0x20 [ 20.673214] [ 20.676966] Allocated by task 187: [ 20.677320] kasan_save_stack+0x3c/0x68 [ 20.677598] kasan_save_track+0x20/0x40 [ 20.677842] kasan_save_alloc_info+0x40/0x58 [ 20.678168] __kasan_kmalloc+0xd4/0xd8 [ 20.678407] __kmalloc_cache_noprof+0x154/0x320 [ 20.678710] workqueue_uaf+0x140/0x4c0 [ 20.678883] kunit_try_run_case+0x170/0x3f0 [ 20.679056] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.679468] kthread+0x24c/0x2d0 [ 20.680359] ret_from_fork+0x10/0x20 [ 20.680774] [ 20.680895] Freed by task 47: [ 20.681200] kasan_save_stack+0x3c/0x68 [ 20.681433] kasan_save_track+0x20/0x40 [ 20.681818] kasan_save_free_info+0x4c/0x78 [ 20.682020] __kasan_slab_free+0x6c/0x98 [ 20.682422] kfree+0x110/0x3b8 [ 20.682751] workqueue_uaf_work+0x18/0x30 [ 20.683004] process_one_work+0x530/0xfa8 [ 20.683304] worker_thread+0x610/0xf18 [ 20.683552] kthread+0x24c/0x2d0 [ 20.683795] ret_from_fork+0x10/0x20 [ 20.684052] [ 20.684190] Last potentially related work creation: [ 20.684640] kasan_save_stack+0x3c/0x68 [ 20.685033] __kasan_record_aux_stack+0xbc/0xe8 [ 20.685395] kasan_record_aux_stack_noalloc+0x14/0x20 [ 20.685768] __queue_work+0x654/0xfd8 [ 20.685948] queue_work_on+0xbc/0xf8 [ 20.686395] workqueue_uaf+0x218/0x4c0 [ 20.686804] kunit_try_run_case+0x170/0x3f0 [ 20.687325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.687676] kthread+0x24c/0x2d0 [ 20.688011] ret_from_fork+0x10/0x20 [ 20.688300] [ 20.688546] The buggy address belongs to the object at fff00000c5c7fbc0 [ 20.688546] which belongs to the cache kmalloc-32 of size 32 [ 20.689293] The buggy address is located 0 bytes inside of [ 20.689293] freed 32-byte region [fff00000c5c7fbc0, fff00000c5c7fbe0) [ 20.689665] [ 20.689785] The buggy address belongs to the physical page: [ 20.689982] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c7f [ 20.690276] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.690573] page_type: f5(slab) [ 20.690879] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 20.692222] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 20.692816] page dumped because: kasan: bad access detected [ 20.693207] [ 20.693437] Memory state around the buggy address: [ 20.693735] fff00000c5c7fa80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.694287] fff00000c5c7fb00: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc [ 20.694744] >fff00000c5c7fb80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 20.695289] ^ [ 20.695787] fff00000c5c7fc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.696379] fff00000c5c7fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.696648] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[ 20.345444] ================================================================== [ 20.346179] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 20.347351] Free of addr fff00000c5bb2280 by task kunit_try_catch/179 [ 20.347740] [ 20.347972] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 20.348153] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.348228] Hardware name: linux,dummy-virt (DT) [ 20.348323] Call trace: [ 20.348380] dump_backtrace+0x9c/0x128 [ 20.348480] show_stack+0x20/0x38 [ 20.348553] dump_stack_lvl+0x8c/0xd0 [ 20.348633] print_report+0x118/0x5f0 [ 20.348712] kasan_report_invalid_free+0xc0/0xe8 [ 20.348795] check_slab_allocation+0xd4/0x108 [ 20.348891] __kasan_slab_pre_free+0x2c/0x48 [ 20.348973] kfree+0xe8/0x3b8 [ 20.349052] kfree_sensitive+0x3c/0xb0 [ 20.349130] kmalloc_double_kzfree+0x174/0x318 [ 20.349216] kunit_try_run_case+0x170/0x3f0 [ 20.350580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.350693] kthread+0x24c/0x2d0 [ 20.350743] ret_from_fork+0x10/0x20 [ 20.350795] [ 20.356023] Allocated by task 179: [ 20.356491] kasan_save_stack+0x3c/0x68 [ 20.356998] kasan_save_track+0x20/0x40 [ 20.358788] kasan_save_alloc_info+0x40/0x58 [ 20.359705] __kasan_kmalloc+0xd4/0xd8 [ 20.360177] __kmalloc_cache_noprof+0x154/0x320 [ 20.360703] kmalloc_double_kzfree+0xb8/0x318 [ 20.361121] kunit_try_run_case+0x170/0x3f0 [ 20.361469] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.362010] kthread+0x24c/0x2d0 [ 20.362371] ret_from_fork+0x10/0x20 [ 20.362804] [ 20.363077] Freed by task 179: [ 20.363919] kasan_save_stack+0x3c/0x68 [ 20.364301] kasan_save_track+0x20/0x40 [ 20.364568] kasan_save_free_info+0x4c/0x78 [ 20.364883] __kasan_slab_free+0x6c/0x98 [ 20.365190] kfree+0x110/0x3b8 [ 20.365605] kfree_sensitive+0x80/0xb0 [ 20.366092] kmalloc_double_kzfree+0x120/0x318 [ 20.366626] kunit_try_run_case+0x170/0x3f0 [ 20.367060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.368127] kthread+0x24c/0x2d0 [ 20.368493] ret_from_fork+0x10/0x20 [ 20.368917] [ 20.369183] The buggy address belongs to the object at fff00000c5bb2280 [ 20.369183] which belongs to the cache kmalloc-16 of size 16 [ 20.370132] The buggy address is located 0 bytes inside of [ 20.370132] 16-byte region [fff00000c5bb2280, fff00000c5bb2290) [ 20.370970] [ 20.371651] The buggy address belongs to the physical page: [ 20.372119] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 20.372900] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.373577] page_type: f5(slab) [ 20.373832] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.374935] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 20.375742] page dumped because: kasan: bad access detected [ 20.376160] [ 20.376816] Memory state around the buggy address: [ 20.377181] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.378105] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 20.378792] >fff00000c5bb2280: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.379458] ^ [ 20.379934] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.380677] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.381533] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 20.310111] ================================================================== [ 20.311227] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x174/0x318 [ 20.311961] Read of size 1 at addr fff00000c5bb2280 by task kunit_try_catch/179 [ 20.313319] [ 20.313548] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 20.313749] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.313819] Hardware name: linux,dummy-virt (DT) [ 20.313892] Call trace: [ 20.313945] dump_backtrace+0x9c/0x128 [ 20.314068] show_stack+0x20/0x38 [ 20.314159] dump_stack_lvl+0x8c/0xd0 [ 20.314221] print_report+0x118/0x5f0 [ 20.314293] kasan_report+0xdc/0x128 [ 20.314334] __kasan_check_byte+0x54/0x70 [ 20.314379] kfree_sensitive+0x30/0xb0 [ 20.314421] kmalloc_double_kzfree+0x174/0x318 [ 20.314467] kunit_try_run_case+0x170/0x3f0 [ 20.314514] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.314564] kthread+0x24c/0x2d0 [ 20.314605] ret_from_fork+0x10/0x20 [ 20.314653] [ 20.320907] Allocated by task 179: [ 20.321410] kasan_save_stack+0x3c/0x68 [ 20.321950] kasan_save_track+0x20/0x40 [ 20.322331] kasan_save_alloc_info+0x40/0x58 [ 20.322772] __kasan_kmalloc+0xd4/0xd8 [ 20.323113] __kmalloc_cache_noprof+0x154/0x320 [ 20.323645] kmalloc_double_kzfree+0xb8/0x318 [ 20.324146] kunit_try_run_case+0x170/0x3f0 [ 20.324557] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.325037] kthread+0x24c/0x2d0 [ 20.325712] ret_from_fork+0x10/0x20 [ 20.326181] [ 20.326487] Freed by task 179: [ 20.326852] kasan_save_stack+0x3c/0x68 [ 20.327594] kasan_save_track+0x20/0x40 [ 20.327884] kasan_save_free_info+0x4c/0x78 [ 20.328152] __kasan_slab_free+0x6c/0x98 [ 20.328436] kfree+0x110/0x3b8 [ 20.329012] kfree_sensitive+0x80/0xb0 [ 20.329554] kmalloc_double_kzfree+0x120/0x318 [ 20.330103] kunit_try_run_case+0x170/0x3f0 [ 20.330527] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.331141] kthread+0x24c/0x2d0 [ 20.331508] ret_from_fork+0x10/0x20 [ 20.331937] [ 20.332204] The buggy address belongs to the object at fff00000c5bb2280 [ 20.332204] which belongs to the cache kmalloc-16 of size 16 [ 20.333178] The buggy address is located 0 bytes inside of [ 20.333178] freed 16-byte region [fff00000c5bb2280, fff00000c5bb2290) [ 20.334273] [ 20.334612] The buggy address belongs to the physical page: [ 20.334944] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 20.336008] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.336532] page_type: f5(slab) [ 20.336881] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.337682] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 20.338334] page dumped because: kasan: bad access detected [ 20.338888] [ 20.339335] Memory state around the buggy address: [ 20.340100] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.340676] fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 20.341291] >fff00000c5bb2280: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.341905] ^ [ 20.342273] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.342916] fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.343524] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 20.260418] ================================================================== [ 20.261168] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x408/0x478 [ 20.261935] Read of size 1 at addr fff00000c5cc29a8 by task kunit_try_catch/175 [ 20.262550] [ 20.262873] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 20.263189] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.263278] Hardware name: linux,dummy-virt (DT) [ 20.263360] Call trace: [ 20.263418] dump_backtrace+0x9c/0x128 [ 20.263545] show_stack+0x20/0x38 [ 20.263635] dump_stack_lvl+0x8c/0xd0 [ 20.263697] print_report+0x118/0x5f0 [ 20.263743] kasan_report+0xdc/0x128 [ 20.263783] __asan_report_load1_noabort+0x20/0x30 [ 20.263832] kmalloc_uaf2+0x408/0x478 [ 20.263876] kunit_try_run_case+0x170/0x3f0 [ 20.263921] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.263972] kthread+0x24c/0x2d0 [ 20.264014] ret_from_fork+0x10/0x20 [ 20.264060] [ 20.269929] Allocated by task 175: [ 20.270937] kasan_save_stack+0x3c/0x68 [ 20.271883] kasan_save_track+0x20/0x40 [ 20.272406] kasan_save_alloc_info+0x40/0x58 [ 20.272956] __kasan_kmalloc+0xd4/0xd8 [ 20.273448] __kmalloc_cache_noprof+0x154/0x320 [ 20.273953] kmalloc_uaf2+0xc4/0x478 [ 20.274361] kunit_try_run_case+0x170/0x3f0 [ 20.274834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.275718] kthread+0x24c/0x2d0 [ 20.276099] ret_from_fork+0x10/0x20 [ 20.276583] [ 20.276881] Freed by task 175: [ 20.277169] kasan_save_stack+0x3c/0x68 [ 20.277723] kasan_save_track+0x20/0x40 [ 20.278176] kasan_save_free_info+0x4c/0x78 [ 20.278704] __kasan_slab_free+0x6c/0x98 [ 20.279136] kfree+0x110/0x3b8 [ 20.279870] kmalloc_uaf2+0x138/0x478 [ 20.280273] kunit_try_run_case+0x170/0x3f0 [ 20.280630] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.281074] kthread+0x24c/0x2d0 [ 20.281471] ret_from_fork+0x10/0x20 [ 20.281828] [ 20.282099] The buggy address belongs to the object at fff00000c5cc2980 [ 20.282099] which belongs to the cache kmalloc-64 of size 64 [ 20.283677] The buggy address is located 40 bytes inside of [ 20.283677] freed 64-byte region [fff00000c5cc2980, fff00000c5cc29c0) [ 20.284610] [ 20.284898] The buggy address belongs to the physical page: [ 20.285401] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cc2 [ 20.286044] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.286664] page_type: f5(slab) [ 20.287028] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.287858] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 20.288511] page dumped because: kasan: bad access detected [ 20.289030] [ 20.289541] Memory state around the buggy address: [ 20.290079] fff00000c5cc2880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.290738] fff00000c5cc2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.291634] >fff00000c5cc2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.291990] ^ [ 20.292472] fff00000c5cc2a00: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 20.292997] fff00000c5cc2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.293712] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 20.218453] ================================================================== [ 20.219181] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x17c/0x328 [ 20.220584] Write of size 33 at addr fff00000c5cc2900 by task kunit_try_catch/173 [ 20.221715] [ 20.222311] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 20.222531] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.222602] Hardware name: linux,dummy-virt (DT) [ 20.222673] Call trace: [ 20.222718] dump_backtrace+0x9c/0x128 [ 20.222830] show_stack+0x20/0x38 [ 20.222874] dump_stack_lvl+0x8c/0xd0 [ 20.222924] print_report+0x118/0x5f0 [ 20.222968] kasan_report+0xdc/0x128 [ 20.223010] kasan_check_range+0x100/0x1a8 [ 20.223060] __asan_memset+0x34/0x78 [ 20.223139] kmalloc_uaf_memset+0x17c/0x328 [ 20.223222] kunit_try_run_case+0x170/0x3f0 [ 20.223452] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.223562] kthread+0x24c/0x2d0 [ 20.223640] ret_from_fork+0x10/0x20 [ 20.223733] [ 20.229494] Allocated by task 173: [ 20.229733] kasan_save_stack+0x3c/0x68 [ 20.229993] kasan_save_track+0x20/0x40 [ 20.230216] kasan_save_alloc_info+0x40/0x58 [ 20.230506] __kasan_kmalloc+0xd4/0xd8 [ 20.230749] __kmalloc_cache_noprof+0x154/0x320 [ 20.231577] kmalloc_uaf_memset+0xb8/0x328 [ 20.232562] kunit_try_run_case+0x170/0x3f0 [ 20.233016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.233691] kthread+0x24c/0x2d0 [ 20.234129] ret_from_fork+0x10/0x20 [ 20.234553] [ 20.234801] Freed by task 173: [ 20.235194] kasan_save_stack+0x3c/0x68 [ 20.235598] kasan_save_track+0x20/0x40 [ 20.235982] kasan_save_free_info+0x4c/0x78 [ 20.236348] __kasan_slab_free+0x6c/0x98 [ 20.236684] kfree+0x110/0x3b8 [ 20.236974] kmalloc_uaf_memset+0x120/0x328 [ 20.237704] kunit_try_run_case+0x170/0x3f0 [ 20.238161] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.238677] kthread+0x24c/0x2d0 [ 20.239008] ret_from_fork+0x10/0x20 [ 20.239333] [ 20.240051] The buggy address belongs to the object at fff00000c5cc2900 [ 20.240051] which belongs to the cache kmalloc-64 of size 64 [ 20.240836] The buggy address is located 0 bytes inside of [ 20.240836] freed 64-byte region [fff00000c5cc2900, fff00000c5cc2940) [ 20.241847] [ 20.242187] The buggy address belongs to the physical page: [ 20.242742] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cc2 [ 20.243773] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.244422] page_type: f5(slab) [ 20.244826] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.245485] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 20.246203] page dumped because: kasan: bad access detected [ 20.246727] [ 20.246978] Memory state around the buggy address: [ 20.247558] fff00000c5cc2800: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.248381] fff00000c5cc2880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.248979] >fff00000c5cc2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.249602] ^ [ 20.249982] fff00000c5cc2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.250585] fff00000c5cc2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.251213] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 20.176647] ================================================================== [ 20.177490] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x30c/0x340 [ 20.178249] Read of size 1 at addr fff00000c6451428 by task kunit_try_catch/171 [ 20.178745] [ 20.179074] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 20.179295] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.179352] Hardware name: linux,dummy-virt (DT) [ 20.179418] Call trace: [ 20.179460] dump_backtrace+0x9c/0x128 [ 20.179570] show_stack+0x20/0x38 [ 20.179659] dump_stack_lvl+0x8c/0xd0 [ 20.179763] print_report+0x118/0x5f0 [ 20.179861] kasan_report+0xdc/0x128 [ 20.179954] __asan_report_load1_noabort+0x20/0x30 [ 20.180062] kmalloc_uaf+0x30c/0x340 [ 20.180182] kunit_try_run_case+0x170/0x3f0 [ 20.180420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.180480] kthread+0x24c/0x2d0 [ 20.180526] ret_from_fork+0x10/0x20 [ 20.180576] [ 20.185386] Allocated by task 171: [ 20.185874] kasan_save_stack+0x3c/0x68 [ 20.186142] kasan_save_track+0x20/0x40 [ 20.186644] kasan_save_alloc_info+0x40/0x58 [ 20.187506] __kasan_kmalloc+0xd4/0xd8 [ 20.188190] __kmalloc_cache_noprof+0x154/0x320 [ 20.188724] kmalloc_uaf+0xb8/0x340 [ 20.189703] kunit_try_run_case+0x170/0x3f0 [ 20.190144] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.190767] kthread+0x24c/0x2d0 [ 20.191260] ret_from_fork+0x10/0x20 [ 20.191882] [ 20.192059] Freed by task 171: [ 20.192699] kasan_save_stack+0x3c/0x68 [ 20.193226] kasan_save_track+0x20/0x40 [ 20.193681] kasan_save_free_info+0x4c/0x78 [ 20.194201] __kasan_slab_free+0x6c/0x98 [ 20.194563] kfree+0x110/0x3b8 [ 20.194996] kmalloc_uaf+0x120/0x340 [ 20.195702] kunit_try_run_case+0x170/0x3f0 [ 20.196103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.196727] kthread+0x24c/0x2d0 [ 20.197105] ret_from_fork+0x10/0x20 [ 20.197587] [ 20.197858] The buggy address belongs to the object at fff00000c6451420 [ 20.197858] which belongs to the cache kmalloc-16 of size 16 [ 20.198815] The buggy address is located 8 bytes inside of [ 20.198815] freed 16-byte region [fff00000c6451420, fff00000c6451430) [ 20.200349] [ 20.200874] The buggy address belongs to the physical page: [ 20.201636] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106451 [ 20.202063] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.202781] page_type: f5(slab) [ 20.203100] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.204119] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 20.204847] page dumped because: kasan: bad access detected [ 20.205345] [ 20.205507] Memory state around the buggy address: [ 20.205777] fff00000c6451300: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc [ 20.206538] fff00000c6451380: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 20.207556] >fff00000c6451400: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 20.207907] ^ [ 20.208462] fff00000c6451480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.209183] fff00000c6451500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.209780] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 20.137370] ================================================================== [ 20.138085] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x15c/0x2f8 [ 20.138901] Read of size 64 at addr fff00000c6491804 by task kunit_try_catch/169 [ 20.140489] [ 20.140837] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 20.141040] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.141108] Hardware name: linux,dummy-virt (DT) [ 20.141188] Call trace: [ 20.141257] dump_backtrace+0x9c/0x128 [ 20.141388] show_stack+0x20/0x38 [ 20.141458] dump_stack_lvl+0x8c/0xd0 [ 20.141556] print_report+0x118/0x5f0 [ 20.141629] kasan_report+0xdc/0x128 [ 20.141691] kasan_check_range+0x100/0x1a8 [ 20.141749] __asan_memmove+0x3c/0x98 [ 20.141794] kmalloc_memmove_invalid_size+0x15c/0x2f8 [ 20.141843] kunit_try_run_case+0x170/0x3f0 [ 20.141888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.141936] kthread+0x24c/0x2d0 [ 20.141978] ret_from_fork+0x10/0x20 [ 20.142026] [ 20.146637] Allocated by task 169: [ 20.147051] kasan_save_stack+0x3c/0x68 [ 20.147521] kasan_save_track+0x20/0x40 [ 20.148286] kasan_save_alloc_info+0x40/0x58 [ 20.148849] __kasan_kmalloc+0xd4/0xd8 [ 20.149186] __kmalloc_cache_noprof+0x154/0x320 [ 20.149689] kmalloc_memmove_invalid_size+0xb8/0x2f8 [ 20.150246] kunit_try_run_case+0x170/0x3f0 [ 20.150734] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.151658] kthread+0x24c/0x2d0 [ 20.151985] ret_from_fork+0x10/0x20 [ 20.152220] [ 20.152380] The buggy address belongs to the object at fff00000c6491800 [ 20.152380] which belongs to the cache kmalloc-64 of size 64 [ 20.154090] The buggy address is located 4 bytes inside of [ 20.154090] allocated 64-byte region [fff00000c6491800, fff00000c6491840) [ 20.154960] [ 20.155563] The buggy address belongs to the physical page: [ 20.155968] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106491 [ 20.156645] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.157255] page_type: f5(slab) [ 20.157602] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.158169] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 20.158797] page dumped because: kasan: bad access detected [ 20.159383] [ 20.159560] Memory state around the buggy address: [ 20.160045] fff00000c6491700: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 20.160427] fff00000c6491780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.161986] >fff00000c6491800: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.163034] ^ [ 20.163818] fff00000c6491880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.164477] fff00000c6491900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.165033] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 20.092637] ================================================================== [ 20.093393] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x15c/0x2f8 [ 20.094222] Read of size 18446744073709551614 at addr fff00000c6491684 by task kunit_try_catch/167 [ 20.094857] [ 20.095130] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 20.095406] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.095999] Hardware name: linux,dummy-virt (DT) [ 20.096208] Call trace: [ 20.096289] dump_backtrace+0x9c/0x128 [ 20.096400] show_stack+0x20/0x38 [ 20.096471] dump_stack_lvl+0x8c/0xd0 [ 20.096554] print_report+0x118/0x5f0 [ 20.096626] kasan_report+0xdc/0x128 [ 20.096667] kasan_check_range+0x100/0x1a8 [ 20.096709] __asan_memmove+0x3c/0x98 [ 20.096750] kmalloc_memmove_negative_size+0x15c/0x2f8 [ 20.096798] kunit_try_run_case+0x170/0x3f0 [ 20.096842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.096890] kthread+0x24c/0x2d0 [ 20.096931] ret_from_fork+0x10/0x20 [ 20.096979] [ 20.102062] Allocated by task 167: [ 20.102310] kasan_save_stack+0x3c/0x68 [ 20.102666] kasan_save_track+0x20/0x40 [ 20.103000] kasan_save_alloc_info+0x40/0x58 [ 20.104181] __kasan_kmalloc+0xd4/0xd8 [ 20.105121] __kmalloc_cache_noprof+0x154/0x320 [ 20.105674] kmalloc_memmove_negative_size+0xb8/0x2f8 [ 20.106291] kunit_try_run_case+0x170/0x3f0 [ 20.106603] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.107488] kthread+0x24c/0x2d0 [ 20.108036] ret_from_fork+0x10/0x20 [ 20.108602] [ 20.108872] The buggy address belongs to the object at fff00000c6491680 [ 20.108872] which belongs to the cache kmalloc-64 of size 64 [ 20.109702] The buggy address is located 4 bytes inside of [ 20.109702] 64-byte region [fff00000c6491680, fff00000c64916c0) [ 20.110845] [ 20.111251] The buggy address belongs to the physical page: [ 20.111812] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106491 [ 20.112434] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.112940] page_type: f5(slab) [ 20.113765] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.114397] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 20.115672] page dumped because: kasan: bad access detected [ 20.115982] [ 20.116157] Memory state around the buggy address: [ 20.116700] fff00000c6491580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.117590] fff00000c6491600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.118377] >fff00000c6491680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.118975] ^ [ 20.119562] fff00000c6491700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.119925] fff00000c6491780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.120638] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 20.056288] ================================================================== [ 20.056971] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x15c/0x310 [ 20.057718] Write of size 16 at addr fff00000c6492769 by task kunit_try_catch/165 [ 20.058370] [ 20.058641] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 20.058839] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.058907] Hardware name: linux,dummy-virt (DT) [ 20.058977] Call trace: [ 20.059026] dump_backtrace+0x9c/0x128 [ 20.059190] show_stack+0x20/0x38 [ 20.059297] dump_stack_lvl+0x8c/0xd0 [ 20.059406] print_report+0x118/0x5f0 [ 20.059484] kasan_report+0xdc/0x128 [ 20.059550] kasan_check_range+0x100/0x1a8 [ 20.059628] __asan_memset+0x34/0x78 [ 20.059696] kmalloc_oob_memset_16+0x15c/0x310 [ 20.059786] kunit_try_run_case+0x170/0x3f0 [ 20.059866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.059954] kthread+0x24c/0x2d0 [ 20.060038] ret_from_fork+0x10/0x20 [ 20.060148] [ 20.065409] Allocated by task 165: [ 20.065787] kasan_save_stack+0x3c/0x68 [ 20.066136] kasan_save_track+0x20/0x40 [ 20.066687] kasan_save_alloc_info+0x40/0x58 [ 20.067339] __kasan_kmalloc+0xd4/0xd8 [ 20.067864] __kmalloc_cache_noprof+0x154/0x320 [ 20.068425] kmalloc_oob_memset_16+0xb0/0x310 [ 20.068852] kunit_try_run_case+0x170/0x3f0 [ 20.069388] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.069874] kthread+0x24c/0x2d0 [ 20.070346] ret_from_fork+0x10/0x20 [ 20.070751] [ 20.071071] The buggy address belongs to the object at fff00000c6492700 [ 20.071071] which belongs to the cache kmalloc-128 of size 128 [ 20.072124] The buggy address is located 105 bytes inside of [ 20.072124] allocated 120-byte region [fff00000c6492700, fff00000c6492778) [ 20.073118] [ 20.073469] The buggy address belongs to the physical page: [ 20.074030] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106492 [ 20.074738] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.075831] page_type: f5(slab) [ 20.076232] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.076982] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.077629] page dumped because: kasan: bad access detected [ 20.078125] [ 20.078301] Memory state around the buggy address: [ 20.078853] fff00000c6492600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.079700] fff00000c6492680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.080487] >fff00000c6492700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.081080] ^ [ 20.081710] fff00000c6492780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.082444] fff00000c6492800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.083049] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 20.017114] ================================================================== [ 20.017789] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x15c/0x310 [ 20.018857] Write of size 8 at addr fff00000c5cb7871 by task kunit_try_catch/163 [ 20.019770] [ 20.020008] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 20.020204] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.020278] Hardware name: linux,dummy-virt (DT) [ 20.020346] Call trace: [ 20.020392] dump_backtrace+0x9c/0x128 [ 20.020496] show_stack+0x20/0x38 [ 20.020582] dump_stack_lvl+0x8c/0xd0 [ 20.020663] print_report+0x118/0x5f0 [ 20.020741] kasan_report+0xdc/0x128 [ 20.020818] kasan_check_range+0x100/0x1a8 [ 20.020865] __asan_memset+0x34/0x78 [ 20.020907] kmalloc_oob_memset_8+0x15c/0x310 [ 20.020952] kunit_try_run_case+0x170/0x3f0 [ 20.020997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.021045] kthread+0x24c/0x2d0 [ 20.021087] ret_from_fork+0x10/0x20 [ 20.021134] [ 20.027923] Allocated by task 163: [ 20.028298] kasan_save_stack+0x3c/0x68 [ 20.028671] kasan_save_track+0x20/0x40 [ 20.028994] kasan_save_alloc_info+0x40/0x58 [ 20.029822] __kasan_kmalloc+0xd4/0xd8 [ 20.030366] __kmalloc_cache_noprof+0x154/0x320 [ 20.030816] kmalloc_oob_memset_8+0xb0/0x310 [ 20.031199] kunit_try_run_case+0x170/0x3f0 [ 20.031696] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.032972] kthread+0x24c/0x2d0 [ 20.033366] ret_from_fork+0x10/0x20 [ 20.033870] [ 20.034165] The buggy address belongs to the object at fff00000c5cb7800 [ 20.034165] which belongs to the cache kmalloc-128 of size 128 [ 20.035000] The buggy address is located 113 bytes inside of [ 20.035000] allocated 120-byte region [fff00000c5cb7800, fff00000c5cb7878) [ 20.035898] [ 20.036662] The buggy address belongs to the physical page: [ 20.036987] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cb7 [ 20.037829] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.038476] page_type: f5(slab) [ 20.038830] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.039662] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.040222] page dumped because: kasan: bad access detected [ 20.040642] [ 20.040870] Memory state around the buggy address: [ 20.042448] fff00000c5cb7700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 20.043630] fff00000c5cb7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.044378] >fff00000c5cb7800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.044896] ^ [ 20.045497] fff00000c5cb7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.046045] fff00000c5cb7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.046692] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 19.980855] ================================================================== [ 19.981658] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x15c/0x318 [ 19.982103] Write of size 4 at addr fff00000c5cb7575 by task kunit_try_catch/161 [ 19.983293] [ 19.983576] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 19.983766] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.983822] Hardware name: linux,dummy-virt (DT) [ 19.983899] Call trace: [ 19.983945] dump_backtrace+0x9c/0x128 [ 19.984055] show_stack+0x20/0x38 [ 19.984135] dump_stack_lvl+0x8c/0xd0 [ 19.984212] print_report+0x118/0x5f0 [ 19.984307] kasan_report+0xdc/0x128 [ 19.984387] kasan_check_range+0x100/0x1a8 [ 19.984477] __asan_memset+0x34/0x78 [ 19.984579] kmalloc_oob_memset_4+0x15c/0x318 [ 19.984683] kunit_try_run_case+0x170/0x3f0 [ 19.984772] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.984878] kthread+0x24c/0x2d0 [ 19.984971] ret_from_fork+0x10/0x20 [ 19.985049] [ 19.990618] Allocated by task 161: [ 19.991155] kasan_save_stack+0x3c/0x68 [ 19.991733] kasan_save_track+0x20/0x40 [ 19.992292] kasan_save_alloc_info+0x40/0x58 [ 19.992695] __kasan_kmalloc+0xd4/0xd8 [ 19.993302] __kmalloc_cache_noprof+0x154/0x320 [ 19.994123] kmalloc_oob_memset_4+0xb0/0x318 [ 19.994484] kunit_try_run_case+0x170/0x3f0 [ 19.994784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.995523] kthread+0x24c/0x2d0 [ 19.996290] ret_from_fork+0x10/0x20 [ 19.996686] [ 19.996891] The buggy address belongs to the object at fff00000c5cb7500 [ 19.996891] which belongs to the cache kmalloc-128 of size 128 [ 19.997848] The buggy address is located 117 bytes inside of [ 19.997848] allocated 120-byte region [fff00000c5cb7500, fff00000c5cb7578) [ 19.998827] [ 19.999135] The buggy address belongs to the physical page: [ 20.000113] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cb7 [ 20.001182] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.001858] page_type: f5(slab) [ 20.002181] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.003068] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.004085] page dumped because: kasan: bad access detected [ 20.004585] [ 20.004853] Memory state around the buggy address: [ 20.005119] fff00000c5cb7400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 20.005463] fff00000c5cb7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.005794] >fff00000c5cb7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.006116] ^ [ 20.007338] fff00000c5cb7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.008077] fff00000c5cb7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.008550] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 19.945640] ================================================================== [ 19.946327] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x15c/0x310 [ 19.947417] Write of size 2 at addr fff00000c5cb7277 by task kunit_try_catch/159 [ 19.947855] [ 19.948081] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 19.948265] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.948323] Hardware name: linux,dummy-virt (DT) [ 19.948387] Call trace: [ 19.948428] dump_backtrace+0x9c/0x128 [ 19.948514] show_stack+0x20/0x38 [ 19.948589] dump_stack_lvl+0x8c/0xd0 [ 19.949183] print_report+0x118/0x5f0 [ 19.949331] kasan_report+0xdc/0x128 [ 19.949423] kasan_check_range+0x100/0x1a8 [ 19.949527] __asan_memset+0x34/0x78 [ 19.949595] kmalloc_oob_memset_2+0x15c/0x310 [ 19.949642] kunit_try_run_case+0x170/0x3f0 [ 19.949692] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.949740] kthread+0x24c/0x2d0 [ 19.949782] ret_from_fork+0x10/0x20 [ 19.949829] [ 19.953466] Allocated by task 159: [ 19.953645] kasan_save_stack+0x3c/0x68 [ 19.953821] kasan_save_track+0x20/0x40 [ 19.953974] kasan_save_alloc_info+0x40/0x58 [ 19.954135] __kasan_kmalloc+0xd4/0xd8 [ 19.954410] __kmalloc_cache_noprof+0x154/0x320 [ 19.955362] kmalloc_oob_memset_2+0xb0/0x310 [ 19.955967] kunit_try_run_case+0x170/0x3f0 [ 19.956530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.957177] kthread+0x24c/0x2d0 [ 19.958179] ret_from_fork+0x10/0x20 [ 19.958694] [ 19.958967] The buggy address belongs to the object at fff00000c5cb7200 [ 19.958967] which belongs to the cache kmalloc-128 of size 128 [ 19.960215] The buggy address is located 119 bytes inside of [ 19.960215] allocated 120-byte region [fff00000c5cb7200, fff00000c5cb7278) [ 19.961460] [ 19.961777] The buggy address belongs to the physical page: [ 19.962391] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cb7 [ 19.963451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.964005] page_type: f5(slab) [ 19.964335] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.964948] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 19.965569] page dumped because: kasan: bad access detected [ 19.965991] [ 19.966228] Memory state around the buggy address: [ 19.966702] fff00000c5cb7100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 19.967211] fff00000c5cb7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.967910] >fff00000c5cb7200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.968495] ^ [ 19.969147] fff00000c5cb7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.970036] fff00000c5cb7300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.970542] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 19.906190] ================================================================== [ 19.906865] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x150/0x2e8 [ 19.907898] Write of size 128 at addr fff00000c6492500 by task kunit_try_catch/157 [ 19.908913] [ 19.909183] CPU: 1 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 19.909493] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.909564] Hardware name: linux,dummy-virt (DT) [ 19.909608] Call trace: [ 19.909636] dump_backtrace+0x9c/0x128 [ 19.909700] show_stack+0x20/0x38 [ 19.909740] dump_stack_lvl+0x8c/0xd0 [ 19.909787] print_report+0x118/0x5f0 [ 19.909829] kasan_report+0xdc/0x128 [ 19.909868] kasan_check_range+0x100/0x1a8 [ 19.909911] __asan_memset+0x34/0x78 [ 19.909951] kmalloc_oob_in_memset+0x150/0x2e8 [ 19.909997] kunit_try_run_case+0x170/0x3f0 [ 19.910042] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.910090] kthread+0x24c/0x2d0 [ 19.910131] ret_from_fork+0x10/0x20 [ 19.910177] [ 19.916789] Allocated by task 157: [ 19.917255] kasan_save_stack+0x3c/0x68 [ 19.917764] kasan_save_track+0x20/0x40 [ 19.918220] kasan_save_alloc_info+0x40/0x58 [ 19.918740] __kasan_kmalloc+0xd4/0xd8 [ 19.919233] __kmalloc_cache_noprof+0x154/0x320 [ 19.919780] kmalloc_oob_in_memset+0xb0/0x2e8 [ 19.920290] kunit_try_run_case+0x170/0x3f0 [ 19.920947] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.921454] kthread+0x24c/0x2d0 [ 19.921809] ret_from_fork+0x10/0x20 [ 19.922172] [ 19.922411] The buggy address belongs to the object at fff00000c6492500 [ 19.922411] which belongs to the cache kmalloc-128 of size 128 [ 19.924251] The buggy address is located 0 bytes inside of [ 19.924251] allocated 120-byte region [fff00000c6492500, fff00000c6492578) [ 19.925890] [ 19.926168] The buggy address belongs to the physical page: [ 19.926631] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106492 [ 19.927663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.928221] page_type: f5(slab) [ 19.928607] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.929182] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 19.929661] page dumped because: kasan: bad access detected [ 19.930252] [ 19.930529] Memory state around the buggy address: [ 19.930926] fff00000c6492400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.931532] fff00000c6492480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.932200] >fff00000c6492500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.932699] ^ [ 19.933641] fff00000c6492580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.934165] fff00000c6492600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.934718] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 19.859151] ================================================================== [ 19.860023] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 19.862370] Read of size 16 at addr fff00000c5bb2260 by task kunit_try_catch/155 [ 19.863755] [ 19.864548] CPU: 0 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 19.864763] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.864820] Hardware name: linux,dummy-virt (DT) [ 19.864889] Call trace: [ 19.864942] dump_backtrace+0x9c/0x128 [ 19.865055] show_stack+0x20/0x38 [ 19.865131] dump_stack_lvl+0x8c/0xd0 [ 19.865218] print_report+0x118/0x5f0 [ 19.865312] kasan_report+0xdc/0x128 [ 19.865379] __asan_report_load16_noabort+0x20/0x30 [ 19.865462] kmalloc_uaf_16+0x3bc/0x438 [ 19.865551] kunit_try_run_case+0x170/0x3f0 [ 19.865637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.865720] kthread+0x24c/0x2d0 [ 19.865796] ret_from_fork+0x10/0x20 [ 19.865885] [ 19.874636] Allocated by task 155: [ 19.875302] kasan_save_stack+0x3c/0x68 [ 19.876102] kasan_save_track+0x20/0x40 [ 19.876532] kasan_save_alloc_info+0x40/0x58 [ 19.877075] __kasan_kmalloc+0xd4/0xd8 [ 19.877557] __kmalloc_cache_noprof+0x154/0x320 [ 19.878145] kmalloc_uaf_16+0x144/0x438 [ 19.878571] kunit_try_run_case+0x170/0x3f0 [ 19.879001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.879558] kthread+0x24c/0x2d0 [ 19.880117] ret_from_fork+0x10/0x20 [ 19.880506] [ 19.880712] Freed by task 155: [ 19.881121] kasan_save_stack+0x3c/0x68 [ 19.881499] kasan_save_track+0x20/0x40 [ 19.881957] kasan_save_free_info+0x4c/0x78 [ 19.882441] __kasan_slab_free+0x6c/0x98 [ 19.882886] kfree+0x110/0x3b8 [ 19.883397] kmalloc_uaf_16+0x198/0x438 [ 19.883968] kunit_try_run_case+0x170/0x3f0 [ 19.884627] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.885180] kthread+0x24c/0x2d0 [ 19.885613] ret_from_fork+0x10/0x20 [ 19.886097] [ 19.886414] The buggy address belongs to the object at fff00000c5bb2260 [ 19.886414] which belongs to the cache kmalloc-16 of size 16 [ 19.887463] The buggy address is located 0 bytes inside of [ 19.887463] freed 16-byte region [fff00000c5bb2260, fff00000c5bb2270) [ 19.888227] [ 19.888440] The buggy address belongs to the physical page: [ 19.888772] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2 [ 19.889566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.890077] page_type: f5(slab) [ 19.890591] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.891286] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 19.892166] page dumped because: kasan: bad access detected [ 19.892485] [ 19.892986] Memory state around the buggy address: [ 19.893612] fff00000c5bb2100: 00 02 fc fc 00 05 fc fc fa fb fc fc 00 02 fc fc [ 19.894189] fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.894635] >fff00000c5bb2200: fa fb fc fc 00 04 fc fc 00 00 fc fc fa fb fc fc [ 19.895763] ^ [ 19.896292] fff00000c5bb2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.896831] fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.897340] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 19.822510] ================================================================== [ 19.823279] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a8/0x400 [ 19.824510] Write of size 16 at addr fff00000c64513e0 by task kunit_try_catch/153 [ 19.825158] [ 19.825516] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 19.825732] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.825803] Hardware name: linux,dummy-virt (DT) [ 19.825886] Call trace: [ 19.825944] dump_backtrace+0x9c/0x128 [ 19.826065] show_stack+0x20/0x38 [ 19.826155] dump_stack_lvl+0x8c/0xd0 [ 19.826231] print_report+0x118/0x5f0 [ 19.826351] kasan_report+0xdc/0x128 [ 19.826410] __asan_report_store16_noabort+0x20/0x30 [ 19.826460] kmalloc_oob_16+0x3a8/0x400 [ 19.826503] kunit_try_run_case+0x170/0x3f0 [ 19.826551] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.826599] kthread+0x24c/0x2d0 [ 19.826641] ret_from_fork+0x10/0x20 [ 19.826687] [ 19.831944] Allocated by task 153: [ 19.832174] kasan_save_stack+0x3c/0x68 [ 19.832442] kasan_save_track+0x20/0x40 [ 19.832669] kasan_save_alloc_info+0x40/0x58 [ 19.832908] __kasan_kmalloc+0xd4/0xd8 [ 19.833127] __kmalloc_cache_noprof+0x154/0x320 [ 19.834324] kmalloc_oob_16+0xb4/0x400 [ 19.834762] kunit_try_run_case+0x170/0x3f0 [ 19.835891] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.836339] kthread+0x24c/0x2d0 [ 19.836789] ret_from_fork+0x10/0x20 [ 19.837154] [ 19.837414] The buggy address belongs to the object at fff00000c64513e0 [ 19.837414] which belongs to the cache kmalloc-16 of size 16 [ 19.838235] The buggy address is located 0 bytes inside of [ 19.838235] allocated 13-byte region [fff00000c64513e0, fff00000c64513ed) [ 19.839056] [ 19.839768] The buggy address belongs to the physical page: [ 19.840102] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106451 [ 19.840505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.841190] page_type: f5(slab) [ 19.841640] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.842249] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 19.842965] page dumped because: kasan: bad access detected [ 19.843745] [ 19.843938] Memory state around the buggy address: [ 19.844142] fff00000c6451280: 00 00 fc fc 00 06 fc fc 00 06 fc fc 00 00 fc fc [ 19.844782] fff00000c6451300: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc [ 19.845531] >fff00000c6451380: fa fb fc fc 00 05 fc fc fa fb fc fc 00 05 fc fc [ 19.846129] ^ [ 19.846689] fff00000c6451400: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.847331] fff00000c6451480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.847984] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 19.777400] ================================================================== [ 19.777886] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c4/0x510 [ 19.778341] Read of size 1 at addr fff00000c6042800 by task kunit_try_catch/151 [ 19.778785] [ 19.779062] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 19.779288] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.779361] Hardware name: linux,dummy-virt (DT) [ 19.779441] Call trace: [ 19.779495] dump_backtrace+0x9c/0x128 [ 19.779612] show_stack+0x20/0x38 [ 19.779696] dump_stack_lvl+0x8c/0xd0 [ 19.779787] print_report+0x118/0x5f0 [ 19.779882] kasan_report+0xdc/0x128 [ 19.779968] __asan_report_load1_noabort+0x20/0x30 [ 19.780064] krealloc_uaf+0x4c4/0x510 [ 19.780158] kunit_try_run_case+0x170/0x3f0 [ 19.780574] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.780654] kthread+0x24c/0x2d0 [ 19.780728] ret_from_fork+0x10/0x20 [ 19.780801] [ 19.786881] Allocated by task 151: [ 19.787537] kasan_save_stack+0x3c/0x68 [ 19.788128] kasan_save_track+0x20/0x40 [ 19.788680] kasan_save_alloc_info+0x40/0x58 [ 19.789075] __kasan_kmalloc+0xd4/0xd8 [ 19.789390] __kmalloc_cache_noprof+0x154/0x320 [ 19.789783] krealloc_uaf+0xc8/0x510 [ 19.790105] kunit_try_run_case+0x170/0x3f0 [ 19.790480] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.790902] kthread+0x24c/0x2d0 [ 19.791511] ret_from_fork+0x10/0x20 [ 19.791948] [ 19.792168] Freed by task 151: [ 19.792594] kasan_save_stack+0x3c/0x68 [ 19.792982] kasan_save_track+0x20/0x40 [ 19.793412] kasan_save_free_info+0x4c/0x78 [ 19.793866] __kasan_slab_free+0x6c/0x98 [ 19.794322] kfree+0x110/0x3b8 [ 19.794746] krealloc_uaf+0x130/0x510 [ 19.795454] kunit_try_run_case+0x170/0x3f0 [ 19.795919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.796394] kthread+0x24c/0x2d0 [ 19.796695] ret_from_fork+0x10/0x20 [ 19.797009] [ 19.797841] The buggy address belongs to the object at fff00000c6042800 [ 19.797841] which belongs to the cache kmalloc-256 of size 256 [ 19.798796] The buggy address is located 0 bytes inside of [ 19.798796] freed 256-byte region [fff00000c6042800, fff00000c6042900) [ 19.800068] [ 19.800622] The buggy address belongs to the physical page: [ 19.801511] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106042 [ 19.802115] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.803268] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.803864] page_type: f5(slab) [ 19.804103] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.804486] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 19.804844] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.805197] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 19.806424] head: 0bfffe0000000001 ffffc1ffc3181081 ffffffffffffffff 0000000000000000 [ 19.807098] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 19.807953] page dumped because: kasan: bad access detected [ 19.808430] [ 19.808698] Memory state around the buggy address: [ 19.809177] fff00000c6042700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.809842] fff00000c6042780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.810542] >fff00000c6042800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.811601] ^ [ 19.811913] fff00000c6042880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.812459] fff00000c6042900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.813149] ================================================================== [ 19.738011] ================================================================== [ 19.738853] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x18c/0x510 [ 19.739609] Read of size 1 at addr fff00000c6042800 by task kunit_try_catch/151 [ 19.740747] [ 19.741124] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 19.741372] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.741447] Hardware name: linux,dummy-virt (DT) [ 19.741549] Call trace: [ 19.741627] dump_backtrace+0x9c/0x128 [ 19.741740] show_stack+0x20/0x38 [ 19.741789] dump_stack_lvl+0x8c/0xd0 [ 19.741838] print_report+0x118/0x5f0 [ 19.741880] kasan_report+0xdc/0x128 [ 19.741921] __kasan_check_byte+0x54/0x70 [ 19.741962] krealloc_noprof+0x48/0x1a0 [ 19.742006] krealloc_uaf+0x18c/0x510 [ 19.742048] kunit_try_run_case+0x170/0x3f0 [ 19.742092] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.742140] kthread+0x24c/0x2d0 [ 19.742181] ret_from_fork+0x10/0x20 [ 19.742228] [ 19.747938] Allocated by task 151: [ 19.748421] kasan_save_stack+0x3c/0x68 [ 19.748845] kasan_save_track+0x20/0x40 [ 19.749374] kasan_save_alloc_info+0x40/0x58 [ 19.749788] __kasan_kmalloc+0xd4/0xd8 [ 19.750287] __kmalloc_cache_noprof+0x154/0x320 [ 19.750863] krealloc_uaf+0xc8/0x510 [ 19.751601] kunit_try_run_case+0x170/0x3f0 [ 19.752003] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.752626] kthread+0x24c/0x2d0 [ 19.753048] ret_from_fork+0x10/0x20 [ 19.753466] [ 19.753826] Freed by task 151: [ 19.754301] kasan_save_stack+0x3c/0x68 [ 19.754753] kasan_save_track+0x20/0x40 [ 19.755419] kasan_save_free_info+0x4c/0x78 [ 19.755716] __kasan_slab_free+0x6c/0x98 [ 19.756228] kfree+0x110/0x3b8 [ 19.756659] krealloc_uaf+0x130/0x510 [ 19.757176] kunit_try_run_case+0x170/0x3f0 [ 19.757672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.758197] kthread+0x24c/0x2d0 [ 19.758608] ret_from_fork+0x10/0x20 [ 19.759073] [ 19.759640] The buggy address belongs to the object at fff00000c6042800 [ 19.759640] which belongs to the cache kmalloc-256 of size 256 [ 19.761403] The buggy address is located 0 bytes inside of [ 19.761403] freed 256-byte region [fff00000c6042800, fff00000c6042900) [ 19.762273] [ 19.762530] The buggy address belongs to the physical page: [ 19.762986] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106042 [ 19.763978] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.764790] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.765447] page_type: f5(slab) [ 19.765836] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.766688] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 19.767634] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.768340] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 19.768926] head: 0bfffe0000000001 ffffc1ffc3181081 ffffffffffffffff 0000000000000000 [ 19.769824] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 19.770529] page dumped because: kasan: bad access detected [ 19.771368] [ 19.771826] Memory state around the buggy address: [ 19.772474] fff00000c6042700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.772976] fff00000c6042780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.773767] >fff00000c6042800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.774355] ^ [ 19.774948] fff00000c6042880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.775776] fff00000c6042900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.776120] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 19.374197] ================================================================== [ 19.374957] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa2c/0xbc8 [ 19.376658] Write of size 1 at addr fff00000c44796c9 by task kunit_try_catch/145 [ 19.377226] [ 19.377577] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 19.377777] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.377836] Hardware name: linux,dummy-virt (DT) [ 19.377911] Call trace: [ 19.377963] dump_backtrace+0x9c/0x128 [ 19.378078] show_stack+0x20/0x38 [ 19.378158] dump_stack_lvl+0x8c/0xd0 [ 19.378269] print_report+0x118/0x5f0 [ 19.378344] kasan_report+0xdc/0x128 [ 19.378399] __asan_report_store1_noabort+0x20/0x30 [ 19.378448] krealloc_less_oob_helper+0xa2c/0xbc8 [ 19.378496] krealloc_less_oob+0x20/0x38 [ 19.378540] kunit_try_run_case+0x170/0x3f0 [ 19.378586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.378635] kthread+0x24c/0x2d0 [ 19.378677] ret_from_fork+0x10/0x20 [ 19.378724] [ 19.383813] Allocated by task 145: [ 19.384080] kasan_save_stack+0x3c/0x68 [ 19.384430] kasan_save_track+0x20/0x40 [ 19.385667] kasan_save_alloc_info+0x40/0x58 [ 19.386259] __kasan_krealloc+0x118/0x178 [ 19.386782] krealloc_noprof+0x10c/0x1a0 [ 19.387746] krealloc_less_oob_helper+0x170/0xbc8 [ 19.388119] krealloc_less_oob+0x20/0x38 [ 19.389203] kunit_try_run_case+0x170/0x3f0 [ 19.389739] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.390282] kthread+0x24c/0x2d0 [ 19.390620] ret_from_fork+0x10/0x20 [ 19.390991] [ 19.391278] The buggy address belongs to the object at fff00000c4479600 [ 19.391278] which belongs to the cache kmalloc-256 of size 256 [ 19.392081] The buggy address is located 0 bytes to the right of [ 19.392081] allocated 201-byte region [fff00000c4479600, fff00000c44796c9) [ 19.393135] [ 19.393969] The buggy address belongs to the physical page: [ 19.394611] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104478 [ 19.395666] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.395942] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.396179] page_type: f5(slab) [ 19.396362] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.396599] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 19.396829] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.397059] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 19.397407] head: 0bfffe0000000001 ffffc1ffc3111e01 ffffffffffffffff 0000000000000000 [ 19.398259] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 19.399067] page dumped because: kasan: bad access detected [ 19.400074] [ 19.400367] Memory state around the buggy address: [ 19.400874] fff00000c4479580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.402019] fff00000c4479600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.402794] >fff00000c4479680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 19.403814] ^ [ 19.404451] fff00000c4479700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.405012] fff00000c4479780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.405650] ================================================================== [ 19.511096] ================================================================== [ 19.512656] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa3c/0xbc8 [ 19.513291] Write of size 1 at addr fff00000c44796eb by task kunit_try_catch/145 [ 19.513937] [ 19.514194] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 19.514421] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.514489] Hardware name: linux,dummy-virt (DT) [ 19.514575] Call trace: [ 19.514631] dump_backtrace+0x9c/0x128 [ 19.514743] show_stack+0x20/0x38 [ 19.514828] dump_stack_lvl+0x8c/0xd0 [ 19.514919] print_report+0x118/0x5f0 [ 19.515015] kasan_report+0xdc/0x128 [ 19.515311] __asan_report_store1_noabort+0x20/0x30 [ 19.515434] krealloc_less_oob_helper+0xa3c/0xbc8 [ 19.515495] krealloc_less_oob+0x20/0x38 [ 19.515541] kunit_try_run_case+0x170/0x3f0 [ 19.515589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.515638] kthread+0x24c/0x2d0 [ 19.515680] ret_from_fork+0x10/0x20 [ 19.515727] [ 19.522821] Allocated by task 145: [ 19.523287] kasan_save_stack+0x3c/0x68 [ 19.523854] kasan_save_track+0x20/0x40 [ 19.524440] kasan_save_alloc_info+0x40/0x58 [ 19.524874] __kasan_krealloc+0x118/0x178 [ 19.525406] krealloc_noprof+0x10c/0x1a0 [ 19.525676] krealloc_less_oob_helper+0x170/0xbc8 [ 19.526269] krealloc_less_oob+0x20/0x38 [ 19.526749] kunit_try_run_case+0x170/0x3f0 [ 19.527498] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.528130] kthread+0x24c/0x2d0 [ 19.528449] ret_from_fork+0x10/0x20 [ 19.528937] [ 19.529202] The buggy address belongs to the object at fff00000c4479600 [ 19.529202] which belongs to the cache kmalloc-256 of size 256 [ 19.530636] The buggy address is located 34 bytes to the right of [ 19.530636] allocated 201-byte region [fff00000c4479600, fff00000c44796c9) [ 19.531738] [ 19.531908] The buggy address belongs to the physical page: [ 19.532181] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104478 [ 19.533164] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.533662] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.534206] page_type: f5(slab) [ 19.534646] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.535702] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 19.536123] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.536563] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 19.537392] head: 0bfffe0000000001 ffffc1ffc3111e01 ffffffffffffffff 0000000000000000 [ 19.538013] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 19.538729] page dumped because: kasan: bad access detected [ 19.539410] [ 19.539987] Memory state around the buggy address: [ 19.540463] fff00000c4479580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.541091] fff00000c4479600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.541736] >fff00000c4479680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 19.542337] ^ [ 19.542904] fff00000c4479700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.543596] fff00000c4479780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.544190] ================================================================== [ 19.441302] ================================================================== [ 19.441734] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa54/0xbc8 [ 19.442002] Write of size 1 at addr fff00000c44796da by task kunit_try_catch/145 [ 19.442230] [ 19.442572] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 19.442860] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.442940] Hardware name: linux,dummy-virt (DT) [ 19.443049] Call trace: [ 19.443101] dump_backtrace+0x9c/0x128 [ 19.443262] show_stack+0x20/0x38 [ 19.443399] dump_stack_lvl+0x8c/0xd0 [ 19.443503] print_report+0x118/0x5f0 [ 19.443604] kasan_report+0xdc/0x128 [ 19.443701] __asan_report_store1_noabort+0x20/0x30 [ 19.443809] krealloc_less_oob_helper+0xa54/0xbc8 [ 19.443903] krealloc_less_oob+0x20/0x38 [ 19.443990] kunit_try_run_case+0x170/0x3f0 [ 19.444539] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.444683] kthread+0x24c/0x2d0 [ 19.444787] ret_from_fork+0x10/0x20 [ 19.444897] [ 19.452212] Allocated by task 145: [ 19.452746] kasan_save_stack+0x3c/0x68 [ 19.453317] kasan_save_track+0x20/0x40 [ 19.453862] kasan_save_alloc_info+0x40/0x58 [ 19.454372] __kasan_krealloc+0x118/0x178 [ 19.454878] krealloc_noprof+0x10c/0x1a0 [ 19.455502] krealloc_less_oob_helper+0x170/0xbc8 [ 19.456396] krealloc_less_oob+0x20/0x38 [ 19.456715] kunit_try_run_case+0x170/0x3f0 [ 19.457049] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.457745] kthread+0x24c/0x2d0 [ 19.458100] ret_from_fork+0x10/0x20 [ 19.458521] [ 19.458783] The buggy address belongs to the object at fff00000c4479600 [ 19.458783] which belongs to the cache kmalloc-256 of size 256 [ 19.460147] The buggy address is located 17 bytes to the right of [ 19.460147] allocated 201-byte region [fff00000c4479600, fff00000c44796c9) [ 19.461050] [ 19.461358] The buggy address belongs to the physical page: [ 19.461895] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104478 [ 19.462561] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.463172] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.463842] page_type: f5(slab) [ 19.464709] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.465416] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 19.465988] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.466664] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 19.467557] head: 0bfffe0000000001 ffffc1ffc3111e01 ffffffffffffffff 0000000000000000 [ 19.468218] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 19.468773] page dumped because: kasan: bad access detected [ 19.470071] [ 19.470271] Memory state around the buggy address: [ 19.470545] fff00000c4479580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.471701] fff00000c4479600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.472284] >fff00000c4479680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 19.472881] ^ [ 19.473427] fff00000c4479700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.474036] fff00000c4479780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.474603] ================================================================== [ 19.408199] ================================================================== [ 19.408736] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb20/0xbc8 [ 19.409356] Write of size 1 at addr fff00000c44796d0 by task kunit_try_catch/145 [ 19.409815] [ 19.410141] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 19.410320] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.410381] Hardware name: linux,dummy-virt (DT) [ 19.410459] Call trace: [ 19.410518] dump_backtrace+0x9c/0x128 [ 19.410645] show_stack+0x20/0x38 [ 19.410734] dump_stack_lvl+0x8c/0xd0 [ 19.410826] print_report+0x118/0x5f0 [ 19.410921] kasan_report+0xdc/0x128 [ 19.410994] __asan_report_store1_noabort+0x20/0x30 [ 19.411045] krealloc_less_oob_helper+0xb20/0xbc8 [ 19.411139] krealloc_less_oob+0x20/0x38 [ 19.411215] kunit_try_run_case+0x170/0x3f0 [ 19.411322] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.411409] kthread+0x24c/0x2d0 [ 19.411484] ret_from_fork+0x10/0x20 [ 19.411555] [ 19.416475] Allocated by task 145: [ 19.416933] kasan_save_stack+0x3c/0x68 [ 19.418546] kasan_save_track+0x20/0x40 [ 19.418833] kasan_save_alloc_info+0x40/0x58 [ 19.419117] __kasan_krealloc+0x118/0x178 [ 19.419411] krealloc_noprof+0x10c/0x1a0 [ 19.419696] krealloc_less_oob_helper+0x170/0xbc8 [ 19.420008] krealloc_less_oob+0x20/0x38 [ 19.420377] kunit_try_run_case+0x170/0x3f0 [ 19.420736] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.421257] kthread+0x24c/0x2d0 [ 19.421548] ret_from_fork+0x10/0x20 [ 19.421815] [ 19.421987] The buggy address belongs to the object at fff00000c4479600 [ 19.421987] which belongs to the cache kmalloc-256 of size 256 [ 19.424110] The buggy address is located 7 bytes to the right of [ 19.424110] allocated 201-byte region [fff00000c4479600, fff00000c44796c9) [ 19.425735] [ 19.426040] The buggy address belongs to the physical page: [ 19.426669] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104478 [ 19.427290] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.427893] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.428879] page_type: f5(slab) [ 19.429146] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.429959] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 19.430639] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.431344] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 19.432816] head: 0bfffe0000000001 ffffc1ffc3111e01 ffffffffffffffff 0000000000000000 [ 19.433446] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 19.434012] page dumped because: kasan: bad access detected [ 19.434825] [ 19.435326] Memory state around the buggy address: [ 19.435626] fff00000c4479580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.436612] fff00000c4479600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.437329] >fff00000c4479680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 19.437978] ^ [ 19.438339] fff00000c4479700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.439135] fff00000c4479780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.440219] ================================================================== [ 19.707961] ================================================================== [ 19.708503] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa3c/0xbc8 [ 19.709965] Write of size 1 at addr fff00000c6c6e0eb by task kunit_try_catch/149 [ 19.710735] [ 19.711015] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 19.711261] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.711752] Hardware name: linux,dummy-virt (DT) [ 19.711854] Call trace: [ 19.711914] dump_backtrace+0x9c/0x128 [ 19.711997] show_stack+0x20/0x38 [ 19.712040] dump_stack_lvl+0x8c/0xd0 [ 19.712087] print_report+0x118/0x5f0 [ 19.712164] kasan_report+0xdc/0x128 [ 19.712206] __asan_report_store1_noabort+0x20/0x30 [ 19.712278] krealloc_less_oob_helper+0xa3c/0xbc8 [ 19.712331] krealloc_large_less_oob+0x20/0x38 [ 19.712377] kunit_try_run_case+0x170/0x3f0 [ 19.712423] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.712471] kthread+0x24c/0x2d0 [ 19.712514] ret_from_fork+0x10/0x20 [ 19.712562] [ 19.717295] The buggy address belongs to the physical page: [ 19.717590] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c6c [ 19.717971] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.718348] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.719301] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.719687] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.720032] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.720419] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.720902] head: 0bfffe0000000002 ffffc1ffc31b1b01 ffffffffffffffff 0000000000000000 [ 19.721583] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 19.722402] page dumped because: kasan: bad access detected [ 19.723038] [ 19.723859] Memory state around the buggy address: [ 19.724457] fff00000c6c6df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.724890] fff00000c6c6e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.725230] >fff00000c6c6e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 19.726287] ^ [ 19.726882] fff00000c6c6e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.728399] fff00000c6c6e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.728972] ================================================================== [ 19.615539] ================================================================== [ 19.616615] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa2c/0xbc8 [ 19.617418] Write of size 1 at addr fff00000c6c6e0c9 by task kunit_try_catch/149 [ 19.618042] [ 19.618300] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 19.618499] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.618562] Hardware name: linux,dummy-virt (DT) [ 19.618643] Call trace: [ 19.618701] dump_backtrace+0x9c/0x128 [ 19.618822] show_stack+0x20/0x38 [ 19.618914] dump_stack_lvl+0x8c/0xd0 [ 19.619017] print_report+0x118/0x5f0 [ 19.619287] kasan_report+0xdc/0x128 [ 19.619397] __asan_report_store1_noabort+0x20/0x30 [ 19.619502] krealloc_less_oob_helper+0xa2c/0xbc8 [ 19.619624] krealloc_large_less_oob+0x20/0x38 [ 19.619723] kunit_try_run_case+0x170/0x3f0 [ 19.619798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.619850] kthread+0x24c/0x2d0 [ 19.619894] ret_from_fork+0x10/0x20 [ 19.619944] [ 19.625596] The buggy address belongs to the physical page: [ 19.626103] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c6c [ 19.626750] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.627679] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.628347] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.628948] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.629634] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.630273] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.630908] head: 0bfffe0000000002 ffffc1ffc31b1b01 ffffffffffffffff 0000000000000000 [ 19.631657] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 19.632272] page dumped because: kasan: bad access detected [ 19.632734] [ 19.632964] Memory state around the buggy address: [ 19.633912] fff00000c6c6df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.634378] fff00000c6c6e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.635076] >fff00000c6c6e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 19.636028] ^ [ 19.636399] fff00000c6c6e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.637036] fff00000c6c6e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.637546] ================================================================== [ 19.684356] ================================================================== [ 19.684889] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa98/0xbc8 [ 19.685468] Write of size 1 at addr fff00000c6c6e0ea by task kunit_try_catch/149 [ 19.686179] [ 19.686514] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 19.686731] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.686800] Hardware name: linux,dummy-virt (DT) [ 19.686878] Call trace: [ 19.686933] dump_backtrace+0x9c/0x128 [ 19.687048] show_stack+0x20/0x38 [ 19.687136] dump_stack_lvl+0x8c/0xd0 [ 19.687226] print_report+0x118/0x5f0 [ 19.688047] kasan_report+0xdc/0x128 [ 19.688171] __asan_report_store1_noabort+0x20/0x30 [ 19.688300] krealloc_less_oob_helper+0xa98/0xbc8 [ 19.688414] krealloc_large_less_oob+0x20/0x38 [ 19.688512] kunit_try_run_case+0x170/0x3f0 [ 19.688598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.688650] kthread+0x24c/0x2d0 [ 19.688695] ret_from_fork+0x10/0x20 [ 19.688743] [ 19.693089] The buggy address belongs to the physical page: [ 19.694313] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c6c [ 19.695344] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.696132] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.696844] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.697482] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.698055] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.698645] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.699253] head: 0bfffe0000000002 ffffc1ffc31b1b01 ffffffffffffffff 0000000000000000 [ 19.700264] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 19.700875] page dumped because: kasan: bad access detected [ 19.701405] [ 19.701664] Memory state around the buggy address: [ 19.702096] fff00000c6c6df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.702792] fff00000c6c6e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.703674] >fff00000c6c6e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 19.704292] ^ [ 19.704969] fff00000c6c6e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.705571] fff00000c6c6e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.706136] ================================================================== [ 19.661608] ================================================================== [ 19.662214] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa54/0xbc8 [ 19.662839] Write of size 1 at addr fff00000c6c6e0da by task kunit_try_catch/149 [ 19.663660] [ 19.664003] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 19.664225] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.664310] Hardware name: linux,dummy-virt (DT) [ 19.664388] Call trace: [ 19.664447] dump_backtrace+0x9c/0x128 [ 19.664559] show_stack+0x20/0x38 [ 19.664649] dump_stack_lvl+0x8c/0xd0 [ 19.664745] print_report+0x118/0x5f0 [ 19.664807] kasan_report+0xdc/0x128 [ 19.664848] __asan_report_store1_noabort+0x20/0x30 [ 19.664896] krealloc_less_oob_helper+0xa54/0xbc8 [ 19.664943] krealloc_large_less_oob+0x20/0x38 [ 19.664989] kunit_try_run_case+0x170/0x3f0 [ 19.665034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.665083] kthread+0x24c/0x2d0 [ 19.665124] ret_from_fork+0x10/0x20 [ 19.665170] [ 19.671764] The buggy address belongs to the physical page: [ 19.672284] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c6c [ 19.672900] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.673577] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.674082] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.674427] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.675400] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.676063] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.676704] head: 0bfffe0000000002 ffffc1ffc31b1b01 ffffffffffffffff 0000000000000000 [ 19.677343] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 19.677943] page dumped because: kasan: bad access detected [ 19.678425] [ 19.678676] Memory state around the buggy address: [ 19.680111] fff00000c6c6df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.680619] fff00000c6c6e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.681105] >fff00000c6c6e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 19.681798] ^ [ 19.682420] fff00000c6c6e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.683004] fff00000c6c6e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.683700] ================================================================== [ 19.639122] ================================================================== [ 19.640302] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb20/0xbc8 [ 19.640736] Write of size 1 at addr fff00000c6c6e0d0 by task kunit_try_catch/149 [ 19.640977] [ 19.641100] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 19.641207] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.641260] Hardware name: linux,dummy-virt (DT) [ 19.641308] Call trace: [ 19.641335] dump_backtrace+0x9c/0x128 [ 19.641390] show_stack+0x20/0x38 [ 19.641430] dump_stack_lvl+0x8c/0xd0 [ 19.641476] print_report+0x118/0x5f0 [ 19.641538] kasan_report+0xdc/0x128 [ 19.641579] __asan_report_store1_noabort+0x20/0x30 [ 19.641626] krealloc_less_oob_helper+0xb20/0xbc8 [ 19.641673] krealloc_large_less_oob+0x20/0x38 [ 19.641719] kunit_try_run_case+0x170/0x3f0 [ 19.641764] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.641813] kthread+0x24c/0x2d0 [ 19.641856] ret_from_fork+0x10/0x20 [ 19.641903] [ 19.647130] The buggy address belongs to the physical page: [ 19.647750] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c6c [ 19.648586] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.649756] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.650576] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.651533] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.652052] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.652802] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.653348] head: 0bfffe0000000002 ffffc1ffc31b1b01 ffffffffffffffff 0000000000000000 [ 19.654039] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 19.654567] page dumped because: kasan: bad access detected [ 19.654988] [ 19.656187] Memory state around the buggy address: [ 19.656515] fff00000c6c6df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.657195] fff00000c6c6e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.657826] >fff00000c6c6e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 19.658376] ^ [ 19.658878] fff00000c6c6e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.659504] fff00000c6c6e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.660106] ================================================================== [ 19.476045] ================================================================== [ 19.477248] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa98/0xbc8 [ 19.477848] Write of size 1 at addr fff00000c44796ea by task kunit_try_catch/145 [ 19.478269] [ 19.478544] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 19.478769] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.478833] Hardware name: linux,dummy-virt (DT) [ 19.478912] Call trace: [ 19.478964] dump_backtrace+0x9c/0x128 [ 19.479074] show_stack+0x20/0x38 [ 19.479160] dump_stack_lvl+0x8c/0xd0 [ 19.479276] print_report+0x118/0x5f0 [ 19.479802] kasan_report+0xdc/0x128 [ 19.479891] __asan_report_store1_noabort+0x20/0x30 [ 19.479942] krealloc_less_oob_helper+0xa98/0xbc8 [ 19.479991] krealloc_less_oob+0x20/0x38 [ 19.480035] kunit_try_run_case+0x170/0x3f0 [ 19.480083] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.480131] kthread+0x24c/0x2d0 [ 19.480174] ret_from_fork+0x10/0x20 [ 19.480222] [ 19.486253] Allocated by task 145: [ 19.486723] kasan_save_stack+0x3c/0x68 [ 19.487076] kasan_save_track+0x20/0x40 [ 19.488023] kasan_save_alloc_info+0x40/0x58 [ 19.488456] __kasan_krealloc+0x118/0x178 [ 19.488864] krealloc_noprof+0x10c/0x1a0 [ 19.489802] krealloc_less_oob_helper+0x170/0xbc8 [ 19.490215] krealloc_less_oob+0x20/0x38 [ 19.490798] kunit_try_run_case+0x170/0x3f0 [ 19.491533] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.492133] kthread+0x24c/0x2d0 [ 19.492867] ret_from_fork+0x10/0x20 [ 19.493318] [ 19.493610] The buggy address belongs to the object at fff00000c4479600 [ 19.493610] which belongs to the cache kmalloc-256 of size 256 [ 19.494745] The buggy address is located 33 bytes to the right of [ 19.494745] allocated 201-byte region [fff00000c4479600, fff00000c44796c9) [ 19.496063] [ 19.496434] The buggy address belongs to the physical page: [ 19.496865] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104478 [ 19.497787] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.498384] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.499026] page_type: f5(slab) [ 19.499378] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.500034] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 19.500730] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.501858] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 19.502543] head: 0bfffe0000000001 ffffc1ffc3111e01 ffffffffffffffff 0000000000000000 [ 19.504030] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 19.504543] page dumped because: kasan: bad access detected [ 19.505174] [ 19.505464] Memory state around the buggy address: [ 19.505867] fff00000c4479580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.506508] fff00000c4479600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.507089] >fff00000c4479680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 19.507637] ^ [ 19.508144] fff00000c4479700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.509092] fff00000c4479780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.509525] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 19.292311] ================================================================== [ 19.293096] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x628/0x690 [ 19.294224] Write of size 1 at addr fff00000c44794eb by task kunit_try_catch/143 [ 19.295365] [ 19.295924] CPU: 0 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 19.296142] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.296201] Hardware name: linux,dummy-virt (DT) [ 19.296283] Call trace: [ 19.296330] dump_backtrace+0x9c/0x128 [ 19.296442] show_stack+0x20/0x38 [ 19.296489] dump_stack_lvl+0x8c/0xd0 [ 19.296537] print_report+0x118/0x5f0 [ 19.296580] kasan_report+0xdc/0x128 [ 19.296621] __asan_report_store1_noabort+0x20/0x30 [ 19.296668] krealloc_more_oob_helper+0x628/0x690 [ 19.296716] krealloc_more_oob+0x20/0x38 [ 19.296759] kunit_try_run_case+0x170/0x3f0 [ 19.296804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.296852] kthread+0x24c/0x2d0 [ 19.296894] ret_from_fork+0x10/0x20 [ 19.296942] [ 19.302559] Allocated by task 143: [ 19.302932] kasan_save_stack+0x3c/0x68 [ 19.303415] kasan_save_track+0x20/0x40 [ 19.303908] kasan_save_alloc_info+0x40/0x58 [ 19.304692] __kasan_krealloc+0x118/0x178 [ 19.305110] krealloc_noprof+0x10c/0x1a0 [ 19.305571] krealloc_more_oob_helper+0x170/0x690 [ 19.306024] krealloc_more_oob+0x20/0x38 [ 19.307530] kunit_try_run_case+0x170/0x3f0 [ 19.307951] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.308344] kthread+0x24c/0x2d0 [ 19.308783] ret_from_fork+0x10/0x20 [ 19.309166] [ 19.309445] The buggy address belongs to the object at fff00000c4479400 [ 19.309445] which belongs to the cache kmalloc-256 of size 256 [ 19.310205] The buggy address is located 0 bytes to the right of [ 19.310205] allocated 235-byte region [fff00000c4479400, fff00000c44794eb) [ 19.311198] [ 19.311676] The buggy address belongs to the physical page: [ 19.312658] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104478 [ 19.313252] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.314323] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.315117] page_type: f5(slab) [ 19.315424] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.316071] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 19.317115] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.317528] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 19.318289] head: 0bfffe0000000001 ffffc1ffc3111e01 ffffffffffffffff 0000000000000000 [ 19.318868] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 19.319566] page dumped because: kasan: bad access detected [ 19.320065] [ 19.320552] Memory state around the buggy address: [ 19.320867] fff00000c4479380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.321298] fff00000c4479400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.322295] >fff00000c4479480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 19.323027] ^ [ 19.323574] fff00000c4479500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.324386] fff00000c4479580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.324968] ================================================================== [ 19.577036] ================================================================== [ 19.577797] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5dc/0x690 [ 19.578345] Write of size 1 at addr fff00000c6c520f0 by task kunit_try_catch/147 [ 19.579001] [ 19.579780] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 19.580005] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.580070] Hardware name: linux,dummy-virt (DT) [ 19.580144] Call trace: [ 19.580201] dump_backtrace+0x9c/0x128 [ 19.580334] show_stack+0x20/0x38 [ 19.580416] dump_stack_lvl+0x8c/0xd0 [ 19.580507] print_report+0x118/0x5f0 [ 19.580596] kasan_report+0xdc/0x128 [ 19.580660] __asan_report_store1_noabort+0x20/0x30 [ 19.580710] krealloc_more_oob_helper+0x5dc/0x690 [ 19.580760] krealloc_large_more_oob+0x20/0x38 [ 19.580807] kunit_try_run_case+0x170/0x3f0 [ 19.580852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.580900] kthread+0x24c/0x2d0 [ 19.580941] ret_from_fork+0x10/0x20 [ 19.580989] [ 19.586748] The buggy address belongs to the physical page: [ 19.587373] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c50 [ 19.587922] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.589111] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.589814] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.590475] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.591972] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.592420] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.593036] head: 0bfffe0000000002 ffffc1ffc31b1401 ffffffffffffffff 0000000000000000 [ 19.593784] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 19.594367] page dumped because: kasan: bad access detected [ 19.594850] [ 19.596341] Memory state around the buggy address: [ 19.596764] fff00000c6c51f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.597160] fff00000c6c52000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.597573] >fff00000c6c52080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 19.597961] ^ [ 19.600105] fff00000c6c52100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.602555] fff00000c6c52180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.603993] ================================================================== [ 19.553368] ================================================================== [ 19.554316] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x628/0x690 [ 19.555038] Write of size 1 at addr fff00000c6c520eb by task kunit_try_catch/147 [ 19.556109] [ 19.556707] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 19.556952] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.557025] Hardware name: linux,dummy-virt (DT) [ 19.557089] Call trace: [ 19.557119] dump_backtrace+0x9c/0x128 [ 19.557185] show_stack+0x20/0x38 [ 19.557226] dump_stack_lvl+0x8c/0xd0 [ 19.557301] print_report+0x118/0x5f0 [ 19.557344] kasan_report+0xdc/0x128 [ 19.557385] __asan_report_store1_noabort+0x20/0x30 [ 19.557431] krealloc_more_oob_helper+0x628/0x690 [ 19.557490] krealloc_large_more_oob+0x20/0x38 [ 19.557543] kunit_try_run_case+0x170/0x3f0 [ 19.557589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.557638] kthread+0x24c/0x2d0 [ 19.557680] ret_from_fork+0x10/0x20 [ 19.557728] [ 19.563704] The buggy address belongs to the physical page: [ 19.564179] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c50 [ 19.564718] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.565263] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.565917] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.566584] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.567582] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.568419] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.568988] head: 0bfffe0000000002 ffffc1ffc31b1401 ffffffffffffffff 0000000000000000 [ 19.569563] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 19.570154] page dumped because: kasan: bad access detected [ 19.570955] [ 19.571537] Memory state around the buggy address: [ 19.571788] fff00000c6c51f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.572011] fff00000c6c52000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.572224] >fff00000c6c52080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 19.573133] ^ [ 19.573813] fff00000c6c52100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.574358] fff00000c6c52180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.574688] ================================================================== [ 19.327010] ================================================================== [ 19.327594] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5dc/0x690 [ 19.328503] Write of size 1 at addr fff00000c44794f0 by task kunit_try_catch/143 [ 19.328939] [ 19.329645] CPU: 0 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 19.329863] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.329926] Hardware name: linux,dummy-virt (DT) [ 19.330002] Call trace: [ 19.330052] dump_backtrace+0x9c/0x128 [ 19.330156] show_stack+0x20/0x38 [ 19.330233] dump_stack_lvl+0x8c/0xd0 [ 19.330334] print_report+0x118/0x5f0 [ 19.330422] kasan_report+0xdc/0x128 [ 19.330893] __asan_report_store1_noabort+0x20/0x30 [ 19.331013] krealloc_more_oob_helper+0x5dc/0x690 [ 19.331126] krealloc_more_oob+0x20/0x38 [ 19.331206] kunit_try_run_case+0x170/0x3f0 [ 19.331305] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.331390] kthread+0x24c/0x2d0 [ 19.331470] ret_from_fork+0x10/0x20 [ 19.331563] [ 19.340515] Allocated by task 143: [ 19.341333] kasan_save_stack+0x3c/0x68 [ 19.342776] kasan_save_track+0x20/0x40 [ 19.343589] kasan_save_alloc_info+0x40/0x58 [ 19.345101] __kasan_krealloc+0x118/0x178 [ 19.345683] krealloc_noprof+0x10c/0x1a0 [ 19.346044] krealloc_more_oob_helper+0x170/0x690 [ 19.346679] krealloc_more_oob+0x20/0x38 [ 19.347193] kunit_try_run_case+0x170/0x3f0 [ 19.347619] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.348660] kthread+0x24c/0x2d0 [ 19.348946] ret_from_fork+0x10/0x20 [ 19.349486] [ 19.349750] The buggy address belongs to the object at fff00000c4479400 [ 19.349750] which belongs to the cache kmalloc-256 of size 256 [ 19.350591] The buggy address is located 5 bytes to the right of [ 19.350591] allocated 235-byte region [fff00000c4479400, fff00000c44794eb) [ 19.352589] [ 19.352900] The buggy address belongs to the physical page: [ 19.353577] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104478 [ 19.354279] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.354990] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.355973] page_type: f5(slab) [ 19.356459] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.357197] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 19.357935] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.358648] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 19.359934] head: 0bfffe0000000001 ffffc1ffc3111e01 ffffffffffffffff 0000000000000000 [ 19.360336] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 19.360571] page dumped because: kasan: bad access detected [ 19.360750] [ 19.360850] Memory state around the buggy address: [ 19.361019] fff00000c4479380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.361236] fff00000c4479400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.361600] >fff00000c4479480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 19.362356] ^ [ 19.363017] fff00000c4479500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.364136] fff00000c4479580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.364756] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 19.262090] ================================================================== [ 19.263998] BUG: KASAN: use-after-free in page_alloc_uaf+0x33c/0x368 [ 19.264522] Read of size 1 at addr fff00000c6c40000 by task kunit_try_catch/141 [ 19.265069] [ 19.265399] CPU: 0 UID: 0 PID: 141 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 19.265613] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.265681] Hardware name: linux,dummy-virt (DT) [ 19.265764] Call trace: [ 19.265823] dump_backtrace+0x9c/0x128 [ 19.265941] show_stack+0x20/0x38 [ 19.266033] dump_stack_lvl+0x8c/0xd0 [ 19.266121] print_report+0x118/0x5f0 [ 19.266210] kasan_report+0xdc/0x128 [ 19.266309] __asan_report_load1_noabort+0x20/0x30 [ 19.266406] page_alloc_uaf+0x33c/0x368 [ 19.266496] kunit_try_run_case+0x170/0x3f0 [ 19.266545] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.266605] kthread+0x24c/0x2d0 [ 19.266659] ret_from_fork+0x10/0x20 [ 19.266707] [ 19.270986] The buggy address belongs to the physical page: [ 19.272583] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c40 [ 19.273505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.274097] page_type: f0(buddy) [ 19.274496] raw: 0bfffe0000000000 fff00000ff6163b0 fff00000ff6163b0 0000000000000000 [ 19.275186] raw: 0000000000000000 0000000000000006 00000000f0000000 0000000000000000 [ 19.276256] page dumped because: kasan: bad access detected [ 19.276692] [ 19.276919] Memory state around the buggy address: [ 19.277362] fff00000c6c3ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.277909] fff00000c6c3ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.278707] >fff00000c6c40000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.279503] ^ [ 19.279869] fff00000c6c40080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.280516] fff00000c6c40100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.281118] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[ 19.224292] ================================================================== [ 19.225100] BUG: KASAN: invalid-free in kfree+0x260/0x3b8 [ 19.226073] Free of addr fff00000c6b40001 by task kunit_try_catch/137 [ 19.226614] [ 19.226951] CPU: 1 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 19.227172] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.227249] Hardware name: linux,dummy-virt (DT) [ 19.227333] Call trace: [ 19.227383] dump_backtrace+0x9c/0x128 [ 19.227448] show_stack+0x20/0x38 [ 19.227489] dump_stack_lvl+0x8c/0xd0 [ 19.227565] print_report+0x118/0x5f0 [ 19.227612] kasan_report_invalid_free+0xc0/0xe8 [ 19.227656] __kasan_kfree_large+0x5c/0xa8 [ 19.227697] free_large_kmalloc+0x58/0x140 [ 19.227741] kfree+0x260/0x3b8 [ 19.227780] kmalloc_large_invalid_free+0x114/0x290 [ 19.227827] kunit_try_run_case+0x170/0x3f0 [ 19.227871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.227918] kthread+0x24c/0x2d0 [ 19.227960] ret_from_fork+0x10/0x20 [ 19.228007] [ 19.234101] The buggy address belongs to the physical page: [ 19.234608] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106b40 [ 19.235187] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.236303] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.236897] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.237643] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.238264] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.238993] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.239743] head: 0bfffe0000000002 ffffc1ffc31ad001 ffffffffffffffff 0000000000000000 [ 19.240645] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 19.241298] page dumped because: kasan: bad access detected [ 19.241763] [ 19.242059] Memory state around the buggy address: [ 19.242476] fff00000c6b3ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.244144] fff00000c6b3ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.244650] >fff00000c6b40000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.245267] ^ [ 19.245652] fff00000c6b40080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.246389] fff00000c6b40100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.247002] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 19.164955] ================================================================== [ 19.165856] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x28c/0x2d0 [ 19.166370] Write of size 1 at addr fff00000c6b8a00a by task kunit_try_catch/133 [ 19.166730] [ 19.166897] CPU: 0 UID: 0 PID: 133 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 19.167001] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.167032] Hardware name: linux,dummy-virt (DT) [ 19.167124] Call trace: [ 19.167176] dump_backtrace+0x9c/0x128 [ 19.167287] show_stack+0x20/0x38 [ 19.167363] dump_stack_lvl+0x8c/0xd0 [ 19.167465] print_report+0x118/0x5f0 [ 19.167562] kasan_report+0xdc/0x128 [ 19.167656] __asan_report_store1_noabort+0x20/0x30 [ 19.167743] kmalloc_large_oob_right+0x28c/0x2d0 [ 19.167826] kunit_try_run_case+0x170/0x3f0 [ 19.167915] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.168012] kthread+0x24c/0x2d0 [ 19.168084] ret_from_fork+0x10/0x20 [ 19.168166] [ 19.173987] The buggy address belongs to the physical page: [ 19.174371] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106b88 [ 19.174972] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.176449] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.177720] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.178266] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.179034] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.179748] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.180133] head: 0bfffe0000000002 ffffc1ffc31ae201 ffffffffffffffff 0000000000000000 [ 19.180484] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 19.180831] page dumped because: kasan: bad access detected [ 19.181101] [ 19.181827] Memory state around the buggy address: [ 19.182550] fff00000c6b89f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.183304] fff00000c6b89f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.184231] >fff00000c6b8a000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.184789] ^ [ 19.185212] fff00000c6b8a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.185680] fff00000c6b8a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.186173] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 19.125825] ================================================================== [ 19.126479] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2b8/0x308 [ 19.127849] Write of size 1 at addr fff00000c6c21f00 by task kunit_try_catch/131 [ 19.128831] [ 19.129205] CPU: 1 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 19.129452] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.129537] Hardware name: linux,dummy-virt (DT) [ 19.129609] Call trace: [ 19.129639] dump_backtrace+0x9c/0x128 [ 19.129708] show_stack+0x20/0x38 [ 19.129749] dump_stack_lvl+0x8c/0xd0 [ 19.129794] print_report+0x118/0x5f0 [ 19.129836] kasan_report+0xdc/0x128 [ 19.129875] __asan_report_store1_noabort+0x20/0x30 [ 19.129921] kmalloc_big_oob_right+0x2b8/0x308 [ 19.129967] kunit_try_run_case+0x170/0x3f0 [ 19.130011] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.130058] kthread+0x24c/0x2d0 [ 19.130099] ret_from_fork+0x10/0x20 [ 19.130145] [ 19.135746] Allocated by task 131: [ 19.136152] kasan_save_stack+0x3c/0x68 [ 19.136782] kasan_save_track+0x20/0x40 [ 19.137368] kasan_save_alloc_info+0x40/0x58 [ 19.137878] __kasan_kmalloc+0xd4/0xd8 [ 19.138291] __kmalloc_cache_noprof+0x154/0x320 [ 19.138672] kmalloc_big_oob_right+0xb8/0x308 [ 19.139051] kunit_try_run_case+0x170/0x3f0 [ 19.139891] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.140523] kthread+0x24c/0x2d0 [ 19.140936] ret_from_fork+0x10/0x20 [ 19.141396] [ 19.141701] The buggy address belongs to the object at fff00000c6c20000 [ 19.141701] which belongs to the cache kmalloc-8k of size 8192 [ 19.142660] The buggy address is located 0 bytes to the right of [ 19.142660] allocated 7936-byte region [fff00000c6c20000, fff00000c6c21f00) [ 19.143698] [ 19.143871] The buggy address belongs to the physical page: [ 19.144137] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c20 [ 19.144515] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.144864] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.145205] page_type: f5(slab) [ 19.146524] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 19.147424] raw: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000 [ 19.147812] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 19.148165] head: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000 [ 19.148635] head: 0bfffe0000000003 ffffc1ffc31b0801 ffffffffffffffff 0000000000000000 [ 19.149833] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000 [ 19.150475] page dumped because: kasan: bad access detected [ 19.150968] [ 19.151545] Memory state around the buggy address: [ 19.152061] fff00000c6c21e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.152656] fff00000c6c21e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.153400] >fff00000c6c21f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.154069] ^ [ 19.154414] fff00000c6c21f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.154964] fff00000c6c22000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.155460] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 19.084760] ================================================================== [ 19.085616] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x310/0x348 [ 19.086463] Read of size 1 at addr fff00000c6b25000 by task kunit_try_catch/129 [ 19.087545] [ 19.087920] CPU: 1 UID: 0 PID: 129 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 19.088381] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.088456] Hardware name: linux,dummy-virt (DT) [ 19.088543] Call trace: [ 19.088622] dump_backtrace+0x9c/0x128 [ 19.088748] show_stack+0x20/0x38 [ 19.088833] dump_stack_lvl+0x8c/0xd0 [ 19.088904] print_report+0x118/0x5f0 [ 19.088948] kasan_report+0xdc/0x128 [ 19.088989] __asan_report_load1_noabort+0x20/0x30 [ 19.089035] kmalloc_node_oob_right+0x310/0x348 [ 19.089082] kunit_try_run_case+0x170/0x3f0 [ 19.089127] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.089174] kthread+0x24c/0x2d0 [ 19.089216] ret_from_fork+0x10/0x20 [ 19.089289] [ 19.095313] Allocated by task 129: [ 19.095750] kasan_save_stack+0x3c/0x68 [ 19.096288] kasan_save_track+0x20/0x40 [ 19.096759] kasan_save_alloc_info+0x40/0x58 [ 19.097646] __kasan_kmalloc+0xd4/0xd8 [ 19.097993] __kmalloc_cache_node_noprof+0x174/0x348 [ 19.098410] kmalloc_node_oob_right+0xbc/0x348 [ 19.098954] kunit_try_run_case+0x170/0x3f0 [ 19.099569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.099904] kthread+0x24c/0x2d0 [ 19.100375] ret_from_fork+0x10/0x20 [ 19.100799] [ 19.101013] The buggy address belongs to the object at fff00000c6b24000 [ 19.101013] which belongs to the cache kmalloc-4k of size 4096 [ 19.102032] The buggy address is located 0 bytes to the right of [ 19.102032] allocated 4096-byte region [fff00000c6b24000, fff00000c6b25000) [ 19.102999] [ 19.103346] The buggy address belongs to the physical page: [ 19.104385] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106b20 [ 19.105436] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.106178] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.106780] page_type: f5(slab) [ 19.107138] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 19.107899] raw: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000 [ 19.108742] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 19.109337] head: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000 [ 19.110055] head: 0bfffe0000000003 ffffc1ffc31ac801 ffffffffffffffff 0000000000000000 [ 19.110709] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000 [ 19.111664] page dumped because: kasan: bad access detected [ 19.112339] [ 19.112497] Memory state around the buggy address: [ 19.112749] fff00000c6b24f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.113083] fff00000c6b24f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.113416] >fff00000c6b25000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.113743] ^ [ 19.113945] fff00000c6b25080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.115209] fff00000c6b25100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.116007] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 19.037414] ================================================================== [ 19.038054] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x308/0x340 [ 19.038757] Read of size 1 at addr fff00000c64513bf by task kunit_try_catch/127 [ 19.039311] [ 19.039628] CPU: 1 UID: 0 PID: 127 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 19.039841] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.039910] Hardware name: linux,dummy-virt (DT) [ 19.039986] Call trace: [ 19.040045] dump_backtrace+0x9c/0x128 [ 19.040159] show_stack+0x20/0x38 [ 19.040264] dump_stack_lvl+0x8c/0xd0 [ 19.040357] print_report+0x118/0x5f0 [ 19.040445] kasan_report+0xdc/0x128 [ 19.040535] __asan_report_load1_noabort+0x20/0x30 [ 19.040644] kmalloc_oob_left+0x308/0x340 [ 19.040748] kunit_try_run_case+0x170/0x3f0 [ 19.040828] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.040881] kthread+0x24c/0x2d0 [ 19.040925] ret_from_fork+0x10/0x20 [ 19.040973] [ 19.046341] Allocated by task 1: [ 19.046829] kasan_save_stack+0x3c/0x68 [ 19.047367] kasan_save_track+0x20/0x40 [ 19.047995] kasan_save_alloc_info+0x40/0x58 [ 19.048661] __kasan_kmalloc+0xd4/0xd8 [ 19.049113] __kmalloc_node_track_caller_noprof+0x194/0x438 [ 19.049648] kvasprintf+0xe0/0x180 [ 19.050090] __kthread_create_on_node+0x16c/0x348 [ 19.050573] kthread_create_on_node+0xe4/0x130 [ 19.050973] create_worker+0x380/0x6b8 [ 19.051807] alloc_unbound_pwq+0x62c/0x778 [ 19.052456] apply_wqattrs_prepare+0x1a0/0x6e0 [ 19.052912] apply_workqueue_attrs_locked+0x58/0xb8 [ 19.053591] alloc_workqueue+0x9ac/0x1440 [ 19.054160] latency_fsnotify_init+0x28/0x60 [ 19.054774] do_one_initcall+0xd0/0x608 [ 19.055623] kernel_init_freeable+0x3e0/0x8a0 [ 19.056010] kernel_init+0x2c/0x1f8 [ 19.056387] ret_from_fork+0x10/0x20 [ 19.057002] [ 19.057289] The buggy address belongs to the object at fff00000c64513a0 [ 19.057289] which belongs to the cache kmalloc-16 of size 16 [ 19.058216] The buggy address is located 18 bytes to the right of [ 19.058216] allocated 13-byte region [fff00000c64513a0, fff00000c64513ad) [ 19.059138] [ 19.059475] The buggy address belongs to the physical page: [ 19.060026] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106451 [ 19.060600] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.061099] page_type: f5(slab) [ 19.062854] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.063387] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 19.064141] page dumped because: kasan: bad access detected [ 19.064596] [ 19.064877] Memory state around the buggy address: [ 19.065404] fff00000c6451280: 00 00 fc fc 00 06 fc fc 00 06 fc fc 00 00 fc fc [ 19.066504] fff00000c6451300: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc [ 19.066911] >fff00000c6451380: fa fb fc fc 00 05 fc fc 00 07 fc fc fc fc fc fc [ 19.067304] ^ [ 19.067629] fff00000c6451400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.067993] fff00000c6451480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.069118] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 18.977257] ================================================================== [ 18.977796] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x528/0x5f0 [ 18.978361] Write of size 1 at addr fff00000c64acc78 by task kunit_try_catch/125 [ 18.978608] [ 18.978732] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 18.978842] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.978874] Hardware name: linux,dummy-virt (DT) [ 18.978914] Call trace: [ 18.978942] dump_backtrace+0x9c/0x128 [ 18.978996] show_stack+0x20/0x38 [ 18.979036] dump_stack_lvl+0x8c/0xd0 [ 18.979118] print_report+0x118/0x5f0 [ 18.979200] kasan_report+0xdc/0x128 [ 18.979298] __asan_report_store1_noabort+0x20/0x30 [ 18.979390] kmalloc_oob_right+0x528/0x5f0 [ 18.979484] kunit_try_run_case+0x170/0x3f0 [ 18.979589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.979696] kthread+0x24c/0x2d0 [ 18.979786] ret_from_fork+0x10/0x20 [ 18.979892] [ 18.985506] Allocated by task 125: [ 18.985973] kasan_save_stack+0x3c/0x68 [ 18.986386] kasan_save_track+0x20/0x40 [ 18.986872] kasan_save_alloc_info+0x40/0x58 [ 18.987284] __kasan_kmalloc+0xd4/0xd8 [ 18.987744] __kmalloc_cache_noprof+0x154/0x320 [ 18.988281] kmalloc_oob_right+0xb8/0x5f0 [ 18.988698] kunit_try_run_case+0x170/0x3f0 [ 18.989115] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.989625] kthread+0x24c/0x2d0 [ 18.990069] ret_from_fork+0x10/0x20 [ 18.990525] [ 18.990802] The buggy address belongs to the object at fff00000c64acc00 [ 18.990802] which belongs to the cache kmalloc-128 of size 128 [ 18.991662] The buggy address is located 5 bytes to the right of [ 18.991662] allocated 115-byte region [fff00000c64acc00, fff00000c64acc73) [ 18.992630] [ 18.992933] The buggy address belongs to the physical page: [ 18.993411] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064ac [ 18.994153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.994771] page_type: f5(slab) [ 18.995168] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.995868] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 18.996464] page dumped because: kasan: bad access detected [ 18.996905] [ 18.997167] Memory state around the buggy address: [ 18.997555] fff00000c64acb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.998255] fff00000c64acb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.998750] >fff00000c64acc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.999362] ^ [ 18.999963] fff00000c64acc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.000616] fff00000c64acd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.001265] ================================================================== [ 19.003418] ================================================================== [ 19.004069] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x588/0x5f0 [ 19.004788] Read of size 1 at addr fff00000c64acc80 by task kunit_try_catch/125 [ 19.005427] [ 19.005712] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 19.005932] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.005999] Hardware name: linux,dummy-virt (DT) [ 19.006087] Call trace: [ 19.006149] dump_backtrace+0x9c/0x128 [ 19.006274] show_stack+0x20/0x38 [ 19.006364] dump_stack_lvl+0x8c/0xd0 [ 19.006467] print_report+0x118/0x5f0 [ 19.006569] kasan_report+0xdc/0x128 [ 19.006652] __asan_report_load1_noabort+0x20/0x30 [ 19.006711] kmalloc_oob_right+0x588/0x5f0 [ 19.006756] kunit_try_run_case+0x170/0x3f0 [ 19.006803] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.006851] kthread+0x24c/0x2d0 [ 19.006892] ret_from_fork+0x10/0x20 [ 19.006939] [ 19.012068] Allocated by task 125: [ 19.012440] kasan_save_stack+0x3c/0x68 [ 19.012814] kasan_save_track+0x20/0x40 [ 19.013260] kasan_save_alloc_info+0x40/0x58 [ 19.013792] __kasan_kmalloc+0xd4/0xd8 [ 19.014210] __kmalloc_cache_noprof+0x154/0x320 [ 19.014704] kmalloc_oob_right+0xb8/0x5f0 [ 19.015151] kunit_try_run_case+0x170/0x3f0 [ 19.015649] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.016179] kthread+0x24c/0x2d0 [ 19.016510] ret_from_fork+0x10/0x20 [ 19.016945] [ 19.017226] The buggy address belongs to the object at fff00000c64acc00 [ 19.017226] which belongs to the cache kmalloc-128 of size 128 [ 19.017996] The buggy address is located 13 bytes to the right of [ 19.017996] allocated 115-byte region [fff00000c64acc00, fff00000c64acc73) [ 19.019020] [ 19.019331] The buggy address belongs to the physical page: [ 19.019725] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064ac [ 19.020447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.020915] page_type: f5(slab) [ 19.021377] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.022048] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 19.022693] page dumped because: kasan: bad access detected [ 19.023166] [ 19.023448] Memory state around the buggy address: [ 19.023862] fff00000c64acb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.024488] fff00000c64acc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.025185] >fff00000c64acc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.025616] ^ [ 19.026025] fff00000c64acd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.026665] fff00000c64acd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.027299] ================================================================== [ 18.940440] ================================================================== [ 18.941601] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x56c/0x5f0 [ 18.943446] Write of size 1 at addr fff00000c64acc73 by task kunit_try_catch/125 [ 18.945118] [ 18.946671] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G N 6.12.32-rc1 #1 [ 18.947410] Tainted: [N]=TEST [ 18.947497] Hardware name: linux,dummy-virt (DT) [ 18.947953] Call trace: [ 18.948007] dump_backtrace+0x9c/0x128 [ 18.948113] show_stack+0x20/0x38 [ 18.948157] dump_stack_lvl+0x8c/0xd0 [ 18.948208] print_report+0x118/0x5f0 [ 18.948294] kasan_report+0xdc/0x128 [ 18.948346] __asan_report_store1_noabort+0x20/0x30 [ 18.948393] kmalloc_oob_right+0x56c/0x5f0 [ 18.948438] kunit_try_run_case+0x170/0x3f0 [ 18.948485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.948533] kthread+0x24c/0x2d0 [ 18.948576] ret_from_fork+0x10/0x20 [ 18.948718] [ 18.954068] Allocated by task 125: [ 18.954690] kasan_save_stack+0x3c/0x68 [ 18.955212] kasan_save_track+0x20/0x40 [ 18.955648] kasan_save_alloc_info+0x40/0x58 [ 18.956057] __kasan_kmalloc+0xd4/0xd8 [ 18.956542] __kmalloc_cache_noprof+0x154/0x320 [ 18.957087] kmalloc_oob_right+0xb8/0x5f0 [ 18.957456] kunit_try_run_case+0x170/0x3f0 [ 18.957956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.958526] kthread+0x24c/0x2d0 [ 18.958961] ret_from_fork+0x10/0x20 [ 18.959430] [ 18.959800] The buggy address belongs to the object at fff00000c64acc00 [ 18.959800] which belongs to the cache kmalloc-128 of size 128 [ 18.960768] The buggy address is located 0 bytes to the right of [ 18.960768] allocated 115-byte region [fff00000c64acc00, fff00000c64acc73) [ 18.961772] [ 18.962286] The buggy address belongs to the physical page: [ 18.963172] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064ac [ 18.964082] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.965088] page_type: f5(slab) [ 18.966051] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.966624] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 18.967412] page dumped because: kasan: bad access detected [ 18.967902] [ 18.968196] Memory state around the buggy address: [ 18.969060] fff00000c64acb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.969671] fff00000c64acb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.970330] >fff00000c64acc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 18.970905] ^ [ 18.971576] fff00000c64acc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.972181] fff00000c64acd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.972859] ==================================================================