Date
June 7, 2025, 10:40 a.m.
Failure - log-parser-boot - internal-error-oops-oops-preempt-smp
[ 109.797396] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP [ 109.798316] Modules linked in: [ 109.799162] CPU: 1 UID: 0 PID: 616 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 109.800112] Tainted: [B]=BAD_PAGE, [N]=TEST [ 109.800682] Hardware name: linux,dummy-virt (DT) [ 109.801470] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 109.802400] pc : kunit_test_null_dereference+0x70/0x170 [ 109.803052] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 109.803938] sp : ffff8000833d7dc0 [ 109.804474] x29: ffff8000833d7e20 x28: 0000000000000000 x27: 0000000000000000 [ 109.805617] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000c4119a00 [ 109.806541] x23: ffffa652679b2730 x22: ffffa652679bb300 x21: fff00000c4119a08 [ 109.808305] x20: 1ffff0001067afb8 x19: ffff8000800879f0 x18: ffffc1ffc327fd40 [ 109.809412] x17: ffffa652669e205c x16: ffffa652669e1d9c x15: ffffa6526796f678 [ 109.810373] x14: 1ffe00001b4a3bc0 x13: 0000000000000000 x12: fffd8000182bbd9a [ 109.811346] x11: 1ffe0000182bbd99 x10: fffd8000182bbd99 x9 : ffffa652679b27b8 [ 109.812536] x8 : ffff8000833d7cb8 x7 : 0000000000000000 x6 : 0000000041b58ab3 [ 109.813505] x5 : ffff70001067afb8 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 109.814429] x2 : dfff800000000000 x1 : fff00000c15de400 x0 : ffff8000800879f0 [ 109.816085] Call trace: [ 109.816404] kunit_test_null_dereference+0x70/0x170 [ 109.816975] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 109.817519] kthread+0x24c/0x2d0 [ 109.818014] ret_from_fork+0x10/0x20 [ 109.819237] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 109.820476] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 54.949034] ================================================================== [ 54.949661] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 54.949661] [ 54.950528] Use-after-free read at 0x00000000bbeec1da (in kfence-#173): [ 54.951188] test_krealloc+0x51c/0x830 [ 54.951882] kunit_try_run_case+0x170/0x3f0 [ 54.952444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.953085] kthread+0x24c/0x2d0 [ 54.953519] ret_from_fork+0x10/0x20 [ 54.954070] [ 54.954409] kfence-#173: 0x00000000bbeec1da-0x000000000ade2ffa, size=32, cache=kmalloc-32 [ 54.954409] [ 54.955243] allocated by task 317 on cpu 1 at 54.948249s (0.006981s ago): [ 54.956112] test_alloc+0x29c/0x628 [ 54.956615] test_krealloc+0xc0/0x830 [ 54.957150] kunit_try_run_case+0x170/0x3f0 [ 54.957761] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.958441] kthread+0x24c/0x2d0 [ 54.958888] ret_from_fork+0x10/0x20 [ 54.959361] [ 54.959669] freed by task 317 on cpu 1 at 54.948519s (0.011136s ago): [ 54.960365] krealloc_noprof+0xa8/0x1a0 [ 54.960922] test_krealloc+0x1dc/0x830 [ 54.961475] kunit_try_run_case+0x170/0x3f0 [ 54.962024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.962728] kthread+0x24c/0x2d0 [ 54.963266] ret_from_fork+0x10/0x20 [ 54.963739] [ 54.964066] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 54.965100] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.965566] Hardware name: linux,dummy-virt (DT) [ 54.966151] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 54.856030] ================================================================== [ 54.856662] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 54.856662] [ 54.857570] Use-after-free read at 0x00000000d7c69ba7 (in kfence-#172): [ 54.858558] test_memcache_typesafe_by_rcu+0x280/0x560 [ 54.859579] kunit_try_run_case+0x170/0x3f0 [ 54.860406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.861044] kthread+0x24c/0x2d0 [ 54.861525] ret_from_fork+0x10/0x20 [ 54.862057] [ 54.862417] kfence-#172: 0x00000000d7c69ba7-0x000000001053e2fc, size=32, cache=test [ 54.862417] [ 54.863357] allocated by task 315 on cpu 0 at 54.844386s (0.018957s ago): [ 54.864141] test_alloc+0x230/0x628 [ 54.864617] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 54.865241] kunit_try_run_case+0x170/0x3f0 [ 54.865781] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.866411] kthread+0x24c/0x2d0 [ 54.866892] ret_from_fork+0x10/0x20 [ 54.867510] [ 54.867826] freed by task 315 on cpu 0 at 54.844528s (0.023284s ago): [ 54.868556] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 54.869192] kunit_try_run_case+0x170/0x3f0 [ 54.869752] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.870382] kthread+0x24c/0x2d0 [ 54.870883] ret_from_fork+0x10/0x20 [ 54.871329] [ 54.871694] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 54.872649] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.873216] Hardware name: linux,dummy-virt (DT) [ 54.873743] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 34.061063] ================================================================== [ 34.062180] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 34.062180] [ 34.063073] Invalid read at 0x00000000ad1b4288: [ 34.063833] test_invalid_access+0xdc/0x1f0 [ 34.064501] kunit_try_run_case+0x170/0x3f0 [ 34.065701] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.066324] kthread+0x24c/0x2d0 [ 34.066846] ret_from_fork+0x10/0x20 [ 34.068118] [ 34.068545] CPU: 1 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 34.069691] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.070292] Hardware name: linux,dummy-virt (DT) [ 34.070928] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 33.832353] ================================================================== [ 33.833024] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 33.833024] [ 33.833888] Corrupted memory at 0x00000000e491deac [ ! . . . . . . . . . . . . . . . ] (in kfence-#168): [ 33.836242] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 33.836870] kunit_try_run_case+0x170/0x3f0 [ 33.837535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.837815] kthread+0x24c/0x2d0 [ 33.838116] ret_from_fork+0x10/0x20 [ 33.838750] [ 33.839118] kfence-#168: 0x00000000a3edaf2c-0x000000009a42f602, size=73, cache=kmalloc-96 [ 33.839118] [ 33.840268] allocated by task 305 on cpu 0 at 33.831976s (0.008280s ago): [ 33.841064] test_alloc+0x29c/0x628 [ 33.841614] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 33.842289] kunit_try_run_case+0x170/0x3f0 [ 33.842799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.843574] kthread+0x24c/0x2d0 [ 33.844126] ret_from_fork+0x10/0x20 [ 33.844683] [ 33.845039] freed by task 305 on cpu 0 at 33.832199s (0.012828s ago): [ 33.845631] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 33.846238] kunit_try_run_case+0x170/0x3f0 [ 33.846646] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.847479] kthread+0x24c/0x2d0 [ 33.848877] ret_from_fork+0x10/0x20 [ 33.850105] [ 33.851105] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 33.851913] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.852331] Hardware name: linux,dummy-virt (DT) [ 33.852731] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 33.728278] ================================================================== [ 33.728863] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 33.728863] [ 33.729694] Out-of-bounds read at 0x00000000417de951 (105B right of kfence-#167): [ 33.730409] test_kmalloc_aligned_oob_read+0x238/0x468 [ 33.731083] kunit_try_run_case+0x170/0x3f0 [ 33.731661] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.732238] kthread+0x24c/0x2d0 [ 33.732878] ret_from_fork+0x10/0x20 [ 33.733481] [ 33.733765] kfence-#167: 0x000000003010bc0a-0x00000000deb59836, size=73, cache=kmalloc-96 [ 33.733765] [ 33.734785] allocated by task 303 on cpu 0 at 33.727955s (0.006818s ago): [ 33.735597] test_alloc+0x29c/0x628 [ 33.736153] test_kmalloc_aligned_oob_read+0x100/0x468 [ 33.736817] kunit_try_run_case+0x170/0x3f0 [ 33.737369] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.738032] kthread+0x24c/0x2d0 [ 33.738518] ret_from_fork+0x10/0x20 [ 33.739000] [ 33.739405] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 33.740210] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.740722] Hardware name: linux,dummy-virt (DT) [ 33.741345] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[ 30.088251] ================================================================== [ 30.089004] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 30.089004] [ 30.089814] Corrupted memory at 0x000000007272b330 [ ! ] (in kfence-#132): [ 30.090878] test_corruption+0x1d8/0x378 [ 30.091364] kunit_try_run_case+0x170/0x3f0 [ 30.091941] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.092635] kthread+0x24c/0x2d0 [ 30.093209] ret_from_fork+0x10/0x20 [ 30.093675] [ 30.094003] kfence-#132: 0x000000008a69b099-0x00000000e6f880c8, size=32, cache=test [ 30.094003] [ 30.094899] allocated by task 293 on cpu 0 at 30.088068s (0.006819s ago): [ 30.095817] test_alloc+0x230/0x628 [ 30.096337] test_corruption+0x198/0x378 [ 30.096845] kunit_try_run_case+0x170/0x3f0 [ 30.097456] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.098119] kthread+0x24c/0x2d0 [ 30.098598] ret_from_fork+0x10/0x20 [ 30.099101] [ 30.099427] freed by task 293 on cpu 0 at 30.088144s (0.011270s ago): [ 30.100276] test_corruption+0x1d8/0x378 [ 30.100816] kunit_try_run_case+0x170/0x3f0 [ 30.101347] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.102033] kthread+0x24c/0x2d0 [ 30.102530] ret_from_fork+0x10/0x20 [ 30.102980] [ 30.103336] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 30.104284] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.104818] Hardware name: linux,dummy-virt (DT) [ 30.105403] ================================================================== [ 29.984137] ================================================================== [ 29.984799] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 29.984799] [ 29.985612] Corrupted memory at 0x00000000a9aeeb8c [ ! . . . . . . . . . . . . . . . ] (in kfence-#131): [ 29.987921] test_corruption+0x120/0x378 [ 29.988436] kunit_try_run_case+0x170/0x3f0 [ 29.989004] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.989688] kthread+0x24c/0x2d0 [ 29.990155] ret_from_fork+0x10/0x20 [ 29.990629] [ 29.990974] kfence-#131: 0x00000000588180a2-0x00000000a6c8ee9b, size=32, cache=test [ 29.990974] [ 29.991819] allocated by task 293 on cpu 0 at 29.983937s (0.007869s ago): [ 29.992698] test_alloc+0x230/0x628 [ 29.993162] test_corruption+0xdc/0x378 [ 29.993714] kunit_try_run_case+0x170/0x3f0 [ 29.994263] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.994893] kthread+0x24c/0x2d0 [ 29.995435] ret_from_fork+0x10/0x20 [ 29.995951] [ 29.996264] freed by task 293 on cpu 0 at 29.984029s (0.012222s ago): [ 29.997069] test_corruption+0x120/0x378 [ 29.997596] kunit_try_run_case+0x170/0x3f0 [ 29.998155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.998784] kthread+0x24c/0x2d0 [ 29.999286] ret_from_fork+0x10/0x20 [ 29.999787] [ 30.000159] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 30.001023] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.001564] Hardware name: linux,dummy-virt (DT) [ 30.002049] ================================================================== [ 29.776380] ================================================================== [ 29.777094] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 29.777094] [ 29.777912] Corrupted memory at 0x00000000c504de6d [ ! . . . . . . . . . . . . . . . ] (in kfence-#129): [ 29.781063] test_corruption+0x278/0x378 [ 29.781629] kunit_try_run_case+0x170/0x3f0 [ 29.782251] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.782896] kthread+0x24c/0x2d0 [ 29.783460] ret_from_fork+0x10/0x20 [ 29.784031] [ 29.784420] kfence-#129: 0x00000000221fb4b9-0x000000001a23840d, size=32, cache=kmalloc-32 [ 29.784420] [ 29.785451] allocated by task 291 on cpu 0 at 29.775947s (0.009492s ago): [ 29.786291] test_alloc+0x29c/0x628 [ 29.786893] test_corruption+0xdc/0x378 [ 29.787467] kunit_try_run_case+0x170/0x3f0 [ 29.788131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.788890] kthread+0x24c/0x2d0 [ 29.789431] ret_from_fork+0x10/0x20 [ 29.790053] [ 29.790397] freed by task 291 on cpu 0 at 29.776108s (0.014276s ago): [ 29.791206] test_corruption+0x278/0x378 [ 29.791816] kunit_try_run_case+0x170/0x3f0 [ 29.792400] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.793092] kthread+0x24c/0x2d0 [ 29.793601] ret_from_fork+0x10/0x20 [ 29.794183] [ 29.794550] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 29.795577] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.796120] Hardware name: linux,dummy-virt (DT) [ 29.796681] ================================================================== [ 29.880341] ================================================================== [ 29.881004] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 29.881004] [ 29.881886] Corrupted memory at 0x00000000ca89be67 [ ! ] (in kfence-#130): [ 29.883139] test_corruption+0x284/0x378 [ 29.883842] kunit_try_run_case+0x170/0x3f0 [ 29.884469] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.885237] kthread+0x24c/0x2d0 [ 29.885747] ret_from_fork+0x10/0x20 [ 29.886203] [ 29.886560] kfence-#130: 0x000000007ef76b08-0x000000003317d2f3, size=32, cache=kmalloc-32 [ 29.886560] [ 29.887492] allocated by task 291 on cpu 0 at 29.879994s (0.007486s ago): [ 29.888224] test_alloc+0x29c/0x628 [ 29.888829] test_corruption+0x198/0x378 [ 29.889441] kunit_try_run_case+0x170/0x3f0 [ 29.890114] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.890776] kthread+0x24c/0x2d0 [ 29.891331] ret_from_fork+0x10/0x20 [ 29.891890] [ 29.892262] freed by task 291 on cpu 0 at 29.880105s (0.012145s ago): [ 29.893098] test_corruption+0x284/0x378 [ 29.893698] kunit_try_run_case+0x170/0x3f0 [ 29.894329] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.895013] kthread+0x24c/0x2d0 [ 29.895549] ret_from_fork+0x10/0x20 [ 29.896127] [ 29.896465] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 29.897507] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.898072] Hardware name: linux,dummy-virt (DT) [ 29.898654] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 29.672123] ================================================================== [ 29.672630] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 29.672630] [ 29.673369] Invalid free of 0x000000007d35d05f (in kfence-#128): [ 29.674084] test_invalid_addr_free+0xec/0x238 [ 29.674699] kunit_try_run_case+0x170/0x3f0 [ 29.675379] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.676216] kthread+0x24c/0x2d0 [ 29.676701] ret_from_fork+0x10/0x20 [ 29.677393] [ 29.677739] kfence-#128: 0x00000000d8eaf51b-0x00000000140c8b7e, size=32, cache=test [ 29.677739] [ 29.678643] allocated by task 289 on cpu 1 at 29.671930s (0.006701s ago): [ 29.679590] test_alloc+0x230/0x628 [ 29.680198] test_invalid_addr_free+0xd4/0x238 [ 29.680824] kunit_try_run_case+0x170/0x3f0 [ 29.681455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.682123] kthread+0x24c/0x2d0 [ 29.682686] ret_from_fork+0x10/0x20 [ 29.683208] [ 29.683605] CPU: 1 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 29.684676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.685237] Hardware name: linux,dummy-virt (DT) [ 29.685809] ================================================================== [ 29.568128] ================================================================== [ 29.568848] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 29.568848] [ 29.569677] Invalid free of 0x00000000fd8cd7a0 (in kfence-#127): [ 29.570375] test_invalid_addr_free+0x1ac/0x238 [ 29.570927] kunit_try_run_case+0x170/0x3f0 [ 29.571450] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.572123] kthread+0x24c/0x2d0 [ 29.572626] ret_from_fork+0x10/0x20 [ 29.573137] [ 29.573466] kfence-#127: 0x00000000c7952cc9-0x00000000748f4dd1, size=32, cache=kmalloc-32 [ 29.573466] [ 29.574354] allocated by task 287 on cpu 1 at 29.567948s (0.006394s ago): [ 29.575212] test_alloc+0x29c/0x628 [ 29.575662] test_invalid_addr_free+0xd4/0x238 [ 29.576278] kunit_try_run_case+0x170/0x3f0 [ 29.576780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.577397] kthread+0x24c/0x2d0 [ 29.577914] ret_from_fork+0x10/0x20 [ 29.578392] [ 29.578765] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 29.579719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.580229] Hardware name: linux,dummy-virt (DT) [ 29.580785] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[ 29.360297] ================================================================== [ 29.360944] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 29.360944] [ 29.361727] Invalid free of 0x0000000047a28b9b (in kfence-#125): [ 29.362481] test_double_free+0x1bc/0x238 [ 29.363147] kunit_try_run_case+0x170/0x3f0 [ 29.363823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.364422] kthread+0x24c/0x2d0 [ 29.365095] ret_from_fork+0x10/0x20 [ 29.365625] [ 29.366019] kfence-#125: 0x0000000047a28b9b-0x00000000579daf7c, size=32, cache=kmalloc-32 [ 29.366019] [ 29.367076] allocated by task 283 on cpu 1 at 29.359924s (0.007139s ago): [ 29.367866] test_alloc+0x29c/0x628 [ 29.368416] test_double_free+0xd4/0x238 [ 29.368980] kunit_try_run_case+0x170/0x3f0 [ 29.369575] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.370263] kthread+0x24c/0x2d0 [ 29.370765] ret_from_fork+0x10/0x20 [ 29.371298] [ 29.371678] freed by task 283 on cpu 1 at 29.360039s (0.011595s ago): [ 29.372441] test_double_free+0x1ac/0x238 [ 29.373058] kunit_try_run_case+0x170/0x3f0 [ 29.373463] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.374010] kthread+0x24c/0x2d0 [ 29.374500] ret_from_fork+0x10/0x20 [ 29.374914] [ 29.375214] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 29.375899] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.376468] Hardware name: linux,dummy-virt (DT) [ 29.377028] ================================================================== [ 29.464220] ================================================================== [ 29.464874] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 29.464874] [ 29.465675] Invalid free of 0x000000003411e921 (in kfence-#126): [ 29.466329] test_double_free+0x100/0x238 [ 29.466844] kunit_try_run_case+0x170/0x3f0 [ 29.467353] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.468095] kthread+0x24c/0x2d0 [ 29.468593] ret_from_fork+0x10/0x20 [ 29.469150] [ 29.469509] kfence-#126: 0x000000003411e921-0x000000004924a39b, size=32, cache=test [ 29.469509] [ 29.470364] allocated by task 285 on cpu 0 at 29.463919s (0.006432s ago): [ 29.471160] test_alloc+0x230/0x628 [ 29.471666] test_double_free+0xd4/0x238 [ 29.472223] kunit_try_run_case+0x170/0x3f0 [ 29.472781] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.473495] kthread+0x24c/0x2d0 [ 29.473940] ret_from_fork+0x10/0x20 [ 29.474398] [ 29.474720] freed by task 285 on cpu 0 at 29.464012s (0.010696s ago): [ 29.475556] test_double_free+0xf0/0x238 [ 29.476105] kunit_try_run_case+0x170/0x3f0 [ 29.476654] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.477294] kthread+0x24c/0x2d0 [ 29.477780] ret_from_fork+0x10/0x20 [ 29.478330] [ 29.478678] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 29.479606] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.480141] Hardware name: linux,dummy-virt (DT) [ 29.480666] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 29.256301] ================================================================== [ 29.256986] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 29.256986] [ 29.257859] Use-after-free read at 0x00000000afc7ef0e (in kfence-#124): [ 29.258517] test_use_after_free_read+0x114/0x248 [ 29.259350] kunit_try_run_case+0x170/0x3f0 [ 29.260115] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.260729] kthread+0x24c/0x2d0 [ 29.261330] ret_from_fork+0x10/0x20 [ 29.261895] [ 29.262216] kfence-#124: 0x00000000afc7ef0e-0x00000000d637a397, size=32, cache=test [ 29.262216] [ 29.263094] allocated by task 281 on cpu 1 at 29.256000s (0.007082s ago): [ 29.263871] test_alloc+0x230/0x628 [ 29.264386] test_use_after_free_read+0xd0/0x248 [ 29.265027] kunit_try_run_case+0x170/0x3f0 [ 29.265647] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.266219] kthread+0x24c/0x2d0 [ 29.266777] ret_from_fork+0x10/0x20 [ 29.267258] [ 29.267575] freed by task 281 on cpu 1 at 29.256081s (0.011481s ago): [ 29.268338] test_use_after_free_read+0xf0/0x248 [ 29.268974] kunit_try_run_case+0x170/0x3f0 [ 29.269553] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.270133] kthread+0x24c/0x2d0 [ 29.270628] ret_from_fork+0x10/0x20 [ 29.271149] [ 29.271508] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 29.272407] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.272927] Hardware name: linux,dummy-virt (DT) [ 29.273559] ================================================================== [ 29.152616] ================================================================== [ 29.153283] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 29.153283] [ 29.154193] Use-after-free read at 0x00000000168ec30a (in kfence-#123): [ 29.154882] test_use_after_free_read+0x114/0x248 [ 29.155609] kunit_try_run_case+0x170/0x3f0 [ 29.156228] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.156989] kthread+0x24c/0x2d0 [ 29.157553] ret_from_fork+0x10/0x20 [ 29.158207] [ 29.158542] kfence-#123: 0x00000000168ec30a-0x00000000e8bd9b7c, size=32, cache=kmalloc-32 [ 29.158542] [ 29.159485] allocated by task 279 on cpu 0 at 29.152272s (0.007200s ago): [ 29.160328] test_alloc+0x29c/0x628 [ 29.160934] test_use_after_free_read+0xd0/0x248 [ 29.161561] kunit_try_run_case+0x170/0x3f0 [ 29.162195] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.162871] kthread+0x24c/0x2d0 [ 29.163409] ret_from_fork+0x10/0x20 [ 29.163973] [ 29.164318] freed by task 279 on cpu 0 at 29.152382s (0.011924s ago): [ 29.165144] test_use_after_free_read+0x1c0/0x248 [ 29.165780] kunit_try_run_case+0x170/0x3f0 [ 29.166323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.167086] kthread+0x24c/0x2d0 [ 29.167601] ret_from_fork+0x10/0x20 [ 29.168171] [ 29.168575] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 29.169610] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.170170] Hardware name: linux,dummy-virt (DT) [ 29.170747] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 29.048310] ================================================================== [ 29.049046] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 29.049046] [ 29.049782] Out-of-bounds write at 0x00000000fc9eccce (1B left of kfence-#122): [ 29.050591] test_out_of_bounds_write+0x100/0x240 [ 29.051207] kunit_try_run_case+0x170/0x3f0 [ 29.051876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.052736] kthread+0x24c/0x2d0 [ 29.053400] ret_from_fork+0x10/0x20 [ 29.053933] [ 29.054328] kfence-#122: 0x000000009596f362-0x00000000a62b33bd, size=32, cache=test [ 29.054328] [ 29.055337] allocated by task 277 on cpu 0 at 29.048158s (0.007165s ago): [ 29.056174] test_alloc+0x230/0x628 [ 29.056738] test_out_of_bounds_write+0xc8/0x240 [ 29.057420] kunit_try_run_case+0x170/0x3f0 [ 29.058081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.058761] kthread+0x24c/0x2d0 [ 29.059336] ret_from_fork+0x10/0x20 [ 29.059885] [ 29.060310] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 29.061338] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.061877] Hardware name: linux,dummy-virt (DT) [ 29.062474] ================================================================== [ 28.528237] ================================================================== [ 28.529027] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 28.529027] [ 28.529805] Out-of-bounds write at 0x0000000095851409 (1B left of kfence-#117): [ 28.530633] test_out_of_bounds_write+0x100/0x240 [ 28.531298] kunit_try_run_case+0x170/0x3f0 [ 28.531853] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.532464] kthread+0x24c/0x2d0 [ 28.533001] ret_from_fork+0x10/0x20 [ 28.533520] [ 28.533841] kfence-#117: 0x0000000068332b06-0x00000000823c80ae, size=32, cache=kmalloc-32 [ 28.533841] [ 28.534730] allocated by task 275 on cpu 1 at 28.527997s (0.006720s ago): [ 28.535510] test_alloc+0x29c/0x628 [ 28.536027] test_out_of_bounds_write+0xc8/0x240 [ 28.536626] kunit_try_run_case+0x170/0x3f0 [ 28.537189] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.537819] kthread+0x24c/0x2d0 [ 28.538362] ret_from_fork+0x10/0x20 [ 28.538879] [ 28.539259] CPU: 1 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 28.540082] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.540637] Hardware name: linux,dummy-virt (DT) [ 28.541232] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 28.112194] ================================================================== [ 28.113086] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 28.113086] [ 28.113876] Out-of-bounds read at 0x00000000d35d9ce5 (1B left of kfence-#113): [ 28.114732] test_out_of_bounds_read+0x114/0x3e0 [ 28.115393] kunit_try_run_case+0x170/0x3f0 [ 28.115941] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.116619] kthread+0x24c/0x2d0 [ 28.117141] ret_from_fork+0x10/0x20 [ 28.117632] [ 28.117981] kfence-#113: 0x0000000051753030-0x00000000917ddf2a, size=32, cache=test [ 28.117981] [ 28.118898] allocated by task 273 on cpu 1 at 28.112039s (0.006846s ago): [ 28.119774] test_alloc+0x230/0x628 [ 28.120298] test_out_of_bounds_read+0xdc/0x3e0 [ 28.120882] kunit_try_run_case+0x170/0x3f0 [ 28.121444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.122173] kthread+0x24c/0x2d0 [ 28.122635] ret_from_fork+0x10/0x20 [ 28.123154] [ 28.123510] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 28.124403] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.124979] Hardware name: linux,dummy-virt (DT) [ 28.125569] ================================================================== [ 27.592726] ================================================================== [ 27.593526] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 27.593526] [ 27.594387] Out-of-bounds read at 0x000000002394b17b (1B left of kfence-#108): [ 27.595282] test_out_of_bounds_read+0x114/0x3e0 [ 27.595889] kunit_try_run_case+0x170/0x3f0 [ 27.596433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.597082] kthread+0x24c/0x2d0 [ 27.597556] ret_from_fork+0x10/0x20 [ 27.598050] [ 27.598383] kfence-#108: 0x000000006c7a8b0d-0x000000008dee2002, size=32, cache=kmalloc-32 [ 27.598383] [ 27.599412] allocated by task 271 on cpu 0 at 27.592216s (0.007183s ago): [ 27.600244] test_alloc+0x29c/0x628 [ 27.600734] test_out_of_bounds_read+0xdc/0x3e0 [ 27.601417] kunit_try_run_case+0x170/0x3f0 [ 27.601987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.602674] kthread+0x24c/0x2d0 [ 27.603235] ret_from_fork+0x10/0x20 [ 27.603893] [ 27.604271] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 27.605222] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.605696] Hardware name: linux,dummy-virt (DT) [ 27.606259] ================================================================== [ 28.216054] ================================================================== [ 28.217010] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 28.217010] [ 28.217933] Out-of-bounds read at 0x00000000c8be080f (32B right of kfence-#114): [ 28.218645] test_out_of_bounds_read+0x1c8/0x3e0 [ 28.219274] kunit_try_run_case+0x170/0x3f0 [ 28.219803] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.220523] kthread+0x24c/0x2d0 [ 28.221013] ret_from_fork+0x10/0x20 [ 28.221441] [ 28.221769] kfence-#114: 0x00000000ff60bf9b-0x0000000099f0a02d, size=32, cache=test [ 28.221769] [ 28.222828] allocated by task 273 on cpu 1 at 28.215920s (0.006896s ago): [ 28.223641] test_alloc+0x230/0x628 [ 28.224092] test_out_of_bounds_read+0x198/0x3e0 [ 28.224683] kunit_try_run_case+0x170/0x3f0 [ 28.225312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.225910] kthread+0x24c/0x2d0 [ 28.226430] ret_from_fork+0x10/0x20 [ 28.226998] [ 28.227340] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 28.228274] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.228808] Hardware name: linux,dummy-virt (DT) [ 28.229421] ================================================================== [ 27.696561] ================================================================== [ 27.697324] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 27.697324] [ 27.698178] Out-of-bounds read at 0x000000003de6f4fc (32B right of kfence-#109): [ 27.699057] test_out_of_bounds_read+0x1c8/0x3e0 [ 27.699787] kunit_try_run_case+0x170/0x3f0 [ 27.700306] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.700950] kthread+0x24c/0x2d0 [ 27.701507] ret_from_fork+0x10/0x20 [ 27.702058] [ 27.702411] kfence-#109: 0x00000000efef25f7-0x00000000dbe5f2cb, size=32, cache=kmalloc-32 [ 27.702411] [ 27.703337] allocated by task 271 on cpu 0 at 27.696159s (0.007166s ago): [ 27.704093] test_alloc+0x29c/0x628 [ 27.704593] test_out_of_bounds_read+0x198/0x3e0 [ 27.705150] kunit_try_run_case+0x170/0x3f0 [ 27.705692] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.706377] kthread+0x24c/0x2d0 [ 27.706813] ret_from_fork+0x10/0x20 [ 27.707349] [ 27.707690] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 27.708658] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.709156] Hardware name: linux,dummy-virt (DT) [ 27.709736] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-kfree_sensitive
[ 21.783283] ================================================================== [ 21.784029] BUG: KFENCE: invalid free in kfree_sensitive+0x80/0xb0 [ 21.784029] [ 21.785019] Invalid free of 0x00000000257a260f (in kfence-#81): [ 21.785794] kfree_sensitive+0x80/0xb0 [ 21.786506] kmalloc_double_kzfree+0x174/0x318 [ 21.787200] kunit_try_run_case+0x170/0x3f0 [ 21.788597] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.789148] kthread+0x24c/0x2d0 [ 21.789498] ret_from_fork+0x10/0x20 [ 21.789859] [ 21.790106] kfence-#81: 0x00000000257a260f-0x000000006aca8a8b, size=16, cache=kmalloc-16 [ 21.790106] [ 21.791405] allocated by task 180 on cpu 1 at 21.757367s (0.034027s ago): [ 21.792178] kmalloc_double_kzfree+0xb8/0x318 [ 21.792907] kunit_try_run_case+0x170/0x3f0 [ 21.793621] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.794341] kthread+0x24c/0x2d0 [ 21.794785] ret_from_fork+0x10/0x20 [ 21.795254] [ 21.795575] freed by task 180 on cpu 1 at 21.757455s (0.038108s ago): [ 21.796323] kfree_sensitive+0x80/0xb0 [ 21.796793] kmalloc_double_kzfree+0x120/0x318 [ 21.797512] kunit_try_run_case+0x170/0x3f0 [ 21.798025] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.798679] kthread+0x24c/0x2d0 [ 21.799150] ret_from_fork+0x10/0x20 [ 21.800609] [ 21.801027] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.801946] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.802497] Hardware name: linux,dummy-virt (DT) [ 21.803045] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-write-in-__memset
[ 21.758674] ================================================================== [ 21.760415] BUG: KFENCE: use-after-free write in __memset+0x84/0x188 [ 21.760415] [ 21.761326] Use-after-free write at 0x00000000257a260f (in kfence-#81): [ 21.762670] __memset+0x84/0x188 [ 21.763284] kmalloc_double_kzfree+0x174/0x318 [ 21.764125] kunit_try_run_case+0x170/0x3f0 [ 21.764708] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.765475] kthread+0x24c/0x2d0 [ 21.766053] ret_from_fork+0x10/0x20 [ 21.766665] [ 21.767489] kfence-#81: 0x00000000257a260f-0x000000006aca8a8b, size=16, cache=kmalloc-16 [ 21.767489] [ 21.768516] allocated by task 180 on cpu 1 at 21.757367s (0.011080s ago): [ 21.769566] kmalloc_double_kzfree+0xb8/0x318 [ 21.770206] kunit_try_run_case+0x170/0x3f0 [ 21.770806] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.771463] kthread+0x24c/0x2d0 [ 21.772140] ret_from_fork+0x10/0x20 [ 21.772746] [ 21.773375] freed by task 180 on cpu 1 at 21.757455s (0.015744s ago): [ 21.774244] kfree_sensitive+0x80/0xb0 [ 21.774748] kmalloc_double_kzfree+0x120/0x318 [ 21.775371] kunit_try_run_case+0x170/0x3f0 [ 21.776160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.776896] kthread+0x24c/0x2d0 [ 21.777322] ret_from_fork+0x10/0x20 [ 21.777786] [ 21.778232] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.779287] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.779843] Hardware name: linux,dummy-virt (DT) [ 21.781080] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 27.313818] ================================================================== [ 27.315084] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x50c/0x5b0 [ 27.316375] Read of size 1 at addr ffff8000801097f8 by task kunit_try_catch/257 [ 27.317706] [ 27.318006] CPU: 1 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 27.318187] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.318253] Hardware name: linux,dummy-virt (DT) [ 27.318330] Call trace: [ 27.318390] dump_backtrace+0x9c/0x128 [ 27.318512] show_stack+0x20/0x38 [ 27.318646] dump_stack_lvl+0x8c/0xd0 [ 27.318800] print_report+0x310/0x5f0 [ 27.318935] kasan_report+0xdc/0x128 [ 27.319092] __asan_report_load1_noabort+0x20/0x30 [ 27.319183] vmalloc_oob+0x50c/0x5b0 [ 27.319235] kunit_try_run_case+0x170/0x3f0 [ 27.319309] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.319391] kthread+0x24c/0x2d0 [ 27.319440] ret_from_fork+0x10/0x20 [ 27.319491] [ 27.325789] The buggy address belongs to the virtual mapping at [ 27.325789] [ffff800080109000, ffff80008010b000) created by: [ 27.325789] vmalloc_oob+0x98/0x5b0 [ 27.327362] [ 27.327780] The buggy address belongs to the physical page: [ 27.328394] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10428a [ 27.329389] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.330123] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 27.331114] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 27.331892] page dumped because: kasan: bad access detected [ 27.332649] [ 27.333054] Memory state around the buggy address: [ 27.333664] ffff800080109680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.334442] ffff800080109700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.335460] >ffff800080109780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 27.336191] ^ [ 27.337033] ffff800080109800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 27.337782] ffff800080109880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 27.338440] ================================================================== [ 27.288189] ================================================================== [ 27.289656] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x560/0x5b0 [ 27.290488] Read of size 1 at addr ffff8000801097f3 by task kunit_try_catch/257 [ 27.291134] [ 27.292415] CPU: 1 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 27.292525] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.292561] Hardware name: linux,dummy-virt (DT) [ 27.292603] Call trace: [ 27.292633] dump_backtrace+0x9c/0x128 [ 27.292692] show_stack+0x20/0x38 [ 27.292738] dump_stack_lvl+0x8c/0xd0 [ 27.292806] print_report+0x310/0x5f0 [ 27.292856] kasan_report+0xdc/0x128 [ 27.292902] __asan_report_load1_noabort+0x20/0x30 [ 27.292955] vmalloc_oob+0x560/0x5b0 [ 27.293036] kunit_try_run_case+0x170/0x3f0 [ 27.293093] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.293152] kthread+0x24c/0x2d0 [ 27.293202] ret_from_fork+0x10/0x20 [ 27.293252] [ 27.300702] The buggy address belongs to the virtual mapping at [ 27.300702] [ffff800080109000, ffff80008010b000) created by: [ 27.300702] vmalloc_oob+0x98/0x5b0 [ 27.302218] [ 27.302635] The buggy address belongs to the physical page: [ 27.303275] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10428a [ 27.304574] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.305395] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 27.306225] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 27.307026] page dumped because: kasan: bad access detected [ 27.307784] [ 27.308284] Memory state around the buggy address: [ 27.309415] ffff800080109680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.309999] ffff800080109700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.310327] >ffff800080109780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 27.310639] ^ [ 27.310941] ffff800080109800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 27.311284] ffff800080109880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 27.312317] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 24.986152] ================================================================== [ 24.987845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4210/0x49c8 [ 24.988611] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 24.989805] [ 24.990206] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.990475] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.990546] Hardware name: linux,dummy-virt (DT) [ 24.990593] Call trace: [ 24.990623] dump_backtrace+0x9c/0x128 [ 24.990726] show_stack+0x20/0x38 [ 24.990782] dump_stack_lvl+0x8c/0xd0 [ 24.990830] print_report+0x118/0x5f0 [ 24.990886] kasan_report+0xdc/0x128 [ 24.990934] __asan_report_load4_noabort+0x20/0x30 [ 24.991021] kasan_atomics_helper+0x4210/0x49c8 [ 24.991082] kasan_atomics+0x1a0/0x2e8 [ 24.991135] kunit_try_run_case+0x170/0x3f0 [ 24.991184] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.991241] kthread+0x24c/0x2d0 [ 24.991290] ret_from_fork+0x10/0x20 [ 24.991343] [ 24.999088] Allocated by task 253: [ 24.999755] kasan_save_stack+0x3c/0x68 [ 25.000279] kasan_save_track+0x20/0x40 [ 25.000773] kasan_save_alloc_info+0x40/0x58 [ 25.001398] __kasan_kmalloc+0xd4/0xd8 [ 25.001899] __kmalloc_cache_noprof+0x154/0x320 [ 25.002695] kasan_atomics+0xb8/0x2e8 [ 25.003224] kunit_try_run_case+0x170/0x3f0 [ 25.004060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.004650] kthread+0x24c/0x2d0 [ 25.005177] ret_from_fork+0x10/0x20 [ 25.005721] [ 25.006080] The buggy address belongs to the object at fff00000c4205580 [ 25.006080] which belongs to the cache kmalloc-64 of size 64 [ 25.007107] The buggy address is located 0 bytes to the right of [ 25.007107] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.008928] [ 25.009283] The buggy address belongs to the physical page: [ 25.009945] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.010741] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.011696] page_type: f5(slab) [ 25.012215] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.013033] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.013877] page dumped because: kasan: bad access detected [ 25.014649] [ 25.014992] Memory state around the buggy address: [ 25.015546] fff00000c4205480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 25.016587] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.017328] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.018086] ^ [ 25.018680] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.019698] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.020443] ================================================================== [ 26.408980] ================================================================== [ 26.409906] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf94/0x49c8 [ 26.410697] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.412022] [ 26.412441] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.412644] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.412728] Hardware name: linux,dummy-virt (DT) [ 26.412832] Call trace: [ 26.412893] dump_backtrace+0x9c/0x128 [ 26.412952] show_stack+0x20/0x38 [ 26.413034] dump_stack_lvl+0x8c/0xd0 [ 26.413085] print_report+0x118/0x5f0 [ 26.413134] kasan_report+0xdc/0x128 [ 26.413180] kasan_check_range+0x100/0x1a8 [ 26.413231] __kasan_check_write+0x20/0x30 [ 26.413281] kasan_atomics_helper+0xf94/0x49c8 [ 26.413338] kasan_atomics+0x1a0/0x2e8 [ 26.413389] kunit_try_run_case+0x170/0x3f0 [ 26.413441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.413497] kthread+0x24c/0x2d0 [ 26.413548] ret_from_fork+0x10/0x20 [ 26.413599] [ 26.420294] Allocated by task 253: [ 26.420761] kasan_save_stack+0x3c/0x68 [ 26.421350] kasan_save_track+0x20/0x40 [ 26.421866] kasan_save_alloc_info+0x40/0x58 [ 26.422410] __kasan_kmalloc+0xd4/0xd8 [ 26.422925] __kmalloc_cache_noprof+0x154/0x320 [ 26.423518] kasan_atomics+0xb8/0x2e8 [ 26.424030] kunit_try_run_case+0x170/0x3f0 [ 26.424526] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.425237] kthread+0x24c/0x2d0 [ 26.425642] ret_from_fork+0x10/0x20 [ 26.426267] [ 26.426596] The buggy address belongs to the object at fff00000c4205580 [ 26.426596] which belongs to the cache kmalloc-64 of size 64 [ 26.427696] The buggy address is located 0 bytes to the right of [ 26.427696] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.428940] [ 26.429330] The buggy address belongs to the physical page: [ 26.430038] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.430949] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.431689] page_type: f5(slab) [ 26.432179] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.432898] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.433580] page dumped because: kasan: bad access detected [ 26.434189] [ 26.434524] Memory state around the buggy address: [ 26.435070] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.435794] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.436574] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.437354] ^ [ 26.437885] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.438637] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.439363] ================================================================== [ 25.061040] ================================================================== [ 25.062164] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f8/0x49c8 [ 25.062836] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.063561] [ 25.063913] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.064132] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.064203] Hardware name: linux,dummy-virt (DT) [ 25.064281] Call trace: [ 25.064347] dump_backtrace+0x9c/0x128 [ 25.064454] show_stack+0x20/0x38 [ 25.064551] dump_stack_lvl+0x8c/0xd0 [ 25.064655] print_report+0x118/0x5f0 [ 25.064780] kasan_report+0xdc/0x128 [ 25.064902] kasan_check_range+0x100/0x1a8 [ 25.065077] __kasan_check_read+0x20/0x30 [ 25.065248] kasan_atomics_helper+0x1f8/0x49c8 [ 25.065411] kasan_atomics+0x1a0/0x2e8 [ 25.065533] kunit_try_run_case+0x170/0x3f0 [ 25.065649] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.065762] kthread+0x24c/0x2d0 [ 25.065817] ret_from_fork+0x10/0x20 [ 25.065867] [ 25.075991] Allocated by task 253: [ 25.076581] kasan_save_stack+0x3c/0x68 [ 25.077253] kasan_save_track+0x20/0x40 [ 25.077821] kasan_save_alloc_info+0x40/0x58 [ 25.078510] __kasan_kmalloc+0xd4/0xd8 [ 25.079108] __kmalloc_cache_noprof+0x154/0x320 [ 25.080121] kasan_atomics+0xb8/0x2e8 [ 25.080791] kunit_try_run_case+0x170/0x3f0 [ 25.081446] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.082213] kthread+0x24c/0x2d0 [ 25.082758] ret_from_fork+0x10/0x20 [ 25.083352] [ 25.083855] The buggy address belongs to the object at fff00000c4205580 [ 25.083855] which belongs to the cache kmalloc-64 of size 64 [ 25.085318] The buggy address is located 0 bytes to the right of [ 25.085318] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.086700] [ 25.087038] The buggy address belongs to the physical page: [ 25.088436] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.089418] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.090120] page_type: f5(slab) [ 25.090696] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.091903] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.092784] page dumped because: kasan: bad access detected [ 25.093425] [ 25.093774] Memory state around the buggy address: [ 25.094388] fff00000c4205480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 25.095203] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.096559] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.097449] ^ [ 25.097954] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.098638] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.099770] ================================================================== [ 25.216165] ================================================================== [ 25.216900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x344/0x49c8 [ 25.217573] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.218395] [ 25.218740] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.218946] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.219045] Hardware name: linux,dummy-virt (DT) [ 25.219135] Call trace: [ 25.219207] dump_backtrace+0x9c/0x128 [ 25.219334] show_stack+0x20/0x38 [ 25.219500] dump_stack_lvl+0x8c/0xd0 [ 25.219622] print_report+0x118/0x5f0 [ 25.219738] kasan_report+0xdc/0x128 [ 25.219858] kasan_check_range+0x100/0x1a8 [ 25.219995] __kasan_check_write+0x20/0x30 [ 25.220122] kasan_atomics_helper+0x344/0x49c8 [ 25.220243] kasan_atomics+0x1a0/0x2e8 [ 25.220404] kunit_try_run_case+0x170/0x3f0 [ 25.220522] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.220653] kthread+0x24c/0x2d0 [ 25.220777] ret_from_fork+0x10/0x20 [ 25.220895] [ 25.228095] Allocated by task 253: [ 25.228720] kasan_save_stack+0x3c/0x68 [ 25.229362] kasan_save_track+0x20/0x40 [ 25.229913] kasan_save_alloc_info+0x40/0x58 [ 25.230461] __kasan_kmalloc+0xd4/0xd8 [ 25.230891] __kmalloc_cache_noprof+0x154/0x320 [ 25.231575] kasan_atomics+0xb8/0x2e8 [ 25.232182] kunit_try_run_case+0x170/0x3f0 [ 25.232810] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.233432] kthread+0x24c/0x2d0 [ 25.233897] ret_from_fork+0x10/0x20 [ 25.234403] [ 25.234733] The buggy address belongs to the object at fff00000c4205580 [ 25.234733] which belongs to the cache kmalloc-64 of size 64 [ 25.235938] The buggy address is located 0 bytes to the right of [ 25.235938] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.237329] [ 25.237608] The buggy address belongs to the physical page: [ 25.239068] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.239837] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.240442] page_type: f5(slab) [ 25.240942] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.243003] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.244626] page dumped because: kasan: bad access detected [ 25.245698] [ 25.246138] Memory state around the buggy address: [ 25.246718] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.247787] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.248587] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.249532] ^ [ 25.250122] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.250930] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.251808] ================================================================== [ 25.552651] ================================================================== [ 25.553430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6bc/0x49c8 [ 25.554222] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.555033] [ 25.555390] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.555591] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.555704] Hardware name: linux,dummy-virt (DT) [ 25.555793] Call trace: [ 25.555867] dump_backtrace+0x9c/0x128 [ 25.556009] show_stack+0x20/0x38 [ 25.556130] dump_stack_lvl+0x8c/0xd0 [ 25.556249] print_report+0x118/0x5f0 [ 25.556369] kasan_report+0xdc/0x128 [ 25.556485] kasan_check_range+0x100/0x1a8 [ 25.556603] __kasan_check_write+0x20/0x30 [ 25.556729] kasan_atomics_helper+0x6bc/0x49c8 [ 25.556866] kasan_atomics+0x1a0/0x2e8 [ 25.557008] kunit_try_run_case+0x170/0x3f0 [ 25.557129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.557201] kthread+0x24c/0x2d0 [ 25.557250] ret_from_fork+0x10/0x20 [ 25.557300] [ 25.563993] Allocated by task 253: [ 25.564474] kasan_save_stack+0x3c/0x68 [ 25.565075] kasan_save_track+0x20/0x40 [ 25.565693] kasan_save_alloc_info+0x40/0x58 [ 25.566241] __kasan_kmalloc+0xd4/0xd8 [ 25.566730] __kmalloc_cache_noprof+0x154/0x320 [ 25.567368] kasan_atomics+0xb8/0x2e8 [ 25.567867] kunit_try_run_case+0x170/0x3f0 [ 25.568429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.569246] kthread+0x24c/0x2d0 [ 25.569744] ret_from_fork+0x10/0x20 [ 25.570679] [ 25.571153] The buggy address belongs to the object at fff00000c4205580 [ 25.571153] which belongs to the cache kmalloc-64 of size 64 [ 25.572238] The buggy address is located 0 bytes to the right of [ 25.572238] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.573802] [ 25.574244] The buggy address belongs to the physical page: [ 25.574912] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.575886] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.576718] page_type: f5(slab) [ 25.577219] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.577995] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.578744] page dumped because: kasan: bad access detected [ 25.579531] [ 25.580018] Memory state around the buggy address: [ 25.580530] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.581219] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.581938] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.582670] ^ [ 25.583228] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.583914] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.584672] ================================================================== [ 25.101201] ================================================================== [ 25.101978] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x25c/0x49c8 [ 25.102649] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.103590] [ 25.103987] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.104192] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.104276] Hardware name: linux,dummy-virt (DT) [ 25.104362] Call trace: [ 25.104461] dump_backtrace+0x9c/0x128 [ 25.104574] show_stack+0x20/0x38 [ 25.104676] dump_stack_lvl+0x8c/0xd0 [ 25.104789] print_report+0x118/0x5f0 [ 25.104886] kasan_report+0xdc/0x128 [ 25.105006] kasan_check_range+0x100/0x1a8 [ 25.105119] __kasan_check_write+0x20/0x30 [ 25.105286] kasan_atomics_helper+0x25c/0x49c8 [ 25.105417] kasan_atomics+0x1a0/0x2e8 [ 25.105538] kunit_try_run_case+0x170/0x3f0 [ 25.105651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.105734] kthread+0x24c/0x2d0 [ 25.105785] ret_from_fork+0x10/0x20 [ 25.105836] [ 25.114394] Allocated by task 253: [ 25.114919] kasan_save_stack+0x3c/0x68 [ 25.115877] kasan_save_track+0x20/0x40 [ 25.116515] kasan_save_alloc_info+0x40/0x58 [ 25.117072] __kasan_kmalloc+0xd4/0xd8 [ 25.117690] __kmalloc_cache_noprof+0x154/0x320 [ 25.118334] kasan_atomics+0xb8/0x2e8 [ 25.118980] kunit_try_run_case+0x170/0x3f0 [ 25.119516] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.120109] kthread+0x24c/0x2d0 [ 25.120508] ret_from_fork+0x10/0x20 [ 25.120955] [ 25.122003] The buggy address belongs to the object at fff00000c4205580 [ 25.122003] which belongs to the cache kmalloc-64 of size 64 [ 25.123442] The buggy address is located 0 bytes to the right of [ 25.123442] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.125059] [ 25.125566] The buggy address belongs to the physical page: [ 25.126243] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.126980] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.127693] page_type: f5(slab) [ 25.128199] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.128996] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.129730] page dumped because: kasan: bad access detected [ 25.130743] [ 25.131035] Memory state around the buggy address: [ 25.131614] fff00000c4205480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 25.132534] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.133242] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.134405] ^ [ 25.134893] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.135594] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.136606] ================================================================== [ 25.922813] ================================================================== [ 25.923597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f34/0x49c8 [ 25.924493] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.925313] [ 25.925625] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.925850] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.925938] Hardware name: linux,dummy-virt (DT) [ 25.926050] Call trace: [ 25.926125] dump_backtrace+0x9c/0x128 [ 25.926254] show_stack+0x20/0x38 [ 25.926374] dump_stack_lvl+0x8c/0xd0 [ 25.926500] print_report+0x118/0x5f0 [ 25.926615] kasan_report+0xdc/0x128 [ 25.926718] __asan_report_load4_noabort+0x20/0x30 [ 25.926780] kasan_atomics_helper+0x3f34/0x49c8 [ 25.926835] kasan_atomics+0x1a0/0x2e8 [ 25.926887] kunit_try_run_case+0x170/0x3f0 [ 25.926938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.927026] kthread+0x24c/0x2d0 [ 25.927078] ret_from_fork+0x10/0x20 [ 25.927130] [ 25.933463] Allocated by task 253: [ 25.933938] kasan_save_stack+0x3c/0x68 [ 25.934532] kasan_save_track+0x20/0x40 [ 25.935103] kasan_save_alloc_info+0x40/0x58 [ 25.935665] __kasan_kmalloc+0xd4/0xd8 [ 25.936170] __kmalloc_cache_noprof+0x154/0x320 [ 25.936701] kasan_atomics+0xb8/0x2e8 [ 25.937239] kunit_try_run_case+0x170/0x3f0 [ 25.937819] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.938498] kthread+0x24c/0x2d0 [ 25.938980] ret_from_fork+0x10/0x20 [ 25.939439] [ 25.939760] The buggy address belongs to the object at fff00000c4205580 [ 25.939760] which belongs to the cache kmalloc-64 of size 64 [ 25.940951] The buggy address is located 0 bytes to the right of [ 25.940951] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.942286] [ 25.942607] The buggy address belongs to the physical page: [ 25.943153] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.944020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.944668] page_type: f5(slab) [ 25.945201] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.946507] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.947453] page dumped because: kasan: bad access detected [ 25.948059] [ 25.948357] Memory state around the buggy address: [ 25.948872] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.949665] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.950433] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.951392] ^ [ 25.951826] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.954514] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.956391] ================================================================== [ 26.791743] ================================================================== [ 26.792356] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x406c/0x49c8 [ 26.793321] Read of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.794129] [ 26.794481] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.794697] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.794784] Hardware name: linux,dummy-virt (DT) [ 26.794876] Call trace: [ 26.794951] dump_backtrace+0x9c/0x128 [ 26.795094] show_stack+0x20/0x38 [ 26.795214] dump_stack_lvl+0x8c/0xd0 [ 26.795333] print_report+0x118/0x5f0 [ 26.795631] kasan_report+0xdc/0x128 [ 26.795757] __asan_report_load8_noabort+0x20/0x30 [ 26.795898] kasan_atomics_helper+0x406c/0x49c8 [ 26.796053] kasan_atomics+0x1a0/0x2e8 [ 26.796178] kunit_try_run_case+0x170/0x3f0 [ 26.796266] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.796327] kthread+0x24c/0x2d0 [ 26.796378] ret_from_fork+0x10/0x20 [ 26.796429] [ 26.802616] Allocated by task 253: [ 26.803121] kasan_save_stack+0x3c/0x68 [ 26.803722] kasan_save_track+0x20/0x40 [ 26.804284] kasan_save_alloc_info+0x40/0x58 [ 26.804909] __kasan_kmalloc+0xd4/0xd8 [ 26.805471] __kmalloc_cache_noprof+0x154/0x320 [ 26.805998] kasan_atomics+0xb8/0x2e8 [ 26.806564] kunit_try_run_case+0x170/0x3f0 [ 26.807244] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.807908] kthread+0x24c/0x2d0 [ 26.808429] ret_from_fork+0x10/0x20 [ 26.808887] [ 26.809227] The buggy address belongs to the object at fff00000c4205580 [ 26.809227] which belongs to the cache kmalloc-64 of size 64 [ 26.810487] The buggy address is located 0 bytes to the right of [ 26.810487] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.811691] [ 26.812047] The buggy address belongs to the physical page: [ 26.812605] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.813428] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.814445] page_type: f5(slab) [ 26.814852] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.816065] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.816996] page dumped because: kasan: bad access detected [ 26.817542] [ 26.817823] Memory state around the buggy address: [ 26.818469] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.819407] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.820233] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.821036] ^ [ 26.821699] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.822543] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.823337] ================================================================== [ 26.239863] ================================================================== [ 26.240595] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe3c/0x49c8 [ 26.241458] Read of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.242237] [ 26.242617] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.242819] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.242909] Hardware name: linux,dummy-virt (DT) [ 26.243017] Call trace: [ 26.243091] dump_backtrace+0x9c/0x128 [ 26.243215] show_stack+0x20/0x38 [ 26.243333] dump_stack_lvl+0x8c/0xd0 [ 26.243455] print_report+0x118/0x5f0 [ 26.243591] kasan_report+0xdc/0x128 [ 26.243710] kasan_check_range+0x100/0x1a8 [ 26.243832] __kasan_check_read+0x20/0x30 [ 26.243981] kasan_atomics_helper+0xe3c/0x49c8 [ 26.244114] kasan_atomics+0x1a0/0x2e8 [ 26.244236] kunit_try_run_case+0x170/0x3f0 [ 26.244364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.244479] kthread+0x24c/0x2d0 [ 26.244533] ret_from_fork+0x10/0x20 [ 26.244585] [ 26.251253] Allocated by task 253: [ 26.251775] kasan_save_stack+0x3c/0x68 [ 26.252399] kasan_save_track+0x20/0x40 [ 26.252883] kasan_save_alloc_info+0x40/0x58 [ 26.253461] __kasan_kmalloc+0xd4/0xd8 [ 26.253920] __kmalloc_cache_noprof+0x154/0x320 [ 26.254546] kasan_atomics+0xb8/0x2e8 [ 26.255132] kunit_try_run_case+0x170/0x3f0 [ 26.255706] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.257112] kthread+0x24c/0x2d0 [ 26.257595] ret_from_fork+0x10/0x20 [ 26.258110] [ 26.258399] The buggy address belongs to the object at fff00000c4205580 [ 26.258399] which belongs to the cache kmalloc-64 of size 64 [ 26.259520] The buggy address is located 0 bytes to the right of [ 26.259520] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.260803] [ 26.261123] The buggy address belongs to the physical page: [ 26.261759] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.262829] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.263573] page_type: f5(slab) [ 26.264030] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.264799] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.265550] page dumped because: kasan: bad access detected [ 26.266158] [ 26.266478] Memory state around the buggy address: [ 26.267041] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.267725] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.268469] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.269195] ^ [ 26.269762] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.270464] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.271216] ================================================================== [ 26.373486] ================================================================== [ 26.374162] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf28/0x49c8 [ 26.374952] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.375638] [ 26.376037] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.376238] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.376326] Hardware name: linux,dummy-virt (DT) [ 26.376419] Call trace: [ 26.376491] dump_backtrace+0x9c/0x128 [ 26.376615] show_stack+0x20/0x38 [ 26.376732] dump_stack_lvl+0x8c/0xd0 [ 26.376862] print_report+0x118/0x5f0 [ 26.376996] kasan_report+0xdc/0x128 [ 26.377114] kasan_check_range+0x100/0x1a8 [ 26.377194] __kasan_check_write+0x20/0x30 [ 26.377246] kasan_atomics_helper+0xf28/0x49c8 [ 26.377300] kasan_atomics+0x1a0/0x2e8 [ 26.377351] kunit_try_run_case+0x170/0x3f0 [ 26.377400] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.377455] kthread+0x24c/0x2d0 [ 26.377504] ret_from_fork+0x10/0x20 [ 26.377554] [ 26.386085] Allocated by task 253: [ 26.386673] kasan_save_stack+0x3c/0x68 [ 26.387313] kasan_save_track+0x20/0x40 [ 26.387974] kasan_save_alloc_info+0x40/0x58 [ 26.388657] __kasan_kmalloc+0xd4/0xd8 [ 26.389165] __kmalloc_cache_noprof+0x154/0x320 [ 26.389677] kasan_atomics+0xb8/0x2e8 [ 26.390424] kunit_try_run_case+0x170/0x3f0 [ 26.390951] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.391536] kthread+0x24c/0x2d0 [ 26.392010] ret_from_fork+0x10/0x20 [ 26.392543] [ 26.392977] The buggy address belongs to the object at fff00000c4205580 [ 26.392977] which belongs to the cache kmalloc-64 of size 64 [ 26.394161] The buggy address is located 0 bytes to the right of [ 26.394161] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.395367] [ 26.395707] The buggy address belongs to the physical page: [ 26.396386] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.397343] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.398090] page_type: f5(slab) [ 26.398551] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.399357] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.400191] page dumped because: kasan: bad access detected [ 26.400939] [ 26.401394] Memory state around the buggy address: [ 26.401851] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.402770] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.403640] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.404479] ^ [ 26.405189] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.406031] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.406843] ================================================================== [ 26.550796] ================================================================== [ 26.551582] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1144/0x49c8 [ 26.552412] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.553577] [ 26.554020] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.554218] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.554347] Hardware name: linux,dummy-virt (DT) [ 26.554441] Call trace: [ 26.554502] dump_backtrace+0x9c/0x128 [ 26.554564] show_stack+0x20/0x38 [ 26.554610] dump_stack_lvl+0x8c/0xd0 [ 26.554656] print_report+0x118/0x5f0 [ 26.554703] kasan_report+0xdc/0x128 [ 26.554751] kasan_check_range+0x100/0x1a8 [ 26.554802] __kasan_check_write+0x20/0x30 [ 26.554852] kasan_atomics_helper+0x1144/0x49c8 [ 26.554906] kasan_atomics+0x1a0/0x2e8 [ 26.554955] kunit_try_run_case+0x170/0x3f0 [ 26.555035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.555092] kthread+0x24c/0x2d0 [ 26.555142] ret_from_fork+0x10/0x20 [ 26.555192] [ 26.562525] Allocated by task 253: [ 26.563109] kasan_save_stack+0x3c/0x68 [ 26.563692] kasan_save_track+0x20/0x40 [ 26.564245] kasan_save_alloc_info+0x40/0x58 [ 26.565020] __kasan_kmalloc+0xd4/0xd8 [ 26.565539] __kmalloc_cache_noprof+0x154/0x320 [ 26.566243] kasan_atomics+0xb8/0x2e8 [ 26.566789] kunit_try_run_case+0x170/0x3f0 [ 26.567426] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.568153] kthread+0x24c/0x2d0 [ 26.568627] ret_from_fork+0x10/0x20 [ 26.569281] [ 26.569617] The buggy address belongs to the object at fff00000c4205580 [ 26.569617] which belongs to the cache kmalloc-64 of size 64 [ 26.571286] The buggy address is located 0 bytes to the right of [ 26.571286] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.572456] [ 26.573011] The buggy address belongs to the physical page: [ 26.573572] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.574558] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.575310] page_type: f5(slab) [ 26.575807] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.576653] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.577473] page dumped because: kasan: bad access detected [ 26.578110] [ 26.578455] Memory state around the buggy address: [ 26.579035] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.579796] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.580610] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.581437] ^ [ 26.582008] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.582790] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.583579] ================================================================== [ 26.857213] ================================================================== [ 26.857751] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1518/0x49c8 [ 26.858705] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.859622] [ 26.860015] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.860217] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.860302] Hardware name: linux,dummy-virt (DT) [ 26.860394] Call trace: [ 26.860471] dump_backtrace+0x9c/0x128 [ 26.860597] show_stack+0x20/0x38 [ 26.860715] dump_stack_lvl+0x8c/0xd0 [ 26.860841] print_report+0x118/0x5f0 [ 26.860978] kasan_report+0xdc/0x128 [ 26.861100] kasan_check_range+0x100/0x1a8 [ 26.861226] __kasan_check_write+0x20/0x30 [ 26.861351] kasan_atomics_helper+0x1518/0x49c8 [ 26.861486] kasan_atomics+0x1a0/0x2e8 [ 26.861613] kunit_try_run_case+0x170/0x3f0 [ 26.861725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.861791] kthread+0x24c/0x2d0 [ 26.861843] ret_from_fork+0x10/0x20 [ 26.861892] [ 26.868740] Allocated by task 253: [ 26.869242] kasan_save_stack+0x3c/0x68 [ 26.869827] kasan_save_track+0x20/0x40 [ 26.870333] kasan_save_alloc_info+0x40/0x58 [ 26.870870] __kasan_kmalloc+0xd4/0xd8 [ 26.871322] __kmalloc_cache_noprof+0x154/0x320 [ 26.872068] kasan_atomics+0xb8/0x2e8 [ 26.872627] kunit_try_run_case+0x170/0x3f0 [ 26.873240] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.873830] kthread+0x24c/0x2d0 [ 26.874351] ret_from_fork+0x10/0x20 [ 26.874878] [ 26.875231] The buggy address belongs to the object at fff00000c4205580 [ 26.875231] which belongs to the cache kmalloc-64 of size 64 [ 26.876331] The buggy address is located 0 bytes to the right of [ 26.876331] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.877539] [ 26.877869] The buggy address belongs to the physical page: [ 26.878477] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.879229] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.880081] page_type: f5(slab) [ 26.880533] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.881329] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.882082] page dumped because: kasan: bad access detected [ 26.882725] [ 26.883067] Memory state around the buggy address: [ 26.883646] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.884453] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.885182] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.885912] ^ [ 26.886493] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.887245] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.887938] ================================================================== [ 26.688659] ================================================================== [ 26.689306] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1300/0x49c8 [ 26.690072] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.690981] [ 26.691312] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.691545] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.691630] Hardware name: linux,dummy-virt (DT) [ 26.691722] Call trace: [ 26.691799] dump_backtrace+0x9c/0x128 [ 26.691927] show_stack+0x20/0x38 [ 26.692065] dump_stack_lvl+0x8c/0xd0 [ 26.692185] print_report+0x118/0x5f0 [ 26.692303] kasan_report+0xdc/0x128 [ 26.692403] kasan_check_range+0x100/0x1a8 [ 26.692457] __kasan_check_write+0x20/0x30 [ 26.692508] kasan_atomics_helper+0x1300/0x49c8 [ 26.692563] kasan_atomics+0x1a0/0x2e8 [ 26.692613] kunit_try_run_case+0x170/0x3f0 [ 26.692662] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.692718] kthread+0x24c/0x2d0 [ 26.692781] ret_from_fork+0x10/0x20 [ 26.692834] [ 26.699494] Allocated by task 253: [ 26.700002] kasan_save_stack+0x3c/0x68 [ 26.700546] kasan_save_track+0x20/0x40 [ 26.701138] kasan_save_alloc_info+0x40/0x58 [ 26.701677] __kasan_kmalloc+0xd4/0xd8 [ 26.702158] __kmalloc_cache_noprof+0x154/0x320 [ 26.702866] kasan_atomics+0xb8/0x2e8 [ 26.703440] kunit_try_run_case+0x170/0x3f0 [ 26.703989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.704532] kthread+0x24c/0x2d0 [ 26.705076] ret_from_fork+0x10/0x20 [ 26.705619] [ 26.705945] The buggy address belongs to the object at fff00000c4205580 [ 26.705945] which belongs to the cache kmalloc-64 of size 64 [ 26.707216] The buggy address is located 0 bytes to the right of [ 26.707216] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.708407] [ 26.708776] The buggy address belongs to the physical page: [ 26.709346] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.710219] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.710895] page_type: f5(slab) [ 26.711417] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.712345] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.713089] page dumped because: kasan: bad access detected [ 26.713655] [ 26.714025] Memory state around the buggy address: [ 26.714582] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.715286] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.716058] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.716730] ^ [ 26.717327] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.718067] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.718788] ================================================================== [ 25.995683] ================================================================== [ 25.996396] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f24/0x49c8 [ 25.998252] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.999198] [ 25.999583] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.999848] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.999940] Hardware name: linux,dummy-virt (DT) [ 26.000051] Call trace: [ 26.000091] dump_backtrace+0x9c/0x128 [ 26.000151] show_stack+0x20/0x38 [ 26.000199] dump_stack_lvl+0x8c/0xd0 [ 26.000249] print_report+0x118/0x5f0 [ 26.000300] kasan_report+0xdc/0x128 [ 26.000351] __asan_report_load4_noabort+0x20/0x30 [ 26.000407] kasan_atomics_helper+0x3f24/0x49c8 [ 26.000464] kasan_atomics+0x1a0/0x2e8 [ 26.000518] kunit_try_run_case+0x170/0x3f0 [ 26.000569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.000627] kthread+0x24c/0x2d0 [ 26.000677] ret_from_fork+0x10/0x20 [ 26.000728] [ 26.008033] Allocated by task 253: [ 26.008468] kasan_save_stack+0x3c/0x68 [ 26.009010] kasan_save_track+0x20/0x40 [ 26.009551] kasan_save_alloc_info+0x40/0x58 [ 26.010187] __kasan_kmalloc+0xd4/0xd8 [ 26.010838] __kmalloc_cache_noprof+0x154/0x320 [ 26.011561] kasan_atomics+0xb8/0x2e8 [ 26.012062] kunit_try_run_case+0x170/0x3f0 [ 26.012754] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.013453] kthread+0x24c/0x2d0 [ 26.013999] ret_from_fork+0x10/0x20 [ 26.014540] [ 26.014917] The buggy address belongs to the object at fff00000c4205580 [ 26.014917] which belongs to the cache kmalloc-64 of size 64 [ 26.016155] The buggy address is located 0 bytes to the right of [ 26.016155] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.017471] [ 26.017810] The buggy address belongs to the physical page: [ 26.018414] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.019325] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.020093] page_type: f5(slab) [ 26.020591] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.021459] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.022273] page dumped because: kasan: bad access detected [ 26.022883] [ 26.023249] Memory state around the buggy address: [ 26.023847] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.024727] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.025535] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.026307] ^ [ 26.026901] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.027693] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.028506] ================================================================== [ 25.586203] ================================================================== [ 25.586882] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x728/0x49c8 [ 25.588781] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.589753] [ 25.590074] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.590277] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.590365] Hardware name: linux,dummy-virt (DT) [ 25.590454] Call trace: [ 25.590514] dump_backtrace+0x9c/0x128 [ 25.590589] show_stack+0x20/0x38 [ 25.590653] dump_stack_lvl+0x8c/0xd0 [ 25.590731] print_report+0x118/0x5f0 [ 25.590779] kasan_report+0xdc/0x128 [ 25.590828] kasan_check_range+0x100/0x1a8 [ 25.590879] __kasan_check_write+0x20/0x30 [ 25.590929] kasan_atomics_helper+0x728/0x49c8 [ 25.591010] kasan_atomics+0x1a0/0x2e8 [ 25.591064] kunit_try_run_case+0x170/0x3f0 [ 25.591113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.591169] kthread+0x24c/0x2d0 [ 25.591216] ret_from_fork+0x10/0x20 [ 25.591267] [ 25.597893] Allocated by task 253: [ 25.598493] kasan_save_stack+0x3c/0x68 [ 25.599142] kasan_save_track+0x20/0x40 [ 25.599618] kasan_save_alloc_info+0x40/0x58 [ 25.600200] __kasan_kmalloc+0xd4/0xd8 [ 25.600715] __kmalloc_cache_noprof+0x154/0x320 [ 25.601329] kasan_atomics+0xb8/0x2e8 [ 25.601825] kunit_try_run_case+0x170/0x3f0 [ 25.602416] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.603804] kthread+0x24c/0x2d0 [ 25.604221] ret_from_fork+0x10/0x20 [ 25.604684] [ 25.604979] The buggy address belongs to the object at fff00000c4205580 [ 25.604979] which belongs to the cache kmalloc-64 of size 64 [ 25.606115] The buggy address is located 0 bytes to the right of [ 25.606115] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.607323] [ 25.607596] The buggy address belongs to the physical page: [ 25.608269] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.609078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.609730] page_type: f5(slab) [ 25.610260] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.611098] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.611825] page dumped because: kasan: bad access detected [ 25.612448] [ 25.612791] Memory state around the buggy address: [ 25.613322] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.614174] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.615018] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.615721] ^ [ 25.616340] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.617050] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.617774] ================================================================== [ 27.067396] ================================================================== [ 27.068853] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f5c/0x49c8 [ 27.069933] Read of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 27.070767] [ 27.071151] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 27.071395] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.071510] Hardware name: linux,dummy-virt (DT) [ 27.071607] Call trace: [ 27.071685] dump_backtrace+0x9c/0x128 [ 27.071815] show_stack+0x20/0x38 [ 27.072001] dump_stack_lvl+0x8c/0xd0 [ 27.072287] print_report+0x118/0x5f0 [ 27.072361] kasan_report+0xdc/0x128 [ 27.072421] __asan_report_load8_noabort+0x20/0x30 [ 27.072488] kasan_atomics_helper+0x3f5c/0x49c8 [ 27.072548] kasan_atomics+0x1a0/0x2e8 [ 27.072601] kunit_try_run_case+0x170/0x3f0 [ 27.072652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.072711] kthread+0x24c/0x2d0 [ 27.072773] ret_from_fork+0x10/0x20 [ 27.072831] [ 27.081188] Allocated by task 253: [ 27.081699] kasan_save_stack+0x3c/0x68 [ 27.082232] kasan_save_track+0x20/0x40 [ 27.082776] kasan_save_alloc_info+0x40/0x58 [ 27.083338] __kasan_kmalloc+0xd4/0xd8 [ 27.084056] __kmalloc_cache_noprof+0x154/0x320 [ 27.084541] kasan_atomics+0xb8/0x2e8 [ 27.084912] kunit_try_run_case+0x170/0x3f0 [ 27.085322] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.085810] kthread+0x24c/0x2d0 [ 27.086890] ret_from_fork+0x10/0x20 [ 27.087944] [ 27.088293] The buggy address belongs to the object at fff00000c4205580 [ 27.088293] which belongs to the cache kmalloc-64 of size 64 [ 27.089423] The buggy address is located 0 bytes to the right of [ 27.089423] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 27.090550] [ 27.090880] The buggy address belongs to the physical page: [ 27.091722] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 27.092522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.093531] page_type: f5(slab) [ 27.094461] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.095770] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.096597] page dumped because: kasan: bad access detected [ 27.097357] [ 27.097666] Memory state around the buggy address: [ 27.098477] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.099343] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.100217] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.101080] ^ [ 27.101615] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.102613] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.103473] ================================================================== [ 26.923349] ================================================================== [ 26.924283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15f0/0x49c8 [ 26.925238] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.926315] [ 26.926705] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.927009] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.927097] Hardware name: linux,dummy-virt (DT) [ 26.927187] Call trace: [ 26.927260] dump_backtrace+0x9c/0x128 [ 26.927349] show_stack+0x20/0x38 [ 26.927399] dump_stack_lvl+0x8c/0xd0 [ 26.927446] print_report+0x118/0x5f0 [ 26.927494] kasan_report+0xdc/0x128 [ 26.927542] kasan_check_range+0x100/0x1a8 [ 26.927594] __kasan_check_write+0x20/0x30 [ 26.927645] kasan_atomics_helper+0x15f0/0x49c8 [ 26.927702] kasan_atomics+0x1a0/0x2e8 [ 26.927756] kunit_try_run_case+0x170/0x3f0 [ 26.927809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.927867] kthread+0x24c/0x2d0 [ 26.927918] ret_from_fork+0x10/0x20 [ 26.927995] [ 26.935319] Allocated by task 253: [ 26.936017] kasan_save_stack+0x3c/0x68 [ 26.936674] kasan_save_track+0x20/0x40 [ 26.937369] kasan_save_alloc_info+0x40/0x58 [ 26.938082] __kasan_kmalloc+0xd4/0xd8 [ 26.938507] __kmalloc_cache_noprof+0x154/0x320 [ 26.939383] kasan_atomics+0xb8/0x2e8 [ 26.940018] kunit_try_run_case+0x170/0x3f0 [ 26.940709] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.941476] kthread+0x24c/0x2d0 [ 26.942026] ret_from_fork+0x10/0x20 [ 26.942655] [ 26.943061] The buggy address belongs to the object at fff00000c4205580 [ 26.943061] which belongs to the cache kmalloc-64 of size 64 [ 26.944379] The buggy address is located 0 bytes to the right of [ 26.944379] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.945736] [ 26.946150] The buggy address belongs to the physical page: [ 26.946783] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.947705] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.948534] page_type: f5(slab) [ 26.949075] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.949954] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.950780] page dumped because: kasan: bad access detected [ 26.951497] [ 26.951863] Memory state around the buggy address: [ 26.952503] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.953359] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.954219] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.955016] ^ [ 26.955661] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.956505] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.957347] ================================================================== [ 25.857657] ================================================================== [ 25.858441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xabc/0x49c8 [ 25.860102] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.860827] [ 25.861169] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.861373] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.861458] Hardware name: linux,dummy-virt (DT) [ 25.861553] Call trace: [ 25.861624] dump_backtrace+0x9c/0x128 [ 25.861739] show_stack+0x20/0x38 [ 25.861838] dump_stack_lvl+0x8c/0xd0 [ 25.861909] print_report+0x118/0x5f0 [ 25.861985] kasan_report+0xdc/0x128 [ 25.862038] kasan_check_range+0x100/0x1a8 [ 25.862090] __kasan_check_write+0x20/0x30 [ 25.862139] kasan_atomics_helper+0xabc/0x49c8 [ 25.862195] kasan_atomics+0x1a0/0x2e8 [ 25.862247] kunit_try_run_case+0x170/0x3f0 [ 25.862300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.862356] kthread+0x24c/0x2d0 [ 25.862406] ret_from_fork+0x10/0x20 [ 25.862458] [ 25.869167] Allocated by task 253: [ 25.869624] kasan_save_stack+0x3c/0x68 [ 25.870147] kasan_save_track+0x20/0x40 [ 25.870771] kasan_save_alloc_info+0x40/0x58 [ 25.871466] __kasan_kmalloc+0xd4/0xd8 [ 25.871975] __kmalloc_cache_noprof+0x154/0x320 [ 25.872599] kasan_atomics+0xb8/0x2e8 [ 25.873127] kunit_try_run_case+0x170/0x3f0 [ 25.873705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.874422] kthread+0x24c/0x2d0 [ 25.874976] ret_from_fork+0x10/0x20 [ 25.875440] [ 25.875764] The buggy address belongs to the object at fff00000c4205580 [ 25.875764] which belongs to the cache kmalloc-64 of size 64 [ 25.877092] The buggy address is located 0 bytes to the right of [ 25.877092] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.878324] [ 25.878662] The buggy address belongs to the physical page: [ 25.879227] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.880174] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.880884] page_type: f5(slab) [ 25.881375] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.882173] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.882948] page dumped because: kasan: bad access detected [ 25.883596] [ 25.883935] Memory state around the buggy address: [ 25.884539] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.885345] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.886149] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.886886] ^ [ 25.887528] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.888292] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.889145] ================================================================== [ 25.403730] ================================================================== [ 25.404501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50c/0x49c8 [ 25.405438] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.406649] [ 25.407116] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.407322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.407421] Hardware name: linux,dummy-virt (DT) [ 25.407512] Call trace: [ 25.407580] dump_backtrace+0x9c/0x128 [ 25.407700] show_stack+0x20/0x38 [ 25.407830] dump_stack_lvl+0x8c/0xd0 [ 25.407944] print_report+0x118/0x5f0 [ 25.408071] kasan_report+0xdc/0x128 [ 25.408171] kasan_check_range+0x100/0x1a8 [ 25.408281] __kasan_check_write+0x20/0x30 [ 25.408384] kasan_atomics_helper+0x50c/0x49c8 [ 25.408498] kasan_atomics+0x1a0/0x2e8 [ 25.408620] kunit_try_run_case+0x170/0x3f0 [ 25.408740] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.408843] kthread+0x24c/0x2d0 [ 25.408897] ret_from_fork+0x10/0x20 [ 25.408946] [ 25.417816] Allocated by task 253: [ 25.418676] kasan_save_stack+0x3c/0x68 [ 25.419401] kasan_save_track+0x20/0x40 [ 25.420060] kasan_save_alloc_info+0x40/0x58 [ 25.420471] __kasan_kmalloc+0xd4/0xd8 [ 25.420885] __kmalloc_cache_noprof+0x154/0x320 [ 25.421336] kasan_atomics+0xb8/0x2e8 [ 25.421713] kunit_try_run_case+0x170/0x3f0 [ 25.422344] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.423524] kthread+0x24c/0x2d0 [ 25.425844] ret_from_fork+0x10/0x20 [ 25.426846] [ 25.427291] The buggy address belongs to the object at fff00000c4205580 [ 25.427291] which belongs to the cache kmalloc-64 of size 64 [ 25.430431] The buggy address is located 0 bytes to the right of [ 25.430431] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.433718] [ 25.434247] The buggy address belongs to the physical page: [ 25.435055] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.436362] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.437032] page_type: f5(slab) [ 25.437495] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.438185] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.438940] page dumped because: kasan: bad access detected [ 25.440244] [ 25.440598] Memory state around the buggy address: [ 25.441123] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.441836] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.442574] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.443710] ^ [ 25.444191] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.444883] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.445609] ================================================================== [ 26.993326] ================================================================== [ 26.994135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f18/0x49c8 [ 26.995009] Read of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.996023] [ 26.996407] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.996653] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.996778] Hardware name: linux,dummy-virt (DT) [ 26.996876] Call trace: [ 26.996952] dump_backtrace+0x9c/0x128 [ 26.997145] show_stack+0x20/0x38 [ 26.997268] dump_stack_lvl+0x8c/0xd0 [ 26.997407] print_report+0x118/0x5f0 [ 26.997550] kasan_report+0xdc/0x128 [ 26.997604] __asan_report_load8_noabort+0x20/0x30 [ 26.997663] kasan_atomics_helper+0x3f18/0x49c8 [ 26.997719] kasan_atomics+0x1a0/0x2e8 [ 26.997771] kunit_try_run_case+0x170/0x3f0 [ 26.997821] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.997879] kthread+0x24c/0x2d0 [ 26.997931] ret_from_fork+0x10/0x20 [ 26.998012] [ 27.005746] Allocated by task 253: [ 27.006128] kasan_save_stack+0x3c/0x68 [ 27.006512] kasan_save_track+0x20/0x40 [ 27.006901] kasan_save_alloc_info+0x40/0x58 [ 27.009105] __kasan_kmalloc+0xd4/0xd8 [ 27.010096] __kmalloc_cache_noprof+0x154/0x320 [ 27.011791] kasan_atomics+0xb8/0x2e8 [ 27.013077] kunit_try_run_case+0x170/0x3f0 [ 27.014391] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.015928] kthread+0x24c/0x2d0 [ 27.016802] ret_from_fork+0x10/0x20 [ 27.017501] [ 27.017936] The buggy address belongs to the object at fff00000c4205580 [ 27.017936] which belongs to the cache kmalloc-64 of size 64 [ 27.019157] The buggy address is located 0 bytes to the right of [ 27.019157] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 27.020378] [ 27.020738] The buggy address belongs to the physical page: [ 27.021426] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 27.022280] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.023069] page_type: f5(slab) [ 27.023607] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.024484] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.025307] page dumped because: kasan: bad access detected [ 27.025952] [ 27.026302] Memory state around the buggy address: [ 27.026929] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.027742] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.028525] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.029310] ^ [ 27.029915] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.030712] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.031456] ================================================================== [ 25.366395] ================================================================== [ 25.367143] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x49c8 [ 25.368305] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.369226] [ 25.369586] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.369774] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.369844] Hardware name: linux,dummy-virt (DT) [ 25.369926] Call trace: [ 25.370008] dump_backtrace+0x9c/0x128 [ 25.370135] show_stack+0x20/0x38 [ 25.370255] dump_stack_lvl+0x8c/0xd0 [ 25.370379] print_report+0x118/0x5f0 [ 25.370542] kasan_report+0xdc/0x128 [ 25.370662] kasan_check_range+0x100/0x1a8 [ 25.370780] __kasan_check_write+0x20/0x30 [ 25.370948] kasan_atomics_helper+0x4a0/0x49c8 [ 25.371097] kasan_atomics+0x1a0/0x2e8 [ 25.371244] kunit_try_run_case+0x170/0x3f0 [ 25.371431] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.371584] kthread+0x24c/0x2d0 [ 25.371696] ret_from_fork+0x10/0x20 [ 25.371804] [ 25.380235] Allocated by task 253: [ 25.381151] kasan_save_stack+0x3c/0x68 [ 25.381645] kasan_save_track+0x20/0x40 [ 25.382327] kasan_save_alloc_info+0x40/0x58 [ 25.383033] __kasan_kmalloc+0xd4/0xd8 [ 25.384044] __kmalloc_cache_noprof+0x154/0x320 [ 25.385521] kasan_atomics+0xb8/0x2e8 [ 25.386229] kunit_try_run_case+0x170/0x3f0 [ 25.386900] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.387983] kthread+0x24c/0x2d0 [ 25.388562] ret_from_fork+0x10/0x20 [ 25.389127] [ 25.389271] The buggy address belongs to the object at fff00000c4205580 [ 25.389271] which belongs to the cache kmalloc-64 of size 64 [ 25.389753] The buggy address is located 0 bytes to the right of [ 25.389753] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.390732] [ 25.391081] The buggy address belongs to the physical page: [ 25.391788] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.393539] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.394400] page_type: f5(slab) [ 25.394608] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.394943] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.396023] page dumped because: kasan: bad access detected [ 25.396735] [ 25.397307] Memory state around the buggy address: [ 25.398102] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.398856] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.399619] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.400332] ^ [ 25.401129] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.401863] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.402590] ================================================================== [ 25.181160] ================================================================== [ 25.181732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4264/0x49c8 [ 25.182586] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.183337] [ 25.183777] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.184002] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.184082] Hardware name: linux,dummy-virt (DT) [ 25.184159] Call trace: [ 25.184213] dump_backtrace+0x9c/0x128 [ 25.184319] show_stack+0x20/0x38 [ 25.184422] dump_stack_lvl+0x8c/0xd0 [ 25.184524] print_report+0x118/0x5f0 [ 25.184616] kasan_report+0xdc/0x128 [ 25.184712] __asan_report_load4_noabort+0x20/0x30 [ 25.184834] kasan_atomics_helper+0x4264/0x49c8 [ 25.184938] kasan_atomics+0x1a0/0x2e8 [ 25.185069] kunit_try_run_case+0x170/0x3f0 [ 25.185173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.185286] kthread+0x24c/0x2d0 [ 25.185380] ret_from_fork+0x10/0x20 [ 25.185482] [ 25.192190] Allocated by task 253: [ 25.192772] kasan_save_stack+0x3c/0x68 [ 25.193547] kasan_save_track+0x20/0x40 [ 25.194348] kasan_save_alloc_info+0x40/0x58 [ 25.195034] __kasan_kmalloc+0xd4/0xd8 [ 25.195625] __kmalloc_cache_noprof+0x154/0x320 [ 25.196357] kasan_atomics+0xb8/0x2e8 [ 25.196922] kunit_try_run_case+0x170/0x3f0 [ 25.197523] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.198198] kthread+0x24c/0x2d0 [ 25.198605] ret_from_fork+0x10/0x20 [ 25.199054] [ 25.199432] The buggy address belongs to the object at fff00000c4205580 [ 25.199432] which belongs to the cache kmalloc-64 of size 64 [ 25.201108] The buggy address is located 0 bytes to the right of [ 25.201108] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.202414] [ 25.202737] The buggy address belongs to the physical page: [ 25.204693] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.205462] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.206205] page_type: f5(slab) [ 25.206667] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.207897] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.209061] page dumped because: kasan: bad access detected [ 25.209614] [ 25.209919] Memory state around the buggy address: [ 25.210486] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.211232] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.212006] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.212686] ^ [ 25.213432] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.214314] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.214908] ================================================================== [ 26.959697] ================================================================== [ 26.960312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x165c/0x49c8 [ 26.961234] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.962199] [ 26.962615] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.962937] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.963054] Hardware name: linux,dummy-virt (DT) [ 26.963147] Call trace: [ 26.963221] dump_backtrace+0x9c/0x128 [ 26.963463] show_stack+0x20/0x38 [ 26.963578] dump_stack_lvl+0x8c/0xd0 [ 26.963633] print_report+0x118/0x5f0 [ 26.963683] kasan_report+0xdc/0x128 [ 26.963731] kasan_check_range+0x100/0x1a8 [ 26.963783] __kasan_check_write+0x20/0x30 [ 26.963834] kasan_atomics_helper+0x165c/0x49c8 [ 26.963889] kasan_atomics+0x1a0/0x2e8 [ 26.963940] kunit_try_run_case+0x170/0x3f0 [ 26.964021] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.964081] kthread+0x24c/0x2d0 [ 26.964134] ret_from_fork+0x10/0x20 [ 26.964184] [ 26.971900] Allocated by task 253: [ 26.972478] kasan_save_stack+0x3c/0x68 [ 26.973416] kasan_save_track+0x20/0x40 [ 26.974111] kasan_save_alloc_info+0x40/0x58 [ 26.974651] __kasan_kmalloc+0xd4/0xd8 [ 26.975189] __kmalloc_cache_noprof+0x154/0x320 [ 26.975825] kasan_atomics+0xb8/0x2e8 [ 26.976398] kunit_try_run_case+0x170/0x3f0 [ 26.977058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.977559] kthread+0x24c/0x2d0 [ 26.977770] ret_from_fork+0x10/0x20 [ 26.978031] [ 26.978358] The buggy address belongs to the object at fff00000c4205580 [ 26.978358] which belongs to the cache kmalloc-64 of size 64 [ 26.979555] The buggy address is located 0 bytes to the right of [ 26.979555] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.980774] [ 26.981168] The buggy address belongs to the physical page: [ 26.981825] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.982804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.983512] page_type: f5(slab) [ 26.984116] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.985006] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.985785] page dumped because: kasan: bad access detected [ 26.986431] [ 26.986763] Memory state around the buggy address: [ 26.987385] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.988209] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.989000] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.989743] ^ [ 26.990361] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.991151] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.991903] ================================================================== [ 27.105994] ================================================================== [ 27.106642] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x49c8 [ 27.107576] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 27.108656] [ 27.109014] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 27.109180] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.109224] Hardware name: linux,dummy-virt (DT) [ 27.109274] Call trace: [ 27.109342] dump_backtrace+0x9c/0x128 [ 27.109469] show_stack+0x20/0x38 [ 27.109585] dump_stack_lvl+0x8c/0xd0 [ 27.109702] print_report+0x118/0x5f0 [ 27.109819] kasan_report+0xdc/0x128 [ 27.109873] kasan_check_range+0x100/0x1a8 [ 27.109926] __kasan_check_write+0x20/0x30 [ 27.110007] kasan_atomics_helper+0x1780/0x49c8 [ 27.110068] kasan_atomics+0x1a0/0x2e8 [ 27.110119] kunit_try_run_case+0x170/0x3f0 [ 27.110170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.110225] kthread+0x24c/0x2d0 [ 27.110276] ret_from_fork+0x10/0x20 [ 27.110328] [ 27.116996] Allocated by task 253: [ 27.117409] kasan_save_stack+0x3c/0x68 [ 27.117990] kasan_save_track+0x20/0x40 [ 27.118480] kasan_save_alloc_info+0x40/0x58 [ 27.118982] __kasan_kmalloc+0xd4/0xd8 [ 27.119552] __kmalloc_cache_noprof+0x154/0x320 [ 27.120207] kasan_atomics+0xb8/0x2e8 [ 27.120736] kunit_try_run_case+0x170/0x3f0 [ 27.121311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.122059] kthread+0x24c/0x2d0 [ 27.122652] ret_from_fork+0x10/0x20 [ 27.123200] [ 27.123510] The buggy address belongs to the object at fff00000c4205580 [ 27.123510] which belongs to the cache kmalloc-64 of size 64 [ 27.124623] The buggy address is located 0 bytes to the right of [ 27.124623] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 27.125817] [ 27.126206] The buggy address belongs to the physical page: [ 27.126875] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 27.127818] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.128522] page_type: f5(slab) [ 27.129057] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.129817] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.130652] page dumped because: kasan: bad access detected [ 27.131223] [ 27.131546] Memory state around the buggy address: [ 27.132141] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.132895] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.133589] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.134401] ^ [ 27.134905] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.135694] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.136464] ================================================================== [ 25.485655] ================================================================== [ 25.486335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5e4/0x49c8 [ 25.487230] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.488004] [ 25.488334] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.488505] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.488568] Hardware name: linux,dummy-virt (DT) [ 25.488653] Call trace: [ 25.488721] dump_backtrace+0x9c/0x128 [ 25.488854] show_stack+0x20/0x38 [ 25.488987] dump_stack_lvl+0x8c/0xd0 [ 25.489113] print_report+0x118/0x5f0 [ 25.489230] kasan_report+0xdc/0x128 [ 25.489353] kasan_check_range+0x100/0x1a8 [ 25.489476] __kasan_check_write+0x20/0x30 [ 25.489606] kasan_atomics_helper+0x5e4/0x49c8 [ 25.489734] kasan_atomics+0x1a0/0x2e8 [ 25.489856] kunit_try_run_case+0x170/0x3f0 [ 25.490039] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.490206] kthread+0x24c/0x2d0 [ 25.490371] ret_from_fork+0x10/0x20 [ 25.490497] [ 25.497989] Allocated by task 253: [ 25.498543] kasan_save_stack+0x3c/0x68 [ 25.499080] kasan_save_track+0x20/0x40 [ 25.499693] kasan_save_alloc_info+0x40/0x58 [ 25.500362] __kasan_kmalloc+0xd4/0xd8 [ 25.500899] __kmalloc_cache_noprof+0x154/0x320 [ 25.501563] kasan_atomics+0xb8/0x2e8 [ 25.502183] kunit_try_run_case+0x170/0x3f0 [ 25.502779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.503475] kthread+0x24c/0x2d0 [ 25.503939] ret_from_fork+0x10/0x20 [ 25.504647] [ 25.504950] The buggy address belongs to the object at fff00000c4205580 [ 25.504950] which belongs to the cache kmalloc-64 of size 64 [ 25.506186] The buggy address is located 0 bytes to the right of [ 25.506186] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.507530] [ 25.507904] The buggy address belongs to the physical page: [ 25.508649] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.509595] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.510452] page_type: f5(slab) [ 25.510988] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.511812] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.512599] page dumped because: kasan: bad access detected [ 25.513275] [ 25.513605] Memory state around the buggy address: [ 25.514227] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.515039] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.515810] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.516579] ^ [ 25.517190] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.517949] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.518706] ================================================================== [ 25.023320] ================================================================== [ 25.024491] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40e4/0x49c8 [ 25.024917] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.025955] [ 25.026363] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.026579] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.026665] Hardware name: linux,dummy-virt (DT) [ 25.026759] Call trace: [ 25.026835] dump_backtrace+0x9c/0x128 [ 25.026978] show_stack+0x20/0x38 [ 25.027095] dump_stack_lvl+0x8c/0xd0 [ 25.027207] print_report+0x118/0x5f0 [ 25.027320] kasan_report+0xdc/0x128 [ 25.027482] __asan_report_store4_noabort+0x20/0x30 [ 25.027606] kasan_atomics_helper+0x40e4/0x49c8 [ 25.027727] kasan_atomics+0x1a0/0x2e8 [ 25.027826] kunit_try_run_case+0x170/0x3f0 [ 25.027882] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.027937] kthread+0x24c/0x2d0 [ 25.028021] ret_from_fork+0x10/0x20 [ 25.028074] [ 25.034905] Allocated by task 253: [ 25.035861] kasan_save_stack+0x3c/0x68 [ 25.036499] kasan_save_track+0x20/0x40 [ 25.037526] kasan_save_alloc_info+0x40/0x58 [ 25.038448] __kasan_kmalloc+0xd4/0xd8 [ 25.039104] __kmalloc_cache_noprof+0x154/0x320 [ 25.040131] kasan_atomics+0xb8/0x2e8 [ 25.040563] kunit_try_run_case+0x170/0x3f0 [ 25.041123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.042047] kthread+0x24c/0x2d0 [ 25.042382] ret_from_fork+0x10/0x20 [ 25.042929] [ 25.043296] The buggy address belongs to the object at fff00000c4205580 [ 25.043296] which belongs to the cache kmalloc-64 of size 64 [ 25.044618] The buggy address is located 0 bytes to the right of [ 25.044618] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.046132] [ 25.046482] The buggy address belongs to the physical page: [ 25.047027] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.048251] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.048850] page_type: f5(slab) [ 25.049253] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.050099] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.050915] page dumped because: kasan: bad access detected [ 25.051826] [ 25.052214] Memory state around the buggy address: [ 25.052794] fff00000c4205480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 25.053636] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.054516] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.055284] ^ [ 25.056227] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.057421] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.058748] ================================================================== [ 25.138444] ================================================================== [ 25.139204] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2c4/0x49c8 [ 25.140042] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.140823] [ 25.141223] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.141468] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.141555] Hardware name: linux,dummy-virt (DT) [ 25.141641] Call trace: [ 25.141706] dump_backtrace+0x9c/0x128 [ 25.141973] show_stack+0x20/0x38 [ 25.142094] dump_stack_lvl+0x8c/0xd0 [ 25.142416] print_report+0x118/0x5f0 [ 25.142580] kasan_report+0xdc/0x128 [ 25.142697] kasan_check_range+0x100/0x1a8 [ 25.142760] __kasan_check_read+0x20/0x30 [ 25.142813] kasan_atomics_helper+0x2c4/0x49c8 [ 25.142865] kasan_atomics+0x1a0/0x2e8 [ 25.142918] kunit_try_run_case+0x170/0x3f0 [ 25.142994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.143057] kthread+0x24c/0x2d0 [ 25.143108] ret_from_fork+0x10/0x20 [ 25.143157] [ 25.150718] Allocated by task 253: [ 25.151238] kasan_save_stack+0x3c/0x68 [ 25.151710] kasan_save_track+0x20/0x40 [ 25.152144] kasan_save_alloc_info+0x40/0x58 [ 25.152607] __kasan_kmalloc+0xd4/0xd8 [ 25.155288] __kmalloc_cache_noprof+0x154/0x320 [ 25.156660] kasan_atomics+0xb8/0x2e8 [ 25.157084] kunit_try_run_case+0x170/0x3f0 [ 25.157726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.158414] kthread+0x24c/0x2d0 [ 25.159131] ret_from_fork+0x10/0x20 [ 25.160326] [ 25.160593] The buggy address belongs to the object at fff00000c4205580 [ 25.160593] which belongs to the cache kmalloc-64 of size 64 [ 25.162762] The buggy address is located 0 bytes to the right of [ 25.162762] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.165590] [ 25.166085] The buggy address belongs to the physical page: [ 25.166948] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.168516] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.170008] page_type: f5(slab) [ 25.170527] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.171713] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.172522] page dumped because: kasan: bad access detected [ 25.173184] [ 25.173502] Memory state around the buggy address: [ 25.174148] fff00000c4205480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 25.175012] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.175771] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.176932] ^ [ 25.177514] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.178452] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.179233] ================================================================== [ 26.201573] ================================================================== [ 26.202316] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f6c/0x49c8 [ 26.203129] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.204283] [ 26.204580] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.204814] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.204906] Hardware name: linux,dummy-virt (DT) [ 26.205023] Call trace: [ 26.205097] dump_backtrace+0x9c/0x128 [ 26.205223] show_stack+0x20/0x38 [ 26.205341] dump_stack_lvl+0x8c/0xd0 [ 26.205459] print_report+0x118/0x5f0 [ 26.205573] kasan_report+0xdc/0x128 [ 26.205636] __asan_report_load4_noabort+0x20/0x30 [ 26.205690] kasan_atomics_helper+0x3f6c/0x49c8 [ 26.205745] kasan_atomics+0x1a0/0x2e8 [ 26.205796] kunit_try_run_case+0x170/0x3f0 [ 26.205847] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.205901] kthread+0x24c/0x2d0 [ 26.205950] ret_from_fork+0x10/0x20 [ 26.206031] [ 26.212231] Allocated by task 253: [ 26.213263] kasan_save_stack+0x3c/0x68 [ 26.213736] kasan_save_track+0x20/0x40 [ 26.214314] kasan_save_alloc_info+0x40/0x58 [ 26.214936] __kasan_kmalloc+0xd4/0xd8 [ 26.217485] __kmalloc_cache_noprof+0x154/0x320 [ 26.217901] kasan_atomics+0xb8/0x2e8 [ 26.218296] kunit_try_run_case+0x170/0x3f0 [ 26.218698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.220863] kthread+0x24c/0x2d0 [ 26.222349] ret_from_fork+0x10/0x20 [ 26.223705] [ 26.224558] The buggy address belongs to the object at fff00000c4205580 [ 26.224558] which belongs to the cache kmalloc-64 of size 64 [ 26.226679] The buggy address is located 0 bytes to the right of [ 26.226679] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.228027] [ 26.228362] The buggy address belongs to the physical page: [ 26.228998] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.229861] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.230587] page_type: f5(slab) [ 26.231066] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.231796] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.232593] page dumped because: kasan: bad access detected [ 26.233190] [ 26.233507] Memory state around the buggy address: [ 26.234030] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.234867] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.235674] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.236426] ^ [ 26.237000] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.237711] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.238419] ================================================================== [ 26.340726] ================================================================== [ 26.342020] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3fc4/0x49c8 [ 26.342906] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.344196] [ 26.344660] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.344888] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.345114] Hardware name: linux,dummy-virt (DT) [ 26.345159] Call trace: [ 26.345192] dump_backtrace+0x9c/0x128 [ 26.345251] show_stack+0x20/0x38 [ 26.345299] dump_stack_lvl+0x8c/0xd0 [ 26.345347] print_report+0x118/0x5f0 [ 26.345394] kasan_report+0xdc/0x128 [ 26.345441] __asan_report_store8_noabort+0x20/0x30 [ 26.345494] kasan_atomics_helper+0x3fc4/0x49c8 [ 26.345548] kasan_atomics+0x1a0/0x2e8 [ 26.345599] kunit_try_run_case+0x170/0x3f0 [ 26.345648] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.345704] kthread+0x24c/0x2d0 [ 26.345752] ret_from_fork+0x10/0x20 [ 26.345803] [ 26.352418] Allocated by task 253: [ 26.352990] kasan_save_stack+0x3c/0x68 [ 26.353573] kasan_save_track+0x20/0x40 [ 26.354181] kasan_save_alloc_info+0x40/0x58 [ 26.354784] __kasan_kmalloc+0xd4/0xd8 [ 26.355302] __kmalloc_cache_noprof+0x154/0x320 [ 26.355978] kasan_atomics+0xb8/0x2e8 [ 26.356486] kunit_try_run_case+0x170/0x3f0 [ 26.357164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.357886] kthread+0x24c/0x2d0 [ 26.358422] ret_from_fork+0x10/0x20 [ 26.359029] [ 26.359357] The buggy address belongs to the object at fff00000c4205580 [ 26.359357] which belongs to the cache kmalloc-64 of size 64 [ 26.360674] The buggy address is located 0 bytes to the right of [ 26.360674] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.361947] [ 26.362306] The buggy address belongs to the physical page: [ 26.362887] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.363571] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.364332] page_type: f5(slab) [ 26.364827] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.365644] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.366453] page dumped because: kasan: bad access detected [ 26.367028] [ 26.367365] Memory state around the buggy address: [ 26.367926] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.368663] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.369390] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.370081] ^ [ 26.370691] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.371431] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.372176] ================================================================== [ 26.653312] ================================================================== [ 26.654150] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1288/0x49c8 [ 26.655467] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.656460] [ 26.656947] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.657169] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.657290] Hardware name: linux,dummy-virt (DT) [ 26.657383] Call trace: [ 26.657458] dump_backtrace+0x9c/0x128 [ 26.657549] show_stack+0x20/0x38 [ 26.657597] dump_stack_lvl+0x8c/0xd0 [ 26.657644] print_report+0x118/0x5f0 [ 26.657691] kasan_report+0xdc/0x128 [ 26.657738] kasan_check_range+0x100/0x1a8 [ 26.657788] __kasan_check_write+0x20/0x30 [ 26.657840] kasan_atomics_helper+0x1288/0x49c8 [ 26.657895] kasan_atomics+0x1a0/0x2e8 [ 26.657949] kunit_try_run_case+0x170/0x3f0 [ 26.658035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.658094] kthread+0x24c/0x2d0 [ 26.658145] ret_from_fork+0x10/0x20 [ 26.658196] [ 26.666336] Allocated by task 253: [ 26.666844] kasan_save_stack+0x3c/0x68 [ 26.667455] kasan_save_track+0x20/0x40 [ 26.667934] kasan_save_alloc_info+0x40/0x58 [ 26.668593] __kasan_kmalloc+0xd4/0xd8 [ 26.669229] __kmalloc_cache_noprof+0x154/0x320 [ 26.669853] kasan_atomics+0xb8/0x2e8 [ 26.670368] kunit_try_run_case+0x170/0x3f0 [ 26.671015] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.671688] kthread+0x24c/0x2d0 [ 26.672201] ret_from_fork+0x10/0x20 [ 26.672797] [ 26.673196] The buggy address belongs to the object at fff00000c4205580 [ 26.673196] which belongs to the cache kmalloc-64 of size 64 [ 26.674382] The buggy address is located 0 bytes to the right of [ 26.674382] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.675693] [ 26.676090] The buggy address belongs to the physical page: [ 26.676754] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.677599] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.678325] page_type: f5(slab) [ 26.678850] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.679651] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.680485] page dumped because: kasan: bad access detected [ 26.681189] [ 26.681537] Memory state around the buggy address: [ 26.682106] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.682855] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.683662] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.684344] ^ [ 26.685008] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.685951] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.686700] ================================================================== [ 26.824990] ================================================================== [ 26.825719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14ac/0x49c8 [ 26.826733] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.827490] [ 26.828095] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.828795] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.828834] Hardware name: linux,dummy-virt (DT) [ 26.828873] Call trace: [ 26.828904] dump_backtrace+0x9c/0x128 [ 26.828992] show_stack+0x20/0x38 [ 26.829112] dump_stack_lvl+0x8c/0xd0 [ 26.829230] print_report+0x118/0x5f0 [ 26.829341] kasan_report+0xdc/0x128 [ 26.829395] kasan_check_range+0x100/0x1a8 [ 26.829447] __kasan_check_write+0x20/0x30 [ 26.829498] kasan_atomics_helper+0x14ac/0x49c8 [ 26.829554] kasan_atomics+0x1a0/0x2e8 [ 26.829606] kunit_try_run_case+0x170/0x3f0 [ 26.829656] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.829713] kthread+0x24c/0x2d0 [ 26.829764] ret_from_fork+0x10/0x20 [ 26.829812] [ 26.836521] Allocated by task 253: [ 26.837049] kasan_save_stack+0x3c/0x68 [ 26.837694] kasan_save_track+0x20/0x40 [ 26.838258] kasan_save_alloc_info+0x40/0x58 [ 26.838765] __kasan_kmalloc+0xd4/0xd8 [ 26.839325] __kmalloc_cache_noprof+0x154/0x320 [ 26.840101] kasan_atomics+0xb8/0x2e8 [ 26.840572] kunit_try_run_case+0x170/0x3f0 [ 26.841170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.841781] kthread+0x24c/0x2d0 [ 26.842248] ret_from_fork+0x10/0x20 [ 26.842793] [ 26.843143] The buggy address belongs to the object at fff00000c4205580 [ 26.843143] which belongs to the cache kmalloc-64 of size 64 [ 26.844152] The buggy address is located 0 bytes to the right of [ 26.844152] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.845295] [ 26.845627] The buggy address belongs to the physical page: [ 26.846372] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.847166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.847954] page_type: f5(slab) [ 26.848380] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.849223] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.850020] page dumped because: kasan: bad access detected [ 26.850673] [ 26.851284] Memory state around the buggy address: [ 26.851827] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.852563] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.853281] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.854034] ^ [ 26.854601] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.855321] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.856097] ================================================================== [ 25.329363] ================================================================== [ 25.330440] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x434/0x49c8 [ 25.331200] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.332217] [ 25.332574] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.332779] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.332858] Hardware name: linux,dummy-virt (DT) [ 25.332943] Call trace: [ 25.333037] dump_backtrace+0x9c/0x128 [ 25.333165] show_stack+0x20/0x38 [ 25.333279] dump_stack_lvl+0x8c/0xd0 [ 25.333396] print_report+0x118/0x5f0 [ 25.333513] kasan_report+0xdc/0x128 [ 25.333607] kasan_check_range+0x100/0x1a8 [ 25.333661] __kasan_check_write+0x20/0x30 [ 25.333712] kasan_atomics_helper+0x434/0x49c8 [ 25.333765] kasan_atomics+0x1a0/0x2e8 [ 25.333815] kunit_try_run_case+0x170/0x3f0 [ 25.333864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.333919] kthread+0x24c/0x2d0 [ 25.333995] ret_from_fork+0x10/0x20 [ 25.334058] [ 25.342472] Allocated by task 253: [ 25.342938] kasan_save_stack+0x3c/0x68 [ 25.344184] kasan_save_track+0x20/0x40 [ 25.344737] kasan_save_alloc_info+0x40/0x58 [ 25.345493] __kasan_kmalloc+0xd4/0xd8 [ 25.345872] __kmalloc_cache_noprof+0x154/0x320 [ 25.346314] kasan_atomics+0xb8/0x2e8 [ 25.346687] kunit_try_run_case+0x170/0x3f0 [ 25.347840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.348850] kthread+0x24c/0x2d0 [ 25.349552] ret_from_fork+0x10/0x20 [ 25.349982] [ 25.350407] The buggy address belongs to the object at fff00000c4205580 [ 25.350407] which belongs to the cache kmalloc-64 of size 64 [ 25.351598] The buggy address is located 0 bytes to the right of [ 25.351598] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.353092] [ 25.353411] The buggy address belongs to the physical page: [ 25.353999] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.354871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.355753] page_type: f5(slab) [ 25.356223] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.357167] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.358002] page dumped because: kasan: bad access detected [ 25.358606] [ 25.358985] Memory state around the buggy address: [ 25.359656] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.360560] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.361643] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.362467] ^ [ 25.363059] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.363908] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.364854] ================================================================== [ 25.447074] ================================================================== [ 25.447750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x578/0x49c8 [ 25.449239] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.450824] [ 25.451307] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.451551] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.451632] Hardware name: linux,dummy-virt (DT) [ 25.451716] Call trace: [ 25.451781] dump_backtrace+0x9c/0x128 [ 25.451922] show_stack+0x20/0x38 [ 25.452036] dump_stack_lvl+0x8c/0xd0 [ 25.452141] print_report+0x118/0x5f0 [ 25.452237] kasan_report+0xdc/0x128 [ 25.452344] kasan_check_range+0x100/0x1a8 [ 25.452463] __kasan_check_write+0x20/0x30 [ 25.452560] kasan_atomics_helper+0x578/0x49c8 [ 25.452616] kasan_atomics+0x1a0/0x2e8 [ 25.452667] kunit_try_run_case+0x170/0x3f0 [ 25.452714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.452783] kthread+0x24c/0x2d0 [ 25.452835] ret_from_fork+0x10/0x20 [ 25.452885] [ 25.460944] Allocated by task 253: [ 25.461356] kasan_save_stack+0x3c/0x68 [ 25.461937] kasan_save_track+0x20/0x40 [ 25.462510] kasan_save_alloc_info+0x40/0x58 [ 25.463000] __kasan_kmalloc+0xd4/0xd8 [ 25.463583] __kmalloc_cache_noprof+0x154/0x320 [ 25.465020] kasan_atomics+0xb8/0x2e8 [ 25.465469] kunit_try_run_case+0x170/0x3f0 [ 25.466228] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.467028] kthread+0x24c/0x2d0 [ 25.467546] ret_from_fork+0x10/0x20 [ 25.468003] [ 25.468286] The buggy address belongs to the object at fff00000c4205580 [ 25.468286] which belongs to the cache kmalloc-64 of size 64 [ 25.470266] The buggy address is located 0 bytes to the right of [ 25.470266] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.471906] [ 25.472287] The buggy address belongs to the physical page: [ 25.472930] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.473787] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.474528] page_type: f5(slab) [ 25.475026] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.476626] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.477563] page dumped because: kasan: bad access detected [ 25.478242] [ 25.478705] Memory state around the buggy address: [ 25.479282] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.480377] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.481129] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.481979] ^ [ 25.482629] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.483447] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.484318] ================================================================== [ 26.169126] ================================================================== [ 26.170008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xda0/0x49c8 [ 26.171181] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.172464] [ 26.172799] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.173025] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.173107] Hardware name: linux,dummy-virt (DT) [ 26.173199] Call trace: [ 26.173275] dump_backtrace+0x9c/0x128 [ 26.173365] show_stack+0x20/0x38 [ 26.173413] dump_stack_lvl+0x8c/0xd0 [ 26.173461] print_report+0x118/0x5f0 [ 26.173506] kasan_report+0xdc/0x128 [ 26.173552] kasan_check_range+0x100/0x1a8 [ 26.173601] __kasan_check_write+0x20/0x30 [ 26.173650] kasan_atomics_helper+0xda0/0x49c8 [ 26.173705] kasan_atomics+0x1a0/0x2e8 [ 26.173755] kunit_try_run_case+0x170/0x3f0 [ 26.173802] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.173857] kthread+0x24c/0x2d0 [ 26.173903] ret_from_fork+0x10/0x20 [ 26.173951] [ 26.180703] Allocated by task 253: [ 26.181262] kasan_save_stack+0x3c/0x68 [ 26.181860] kasan_save_track+0x20/0x40 [ 26.182315] kasan_save_alloc_info+0x40/0x58 [ 26.182911] __kasan_kmalloc+0xd4/0xd8 [ 26.183488] __kmalloc_cache_noprof+0x154/0x320 [ 26.184128] kasan_atomics+0xb8/0x2e8 [ 26.184661] kunit_try_run_case+0x170/0x3f0 [ 26.185186] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.185855] kthread+0x24c/0x2d0 [ 26.186403] ret_from_fork+0x10/0x20 [ 26.186875] [ 26.187204] The buggy address belongs to the object at fff00000c4205580 [ 26.187204] which belongs to the cache kmalloc-64 of size 64 [ 26.188296] The buggy address is located 0 bytes to the right of [ 26.188296] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.189560] [ 26.189877] The buggy address belongs to the physical page: [ 26.190591] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.191508] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.192246] page_type: f5(slab) [ 26.192725] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.193584] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.194398] page dumped because: kasan: bad access detected [ 26.195017] [ 26.195302] Memory state around the buggy address: [ 26.195984] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.196665] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.197436] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.198233] ^ [ 26.198718] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.199620] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.200268] ================================================================== [ 26.064274] ================================================================== [ 26.065348] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f4c/0x49c8 [ 26.066374] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.068143] [ 26.068535] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.068690] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.068789] Hardware name: linux,dummy-virt (DT) [ 26.068887] Call trace: [ 26.068971] dump_backtrace+0x9c/0x128 [ 26.069117] show_stack+0x20/0x38 [ 26.069250] dump_stack_lvl+0x8c/0xd0 [ 26.069306] print_report+0x118/0x5f0 [ 26.069354] kasan_report+0xdc/0x128 [ 26.069400] __asan_report_load4_noabort+0x20/0x30 [ 26.069457] kasan_atomics_helper+0x3f4c/0x49c8 [ 26.069510] kasan_atomics+0x1a0/0x2e8 [ 26.069559] kunit_try_run_case+0x170/0x3f0 [ 26.069609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.069663] kthread+0x24c/0x2d0 [ 26.069713] ret_from_fork+0x10/0x20 [ 26.069764] [ 26.076642] Allocated by task 253: [ 26.077070] kasan_save_stack+0x3c/0x68 [ 26.077621] kasan_save_track+0x20/0x40 [ 26.078122] kasan_save_alloc_info+0x40/0x58 [ 26.078728] __kasan_kmalloc+0xd4/0xd8 [ 26.079353] __kmalloc_cache_noprof+0x154/0x320 [ 26.080013] kasan_atomics+0xb8/0x2e8 [ 26.080620] kunit_try_run_case+0x170/0x3f0 [ 26.081259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.081917] kthread+0x24c/0x2d0 [ 26.082468] ret_from_fork+0x10/0x20 [ 26.083044] [ 26.083402] The buggy address belongs to the object at fff00000c4205580 [ 26.083402] which belongs to the cache kmalloc-64 of size 64 [ 26.084646] The buggy address is located 0 bytes to the right of [ 26.084646] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.085980] [ 26.086321] The buggy address belongs to the physical page: [ 26.087020] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.087929] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.088666] page_type: f5(slab) [ 26.089287] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.090130] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.090919] page dumped because: kasan: bad access detected [ 26.091570] [ 26.091894] Memory state around the buggy address: [ 26.092522] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.093360] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.094132] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.094887] ^ [ 26.095467] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.096228] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.096825] ================================================================== [ 26.760261] ================================================================== [ 26.761071] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x141c/0x49c8 [ 26.761913] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.762624] [ 26.762997] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.763202] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.763287] Hardware name: linux,dummy-virt (DT) [ 26.763379] Call trace: [ 26.763477] dump_backtrace+0x9c/0x128 [ 26.763603] show_stack+0x20/0x38 [ 26.763714] dump_stack_lvl+0x8c/0xd0 [ 26.763827] print_report+0x118/0x5f0 [ 26.763920] kasan_report+0xdc/0x128 [ 26.763997] kasan_check_range+0x100/0x1a8 [ 26.764053] __kasan_check_write+0x20/0x30 [ 26.764103] kasan_atomics_helper+0x141c/0x49c8 [ 26.764158] kasan_atomics+0x1a0/0x2e8 [ 26.764208] kunit_try_run_case+0x170/0x3f0 [ 26.764257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.764314] kthread+0x24c/0x2d0 [ 26.764363] ret_from_fork+0x10/0x20 [ 26.764414] [ 26.771045] Allocated by task 253: [ 26.771478] kasan_save_stack+0x3c/0x68 [ 26.771950] kasan_save_track+0x20/0x40 [ 26.772540] kasan_save_alloc_info+0x40/0x58 [ 26.773058] __kasan_kmalloc+0xd4/0xd8 [ 26.773491] __kmalloc_cache_noprof+0x154/0x320 [ 26.774196] kasan_atomics+0xb8/0x2e8 [ 26.774747] kunit_try_run_case+0x170/0x3f0 [ 26.775351] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.775980] kthread+0x24c/0x2d0 [ 26.776503] ret_from_fork+0x10/0x20 [ 26.776957] [ 26.777287] The buggy address belongs to the object at fff00000c4205580 [ 26.777287] which belongs to the cache kmalloc-64 of size 64 [ 26.778513] The buggy address is located 0 bytes to the right of [ 26.778513] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.779689] [ 26.780029] The buggy address belongs to the physical page: [ 26.780518] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.781721] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.782906] page_type: f5(slab) [ 26.783427] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.784275] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.785047] page dumped because: kasan: bad access detected [ 26.785604] [ 26.785905] Memory state around the buggy address: [ 26.786482] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.787221] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.787953] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.788667] ^ [ 26.789218] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.789991] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.790697] ================================================================== [ 27.202073] ================================================================== [ 27.203002] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f88/0x49c8 [ 27.204094] Read of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 27.205069] [ 27.205459] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 27.205680] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.205769] Hardware name: linux,dummy-virt (DT) [ 27.205861] Call trace: [ 27.205896] dump_backtrace+0x9c/0x128 [ 27.205955] show_stack+0x20/0x38 [ 27.206035] dump_stack_lvl+0x8c/0xd0 [ 27.206086] print_report+0x118/0x5f0 [ 27.206133] kasan_report+0xdc/0x128 [ 27.206179] __asan_report_load8_noabort+0x20/0x30 [ 27.206236] kasan_atomics_helper+0x3f88/0x49c8 [ 27.206295] kasan_atomics+0x1a0/0x2e8 [ 27.206348] kunit_try_run_case+0x170/0x3f0 [ 27.206399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.206456] kthread+0x24c/0x2d0 [ 27.206507] ret_from_fork+0x10/0x20 [ 27.206560] [ 27.212716] Allocated by task 253: [ 27.213224] kasan_save_stack+0x3c/0x68 [ 27.213791] kasan_save_track+0x20/0x40 [ 27.214383] kasan_save_alloc_info+0x40/0x58 [ 27.214919] __kasan_kmalloc+0xd4/0xd8 [ 27.215530] __kmalloc_cache_noprof+0x154/0x320 [ 27.216214] kasan_atomics+0xb8/0x2e8 [ 27.216834] kunit_try_run_case+0x170/0x3f0 [ 27.217342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.218059] kthread+0x24c/0x2d0 [ 27.218511] ret_from_fork+0x10/0x20 [ 27.219014] [ 27.219342] The buggy address belongs to the object at fff00000c4205580 [ 27.219342] which belongs to the cache kmalloc-64 of size 64 [ 27.220450] The buggy address is located 0 bytes to the right of [ 27.220450] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 27.221721] [ 27.222061] The buggy address belongs to the physical page: [ 27.222648] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 27.223475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.224142] page_type: f5(slab) [ 27.224663] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.225397] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.226221] page dumped because: kasan: bad access detected [ 27.226816] [ 27.227158] Memory state around the buggy address: [ 27.227690] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.228413] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.229125] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.229808] ^ [ 27.230506] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.231162] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.231917] ================================================================== [ 25.254202] ================================================================== [ 25.254756] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x49c8 [ 25.255664] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.256451] [ 25.256831] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.257073] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.257161] Hardware name: linux,dummy-virt (DT) [ 25.257259] Call trace: [ 25.257337] dump_backtrace+0x9c/0x128 [ 25.257468] show_stack+0x20/0x38 [ 25.257591] dump_stack_lvl+0x8c/0xd0 [ 25.257715] print_report+0x118/0x5f0 [ 25.257834] kasan_report+0xdc/0x128 [ 25.257950] __asan_report_store4_noabort+0x20/0x30 [ 25.258152] kasan_atomics_helper+0x40fc/0x49c8 [ 25.258297] kasan_atomics+0x1a0/0x2e8 [ 25.258359] kunit_try_run_case+0x170/0x3f0 [ 25.258410] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.258468] kthread+0x24c/0x2d0 [ 25.258518] ret_from_fork+0x10/0x20 [ 25.258569] [ 25.266495] Allocated by task 253: [ 25.266983] kasan_save_stack+0x3c/0x68 [ 25.268674] kasan_save_track+0x20/0x40 [ 25.269141] kasan_save_alloc_info+0x40/0x58 [ 25.269767] __kasan_kmalloc+0xd4/0xd8 [ 25.270330] __kmalloc_cache_noprof+0x154/0x320 [ 25.270917] kasan_atomics+0xb8/0x2e8 [ 25.271879] kunit_try_run_case+0x170/0x3f0 [ 25.272696] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.273446] kthread+0x24c/0x2d0 [ 25.273977] ret_from_fork+0x10/0x20 [ 25.274518] [ 25.274900] The buggy address belongs to the object at fff00000c4205580 [ 25.274900] which belongs to the cache kmalloc-64 of size 64 [ 25.276613] The buggy address is located 0 bytes to the right of [ 25.276613] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.277788] [ 25.278371] The buggy address belongs to the physical page: [ 25.279028] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.280244] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.280926] page_type: f5(slab) [ 25.281560] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.282480] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.283352] page dumped because: kasan: bad access detected [ 25.284056] [ 25.284342] Memory state around the buggy address: [ 25.284911] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.285613] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.287056] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.287645] ^ [ 25.288574] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.289438] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.290320] ================================================================== [ 25.725893] ================================================================== [ 25.727009] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4440/0x49c8 [ 25.728043] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.728834] [ 25.729193] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.729424] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.729511] Hardware name: linux,dummy-virt (DT) [ 25.729609] Call trace: [ 25.729680] dump_backtrace+0x9c/0x128 [ 25.729813] show_stack+0x20/0x38 [ 25.729908] dump_stack_lvl+0x8c/0xd0 [ 25.729992] print_report+0x118/0x5f0 [ 25.730049] kasan_report+0xdc/0x128 [ 25.730096] __asan_report_load4_noabort+0x20/0x30 [ 25.730151] kasan_atomics_helper+0x4440/0x49c8 [ 25.730208] kasan_atomics+0x1a0/0x2e8 [ 25.730260] kunit_try_run_case+0x170/0x3f0 [ 25.730312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.730369] kthread+0x24c/0x2d0 [ 25.730422] ret_from_fork+0x10/0x20 [ 25.730477] [ 25.736856] Allocated by task 253: [ 25.737417] kasan_save_stack+0x3c/0x68 [ 25.737942] kasan_save_track+0x20/0x40 [ 25.738511] kasan_save_alloc_info+0x40/0x58 [ 25.739044] __kasan_kmalloc+0xd4/0xd8 [ 25.739652] __kmalloc_cache_noprof+0x154/0x320 [ 25.740230] kasan_atomics+0xb8/0x2e8 [ 25.740742] kunit_try_run_case+0x170/0x3f0 [ 25.741316] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.741929] kthread+0x24c/0x2d0 [ 25.742472] ret_from_fork+0x10/0x20 [ 25.743126] [ 25.743455] The buggy address belongs to the object at fff00000c4205580 [ 25.743455] which belongs to the cache kmalloc-64 of size 64 [ 25.744561] The buggy address is located 0 bytes to the right of [ 25.744561] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.745749] [ 25.746142] The buggy address belongs to the physical page: [ 25.746767] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.747509] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.748291] page_type: f5(slab) [ 25.748803] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.749722] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.750462] page dumped because: kasan: bad access detected [ 25.751083] [ 25.751431] Memory state around the buggy address: [ 25.752050] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.752758] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.753591] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.754380] ^ [ 25.754955] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.755646] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.756404] ================================================================== [ 26.440372] ================================================================== [ 26.441235] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1000/0x49c8 [ 26.441927] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.443169] [ 26.443866] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.444089] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.444174] Hardware name: linux,dummy-virt (DT) [ 26.444286] Call trace: [ 26.444371] dump_backtrace+0x9c/0x128 [ 26.444495] show_stack+0x20/0x38 [ 26.444566] dump_stack_lvl+0x8c/0xd0 [ 26.444616] print_report+0x118/0x5f0 [ 26.444666] kasan_report+0xdc/0x128 [ 26.444714] kasan_check_range+0x100/0x1a8 [ 26.444772] __kasan_check_write+0x20/0x30 [ 26.444828] kasan_atomics_helper+0x1000/0x49c8 [ 26.444883] kasan_atomics+0x1a0/0x2e8 [ 26.444935] kunit_try_run_case+0x170/0x3f0 [ 26.445017] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.445078] kthread+0x24c/0x2d0 [ 26.445128] ret_from_fork+0x10/0x20 [ 26.445178] [ 26.452212] Allocated by task 253: [ 26.452778] kasan_save_stack+0x3c/0x68 [ 26.453441] kasan_save_track+0x20/0x40 [ 26.454054] kasan_save_alloc_info+0x40/0x58 [ 26.454611] __kasan_kmalloc+0xd4/0xd8 [ 26.455206] __kmalloc_cache_noprof+0x154/0x320 [ 26.455879] kasan_atomics+0xb8/0x2e8 [ 26.456487] kunit_try_run_case+0x170/0x3f0 [ 26.457098] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.457808] kthread+0x24c/0x2d0 [ 26.458340] ret_from_fork+0x10/0x20 [ 26.458892] [ 26.459276] The buggy address belongs to the object at fff00000c4205580 [ 26.459276] which belongs to the cache kmalloc-64 of size 64 [ 26.460474] The buggy address is located 0 bytes to the right of [ 26.460474] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.461800] [ 26.462195] The buggy address belongs to the physical page: [ 26.462812] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.463685] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.464304] page_type: f5(slab) [ 26.464759] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.465624] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.466381] page dumped because: kasan: bad access detected [ 26.466988] [ 26.467266] Memory state around the buggy address: [ 26.467874] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.468618] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.469371] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.470045] ^ [ 26.470627] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.471449] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.472236] ================================================================== [ 25.618953] ================================================================== [ 25.619693] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7a0/0x49c8 [ 25.620610] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.621409] [ 25.621828] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.622054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.622180] Hardware name: linux,dummy-virt (DT) [ 25.622276] Call trace: [ 25.622350] dump_backtrace+0x9c/0x128 [ 25.622477] show_stack+0x20/0x38 [ 25.622594] dump_stack_lvl+0x8c/0xd0 [ 25.622716] print_report+0x118/0x5f0 [ 25.622836] kasan_report+0xdc/0x128 [ 25.622955] kasan_check_range+0x100/0x1a8 [ 25.623098] __kasan_check_write+0x20/0x30 [ 25.623162] kasan_atomics_helper+0x7a0/0x49c8 [ 25.623217] kasan_atomics+0x1a0/0x2e8 [ 25.623268] kunit_try_run_case+0x170/0x3f0 [ 25.623318] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.623373] kthread+0x24c/0x2d0 [ 25.623424] ret_from_fork+0x10/0x20 [ 25.623474] [ 25.630110] Allocated by task 253: [ 25.630505] kasan_save_stack+0x3c/0x68 [ 25.631146] kasan_save_track+0x20/0x40 [ 25.631764] kasan_save_alloc_info+0x40/0x58 [ 25.632370] __kasan_kmalloc+0xd4/0xd8 [ 25.632810] __kmalloc_cache_noprof+0x154/0x320 [ 25.633581] kasan_atomics+0xb8/0x2e8 [ 25.634978] kunit_try_run_case+0x170/0x3f0 [ 25.635581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.636166] kthread+0x24c/0x2d0 [ 25.636567] ret_from_fork+0x10/0x20 [ 25.637233] [ 25.637698] The buggy address belongs to the object at fff00000c4205580 [ 25.637698] which belongs to the cache kmalloc-64 of size 64 [ 25.638940] The buggy address is located 0 bytes to the right of [ 25.638940] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.640500] [ 25.640795] The buggy address belongs to the physical page: [ 25.641393] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.642261] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.643190] page_type: f5(slab) [ 25.643755] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.644659] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.645538] page dumped because: kasan: bad access detected [ 25.646232] [ 25.646647] Memory state around the buggy address: [ 25.647285] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.648120] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.648941] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.649736] ^ [ 25.650381] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.651268] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.652047] ================================================================== [ 25.654255] ================================================================== [ 25.654940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x810/0x49c8 [ 25.655846] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.657036] [ 25.657383] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.657759] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.657798] Hardware name: linux,dummy-virt (DT) [ 25.657837] Call trace: [ 25.657869] dump_backtrace+0x9c/0x128 [ 25.657926] show_stack+0x20/0x38 [ 25.658005] dump_stack_lvl+0x8c/0xd0 [ 25.658058] print_report+0x118/0x5f0 [ 25.658105] kasan_report+0xdc/0x128 [ 25.658151] kasan_check_range+0x100/0x1a8 [ 25.658201] __kasan_check_write+0x20/0x30 [ 25.658250] kasan_atomics_helper+0x810/0x49c8 [ 25.658305] kasan_atomics+0x1a0/0x2e8 [ 25.658356] kunit_try_run_case+0x170/0x3f0 [ 25.658405] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.658461] kthread+0x24c/0x2d0 [ 25.658511] ret_from_fork+0x10/0x20 [ 25.658562] [ 25.665427] Allocated by task 253: [ 25.665994] kasan_save_stack+0x3c/0x68 [ 25.666590] kasan_save_track+0x20/0x40 [ 25.667167] kasan_save_alloc_info+0x40/0x58 [ 25.667763] __kasan_kmalloc+0xd4/0xd8 [ 25.668207] __kmalloc_cache_noprof+0x154/0x320 [ 25.669000] kasan_atomics+0xb8/0x2e8 [ 25.669627] kunit_try_run_case+0x170/0x3f0 [ 25.670272] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.671003] kthread+0x24c/0x2d0 [ 25.671582] ret_from_fork+0x10/0x20 [ 25.672073] [ 25.672447] The buggy address belongs to the object at fff00000c4205580 [ 25.672447] which belongs to the cache kmalloc-64 of size 64 [ 25.673456] The buggy address is located 0 bytes to the right of [ 25.673456] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.674614] [ 25.674944] The buggy address belongs to the physical page: [ 25.675571] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.676379] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.677070] page_type: f5(slab) [ 25.677475] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.678329] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.679099] page dumped because: kasan: bad access detected [ 25.679736] [ 25.680092] Memory state around the buggy address: [ 25.680649] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.681433] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.682274] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.682904] ^ [ 25.683544] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.684242] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.684804] ================================================================== [ 25.757622] ================================================================== [ 25.758422] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x978/0x49c8 [ 25.759116] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.759723] [ 25.759938] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.760218] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.760331] Hardware name: linux,dummy-virt (DT) [ 25.760484] Call trace: [ 25.760558] dump_backtrace+0x9c/0x128 [ 25.760685] show_stack+0x20/0x38 [ 25.760806] dump_stack_lvl+0x8c/0xd0 [ 25.760929] print_report+0x118/0x5f0 [ 25.761068] kasan_report+0xdc/0x128 [ 25.761184] kasan_check_range+0x100/0x1a8 [ 25.761377] __kasan_check_write+0x20/0x30 [ 25.761511] kasan_atomics_helper+0x978/0x49c8 [ 25.761645] kasan_atomics+0x1a0/0x2e8 [ 25.761740] kunit_try_run_case+0x170/0x3f0 [ 25.761797] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.761856] kthread+0x24c/0x2d0 [ 25.761907] ret_from_fork+0x10/0x20 [ 25.761976] [ 25.770235] Allocated by task 253: [ 25.770643] kasan_save_stack+0x3c/0x68 [ 25.771331] kasan_save_track+0x20/0x40 [ 25.771974] kasan_save_alloc_info+0x40/0x58 [ 25.772540] __kasan_kmalloc+0xd4/0xd8 [ 25.773149] __kmalloc_cache_noprof+0x154/0x320 [ 25.773764] kasan_atomics+0xb8/0x2e8 [ 25.774439] kunit_try_run_case+0x170/0x3f0 [ 25.775029] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.775733] kthread+0x24c/0x2d0 [ 25.776236] ret_from_fork+0x10/0x20 [ 25.776795] [ 25.777184] The buggy address belongs to the object at fff00000c4205580 [ 25.777184] which belongs to the cache kmalloc-64 of size 64 [ 25.778418] The buggy address is located 0 bytes to the right of [ 25.778418] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.779643] [ 25.780008] The buggy address belongs to the physical page: [ 25.780703] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.781572] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.782336] page_type: f5(slab) [ 25.782848] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.783700] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.784552] page dumped because: kasan: bad access detected [ 25.785196] [ 25.785549] Memory state around the buggy address: [ 25.786162] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.786984] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.787767] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.788561] ^ [ 25.789134] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.789900] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.790779] ================================================================== [ 26.474101] ================================================================== [ 26.474829] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x106c/0x49c8 [ 26.475725] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.476623] [ 26.476942] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.477408] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.477479] Hardware name: linux,dummy-virt (DT) [ 26.477553] Call trace: [ 26.477613] dump_backtrace+0x9c/0x128 [ 26.477725] show_stack+0x20/0x38 [ 26.477819] dump_stack_lvl+0x8c/0xd0 [ 26.477923] print_report+0x118/0x5f0 [ 26.478055] kasan_report+0xdc/0x128 [ 26.478164] kasan_check_range+0x100/0x1a8 [ 26.478281] __kasan_check_write+0x20/0x30 [ 26.478395] kasan_atomics_helper+0x106c/0x49c8 [ 26.478515] kasan_atomics+0x1a0/0x2e8 [ 26.478629] kunit_try_run_case+0x170/0x3f0 [ 26.478743] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.478858] kthread+0x24c/0x2d0 [ 26.478979] ret_from_fork+0x10/0x20 [ 26.479092] [ 26.493022] Allocated by task 253: [ 26.493571] kasan_save_stack+0x3c/0x68 [ 26.494078] kasan_save_track+0x20/0x40 [ 26.494717] kasan_save_alloc_info+0x40/0x58 [ 26.495328] __kasan_kmalloc+0xd4/0xd8 [ 26.495890] __kmalloc_cache_noprof+0x154/0x320 [ 26.496559] kasan_atomics+0xb8/0x2e8 [ 26.497114] kunit_try_run_case+0x170/0x3f0 [ 26.497691] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.498400] kthread+0x24c/0x2d0 [ 26.498895] ret_from_fork+0x10/0x20 [ 26.499456] [ 26.499805] The buggy address belongs to the object at fff00000c4205580 [ 26.499805] which belongs to the cache kmalloc-64 of size 64 [ 26.501028] The buggy address is located 0 bytes to the right of [ 26.501028] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.502283] [ 26.502595] The buggy address belongs to the physical page: [ 26.503217] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.504153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.504899] page_type: f5(slab) [ 26.505404] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.506248] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.507045] page dumped because: kasan: bad access detected [ 26.507667] [ 26.508005] Memory state around the buggy address: [ 26.508592] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.509450] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.510255] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.511006] ^ [ 26.511578] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.512361] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.513173] ================================================================== [ 26.720317] ================================================================== [ 26.721065] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1370/0x49c8 [ 26.721925] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.723997] [ 26.724340] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.724545] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.724630] Hardware name: linux,dummy-virt (DT) [ 26.724718] Call trace: [ 26.724800] dump_backtrace+0x9c/0x128 [ 26.724919] show_stack+0x20/0x38 [ 26.725023] dump_stack_lvl+0x8c/0xd0 [ 26.725079] print_report+0x118/0x5f0 [ 26.725125] kasan_report+0xdc/0x128 [ 26.725171] kasan_check_range+0x100/0x1a8 [ 26.725219] __kasan_check_write+0x20/0x30 [ 26.725270] kasan_atomics_helper+0x1370/0x49c8 [ 26.725325] kasan_atomics+0x1a0/0x2e8 [ 26.725374] kunit_try_run_case+0x170/0x3f0 [ 26.725423] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.725480] kthread+0x24c/0x2d0 [ 26.725530] ret_from_fork+0x10/0x20 [ 26.725580] [ 26.732523] Allocated by task 253: [ 26.733063] kasan_save_stack+0x3c/0x68 [ 26.733749] kasan_save_track+0x20/0x40 [ 26.734325] kasan_save_alloc_info+0x40/0x58 [ 26.734944] __kasan_kmalloc+0xd4/0xd8 [ 26.735487] __kmalloc_cache_noprof+0x154/0x320 [ 26.736144] kasan_atomics+0xb8/0x2e8 [ 26.736675] kunit_try_run_case+0x170/0x3f0 [ 26.737255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.737911] kthread+0x24c/0x2d0 [ 26.738412] ret_from_fork+0x10/0x20 [ 26.738939] [ 26.739277] The buggy address belongs to the object at fff00000c4205580 [ 26.739277] which belongs to the cache kmalloc-64 of size 64 [ 26.740360] The buggy address is located 0 bytes to the right of [ 26.740360] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.741679] [ 26.742569] The buggy address belongs to the physical page: [ 26.743831] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.744452] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.744995] page_type: f5(slab) [ 26.745363] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.745911] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.750203] page dumped because: kasan: bad access detected [ 26.751760] [ 26.752381] Memory state around the buggy address: [ 26.754099] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.754822] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.755531] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.756324] ^ [ 26.756920] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.757672] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.758343] ================================================================== [ 26.584804] ================================================================== [ 26.585516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11b0/0x49c8 [ 26.586228] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.587273] [ 26.587569] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.587773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.587857] Hardware name: linux,dummy-virt (DT) [ 26.588001] Call trace: [ 26.588073] dump_backtrace+0x9c/0x128 [ 26.588200] show_stack+0x20/0x38 [ 26.588367] dump_stack_lvl+0x8c/0xd0 [ 26.588487] print_report+0x118/0x5f0 [ 26.588589] kasan_report+0xdc/0x128 [ 26.588640] kasan_check_range+0x100/0x1a8 [ 26.588690] __kasan_check_write+0x20/0x30 [ 26.588746] kasan_atomics_helper+0x11b0/0x49c8 [ 26.588817] kasan_atomics+0x1a0/0x2e8 [ 26.588871] kunit_try_run_case+0x170/0x3f0 [ 26.588922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.589006] kthread+0x24c/0x2d0 [ 26.589063] ret_from_fork+0x10/0x20 [ 26.589114] [ 26.597124] Allocated by task 253: [ 26.597632] kasan_save_stack+0x3c/0x68 [ 26.598203] kasan_save_track+0x20/0x40 [ 26.598814] kasan_save_alloc_info+0x40/0x58 [ 26.599536] __kasan_kmalloc+0xd4/0xd8 [ 26.600074] __kmalloc_cache_noprof+0x154/0x320 [ 26.600648] kasan_atomics+0xb8/0x2e8 [ 26.601269] kunit_try_run_case+0x170/0x3f0 [ 26.601880] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.602596] kthread+0x24c/0x2d0 [ 26.603111] ret_from_fork+0x10/0x20 [ 26.603713] [ 26.604062] The buggy address belongs to the object at fff00000c4205580 [ 26.604062] which belongs to the cache kmalloc-64 of size 64 [ 26.605240] The buggy address is located 0 bytes to the right of [ 26.605240] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.606550] [ 26.606928] The buggy address belongs to the physical page: [ 26.607580] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.608491] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.609269] page_type: f5(slab) [ 26.609806] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.610664] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.611465] page dumped because: kasan: bad access detected [ 26.612094] [ 26.612455] Memory state around the buggy address: [ 26.613071] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.613878] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.614671] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.615488] ^ [ 26.616068] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.616890] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.617649] ================================================================== [ 26.134839] ================================================================== [ 26.135557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f40/0x49c8 [ 26.136525] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.137471] [ 26.138003] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.138227] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.138426] Hardware name: linux,dummy-virt (DT) [ 26.138526] Call trace: [ 26.138598] dump_backtrace+0x9c/0x128 [ 26.138725] show_stack+0x20/0x38 [ 26.138807] dump_stack_lvl+0x8c/0xd0 [ 26.138882] print_report+0x118/0x5f0 [ 26.138933] kasan_report+0xdc/0x128 [ 26.139004] __asan_report_load4_noabort+0x20/0x30 [ 26.139064] kasan_atomics_helper+0x3f40/0x49c8 [ 26.139120] kasan_atomics+0x1a0/0x2e8 [ 26.139169] kunit_try_run_case+0x170/0x3f0 [ 26.139216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.139272] kthread+0x24c/0x2d0 [ 26.139320] ret_from_fork+0x10/0x20 [ 26.139370] [ 26.146084] Allocated by task 253: [ 26.146621] kasan_save_stack+0x3c/0x68 [ 26.147354] kasan_save_track+0x20/0x40 [ 26.147890] kasan_save_alloc_info+0x40/0x58 [ 26.148589] __kasan_kmalloc+0xd4/0xd8 [ 26.149164] __kmalloc_cache_noprof+0x154/0x320 [ 26.149887] kasan_atomics+0xb8/0x2e8 [ 26.150461] kunit_try_run_case+0x170/0x3f0 [ 26.151178] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.151890] kthread+0x24c/0x2d0 [ 26.152344] ret_from_fork+0x10/0x20 [ 26.152897] [ 26.153270] The buggy address belongs to the object at fff00000c4205580 [ 26.153270] which belongs to the cache kmalloc-64 of size 64 [ 26.154479] The buggy address is located 0 bytes to the right of [ 26.154479] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.155802] [ 26.156168] The buggy address belongs to the physical page: [ 26.156788] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.157772] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.158682] page_type: f5(slab) [ 26.159504] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.160352] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.161238] page dumped because: kasan: bad access detected [ 26.161845] [ 26.162379] Memory state around the buggy address: [ 26.162906] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.163627] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.164372] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.165111] ^ [ 26.165646] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.166373] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.167143] ================================================================== [ 25.520141] ================================================================== [ 25.521150] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x650/0x49c8 [ 25.522327] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.523274] [ 25.523745] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.523987] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.524072] Hardware name: linux,dummy-virt (DT) [ 25.524165] Call trace: [ 25.524223] dump_backtrace+0x9c/0x128 [ 25.524284] show_stack+0x20/0x38 [ 25.524329] dump_stack_lvl+0x8c/0xd0 [ 25.524377] print_report+0x118/0x5f0 [ 25.524422] kasan_report+0xdc/0x128 [ 25.524470] kasan_check_range+0x100/0x1a8 [ 25.524519] __kasan_check_write+0x20/0x30 [ 25.524568] kasan_atomics_helper+0x650/0x49c8 [ 25.524622] kasan_atomics+0x1a0/0x2e8 [ 25.524672] kunit_try_run_case+0x170/0x3f0 [ 25.524719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.524788] kthread+0x24c/0x2d0 [ 25.524837] ret_from_fork+0x10/0x20 [ 25.524887] [ 25.531535] Allocated by task 253: [ 25.532050] kasan_save_stack+0x3c/0x68 [ 25.532669] kasan_save_track+0x20/0x40 [ 25.533204] kasan_save_alloc_info+0x40/0x58 [ 25.533812] __kasan_kmalloc+0xd4/0xd8 [ 25.534462] __kmalloc_cache_noprof+0x154/0x320 [ 25.535102] kasan_atomics+0xb8/0x2e8 [ 25.535535] kunit_try_run_case+0x170/0x3f0 [ 25.536084] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.536852] kthread+0x24c/0x2d0 [ 25.537411] ret_from_fork+0x10/0x20 [ 25.538047] [ 25.538416] The buggy address belongs to the object at fff00000c4205580 [ 25.538416] which belongs to the cache kmalloc-64 of size 64 [ 25.539507] The buggy address is located 0 bytes to the right of [ 25.539507] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.540832] [ 25.541188] The buggy address belongs to the physical page: [ 25.541972] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.542815] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.543482] page_type: f5(slab) [ 25.544167] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.544939] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.545664] page dumped because: kasan: bad access detected [ 25.546275] [ 25.546596] Memory state around the buggy address: [ 25.547137] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.547901] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.548570] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.549351] ^ [ 25.549899] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.550639] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.551409] ================================================================== [ 25.960381] ================================================================== [ 25.962049] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xbc8/0x49c8 [ 25.963293] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.964379] [ 25.964708] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.965163] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.965206] Hardware name: linux,dummy-virt (DT) [ 25.965289] Call trace: [ 25.965325] dump_backtrace+0x9c/0x128 [ 25.965382] show_stack+0x20/0x38 [ 25.965429] dump_stack_lvl+0x8c/0xd0 [ 25.965477] print_report+0x118/0x5f0 [ 25.965524] kasan_report+0xdc/0x128 [ 25.965568] kasan_check_range+0x100/0x1a8 [ 25.965615] __kasan_check_write+0x20/0x30 [ 25.965664] kasan_atomics_helper+0xbc8/0x49c8 [ 25.965716] kasan_atomics+0x1a0/0x2e8 [ 25.965765] kunit_try_run_case+0x170/0x3f0 [ 25.965814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.965870] kthread+0x24c/0x2d0 [ 25.965919] ret_from_fork+0x10/0x20 [ 25.966031] [ 25.974302] Allocated by task 253: [ 25.974898] kasan_save_stack+0x3c/0x68 [ 25.975619] kasan_save_track+0x20/0x40 [ 25.976238] kasan_save_alloc_info+0x40/0x58 [ 25.976845] __kasan_kmalloc+0xd4/0xd8 [ 25.977432] __kmalloc_cache_noprof+0x154/0x320 [ 25.978009] kasan_atomics+0xb8/0x2e8 [ 25.978571] kunit_try_run_case+0x170/0x3f0 [ 25.979209] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.979863] kthread+0x24c/0x2d0 [ 25.980442] ret_from_fork+0x10/0x20 [ 25.980993] [ 25.981370] The buggy address belongs to the object at fff00000c4205580 [ 25.981370] which belongs to the cache kmalloc-64 of size 64 [ 25.982560] The buggy address is located 0 bytes to the right of [ 25.982560] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.983504] [ 25.983645] The buggy address belongs to the physical page: [ 25.983902] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.985172] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.985887] page_type: f5(slab) [ 25.986368] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.987237] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.988032] page dumped because: kasan: bad access detected [ 25.988662] [ 25.989050] Memory state around the buggy address: [ 25.989601] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.990454] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.991246] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.992026] ^ [ 25.992642] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.993423] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.994201] ================================================================== [ 25.825284] ================================================================== [ 25.826030] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa50/0x49c8 [ 25.826851] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.827632] [ 25.828056] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.828262] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.828345] Hardware name: linux,dummy-virt (DT) [ 25.828439] Call trace: [ 25.828507] dump_backtrace+0x9c/0x128 [ 25.828634] show_stack+0x20/0x38 [ 25.828747] dump_stack_lvl+0x8c/0xd0 [ 25.828873] print_report+0x118/0x5f0 [ 25.829010] kasan_report+0xdc/0x128 [ 25.829130] kasan_check_range+0x100/0x1a8 [ 25.829251] __kasan_check_write+0x20/0x30 [ 25.829375] kasan_atomics_helper+0xa50/0x49c8 [ 25.829505] kasan_atomics+0x1a0/0x2e8 [ 25.829592] kunit_try_run_case+0x170/0x3f0 [ 25.829642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.829700] kthread+0x24c/0x2d0 [ 25.829751] ret_from_fork+0x10/0x20 [ 25.829803] [ 25.836479] Allocated by task 253: [ 25.836944] kasan_save_stack+0x3c/0x68 [ 25.837541] kasan_save_track+0x20/0x40 [ 25.838074] kasan_save_alloc_info+0x40/0x58 [ 25.838643] __kasan_kmalloc+0xd4/0xd8 [ 25.839175] __kmalloc_cache_noprof+0x154/0x320 [ 25.839766] kasan_atomics+0xb8/0x2e8 [ 25.840240] kunit_try_run_case+0x170/0x3f0 [ 25.840829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.841578] kthread+0x24c/0x2d0 [ 25.842080] ret_from_fork+0x10/0x20 [ 25.842554] [ 25.842886] The buggy address belongs to the object at fff00000c4205580 [ 25.842886] which belongs to the cache kmalloc-64 of size 64 [ 25.844023] The buggy address is located 0 bytes to the right of [ 25.844023] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.845153] [ 25.845434] The buggy address belongs to the physical page: [ 25.846127] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.847001] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.847699] page_type: f5(slab) [ 25.848271] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.849028] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.849801] page dumped because: kasan: bad access detected [ 25.850396] [ 25.850707] Memory state around the buggy address: [ 25.851264] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.852391] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.853051] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.853881] ^ [ 25.854436] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.855190] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.855903] ================================================================== [ 27.033084] ================================================================== [ 27.034193] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16f0/0x49c8 [ 27.035082] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 27.036061] [ 27.036441] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 27.036674] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.036797] Hardware name: linux,dummy-virt (DT) [ 27.036891] Call trace: [ 27.036984] dump_backtrace+0x9c/0x128 [ 27.037157] show_stack+0x20/0x38 [ 27.037277] dump_stack_lvl+0x8c/0xd0 [ 27.037445] print_report+0x118/0x5f0 [ 27.037550] kasan_report+0xdc/0x128 [ 27.037603] kasan_check_range+0x100/0x1a8 [ 27.037654] __kasan_check_write+0x20/0x30 [ 27.037749] kasan_atomics_helper+0x16f0/0x49c8 [ 27.037810] kasan_atomics+0x1a0/0x2e8 [ 27.037864] kunit_try_run_case+0x170/0x3f0 [ 27.037918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.038004] kthread+0x24c/0x2d0 [ 27.038060] ret_from_fork+0x10/0x20 [ 27.038112] [ 27.045349] Allocated by task 253: [ 27.045748] kasan_save_stack+0x3c/0x68 [ 27.046455] kasan_save_track+0x20/0x40 [ 27.047037] kasan_save_alloc_info+0x40/0x58 [ 27.047634] __kasan_kmalloc+0xd4/0xd8 [ 27.048296] __kmalloc_cache_noprof+0x154/0x320 [ 27.048913] kasan_atomics+0xb8/0x2e8 [ 27.049540] kunit_try_run_case+0x170/0x3f0 [ 27.050015] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.050762] kthread+0x24c/0x2d0 [ 27.051251] ret_from_fork+0x10/0x20 [ 27.051866] [ 27.052236] The buggy address belongs to the object at fff00000c4205580 [ 27.052236] which belongs to the cache kmalloc-64 of size 64 [ 27.053467] The buggy address is located 0 bytes to the right of [ 27.053467] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 27.054747] [ 27.055107] The buggy address belongs to the physical page: [ 27.055813] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 27.056675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.057452] page_type: f5(slab) [ 27.058019] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.058849] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.059626] page dumped because: kasan: bad access detected [ 27.060260] [ 27.060617] Memory state around the buggy address: [ 27.061261] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.062021] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.062838] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.063604] ^ [ 27.064205] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.065008] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.065777] ================================================================== [ 26.272801] ================================================================== [ 26.273466] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40c0/0x49c8 [ 26.274470] Read of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.275160] [ 26.275731] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.275845] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.275882] Hardware name: linux,dummy-virt (DT) [ 26.275924] Call trace: [ 26.275955] dump_backtrace+0x9c/0x128 [ 26.276105] show_stack+0x20/0x38 [ 26.276222] dump_stack_lvl+0x8c/0xd0 [ 26.276345] print_report+0x118/0x5f0 [ 26.276468] kasan_report+0xdc/0x128 [ 26.276589] __asan_report_load8_noabort+0x20/0x30 [ 26.276723] kasan_atomics_helper+0x40c0/0x49c8 [ 26.276865] kasan_atomics+0x1a0/0x2e8 [ 26.277016] kunit_try_run_case+0x170/0x3f0 [ 26.277139] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.277281] kthread+0x24c/0x2d0 [ 26.277390] ret_from_fork+0x10/0x20 [ 26.277501] [ 26.284659] Allocated by task 253: [ 26.285128] kasan_save_stack+0x3c/0x68 [ 26.285907] kasan_save_track+0x20/0x40 [ 26.286551] kasan_save_alloc_info+0x40/0x58 [ 26.287202] __kasan_kmalloc+0xd4/0xd8 [ 26.287664] __kmalloc_cache_noprof+0x154/0x320 [ 26.288202] kasan_atomics+0xb8/0x2e8 [ 26.288650] kunit_try_run_case+0x170/0x3f0 [ 26.289458] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.290118] kthread+0x24c/0x2d0 [ 26.290627] ret_from_fork+0x10/0x20 [ 26.291182] [ 26.291538] The buggy address belongs to the object at fff00000c4205580 [ 26.291538] which belongs to the cache kmalloc-64 of size 64 [ 26.292933] The buggy address is located 0 bytes to the right of [ 26.292933] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.294121] [ 26.294447] The buggy address belongs to the physical page: [ 26.295060] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.295998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.296759] page_type: f5(slab) [ 26.297339] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.298163] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.298972] page dumped because: kasan: bad access detected [ 26.299595] [ 26.299948] Memory state around the buggy address: [ 26.300515] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.301368] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.302155] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.302973] ^ [ 26.303573] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.304354] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.305130] ================================================================== [ 26.029948] ================================================================== [ 26.030922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc64/0x49c8 [ 26.031790] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.032613] [ 26.032998] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.033249] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.033317] Hardware name: linux,dummy-virt (DT) [ 26.033359] Call trace: [ 26.033390] dump_backtrace+0x9c/0x128 [ 26.033470] show_stack+0x20/0x38 [ 26.033588] dump_stack_lvl+0x8c/0xd0 [ 26.033752] print_report+0x118/0x5f0 [ 26.033881] kasan_report+0xdc/0x128 [ 26.034045] kasan_check_range+0x100/0x1a8 [ 26.034172] __kasan_check_write+0x20/0x30 [ 26.034229] kasan_atomics_helper+0xc64/0x49c8 [ 26.034284] kasan_atomics+0x1a0/0x2e8 [ 26.034336] kunit_try_run_case+0x170/0x3f0 [ 26.034384] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.034441] kthread+0x24c/0x2d0 [ 26.034492] ret_from_fork+0x10/0x20 [ 26.034549] [ 26.041740] Allocated by task 253: [ 26.042214] kasan_save_stack+0x3c/0x68 [ 26.042865] kasan_save_track+0x20/0x40 [ 26.043433] kasan_save_alloc_info+0x40/0x58 [ 26.044053] __kasan_kmalloc+0xd4/0xd8 [ 26.044625] __kmalloc_cache_noprof+0x154/0x320 [ 26.045287] kasan_atomics+0xb8/0x2e8 [ 26.045892] kunit_try_run_case+0x170/0x3f0 [ 26.046479] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.047217] kthread+0x24c/0x2d0 [ 26.047785] ret_from_fork+0x10/0x20 [ 26.048373] [ 26.048722] The buggy address belongs to the object at fff00000c4205580 [ 26.048722] which belongs to the cache kmalloc-64 of size 64 [ 26.050010] The buggy address is located 0 bytes to the right of [ 26.050010] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.051298] [ 26.051678] The buggy address belongs to the physical page: [ 26.052289] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.053206] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.053987] page_type: f5(slab) [ 26.054466] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.055348] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.056157] page dumped because: kasan: bad access detected [ 26.056788] [ 26.057117] Memory state around the buggy address: [ 26.057663] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.058537] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.059364] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.060247] ^ [ 26.060793] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.061451] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.062333] ================================================================== [ 27.137560] ================================================================== [ 27.138323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f78/0x49c8 [ 27.139174] Read of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 27.140000] [ 27.140333] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 27.140553] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.140642] Hardware name: linux,dummy-virt (DT) [ 27.140738] Call trace: [ 27.140823] dump_backtrace+0x9c/0x128 [ 27.140951] show_stack+0x20/0x38 [ 27.141091] dump_stack_lvl+0x8c/0xd0 [ 27.141183] print_report+0x118/0x5f0 [ 27.141280] kasan_report+0xdc/0x128 [ 27.141395] __asan_report_load8_noabort+0x20/0x30 [ 27.141530] kasan_atomics_helper+0x3f78/0x49c8 [ 27.141666] kasan_atomics+0x1a0/0x2e8 [ 27.141793] kunit_try_run_case+0x170/0x3f0 [ 27.141893] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.141955] kthread+0x24c/0x2d0 [ 27.142038] ret_from_fork+0x10/0x20 [ 27.142092] [ 27.149205] Allocated by task 253: [ 27.149616] kasan_save_stack+0x3c/0x68 [ 27.150213] kasan_save_track+0x20/0x40 [ 27.150721] kasan_save_alloc_info+0x40/0x58 [ 27.151222] __kasan_kmalloc+0xd4/0xd8 [ 27.151773] __kmalloc_cache_noprof+0x154/0x320 [ 27.152504] kasan_atomics+0xb8/0x2e8 [ 27.152979] kunit_try_run_case+0x170/0x3f0 [ 27.153563] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.154286] kthread+0x24c/0x2d0 [ 27.154708] ret_from_fork+0x10/0x20 [ 27.155250] [ 27.155536] The buggy address belongs to the object at fff00000c4205580 [ 27.155536] which belongs to the cache kmalloc-64 of size 64 [ 27.156678] The buggy address is located 0 bytes to the right of [ 27.156678] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 27.157923] [ 27.158287] The buggy address belongs to the physical page: [ 27.158887] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 27.159567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.160356] page_type: f5(slab) [ 27.160856] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.161648] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.162448] page dumped because: kasan: bad access detected [ 27.163041] [ 27.163333] Memory state around the buggy address: [ 27.163858] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.164607] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.165275] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.165899] ^ [ 27.166543] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.167306] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.168049] ================================================================== [ 26.306276] ================================================================== [ 26.307001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb0/0x49c8 [ 26.307856] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.308694] [ 26.309104] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.309311] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.309394] Hardware name: linux,dummy-virt (DT) [ 26.309485] Call trace: [ 26.309578] dump_backtrace+0x9c/0x128 [ 26.309731] show_stack+0x20/0x38 [ 26.309844] dump_stack_lvl+0x8c/0xd0 [ 26.309997] print_report+0x118/0x5f0 [ 26.310163] kasan_report+0xdc/0x128 [ 26.310314] kasan_check_range+0x100/0x1a8 [ 26.310435] __kasan_check_write+0x20/0x30 [ 26.310510] kasan_atomics_helper+0xeb0/0x49c8 [ 26.310565] kasan_atomics+0x1a0/0x2e8 [ 26.310616] kunit_try_run_case+0x170/0x3f0 [ 26.310665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.310722] kthread+0x24c/0x2d0 [ 26.310771] ret_from_fork+0x10/0x20 [ 26.310819] [ 26.318645] Allocated by task 253: [ 26.319021] kasan_save_stack+0x3c/0x68 [ 26.319398] kasan_save_track+0x20/0x40 [ 26.319765] kasan_save_alloc_info+0x40/0x58 [ 26.321031] __kasan_kmalloc+0xd4/0xd8 [ 26.321469] __kmalloc_cache_noprof+0x154/0x320 [ 26.322034] kasan_atomics+0xb8/0x2e8 [ 26.322564] kunit_try_run_case+0x170/0x3f0 [ 26.323175] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.323848] kthread+0x24c/0x2d0 [ 26.324466] ret_from_fork+0x10/0x20 [ 26.325038] [ 26.325353] The buggy address belongs to the object at fff00000c4205580 [ 26.325353] which belongs to the cache kmalloc-64 of size 64 [ 26.326478] The buggy address is located 0 bytes to the right of [ 26.326478] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.327746] [ 26.328139] The buggy address belongs to the physical page: [ 26.328810] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.329689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.330501] page_type: f5(slab) [ 26.331026] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.331868] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.332822] page dumped because: kasan: bad access detected [ 26.333385] [ 26.333660] Memory state around the buggy address: [ 26.334551] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.335456] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.336322] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.337194] ^ [ 26.337906] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.338796] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.339644] ================================================================== [ 27.233430] ================================================================== [ 27.234137] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18a4/0x49c8 [ 27.235383] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 27.236276] [ 27.236672] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 27.236948] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.237050] Hardware name: linux,dummy-virt (DT) [ 27.237142] Call trace: [ 27.237211] dump_backtrace+0x9c/0x128 [ 27.237334] show_stack+0x20/0x38 [ 27.237423] dump_stack_lvl+0x8c/0xd0 [ 27.237475] print_report+0x118/0x5f0 [ 27.237526] kasan_report+0xdc/0x128 [ 27.237574] kasan_check_range+0x100/0x1a8 [ 27.237624] __kasan_check_write+0x20/0x30 [ 27.237673] kasan_atomics_helper+0x18a4/0x49c8 [ 27.237730] kasan_atomics+0x1a0/0x2e8 [ 27.237781] kunit_try_run_case+0x170/0x3f0 [ 27.237832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.237888] kthread+0x24c/0x2d0 [ 27.237939] ret_from_fork+0x10/0x20 [ 27.238027] [ 27.245351] Allocated by task 253: [ 27.245946] kasan_save_stack+0x3c/0x68 [ 27.246526] kasan_save_track+0x20/0x40 [ 27.247218] kasan_save_alloc_info+0x40/0x58 [ 27.247859] __kasan_kmalloc+0xd4/0xd8 [ 27.248537] __kmalloc_cache_noprof+0x154/0x320 [ 27.249266] kasan_atomics+0xb8/0x2e8 [ 27.249795] kunit_try_run_case+0x170/0x3f0 [ 27.250444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.251036] kthread+0x24c/0x2d0 [ 27.251603] ret_from_fork+0x10/0x20 [ 27.252162] [ 27.252440] The buggy address belongs to the object at fff00000c4205580 [ 27.252440] which belongs to the cache kmalloc-64 of size 64 [ 27.253528] The buggy address is located 0 bytes to the right of [ 27.253528] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 27.254542] [ 27.254818] The buggy address belongs to the physical page: [ 27.255584] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 27.256579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.257386] page_type: f5(slab) [ 27.258017] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.258864] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.259757] page dumped because: kasan: bad access detected [ 27.260318] [ 27.260664] Memory state around the buggy address: [ 27.261314] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.262135] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.262974] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.263709] ^ [ 27.264310] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.265040] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.265842] ================================================================== [ 25.687271] ================================================================== [ 25.688649] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8d8/0x49c8 [ 25.690871] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.692090] [ 25.692374] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.692571] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.692647] Hardware name: linux,dummy-virt (DT) [ 25.692734] Call trace: [ 25.692805] dump_backtrace+0x9c/0x128 [ 25.692920] show_stack+0x20/0x38 [ 25.693347] dump_stack_lvl+0x8c/0xd0 [ 25.693529] print_report+0x118/0x5f0 [ 25.693652] kasan_report+0xdc/0x128 [ 25.693754] kasan_check_range+0x100/0x1a8 [ 25.693864] __kasan_check_write+0x20/0x30 [ 25.693998] kasan_atomics_helper+0x8d8/0x49c8 [ 25.694124] kasan_atomics+0x1a0/0x2e8 [ 25.694237] kunit_try_run_case+0x170/0x3f0 [ 25.694349] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.694476] kthread+0x24c/0x2d0 [ 25.694580] ret_from_fork+0x10/0x20 [ 25.694681] [ 25.703886] Allocated by task 253: [ 25.704400] kasan_save_stack+0x3c/0x68 [ 25.704922] kasan_save_track+0x20/0x40 [ 25.705519] kasan_save_alloc_info+0x40/0x58 [ 25.706145] __kasan_kmalloc+0xd4/0xd8 [ 25.706701] __kmalloc_cache_noprof+0x154/0x320 [ 25.707239] kasan_atomics+0xb8/0x2e8 [ 25.707811] kunit_try_run_case+0x170/0x3f0 [ 25.708420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.709142] kthread+0x24c/0x2d0 [ 25.709618] ret_from_fork+0x10/0x20 [ 25.710111] [ 25.710432] The buggy address belongs to the object at fff00000c4205580 [ 25.710432] which belongs to the cache kmalloc-64 of size 64 [ 25.711540] The buggy address is located 0 bytes to the right of [ 25.711540] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.712729] [ 25.713097] The buggy address belongs to the physical page: [ 25.713755] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.714528] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.715223] page_type: f5(slab) [ 25.715666] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.716522] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.717318] page dumped because: kasan: bad access detected [ 25.718003] [ 25.718326] Memory state around the buggy address: [ 25.718896] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.719643] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.720398] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.721200] ^ [ 25.721866] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.722549] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.723276] ================================================================== [ 25.792823] ================================================================== [ 25.793704] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x9e4/0x49c8 [ 25.794579] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.795625] [ 25.796246] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.796422] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.796537] Hardware name: linux,dummy-virt (DT) [ 25.796632] Call trace: [ 25.796705] dump_backtrace+0x9c/0x128 [ 25.796796] show_stack+0x20/0x38 [ 25.796846] dump_stack_lvl+0x8c/0xd0 [ 25.796896] print_report+0x118/0x5f0 [ 25.796943] kasan_report+0xdc/0x128 [ 25.797026] kasan_check_range+0x100/0x1a8 [ 25.797077] __kasan_check_write+0x20/0x30 [ 25.797128] kasan_atomics_helper+0x9e4/0x49c8 [ 25.797183] kasan_atomics+0x1a0/0x2e8 [ 25.797233] kunit_try_run_case+0x170/0x3f0 [ 25.797283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.797339] kthread+0x24c/0x2d0 [ 25.797394] ret_from_fork+0x10/0x20 [ 25.797444] [ 25.804629] Allocated by task 253: [ 25.805229] kasan_save_stack+0x3c/0x68 [ 25.805714] kasan_save_track+0x20/0x40 [ 25.806293] kasan_save_alloc_info+0x40/0x58 [ 25.806832] __kasan_kmalloc+0xd4/0xd8 [ 25.807299] __kmalloc_cache_noprof+0x154/0x320 [ 25.807916] kasan_atomics+0xb8/0x2e8 [ 25.808430] kunit_try_run_case+0x170/0x3f0 [ 25.808918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.809616] kthread+0x24c/0x2d0 [ 25.810034] ret_from_fork+0x10/0x20 [ 25.810506] [ 25.810830] The buggy address belongs to the object at fff00000c4205580 [ 25.810830] which belongs to the cache kmalloc-64 of size 64 [ 25.812065] The buggy address is located 0 bytes to the right of [ 25.812065] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.813244] [ 25.813557] The buggy address belongs to the physical page: [ 25.814087] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.814850] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.815652] page_type: f5(slab) [ 25.816165] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.817098] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.817861] page dumped because: kasan: bad access detected [ 25.818474] [ 25.818772] Memory state around the buggy address: [ 25.819327] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.820058] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.820867] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.821481] ^ [ 25.822123] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.823084] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.823887] ================================================================== [ 25.292205] ================================================================== [ 25.293340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3c8/0x49c8 [ 25.294167] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.295623] [ 25.296132] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.296341] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.296424] Hardware name: linux,dummy-virt (DT) [ 25.296513] Call trace: [ 25.296677] dump_backtrace+0x9c/0x128 [ 25.296864] show_stack+0x20/0x38 [ 25.296918] dump_stack_lvl+0x8c/0xd0 [ 25.296999] print_report+0x118/0x5f0 [ 25.297054] kasan_report+0xdc/0x128 [ 25.297099] kasan_check_range+0x100/0x1a8 [ 25.297149] __kasan_check_write+0x20/0x30 [ 25.297196] kasan_atomics_helper+0x3c8/0x49c8 [ 25.297250] kasan_atomics+0x1a0/0x2e8 [ 25.297298] kunit_try_run_case+0x170/0x3f0 [ 25.297346] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.297402] kthread+0x24c/0x2d0 [ 25.297449] ret_from_fork+0x10/0x20 [ 25.297500] [ 25.305600] Allocated by task 253: [ 25.306051] kasan_save_stack+0x3c/0x68 [ 25.306644] kasan_save_track+0x20/0x40 [ 25.308271] kasan_save_alloc_info+0x40/0x58 [ 25.309057] __kasan_kmalloc+0xd4/0xd8 [ 25.309620] __kmalloc_cache_noprof+0x154/0x320 [ 25.310232] kasan_atomics+0xb8/0x2e8 [ 25.310729] kunit_try_run_case+0x170/0x3f0 [ 25.311302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.311941] kthread+0x24c/0x2d0 [ 25.312382] ret_from_fork+0x10/0x20 [ 25.312935] [ 25.313546] The buggy address belongs to the object at fff00000c4205580 [ 25.313546] which belongs to the cache kmalloc-64 of size 64 [ 25.314702] The buggy address is located 0 bytes to the right of [ 25.314702] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.316453] [ 25.316816] The buggy address belongs to the physical page: [ 25.317454] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.318178] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.318890] page_type: f5(slab) [ 25.319650] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.320705] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.321648] page dumped because: kasan: bad access detected [ 25.322290] [ 25.322640] Memory state around the buggy address: [ 25.323237] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.324318] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.324646] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.325154] ^ [ 25.325661] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.326425] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.327159] ================================================================== [ 25.890441] ================================================================== [ 25.891258] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb28/0x49c8 [ 25.892126] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 25.892889] [ 25.893277] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 25.893489] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.893576] Hardware name: linux,dummy-virt (DT) [ 25.893673] Call trace: [ 25.893743] dump_backtrace+0x9c/0x128 [ 25.893868] show_stack+0x20/0x38 [ 25.893998] dump_stack_lvl+0x8c/0xd0 [ 25.894119] print_report+0x118/0x5f0 [ 25.894243] kasan_report+0xdc/0x128 [ 25.894356] kasan_check_range+0x100/0x1a8 [ 25.894475] __kasan_check_write+0x20/0x30 [ 25.894597] kasan_atomics_helper+0xb28/0x49c8 [ 25.894728] kasan_atomics+0x1a0/0x2e8 [ 25.894816] kunit_try_run_case+0x170/0x3f0 [ 25.894866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.894923] kthread+0x24c/0x2d0 [ 25.895009] ret_from_fork+0x10/0x20 [ 25.895067] [ 25.901824] Allocated by task 253: [ 25.902228] kasan_save_stack+0x3c/0x68 [ 25.902781] kasan_save_track+0x20/0x40 [ 25.903369] kasan_save_alloc_info+0x40/0x58 [ 25.904019] __kasan_kmalloc+0xd4/0xd8 [ 25.904504] __kmalloc_cache_noprof+0x154/0x320 [ 25.905058] kasan_atomics+0xb8/0x2e8 [ 25.905665] kunit_try_run_case+0x170/0x3f0 [ 25.906251] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.906871] kthread+0x24c/0x2d0 [ 25.907376] ret_from_fork+0x10/0x20 [ 25.907886] [ 25.908213] The buggy address belongs to the object at fff00000c4205580 [ 25.908213] which belongs to the cache kmalloc-64 of size 64 [ 25.909412] The buggy address is located 0 bytes to the right of [ 25.909412] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 25.910574] [ 25.910848] The buggy address belongs to the physical page: [ 25.911484] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 25.912398] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.913130] page_type: f5(slab) [ 25.913603] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.914374] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.915179] page dumped because: kasan: bad access detected [ 25.915816] [ 25.916145] Memory state around the buggy address: [ 25.916627] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.917514] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.918229] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.919036] ^ [ 25.919568] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.920361] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.921109] ================================================================== [ 26.514701] ================================================================== [ 26.516182] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10d8/0x49c8 [ 26.516932] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.517695] [ 26.518262] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.518525] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.518637] Hardware name: linux,dummy-virt (DT) [ 26.518729] Call trace: [ 26.518802] dump_backtrace+0x9c/0x128 [ 26.518941] show_stack+0x20/0x38 [ 26.519089] dump_stack_lvl+0x8c/0xd0 [ 26.519197] print_report+0x118/0x5f0 [ 26.519253] kasan_report+0xdc/0x128 [ 26.519300] kasan_check_range+0x100/0x1a8 [ 26.519350] __kasan_check_write+0x20/0x30 [ 26.519401] kasan_atomics_helper+0x10d8/0x49c8 [ 26.519455] kasan_atomics+0x1a0/0x2e8 [ 26.519505] kunit_try_run_case+0x170/0x3f0 [ 26.519554] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.519609] kthread+0x24c/0x2d0 [ 26.519660] ret_from_fork+0x10/0x20 [ 26.519711] [ 26.526884] Allocated by task 253: [ 26.527519] kasan_save_stack+0x3c/0x68 [ 26.528097] kasan_save_track+0x20/0x40 [ 26.528644] kasan_save_alloc_info+0x40/0x58 [ 26.529320] __kasan_kmalloc+0xd4/0xd8 [ 26.529765] __kmalloc_cache_noprof+0x154/0x320 [ 26.530565] kasan_atomics+0xb8/0x2e8 [ 26.531044] kunit_try_run_case+0x170/0x3f0 [ 26.531728] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.532462] kthread+0x24c/0x2d0 [ 26.533037] ret_from_fork+0x10/0x20 [ 26.533589] [ 26.534017] The buggy address belongs to the object at fff00000c4205580 [ 26.534017] which belongs to the cache kmalloc-64 of size 64 [ 26.535158] The buggy address is located 0 bytes to the right of [ 26.535158] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.536438] [ 26.536799] The buggy address belongs to the physical page: [ 26.537479] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.538390] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.539041] page_type: f5(slab) [ 26.539440] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.540561] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.541533] page dumped because: kasan: bad access detected [ 26.542149] [ 26.542690] Memory state around the buggy address: [ 26.543589] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.544452] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.545287] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.546142] ^ [ 26.546848] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.547593] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.548491] ================================================================== [ 26.619144] ================================================================== [ 26.619714] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x121c/0x49c8 [ 26.620854] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.622425] [ 26.623059] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.623281] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.623366] Hardware name: linux,dummy-virt (DT) [ 26.623447] Call trace: [ 26.623516] dump_backtrace+0x9c/0x128 [ 26.623630] show_stack+0x20/0x38 [ 26.623734] dump_stack_lvl+0x8c/0xd0 [ 26.623856] print_report+0x118/0x5f0 [ 26.624066] kasan_report+0xdc/0x128 [ 26.624172] kasan_check_range+0x100/0x1a8 [ 26.624227] __kasan_check_write+0x20/0x30 [ 26.624278] kasan_atomics_helper+0x121c/0x49c8 [ 26.624335] kasan_atomics+0x1a0/0x2e8 [ 26.624386] kunit_try_run_case+0x170/0x3f0 [ 26.624435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.624491] kthread+0x24c/0x2d0 [ 26.624541] ret_from_fork+0x10/0x20 [ 26.624591] [ 26.632326] Allocated by task 253: [ 26.632947] kasan_save_stack+0x3c/0x68 [ 26.633614] kasan_save_track+0x20/0x40 [ 26.634079] kasan_save_alloc_info+0x40/0x58 [ 26.634828] __kasan_kmalloc+0xd4/0xd8 [ 26.635504] __kmalloc_cache_noprof+0x154/0x320 [ 26.636217] kasan_atomics+0xb8/0x2e8 [ 26.636812] kunit_try_run_case+0x170/0x3f0 [ 26.637496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.638090] kthread+0x24c/0x2d0 [ 26.638499] ret_from_fork+0x10/0x20 [ 26.638938] [ 26.639679] The buggy address belongs to the object at fff00000c4205580 [ 26.639679] which belongs to the cache kmalloc-64 of size 64 [ 26.640755] The buggy address is located 0 bytes to the right of [ 26.640755] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.642064] [ 26.642383] The buggy address belongs to the physical page: [ 26.643032] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.643810] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.644576] page_type: f5(slab) [ 26.645158] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.645988] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.646755] page dumped because: kasan: bad access detected [ 26.647354] [ 26.647691] Memory state around the buggy address: [ 26.648250] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.649011] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.649835] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.650500] ^ [ 26.650988] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.651541] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.652098] ================================================================== [ 26.099305] ================================================================== [ 26.100042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd00/0x49c8 [ 26.100740] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.101469] [ 26.102032] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.102275] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.102359] Hardware name: linux,dummy-virt (DT) [ 26.102452] Call trace: [ 26.102580] dump_backtrace+0x9c/0x128 [ 26.102736] show_stack+0x20/0x38 [ 26.102805] dump_stack_lvl+0x8c/0xd0 [ 26.102855] print_report+0x118/0x5f0 [ 26.102900] kasan_report+0xdc/0x128 [ 26.102946] kasan_check_range+0x100/0x1a8 [ 26.103030] __kasan_check_write+0x20/0x30 [ 26.103085] kasan_atomics_helper+0xd00/0x49c8 [ 26.103139] kasan_atomics+0x1a0/0x2e8 [ 26.103187] kunit_try_run_case+0x170/0x3f0 [ 26.103234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.103290] kthread+0x24c/0x2d0 [ 26.103338] ret_from_fork+0x10/0x20 [ 26.103388] [ 26.111312] Allocated by task 253: [ 26.111850] kasan_save_stack+0x3c/0x68 [ 26.112514] kasan_save_track+0x20/0x40 [ 26.113159] kasan_save_alloc_info+0x40/0x58 [ 26.113921] __kasan_kmalloc+0xd4/0xd8 [ 26.114579] __kmalloc_cache_noprof+0x154/0x320 [ 26.115396] kasan_atomics+0xb8/0x2e8 [ 26.115945] kunit_try_run_case+0x170/0x3f0 [ 26.116418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.117057] kthread+0x24c/0x2d0 [ 26.117627] ret_from_fork+0x10/0x20 [ 26.118139] [ 26.118660] The buggy address belongs to the object at fff00000c4205580 [ 26.118660] which belongs to the cache kmalloc-64 of size 64 [ 26.119909] The buggy address is located 0 bytes to the right of [ 26.119909] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.121367] [ 26.121736] The buggy address belongs to the physical page: [ 26.122480] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.123436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.124271] page_type: f5(slab) [ 26.124793] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.125682] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.126522] page dumped because: kasan: bad access detected [ 26.127225] [ 26.127570] Memory state around the buggy address: [ 26.128313] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.129135] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.130005] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.130792] ^ [ 26.131444] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.132278] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.133109] ================================================================== [ 26.889659] ================================================================== [ 26.890422] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1584/0x49c8 [ 26.891182] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 26.892124] [ 26.892512] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 26.892719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.892851] Hardware name: linux,dummy-virt (DT) [ 26.892943] Call trace: [ 26.893069] dump_backtrace+0x9c/0x128 [ 26.893197] show_stack+0x20/0x38 [ 26.893317] dump_stack_lvl+0x8c/0xd0 [ 26.893419] print_report+0x118/0x5f0 [ 26.893473] kasan_report+0xdc/0x128 [ 26.893523] kasan_check_range+0x100/0x1a8 [ 26.893577] __kasan_check_write+0x20/0x30 [ 26.893628] kasan_atomics_helper+0x1584/0x49c8 [ 26.893683] kasan_atomics+0x1a0/0x2e8 [ 26.893735] kunit_try_run_case+0x170/0x3f0 [ 26.893784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.893841] kthread+0x24c/0x2d0 [ 26.893892] ret_from_fork+0x10/0x20 [ 26.893940] [ 26.901219] Allocated by task 253: [ 26.901675] kasan_save_stack+0x3c/0x68 [ 26.902435] kasan_save_track+0x20/0x40 [ 26.903112] kasan_save_alloc_info+0x40/0x58 [ 26.903756] __kasan_kmalloc+0xd4/0xd8 [ 26.904404] __kmalloc_cache_noprof+0x154/0x320 [ 26.905017] kasan_atomics+0xb8/0x2e8 [ 26.905619] kunit_try_run_case+0x170/0x3f0 [ 26.906227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.906980] kthread+0x24c/0x2d0 [ 26.907482] ret_from_fork+0x10/0x20 [ 26.908011] [ 26.908345] The buggy address belongs to the object at fff00000c4205580 [ 26.908345] which belongs to the cache kmalloc-64 of size 64 [ 26.909604] The buggy address is located 0 bytes to the right of [ 26.909604] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 26.910780] [ 26.911117] The buggy address belongs to the physical page: [ 26.911702] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 26.912539] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.913378] page_type: f5(slab) [ 26.913982] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.914811] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.915659] page dumped because: kasan: bad access detected [ 26.916244] [ 26.916602] Memory state around the buggy address: [ 26.917220] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.918008] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.918729] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.919635] ^ [ 26.920335] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.921237] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.922030] ================================================================== [ 27.170141] ================================================================== [ 27.170681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1810/0x49c8 [ 27.171614] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253 [ 27.172374] [ 27.172703] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 27.172885] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.172978] Hardware name: linux,dummy-virt (DT) [ 27.173058] Call trace: [ 27.173111] dump_backtrace+0x9c/0x128 [ 27.173214] show_stack+0x20/0x38 [ 27.173306] dump_stack_lvl+0x8c/0xd0 [ 27.173406] print_report+0x118/0x5f0 [ 27.173516] kasan_report+0xdc/0x128 [ 27.173638] kasan_check_range+0x100/0x1a8 [ 27.173754] __kasan_check_write+0x20/0x30 [ 27.173877] kasan_atomics_helper+0x1810/0x49c8 [ 27.174025] kasan_atomics+0x1a0/0x2e8 [ 27.174152] kunit_try_run_case+0x170/0x3f0 [ 27.174282] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.174423] kthread+0x24c/0x2d0 [ 27.174548] ret_from_fork+0x10/0x20 [ 27.174670] [ 27.181251] Allocated by task 253: [ 27.181775] kasan_save_stack+0x3c/0x68 [ 27.182332] kasan_save_track+0x20/0x40 [ 27.182873] kasan_save_alloc_info+0x40/0x58 [ 27.183523] __kasan_kmalloc+0xd4/0xd8 [ 27.184037] __kmalloc_cache_noprof+0x154/0x320 [ 27.184543] kasan_atomics+0xb8/0x2e8 [ 27.185113] kunit_try_run_case+0x170/0x3f0 [ 27.185656] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.186352] kthread+0x24c/0x2d0 [ 27.186760] ret_from_fork+0x10/0x20 [ 27.187320] [ 27.187656] The buggy address belongs to the object at fff00000c4205580 [ 27.187656] which belongs to the cache kmalloc-64 of size 64 [ 27.188745] The buggy address is located 0 bytes to the right of [ 27.188745] allocated 48-byte region [fff00000c4205580, fff00000c42055b0) [ 27.190002] [ 27.190336] The buggy address belongs to the physical page: [ 27.191084] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205 [ 27.191894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.192707] page_type: f5(slab) [ 27.193241] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.193916] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.194748] page dumped because: kasan: bad access detected [ 27.195419] [ 27.195752] Memory state around the buggy address: [ 27.196276] fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.197163] fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.197930] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.198631] ^ [ 27.199400] fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.199916] fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.200802] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 24.719945] ================================================================== [ 24.721111] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1e4/0xc08 [ 24.721849] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249 [ 24.722787] [ 24.723193] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.723415] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.723495] Hardware name: linux,dummy-virt (DT) [ 24.724009] Call trace: [ 24.724087] dump_backtrace+0x9c/0x128 [ 24.724248] show_stack+0x20/0x38 [ 24.724366] dump_stack_lvl+0x8c/0xd0 [ 24.724475] print_report+0x118/0x5f0 [ 24.724529] kasan_report+0xdc/0x128 [ 24.724577] kasan_check_range+0x100/0x1a8 [ 24.724627] __kasan_check_write+0x20/0x30 [ 24.724677] kasan_bitops_test_and_modify.constprop.0+0x1e4/0xc08 [ 24.724742] kasan_bitops_generic+0x120/0x1d0 [ 24.724808] kunit_try_run_case+0x170/0x3f0 [ 24.724861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.724920] kthread+0x24c/0x2d0 [ 24.724996] ret_from_fork+0x10/0x20 [ 24.725055] [ 24.732343] Allocated by task 249: [ 24.733197] kasan_save_stack+0x3c/0x68 [ 24.734510] kasan_save_track+0x20/0x40 [ 24.735115] kasan_save_alloc_info+0x40/0x58 [ 24.736452] __kasan_kmalloc+0xd4/0xd8 [ 24.737123] __kmalloc_cache_noprof+0x154/0x320 [ 24.737831] kasan_bitops_generic+0xa0/0x1d0 [ 24.738405] kunit_try_run_case+0x170/0x3f0 [ 24.739038] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.740160] kthread+0x24c/0x2d0 [ 24.740557] ret_from_fork+0x10/0x20 [ 24.740985] [ 24.741557] The buggy address belongs to the object at fff00000c662ada0 [ 24.741557] which belongs to the cache kmalloc-16 of size 16 [ 24.743156] The buggy address is located 8 bytes inside of [ 24.743156] allocated 9-byte region [fff00000c662ada0, fff00000c662ada9) [ 24.744861] [ 24.745323] The buggy address belongs to the physical page: [ 24.745850] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 24.746873] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.748068] page_type: f5(slab) [ 24.748552] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.749286] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.749923] page dumped because: kasan: bad access detected [ 24.750598] [ 24.750881] Memory state around the buggy address: [ 24.751932] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 24.752709] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.753662] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.754508] ^ [ 24.755209] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.756203] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.756841] ================================================================== [ 24.643452] ================================================================== [ 24.644523] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x104/0xc08 [ 24.645372] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249 [ 24.646276] [ 24.646703] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.646979] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.647065] Hardware name: linux,dummy-virt (DT) [ 24.647164] Call trace: [ 24.647239] dump_backtrace+0x9c/0x128 [ 24.647460] show_stack+0x20/0x38 [ 24.647578] dump_stack_lvl+0x8c/0xd0 [ 24.647694] print_report+0x118/0x5f0 [ 24.647801] kasan_report+0xdc/0x128 [ 24.647906] kasan_check_range+0x100/0x1a8 [ 24.648038] __kasan_check_write+0x20/0x30 [ 24.648153] kasan_bitops_test_and_modify.constprop.0+0x104/0xc08 [ 24.648298] kasan_bitops_generic+0x120/0x1d0 [ 24.648421] kunit_try_run_case+0x170/0x3f0 [ 24.648549] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.648684] kthread+0x24c/0x2d0 [ 24.648811] ret_from_fork+0x10/0x20 [ 24.648914] [ 24.657162] Allocated by task 249: [ 24.657623] kasan_save_stack+0x3c/0x68 [ 24.658218] kasan_save_track+0x20/0x40 [ 24.658803] kasan_save_alloc_info+0x40/0x58 [ 24.659524] __kasan_kmalloc+0xd4/0xd8 [ 24.659974] __kmalloc_cache_noprof+0x154/0x320 [ 24.660710] kasan_bitops_generic+0xa0/0x1d0 [ 24.661989] kunit_try_run_case+0x170/0x3f0 [ 24.662866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.664030] kthread+0x24c/0x2d0 [ 24.664504] ret_from_fork+0x10/0x20 [ 24.665064] [ 24.665401] The buggy address belongs to the object at fff00000c662ada0 [ 24.665401] which belongs to the cache kmalloc-16 of size 16 [ 24.666571] The buggy address is located 8 bytes inside of [ 24.666571] allocated 9-byte region [fff00000c662ada0, fff00000c662ada9) [ 24.667889] [ 24.668377] The buggy address belongs to the physical page: [ 24.668982] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 24.669912] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.670533] page_type: f5(slab) [ 24.671059] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.671923] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.673065] page dumped because: kasan: bad access detected [ 24.673722] [ 24.674208] Memory state around the buggy address: [ 24.675153] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 24.676060] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.677293] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.678005] ^ [ 24.678559] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.679398] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.680633] ================================================================== [ 24.866075] ================================================================== [ 24.866770] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x34c/0xc08 [ 24.867795] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249 [ 24.868553] [ 24.868889] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.869128] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.869215] Hardware name: linux,dummy-virt (DT) [ 24.869313] Call trace: [ 24.869392] dump_backtrace+0x9c/0x128 [ 24.869521] show_stack+0x20/0x38 [ 24.869641] dump_stack_lvl+0x8c/0xd0 [ 24.869764] print_report+0x118/0x5f0 [ 24.869888] kasan_report+0xdc/0x128 [ 24.870027] kasan_check_range+0x100/0x1a8 [ 24.870151] __kasan_check_write+0x20/0x30 [ 24.870280] kasan_bitops_test_and_modify.constprop.0+0x34c/0xc08 [ 24.870426] kasan_bitops_generic+0x120/0x1d0 [ 24.870496] kunit_try_run_case+0x170/0x3f0 [ 24.870548] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.870605] kthread+0x24c/0x2d0 [ 24.870652] ret_from_fork+0x10/0x20 [ 24.870706] [ 24.877504] Allocated by task 249: [ 24.877902] kasan_save_stack+0x3c/0x68 [ 24.878569] kasan_save_track+0x20/0x40 [ 24.879222] kasan_save_alloc_info+0x40/0x58 [ 24.879684] __kasan_kmalloc+0xd4/0xd8 [ 24.880196] __kmalloc_cache_noprof+0x154/0x320 [ 24.880911] kasan_bitops_generic+0xa0/0x1d0 [ 24.881634] kunit_try_run_case+0x170/0x3f0 [ 24.882163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.882832] kthread+0x24c/0x2d0 [ 24.883263] ret_from_fork+0x10/0x20 [ 24.883850] [ 24.884166] The buggy address belongs to the object at fff00000c662ada0 [ 24.884166] which belongs to the cache kmalloc-16 of size 16 [ 24.885326] The buggy address is located 8 bytes inside of [ 24.885326] allocated 9-byte region [fff00000c662ada0, fff00000c662ada9) [ 24.886411] [ 24.886742] The buggy address belongs to the physical page: [ 24.887301] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 24.888232] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.888973] page_type: f5(slab) [ 24.889404] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.890772] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.892509] page dumped because: kasan: bad access detected [ 24.892987] [ 24.893224] Memory state around the buggy address: [ 24.893613] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 24.896196] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.898474] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.900356] ^ [ 24.901662] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.902562] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.903423] ================================================================== [ 24.832928] ================================================================== [ 24.833764] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xb14/0xc08 [ 24.835173] Read of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249 [ 24.836045] [ 24.836390] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.836637] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.836728] Hardware name: linux,dummy-virt (DT) [ 24.836872] Call trace: [ 24.836946] dump_backtrace+0x9c/0x128 [ 24.837088] show_stack+0x20/0x38 [ 24.837256] dump_stack_lvl+0x8c/0xd0 [ 24.837426] print_report+0x118/0x5f0 [ 24.837545] kasan_report+0xdc/0x128 [ 24.837645] __asan_report_load8_noabort+0x20/0x30 [ 24.837703] kasan_bitops_test_and_modify.constprop.0+0xb14/0xc08 [ 24.837766] kasan_bitops_generic+0x120/0x1d0 [ 24.837820] kunit_try_run_case+0x170/0x3f0 [ 24.837869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.837924] kthread+0x24c/0x2d0 [ 24.837997] ret_from_fork+0x10/0x20 [ 24.838055] [ 24.845000] Allocated by task 249: [ 24.845435] kasan_save_stack+0x3c/0x68 [ 24.846041] kasan_save_track+0x20/0x40 [ 24.846671] kasan_save_alloc_info+0x40/0x58 [ 24.847273] __kasan_kmalloc+0xd4/0xd8 [ 24.847850] __kmalloc_cache_noprof+0x154/0x320 [ 24.848562] kasan_bitops_generic+0xa0/0x1d0 [ 24.849140] kunit_try_run_case+0x170/0x3f0 [ 24.849727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.850448] kthread+0x24c/0x2d0 [ 24.851021] ret_from_fork+0x10/0x20 [ 24.851540] [ 24.851862] The buggy address belongs to the object at fff00000c662ada0 [ 24.851862] which belongs to the cache kmalloc-16 of size 16 [ 24.853140] The buggy address is located 8 bytes inside of [ 24.853140] allocated 9-byte region [fff00000c662ada0, fff00000c662ada9) [ 24.854354] [ 24.854726] The buggy address belongs to the physical page: [ 24.855282] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 24.856231] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.857088] page_type: f5(slab) [ 24.857549] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.858334] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.859163] page dumped because: kasan: bad access detected [ 24.859782] [ 24.860120] Memory state around the buggy address: [ 24.860652] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 24.861415] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.862133] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.862836] ^ [ 24.863443] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.864129] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.864912] ================================================================== [ 24.682181] ================================================================== [ 24.682908] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xc08 [ 24.685051] Read of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249 [ 24.686325] [ 24.686697] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.686899] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.686941] Hardware name: linux,dummy-virt (DT) [ 24.687085] Call trace: [ 24.687159] dump_backtrace+0x9c/0x128 [ 24.687281] show_stack+0x20/0x38 [ 24.687414] dump_stack_lvl+0x8c/0xd0 [ 24.687543] print_report+0x118/0x5f0 [ 24.687656] kasan_report+0xdc/0x128 [ 24.687734] __asan_report_load8_noabort+0x20/0x30 [ 24.687790] kasan_bitops_test_and_modify.constprop.0+0xa48/0xc08 [ 24.687853] kasan_bitops_generic+0x120/0x1d0 [ 24.687906] kunit_try_run_case+0x170/0x3f0 [ 24.687956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.688045] kthread+0x24c/0x2d0 [ 24.688093] ret_from_fork+0x10/0x20 [ 24.688143] [ 24.695501] Allocated by task 249: [ 24.696236] kasan_save_stack+0x3c/0x68 [ 24.696848] kasan_save_track+0x20/0x40 [ 24.697490] kasan_save_alloc_info+0x40/0x58 [ 24.698132] __kasan_kmalloc+0xd4/0xd8 [ 24.698692] __kmalloc_cache_noprof+0x154/0x320 [ 24.699342] kasan_bitops_generic+0xa0/0x1d0 [ 24.699923] kunit_try_run_case+0x170/0x3f0 [ 24.700809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.701432] kthread+0x24c/0x2d0 [ 24.701779] ret_from_fork+0x10/0x20 [ 24.702451] [ 24.702780] The buggy address belongs to the object at fff00000c662ada0 [ 24.702780] which belongs to the cache kmalloc-16 of size 16 [ 24.705025] The buggy address is located 8 bytes inside of [ 24.705025] allocated 9-byte region [fff00000c662ada0, fff00000c662ada9) [ 24.706270] [ 24.706646] The buggy address belongs to the physical page: [ 24.707233] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 24.708357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.709491] page_type: f5(slab) [ 24.710007] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.710886] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.712025] page dumped because: kasan: bad access detected [ 24.713024] [ 24.713385] Memory state around the buggy address: [ 24.713979] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 24.714693] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.715415] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.716666] ^ [ 24.717337] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.718091] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.718795] ================================================================== [ 24.905932] ================================================================== [ 24.906985] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xc08 [ 24.908320] Read of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249 [ 24.909039] [ 24.909266] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.909368] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.909404] Hardware name: linux,dummy-virt (DT) [ 24.909444] Call trace: [ 24.909474] dump_backtrace+0x9c/0x128 [ 24.909527] show_stack+0x20/0x38 [ 24.909573] dump_stack_lvl+0x8c/0xd0 [ 24.909625] print_report+0x118/0x5f0 [ 24.909672] kasan_report+0xdc/0x128 [ 24.909717] __asan_report_load8_noabort+0x20/0x30 [ 24.909770] kasan_bitops_test_and_modify.constprop.0+0xa84/0xc08 [ 24.909831] kasan_bitops_generic+0x120/0x1d0 [ 24.909886] kunit_try_run_case+0x170/0x3f0 [ 24.909935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.910401] kthread+0x24c/0x2d0 [ 24.910595] ret_from_fork+0x10/0x20 [ 24.910715] [ 24.917919] Allocated by task 249: [ 24.918370] kasan_save_stack+0x3c/0x68 [ 24.918912] kasan_save_track+0x20/0x40 [ 24.919517] kasan_save_alloc_info+0x40/0x58 [ 24.920159] __kasan_kmalloc+0xd4/0xd8 [ 24.920780] __kmalloc_cache_noprof+0x154/0x320 [ 24.921392] kasan_bitops_generic+0xa0/0x1d0 [ 24.921928] kunit_try_run_case+0x170/0x3f0 [ 24.922481] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.923128] kthread+0x24c/0x2d0 [ 24.923589] ret_from_fork+0x10/0x20 [ 24.924126] [ 24.924451] The buggy address belongs to the object at fff00000c662ada0 [ 24.924451] which belongs to the cache kmalloc-16 of size 16 [ 24.925700] The buggy address is located 8 bytes inside of [ 24.925700] allocated 9-byte region [fff00000c662ada0, fff00000c662ada9) [ 24.926747] [ 24.927091] The buggy address belongs to the physical page: [ 24.927689] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 24.928484] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.929274] page_type: f5(slab) [ 24.929758] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.930576] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.931031] page dumped because: kasan: bad access detected [ 24.931467] [ 24.932049] Memory state around the buggy address: [ 24.932827] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 24.933545] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.934292] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.935109] ^ [ 24.935694] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.936467] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.937240] ================================================================== [ 24.797572] ================================================================== [ 24.798296] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x26c/0xc08 [ 24.799053] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249 [ 24.800063] [ 24.800360] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.800583] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.800671] Hardware name: linux,dummy-virt (DT) [ 24.800777] Call trace: [ 24.800866] dump_backtrace+0x9c/0x128 [ 24.801021] show_stack+0x20/0x38 [ 24.801166] dump_stack_lvl+0x8c/0xd0 [ 24.801294] print_report+0x118/0x5f0 [ 24.801412] kasan_report+0xdc/0x128 [ 24.801526] kasan_check_range+0x100/0x1a8 [ 24.801635] __kasan_check_write+0x20/0x30 [ 24.801734] kasan_bitops_test_and_modify.constprop.0+0x26c/0xc08 [ 24.801861] kasan_bitops_generic+0x120/0x1d0 [ 24.802029] kunit_try_run_case+0x170/0x3f0 [ 24.802187] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.802340] kthread+0x24c/0x2d0 [ 24.802483] ret_from_fork+0x10/0x20 [ 24.802587] [ 24.810682] Allocated by task 249: [ 24.811250] kasan_save_stack+0x3c/0x68 [ 24.811709] kasan_save_track+0x20/0x40 [ 24.812223] kasan_save_alloc_info+0x40/0x58 [ 24.813003] __kasan_kmalloc+0xd4/0xd8 [ 24.813840] __kmalloc_cache_noprof+0x154/0x320 [ 24.814426] kasan_bitops_generic+0xa0/0x1d0 [ 24.814891] kunit_try_run_case+0x170/0x3f0 [ 24.815551] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.816355] kthread+0x24c/0x2d0 [ 24.816952] ret_from_fork+0x10/0x20 [ 24.817561] [ 24.817931] The buggy address belongs to the object at fff00000c662ada0 [ 24.817931] which belongs to the cache kmalloc-16 of size 16 [ 24.819173] The buggy address is located 8 bytes inside of [ 24.819173] allocated 9-byte region [fff00000c662ada0, fff00000c662ada9) [ 24.820474] [ 24.820851] The buggy address belongs to the physical page: [ 24.821528] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 24.822388] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.823203] page_type: f5(slab) [ 24.823708] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.824560] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.825317] page dumped because: kasan: bad access detected [ 24.826024] [ 24.826401] Memory state around the buggy address: [ 24.827013] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 24.827805] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.828617] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.829420] ^ [ 24.830015] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.830800] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.831528] ================================================================== [ 24.938759] ================================================================== [ 24.939389] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xc08 [ 24.940356] Read of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249 [ 24.942042] [ 24.942599] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.942846] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.942931] Hardware name: linux,dummy-virt (DT) [ 24.943011] Call trace: [ 24.943043] dump_backtrace+0x9c/0x128 [ 24.943100] show_stack+0x20/0x38 [ 24.943146] dump_stack_lvl+0x8c/0xd0 [ 24.943198] print_report+0x118/0x5f0 [ 24.943246] kasan_report+0xdc/0x128 [ 24.943291] __asan_report_load8_noabort+0x20/0x30 [ 24.943344] kasan_bitops_test_and_modify.constprop.0+0xacc/0xc08 [ 24.943407] kasan_bitops_generic+0x120/0x1d0 [ 24.943461] kunit_try_run_case+0x170/0x3f0 [ 24.943510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.943567] kthread+0x24c/0x2d0 [ 24.943613] ret_from_fork+0x10/0x20 [ 24.943664] [ 24.951219] Allocated by task 249: [ 24.951873] kasan_save_stack+0x3c/0x68 [ 24.952449] kasan_save_track+0x20/0x40 [ 24.953155] kasan_save_alloc_info+0x40/0x58 [ 24.953747] __kasan_kmalloc+0xd4/0xd8 [ 24.954518] __kmalloc_cache_noprof+0x154/0x320 [ 24.955153] kasan_bitops_generic+0xa0/0x1d0 [ 24.955890] kunit_try_run_case+0x170/0x3f0 [ 24.956482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.957165] kthread+0x24c/0x2d0 [ 24.957657] ret_from_fork+0x10/0x20 [ 24.958208] [ 24.958538] The buggy address belongs to the object at fff00000c662ada0 [ 24.958538] which belongs to the cache kmalloc-16 of size 16 [ 24.959812] The buggy address is located 8 bytes inside of [ 24.959812] allocated 9-byte region [fff00000c662ada0, fff00000c662ada9) [ 24.961106] [ 24.961389] The buggy address belongs to the physical page: [ 24.962011] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 24.962793] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.963491] page_type: f5(slab) [ 24.963907] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.964846] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.965717] page dumped because: kasan: bad access detected [ 24.966358] [ 24.966681] Memory state around the buggy address: [ 24.967301] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 24.968065] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.968826] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.969627] ^ [ 24.970188] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.970942] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.971690] ================================================================== [ 24.758223] ================================================================== [ 24.758820] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa90/0xc08 [ 24.759922] Read of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249 [ 24.760749] [ 24.761358] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.761570] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.761649] Hardware name: linux,dummy-virt (DT) [ 24.761740] Call trace: [ 24.761845] dump_backtrace+0x9c/0x128 [ 24.761982] show_stack+0x20/0x38 [ 24.762098] dump_stack_lvl+0x8c/0xd0 [ 24.762292] print_report+0x118/0x5f0 [ 24.762411] kasan_report+0xdc/0x128 [ 24.762526] __asan_report_load8_noabort+0x20/0x30 [ 24.762653] kasan_bitops_test_and_modify.constprop.0+0xa90/0xc08 [ 24.762750] kasan_bitops_generic+0x120/0x1d0 [ 24.762805] kunit_try_run_case+0x170/0x3f0 [ 24.762854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.762910] kthread+0x24c/0x2d0 [ 24.762955] ret_from_fork+0x10/0x20 [ 24.763038] [ 24.772788] Allocated by task 249: [ 24.773548] kasan_save_stack+0x3c/0x68 [ 24.774026] kasan_save_track+0x20/0x40 [ 24.774435] kasan_save_alloc_info+0x40/0x58 [ 24.775158] __kasan_kmalloc+0xd4/0xd8 [ 24.776221] __kmalloc_cache_noprof+0x154/0x320 [ 24.776779] kasan_bitops_generic+0xa0/0x1d0 [ 24.777429] kunit_try_run_case+0x170/0x3f0 [ 24.778063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.778770] kthread+0x24c/0x2d0 [ 24.779319] ret_from_fork+0x10/0x20 [ 24.780010] [ 24.780524] The buggy address belongs to the object at fff00000c662ada0 [ 24.780524] which belongs to the cache kmalloc-16 of size 16 [ 24.782067] The buggy address is located 8 bytes inside of [ 24.782067] allocated 9-byte region [fff00000c662ada0, fff00000c662ada9) [ 24.783950] [ 24.784472] The buggy address belongs to the physical page: [ 24.785663] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 24.786624] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.787433] page_type: f5(slab) [ 24.787941] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.788839] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.789592] page dumped because: kasan: bad access detected [ 24.790183] [ 24.790521] Memory state around the buggy address: [ 24.791091] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 24.791954] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.792859] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.793667] ^ [ 24.794315] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.795110] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.795979] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 24.407630] ================================================================== [ 24.408793] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2c4/0xbf8 [ 24.409497] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249 [ 24.410233] [ 24.411487] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.411699] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.411782] Hardware name: linux,dummy-virt (DT) [ 24.411866] Call trace: [ 24.411936] dump_backtrace+0x9c/0x128 [ 24.412066] show_stack+0x20/0x38 [ 24.412146] dump_stack_lvl+0x8c/0xd0 [ 24.412199] print_report+0x118/0x5f0 [ 24.412245] kasan_report+0xdc/0x128 [ 24.412289] kasan_check_range+0x100/0x1a8 [ 24.412339] __kasan_check_write+0x20/0x30 [ 24.412386] kasan_bitops_modify.constprop.0+0x2c4/0xbf8 [ 24.412445] kasan_bitops_generic+0x114/0x1d0 [ 24.412498] kunit_try_run_case+0x170/0x3f0 [ 24.412544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.412601] kthread+0x24c/0x2d0 [ 24.412645] ret_from_fork+0x10/0x20 [ 24.412693] [ 24.421275] Allocated by task 249: [ 24.421933] kasan_save_stack+0x3c/0x68 [ 24.422664] kasan_save_track+0x20/0x40 [ 24.423219] kasan_save_alloc_info+0x40/0x58 [ 24.424140] __kasan_kmalloc+0xd4/0xd8 [ 24.424781] __kmalloc_cache_noprof+0x154/0x320 [ 24.425404] kasan_bitops_generic+0xa0/0x1d0 [ 24.426076] kunit_try_run_case+0x170/0x3f0 [ 24.426683] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.427230] kthread+0x24c/0x2d0 [ 24.428088] ret_from_fork+0x10/0x20 [ 24.428616] [ 24.429133] The buggy address belongs to the object at fff00000c662ada0 [ 24.429133] which belongs to the cache kmalloc-16 of size 16 [ 24.430444] The buggy address is located 8 bytes inside of [ 24.430444] allocated 9-byte region [fff00000c662ada0, fff00000c662ada9) [ 24.431570] [ 24.431867] The buggy address belongs to the physical page: [ 24.432582] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 24.433537] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.434239] page_type: f5(slab) [ 24.434813] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.435664] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.436644] page dumped because: kasan: bad access detected [ 24.437461] [ 24.437852] Memory state around the buggy address: [ 24.438364] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 24.439262] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.440148] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.440945] ^ [ 24.441607] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.443007] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.443989] ================================================================== [ 24.290286] ================================================================== [ 24.291061] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbf8 [ 24.292009] Read of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249 [ 24.292920] [ 24.293345] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.293554] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.293701] Hardware name: linux,dummy-virt (DT) [ 24.293786] Call trace: [ 24.293863] dump_backtrace+0x9c/0x128 [ 24.294002] show_stack+0x20/0x38 [ 24.294156] dump_stack_lvl+0x8c/0xd0 [ 24.294279] print_report+0x118/0x5f0 [ 24.294397] kasan_report+0xdc/0x128 [ 24.294513] __asan_report_load8_noabort+0x20/0x30 [ 24.294674] kasan_bitops_modify.constprop.0+0xa80/0xbf8 [ 24.294819] kasan_bitops_generic+0x114/0x1d0 [ 24.294926] kunit_try_run_case+0x170/0x3f0 [ 24.295004] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.295068] kthread+0x24c/0x2d0 [ 24.295116] ret_from_fork+0x10/0x20 [ 24.295168] [ 24.302099] Allocated by task 249: [ 24.302496] kasan_save_stack+0x3c/0x68 [ 24.303071] kasan_save_track+0x20/0x40 [ 24.304050] kasan_save_alloc_info+0x40/0x58 [ 24.304642] __kasan_kmalloc+0xd4/0xd8 [ 24.305204] __kmalloc_cache_noprof+0x154/0x320 [ 24.305822] kasan_bitops_generic+0xa0/0x1d0 [ 24.307208] kunit_try_run_case+0x170/0x3f0 [ 24.308353] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.309141] kthread+0x24c/0x2d0 [ 24.309681] ret_from_fork+0x10/0x20 [ 24.310165] [ 24.310453] The buggy address belongs to the object at fff00000c662ada0 [ 24.310453] which belongs to the cache kmalloc-16 of size 16 [ 24.311757] The buggy address is located 8 bytes inside of [ 24.311757] allocated 9-byte region [fff00000c662ada0, fff00000c662ada9) [ 24.313479] [ 24.313881] The buggy address belongs to the physical page: [ 24.314544] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 24.315544] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.316398] page_type: f5(slab) [ 24.316609] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.316994] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.318222] page dumped because: kasan: bad access detected [ 24.318945] [ 24.319253] Memory state around the buggy address: [ 24.319810] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 24.320497] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.321885] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.322611] ^ [ 24.323153] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.324314] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.325012] ================================================================== [ 24.251155] ================================================================== [ 24.252916] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x104/0xbf8 [ 24.254147] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249 [ 24.255270] [ 24.255600] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.255851] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.255931] Hardware name: linux,dummy-virt (DT) [ 24.256036] Call trace: [ 24.256097] dump_backtrace+0x9c/0x128 [ 24.256205] show_stack+0x20/0x38 [ 24.256307] dump_stack_lvl+0x8c/0xd0 [ 24.256405] print_report+0x118/0x5f0 [ 24.256510] kasan_report+0xdc/0x128 [ 24.256625] kasan_check_range+0x100/0x1a8 [ 24.256743] __kasan_check_write+0x20/0x30 [ 24.256855] kasan_bitops_modify.constprop.0+0x104/0xbf8 [ 24.256918] kasan_bitops_generic+0x114/0x1d0 [ 24.257019] kunit_try_run_case+0x170/0x3f0 [ 24.257082] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.257137] kthread+0x24c/0x2d0 [ 24.257183] ret_from_fork+0x10/0x20 [ 24.257234] [ 24.266936] Allocated by task 249: [ 24.267316] kasan_save_stack+0x3c/0x68 [ 24.268419] kasan_save_track+0x20/0x40 [ 24.268909] kasan_save_alloc_info+0x40/0x58 [ 24.269403] __kasan_kmalloc+0xd4/0xd8 [ 24.269854] __kmalloc_cache_noprof+0x154/0x320 [ 24.270375] kasan_bitops_generic+0xa0/0x1d0 [ 24.270938] kunit_try_run_case+0x170/0x3f0 [ 24.271482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.272372] kthread+0x24c/0x2d0 [ 24.272812] ret_from_fork+0x10/0x20 [ 24.273221] [ 24.273437] The buggy address belongs to the object at fff00000c662ada0 [ 24.273437] which belongs to the cache kmalloc-16 of size 16 [ 24.274351] The buggy address is located 8 bytes inside of [ 24.274351] allocated 9-byte region [fff00000c662ada0, fff00000c662ada9) [ 24.276700] [ 24.277181] The buggy address belongs to the physical page: [ 24.277980] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 24.278894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.279650] page_type: f5(slab) [ 24.280101] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.280811] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.281694] page dumped because: kasan: bad access detected [ 24.282320] [ 24.282653] Memory state around the buggy address: [ 24.283797] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 24.284592] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.285353] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.286334] ^ [ 24.286894] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.287670] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.288630] ================================================================== [ 24.365688] ================================================================== [ 24.367157] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xabc/0xbf8 [ 24.369372] Read of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249 [ 24.370516] [ 24.370955] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.371289] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.371372] Hardware name: linux,dummy-virt (DT) [ 24.371461] Call trace: [ 24.371524] dump_backtrace+0x9c/0x128 [ 24.371633] show_stack+0x20/0x38 [ 24.371729] dump_stack_lvl+0x8c/0xd0 [ 24.373289] print_report+0x118/0x5f0 [ 24.373386] kasan_report+0xdc/0x128 [ 24.373480] __asan_report_load8_noabort+0x20/0x30 [ 24.373582] kasan_bitops_modify.constprop.0+0xabc/0xbf8 [ 24.373708] kasan_bitops_generic+0x114/0x1d0 [ 24.373835] kunit_try_run_case+0x170/0x3f0 [ 24.373994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.374092] kthread+0x24c/0x2d0 [ 24.374143] ret_from_fork+0x10/0x20 [ 24.374193] [ 24.383342] Allocated by task 249: [ 24.384026] kasan_save_stack+0x3c/0x68 [ 24.384588] kasan_save_track+0x20/0x40 [ 24.385260] kasan_save_alloc_info+0x40/0x58 [ 24.386052] __kasan_kmalloc+0xd4/0xd8 [ 24.386616] __kmalloc_cache_noprof+0x154/0x320 [ 24.387292] kasan_bitops_generic+0xa0/0x1d0 [ 24.388020] kunit_try_run_case+0x170/0x3f0 [ 24.388665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.389528] kthread+0x24c/0x2d0 [ 24.390059] ret_from_fork+0x10/0x20 [ 24.390706] [ 24.391192] The buggy address belongs to the object at fff00000c662ada0 [ 24.391192] which belongs to the cache kmalloc-16 of size 16 [ 24.392650] The buggy address is located 8 bytes inside of [ 24.392650] allocated 9-byte region [fff00000c662ada0, fff00000c662ada9) [ 24.393824] [ 24.394165] The buggy address belongs to the physical page: [ 24.394828] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 24.395860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.396565] page_type: f5(slab) [ 24.397064] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.397806] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.398780] page dumped because: kasan: bad access detected [ 24.399587] [ 24.400012] Memory state around the buggy address: [ 24.400613] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 24.401486] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.402298] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.403078] ^ [ 24.403771] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.404735] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.405783] ================================================================== [ 24.559742] ================================================================== [ 24.560507] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3c8/0xbf8 [ 24.562205] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249 [ 24.563026] [ 24.563369] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.563878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.563984] Hardware name: linux,dummy-virt (DT) [ 24.564085] Call trace: [ 24.564156] dump_backtrace+0x9c/0x128 [ 24.564281] show_stack+0x20/0x38 [ 24.564402] dump_stack_lvl+0x8c/0xd0 [ 24.564522] print_report+0x118/0x5f0 [ 24.564600] kasan_report+0xdc/0x128 [ 24.564649] kasan_check_range+0x100/0x1a8 [ 24.564699] __kasan_check_write+0x20/0x30 [ 24.564746] kasan_bitops_modify.constprop.0+0x3c8/0xbf8 [ 24.564816] kasan_bitops_generic+0x114/0x1d0 [ 24.564869] kunit_try_run_case+0x170/0x3f0 [ 24.564916] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.565000] kthread+0x24c/0x2d0 [ 24.565052] ret_from_fork+0x10/0x20 [ 24.565102] [ 24.572729] Allocated by task 249: [ 24.573586] kasan_save_stack+0x3c/0x68 [ 24.574184] kasan_save_track+0x20/0x40 [ 24.574641] kasan_save_alloc_info+0x40/0x58 [ 24.575237] __kasan_kmalloc+0xd4/0xd8 [ 24.576653] __kmalloc_cache_noprof+0x154/0x320 [ 24.577270] kasan_bitops_generic+0xa0/0x1d0 [ 24.577798] kunit_try_run_case+0x170/0x3f0 [ 24.578354] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.578976] kthread+0x24c/0x2d0 [ 24.579781] ret_from_fork+0x10/0x20 [ 24.580329] [ 24.580659] The buggy address belongs to the object at fff00000c662ada0 [ 24.580659] which belongs to the cache kmalloc-16 of size 16 [ 24.581787] The buggy address is located 8 bytes inside of [ 24.581787] allocated 9-byte region [fff00000c662ada0, fff00000c662ada9) [ 24.583009] [ 24.583312] The buggy address belongs to the physical page: [ 24.584014] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 24.584878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.586545] page_type: f5(slab) [ 24.586998] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.587952] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.588761] page dumped because: kasan: bad access detected [ 24.589400] [ 24.589724] Memory state around the buggy address: [ 24.590933] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 24.591874] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.592731] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.593609] ^ [ 24.594176] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.595113] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.596135] ================================================================== [ 24.326397] ================================================================== [ 24.327354] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1e4/0xbf8 [ 24.328496] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249 [ 24.329384] [ 24.329731] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.329937] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.330031] Hardware name: linux,dummy-virt (DT) [ 24.330119] Call trace: [ 24.330179] dump_backtrace+0x9c/0x128 [ 24.330283] show_stack+0x20/0x38 [ 24.330378] dump_stack_lvl+0x8c/0xd0 [ 24.330492] print_report+0x118/0x5f0 [ 24.330607] kasan_report+0xdc/0x128 [ 24.330719] kasan_check_range+0x100/0x1a8 [ 24.330777] __kasan_check_write+0x20/0x30 [ 24.330829] kasan_bitops_modify.constprop.0+0x1e4/0xbf8 [ 24.330889] kasan_bitops_generic+0x114/0x1d0 [ 24.330946] kunit_try_run_case+0x170/0x3f0 [ 24.331150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.331283] kthread+0x24c/0x2d0 [ 24.331415] ret_from_fork+0x10/0x20 [ 24.331539] [ 24.340187] Allocated by task 249: [ 24.340802] kasan_save_stack+0x3c/0x68 [ 24.341256] kasan_save_track+0x20/0x40 [ 24.341800] kasan_save_alloc_info+0x40/0x58 [ 24.342516] __kasan_kmalloc+0xd4/0xd8 [ 24.343282] __kmalloc_cache_noprof+0x154/0x320 [ 24.344103] kasan_bitops_generic+0xa0/0x1d0 [ 24.344709] kunit_try_run_case+0x170/0x3f0 [ 24.345475] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.346323] kthread+0x24c/0x2d0 [ 24.346877] ret_from_fork+0x10/0x20 [ 24.347557] [ 24.347922] The buggy address belongs to the object at fff00000c662ada0 [ 24.347922] which belongs to the cache kmalloc-16 of size 16 [ 24.349998] The buggy address is located 8 bytes inside of [ 24.349998] allocated 9-byte region [fff00000c662ada0, fff00000c662ada9) [ 24.351544] [ 24.351896] The buggy address belongs to the physical page: [ 24.352747] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 24.354163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.355296] page_type: f5(slab) [ 24.355813] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.356431] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.357014] page dumped because: kasan: bad access detected [ 24.357629] [ 24.358000] Memory state around the buggy address: [ 24.358680] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 24.359532] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.360717] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.361914] ^ [ 24.362242] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.362563] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.362871] ================================================================== [ 24.483082] ================================================================== [ 24.483716] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xb28/0xbf8 [ 24.484955] Read of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249 [ 24.485540] [ 24.485799] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.486038] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.486196] Hardware name: linux,dummy-virt (DT) [ 24.486451] Call trace: [ 24.486693] dump_backtrace+0x9c/0x128 [ 24.486820] show_stack+0x20/0x38 [ 24.486935] dump_stack_lvl+0x8c/0xd0 [ 24.487075] print_report+0x118/0x5f0 [ 24.487189] kasan_report+0xdc/0x128 [ 24.487286] __asan_report_load8_noabort+0x20/0x30 [ 24.487345] kasan_bitops_modify.constprop.0+0xb28/0xbf8 [ 24.487467] kasan_bitops_generic+0x114/0x1d0 [ 24.487587] kunit_try_run_case+0x170/0x3f0 [ 24.487701] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.487823] kthread+0x24c/0x2d0 [ 24.487926] ret_from_fork+0x10/0x20 [ 24.488048] [ 24.496697] Allocated by task 249: [ 24.497738] kasan_save_stack+0x3c/0x68 [ 24.498273] kasan_save_track+0x20/0x40 [ 24.498851] kasan_save_alloc_info+0x40/0x58 [ 24.499493] __kasan_kmalloc+0xd4/0xd8 [ 24.500404] __kmalloc_cache_noprof+0x154/0x320 [ 24.501024] kasan_bitops_generic+0xa0/0x1d0 [ 24.501649] kunit_try_run_case+0x170/0x3f0 [ 24.502221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.502887] kthread+0x24c/0x2d0 [ 24.503555] ret_from_fork+0x10/0x20 [ 24.504051] [ 24.505146] The buggy address belongs to the object at fff00000c662ada0 [ 24.505146] which belongs to the cache kmalloc-16 of size 16 [ 24.506141] The buggy address is located 8 bytes inside of [ 24.506141] allocated 9-byte region [fff00000c662ada0, fff00000c662ada9) [ 24.507638] [ 24.508008] The buggy address belongs to the physical page: [ 24.508887] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 24.509693] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.510448] page_type: f5(slab) [ 24.510973] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.512358] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.513210] page dumped because: kasan: bad access detected [ 24.513828] [ 24.514162] Memory state around the buggy address: [ 24.514804] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 24.515942] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.516694] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.517431] ^ [ 24.518052] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.518888] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.520578] ================================================================== [ 24.446653] ================================================================== [ 24.447238] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x334/0xbf8 [ 24.448360] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249 [ 24.449496] [ 24.449764] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.449978] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.450064] Hardware name: linux,dummy-virt (DT) [ 24.450157] Call trace: [ 24.450229] dump_backtrace+0x9c/0x128 [ 24.450353] show_stack+0x20/0x38 [ 24.450467] dump_stack_lvl+0x8c/0xd0 [ 24.450589] print_report+0x118/0x5f0 [ 24.450652] kasan_report+0xdc/0x128 [ 24.450699] kasan_check_range+0x100/0x1a8 [ 24.450747] __kasan_check_write+0x20/0x30 [ 24.450798] kasan_bitops_modify.constprop.0+0x334/0xbf8 [ 24.450858] kasan_bitops_generic+0x114/0x1d0 [ 24.450911] kunit_try_run_case+0x170/0x3f0 [ 24.450986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.451050] kthread+0x24c/0x2d0 [ 24.451101] ret_from_fork+0x10/0x20 [ 24.451153] [ 24.459234] Allocated by task 249: [ 24.459894] kasan_save_stack+0x3c/0x68 [ 24.460561] kasan_save_track+0x20/0x40 [ 24.461207] kasan_save_alloc_info+0x40/0x58 [ 24.461756] __kasan_kmalloc+0xd4/0xd8 [ 24.462336] __kmalloc_cache_noprof+0x154/0x320 [ 24.462918] kasan_bitops_generic+0xa0/0x1d0 [ 24.464383] kunit_try_run_case+0x170/0x3f0 [ 24.464809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.465498] kthread+0x24c/0x2d0 [ 24.466025] ret_from_fork+0x10/0x20 [ 24.466589] [ 24.466972] The buggy address belongs to the object at fff00000c662ada0 [ 24.466972] which belongs to the cache kmalloc-16 of size 16 [ 24.467917] The buggy address is located 8 bytes inside of [ 24.467917] allocated 9-byte region [fff00000c662ada0, fff00000c662ada9) [ 24.469539] [ 24.469872] The buggy address belongs to the physical page: [ 24.470545] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 24.471520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.472298] page_type: f5(slab) [ 24.472865] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.473802] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.474578] page dumped because: kasan: bad access detected [ 24.475171] [ 24.475820] Memory state around the buggy address: [ 24.476455] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 24.477198] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.477900] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.478724] ^ [ 24.479300] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.480281] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.481023] ================================================================== [ 24.521781] ================================================================== [ 24.522495] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x358/0xbf8 [ 24.523359] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249 [ 24.524519] [ 24.524851] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.525079] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.525163] Hardware name: linux,dummy-virt (DT) [ 24.525256] Call trace: [ 24.525329] dump_backtrace+0x9c/0x128 [ 24.525453] show_stack+0x20/0x38 [ 24.525565] dump_stack_lvl+0x8c/0xd0 [ 24.525692] print_report+0x118/0x5f0 [ 24.525806] kasan_report+0xdc/0x128 [ 24.525925] kasan_check_range+0x100/0x1a8 [ 24.526066] __kasan_check_write+0x20/0x30 [ 24.526194] kasan_bitops_modify.constprop.0+0x358/0xbf8 [ 24.526330] kasan_bitops_generic+0x114/0x1d0 [ 24.526424] kunit_try_run_case+0x170/0x3f0 [ 24.526476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.526530] kthread+0x24c/0x2d0 [ 24.526576] ret_from_fork+0x10/0x20 [ 24.526626] [ 24.535049] Allocated by task 249: [ 24.535784] kasan_save_stack+0x3c/0x68 [ 24.536668] kasan_save_track+0x20/0x40 [ 24.537710] kasan_save_alloc_info+0x40/0x58 [ 24.538441] __kasan_kmalloc+0xd4/0xd8 [ 24.539029] __kmalloc_cache_noprof+0x154/0x320 [ 24.539956] kasan_bitops_generic+0xa0/0x1d0 [ 24.540458] kunit_try_run_case+0x170/0x3f0 [ 24.541089] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.541904] kthread+0x24c/0x2d0 [ 24.542403] ret_from_fork+0x10/0x20 [ 24.542912] [ 24.543225] The buggy address belongs to the object at fff00000c662ada0 [ 24.543225] which belongs to the cache kmalloc-16 of size 16 [ 24.544704] The buggy address is located 8 bytes inside of [ 24.544704] allocated 9-byte region [fff00000c662ada0, fff00000c662ada9) [ 24.546296] [ 24.546612] The buggy address belongs to the physical page: [ 24.547558] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 24.548751] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.549586] page_type: f5(slab) [ 24.550006] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.550742] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.551466] page dumped because: kasan: bad access detected [ 24.551984] [ 24.552915] Memory state around the buggy address: [ 24.553628] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 24.554371] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.555051] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.556424] ^ [ 24.556824] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.557900] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.558618] ================================================================== [ 24.598144] ================================================================== [ 24.598767] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa5c/0xbf8 [ 24.600165] Read of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249 [ 24.601000] [ 24.601522] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.601745] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.601884] Hardware name: linux,dummy-virt (DT) [ 24.602022] Call trace: [ 24.602095] dump_backtrace+0x9c/0x128 [ 24.602155] show_stack+0x20/0x38 [ 24.602199] dump_stack_lvl+0x8c/0xd0 [ 24.602253] print_report+0x118/0x5f0 [ 24.602302] kasan_report+0xdc/0x128 [ 24.602350] __asan_report_load8_noabort+0x20/0x30 [ 24.602404] kasan_bitops_modify.constprop.0+0xa5c/0xbf8 [ 24.602462] kasan_bitops_generic+0x114/0x1d0 [ 24.602515] kunit_try_run_case+0x170/0x3f0 [ 24.602565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.602622] kthread+0x24c/0x2d0 [ 24.602669] ret_from_fork+0x10/0x20 [ 24.602719] [ 24.610865] Allocated by task 249: [ 24.611294] kasan_save_stack+0x3c/0x68 [ 24.611995] kasan_save_track+0x20/0x40 [ 24.613325] kasan_save_alloc_info+0x40/0x58 [ 24.613931] __kasan_kmalloc+0xd4/0xd8 [ 24.614572] __kmalloc_cache_noprof+0x154/0x320 [ 24.615288] kasan_bitops_generic+0xa0/0x1d0 [ 24.616259] kunit_try_run_case+0x170/0x3f0 [ 24.616969] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.617672] kthread+0x24c/0x2d0 [ 24.618219] ret_from_fork+0x10/0x20 [ 24.618852] [ 24.619085] The buggy address belongs to the object at fff00000c662ada0 [ 24.619085] which belongs to the cache kmalloc-16 of size 16 [ 24.621123] The buggy address is located 8 bytes inside of [ 24.621123] allocated 9-byte region [fff00000c662ada0, fff00000c662ada9) [ 24.622464] [ 24.622858] The buggy address belongs to the physical page: [ 24.623887] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 24.624556] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.625189] page_type: f5(slab) [ 24.625588] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 24.627067] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 24.627646] page dumped because: kasan: bad access detected [ 24.629168] [ 24.630056] Memory state around the buggy address: [ 24.631366] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 24.633668] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 24.636459] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 24.637896] ^ [ 24.639784] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.640929] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.642180] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 24.197934] ================================================================== [ 24.199329] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 24.200120] Read of size 1 at addr fff00000c41f1950 by task kunit_try_catch/247 [ 24.201656] [ 24.202155] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.202377] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.202458] Hardware name: linux,dummy-virt (DT) [ 24.202505] Call trace: [ 24.202535] dump_backtrace+0x9c/0x128 [ 24.202592] show_stack+0x20/0x38 [ 24.202637] dump_stack_lvl+0x8c/0xd0 [ 24.202686] print_report+0x118/0x5f0 [ 24.202732] kasan_report+0xdc/0x128 [ 24.202778] __asan_report_load1_noabort+0x20/0x30 [ 24.202831] strnlen+0x80/0x88 [ 24.202878] kasan_strings+0x398/0x938 [ 24.202925] kunit_try_run_case+0x170/0x3f0 [ 24.203001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.203065] kthread+0x24c/0x2d0 [ 24.203111] ret_from_fork+0x10/0x20 [ 24.203161] [ 24.211891] Allocated by task 247: [ 24.212981] kasan_save_stack+0x3c/0x68 [ 24.214094] kasan_save_track+0x20/0x40 [ 24.214709] kasan_save_alloc_info+0x40/0x58 [ 24.215140] __kasan_kmalloc+0xd4/0xd8 [ 24.216090] __kmalloc_cache_noprof+0x154/0x320 [ 24.216945] kasan_strings+0xb0/0x938 [ 24.217514] kunit_try_run_case+0x170/0x3f0 [ 24.218136] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.218809] kthread+0x24c/0x2d0 [ 24.219316] ret_from_fork+0x10/0x20 [ 24.220329] [ 24.220476] Freed by task 247: [ 24.220657] kasan_save_stack+0x3c/0x68 [ 24.220896] kasan_save_track+0x20/0x40 [ 24.221294] kasan_save_free_info+0x4c/0x78 [ 24.221863] __kasan_slab_free+0x6c/0x98 [ 24.222638] kfree+0x110/0x3b8 [ 24.223067] kasan_strings+0x128/0x938 [ 24.223759] kunit_try_run_case+0x170/0x3f0 [ 24.224354] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.225036] kthread+0x24c/0x2d0 [ 24.225502] ret_from_fork+0x10/0x20 [ 24.226375] [ 24.226752] The buggy address belongs to the object at fff00000c41f1940 [ 24.226752] which belongs to the cache kmalloc-32 of size 32 [ 24.228635] The buggy address is located 16 bytes inside of [ 24.228635] freed 32-byte region [fff00000c41f1940, fff00000c41f1960) [ 24.229892] [ 24.230298] The buggy address belongs to the physical page: [ 24.230871] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041f1 [ 24.231921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.232939] page_type: f5(slab) [ 24.233497] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 24.234397] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 24.235193] page dumped because: kasan: bad access detected [ 24.236349] [ 24.236746] Memory state around the buggy address: [ 24.237420] fff00000c41f1800: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 24.238253] fff00000c41f1880: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 24.239042] >fff00000c41f1900: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 24.240039] ^ [ 24.241070] fff00000c41f1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.241807] fff00000c41f1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.242480] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[ 24.154210] ================================================================== [ 24.154925] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 24.155711] Read of size 1 at addr fff00000c41f1950 by task kunit_try_catch/247 [ 24.156438] [ 24.156664] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.156774] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.156810] Hardware name: linux,dummy-virt (DT) [ 24.156849] Call trace: [ 24.156877] dump_backtrace+0x9c/0x128 [ 24.156935] show_stack+0x20/0x38 [ 24.157039] dump_stack_lvl+0x8c/0xd0 [ 24.157158] print_report+0x118/0x5f0 [ 24.157281] kasan_report+0xdc/0x128 [ 24.157397] __asan_report_load1_noabort+0x20/0x30 [ 24.157527] strlen+0xa8/0xb0 [ 24.157643] kasan_strings+0x334/0x938 [ 24.157771] kunit_try_run_case+0x170/0x3f0 [ 24.157893] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.158042] kthread+0x24c/0x2d0 [ 24.158157] ret_from_fork+0x10/0x20 [ 24.158275] [ 24.166325] Allocated by task 247: [ 24.166817] kasan_save_stack+0x3c/0x68 [ 24.167281] kasan_save_track+0x20/0x40 [ 24.168035] kasan_save_alloc_info+0x40/0x58 [ 24.168654] __kasan_kmalloc+0xd4/0xd8 [ 24.169212] __kmalloc_cache_noprof+0x154/0x320 [ 24.169847] kasan_strings+0xb0/0x938 [ 24.170379] kunit_try_run_case+0x170/0x3f0 [ 24.170923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.171666] kthread+0x24c/0x2d0 [ 24.172174] ret_from_fork+0x10/0x20 [ 24.172700] [ 24.173037] Freed by task 247: [ 24.173464] kasan_save_stack+0x3c/0x68 [ 24.174930] kasan_save_track+0x20/0x40 [ 24.175343] kasan_save_free_info+0x4c/0x78 [ 24.176097] __kasan_slab_free+0x6c/0x98 [ 24.176622] kfree+0x110/0x3b8 [ 24.177509] kasan_strings+0x128/0x938 [ 24.177905] kunit_try_run_case+0x170/0x3f0 [ 24.178630] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.179423] kthread+0x24c/0x2d0 [ 24.180083] ret_from_fork+0x10/0x20 [ 24.180511] [ 24.180797] The buggy address belongs to the object at fff00000c41f1940 [ 24.180797] which belongs to the cache kmalloc-32 of size 32 [ 24.181887] The buggy address is located 16 bytes inside of [ 24.181887] freed 32-byte region [fff00000c41f1940, fff00000c41f1960) [ 24.184130] [ 24.184532] The buggy address belongs to the physical page: [ 24.185165] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041f1 [ 24.185898] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.186825] page_type: f5(slab) [ 24.187265] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 24.188521] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 24.189240] page dumped because: kasan: bad access detected [ 24.189988] [ 24.190460] Memory state around the buggy address: [ 24.191173] fff00000c41f1800: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 24.192155] fff00000c41f1880: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 24.192876] >fff00000c41f1900: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 24.193606] ^ [ 24.194205] fff00000c41f1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.195127] fff00000c41f1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.196205] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 24.109226] ================================================================== [ 24.109996] BUG: KASAN: slab-use-after-free in kasan_strings+0x894/0x938 [ 24.110698] Read of size 1 at addr fff00000c41f1950 by task kunit_try_catch/247 [ 24.111463] [ 24.112729] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.112980] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.113067] Hardware name: linux,dummy-virt (DT) [ 24.113159] Call trace: [ 24.113236] dump_backtrace+0x9c/0x128 [ 24.113355] show_stack+0x20/0x38 [ 24.113464] dump_stack_lvl+0x8c/0xd0 [ 24.113528] print_report+0x118/0x5f0 [ 24.113577] kasan_report+0xdc/0x128 [ 24.113627] __asan_report_load1_noabort+0x20/0x30 [ 24.113680] kasan_strings+0x894/0x938 [ 24.113730] kunit_try_run_case+0x170/0x3f0 [ 24.113778] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.113835] kthread+0x24c/0x2d0 [ 24.113883] ret_from_fork+0x10/0x20 [ 24.113934] [ 24.121141] Allocated by task 247: [ 24.121549] kasan_save_stack+0x3c/0x68 [ 24.122322] kasan_save_track+0x20/0x40 [ 24.123544] kasan_save_alloc_info+0x40/0x58 [ 24.124397] __kasan_kmalloc+0xd4/0xd8 [ 24.125018] __kmalloc_cache_noprof+0x154/0x320 [ 24.125572] kasan_strings+0xb0/0x938 [ 24.126171] kunit_try_run_case+0x170/0x3f0 [ 24.126744] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.127462] kthread+0x24c/0x2d0 [ 24.128342] ret_from_fork+0x10/0x20 [ 24.128752] [ 24.128936] Freed by task 247: [ 24.129488] kasan_save_stack+0x3c/0x68 [ 24.130074] kasan_save_track+0x20/0x40 [ 24.130617] kasan_save_free_info+0x4c/0x78 [ 24.131133] __kasan_slab_free+0x6c/0x98 [ 24.131577] kfree+0x110/0x3b8 [ 24.132068] kasan_strings+0x128/0x938 [ 24.133215] kunit_try_run_case+0x170/0x3f0 [ 24.133860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.134545] kthread+0x24c/0x2d0 [ 24.135111] ret_from_fork+0x10/0x20 [ 24.136079] [ 24.136444] The buggy address belongs to the object at fff00000c41f1940 [ 24.136444] which belongs to the cache kmalloc-32 of size 32 [ 24.137895] The buggy address is located 16 bytes inside of [ 24.137895] freed 32-byte region [fff00000c41f1940, fff00000c41f1960) [ 24.139007] [ 24.139325] The buggy address belongs to the physical page: [ 24.140488] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041f1 [ 24.141300] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.142338] page_type: f5(slab) [ 24.142742] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 24.143799] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 24.145154] page dumped because: kasan: bad access detected [ 24.145897] [ 24.146372] Memory state around the buggy address: [ 24.147070] fff00000c41f1800: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 24.148070] fff00000c41f1880: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 24.148807] >fff00000c41f1900: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 24.149516] ^ [ 24.150229] fff00000c41f1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.151020] fff00000c41f1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.151867] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 24.058659] ================================================================== [ 24.059488] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 24.060074] Read of size 1 at addr fff00000c41f1950 by task kunit_try_catch/247 [ 24.060839] [ 24.061203] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.061784] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.061873] Hardware name: linux,dummy-virt (DT) [ 24.061984] Call trace: [ 24.062062] dump_backtrace+0x9c/0x128 [ 24.062193] show_stack+0x20/0x38 [ 24.062313] dump_stack_lvl+0x8c/0xd0 [ 24.062438] print_report+0x118/0x5f0 [ 24.062560] kasan_report+0xdc/0x128 [ 24.062683] __asan_report_load1_noabort+0x20/0x30 [ 24.062764] strcmp+0xc0/0xc8 [ 24.062812] kasan_strings+0x254/0x938 [ 24.062860] kunit_try_run_case+0x170/0x3f0 [ 24.062910] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.062992] kthread+0x24c/0x2d0 [ 24.063045] ret_from_fork+0x10/0x20 [ 24.063098] [ 24.071052] Allocated by task 247: [ 24.071562] kasan_save_stack+0x3c/0x68 [ 24.072164] kasan_save_track+0x20/0x40 [ 24.072688] kasan_save_alloc_info+0x40/0x58 [ 24.073308] __kasan_kmalloc+0xd4/0xd8 [ 24.073888] __kmalloc_cache_noprof+0x154/0x320 [ 24.075295] kasan_strings+0xb0/0x938 [ 24.075861] kunit_try_run_case+0x170/0x3f0 [ 24.076402] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.077173] kthread+0x24c/0x2d0 [ 24.077667] ret_from_fork+0x10/0x20 [ 24.078281] [ 24.078645] Freed by task 247: [ 24.079110] kasan_save_stack+0x3c/0x68 [ 24.080241] kasan_save_track+0x20/0x40 [ 24.080763] kasan_save_free_info+0x4c/0x78 [ 24.081703] __kasan_slab_free+0x6c/0x98 [ 24.082354] kfree+0x110/0x3b8 [ 24.082955] kasan_strings+0x128/0x938 [ 24.083476] kunit_try_run_case+0x170/0x3f0 [ 24.084364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.084853] kthread+0x24c/0x2d0 [ 24.085191] ret_from_fork+0x10/0x20 [ 24.085533] [ 24.085738] The buggy address belongs to the object at fff00000c41f1940 [ 24.085738] which belongs to the cache kmalloc-32 of size 32 [ 24.086711] The buggy address is located 16 bytes inside of [ 24.086711] freed 32-byte region [fff00000c41f1940, fff00000c41f1960) [ 24.088061] [ 24.089049] The buggy address belongs to the physical page: [ 24.089747] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041f1 [ 24.090624] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.091408] page_type: f5(slab) [ 24.091909] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 24.094083] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 24.094626] page dumped because: kasan: bad access detected [ 24.095102] [ 24.095331] Memory state around the buggy address: [ 24.098873] fff00000c41f1800: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 24.100980] fff00000c41f1880: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 24.103044] >fff00000c41f1900: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 24.105087] ^ [ 24.105986] fff00000c41f1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.106770] fff00000c41f1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.107536] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strrchr
[ 24.014843] ================================================================== [ 24.015992] BUG: KASAN: slab-use-after-free in strrchr+0x6c/0x78 [ 24.016683] Read of size 1 at addr fff00000c41f1950 by task kunit_try_catch/247 [ 24.018060] [ 24.018396] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 24.018599] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.018685] Hardware name: linux,dummy-virt (DT) [ 24.018776] Call trace: [ 24.018847] dump_backtrace+0x9c/0x128 [ 24.018985] show_stack+0x20/0x38 [ 24.019106] dump_stack_lvl+0x8c/0xd0 [ 24.019230] print_report+0x118/0x5f0 [ 24.019350] kasan_report+0xdc/0x128 [ 24.019533] __asan_report_load1_noabort+0x20/0x30 [ 24.019654] strrchr+0x6c/0x78 [ 24.019757] kasan_strings+0x1f0/0x938 [ 24.019841] kunit_try_run_case+0x170/0x3f0 [ 24.019893] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.019951] kthread+0x24c/0x2d0 [ 24.020028] ret_from_fork+0x10/0x20 [ 24.020079] [ 24.028201] Allocated by task 247: [ 24.028666] kasan_save_stack+0x3c/0x68 [ 24.029232] kasan_save_track+0x20/0x40 [ 24.029707] kasan_save_alloc_info+0x40/0x58 [ 24.030268] __kasan_kmalloc+0xd4/0xd8 [ 24.030795] __kmalloc_cache_noprof+0x154/0x320 [ 24.032223] kasan_strings+0xb0/0x938 [ 24.032607] kunit_try_run_case+0x170/0x3f0 [ 24.033154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.033796] kthread+0x24c/0x2d0 [ 24.034278] ret_from_fork+0x10/0x20 [ 24.034734] [ 24.035089] Freed by task 247: [ 24.035560] kasan_save_stack+0x3c/0x68 [ 24.036117] kasan_save_track+0x20/0x40 [ 24.036605] kasan_save_free_info+0x4c/0x78 [ 24.037566] __kasan_slab_free+0x6c/0x98 [ 24.038142] kfree+0x110/0x3b8 [ 24.038588] kasan_strings+0x128/0x938 [ 24.039078] kunit_try_run_case+0x170/0x3f0 [ 24.040286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.040908] kthread+0x24c/0x2d0 [ 24.041435] ret_from_fork+0x10/0x20 [ 24.041920] [ 24.042393] The buggy address belongs to the object at fff00000c41f1940 [ 24.042393] which belongs to the cache kmalloc-32 of size 32 [ 24.043850] The buggy address is located 16 bytes inside of [ 24.043850] freed 32-byte region [fff00000c41f1940, fff00000c41f1960) [ 24.044998] [ 24.045326] The buggy address belongs to the physical page: [ 24.045910] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041f1 [ 24.046764] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.048105] page_type: f5(slab) [ 24.048516] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 24.049306] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 24.050058] page dumped because: kasan: bad access detected [ 24.050650] [ 24.051000] Memory state around the buggy address: [ 24.051600] fff00000c41f1800: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 24.052697] fff00000c41f1880: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 24.053488] >fff00000c41f1900: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 24.054233] ^ [ 24.054872] fff00000c41f1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.055792] fff00000c41f1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.056539] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strchr
[ 23.970242] ================================================================== [ 23.971243] BUG: KASAN: slab-use-after-free in strchr+0xcc/0xd8 [ 23.972323] Read of size 1 at addr fff00000c41f1950 by task kunit_try_catch/247 [ 23.973080] [ 23.973414] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.973584] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.973624] Hardware name: linux,dummy-virt (DT) [ 23.973672] Call trace: [ 23.974270] dump_backtrace+0x9c/0x128 [ 23.974405] show_stack+0x20/0x38 [ 23.974473] dump_stack_lvl+0x8c/0xd0 [ 23.974529] print_report+0x118/0x5f0 [ 23.974578] kasan_report+0xdc/0x128 [ 23.974625] __asan_report_load1_noabort+0x20/0x30 [ 23.974678] strchr+0xcc/0xd8 [ 23.974726] kasan_strings+0x18c/0x938 [ 23.974776] kunit_try_run_case+0x170/0x3f0 [ 23.974826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.974883] kthread+0x24c/0x2d0 [ 23.974929] ret_from_fork+0x10/0x20 [ 23.975016] [ 23.984332] Allocated by task 247: [ 23.984911] kasan_save_stack+0x3c/0x68 [ 23.985490] kasan_save_track+0x20/0x40 [ 23.986137] kasan_save_alloc_info+0x40/0x58 [ 23.986706] __kasan_kmalloc+0xd4/0xd8 [ 23.987241] __kmalloc_cache_noprof+0x154/0x320 [ 23.988790] kasan_strings+0xb0/0x938 [ 23.989433] kunit_try_run_case+0x170/0x3f0 [ 23.989849] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.990653] kthread+0x24c/0x2d0 [ 23.991203] ret_from_fork+0x10/0x20 [ 23.991984] [ 23.992582] Freed by task 247: [ 23.993063] kasan_save_stack+0x3c/0x68 [ 23.993585] kasan_save_track+0x20/0x40 [ 23.994113] kasan_save_free_info+0x4c/0x78 [ 23.994643] __kasan_slab_free+0x6c/0x98 [ 23.995152] kfree+0x110/0x3b8 [ 23.995653] kasan_strings+0x128/0x938 [ 23.996145] kunit_try_run_case+0x170/0x3f0 [ 23.996731] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.998118] kthread+0x24c/0x2d0 [ 23.998612] ret_from_fork+0x10/0x20 [ 23.999079] [ 23.999411] The buggy address belongs to the object at fff00000c41f1940 [ 23.999411] which belongs to the cache kmalloc-32 of size 32 [ 24.000938] The buggy address is located 16 bytes inside of [ 24.000938] freed 32-byte region [fff00000c41f1940, fff00000c41f1960) [ 24.002092] [ 24.002398] The buggy address belongs to the physical page: [ 24.002943] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041f1 [ 24.004692] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.005426] page_type: f5(slab) [ 24.005905] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 24.006699] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 24.007762] page dumped because: kasan: bad access detected [ 24.008398] [ 24.008718] Memory state around the buggy address: [ 24.009305] fff00000c41f1800: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 24.010009] fff00000c41f1880: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 24.010769] >fff00000c41f1900: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 24.011520] ^ [ 24.012535] fff00000c41f1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.012872] fff00000c41f1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.013583] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 23.924420] ================================================================== [ 23.925504] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 23.926324] Read of size 1 at addr fff00000c41f1818 by task kunit_try_catch/245 [ 23.927162] [ 23.927527] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.927746] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.927787] Hardware name: linux,dummy-virt (DT) [ 23.927830] Call trace: [ 23.927861] dump_backtrace+0x9c/0x128 [ 23.928540] show_stack+0x20/0x38 [ 23.928649] dump_stack_lvl+0x8c/0xd0 [ 23.928754] print_report+0x118/0x5f0 [ 23.928874] kasan_report+0xdc/0x128 [ 23.928985] __asan_report_load1_noabort+0x20/0x30 [ 23.929050] memcmp+0x198/0x1d8 [ 23.929096] kasan_memcmp+0x170/0x310 [ 23.929147] kunit_try_run_case+0x170/0x3f0 [ 23.929198] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.929255] kthread+0x24c/0x2d0 [ 23.929305] ret_from_fork+0x10/0x20 [ 23.929358] [ 23.937476] Allocated by task 245: [ 23.938573] kasan_save_stack+0x3c/0x68 [ 23.939075] kasan_save_track+0x20/0x40 [ 23.940198] kasan_save_alloc_info+0x40/0x58 [ 23.940933] __kasan_kmalloc+0xd4/0xd8 [ 23.941591] __kmalloc_cache_noprof+0x154/0x320 [ 23.942307] kasan_memcmp+0xbc/0x310 [ 23.942933] kunit_try_run_case+0x170/0x3f0 [ 23.943659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.944684] kthread+0x24c/0x2d0 [ 23.945623] ret_from_fork+0x10/0x20 [ 23.946288] [ 23.946600] The buggy address belongs to the object at fff00000c41f1800 [ 23.946600] which belongs to the cache kmalloc-32 of size 32 [ 23.947885] The buggy address is located 0 bytes to the right of [ 23.947885] allocated 24-byte region [fff00000c41f1800, fff00000c41f1818) [ 23.949562] [ 23.949946] The buggy address belongs to the physical page: [ 23.950569] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041f1 [ 23.951671] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.952856] page_type: f5(slab) [ 23.953326] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 23.954237] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 23.954955] page dumped because: kasan: bad access detected [ 23.955712] [ 23.956104] Memory state around the buggy address: [ 23.956816] fff00000c41f1700: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 23.957579] fff00000c41f1780: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 23.958335] >fff00000c41f1800: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.959072] ^ [ 23.959567] fff00000c41f1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.960325] fff00000c41f1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.961632] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memchr
[ 23.879032] ================================================================== [ 23.880238] BUG: KASAN: slab-out-of-bounds in memchr+0x78/0x88 [ 23.881206] Read of size 1 at addr fff00000c41f1758 by task kunit_try_catch/243 [ 23.882020] [ 23.882517] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.882737] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.882822] Hardware name: linux,dummy-virt (DT) [ 23.882928] Call trace: [ 23.883031] dump_backtrace+0x9c/0x128 [ 23.883136] show_stack+0x20/0x38 [ 23.883188] dump_stack_lvl+0x8c/0xd0 [ 23.883239] print_report+0x118/0x5f0 [ 23.883331] kasan_report+0xdc/0x128 [ 23.883439] __asan_report_load1_noabort+0x20/0x30 [ 23.883555] memchr+0x78/0x88 [ 23.883655] kasan_memchr+0x150/0x2f0 [ 23.883750] kunit_try_run_case+0x170/0x3f0 [ 23.883854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.883992] kthread+0x24c/0x2d0 [ 23.884265] ret_from_fork+0x10/0x20 [ 23.884323] [ 23.891690] Allocated by task 243: [ 23.892757] kasan_save_stack+0x3c/0x68 [ 23.893811] kasan_save_track+0x20/0x40 [ 23.894385] kasan_save_alloc_info+0x40/0x58 [ 23.895052] __kasan_kmalloc+0xd4/0xd8 [ 23.895851] __kmalloc_cache_noprof+0x154/0x320 [ 23.896491] kasan_memchr+0xb0/0x2f0 [ 23.897062] kunit_try_run_case+0x170/0x3f0 [ 23.897648] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.898341] kthread+0x24c/0x2d0 [ 23.898861] ret_from_fork+0x10/0x20 [ 23.899403] [ 23.900239] The buggy address belongs to the object at fff00000c41f1740 [ 23.900239] which belongs to the cache kmalloc-32 of size 32 [ 23.901735] The buggy address is located 0 bytes to the right of [ 23.901735] allocated 24-byte region [fff00000c41f1740, fff00000c41f1758) [ 23.902985] [ 23.903269] The buggy address belongs to the physical page: [ 23.904358] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041f1 [ 23.905445] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.906286] page_type: f5(slab) [ 23.906736] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 23.907871] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 23.909435] page dumped because: kasan: bad access detected [ 23.909939] [ 23.910509] Memory state around the buggy address: [ 23.911311] fff00000c41f1600: 00 00 07 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 23.912186] fff00000c41f1680: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 23.912901] >fff00000c41f1700: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 23.913578] ^ [ 23.914218] fff00000c41f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.914910] fff00000c41f1800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.916495] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 23.844039] ================================================================== [ 23.845263] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2e4/0x348 [ 23.846023] Read of size 1 at addr ffff800080bd7bea by task kunit_try_catch/241 [ 23.846694] [ 23.847054] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.847260] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.847337] Hardware name: linux,dummy-virt (DT) [ 23.847572] Call trace: [ 23.847648] dump_backtrace+0x9c/0x128 [ 23.847768] show_stack+0x20/0x38 [ 23.847877] dump_stack_lvl+0x8c/0xd0 [ 23.848012] print_report+0x310/0x5f0 [ 23.848127] kasan_report+0xdc/0x128 [ 23.848190] __asan_report_load1_noabort+0x20/0x30 [ 23.848243] kasan_alloca_oob_right+0x2e4/0x348 [ 23.848295] kunit_try_run_case+0x170/0x3f0 [ 23.848343] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.848396] kthread+0x24c/0x2d0 [ 23.848443] ret_from_fork+0x10/0x20 [ 23.848489] [ 23.856640] The buggy address belongs to stack of task kunit_try_catch/241 [ 23.857434] [ 23.857823] The buggy address belongs to the virtual mapping at [ 23.857823] [ffff800080bd0000, ffff800080bd9000) created by: [ 23.857823] kernel_clone+0x150/0x7a8 [ 23.858861] [ 23.859074] The buggy address belongs to the physical page: [ 23.860306] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041e7 [ 23.861272] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.862073] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 23.863035] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.863981] page dumped because: kasan: bad access detected [ 23.864853] [ 23.865178] Memory state around the buggy address: [ 23.865726] ffff800080bd7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.866548] ffff800080bd7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.867408] >ffff800080bd7b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 23.868256] ^ [ 23.869419] ffff800080bd7c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 [ 23.870299] ffff800080bd7c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 [ 23.871073] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 23.801203] ================================================================== [ 23.801755] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2c0/0x318 [ 23.802247] Read of size 1 at addr ffff800080bc7bdf by task kunit_try_catch/239 [ 23.804132] [ 23.804456] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.804661] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.804785] Hardware name: linux,dummy-virt (DT) [ 23.805070] Call trace: [ 23.805133] dump_backtrace+0x9c/0x128 [ 23.805271] show_stack+0x20/0x38 [ 23.805381] dump_stack_lvl+0x8c/0xd0 [ 23.805481] print_report+0x310/0x5f0 [ 23.805588] kasan_report+0xdc/0x128 [ 23.805653] __asan_report_load1_noabort+0x20/0x30 [ 23.805706] kasan_alloca_oob_left+0x2c0/0x318 [ 23.805755] kunit_try_run_case+0x170/0x3f0 [ 23.805802] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.805855] kthread+0x24c/0x2d0 [ 23.805902] ret_from_fork+0x10/0x20 [ 23.805950] [ 23.814662] The buggy address belongs to stack of task kunit_try_catch/239 [ 23.815613] [ 23.815955] The buggy address belongs to the virtual mapping at [ 23.815955] [ffff800080bc0000, ffff800080bc9000) created by: [ 23.815955] kernel_clone+0x150/0x7a8 [ 23.817660] [ 23.818025] The buggy address belongs to the physical page: [ 23.818734] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041f7 [ 23.819829] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.821194] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 23.822156] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.822990] page dumped because: kasan: bad access detected [ 23.824147] [ 23.824302] Memory state around the buggy address: [ 23.824537] ffff800080bc7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.824859] ffff800080bc7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.825452] >ffff800080bc7b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 23.826346] ^ [ 23.826888] ffff800080bc7c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 [ 23.827557] ffff800080bc7c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 [ 23.829391] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 23.760559] ================================================================== [ 23.761942] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x240/0x278 [ 23.762692] Read of size 1 at addr ffff800080ba7cba by task kunit_try_catch/237 [ 23.763429] [ 23.763951] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.764155] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.764236] Hardware name: linux,dummy-virt (DT) [ 23.764319] Call trace: [ 23.764389] dump_backtrace+0x9c/0x128 [ 23.764509] show_stack+0x20/0x38 [ 23.764618] dump_stack_lvl+0x8c/0xd0 [ 23.764736] print_report+0x310/0x5f0 [ 23.764861] kasan_report+0xdc/0x128 [ 23.764990] __asan_report_load1_noabort+0x20/0x30 [ 23.765113] kasan_stack_oob+0x240/0x278 [ 23.765171] kunit_try_run_case+0x170/0x3f0 [ 23.765219] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.765273] kthread+0x24c/0x2d0 [ 23.765319] ret_from_fork+0x10/0x20 [ 23.765365] [ 23.773066] The buggy address belongs to stack of task kunit_try_catch/237 [ 23.773973] and is located at offset 138 in frame: [ 23.774578] kasan_stack_oob+0x0/0x278 [ 23.775330] [ 23.776253] This frame has 4 objects: [ 23.777169] [48, 49) '__assertion' [ 23.777282] [64, 72) 'array' [ 23.777657] [96, 112) '__assertion' [ 23.778125] [128, 138) 'stack_array' [ 23.778635] [ 23.779291] The buggy address belongs to the virtual mapping at [ 23.779291] [ffff800080ba0000, ffff800080ba9000) created by: [ 23.779291] kernel_clone+0x150/0x7a8 [ 23.780809] [ 23.781193] The buggy address belongs to the physical page: [ 23.781849] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104206 [ 23.782703] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.783469] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 23.785054] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.785927] page dumped because: kasan: bad access detected [ 23.786557] [ 23.786909] Memory state around the buggy address: [ 23.787750] ffff800080ba7b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.788612] ffff800080ba7c00: 00 00 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 [ 23.789442] >ffff800080ba7c80: f2 f2 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 [ 23.790205] ^ [ 23.790848] ffff800080ba7d00: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 [ 23.791629] ffff800080ba7d80: f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 [ 23.793029] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 23.718468] ================================================================== [ 23.719606] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x220/0x258 [ 23.721340] Read of size 1 at addr ffffa6526de046cd by task kunit_try_catch/233 [ 23.722033] [ 23.722392] CPU: 1 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.722598] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.722671] Hardware name: linux,dummy-virt (DT) [ 23.722759] Call trace: [ 23.722832] dump_backtrace+0x9c/0x128 [ 23.722954] show_stack+0x20/0x38 [ 23.723096] dump_stack_lvl+0x8c/0xd0 [ 23.723223] print_report+0x310/0x5f0 [ 23.723449] kasan_report+0xdc/0x128 [ 23.723579] __asan_report_load1_noabort+0x20/0x30 [ 23.723695] kasan_global_oob_right+0x220/0x258 [ 23.723803] kunit_try_run_case+0x170/0x3f0 [ 23.723909] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.724037] kthread+0x24c/0x2d0 [ 23.724140] ret_from_fork+0x10/0x20 [ 23.724259] [ 23.731378] The buggy address belongs to the variable: [ 23.733208] global_array+0xd/0x40 [ 23.734102] [ 23.734785] The buggy address belongs to the virtual mapping at [ 23.734785] [ffffa6526c180000, ffffa6526dec1000) created by: [ 23.734785] paging_init+0x66c/0x7d0 [ 23.736383] [ 23.737316] The buggy address belongs to the physical page: [ 23.737942] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47804 [ 23.738727] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 23.739938] raw: 03fffe0000002000 ffffc1ffc01e0108 ffffc1ffc01e0108 0000000000000000 [ 23.740625] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.741359] page dumped because: kasan: bad access detected [ 23.741932] [ 23.742251] Memory state around the buggy address: [ 23.742845] ffffa6526de04580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.744029] ffffa6526de04600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.744772] >ffffa6526de04680: 00 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 [ 23.745473] ^ [ 23.746058] ffffa6526de04700: 02 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 23.746803] ffffa6526de04780: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 23.747458] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 23.684074] ================================================================== [ 23.685336] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x124/0x2b0 [ 23.686199] Free of addr fff00000c6a28001 by task kunit_try_catch/231 [ 23.686885] [ 23.687245] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.687480] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.687562] Hardware name: linux,dummy-virt (DT) [ 23.687652] Call trace: [ 23.687717] dump_backtrace+0x9c/0x128 [ 23.687836] show_stack+0x20/0x38 [ 23.687945] dump_stack_lvl+0x8c/0xd0 [ 23.688082] print_report+0x118/0x5f0 [ 23.688199] kasan_report_invalid_free+0xc0/0xe8 [ 23.688323] __kasan_mempool_poison_object+0xfc/0x150 [ 23.688454] mempool_free+0x28c/0x328 [ 23.688579] mempool_kmalloc_invalid_free_helper+0x124/0x2b0 [ 23.688756] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 23.688877] kunit_try_run_case+0x170/0x3f0 [ 23.688929] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.689012] kthread+0x24c/0x2d0 [ 23.689062] ret_from_fork+0x10/0x20 [ 23.689112] [ 23.696296] The buggy address belongs to the physical page: [ 23.696946] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a28 [ 23.697870] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.698813] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.699955] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.700758] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.701596] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.702513] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.703284] head: 0bfffe0000000002 ffffc1ffc31a8a01 ffffffffffffffff 0000000000000000 [ 23.704168] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 23.704920] page dumped because: kasan: bad access detected [ 23.705614] [ 23.705934] Memory state around the buggy address: [ 23.707166] fff00000c6a27f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.708095] fff00000c6a27f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.708831] >fff00000c6a28000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.709478] ^ [ 23.709954] fff00000c6a28080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.710756] fff00000c6a28100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.711659] ================================================================== [ 23.640137] ================================================================== [ 23.640666] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x124/0x2b0 [ 23.641118] Free of addr fff00000c424c901 by task kunit_try_catch/229 [ 23.642533] [ 23.642940] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.643209] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.643292] Hardware name: linux,dummy-virt (DT) [ 23.643392] Call trace: [ 23.643477] dump_backtrace+0x9c/0x128 [ 23.643587] show_stack+0x20/0x38 [ 23.643681] dump_stack_lvl+0x8c/0xd0 [ 23.643731] print_report+0x118/0x5f0 [ 23.643775] kasan_report_invalid_free+0xc0/0xe8 [ 23.643825] check_slab_allocation+0xfc/0x108 [ 23.643872] __kasan_mempool_poison_object+0x78/0x150 [ 23.643927] mempool_free+0x28c/0x328 [ 23.644008] mempool_kmalloc_invalid_free_helper+0x124/0x2b0 [ 23.644070] mempool_kmalloc_invalid_free+0xc0/0x118 [ 23.644125] kunit_try_run_case+0x170/0x3f0 [ 23.644172] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.644227] kthread+0x24c/0x2d0 [ 23.644275] ret_from_fork+0x10/0x20 [ 23.644322] [ 23.653659] Allocated by task 229: [ 23.654200] kasan_save_stack+0x3c/0x68 [ 23.654740] kasan_save_track+0x20/0x40 [ 23.655365] kasan_save_alloc_info+0x40/0x58 [ 23.656093] __kasan_mempool_unpoison_object+0x11c/0x180 [ 23.656925] remove_element+0x130/0x1f8 [ 23.657527] mempool_alloc_preallocated+0x58/0xc0 [ 23.658179] mempool_kmalloc_invalid_free_helper+0x94/0x2b0 [ 23.658872] mempool_kmalloc_invalid_free+0xc0/0x118 [ 23.659687] kunit_try_run_case+0x170/0x3f0 [ 23.660197] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.660851] kthread+0x24c/0x2d0 [ 23.661299] ret_from_fork+0x10/0x20 [ 23.661762] [ 23.662311] The buggy address belongs to the object at fff00000c424c900 [ 23.662311] which belongs to the cache kmalloc-128 of size 128 [ 23.663614] The buggy address is located 1 bytes inside of [ 23.663614] 128-byte region [fff00000c424c900, fff00000c424c980) [ 23.664673] [ 23.665040] The buggy address belongs to the physical page: [ 23.665618] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10424c [ 23.666406] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.667174] page_type: f5(slab) [ 23.667897] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 23.668691] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 23.669420] page dumped because: kasan: bad access detected [ 23.670092] [ 23.670388] Memory state around the buggy address: [ 23.670948] fff00000c424c800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.671846] fff00000c424c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.672567] >fff00000c424c900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.673304] ^ [ 23.673741] fff00000c424c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.674532] fff00000c424ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.675259] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 23.561389] ================================================================== [ 23.562408] BUG: KASAN: double-free in mempool_double_free_helper+0x15c/0x2f8 [ 23.563026] Free of addr fff00000c6a74000 by task kunit_try_catch/225 [ 23.564475] [ 23.566235] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.566451] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.566533] Hardware name: linux,dummy-virt (DT) [ 23.566626] Call trace: [ 23.566689] dump_backtrace+0x9c/0x128 [ 23.566800] show_stack+0x20/0x38 [ 23.566900] dump_stack_lvl+0x8c/0xd0 [ 23.567044] print_report+0x118/0x5f0 [ 23.567140] kasan_report_invalid_free+0xc0/0xe8 [ 23.567246] __kasan_mempool_poison_object+0x14c/0x150 [ 23.567349] mempool_free+0x28c/0x328 [ 23.567455] mempool_double_free_helper+0x15c/0x2f8 [ 23.567558] mempool_kmalloc_large_double_free+0xc0/0x118 [ 23.567663] kunit_try_run_case+0x170/0x3f0 [ 23.567753] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.567857] kthread+0x24c/0x2d0 [ 23.567943] ret_from_fork+0x10/0x20 [ 23.568068] [ 23.582854] The buggy address belongs to the physical page: [ 23.584060] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a74 [ 23.584655] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.585449] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.586245] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.587031] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.587800] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.588601] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.589406] head: 0bfffe0000000002 ffffc1ffc31a9d01 ffffffffffffffff 0000000000000000 [ 23.590246] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 23.591009] page dumped because: kasan: bad access detected [ 23.591552] [ 23.591856] Memory state around the buggy address: [ 23.593027] fff00000c6a73f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.593749] fff00000c6a73f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.594483] >fff00000c6a74000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.595202] ^ [ 23.595645] fff00000c6a74080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.596389] fff00000c6a74100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.597481] ================================================================== [ 23.605599] ================================================================== [ 23.606634] BUG: KASAN: double-free in mempool_double_free_helper+0x15c/0x2f8 [ 23.607419] Free of addr fff00000c6a74000 by task kunit_try_catch/227 [ 23.608108] [ 23.608454] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.608672] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.608757] Hardware name: linux,dummy-virt (DT) [ 23.608856] Call trace: [ 23.608923] dump_backtrace+0x9c/0x128 [ 23.609102] show_stack+0x20/0x38 [ 23.609219] dump_stack_lvl+0x8c/0xd0 [ 23.609334] print_report+0x118/0x5f0 [ 23.609484] kasan_report_invalid_free+0xc0/0xe8 [ 23.609606] __kasan_mempool_poison_pages+0xe0/0xe8 [ 23.609725] mempool_free+0x24c/0x328 [ 23.609844] mempool_double_free_helper+0x15c/0x2f8 [ 23.609979] mempool_page_alloc_double_free+0xbc/0x118 [ 23.610100] kunit_try_run_case+0x170/0x3f0 [ 23.610198] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.610308] kthread+0x24c/0x2d0 [ 23.610412] ret_from_fork+0x10/0x20 [ 23.610490] [ 23.618878] The buggy address belongs to the physical page: [ 23.619932] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a74 [ 23.620849] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.621677] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 23.622532] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.623286] page dumped because: kasan: bad access detected [ 23.624602] [ 23.624932] Memory state around the buggy address: [ 23.625503] fff00000c6a73f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.626458] fff00000c6a73f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.627233] >fff00000c6a74000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.628284] ^ [ 23.628700] fff00000c6a74080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.629441] fff00000c6a74100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.630187] ================================================================== [ 23.512344] ================================================================== [ 23.513618] BUG: KASAN: double-free in mempool_double_free_helper+0x15c/0x2f8 [ 23.514390] Free of addr fff00000c424c200 by task kunit_try_catch/223 [ 23.515121] [ 23.515473] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.515691] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.515776] Hardware name: linux,dummy-virt (DT) [ 23.515867] Call trace: [ 23.515931] dump_backtrace+0x9c/0x128 [ 23.516074] show_stack+0x20/0x38 [ 23.516179] dump_stack_lvl+0x8c/0xd0 [ 23.516294] print_report+0x118/0x5f0 [ 23.516401] kasan_report_invalid_free+0xc0/0xe8 [ 23.516517] check_slab_allocation+0xd4/0x108 [ 23.516670] __kasan_mempool_poison_object+0x78/0x150 [ 23.516789] mempool_free+0x28c/0x328 [ 23.516851] mempool_double_free_helper+0x15c/0x2f8 [ 23.516905] mempool_kmalloc_double_free+0xc0/0x118 [ 23.516983] kunit_try_run_case+0x170/0x3f0 [ 23.517040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.517095] kthread+0x24c/0x2d0 [ 23.517142] ret_from_fork+0x10/0x20 [ 23.517192] [ 23.523174] Allocated by task 223: [ 23.523579] kasan_save_stack+0x3c/0x68 [ 23.524389] kasan_save_track+0x20/0x40 [ 23.524976] kasan_save_alloc_info+0x40/0x58 [ 23.525585] __kasan_mempool_unpoison_object+0x11c/0x180 [ 23.526278] remove_element+0x130/0x1f8 [ 23.526789] mempool_alloc_preallocated+0x58/0xc0 [ 23.527348] mempool_double_free_helper+0x94/0x2f8 [ 23.528238] mempool_kmalloc_double_free+0xc0/0x118 [ 23.528938] kunit_try_run_case+0x170/0x3f0 [ 23.529429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.530166] kthread+0x24c/0x2d0 [ 23.530624] ret_from_fork+0x10/0x20 [ 23.531141] [ 23.532399] Freed by task 223: [ 23.532844] kasan_save_stack+0x3c/0x68 [ 23.533553] kasan_save_track+0x20/0x40 [ 23.534134] kasan_save_free_info+0x4c/0x78 [ 23.534648] __kasan_mempool_poison_object+0xc0/0x150 [ 23.535315] mempool_free+0x28c/0x328 [ 23.536021] mempool_double_free_helper+0x104/0x2f8 [ 23.536639] mempool_kmalloc_double_free+0xc0/0x118 [ 23.537279] kunit_try_run_case+0x170/0x3f0 [ 23.537897] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.538567] kthread+0x24c/0x2d0 [ 23.538996] ret_from_fork+0x10/0x20 [ 23.539773] [ 23.540150] The buggy address belongs to the object at fff00000c424c200 [ 23.540150] which belongs to the cache kmalloc-128 of size 128 [ 23.541508] The buggy address is located 0 bytes inside of [ 23.541508] 128-byte region [fff00000c424c200, fff00000c424c280) [ 23.542506] [ 23.542819] The buggy address belongs to the physical page: [ 23.543733] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10424c [ 23.544534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.545243] page_type: f5(slab) [ 23.545692] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 23.546447] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 23.547225] page dumped because: kasan: bad access detected [ 23.548055] [ 23.548356] Memory state around the buggy address: [ 23.548862] fff00000c424c100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.549560] fff00000c424c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.550322] >fff00000c424c200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.551088] ^ [ 23.551719] fff00000c424c280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.552490] fff00000c424c300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.553236] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 23.377097] ================================================================== [ 23.378323] BUG: KASAN: use-after-free in mempool_uaf_helper+0x320/0x348 [ 23.379138] Read of size 1 at addr fff00000c6a24000 by task kunit_try_catch/217 [ 23.380696] [ 23.381019] CPU: 0 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.381396] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.381501] Hardware name: linux,dummy-virt (DT) [ 23.381564] Call trace: [ 23.381596] dump_backtrace+0x9c/0x128 [ 23.381653] show_stack+0x20/0x38 [ 23.381742] dump_stack_lvl+0x8c/0xd0 [ 23.381799] print_report+0x118/0x5f0 [ 23.381843] kasan_report+0xdc/0x128 [ 23.381885] __asan_report_load1_noabort+0x20/0x30 [ 23.381938] mempool_uaf_helper+0x320/0x348 [ 23.382017] mempool_kmalloc_large_uaf+0xc4/0x120 [ 23.382076] kunit_try_run_case+0x170/0x3f0 [ 23.382125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.382179] kthread+0x24c/0x2d0 [ 23.382224] ret_from_fork+0x10/0x20 [ 23.382274] [ 23.390290] The buggy address belongs to the physical page: [ 23.391044] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a24 [ 23.392256] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.393177] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.394039] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.394933] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.395947] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.396826] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.397627] head: 0bfffe0000000002 ffffc1ffc31a8901 ffffffffffffffff 0000000000000000 [ 23.398349] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 23.399286] page dumped because: kasan: bad access detected [ 23.400127] [ 23.400563] Memory state around the buggy address: [ 23.401131] fff00000c6a23f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.402130] fff00000c6a23f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.402892] >fff00000c6a24000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.403788] ^ [ 23.404431] fff00000c6a24080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.405235] fff00000c6a24100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.405885] ================================================================== [ 23.479726] ================================================================== [ 23.480900] BUG: KASAN: use-after-free in mempool_uaf_helper+0x320/0x348 [ 23.481602] Read of size 1 at addr fff00000c6a74000 by task kunit_try_catch/221 [ 23.482750] [ 23.483249] CPU: 1 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.483668] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.483746] Hardware name: linux,dummy-virt (DT) [ 23.483830] Call trace: [ 23.483879] dump_backtrace+0x9c/0x128 [ 23.483939] show_stack+0x20/0x38 [ 23.484016] dump_stack_lvl+0x8c/0xd0 [ 23.484072] print_report+0x118/0x5f0 [ 23.484116] kasan_report+0xdc/0x128 [ 23.484160] __asan_report_load1_noabort+0x20/0x30 [ 23.484213] mempool_uaf_helper+0x320/0x348 [ 23.484262] mempool_page_alloc_uaf+0xc0/0x118 [ 23.484312] kunit_try_run_case+0x170/0x3f0 [ 23.484364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.484419] kthread+0x24c/0x2d0 [ 23.484466] ret_from_fork+0x10/0x20 [ 23.484515] [ 23.492003] The buggy address belongs to the physical page: [ 23.492622] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a74 [ 23.493675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.494624] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 23.495860] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.496580] page dumped because: kasan: bad access detected [ 23.497223] [ 23.497523] Memory state around the buggy address: [ 23.498150] fff00000c6a73f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.498843] fff00000c6a73f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.500035] >fff00000c6a74000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.500787] ^ [ 23.501248] fff00000c6a74080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.502003] fff00000c6a74100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.502716] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 23.417794] ================================================================== [ 23.418915] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x320/0x348 [ 23.419876] Read of size 1 at addr fff00000c4222240 by task kunit_try_catch/219 [ 23.421573] [ 23.421933] CPU: 1 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.422162] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.422229] Hardware name: linux,dummy-virt (DT) [ 23.422303] Call trace: [ 23.422358] dump_backtrace+0x9c/0x128 [ 23.422464] show_stack+0x20/0x38 [ 23.422556] dump_stack_lvl+0x8c/0xd0 [ 23.422672] print_report+0x118/0x5f0 [ 23.422782] kasan_report+0xdc/0x128 [ 23.422896] __asan_report_load1_noabort+0x20/0x30 [ 23.423037] mempool_uaf_helper+0x320/0x348 [ 23.423128] mempool_slab_uaf+0xc0/0x118 [ 23.423182] kunit_try_run_case+0x170/0x3f0 [ 23.423231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.423285] kthread+0x24c/0x2d0 [ 23.423330] ret_from_fork+0x10/0x20 [ 23.423460] [ 23.431516] Allocated by task 219: [ 23.432017] kasan_save_stack+0x3c/0x68 [ 23.432719] kasan_save_track+0x20/0x40 [ 23.433401] kasan_save_alloc_info+0x40/0x58 [ 23.434035] __kasan_mempool_unpoison_object+0xbc/0x180 [ 23.434650] remove_element+0x16c/0x1f8 [ 23.435105] mempool_alloc_preallocated+0x58/0xc0 [ 23.435801] mempool_uaf_helper+0xa4/0x348 [ 23.436412] mempool_slab_uaf+0xc0/0x118 [ 23.437442] kunit_try_run_case+0x170/0x3f0 [ 23.438115] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.438844] kthread+0x24c/0x2d0 [ 23.439451] ret_from_fork+0x10/0x20 [ 23.440296] [ 23.440755] Freed by task 219: [ 23.441378] kasan_save_stack+0x3c/0x68 [ 23.442039] kasan_save_track+0x20/0x40 [ 23.442505] kasan_save_free_info+0x4c/0x78 [ 23.443066] __kasan_mempool_poison_object+0xc0/0x150 [ 23.444177] mempool_free+0x28c/0x328 [ 23.444670] mempool_uaf_helper+0x108/0x348 [ 23.445207] mempool_slab_uaf+0xc0/0x118 [ 23.445673] kunit_try_run_case+0x170/0x3f0 [ 23.446451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.447071] kthread+0x24c/0x2d0 [ 23.447760] ret_from_fork+0x10/0x20 [ 23.448404] [ 23.448845] The buggy address belongs to the object at fff00000c4222240 [ 23.448845] which belongs to the cache test_cache of size 123 [ 23.450063] The buggy address is located 0 bytes inside of [ 23.450063] freed 123-byte region [fff00000c4222240, fff00000c42222bb) [ 23.451148] [ 23.452153] The buggy address belongs to the physical page: [ 23.452647] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104222 [ 23.453599] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.454400] page_type: f5(slab) [ 23.454882] raw: 0bfffe0000000000 fff00000c4182500 dead000000000122 0000000000000000 [ 23.455816] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000 [ 23.456904] page dumped because: kasan: bad access detected [ 23.457616] [ 23.458072] Memory state around the buggy address: [ 23.458511] fff00000c4222100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.459167] fff00000c4222180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.460148] >fff00000c4222200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 23.461372] ^ [ 23.461847] fff00000c4222280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.462688] fff00000c4222300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.463675] ================================================================== [ 23.324539] ================================================================== [ 23.325788] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x320/0x348 [ 23.326459] Read of size 1 at addr fff00000c420b400 by task kunit_try_catch/215 [ 23.327733] [ 23.328305] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.328695] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.328773] Hardware name: linux,dummy-virt (DT) [ 23.328853] Call trace: [ 23.328913] dump_backtrace+0x9c/0x128 [ 23.329048] show_stack+0x20/0x38 [ 23.329109] dump_stack_lvl+0x8c/0xd0 [ 23.329162] print_report+0x118/0x5f0 [ 23.329207] kasan_report+0xdc/0x128 [ 23.329251] __asan_report_load1_noabort+0x20/0x30 [ 23.329303] mempool_uaf_helper+0x320/0x348 [ 23.329351] mempool_kmalloc_uaf+0xc4/0x120 [ 23.329400] kunit_try_run_case+0x170/0x3f0 [ 23.329448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.329499] kthread+0x24c/0x2d0 [ 23.329549] ret_from_fork+0x10/0x20 [ 23.329597] [ 23.337573] Allocated by task 215: [ 23.338261] kasan_save_stack+0x3c/0x68 [ 23.338945] kasan_save_track+0x20/0x40 [ 23.340116] kasan_save_alloc_info+0x40/0x58 [ 23.340745] __kasan_mempool_unpoison_object+0x11c/0x180 [ 23.341464] remove_element+0x130/0x1f8 [ 23.342075] mempool_alloc_preallocated+0x58/0xc0 [ 23.342737] mempool_uaf_helper+0xa4/0x348 [ 23.343354] mempool_kmalloc_uaf+0xc4/0x120 [ 23.344197] kunit_try_run_case+0x170/0x3f0 [ 23.344848] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.345555] kthread+0x24c/0x2d0 [ 23.346124] ret_from_fork+0x10/0x20 [ 23.346723] [ 23.347088] Freed by task 215: [ 23.347851] kasan_save_stack+0x3c/0x68 [ 23.348520] kasan_save_track+0x20/0x40 [ 23.349121] kasan_save_free_info+0x4c/0x78 [ 23.349763] __kasan_mempool_poison_object+0xc0/0x150 [ 23.350513] mempool_free+0x28c/0x328 [ 23.351100] mempool_uaf_helper+0x108/0x348 [ 23.351933] mempool_kmalloc_uaf+0xc4/0x120 [ 23.352540] kunit_try_run_case+0x170/0x3f0 [ 23.353235] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.353928] kthread+0x24c/0x2d0 [ 23.354517] ret_from_fork+0x10/0x20 [ 23.355085] [ 23.355536] The buggy address belongs to the object at fff00000c420b400 [ 23.355536] which belongs to the cache kmalloc-128 of size 128 [ 23.356803] The buggy address is located 0 bytes inside of [ 23.356803] freed 128-byte region [fff00000c420b400, fff00000c420b480) [ 23.357878] [ 23.358475] The buggy address belongs to the physical page: [ 23.359245] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10420b [ 23.360503] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.361215] page_type: f5(slab) [ 23.361670] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 23.362530] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 23.363326] page dumped because: kasan: bad access detected [ 23.363946] [ 23.364498] Memory state around the buggy address: [ 23.365246] fff00000c420b300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.366031] fff00000c420b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.366352] >fff00000c420b400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.366657] ^ [ 23.366843] fff00000c420b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.367729] fff00000c420b500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.368506] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 23.268272] ================================================================== [ 23.269322] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2b8/0x2f8 [ 23.270131] Read of size 1 at addr fff00000c424f2bb by task kunit_try_catch/213 [ 23.270824] [ 23.271198] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.271408] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.271489] Hardware name: linux,dummy-virt (DT) [ 23.271578] Call trace: [ 23.271642] dump_backtrace+0x9c/0x128 [ 23.271764] show_stack+0x20/0x38 [ 23.271889] dump_stack_lvl+0x8c/0xd0 [ 23.272012] print_report+0x118/0x5f0 [ 23.272125] kasan_report+0xdc/0x128 [ 23.272221] __asan_report_load1_noabort+0x20/0x30 [ 23.272332] mempool_oob_right_helper+0x2b8/0x2f8 [ 23.272440] mempool_slab_oob_right+0xc0/0x118 [ 23.272542] kunit_try_run_case+0x170/0x3f0 [ 23.272638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.272742] kthread+0x24c/0x2d0 [ 23.272853] ret_from_fork+0x10/0x20 [ 23.273255] [ 23.281248] Allocated by task 213: [ 23.281734] kasan_save_stack+0x3c/0x68 [ 23.282290] kasan_save_track+0x20/0x40 [ 23.282742] kasan_save_alloc_info+0x40/0x58 [ 23.283273] __kasan_mempool_unpoison_object+0xbc/0x180 [ 23.283954] remove_element+0x16c/0x1f8 [ 23.284534] mempool_alloc_preallocated+0x58/0xc0 [ 23.285155] mempool_oob_right_helper+0x98/0x2f8 [ 23.285779] mempool_slab_oob_right+0xc0/0x118 [ 23.286320] kunit_try_run_case+0x170/0x3f0 [ 23.286907] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.287565] kthread+0x24c/0x2d0 [ 23.288038] ret_from_fork+0x10/0x20 [ 23.288605] [ 23.288929] The buggy address belongs to the object at fff00000c424f240 [ 23.288929] which belongs to the cache test_cache of size 123 [ 23.289768] The buggy address is located 0 bytes to the right of [ 23.289768] allocated 123-byte region [fff00000c424f240, fff00000c424f2bb) [ 23.290629] [ 23.290880] The buggy address belongs to the physical page: [ 23.291392] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10424f [ 23.292234] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.293140] page_type: f5(slab) [ 23.293525] raw: 0bfffe0000000000 fff00000c11cd8c0 dead000000000122 0000000000000000 [ 23.294301] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000 [ 23.295225] page dumped because: kasan: bad access detected [ 23.295914] [ 23.296208] Memory state around the buggy address: [ 23.296741] fff00000c424f180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.298778] fff00000c424f200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 23.299711] >fff00000c424f280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 23.300562] ^ [ 23.301062] fff00000c424f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.302305] fff00000c424f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.303274] ================================================================== [ 23.226921] ================================================================== [ 23.228665] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2b8/0x2f8 [ 23.229548] Read of size 1 at addr fff00000c6a26001 by task kunit_try_catch/211 [ 23.230216] [ 23.230599] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.230806] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.230885] Hardware name: linux,dummy-virt (DT) [ 23.230991] Call trace: [ 23.231057] dump_backtrace+0x9c/0x128 [ 23.231179] show_stack+0x20/0x38 [ 23.231287] dump_stack_lvl+0x8c/0xd0 [ 23.231451] print_report+0x118/0x5f0 [ 23.231590] kasan_report+0xdc/0x128 [ 23.231725] __asan_report_load1_noabort+0x20/0x30 [ 23.231842] mempool_oob_right_helper+0x2b8/0x2f8 [ 23.231902] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 23.231983] kunit_try_run_case+0x170/0x3f0 [ 23.232040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.232093] kthread+0x24c/0x2d0 [ 23.232142] ret_from_fork+0x10/0x20 [ 23.232191] [ 23.239599] The buggy address belongs to the physical page: [ 23.240230] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a24 [ 23.241337] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.242242] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.243039] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.244635] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.245286] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.245875] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.246478] head: 0bfffe0000000002 ffffc1ffc31a8901 ffffffffffffffff 0000000000000000 [ 23.247796] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 23.248757] page dumped because: kasan: bad access detected [ 23.250497] [ 23.251217] Memory state around the buggy address: [ 23.253147] fff00000c6a25f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.253860] fff00000c6a25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.254617] >fff00000c6a26000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.255440] ^ [ 23.255898] fff00000c6a26080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.256660] fff00000c6a26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 23.257700] ================================================================== [ 23.178905] ================================================================== [ 23.180074] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2b8/0x2f8 [ 23.180815] Read of size 1 at addr fff00000c418f873 by task kunit_try_catch/209 [ 23.181518] [ 23.181743] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 23.181848] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.181883] Hardware name: linux,dummy-virt (DT) [ 23.181923] Call trace: [ 23.181949] dump_backtrace+0x9c/0x128 [ 23.182098] show_stack+0x20/0x38 [ 23.182201] dump_stack_lvl+0x8c/0xd0 [ 23.182325] print_report+0x118/0x5f0 [ 23.182434] kasan_report+0xdc/0x128 [ 23.182569] __asan_report_load1_noabort+0x20/0x30 [ 23.182700] mempool_oob_right_helper+0x2b8/0x2f8 [ 23.182823] mempool_kmalloc_oob_right+0xc4/0x120 [ 23.182945] kunit_try_run_case+0x170/0x3f0 [ 23.183091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.183211] kthread+0x24c/0x2d0 [ 23.183328] ret_from_fork+0x10/0x20 [ 23.183446] [ 23.193935] Allocated by task 209: [ 23.194571] kasan_save_stack+0x3c/0x68 [ 23.195118] kasan_save_track+0x20/0x40 [ 23.195595] kasan_save_alloc_info+0x40/0x58 [ 23.196217] __kasan_mempool_unpoison_object+0x11c/0x180 [ 23.197436] remove_element+0x130/0x1f8 [ 23.198003] mempool_alloc_preallocated+0x58/0xc0 [ 23.198631] mempool_oob_right_helper+0x98/0x2f8 [ 23.199262] mempool_kmalloc_oob_right+0xc4/0x120 [ 23.199828] kunit_try_run_case+0x170/0x3f0 [ 23.200694] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.201382] kthread+0x24c/0x2d0 [ 23.201877] ret_from_fork+0x10/0x20 [ 23.202407] [ 23.202727] The buggy address belongs to the object at fff00000c418f800 [ 23.202727] which belongs to the cache kmalloc-128 of size 128 [ 23.204664] The buggy address is located 0 bytes to the right of [ 23.204664] allocated 115-byte region [fff00000c418f800, fff00000c418f873) [ 23.205616] [ 23.205759] The buggy address belongs to the physical page: [ 23.206142] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10418f [ 23.207644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.208551] page_type: f5(slab) [ 23.209078] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 23.209758] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 23.210499] page dumped because: kasan: bad access detected [ 23.211141] [ 23.211485] Memory state around the buggy address: [ 23.212299] fff00000c418f700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.213753] fff00000c418f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.214828] >fff00000c418f800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 23.215539] ^ [ 23.216291] fff00000c418f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.217468] fff00000c418f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 23.218205] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 22.573596] ================================================================== [ 22.574193] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x184/0x318 [ 22.574544] Read of size 1 at addr fff00000c11cd640 by task kunit_try_catch/203 [ 22.574864] [ 22.575080] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 22.575201] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.575259] Hardware name: linux,dummy-virt (DT) [ 22.575336] Call trace: [ 22.575413] dump_backtrace+0x9c/0x128 [ 22.575516] show_stack+0x20/0x38 [ 22.575618] dump_stack_lvl+0x8c/0xd0 [ 22.575740] print_report+0x118/0x5f0 [ 22.575850] kasan_report+0xdc/0x128 [ 22.576033] __kasan_check_byte+0x54/0x70 [ 22.576145] kmem_cache_destroy+0x34/0x218 [ 22.576251] kmem_cache_double_destroy+0x184/0x318 [ 22.576367] kunit_try_run_case+0x170/0x3f0 [ 22.576488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.576872] kthread+0x24c/0x2d0 [ 22.577006] ret_from_fork+0x10/0x20 [ 22.577122] [ 22.584104] Allocated by task 203: [ 22.584534] kasan_save_stack+0x3c/0x68 [ 22.585063] kasan_save_track+0x20/0x40 [ 22.585603] kasan_save_alloc_info+0x40/0x58 [ 22.586178] __kasan_slab_alloc+0xa8/0xb0 [ 22.586693] kmem_cache_alloc_noprof+0xf8/0x300 [ 22.587264] __kmem_cache_create_args+0x19c/0x2c8 [ 22.588184] kmem_cache_double_destroy+0xd0/0x318 [ 22.588726] kunit_try_run_case+0x170/0x3f0 [ 22.589233] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.589912] kthread+0x24c/0x2d0 [ 22.590419] ret_from_fork+0x10/0x20 [ 22.590906] [ 22.591189] Freed by task 203: [ 22.592031] kasan_save_stack+0x3c/0x68 [ 22.592568] kasan_save_track+0x20/0x40 [ 22.593144] kasan_save_free_info+0x4c/0x78 [ 22.593654] __kasan_slab_free+0x6c/0x98 [ 22.594203] kmem_cache_free+0x118/0x460 [ 22.594696] slab_kmem_cache_release+0x38/0x50 [ 22.595226] kmem_cache_release+0x1c/0x30 [ 22.596015] kobject_put+0x17c/0x420 [ 22.596458] sysfs_slab_release+0x1c/0x30 [ 22.597054] kmem_cache_destroy+0x118/0x218 [ 22.597628] kmem_cache_double_destroy+0x130/0x318 [ 22.598413] kunit_try_run_case+0x170/0x3f0 [ 22.598977] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.599939] kthread+0x24c/0x2d0 [ 22.600381] ret_from_fork+0x10/0x20 [ 22.600881] [ 22.601177] The buggy address belongs to the object at fff00000c11cd640 [ 22.601177] which belongs to the cache kmem_cache of size 208 [ 22.602321] The buggy address is located 0 bytes inside of [ 22.602321] freed 208-byte region [fff00000c11cd640, fff00000c11cd710) [ 22.603841] [ 22.604194] The buggy address belongs to the physical page: [ 22.604756] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1011cd [ 22.605575] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.606265] page_type: f5(slab) [ 22.606720] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 22.607992] raw: 0000000000000000 00000000800c000c 00000001f5000000 0000000000000000 [ 22.608752] page dumped because: kasan: bad access detected [ 22.609386] [ 22.609685] Memory state around the buggy address: [ 22.610247] fff00000c11cd500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.610948] fff00000c11cd580: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc [ 22.611617] >fff00000c11cd600: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 22.612664] ^ [ 22.613280] fff00000c11cd680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.613992] fff00000c11cd700: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.614715] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 22.459936] ================================================================== [ 22.461155] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x3a4/0x488 [ 22.462152] Read of size 1 at addr fff00000c41fc000 by task kunit_try_catch/201 [ 22.462998] [ 22.463607] CPU: 1 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 22.463792] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.463873] Hardware name: linux,dummy-virt (DT) [ 22.463988] Call trace: [ 22.464056] dump_backtrace+0x9c/0x128 [ 22.464180] show_stack+0x20/0x38 [ 22.464231] dump_stack_lvl+0x8c/0xd0 [ 22.464287] print_report+0x118/0x5f0 [ 22.464335] kasan_report+0xdc/0x128 [ 22.464380] __asan_report_load1_noabort+0x20/0x30 [ 22.464429] kmem_cache_rcu_uaf+0x3a4/0x488 [ 22.464479] kunit_try_run_case+0x170/0x3f0 [ 22.464531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.464586] kthread+0x24c/0x2d0 [ 22.464633] ret_from_fork+0x10/0x20 [ 22.464682] [ 22.470477] Allocated by task 201: [ 22.470868] kasan_save_stack+0x3c/0x68 [ 22.471490] kasan_save_track+0x20/0x40 [ 22.472156] kasan_save_alloc_info+0x40/0x58 [ 22.472830] __kasan_slab_alloc+0xa8/0xb0 [ 22.473448] kmem_cache_alloc_noprof+0xf8/0x300 [ 22.474132] kmem_cache_rcu_uaf+0x130/0x488 [ 22.474676] kunit_try_run_case+0x170/0x3f0 [ 22.475345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.476011] kthread+0x24c/0x2d0 [ 22.476487] ret_from_fork+0x10/0x20 [ 22.477084] [ 22.477426] Freed by task 0: [ 22.477845] kasan_save_stack+0x3c/0x68 [ 22.478299] kasan_save_track+0x20/0x40 [ 22.478714] kasan_save_free_info+0x4c/0x78 [ 22.479350] __kasan_slab_free+0x6c/0x98 [ 22.480015] slab_free_after_rcu_debug+0xd0/0x2d0 [ 22.480791] rcu_core+0xa54/0x1df8 [ 22.481314] rcu_core_si+0x18/0x30 [ 22.481940] handle_softirqs+0x36c/0xb18 [ 22.482561] __do_softirq+0x1c/0x28 [ 22.483146] [ 22.483461] Last potentially related work creation: [ 22.484090] kasan_save_stack+0x3c/0x68 [ 22.484609] __kasan_record_aux_stack+0xbc/0xe8 [ 22.485246] kasan_record_aux_stack_noalloc+0x14/0x20 [ 22.485866] kmem_cache_free+0x28c/0x460 [ 22.486413] kmem_cache_rcu_uaf+0x170/0x488 [ 22.487021] kunit_try_run_case+0x170/0x3f0 [ 22.487568] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.488228] kthread+0x24c/0x2d0 [ 22.488712] ret_from_fork+0x10/0x20 [ 22.489242] [ 22.489599] The buggy address belongs to the object at fff00000c41fc000 [ 22.489599] which belongs to the cache test_cache of size 200 [ 22.490685] The buggy address is located 0 bytes inside of [ 22.490685] freed 200-byte region [fff00000c41fc000, fff00000c41fc0c8) [ 22.491869] [ 22.492208] The buggy address belongs to the physical page: [ 22.493056] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041fc [ 22.493940] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.494781] page_type: f5(slab) [ 22.495331] raw: 0bfffe0000000000 fff00000c4182280 dead000000000122 0000000000000000 [ 22.496254] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000 [ 22.497088] page dumped because: kasan: bad access detected [ 22.497725] [ 22.498069] Memory state around the buggy address: [ 22.498626] fff00000c41fbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.499467] fff00000c41fbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.500208] >fff00000c41fc000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.500906] ^ [ 22.501387] fff00000c41fc080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 22.502123] fff00000c41fc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.502867] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 22.354391] ================================================================== [ 22.356174] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x190/0x3d8 [ 22.357118] Free of addr fff00000c41fd001 by task kunit_try_catch/199 [ 22.358174] [ 22.358337] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 22.358448] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.358480] Hardware name: linux,dummy-virt (DT) [ 22.358522] Call trace: [ 22.358549] dump_backtrace+0x9c/0x128 [ 22.358607] show_stack+0x20/0x38 [ 22.358648] dump_stack_lvl+0x8c/0xd0 [ 22.358698] print_report+0x118/0x5f0 [ 22.358743] kasan_report_invalid_free+0xc0/0xe8 [ 22.358793] check_slab_allocation+0xfc/0x108 [ 22.358839] __kasan_slab_pre_free+0x2c/0x48 [ 22.358885] kmem_cache_free+0xf0/0x460 [ 22.358932] kmem_cache_invalid_free+0x190/0x3d8 [ 22.359008] kunit_try_run_case+0x170/0x3f0 [ 22.359065] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.359119] kthread+0x24c/0x2d0 [ 22.359164] ret_from_fork+0x10/0x20 [ 22.359213] [ 22.368182] Allocated by task 199: [ 22.368576] kasan_save_stack+0x3c/0x68 [ 22.369184] kasan_save_track+0x20/0x40 [ 22.369903] kasan_save_alloc_info+0x40/0x58 [ 22.370502] __kasan_slab_alloc+0xa8/0xb0 [ 22.371017] kmem_cache_alloc_noprof+0xf8/0x300 [ 22.371829] kmem_cache_invalid_free+0x130/0x3d8 [ 22.372383] kunit_try_run_case+0x170/0x3f0 [ 22.373023] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.373721] kthread+0x24c/0x2d0 [ 22.374204] ret_from_fork+0x10/0x20 [ 22.374778] [ 22.375132] The buggy address belongs to the object at fff00000c41fd000 [ 22.375132] which belongs to the cache test_cache of size 200 [ 22.376619] The buggy address is located 1 bytes inside of [ 22.376619] 200-byte region [fff00000c41fd000, fff00000c41fd0c8) [ 22.377805] [ 22.378216] The buggy address belongs to the physical page: [ 22.378787] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041fd [ 22.379751] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.380680] page_type: f5(slab) [ 22.381234] raw: 0bfffe0000000000 fff00000c4182140 dead000000000122 0000000000000000 [ 22.382117] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000 [ 22.382928] page dumped because: kasan: bad access detected [ 22.383581] [ 22.383883] Memory state around the buggy address: [ 22.384427] fff00000c41fcf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.385260] fff00000c41fcf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.385942] >fff00000c41fd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.386829] ^ [ 22.387305] fff00000c41fd080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 22.388363] fff00000c41fd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.389667] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 22.292123] ================================================================== [ 22.292661] BUG: KASAN: double-free in kmem_cache_double_free+0x19c/0x3e0 [ 22.293060] Free of addr fff00000c4180000 by task kunit_try_catch/197 [ 22.293638] [ 22.294436] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 22.294665] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.294737] Hardware name: linux,dummy-virt (DT) [ 22.294829] Call trace: [ 22.294899] dump_backtrace+0x9c/0x128 [ 22.295040] show_stack+0x20/0x38 [ 22.295147] dump_stack_lvl+0x8c/0xd0 [ 22.295238] print_report+0x118/0x5f0 [ 22.295286] kasan_report_invalid_free+0xc0/0xe8 [ 22.295339] check_slab_allocation+0xd4/0x108 [ 22.295451] __kasan_slab_pre_free+0x2c/0x48 [ 22.295565] kmem_cache_free+0xf0/0x460 [ 22.295670] kmem_cache_double_free+0x19c/0x3e0 [ 22.295751] kunit_try_run_case+0x170/0x3f0 [ 22.295799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.295854] kthread+0x24c/0x2d0 [ 22.295898] ret_from_fork+0x10/0x20 [ 22.295947] [ 22.304267] Allocated by task 197: [ 22.304726] kasan_save_stack+0x3c/0x68 [ 22.306117] kasan_save_track+0x20/0x40 [ 22.306612] kasan_save_alloc_info+0x40/0x58 [ 22.307207] __kasan_slab_alloc+0xa8/0xb0 [ 22.307956] kmem_cache_alloc_noprof+0xf8/0x300 [ 22.308660] kmem_cache_double_free+0x130/0x3e0 [ 22.309332] kunit_try_run_case+0x170/0x3f0 [ 22.310008] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.310749] kthread+0x24c/0x2d0 [ 22.311289] ret_from_fork+0x10/0x20 [ 22.312324] [ 22.312585] Freed by task 197: [ 22.312903] kasan_save_stack+0x3c/0x68 [ 22.313416] kasan_save_track+0x20/0x40 [ 22.313915] kasan_save_free_info+0x4c/0x78 [ 22.315627] __kasan_slab_free+0x6c/0x98 [ 22.316564] kmem_cache_free+0x118/0x460 [ 22.317444] kmem_cache_double_free+0x144/0x3e0 [ 22.317944] kunit_try_run_case+0x170/0x3f0 [ 22.318672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.319332] kthread+0x24c/0x2d0 [ 22.319998] ret_from_fork+0x10/0x20 [ 22.320707] [ 22.321370] The buggy address belongs to the object at fff00000c4180000 [ 22.321370] which belongs to the cache test_cache of size 200 [ 22.322521] The buggy address is located 0 bytes inside of [ 22.322521] 200-byte region [fff00000c4180000, fff00000c41800c8) [ 22.323611] [ 22.324380] The buggy address belongs to the physical page: [ 22.325250] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104180 [ 22.326404] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.327166] page_type: f5(slab) [ 22.327636] raw: 0bfffe0000000000 fff00000c4182000 dead000000000122 0000000000000000 [ 22.328441] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000 [ 22.329214] page dumped because: kasan: bad access detected [ 22.329878] [ 22.330234] Memory state around the buggy address: [ 22.330824] fff00000c417ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.331565] fff00000c417ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.332583] >fff00000c4180000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.333629] ^ [ 22.334241] fff00000c4180080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 22.335126] fff00000c4180100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.335997] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 22.221062] ================================================================== [ 22.222295] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x350/0x440 [ 22.222621] Read of size 1 at addr fff00000c41840c8 by task kunit_try_catch/195 [ 22.222943] [ 22.223278] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 22.223558] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.223640] Hardware name: linux,dummy-virt (DT) [ 22.223729] Call trace: [ 22.223799] dump_backtrace+0x9c/0x128 [ 22.223921] show_stack+0x20/0x38 [ 22.224045] dump_stack_lvl+0x8c/0xd0 [ 22.224161] print_report+0x118/0x5f0 [ 22.224268] kasan_report+0xdc/0x128 [ 22.224378] __asan_report_load1_noabort+0x20/0x30 [ 22.224501] kmem_cache_oob+0x350/0x440 [ 22.224623] kunit_try_run_case+0x170/0x3f0 [ 22.224740] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.224874] kthread+0x24c/0x2d0 [ 22.224991] ret_from_fork+0x10/0x20 [ 22.225138] [ 22.232309] Allocated by task 195: [ 22.232876] kasan_save_stack+0x3c/0x68 [ 22.233493] kasan_save_track+0x20/0x40 [ 22.234130] kasan_save_alloc_info+0x40/0x58 [ 22.234715] __kasan_slab_alloc+0xa8/0xb0 [ 22.235272] kmem_cache_alloc_noprof+0xf8/0x300 [ 22.236753] kmem_cache_oob+0x130/0x440 [ 22.237338] kunit_try_run_case+0x170/0x3f0 [ 22.237885] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.238524] kthread+0x24c/0x2d0 [ 22.238995] ret_from_fork+0x10/0x20 [ 22.239832] [ 22.240143] The buggy address belongs to the object at fff00000c4184000 [ 22.240143] which belongs to the cache test_cache of size 200 [ 22.241306] The buggy address is located 0 bytes to the right of [ 22.241306] allocated 200-byte region [fff00000c4184000, fff00000c41840c8) [ 22.242478] [ 22.242801] The buggy address belongs to the physical page: [ 22.243623] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104184 [ 22.244458] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.245205] page_type: f5(slab) [ 22.245704] raw: 0bfffe0000000000 fff00000c5c00dc0 dead000000000122 0000000000000000 [ 22.246930] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000 [ 22.247707] page dumped because: kasan: bad access detected [ 22.248338] [ 22.248643] Memory state around the buggy address: [ 22.249720] fff00000c4183f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.250433] fff00000c4184000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.251124] >fff00000c4184080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 22.251868] ^ [ 22.252513] fff00000c4184100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.253276] fff00000c4184180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.254075] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 22.148462] ================================================================== [ 22.149366] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x498/0x4c0 [ 22.150185] Read of size 8 at addr fff00000c4227340 by task kunit_try_catch/188 [ 22.150990] [ 22.151334] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 22.151563] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.151641] Hardware name: linux,dummy-virt (DT) [ 22.151730] Call trace: [ 22.151797] dump_backtrace+0x9c/0x128 [ 22.151914] show_stack+0x20/0x38 [ 22.152080] dump_stack_lvl+0x8c/0xd0 [ 22.152208] print_report+0x118/0x5f0 [ 22.152320] kasan_report+0xdc/0x128 [ 22.152427] __asan_report_load8_noabort+0x20/0x30 [ 22.152548] workqueue_uaf+0x498/0x4c0 [ 22.152660] kunit_try_run_case+0x170/0x3f0 [ 22.152805] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.152873] kthread+0x24c/0x2d0 [ 22.152918] ret_from_fork+0x10/0x20 [ 22.152996] [ 22.160873] Allocated by task 188: [ 22.161479] kasan_save_stack+0x3c/0x68 [ 22.162157] kasan_save_track+0x20/0x40 [ 22.163816] kasan_save_alloc_info+0x40/0x58 [ 22.164432] __kasan_kmalloc+0xd4/0xd8 [ 22.164918] __kmalloc_cache_noprof+0x154/0x320 [ 22.165540] workqueue_uaf+0x140/0x4c0 [ 22.166032] kunit_try_run_case+0x170/0x3f0 [ 22.166583] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.167220] kthread+0x24c/0x2d0 [ 22.168101] ret_from_fork+0x10/0x20 [ 22.168515] [ 22.168855] Freed by task 32: [ 22.169288] kasan_save_stack+0x3c/0x68 [ 22.169757] kasan_save_track+0x20/0x40 [ 22.170472] kasan_save_free_info+0x4c/0x78 [ 22.171036] __kasan_slab_free+0x6c/0x98 [ 22.171949] kfree+0x110/0x3b8 [ 22.172422] workqueue_uaf_work+0x18/0x30 [ 22.172936] process_one_work+0x530/0xfa8 [ 22.173450] worker_thread+0x610/0xf18 [ 22.173988] kthread+0x24c/0x2d0 [ 22.174466] ret_from_fork+0x10/0x20 [ 22.174996] [ 22.175313] Last potentially related work creation: [ 22.176714] kasan_save_stack+0x3c/0x68 [ 22.177239] __kasan_record_aux_stack+0xbc/0xe8 [ 22.177813] kasan_record_aux_stack_noalloc+0x14/0x20 [ 22.178522] __queue_work+0x654/0xfd8 [ 22.178871] queue_work_on+0xbc/0xf8 [ 22.179848] workqueue_uaf+0x218/0x4c0 [ 22.180335] kunit_try_run_case+0x170/0x3f0 [ 22.180899] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.181539] kthread+0x24c/0x2d0 [ 22.181995] ret_from_fork+0x10/0x20 [ 22.182461] [ 22.182778] The buggy address belongs to the object at fff00000c4227340 [ 22.182778] which belongs to the cache kmalloc-32 of size 32 [ 22.185536] The buggy address is located 0 bytes inside of [ 22.185536] freed 32-byte region [fff00000c4227340, fff00000c4227360) [ 22.186670] [ 22.187069] The buggy address belongs to the physical page: [ 22.187866] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104227 [ 22.189162] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.189483] page_type: f5(slab) [ 22.189684] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 22.190110] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 22.190859] page dumped because: kasan: bad access detected [ 22.191538] [ 22.191805] Memory state around the buggy address: [ 22.192839] fff00000c4227200: 00 00 05 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 22.193620] fff00000c4227280: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc [ 22.194660] >fff00000c4227300: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 22.195318] ^ [ 22.196300] fff00000c4227380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.197392] fff00000c4227400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.198336] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 22.080160] ================================================================== [ 22.081157] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 22.081907] Read of size 4 at addr fff00000c4227280 by task swapper/1/0 [ 22.082569] [ 22.082942] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B N 6.12.33-rc1 #1 [ 22.083173] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.083251] Hardware name: linux,dummy-virt (DT) [ 22.083340] Call trace: [ 22.083425] dump_backtrace+0x9c/0x128 [ 22.083543] show_stack+0x20/0x38 [ 22.083651] dump_stack_lvl+0x8c/0xd0 [ 22.083777] print_report+0x118/0x5f0 [ 22.083888] kasan_report+0xdc/0x128 [ 22.084050] __asan_report_load4_noabort+0x20/0x30 [ 22.084172] rcu_uaf_reclaim+0x64/0x70 [ 22.084288] rcu_core+0xa54/0x1df8 [ 22.084408] rcu_core_si+0x18/0x30 [ 22.084511] handle_softirqs+0x36c/0xb18 [ 22.084656] __do_softirq+0x1c/0x28 [ 22.084752] ____do_softirq+0x18/0x30 [ 22.084859] call_on_irq_stack+0x24/0x58 [ 22.084952] do_softirq_own_stack+0x24/0x38 [ 22.085070] irq_exit_rcu+0x1a4/0x268 [ 22.085163] el1_interrupt+0x38/0x58 [ 22.085268] el1h_64_irq_handler+0x18/0x28 [ 22.085346] el1h_64_irq+0x64/0x68 [ 22.085388] arch_local_irq_enable+0x4/0x8 [ 22.085443] do_idle+0x388/0x4f0 [ 22.085485] cpu_startup_entry+0x64/0x80 [ 22.085531] secondary_start_kernel+0x288/0x340 [ 22.085584] __secondary_switched+0xb8/0xc0 [ 22.085640] [ 22.098790] Allocated by task 186: [ 22.099333] kasan_save_stack+0x3c/0x68 [ 22.100107] kasan_save_track+0x20/0x40 [ 22.100676] kasan_save_alloc_info+0x40/0x58 [ 22.101279] __kasan_kmalloc+0xd4/0xd8 [ 22.101862] __kmalloc_cache_noprof+0x154/0x320 [ 22.102537] rcu_uaf+0xb8/0x2e0 [ 22.102928] kunit_try_run_case+0x170/0x3f0 [ 22.103421] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.104720] kthread+0x24c/0x2d0 [ 22.105545] ret_from_fork+0x10/0x20 [ 22.106033] [ 22.106566] Freed by task 0: [ 22.107385] kasan_save_stack+0x3c/0x68 [ 22.108059] kasan_save_track+0x20/0x40 [ 22.108723] kasan_save_free_info+0x4c/0x78 [ 22.109448] __kasan_slab_free+0x6c/0x98 [ 22.109950] kfree+0x110/0x3b8 [ 22.110648] rcu_uaf_reclaim+0x28/0x70 [ 22.111159] rcu_core+0xa54/0x1df8 [ 22.111909] rcu_core_si+0x18/0x30 [ 22.112478] handle_softirqs+0x36c/0xb18 [ 22.113044] __do_softirq+0x1c/0x28 [ 22.113585] [ 22.113995] Last potentially related work creation: [ 22.114609] kasan_save_stack+0x3c/0x68 [ 22.115152] __kasan_record_aux_stack+0xbc/0xe8 [ 22.116033] kasan_record_aux_stack_noalloc+0x14/0x20 [ 22.116646] __call_rcu_common.constprop.0+0x74/0xa18 [ 22.117296] call_rcu+0x18/0x30 [ 22.117785] rcu_uaf+0x150/0x2e0 [ 22.118311] kunit_try_run_case+0x170/0x3f0 [ 22.118899] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.119558] kthread+0x24c/0x2d0 [ 22.120209] ret_from_fork+0x10/0x20 [ 22.120670] [ 22.121028] The buggy address belongs to the object at fff00000c4227280 [ 22.121028] which belongs to the cache kmalloc-32 of size 32 [ 22.122123] The buggy address is located 0 bytes inside of [ 22.122123] freed 32-byte region [fff00000c4227280, fff00000c42272a0) [ 22.123227] [ 22.123568] The buggy address belongs to the physical page: [ 22.125182] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104227 [ 22.126012] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.126699] page_type: f5(slab) [ 22.127284] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 22.128298] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000 [ 22.129050] page dumped because: kasan: bad access detected [ 22.129644] [ 22.129920] Memory state around the buggy address: [ 22.130497] fff00000c4227180: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 22.131279] fff00000c4227200: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 22.132259] >fff00000c4227280: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 22.132930] ^ [ 22.133415] fff00000c4227300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.134137] fff00000c4227380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.134908] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 21.968287] ================================================================== [ 21.968980] BUG: KASAN: slab-use-after-free in ksize_uaf+0x578/0x5d0 [ 21.969670] Read of size 1 at addr fff00000c4228300 by task kunit_try_catch/184 [ 21.970671] [ 21.971040] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.971250] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.971360] Hardware name: linux,dummy-virt (DT) [ 21.971466] Call trace: [ 21.971532] dump_backtrace+0x9c/0x128 [ 21.971652] show_stack+0x20/0x38 [ 21.972140] dump_stack_lvl+0x8c/0xd0 [ 21.972267] print_report+0x118/0x5f0 [ 21.972412] kasan_report+0xdc/0x128 [ 21.972528] __asan_report_load1_noabort+0x20/0x30 [ 21.972649] ksize_uaf+0x578/0x5d0 [ 21.972763] kunit_try_run_case+0x170/0x3f0 [ 21.972925] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.973073] kthread+0x24c/0x2d0 [ 21.973149] ret_from_fork+0x10/0x20 [ 21.973200] [ 21.980200] Allocated by task 184: [ 21.980530] kasan_save_stack+0x3c/0x68 [ 21.981121] kasan_save_track+0x20/0x40 [ 21.981738] kasan_save_alloc_info+0x40/0x58 [ 21.982473] __kasan_kmalloc+0xd4/0xd8 [ 21.983111] __kmalloc_cache_noprof+0x154/0x320 [ 21.983645] ksize_uaf+0xb8/0x5d0 [ 21.984517] kunit_try_run_case+0x170/0x3f0 [ 21.985438] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.986390] kthread+0x24c/0x2d0 [ 21.987028] ret_from_fork+0x10/0x20 [ 21.987437] [ 21.987681] Freed by task 184: [ 21.989210] kasan_save_stack+0x3c/0x68 [ 21.989811] kasan_save_track+0x20/0x40 [ 21.990594] kasan_save_free_info+0x4c/0x78 [ 21.991234] __kasan_slab_free+0x6c/0x98 [ 21.991950] kfree+0x110/0x3b8 [ 21.993928] ksize_uaf+0x120/0x5d0 [ 21.994923] kunit_try_run_case+0x170/0x3f0 [ 21.995428] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.995916] kthread+0x24c/0x2d0 [ 21.996524] ret_from_fork+0x10/0x20 [ 21.996902] [ 21.997540] The buggy address belongs to the object at fff00000c4228300 [ 21.997540] which belongs to the cache kmalloc-128 of size 128 [ 22.000005] The buggy address is located 0 bytes inside of [ 22.000005] freed 128-byte region [fff00000c4228300, fff00000c4228380) [ 22.001181] [ 22.001491] The buggy address belongs to the physical page: [ 22.002977] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104228 [ 22.005167] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.006016] page_type: f5(slab) [ 22.006638] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.007799] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 22.008775] page dumped because: kasan: bad access detected [ 22.009511] [ 22.009797] Memory state around the buggy address: [ 22.010595] fff00000c4228200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.011670] fff00000c4228280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.012702] >fff00000c4228300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.013513] ^ [ 22.014113] fff00000c4228380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.014944] fff00000c4228400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.016003] ================================================================== [ 21.926425] ================================================================== [ 21.927804] BUG: KASAN: slab-use-after-free in ksize_uaf+0x174/0x5d0 [ 21.928504] Read of size 1 at addr fff00000c4228300 by task kunit_try_catch/184 [ 21.929123] [ 21.929438] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.929577] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.929612] Hardware name: linux,dummy-virt (DT) [ 21.929671] Call trace: [ 21.929767] dump_backtrace+0x9c/0x128 [ 21.929892] show_stack+0x20/0x38 [ 21.930019] dump_stack_lvl+0x8c/0xd0 [ 21.930138] print_report+0x118/0x5f0 [ 21.930249] kasan_report+0xdc/0x128 [ 21.930356] __kasan_check_byte+0x54/0x70 [ 21.930468] ksize+0x30/0x88 [ 21.930536] ksize_uaf+0x174/0x5d0 [ 21.930583] kunit_try_run_case+0x170/0x3f0 [ 21.930630] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.930684] kthread+0x24c/0x2d0 [ 21.930726] ret_from_fork+0x10/0x20 [ 21.930776] [ 21.938140] Allocated by task 184: [ 21.938624] kasan_save_stack+0x3c/0x68 [ 21.939109] kasan_save_track+0x20/0x40 [ 21.940024] kasan_save_alloc_info+0x40/0x58 [ 21.940667] __kasan_kmalloc+0xd4/0xd8 [ 21.941242] __kmalloc_cache_noprof+0x154/0x320 [ 21.941974] ksize_uaf+0xb8/0x5d0 [ 21.942479] kunit_try_run_case+0x170/0x3f0 [ 21.943001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.943678] kthread+0x24c/0x2d0 [ 21.944989] ret_from_fork+0x10/0x20 [ 21.945535] [ 21.945833] Freed by task 184: [ 21.946350] kasan_save_stack+0x3c/0x68 [ 21.946923] kasan_save_track+0x20/0x40 [ 21.947511] kasan_save_free_info+0x4c/0x78 [ 21.948567] __kasan_slab_free+0x6c/0x98 [ 21.949153] kfree+0x110/0x3b8 [ 21.949624] ksize_uaf+0x120/0x5d0 [ 21.950144] kunit_try_run_case+0x170/0x3f0 [ 21.950693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.951735] kthread+0x24c/0x2d0 [ 21.952236] ret_from_fork+0x10/0x20 [ 21.952672] [ 21.952974] The buggy address belongs to the object at fff00000c4228300 [ 21.952974] which belongs to the cache kmalloc-128 of size 128 [ 21.954079] The buggy address is located 0 bytes inside of [ 21.954079] freed 128-byte region [fff00000c4228300, fff00000c4228380) [ 21.955261] [ 21.955871] The buggy address belongs to the physical page: [ 21.956510] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104228 [ 21.957382] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.958170] page_type: f5(slab) [ 21.958641] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.959640] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 21.960387] page dumped because: kasan: bad access detected [ 21.961035] [ 21.961366] Memory state around the buggy address: [ 21.961937] fff00000c4228200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.962748] fff00000c4228280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.963507] >fff00000c4228300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.964726] ^ [ 21.965386] fff00000c4228380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.966079] fff00000c4228400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.966696] ================================================================== [ 22.017129] ================================================================== [ 22.017816] BUG: KASAN: slab-use-after-free in ksize_uaf+0x53c/0x5d0 [ 22.018776] Read of size 1 at addr fff00000c4228378 by task kunit_try_catch/184 [ 22.019665] [ 22.020064] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 22.020255] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.020325] Hardware name: linux,dummy-virt (DT) [ 22.020410] Call trace: [ 22.020478] dump_backtrace+0x9c/0x128 [ 22.020589] show_stack+0x20/0x38 [ 22.020702] dump_stack_lvl+0x8c/0xd0 [ 22.020829] print_report+0x118/0x5f0 [ 22.020943] kasan_report+0xdc/0x128 [ 22.021068] __asan_report_load1_noabort+0x20/0x30 [ 22.021190] ksize_uaf+0x53c/0x5d0 [ 22.021247] kunit_try_run_case+0x170/0x3f0 [ 22.021320] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.021375] kthread+0x24c/0x2d0 [ 22.021420] ret_from_fork+0x10/0x20 [ 22.021470] [ 22.029086] Allocated by task 184: [ 22.029414] kasan_save_stack+0x3c/0x68 [ 22.030006] kasan_save_track+0x20/0x40 [ 22.030507] kasan_save_alloc_info+0x40/0x58 [ 22.031000] __kasan_kmalloc+0xd4/0xd8 [ 22.031528] __kmalloc_cache_noprof+0x154/0x320 [ 22.032581] ksize_uaf+0xb8/0x5d0 [ 22.033289] kunit_try_run_case+0x170/0x3f0 [ 22.033843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.034469] kthread+0x24c/0x2d0 [ 22.034926] ret_from_fork+0x10/0x20 [ 22.035646] [ 22.036018] Freed by task 184: [ 22.036410] kasan_save_stack+0x3c/0x68 [ 22.036950] kasan_save_track+0x20/0x40 [ 22.037474] kasan_save_free_info+0x4c/0x78 [ 22.038076] __kasan_slab_free+0x6c/0x98 [ 22.038585] kfree+0x110/0x3b8 [ 22.039090] ksize_uaf+0x120/0x5d0 [ 22.040286] kunit_try_run_case+0x170/0x3f0 [ 22.040676] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.040996] kthread+0x24c/0x2d0 [ 22.041270] ret_from_fork+0x10/0x20 [ 22.042203] [ 22.042652] The buggy address belongs to the object at fff00000c4228300 [ 22.042652] which belongs to the cache kmalloc-128 of size 128 [ 22.043942] The buggy address is located 120 bytes inside of [ 22.043942] freed 128-byte region [fff00000c4228300, fff00000c4228380) [ 22.045109] [ 22.045408] The buggy address belongs to the physical page: [ 22.046004] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104228 [ 22.046938] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.048112] page_type: f5(slab) [ 22.048631] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.049283] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 22.050109] page dumped because: kasan: bad access detected [ 22.050629] [ 22.050923] Memory state around the buggy address: [ 22.051581] fff00000c4228200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.052753] fff00000c4228280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.053504] >fff00000c4228300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.054180] ^ [ 22.054909] fff00000c4228380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.055811] fff00000c4228400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.056884] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 21.884804] ================================================================== [ 21.885755] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x720 [ 21.886636] Read of size 1 at addr fff00000c422827f by task kunit_try_catch/182 [ 21.887333] [ 21.888224] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.888500] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.888571] Hardware name: linux,dummy-virt (DT) [ 21.888641] Call trace: [ 21.888702] dump_backtrace+0x9c/0x128 [ 21.888830] show_stack+0x20/0x38 [ 21.888893] dump_stack_lvl+0x8c/0xd0 [ 21.888946] print_report+0x118/0x5f0 [ 21.889022] kasan_report+0xdc/0x128 [ 21.889069] __asan_report_load1_noabort+0x20/0x30 [ 21.889120] ksize_unpoisons_memory+0x690/0x720 [ 21.889173] kunit_try_run_case+0x170/0x3f0 [ 21.889220] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.889274] kthread+0x24c/0x2d0 [ 21.889321] ret_from_fork+0x10/0x20 [ 21.889367] [ 21.896699] Allocated by task 182: [ 21.897750] kasan_save_stack+0x3c/0x68 [ 21.898412] kasan_save_track+0x20/0x40 [ 21.898987] kasan_save_alloc_info+0x40/0x58 [ 21.899515] __kasan_kmalloc+0xd4/0xd8 [ 21.900496] __kmalloc_cache_noprof+0x154/0x320 [ 21.901094] ksize_unpoisons_memory+0xc0/0x720 [ 21.901653] kunit_try_run_case+0x170/0x3f0 [ 21.902202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.902803] kthread+0x24c/0x2d0 [ 21.903294] ret_from_fork+0x10/0x20 [ 21.904510] [ 21.904803] The buggy address belongs to the object at fff00000c4228200 [ 21.904803] which belongs to the cache kmalloc-128 of size 128 [ 21.905826] The buggy address is located 12 bytes to the right of [ 21.905826] allocated 115-byte region [fff00000c4228200, fff00000c4228273) [ 21.907013] [ 21.907332] The buggy address belongs to the physical page: [ 21.908300] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104228 [ 21.909112] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.909820] page_type: f5(slab) [ 21.910320] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.911114] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 21.912221] page dumped because: kasan: bad access detected [ 21.912867] [ 21.913089] Memory state around the buggy address: [ 21.913521] fff00000c4228100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.914633] fff00000c4228180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.915745] >fff00000c4228200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.916456] ^ [ 21.917390] fff00000c4228280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.918139] fff00000c4228300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.918859] ================================================================== [ 21.813316] ================================================================== [ 21.814401] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x630/0x720 [ 21.815285] Read of size 1 at addr fff00000c4228273 by task kunit_try_catch/182 [ 21.816939] [ 21.817298] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.817414] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.817494] Hardware name: linux,dummy-virt (DT) [ 21.817588] Call trace: [ 21.817677] dump_backtrace+0x9c/0x128 [ 21.817826] show_stack+0x20/0x38 [ 21.817896] dump_stack_lvl+0x8c/0xd0 [ 21.817948] print_report+0x118/0x5f0 [ 21.818024] kasan_report+0xdc/0x128 [ 21.818069] __asan_report_load1_noabort+0x20/0x30 [ 21.818120] ksize_unpoisons_memory+0x630/0x720 [ 21.818171] kunit_try_run_case+0x170/0x3f0 [ 21.818217] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.818270] kthread+0x24c/0x2d0 [ 21.818315] ret_from_fork+0x10/0x20 [ 21.818364] [ 21.825516] Allocated by task 182: [ 21.825944] kasan_save_stack+0x3c/0x68 [ 21.826665] kasan_save_track+0x20/0x40 [ 21.827239] kasan_save_alloc_info+0x40/0x58 [ 21.828091] __kasan_kmalloc+0xd4/0xd8 [ 21.828580] __kmalloc_cache_noprof+0x154/0x320 [ 21.829236] ksize_unpoisons_memory+0xc0/0x720 [ 21.829902] kunit_try_run_case+0x170/0x3f0 [ 21.830527] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.831307] kthread+0x24c/0x2d0 [ 21.832019] ret_from_fork+0x10/0x20 [ 21.832551] [ 21.832900] The buggy address belongs to the object at fff00000c4228200 [ 21.832900] which belongs to the cache kmalloc-128 of size 128 [ 21.834213] The buggy address is located 0 bytes to the right of [ 21.834213] allocated 115-byte region [fff00000c4228200, fff00000c4228273) [ 21.835978] [ 21.836246] The buggy address belongs to the physical page: [ 21.837168] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104228 [ 21.838071] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.838807] page_type: f5(slab) [ 21.839307] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.840288] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 21.841119] page dumped because: kasan: bad access detected [ 21.841748] [ 21.842138] Memory state around the buggy address: [ 21.842777] fff00000c4228100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.843858] fff00000c4228180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.844623] >fff00000c4228200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.845513] ^ [ 21.846185] fff00000c4228280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.846877] fff00000c4228300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.847824] ================================================================== [ 21.849738] ================================================================== [ 21.850446] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x720 [ 21.851117] Read of size 1 at addr fff00000c4228278 by task kunit_try_catch/182 [ 21.851887] [ 21.852455] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.852672] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.852755] Hardware name: linux,dummy-virt (DT) [ 21.852854] Call trace: [ 21.852927] dump_backtrace+0x9c/0x128 [ 21.853059] show_stack+0x20/0x38 [ 21.853166] dump_stack_lvl+0x8c/0xd0 [ 21.853282] print_report+0x118/0x5f0 [ 21.853384] kasan_report+0xdc/0x128 [ 21.853481] __asan_report_load1_noabort+0x20/0x30 [ 21.853654] ksize_unpoisons_memory+0x628/0x720 [ 21.853760] kunit_try_run_case+0x170/0x3f0 [ 21.853854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.853987] kthread+0x24c/0x2d0 [ 21.854041] ret_from_fork+0x10/0x20 [ 21.854091] [ 21.860605] Allocated by task 182: [ 21.861073] kasan_save_stack+0x3c/0x68 [ 21.861516] kasan_save_track+0x20/0x40 [ 21.862055] kasan_save_alloc_info+0x40/0x58 [ 21.862629] __kasan_kmalloc+0xd4/0xd8 [ 21.863196] __kmalloc_cache_noprof+0x154/0x320 [ 21.864113] ksize_unpoisons_memory+0xc0/0x720 [ 21.864687] kunit_try_run_case+0x170/0x3f0 [ 21.865294] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.865976] kthread+0x24c/0x2d0 [ 21.866449] ret_from_fork+0x10/0x20 [ 21.866982] [ 21.867297] The buggy address belongs to the object at fff00000c4228200 [ 21.867297] which belongs to the cache kmalloc-128 of size 128 [ 21.868634] The buggy address is located 5 bytes to the right of [ 21.868634] allocated 115-byte region [fff00000c4228200, fff00000c4228273) [ 21.869747] [ 21.870105] The buggy address belongs to the physical page: [ 21.870808] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104228 [ 21.872428] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.873150] page_type: f5(slab) [ 21.873623] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.874583] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 21.875613] page dumped because: kasan: bad access detected [ 21.876202] [ 21.876484] Memory state around the buggy address: [ 21.877002] fff00000c4228100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.877754] fff00000c4228180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.878510] >fff00000c4228200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.879207] ^ [ 21.880207] fff00000c4228280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.880953] fff00000c4228300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.881664] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 21.693884] ================================================================== [ 21.695008] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x408/0x478 [ 21.695915] Read of size 1 at addr fff00000c41e2aa8 by task kunit_try_catch/176 [ 21.697623] [ 21.698094] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.698393] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.698433] Hardware name: linux,dummy-virt (DT) [ 21.698474] Call trace: [ 21.698504] dump_backtrace+0x9c/0x128 [ 21.698560] show_stack+0x20/0x38 [ 21.698603] dump_stack_lvl+0x8c/0xd0 [ 21.698649] print_report+0x118/0x5f0 [ 21.698695] kasan_report+0xdc/0x128 [ 21.698739] __asan_report_load1_noabort+0x20/0x30 [ 21.698790] kmalloc_uaf2+0x408/0x478 [ 21.698835] kunit_try_run_case+0x170/0x3f0 [ 21.698883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.698937] kthread+0x24c/0x2d0 [ 21.699014] ret_from_fork+0x10/0x20 [ 21.699065] [ 21.707264] Allocated by task 176: [ 21.707748] kasan_save_stack+0x3c/0x68 [ 21.708786] kasan_save_track+0x20/0x40 [ 21.709440] kasan_save_alloc_info+0x40/0x58 [ 21.709844] __kasan_kmalloc+0xd4/0xd8 [ 21.710220] __kmalloc_cache_noprof+0x154/0x320 [ 21.710638] kmalloc_uaf2+0xc4/0x478 [ 21.711478] kunit_try_run_case+0x170/0x3f0 [ 21.712383] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.713404] kthread+0x24c/0x2d0 [ 21.713767] ret_from_fork+0x10/0x20 [ 21.714281] [ 21.714547] Freed by task 176: [ 21.715912] kasan_save_stack+0x3c/0x68 [ 21.716459] kasan_save_track+0x20/0x40 [ 21.717244] kasan_save_free_info+0x4c/0x78 [ 21.718125] __kasan_slab_free+0x6c/0x98 [ 21.718875] kfree+0x110/0x3b8 [ 21.720881] kmalloc_uaf2+0x138/0x478 [ 21.721603] kunit_try_run_case+0x170/0x3f0 [ 21.722331] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.722804] kthread+0x24c/0x2d0 [ 21.723550] ret_from_fork+0x10/0x20 [ 21.724600] [ 21.724924] The buggy address belongs to the object at fff00000c41e2a80 [ 21.724924] which belongs to the cache kmalloc-64 of size 64 [ 21.726317] The buggy address is located 40 bytes inside of [ 21.726317] freed 64-byte region [fff00000c41e2a80, fff00000c41e2ac0) [ 21.728558] [ 21.729309] The buggy address belongs to the physical page: [ 21.729832] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041e2 [ 21.730527] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.732011] page_type: f5(slab) [ 21.732479] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.733913] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 21.735712] page dumped because: kasan: bad access detected [ 21.736420] [ 21.737115] Memory state around the buggy address: [ 21.737912] fff00000c41e2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.738759] fff00000c41e2a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.739433] >fff00000c41e2a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.740539] ^ [ 21.741033] fff00000c41e2b00: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 21.741879] fff00000c41e2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.742686] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 21.643199] ================================================================== [ 21.644703] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x17c/0x328 [ 21.645487] Write of size 33 at addr fff00000c41e2a00 by task kunit_try_catch/174 [ 21.646280] [ 21.646637] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.646863] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.646939] Hardware name: linux,dummy-virt (DT) [ 21.647042] Call trace: [ 21.647112] dump_backtrace+0x9c/0x128 [ 21.647230] show_stack+0x20/0x38 [ 21.647334] dump_stack_lvl+0x8c/0xd0 [ 21.647516] print_report+0x118/0x5f0 [ 21.647656] kasan_report+0xdc/0x128 [ 21.647766] kasan_check_range+0x100/0x1a8 [ 21.647820] __asan_memset+0x34/0x78 [ 21.647866] kmalloc_uaf_memset+0x17c/0x328 [ 21.647917] kunit_try_run_case+0x170/0x3f0 [ 21.647990] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.648052] kthread+0x24c/0x2d0 [ 21.648099] ret_from_fork+0x10/0x20 [ 21.648147] [ 21.656517] Allocated by task 174: [ 21.657417] kasan_save_stack+0x3c/0x68 [ 21.658000] kasan_save_track+0x20/0x40 [ 21.658468] kasan_save_alloc_info+0x40/0x58 [ 21.659259] __kasan_kmalloc+0xd4/0xd8 [ 21.659769] __kmalloc_cache_noprof+0x154/0x320 [ 21.660380] kmalloc_uaf_memset+0xb8/0x328 [ 21.661374] kunit_try_run_case+0x170/0x3f0 [ 21.661872] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.662513] kthread+0x24c/0x2d0 [ 21.663007] ret_from_fork+0x10/0x20 [ 21.663472] [ 21.664229] Freed by task 174: [ 21.664665] kasan_save_stack+0x3c/0x68 [ 21.665202] kasan_save_track+0x20/0x40 [ 21.665686] kasan_save_free_info+0x4c/0x78 [ 21.666196] __kasan_slab_free+0x6c/0x98 [ 21.666773] kfree+0x110/0x3b8 [ 21.667242] kmalloc_uaf_memset+0x120/0x328 [ 21.667917] kunit_try_run_case+0x170/0x3f0 [ 21.668458] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.669135] kthread+0x24c/0x2d0 [ 21.669623] ret_from_fork+0x10/0x20 [ 21.670639] [ 21.670948] The buggy address belongs to the object at fff00000c41e2a00 [ 21.670948] which belongs to the cache kmalloc-64 of size 64 [ 21.672336] The buggy address is located 0 bytes inside of [ 21.672336] freed 64-byte region [fff00000c41e2a00, fff00000c41e2a40) [ 21.673611] [ 21.673894] The buggy address belongs to the physical page: [ 21.674553] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041e2 [ 21.675588] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.676392] page_type: f5(slab) [ 21.676832] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.677587] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 21.678546] page dumped because: kasan: bad access detected [ 21.679274] [ 21.679938] Memory state around the buggy address: [ 21.680561] fff00000c41e2900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.681399] fff00000c41e2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.682235] >fff00000c41e2a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.683043] ^ [ 21.683805] fff00000c41e2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.684628] fff00000c41e2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.685428] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 21.598212] ================================================================== [ 21.599165] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x30c/0x340 [ 21.599892] Read of size 1 at addr fff00000c662ad88 by task kunit_try_catch/172 [ 21.600710] [ 21.601096] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.601301] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.601376] Hardware name: linux,dummy-virt (DT) [ 21.601461] Call trace: [ 21.601527] dump_backtrace+0x9c/0x128 [ 21.601643] show_stack+0x20/0x38 [ 21.601750] dump_stack_lvl+0x8c/0xd0 [ 21.601869] print_report+0x118/0x5f0 [ 21.602000] kasan_report+0xdc/0x128 [ 21.602108] __asan_report_load1_noabort+0x20/0x30 [ 21.602229] kmalloc_uaf+0x30c/0x340 [ 21.602336] kunit_try_run_case+0x170/0x3f0 [ 21.602430] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.602488] kthread+0x24c/0x2d0 [ 21.602532] ret_from_fork+0x10/0x20 [ 21.602584] [ 21.607609] Allocated by task 172: [ 21.608005] kasan_save_stack+0x3c/0x68 [ 21.608562] kasan_save_track+0x20/0x40 [ 21.609222] kasan_save_alloc_info+0x40/0x58 [ 21.609925] __kasan_kmalloc+0xd4/0xd8 [ 21.610543] __kmalloc_cache_noprof+0x154/0x320 [ 21.611167] kmalloc_uaf+0xb8/0x340 [ 21.612117] kunit_try_run_case+0x170/0x3f0 [ 21.612689] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.613414] kthread+0x24c/0x2d0 [ 21.613902] ret_from_fork+0x10/0x20 [ 21.614426] [ 21.614736] Freed by task 172: [ 21.615214] kasan_save_stack+0x3c/0x68 [ 21.615750] kasan_save_track+0x20/0x40 [ 21.616240] kasan_save_free_info+0x4c/0x78 [ 21.616688] __kasan_slab_free+0x6c/0x98 [ 21.617294] kfree+0x110/0x3b8 [ 21.617897] kmalloc_uaf+0x120/0x340 [ 21.618430] kunit_try_run_case+0x170/0x3f0 [ 21.619125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.619862] kthread+0x24c/0x2d0 [ 21.620403] ret_from_fork+0x10/0x20 [ 21.620923] [ 21.621302] The buggy address belongs to the object at fff00000c662ad80 [ 21.621302] which belongs to the cache kmalloc-16 of size 16 [ 21.622467] The buggy address is located 8 bytes inside of [ 21.622467] freed 16-byte region [fff00000c662ad80, fff00000c662ad90) [ 21.623726] [ 21.624067] The buggy address belongs to the physical page: [ 21.624737] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 21.625674] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.626498] page_type: f5(slab) [ 21.627063] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.627871] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 21.628690] page dumped because: kasan: bad access detected [ 21.629374] [ 21.629730] Memory state around the buggy address: [ 21.630316] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 21.631048] fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.631734] >fff00000c662ad80: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.632280] ^ [ 21.632633] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.633282] fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.634147] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 21.553439] ================================================================== [ 21.554426] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x15c/0x2f8 [ 21.555226] Read of size 64 at addr fff00000c413b784 by task kunit_try_catch/170 [ 21.556013] [ 21.556567] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.556787] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.556863] Hardware name: linux,dummy-virt (DT) [ 21.556912] Call trace: [ 21.556941] dump_backtrace+0x9c/0x128 [ 21.557050] show_stack+0x20/0x38 [ 21.557097] dump_stack_lvl+0x8c/0xd0 [ 21.557146] print_report+0x118/0x5f0 [ 21.557191] kasan_report+0xdc/0x128 [ 21.557232] kasan_check_range+0x100/0x1a8 [ 21.557277] __asan_memmove+0x3c/0x98 [ 21.557319] kmalloc_memmove_invalid_size+0x15c/0x2f8 [ 21.557371] kunit_try_run_case+0x170/0x3f0 [ 21.557416] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.557467] kthread+0x24c/0x2d0 [ 21.557509] ret_from_fork+0x10/0x20 [ 21.557558] [ 21.565921] Allocated by task 170: [ 21.566438] kasan_save_stack+0x3c/0x68 [ 21.567057] kasan_save_track+0x20/0x40 [ 21.567901] kasan_save_alloc_info+0x40/0x58 [ 21.568518] __kasan_kmalloc+0xd4/0xd8 [ 21.569067] __kmalloc_cache_noprof+0x154/0x320 [ 21.569665] kmalloc_memmove_invalid_size+0xb8/0x2f8 [ 21.570322] kunit_try_run_case+0x170/0x3f0 [ 21.570866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.571785] kthread+0x24c/0x2d0 [ 21.572290] ret_from_fork+0x10/0x20 [ 21.572860] [ 21.573240] The buggy address belongs to the object at fff00000c413b780 [ 21.573240] which belongs to the cache kmalloc-64 of size 64 [ 21.574487] The buggy address is located 4 bytes inside of [ 21.574487] allocated 64-byte region [fff00000c413b780, fff00000c413b7c0) [ 21.575865] [ 21.576235] The buggy address belongs to the physical page: [ 21.577675] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10413b [ 21.578529] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.579247] page_type: f5(slab) [ 21.579706] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.580477] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 21.581504] page dumped because: kasan: bad access detected [ 21.582240] [ 21.582743] Memory state around the buggy address: [ 21.583493] fff00000c413b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.584457] fff00000c413b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.585179] >fff00000c413b780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.585843] ^ [ 21.586400] fff00000c413b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.587080] fff00000c413b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.587735] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 21.510218] ================================================================== [ 21.511427] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x15c/0x2f8 [ 21.512370] Read of size 18446744073709551614 at addr fff00000c413b704 by task kunit_try_catch/168 [ 21.513157] [ 21.513476] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.513610] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.513644] Hardware name: linux,dummy-virt (DT) [ 21.513696] Call trace: [ 21.514053] dump_backtrace+0x9c/0x128 [ 21.514226] show_stack+0x20/0x38 [ 21.514387] dump_stack_lvl+0x8c/0xd0 [ 21.514492] print_report+0x118/0x5f0 [ 21.514542] kasan_report+0xdc/0x128 [ 21.514584] kasan_check_range+0x100/0x1a8 [ 21.514629] __asan_memmove+0x3c/0x98 [ 21.514672] kmalloc_memmove_negative_size+0x15c/0x2f8 [ 21.514723] kunit_try_run_case+0x170/0x3f0 [ 21.514767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.514818] kthread+0x24c/0x2d0 [ 21.514860] ret_from_fork+0x10/0x20 [ 21.514907] [ 21.523222] Allocated by task 168: [ 21.523685] kasan_save_stack+0x3c/0x68 [ 21.524402] kasan_save_track+0x20/0x40 [ 21.524980] kasan_save_alloc_info+0x40/0x58 [ 21.525459] __kasan_kmalloc+0xd4/0xd8 [ 21.526045] __kmalloc_cache_noprof+0x154/0x320 [ 21.526606] kmalloc_memmove_negative_size+0xb8/0x2f8 [ 21.527359] kunit_try_run_case+0x170/0x3f0 [ 21.527856] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.528562] kthread+0x24c/0x2d0 [ 21.529067] ret_from_fork+0x10/0x20 [ 21.529545] [ 21.529848] The buggy address belongs to the object at fff00000c413b700 [ 21.529848] which belongs to the cache kmalloc-64 of size 64 [ 21.531174] The buggy address is located 4 bytes inside of [ 21.531174] 64-byte region [fff00000c413b700, fff00000c413b740) [ 21.533285] [ 21.533744] The buggy address belongs to the physical page: [ 21.534496] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10413b [ 21.535453] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.536210] page_type: f5(slab) [ 21.536629] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.537709] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 21.538314] page dumped because: kasan: bad access detected [ 21.538571] [ 21.538697] Memory state around the buggy address: [ 21.538930] fff00000c413b600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.539580] fff00000c413b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.541159] >fff00000c413b700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.541897] ^ [ 21.542532] fff00000c413b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.543360] fff00000c413b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.544242] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 21.466586] ================================================================== [ 21.468142] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x15c/0x310 [ 21.469288] Write of size 16 at addr fff00000c41c1969 by task kunit_try_catch/166 [ 21.470122] [ 21.470478] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.470678] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.470751] Hardware name: linux,dummy-virt (DT) [ 21.470837] Call trace: [ 21.470905] dump_backtrace+0x9c/0x128 [ 21.471045] show_stack+0x20/0x38 [ 21.471151] dump_stack_lvl+0x8c/0xd0 [ 21.471268] print_report+0x118/0x5f0 [ 21.471420] kasan_report+0xdc/0x128 [ 21.471529] kasan_check_range+0x100/0x1a8 [ 21.471632] __asan_memset+0x34/0x78 [ 21.471730] kmalloc_oob_memset_16+0x15c/0x310 [ 21.471837] kunit_try_run_case+0x170/0x3f0 [ 21.471937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.472066] kthread+0x24c/0x2d0 [ 21.472165] ret_from_fork+0x10/0x20 [ 21.472246] [ 21.480803] Allocated by task 166: [ 21.481201] kasan_save_stack+0x3c/0x68 [ 21.481986] kasan_save_track+0x20/0x40 [ 21.482673] kasan_save_alloc_info+0x40/0x58 [ 21.483234] __kasan_kmalloc+0xd4/0xd8 [ 21.484022] __kmalloc_cache_noprof+0x154/0x320 [ 21.484561] kmalloc_oob_memset_16+0xb0/0x310 [ 21.485125] kunit_try_run_case+0x170/0x3f0 [ 21.485629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.486251] kthread+0x24c/0x2d0 [ 21.486705] ret_from_fork+0x10/0x20 [ 21.487190] [ 21.488363] The buggy address belongs to the object at fff00000c41c1900 [ 21.488363] which belongs to the cache kmalloc-128 of size 128 [ 21.489371] The buggy address is located 105 bytes inside of [ 21.489371] allocated 120-byte region [fff00000c41c1900, fff00000c41c1978) [ 21.490543] [ 21.490859] The buggy address belongs to the physical page: [ 21.491443] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041c1 [ 21.492348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.493474] page_type: f5(slab) [ 21.493920] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.494574] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 21.495298] page dumped because: kasan: bad access detected [ 21.496570] [ 21.497085] Memory state around the buggy address: [ 21.497518] fff00000c41c1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 21.498417] fff00000c41c1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.499349] >fff00000c41c1900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.500301] ^ [ 21.501062] fff00000c41c1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.502021] fff00000c41c1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.502819] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 21.416297] ================================================================== [ 21.417303] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x15c/0x310 [ 21.418000] Write of size 8 at addr fff00000c416b871 by task kunit_try_catch/164 [ 21.419322] [ 21.420008] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.420285] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.420353] Hardware name: linux,dummy-virt (DT) [ 21.420393] Call trace: [ 21.420421] dump_backtrace+0x9c/0x128 [ 21.420474] show_stack+0x20/0x38 [ 21.420516] dump_stack_lvl+0x8c/0xd0 [ 21.420563] print_report+0x118/0x5f0 [ 21.420605] kasan_report+0xdc/0x128 [ 21.420646] kasan_check_range+0x100/0x1a8 [ 21.420690] __asan_memset+0x34/0x78 [ 21.420733] kmalloc_oob_memset_8+0x15c/0x310 [ 21.420795] kunit_try_run_case+0x170/0x3f0 [ 21.420842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.420894] kthread+0x24c/0x2d0 [ 21.420936] ret_from_fork+0x10/0x20 [ 21.421012] [ 21.428993] Allocated by task 164: [ 21.429491] kasan_save_stack+0x3c/0x68 [ 21.429985] kasan_save_track+0x20/0x40 [ 21.430467] kasan_save_alloc_info+0x40/0x58 [ 21.430985] __kasan_kmalloc+0xd4/0xd8 [ 21.431505] __kmalloc_cache_noprof+0x154/0x320 [ 21.432033] kmalloc_oob_memset_8+0xb0/0x310 [ 21.432598] kunit_try_run_case+0x170/0x3f0 [ 21.433404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.433986] kthread+0x24c/0x2d0 [ 21.434506] ret_from_fork+0x10/0x20 [ 21.435032] [ 21.435314] The buggy address belongs to the object at fff00000c416b800 [ 21.435314] which belongs to the cache kmalloc-128 of size 128 [ 21.438101] The buggy address is located 113 bytes inside of [ 21.438101] allocated 120-byte region [fff00000c416b800, fff00000c416b878) [ 21.439836] [ 21.440149] The buggy address belongs to the physical page: [ 21.441031] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10416b [ 21.441805] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.442512] page_type: f5(slab) [ 21.442951] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.444467] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 21.445245] page dumped because: kasan: bad access detected [ 21.445814] [ 21.446163] Memory state around the buggy address: [ 21.446706] fff00000c416b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 21.447645] fff00000c416b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.448736] >fff00000c416b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.449513] ^ [ 21.450096] fff00000c416b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.450780] fff00000c416b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.451479] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 21.372941] ================================================================== [ 21.373887] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x15c/0x318 [ 21.374653] Write of size 4 at addr fff00000c41c1775 by task kunit_try_catch/162 [ 21.375429] [ 21.376186] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.376870] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.376910] Hardware name: linux,dummy-virt (DT) [ 21.376947] Call trace: [ 21.377003] dump_backtrace+0x9c/0x128 [ 21.377060] show_stack+0x20/0x38 [ 21.377102] dump_stack_lvl+0x8c/0xd0 [ 21.377147] print_report+0x118/0x5f0 [ 21.377191] kasan_report+0xdc/0x128 [ 21.377234] kasan_check_range+0x100/0x1a8 [ 21.377280] __asan_memset+0x34/0x78 [ 21.377324] kmalloc_oob_memset_4+0x15c/0x318 [ 21.377373] kunit_try_run_case+0x170/0x3f0 [ 21.377418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.377469] kthread+0x24c/0x2d0 [ 21.377515] ret_from_fork+0x10/0x20 [ 21.377563] [ 21.385843] Allocated by task 162: [ 21.386399] kasan_save_stack+0x3c/0x68 [ 21.386949] kasan_save_track+0x20/0x40 [ 21.387886] kasan_save_alloc_info+0x40/0x58 [ 21.388595] __kasan_kmalloc+0xd4/0xd8 [ 21.388992] __kmalloc_cache_noprof+0x154/0x320 [ 21.389747] kmalloc_oob_memset_4+0xb0/0x318 [ 21.390391] kunit_try_run_case+0x170/0x3f0 [ 21.390942] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.391976] kthread+0x24c/0x2d0 [ 21.392611] ret_from_fork+0x10/0x20 [ 21.393093] [ 21.393613] The buggy address belongs to the object at fff00000c41c1700 [ 21.393613] which belongs to the cache kmalloc-128 of size 128 [ 21.394841] The buggy address is located 117 bytes inside of [ 21.394841] allocated 120-byte region [fff00000c41c1700, fff00000c41c1778) [ 21.396242] [ 21.396553] The buggy address belongs to the physical page: [ 21.397525] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041c1 [ 21.398385] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.399133] page_type: f5(slab) [ 21.400033] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.400692] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 21.401503] page dumped because: kasan: bad access detected [ 21.402087] [ 21.402392] Memory state around the buggy address: [ 21.402868] fff00000c41c1600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 21.404045] fff00000c41c1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.404676] >fff00000c41c1700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.405409] ^ [ 21.406082] fff00000c41c1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.406799] fff00000c41c1800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.408211] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 21.330942] ================================================================== [ 21.331942] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x15c/0x310 [ 21.333218] Write of size 2 at addr fff00000c416b577 by task kunit_try_catch/160 [ 21.334024] [ 21.334378] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.334617] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.334694] Hardware name: linux,dummy-virt (DT) [ 21.334747] Call trace: [ 21.334773] dump_backtrace+0x9c/0x128 [ 21.334826] show_stack+0x20/0x38 [ 21.334906] dump_stack_lvl+0x8c/0xd0 [ 21.334990] print_report+0x118/0x5f0 [ 21.335041] kasan_report+0xdc/0x128 [ 21.335084] kasan_check_range+0x100/0x1a8 [ 21.335131] __asan_memset+0x34/0x78 [ 21.335178] kmalloc_oob_memset_2+0x15c/0x310 [ 21.335227] kunit_try_run_case+0x170/0x3f0 [ 21.335273] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.335325] kthread+0x24c/0x2d0 [ 21.335366] ret_from_fork+0x10/0x20 [ 21.335413] [ 21.342504] Allocated by task 160: [ 21.342924] kasan_save_stack+0x3c/0x68 [ 21.343449] kasan_save_track+0x20/0x40 [ 21.344034] kasan_save_alloc_info+0x40/0x58 [ 21.344659] __kasan_kmalloc+0xd4/0xd8 [ 21.345311] __kmalloc_cache_noprof+0x154/0x320 [ 21.345980] kmalloc_oob_memset_2+0xb0/0x310 [ 21.346572] kunit_try_run_case+0x170/0x3f0 [ 21.347174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.347834] kthread+0x24c/0x2d0 [ 21.348354] ret_from_fork+0x10/0x20 [ 21.348941] [ 21.349285] The buggy address belongs to the object at fff00000c416b500 [ 21.349285] which belongs to the cache kmalloc-128 of size 128 [ 21.350492] The buggy address is located 119 bytes inside of [ 21.350492] allocated 120-byte region [fff00000c416b500, fff00000c416b578) [ 21.351730] [ 21.352087] The buggy address belongs to the physical page: [ 21.352778] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10416b [ 21.353711] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.354478] page_type: f5(slab) [ 21.355015] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.355868] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 21.356655] page dumped because: kasan: bad access detected [ 21.357304] [ 21.357651] Memory state around the buggy address: [ 21.358252] fff00000c416b400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.359031] fff00000c416b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.359830] >fff00000c416b500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.360587] ^ [ 21.361398] fff00000c416b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.362185] fff00000c416b600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.362931] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 21.290241] ================================================================== [ 21.291233] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x150/0x2e8 [ 21.292600] Write of size 128 at addr fff00000c416b400 by task kunit_try_catch/158 [ 21.293314] [ 21.293628] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.293944] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.294038] Hardware name: linux,dummy-virt (DT) [ 21.294125] Call trace: [ 21.294187] dump_backtrace+0x9c/0x128 [ 21.294299] show_stack+0x20/0x38 [ 21.294401] dump_stack_lvl+0x8c/0xd0 [ 21.294473] print_report+0x118/0x5f0 [ 21.294520] kasan_report+0xdc/0x128 [ 21.294563] kasan_check_range+0x100/0x1a8 [ 21.294610] __asan_memset+0x34/0x78 [ 21.294653] kmalloc_oob_in_memset+0x150/0x2e8 [ 21.294701] kunit_try_run_case+0x170/0x3f0 [ 21.294747] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.294798] kthread+0x24c/0x2d0 [ 21.294841] ret_from_fork+0x10/0x20 [ 21.294888] [ 21.302424] Allocated by task 158: [ 21.303040] kasan_save_stack+0x3c/0x68 [ 21.303704] kasan_save_track+0x20/0x40 [ 21.304375] kasan_save_alloc_info+0x40/0x58 [ 21.304950] __kasan_kmalloc+0xd4/0xd8 [ 21.305712] __kmalloc_cache_noprof+0x154/0x320 [ 21.306437] kmalloc_oob_in_memset+0xb0/0x2e8 [ 21.307055] kunit_try_run_case+0x170/0x3f0 [ 21.307650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.308375] kthread+0x24c/0x2d0 [ 21.308955] ret_from_fork+0x10/0x20 [ 21.309508] [ 21.309928] The buggy address belongs to the object at fff00000c416b400 [ 21.309928] which belongs to the cache kmalloc-128 of size 128 [ 21.311268] The buggy address is located 0 bytes inside of [ 21.311268] allocated 120-byte region [fff00000c416b400, fff00000c416b478) [ 21.312576] [ 21.312909] The buggy address belongs to the physical page: [ 21.313594] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10416b [ 21.314362] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.315057] page_type: f5(slab) [ 21.315516] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.316368] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 21.317094] page dumped because: kasan: bad access detected [ 21.317723] [ 21.318067] Memory state around the buggy address: [ 21.318571] fff00000c416b300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.319382] fff00000c416b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.320070] >fff00000c416b400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.320842] ^ [ 21.321492] fff00000c416b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.322263] fff00000c416b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.322937] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 21.243241] ================================================================== [ 21.244227] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 21.245008] Read of size 16 at addr fff00000c662ad60 by task kunit_try_catch/156 [ 21.245846] [ 21.246252] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.246513] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.246606] Hardware name: linux,dummy-virt (DT) [ 21.246719] Call trace: [ 21.246787] dump_backtrace+0x9c/0x128 [ 21.246902] show_stack+0x20/0x38 [ 21.247024] dump_stack_lvl+0x8c/0xd0 [ 21.247092] print_report+0x118/0x5f0 [ 21.247137] kasan_report+0xdc/0x128 [ 21.247181] __asan_report_load16_noabort+0x20/0x30 [ 21.247231] kmalloc_uaf_16+0x3bc/0x438 [ 21.247276] kunit_try_run_case+0x170/0x3f0 [ 21.247321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.247373] kthread+0x24c/0x2d0 [ 21.247415] ret_from_fork+0x10/0x20 [ 21.247462] [ 21.253872] Allocated by task 156: [ 21.254400] kasan_save_stack+0x3c/0x68 [ 21.254887] kasan_save_track+0x20/0x40 [ 21.255547] kasan_save_alloc_info+0x40/0x58 [ 21.256168] __kasan_kmalloc+0xd4/0xd8 [ 21.256740] __kmalloc_cache_noprof+0x154/0x320 [ 21.257363] kmalloc_uaf_16+0x144/0x438 [ 21.257911] kunit_try_run_case+0x170/0x3f0 [ 21.258607] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.259223] kthread+0x24c/0x2d0 [ 21.259783] ret_from_fork+0x10/0x20 [ 21.260353] [ 21.260690] Freed by task 156: [ 21.261114] kasan_save_stack+0x3c/0x68 [ 21.261713] kasan_save_track+0x20/0x40 [ 21.262289] kasan_save_free_info+0x4c/0x78 [ 21.262880] __kasan_slab_free+0x6c/0x98 [ 21.263438] kfree+0x110/0x3b8 [ 21.263999] kmalloc_uaf_16+0x198/0x438 [ 21.264562] kunit_try_run_case+0x170/0x3f0 [ 21.265166] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.265772] kthread+0x24c/0x2d0 [ 21.266323] ret_from_fork+0x10/0x20 [ 21.266820] [ 21.267207] The buggy address belongs to the object at fff00000c662ad60 [ 21.267207] which belongs to the cache kmalloc-16 of size 16 [ 21.268294] The buggy address is located 0 bytes inside of [ 21.268294] freed 16-byte region [fff00000c662ad60, fff00000c662ad70) [ 21.269406] [ 21.269810] The buggy address belongs to the physical page: [ 21.270489] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 21.271345] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.272115] page_type: f5(slab) [ 21.272605] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.273457] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 21.274223] page dumped because: kasan: bad access detected [ 21.274844] [ 21.275204] Memory state around the buggy address: [ 21.275820] fff00000c662ac00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.276533] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 21.277382] >fff00000c662ad00: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 21.278145] ^ [ 21.278804] fff00000c662ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.279579] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.280328] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 21.204606] ================================================================== [ 21.205621] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a8/0x400 [ 21.206370] Write of size 16 at addr fff00000c662ad00 by task kunit_try_catch/154 [ 21.207261] [ 21.207630] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.207845] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.207986] Hardware name: linux,dummy-virt (DT) [ 21.208079] Call trace: [ 21.208146] dump_backtrace+0x9c/0x128 [ 21.208260] show_stack+0x20/0x38 [ 21.208364] dump_stack_lvl+0x8c/0xd0 [ 21.208475] print_report+0x118/0x5f0 [ 21.208537] kasan_report+0xdc/0x128 [ 21.208584] __asan_report_store16_noabort+0x20/0x30 [ 21.208635] kmalloc_oob_16+0x3a8/0x400 [ 21.208680] kunit_try_run_case+0x170/0x3f0 [ 21.208726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.208790] kthread+0x24c/0x2d0 [ 21.208837] ret_from_fork+0x10/0x20 [ 21.208885] [ 21.214864] Allocated by task 154: [ 21.215431] kasan_save_stack+0x3c/0x68 [ 21.216080] kasan_save_track+0x20/0x40 [ 21.216507] kasan_save_alloc_info+0x40/0x58 [ 21.216998] __kasan_kmalloc+0xd4/0xd8 [ 21.217608] __kmalloc_cache_noprof+0x154/0x320 [ 21.218313] kmalloc_oob_16+0xb4/0x400 [ 21.218954] kunit_try_run_case+0x170/0x3f0 [ 21.219564] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.220313] kthread+0x24c/0x2d0 [ 21.220870] ret_from_fork+0x10/0x20 [ 21.221413] [ 21.221754] The buggy address belongs to the object at fff00000c662ad00 [ 21.221754] which belongs to the cache kmalloc-16 of size 16 [ 21.222926] The buggy address is located 0 bytes inside of [ 21.222926] allocated 13-byte region [fff00000c662ad00, fff00000c662ad0d) [ 21.224133] [ 21.224492] The buggy address belongs to the physical page: [ 21.225139] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 21.225988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.226754] page_type: f5(slab) [ 21.227214] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.227979] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 21.229009] page dumped because: kasan: bad access detected [ 21.229618] [ 21.229996] Memory state around the buggy address: [ 21.230579] fff00000c662ac00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.231256] fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc [ 21.232090] >fff00000c662ad00: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.232869] ^ [ 21.233405] fff00000c662ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.234213] fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.234986] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 21.145495] ================================================================== [ 21.146244] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c4/0x510 [ 21.147171] Read of size 1 at addr fff00000c6540800 by task kunit_try_catch/152 [ 21.148062] [ 21.148405] CPU: 1 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.148674] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.148784] Hardware name: linux,dummy-virt (DT) [ 21.148870] Call trace: [ 21.148935] dump_backtrace+0x9c/0x128 [ 21.149067] show_stack+0x20/0x38 [ 21.149168] dump_stack_lvl+0x8c/0xd0 [ 21.149308] print_report+0x118/0x5f0 [ 21.149410] kasan_report+0xdc/0x128 [ 21.149515] __asan_report_load1_noabort+0x20/0x30 [ 21.149654] krealloc_uaf+0x4c4/0x510 [ 21.149786] kunit_try_run_case+0x170/0x3f0 [ 21.149884] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.150006] kthread+0x24c/0x2d0 [ 21.150150] ret_from_fork+0x10/0x20 [ 21.150269] [ 21.157656] Allocated by task 152: [ 21.158216] kasan_save_stack+0x3c/0x68 [ 21.158798] kasan_save_track+0x20/0x40 [ 21.160142] kasan_save_alloc_info+0x40/0x58 [ 21.160749] __kasan_kmalloc+0xd4/0xd8 [ 21.161356] __kmalloc_cache_noprof+0x154/0x320 [ 21.161996] krealloc_uaf+0xc8/0x510 [ 21.162537] kunit_try_run_case+0x170/0x3f0 [ 21.163141] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.164023] kthread+0x24c/0x2d0 [ 21.164530] ret_from_fork+0x10/0x20 [ 21.165113] [ 21.165481] Freed by task 152: [ 21.166083] kasan_save_stack+0x3c/0x68 [ 21.166539] kasan_save_track+0x20/0x40 [ 21.166988] kasan_save_free_info+0x4c/0x78 [ 21.167885] __kasan_slab_free+0x6c/0x98 [ 21.168867] kfree+0x110/0x3b8 [ 21.169456] krealloc_uaf+0x130/0x510 [ 21.169912] kunit_try_run_case+0x170/0x3f0 [ 21.170417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.171144] kthread+0x24c/0x2d0 [ 21.171799] ret_from_fork+0x10/0x20 [ 21.172726] [ 21.173252] The buggy address belongs to the object at fff00000c6540800 [ 21.173252] which belongs to the cache kmalloc-256 of size 256 [ 21.174373] The buggy address is located 0 bytes inside of [ 21.174373] freed 256-byte region [fff00000c6540800, fff00000c6540900) [ 21.175473] [ 21.175768] The buggy address belongs to the physical page: [ 21.176337] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106540 [ 21.177396] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.178244] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.178982] page_type: f5(slab) [ 21.179667] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 21.180447] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 21.181224] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 21.182037] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 21.182863] head: 0bfffe0000000001 ffffc1ffc3195001 ffffffffffffffff 0000000000000000 [ 21.183781] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 21.184420] page dumped because: kasan: bad access detected [ 21.185738] [ 21.186006] Memory state around the buggy address: [ 21.186396] fff00000c6540700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.186916] fff00000c6540780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.188651] >fff00000c6540800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.189376] ^ [ 21.189761] fff00000c6540880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.190549] fff00000c6540900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.191814] ================================================================== [ 21.098403] ================================================================== [ 21.099485] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x18c/0x510 [ 21.100509] Read of size 1 at addr fff00000c6540800 by task kunit_try_catch/152 [ 21.101935] [ 21.102284] CPU: 1 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.102491] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.102568] Hardware name: linux,dummy-virt (DT) [ 21.102655] Call trace: [ 21.102722] dump_backtrace+0x9c/0x128 [ 21.102797] show_stack+0x20/0x38 [ 21.102841] dump_stack_lvl+0x8c/0xd0 [ 21.102888] print_report+0x118/0x5f0 [ 21.102935] kasan_report+0xdc/0x128 [ 21.103008] __kasan_check_byte+0x54/0x70 [ 21.103057] krealloc_noprof+0x48/0x1a0 [ 21.103104] krealloc_uaf+0x18c/0x510 [ 21.103150] kunit_try_run_case+0x170/0x3f0 [ 21.103196] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.103247] kthread+0x24c/0x2d0 [ 21.103292] ret_from_fork+0x10/0x20 [ 21.103339] [ 21.110372] Allocated by task 152: [ 21.110753] kasan_save_stack+0x3c/0x68 [ 21.112160] kasan_save_track+0x20/0x40 [ 21.113042] kasan_save_alloc_info+0x40/0x58 [ 21.113664] __kasan_kmalloc+0xd4/0xd8 [ 21.114194] __kmalloc_cache_noprof+0x154/0x320 [ 21.114771] krealloc_uaf+0xc8/0x510 [ 21.115256] kunit_try_run_case+0x170/0x3f0 [ 21.115752] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.116515] kthread+0x24c/0x2d0 [ 21.117032] ret_from_fork+0x10/0x20 [ 21.117548] [ 21.117891] Freed by task 152: [ 21.118315] kasan_save_stack+0x3c/0x68 [ 21.118877] kasan_save_track+0x20/0x40 [ 21.119422] kasan_save_free_info+0x4c/0x78 [ 21.120394] __kasan_slab_free+0x6c/0x98 [ 21.120992] kfree+0x110/0x3b8 [ 21.121489] krealloc_uaf+0x130/0x510 [ 21.121981] kunit_try_run_case+0x170/0x3f0 [ 21.122523] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.123235] kthread+0x24c/0x2d0 [ 21.123682] ret_from_fork+0x10/0x20 [ 21.124709] [ 21.125089] The buggy address belongs to the object at fff00000c6540800 [ 21.125089] which belongs to the cache kmalloc-256 of size 256 [ 21.126005] The buggy address is located 0 bytes inside of [ 21.126005] freed 256-byte region [fff00000c6540800, fff00000c6540900) [ 21.127151] [ 21.127547] The buggy address belongs to the physical page: [ 21.128312] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106540 [ 21.129357] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.130179] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.130955] page_type: f5(slab) [ 21.131339] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 21.132581] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 21.133416] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 21.134261] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 21.135068] head: 0bfffe0000000001 ffffc1ffc3195001 ffffffffffffffff 0000000000000000 [ 21.135950] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 21.137067] page dumped because: kasan: bad access detected [ 21.137814] [ 21.138343] Memory state around the buggy address: [ 21.139026] fff00000c6540700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.140152] fff00000c6540780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.140921] >fff00000c6540800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.141713] ^ [ 21.142173] fff00000c6540880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.142888] fff00000c6540900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.143677] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 20.778241] ================================================================== [ 20.779091] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa98/0xbc8 [ 20.780100] Write of size 1 at addr fff00000c1e2d8ea by task kunit_try_catch/146 [ 20.780874] [ 20.781198] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 20.781391] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.781455] Hardware name: linux,dummy-virt (DT) [ 20.781523] Call trace: [ 20.781573] dump_backtrace+0x9c/0x128 [ 20.781667] show_stack+0x20/0x38 [ 20.781762] dump_stack_lvl+0x8c/0xd0 [ 20.781922] print_report+0x118/0x5f0 [ 20.782057] kasan_report+0xdc/0x128 [ 20.782167] __asan_report_store1_noabort+0x20/0x30 [ 20.782289] krealloc_less_oob_helper+0xa98/0xbc8 [ 20.782412] krealloc_less_oob+0x20/0x38 [ 20.782577] kunit_try_run_case+0x170/0x3f0 [ 20.782691] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.782814] kthread+0x24c/0x2d0 [ 20.782886] ret_from_fork+0x10/0x20 [ 20.782936] [ 20.793440] Allocated by task 146: [ 20.794181] kasan_save_stack+0x3c/0x68 [ 20.794846] kasan_save_track+0x20/0x40 [ 20.795416] kasan_save_alloc_info+0x40/0x58 [ 20.795950] __kasan_krealloc+0x118/0x178 [ 20.797258] krealloc_noprof+0x10c/0x1a0 [ 20.797804] krealloc_less_oob_helper+0x170/0xbc8 [ 20.798434] krealloc_less_oob+0x20/0x38 [ 20.798981] kunit_try_run_case+0x170/0x3f0 [ 20.799544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.800213] kthread+0x24c/0x2d0 [ 20.800759] ret_from_fork+0x10/0x20 [ 20.801568] [ 20.801864] The buggy address belongs to the object at fff00000c1e2d800 [ 20.801864] which belongs to the cache kmalloc-256 of size 256 [ 20.803214] The buggy address is located 33 bytes to the right of [ 20.803214] allocated 201-byte region [fff00000c1e2d800, fff00000c1e2d8c9) [ 20.805039] [ 20.805358] The buggy address belongs to the physical page: [ 20.805877] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e2c [ 20.806731] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.807701] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.808632] page_type: f5(slab) [ 20.809166] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 20.809899] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.810742] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 20.811695] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.812598] head: 0bfffe0000000001 ffffc1ffc3078b01 ffffffffffffffff 0000000000000000 [ 20.813398] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 20.814141] page dumped because: kasan: bad access detected [ 20.814725] [ 20.815122] Memory state around the buggy address: [ 20.815607] fff00000c1e2d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.816560] fff00000c1e2d800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.817414] >fff00000c1e2d880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 20.818098] ^ [ 20.818885] fff00000c1e2d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.819707] fff00000c1e2d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.820540] ================================================================== [ 20.972637] ================================================================== [ 20.973796] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb20/0xbc8 [ 20.974534] Write of size 1 at addr fff00000c69660d0 by task kunit_try_catch/150 [ 20.975249] [ 20.975651] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 20.975858] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.975935] Hardware name: linux,dummy-virt (DT) [ 20.976041] Call trace: [ 20.976110] dump_backtrace+0x9c/0x128 [ 20.976229] show_stack+0x20/0x38 [ 20.976334] dump_stack_lvl+0x8c/0xd0 [ 20.976436] print_report+0x118/0x5f0 [ 20.976576] kasan_report+0xdc/0x128 [ 20.976679] __asan_report_store1_noabort+0x20/0x30 [ 20.976736] krealloc_less_oob_helper+0xb20/0xbc8 [ 20.976802] krealloc_large_less_oob+0x20/0x38 [ 20.976855] kunit_try_run_case+0x170/0x3f0 [ 20.976904] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.976956] kthread+0x24c/0x2d0 [ 20.977035] ret_from_fork+0x10/0x20 [ 20.977082] [ 20.983508] The buggy address belongs to the physical page: [ 20.984090] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106964 [ 20.985833] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.986627] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.988231] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.989052] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.989853] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.990622] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.991471] head: 0bfffe0000000002 ffffc1ffc31a5901 ffffffffffffffff 0000000000000000 [ 20.992256] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 20.993053] page dumped because: kasan: bad access detected [ 20.993683] [ 20.994048] Memory state around the buggy address: [ 20.994580] fff00000c6965f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.995320] fff00000c6966000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.996206] >fff00000c6966080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 20.996982] ^ [ 20.997711] fff00000c6966100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.998550] fff00000c6966180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.999266] ================================================================== [ 20.644651] ================================================================== [ 20.645693] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa2c/0xbc8 [ 20.646478] Write of size 1 at addr fff00000c1e2d8c9 by task kunit_try_catch/146 [ 20.647377] [ 20.647703] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 20.647899] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.647987] Hardware name: linux,dummy-virt (DT) [ 20.648067] Call trace: [ 20.648126] dump_backtrace+0x9c/0x128 [ 20.648231] show_stack+0x20/0x38 [ 20.648319] dump_stack_lvl+0x8c/0xd0 [ 20.648412] print_report+0x118/0x5f0 [ 20.648513] kasan_report+0xdc/0x128 [ 20.648662] __asan_report_store1_noabort+0x20/0x30 [ 20.648801] krealloc_less_oob_helper+0xa2c/0xbc8 [ 20.648920] krealloc_less_oob+0x20/0x38 [ 20.649056] kunit_try_run_case+0x170/0x3f0 [ 20.649213] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.649342] kthread+0x24c/0x2d0 [ 20.649407] ret_from_fork+0x10/0x20 [ 20.649457] [ 20.656685] Allocated by task 146: [ 20.657081] kasan_save_stack+0x3c/0x68 [ 20.657486] kasan_save_track+0x20/0x40 [ 20.657855] kasan_save_alloc_info+0x40/0x58 [ 20.661074] __kasan_krealloc+0x118/0x178 [ 20.662281] krealloc_noprof+0x10c/0x1a0 [ 20.664439] krealloc_less_oob_helper+0x170/0xbc8 [ 20.665568] krealloc_less_oob+0x20/0x38 [ 20.666583] kunit_try_run_case+0x170/0x3f0 [ 20.668348] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.670049] kthread+0x24c/0x2d0 [ 20.670618] ret_from_fork+0x10/0x20 [ 20.671251] [ 20.671743] The buggy address belongs to the object at fff00000c1e2d800 [ 20.671743] which belongs to the cache kmalloc-256 of size 256 [ 20.673434] The buggy address is located 0 bytes to the right of [ 20.673434] allocated 201-byte region [fff00000c1e2d800, fff00000c1e2d8c9) [ 20.674752] [ 20.675148] The buggy address belongs to the physical page: [ 20.676240] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e2c [ 20.677189] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.678065] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.678734] page_type: f5(slab) [ 20.679421] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 20.680387] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.681490] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 20.682447] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.683449] head: 0bfffe0000000001 ffffc1ffc3078b01 ffffffffffffffff 0000000000000000 [ 20.684860] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 20.685587] page dumped because: kasan: bad access detected [ 20.686131] [ 20.686403] Memory state around the buggy address: [ 20.687072] fff00000c1e2d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.688593] fff00000c1e2d800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.689422] >fff00000c1e2d880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 20.690215] ^ [ 20.690878] fff00000c1e2d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.691727] fff00000c1e2d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.692496] ================================================================== [ 21.000798] ================================================================== [ 21.002185] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa54/0xbc8 [ 21.002947] Write of size 1 at addr fff00000c69660da by task kunit_try_catch/150 [ 21.004502] [ 21.004806] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.005160] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.005254] Hardware name: linux,dummy-virt (DT) [ 21.005340] Call trace: [ 21.005405] dump_backtrace+0x9c/0x128 [ 21.005474] show_stack+0x20/0x38 [ 21.005516] dump_stack_lvl+0x8c/0xd0 [ 21.005560] print_report+0x118/0x5f0 [ 21.005603] kasan_report+0xdc/0x128 [ 21.005644] __asan_report_store1_noabort+0x20/0x30 [ 21.005693] krealloc_less_oob_helper+0xa54/0xbc8 [ 21.005744] krealloc_large_less_oob+0x20/0x38 [ 21.005793] kunit_try_run_case+0x170/0x3f0 [ 21.005838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.005890] kthread+0x24c/0x2d0 [ 21.005933] ret_from_fork+0x10/0x20 [ 21.006009] [ 21.014081] The buggy address belongs to the physical page: [ 21.014702] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106964 [ 21.016032] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.016928] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.017747] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.018582] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.019751] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.020458] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.021321] head: 0bfffe0000000002 ffffc1ffc31a5901 ffffffffffffffff 0000000000000000 [ 21.022087] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 21.022820] page dumped because: kasan: bad access detected [ 21.023506] [ 21.023782] Memory state around the buggy address: [ 21.024439] fff00000c6965f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.025145] fff00000c6966000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.025891] >fff00000c6966080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 21.026595] ^ [ 21.027257] fff00000c6966100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.027939] fff00000c6966180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.029735] ================================================================== [ 21.061080] ================================================================== [ 21.061695] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa3c/0xbc8 [ 21.062372] Write of size 1 at addr fff00000c69660eb by task kunit_try_catch/150 [ 21.063045] [ 21.063392] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.063596] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.063672] Hardware name: linux,dummy-virt (DT) [ 21.063755] Call trace: [ 21.063819] dump_backtrace+0x9c/0x128 [ 21.063931] show_stack+0x20/0x38 [ 21.064056] dump_stack_lvl+0x8c/0xd0 [ 21.064163] print_report+0x118/0x5f0 [ 21.064267] kasan_report+0xdc/0x128 [ 21.064372] __asan_report_store1_noabort+0x20/0x30 [ 21.064489] krealloc_less_oob_helper+0xa3c/0xbc8 [ 21.064608] krealloc_large_less_oob+0x20/0x38 [ 21.064777] kunit_try_run_case+0x170/0x3f0 [ 21.064885] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.065016] kthread+0x24c/0x2d0 [ 21.065069] ret_from_fork+0x10/0x20 [ 21.065116] [ 21.074138] The buggy address belongs to the physical page: [ 21.074837] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106964 [ 21.075750] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.077294] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.078072] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.078914] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.079757] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.080590] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.081411] head: 0bfffe0000000002 ffffc1ffc31a5901 ffffffffffffffff 0000000000000000 [ 21.082192] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 21.082922] page dumped because: kasan: bad access detected [ 21.083524] [ 21.083839] Memory state around the buggy address: [ 21.084471] fff00000c6965f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.085319] fff00000c6966000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.086151] >fff00000c6966080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 21.086867] ^ [ 21.087608] fff00000c6966100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.088344] fff00000c6966180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.089091] ================================================================== [ 20.694264] ================================================================== [ 20.695054] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb20/0xbc8 [ 20.696039] Write of size 1 at addr fff00000c1e2d8d0 by task kunit_try_catch/146 [ 20.697124] [ 20.697522] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 20.697817] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.697892] Hardware name: linux,dummy-virt (DT) [ 20.697996] Call trace: [ 20.698054] dump_backtrace+0x9c/0x128 [ 20.698157] show_stack+0x20/0x38 [ 20.698246] dump_stack_lvl+0x8c/0xd0 [ 20.698332] print_report+0x118/0x5f0 [ 20.698415] kasan_report+0xdc/0x128 [ 20.698507] __asan_report_store1_noabort+0x20/0x30 [ 20.698618] krealloc_less_oob_helper+0xb20/0xbc8 [ 20.698740] krealloc_less_oob+0x20/0x38 [ 20.698938] kunit_try_run_case+0x170/0x3f0 [ 20.699066] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.699271] kthread+0x24c/0x2d0 [ 20.699405] ret_from_fork+0x10/0x20 [ 20.699628] [ 20.707357] Allocated by task 146: [ 20.707941] kasan_save_stack+0x3c/0x68 [ 20.708562] kasan_save_track+0x20/0x40 [ 20.709080] kasan_save_alloc_info+0x40/0x58 [ 20.709808] __kasan_krealloc+0x118/0x178 [ 20.710477] krealloc_noprof+0x10c/0x1a0 [ 20.710908] krealloc_less_oob_helper+0x170/0xbc8 [ 20.711904] krealloc_less_oob+0x20/0x38 [ 20.712654] kunit_try_run_case+0x170/0x3f0 [ 20.713405] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.714149] kthread+0x24c/0x2d0 [ 20.714707] ret_from_fork+0x10/0x20 [ 20.715349] [ 20.715609] The buggy address belongs to the object at fff00000c1e2d800 [ 20.715609] which belongs to the cache kmalloc-256 of size 256 [ 20.717136] The buggy address is located 7 bytes to the right of [ 20.717136] allocated 201-byte region [fff00000c1e2d800, fff00000c1e2d8c9) [ 20.718542] [ 20.718917] The buggy address belongs to the physical page: [ 20.719518] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e2c [ 20.720200] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.721095] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.721842] page_type: f5(slab) [ 20.722422] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 20.723199] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.724038] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 20.724857] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.725669] head: 0bfffe0000000001 ffffc1ffc3078b01 ffffffffffffffff 0000000000000000 [ 20.726529] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 20.727305] page dumped because: kasan: bad access detected [ 20.727935] [ 20.728279] Memory state around the buggy address: [ 20.728901] fff00000c1e2d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.729656] fff00000c1e2d800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.730450] >fff00000c1e2d880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 20.731194] ^ [ 20.731852] fff00000c1e2d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.732630] fff00000c1e2d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.733407] ================================================================== [ 20.942075] ================================================================== [ 20.943130] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa2c/0xbc8 [ 20.944909] Write of size 1 at addr fff00000c69660c9 by task kunit_try_catch/150 [ 20.945640] [ 20.945979] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 20.946167] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.946231] Hardware name: linux,dummy-virt (DT) [ 20.946319] Call trace: [ 20.946387] dump_backtrace+0x9c/0x128 [ 20.946504] show_stack+0x20/0x38 [ 20.946611] dump_stack_lvl+0x8c/0xd0 [ 20.946773] print_report+0x118/0x5f0 [ 20.946887] kasan_report+0xdc/0x128 [ 20.947012] __asan_report_store1_noabort+0x20/0x30 [ 20.947132] krealloc_less_oob_helper+0xa2c/0xbc8 [ 20.947205] krealloc_large_less_oob+0x20/0x38 [ 20.947256] kunit_try_run_case+0x170/0x3f0 [ 20.947302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.947354] kthread+0x24c/0x2d0 [ 20.947453] ret_from_fork+0x10/0x20 [ 20.947560] [ 20.955224] The buggy address belongs to the physical page: [ 20.956270] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106964 [ 20.957511] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.958225] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.959035] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.959993] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.960907] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.961726] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.962565] head: 0bfffe0000000002 ffffc1ffc31a5901 ffffffffffffffff 0000000000000000 [ 20.963431] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 20.964250] page dumped because: kasan: bad access detected [ 20.964705] [ 20.964951] Memory state around the buggy address: [ 20.965482] fff00000c6965f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.966343] fff00000c6966000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.967056] >fff00000c6966080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 20.968077] ^ [ 20.968951] fff00000c6966100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.969804] fff00000c6966180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.970926] ================================================================== [ 20.736205] ================================================================== [ 20.736871] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa54/0xbc8 [ 20.737733] Write of size 1 at addr fff00000c1e2d8da by task kunit_try_catch/146 [ 20.738473] [ 20.738808] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 20.739059] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.739154] Hardware name: linux,dummy-virt (DT) [ 20.739270] Call trace: [ 20.739325] dump_backtrace+0x9c/0x128 [ 20.739468] show_stack+0x20/0x38 [ 20.739578] dump_stack_lvl+0x8c/0xd0 [ 20.739682] print_report+0x118/0x5f0 [ 20.739782] kasan_report+0xdc/0x128 [ 20.739889] __asan_report_store1_noabort+0x20/0x30 [ 20.740063] krealloc_less_oob_helper+0xa54/0xbc8 [ 20.740187] krealloc_less_oob+0x20/0x38 [ 20.740324] kunit_try_run_case+0x170/0x3f0 [ 20.740465] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.740541] kthread+0x24c/0x2d0 [ 20.740589] ret_from_fork+0x10/0x20 [ 20.740637] [ 20.748185] Allocated by task 146: [ 20.748687] kasan_save_stack+0x3c/0x68 [ 20.749296] kasan_save_track+0x20/0x40 [ 20.749843] kasan_save_alloc_info+0x40/0x58 [ 20.750472] __kasan_krealloc+0x118/0x178 [ 20.751072] krealloc_noprof+0x10c/0x1a0 [ 20.751901] krealloc_less_oob_helper+0x170/0xbc8 [ 20.752613] krealloc_less_oob+0x20/0x38 [ 20.753233] kunit_try_run_case+0x170/0x3f0 [ 20.753785] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.754494] kthread+0x24c/0x2d0 [ 20.755077] ret_from_fork+0x10/0x20 [ 20.755991] [ 20.756364] The buggy address belongs to the object at fff00000c1e2d800 [ 20.756364] which belongs to the cache kmalloc-256 of size 256 [ 20.758465] The buggy address is located 17 bytes to the right of [ 20.758465] allocated 201-byte region [fff00000c1e2d800, fff00000c1e2d8c9) [ 20.760048] [ 20.760389] The buggy address belongs to the physical page: [ 20.761058] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e2c [ 20.761925] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.762815] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.763581] page_type: f5(slab) [ 20.764081] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 20.764932] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.765778] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 20.766633] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.767473] head: 0bfffe0000000001 ffffc1ffc3078b01 ffffffffffffffff 0000000000000000 [ 20.768319] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 20.769123] page dumped because: kasan: bad access detected [ 20.769743] [ 20.770107] Memory state around the buggy address: [ 20.770729] fff00000c1e2d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.771488] fff00000c1e2d800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.772290] >fff00000c1e2d880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 20.773073] ^ [ 20.773749] fff00000c1e2d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.774523] fff00000c1e2d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.775337] ================================================================== [ 20.822259] ================================================================== [ 20.823015] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa3c/0xbc8 [ 20.824281] Write of size 1 at addr fff00000c1e2d8eb by task kunit_try_catch/146 [ 20.825088] [ 20.825430] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 20.825637] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.825714] Hardware name: linux,dummy-virt (DT) [ 20.825799] Call trace: [ 20.825849] dump_backtrace+0x9c/0x128 [ 20.825902] show_stack+0x20/0x38 [ 20.825944] dump_stack_lvl+0x8c/0xd0 [ 20.826063] print_report+0x118/0x5f0 [ 20.826172] kasan_report+0xdc/0x128 [ 20.826284] __asan_report_store1_noabort+0x20/0x30 [ 20.826411] krealloc_less_oob_helper+0xa3c/0xbc8 [ 20.826534] krealloc_less_oob+0x20/0x38 [ 20.826653] kunit_try_run_case+0x170/0x3f0 [ 20.826769] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.826833] kthread+0x24c/0x2d0 [ 20.826876] ret_from_fork+0x10/0x20 [ 20.826923] [ 20.834765] Allocated by task 146: [ 20.835273] kasan_save_stack+0x3c/0x68 [ 20.835709] kasan_save_track+0x20/0x40 [ 20.836403] kasan_save_alloc_info+0x40/0x58 [ 20.836990] __kasan_krealloc+0x118/0x178 [ 20.837528] krealloc_noprof+0x10c/0x1a0 [ 20.838626] krealloc_less_oob_helper+0x170/0xbc8 [ 20.839392] krealloc_less_oob+0x20/0x38 [ 20.840304] kunit_try_run_case+0x170/0x3f0 [ 20.840717] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.841460] kthread+0x24c/0x2d0 [ 20.841941] ret_from_fork+0x10/0x20 [ 20.842480] [ 20.842787] The buggy address belongs to the object at fff00000c1e2d800 [ 20.842787] which belongs to the cache kmalloc-256 of size 256 [ 20.844212] The buggy address is located 34 bytes to the right of [ 20.844212] allocated 201-byte region [fff00000c1e2d800, fff00000c1e2d8c9) [ 20.845851] [ 20.846186] The buggy address belongs to the physical page: [ 20.846739] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e2c [ 20.847905] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.848672] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.849387] page_type: f5(slab) [ 20.849868] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 20.850723] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.851566] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 20.852547] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.853366] head: 0bfffe0000000001 ffffc1ffc3078b01 ffffffffffffffff 0000000000000000 [ 20.854147] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 20.854850] page dumped because: kasan: bad access detected [ 20.855489] [ 20.855793] Memory state around the buggy address: [ 20.856427] fff00000c1e2d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.857800] fff00000c1e2d800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.858694] >fff00000c1e2d880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 20.859340] ^ [ 20.860107] fff00000c1e2d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.860912] fff00000c1e2d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.861783] ================================================================== [ 21.030657] ================================================================== [ 21.031742] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa98/0xbc8 [ 21.032907] Write of size 1 at addr fff00000c69660ea by task kunit_try_catch/150 [ 21.033682] [ 21.034012] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 21.034178] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.034214] Hardware name: linux,dummy-virt (DT) [ 21.034251] Call trace: [ 21.034291] dump_backtrace+0x9c/0x128 [ 21.034453] show_stack+0x20/0x38 [ 21.034562] dump_stack_lvl+0x8c/0xd0 [ 21.034670] print_report+0x118/0x5f0 [ 21.034776] kasan_report+0xdc/0x128 [ 21.034881] __asan_report_store1_noabort+0x20/0x30 [ 21.035016] krealloc_less_oob_helper+0xa98/0xbc8 [ 21.035076] krealloc_large_less_oob+0x20/0x38 [ 21.035129] kunit_try_run_case+0x170/0x3f0 [ 21.035176] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.035228] kthread+0x24c/0x2d0 [ 21.035275] ret_from_fork+0x10/0x20 [ 21.035322] [ 21.043067] The buggy address belongs to the physical page: [ 21.043592] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106964 [ 21.044754] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.046245] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 21.047714] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.048760] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.049625] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 21.050317] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.051084] head: 0bfffe0000000002 ffffc1ffc31a5901 ffffffffffffffff 0000000000000000 [ 21.052048] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 21.053198] page dumped because: kasan: bad access detected [ 21.053741] [ 21.053950] Memory state around the buggy address: [ 21.054647] fff00000c6965f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.055467] fff00000c6966000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.056271] >fff00000c6966080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 21.057486] ^ [ 21.058325] fff00000c6966100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.059176] fff00000c6966180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 21.060103] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 20.551104] ================================================================== [ 20.552143] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x628/0x690 [ 20.552792] Write of size 1 at addr fff00000c1e2d6eb by task kunit_try_catch/144 [ 20.554151] [ 20.554619] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 20.554870] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.554949] Hardware name: linux,dummy-virt (DT) [ 20.555036] Call trace: [ 20.555067] dump_backtrace+0x9c/0x128 [ 20.555123] show_stack+0x20/0x38 [ 20.555167] dump_stack_lvl+0x8c/0xd0 [ 20.555212] print_report+0x118/0x5f0 [ 20.555254] kasan_report+0xdc/0x128 [ 20.555296] __asan_report_store1_noabort+0x20/0x30 [ 20.555345] krealloc_more_oob_helper+0x628/0x690 [ 20.555450] krealloc_more_oob+0x20/0x38 [ 20.555558] kunit_try_run_case+0x170/0x3f0 [ 20.555663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.555746] kthread+0x24c/0x2d0 [ 20.555795] ret_from_fork+0x10/0x20 [ 20.555842] [ 20.563622] Allocated by task 144: [ 20.564044] kasan_save_stack+0x3c/0x68 [ 20.564745] kasan_save_track+0x20/0x40 [ 20.565403] kasan_save_alloc_info+0x40/0x58 [ 20.566013] __kasan_krealloc+0x118/0x178 [ 20.566856] krealloc_noprof+0x10c/0x1a0 [ 20.567737] krealloc_more_oob_helper+0x170/0x690 [ 20.569041] krealloc_more_oob+0x20/0x38 [ 20.569776] kunit_try_run_case+0x170/0x3f0 [ 20.570333] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.571055] kthread+0x24c/0x2d0 [ 20.571553] ret_from_fork+0x10/0x20 [ 20.572021] [ 20.572372] The buggy address belongs to the object at fff00000c1e2d600 [ 20.572372] which belongs to the cache kmalloc-256 of size 256 [ 20.573583] The buggy address is located 0 bytes to the right of [ 20.573583] allocated 235-byte region [fff00000c1e2d600, fff00000c1e2d6eb) [ 20.574809] [ 20.575183] The buggy address belongs to the physical page: [ 20.575887] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e2c [ 20.577301] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.578278] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.579054] page_type: f5(slab) [ 20.579468] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 20.580633] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.581538] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 20.582461] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.583407] head: 0bfffe0000000001 ffffc1ffc3078b01 ffffffffffffffff 0000000000000000 [ 20.584422] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 20.585375] page dumped because: kasan: bad access detected [ 20.586009] [ 20.586296] Memory state around the buggy address: [ 20.586837] fff00000c1e2d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.587872] fff00000c1e2d600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.588875] >fff00000c1e2d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 20.589927] ^ [ 20.590576] fff00000c1e2d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.591511] fff00000c1e2d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.592340] ================================================================== [ 20.901491] ================================================================== [ 20.902849] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5dc/0x690 [ 20.904635] Write of size 1 at addr fff00000c68ee0f0 by task kunit_try_catch/148 [ 20.905777] [ 20.906127] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 20.906331] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.906405] Hardware name: linux,dummy-virt (DT) [ 20.906496] Call trace: [ 20.906560] dump_backtrace+0x9c/0x128 [ 20.906671] show_stack+0x20/0x38 [ 20.906774] dump_stack_lvl+0x8c/0xd0 [ 20.906865] print_report+0x118/0x5f0 [ 20.906911] kasan_report+0xdc/0x128 [ 20.906954] __asan_report_store1_noabort+0x20/0x30 [ 20.907039] krealloc_more_oob_helper+0x5dc/0x690 [ 20.907094] krealloc_large_more_oob+0x20/0x38 [ 20.907146] kunit_try_run_case+0x170/0x3f0 [ 20.907194] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.907248] kthread+0x24c/0x2d0 [ 20.907291] ret_from_fork+0x10/0x20 [ 20.907339] [ 20.914275] The buggy address belongs to the physical page: [ 20.915050] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068ec [ 20.915890] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.916685] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.917506] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.918328] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.919091] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.919889] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.920726] head: 0bfffe0000000002 ffffc1ffc31a3b01 ffffffffffffffff 0000000000000000 [ 20.921553] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 20.922393] page dumped because: kasan: bad access detected [ 20.922819] [ 20.924362] Memory state around the buggy address: [ 20.925597] fff00000c68edf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.927655] fff00000c68ee000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.928956] >fff00000c68ee080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 20.931039] ^ [ 20.932215] fff00000c68ee100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.932736] fff00000c68ee180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.934313] ================================================================== [ 20.594176] ================================================================== [ 20.595436] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5dc/0x690 [ 20.596526] Write of size 1 at addr fff00000c1e2d6f0 by task kunit_try_catch/144 [ 20.597091] [ 20.597365] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 20.597465] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.597497] Hardware name: linux,dummy-virt (DT) [ 20.597534] Call trace: [ 20.597560] dump_backtrace+0x9c/0x128 [ 20.597614] show_stack+0x20/0x38 [ 20.597656] dump_stack_lvl+0x8c/0xd0 [ 20.597702] print_report+0x118/0x5f0 [ 20.597747] kasan_report+0xdc/0x128 [ 20.597794] __asan_report_store1_noabort+0x20/0x30 [ 20.597847] krealloc_more_oob_helper+0x5dc/0x690 [ 20.597901] krealloc_more_oob+0x20/0x38 [ 20.597951] kunit_try_run_case+0x170/0x3f0 [ 20.598098] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.598310] kthread+0x24c/0x2d0 [ 20.598477] ret_from_fork+0x10/0x20 [ 20.598626] [ 20.606235] Allocated by task 144: [ 20.606730] kasan_save_stack+0x3c/0x68 [ 20.608270] kasan_save_track+0x20/0x40 [ 20.608827] kasan_save_alloc_info+0x40/0x58 [ 20.609453] __kasan_krealloc+0x118/0x178 [ 20.610075] krealloc_noprof+0x10c/0x1a0 [ 20.610719] krealloc_more_oob_helper+0x170/0x690 [ 20.611348] krealloc_more_oob+0x20/0x38 [ 20.612289] kunit_try_run_case+0x170/0x3f0 [ 20.612877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.613542] kthread+0x24c/0x2d0 [ 20.614038] ret_from_fork+0x10/0x20 [ 20.614546] [ 20.614876] The buggy address belongs to the object at fff00000c1e2d600 [ 20.614876] which belongs to the cache kmalloc-256 of size 256 [ 20.616265] The buggy address is located 5 bytes to the right of [ 20.616265] allocated 235-byte region [fff00000c1e2d600, fff00000c1e2d6eb) [ 20.617461] [ 20.617746] The buggy address belongs to the physical page: [ 20.619344] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e2c [ 20.620453] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.621265] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.622030] page_type: f5(slab) [ 20.622512] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 20.623306] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.624739] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 20.625654] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.626483] head: 0bfffe0000000001 ffffc1ffc3078b01 ffffffffffffffff 0000000000000000 [ 20.627285] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 20.628335] page dumped because: kasan: bad access detected [ 20.628945] [ 20.629467] Memory state around the buggy address: [ 20.629914] fff00000c1e2d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.630772] fff00000c1e2d600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.632227] >fff00000c1e2d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 20.633055] ^ [ 20.634001] fff00000c1e2d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.634751] fff00000c1e2d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.635809] ================================================================== [ 20.870281] ================================================================== [ 20.871299] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x628/0x690 [ 20.872501] Write of size 1 at addr fff00000c68ee0eb by task kunit_try_catch/148 [ 20.873915] [ 20.874387] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 20.874600] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.874694] Hardware name: linux,dummy-virt (DT) [ 20.874809] Call trace: [ 20.874878] dump_backtrace+0x9c/0x128 [ 20.875008] show_stack+0x20/0x38 [ 20.875070] dump_stack_lvl+0x8c/0xd0 [ 20.875123] print_report+0x118/0x5f0 [ 20.875166] kasan_report+0xdc/0x128 [ 20.875209] __asan_report_store1_noabort+0x20/0x30 [ 20.875259] krealloc_more_oob_helper+0x628/0x690 [ 20.875310] krealloc_large_more_oob+0x20/0x38 [ 20.875365] kunit_try_run_case+0x170/0x3f0 [ 20.875499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.875617] kthread+0x24c/0x2d0 [ 20.875711] ret_from_fork+0x10/0x20 [ 20.875768] [ 20.884459] The buggy address belongs to the physical page: [ 20.885371] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068ec [ 20.886168] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.886921] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.887926] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.889084] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.889886] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.890638] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.891443] head: 0bfffe0000000002 ffffc1ffc31a3b01 ffffffffffffffff 0000000000000000 [ 20.892376] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 20.893121] page dumped because: kasan: bad access detected [ 20.893674] [ 20.893991] Memory state around the buggy address: [ 20.894525] fff00000c68edf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.895306] fff00000c68ee000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.896662] >fff00000c68ee080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 20.897617] ^ [ 20.898160] fff00000c68ee100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.898921] fff00000c68ee180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.900217] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 20.519082] ================================================================== [ 20.520738] BUG: KASAN: use-after-free in page_alloc_uaf+0x33c/0x368 [ 20.521271] Read of size 1 at addr fff00000c69d0000 by task kunit_try_catch/142 [ 20.522033] [ 20.522415] CPU: 0 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 20.522634] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.522712] Hardware name: linux,dummy-virt (DT) [ 20.522800] Call trace: [ 20.522869] dump_backtrace+0x9c/0x128 [ 20.523010] show_stack+0x20/0x38 [ 20.523119] dump_stack_lvl+0x8c/0xd0 [ 20.523209] print_report+0x118/0x5f0 [ 20.523319] kasan_report+0xdc/0x128 [ 20.523425] __asan_report_load1_noabort+0x20/0x30 [ 20.523770] page_alloc_uaf+0x33c/0x368 [ 20.523899] kunit_try_run_case+0x170/0x3f0 [ 20.524033] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.524117] kthread+0x24c/0x2d0 [ 20.524167] ret_from_fork+0x10/0x20 [ 20.524216] [ 20.530953] The buggy address belongs to the physical page: [ 20.532430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069d0 [ 20.533299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.534069] page_type: f0(buddy) [ 20.534738] raw: 0bfffe0000000000 fff00000ff6162e0 fff00000ff6162e0 0000000000000000 [ 20.535874] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000 [ 20.536652] page dumped because: kasan: bad access detected [ 20.537254] [ 20.537560] Memory state around the buggy address: [ 20.538117] fff00000c69cff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.538874] fff00000c69cff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.539632] >fff00000c69d0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.540829] ^ [ 20.541162] fff00000c69d0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.541939] fff00000c69d0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.542946] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[ 20.473916] ================================================================== [ 20.475046] BUG: KASAN: invalid-free in kfree+0x260/0x3b8 [ 20.476056] Free of addr fff00000c695c001 by task kunit_try_catch/138 [ 20.476560] [ 20.476915] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 20.477145] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.477218] Hardware name: linux,dummy-virt (DT) [ 20.477303] Call trace: [ 20.477367] dump_backtrace+0x9c/0x128 [ 20.477483] show_stack+0x20/0x38 [ 20.477585] dump_stack_lvl+0x8c/0xd0 [ 20.477692] print_report+0x118/0x5f0 [ 20.477799] kasan_report_invalid_free+0xc0/0xe8 [ 20.477917] __kasan_kfree_large+0x5c/0xa8 [ 20.478044] free_large_kmalloc+0x58/0x140 [ 20.478164] kfree+0x260/0x3b8 [ 20.478269] kmalloc_large_invalid_free+0x114/0x290 [ 20.478386] kunit_try_run_case+0x170/0x3f0 [ 20.478440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.478494] kthread+0x24c/0x2d0 [ 20.478541] ret_from_fork+0x10/0x20 [ 20.478589] [ 20.488463] The buggy address belongs to the physical page: [ 20.489614] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10695c [ 20.490515] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.491502] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.492711] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.493851] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.494785] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.495823] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.496750] head: 0bfffe0000000002 ffffc1ffc31a5701 ffffffffffffffff 0000000000000000 [ 20.497470] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 20.498177] page dumped because: kasan: bad access detected [ 20.498794] [ 20.499120] Memory state around the buggy address: [ 20.499793] fff00000c695bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.500616] fff00000c695bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.502020] >fff00000c695c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.502845] ^ [ 20.503269] fff00000c695c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.504364] fff00000c695c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.505324] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 20.443927] ================================================================== [ 20.445112] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2d8/0x300 [ 20.445750] Read of size 1 at addr fff00000c68e8000 by task kunit_try_catch/136 [ 20.446440] [ 20.446805] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 20.447034] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.447111] Hardware name: linux,dummy-virt (DT) [ 20.447199] Call trace: [ 20.447264] dump_backtrace+0x9c/0x128 [ 20.447545] show_stack+0x20/0x38 [ 20.447654] dump_stack_lvl+0x8c/0xd0 [ 20.447769] print_report+0x118/0x5f0 [ 20.447863] kasan_report+0xdc/0x128 [ 20.447987] __asan_report_load1_noabort+0x20/0x30 [ 20.448108] kmalloc_large_uaf+0x2d8/0x300 [ 20.448205] kunit_try_run_case+0x170/0x3f0 [ 20.448255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.448307] kthread+0x24c/0x2d0 [ 20.448351] ret_from_fork+0x10/0x20 [ 20.448400] [ 20.454754] The buggy address belongs to the physical page: [ 20.455387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068e8 [ 20.456199] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.457649] raw: 0bfffe0000000000 ffffc1ffc31a3b08 fff00000da522200 0000000000000000 [ 20.458328] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 20.459095] page dumped because: kasan: bad access detected [ 20.459880] [ 20.460182] Memory state around the buggy address: [ 20.460652] fff00000c68e7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.461438] fff00000c68e7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.462115] >fff00000c68e8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.462972] ^ [ 20.463402] fff00000c68e8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.464473] fff00000c68e8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.465225] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 20.406623] ================================================================== [ 20.407711] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x28c/0x2d0 [ 20.408475] Write of size 1 at addr fff00000c695e00a by task kunit_try_catch/134 [ 20.410091] [ 20.410449] CPU: 0 UID: 0 PID: 134 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 20.410654] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.410726] Hardware name: linux,dummy-virt (DT) [ 20.410809] Call trace: [ 20.410873] dump_backtrace+0x9c/0x128 [ 20.411011] show_stack+0x20/0x38 [ 20.411118] dump_stack_lvl+0x8c/0xd0 [ 20.411231] print_report+0x118/0x5f0 [ 20.411340] kasan_report+0xdc/0x128 [ 20.411678] __asan_report_store1_noabort+0x20/0x30 [ 20.411755] kmalloc_large_oob_right+0x28c/0x2d0 [ 20.411806] kunit_try_run_case+0x170/0x3f0 [ 20.411852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.411904] kthread+0x24c/0x2d0 [ 20.411949] ret_from_fork+0x10/0x20 [ 20.412047] [ 20.419229] The buggy address belongs to the physical page: [ 20.420295] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10695c [ 20.421093] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.421871] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.422693] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.424332] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.425089] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.425870] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.426752] head: 0bfffe0000000002 ffffc1ffc31a5701 ffffffffffffffff 0000000000000000 [ 20.427517] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 20.428647] page dumped because: kasan: bad access detected [ 20.429367] [ 20.429659] Memory state around the buggy address: [ 20.430190] fff00000c695df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.430975] fff00000c695df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.431631] >fff00000c695e000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.433179] ^ [ 20.433699] fff00000c695e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.434422] fff00000c695e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.435119] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 20.355429] ================================================================== [ 20.356605] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2b8/0x308 [ 20.357297] Write of size 1 at addr fff00000c69a9f00 by task kunit_try_catch/132 [ 20.357825] [ 20.358212] CPU: 1 UID: 0 PID: 132 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 20.358415] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.358491] Hardware name: linux,dummy-virt (DT) [ 20.358578] Call trace: [ 20.358642] dump_backtrace+0x9c/0x128 [ 20.358758] show_stack+0x20/0x38 [ 20.358858] dump_stack_lvl+0x8c/0xd0 [ 20.358990] print_report+0x118/0x5f0 [ 20.359098] kasan_report+0xdc/0x128 [ 20.359179] __asan_report_store1_noabort+0x20/0x30 [ 20.359232] kmalloc_big_oob_right+0x2b8/0x308 [ 20.359280] kunit_try_run_case+0x170/0x3f0 [ 20.359326] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.359433] kthread+0x24c/0x2d0 [ 20.359539] ret_from_fork+0x10/0x20 [ 20.359632] [ 20.366590] Allocated by task 132: [ 20.367114] kasan_save_stack+0x3c/0x68 [ 20.367573] kasan_save_track+0x20/0x40 [ 20.368152] kasan_save_alloc_info+0x40/0x58 [ 20.368747] __kasan_kmalloc+0xd4/0xd8 [ 20.369523] __kmalloc_cache_noprof+0x154/0x320 [ 20.370153] kmalloc_big_oob_right+0xb8/0x308 [ 20.370689] kunit_try_run_case+0x170/0x3f0 [ 20.371224] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.372749] kthread+0x24c/0x2d0 [ 20.373198] ret_from_fork+0x10/0x20 [ 20.373710] [ 20.374028] The buggy address belongs to the object at fff00000c69a8000 [ 20.374028] which belongs to the cache kmalloc-8k of size 8192 [ 20.375185] The buggy address is located 0 bytes to the right of [ 20.375185] allocated 7936-byte region [fff00000c69a8000, fff00000c69a9f00) [ 20.376655] [ 20.376983] The buggy address belongs to the physical page: [ 20.377569] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069a8 [ 20.378510] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.379332] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.380347] page_type: f5(slab) [ 20.380791] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 20.381623] raw: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000 [ 20.382424] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 20.383205] head: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000 [ 20.384194] head: 0bfffe0000000003 ffffc1ffc31a6a01 ffffffffffffffff 0000000000000000 [ 20.384994] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000 [ 20.385742] page dumped because: kasan: bad access detected [ 20.386332] [ 20.386645] Memory state around the buggy address: [ 20.387144] fff00000c69a9e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.388223] fff00000c69a9e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.388940] >fff00000c69a9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.389632] ^ [ 20.390093] fff00000c69a9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.390811] fff00000c69aa000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.392240] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 20.308490] ================================================================== [ 20.309652] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x310/0x348 [ 20.310365] Read of size 1 at addr fff00000c6903000 by task kunit_try_catch/130 [ 20.311225] [ 20.311939] CPU: 0 UID: 0 PID: 130 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 20.312224] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.312291] Hardware name: linux,dummy-virt (DT) [ 20.312370] Call trace: [ 20.312428] dump_backtrace+0x9c/0x128 [ 20.312543] show_stack+0x20/0x38 [ 20.312649] dump_stack_lvl+0x8c/0xd0 [ 20.312756] print_report+0x118/0x5f0 [ 20.312872] kasan_report+0xdc/0x128 [ 20.312980] __asan_report_load1_noabort+0x20/0x30 [ 20.313050] kmalloc_node_oob_right+0x310/0x348 [ 20.313101] kunit_try_run_case+0x170/0x3f0 [ 20.313147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.313199] kthread+0x24c/0x2d0 [ 20.313246] ret_from_fork+0x10/0x20 [ 20.313293] [ 20.321113] Allocated by task 130: [ 20.321579] kasan_save_stack+0x3c/0x68 [ 20.322045] kasan_save_track+0x20/0x40 [ 20.322591] kasan_save_alloc_info+0x40/0x58 [ 20.323167] __kasan_kmalloc+0xd4/0xd8 [ 20.323704] __kmalloc_cache_node_noprof+0x174/0x348 [ 20.324362] kmalloc_node_oob_right+0xbc/0x348 [ 20.325356] kunit_try_run_case+0x170/0x3f0 [ 20.325883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.326493] kthread+0x24c/0x2d0 [ 20.326991] ret_from_fork+0x10/0x20 [ 20.328000] [ 20.328241] The buggy address belongs to the object at fff00000c6902000 [ 20.328241] which belongs to the cache kmalloc-4k of size 4096 [ 20.329403] The buggy address is located 0 bytes to the right of [ 20.329403] allocated 4096-byte region [fff00000c6902000, fff00000c6903000) [ 20.330532] [ 20.330820] The buggy address belongs to the physical page: [ 20.331576] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106900 [ 20.332634] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.333381] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.334234] page_type: f5(slab) [ 20.334745] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 20.335673] raw: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000 [ 20.336590] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 20.337332] head: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000 [ 20.338347] head: 0bfffe0000000003 ffffc1ffc31a4001 ffffffffffffffff 0000000000000000 [ 20.339139] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000 [ 20.340191] page dumped because: kasan: bad access detected [ 20.340795] [ 20.341135] Memory state around the buggy address: [ 20.341669] fff00000c6902f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.342468] fff00000c6902f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.343279] >fff00000c6903000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.344525] ^ [ 20.344997] fff00000c6903080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.346027] fff00000c6903100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.347265] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 20.260843] ================================================================== [ 20.261873] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x308/0x340 [ 20.262693] Read of size 1 at addr fff00000c662acdf by task kunit_try_catch/128 [ 20.263895] [ 20.264329] CPU: 1 UID: 0 PID: 128 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 20.264584] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.264663] Hardware name: linux,dummy-virt (DT) [ 20.264759] Call trace: [ 20.264820] dump_backtrace+0x9c/0x128 [ 20.264878] show_stack+0x20/0x38 [ 20.264921] dump_stack_lvl+0x8c/0xd0 [ 20.264997] print_report+0x118/0x5f0 [ 20.265046] kasan_report+0xdc/0x128 [ 20.265088] __asan_report_load1_noabort+0x20/0x30 [ 20.265137] kmalloc_oob_left+0x308/0x340 [ 20.265184] kunit_try_run_case+0x170/0x3f0 [ 20.265234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.265286] kthread+0x24c/0x2d0 [ 20.265332] ret_from_fork+0x10/0x20 [ 20.265381] [ 20.272578] Allocated by task 1: [ 20.273075] kasan_save_stack+0x3c/0x68 [ 20.273720] kasan_save_track+0x20/0x40 [ 20.274240] kasan_save_alloc_info+0x40/0x58 [ 20.274835] __kasan_kmalloc+0xd4/0xd8 [ 20.275630] __kmalloc_node_track_caller_noprof+0x194/0x438 [ 20.276384] kvasprintf+0xe0/0x180 [ 20.276937] __kthread_create_on_node+0x16c/0x348 [ 20.277575] kthread_create_on_node+0xe4/0x130 [ 20.278162] create_worker+0x380/0x6b8 [ 20.278771] alloc_unbound_pwq+0x62c/0x778 [ 20.279348] apply_wqattrs_prepare+0x1a0/0x6e0 [ 20.280206] apply_workqueue_attrs_locked+0x58/0xb8 [ 20.280860] alloc_workqueue+0x9ac/0x1440 [ 20.281475] latency_fsnotify_init+0x28/0x60 [ 20.282146] do_one_initcall+0xd0/0x608 [ 20.282708] kernel_init_freeable+0x3e0/0x8a0 [ 20.283629] kernel_init+0x2c/0x1f8 [ 20.284107] ret_from_fork+0x10/0x20 [ 20.284542] [ 20.284830] The buggy address belongs to the object at fff00000c662acc0 [ 20.284830] which belongs to the cache kmalloc-16 of size 16 [ 20.285898] The buggy address is located 18 bytes to the right of [ 20.285898] allocated 13-byte region [fff00000c662acc0, fff00000c662accd) [ 20.286999] [ 20.287342] The buggy address belongs to the physical page: [ 20.287877] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a [ 20.288740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.289513] page_type: f5(slab) [ 20.289975] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.290805] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 20.292185] page dumped because: kasan: bad access detected [ 20.292728] [ 20.293057] Memory state around the buggy address: [ 20.293623] fff00000c662ab80: 00 02 fc fc 00 05 fc fc fa fb fc fc 00 02 fc fc [ 20.294843] fff00000c662ac00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.296020] >fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc 00 07 fc fc [ 20.296730] ^ [ 20.297376] fff00000c662ad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.298097] fff00000c662ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.298829] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 20.216553] ================================================================== [ 20.217391] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x588/0x5f0 [ 20.218275] Read of size 1 at addr fff00000c40eff80 by task kunit_try_catch/126 [ 20.219052] [ 20.219396] CPU: 0 UID: 0 PID: 126 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 20.219654] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.219733] Hardware name: linux,dummy-virt (DT) [ 20.219866] Call trace: [ 20.219936] dump_backtrace+0x9c/0x128 [ 20.220068] show_stack+0x20/0x38 [ 20.220164] dump_stack_lvl+0x8c/0xd0 [ 20.220264] print_report+0x118/0x5f0 [ 20.220363] kasan_report+0xdc/0x128 [ 20.220458] __asan_report_load1_noabort+0x20/0x30 [ 20.220551] kmalloc_oob_right+0x588/0x5f0 [ 20.220640] kunit_try_run_case+0x170/0x3f0 [ 20.220730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.220849] kthread+0x24c/0x2d0 [ 20.220936] ret_from_fork+0x10/0x20 [ 20.221053] [ 20.229938] Allocated by task 126: [ 20.230528] kasan_save_stack+0x3c/0x68 [ 20.231088] kasan_save_track+0x20/0x40 [ 20.231900] kasan_save_alloc_info+0x40/0x58 [ 20.232942] __kasan_kmalloc+0xd4/0xd8 [ 20.233800] __kmalloc_cache_noprof+0x154/0x320 [ 20.234426] kmalloc_oob_right+0xb8/0x5f0 [ 20.235050] kunit_try_run_case+0x170/0x3f0 [ 20.236157] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.236805] kthread+0x24c/0x2d0 [ 20.237248] ret_from_fork+0x10/0x20 [ 20.237691] [ 20.238397] The buggy address belongs to the object at fff00000c40eff00 [ 20.238397] which belongs to the cache kmalloc-128 of size 128 [ 20.239642] The buggy address is located 13 bytes to the right of [ 20.239642] allocated 115-byte region [fff00000c40eff00, fff00000c40eff73) [ 20.241317] [ 20.241644] The buggy address belongs to the physical page: [ 20.242487] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1040ef [ 20.243230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.243894] page_type: f5(slab) [ 20.244355] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.245465] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.246358] page dumped because: kasan: bad access detected [ 20.246914] [ 20.247253] Memory state around the buggy address: [ 20.247955] fff00000c40efe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.248679] fff00000c40eff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.249441] >fff00000c40eff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.250573] ^ [ 20.251212] fff00000c40f0000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.252299] fff00000c40f0080: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.252866] ================================================================== [ 20.178821] ================================================================== [ 20.179418] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x528/0x5f0 [ 20.180231] Write of size 1 at addr fff00000c40eff78 by task kunit_try_catch/126 [ 20.181067] [ 20.181400] CPU: 0 UID: 0 PID: 126 Comm: kunit_try_catch Tainted: G B N 6.12.33-rc1 #1 [ 20.181615] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.181693] Hardware name: linux,dummy-virt (DT) [ 20.181782] Call trace: [ 20.181847] dump_backtrace+0x9c/0x128 [ 20.182139] show_stack+0x20/0x38 [ 20.182253] dump_stack_lvl+0x8c/0xd0 [ 20.182369] print_report+0x118/0x5f0 [ 20.182479] kasan_report+0xdc/0x128 [ 20.182585] __asan_report_store1_noabort+0x20/0x30 [ 20.182711] kmalloc_oob_right+0x528/0x5f0 [ 20.182826] kunit_try_run_case+0x170/0x3f0 [ 20.182885] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.182941] kthread+0x24c/0x2d0 [ 20.183017] ret_from_fork+0x10/0x20 [ 20.183068] [ 20.193163] Allocated by task 126: [ 20.193678] kasan_save_stack+0x3c/0x68 [ 20.194242] kasan_save_track+0x20/0x40 [ 20.194869] kasan_save_alloc_info+0x40/0x58 [ 20.195637] __kasan_kmalloc+0xd4/0xd8 [ 20.196140] __kmalloc_cache_noprof+0x154/0x320 [ 20.196710] kmalloc_oob_right+0xb8/0x5f0 [ 20.197271] kunit_try_run_case+0x170/0x3f0 [ 20.197793] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.198453] kthread+0x24c/0x2d0 [ 20.198922] ret_from_fork+0x10/0x20 [ 20.200224] [ 20.200483] The buggy address belongs to the object at fff00000c40eff00 [ 20.200483] which belongs to the cache kmalloc-128 of size 128 [ 20.201545] The buggy address is located 5 bytes to the right of [ 20.201545] allocated 115-byte region [fff00000c40eff00, fff00000c40eff73) [ 20.202845] [ 20.203170] The buggy address belongs to the physical page: [ 20.204081] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1040ef [ 20.204914] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.205727] page_type: f5(slab) [ 20.206217] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.207011] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.208055] page dumped because: kasan: bad access detected [ 20.208712] [ 20.209039] Memory state around the buggy address: [ 20.209499] fff00000c40efe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 20.210741] fff00000c40efe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.211576] >fff00000c40eff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.212393] ^ [ 20.212996] fff00000c40eff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.213782] fff00000c40f0000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.214488] ================================================================== [ 20.128681] ================================================================== [ 20.130740] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x56c/0x5f0 [ 20.136356] Write of size 1 at addr fff00000c40eff73 by task kunit_try_catch/126 [ 20.137937] [ 20.140420] CPU: 0 UID: 0 PID: 126 Comm: kunit_try_catch Tainted: G N 6.12.33-rc1 #1 [ 20.141341] Tainted: [N]=TEST [ 20.141393] Hardware name: linux,dummy-virt (DT) [ 20.141692] Call trace: [ 20.141742] dump_backtrace+0x9c/0x128 [ 20.141835] show_stack+0x20/0x38 [ 20.141883] dump_stack_lvl+0x8c/0xd0 [ 20.141938] print_report+0x118/0x5f0 [ 20.142019] kasan_report+0xdc/0x128 [ 20.142066] __asan_report_store1_noabort+0x20/0x30 [ 20.142117] kmalloc_oob_right+0x56c/0x5f0 [ 20.142165] kunit_try_run_case+0x170/0x3f0 [ 20.142216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.142268] kthread+0x24c/0x2d0 [ 20.142315] ret_from_fork+0x10/0x20 [ 20.142462] [ 20.150748] Allocated by task 126: [ 20.151629] kasan_save_stack+0x3c/0x68 [ 20.152224] kasan_save_track+0x20/0x40 [ 20.152671] kasan_save_alloc_info+0x40/0x58 [ 20.153257] __kasan_kmalloc+0xd4/0xd8 [ 20.153777] __kmalloc_cache_noprof+0x154/0x320 [ 20.154836] kmalloc_oob_right+0xb8/0x5f0 [ 20.155571] kunit_try_run_case+0x170/0x3f0 [ 20.156250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.156870] kthread+0x24c/0x2d0 [ 20.157451] ret_from_fork+0x10/0x20 [ 20.158072] [ 20.158394] The buggy address belongs to the object at fff00000c40eff00 [ 20.158394] which belongs to the cache kmalloc-128 of size 128 [ 20.160303] The buggy address is located 0 bytes to the right of [ 20.160303] allocated 115-byte region [fff00000c40eff00, fff00000c40eff73) [ 20.161447] [ 20.161942] The buggy address belongs to the physical page: [ 20.162875] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1040ef [ 20.164284] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.165375] page_type: f5(slab) [ 20.166353] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.167075] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.168120] page dumped because: kasan: bad access detected [ 20.169011] [ 20.169406] Memory state around the buggy address: [ 20.170212] fff00000c40efe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 20.170933] fff00000c40efe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.172023] >fff00000c40eff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.172691] ^ [ 20.173322] fff00000c40eff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.174096] fff00000c40f0000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.174884] ==================================================================