Date
May 12, 2025, 6:12 p.m.
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 20.401893] ================================================================== [ 20.402673] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 20.403201] Read of size 1 at addr fff00000c59c2d00 by task kunit_try_catch/216 [ 20.403708] [ 20.403895] CPU: 1 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 20.403998] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.404032] Hardware name: linux,dummy-virt (DT) [ 20.404069] Call trace: [ 20.404100] show_stack+0x20/0x38 (C) [ 20.404158] dump_stack_lvl+0x8c/0xd0 [ 20.404216] print_report+0x118/0x608 [ 20.404269] kasan_report+0xdc/0x128 [ 20.404321] __asan_report_load1_noabort+0x20/0x30 [ 20.404373] mempool_uaf_helper+0x314/0x340 [ 20.404425] mempool_kmalloc_uaf+0xc4/0x120 [ 20.404477] kunit_try_run_case+0x170/0x3f0 [ 20.404530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.404588] kthread+0x318/0x620 [ 20.404638] ret_from_fork+0x10/0x20 [ 20.404694] [ 20.409868] Allocated by task 216: [ 20.410410] kasan_save_stack+0x3c/0x68 [ 20.410962] kasan_save_track+0x20/0x40 [ 20.411334] kasan_save_alloc_info+0x40/0x58 [ 20.411678] __kasan_mempool_unpoison_object+0x11c/0x180 [ 20.412085] remove_element+0x130/0x1f8 [ 20.412485] mempool_alloc_preallocated+0x58/0xc0 [ 20.412868] mempool_uaf_helper+0xa4/0x340 [ 20.413125] mempool_kmalloc_uaf+0xc4/0x120 [ 20.413371] kunit_try_run_case+0x170/0x3f0 [ 20.413618] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.413898] kthread+0x318/0x620 [ 20.414131] ret_from_fork+0x10/0x20 [ 20.414365] [ 20.414511] Freed by task 216: [ 20.414712] kasan_save_stack+0x3c/0x68 [ 20.415439] kasan_save_track+0x20/0x40 [ 20.415753] kasan_save_free_info+0x4c/0x78 [ 20.416020] __kasan_mempool_poison_object+0xc0/0x150 [ 20.416256] mempool_free+0x28c/0x328 [ 20.416616] mempool_uaf_helper+0x104/0x340 [ 20.416980] mempool_kmalloc_uaf+0xc4/0x120 [ 20.417308] kunit_try_run_case+0x170/0x3f0 [ 20.417658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.418087] kthread+0x318/0x620 [ 20.418391] ret_from_fork+0x10/0x20 [ 20.418705] [ 20.418929] The buggy address belongs to the object at fff00000c59c2d00 [ 20.418929] which belongs to the cache kmalloc-128 of size 128 [ 20.419704] The buggy address is located 0 bytes inside of [ 20.419704] freed 128-byte region [fff00000c59c2d00, fff00000c59c2d80) [ 20.420451] [ 20.420645] The buggy address belongs to the physical page: [ 20.421045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c2 [ 20.421589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.422088] page_type: f5(slab) [ 20.422377] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.422809] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.423242] page dumped because: kasan: bad access detected [ 20.423496] [ 20.423681] Memory state around the buggy address: [ 20.424247] fff00000c59c2c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.424754] fff00000c59c2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.425226] >fff00000c59c2d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.425688] ^ [ 20.425952] fff00000c59c2d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.426412] fff00000c59c2e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.426907] ================================================================== [ 20.459123] ================================================================== [ 20.459623] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 20.460333] Read of size 1 at addr fff00000c6589240 by task kunit_try_catch/220 [ 20.460851] [ 20.461065] CPU: 1 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 20.461168] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.461202] Hardware name: linux,dummy-virt (DT) [ 20.461239] Call trace: [ 20.461268] show_stack+0x20/0x38 (C) [ 20.461334] dump_stack_lvl+0x8c/0xd0 [ 20.461392] print_report+0x118/0x608 [ 20.461448] kasan_report+0xdc/0x128 [ 20.461498] __asan_report_load1_noabort+0x20/0x30 [ 20.461548] mempool_uaf_helper+0x314/0x340 [ 20.461599] mempool_slab_uaf+0xc0/0x118 [ 20.461648] kunit_try_run_case+0x170/0x3f0 [ 20.461704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.461844] kthread+0x318/0x620 [ 20.461916] ret_from_fork+0x10/0x20 [ 20.461979] [ 20.465829] Allocated by task 220: [ 20.466125] kasan_save_stack+0x3c/0x68 [ 20.466478] kasan_save_track+0x20/0x40 [ 20.466830] kasan_save_alloc_info+0x40/0x58 [ 20.467018] __kasan_mempool_unpoison_object+0xbc/0x180 [ 20.467207] remove_element+0x16c/0x1f8 [ 20.467543] mempool_alloc_preallocated+0x58/0xc0 [ 20.468116] mempool_uaf_helper+0xa4/0x340 [ 20.468488] mempool_slab_uaf+0xc0/0x118 [ 20.468721] kunit_try_run_case+0x170/0x3f0 [ 20.469070] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.469437] kthread+0x318/0x620 [ 20.469675] ret_from_fork+0x10/0x20 [ 20.469938] [ 20.470106] Freed by task 220: [ 20.470393] kasan_save_stack+0x3c/0x68 [ 20.470849] kasan_save_track+0x20/0x40 [ 20.471134] kasan_save_free_info+0x4c/0x78 [ 20.471311] __kasan_mempool_poison_object+0xc0/0x150 [ 20.471701] mempool_free+0x28c/0x328 [ 20.471936] mempool_uaf_helper+0x104/0x340 [ 20.472315] mempool_slab_uaf+0xc0/0x118 [ 20.472541] kunit_try_run_case+0x170/0x3f0 [ 20.472872] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.473182] kthread+0x318/0x620 [ 20.473496] ret_from_fork+0x10/0x20 [ 20.473676] [ 20.473883] The buggy address belongs to the object at fff00000c6589240 [ 20.473883] which belongs to the cache test_cache of size 123 [ 20.474868] The buggy address is located 0 bytes inside of [ 20.474868] freed 123-byte region [fff00000c6589240, fff00000c65892bb) [ 20.475275] [ 20.475384] The buggy address belongs to the physical page: [ 20.475566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106589 [ 20.476021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.476424] page_type: f5(slab) [ 20.476701] raw: 0bfffe0000000000 fff00000c596f8c0 dead000000000122 0000000000000000 [ 20.477032] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 20.477498] page dumped because: kasan: bad access detected [ 20.477888] [ 20.478111] Memory state around the buggy address: [ 20.478373] fff00000c6589100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.478971] fff00000c6589180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.479637] >fff00000c6589200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 20.480644] ^ [ 20.480953] fff00000c6589280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.481369] fff00000c6589300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.481793] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 20.347277] ================================================================== [ 20.347778] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 20.348229] Read of size 1 at addr fff00000c65fa001 by task kunit_try_catch/212 [ 20.348733] [ 20.348953] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 20.349062] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.349096] Hardware name: linux,dummy-virt (DT) [ 20.349136] Call trace: [ 20.349165] show_stack+0x20/0x38 (C) [ 20.349231] dump_stack_lvl+0x8c/0xd0 [ 20.349291] print_report+0x118/0x608 [ 20.349348] kasan_report+0xdc/0x128 [ 20.349400] __asan_report_load1_noabort+0x20/0x30 [ 20.349453] mempool_oob_right_helper+0x2ac/0x2f0 [ 20.349507] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 20.349564] kunit_try_run_case+0x170/0x3f0 [ 20.349618] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.349676] kthread+0x318/0x620 [ 20.349727] ret_from_fork+0x10/0x20 [ 20.349803] [ 20.352733] The buggy address belongs to the physical page: [ 20.353081] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065f8 [ 20.353549] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.353812] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.354291] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.354638] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.355853] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.356183] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.356500] head: 0bfffe0000000002 ffffc1ffc3197e01 ffffffffffffffff 0000000000000000 [ 20.357008] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 20.357326] page dumped because: kasan: bad access detected [ 20.357661] [ 20.357839] Memory state around the buggy address: [ 20.358061] fff00000c65f9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.358434] fff00000c65f9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.359106] >fff00000c65fa000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.359434] ^ [ 20.359634] fff00000c65fa080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.359950] fff00000c65fa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.360263] ================================================================== [ 20.368710] ================================================================== [ 20.369299] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 20.369666] Read of size 1 at addr fff00000c1f122bb by task kunit_try_catch/214 [ 20.370056] [ 20.370207] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 20.370307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.370341] Hardware name: linux,dummy-virt (DT) [ 20.370379] Call trace: [ 20.370407] show_stack+0x20/0x38 (C) [ 20.370465] dump_stack_lvl+0x8c/0xd0 [ 20.370910] print_report+0x118/0x608 [ 20.370971] kasan_report+0xdc/0x128 [ 20.371027] __asan_report_load1_noabort+0x20/0x30 [ 20.371080] mempool_oob_right_helper+0x2ac/0x2f0 [ 20.371135] mempool_slab_oob_right+0xc0/0x118 [ 20.371189] kunit_try_run_case+0x170/0x3f0 [ 20.371243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.371298] kthread+0x318/0x620 [ 20.371347] ret_from_fork+0x10/0x20 [ 20.371401] [ 20.375724] Allocated by task 214: [ 20.375904] kasan_save_stack+0x3c/0x68 [ 20.376199] kasan_save_track+0x20/0x40 [ 20.376426] kasan_save_alloc_info+0x40/0x58 [ 20.376774] __kasan_mempool_unpoison_object+0xbc/0x180 [ 20.377138] remove_element+0x16c/0x1f8 [ 20.377301] mempool_alloc_preallocated+0x58/0xc0 [ 20.377658] mempool_oob_right_helper+0x98/0x2f0 [ 20.377939] mempool_slab_oob_right+0xc0/0x118 [ 20.378170] kunit_try_run_case+0x170/0x3f0 [ 20.378397] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.378679] kthread+0x318/0x620 [ 20.379033] ret_from_fork+0x10/0x20 [ 20.379454] [ 20.379802] The buggy address belongs to the object at fff00000c1f12240 [ 20.379802] which belongs to the cache test_cache of size 123 [ 20.380200] The buggy address is located 0 bytes to the right of [ 20.380200] allocated 123-byte region [fff00000c1f12240, fff00000c1f122bb) [ 20.380612] [ 20.380732] The buggy address belongs to the physical page: [ 20.380994] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101f12 [ 20.381308] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.381586] page_type: f5(slab) [ 20.382378] raw: 0bfffe0000000000 fff00000c596f780 dead000000000122 0000000000000000 [ 20.382756] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 20.383597] page dumped because: kasan: bad access detected [ 20.383925] [ 20.384048] Memory state around the buggy address: [ 20.384420] fff00000c1f12180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.384851] fff00000c1f12200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 20.385153] >fff00000c1f12280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 20.385657] ^ [ 20.385937] fff00000c1f12300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.386421] fff00000c1f12380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.387108] ================================================================== [ 20.315821] ================================================================== [ 20.316436] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 20.317139] Read of size 1 at addr fff00000c5a05673 by task kunit_try_catch/210 [ 20.317562] [ 20.317710] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 20.318003] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.318040] Hardware name: linux,dummy-virt (DT) [ 20.318103] Call trace: [ 20.318140] show_stack+0x20/0x38 (C) [ 20.318207] dump_stack_lvl+0x8c/0xd0 [ 20.318266] print_report+0x118/0x608 [ 20.318319] kasan_report+0xdc/0x128 [ 20.318372] __asan_report_load1_noabort+0x20/0x30 [ 20.318425] mempool_oob_right_helper+0x2ac/0x2f0 [ 20.318495] mempool_kmalloc_oob_right+0xc4/0x120 [ 20.318555] kunit_try_run_case+0x170/0x3f0 [ 20.318611] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.318670] kthread+0x318/0x620 [ 20.318798] ret_from_fork+0x10/0x20 [ 20.318909] [ 20.323722] Allocated by task 210: [ 20.323997] kasan_save_stack+0x3c/0x68 [ 20.324480] kasan_save_track+0x20/0x40 [ 20.324678] kasan_save_alloc_info+0x40/0x58 [ 20.324869] __kasan_mempool_unpoison_object+0x11c/0x180 [ 20.325526] remove_element+0x130/0x1f8 [ 20.325900] mempool_alloc_preallocated+0x58/0xc0 [ 20.326341] mempool_oob_right_helper+0x98/0x2f0 [ 20.326686] mempool_kmalloc_oob_right+0xc4/0x120 [ 20.327122] kunit_try_run_case+0x170/0x3f0 [ 20.327484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.327826] kthread+0x318/0x620 [ 20.328054] ret_from_fork+0x10/0x20 [ 20.328294] [ 20.328441] The buggy address belongs to the object at fff00000c5a05600 [ 20.328441] which belongs to the cache kmalloc-128 of size 128 [ 20.329319] The buggy address is located 0 bytes to the right of [ 20.329319] allocated 115-byte region [fff00000c5a05600, fff00000c5a05673) [ 20.330055] [ 20.330278] The buggy address belongs to the physical page: [ 20.330612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a05 [ 20.331156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.331580] page_type: f5(slab) [ 20.332010] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.332523] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.333061] page dumped because: kasan: bad access detected [ 20.333428] [ 20.333545] Memory state around the buggy address: [ 20.333735] fff00000c5a05500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.334427] fff00000c5a05580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.335206] >fff00000c5a05600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.335576] ^ [ 20.335922] fff00000c5a05680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.336322] fff00000c5a05700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.336566] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 51.291949] ================================================================== [ 51.292348] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 51.292348] [ 51.292672] Use-after-free read at 0x00000000cd07583c (in kfence-#158): [ 51.293129] test_krealloc+0x51c/0x830 [ 51.293421] kunit_try_run_case+0x170/0x3f0 [ 51.293710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.294039] kthread+0x318/0x620 [ 51.294375] ret_from_fork+0x10/0x20 [ 51.294636] [ 51.294894] kfence-#158: 0x00000000cd07583c-0x000000007a76b377, size=32, cache=kmalloc-32 [ 51.294894] [ 51.295868] allocated by task 326 on cpu 1 at 51.291146s (0.004715s ago): [ 51.296162] test_alloc+0x29c/0x628 [ 51.296596] test_krealloc+0xc0/0x830 [ 51.296818] kunit_try_run_case+0x170/0x3f0 [ 51.297049] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.297304] kthread+0x318/0x620 [ 51.297493] ret_from_fork+0x10/0x20 [ 51.297702] [ 51.297945] freed by task 326 on cpu 1 at 51.291423s (0.006511s ago): [ 51.298274] krealloc_noprof+0x148/0x360 [ 51.298463] test_krealloc+0x1dc/0x830 [ 51.299863] kunit_try_run_case+0x170/0x3f0 [ 51.300281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.301293] kthread+0x318/0x620 [ 51.301684] ret_from_fork+0x10/0x20 [ 51.302064] [ 51.302296] CPU: 1 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 51.303189] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.303625] Hardware name: linux,dummy-virt (DT) [ 51.304047] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 51.227411] ================================================================== [ 51.228006] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 51.228006] [ 51.228363] Use-after-free read at 0x00000000ea012d05 (in kfence-#157): [ 51.228883] test_memcache_typesafe_by_rcu+0x280/0x560 [ 51.229136] kunit_try_run_case+0x170/0x3f0 [ 51.229453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.229886] kthread+0x318/0x620 [ 51.230088] ret_from_fork+0x10/0x20 [ 51.230428] [ 51.230621] kfence-#157: 0x00000000ea012d05-0x0000000021942ff1, size=32, cache=test [ 51.230621] [ 51.231080] allocated by task 324 on cpu 0 at 51.186320s (0.044754s ago): [ 51.231518] test_alloc+0x230/0x628 [ 51.231833] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 51.232159] kunit_try_run_case+0x170/0x3f0 [ 51.232413] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.232767] kthread+0x318/0x620 [ 51.232981] ret_from_fork+0x10/0x20 [ 51.233229] [ 51.233407] freed by task 324 on cpu 0 at 51.186459s (0.046942s ago): [ 51.233787] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 51.234111] kunit_try_run_case+0x170/0x3f0 [ 51.234401] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.234697] kthread+0x318/0x620 [ 51.234930] ret_from_fork+0x10/0x20 [ 51.235121] [ 51.235328] CPU: 0 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 51.235846] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.236103] Hardware name: linux,dummy-virt (DT) [ 51.236367] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 29.265172] ================================================================== [ 29.265998] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 29.265998] [ 29.266792] Invalid read at 0x000000000f3b9611: [ 29.267678] test_invalid_access+0xdc/0x1f0 [ 29.268154] kunit_try_run_case+0x170/0x3f0 [ 29.268480] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.268876] kthread+0x318/0x620 [ 29.269144] ret_from_fork+0x10/0x20 [ 29.269431] [ 29.269659] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 29.270234] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.270626] Hardware name: linux,dummy-virt (DT) [ 29.271490] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 29.031643] ================================================================== [ 29.032089] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 29.032089] [ 29.032386] Corrupted memory at 0x0000000041ea2170 [ ! . . . . . . . . . . . . . . . ] (in kfence-#152): [ 29.033595] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 29.034038] kunit_try_run_case+0x170/0x3f0 [ 29.034407] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.034974] kthread+0x318/0x620 [ 29.035189] ret_from_fork+0x10/0x20 [ 29.035499] [ 29.035637] kfence-#152: 0x0000000010a8010e-0x0000000014d365e5, size=73, cache=kmalloc-96 [ 29.035637] [ 29.036057] allocated by task 314 on cpu 1 at 29.031313s (0.004739s ago): [ 29.036485] test_alloc+0x29c/0x628 [ 29.036780] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 29.037057] kunit_try_run_case+0x170/0x3f0 [ 29.037311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.037609] kthread+0x318/0x620 [ 29.037799] ret_from_fork+0x10/0x20 [ 29.038059] [ 29.038250] freed by task 314 on cpu 1 at 29.031488s (0.006756s ago): [ 29.038580] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 29.038877] kunit_try_run_case+0x170/0x3f0 [ 29.039131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.039390] kthread+0x318/0x620 [ 29.039587] ret_from_fork+0x10/0x20 [ 29.039831] [ 29.040027] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 29.040575] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.040802] Hardware name: linux,dummy-virt (DT) [ 29.041058] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 28.927755] ================================================================== [ 28.928117] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 28.928117] [ 28.928436] Out-of-bounds read at 0x00000000623ad710 (105B right of kfence-#151): [ 28.929016] test_kmalloc_aligned_oob_read+0x238/0x468 [ 28.929570] kunit_try_run_case+0x170/0x3f0 [ 28.929880] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.930301] kthread+0x318/0x620 [ 28.930479] ret_from_fork+0x10/0x20 [ 28.931018] [ 28.931150] kfence-#151: 0x00000000f1b1de98-0x000000006f6ebf09, size=73, cache=kmalloc-96 [ 28.931150] [ 28.931494] allocated by task 312 on cpu 0 at 28.927433s (0.004056s ago): [ 28.931874] test_alloc+0x29c/0x628 [ 28.932078] test_kmalloc_aligned_oob_read+0x100/0x468 [ 28.932374] kunit_try_run_case+0x170/0x3f0 [ 28.932617] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.932953] kthread+0x318/0x620 [ 28.933171] ret_from_fork+0x10/0x20 [ 28.933498] [ 28.933662] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 28.934255] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.934557] Hardware name: linux,dummy-virt (DT) [ 28.934793] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[ 24.871666] ================================================================== [ 24.872323] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 24.872323] [ 24.872929] Corrupted memory at 0x00000000380f2867 [ ! . . . . . . . . . . . . . . . ] (in kfence-#112): [ 24.875901] test_corruption+0x278/0x378 [ 24.876323] kunit_try_run_case+0x170/0x3f0 [ 24.876722] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.877192] kthread+0x318/0x620 [ 24.877578] ret_from_fork+0x10/0x20 [ 24.877988] [ 24.878225] kfence-#112: 0x0000000067594dd7-0x00000000ae319080, size=32, cache=kmalloc-32 [ 24.878225] [ 24.878970] allocated by task 300 on cpu 1 at 24.871243s (0.007715s ago): [ 24.879644] test_alloc+0x29c/0x628 [ 24.880035] test_corruption+0xdc/0x378 [ 24.880457] kunit_try_run_case+0x170/0x3f0 [ 24.880969] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.881460] kthread+0x318/0x620 [ 24.881901] ret_from_fork+0x10/0x20 [ 24.882356] [ 24.882625] freed by task 300 on cpu 1 at 24.871414s (0.011199s ago): [ 24.883316] test_corruption+0x278/0x378 [ 24.883767] kunit_try_run_case+0x170/0x3f0 [ 24.884181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.884618] kthread+0x318/0x620 [ 24.885047] ret_from_fork+0x10/0x20 [ 24.885394] [ 24.885728] CPU: 1 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 24.886475] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.886805] Hardware name: linux,dummy-virt (DT) [ 24.887321] ================================================================== [ 24.975934] ================================================================== [ 24.976482] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 24.976482] [ 24.977185] Corrupted memory at 0x000000008753d1d2 [ ! ] (in kfence-#113): [ 24.978247] test_corruption+0x284/0x378 [ 24.978758] kunit_try_run_case+0x170/0x3f0 [ 24.979266] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.979877] kthread+0x318/0x620 [ 24.980364] ret_from_fork+0x10/0x20 [ 24.980792] [ 24.981114] kfence-#113: 0x00000000f54054f5-0x000000005edd7b85, size=32, cache=kmalloc-32 [ 24.981114] [ 24.981934] allocated by task 300 on cpu 1 at 24.975487s (0.006435s ago): [ 24.982624] test_alloc+0x29c/0x628 [ 24.983155] test_corruption+0x198/0x378 [ 24.983585] kunit_try_run_case+0x170/0x3f0 [ 24.984065] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.984607] kthread+0x318/0x620 [ 24.985037] ret_from_fork+0x10/0x20 [ 24.985436] [ 24.985732] freed by task 300 on cpu 1 at 24.975664s (0.010057s ago): [ 24.986392] test_corruption+0x284/0x378 [ 24.986853] kunit_try_run_case+0x170/0x3f0 [ 24.987245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.987819] kthread+0x318/0x620 [ 24.988199] ret_from_fork+0x10/0x20 [ 24.988660] [ 24.988929] CPU: 1 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 24.989810] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.990221] Hardware name: linux,dummy-virt (DT) [ 24.990622] ================================================================== [ 25.079514] ================================================================== [ 25.080076] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 25.080076] [ 25.081147] Corrupted memory at 0x00000000444958e2 [ ! . . . . . . . . . . . . . . . ] (in kfence-#114): [ 25.082845] test_corruption+0x120/0x378 [ 25.083296] kunit_try_run_case+0x170/0x3f0 [ 25.083979] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.084625] kthread+0x318/0x620 [ 25.085023] ret_from_fork+0x10/0x20 [ 25.085520] [ 25.085837] kfence-#114: 0x0000000055794dbf-0x000000004d02accd, size=32, cache=test [ 25.085837] [ 25.086547] allocated by task 302 on cpu 1 at 25.079253s (0.007282s ago): [ 25.087250] test_alloc+0x230/0x628 [ 25.087730] test_corruption+0xdc/0x378 [ 25.088186] kunit_try_run_case+0x170/0x3f0 [ 25.088659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.089130] kthread+0x318/0x620 [ 25.089536] ret_from_fork+0x10/0x20 [ 25.089962] [ 25.090250] freed by task 302 on cpu 1 at 25.079353s (0.010884s ago): [ 25.090828] test_corruption+0x120/0x378 [ 25.091377] kunit_try_run_case+0x170/0x3f0 [ 25.091854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.092390] kthread+0x318/0x620 [ 25.092796] ret_from_fork+0x10/0x20 [ 25.093170] [ 25.093440] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 25.094097] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.094603] Hardware name: linux,dummy-virt (DT) [ 25.095133] ================================================================== [ 25.183853] ================================================================== [ 25.184503] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 25.184503] [ 25.185260] Corrupted memory at 0x000000005e089b09 [ ! ] (in kfence-#115): [ 25.186238] test_corruption+0x1d8/0x378 [ 25.186696] kunit_try_run_case+0x170/0x3f0 [ 25.187278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.187767] kthread+0x318/0x620 [ 25.188219] ret_from_fork+0x10/0x20 [ 25.188712] [ 25.189035] kfence-#115: 0x00000000ecaabb0e-0x00000000c7599280, size=32, cache=test [ 25.189035] [ 25.189720] allocated by task 302 on cpu 1 at 25.183556s (0.006151s ago): [ 25.190499] test_alloc+0x230/0x628 [ 25.190961] test_corruption+0x198/0x378 [ 25.191409] kunit_try_run_case+0x170/0x3f0 [ 25.191815] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.192344] kthread+0x318/0x620 [ 25.192669] ret_from_fork+0x10/0x20 [ 25.193130] [ 25.193421] freed by task 302 on cpu 1 at 25.183665s (0.009744s ago): [ 25.194074] test_corruption+0x1d8/0x378 [ 25.194423] kunit_try_run_case+0x170/0x3f0 [ 25.194929] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.195392] kthread+0x318/0x620 [ 25.195730] ret_from_fork+0x10/0x20 [ 25.196161] [ 25.196466] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 25.197175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.197498] Hardware name: linux,dummy-virt (DT) [ 25.197999] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 24.767534] ================================================================== [ 24.768121] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 24.768121] [ 24.768678] Invalid free of 0x0000000055685f81 (in kfence-#111): [ 24.769069] test_invalid_addr_free+0xec/0x238 [ 24.769575] kunit_try_run_case+0x170/0x3f0 [ 24.770093] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.770548] kthread+0x318/0x620 [ 24.771052] ret_from_fork+0x10/0x20 [ 24.771494] [ 24.771780] kfence-#111: 0x0000000054e49d17-0x000000006eb9935d, size=32, cache=test [ 24.771780] [ 24.772460] allocated by task 298 on cpu 1 at 24.767309s (0.005140s ago): [ 24.773229] test_alloc+0x230/0x628 [ 24.773678] test_invalid_addr_free+0xd4/0x238 [ 24.774212] kunit_try_run_case+0x170/0x3f0 [ 24.774570] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.775185] kthread+0x318/0x620 [ 24.775553] ret_from_fork+0x10/0x20 [ 24.776009] [ 24.776330] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 24.776961] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.777381] Hardware name: linux,dummy-virt (DT) [ 24.777850] ================================================================== [ 24.663600] ================================================================== [ 24.664246] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 24.664246] [ 24.664940] Invalid free of 0x0000000041001053 (in kfence-#110): [ 24.665508] test_invalid_addr_free+0x1ac/0x238 [ 24.665889] kunit_try_run_case+0x170/0x3f0 [ 24.666402] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.667027] kthread+0x318/0x620 [ 24.667502] ret_from_fork+0x10/0x20 [ 24.667873] [ 24.668106] kfence-#110: 0x000000000cee93e1-0x000000007aec184b, size=32, cache=kmalloc-32 [ 24.668106] [ 24.669062] allocated by task 296 on cpu 1 at 24.663335s (0.005714s ago): [ 24.669639] test_alloc+0x29c/0x628 [ 24.670155] test_invalid_addr_free+0xd4/0x238 [ 24.670717] kunit_try_run_case+0x170/0x3f0 [ 24.671283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.671811] kthread+0x318/0x620 [ 24.672218] ret_from_fork+0x10/0x20 [ 24.672649] [ 24.673005] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 24.673815] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.674239] Hardware name: linux,dummy-virt (DT) [ 24.674721] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[ 24.559642] ================================================================== [ 24.560199] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 24.560199] [ 24.560828] Invalid free of 0x000000009c98e922 (in kfence-#109): [ 24.561250] test_double_free+0x100/0x238 [ 24.561714] kunit_try_run_case+0x170/0x3f0 [ 24.562227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.562761] kthread+0x318/0x620 [ 24.563241] ret_from_fork+0x10/0x20 [ 24.563761] [ 24.564053] kfence-#109: 0x000000009c98e922-0x00000000b73b636d, size=32, cache=test [ 24.564053] [ 24.564767] allocated by task 294 on cpu 0 at 24.559285s (0.005470s ago): [ 24.565408] test_alloc+0x230/0x628 [ 24.565807] test_double_free+0xd4/0x238 [ 24.566313] kunit_try_run_case+0x170/0x3f0 [ 24.566680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.567297] kthread+0x318/0x620 [ 24.567623] ret_from_fork+0x10/0x20 [ 24.568094] [ 24.568369] freed by task 294 on cpu 0 at 24.559379s (0.008980s ago): [ 24.568946] test_double_free+0xf0/0x238 [ 24.569400] kunit_try_run_case+0x170/0x3f0 [ 24.569852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.570373] kthread+0x318/0x620 [ 24.570779] ret_from_fork+0x10/0x20 [ 24.571192] [ 24.571533] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 24.572256] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.572726] Hardware name: linux,dummy-virt (DT) [ 24.573206] ================================================================== [ 24.455883] ================================================================== [ 24.456468] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 24.456468] [ 24.457105] Invalid free of 0x00000000f5ee14be (in kfence-#108): [ 24.457639] test_double_free+0x1bc/0x238 [ 24.458102] kunit_try_run_case+0x170/0x3f0 [ 24.458642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.459170] kthread+0x318/0x620 [ 24.459634] ret_from_fork+0x10/0x20 [ 24.460082] [ 24.460363] kfence-#108: 0x00000000f5ee14be-0x000000001d4ad8a4, size=32, cache=kmalloc-32 [ 24.460363] [ 24.461200] allocated by task 292 on cpu 0 at 24.455335s (0.005853s ago): [ 24.461804] test_alloc+0x29c/0x628 [ 24.462279] test_double_free+0xd4/0x238 [ 24.462728] kunit_try_run_case+0x170/0x3f0 [ 24.463248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.463658] kthread+0x318/0x620 [ 24.464124] ret_from_fork+0x10/0x20 [ 24.464571] [ 24.464841] freed by task 292 on cpu 0 at 24.455478s (0.009350s ago): [ 24.465478] test_double_free+0x1ac/0x238 [ 24.465963] kunit_try_run_case+0x170/0x3f0 [ 24.466389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.466881] kthread+0x318/0x620 [ 24.467275] ret_from_fork+0x10/0x20 [ 24.467633] [ 24.467969] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 24.468634] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.469125] Hardware name: linux,dummy-virt (DT) [ 24.469535] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 24.143748] ================================================================== [ 24.144344] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 24.144344] [ 24.145165] Use-after-free read at 0x00000000a2e815c7 (in kfence-#105): [ 24.146214] test_use_after_free_read+0x114/0x248 [ 24.147053] kunit_try_run_case+0x170/0x3f0 [ 24.147727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.148202] kthread+0x318/0x620 [ 24.148571] ret_from_fork+0x10/0x20 [ 24.149143] [ 24.149502] kfence-#105: 0x00000000a2e815c7-0x0000000091cb25bc, size=32, cache=test [ 24.149502] [ 24.150238] allocated by task 286 on cpu 0 at 24.143367s (0.006859s ago): [ 24.151058] test_alloc+0x230/0x628 [ 24.151571] test_use_after_free_read+0xd0/0x248 [ 24.152188] kunit_try_run_case+0x170/0x3f0 [ 24.152617] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.153298] kthread+0x318/0x620 [ 24.153760] ret_from_fork+0x10/0x20 [ 24.154300] [ 24.154667] freed by task 286 on cpu 0 at 24.143483s (0.011172s ago): [ 24.155505] test_use_after_free_read+0xf0/0x248 [ 24.155875] kunit_try_run_case+0x170/0x3f0 [ 24.156392] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.156896] kthread+0x318/0x620 [ 24.157345] ret_from_fork+0x10/0x20 [ 24.157788] [ 24.158104] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 24.158789] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.159294] Hardware name: linux,dummy-virt (DT) [ 24.159695] ================================================================== [ 24.039708] ================================================================== [ 24.040284] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 24.040284] [ 24.041570] Use-after-free read at 0x00000000534d1225 (in kfence-#104): [ 24.042189] test_use_after_free_read+0x114/0x248 [ 24.042971] kunit_try_run_case+0x170/0x3f0 [ 24.043289] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.043492] kthread+0x318/0x620 [ 24.043646] ret_from_fork+0x10/0x20 [ 24.043824] [ 24.043933] kfence-#104: 0x00000000534d1225-0x00000000dfb58895, size=32, cache=kmalloc-32 [ 24.043933] [ 24.044202] allocated by task 284 on cpu 1 at 24.039240s (0.004956s ago): [ 24.044439] test_alloc+0x29c/0x628 [ 24.044596] test_use_after_free_read+0xd0/0x248 [ 24.044837] kunit_try_run_case+0x170/0x3f0 [ 24.045339] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.046041] kthread+0x318/0x620 [ 24.046571] ret_from_fork+0x10/0x20 [ 24.047120] [ 24.047632] freed by task 284 on cpu 1 at 24.039364s (0.008107s ago): [ 24.048490] test_use_after_free_read+0x1c0/0x248 [ 24.048950] kunit_try_run_case+0x170/0x3f0 [ 24.049402] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.049932] kthread+0x318/0x620 [ 24.050336] ret_from_fork+0x10/0x20 [ 24.050787] [ 24.051103] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 24.051842] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.052164] Hardware name: linux,dummy-virt (DT) [ 24.052678] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 23.935411] ================================================================== [ 23.936107] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 23.936107] [ 23.936705] Out-of-bounds write at 0x00000000f6f9f8e4 (1B left of kfence-#103): [ 23.937350] test_out_of_bounds_write+0x100/0x240 [ 23.937895] kunit_try_run_case+0x170/0x3f0 [ 23.938326] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.938994] kthread+0x318/0x620 [ 23.939369] ret_from_fork+0x10/0x20 [ 23.939718] [ 23.939958] kfence-#103: 0x00000000b86db979-0x0000000012d0829c, size=32, cache=test [ 23.939958] [ 23.940759] allocated by task 282 on cpu 0 at 23.935267s (0.005480s ago): [ 23.941372] test_alloc+0x230/0x628 [ 23.941771] test_out_of_bounds_write+0xc8/0x240 [ 23.942299] kunit_try_run_case+0x170/0x3f0 [ 23.942729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.943175] kthread+0x318/0x620 [ 23.943600] ret_from_fork+0x10/0x20 [ 23.944068] [ 23.944325] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 23.945110] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.945548] Hardware name: linux,dummy-virt (DT) [ 23.945928] ================================================================== [ 23.519607] ================================================================== [ 23.520066] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 23.520066] [ 23.520421] Out-of-bounds write at 0x00000000b25b398e (1B left of kfence-#99): [ 23.520652] test_out_of_bounds_write+0x100/0x240 [ 23.520859] kunit_try_run_case+0x170/0x3f0 [ 23.521032] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.521219] kthread+0x318/0x620 [ 23.521367] ret_from_fork+0x10/0x20 [ 23.521517] [ 23.521619] kfence-#99: 0x00000000ef187485-0x000000002a39b55f, size=32, cache=kmalloc-32 [ 23.521619] [ 23.522012] allocated by task 280 on cpu 0 at 23.519327s (0.002675s ago): [ 23.522584] test_alloc+0x29c/0x628 [ 23.523490] test_out_of_bounds_write+0xc8/0x240 [ 23.524093] kunit_try_run_case+0x170/0x3f0 [ 23.524649] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.525126] kthread+0x318/0x620 [ 23.525607] ret_from_fork+0x10/0x20 [ 23.526134] [ 23.526446] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 23.527041] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.527358] Hardware name: linux,dummy-virt (DT) [ 23.527927] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 23.415470] ================================================================== [ 23.416319] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 23.416319] [ 23.417042] Out-of-bounds read at 0x0000000068f4646b (32B right of kfence-#98): [ 23.417709] test_out_of_bounds_read+0x1c8/0x3e0 [ 23.418291] kunit_try_run_case+0x170/0x3f0 [ 23.418747] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.419394] kthread+0x318/0x620 [ 23.419846] ret_from_fork+0x10/0x20 [ 23.420279] [ 23.420570] kfence-#98: 0x00000000426b8b73-0x00000000257a7f50, size=32, cache=test [ 23.420570] [ 23.421320] allocated by task 278 on cpu 1 at 23.415315s (0.005994s ago): [ 23.421955] test_alloc+0x230/0x628 [ 23.422482] test_out_of_bounds_read+0x198/0x3e0 [ 23.422960] kunit_try_run_case+0x170/0x3f0 [ 23.423471] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.423927] kthread+0x318/0x620 [ 23.424365] ret_from_fork+0x10/0x20 [ 23.424847] [ 23.425182] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 23.425972] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.426457] Hardware name: linux,dummy-virt (DT) [ 23.426904] ================================================================== [ 23.103449] ================================================================== [ 23.104004] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 23.104004] [ 23.104498] Out-of-bounds read at 0x00000000bfd868f5 (1B left of kfence-#95): [ 23.104957] test_out_of_bounds_read+0x114/0x3e0 [ 23.105319] kunit_try_run_case+0x170/0x3f0 [ 23.105608] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.105900] kthread+0x318/0x620 [ 23.106108] ret_from_fork+0x10/0x20 [ 23.106447] [ 23.106653] kfence-#95: 0x00000000e299e969-0x000000003ec3df6d, size=32, cache=test [ 23.106653] [ 23.107069] allocated by task 278 on cpu 1 at 23.103344s (0.003719s ago): [ 23.107518] test_alloc+0x230/0x628 [ 23.107790] test_out_of_bounds_read+0xdc/0x3e0 [ 23.108062] kunit_try_run_case+0x170/0x3f0 [ 23.108352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.108637] kthread+0x318/0x620 [ 23.108907] ret_from_fork+0x10/0x20 [ 23.109155] [ 23.109356] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 23.109810] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.110121] Hardware name: linux,dummy-virt (DT) [ 23.110392] ================================================================== [ 22.792399] ================================================================== [ 22.792857] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 22.792857] [ 22.793284] Out-of-bounds read at 0x00000000e7ba967f (1B left of kfence-#92): [ 22.794014] test_out_of_bounds_read+0x114/0x3e0 [ 22.794328] kunit_try_run_case+0x170/0x3f0 [ 22.794723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.795078] kthread+0x318/0x620 [ 22.795236] ret_from_fork+0x10/0x20 [ 22.795435] [ 22.795857] kfence-#92: 0x000000001cf77dd6-0x00000000e8411fb2, size=32, cache=kmalloc-32 [ 22.795857] [ 22.796690] allocated by task 276 on cpu 1 at 22.791255s (0.005357s ago): [ 22.797606] test_alloc+0x29c/0x628 [ 22.797839] test_out_of_bounds_read+0xdc/0x3e0 [ 22.798029] kunit_try_run_case+0x170/0x3f0 [ 22.798285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.798700] kthread+0x318/0x620 [ 22.799023] ret_from_fork+0x10/0x20 [ 22.799248] [ 22.799495] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.799953] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.800240] Hardware name: linux,dummy-virt (DT) [ 22.800517] ================================================================== [ 22.895589] ================================================================== [ 22.895952] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 22.895952] [ 22.896260] Out-of-bounds read at 0x00000000754275c6 (32B right of kfence-#93): [ 22.896685] test_out_of_bounds_read+0x1c8/0x3e0 [ 22.897089] kunit_try_run_case+0x170/0x3f0 [ 22.897321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.897685] kthread+0x318/0x620 [ 22.897944] ret_from_fork+0x10/0x20 [ 22.898193] [ 22.898316] kfence-#93: 0x000000003f350ab3-0x00000000a4499652, size=32, cache=kmalloc-32 [ 22.898316] [ 22.898887] allocated by task 276 on cpu 1 at 22.895292s (0.003590s ago): [ 22.899172] test_alloc+0x29c/0x628 [ 22.899442] test_out_of_bounds_read+0x198/0x3e0 [ 22.899752] kunit_try_run_case+0x170/0x3f0 [ 22.899961] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.900218] kthread+0x318/0x620 [ 22.900448] ret_from_fork+0x10/0x20 [ 22.900700] [ 22.900886] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.901346] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.901548] Hardware name: linux,dummy-virt (DT) [ 22.901814] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 22.672938] ================================================================== [ 22.673254] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 22.673847] Write of size 1 at addr fff00000c6649478 by task kunit_try_catch/274 [ 22.674152] [ 22.674280] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.674385] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.674424] Hardware name: linux,dummy-virt (DT) [ 22.674498] Call trace: [ 22.674533] show_stack+0x20/0x38 (C) [ 22.674595] dump_stack_lvl+0x8c/0xd0 [ 22.674684] print_report+0x118/0x608 [ 22.674768] kasan_report+0xdc/0x128 [ 22.674824] __asan_report_store1_noabort+0x20/0x30 [ 22.674909] strncpy_from_user+0x270/0x2a0 [ 22.674995] copy_user_test_oob+0x5c0/0xec0 [ 22.675054] kunit_try_run_case+0x170/0x3f0 [ 22.675110] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.675177] kthread+0x318/0x620 [ 22.675230] ret_from_fork+0x10/0x20 [ 22.675290] [ 22.678233] Allocated by task 274: [ 22.678387] kasan_save_stack+0x3c/0x68 [ 22.678787] kasan_save_track+0x20/0x40 [ 22.679135] kasan_save_alloc_info+0x40/0x58 [ 22.679307] __kasan_kmalloc+0xd4/0xd8 [ 22.679688] __kmalloc_noprof+0x190/0x4d0 [ 22.679972] kunit_kmalloc_array+0x34/0x88 [ 22.680255] copy_user_test_oob+0xac/0xec0 [ 22.680482] kunit_try_run_case+0x170/0x3f0 [ 22.680702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.681024] kthread+0x318/0x620 [ 22.681231] ret_from_fork+0x10/0x20 [ 22.681458] [ 22.681585] The buggy address belongs to the object at fff00000c6649400 [ 22.681585] which belongs to the cache kmalloc-128 of size 128 [ 22.681976] The buggy address is located 0 bytes to the right of [ 22.681976] allocated 120-byte region [fff00000c6649400, fff00000c6649478) [ 22.682314] [ 22.682419] The buggy address belongs to the physical page: [ 22.682873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106649 [ 22.683563] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.683987] page_type: f5(slab) [ 22.684148] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.684774] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.685309] page dumped because: kasan: bad access detected [ 22.685607] [ 22.685721] Memory state around the buggy address: [ 22.686171] fff00000c6649300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.686530] fff00000c6649380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.686810] >fff00000c6649400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 22.687143] ^ [ 22.687467] fff00000c6649480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.687819] fff00000c6649500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.688086] ================================================================== [ 22.654983] ================================================================== [ 22.655661] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 22.656149] Write of size 121 at addr fff00000c6649400 by task kunit_try_catch/274 [ 22.656748] [ 22.656930] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.657030] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.657082] Hardware name: linux,dummy-virt (DT) [ 22.657131] Call trace: [ 22.657166] show_stack+0x20/0x38 (C) [ 22.657227] dump_stack_lvl+0x8c/0xd0 [ 22.657283] print_report+0x118/0x608 [ 22.657336] kasan_report+0xdc/0x128 [ 22.657416] kasan_check_range+0x100/0x1a8 [ 22.657507] __kasan_check_write+0x20/0x30 [ 22.657572] strncpy_from_user+0x3c/0x2a0 [ 22.657631] copy_user_test_oob+0x5c0/0xec0 [ 22.657685] kunit_try_run_case+0x170/0x3f0 [ 22.657753] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.657821] kthread+0x318/0x620 [ 22.657874] ret_from_fork+0x10/0x20 [ 22.657934] [ 22.661320] Allocated by task 274: [ 22.661576] kasan_save_stack+0x3c/0x68 [ 22.661758] kasan_save_track+0x20/0x40 [ 22.662140] kasan_save_alloc_info+0x40/0x58 [ 22.662556] __kasan_kmalloc+0xd4/0xd8 [ 22.662805] __kmalloc_noprof+0x190/0x4d0 [ 22.663059] kunit_kmalloc_array+0x34/0x88 [ 22.663308] copy_user_test_oob+0xac/0xec0 [ 22.663558] kunit_try_run_case+0x170/0x3f0 [ 22.663772] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.664036] kthread+0x318/0x620 [ 22.664267] ret_from_fork+0x10/0x20 [ 22.664487] [ 22.664593] The buggy address belongs to the object at fff00000c6649400 [ 22.664593] which belongs to the cache kmalloc-128 of size 128 [ 22.665178] The buggy address is located 0 bytes inside of [ 22.665178] allocated 120-byte region [fff00000c6649400, fff00000c6649478) [ 22.665580] [ 22.665790] The buggy address belongs to the physical page: [ 22.666271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106649 [ 22.666666] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.667071] page_type: f5(slab) [ 22.667238] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.667478] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.668050] page dumped because: kasan: bad access detected [ 22.668518] [ 22.668733] Memory state around the buggy address: [ 22.669085] fff00000c6649300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.669514] fff00000c6649380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.669752] >fff00000c6649400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 22.670424] ^ [ 22.670795] fff00000c6649480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.671266] fff00000c6649500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.671701] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 22.559775] ================================================================== [ 22.560284] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0 [ 22.560775] Read of size 121 at addr fff00000c6649400 by task kunit_try_catch/274 [ 22.561205] [ 22.561432] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.561535] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.561570] Hardware name: linux,dummy-virt (DT) [ 22.561611] Call trace: [ 22.561658] show_stack+0x20/0x38 (C) [ 22.561721] dump_stack_lvl+0x8c/0xd0 [ 22.561807] print_report+0x118/0x608 [ 22.561867] kasan_report+0xdc/0x128 [ 22.561918] kasan_check_range+0x100/0x1a8 [ 22.561975] __kasan_check_read+0x20/0x30 [ 22.562028] copy_user_test_oob+0x728/0xec0 [ 22.562092] kunit_try_run_case+0x170/0x3f0 [ 22.562151] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.562213] kthread+0x318/0x620 [ 22.562263] ret_from_fork+0x10/0x20 [ 22.562318] [ 22.566589] Allocated by task 274: [ 22.566908] kasan_save_stack+0x3c/0x68 [ 22.567240] kasan_save_track+0x20/0x40 [ 22.567541] kasan_save_alloc_info+0x40/0x58 [ 22.567829] __kasan_kmalloc+0xd4/0xd8 [ 22.568140] __kmalloc_noprof+0x190/0x4d0 [ 22.568428] kunit_kmalloc_array+0x34/0x88 [ 22.568731] copy_user_test_oob+0xac/0xec0 [ 22.569060] kunit_try_run_case+0x170/0x3f0 [ 22.569322] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.569772] kthread+0x318/0x620 [ 22.570083] ret_from_fork+0x10/0x20 [ 22.570328] [ 22.570523] The buggy address belongs to the object at fff00000c6649400 [ 22.570523] which belongs to the cache kmalloc-128 of size 128 [ 22.571191] The buggy address is located 0 bytes inside of [ 22.571191] allocated 120-byte region [fff00000c6649400, fff00000c6649478) [ 22.571906] [ 22.572086] The buggy address belongs to the physical page: [ 22.572378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106649 [ 22.572816] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.573247] page_type: f5(slab) [ 22.573554] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.573945] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.574312] page dumped because: kasan: bad access detected [ 22.574780] [ 22.574933] Memory state around the buggy address: [ 22.575195] fff00000c6649300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.575720] fff00000c6649380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.576072] >fff00000c6649400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 22.576503] ^ [ 22.576979] fff00000c6649480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.577375] fff00000c6649500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.577800] ================================================================== [ 22.532360] ================================================================== [ 22.533170] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0 [ 22.533641] Write of size 121 at addr fff00000c6649400 by task kunit_try_catch/274 [ 22.534004] [ 22.534237] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.534352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.534391] Hardware name: linux,dummy-virt (DT) [ 22.534435] Call trace: [ 22.534484] show_stack+0x20/0x38 (C) [ 22.535554] dump_stack_lvl+0x8c/0xd0 [ 22.535621] print_report+0x118/0x608 [ 22.535678] kasan_report+0xdc/0x128 [ 22.535731] kasan_check_range+0x100/0x1a8 [ 22.535806] __kasan_check_write+0x20/0x30 [ 22.535859] copy_user_test_oob+0x234/0xec0 [ 22.535915] kunit_try_run_case+0x170/0x3f0 [ 22.535970] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.536029] kthread+0x318/0x620 [ 22.536081] ret_from_fork+0x10/0x20 [ 22.536137] [ 22.540033] Allocated by task 274: [ 22.540248] kasan_save_stack+0x3c/0x68 [ 22.540474] kasan_save_track+0x20/0x40 [ 22.540643] kasan_save_alloc_info+0x40/0x58 [ 22.541921] __kasan_kmalloc+0xd4/0xd8 [ 22.542242] __kmalloc_noprof+0x190/0x4d0 [ 22.542435] kunit_kmalloc_array+0x34/0x88 [ 22.542610] copy_user_test_oob+0xac/0xec0 [ 22.542876] kunit_try_run_case+0x170/0x3f0 [ 22.543170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.544068] kthread+0x318/0x620 [ 22.544367] ret_from_fork+0x10/0x20 [ 22.544601] [ 22.544846] The buggy address belongs to the object at fff00000c6649400 [ 22.544846] which belongs to the cache kmalloc-128 of size 128 [ 22.545292] The buggy address is located 0 bytes inside of [ 22.545292] allocated 120-byte region [fff00000c6649400, fff00000c6649478) [ 22.545879] [ 22.546028] The buggy address belongs to the physical page: [ 22.546695] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106649 [ 22.547265] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.547510] page_type: f5(slab) [ 22.547686] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.548050] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.548675] page dumped because: kasan: bad access detected [ 22.548964] [ 22.549074] Memory state around the buggy address: [ 22.549893] fff00000c6649300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.550319] fff00000c6649380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.550891] >fff00000c6649400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 22.551343] ^ [ 22.551687] fff00000c6649480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.552034] fff00000c6649500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.552359] ================================================================== [ 22.635929] ================================================================== [ 22.636319] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0 [ 22.637165] Read of size 121 at addr fff00000c6649400 by task kunit_try_catch/274 [ 22.637474] [ 22.637619] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.637714] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.637768] Hardware name: linux,dummy-virt (DT) [ 22.637809] Call trace: [ 22.637839] show_stack+0x20/0x38 (C) [ 22.637897] dump_stack_lvl+0x8c/0xd0 [ 22.637952] print_report+0x118/0x608 [ 22.638001] kasan_report+0xdc/0x128 [ 22.638049] kasan_check_range+0x100/0x1a8 [ 22.638127] __kasan_check_read+0x20/0x30 [ 22.638181] copy_user_test_oob+0x4a0/0xec0 [ 22.638234] kunit_try_run_case+0x170/0x3f0 [ 22.638291] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.638347] kthread+0x318/0x620 [ 22.638394] ret_from_fork+0x10/0x20 [ 22.638446] [ 22.642664] Allocated by task 274: [ 22.643090] kasan_save_stack+0x3c/0x68 [ 22.643421] kasan_save_track+0x20/0x40 [ 22.643773] kasan_save_alloc_info+0x40/0x58 [ 22.644000] __kasan_kmalloc+0xd4/0xd8 [ 22.644376] __kmalloc_noprof+0x190/0x4d0 [ 22.644616] kunit_kmalloc_array+0x34/0x88 [ 22.644950] copy_user_test_oob+0xac/0xec0 [ 22.645229] kunit_try_run_case+0x170/0x3f0 [ 22.645453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.645836] kthread+0x318/0x620 [ 22.646063] ret_from_fork+0x10/0x20 [ 22.646321] [ 22.646474] The buggy address belongs to the object at fff00000c6649400 [ 22.646474] which belongs to the cache kmalloc-128 of size 128 [ 22.646963] The buggy address is located 0 bytes inside of [ 22.646963] allocated 120-byte region [fff00000c6649400, fff00000c6649478) [ 22.647685] [ 22.647930] The buggy address belongs to the physical page: [ 22.648237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106649 [ 22.648532] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.649061] page_type: f5(slab) [ 22.649318] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.649734] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.650182] page dumped because: kasan: bad access detected [ 22.650452] [ 22.650643] Memory state around the buggy address: [ 22.650855] fff00000c6649300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.651252] fff00000c6649380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.651678] >fff00000c6649400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 22.652098] ^ [ 22.652494] fff00000c6649480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.652896] fff00000c6649500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.653272] ================================================================== [ 22.619314] ================================================================== [ 22.619712] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0 [ 22.620757] Write of size 121 at addr fff00000c6649400 by task kunit_try_catch/274 [ 22.621114] [ 22.621262] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.621362] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.621397] Hardware name: linux,dummy-virt (DT) [ 22.621436] Call trace: [ 22.621466] show_stack+0x20/0x38 (C) [ 22.621549] dump_stack_lvl+0x8c/0xd0 [ 22.621605] print_report+0x118/0x608 [ 22.621658] kasan_report+0xdc/0x128 [ 22.621711] kasan_check_range+0x100/0x1a8 [ 22.621785] __kasan_check_write+0x20/0x30 [ 22.621838] copy_user_test_oob+0x434/0xec0 [ 22.621892] kunit_try_run_case+0x170/0x3f0 [ 22.621943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.622001] kthread+0x318/0x620 [ 22.622051] ret_from_fork+0x10/0x20 [ 22.622119] [ 22.624887] Allocated by task 274: [ 22.625076] kasan_save_stack+0x3c/0x68 [ 22.625352] kasan_save_track+0x20/0x40 [ 22.625629] kasan_save_alloc_info+0x40/0x58 [ 22.625885] __kasan_kmalloc+0xd4/0xd8 [ 22.626139] __kmalloc_noprof+0x190/0x4d0 [ 22.626416] kunit_kmalloc_array+0x34/0x88 [ 22.626690] copy_user_test_oob+0xac/0xec0 [ 22.626906] kunit_try_run_case+0x170/0x3f0 [ 22.627121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.627566] kthread+0x318/0x620 [ 22.627862] ret_from_fork+0x10/0x20 [ 22.628093] [ 22.628280] The buggy address belongs to the object at fff00000c6649400 [ 22.628280] which belongs to the cache kmalloc-128 of size 128 [ 22.628767] The buggy address is located 0 bytes inside of [ 22.628767] allocated 120-byte region [fff00000c6649400, fff00000c6649478) [ 22.629187] [ 22.629375] The buggy address belongs to the physical page: [ 22.629780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106649 [ 22.630202] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.630615] page_type: f5(slab) [ 22.630847] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.631226] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.631693] page dumped because: kasan: bad access detected [ 22.631992] [ 22.632143] Memory state around the buggy address: [ 22.632359] fff00000c6649300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.632580] fff00000c6649380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.633122] >fff00000c6649400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 22.633482] ^ [ 22.634032] fff00000c6649480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.634422] fff00000c6649500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.634778] ================================================================== [ 22.583829] ================================================================== [ 22.584294] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0 [ 22.584762] Write of size 121 at addr fff00000c6649400 by task kunit_try_catch/274 [ 22.585086] [ 22.585283] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.585421] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.585458] Hardware name: linux,dummy-virt (DT) [ 22.585498] Call trace: [ 22.585530] show_stack+0x20/0x38 (C) [ 22.585591] dump_stack_lvl+0x8c/0xd0 [ 22.585665] print_report+0x118/0x608 [ 22.585728] kasan_report+0xdc/0x128 [ 22.585815] kasan_check_range+0x100/0x1a8 [ 22.585877] __kasan_check_write+0x20/0x30 [ 22.585934] copy_user_test_oob+0x35c/0xec0 [ 22.585989] kunit_try_run_case+0x170/0x3f0 [ 22.586042] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.586119] kthread+0x318/0x620 [ 22.586175] ret_from_fork+0x10/0x20 [ 22.586235] [ 22.590308] Allocated by task 274: [ 22.590667] kasan_save_stack+0x3c/0x68 [ 22.591090] kasan_save_track+0x20/0x40 [ 22.591344] kasan_save_alloc_info+0x40/0x58 [ 22.591699] __kasan_kmalloc+0xd4/0xd8 [ 22.591976] __kmalloc_noprof+0x190/0x4d0 [ 22.592194] kunit_kmalloc_array+0x34/0x88 [ 22.592555] copy_user_test_oob+0xac/0xec0 [ 22.592861] kunit_try_run_case+0x170/0x3f0 [ 22.593140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.593493] kthread+0x318/0x620 [ 22.593802] ret_from_fork+0x10/0x20 [ 22.594021] [ 22.594232] The buggy address belongs to the object at fff00000c6649400 [ 22.594232] which belongs to the cache kmalloc-128 of size 128 [ 22.594865] The buggy address is located 0 bytes inside of [ 22.594865] allocated 120-byte region [fff00000c6649400, fff00000c6649478) [ 22.595526] [ 22.595687] The buggy address belongs to the physical page: [ 22.596047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106649 [ 22.596502] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.596896] page_type: f5(slab) [ 22.597123] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.597479] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.597952] page dumped because: kasan: bad access detected [ 22.598265] [ 22.598461] Memory state around the buggy address: [ 22.598804] fff00000c6649300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.599209] fff00000c6649380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.599590] >fff00000c6649400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 22.600105] ^ [ 22.600455] fff00000c6649480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.600828] fff00000c6649500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.601205] ================================================================== [ 22.602360] ================================================================== [ 22.602695] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0 [ 22.603495] Read of size 121 at addr fff00000c6649400 by task kunit_try_catch/274 [ 22.604350] [ 22.604553] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.604669] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.604705] Hardware name: linux,dummy-virt (DT) [ 22.604758] Call trace: [ 22.604791] show_stack+0x20/0x38 (C) [ 22.604856] dump_stack_lvl+0x8c/0xd0 [ 22.604912] print_report+0x118/0x608 [ 22.604963] kasan_report+0xdc/0x128 [ 22.605012] kasan_check_range+0x100/0x1a8 [ 22.605063] __kasan_check_read+0x20/0x30 [ 22.605110] copy_user_test_oob+0x3c8/0xec0 [ 22.605160] kunit_try_run_case+0x170/0x3f0 [ 22.605208] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.605260] kthread+0x318/0x620 [ 22.605310] ret_from_fork+0x10/0x20 [ 22.605361] [ 22.608397] Allocated by task 274: [ 22.608600] kasan_save_stack+0x3c/0x68 [ 22.608851] kasan_save_track+0x20/0x40 [ 22.609188] kasan_save_alloc_info+0x40/0x58 [ 22.609490] __kasan_kmalloc+0xd4/0xd8 [ 22.609802] __kmalloc_noprof+0x190/0x4d0 [ 22.610090] kunit_kmalloc_array+0x34/0x88 [ 22.610379] copy_user_test_oob+0xac/0xec0 [ 22.610747] kunit_try_run_case+0x170/0x3f0 [ 22.611056] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.611345] kthread+0x318/0x620 [ 22.611637] ret_from_fork+0x10/0x20 [ 22.611893] [ 22.612051] The buggy address belongs to the object at fff00000c6649400 [ 22.612051] which belongs to the cache kmalloc-128 of size 128 [ 22.612648] The buggy address is located 0 bytes inside of [ 22.612648] allocated 120-byte region [fff00000c6649400, fff00000c6649478) [ 22.613151] [ 22.613340] The buggy address belongs to the physical page: [ 22.613668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106649 [ 22.614202] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.614555] page_type: f5(slab) [ 22.614874] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.615178] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.615483] page dumped because: kasan: bad access detected [ 22.615757] [ 22.615942] Memory state around the buggy address: [ 22.616204] fff00000c6649300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.616604] fff00000c6649380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.616956] >fff00000c6649400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 22.617245] ^ [ 22.617604] fff00000c6649480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.617967] fff00000c6649500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.618291] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 22.474291] ================================================================== [ 22.475511] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 22.476172] Read of size 8 at addr fff00000c5a05c78 by task kunit_try_catch/270 [ 22.476423] [ 22.476553] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.476659] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.476697] Hardware name: linux,dummy-virt (DT) [ 22.476810] Call trace: [ 22.476892] show_stack+0x20/0x38 (C) [ 22.476979] dump_stack_lvl+0x8c/0xd0 [ 22.477041] print_report+0x118/0x608 [ 22.477101] kasan_report+0xdc/0x128 [ 22.477158] __asan_report_load8_noabort+0x20/0x30 [ 22.477215] copy_to_kernel_nofault+0x204/0x250 [ 22.477276] copy_to_kernel_nofault_oob+0x158/0x418 [ 22.477335] kunit_try_run_case+0x170/0x3f0 [ 22.477395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.477455] kthread+0x318/0x620 [ 22.477510] ret_from_fork+0x10/0x20 [ 22.477566] [ 22.480834] Allocated by task 270: [ 22.481142] kasan_save_stack+0x3c/0x68 [ 22.481462] kasan_save_track+0x20/0x40 [ 22.481825] kasan_save_alloc_info+0x40/0x58 [ 22.482094] __kasan_kmalloc+0xd4/0xd8 [ 22.482320] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.482664] copy_to_kernel_nofault_oob+0xc8/0x418 [ 22.482970] kunit_try_run_case+0x170/0x3f0 [ 22.483348] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.483652] kthread+0x318/0x620 [ 22.483905] ret_from_fork+0x10/0x20 [ 22.484144] [ 22.484333] The buggy address belongs to the object at fff00000c5a05c00 [ 22.484333] which belongs to the cache kmalloc-128 of size 128 [ 22.484974] The buggy address is located 0 bytes to the right of [ 22.484974] allocated 120-byte region [fff00000c5a05c00, fff00000c5a05c78) [ 22.485556] [ 22.485757] The buggy address belongs to the physical page: [ 22.486092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a05 [ 22.486495] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.487051] page_type: f5(slab) [ 22.487296] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.487838] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.488332] page dumped because: kasan: bad access detected [ 22.488646] [ 22.488854] Memory state around the buggy address: [ 22.489145] fff00000c5a05b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.489571] fff00000c5a05b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.489953] >fff00000c5a05c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 22.490346] ^ [ 22.490759] fff00000c5a05c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.491300] fff00000c5a05d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.491622] ================================================================== [ 22.492953] ================================================================== [ 22.493390] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 22.493794] Write of size 8 at addr fff00000c5a05c78 by task kunit_try_catch/270 [ 22.494263] [ 22.494423] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.494560] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.494598] Hardware name: linux,dummy-virt (DT) [ 22.494641] Call trace: [ 22.494673] show_stack+0x20/0x38 (C) [ 22.494748] dump_stack_lvl+0x8c/0xd0 [ 22.494812] print_report+0x118/0x608 [ 22.494869] kasan_report+0xdc/0x128 [ 22.494925] kasan_check_range+0x100/0x1a8 [ 22.494983] __kasan_check_write+0x20/0x30 [ 22.495039] copy_to_kernel_nofault+0x8c/0x250 [ 22.495098] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 22.495157] kunit_try_run_case+0x170/0x3f0 [ 22.495214] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.495276] kthread+0x318/0x620 [ 22.495330] ret_from_fork+0x10/0x20 [ 22.495386] [ 22.498620] Allocated by task 270: [ 22.498816] kasan_save_stack+0x3c/0x68 [ 22.499184] kasan_save_track+0x20/0x40 [ 22.499407] kasan_save_alloc_info+0x40/0x58 [ 22.499681] __kasan_kmalloc+0xd4/0xd8 [ 22.499869] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.500250] copy_to_kernel_nofault_oob+0xc8/0x418 [ 22.500529] kunit_try_run_case+0x170/0x3f0 [ 22.500698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.501248] kthread+0x318/0x620 [ 22.501595] ret_from_fork+0x10/0x20 [ 22.501877] [ 22.501982] The buggy address belongs to the object at fff00000c5a05c00 [ 22.501982] which belongs to the cache kmalloc-128 of size 128 [ 22.502939] The buggy address is located 0 bytes to the right of [ 22.502939] allocated 120-byte region [fff00000c5a05c00, fff00000c5a05c78) [ 22.503453] [ 22.503710] The buggy address belongs to the physical page: [ 22.504110] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a05 [ 22.504594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.504988] page_type: f5(slab) [ 22.505216] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.505570] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.506060] page dumped because: kasan: bad access detected [ 22.506269] [ 22.506429] Memory state around the buggy address: [ 22.506709] fff00000c5a05b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.507103] fff00000c5a05b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.507342] >fff00000c5a05c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 22.508454] ^ [ 22.509098] fff00000c5a05c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.509542] fff00000c5a05d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.509994] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 22.416461] ================================================================== [ 22.416950] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 22.417463] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/258 [ 22.417967] [ 22.418129] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.418235] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.418271] Hardware name: linux,dummy-virt (DT) [ 22.418311] Call trace: [ 22.418340] show_stack+0x20/0x38 (C) [ 22.418399] dump_stack_lvl+0x8c/0xd0 [ 22.418457] print_report+0x310/0x608 [ 22.418527] kasan_report+0xdc/0x128 [ 22.418578] __asan_report_load1_noabort+0x20/0x30 [ 22.418633] vmalloc_oob+0x578/0x5d0 [ 22.418683] kunit_try_run_case+0x170/0x3f0 [ 22.418777] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.418844] kthread+0x318/0x620 [ 22.418934] ret_from_fork+0x10/0x20 [ 22.418993] [ 22.422523] The buggy address belongs to the virtual mapping at [ 22.422523] [ffff80008010b000, ffff80008010d000) created by: [ 22.422523] vmalloc_oob+0x98/0x5d0 [ 22.423262] [ 22.423464] The buggy address belongs to the physical page: [ 22.423915] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106717 [ 22.424354] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.424725] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 22.425167] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 22.425591] page dumped because: kasan: bad access detected [ 22.425881] [ 22.426094] Memory state around the buggy address: [ 22.426329] ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.427417] ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.427880] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 22.428261] ^ [ 22.428614] ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 22.428979] ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 22.429345] ================================================================== [ 22.431095] ================================================================== [ 22.431751] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 22.432194] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/258 [ 22.432566] [ 22.432696] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.432809] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.432861] Hardware name: linux,dummy-virt (DT) [ 22.432915] Call trace: [ 22.432951] show_stack+0x20/0x38 (C) [ 22.433027] dump_stack_lvl+0x8c/0xd0 [ 22.433099] print_report+0x310/0x608 [ 22.433169] kasan_report+0xdc/0x128 [ 22.433239] __asan_report_load1_noabort+0x20/0x30 [ 22.433311] vmalloc_oob+0x51c/0x5d0 [ 22.433363] kunit_try_run_case+0x170/0x3f0 [ 22.433417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.433477] kthread+0x318/0x620 [ 22.433529] ret_from_fork+0x10/0x20 [ 22.433585] [ 22.437301] The buggy address belongs to the virtual mapping at [ 22.437301] [ffff80008010b000, ffff80008010d000) created by: [ 22.437301] vmalloc_oob+0x98/0x5d0 [ 22.437911] [ 22.438113] The buggy address belongs to the physical page: [ 22.438460] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106717 [ 22.438975] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.439606] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 22.440039] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 22.440434] page dumped because: kasan: bad access detected [ 22.440774] [ 22.440959] Memory state around the buggy address: [ 22.441240] ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.441677] ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.442083] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 22.442332] ^ [ 22.442889] ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 22.443250] ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 22.443636] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 21.714017] ================================================================== [ 21.714339] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 21.714945] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.715407] [ 21.715621] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.715746] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.715788] Hardware name: linux,dummy-virt (DT) [ 21.715828] Call trace: [ 21.715857] show_stack+0x20/0x38 (C) [ 21.715916] dump_stack_lvl+0x8c/0xd0 [ 21.715990] print_report+0x118/0x608 [ 21.716044] kasan_report+0xdc/0x128 [ 21.716098] kasan_check_range+0x100/0x1a8 [ 21.716154] __kasan_check_write+0x20/0x30 [ 21.716220] kasan_atomics_helper+0xad4/0x4858 [ 21.716283] kasan_atomics+0x198/0x2e8 [ 21.716338] kunit_try_run_case+0x170/0x3f0 [ 21.716393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.716455] kthread+0x318/0x620 [ 21.716506] ret_from_fork+0x10/0x20 [ 21.716562] [ 21.720031] Allocated by task 254: [ 21.720364] kasan_save_stack+0x3c/0x68 [ 21.720713] kasan_save_track+0x20/0x40 [ 21.720993] kasan_save_alloc_info+0x40/0x58 [ 21.721360] __kasan_kmalloc+0xd4/0xd8 [ 21.721664] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.721976] kasan_atomics+0xb8/0x2e8 [ 21.722362] kunit_try_run_case+0x170/0x3f0 [ 21.722669] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.723031] kthread+0x318/0x620 [ 21.723252] ret_from_fork+0x10/0x20 [ 21.723499] [ 21.723707] The buggy address belongs to the object at fff00000c66ea700 [ 21.723707] which belongs to the cache kmalloc-64 of size 64 [ 21.724321] The buggy address is located 0 bytes to the right of [ 21.724321] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.725038] [ 21.725176] The buggy address belongs to the physical page: [ 21.725483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.726008] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.726412] page_type: f5(slab) [ 21.726773] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.727382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.727652] page dumped because: kasan: bad access detected [ 21.728054] [ 21.728363] Memory state around the buggy address: [ 21.728637] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.729038] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.729455] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.730243] ^ [ 21.730580] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.731082] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.731456] ================================================================== [ 21.301652] ================================================================== [ 21.301993] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 21.302269] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.302889] [ 21.303141] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.303248] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.303286] Hardware name: linux,dummy-virt (DT) [ 21.303343] Call trace: [ 21.303376] show_stack+0x20/0x38 (C) [ 21.303438] dump_stack_lvl+0x8c/0xd0 [ 21.303496] print_report+0x118/0x608 [ 21.303551] kasan_report+0xdc/0x128 [ 21.303606] kasan_check_range+0x100/0x1a8 [ 21.303663] __kasan_check_write+0x20/0x30 [ 21.303715] kasan_atomics_helper+0x24c/0x4858 [ 21.303785] kasan_atomics+0x198/0x2e8 [ 21.303839] kunit_try_run_case+0x170/0x3f0 [ 21.303893] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.303948] kthread+0x318/0x620 [ 21.303998] ret_from_fork+0x10/0x20 [ 21.304053] [ 21.307207] Allocated by task 254: [ 21.307505] kasan_save_stack+0x3c/0x68 [ 21.307758] kasan_save_track+0x20/0x40 [ 21.308024] kasan_save_alloc_info+0x40/0x58 [ 21.308233] __kasan_kmalloc+0xd4/0xd8 [ 21.308466] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.308643] kasan_atomics+0xb8/0x2e8 [ 21.308811] kunit_try_run_case+0x170/0x3f0 [ 21.309143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.309543] kthread+0x318/0x620 [ 21.309849] ret_from_fork+0x10/0x20 [ 21.310193] [ 21.310381] The buggy address belongs to the object at fff00000c66ea700 [ 21.310381] which belongs to the cache kmalloc-64 of size 64 [ 21.311141] The buggy address is located 0 bytes to the right of [ 21.311141] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.311679] [ 21.311870] The buggy address belongs to the physical page: [ 21.312184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.312504] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.312722] page_type: f5(slab) [ 21.313019] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.313487] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.313976] page dumped because: kasan: bad access detected [ 21.314254] [ 21.314392] Memory state around the buggy address: [ 21.314845] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.315229] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.315568] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.315878] ^ [ 21.316198] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.316611] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.316993] ================================================================== [ 22.271916] ================================================================== [ 22.272593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 22.273083] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.273409] [ 22.273633] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.274392] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.274447] Hardware name: linux,dummy-virt (DT) [ 22.274526] Call trace: [ 22.274560] show_stack+0x20/0x38 (C) [ 22.274629] dump_stack_lvl+0x8c/0xd0 [ 22.274687] print_report+0x118/0x608 [ 22.274764] kasan_report+0xdc/0x128 [ 22.274824] kasan_check_range+0x100/0x1a8 [ 22.274880] __kasan_check_write+0x20/0x30 [ 22.274935] kasan_atomics_helper+0x1644/0x4858 [ 22.274993] kasan_atomics+0x198/0x2e8 [ 22.275040] kunit_try_run_case+0x170/0x3f0 [ 22.275093] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.275149] kthread+0x318/0x620 [ 22.275195] ret_from_fork+0x10/0x20 [ 22.275249] [ 22.279516] Allocated by task 254: [ 22.280008] kasan_save_stack+0x3c/0x68 [ 22.280381] kasan_save_track+0x20/0x40 [ 22.280720] kasan_save_alloc_info+0x40/0x58 [ 22.281009] __kasan_kmalloc+0xd4/0xd8 [ 22.281249] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.281501] kasan_atomics+0xb8/0x2e8 [ 22.281743] kunit_try_run_case+0x170/0x3f0 [ 22.282001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.282366] kthread+0x318/0x620 [ 22.282591] ret_from_fork+0x10/0x20 [ 22.283291] [ 22.283415] The buggy address belongs to the object at fff00000c66ea700 [ 22.283415] which belongs to the cache kmalloc-64 of size 64 [ 22.284184] The buggy address is located 0 bytes to the right of [ 22.284184] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.284997] [ 22.285112] The buggy address belongs to the physical page: [ 22.285516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.286092] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.286479] page_type: f5(slab) [ 22.286651] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.287216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.287728] page dumped because: kasan: bad access detected [ 22.288142] [ 22.288366] Memory state around the buggy address: [ 22.288787] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.289285] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.289776] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.290249] ^ [ 22.290701] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.291196] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.291655] ================================================================== [ 21.384783] ================================================================== [ 21.385084] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 21.385473] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.386443] [ 21.386687] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.386865] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.386904] Hardware name: linux,dummy-virt (DT) [ 21.386942] Call trace: [ 21.386973] show_stack+0x20/0x38 (C) [ 21.387036] dump_stack_lvl+0x8c/0xd0 [ 21.387091] print_report+0x118/0x608 [ 21.387145] kasan_report+0xdc/0x128 [ 21.387196] kasan_check_range+0x100/0x1a8 [ 21.387251] __kasan_check_write+0x20/0x30 [ 21.387305] kasan_atomics_helper+0x3ac/0x4858 [ 21.387359] kasan_atomics+0x198/0x2e8 [ 21.387411] kunit_try_run_case+0x170/0x3f0 [ 21.387465] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.387523] kthread+0x318/0x620 [ 21.387573] ret_from_fork+0x10/0x20 [ 21.387630] [ 21.392601] Allocated by task 254: [ 21.392856] kasan_save_stack+0x3c/0x68 [ 21.393179] kasan_save_track+0x20/0x40 [ 21.393584] kasan_save_alloc_info+0x40/0x58 [ 21.393945] __kasan_kmalloc+0xd4/0xd8 [ 21.394193] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.394482] kasan_atomics+0xb8/0x2e8 [ 21.394734] kunit_try_run_case+0x170/0x3f0 [ 21.395441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.395855] kthread+0x318/0x620 [ 21.396105] ret_from_fork+0x10/0x20 [ 21.396394] [ 21.396604] The buggy address belongs to the object at fff00000c66ea700 [ 21.396604] which belongs to the cache kmalloc-64 of size 64 [ 21.397133] The buggy address is located 0 bytes to the right of [ 21.397133] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.397662] [ 21.397845] The buggy address belongs to the physical page: [ 21.398196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.398951] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.399301] page_type: f5(slab) [ 21.399572] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.399978] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.400340] page dumped because: kasan: bad access detected [ 21.400631] [ 21.400824] Memory state around the buggy address: [ 21.401062] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.401476] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.401873] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.402175] ^ [ 21.402455] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.402972] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.403652] ================================================================== [ 22.292766] ================================================================== [ 22.293054] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 22.293304] Read of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.293537] [ 22.293659] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.293786] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.293823] Hardware name: linux,dummy-virt (DT) [ 22.293864] Call trace: [ 22.293895] show_stack+0x20/0x38 (C) [ 22.293960] dump_stack_lvl+0x8c/0xd0 [ 22.294018] print_report+0x118/0x608 [ 22.294094] kasan_report+0xdc/0x128 [ 22.294157] __asan_report_load8_noabort+0x20/0x30 [ 22.294216] kasan_atomics_helper+0x3df4/0x4858 [ 22.294273] kasan_atomics+0x198/0x2e8 [ 22.294329] kunit_try_run_case+0x170/0x3f0 [ 22.294390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.294456] kthread+0x318/0x620 [ 22.294545] ret_from_fork+0x10/0x20 [ 22.294611] [ 22.297922] Allocated by task 254: [ 22.298214] kasan_save_stack+0x3c/0x68 [ 22.298462] kasan_save_track+0x20/0x40 [ 22.298687] kasan_save_alloc_info+0x40/0x58 [ 22.300714] __kasan_kmalloc+0xd4/0xd8 [ 22.301075] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.301499] kasan_atomics+0xb8/0x2e8 [ 22.301898] kunit_try_run_case+0x170/0x3f0 [ 22.302302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.302883] kthread+0x318/0x620 [ 22.303191] ret_from_fork+0x10/0x20 [ 22.303539] [ 22.303775] The buggy address belongs to the object at fff00000c66ea700 [ 22.303775] which belongs to the cache kmalloc-64 of size 64 [ 22.304561] The buggy address is located 0 bytes to the right of [ 22.304561] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.305106] [ 22.305280] The buggy address belongs to the physical page: [ 22.305464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.305721] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.305980] page_type: f5(slab) [ 22.306157] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.306406] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.306645] page dumped because: kasan: bad access detected [ 22.307013] [ 22.307246] Memory state around the buggy address: [ 22.307648] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.308102] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.308597] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.309144] ^ [ 22.309373] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.309707] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.309960] ================================================================== [ 21.284090] ================================================================== [ 21.284444] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 21.284984] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.285380] [ 21.285573] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.285680] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.285718] Hardware name: linux,dummy-virt (DT) [ 21.285769] Call trace: [ 21.285803] show_stack+0x20/0x38 (C) [ 21.285865] dump_stack_lvl+0x8c/0xd0 [ 21.285924] print_report+0x118/0x608 [ 21.285980] kasan_report+0xdc/0x128 [ 21.286031] kasan_check_range+0x100/0x1a8 [ 21.286100] __kasan_check_read+0x20/0x30 [ 21.286156] kasan_atomics_helper+0x1ec/0x4858 [ 21.286214] kasan_atomics+0x198/0x2e8 [ 21.286268] kunit_try_run_case+0x170/0x3f0 [ 21.286326] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.286387] kthread+0x318/0x620 [ 21.286440] ret_from_fork+0x10/0x20 [ 21.286515] [ 21.290397] Allocated by task 254: [ 21.290827] kasan_save_stack+0x3c/0x68 [ 21.291019] kasan_save_track+0x20/0x40 [ 21.291313] kasan_save_alloc_info+0x40/0x58 [ 21.291667] __kasan_kmalloc+0xd4/0xd8 [ 21.291898] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.292127] kasan_atomics+0xb8/0x2e8 [ 21.292293] kunit_try_run_case+0x170/0x3f0 [ 21.292460] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.292652] kthread+0x318/0x620 [ 21.292947] ret_from_fork+0x10/0x20 [ 21.293256] [ 21.293431] The buggy address belongs to the object at fff00000c66ea700 [ 21.293431] which belongs to the cache kmalloc-64 of size 64 [ 21.294077] The buggy address is located 0 bytes to the right of [ 21.294077] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.294821] [ 21.295076] The buggy address belongs to the physical page: [ 21.295267] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.295581] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.296091] page_type: f5(slab) [ 21.296272] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.296605] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.297030] page dumped because: kasan: bad access detected [ 21.297325] [ 21.297500] Memory state around the buggy address: [ 21.297755] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.298252] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.298788] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.299209] ^ [ 21.299561] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.299864] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.300343] ================================================================== [ 21.839905] ================================================================== [ 21.840377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 21.841052] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.841504] [ 21.841790] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.841893] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.841928] Hardware name: linux,dummy-virt (DT) [ 21.841967] Call trace: [ 21.841996] show_stack+0x20/0x38 (C) [ 21.842078] dump_stack_lvl+0x8c/0xd0 [ 21.842143] print_report+0x118/0x608 [ 21.842197] kasan_report+0xdc/0x128 [ 21.842253] __asan_report_load4_noabort+0x20/0x30 [ 21.842312] kasan_atomics_helper+0x3dd8/0x4858 [ 21.842366] kasan_atomics+0x198/0x2e8 [ 21.842420] kunit_try_run_case+0x170/0x3f0 [ 21.842475] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.843145] kthread+0x318/0x620 [ 21.843221] ret_from_fork+0x10/0x20 [ 21.843334] [ 21.846539] Allocated by task 254: [ 21.846840] kasan_save_stack+0x3c/0x68 [ 21.847105] kasan_save_track+0x20/0x40 [ 21.847339] kasan_save_alloc_info+0x40/0x58 [ 21.847647] __kasan_kmalloc+0xd4/0xd8 [ 21.847965] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.848254] kasan_atomics+0xb8/0x2e8 [ 21.848473] kunit_try_run_case+0x170/0x3f0 [ 21.848798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.849148] kthread+0x318/0x620 [ 21.849409] ret_from_fork+0x10/0x20 [ 21.849619] [ 21.849814] The buggy address belongs to the object at fff00000c66ea700 [ 21.849814] which belongs to the cache kmalloc-64 of size 64 [ 21.850365] The buggy address is located 0 bytes to the right of [ 21.850365] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.851009] [ 21.851122] The buggy address belongs to the physical page: [ 21.851538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.851937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.852425] page_type: f5(slab) [ 21.852592] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.852862] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.853101] page dumped because: kasan: bad access detected [ 21.853290] [ 21.853393] Memory state around the buggy address: [ 21.853567] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.853873] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.854399] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.854865] ^ [ 21.855226] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.855638] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.855946] ================================================================== [ 21.335233] ================================================================== [ 21.335557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 21.335931] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.336281] [ 21.336454] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.336559] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.336596] Hardware name: linux,dummy-virt (DT) [ 21.336636] Call trace: [ 21.336664] show_stack+0x20/0x38 (C) [ 21.336722] dump_stack_lvl+0x8c/0xd0 [ 21.336794] print_report+0x118/0x608 [ 21.336851] kasan_report+0xdc/0x128 [ 21.336904] __asan_report_load4_noabort+0x20/0x30 [ 21.336961] kasan_atomics_helper+0x40fc/0x4858 [ 21.337017] kasan_atomics+0x198/0x2e8 [ 21.337069] kunit_try_run_case+0x170/0x3f0 [ 21.337125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.337185] kthread+0x318/0x620 [ 21.337239] ret_from_fork+0x10/0x20 [ 21.337296] [ 21.340553] Allocated by task 254: [ 21.340751] kasan_save_stack+0x3c/0x68 [ 21.340921] kasan_save_track+0x20/0x40 [ 21.341239] kasan_save_alloc_info+0x40/0x58 [ 21.341571] __kasan_kmalloc+0xd4/0xd8 [ 21.341769] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.341945] kasan_atomics+0xb8/0x2e8 [ 21.342208] kunit_try_run_case+0x170/0x3f0 [ 21.342698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.343136] kthread+0x318/0x620 [ 21.343300] ret_from_fork+0x10/0x20 [ 21.343601] [ 21.343783] The buggy address belongs to the object at fff00000c66ea700 [ 21.343783] which belongs to the cache kmalloc-64 of size 64 [ 21.344288] The buggy address is located 0 bytes to the right of [ 21.344288] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.344787] [ 21.344959] The buggy address belongs to the physical page: [ 21.345310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.345831] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.346194] page_type: f5(slab) [ 21.346387] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.347049] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.347379] page dumped because: kasan: bad access detected [ 21.347615] [ 21.347796] Memory state around the buggy address: [ 21.348009] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.348342] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.348683] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.349056] ^ [ 21.349303] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.349627] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.349996] ================================================================== [ 21.461115] ================================================================== [ 21.461811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 21.462306] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.463118] [ 21.463982] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.464110] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.464148] Hardware name: linux,dummy-virt (DT) [ 21.464189] Call trace: [ 21.464221] show_stack+0x20/0x38 (C) [ 21.464293] dump_stack_lvl+0x8c/0xd0 [ 21.464351] print_report+0x118/0x608 [ 21.464410] kasan_report+0xdc/0x128 [ 21.464464] kasan_check_range+0x100/0x1a8 [ 21.464521] __kasan_check_write+0x20/0x30 [ 21.464575] kasan_atomics_helper+0x54c/0x4858 [ 21.464632] kasan_atomics+0x198/0x2e8 [ 21.464686] kunit_try_run_case+0x170/0x3f0 [ 21.464766] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.464830] kthread+0x318/0x620 [ 21.464883] ret_from_fork+0x10/0x20 [ 21.464939] [ 21.468648] Allocated by task 254: [ 21.469728] kasan_save_stack+0x3c/0x68 [ 21.470122] kasan_save_track+0x20/0x40 [ 21.470707] kasan_save_alloc_info+0x40/0x58 [ 21.471126] __kasan_kmalloc+0xd4/0xd8 [ 21.471603] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.472112] kasan_atomics+0xb8/0x2e8 [ 21.472475] kunit_try_run_case+0x170/0x3f0 [ 21.472861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.473289] kthread+0x318/0x620 [ 21.473621] ret_from_fork+0x10/0x20 [ 21.474027] [ 21.474206] The buggy address belongs to the object at fff00000c66ea700 [ 21.474206] which belongs to the cache kmalloc-64 of size 64 [ 21.475370] The buggy address is located 0 bytes to the right of [ 21.475370] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.476122] [ 21.476352] The buggy address belongs to the physical page: [ 21.476621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.476887] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.477118] page_type: f5(slab) [ 21.477598] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.478104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.478692] page dumped because: kasan: bad access detected [ 21.479243] [ 21.479516] Memory state around the buggy address: [ 21.479902] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.480247] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.480785] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.481286] ^ [ 21.481650] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.482088] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.482723] ================================================================== [ 22.083500] ================================================================== [ 22.083820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 22.084205] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.084525] [ 22.084708] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.084815] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.084850] Hardware name: linux,dummy-virt (DT) [ 22.084889] Call trace: [ 22.084917] show_stack+0x20/0x38 (C) [ 22.084975] dump_stack_lvl+0x8c/0xd0 [ 22.085029] print_report+0x118/0x608 [ 22.085084] kasan_report+0xdc/0x128 [ 22.085137] kasan_check_range+0x100/0x1a8 [ 22.085191] __kasan_check_write+0x20/0x30 [ 22.085243] kasan_atomics_helper+0x11f8/0x4858 [ 22.085299] kasan_atomics+0x198/0x2e8 [ 22.085349] kunit_try_run_case+0x170/0x3f0 [ 22.085404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.085463] kthread+0x318/0x620 [ 22.085512] ret_from_fork+0x10/0x20 [ 22.085568] [ 22.088420] Allocated by task 254: [ 22.088689] kasan_save_stack+0x3c/0x68 [ 22.088873] kasan_save_track+0x20/0x40 [ 22.089171] kasan_save_alloc_info+0x40/0x58 [ 22.089546] __kasan_kmalloc+0xd4/0xd8 [ 22.089844] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.090102] kasan_atomics+0xb8/0x2e8 [ 22.090412] kunit_try_run_case+0x170/0x3f0 [ 22.090652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.091051] kthread+0x318/0x620 [ 22.091248] ret_from_fork+0x10/0x20 [ 22.091573] [ 22.091753] The buggy address belongs to the object at fff00000c66ea700 [ 22.091753] which belongs to the cache kmalloc-64 of size 64 [ 22.092287] The buggy address is located 0 bytes to the right of [ 22.092287] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.092830] [ 22.093000] The buggy address belongs to the physical page: [ 22.093235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.093781] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.094120] page_type: f5(slab) [ 22.094417] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.094791] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.095287] page dumped because: kasan: bad access detected [ 22.095559] [ 22.095729] Memory state around the buggy address: [ 22.095935] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.096272] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.096644] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.096962] ^ [ 22.097238] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.097623] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.097939] ================================================================== [ 21.541450] ================================================================== [ 21.542789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 21.543063] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.543297] [ 21.543421] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.543522] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.543558] Hardware name: linux,dummy-virt (DT) [ 21.543596] Call trace: [ 21.543627] show_stack+0x20/0x38 (C) [ 21.543686] dump_stack_lvl+0x8c/0xd0 [ 21.543761] print_report+0x118/0x608 [ 21.543822] kasan_report+0xdc/0x128 [ 21.543876] kasan_check_range+0x100/0x1a8 [ 21.543933] __kasan_check_write+0x20/0x30 [ 21.543986] kasan_atomics_helper+0x6ec/0x4858 [ 21.544042] kasan_atomics+0x198/0x2e8 [ 21.544096] kunit_try_run_case+0x170/0x3f0 [ 21.544155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.544214] kthread+0x318/0x620 [ 21.544267] ret_from_fork+0x10/0x20 [ 21.544324] [ 21.548775] Allocated by task 254: [ 21.548983] kasan_save_stack+0x3c/0x68 [ 21.549222] kasan_save_track+0x20/0x40 [ 21.549431] kasan_save_alloc_info+0x40/0x58 [ 21.549648] __kasan_kmalloc+0xd4/0xd8 [ 21.551177] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.551416] kasan_atomics+0xb8/0x2e8 [ 21.551874] kunit_try_run_case+0x170/0x3f0 [ 21.552280] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.552573] kthread+0x318/0x620 [ 21.552787] ret_from_fork+0x10/0x20 [ 21.553023] [ 21.553175] The buggy address belongs to the object at fff00000c66ea700 [ 21.553175] which belongs to the cache kmalloc-64 of size 64 [ 21.553709] The buggy address is located 0 bytes to the right of [ 21.553709] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.554908] [ 21.555080] The buggy address belongs to the physical page: [ 21.555287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.555698] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.556193] page_type: f5(slab) [ 21.556513] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.556774] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.557406] page dumped because: kasan: bad access detected [ 21.557744] [ 21.557952] Memory state around the buggy address: [ 21.558318] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.558727] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.559325] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.559790] ^ [ 21.560097] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.560466] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.560958] ================================================================== [ 22.129603] ================================================================== [ 22.129907] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 22.130420] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.130815] [ 22.130996] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.131092] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.131127] Hardware name: linux,dummy-virt (DT) [ 22.131167] Call trace: [ 22.131195] show_stack+0x20/0x38 (C) [ 22.131254] dump_stack_lvl+0x8c/0xd0 [ 22.131308] print_report+0x118/0x608 [ 22.131362] kasan_report+0xdc/0x128 [ 22.131414] kasan_check_range+0x100/0x1a8 [ 22.131467] __kasan_check_write+0x20/0x30 [ 22.131519] kasan_atomics_helper+0x1384/0x4858 [ 22.131573] kasan_atomics+0x198/0x2e8 [ 22.131623] kunit_try_run_case+0x170/0x3f0 [ 22.131677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.131735] kthread+0x318/0x620 [ 22.131800] ret_from_fork+0x10/0x20 [ 22.131855] [ 22.134837] Allocated by task 254: [ 22.135134] kasan_save_stack+0x3c/0x68 [ 22.135323] kasan_save_track+0x20/0x40 [ 22.135574] kasan_save_alloc_info+0x40/0x58 [ 22.135882] __kasan_kmalloc+0xd4/0xd8 [ 22.136116] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.136440] kasan_atomics+0xb8/0x2e8 [ 22.136646] kunit_try_run_case+0x170/0x3f0 [ 22.136866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.137160] kthread+0x318/0x620 [ 22.137316] ret_from_fork+0x10/0x20 [ 22.137644] [ 22.137827] The buggy address belongs to the object at fff00000c66ea700 [ 22.137827] which belongs to the cache kmalloc-64 of size 64 [ 22.138300] The buggy address is located 0 bytes to the right of [ 22.138300] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.138925] [ 22.139094] The buggy address belongs to the physical page: [ 22.139352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.139707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.140021] page_type: f5(slab) [ 22.140260] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.140571] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.141064] page dumped because: kasan: bad access detected [ 22.141299] [ 22.141465] Memory state around the buggy address: [ 22.141668] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.142082] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.142468] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.142791] ^ [ 22.143085] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.143393] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.143733] ================================================================== [ 21.957142] ================================================================== [ 21.957599] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 21.957917] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.958322] [ 21.958543] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.958641] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.958695] Hardware name: linux,dummy-virt (DT) [ 21.958734] Call trace: [ 21.958775] show_stack+0x20/0x38 (C) [ 21.958849] dump_stack_lvl+0x8c/0xd0 [ 21.958902] print_report+0x118/0x608 [ 21.958955] kasan_report+0xdc/0x128 [ 21.959006] kasan_check_range+0x100/0x1a8 [ 21.959060] __kasan_check_write+0x20/0x30 [ 21.959135] kasan_atomics_helper+0xeb8/0x4858 [ 21.959189] kasan_atomics+0x198/0x2e8 [ 21.959254] kunit_try_run_case+0x170/0x3f0 [ 21.959306] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.959364] kthread+0x318/0x620 [ 21.959411] ret_from_fork+0x10/0x20 [ 21.959461] [ 21.962763] Allocated by task 254: [ 21.963087] kasan_save_stack+0x3c/0x68 [ 21.963328] kasan_save_track+0x20/0x40 [ 21.963557] kasan_save_alloc_info+0x40/0x58 [ 21.963938] __kasan_kmalloc+0xd4/0xd8 [ 21.964180] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.964411] kasan_atomics+0xb8/0x2e8 [ 21.964649] kunit_try_run_case+0x170/0x3f0 [ 21.964893] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.965183] kthread+0x318/0x620 [ 21.965387] ret_from_fork+0x10/0x20 [ 21.965614] [ 21.965731] The buggy address belongs to the object at fff00000c66ea700 [ 21.965731] which belongs to the cache kmalloc-64 of size 64 [ 21.966851] The buggy address is located 0 bytes to the right of [ 21.966851] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.967279] [ 21.967453] The buggy address belongs to the physical page: [ 21.967708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.968461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.968790] page_type: f5(slab) [ 21.969191] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.969715] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.970205] page dumped because: kasan: bad access detected [ 21.970619] [ 21.970858] Memory state around the buggy address: [ 21.971262] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.971751] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.972240] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.972694] ^ [ 21.973084] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.973447] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.973764] ================================================================== [ 21.245549] ================================================================== [ 21.246219] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 21.246964] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.247804] [ 21.247945] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.248049] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.248080] Hardware name: linux,dummy-virt (DT) [ 21.248120] Call trace: [ 21.248148] show_stack+0x20/0x38 (C) [ 21.248216] dump_stack_lvl+0x8c/0xd0 [ 21.248274] print_report+0x118/0x608 [ 21.248329] kasan_report+0xdc/0x128 [ 21.248378] __asan_report_load4_noabort+0x20/0x30 [ 21.248432] kasan_atomics_helper+0x40a8/0x4858 [ 21.248485] kasan_atomics+0x198/0x2e8 [ 21.248533] kunit_try_run_case+0x170/0x3f0 [ 21.248586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.248641] kthread+0x318/0x620 [ 21.248691] ret_from_fork+0x10/0x20 [ 21.248767] [ 21.253605] Allocated by task 254: [ 21.253822] kasan_save_stack+0x3c/0x68 [ 21.254225] kasan_save_track+0x20/0x40 [ 21.254503] kasan_save_alloc_info+0x40/0x58 [ 21.255052] __kasan_kmalloc+0xd4/0xd8 [ 21.255289] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.255559] kasan_atomics+0xb8/0x2e8 [ 21.255865] kunit_try_run_case+0x170/0x3f0 [ 21.256135] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.256469] kthread+0x318/0x620 [ 21.256694] ret_from_fork+0x10/0x20 [ 21.256892] [ 21.257087] The buggy address belongs to the object at fff00000c66ea700 [ 21.257087] which belongs to the cache kmalloc-64 of size 64 [ 21.257658] The buggy address is located 0 bytes to the right of [ 21.257658] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.258332] [ 21.258625] The buggy address belongs to the physical page: [ 21.258874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.259537] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.259837] page_type: f5(slab) [ 21.260185] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.260711] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.261153] page dumped because: kasan: bad access detected [ 21.261486] [ 21.261698] Memory state around the buggy address: [ 21.262073] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.262767] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.263267] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.263689] ^ [ 21.264001] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.264475] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.264909] ================================================================== [ 21.991890] ================================================================== [ 21.992294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 21.992825] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.993260] [ 21.993459] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.993576] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.993612] Hardware name: linux,dummy-virt (DT) [ 21.993652] Call trace: [ 21.993680] show_stack+0x20/0x38 (C) [ 21.993746] dump_stack_lvl+0x8c/0xd0 [ 21.993808] print_report+0x118/0x608 [ 21.993877] kasan_report+0xdc/0x128 [ 21.993939] kasan_check_range+0x100/0x1a8 [ 21.993996] __kasan_check_write+0x20/0x30 [ 21.994047] kasan_atomics_helper+0xf88/0x4858 [ 21.994115] kasan_atomics+0x198/0x2e8 [ 21.994168] kunit_try_run_case+0x170/0x3f0 [ 21.994223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.994280] kthread+0x318/0x620 [ 21.994329] ret_from_fork+0x10/0x20 [ 21.994386] [ 21.997370] Allocated by task 254: [ 21.997515] kasan_save_stack+0x3c/0x68 [ 21.997700] kasan_save_track+0x20/0x40 [ 21.998072] kasan_save_alloc_info+0x40/0x58 [ 21.998387] __kasan_kmalloc+0xd4/0xd8 [ 21.998550] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.998957] kasan_atomics+0xb8/0x2e8 [ 21.999313] kunit_try_run_case+0x170/0x3f0 [ 21.999510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.999876] kthread+0x318/0x620 [ 22.000180] ret_from_fork+0x10/0x20 [ 22.000479] [ 22.000666] The buggy address belongs to the object at fff00000c66ea700 [ 22.000666] which belongs to the cache kmalloc-64 of size 64 [ 22.001120] The buggy address is located 0 bytes to the right of [ 22.001120] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.001763] [ 22.001892] The buggy address belongs to the physical page: [ 22.002348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.002775] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.003083] page_type: f5(slab) [ 22.003317] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.003775] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.004066] page dumped because: kasan: bad access detected [ 22.004403] [ 22.004568] Memory state around the buggy address: [ 22.004854] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.005213] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.005638] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.005968] ^ [ 22.006335] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.006690] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.007063] ================================================================== [ 22.160588] ================================================================== [ 22.161112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 22.161547] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.161870] [ 22.162105] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.162208] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.162243] Hardware name: linux,dummy-virt (DT) [ 22.162283] Call trace: [ 22.162312] show_stack+0x20/0x38 (C) [ 22.162372] dump_stack_lvl+0x8c/0xd0 [ 22.162435] print_report+0x118/0x608 [ 22.162491] kasan_report+0xdc/0x128 [ 22.162998] kasan_check_range+0x100/0x1a8 [ 22.163062] __kasan_check_write+0x20/0x30 [ 22.163118] kasan_atomics_helper+0x1414/0x4858 [ 22.163177] kasan_atomics+0x198/0x2e8 [ 22.163230] kunit_try_run_case+0x170/0x3f0 [ 22.163294] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.163354] kthread+0x318/0x620 [ 22.163404] ret_from_fork+0x10/0x20 [ 22.163461] [ 22.167878] Allocated by task 254: [ 22.168268] kasan_save_stack+0x3c/0x68 [ 22.168642] kasan_save_track+0x20/0x40 [ 22.169073] kasan_save_alloc_info+0x40/0x58 [ 22.169310] __kasan_kmalloc+0xd4/0xd8 [ 22.169537] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.169842] kasan_atomics+0xb8/0x2e8 [ 22.170084] kunit_try_run_case+0x170/0x3f0 [ 22.170343] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.170617] kthread+0x318/0x620 [ 22.170847] ret_from_fork+0x10/0x20 [ 22.171017] [ 22.171125] The buggy address belongs to the object at fff00000c66ea700 [ 22.171125] which belongs to the cache kmalloc-64 of size 64 [ 22.171982] The buggy address is located 0 bytes to the right of [ 22.171982] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.172540] [ 22.172752] The buggy address belongs to the physical page: [ 22.173268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.173755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.174171] page_type: f5(slab) [ 22.174445] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.174867] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.175103] page dumped because: kasan: bad access detected [ 22.175289] [ 22.175393] Memory state around the buggy address: [ 22.175570] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.175826] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.176054] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.176274] ^ [ 22.176458] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.176686] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.177247] ================================================================== [ 21.749570] ================================================================== [ 21.749914] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 21.750458] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.750962] [ 21.751134] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.751250] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.751287] Hardware name: linux,dummy-virt (DT) [ 21.751325] Call trace: [ 21.751353] show_stack+0x20/0x38 (C) [ 21.751410] dump_stack_lvl+0x8c/0xd0 [ 21.751465] print_report+0x118/0x608 [ 21.751517] kasan_report+0xdc/0x128 [ 21.751593] kasan_check_range+0x100/0x1a8 [ 21.751649] __kasan_check_write+0x20/0x30 [ 21.751704] kasan_atomics_helper+0xb70/0x4858 [ 21.751788] kasan_atomics+0x198/0x2e8 [ 21.751843] kunit_try_run_case+0x170/0x3f0 [ 21.751899] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.751958] kthread+0x318/0x620 [ 21.752011] ret_from_fork+0x10/0x20 [ 21.752067] [ 21.755262] Allocated by task 254: [ 21.755509] kasan_save_stack+0x3c/0x68 [ 21.755872] kasan_save_track+0x20/0x40 [ 21.756174] kasan_save_alloc_info+0x40/0x58 [ 21.756344] __kasan_kmalloc+0xd4/0xd8 [ 21.756721] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.757158] kasan_atomics+0xb8/0x2e8 [ 21.757434] kunit_try_run_case+0x170/0x3f0 [ 21.757642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.758139] kthread+0x318/0x620 [ 21.758385] ret_from_fork+0x10/0x20 [ 21.758622] [ 21.758855] The buggy address belongs to the object at fff00000c66ea700 [ 21.758855] which belongs to the cache kmalloc-64 of size 64 [ 21.759466] The buggy address is located 0 bytes to the right of [ 21.759466] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.760114] [ 21.760303] The buggy address belongs to the physical page: [ 21.760589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.761120] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.761537] page_type: f5(slab) [ 21.761781] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.762243] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.762731] page dumped because: kasan: bad access detected [ 21.763061] [ 21.763211] Memory state around the buggy address: [ 21.763498] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.763897] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.764317] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.764726] ^ [ 21.764989] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.765349] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.765774] ================================================================== [ 21.820799] ================================================================== [ 21.821570] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 21.822256] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.823023] [ 21.823557] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.823669] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.823708] Hardware name: linux,dummy-virt (DT) [ 21.823787] Call trace: [ 21.823824] show_stack+0x20/0x38 (C) [ 21.823903] dump_stack_lvl+0x8c/0xd0 [ 21.823960] print_report+0x118/0x608 [ 21.824014] kasan_report+0xdc/0x128 [ 21.824068] kasan_check_range+0x100/0x1a8 [ 21.824123] __kasan_check_write+0x20/0x30 [ 21.824177] kasan_atomics_helper+0xca0/0x4858 [ 21.824232] kasan_atomics+0x198/0x2e8 [ 21.824284] kunit_try_run_case+0x170/0x3f0 [ 21.824340] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.824402] kthread+0x318/0x620 [ 21.824454] ret_from_fork+0x10/0x20 [ 21.824509] [ 21.828105] Allocated by task 254: [ 21.828314] kasan_save_stack+0x3c/0x68 [ 21.828537] kasan_save_track+0x20/0x40 [ 21.829460] kasan_save_alloc_info+0x40/0x58 [ 21.829831] __kasan_kmalloc+0xd4/0xd8 [ 21.830023] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.830371] kasan_atomics+0xb8/0x2e8 [ 21.830619] kunit_try_run_case+0x170/0x3f0 [ 21.830991] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.831332] kthread+0x318/0x620 [ 21.831556] ret_from_fork+0x10/0x20 [ 21.831784] [ 21.831988] The buggy address belongs to the object at fff00000c66ea700 [ 21.831988] which belongs to the cache kmalloc-64 of size 64 [ 21.832584] The buggy address is located 0 bytes to the right of [ 21.832584] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.833269] [ 21.833418] The buggy address belongs to the physical page: [ 21.833684] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.834170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.834660] page_type: f5(slab) [ 21.834858] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.835362] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.835767] page dumped because: kasan: bad access detected [ 21.836074] [ 21.836232] Memory state around the buggy address: [ 21.836578] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.836968] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.837390] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.837817] ^ [ 21.838092] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.838439] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.838895] ================================================================== [ 22.198395] ================================================================== [ 22.198734] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 22.199033] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.199288] [ 22.199458] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.199567] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.199604] Hardware name: linux,dummy-virt (DT) [ 22.199644] Call trace: [ 22.199676] show_stack+0x20/0x38 (C) [ 22.199822] dump_stack_lvl+0x8c/0xd0 [ 22.200237] print_report+0x118/0x608 [ 22.200301] kasan_report+0xdc/0x128 [ 22.200357] kasan_check_range+0x100/0x1a8 [ 22.200414] __kasan_check_write+0x20/0x30 [ 22.200466] kasan_atomics_helper+0x14e4/0x4858 [ 22.200523] kasan_atomics+0x198/0x2e8 [ 22.200579] kunit_try_run_case+0x170/0x3f0 [ 22.200635] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.200695] kthread+0x318/0x620 [ 22.200769] ret_from_fork+0x10/0x20 [ 22.200831] [ 22.205586] Allocated by task 254: [ 22.205921] kasan_save_stack+0x3c/0x68 [ 22.206403] kasan_save_track+0x20/0x40 [ 22.206603] kasan_save_alloc_info+0x40/0x58 [ 22.207094] __kasan_kmalloc+0xd4/0xd8 [ 22.207612] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.208006] kasan_atomics+0xb8/0x2e8 [ 22.208349] kunit_try_run_case+0x170/0x3f0 [ 22.208599] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.209126] kthread+0x318/0x620 [ 22.209449] ret_from_fork+0x10/0x20 [ 22.209692] [ 22.209963] The buggy address belongs to the object at fff00000c66ea700 [ 22.209963] which belongs to the cache kmalloc-64 of size 64 [ 22.210804] The buggy address is located 0 bytes to the right of [ 22.210804] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.211652] [ 22.211982] The buggy address belongs to the physical page: [ 22.212285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.212765] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.213117] page_type: f5(slab) [ 22.213435] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.213809] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.214319] page dumped because: kasan: bad access detected [ 22.214659] [ 22.214814] Memory state around the buggy address: [ 22.215086] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.215573] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.216043] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.216384] ^ [ 22.216652] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.217050] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.217440] ================================================================== [ 22.329227] ================================================================== [ 22.329606] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 22.330581] Read of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.330947] [ 22.331088] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.331189] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.331226] Hardware name: linux,dummy-virt (DT) [ 22.331266] Call trace: [ 22.331296] show_stack+0x20/0x38 (C) [ 22.331357] dump_stack_lvl+0x8c/0xd0 [ 22.331414] print_report+0x118/0x608 [ 22.331468] kasan_report+0xdc/0x128 [ 22.331521] __asan_report_load8_noabort+0x20/0x30 [ 22.331577] kasan_atomics_helper+0x3e10/0x4858 [ 22.331633] kasan_atomics+0x198/0x2e8 [ 22.331684] kunit_try_run_case+0x170/0x3f0 [ 22.331752] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.331817] kthread+0x318/0x620 [ 22.331871] ret_from_fork+0x10/0x20 [ 22.331929] [ 22.334935] Allocated by task 254: [ 22.335258] kasan_save_stack+0x3c/0x68 [ 22.335640] kasan_save_track+0x20/0x40 [ 22.335890] kasan_save_alloc_info+0x40/0x58 [ 22.336188] __kasan_kmalloc+0xd4/0xd8 [ 22.336538] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.336724] kasan_atomics+0xb8/0x2e8 [ 22.337089] kunit_try_run_case+0x170/0x3f0 [ 22.337470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.337763] kthread+0x318/0x620 [ 22.337997] ret_from_fork+0x10/0x20 [ 22.338274] [ 22.338462] The buggy address belongs to the object at fff00000c66ea700 [ 22.338462] which belongs to the cache kmalloc-64 of size 64 [ 22.339022] The buggy address is located 0 bytes to the right of [ 22.339022] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.339700] [ 22.339851] The buggy address belongs to the physical page: [ 22.340191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.340619] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.340956] page_type: f5(slab) [ 22.341280] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.341613] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.342124] page dumped because: kasan: bad access detected [ 22.342496] [ 22.342673] Memory state around the buggy address: [ 22.342982] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.343304] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.343783] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.344175] ^ [ 22.344451] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.344850] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.345232] ================================================================== [ 22.068029] ================================================================== [ 22.068412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 22.068648] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.069284] [ 22.069405] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.069497] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.069534] Hardware name: linux,dummy-virt (DT) [ 22.069572] Call trace: [ 22.069600] show_stack+0x20/0x38 (C) [ 22.069656] dump_stack_lvl+0x8c/0xd0 [ 22.069710] print_report+0x118/0x608 [ 22.069775] kasan_report+0xdc/0x128 [ 22.069831] kasan_check_range+0x100/0x1a8 [ 22.069888] __kasan_check_write+0x20/0x30 [ 22.069941] kasan_atomics_helper+0x1190/0x4858 [ 22.069996] kasan_atomics+0x198/0x2e8 [ 22.070049] kunit_try_run_case+0x170/0x3f0 [ 22.070117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.070180] kthread+0x318/0x620 [ 22.070232] ret_from_fork+0x10/0x20 [ 22.070287] [ 22.073640] Allocated by task 254: [ 22.073842] kasan_save_stack+0x3c/0x68 [ 22.074017] kasan_save_track+0x20/0x40 [ 22.074196] kasan_save_alloc_info+0x40/0x58 [ 22.074580] __kasan_kmalloc+0xd4/0xd8 [ 22.074909] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.075087] kasan_atomics+0xb8/0x2e8 [ 22.075422] kunit_try_run_case+0x170/0x3f0 [ 22.075808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.076077] kthread+0x318/0x620 [ 22.076294] ret_from_fork+0x10/0x20 [ 22.076514] [ 22.076681] The buggy address belongs to the object at fff00000c66ea700 [ 22.076681] which belongs to the cache kmalloc-64 of size 64 [ 22.077193] The buggy address is located 0 bytes to the right of [ 22.077193] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.077616] [ 22.077721] The buggy address belongs to the physical page: [ 22.078162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.078584] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.078947] page_type: f5(slab) [ 22.079147] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.079514] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.079778] page dumped because: kasan: bad access detected [ 22.080148] [ 22.080317] Memory state around the buggy address: [ 22.080623] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.080906] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.081408] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.081728] ^ [ 22.081984] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.082417] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.082719] ================================================================== [ 21.678232] ================================================================== [ 21.678824] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 21.679250] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.679727] [ 21.679956] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.680051] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.680091] Hardware name: linux,dummy-virt (DT) [ 21.680130] Call trace: [ 21.680157] show_stack+0x20/0x38 (C) [ 21.680213] dump_stack_lvl+0x8c/0xd0 [ 21.680264] print_report+0x118/0x608 [ 21.680315] kasan_report+0xdc/0x128 [ 21.680365] kasan_check_range+0x100/0x1a8 [ 21.680416] __kasan_check_write+0x20/0x30 [ 21.680465] kasan_atomics_helper+0xa04/0x4858 [ 21.680516] kasan_atomics+0x198/0x2e8 [ 21.680563] kunit_try_run_case+0x170/0x3f0 [ 21.680613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.680666] kthread+0x318/0x620 [ 21.680748] ret_from_fork+0x10/0x20 [ 21.680806] [ 21.684079] Allocated by task 254: [ 21.684509] kasan_save_stack+0x3c/0x68 [ 21.684734] kasan_save_track+0x20/0x40 [ 21.684909] kasan_save_alloc_info+0x40/0x58 [ 21.685324] __kasan_kmalloc+0xd4/0xd8 [ 21.685768] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.685995] kasan_atomics+0xb8/0x2e8 [ 21.686214] kunit_try_run_case+0x170/0x3f0 [ 21.686611] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.686954] kthread+0x318/0x620 [ 21.687224] ret_from_fork+0x10/0x20 [ 21.687561] [ 21.687802] The buggy address belongs to the object at fff00000c66ea700 [ 21.687802] which belongs to the cache kmalloc-64 of size 64 [ 21.688304] The buggy address is located 0 bytes to the right of [ 21.688304] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.689111] [ 21.689308] The buggy address belongs to the physical page: [ 21.689681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.690297] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.690826] page_type: f5(slab) [ 21.691023] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.691525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.691911] page dumped because: kasan: bad access detected [ 21.692323] [ 21.692496] Memory state around the buggy address: [ 21.692791] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.693291] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.693639] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.694024] ^ [ 21.694311] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.694712] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.695245] ================================================================== [ 21.483624] ================================================================== [ 21.483940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 21.484267] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.484568] [ 21.484718] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.484929] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.484969] Hardware name: linux,dummy-virt (DT) [ 21.485010] Call trace: [ 21.485042] show_stack+0x20/0x38 (C) [ 21.485115] dump_stack_lvl+0x8c/0xd0 [ 21.485176] print_report+0x118/0x608 [ 21.485233] kasan_report+0xdc/0x128 [ 21.485286] kasan_check_range+0x100/0x1a8 [ 21.485345] __kasan_check_write+0x20/0x30 [ 21.485397] kasan_atomics_helper+0x5b4/0x4858 [ 21.485453] kasan_atomics+0x198/0x2e8 [ 21.485506] kunit_try_run_case+0x170/0x3f0 [ 21.485560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.485619] kthread+0x318/0x620 [ 21.485672] ret_from_fork+0x10/0x20 [ 21.485729] [ 21.489535] Allocated by task 254: [ 21.489911] kasan_save_stack+0x3c/0x68 [ 21.490144] kasan_save_track+0x20/0x40 [ 21.490778] kasan_save_alloc_info+0x40/0x58 [ 21.491179] __kasan_kmalloc+0xd4/0xd8 [ 21.491417] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.491676] kasan_atomics+0xb8/0x2e8 [ 21.491908] kunit_try_run_case+0x170/0x3f0 [ 21.492158] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.492446] kthread+0x318/0x620 [ 21.492660] ret_from_fork+0x10/0x20 [ 21.492991] [ 21.493147] The buggy address belongs to the object at fff00000c66ea700 [ 21.493147] which belongs to the cache kmalloc-64 of size 64 [ 21.493478] The buggy address is located 0 bytes to the right of [ 21.493478] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.493836] [ 21.493951] The buggy address belongs to the physical page: [ 21.494159] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.494436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.495328] page_type: f5(slab) [ 21.495571] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.495945] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.496252] page dumped because: kasan: bad access detected [ 21.496510] [ 21.496641] Memory state around the buggy address: [ 21.497735] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.498167] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.498745] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.499142] ^ [ 21.499517] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.500141] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.500449] ================================================================== [ 21.561994] ================================================================== [ 21.562346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 21.564002] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.564542] [ 21.564713] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.564867] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.564905] Hardware name: linux,dummy-virt (DT) [ 21.564946] Call trace: [ 21.564977] show_stack+0x20/0x38 (C) [ 21.565066] dump_stack_lvl+0x8c/0xd0 [ 21.565126] print_report+0x118/0x608 [ 21.565181] kasan_report+0xdc/0x128 [ 21.565235] kasan_check_range+0x100/0x1a8 [ 21.565291] __kasan_check_write+0x20/0x30 [ 21.565343] kasan_atomics_helper+0x760/0x4858 [ 21.565399] kasan_atomics+0x198/0x2e8 [ 21.565451] kunit_try_run_case+0x170/0x3f0 [ 21.565506] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.565566] kthread+0x318/0x620 [ 21.565620] ret_from_fork+0x10/0x20 [ 21.565679] [ 21.569565] Allocated by task 254: [ 21.569845] kasan_save_stack+0x3c/0x68 [ 21.570281] kasan_save_track+0x20/0x40 [ 21.570557] kasan_save_alloc_info+0x40/0x58 [ 21.570939] __kasan_kmalloc+0xd4/0xd8 [ 21.571284] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.571514] kasan_atomics+0xb8/0x2e8 [ 21.572503] kunit_try_run_case+0x170/0x3f0 [ 21.572780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.573215] kthread+0x318/0x620 [ 21.573506] ret_from_fork+0x10/0x20 [ 21.573805] [ 21.574046] The buggy address belongs to the object at fff00000c66ea700 [ 21.574046] which belongs to the cache kmalloc-64 of size 64 [ 21.574966] The buggy address is located 0 bytes to the right of [ 21.574966] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.575409] [ 21.575754] The buggy address belongs to the physical page: [ 21.576252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.576510] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.577015] page_type: f5(slab) [ 21.577227] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.577707] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.578222] page dumped because: kasan: bad access detected [ 21.578556] [ 21.578766] Memory state around the buggy address: [ 21.579038] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.579512] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.579905] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.580354] ^ [ 21.580744] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.581149] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.581525] ================================================================== [ 21.659312] ================================================================== [ 21.659993] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 21.660354] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.660823] [ 21.661065] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.661169] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.661225] Hardware name: linux,dummy-virt (DT) [ 21.661270] Call trace: [ 21.661299] show_stack+0x20/0x38 (C) [ 21.661361] dump_stack_lvl+0x8c/0xd0 [ 21.661418] print_report+0x118/0x608 [ 21.661499] kasan_report+0xdc/0x128 [ 21.661554] kasan_check_range+0x100/0x1a8 [ 21.661633] __kasan_check_write+0x20/0x30 [ 21.661689] kasan_atomics_helper+0x99c/0x4858 [ 21.661755] kasan_atomics+0x198/0x2e8 [ 21.661813] kunit_try_run_case+0x170/0x3f0 [ 21.661866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.661924] kthread+0x318/0x620 [ 21.661976] ret_from_fork+0x10/0x20 [ 21.662034] [ 21.666853] Allocated by task 254: [ 21.667275] kasan_save_stack+0x3c/0x68 [ 21.667521] kasan_save_track+0x20/0x40 [ 21.667754] kasan_save_alloc_info+0x40/0x58 [ 21.667933] __kasan_kmalloc+0xd4/0xd8 [ 21.668091] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.668517] kasan_atomics+0xb8/0x2e8 [ 21.668876] kunit_try_run_case+0x170/0x3f0 [ 21.669278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.669536] kthread+0x318/0x620 [ 21.669786] ret_from_fork+0x10/0x20 [ 21.669941] [ 21.670106] The buggy address belongs to the object at fff00000c66ea700 [ 21.670106] which belongs to the cache kmalloc-64 of size 64 [ 21.670940] The buggy address is located 0 bytes to the right of [ 21.670940] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.671399] [ 21.671598] The buggy address belongs to the physical page: [ 21.672085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.672639] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.672874] page_type: f5(slab) [ 21.673194] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.673617] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.674080] page dumped because: kasan: bad access detected [ 21.674421] [ 21.674629] Memory state around the buggy address: [ 21.674923] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.675314] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.675731] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.676149] ^ [ 21.676429] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.676869] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.677298] ================================================================== [ 21.404753] ================================================================== [ 21.405137] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 21.405491] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.405922] [ 21.406131] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.406254] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.406295] Hardware name: linux,dummy-virt (DT) [ 21.406346] Call trace: [ 21.406380] show_stack+0x20/0x38 (C) [ 21.406441] dump_stack_lvl+0x8c/0xd0 [ 21.406678] print_report+0x118/0x608 [ 21.407315] kasan_report+0xdc/0x128 [ 21.407381] kasan_check_range+0x100/0x1a8 [ 21.407439] __kasan_check_write+0x20/0x30 [ 21.407489] kasan_atomics_helper+0x414/0x4858 [ 21.407545] kasan_atomics+0x198/0x2e8 [ 21.407597] kunit_try_run_case+0x170/0x3f0 [ 21.407650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.407705] kthread+0x318/0x620 [ 21.407780] ret_from_fork+0x10/0x20 [ 21.407839] [ 21.410868] Allocated by task 254: [ 21.411192] kasan_save_stack+0x3c/0x68 [ 21.411490] kasan_save_track+0x20/0x40 [ 21.412019] kasan_save_alloc_info+0x40/0x58 [ 21.412309] __kasan_kmalloc+0xd4/0xd8 [ 21.412578] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.412943] kasan_atomics+0xb8/0x2e8 [ 21.413257] kunit_try_run_case+0x170/0x3f0 [ 21.413544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.413813] kthread+0x318/0x620 [ 21.414130] ret_from_fork+0x10/0x20 [ 21.414400] [ 21.414645] The buggy address belongs to the object at fff00000c66ea700 [ 21.414645] which belongs to the cache kmalloc-64 of size 64 [ 21.415371] The buggy address is located 0 bytes to the right of [ 21.415371] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.415940] [ 21.416117] The buggy address belongs to the physical page: [ 21.416427] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.416873] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.417237] page_type: f5(slab) [ 21.417413] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.417684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.418141] page dumped because: kasan: bad access detected [ 21.418448] [ 21.418715] Memory state around the buggy address: [ 21.419069] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.419429] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.419843] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.420213] ^ [ 21.420503] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.420816] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.421215] ================================================================== [ 22.022421] ================================================================== [ 22.022690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 22.023236] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.023493] [ 22.023703] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.023822] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.023859] Hardware name: linux,dummy-virt (DT) [ 22.023898] Call trace: [ 22.023928] show_stack+0x20/0x38 (C) [ 22.023984] dump_stack_lvl+0x8c/0xd0 [ 22.024039] print_report+0x118/0x608 [ 22.024090] kasan_report+0xdc/0x128 [ 22.024140] kasan_check_range+0x100/0x1a8 [ 22.024194] __kasan_check_write+0x20/0x30 [ 22.024247] kasan_atomics_helper+0x1058/0x4858 [ 22.024303] kasan_atomics+0x198/0x2e8 [ 22.024354] kunit_try_run_case+0x170/0x3f0 [ 22.024411] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.024466] kthread+0x318/0x620 [ 22.024517] ret_from_fork+0x10/0x20 [ 22.024570] [ 22.027697] Allocated by task 254: [ 22.027982] kasan_save_stack+0x3c/0x68 [ 22.028155] kasan_save_track+0x20/0x40 [ 22.028316] kasan_save_alloc_info+0x40/0x58 [ 22.028679] __kasan_kmalloc+0xd4/0xd8 [ 22.028992] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.029159] kasan_atomics+0xb8/0x2e8 [ 22.029473] kunit_try_run_case+0x170/0x3f0 [ 22.029832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.030106] kthread+0x318/0x620 [ 22.030312] ret_from_fork+0x10/0x20 [ 22.030621] [ 22.030771] The buggy address belongs to the object at fff00000c66ea700 [ 22.030771] which belongs to the cache kmalloc-64 of size 64 [ 22.031379] The buggy address is located 0 bytes to the right of [ 22.031379] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.031813] [ 22.031982] The buggy address belongs to the physical page: [ 22.032324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.032564] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.033056] page_type: f5(slab) [ 22.033288] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.033731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.034136] page dumped because: kasan: bad access detected [ 22.034357] [ 22.034601] Memory state around the buggy address: [ 22.034895] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.035379] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.035733] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.035986] ^ [ 22.036318] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.036611] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.036822] ================================================================== [ 21.601513] ================================================================== [ 21.602098] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 21.602864] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.603459] [ 21.603599] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.603719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.603767] Hardware name: linux,dummy-virt (DT) [ 21.603810] Call trace: [ 21.603841] show_stack+0x20/0x38 (C) [ 21.603910] dump_stack_lvl+0x8c/0xd0 [ 21.603969] print_report+0x118/0x608 [ 21.604029] kasan_report+0xdc/0x128 [ 21.604084] kasan_check_range+0x100/0x1a8 [ 21.604143] __kasan_check_write+0x20/0x30 [ 21.604219] kasan_atomics_helper+0x894/0x4858 [ 21.604286] kasan_atomics+0x198/0x2e8 [ 21.604340] kunit_try_run_case+0x170/0x3f0 [ 21.604418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.604490] kthread+0x318/0x620 [ 21.604843] ret_from_fork+0x10/0x20 [ 21.604906] [ 21.608143] Allocated by task 254: [ 21.608354] kasan_save_stack+0x3c/0x68 [ 21.608583] kasan_save_track+0x20/0x40 [ 21.609882] kasan_save_alloc_info+0x40/0x58 [ 21.610143] __kasan_kmalloc+0xd4/0xd8 [ 21.610317] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.610516] kasan_atomics+0xb8/0x2e8 [ 21.610680] kunit_try_run_case+0x170/0x3f0 [ 21.610874] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.611073] kthread+0x318/0x620 [ 21.611249] ret_from_fork+0x10/0x20 [ 21.611409] [ 21.611523] The buggy address belongs to the object at fff00000c66ea700 [ 21.611523] which belongs to the cache kmalloc-64 of size 64 [ 21.612040] The buggy address is located 0 bytes to the right of [ 21.612040] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.612424] [ 21.612539] The buggy address belongs to the physical page: [ 21.612728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.613036] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.613279] page_type: f5(slab) [ 21.613444] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.613707] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.615689] page dumped because: kasan: bad access detected [ 21.615940] [ 21.616142] Memory state around the buggy address: [ 21.616419] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.616818] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.617174] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.617560] ^ [ 21.618208] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.618690] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.619279] ================================================================== [ 21.856846] ================================================================== [ 21.857260] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 21.857555] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.857809] [ 21.858024] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.858174] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.858212] Hardware name: linux,dummy-virt (DT) [ 21.858282] Call trace: [ 21.858324] show_stack+0x20/0x38 (C) [ 21.858386] dump_stack_lvl+0x8c/0xd0 [ 21.858465] print_report+0x118/0x608 [ 21.858555] kasan_report+0xdc/0x128 [ 21.858623] kasan_check_range+0x100/0x1a8 [ 21.858685] __kasan_check_write+0x20/0x30 [ 21.858889] kasan_atomics_helper+0xd3c/0x4858 [ 21.858950] kasan_atomics+0x198/0x2e8 [ 21.859004] kunit_try_run_case+0x170/0x3f0 [ 21.859059] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.859118] kthread+0x318/0x620 [ 21.859168] ret_from_fork+0x10/0x20 [ 21.859225] [ 21.861691] Allocated by task 254: [ 21.861888] kasan_save_stack+0x3c/0x68 [ 21.862095] kasan_save_track+0x20/0x40 [ 21.862289] kasan_save_alloc_info+0x40/0x58 [ 21.862630] __kasan_kmalloc+0xd4/0xd8 [ 21.862821] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.863014] kasan_atomics+0xb8/0x2e8 [ 21.863308] kunit_try_run_case+0x170/0x3f0 [ 21.863661] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.864174] kthread+0x318/0x620 [ 21.864472] ret_from_fork+0x10/0x20 [ 21.864778] [ 21.864950] The buggy address belongs to the object at fff00000c66ea700 [ 21.864950] which belongs to the cache kmalloc-64 of size 64 [ 21.865624] The buggy address is located 0 bytes to the right of [ 21.865624] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.866370] [ 21.866499] The buggy address belongs to the physical page: [ 21.866872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.867329] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.867732] page_type: f5(slab) [ 21.868065] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.868433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.868830] page dumped because: kasan: bad access detected [ 21.869150] [ 21.869278] Memory state around the buggy address: [ 21.869470] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.869895] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.870325] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.870674] ^ [ 21.871008] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.871402] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.871779] ================================================================== [ 21.905765] ================================================================== [ 21.906171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 21.906692] Read of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.906934] [ 21.907055] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.907152] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.907185] Hardware name: linux,dummy-virt (DT) [ 21.907221] Call trace: [ 21.907248] show_stack+0x20/0x38 (C) [ 21.907307] dump_stack_lvl+0x8c/0xd0 [ 21.907360] print_report+0x118/0x608 [ 21.907413] kasan_report+0xdc/0x128 [ 21.907464] __asan_report_load8_noabort+0x20/0x30 [ 21.907516] kasan_atomics_helper+0x3f58/0x4858 [ 21.907569] kasan_atomics+0x198/0x2e8 [ 21.907618] kunit_try_run_case+0x170/0x3f0 [ 21.907670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.907726] kthread+0x318/0x620 [ 21.907791] ret_from_fork+0x10/0x20 [ 21.907847] [ 21.911552] Allocated by task 254: [ 21.911843] kasan_save_stack+0x3c/0x68 [ 21.912195] kasan_save_track+0x20/0x40 [ 21.912529] kasan_save_alloc_info+0x40/0x58 [ 21.912911] __kasan_kmalloc+0xd4/0xd8 [ 21.913217] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.913562] kasan_atomics+0xb8/0x2e8 [ 21.913887] kunit_try_run_case+0x170/0x3f0 [ 21.914162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.914571] kthread+0x318/0x620 [ 21.914869] ret_from_fork+0x10/0x20 [ 21.915174] [ 21.915378] The buggy address belongs to the object at fff00000c66ea700 [ 21.915378] which belongs to the cache kmalloc-64 of size 64 [ 21.915896] The buggy address is located 0 bytes to the right of [ 21.915896] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.916625] [ 21.916771] The buggy address belongs to the physical page: [ 21.917051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.917408] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.918005] page_type: f5(slab) [ 21.918246] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.918799] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.919438] page dumped because: kasan: bad access detected [ 21.919658] [ 21.919811] Memory state around the buggy address: [ 21.920238] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.920687] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.921021] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.921587] ^ [ 21.922033] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.922400] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.922772] ================================================================== [ 22.144685] ================================================================== [ 22.145119] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 22.145471] Read of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.145777] [ 22.145941] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.146034] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.146082] Hardware name: linux,dummy-virt (DT) [ 22.146123] Call trace: [ 22.146153] show_stack+0x20/0x38 (C) [ 22.146214] dump_stack_lvl+0x8c/0xd0 [ 22.146270] print_report+0x118/0x608 [ 22.146325] kasan_report+0xdc/0x128 [ 22.146375] __asan_report_load8_noabort+0x20/0x30 [ 22.146427] kasan_atomics_helper+0x3f04/0x4858 [ 22.146482] kasan_atomics+0x198/0x2e8 [ 22.146532] kunit_try_run_case+0x170/0x3f0 [ 22.146588] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.146647] kthread+0x318/0x620 [ 22.146697] ret_from_fork+0x10/0x20 [ 22.146763] [ 22.149578] Allocated by task 254: [ 22.149716] kasan_save_stack+0x3c/0x68 [ 22.149887] kasan_save_track+0x20/0x40 [ 22.150211] kasan_save_alloc_info+0x40/0x58 [ 22.150595] __kasan_kmalloc+0xd4/0xd8 [ 22.150844] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.151017] kasan_atomics+0xb8/0x2e8 [ 22.151252] kunit_try_run_case+0x170/0x3f0 [ 22.151563] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.151940] kthread+0x318/0x620 [ 22.152231] ret_from_fork+0x10/0x20 [ 22.152418] [ 22.152517] The buggy address belongs to the object at fff00000c66ea700 [ 22.152517] which belongs to the cache kmalloc-64 of size 64 [ 22.153055] The buggy address is located 0 bytes to the right of [ 22.153055] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.153634] [ 22.153930] The buggy address belongs to the physical page: [ 22.154680] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.154957] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.155247] page_type: f5(slab) [ 22.155533] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.155954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.156321] page dumped because: kasan: bad access detected [ 22.156576] [ 22.156721] Memory state around the buggy address: [ 22.157090] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.157358] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.157598] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.157859] ^ [ 22.158060] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.158343] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.158588] ================================================================== [ 21.421899] ================================================================== [ 21.422264] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 21.422749] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.423612] [ 21.424019] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.424334] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.424374] Hardware name: linux,dummy-virt (DT) [ 21.424413] Call trace: [ 21.424445] show_stack+0x20/0x38 (C) [ 21.424511] dump_stack_lvl+0x8c/0xd0 [ 21.424565] print_report+0x118/0x608 [ 21.424619] kasan_report+0xdc/0x128 [ 21.424670] kasan_check_range+0x100/0x1a8 [ 21.424723] __kasan_check_write+0x20/0x30 [ 21.424797] kasan_atomics_helper+0x47c/0x4858 [ 21.424850] kasan_atomics+0x198/0x2e8 [ 21.424898] kunit_try_run_case+0x170/0x3f0 [ 21.424950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.425004] kthread+0x318/0x620 [ 21.425052] ret_from_fork+0x10/0x20 [ 21.425105] [ 21.428607] Allocated by task 254: [ 21.428800] kasan_save_stack+0x3c/0x68 [ 21.429070] kasan_save_track+0x20/0x40 [ 21.429227] kasan_save_alloc_info+0x40/0x58 [ 21.429598] __kasan_kmalloc+0xd4/0xd8 [ 21.429866] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.430205] kasan_atomics+0xb8/0x2e8 [ 21.430454] kunit_try_run_case+0x170/0x3f0 [ 21.430797] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.431288] kthread+0x318/0x620 [ 21.431444] ret_from_fork+0x10/0x20 [ 21.431781] [ 21.431921] The buggy address belongs to the object at fff00000c66ea700 [ 21.431921] which belongs to the cache kmalloc-64 of size 64 [ 21.432508] The buggy address is located 0 bytes to the right of [ 21.432508] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.433111] [ 21.433267] The buggy address belongs to the physical page: [ 21.433579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.433947] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.434407] page_type: f5(slab) [ 21.434695] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.435056] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.435420] page dumped because: kasan: bad access detected [ 21.435635] [ 21.435743] Memory state around the buggy address: [ 21.435959] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.436346] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.436644] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.437285] ^ [ 21.437670] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.438125] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.438624] ================================================================== [ 21.941137] ================================================================== [ 21.941590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 21.942121] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.942467] [ 21.942653] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.942767] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.942808] Hardware name: linux,dummy-virt (DT) [ 21.942869] Call trace: [ 21.942917] show_stack+0x20/0x38 (C) [ 21.942981] dump_stack_lvl+0x8c/0xd0 [ 21.943039] print_report+0x118/0x608 [ 21.943092] kasan_report+0xdc/0x128 [ 21.943158] __asan_report_store8_noabort+0x20/0x30 [ 21.943223] kasan_atomics_helper+0x3e5c/0x4858 [ 21.943279] kasan_atomics+0x198/0x2e8 [ 21.943331] kunit_try_run_case+0x170/0x3f0 [ 21.943385] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.943443] kthread+0x318/0x620 [ 21.943493] ret_from_fork+0x10/0x20 [ 21.943549] [ 21.946664] Allocated by task 254: [ 21.947000] kasan_save_stack+0x3c/0x68 [ 21.947272] kasan_save_track+0x20/0x40 [ 21.947622] kasan_save_alloc_info+0x40/0x58 [ 21.947920] __kasan_kmalloc+0xd4/0xd8 [ 21.948215] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.948467] kasan_atomics+0xb8/0x2e8 [ 21.948716] kunit_try_run_case+0x170/0x3f0 [ 21.948978] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.949269] kthread+0x318/0x620 [ 21.949479] ret_from_fork+0x10/0x20 [ 21.949734] [ 21.949946] The buggy address belongs to the object at fff00000c66ea700 [ 21.949946] which belongs to the cache kmalloc-64 of size 64 [ 21.950495] The buggy address is located 0 bytes to the right of [ 21.950495] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.951023] [ 21.951224] The buggy address belongs to the physical page: [ 21.951481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.951999] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.952388] page_type: f5(slab) [ 21.952563] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.953029] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.953428] page dumped because: kasan: bad access detected [ 21.953713] [ 21.953900] Memory state around the buggy address: [ 21.954199] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.954489] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.954909] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.955253] ^ [ 21.955462] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.955942] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.956388] ================================================================== [ 22.385946] ================================================================== [ 22.386732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 22.387313] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.387891] [ 22.388062] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.388165] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.388199] Hardware name: linux,dummy-virt (DT) [ 22.388254] Call trace: [ 22.388286] show_stack+0x20/0x38 (C) [ 22.388343] dump_stack_lvl+0x8c/0xd0 [ 22.388396] print_report+0x118/0x608 [ 22.388445] kasan_report+0xdc/0x128 [ 22.388494] kasan_check_range+0x100/0x1a8 [ 22.388544] __kasan_check_write+0x20/0x30 [ 22.388593] kasan_atomics_helper+0x17ec/0x4858 [ 22.388643] kasan_atomics+0x198/0x2e8 [ 22.388691] kunit_try_run_case+0x170/0x3f0 [ 22.388836] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.389007] kthread+0x318/0x620 [ 22.389061] ret_from_fork+0x10/0x20 [ 22.389127] [ 22.393852] Allocated by task 254: [ 22.394234] kasan_save_stack+0x3c/0x68 [ 22.394449] kasan_save_track+0x20/0x40 [ 22.394731] kasan_save_alloc_info+0x40/0x58 [ 22.394962] __kasan_kmalloc+0xd4/0xd8 [ 22.395539] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.395807] kasan_atomics+0xb8/0x2e8 [ 22.396298] kunit_try_run_case+0x170/0x3f0 [ 22.396530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.397112] kthread+0x318/0x620 [ 22.397449] ret_from_fork+0x10/0x20 [ 22.397690] [ 22.398031] The buggy address belongs to the object at fff00000c66ea700 [ 22.398031] which belongs to the cache kmalloc-64 of size 64 [ 22.398878] The buggy address is located 0 bytes to the right of [ 22.398878] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.399653] [ 22.400044] The buggy address belongs to the physical page: [ 22.400425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.401021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.401406] page_type: f5(slab) [ 22.401601] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.402080] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.402392] page dumped because: kasan: bad access detected [ 22.402601] [ 22.402713] Memory state around the buggy address: [ 22.402917] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.403162] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.403398] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.403627] ^ [ 22.403913] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.404393] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.404913] ================================================================== [ 22.037846] ================================================================== [ 22.038292] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 22.038731] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.038978] [ 22.039167] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.039255] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.039290] Hardware name: linux,dummy-virt (DT) [ 22.039327] Call trace: [ 22.039355] show_stack+0x20/0x38 (C) [ 22.039410] dump_stack_lvl+0x8c/0xd0 [ 22.039459] print_report+0x118/0x608 [ 22.039510] kasan_report+0xdc/0x128 [ 22.039557] kasan_check_range+0x100/0x1a8 [ 22.039608] __kasan_check_write+0x20/0x30 [ 22.039655] kasan_atomics_helper+0x10c0/0x4858 [ 22.039709] kasan_atomics+0x198/0x2e8 [ 22.039770] kunit_try_run_case+0x170/0x3f0 [ 22.039823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.039880] kthread+0x318/0x620 [ 22.039926] ret_from_fork+0x10/0x20 [ 22.039979] [ 22.043056] Allocated by task 254: [ 22.043226] kasan_save_stack+0x3c/0x68 [ 22.043506] kasan_save_track+0x20/0x40 [ 22.043819] kasan_save_alloc_info+0x40/0x58 [ 22.044151] __kasan_kmalloc+0xd4/0xd8 [ 22.044314] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.044543] kasan_atomics+0xb8/0x2e8 [ 22.044692] kunit_try_run_case+0x170/0x3f0 [ 22.045022] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.045365] kthread+0x318/0x620 [ 22.045507] ret_from_fork+0x10/0x20 [ 22.045746] [ 22.045903] The buggy address belongs to the object at fff00000c66ea700 [ 22.045903] which belongs to the cache kmalloc-64 of size 64 [ 22.046634] The buggy address is located 0 bytes to the right of [ 22.046634] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.047145] [ 22.047324] The buggy address belongs to the physical page: [ 22.047604] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.048002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.048338] page_type: f5(slab) [ 22.048527] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.048938] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.049206] page dumped because: kasan: bad access detected [ 22.049555] [ 22.049744] Memory state around the buggy address: [ 22.049969] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.050409] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.050747] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.051203] ^ [ 22.051406] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.051789] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.052028] ================================================================== [ 22.098977] ================================================================== [ 22.099258] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 22.099681] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.099952] [ 22.100135] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.100234] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.100266] Hardware name: linux,dummy-virt (DT) [ 22.100304] Call trace: [ 22.100331] show_stack+0x20/0x38 (C) [ 22.100388] dump_stack_lvl+0x8c/0xd0 [ 22.100440] print_report+0x118/0x608 [ 22.100493] kasan_report+0xdc/0x128 [ 22.100545] kasan_check_range+0x100/0x1a8 [ 22.100598] __kasan_check_write+0x20/0x30 [ 22.100649] kasan_atomics_helper+0x126c/0x4858 [ 22.100702] kasan_atomics+0x198/0x2e8 [ 22.100764] kunit_try_run_case+0x170/0x3f0 [ 22.100822] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.100880] kthread+0x318/0x620 [ 22.100929] ret_from_fork+0x10/0x20 [ 22.100983] [ 22.104022] Allocated by task 254: [ 22.104220] kasan_save_stack+0x3c/0x68 [ 22.104545] kasan_save_track+0x20/0x40 [ 22.104781] kasan_save_alloc_info+0x40/0x58 [ 22.104966] __kasan_kmalloc+0xd4/0xd8 [ 22.105127] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.105506] kasan_atomics+0xb8/0x2e8 [ 22.105854] kunit_try_run_case+0x170/0x3f0 [ 22.106145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.106418] kthread+0x318/0x620 [ 22.106604] ret_from_fork+0x10/0x20 [ 22.106895] [ 22.107085] The buggy address belongs to the object at fff00000c66ea700 [ 22.107085] which belongs to the cache kmalloc-64 of size 64 [ 22.107432] The buggy address is located 0 bytes to the right of [ 22.107432] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.108136] [ 22.108321] The buggy address belongs to the physical page: [ 22.108612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.109010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.109285] page_type: f5(slab) [ 22.109521] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.110024] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.110334] page dumped because: kasan: bad access detected [ 22.110705] [ 22.110907] Memory state around the buggy address: [ 22.111136] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.111486] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.111824] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.112171] ^ [ 22.112446] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.112817] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.113172] ================================================================== [ 21.440353] ================================================================== [ 21.440842] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 21.441308] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.441931] [ 21.442124] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.442293] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.442344] Hardware name: linux,dummy-virt (DT) [ 21.442389] Call trace: [ 21.442419] show_stack+0x20/0x38 (C) [ 21.442491] dump_stack_lvl+0x8c/0xd0 [ 21.443320] print_report+0x118/0x608 [ 21.443379] kasan_report+0xdc/0x128 [ 21.443434] kasan_check_range+0x100/0x1a8 [ 21.443489] __kasan_check_write+0x20/0x30 [ 21.443543] kasan_atomics_helper+0x4e4/0x4858 [ 21.443597] kasan_atomics+0x198/0x2e8 [ 21.443649] kunit_try_run_case+0x170/0x3f0 [ 21.443706] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.443782] kthread+0x318/0x620 [ 21.443835] ret_from_fork+0x10/0x20 [ 21.443891] [ 21.447141] Allocated by task 254: [ 21.447632] kasan_save_stack+0x3c/0x68 [ 21.448047] kasan_save_track+0x20/0x40 [ 21.448316] kasan_save_alloc_info+0x40/0x58 [ 21.448692] __kasan_kmalloc+0xd4/0xd8 [ 21.448866] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.449284] kasan_atomics+0xb8/0x2e8 [ 21.449657] kunit_try_run_case+0x170/0x3f0 [ 21.449966] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.450386] kthread+0x318/0x620 [ 21.450666] ret_from_fork+0x10/0x20 [ 21.450989] [ 21.451144] The buggy address belongs to the object at fff00000c66ea700 [ 21.451144] which belongs to the cache kmalloc-64 of size 64 [ 21.451779] The buggy address is located 0 bytes to the right of [ 21.451779] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.452349] [ 21.452516] The buggy address belongs to the physical page: [ 21.453052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.453323] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.453614] page_type: f5(slab) [ 21.453847] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.454267] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.454854] page dumped because: kasan: bad access detected [ 21.455426] [ 21.456206] Memory state around the buggy address: [ 21.456461] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.456908] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.457614] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.458135] ^ [ 21.458854] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.459324] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.460074] ================================================================== [ 21.975760] ================================================================== [ 21.976057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 21.976522] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.977048] [ 21.977204] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.977410] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.977447] Hardware name: linux,dummy-virt (DT) [ 21.977486] Call trace: [ 21.977517] show_stack+0x20/0x38 (C) [ 21.977578] dump_stack_lvl+0x8c/0xd0 [ 21.977635] print_report+0x118/0x608 [ 21.977688] kasan_report+0xdc/0x128 [ 21.977761] kasan_check_range+0x100/0x1a8 [ 21.977824] __kasan_check_write+0x20/0x30 [ 21.977876] kasan_atomics_helper+0xf20/0x4858 [ 21.977932] kasan_atomics+0x198/0x2e8 [ 21.977984] kunit_try_run_case+0x170/0x3f0 [ 21.978040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.978114] kthread+0x318/0x620 [ 21.978169] ret_from_fork+0x10/0x20 [ 21.978229] [ 21.981038] Allocated by task 254: [ 21.981363] kasan_save_stack+0x3c/0x68 [ 21.981717] kasan_save_track+0x20/0x40 [ 21.981985] kasan_save_alloc_info+0x40/0x58 [ 21.982272] __kasan_kmalloc+0xd4/0xd8 [ 21.982520] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.982829] kasan_atomics+0xb8/0x2e8 [ 21.983072] kunit_try_run_case+0x170/0x3f0 [ 21.983368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.983643] kthread+0x318/0x620 [ 21.983848] ret_from_fork+0x10/0x20 [ 21.984086] [ 21.984192] The buggy address belongs to the object at fff00000c66ea700 [ 21.984192] which belongs to the cache kmalloc-64 of size 64 [ 21.984517] The buggy address is located 0 bytes to the right of [ 21.984517] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.985427] [ 21.985611] The buggy address belongs to the physical page: [ 21.985919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.986256] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.986481] page_type: f5(slab) [ 21.986815] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.987435] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.987818] page dumped because: kasan: bad access detected [ 21.988271] [ 21.988401] Memory state around the buggy address: [ 21.988717] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.989117] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.989608] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.989980] ^ [ 21.990190] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.990612] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.991062] ================================================================== [ 21.766879] ================================================================== [ 21.767308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 21.767704] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.768006] [ 21.768128] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.768225] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.768261] Hardware name: linux,dummy-virt (DT) [ 21.768321] Call trace: [ 21.768351] show_stack+0x20/0x38 (C) [ 21.768409] dump_stack_lvl+0x8c/0xd0 [ 21.768464] print_report+0x118/0x608 [ 21.768517] kasan_report+0xdc/0x128 [ 21.768595] __asan_report_load4_noabort+0x20/0x30 [ 21.768650] kasan_atomics_helper+0x3dbc/0x4858 [ 21.768707] kasan_atomics+0x198/0x2e8 [ 21.768770] kunit_try_run_case+0x170/0x3f0 [ 21.768830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.768889] kthread+0x318/0x620 [ 21.768942] ret_from_fork+0x10/0x20 [ 21.768998] [ 21.772369] Allocated by task 254: [ 21.772574] kasan_save_stack+0x3c/0x68 [ 21.772829] kasan_save_track+0x20/0x40 [ 21.773073] kasan_save_alloc_info+0x40/0x58 [ 21.773377] __kasan_kmalloc+0xd4/0xd8 [ 21.773746] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.773983] kasan_atomics+0xb8/0x2e8 [ 21.774259] kunit_try_run_case+0x170/0x3f0 [ 21.774587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.774934] kthread+0x318/0x620 [ 21.775224] ret_from_fork+0x10/0x20 [ 21.775449] [ 21.775632] The buggy address belongs to the object at fff00000c66ea700 [ 21.775632] which belongs to the cache kmalloc-64 of size 64 [ 21.776190] The buggy address is located 0 bytes to the right of [ 21.776190] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.776836] [ 21.777009] The buggy address belongs to the physical page: [ 21.777346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.777706] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.778130] page_type: f5(slab) [ 21.778318] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.778804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.779098] page dumped because: kasan: bad access detected [ 21.779470] [ 21.779602] Memory state around the buggy address: [ 21.779923] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.780230] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.780681] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.781077] ^ [ 21.781331] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.781760] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.782113] ================================================================== [ 21.783206] ================================================================== [ 21.783631] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 21.784359] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.784777] [ 21.785011] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.785113] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.785169] Hardware name: linux,dummy-virt (DT) [ 21.785208] Call trace: [ 21.785238] show_stack+0x20/0x38 (C) [ 21.785296] dump_stack_lvl+0x8c/0xd0 [ 21.785353] print_report+0x118/0x608 [ 21.785408] kasan_report+0xdc/0x128 [ 21.785463] kasan_check_range+0x100/0x1a8 [ 21.785545] __kasan_check_write+0x20/0x30 [ 21.785602] kasan_atomics_helper+0xc08/0x4858 [ 21.785680] kasan_atomics+0x198/0x2e8 [ 21.785751] kunit_try_run_case+0x170/0x3f0 [ 21.785812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.785874] kthread+0x318/0x620 [ 21.785927] ret_from_fork+0x10/0x20 [ 21.785982] [ 21.789512] Allocated by task 254: [ 21.789716] kasan_save_stack+0x3c/0x68 [ 21.790033] kasan_save_track+0x20/0x40 [ 21.790377] kasan_save_alloc_info+0x40/0x58 [ 21.790669] __kasan_kmalloc+0xd4/0xd8 [ 21.791013] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.791435] kasan_atomics+0xb8/0x2e8 [ 21.791604] kunit_try_run_case+0x170/0x3f0 [ 21.791926] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.792398] kthread+0x318/0x620 [ 21.792600] ret_from_fork+0x10/0x20 [ 21.792933] [ 21.793075] The buggy address belongs to the object at fff00000c66ea700 [ 21.793075] which belongs to the cache kmalloc-64 of size 64 [ 21.793635] The buggy address is located 0 bytes to the right of [ 21.793635] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.794436] [ 21.794665] The buggy address belongs to the physical page: [ 21.795013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.795578] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.796023] page_type: f5(slab) [ 21.796318] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.796814] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.797276] page dumped because: kasan: bad access detected [ 21.797645] [ 21.797866] Memory state around the buggy address: [ 21.798197] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.798520] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.798921] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.799368] ^ [ 21.799583] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.800062] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.800462] ================================================================== [ 22.114354] ================================================================== [ 22.114732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 22.115256] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.115668] [ 22.115869] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.115968] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.116002] Hardware name: linux,dummy-virt (DT) [ 22.116041] Call trace: [ 22.116068] show_stack+0x20/0x38 (C) [ 22.116127] dump_stack_lvl+0x8c/0xd0 [ 22.116180] print_report+0x118/0x608 [ 22.116234] kasan_report+0xdc/0x128 [ 22.116288] kasan_check_range+0x100/0x1a8 [ 22.116342] __kasan_check_write+0x20/0x30 [ 22.116394] kasan_atomics_helper+0x12d8/0x4858 [ 22.116449] kasan_atomics+0x198/0x2e8 [ 22.116499] kunit_try_run_case+0x170/0x3f0 [ 22.116553] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.116611] kthread+0x318/0x620 [ 22.116660] ret_from_fork+0x10/0x20 [ 22.116715] [ 22.119672] Allocated by task 254: [ 22.119850] kasan_save_stack+0x3c/0x68 [ 22.120020] kasan_save_track+0x20/0x40 [ 22.120242] kasan_save_alloc_info+0x40/0x58 [ 22.120606] __kasan_kmalloc+0xd4/0xd8 [ 22.120895] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.121193] kasan_atomics+0xb8/0x2e8 [ 22.121483] kunit_try_run_case+0x170/0x3f0 [ 22.121698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.121967] kthread+0x318/0x620 [ 22.122286] ret_from_fork+0x10/0x20 [ 22.122531] [ 22.122697] The buggy address belongs to the object at fff00000c66ea700 [ 22.122697] which belongs to the cache kmalloc-64 of size 64 [ 22.123267] The buggy address is located 0 bytes to the right of [ 22.123267] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.123802] [ 22.123958] The buggy address belongs to the physical page: [ 22.124142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.124719] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.125208] page_type: f5(slab) [ 22.125460] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.125788] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.126139] page dumped because: kasan: bad access detected [ 22.126329] [ 22.126499] Memory state around the buggy address: [ 22.126827] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.127254] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.127551] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.127844] ^ [ 22.128207] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.128526] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.128838] ================================================================== [ 22.007856] ================================================================== [ 22.008234] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 22.008487] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.008978] [ 22.009130] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.009231] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.009269] Hardware name: linux,dummy-virt (DT) [ 22.009329] Call trace: [ 22.009360] show_stack+0x20/0x38 (C) [ 22.009420] dump_stack_lvl+0x8c/0xd0 [ 22.009495] print_report+0x118/0x608 [ 22.009553] kasan_report+0xdc/0x128 [ 22.009607] kasan_check_range+0x100/0x1a8 [ 22.009663] __kasan_check_write+0x20/0x30 [ 22.009715] kasan_atomics_helper+0xff0/0x4858 [ 22.009791] kasan_atomics+0x198/0x2e8 [ 22.009846] kunit_try_run_case+0x170/0x3f0 [ 22.009900] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.009957] kthread+0x318/0x620 [ 22.010009] ret_from_fork+0x10/0x20 [ 22.010070] [ 22.012544] Allocated by task 254: [ 22.012815] kasan_save_stack+0x3c/0x68 [ 22.013142] kasan_save_track+0x20/0x40 [ 22.013400] kasan_save_alloc_info+0x40/0x58 [ 22.013699] __kasan_kmalloc+0xd4/0xd8 [ 22.013951] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.014190] kasan_atomics+0xb8/0x2e8 [ 22.014429] kunit_try_run_case+0x170/0x3f0 [ 22.014605] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.015040] kthread+0x318/0x620 [ 22.015309] ret_from_fork+0x10/0x20 [ 22.015514] [ 22.015681] The buggy address belongs to the object at fff00000c66ea700 [ 22.015681] which belongs to the cache kmalloc-64 of size 64 [ 22.016156] The buggy address is located 0 bytes to the right of [ 22.016156] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.016658] [ 22.016832] The buggy address belongs to the physical page: [ 22.017068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.017521] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.017777] page_type: f5(slab) [ 22.018082] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.018524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.018924] page dumped because: kasan: bad access detected [ 22.019187] [ 22.019346] Memory state around the buggy address: [ 22.019585] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.019935] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.020268] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.020566] ^ [ 22.020867] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.021214] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.021596] ================================================================== [ 21.620657] ================================================================== [ 21.621090] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 21.621649] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.622101] [ 21.622272] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.622443] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.622908] Hardware name: linux,dummy-virt (DT) [ 21.622966] Call trace: [ 21.622997] show_stack+0x20/0x38 (C) [ 21.623071] dump_stack_lvl+0x8c/0xd0 [ 21.623129] print_report+0x118/0x608 [ 21.623186] kasan_report+0xdc/0x128 [ 21.623239] __asan_report_load4_noabort+0x20/0x30 [ 21.623297] kasan_atomics_helper+0x42d8/0x4858 [ 21.623356] kasan_atomics+0x198/0x2e8 [ 21.623409] kunit_try_run_case+0x170/0x3f0 [ 21.623468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.623529] kthread+0x318/0x620 [ 21.623582] ret_from_fork+0x10/0x20 [ 21.623642] [ 21.628502] Allocated by task 254: [ 21.628922] kasan_save_stack+0x3c/0x68 [ 21.629220] kasan_save_track+0x20/0x40 [ 21.629611] kasan_save_alloc_info+0x40/0x58 [ 21.629953] __kasan_kmalloc+0xd4/0xd8 [ 21.630211] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.630932] kasan_atomics+0xb8/0x2e8 [ 21.631350] kunit_try_run_case+0x170/0x3f0 [ 21.631701] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.632100] kthread+0x318/0x620 [ 21.632333] ret_from_fork+0x10/0x20 [ 21.632586] [ 21.632725] The buggy address belongs to the object at fff00000c66ea700 [ 21.632725] which belongs to the cache kmalloc-64 of size 64 [ 21.633218] The buggy address is located 0 bytes to the right of [ 21.633218] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.633591] [ 21.633819] The buggy address belongs to the physical page: [ 21.634201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.634841] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.635192] page_type: f5(slab) [ 21.635504] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.636010] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.636505] page dumped because: kasan: bad access detected [ 21.636827] [ 21.637003] Memory state around the buggy address: [ 21.637224] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.637712] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.638104] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.638569] ^ [ 21.638955] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.639279] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.639810] ================================================================== [ 21.266320] ================================================================== [ 21.267106] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 21.267416] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.267664] [ 21.267818] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.267928] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.267960] Hardware name: linux,dummy-virt (DT) [ 21.267999] Call trace: [ 21.268027] show_stack+0x20/0x38 (C) [ 21.268090] dump_stack_lvl+0x8c/0xd0 [ 21.268143] print_report+0x118/0x608 [ 21.268198] kasan_report+0xdc/0x128 [ 21.268255] __asan_report_store4_noabort+0x20/0x30 [ 21.268313] kasan_atomics_helper+0x3f7c/0x4858 [ 21.268369] kasan_atomics+0x198/0x2e8 [ 21.268425] kunit_try_run_case+0x170/0x3f0 [ 21.268482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.268540] kthread+0x318/0x620 [ 21.268594] ret_from_fork+0x10/0x20 [ 21.268651] [ 21.273157] Allocated by task 254: [ 21.273421] kasan_save_stack+0x3c/0x68 [ 21.273636] kasan_save_track+0x20/0x40 [ 21.273924] kasan_save_alloc_info+0x40/0x58 [ 21.274189] __kasan_kmalloc+0xd4/0xd8 [ 21.274642] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.274884] kasan_atomics+0xb8/0x2e8 [ 21.275195] kunit_try_run_case+0x170/0x3f0 [ 21.275384] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.275714] kthread+0x318/0x620 [ 21.275972] ret_from_fork+0x10/0x20 [ 21.276205] [ 21.276319] The buggy address belongs to the object at fff00000c66ea700 [ 21.276319] which belongs to the cache kmalloc-64 of size 64 [ 21.277149] The buggy address is located 0 bytes to the right of [ 21.277149] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.277658] [ 21.277784] The buggy address belongs to the physical page: [ 21.278228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.278875] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.279242] page_type: f5(slab) [ 21.279497] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.279898] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.280253] page dumped because: kasan: bad access detected [ 21.280609] [ 21.280789] Memory state around the buggy address: [ 21.281018] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.281474] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.281874] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.282246] ^ [ 21.282660] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.283006] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.283430] ================================================================== [ 21.696546] ================================================================== [ 21.696853] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 21.697413] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.697804] [ 21.698014] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.698140] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.698179] Hardware name: linux,dummy-virt (DT) [ 21.698219] Call trace: [ 21.698249] show_stack+0x20/0x38 (C) [ 21.698308] dump_stack_lvl+0x8c/0xd0 [ 21.698363] print_report+0x118/0x608 [ 21.698435] kasan_report+0xdc/0x128 [ 21.698520] kasan_check_range+0x100/0x1a8 [ 21.698581] __kasan_check_write+0x20/0x30 [ 21.698633] kasan_atomics_helper+0xa6c/0x4858 [ 21.698690] kasan_atomics+0x198/0x2e8 [ 21.698759] kunit_try_run_case+0x170/0x3f0 [ 21.698820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.698880] kthread+0x318/0x620 [ 21.698932] ret_from_fork+0x10/0x20 [ 21.698990] [ 21.702289] Allocated by task 254: [ 21.702578] kasan_save_stack+0x3c/0x68 [ 21.702874] kasan_save_track+0x20/0x40 [ 21.703196] kasan_save_alloc_info+0x40/0x58 [ 21.703489] __kasan_kmalloc+0xd4/0xd8 [ 21.703762] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.704056] kasan_atomics+0xb8/0x2e8 [ 21.704408] kunit_try_run_case+0x170/0x3f0 [ 21.704801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.705242] kthread+0x318/0x620 [ 21.705477] ret_from_fork+0x10/0x20 [ 21.705782] [ 21.705948] The buggy address belongs to the object at fff00000c66ea700 [ 21.705948] which belongs to the cache kmalloc-64 of size 64 [ 21.706610] The buggy address is located 0 bytes to the right of [ 21.706610] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.707266] [ 21.707464] The buggy address belongs to the physical page: [ 21.707760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.708184] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.708636] page_type: f5(slab) [ 21.708863] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.709302] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.709775] page dumped because: kasan: bad access detected [ 21.710075] [ 21.710281] Memory state around the buggy address: [ 21.710531] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.710974] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.711403] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.711796] ^ [ 21.712083] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.712445] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.712879] ================================================================== [ 22.233826] ================================================================== [ 22.234178] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 22.234528] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.234847] [ 22.234968] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.235066] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.235102] Hardware name: linux,dummy-virt (DT) [ 22.235138] Call trace: [ 22.235168] show_stack+0x20/0x38 (C) [ 22.235226] dump_stack_lvl+0x8c/0xd0 [ 22.235281] print_report+0x118/0x608 [ 22.235337] kasan_report+0xdc/0x128 [ 22.235386] kasan_check_range+0x100/0x1a8 [ 22.235438] __kasan_check_write+0x20/0x30 [ 22.235484] kasan_atomics_helper+0x15b4/0x4858 [ 22.235537] kasan_atomics+0x198/0x2e8 [ 22.235587] kunit_try_run_case+0x170/0x3f0 [ 22.235637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.235694] kthread+0x318/0x620 [ 22.235757] ret_from_fork+0x10/0x20 [ 22.235817] [ 22.238864] Allocated by task 254: [ 22.239171] kasan_save_stack+0x3c/0x68 [ 22.239438] kasan_save_track+0x20/0x40 [ 22.239692] kasan_save_alloc_info+0x40/0x58 [ 22.239938] __kasan_kmalloc+0xd4/0xd8 [ 22.240103] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.240465] kasan_atomics+0xb8/0x2e8 [ 22.240772] kunit_try_run_case+0x170/0x3f0 [ 22.240986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.241273] kthread+0x318/0x620 [ 22.241523] ret_from_fork+0x10/0x20 [ 22.241717] [ 22.241907] The buggy address belongs to the object at fff00000c66ea700 [ 22.241907] which belongs to the cache kmalloc-64 of size 64 [ 22.242368] The buggy address is located 0 bytes to the right of [ 22.242368] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.243411] [ 22.243589] The buggy address belongs to the physical page: [ 22.243785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.244038] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.244259] page_type: f5(slab) [ 22.244418] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.244656] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.245097] page dumped because: kasan: bad access detected [ 22.245428] [ 22.245572] Memory state around the buggy address: [ 22.245875] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.246534] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.246945] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.247229] ^ [ 22.247462] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.247721] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.248009] ================================================================== [ 22.052848] ================================================================== [ 22.053259] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 22.053657] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.053983] [ 22.054165] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.054262] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.054296] Hardware name: linux,dummy-virt (DT) [ 22.054333] Call trace: [ 22.054360] show_stack+0x20/0x38 (C) [ 22.054417] dump_stack_lvl+0x8c/0xd0 [ 22.054501] print_report+0x118/0x608 [ 22.054558] kasan_report+0xdc/0x128 [ 22.054611] kasan_check_range+0x100/0x1a8 [ 22.054664] __kasan_check_write+0x20/0x30 [ 22.054715] kasan_atomics_helper+0x1128/0x4858 [ 22.054790] kasan_atomics+0x198/0x2e8 [ 22.054843] kunit_try_run_case+0x170/0x3f0 [ 22.054896] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.054954] kthread+0x318/0x620 [ 22.054999] ret_from_fork+0x10/0x20 [ 22.055049] [ 22.057650] Allocated by task 254: [ 22.057891] kasan_save_stack+0x3c/0x68 [ 22.058112] kasan_save_track+0x20/0x40 [ 22.058365] kasan_save_alloc_info+0x40/0x58 [ 22.058623] __kasan_kmalloc+0xd4/0xd8 [ 22.058856] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.059031] kasan_atomics+0xb8/0x2e8 [ 22.059188] kunit_try_run_case+0x170/0x3f0 [ 22.059534] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.059977] kthread+0x318/0x620 [ 22.060145] ret_from_fork+0x10/0x20 [ 22.060309] [ 22.060413] The buggy address belongs to the object at fff00000c66ea700 [ 22.060413] which belongs to the cache kmalloc-64 of size 64 [ 22.061515] The buggy address is located 0 bytes to the right of [ 22.061515] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.061922] [ 22.062203] The buggy address belongs to the physical page: [ 22.062619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.062950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.063190] page_type: f5(slab) [ 22.063357] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.063624] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.064226] page dumped because: kasan: bad access detected [ 22.064417] [ 22.064655] Memory state around the buggy address: [ 22.065053] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.065403] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.065629] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.066124] ^ [ 22.066456] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.066827] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.067191] ================================================================== [ 21.872534] ================================================================== [ 21.872964] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 21.873392] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.873751] [ 21.873920] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.874016] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.874049] Hardware name: linux,dummy-virt (DT) [ 21.874096] Call trace: [ 21.874128] show_stack+0x20/0x38 (C) [ 21.874190] dump_stack_lvl+0x8c/0xd0 [ 21.874250] print_report+0x118/0x608 [ 21.874305] kasan_report+0xdc/0x128 [ 21.874359] __asan_report_load4_noabort+0x20/0x30 [ 21.874413] kasan_atomics_helper+0x3e04/0x4858 [ 21.874471] kasan_atomics+0x198/0x2e8 [ 21.874545] kunit_try_run_case+0x170/0x3f0 [ 21.874606] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.874663] kthread+0x318/0x620 [ 21.874711] ret_from_fork+0x10/0x20 [ 21.874776] [ 21.877316] Allocated by task 254: [ 21.877620] kasan_save_stack+0x3c/0x68 [ 21.877880] kasan_save_track+0x20/0x40 [ 21.878127] kasan_save_alloc_info+0x40/0x58 [ 21.878426] __kasan_kmalloc+0xd4/0xd8 [ 21.878648] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.879036] kasan_atomics+0xb8/0x2e8 [ 21.879291] kunit_try_run_case+0x170/0x3f0 [ 21.879547] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.879774] kthread+0x318/0x620 [ 21.880039] ret_from_fork+0x10/0x20 [ 21.880285] [ 21.880385] The buggy address belongs to the object at fff00000c66ea700 [ 21.880385] which belongs to the cache kmalloc-64 of size 64 [ 21.881118] The buggy address is located 0 bytes to the right of [ 21.881118] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.881693] [ 21.881886] The buggy address belongs to the physical page: [ 21.882143] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.882560] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.882917] page_type: f5(slab) [ 21.883153] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.883464] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.884015] page dumped because: kasan: bad access detected [ 21.884394] [ 21.884529] Memory state around the buggy address: [ 21.884711] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.885171] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.885506] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.885900] ^ [ 21.886160] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.886475] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.886986] ================================================================== [ 21.801308] ================================================================== [ 21.801702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 21.802299] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.802694] [ 21.802866] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.802967] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.803003] Hardware name: linux,dummy-virt (DT) [ 21.803062] Call trace: [ 21.803095] show_stack+0x20/0x38 (C) [ 21.803164] dump_stack_lvl+0x8c/0xd0 [ 21.803222] print_report+0x118/0x608 [ 21.803276] kasan_report+0xdc/0x128 [ 21.803331] __asan_report_load4_noabort+0x20/0x30 [ 21.803386] kasan_atomics_helper+0x3de4/0x4858 [ 21.803442] kasan_atomics+0x198/0x2e8 [ 21.803495] kunit_try_run_case+0x170/0x3f0 [ 21.803552] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.803611] kthread+0x318/0x620 [ 21.803662] ret_from_fork+0x10/0x20 [ 21.803716] [ 21.807920] Allocated by task 254: [ 21.808103] kasan_save_stack+0x3c/0x68 [ 21.808702] kasan_save_track+0x20/0x40 [ 21.809116] kasan_save_alloc_info+0x40/0x58 [ 21.809398] __kasan_kmalloc+0xd4/0xd8 [ 21.809751] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.810104] kasan_atomics+0xb8/0x2e8 [ 21.810282] kunit_try_run_case+0x170/0x3f0 [ 21.810461] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.810665] kthread+0x318/0x620 [ 21.810935] ret_from_fork+0x10/0x20 [ 21.811481] [ 21.811596] The buggy address belongs to the object at fff00000c66ea700 [ 21.811596] which belongs to the cache kmalloc-64 of size 64 [ 21.812017] The buggy address is located 0 bytes to the right of [ 21.812017] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.812373] [ 21.812480] The buggy address belongs to the physical page: [ 21.812672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.813873] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.814428] page_type: f5(slab) [ 21.814807] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.815359] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.815870] page dumped because: kasan: bad access detected [ 21.816163] [ 21.816317] Memory state around the buggy address: [ 21.816592] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.816924] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.817358] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.817776] ^ [ 21.818092] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.818585] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.819081] ================================================================== [ 21.582392] ================================================================== [ 21.583587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 21.583893] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.584341] [ 21.584551] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.584654] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.584689] Hardware name: linux,dummy-virt (DT) [ 21.584729] Call trace: [ 21.584772] show_stack+0x20/0x38 (C) [ 21.584834] dump_stack_lvl+0x8c/0xd0 [ 21.584887] print_report+0x118/0x608 [ 21.584937] kasan_report+0xdc/0x128 [ 21.584986] kasan_check_range+0x100/0x1a8 [ 21.585037] __kasan_check_write+0x20/0x30 [ 21.585086] kasan_atomics_helper+0x7cc/0x4858 [ 21.585137] kasan_atomics+0x198/0x2e8 [ 21.585186] kunit_try_run_case+0x170/0x3f0 [ 21.585237] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.585291] kthread+0x318/0x620 [ 21.585338] ret_from_fork+0x10/0x20 [ 21.585389] [ 21.589276] Allocated by task 254: [ 21.589595] kasan_save_stack+0x3c/0x68 [ 21.589974] kasan_save_track+0x20/0x40 [ 21.590313] kasan_save_alloc_info+0x40/0x58 [ 21.590735] __kasan_kmalloc+0xd4/0xd8 [ 21.591178] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.591528] kasan_atomics+0xb8/0x2e8 [ 21.591794] kunit_try_run_case+0x170/0x3f0 [ 21.591967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.592384] kthread+0x318/0x620 [ 21.592614] ret_from_fork+0x10/0x20 [ 21.592910] [ 21.593047] The buggy address belongs to the object at fff00000c66ea700 [ 21.593047] which belongs to the cache kmalloc-64 of size 64 [ 21.593672] The buggy address is located 0 bytes to the right of [ 21.593672] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.594408] [ 21.594690] The buggy address belongs to the physical page: [ 21.595147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.595600] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.595987] page_type: f5(slab) [ 21.596176] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.596528] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.596995] page dumped because: kasan: bad access detected [ 21.597252] [ 21.597360] Memory state around the buggy address: [ 21.597708] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.598052] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.598558] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.599172] ^ [ 21.599503] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.599834] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.600616] ================================================================== [ 21.523038] ================================================================== [ 21.523405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 21.523785] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.524363] [ 21.524550] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.524651] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.524685] Hardware name: linux,dummy-virt (DT) [ 21.524726] Call trace: [ 21.524769] show_stack+0x20/0x38 (C) [ 21.524828] dump_stack_lvl+0x8c/0xd0 [ 21.524885] print_report+0x118/0x608 [ 21.524938] kasan_report+0xdc/0x128 [ 21.524990] kasan_check_range+0x100/0x1a8 [ 21.525044] __kasan_check_write+0x20/0x30 [ 21.525095] kasan_atomics_helper+0x684/0x4858 [ 21.525149] kasan_atomics+0x198/0x2e8 [ 21.525200] kunit_try_run_case+0x170/0x3f0 [ 21.525254] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.525310] kthread+0x318/0x620 [ 21.525359] ret_from_fork+0x10/0x20 [ 21.525415] [ 21.529963] Allocated by task 254: [ 21.530202] kasan_save_stack+0x3c/0x68 [ 21.530846] kasan_save_track+0x20/0x40 [ 21.531100] kasan_save_alloc_info+0x40/0x58 [ 21.531383] __kasan_kmalloc+0xd4/0xd8 [ 21.531734] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.532093] kasan_atomics+0xb8/0x2e8 [ 21.532343] kunit_try_run_case+0x170/0x3f0 [ 21.532522] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.532785] kthread+0x318/0x620 [ 21.533228] ret_from_fork+0x10/0x20 [ 21.533526] [ 21.533643] The buggy address belongs to the object at fff00000c66ea700 [ 21.533643] which belongs to the cache kmalloc-64 of size 64 [ 21.534286] The buggy address is located 0 bytes to the right of [ 21.534286] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.535049] [ 21.535328] The buggy address belongs to the physical page: [ 21.535588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.535987] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.536343] page_type: f5(slab) [ 21.536575] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.537325] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.537710] page dumped because: kasan: bad access detected [ 21.538118] [ 21.538323] Memory state around the buggy address: [ 21.538839] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.539373] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.539669] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.539940] ^ [ 21.540149] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.540417] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.540676] ================================================================== [ 21.640672] ================================================================== [ 21.641166] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 21.641643] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.642164] [ 21.642416] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.642573] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.642612] Hardware name: linux,dummy-virt (DT) [ 21.642671] Call trace: [ 21.642701] show_stack+0x20/0x38 (C) [ 21.642807] dump_stack_lvl+0x8c/0xd0 [ 21.642881] print_report+0x118/0x608 [ 21.642938] kasan_report+0xdc/0x128 [ 21.642993] kasan_check_range+0x100/0x1a8 [ 21.643051] __kasan_check_write+0x20/0x30 [ 21.643104] kasan_atomics_helper+0x934/0x4858 [ 21.643162] kasan_atomics+0x198/0x2e8 [ 21.643215] kunit_try_run_case+0x170/0x3f0 [ 21.643269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.643327] kthread+0x318/0x620 [ 21.643379] ret_from_fork+0x10/0x20 [ 21.643438] [ 21.647045] Allocated by task 254: [ 21.647349] kasan_save_stack+0x3c/0x68 [ 21.647722] kasan_save_track+0x20/0x40 [ 21.648340] kasan_save_alloc_info+0x40/0x58 [ 21.648732] __kasan_kmalloc+0xd4/0xd8 [ 21.648977] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.649296] kasan_atomics+0xb8/0x2e8 [ 21.649539] kunit_try_run_case+0x170/0x3f0 [ 21.649818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.650262] kthread+0x318/0x620 [ 21.650620] ret_from_fork+0x10/0x20 [ 21.650888] [ 21.651075] The buggy address belongs to the object at fff00000c66ea700 [ 21.651075] which belongs to the cache kmalloc-64 of size 64 [ 21.651780] The buggy address is located 0 bytes to the right of [ 21.651780] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.652462] [ 21.652669] The buggy address belongs to the physical page: [ 21.653038] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.653505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.654027] page_type: f5(slab) [ 21.654277] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.654829] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.655282] page dumped because: kasan: bad access detected [ 21.655555] [ 21.655703] Memory state around the buggy address: [ 21.656087] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.656464] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.656966] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.657378] ^ [ 21.657557] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.658030] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.658375] ================================================================== [ 21.501911] ================================================================== [ 21.502247] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 21.502561] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.503202] [ 21.503621] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.503926] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.503965] Hardware name: linux,dummy-virt (DT) [ 21.504004] Call trace: [ 21.504037] show_stack+0x20/0x38 (C) [ 21.504101] dump_stack_lvl+0x8c/0xd0 [ 21.504338] print_report+0x118/0x608 [ 21.504406] kasan_report+0xdc/0x128 [ 21.504462] kasan_check_range+0x100/0x1a8 [ 21.504549] __kasan_check_write+0x20/0x30 [ 21.504606] kasan_atomics_helper+0x61c/0x4858 [ 21.504679] kasan_atomics+0x198/0x2e8 [ 21.504734] kunit_try_run_case+0x170/0x3f0 [ 21.504811] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.504870] kthread+0x318/0x620 [ 21.504922] ret_from_fork+0x10/0x20 [ 21.504978] [ 21.509106] Allocated by task 254: [ 21.509587] kasan_save_stack+0x3c/0x68 [ 21.509852] kasan_save_track+0x20/0x40 [ 21.510268] kasan_save_alloc_info+0x40/0x58 [ 21.510667] __kasan_kmalloc+0xd4/0xd8 [ 21.510998] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.511264] kasan_atomics+0xb8/0x2e8 [ 21.511628] kunit_try_run_case+0x170/0x3f0 [ 21.512027] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.512320] kthread+0x318/0x620 [ 21.512696] ret_from_fork+0x10/0x20 [ 21.513022] [ 21.513224] The buggy address belongs to the object at fff00000c66ea700 [ 21.513224] which belongs to the cache kmalloc-64 of size 64 [ 21.514147] The buggy address is located 0 bytes to the right of [ 21.514147] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.515466] [ 21.515608] The buggy address belongs to the physical page: [ 21.515841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.516441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.516896] page_type: f5(slab) [ 21.517197] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.517782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.518300] page dumped because: kasan: bad access detected [ 21.518640] [ 21.518803] Memory state around the buggy address: [ 21.519007] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.519348] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.520122] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.520358] ^ [ 21.520539] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.521119] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.521579] ================================================================== [ 22.311616] ================================================================== [ 22.312048] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 22.312666] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.313012] [ 22.313227] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.313329] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.313366] Hardware name: linux,dummy-virt (DT) [ 22.313406] Call trace: [ 22.313435] show_stack+0x20/0x38 (C) [ 22.313495] dump_stack_lvl+0x8c/0xd0 [ 22.313551] print_report+0x118/0x608 [ 22.313603] kasan_report+0xdc/0x128 [ 22.313655] kasan_check_range+0x100/0x1a8 [ 22.313710] __kasan_check_write+0x20/0x30 [ 22.314081] kasan_atomics_helper+0x16d0/0x4858 [ 22.314146] kasan_atomics+0x198/0x2e8 [ 22.314203] kunit_try_run_case+0x170/0x3f0 [ 22.314259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.314320] kthread+0x318/0x620 [ 22.314375] ret_from_fork+0x10/0x20 [ 22.314434] [ 22.317917] Allocated by task 254: [ 22.318301] kasan_save_stack+0x3c/0x68 [ 22.318624] kasan_save_track+0x20/0x40 [ 22.318856] kasan_save_alloc_info+0x40/0x58 [ 22.319263] __kasan_kmalloc+0xd4/0xd8 [ 22.319535] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.319933] kasan_atomics+0xb8/0x2e8 [ 22.320267] kunit_try_run_case+0x170/0x3f0 [ 22.320539] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.320802] kthread+0x318/0x620 [ 22.321046] ret_from_fork+0x10/0x20 [ 22.321309] [ 22.321453] The buggy address belongs to the object at fff00000c66ea700 [ 22.321453] which belongs to the cache kmalloc-64 of size 64 [ 22.322070] The buggy address is located 0 bytes to the right of [ 22.322070] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.322450] [ 22.322653] The buggy address belongs to the physical page: [ 22.323159] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.323768] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.324138] page_type: f5(slab) [ 22.324371] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.324827] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.325280] page dumped because: kasan: bad access detected [ 22.325597] [ 22.325772] Memory state around the buggy address: [ 22.326031] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.326468] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.326866] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.327278] ^ [ 22.327604] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.328042] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.328403] ================================================================== [ 22.346099] ================================================================== [ 22.346420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 22.346998] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.347724] [ 22.347877] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.347977] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.348011] Hardware name: linux,dummy-virt (DT) [ 22.348071] Call trace: [ 22.348110] show_stack+0x20/0x38 (C) [ 22.348172] dump_stack_lvl+0x8c/0xd0 [ 22.348225] print_report+0x118/0x608 [ 22.348278] kasan_report+0xdc/0x128 [ 22.348328] kasan_check_range+0x100/0x1a8 [ 22.348384] __kasan_check_write+0x20/0x30 [ 22.348433] kasan_atomics_helper+0x175c/0x4858 [ 22.348487] kasan_atomics+0x198/0x2e8 [ 22.348537] kunit_try_run_case+0x170/0x3f0 [ 22.348591] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.348648] kthread+0x318/0x620 [ 22.348698] ret_from_fork+0x10/0x20 [ 22.348766] [ 22.352045] Allocated by task 254: [ 22.352389] kasan_save_stack+0x3c/0x68 [ 22.352761] kasan_save_track+0x20/0x40 [ 22.352969] kasan_save_alloc_info+0x40/0x58 [ 22.353331] __kasan_kmalloc+0xd4/0xd8 [ 22.353622] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.353889] kasan_atomics+0xb8/0x2e8 [ 22.354166] kunit_try_run_case+0x170/0x3f0 [ 22.354505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.354911] kthread+0x318/0x620 [ 22.355232] ret_from_fork+0x10/0x20 [ 22.355456] [ 22.355645] The buggy address belongs to the object at fff00000c66ea700 [ 22.355645] which belongs to the cache kmalloc-64 of size 64 [ 22.356086] The buggy address is located 0 bytes to the right of [ 22.356086] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.356811] [ 22.357012] The buggy address belongs to the physical page: [ 22.357328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.357719] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.358158] page_type: f5(slab) [ 22.358379] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.358823] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.359220] page dumped because: kasan: bad access detected [ 22.359497] [ 22.359660] Memory state around the buggy address: [ 22.359935] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.360336] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.360712] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.361028] ^ [ 22.361212] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.361801] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.362083] ================================================================== [ 22.363643] ================================================================== [ 22.364322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 22.365138] Read of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.366049] [ 22.366431] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.366668] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.366706] Hardware name: linux,dummy-virt (DT) [ 22.366769] Call trace: [ 22.366803] show_stack+0x20/0x38 (C) [ 22.366869] dump_stack_lvl+0x8c/0xd0 [ 22.366927] print_report+0x118/0x608 [ 22.366985] kasan_report+0xdc/0x128 [ 22.367039] __asan_report_load8_noabort+0x20/0x30 [ 22.367098] kasan_atomics_helper+0x3e20/0x4858 [ 22.367155] kasan_atomics+0x198/0x2e8 [ 22.367211] kunit_try_run_case+0x170/0x3f0 [ 22.367267] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.367327] kthread+0x318/0x620 [ 22.367382] ret_from_fork+0x10/0x20 [ 22.367442] [ 22.372157] Allocated by task 254: [ 22.372541] kasan_save_stack+0x3c/0x68 [ 22.372865] kasan_save_track+0x20/0x40 [ 22.373287] kasan_save_alloc_info+0x40/0x58 [ 22.373563] __kasan_kmalloc+0xd4/0xd8 [ 22.374003] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.374320] kasan_atomics+0xb8/0x2e8 [ 22.374731] kunit_try_run_case+0x170/0x3f0 [ 22.375130] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.375466] kthread+0x318/0x620 [ 22.375852] ret_from_fork+0x10/0x20 [ 22.376220] [ 22.376458] The buggy address belongs to the object at fff00000c66ea700 [ 22.376458] which belongs to the cache kmalloc-64 of size 64 [ 22.376920] The buggy address is located 0 bytes to the right of [ 22.376920] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.377911] [ 22.378115] The buggy address belongs to the physical page: [ 22.378485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.379259] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.379648] page_type: f5(slab) [ 22.380053] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.380576] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.381152] page dumped because: kasan: bad access detected [ 22.381564] [ 22.381718] Memory state around the buggy address: [ 22.382109] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.382654] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.383204] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.383612] ^ [ 22.383876] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.384289] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.384564] ================================================================== [ 22.251085] ================================================================== [ 22.251822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 22.252598] Read of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.253464] [ 22.253734] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.253943] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.253981] Hardware name: linux,dummy-virt (DT) [ 22.254020] Call trace: [ 22.254052] show_stack+0x20/0x38 (C) [ 22.254143] dump_stack_lvl+0x8c/0xd0 [ 22.254206] print_report+0x118/0x608 [ 22.254266] kasan_report+0xdc/0x128 [ 22.254321] __asan_report_load8_noabort+0x20/0x30 [ 22.254384] kasan_atomics_helper+0x3db0/0x4858 [ 22.254450] kasan_atomics+0x198/0x2e8 [ 22.254522] kunit_try_run_case+0x170/0x3f0 [ 22.254594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.254659] kthread+0x318/0x620 [ 22.254716] ret_from_fork+0x10/0x20 [ 22.254801] [ 22.258161] Allocated by task 254: [ 22.258389] kasan_save_stack+0x3c/0x68 [ 22.258662] kasan_save_track+0x20/0x40 [ 22.259521] kasan_save_alloc_info+0x40/0x58 [ 22.259878] __kasan_kmalloc+0xd4/0xd8 [ 22.260192] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.260478] kasan_atomics+0xb8/0x2e8 [ 22.260761] kunit_try_run_case+0x170/0x3f0 [ 22.261051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.261402] kthread+0x318/0x620 [ 22.261775] ret_from_fork+0x10/0x20 [ 22.262055] [ 22.262260] The buggy address belongs to the object at fff00000c66ea700 [ 22.262260] which belongs to the cache kmalloc-64 of size 64 [ 22.262824] The buggy address is located 0 bytes to the right of [ 22.262824] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.263421] [ 22.263556] The buggy address belongs to the physical page: [ 22.264228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.264618] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.265166] page_type: f5(slab) [ 22.265513] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.266045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.266593] page dumped because: kasan: bad access detected [ 22.267238] [ 22.267487] Memory state around the buggy address: [ 22.267689] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.268009] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.268332] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.268670] ^ [ 22.269576] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.270176] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.270724] ================================================================== [ 21.350873] ================================================================== [ 21.351207] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 21.351617] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.352097] [ 21.352264] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.352362] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.352396] Hardware name: linux,dummy-virt (DT) [ 21.352435] Call trace: [ 21.352463] show_stack+0x20/0x38 (C) [ 21.352522] dump_stack_lvl+0x8c/0xd0 [ 21.352579] print_report+0x118/0x608 [ 21.352631] kasan_report+0xdc/0x128 [ 21.352686] kasan_check_range+0x100/0x1a8 [ 21.352788] __kasan_check_write+0x20/0x30 [ 21.352846] kasan_atomics_helper+0x32c/0x4858 [ 21.352903] kasan_atomics+0x198/0x2e8 [ 21.352956] kunit_try_run_case+0x170/0x3f0 [ 21.353013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.353072] kthread+0x318/0x620 [ 21.353124] ret_from_fork+0x10/0x20 [ 21.353181] [ 21.356233] Allocated by task 254: [ 21.356411] kasan_save_stack+0x3c/0x68 [ 21.356703] kasan_save_track+0x20/0x40 [ 21.357943] kasan_save_alloc_info+0x40/0x58 [ 21.358213] __kasan_kmalloc+0xd4/0xd8 [ 21.358436] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.358910] kasan_atomics+0xb8/0x2e8 [ 21.359127] kunit_try_run_case+0x170/0x3f0 [ 21.359368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.359706] kthread+0x318/0x620 [ 21.359981] ret_from_fork+0x10/0x20 [ 21.360204] [ 21.360337] The buggy address belongs to the object at fff00000c66ea700 [ 21.360337] which belongs to the cache kmalloc-64 of size 64 [ 21.360862] The buggy address is located 0 bytes to the right of [ 21.360862] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.361430] [ 21.361541] The buggy address belongs to the physical page: [ 21.361819] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.362196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.362549] page_type: f5(slab) [ 21.363462] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.363808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.364143] page dumped because: kasan: bad access detected [ 21.364457] [ 21.364599] Memory state around the buggy address: [ 21.364974] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.365284] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.365618] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.365941] ^ [ 21.366232] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.366599] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.366946] ================================================================== [ 22.218307] ================================================================== [ 22.218929] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 22.219285] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.219646] [ 22.219836] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.219938] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.219974] Hardware name: linux,dummy-virt (DT) [ 22.220012] Call trace: [ 22.220042] show_stack+0x20/0x38 (C) [ 22.220102] dump_stack_lvl+0x8c/0xd0 [ 22.220160] print_report+0x118/0x608 [ 22.220216] kasan_report+0xdc/0x128 [ 22.220267] kasan_check_range+0x100/0x1a8 [ 22.220321] __kasan_check_write+0x20/0x30 [ 22.220372] kasan_atomics_helper+0x154c/0x4858 [ 22.220426] kasan_atomics+0x198/0x2e8 [ 22.220478] kunit_try_run_case+0x170/0x3f0 [ 22.220532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.220589] kthread+0x318/0x620 [ 22.220640] ret_from_fork+0x10/0x20 [ 22.220694] [ 22.223638] Allocated by task 254: [ 22.223868] kasan_save_stack+0x3c/0x68 [ 22.224130] kasan_save_track+0x20/0x40 [ 22.224423] kasan_save_alloc_info+0x40/0x58 [ 22.224642] __kasan_kmalloc+0xd4/0xd8 [ 22.224914] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.225177] kasan_atomics+0xb8/0x2e8 [ 22.225415] kunit_try_run_case+0x170/0x3f0 [ 22.225682] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.225946] kthread+0x318/0x620 [ 22.226179] ret_from_fork+0x10/0x20 [ 22.226401] [ 22.226534] The buggy address belongs to the object at fff00000c66ea700 [ 22.226534] which belongs to the cache kmalloc-64 of size 64 [ 22.227002] The buggy address is located 0 bytes to the right of [ 22.227002] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.227594] [ 22.227786] The buggy address belongs to the physical page: [ 22.227997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.228436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.228807] page_type: f5(slab) [ 22.229010] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.229359] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.229830] page dumped because: kasan: bad access detected [ 22.230111] [ 22.230304] Memory state around the buggy address: [ 22.230595] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.231052] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.231387] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.231679] ^ [ 22.232034] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.232448] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.232784] ================================================================== [ 22.178304] ================================================================== [ 22.178796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 22.179374] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 22.179728] [ 22.179895] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 22.180000] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.180038] Hardware name: linux,dummy-virt (DT) [ 22.180076] Call trace: [ 22.180108] show_stack+0x20/0x38 (C) [ 22.180172] dump_stack_lvl+0x8c/0xd0 [ 22.180229] print_report+0x118/0x608 [ 22.180284] kasan_report+0xdc/0x128 [ 22.180337] kasan_check_range+0x100/0x1a8 [ 22.180393] __kasan_check_write+0x20/0x30 [ 22.180445] kasan_atomics_helper+0x147c/0x4858 [ 22.180500] kasan_atomics+0x198/0x2e8 [ 22.180553] kunit_try_run_case+0x170/0x3f0 [ 22.180607] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.180664] kthread+0x318/0x620 [ 22.180714] ret_from_fork+0x10/0x20 [ 22.180789] [ 22.185345] Allocated by task 254: [ 22.185677] kasan_save_stack+0x3c/0x68 [ 22.185929] kasan_save_track+0x20/0x40 [ 22.186175] kasan_save_alloc_info+0x40/0x58 [ 22.186463] __kasan_kmalloc+0xd4/0xd8 [ 22.186695] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.186963] kasan_atomics+0xb8/0x2e8 [ 22.187190] kunit_try_run_case+0x170/0x3f0 [ 22.187462] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.188327] kthread+0x318/0x620 [ 22.188570] ret_from_fork+0x10/0x20 [ 22.188760] [ 22.189116] The buggy address belongs to the object at fff00000c66ea700 [ 22.189116] which belongs to the cache kmalloc-64 of size 64 [ 22.189946] The buggy address is located 0 bytes to the right of [ 22.189946] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 22.190669] [ 22.190864] The buggy address belongs to the physical page: [ 22.191121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 22.191462] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.191781] page_type: f5(slab) [ 22.191994] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.192326] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 22.192651] page dumped because: kasan: bad access detected [ 22.193928] [ 22.194080] Memory state around the buggy address: [ 22.194353] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.194773] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.195093] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.195547] ^ [ 22.195904] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.196424] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.196820] ================================================================== [ 21.732385] ================================================================== [ 21.732852] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 21.733507] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.733944] [ 21.734156] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.734258] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.734292] Hardware name: linux,dummy-virt (DT) [ 21.734331] Call trace: [ 21.734359] show_stack+0x20/0x38 (C) [ 21.734444] dump_stack_lvl+0x8c/0xd0 [ 21.734535] print_report+0x118/0x608 [ 21.734592] kasan_report+0xdc/0x128 [ 21.734667] __asan_report_load4_noabort+0x20/0x30 [ 21.734724] kasan_atomics_helper+0x3dcc/0x4858 [ 21.734797] kasan_atomics+0x198/0x2e8 [ 21.734854] kunit_try_run_case+0x170/0x3f0 [ 21.734913] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.734976] kthread+0x318/0x620 [ 21.735029] ret_from_fork+0x10/0x20 [ 21.735118] [ 21.738235] Allocated by task 254: [ 21.738588] kasan_save_stack+0x3c/0x68 [ 21.738907] kasan_save_track+0x20/0x40 [ 21.739278] kasan_save_alloc_info+0x40/0x58 [ 21.739572] __kasan_kmalloc+0xd4/0xd8 [ 21.739816] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.740002] kasan_atomics+0xb8/0x2e8 [ 21.740357] kunit_try_run_case+0x170/0x3f0 [ 21.740743] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.741115] kthread+0x318/0x620 [ 21.741320] ret_from_fork+0x10/0x20 [ 21.741610] [ 21.741818] The buggy address belongs to the object at fff00000c66ea700 [ 21.741818] which belongs to the cache kmalloc-64 of size 64 [ 21.742382] The buggy address is located 0 bytes to the right of [ 21.742382] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.743185] [ 21.743389] The buggy address belongs to the physical page: [ 21.743658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.744135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.744438] page_type: f5(slab) [ 21.744747] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.745203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.745514] page dumped because: kasan: bad access detected [ 21.745924] [ 21.746041] Memory state around the buggy address: [ 21.746381] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.746864] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.747189] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.747681] ^ [ 21.748016] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.748356] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.748758] ================================================================== [ 21.924103] ================================================================== [ 21.924531] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 21.924916] Write of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.925218] [ 21.925431] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.925535] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.925573] Hardware name: linux,dummy-virt (DT) [ 21.925614] Call trace: [ 21.925644] show_stack+0x20/0x38 (C) [ 21.925706] dump_stack_lvl+0x8c/0xd0 [ 21.926614] print_report+0x118/0x608 [ 21.926686] kasan_report+0xdc/0x128 [ 21.926750] kasan_check_range+0x100/0x1a8 [ 21.926811] __kasan_check_write+0x20/0x30 [ 21.926862] kasan_atomics_helper+0xe44/0x4858 [ 21.926918] kasan_atomics+0x198/0x2e8 [ 21.926970] kunit_try_run_case+0x170/0x3f0 [ 21.927023] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.927081] kthread+0x318/0x620 [ 21.927130] ret_from_fork+0x10/0x20 [ 21.927187] [ 21.930577] Allocated by task 254: [ 21.930789] kasan_save_stack+0x3c/0x68 [ 21.931165] kasan_save_track+0x20/0x40 [ 21.931478] kasan_save_alloc_info+0x40/0x58 [ 21.931784] __kasan_kmalloc+0xd4/0xd8 [ 21.932117] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.932392] kasan_atomics+0xb8/0x2e8 [ 21.932624] kunit_try_run_case+0x170/0x3f0 [ 21.933013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.933326] kthread+0x318/0x620 [ 21.933664] ret_from_fork+0x10/0x20 [ 21.933923] [ 21.934060] The buggy address belongs to the object at fff00000c66ea700 [ 21.934060] which belongs to the cache kmalloc-64 of size 64 [ 21.934632] The buggy address is located 0 bytes to the right of [ 21.934632] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.935365] [ 21.935481] The buggy address belongs to the physical page: [ 21.935833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.936250] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.936540] page_type: f5(slab) [ 21.936797] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.937228] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.937627] page dumped because: kasan: bad access detected [ 21.937892] [ 21.938087] Memory state around the buggy address: [ 21.938359] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.938712] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.939074] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.939447] ^ [ 21.939700] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.939959] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.940173] ================================================================== [ 21.367825] ================================================================== [ 21.368219] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 21.368622] Write of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.370027] [ 21.370209] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.370318] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.370352] Hardware name: linux,dummy-virt (DT) [ 21.370393] Call trace: [ 21.370424] show_stack+0x20/0x38 (C) [ 21.370506] dump_stack_lvl+0x8c/0xd0 [ 21.370565] print_report+0x118/0x608 [ 21.370621] kasan_report+0xdc/0x128 [ 21.370676] __asan_report_store4_noabort+0x20/0x30 [ 21.370734] kasan_atomics_helper+0x3f94/0x4858 [ 21.370824] kasan_atomics+0x198/0x2e8 [ 21.370878] kunit_try_run_case+0x170/0x3f0 [ 21.370935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.370994] kthread+0x318/0x620 [ 21.371046] ret_from_fork+0x10/0x20 [ 21.371103] [ 21.374026] Allocated by task 254: [ 21.374256] kasan_save_stack+0x3c/0x68 [ 21.374439] kasan_save_track+0x20/0x40 [ 21.374798] kasan_save_alloc_info+0x40/0x58 [ 21.375050] __kasan_kmalloc+0xd4/0xd8 [ 21.375224] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.375611] kasan_atomics+0xb8/0x2e8 [ 21.375890] kunit_try_run_case+0x170/0x3f0 [ 21.376129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.376519] kthread+0x318/0x620 [ 21.376683] ret_from_fork+0x10/0x20 [ 21.376855] [ 21.377021] The buggy address belongs to the object at fff00000c66ea700 [ 21.377021] which belongs to the cache kmalloc-64 of size 64 [ 21.377630] The buggy address is located 0 bytes to the right of [ 21.377630] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.378305] [ 21.378434] The buggy address belongs to the physical page: [ 21.378859] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.379153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.379547] page_type: f5(slab) [ 21.379925] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.380172] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.380556] page dumped because: kasan: bad access detected [ 21.380958] [ 21.381128] Memory state around the buggy address: [ 21.381415] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.381801] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.382125] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.382491] ^ [ 21.382766] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.383523] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.383840] ================================================================== [ 21.317668] ================================================================== [ 21.317954] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 21.318438] Read of size 4 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.318681] [ 21.318816] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.318935] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.318973] Hardware name: linux,dummy-virt (DT) [ 21.319014] Call trace: [ 21.319043] show_stack+0x20/0x38 (C) [ 21.319103] dump_stack_lvl+0x8c/0xd0 [ 21.319159] print_report+0x118/0x608 [ 21.319214] kasan_report+0xdc/0x128 [ 21.319268] kasan_check_range+0x100/0x1a8 [ 21.319324] __kasan_check_read+0x20/0x30 [ 21.319377] kasan_atomics_helper+0x2b0/0x4858 [ 21.319433] kasan_atomics+0x198/0x2e8 [ 21.319485] kunit_try_run_case+0x170/0x3f0 [ 21.319542] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.319600] kthread+0x318/0x620 [ 21.319650] ret_from_fork+0x10/0x20 [ 21.319705] [ 21.323846] Allocated by task 254: [ 21.324163] kasan_save_stack+0x3c/0x68 [ 21.324423] kasan_save_track+0x20/0x40 [ 21.324680] kasan_save_alloc_info+0x40/0x58 [ 21.324856] __kasan_kmalloc+0xd4/0xd8 [ 21.325059] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.325403] kasan_atomics+0xb8/0x2e8 [ 21.325656] kunit_try_run_case+0x170/0x3f0 [ 21.325914] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.326235] kthread+0x318/0x620 [ 21.326637] ret_from_fork+0x10/0x20 [ 21.326874] [ 21.327024] The buggy address belongs to the object at fff00000c66ea700 [ 21.327024] which belongs to the cache kmalloc-64 of size 64 [ 21.327497] The buggy address is located 0 bytes to the right of [ 21.327497] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.328130] [ 21.328302] The buggy address belongs to the physical page: [ 21.328656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.329007] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.329401] page_type: f5(slab) [ 21.329668] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.330040] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.330449] page dumped because: kasan: bad access detected [ 21.330791] [ 21.330917] Memory state around the buggy address: [ 21.331108] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.331500] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.331897] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.332160] ^ [ 21.332380] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.332611] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.333613] ================================================================== [ 21.887666] ================================================================== [ 21.888059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 21.888545] Read of size 8 at addr fff00000c66ea730 by task kunit_try_catch/254 [ 21.888926] [ 21.889068] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.889161] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.889194] Hardware name: linux,dummy-virt (DT) [ 21.889229] Call trace: [ 21.889256] show_stack+0x20/0x38 (C) [ 21.889308] dump_stack_lvl+0x8c/0xd0 [ 21.889359] print_report+0x118/0x608 [ 21.889408] kasan_report+0xdc/0x128 [ 21.889457] kasan_check_range+0x100/0x1a8 [ 21.889506] __kasan_check_read+0x20/0x30 [ 21.889554] kasan_atomics_helper+0xdd4/0x4858 [ 21.889603] kasan_atomics+0x198/0x2e8 [ 21.889651] kunit_try_run_case+0x170/0x3f0 [ 21.889701] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.889765] kthread+0x318/0x620 [ 21.889817] ret_from_fork+0x10/0x20 [ 21.889867] [ 21.893897] Allocated by task 254: [ 21.894131] kasan_save_stack+0x3c/0x68 [ 21.894526] kasan_save_track+0x20/0x40 [ 21.894709] kasan_save_alloc_info+0x40/0x58 [ 21.894891] __kasan_kmalloc+0xd4/0xd8 [ 21.895327] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.895605] kasan_atomics+0xb8/0x2e8 [ 21.895791] kunit_try_run_case+0x170/0x3f0 [ 21.895967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.896447] kthread+0x318/0x620 [ 21.896777] ret_from_fork+0x10/0x20 [ 21.897059] [ 21.897275] The buggy address belongs to the object at fff00000c66ea700 [ 21.897275] which belongs to the cache kmalloc-64 of size 64 [ 21.897921] The buggy address is located 0 bytes to the right of [ 21.897921] allocated 48-byte region [fff00000c66ea700, fff00000c66ea730) [ 21.898295] [ 21.898483] The buggy address belongs to the physical page: [ 21.898925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ea [ 21.899468] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.899835] page_type: f5(slab) [ 21.900145] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.900700] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.901097] page dumped because: kasan: bad access detected [ 21.901415] [ 21.901532] Memory state around the buggy address: [ 21.901932] fff00000c66ea600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.902311] fff00000c66ea680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.902669] >fff00000c66ea700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.903044] ^ [ 21.903292] fff00000c66ea780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.903642] fff00000c66ea800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.904422] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 21.112768] ================================================================== [ 21.113188] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 21.113663] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250 [ 21.113977] [ 21.114179] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.114285] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.114318] Hardware name: linux,dummy-virt (DT) [ 21.114378] Call trace: [ 21.114424] show_stack+0x20/0x38 (C) [ 21.114487] dump_stack_lvl+0x8c/0xd0 [ 21.114543] print_report+0x118/0x608 [ 21.114791] kasan_report+0xdc/0x128 [ 21.114917] kasan_check_range+0x100/0x1a8 [ 21.114981] __kasan_check_write+0x20/0x30 [ 21.115035] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8 [ 21.115096] kasan_bitops_generic+0x11c/0x1c8 [ 21.115151] kunit_try_run_case+0x170/0x3f0 [ 21.115212] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.115271] kthread+0x318/0x620 [ 21.115322] ret_from_fork+0x10/0x20 [ 21.115382] [ 21.119292] Allocated by task 250: [ 21.119775] kasan_save_stack+0x3c/0x68 [ 21.120049] kasan_save_track+0x20/0x40 [ 21.120280] kasan_save_alloc_info+0x40/0x58 [ 21.120531] __kasan_kmalloc+0xd4/0xd8 [ 21.120761] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.121508] kasan_bitops_generic+0xa0/0x1c8 [ 21.121859] kunit_try_run_case+0x170/0x3f0 [ 21.122113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.122400] kthread+0x318/0x620 [ 21.122858] ret_from_fork+0x10/0x20 [ 21.123231] [ 21.123437] The buggy address belongs to the object at fff00000c1e7a0e0 [ 21.123437] which belongs to the cache kmalloc-16 of size 16 [ 21.124404] The buggy address is located 8 bytes inside of [ 21.124404] allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9) [ 21.125180] [ 21.125382] The buggy address belongs to the physical page: [ 21.125799] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 21.126122] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.126708] page_type: f5(slab) [ 21.126892] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.127278] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.127649] page dumped because: kasan: bad access detected [ 21.127908] [ 21.128046] Memory state around the buggy address: [ 21.128269] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.128630] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.129339] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 21.129784] ^ [ 21.131634] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.131986] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.132465] ================================================================== [ 21.184530] ================================================================== [ 21.184806] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 21.185416] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250 [ 21.185664] [ 21.185861] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.185956] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.185992] Hardware name: linux,dummy-virt (DT) [ 21.186029] Call trace: [ 21.186058] show_stack+0x20/0x38 (C) [ 21.186127] dump_stack_lvl+0x8c/0xd0 [ 21.186186] print_report+0x118/0x608 [ 21.186243] kasan_report+0xdc/0x128 [ 21.186298] kasan_check_range+0x100/0x1a8 [ 21.186353] __kasan_check_write+0x20/0x30 [ 21.186404] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8 [ 21.186466] kasan_bitops_generic+0x11c/0x1c8 [ 21.186557] kunit_try_run_case+0x170/0x3f0 [ 21.186614] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.186673] kthread+0x318/0x620 [ 21.186726] ret_from_fork+0x10/0x20 [ 21.186800] [ 21.189648] Allocated by task 250: [ 21.189918] kasan_save_stack+0x3c/0x68 [ 21.190148] kasan_save_track+0x20/0x40 [ 21.190318] kasan_save_alloc_info+0x40/0x58 [ 21.190581] __kasan_kmalloc+0xd4/0xd8 [ 21.190911] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.191145] kasan_bitops_generic+0xa0/0x1c8 [ 21.191502] kunit_try_run_case+0x170/0x3f0 [ 21.191733] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.192091] kthread+0x318/0x620 [ 21.192236] ret_from_fork+0x10/0x20 [ 21.192445] [ 21.192601] The buggy address belongs to the object at fff00000c1e7a0e0 [ 21.192601] which belongs to the cache kmalloc-16 of size 16 [ 21.193274] The buggy address is located 8 bytes inside of [ 21.193274] allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9) [ 21.193869] [ 21.194034] The buggy address belongs to the physical page: [ 21.194319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 21.194695] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.195044] page_type: f5(slab) [ 21.195296] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.195566] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.195950] page dumped because: kasan: bad access detected [ 21.196134] [ 21.196306] Memory state around the buggy address: [ 21.196580] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.197027] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.197420] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 21.197734] ^ [ 21.198100] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.198434] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.198723] ================================================================== [ 21.092622] ================================================================== [ 21.093014] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 21.093654] Read of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250 [ 21.094204] [ 21.094425] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.094554] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.094591] Hardware name: linux,dummy-virt (DT) [ 21.094631] Call trace: [ 21.094660] show_stack+0x20/0x38 (C) [ 21.094721] dump_stack_lvl+0x8c/0xd0 [ 21.094794] print_report+0x118/0x608 [ 21.095541] kasan_report+0xdc/0x128 [ 21.095602] __asan_report_load8_noabort+0x20/0x30 [ 21.095661] kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8 [ 21.095724] kasan_bitops_generic+0x11c/0x1c8 [ 21.095810] kunit_try_run_case+0x170/0x3f0 [ 21.095867] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.095927] kthread+0x318/0x620 [ 21.095981] ret_from_fork+0x10/0x20 [ 21.096041] [ 21.100347] Allocated by task 250: [ 21.100629] kasan_save_stack+0x3c/0x68 [ 21.100956] kasan_save_track+0x20/0x40 [ 21.101237] kasan_save_alloc_info+0x40/0x58 [ 21.101497] __kasan_kmalloc+0xd4/0xd8 [ 21.101771] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.102004] kasan_bitops_generic+0xa0/0x1c8 [ 21.102367] kunit_try_run_case+0x170/0x3f0 [ 21.102788] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.103327] kthread+0x318/0x620 [ 21.103563] ret_from_fork+0x10/0x20 [ 21.103837] [ 21.103989] The buggy address belongs to the object at fff00000c1e7a0e0 [ 21.103989] which belongs to the cache kmalloc-16 of size 16 [ 21.104609] The buggy address is located 8 bytes inside of [ 21.104609] allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9) [ 21.105138] [ 21.105242] The buggy address belongs to the physical page: [ 21.105682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 21.106241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.106710] page_type: f5(slab) [ 21.106942] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.107813] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.108289] page dumped because: kasan: bad access detected [ 21.108603] [ 21.108756] Memory state around the buggy address: [ 21.109000] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.109402] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.109802] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 21.110176] ^ [ 21.110609] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.111027] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.111653] ================================================================== [ 21.072641] ================================================================== [ 21.073145] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 21.073708] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250 [ 21.074030] [ 21.074262] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.074367] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.074426] Hardware name: linux,dummy-virt (DT) [ 21.074484] Call trace: [ 21.074798] show_stack+0x20/0x38 (C) [ 21.074868] dump_stack_lvl+0x8c/0xd0 [ 21.074923] print_report+0x118/0x608 [ 21.074978] kasan_report+0xdc/0x128 [ 21.075029] kasan_check_range+0x100/0x1a8 [ 21.075085] __kasan_check_write+0x20/0x30 [ 21.075135] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8 [ 21.075195] kasan_bitops_generic+0x11c/0x1c8 [ 21.075249] kunit_try_run_case+0x170/0x3f0 [ 21.075302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.075359] kthread+0x318/0x620 [ 21.075408] ret_from_fork+0x10/0x20 [ 21.075464] [ 21.079206] Allocated by task 250: [ 21.079488] kasan_save_stack+0x3c/0x68 [ 21.079771] kasan_save_track+0x20/0x40 [ 21.080097] kasan_save_alloc_info+0x40/0x58 [ 21.080515] __kasan_kmalloc+0xd4/0xd8 [ 21.080822] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.081204] kasan_bitops_generic+0xa0/0x1c8 [ 21.081484] kunit_try_run_case+0x170/0x3f0 [ 21.081850] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.082153] kthread+0x318/0x620 [ 21.082463] ret_from_fork+0x10/0x20 [ 21.082752] [ 21.082901] The buggy address belongs to the object at fff00000c1e7a0e0 [ 21.082901] which belongs to the cache kmalloc-16 of size 16 [ 21.083531] The buggy address is located 8 bytes inside of [ 21.083531] allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9) [ 21.084199] [ 21.084356] The buggy address belongs to the physical page: [ 21.084556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 21.085761] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.086323] page_type: f5(slab) [ 21.086568] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.087254] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.087928] page dumped because: kasan: bad access detected [ 21.088208] [ 21.088402] Memory state around the buggy address: [ 21.088689] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.089259] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.089620] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 21.090029] ^ [ 21.090372] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.090970] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.091359] ================================================================== [ 21.199523] ================================================================== [ 21.199840] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 21.200263] Read of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250 [ 21.200478] [ 21.200666] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.200764] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.200798] Hardware name: linux,dummy-virt (DT) [ 21.200833] Call trace: [ 21.200858] show_stack+0x20/0x38 (C) [ 21.200914] dump_stack_lvl+0x8c/0xd0 [ 21.200965] print_report+0x118/0x608 [ 21.201017] kasan_report+0xdc/0x128 [ 21.201070] __asan_report_load8_noabort+0x20/0x30 [ 21.201121] kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8 [ 21.201183] kasan_bitops_generic+0x11c/0x1c8 [ 21.201238] kunit_try_run_case+0x170/0x3f0 [ 21.201291] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.201350] kthread+0x318/0x620 [ 21.201402] ret_from_fork+0x10/0x20 [ 21.201456] [ 21.205667] Allocated by task 250: [ 21.206063] kasan_save_stack+0x3c/0x68 [ 21.206389] kasan_save_track+0x20/0x40 [ 21.206559] kasan_save_alloc_info+0x40/0x58 [ 21.206728] __kasan_kmalloc+0xd4/0xd8 [ 21.207270] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.207812] kasan_bitops_generic+0xa0/0x1c8 [ 21.208008] kunit_try_run_case+0x170/0x3f0 [ 21.208360] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.208674] kthread+0x318/0x620 [ 21.208901] ret_from_fork+0x10/0x20 [ 21.209206] [ 21.209331] The buggy address belongs to the object at fff00000c1e7a0e0 [ 21.209331] which belongs to the cache kmalloc-16 of size 16 [ 21.209883] The buggy address is located 8 bytes inside of [ 21.209883] allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9) [ 21.210426] [ 21.210616] The buggy address belongs to the physical page: [ 21.210892] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 21.211362] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.211798] page_type: f5(slab) [ 21.211993] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.212327] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.212692] page dumped because: kasan: bad access detected [ 21.212975] [ 21.213150] Memory state around the buggy address: [ 21.213436] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.213895] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.214260] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 21.214612] ^ [ 21.214882] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.215310] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.215635] ================================================================== [ 21.133756] ================================================================== [ 21.134134] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 21.134818] Read of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250 [ 21.135871] [ 21.136127] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.136243] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.136277] Hardware name: linux,dummy-virt (DT) [ 21.136314] Call trace: [ 21.136343] show_stack+0x20/0x38 (C) [ 21.136405] dump_stack_lvl+0x8c/0xd0 [ 21.136458] print_report+0x118/0x608 [ 21.136511] kasan_report+0xdc/0x128 [ 21.136562] __asan_report_load8_noabort+0x20/0x30 [ 21.136614] kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8 [ 21.136674] kasan_bitops_generic+0x11c/0x1c8 [ 21.136727] kunit_try_run_case+0x170/0x3f0 [ 21.136803] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.136859] kthread+0x318/0x620 [ 21.136909] ret_from_fork+0x10/0x20 [ 21.136965] [ 21.140450] Allocated by task 250: [ 21.140732] kasan_save_stack+0x3c/0x68 [ 21.141036] kasan_save_track+0x20/0x40 [ 21.141333] kasan_save_alloc_info+0x40/0x58 [ 21.141712] __kasan_kmalloc+0xd4/0xd8 [ 21.141954] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.142313] kasan_bitops_generic+0xa0/0x1c8 [ 21.142591] kunit_try_run_case+0x170/0x3f0 [ 21.142934] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.143297] kthread+0x318/0x620 [ 21.143590] ret_from_fork+0x10/0x20 [ 21.143854] [ 21.143966] The buggy address belongs to the object at fff00000c1e7a0e0 [ 21.143966] which belongs to the cache kmalloc-16 of size 16 [ 21.144634] The buggy address is located 8 bytes inside of [ 21.144634] allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9) [ 21.145330] [ 21.145526] The buggy address belongs to the physical page: [ 21.145899] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 21.146233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.146479] page_type: f5(slab) [ 21.146643] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.147113] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.147583] page dumped because: kasan: bad access detected [ 21.148006] [ 21.148181] Memory state around the buggy address: [ 21.148510] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.149006] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.149427] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 21.149848] ^ [ 21.150222] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.150684] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.151083] ================================================================== [ 21.169406] ================================================================== [ 21.169816] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 21.170238] Read of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250 [ 21.170668] [ 21.170880] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.170983] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.171020] Hardware name: linux,dummy-virt (DT) [ 21.171058] Call trace: [ 21.171086] show_stack+0x20/0x38 (C) [ 21.171146] dump_stack_lvl+0x8c/0xd0 [ 21.171204] print_report+0x118/0x608 [ 21.171257] kasan_report+0xdc/0x128 [ 21.171309] __asan_report_load8_noabort+0x20/0x30 [ 21.171366] kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8 [ 21.171427] kasan_bitops_generic+0x11c/0x1c8 [ 21.171481] kunit_try_run_case+0x170/0x3f0 [ 21.171537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.171597] kthread+0x318/0x620 [ 21.171649] ret_from_fork+0x10/0x20 [ 21.171706] [ 21.174313] Allocated by task 250: [ 21.174628] kasan_save_stack+0x3c/0x68 [ 21.174968] kasan_save_track+0x20/0x40 [ 21.175175] kasan_save_alloc_info+0x40/0x58 [ 21.175499] __kasan_kmalloc+0xd4/0xd8 [ 21.175708] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.175984] kasan_bitops_generic+0xa0/0x1c8 [ 21.176257] kunit_try_run_case+0x170/0x3f0 [ 21.176517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.176842] kthread+0x318/0x620 [ 21.177097] ret_from_fork+0x10/0x20 [ 21.177286] [ 21.177391] The buggy address belongs to the object at fff00000c1e7a0e0 [ 21.177391] which belongs to the cache kmalloc-16 of size 16 [ 21.177720] The buggy address is located 8 bytes inside of [ 21.177720] allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9) [ 21.178427] [ 21.178595] The buggy address belongs to the physical page: [ 21.178884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 21.179334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.179633] page_type: f5(slab) [ 21.179861] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.180295] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.180557] page dumped because: kasan: bad access detected [ 21.180877] [ 21.181004] Memory state around the buggy address: [ 21.181341] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.181773] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.182147] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 21.182531] ^ [ 21.182895] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.183279] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.183624] ================================================================== [ 21.152326] ================================================================== [ 21.152630] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 21.153242] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250 [ 21.153777] [ 21.153941] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.154041] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.154085] Hardware name: linux,dummy-virt (DT) [ 21.154127] Call trace: [ 21.154176] show_stack+0x20/0x38 (C) [ 21.154239] dump_stack_lvl+0x8c/0xd0 [ 21.154295] print_report+0x118/0x608 [ 21.154372] kasan_report+0xdc/0x128 [ 21.154435] kasan_check_range+0x100/0x1a8 [ 21.154493] __kasan_check_write+0x20/0x30 [ 21.154547] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8 [ 21.155063] kasan_bitops_generic+0x11c/0x1c8 [ 21.155173] kunit_try_run_case+0x170/0x3f0 [ 21.155237] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.155301] kthread+0x318/0x620 [ 21.155357] ret_from_fork+0x10/0x20 [ 21.155416] [ 21.158097] Allocated by task 250: [ 21.158281] kasan_save_stack+0x3c/0x68 [ 21.158467] kasan_save_track+0x20/0x40 [ 21.158629] kasan_save_alloc_info+0x40/0x58 [ 21.158870] __kasan_kmalloc+0xd4/0xd8 [ 21.159164] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.159487] kasan_bitops_generic+0xa0/0x1c8 [ 21.159871] kunit_try_run_case+0x170/0x3f0 [ 21.160216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.160546] kthread+0x318/0x620 [ 21.160789] ret_from_fork+0x10/0x20 [ 21.161043] [ 21.161215] The buggy address belongs to the object at fff00000c1e7a0e0 [ 21.161215] which belongs to the cache kmalloc-16 of size 16 [ 21.162006] The buggy address is located 8 bytes inside of [ 21.162006] allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9) [ 21.162588] [ 21.162735] The buggy address belongs to the physical page: [ 21.163314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 21.163774] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.164126] page_type: f5(slab) [ 21.164451] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.164965] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.165379] page dumped because: kasan: bad access detected [ 21.165762] [ 21.165903] Memory state around the buggy address: [ 21.166207] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.166627] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.166870] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 21.167342] ^ [ 21.167922] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.168264] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.168634] ================================================================== [ 21.216459] ================================================================== [ 21.216843] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 21.217141] Read of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250 [ 21.217420] [ 21.217561] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.217661] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.217695] Hardware name: linux,dummy-virt (DT) [ 21.217732] Call trace: [ 21.217781] show_stack+0x20/0x38 (C) [ 21.217839] dump_stack_lvl+0x8c/0xd0 [ 21.217926] print_report+0x118/0x608 [ 21.217981] kasan_report+0xdc/0x128 [ 21.218035] __asan_report_load8_noabort+0x20/0x30 [ 21.218136] kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8 [ 21.218212] kasan_bitops_generic+0x11c/0x1c8 [ 21.218267] kunit_try_run_case+0x170/0x3f0 [ 21.218324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.218383] kthread+0x318/0x620 [ 21.218433] ret_from_fork+0x10/0x20 [ 21.218510] [ 21.220634] Allocated by task 250: [ 21.221528] kasan_save_stack+0x3c/0x68 [ 21.221898] kasan_save_track+0x20/0x40 [ 21.222080] kasan_save_alloc_info+0x40/0x58 [ 21.222408] __kasan_kmalloc+0xd4/0xd8 [ 21.222854] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.223175] kasan_bitops_generic+0xa0/0x1c8 [ 21.223359] kunit_try_run_case+0x170/0x3f0 [ 21.223697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.223997] kthread+0x318/0x620 [ 21.224289] ret_from_fork+0x10/0x20 [ 21.224502] [ 21.224637] The buggy address belongs to the object at fff00000c1e7a0e0 [ 21.224637] which belongs to the cache kmalloc-16 of size 16 [ 21.225148] The buggy address is located 8 bytes inside of [ 21.225148] allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9) [ 21.225766] [ 21.225916] The buggy address belongs to the physical page: [ 21.226212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 21.226568] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.226974] page_type: f5(slab) [ 21.227291] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.227651] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.227963] page dumped because: kasan: bad access detected [ 21.228195] [ 21.228379] Memory state around the buggy address: [ 21.228671] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.228939] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.229319] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 21.229689] ^ [ 21.230014] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.230324] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.230657] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 21.010715] ================================================================== [ 21.011253] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 21.011719] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250 [ 21.012052] [ 21.012227] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.012320] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.012352] Hardware name: linux,dummy-virt (DT) [ 21.012390] Call trace: [ 21.012418] show_stack+0x20/0x38 (C) [ 21.012474] dump_stack_lvl+0x8c/0xd0 [ 21.012528] print_report+0x118/0x608 [ 21.012580] kasan_report+0xdc/0x128 [ 21.012629] kasan_check_range+0x100/0x1a8 [ 21.012683] __kasan_check_write+0x20/0x30 [ 21.013050] kasan_bitops_modify.constprop.0+0x344/0xbc8 [ 21.013120] kasan_bitops_generic+0x110/0x1c8 [ 21.013175] kunit_try_run_case+0x170/0x3f0 [ 21.013230] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.013285] kthread+0x318/0x620 [ 21.013333] ret_from_fork+0x10/0x20 [ 21.013387] [ 21.017535] Allocated by task 250: [ 21.017973] kasan_save_stack+0x3c/0x68 [ 21.018375] kasan_save_track+0x20/0x40 [ 21.018885] kasan_save_alloc_info+0x40/0x58 [ 21.019207] __kasan_kmalloc+0xd4/0xd8 [ 21.019919] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.020235] kasan_bitops_generic+0xa0/0x1c8 [ 21.020445] kunit_try_run_case+0x170/0x3f0 [ 21.020653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.020881] kthread+0x318/0x620 [ 21.021066] ret_from_fork+0x10/0x20 [ 21.021241] [ 21.021365] The buggy address belongs to the object at fff00000c1e7a0e0 [ 21.021365] which belongs to the cache kmalloc-16 of size 16 [ 21.021817] The buggy address is located 8 bytes inside of [ 21.021817] allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9) [ 21.023151] [ 21.023326] The buggy address belongs to the physical page: [ 21.023624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 21.024125] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.024545] page_type: f5(slab) [ 21.024826] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.025127] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.025471] page dumped because: kasan: bad access detected [ 21.026018] [ 21.026271] Memory state around the buggy address: [ 21.027375] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.027808] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.028320] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 21.028707] ^ [ 21.029010] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.029474] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.029889] ================================================================== [ 20.883267] ================================================================== [ 20.883679] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 20.884216] Read of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250 [ 20.884565] [ 20.884692] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 20.884836] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.884875] Hardware name: linux,dummy-virt (DT) [ 20.885045] Call trace: [ 20.885219] show_stack+0x20/0x38 (C) [ 20.885283] dump_stack_lvl+0x8c/0xd0 [ 20.885340] print_report+0x118/0x608 [ 20.885398] kasan_report+0xdc/0x128 [ 20.885452] __asan_report_load8_noabort+0x20/0x30 [ 20.885506] kasan_bitops_modify.constprop.0+0xa4c/0xbc8 [ 20.885567] kasan_bitops_generic+0x110/0x1c8 [ 20.885622] kunit_try_run_case+0x170/0x3f0 [ 20.885676] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.885753] kthread+0x318/0x620 [ 20.885813] ret_from_fork+0x10/0x20 [ 20.885875] [ 20.889791] Allocated by task 250: [ 20.889978] kasan_save_stack+0x3c/0x68 [ 20.890222] kasan_save_track+0x20/0x40 [ 20.890397] kasan_save_alloc_info+0x40/0x58 [ 20.890594] __kasan_kmalloc+0xd4/0xd8 [ 20.891958] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.892269] kasan_bitops_generic+0xa0/0x1c8 [ 20.892810] kunit_try_run_case+0x170/0x3f0 [ 20.893196] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.894079] kthread+0x318/0x620 [ 20.894366] ret_from_fork+0x10/0x20 [ 20.894540] [ 20.894716] The buggy address belongs to the object at fff00000c1e7a0e0 [ 20.894716] which belongs to the cache kmalloc-16 of size 16 [ 20.895239] The buggy address is located 8 bytes inside of [ 20.895239] allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9) [ 20.895726] [ 20.896356] The buggy address belongs to the physical page: [ 20.896548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 20.897334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.897821] page_type: f5(slab) [ 20.898106] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.898704] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.899339] page dumped because: kasan: bad access detected [ 20.899802] [ 20.899946] Memory state around the buggy address: [ 20.900416] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.900846] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.901199] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 20.901510] ^ [ 20.901808] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.902146] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.902488] ================================================================== [ 20.926036] ================================================================== [ 20.927063] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 20.927577] Read of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250 [ 20.928034] [ 20.928219] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 20.928328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.928364] Hardware name: linux,dummy-virt (DT) [ 20.928408] Call trace: [ 20.928438] show_stack+0x20/0x38 (C) [ 20.928502] dump_stack_lvl+0x8c/0xd0 [ 20.928566] print_report+0x118/0x608 [ 20.928625] kasan_report+0xdc/0x128 [ 20.928679] __asan_report_load8_noabort+0x20/0x30 [ 20.929649] kasan_bitops_modify.constprop.0+0xa88/0xbc8 [ 20.929764] kasan_bitops_generic+0x110/0x1c8 [ 20.929828] kunit_try_run_case+0x170/0x3f0 [ 20.929887] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.929948] kthread+0x318/0x620 [ 20.930003] ret_from_fork+0x10/0x20 [ 20.930071] [ 20.933270] Allocated by task 250: [ 20.933444] kasan_save_stack+0x3c/0x68 [ 20.933639] kasan_save_track+0x20/0x40 [ 20.934131] kasan_save_alloc_info+0x40/0x58 [ 20.935077] __kasan_kmalloc+0xd4/0xd8 [ 20.935667] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.936132] kasan_bitops_generic+0xa0/0x1c8 [ 20.936517] kunit_try_run_case+0x170/0x3f0 [ 20.936761] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.936959] kthread+0x318/0x620 [ 20.937302] ret_from_fork+0x10/0x20 [ 20.937542] [ 20.937735] The buggy address belongs to the object at fff00000c1e7a0e0 [ 20.937735] which belongs to the cache kmalloc-16 of size 16 [ 20.938297] The buggy address is located 8 bytes inside of [ 20.938297] allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9) [ 20.939094] [ 20.939237] The buggy address belongs to the physical page: [ 20.939442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 20.939720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.939991] page_type: f5(slab) [ 20.940178] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.940454] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.940721] page dumped because: kasan: bad access detected [ 20.941661] [ 20.941791] Memory state around the buggy address: [ 20.941966] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.942865] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.943912] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 20.944339] ^ [ 20.944818] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.945311] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.945815] ================================================================== [ 20.969153] ================================================================== [ 20.969801] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 20.970243] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250 [ 20.970548] [ 20.971733] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 20.971872] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.971907] Hardware name: linux,dummy-virt (DT) [ 20.971945] Call trace: [ 20.971976] show_stack+0x20/0x38 (C) [ 20.972038] dump_stack_lvl+0x8c/0xd0 [ 20.972090] print_report+0x118/0x608 [ 20.972142] kasan_report+0xdc/0x128 [ 20.972191] kasan_check_range+0x100/0x1a8 [ 20.972242] __kasan_check_write+0x20/0x30 [ 20.972292] kasan_bitops_modify.constprop.0+0x320/0xbc8 [ 20.972347] kasan_bitops_generic+0x110/0x1c8 [ 20.972397] kunit_try_run_case+0x170/0x3f0 [ 20.972448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.972505] kthread+0x318/0x620 [ 20.972555] ret_from_fork+0x10/0x20 [ 20.972612] [ 20.976422] Allocated by task 250: [ 20.976608] kasan_save_stack+0x3c/0x68 [ 20.976826] kasan_save_track+0x20/0x40 [ 20.977019] kasan_save_alloc_info+0x40/0x58 [ 20.977220] __kasan_kmalloc+0xd4/0xd8 [ 20.977406] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.977600] kasan_bitops_generic+0xa0/0x1c8 [ 20.978938] kunit_try_run_case+0x170/0x3f0 [ 20.979459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.980024] kthread+0x318/0x620 [ 20.980255] ret_from_fork+0x10/0x20 [ 20.980568] [ 20.980713] The buggy address belongs to the object at fff00000c1e7a0e0 [ 20.980713] which belongs to the cache kmalloc-16 of size 16 [ 20.981265] The buggy address is located 8 bytes inside of [ 20.981265] allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9) [ 20.982346] [ 20.982884] The buggy address belongs to the physical page: [ 20.983191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 20.983724] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.984182] page_type: f5(slab) [ 20.984449] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.984952] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.985369] page dumped because: kasan: bad access detected [ 20.985702] [ 20.985820] Memory state around the buggy address: [ 20.986283] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.987449] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.987909] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 20.988323] ^ [ 20.988670] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.989091] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.989522] ================================================================== [ 21.030809] ================================================================== [ 21.031128] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 21.032147] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250 [ 21.032655] [ 21.032905] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.033031] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.033070] Hardware name: linux,dummy-virt (DT) [ 21.033126] Call trace: [ 21.033167] show_stack+0x20/0x38 (C) [ 21.033234] dump_stack_lvl+0x8c/0xd0 [ 21.033291] print_report+0x118/0x608 [ 21.033344] kasan_report+0xdc/0x128 [ 21.033400] kasan_check_range+0x100/0x1a8 [ 21.033456] __kasan_check_write+0x20/0x30 [ 21.033508] kasan_bitops_modify.constprop.0+0x3b0/0xbc8 [ 21.033571] kasan_bitops_generic+0x110/0x1c8 [ 21.033629] kunit_try_run_case+0x170/0x3f0 [ 21.033683] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.033762] kthread+0x318/0x620 [ 21.033820] ret_from_fork+0x10/0x20 [ 21.033879] [ 21.038158] Allocated by task 250: [ 21.038484] kasan_save_stack+0x3c/0x68 [ 21.038883] kasan_save_track+0x20/0x40 [ 21.039472] kasan_save_alloc_info+0x40/0x58 [ 21.039886] __kasan_kmalloc+0xd4/0xd8 [ 21.040162] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.040426] kasan_bitops_generic+0xa0/0x1c8 [ 21.040731] kunit_try_run_case+0x170/0x3f0 [ 21.041113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.041427] kthread+0x318/0x620 [ 21.041679] ret_from_fork+0x10/0x20 [ 21.041922] [ 21.042107] The buggy address belongs to the object at fff00000c1e7a0e0 [ 21.042107] which belongs to the cache kmalloc-16 of size 16 [ 21.043050] The buggy address is located 8 bytes inside of [ 21.043050] allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9) [ 21.043908] [ 21.044093] The buggy address belongs to the physical page: [ 21.044439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 21.044961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.045331] page_type: f5(slab) [ 21.045529] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.045944] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.046317] page dumped because: kasan: bad access detected [ 21.046755] [ 21.046900] Memory state around the buggy address: [ 21.047502] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.047893] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.048144] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 21.048715] ^ [ 21.049050] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.049386] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.049710] ================================================================== [ 20.990428] ================================================================== [ 20.991094] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 20.991511] Read of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250 [ 20.991806] [ 20.991976] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 20.992078] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.992112] Hardware name: linux,dummy-virt (DT) [ 20.992149] Call trace: [ 20.992176] show_stack+0x20/0x38 (C) [ 20.992232] dump_stack_lvl+0x8c/0xd0 [ 20.992285] print_report+0x118/0x608 [ 20.992336] kasan_report+0xdc/0x128 [ 20.992386] __asan_report_load8_noabort+0x20/0x30 [ 20.992439] kasan_bitops_modify.constprop.0+0xaf4/0xbc8 [ 20.992494] kasan_bitops_generic+0x110/0x1c8 [ 20.992546] kunit_try_run_case+0x170/0x3f0 [ 20.992600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.992656] kthread+0x318/0x620 [ 20.992707] ret_from_fork+0x10/0x20 [ 20.993107] [ 20.996683] Allocated by task 250: [ 20.996893] kasan_save_stack+0x3c/0x68 [ 20.997100] kasan_save_track+0x20/0x40 [ 20.997283] kasan_save_alloc_info+0x40/0x58 [ 20.997475] __kasan_kmalloc+0xd4/0xd8 [ 20.997666] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.997941] kasan_bitops_generic+0xa0/0x1c8 [ 20.998195] kunit_try_run_case+0x170/0x3f0 [ 20.998626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.999102] kthread+0x318/0x620 [ 20.999451] ret_from_fork+0x10/0x20 [ 20.999876] [ 21.000065] The buggy address belongs to the object at fff00000c1e7a0e0 [ 21.000065] which belongs to the cache kmalloc-16 of size 16 [ 21.000949] The buggy address is located 8 bytes inside of [ 21.000949] allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9) [ 21.001695] [ 21.001937] The buggy address belongs to the physical page: [ 21.002240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 21.003712] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.004060] page_type: f5(slab) [ 21.004224] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.004833] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.005209] page dumped because: kasan: bad access detected [ 21.005467] [ 21.005615] Memory state around the buggy address: [ 21.006102] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.006632] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.007070] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 21.007764] ^ [ 21.008284] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.008721] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.009153] ================================================================== [ 20.904375] ================================================================== [ 20.904688] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 20.905155] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250 [ 20.905892] [ 20.906139] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 20.906320] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.906360] Hardware name: linux,dummy-virt (DT) [ 20.906402] Call trace: [ 20.906435] show_stack+0x20/0x38 (C) [ 20.906547] dump_stack_lvl+0x8c/0xd0 [ 20.906612] print_report+0x118/0x608 [ 20.906670] kasan_report+0xdc/0x128 [ 20.906722] kasan_check_range+0x100/0x1a8 [ 20.906803] __kasan_check_write+0x20/0x30 [ 20.906855] kasan_bitops_modify.constprop.0+0x1dc/0xbc8 [ 20.906915] kasan_bitops_generic+0x110/0x1c8 [ 20.906969] kunit_try_run_case+0x170/0x3f0 [ 20.907730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.907815] kthread+0x318/0x620 [ 20.907870] ret_from_fork+0x10/0x20 [ 20.907930] [ 20.912107] Allocated by task 250: [ 20.912549] kasan_save_stack+0x3c/0x68 [ 20.912903] kasan_save_track+0x20/0x40 [ 20.913236] kasan_save_alloc_info+0x40/0x58 [ 20.913576] __kasan_kmalloc+0xd4/0xd8 [ 20.913926] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.914311] kasan_bitops_generic+0xa0/0x1c8 [ 20.914750] kunit_try_run_case+0x170/0x3f0 [ 20.915812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.916279] kthread+0x318/0x620 [ 20.916573] ret_from_fork+0x10/0x20 [ 20.916791] [ 20.916932] The buggy address belongs to the object at fff00000c1e7a0e0 [ 20.916932] which belongs to the cache kmalloc-16 of size 16 [ 20.917433] The buggy address is located 8 bytes inside of [ 20.917433] allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9) [ 20.918271] [ 20.918488] The buggy address belongs to the physical page: [ 20.919162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 20.919749] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.920114] page_type: f5(slab) [ 20.920406] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.920969] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.921423] page dumped because: kasan: bad access detected [ 20.921830] [ 20.922045] Memory state around the buggy address: [ 20.922415] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.922781] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.923145] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 20.923469] ^ [ 20.923735] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.925123] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.925366] ================================================================== [ 21.051278] ================================================================== [ 21.051567] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 21.051973] Read of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250 [ 21.052533] [ 21.052690] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 21.053425] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.053472] Hardware name: linux,dummy-virt (DT) [ 21.053511] Call trace: [ 21.053542] show_stack+0x20/0x38 (C) [ 21.053611] dump_stack_lvl+0x8c/0xd0 [ 21.053668] print_report+0x118/0x608 [ 21.053721] kasan_report+0xdc/0x128 [ 21.053803] __asan_report_load8_noabort+0x20/0x30 [ 21.053859] kasan_bitops_modify.constprop.0+0xa28/0xbc8 [ 21.053921] kasan_bitops_generic+0x110/0x1c8 [ 21.053978] kunit_try_run_case+0x170/0x3f0 [ 21.054034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.054107] kthread+0x318/0x620 [ 21.054165] ret_from_fork+0x10/0x20 [ 21.054225] [ 21.058452] Allocated by task 250: [ 21.059453] kasan_save_stack+0x3c/0x68 [ 21.059967] kasan_save_track+0x20/0x40 [ 21.060248] kasan_save_alloc_info+0x40/0x58 [ 21.060509] __kasan_kmalloc+0xd4/0xd8 [ 21.060768] __kmalloc_cache_noprof+0x15c/0x3c0 [ 21.061055] kasan_bitops_generic+0xa0/0x1c8 [ 21.061325] kunit_try_run_case+0x170/0x3f0 [ 21.061575] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.061882] kthread+0x318/0x620 [ 21.062049] ret_from_fork+0x10/0x20 [ 21.062382] [ 21.062704] The buggy address belongs to the object at fff00000c1e7a0e0 [ 21.062704] which belongs to the cache kmalloc-16 of size 16 [ 21.063857] The buggy address is located 8 bytes inside of [ 21.063857] allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9) [ 21.064626] [ 21.064851] The buggy address belongs to the physical page: [ 21.065155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 21.065625] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.065985] page_type: f5(slab) [ 21.066334] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.066959] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.067392] page dumped because: kasan: bad access detected [ 21.068243] [ 21.068563] Memory state around the buggy address: [ 21.068829] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.069328] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.069734] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 21.070164] ^ [ 21.070664] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.071041] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.071641] ================================================================== [ 20.947059] ================================================================== [ 20.947357] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 20.947616] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250 [ 20.948173] [ 20.948341] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 20.948435] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.948468] Hardware name: linux,dummy-virt (DT) [ 20.948505] Call trace: [ 20.948531] show_stack+0x20/0x38 (C) [ 20.948586] dump_stack_lvl+0x8c/0xd0 [ 20.948638] print_report+0x118/0x608 [ 20.948687] kasan_report+0xdc/0x128 [ 20.948735] kasan_check_range+0x100/0x1a8 [ 20.949433] __kasan_check_write+0x20/0x30 [ 20.949489] kasan_bitops_modify.constprop.0+0x2b4/0xbc8 [ 20.949547] kasan_bitops_generic+0x110/0x1c8 [ 20.949598] kunit_try_run_case+0x170/0x3f0 [ 20.949651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.949704] kthread+0x318/0x620 [ 20.949765] ret_from_fork+0x10/0x20 [ 20.949821] [ 20.954421] Allocated by task 250: [ 20.955078] kasan_save_stack+0x3c/0x68 [ 20.955381] kasan_save_track+0x20/0x40 [ 20.955607] kasan_save_alloc_info+0x40/0x58 [ 20.955842] __kasan_kmalloc+0xd4/0xd8 [ 20.956069] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.956323] kasan_bitops_generic+0xa0/0x1c8 [ 20.956570] kunit_try_run_case+0x170/0x3f0 [ 20.957780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.958014] kthread+0x318/0x620 [ 20.958373] ret_from_fork+0x10/0x20 [ 20.959015] [ 20.959136] The buggy address belongs to the object at fff00000c1e7a0e0 [ 20.959136] which belongs to the cache kmalloc-16 of size 16 [ 20.959729] The buggy address is located 8 bytes inside of [ 20.959729] allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9) [ 20.960704] [ 20.961030] The buggy address belongs to the physical page: [ 20.961340] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 20.961798] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.962316] page_type: f5(slab) [ 20.963811] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.964111] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.964517] page dumped because: kasan: bad access detected [ 20.964946] [ 20.965191] Memory state around the buggy address: [ 20.965494] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.965933] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.966405] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 20.966843] ^ [ 20.967270] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.967786] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.968329] ================================================================== [ 20.862278] ================================================================== [ 20.863279] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 20.863823] Write of size 8 at addr fff00000c1e7a0e8 by task kunit_try_catch/250 [ 20.864047] [ 20.864238] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 20.864341] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.864377] Hardware name: linux,dummy-virt (DT) [ 20.864418] Call trace: [ 20.864450] show_stack+0x20/0x38 (C) [ 20.864511] dump_stack_lvl+0x8c/0xd0 [ 20.864568] print_report+0x118/0x608 [ 20.864640] kasan_report+0xdc/0x128 [ 20.864688] kasan_check_range+0x100/0x1a8 [ 20.864753] __kasan_check_write+0x20/0x30 [ 20.864833] kasan_bitops_modify.constprop.0+0x100/0xbc8 [ 20.864895] kasan_bitops_generic+0x110/0x1c8 [ 20.864950] kunit_try_run_case+0x170/0x3f0 [ 20.865027] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.865091] kthread+0x318/0x620 [ 20.865144] ret_from_fork+0x10/0x20 [ 20.865225] [ 20.868822] Allocated by task 250: [ 20.869023] kasan_save_stack+0x3c/0x68 [ 20.869249] kasan_save_track+0x20/0x40 [ 20.869439] kasan_save_alloc_info+0x40/0x58 [ 20.869646] __kasan_kmalloc+0xd4/0xd8 [ 20.870755] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.870965] kasan_bitops_generic+0xa0/0x1c8 [ 20.871140] kunit_try_run_case+0x170/0x3f0 [ 20.871307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.871498] kthread+0x318/0x620 [ 20.872210] ret_from_fork+0x10/0x20 [ 20.872417] [ 20.872556] The buggy address belongs to the object at fff00000c1e7a0e0 [ 20.872556] which belongs to the cache kmalloc-16 of size 16 [ 20.873689] The buggy address is located 8 bytes inside of [ 20.873689] allocated 9-byte region [fff00000c1e7a0e0, fff00000c1e7a0e9) [ 20.874369] [ 20.874820] The buggy address belongs to the physical page: [ 20.875236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 20.875724] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.876223] page_type: f5(slab) [ 20.876461] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.876872] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.877271] page dumped because: kasan: bad access detected [ 20.877537] [ 20.877692] Memory state around the buggy address: [ 20.878044] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.878509] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.878765] >fff00000c1e7a080: 00 04 fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 20.879255] ^ [ 20.880424] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.880980] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.881435] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 20.834207] ================================================================== [ 20.834719] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 20.836304] Read of size 1 at addr fff00000c66e72d0 by task kunit_try_catch/248 [ 20.836866] [ 20.837025] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 20.837124] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.837158] Hardware name: linux,dummy-virt (DT) [ 20.837196] Call trace: [ 20.837224] show_stack+0x20/0x38 (C) [ 20.837289] dump_stack_lvl+0x8c/0xd0 [ 20.837343] print_report+0x118/0x608 [ 20.837400] kasan_report+0xdc/0x128 [ 20.837453] __asan_report_load1_noabort+0x20/0x30 [ 20.837507] strnlen+0x80/0x88 [ 20.837556] kasan_strings+0x364/0x8d8 [ 20.837607] kunit_try_run_case+0x170/0x3f0 [ 20.837661] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.837718] kthread+0x318/0x620 [ 20.837795] ret_from_fork+0x10/0x20 [ 20.837852] [ 20.841698] Allocated by task 248: [ 20.842018] kasan_save_stack+0x3c/0x68 [ 20.842295] kasan_save_track+0x20/0x40 [ 20.842658] kasan_save_alloc_info+0x40/0x58 [ 20.843028] __kasan_kmalloc+0xd4/0xd8 [ 20.843203] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.843573] kasan_strings+0xb0/0x8d8 [ 20.843783] kunit_try_run_case+0x170/0x3f0 [ 20.844044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.844304] kthread+0x318/0x620 [ 20.844534] ret_from_fork+0x10/0x20 [ 20.844723] [ 20.844998] Freed by task 248: [ 20.845297] kasan_save_stack+0x3c/0x68 [ 20.845516] kasan_save_track+0x20/0x40 [ 20.845782] kasan_save_free_info+0x4c/0x78 [ 20.845955] __kasan_slab_free+0x6c/0x98 [ 20.846135] kfree+0x214/0x3c8 [ 20.846366] kasan_strings+0x124/0x8d8 [ 20.846858] kunit_try_run_case+0x170/0x3f0 [ 20.847332] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.847696] kthread+0x318/0x620 [ 20.847869] ret_from_fork+0x10/0x20 [ 20.848232] [ 20.848427] The buggy address belongs to the object at fff00000c66e72c0 [ 20.848427] which belongs to the cache kmalloc-32 of size 32 [ 20.849106] The buggy address is located 16 bytes inside of [ 20.849106] freed 32-byte region [fff00000c66e72c0, fff00000c66e72e0) [ 20.849596] [ 20.849811] The buggy address belongs to the physical page: [ 20.850139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e7 [ 20.850816] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.851389] page_type: f5(slab) [ 20.851632] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 20.852049] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 20.852458] page dumped because: kasan: bad access detected [ 20.852775] [ 20.852976] Memory state around the buggy address: [ 20.853204] fff00000c66e7180: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 20.853678] fff00000c66e7200: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc [ 20.854236] >fff00000c66e7280: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 20.854983] ^ [ 20.855268] fff00000c66e7300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.855514] fff00000c66e7380: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 20.855733] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[ 20.811335] ================================================================== [ 20.811722] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 20.811991] Read of size 1 at addr fff00000c66e72d0 by task kunit_try_catch/248 [ 20.812254] [ 20.812392] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 20.812500] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.812537] Hardware name: linux,dummy-virt (DT) [ 20.812580] Call trace: [ 20.812612] show_stack+0x20/0x38 (C) [ 20.812680] dump_stack_lvl+0x8c/0xd0 [ 20.813493] print_report+0x118/0x608 [ 20.813775] kasan_report+0xdc/0x128 [ 20.813849] __asan_report_load1_noabort+0x20/0x30 [ 20.813911] strlen+0xa8/0xb0 [ 20.813965] kasan_strings+0x304/0x8d8 [ 20.814022] kunit_try_run_case+0x170/0x3f0 [ 20.814113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.814181] kthread+0x318/0x620 [ 20.814238] ret_from_fork+0x10/0x20 [ 20.814299] [ 20.817660] Allocated by task 248: [ 20.818029] kasan_save_stack+0x3c/0x68 [ 20.818374] kasan_save_track+0x20/0x40 [ 20.818632] kasan_save_alloc_info+0x40/0x58 [ 20.818972] __kasan_kmalloc+0xd4/0xd8 [ 20.819240] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.819535] kasan_strings+0xb0/0x8d8 [ 20.819731] kunit_try_run_case+0x170/0x3f0 [ 20.820126] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.820475] kthread+0x318/0x620 [ 20.820647] ret_from_fork+0x10/0x20 [ 20.821213] [ 20.821430] Freed by task 248: [ 20.821703] kasan_save_stack+0x3c/0x68 [ 20.822084] kasan_save_track+0x20/0x40 [ 20.822401] kasan_save_free_info+0x4c/0x78 [ 20.822887] __kasan_slab_free+0x6c/0x98 [ 20.823200] kfree+0x214/0x3c8 [ 20.823495] kasan_strings+0x124/0x8d8 [ 20.823752] kunit_try_run_case+0x170/0x3f0 [ 20.824048] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.824399] kthread+0x318/0x620 [ 20.824620] ret_from_fork+0x10/0x20 [ 20.824938] [ 20.825135] The buggy address belongs to the object at fff00000c66e72c0 [ 20.825135] which belongs to the cache kmalloc-32 of size 32 [ 20.825725] The buggy address is located 16 bytes inside of [ 20.825725] freed 32-byte region [fff00000c66e72c0, fff00000c66e72e0) [ 20.826363] [ 20.826705] The buggy address belongs to the physical page: [ 20.827024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e7 [ 20.827485] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.827925] page_type: f5(slab) [ 20.828235] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 20.828614] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 20.828973] page dumped because: kasan: bad access detected [ 20.829315] [ 20.829455] Memory state around the buggy address: [ 20.829756] fff00000c66e7180: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 20.830107] fff00000c66e7200: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc [ 20.830859] >fff00000c66e7280: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 20.831136] ^ [ 20.831358] fff00000c66e7300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.831998] fff00000c66e7380: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 20.832559] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 20.788628] ================================================================== [ 20.789043] BUG: KASAN: slab-use-after-free in kasan_strings+0x838/0x8d8 [ 20.789604] Read of size 1 at addr fff00000c66e72d0 by task kunit_try_catch/248 [ 20.789975] [ 20.790156] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 20.790280] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.790318] Hardware name: linux,dummy-virt (DT) [ 20.790357] Call trace: [ 20.790390] show_stack+0x20/0x38 (C) [ 20.790472] dump_stack_lvl+0x8c/0xd0 [ 20.790556] print_report+0x118/0x608 [ 20.790621] kasan_report+0xdc/0x128 [ 20.790676] __asan_report_load1_noabort+0x20/0x30 [ 20.790732] kasan_strings+0x838/0x8d8 [ 20.790971] kunit_try_run_case+0x170/0x3f0 [ 20.791034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.791097] kthread+0x318/0x620 [ 20.791149] ret_from_fork+0x10/0x20 [ 20.791209] [ 20.794289] Allocated by task 248: [ 20.794617] kasan_save_stack+0x3c/0x68 [ 20.795147] kasan_save_track+0x20/0x40 [ 20.795419] kasan_save_alloc_info+0x40/0x58 [ 20.795720] __kasan_kmalloc+0xd4/0xd8 [ 20.796021] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.796260] kasan_strings+0xb0/0x8d8 [ 20.796492] kunit_try_run_case+0x170/0x3f0 [ 20.796791] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.797092] kthread+0x318/0x620 [ 20.797326] ret_from_fork+0x10/0x20 [ 20.797678] [ 20.797803] Freed by task 248: [ 20.798140] kasan_save_stack+0x3c/0x68 [ 20.798551] kasan_save_track+0x20/0x40 [ 20.798825] kasan_save_free_info+0x4c/0x78 [ 20.799080] __kasan_slab_free+0x6c/0x98 [ 20.799332] kfree+0x214/0x3c8 [ 20.799567] kasan_strings+0x124/0x8d8 [ 20.799785] kunit_try_run_case+0x170/0x3f0 [ 20.800036] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.800544] kthread+0x318/0x620 [ 20.800864] ret_from_fork+0x10/0x20 [ 20.801037] [ 20.801268] The buggy address belongs to the object at fff00000c66e72c0 [ 20.801268] which belongs to the cache kmalloc-32 of size 32 [ 20.802088] The buggy address is located 16 bytes inside of [ 20.802088] freed 32-byte region [fff00000c66e72c0, fff00000c66e72e0) [ 20.803092] [ 20.803340] The buggy address belongs to the physical page: [ 20.803767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e7 [ 20.804267] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.804671] page_type: f5(slab) [ 20.804917] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 20.805407] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 20.805917] page dumped because: kasan: bad access detected [ 20.806244] [ 20.806453] Memory state around the buggy address: [ 20.807640] fff00000c66e7180: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 20.808076] fff00000c66e7200: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc [ 20.808453] >fff00000c66e7280: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 20.808991] ^ [ 20.809322] fff00000c66e7300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.809787] fff00000c66e7380: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 20.810218] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 20.763093] ================================================================== [ 20.764121] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 20.764475] Read of size 1 at addr fff00000c66e72d0 by task kunit_try_catch/248 [ 20.764806] [ 20.765021] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 20.765129] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.765163] Hardware name: linux,dummy-virt (DT) [ 20.765201] Call trace: [ 20.765233] show_stack+0x20/0x38 (C) [ 20.765294] dump_stack_lvl+0x8c/0xd0 [ 20.765351] print_report+0x118/0x608 [ 20.765408] kasan_report+0xdc/0x128 [ 20.765462] __asan_report_load1_noabort+0x20/0x30 [ 20.765516] strcmp+0xc0/0xc8 [ 20.765564] kasan_strings+0x228/0x8d8 [ 20.765615] kunit_try_run_case+0x170/0x3f0 [ 20.765672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.765732] kthread+0x318/0x620 [ 20.765803] ret_from_fork+0x10/0x20 [ 20.765864] [ 20.769824] Allocated by task 248: [ 20.770018] kasan_save_stack+0x3c/0x68 [ 20.770236] kasan_save_track+0x20/0x40 [ 20.770416] kasan_save_alloc_info+0x40/0x58 [ 20.771231] __kasan_kmalloc+0xd4/0xd8 [ 20.771879] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.772235] kasan_strings+0xb0/0x8d8 [ 20.772415] kunit_try_run_case+0x170/0x3f0 [ 20.773018] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.773476] kthread+0x318/0x620 [ 20.773855] ret_from_fork+0x10/0x20 [ 20.774152] [ 20.774394] Freed by task 248: [ 20.774555] kasan_save_stack+0x3c/0x68 [ 20.775049] kasan_save_track+0x20/0x40 [ 20.775309] kasan_save_free_info+0x4c/0x78 [ 20.775585] __kasan_slab_free+0x6c/0x98 [ 20.775841] kfree+0x214/0x3c8 [ 20.776092] kasan_strings+0x124/0x8d8 [ 20.776377] kunit_try_run_case+0x170/0x3f0 [ 20.776657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.777223] kthread+0x318/0x620 [ 20.777711] ret_from_fork+0x10/0x20 [ 20.778033] [ 20.778170] The buggy address belongs to the object at fff00000c66e72c0 [ 20.778170] which belongs to the cache kmalloc-32 of size 32 [ 20.779180] The buggy address is located 16 bytes inside of [ 20.779180] freed 32-byte region [fff00000c66e72c0, fff00000c66e72e0) [ 20.780023] [ 20.780186] The buggy address belongs to the physical page: [ 20.780633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e7 [ 20.781223] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.781622] page_type: f5(slab) [ 20.781899] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 20.782315] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 20.782991] page dumped because: kasan: bad access detected [ 20.783264] [ 20.783410] Memory state around the buggy address: [ 20.783647] fff00000c66e7180: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 20.783979] fff00000c66e7200: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc [ 20.784291] >fff00000c66e7280: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 20.784593] ^ [ 20.785721] fff00000c66e7300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.786271] fff00000c66e7380: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 20.787712] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 20.735725] ================================================================== [ 20.736248] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 20.736677] Read of size 1 at addr fff00000c66f5118 by task kunit_try_catch/246 [ 20.737093] [ 20.737280] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 20.737383] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.737416] Hardware name: linux,dummy-virt (DT) [ 20.737456] Call trace: [ 20.737487] show_stack+0x20/0x38 (C) [ 20.737550] dump_stack_lvl+0x8c/0xd0 [ 20.737609] print_report+0x118/0x608 [ 20.737668] kasan_report+0xdc/0x128 [ 20.737723] __asan_report_load1_noabort+0x20/0x30 [ 20.737798] memcmp+0x198/0x1d8 [ 20.737851] kasan_memcmp+0x16c/0x300 [ 20.737905] kunit_try_run_case+0x170/0x3f0 [ 20.737961] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.738022] kthread+0x318/0x620 [ 20.738100] ret_from_fork+0x10/0x20 [ 20.738165] [ 20.741943] Allocated by task 246: [ 20.742243] kasan_save_stack+0x3c/0x68 [ 20.742816] kasan_save_track+0x20/0x40 [ 20.743180] kasan_save_alloc_info+0x40/0x58 [ 20.743414] __kasan_kmalloc+0xd4/0xd8 [ 20.743696] __kmalloc_cache_noprof+0x15c/0x3c0 [ 20.743985] kasan_memcmp+0xbc/0x300 [ 20.744155] kunit_try_run_case+0x170/0x3f0 [ 20.744410] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.744693] kthread+0x318/0x620 [ 20.744995] ret_from_fork+0x10/0x20 [ 20.745249] [ 20.745417] The buggy address belongs to the object at fff00000c66f5100 [ 20.745417] which belongs to the cache kmalloc-32 of size 32 [ 20.745940] The buggy address is located 0 bytes to the right of [ 20.745940] allocated 24-byte region [fff00000c66f5100, fff00000c66f5118) [ 20.746415] [ 20.746853] The buggy address belongs to the physical page: [ 20.747242] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f5 [ 20.747718] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.748144] page_type: f5(slab) [ 20.748339] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 20.748767] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 20.749142] page dumped because: kasan: bad access detected [ 20.749399] [ 20.749574] Memory state around the buggy address: [ 20.749801] fff00000c66f5000: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 20.750191] fff00000c66f5080: 00 00 00 04 fc fc fc fc 00 00 07 fc fc fc fc fc [ 20.750953] >fff00000c66f5100: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.751262] ^ [ 20.751513] fff00000c66f5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.751958] fff00000c66f5200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.752323] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 20.705231] ================================================================== [ 20.705817] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2e4/0x348 [ 20.706175] Read of size 1 at addr ffff800080b17b4a by task kunit_try_catch/242 [ 20.706437] [ 20.707531] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 20.707653] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.707691] Hardware name: linux,dummy-virt (DT) [ 20.707732] Call trace: [ 20.707781] show_stack+0x20/0x38 (C) [ 20.707852] dump_stack_lvl+0x8c/0xd0 [ 20.707913] print_report+0x310/0x608 [ 20.707972] kasan_report+0xdc/0x128 [ 20.708024] __asan_report_load1_noabort+0x20/0x30 [ 20.708079] kasan_alloca_oob_right+0x2e4/0x348 [ 20.708135] kunit_try_run_case+0x170/0x3f0 [ 20.708194] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.708254] kthread+0x318/0x620 [ 20.708307] ret_from_fork+0x10/0x20 [ 20.708365] [ 20.712183] The buggy address belongs to stack of task kunit_try_catch/242 [ 20.712689] [ 20.712984] The buggy address belongs to the virtual mapping at [ 20.712984] [ffff800080b10000, ffff800080b19000) created by: [ 20.712984] kernel_clone+0x150/0x7a8 [ 20.713964] [ 20.714211] The buggy address belongs to the physical page: [ 20.714687] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653b [ 20.715302] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.715664] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.715943] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.716504] page dumped because: kasan: bad access detected [ 20.716779] [ 20.716973] Memory state around the buggy address: [ 20.717215] ffff800080b17a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.717654] ffff800080b17a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.718042] >ffff800080b17b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 20.718390] ^ [ 20.718731] ffff800080b17b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 20.719465] ffff800080b17c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 20.719899] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 20.683785] ================================================================== [ 20.684360] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 20.684802] Read of size 1 at addr ffff800080bc7b5f by task kunit_try_catch/240 [ 20.685206] [ 20.685407] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 20.685510] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.685542] Hardware name: linux,dummy-virt (DT) [ 20.685583] Call trace: [ 20.685613] show_stack+0x20/0x38 (C) [ 20.685674] dump_stack_lvl+0x8c/0xd0 [ 20.685734] print_report+0x310/0x608 [ 20.685806] kasan_report+0xdc/0x128 [ 20.685859] __asan_report_load1_noabort+0x20/0x30 [ 20.685916] kasan_alloca_oob_left+0x2b8/0x310 [ 20.685971] kunit_try_run_case+0x170/0x3f0 [ 20.686026] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.686110] kthread+0x318/0x620 [ 20.686169] ret_from_fork+0x10/0x20 [ 20.686230] [ 20.690733] The buggy address belongs to stack of task kunit_try_catch/240 [ 20.691721] [ 20.691955] The buggy address belongs to the virtual mapping at [ 20.691955] [ffff800080bc0000, ffff800080bc9000) created by: [ 20.691955] kernel_clone+0x150/0x7a8 [ 20.692606] [ 20.692789] The buggy address belongs to the physical page: [ 20.693052] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106653 [ 20.693453] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.693835] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.694194] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.695232] page dumped because: kasan: bad access detected [ 20.695565] [ 20.695676] Memory state around the buggy address: [ 20.695938] ffff800080bc7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.696338] ffff800080bc7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.696678] >ffff800080bc7b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 20.697083] ^ [ 20.697437] ffff800080bc7b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 20.697769] ffff800080bc7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 20.698207] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 20.662265] ================================================================== [ 20.662788] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 20.663330] Read of size 1 at addr ffff800080b17c2a by task kunit_try_catch/238 [ 20.663574] [ 20.663732] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 20.663878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.663911] Hardware name: linux,dummy-virt (DT) [ 20.663950] Call trace: [ 20.663977] show_stack+0x20/0x38 (C) [ 20.664038] dump_stack_lvl+0x8c/0xd0 [ 20.664096] print_report+0x310/0x608 [ 20.664181] kasan_report+0xdc/0x128 [ 20.664236] __asan_report_load1_noabort+0x20/0x30 [ 20.664289] kasan_stack_oob+0x238/0x270 [ 20.664341] kunit_try_run_case+0x170/0x3f0 [ 20.664398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.664457] kthread+0x318/0x620 [ 20.664510] ret_from_fork+0x10/0x20 [ 20.664566] [ 20.667311] The buggy address belongs to stack of task kunit_try_catch/238 [ 20.667769] and is located at offset 138 in frame: [ 20.667969] kasan_stack_oob+0x0/0x270 [ 20.668489] [ 20.668621] This frame has 4 objects: [ 20.668913] [48, 49) '__assertion' [ 20.668987] [64, 72) 'array' [ 20.669227] [96, 112) '__assertion' [ 20.669489] [128, 138) 'stack_array' [ 20.669688] [ 20.670130] The buggy address belongs to the virtual mapping at [ 20.670130] [ffff800080b10000, ffff800080b19000) created by: [ 20.670130] kernel_clone+0x150/0x7a8 [ 20.670939] [ 20.671117] The buggy address belongs to the physical page: [ 20.671367] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653b [ 20.671803] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.672193] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.672571] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.672947] page dumped because: kasan: bad access detected [ 20.673265] [ 20.673536] Memory state around the buggy address: [ 20.673817] ffff800080b17b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.674289] ffff800080b17b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 20.674908] >ffff800080b17c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 20.675187] ^ [ 20.675527] ffff800080b17c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 20.675910] ffff800080b17d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 20.676215] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 20.637179] ================================================================== [ 20.637766] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 20.638366] Read of size 1 at addr ffffac220aa8910d by task kunit_try_catch/234 [ 20.639190] [ 20.639546] CPU: 1 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 20.639669] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.639703] Hardware name: linux,dummy-virt (DT) [ 20.639755] Call trace: [ 20.640260] show_stack+0x20/0x38 (C) [ 20.640350] dump_stack_lvl+0x8c/0xd0 [ 20.640424] print_report+0x310/0x608 [ 20.640484] kasan_report+0xdc/0x128 [ 20.640539] __asan_report_load1_noabort+0x20/0x30 [ 20.640592] kasan_global_oob_right+0x230/0x270 [ 20.640646] kunit_try_run_case+0x170/0x3f0 [ 20.640701] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.640777] kthread+0x318/0x620 [ 20.640832] ret_from_fork+0x10/0x20 [ 20.640914] [ 20.643680] The buggy address belongs to the variable: [ 20.643987] global_array+0xd/0x40 [ 20.644288] [ 20.644588] The buggy address belongs to the virtual mapping at [ 20.644588] [ffffac2208d10000, ffffac220ab41000) created by: [ 20.644588] paging_init+0x66c/0x7d0 [ 20.645303] [ 20.645627] The buggy address belongs to the physical page: [ 20.645860] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47a89 [ 20.646342] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 20.646957] raw: 03fffe0000002000 ffffc1ffc01ea248 ffffc1ffc01ea248 0000000000000000 [ 20.647375] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.647760] page dumped because: kasan: bad access detected [ 20.648202] [ 20.648361] Memory state around the buggy address: [ 20.648588] ffffac220aa89000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.648957] ffffac220aa89080: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 20.649362] >ffffac220aa89100: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 20.649701] ^ [ 20.650027] ffffac220aa89180: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 20.650355] ffffac220aa89200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.650758] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 20.616054] ================================================================== [ 20.616701] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 20.617232] Free of addr fff00000c65fc001 by task kunit_try_catch/232 [ 20.617489] [ 20.617714] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 20.617827] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.617861] Hardware name: linux,dummy-virt (DT) [ 20.617897] Call trace: [ 20.617925] show_stack+0x20/0x38 (C) [ 20.617985] dump_stack_lvl+0x8c/0xd0 [ 20.618055] print_report+0x118/0x608 [ 20.618154] kasan_report_invalid_free+0xc0/0xe8 [ 20.618227] __kasan_mempool_poison_object+0xfc/0x150 [ 20.618288] mempool_free+0x28c/0x328 [ 20.618355] mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 20.618427] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 20.618499] kunit_try_run_case+0x170/0x3f0 [ 20.618559] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.618618] kthread+0x318/0x620 [ 20.618670] ret_from_fork+0x10/0x20 [ 20.618725] [ 20.623051] The buggy address belongs to the physical page: [ 20.623398] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065fc [ 20.623914] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.624408] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.624860] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.625268] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.625680] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.626014] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.626508] head: 0bfffe0000000002 ffffc1ffc3197f01 ffffffffffffffff 0000000000000000 [ 20.626950] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 20.627512] page dumped because: kasan: bad access detected [ 20.627812] [ 20.627969] Memory state around the buggy address: [ 20.628226] fff00000c65fbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.628658] fff00000c65fbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.629063] >fff00000c65fc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.629464] ^ [ 20.629650] fff00000c65fc080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.630002] fff00000c65fc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.630374] ================================================================== [ 20.590434] ================================================================== [ 20.591012] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 20.591332] Free of addr fff00000c6649101 by task kunit_try_catch/230 [ 20.591611] [ 20.591836] CPU: 1 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 20.591940] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.591974] Hardware name: linux,dummy-virt (DT) [ 20.592016] Call trace: [ 20.592057] show_stack+0x20/0x38 (C) [ 20.592136] dump_stack_lvl+0x8c/0xd0 [ 20.592207] print_report+0x118/0x608 [ 20.592280] kasan_report_invalid_free+0xc0/0xe8 [ 20.592339] check_slab_allocation+0xfc/0x108 [ 20.592395] __kasan_mempool_poison_object+0x78/0x150 [ 20.592454] mempool_free+0x28c/0x328 [ 20.592507] mempool_kmalloc_invalid_free_helper+0x118/0x2a0 [ 20.592579] mempool_kmalloc_invalid_free+0xc0/0x118 [ 20.592653] kunit_try_run_case+0x170/0x3f0 [ 20.592712] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.592802] kthread+0x318/0x620 [ 20.592861] ret_from_fork+0x10/0x20 [ 20.592917] [ 20.596456] Allocated by task 230: [ 20.596650] kasan_save_stack+0x3c/0x68 [ 20.596949] kasan_save_track+0x20/0x40 [ 20.597200] kasan_save_alloc_info+0x40/0x58 [ 20.597555] __kasan_mempool_unpoison_object+0x11c/0x180 [ 20.597969] remove_element+0x130/0x1f8 [ 20.598252] mempool_alloc_preallocated+0x58/0xc0 [ 20.598728] mempool_kmalloc_invalid_free_helper+0x94/0x2a0 [ 20.599009] mempool_kmalloc_invalid_free+0xc0/0x118 [ 20.599392] kunit_try_run_case+0x170/0x3f0 [ 20.599712] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.600060] kthread+0x318/0x620 [ 20.600270] ret_from_fork+0x10/0x20 [ 20.600470] [ 20.600689] The buggy address belongs to the object at fff00000c6649100 [ 20.600689] which belongs to the cache kmalloc-128 of size 128 [ 20.601359] The buggy address is located 1 bytes inside of [ 20.601359] 128-byte region [fff00000c6649100, fff00000c6649180) [ 20.601938] [ 20.602117] The buggy address belongs to the physical page: [ 20.602357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106649 [ 20.603082] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.603493] page_type: f5(slab) [ 20.603696] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.604135] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.604591] page dumped because: kasan: bad access detected [ 20.604917] [ 20.605037] Memory state around the buggy address: [ 20.605389] fff00000c6649000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.605817] fff00000c6649080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.606260] >fff00000c6649100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.607425] ^ [ 20.607611] fff00000c6649180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.608059] fff00000c6649200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.608463] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 20.516697] ================================================================== [ 20.517221] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 20.517724] Free of addr fff00000c5a05a00 by task kunit_try_catch/224 [ 20.518100] [ 20.518319] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 20.518443] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.518480] Hardware name: linux,dummy-virt (DT) [ 20.518592] Call trace: [ 20.518627] show_stack+0x20/0x38 (C) [ 20.518690] dump_stack_lvl+0x8c/0xd0 [ 20.518755] print_report+0x118/0x608 [ 20.518812] kasan_report_invalid_free+0xc0/0xe8 [ 20.518868] check_slab_allocation+0xd4/0x108 [ 20.518922] __kasan_mempool_poison_object+0x78/0x150 [ 20.518980] mempool_free+0x28c/0x328 [ 20.519032] mempool_double_free_helper+0x150/0x2e0 [ 20.519088] mempool_kmalloc_double_free+0xc0/0x118 [ 20.519142] kunit_try_run_case+0x170/0x3f0 [ 20.519197] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.519255] kthread+0x318/0x620 [ 20.519305] ret_from_fork+0x10/0x20 [ 20.519360] [ 20.523888] Allocated by task 224: [ 20.524064] kasan_save_stack+0x3c/0x68 [ 20.524260] kasan_save_track+0x20/0x40 [ 20.524581] kasan_save_alloc_info+0x40/0x58 [ 20.524847] __kasan_mempool_unpoison_object+0x11c/0x180 [ 20.525272] remove_element+0x130/0x1f8 [ 20.525527] mempool_alloc_preallocated+0x58/0xc0 [ 20.525797] mempool_double_free_helper+0x94/0x2e0 [ 20.526124] mempool_kmalloc_double_free+0xc0/0x118 [ 20.526429] kunit_try_run_case+0x170/0x3f0 [ 20.526743] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.527059] kthread+0x318/0x620 [ 20.527227] ret_from_fork+0x10/0x20 [ 20.527386] [ 20.527569] Freed by task 224: [ 20.527728] kasan_save_stack+0x3c/0x68 [ 20.528227] kasan_save_track+0x20/0x40 [ 20.528396] kasan_save_free_info+0x4c/0x78 [ 20.528679] __kasan_mempool_poison_object+0xc0/0x150 [ 20.529016] mempool_free+0x28c/0x328 [ 20.529300] mempool_double_free_helper+0x100/0x2e0 [ 20.529509] mempool_kmalloc_double_free+0xc0/0x118 [ 20.529877] kunit_try_run_case+0x170/0x3f0 [ 20.530056] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.531196] kthread+0x318/0x620 [ 20.531395] ret_from_fork+0x10/0x20 [ 20.531670] [ 20.531858] The buggy address belongs to the object at fff00000c5a05a00 [ 20.531858] which belongs to the cache kmalloc-128 of size 128 [ 20.532478] The buggy address is located 0 bytes inside of [ 20.532478] 128-byte region [fff00000c5a05a00, fff00000c5a05a80) [ 20.532966] [ 20.533119] The buggy address belongs to the physical page: [ 20.533340] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a05 [ 20.533772] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.534309] page_type: f5(slab) [ 20.534678] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.535225] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.535589] page dumped because: kasan: bad access detected [ 20.535863] [ 20.536001] Memory state around the buggy address: [ 20.536170] fff00000c5a05900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.536530] fff00000c5a05980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.537095] >fff00000c5a05a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.537394] ^ [ 20.537685] fff00000c5a05a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.538058] fff00000c5a05b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.539158] ================================================================== [ 20.570485] ================================================================== [ 20.571378] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 20.572003] Free of addr fff00000c665c000 by task kunit_try_catch/228 [ 20.572663] [ 20.572843] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 20.572955] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.572990] Hardware name: linux,dummy-virt (DT) [ 20.573030] Call trace: [ 20.573057] show_stack+0x20/0x38 (C) [ 20.573124] dump_stack_lvl+0x8c/0xd0 [ 20.573180] print_report+0x118/0x608 [ 20.573236] kasan_report_invalid_free+0xc0/0xe8 [ 20.573291] __kasan_mempool_poison_pages+0xe0/0xe8 [ 20.573351] mempool_free+0x24c/0x328 [ 20.573403] mempool_double_free_helper+0x150/0x2e0 [ 20.573460] mempool_page_alloc_double_free+0xbc/0x118 [ 20.573518] kunit_try_run_case+0x170/0x3f0 [ 20.573571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.573630] kthread+0x318/0x620 [ 20.573680] ret_from_fork+0x10/0x20 [ 20.573942] [ 20.578336] The buggy address belongs to the physical page: [ 20.579193] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10665c [ 20.579528] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.579844] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.580105] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.580351] page dumped because: kasan: bad access detected [ 20.580581] [ 20.580706] Memory state around the buggy address: [ 20.581456] fff00000c665bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.581695] fff00000c665bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.582101] >fff00000c665c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.582379] ^ [ 20.583343] fff00000c665c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.583828] fff00000c665c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.584419] ================================================================== [ 20.545791] ================================================================== [ 20.546369] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0 [ 20.547397] Free of addr fff00000c65fc000 by task kunit_try_catch/226 [ 20.547836] [ 20.548005] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 20.548110] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.548145] Hardware name: linux,dummy-virt (DT) [ 20.548185] Call trace: [ 20.548212] show_stack+0x20/0x38 (C) [ 20.548275] dump_stack_lvl+0x8c/0xd0 [ 20.548335] print_report+0x118/0x608 [ 20.548387] kasan_report_invalid_free+0xc0/0xe8 [ 20.548442] __kasan_mempool_poison_object+0x14c/0x150 [ 20.548500] mempool_free+0x28c/0x328 [ 20.548555] mempool_double_free_helper+0x150/0x2e0 [ 20.548609] mempool_kmalloc_large_double_free+0xc0/0x118 [ 20.548667] kunit_try_run_case+0x170/0x3f0 [ 20.548722] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.548798] kthread+0x318/0x620 [ 20.548854] ret_from_fork+0x10/0x20 [ 20.548908] [ 20.553774] The buggy address belongs to the physical page: [ 20.554110] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065fc [ 20.554632] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.555072] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.555357] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.555645] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.555900] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.556141] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.556408] head: 0bfffe0000000002 ffffc1ffc3197f01 ffffffffffffffff 0000000000000000 [ 20.556654] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 20.557421] page dumped because: kasan: bad access detected [ 20.557714] [ 20.557837] Memory state around the buggy address: [ 20.558231] fff00000c65fbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.558687] fff00000c65fbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.559031] >fff00000c65fc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.559371] ^ [ 20.559597] fff00000c65fc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.561198] fff00000c65fc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.561713] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 20.435841] ================================================================== [ 20.436296] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 20.436533] Read of size 1 at addr fff00000c6658000 by task kunit_try_catch/218 [ 20.437288] [ 20.437427] CPU: 0 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 20.437530] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.437562] Hardware name: linux,dummy-virt (DT) [ 20.437600] Call trace: [ 20.437627] show_stack+0x20/0x38 (C) [ 20.437687] dump_stack_lvl+0x8c/0xd0 [ 20.437757] print_report+0x118/0x608 [ 20.437817] kasan_report+0xdc/0x128 [ 20.437866] __asan_report_load1_noabort+0x20/0x30 [ 20.437918] mempool_uaf_helper+0x314/0x340 [ 20.437967] mempool_kmalloc_large_uaf+0xc4/0x120 [ 20.438019] kunit_try_run_case+0x170/0x3f0 [ 20.438114] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.438174] kthread+0x318/0x620 [ 20.438226] ret_from_fork+0x10/0x20 [ 20.438282] [ 20.441700] The buggy address belongs to the physical page: [ 20.441971] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106658 [ 20.442264] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.443191] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.444442] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.445069] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.445445] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.445861] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.446271] head: 0bfffe0000000002 ffffc1ffc3199601 ffffffffffffffff 0000000000000000 [ 20.446733] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 20.447120] page dumped because: kasan: bad access detected [ 20.447393] [ 20.447564] Memory state around the buggy address: [ 20.447843] fff00000c6657f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.448226] fff00000c6657f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.448580] >fff00000c6658000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.449214] ^ [ 20.449574] fff00000c6658080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.450002] fff00000c6658100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.450279] ================================================================== [ 20.496383] ================================================================== [ 20.497008] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 20.497514] Read of size 1 at addr fff00000c65fc000 by task kunit_try_catch/222 [ 20.497883] [ 20.498142] CPU: 1 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 20.498244] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.498276] Hardware name: linux,dummy-virt (DT) [ 20.498314] Call trace: [ 20.498343] show_stack+0x20/0x38 (C) [ 20.498404] dump_stack_lvl+0x8c/0xd0 [ 20.498476] print_report+0x118/0x608 [ 20.498557] kasan_report+0xdc/0x128 [ 20.498612] __asan_report_load1_noabort+0x20/0x30 [ 20.498684] mempool_uaf_helper+0x314/0x340 [ 20.498840] mempool_page_alloc_uaf+0xc0/0x118 [ 20.498929] kunit_try_run_case+0x170/0x3f0 [ 20.499081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.499238] kthread+0x318/0x620 [ 20.499375] ret_from_fork+0x10/0x20 [ 20.499438] [ 20.503274] The buggy address belongs to the physical page: [ 20.504077] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065fc [ 20.504508] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.504876] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.505232] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.505561] page dumped because: kasan: bad access detected [ 20.506191] [ 20.506756] Memory state around the buggy address: [ 20.506969] fff00000c65fbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.507540] fff00000c65fbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.507834] >fff00000c65fc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.508386] ^ [ 20.508657] fff00000c65fc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.509051] fff00000c65fc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.509490] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 19.733067] ================================================================== [ 19.733744] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x17c/0x2f8 [ 19.734160] Read of size 1 at addr fff00000c656d500 by task kunit_try_catch/204 [ 19.734481] [ 19.734938] CPU: 0 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 19.735348] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.735397] Hardware name: linux,dummy-virt (DT) [ 19.735438] Call trace: [ 19.735467] show_stack+0x20/0x38 (C) [ 19.735547] dump_stack_lvl+0x8c/0xd0 [ 19.735606] print_report+0x118/0x608 [ 19.735661] kasan_report+0xdc/0x128 [ 19.735711] __kasan_check_byte+0x54/0x70 [ 19.735778] kmem_cache_destroy+0x34/0x218 [ 19.735835] kmem_cache_double_destroy+0x17c/0x2f8 [ 19.735890] kunit_try_run_case+0x170/0x3f0 [ 19.735944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.736000] kthread+0x318/0x620 [ 19.736051] ret_from_fork+0x10/0x20 [ 19.736106] [ 19.738671] Allocated by task 204: [ 19.738995] kasan_save_stack+0x3c/0x68 [ 19.739416] kasan_save_track+0x20/0x40 [ 19.739858] kasan_save_alloc_info+0x40/0x58 [ 19.740465] __kasan_slab_alloc+0xa8/0xb0 [ 19.740821] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 19.741191] __kmem_cache_create_args+0x18c/0x2b0 [ 19.741435] kmem_cache_double_destroy+0xc8/0x2f8 [ 19.741677] kunit_try_run_case+0x170/0x3f0 [ 19.742058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.742350] kthread+0x318/0x620 [ 19.743087] ret_from_fork+0x10/0x20 [ 19.743397] [ 19.743601] Freed by task 204: [ 19.743855] kasan_save_stack+0x3c/0x68 [ 19.744062] kasan_save_track+0x20/0x40 [ 19.744293] kasan_save_free_info+0x4c/0x78 [ 19.744544] __kasan_slab_free+0x6c/0x98 [ 19.744813] kmem_cache_free+0x260/0x470 [ 19.745110] slab_kmem_cache_release+0x38/0x50 [ 19.745439] kmem_cache_release+0x1c/0x30 [ 19.745663] kobject_put+0x17c/0x430 [ 19.745866] sysfs_slab_release+0x1c/0x30 [ 19.746147] kmem_cache_destroy+0x118/0x218 [ 19.746405] kmem_cache_double_destroy+0x130/0x2f8 [ 19.746751] kunit_try_run_case+0x170/0x3f0 [ 19.747036] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.747336] kthread+0x318/0x620 [ 19.747598] ret_from_fork+0x10/0x20 [ 19.747888] [ 19.748023] The buggy address belongs to the object at fff00000c656d500 [ 19.748023] which belongs to the cache kmem_cache of size 208 [ 19.748665] The buggy address is located 0 bytes inside of [ 19.748665] freed 208-byte region [fff00000c656d500, fff00000c656d5d0) [ 19.749530] [ 19.749729] The buggy address belongs to the physical page: [ 19.750017] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10656d [ 19.750463] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.751038] page_type: f5(slab) [ 19.751312] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 19.751705] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 19.752072] page dumped because: kasan: bad access detected [ 19.752313] [ 19.752489] Memory state around the buggy address: [ 19.752727] fff00000c656d400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.753084] fff00000c656d480: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.753457] >fff00000c656d500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.753722] ^ [ 19.753936] fff00000c656d580: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 19.754297] fff00000c656d600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.754946] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 19.671599] ================================================================== [ 19.672151] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x390/0x468 [ 19.672419] Read of size 1 at addr fff00000c654f000 by task kunit_try_catch/202 [ 19.672654] [ 19.672810] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 19.672913] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.672943] Hardware name: linux,dummy-virt (DT) [ 19.672982] Call trace: [ 19.673011] show_stack+0x20/0x38 (C) [ 19.673073] dump_stack_lvl+0x8c/0xd0 [ 19.673134] print_report+0x118/0x608 [ 19.673189] kasan_report+0xdc/0x128 [ 19.673241] __asan_report_load1_noabort+0x20/0x30 [ 19.673292] kmem_cache_rcu_uaf+0x390/0x468 [ 19.673345] kunit_try_run_case+0x170/0x3f0 [ 19.673400] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.673458] kthread+0x318/0x620 [ 19.673508] ret_from_fork+0x10/0x20 [ 19.673564] [ 19.677702] Allocated by task 202: [ 19.677907] kasan_save_stack+0x3c/0x68 [ 19.678188] kasan_save_track+0x20/0x40 [ 19.678447] kasan_save_alloc_info+0x40/0x58 [ 19.678790] __kasan_slab_alloc+0xa8/0xb0 [ 19.679165] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 19.679833] kmem_cache_rcu_uaf+0x12c/0x468 [ 19.680267] kunit_try_run_case+0x170/0x3f0 [ 19.680524] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.681024] kthread+0x318/0x620 [ 19.681351] ret_from_fork+0x10/0x20 [ 19.681574] [ 19.681782] Freed by task 0: [ 19.681969] kasan_save_stack+0x3c/0x68 [ 19.682245] kasan_save_track+0x20/0x40 [ 19.682477] kasan_save_free_info+0x4c/0x78 [ 19.682830] __kasan_slab_free+0x6c/0x98 [ 19.683172] slab_free_after_rcu_debug+0xd4/0x2f8 [ 19.683355] rcu_core+0x9f4/0x1e20 [ 19.683701] rcu_core_si+0x18/0x30 [ 19.683884] handle_softirqs+0x374/0xb28 [ 19.684148] __do_softirq+0x1c/0x28 [ 19.684404] [ 19.684534] Last potentially related work creation: [ 19.684705] kasan_save_stack+0x3c/0x68 [ 19.684946] kasan_record_aux_stack+0xb4/0xc8 [ 19.685319] kmem_cache_free+0x120/0x470 [ 19.685650] kmem_cache_rcu_uaf+0x16c/0x468 [ 19.685911] kunit_try_run_case+0x170/0x3f0 [ 19.686180] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.686451] kthread+0x318/0x620 [ 19.686613] ret_from_fork+0x10/0x20 [ 19.687058] [ 19.687251] The buggy address belongs to the object at fff00000c654f000 [ 19.687251] which belongs to the cache test_cache of size 200 [ 19.687706] The buggy address is located 0 bytes inside of [ 19.687706] freed 200-byte region [fff00000c654f000, fff00000c654f0c8) [ 19.688888] [ 19.689029] The buggy address belongs to the physical page: [ 19.689385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10654f [ 19.689777] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.690136] page_type: f5(slab) [ 19.690435] raw: 0bfffe0000000000 fff00000c656d3c0 dead000000000122 0000000000000000 [ 19.691210] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 19.691447] page dumped because: kasan: bad access detected [ 19.691627] [ 19.691728] Memory state around the buggy address: [ 19.691930] fff00000c654ef00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.692140] fff00000c654ef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.692650] >fff00000c654f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.692906] ^ [ 19.693074] fff00000c654f080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 19.693582] fff00000c654f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.693877] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 19.591478] ================================================================== [ 19.592204] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3b8 [ 19.592937] Free of addr fff00000c6573001 by task kunit_try_catch/200 [ 19.593444] [ 19.593638] CPU: 0 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 19.593770] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.593812] Hardware name: linux,dummy-virt (DT) [ 19.593869] Call trace: [ 19.593900] show_stack+0x20/0x38 (C) [ 19.593973] dump_stack_lvl+0x8c/0xd0 [ 19.594037] print_report+0x118/0x608 [ 19.594119] kasan_report_invalid_free+0xc0/0xe8 [ 19.594183] check_slab_allocation+0xfc/0x108 [ 19.594242] __kasan_slab_pre_free+0x2c/0x48 [ 19.594299] kmem_cache_free+0xf0/0x470 [ 19.594378] kmem_cache_invalid_free+0x184/0x3b8 [ 19.594443] kunit_try_run_case+0x170/0x3f0 [ 19.594565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.594640] kthread+0x318/0x620 [ 19.594696] ret_from_fork+0x10/0x20 [ 19.594770] [ 19.598928] Allocated by task 200: [ 19.599234] kasan_save_stack+0x3c/0x68 [ 19.599581] kasan_save_track+0x20/0x40 [ 19.600418] kasan_save_alloc_info+0x40/0x58 [ 19.600731] __kasan_slab_alloc+0xa8/0xb0 [ 19.601124] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 19.601392] kmem_cache_invalid_free+0x12c/0x3b8 [ 19.601632] kunit_try_run_case+0x170/0x3f0 [ 19.601813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.602211] kthread+0x318/0x620 [ 19.602453] ret_from_fork+0x10/0x20 [ 19.602725] [ 19.602916] The buggy address belongs to the object at fff00000c6573000 [ 19.602916] which belongs to the cache test_cache of size 200 [ 19.603448] The buggy address is located 1 bytes inside of [ 19.603448] 200-byte region [fff00000c6573000, fff00000c65730c8) [ 19.604042] [ 19.604234] The buggy address belongs to the physical page: [ 19.604513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106573 [ 19.605168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.605500] page_type: f5(slab) [ 19.605781] raw: 0bfffe0000000000 fff00000c656d280 dead000000000122 0000000000000000 [ 19.606159] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 19.606873] page dumped because: kasan: bad access detected [ 19.607375] [ 19.607696] Memory state around the buggy address: [ 19.607918] fff00000c6572f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.608168] fff00000c6572f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.609178] >fff00000c6573000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.609569] ^ [ 19.609769] fff00000c6573080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 19.610252] fff00000c6573100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.610828] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 19.548395] ================================================================== [ 19.549036] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 19.549337] Free of addr fff00000c6572000 by task kunit_try_catch/198 [ 19.549583] [ 19.549723] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 19.549847] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.549880] Hardware name: linux,dummy-virt (DT) [ 19.549917] Call trace: [ 19.549959] show_stack+0x20/0x38 (C) [ 19.550026] dump_stack_lvl+0x8c/0xd0 [ 19.550105] print_report+0x118/0x608 [ 19.550165] kasan_report_invalid_free+0xc0/0xe8 [ 19.550221] check_slab_allocation+0xd4/0x108 [ 19.550278] __kasan_slab_pre_free+0x2c/0x48 [ 19.550334] kmem_cache_free+0xf0/0x470 [ 19.550389] kmem_cache_double_free+0x190/0x3c8 [ 19.550443] kunit_try_run_case+0x170/0x3f0 [ 19.550498] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.550871] kthread+0x318/0x620 [ 19.550951] ret_from_fork+0x10/0x20 [ 19.551010] [ 19.554580] Allocated by task 198: [ 19.554922] kasan_save_stack+0x3c/0x68 [ 19.555774] kasan_save_track+0x20/0x40 [ 19.556390] kasan_save_alloc_info+0x40/0x58 [ 19.556903] __kasan_slab_alloc+0xa8/0xb0 [ 19.557422] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 19.557672] kmem_cache_double_free+0x12c/0x3c8 [ 19.557871] kunit_try_run_case+0x170/0x3f0 [ 19.558050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.558276] kthread+0x318/0x620 [ 19.558426] ret_from_fork+0x10/0x20 [ 19.559190] [ 19.559944] Freed by task 198: [ 19.560265] kasan_save_stack+0x3c/0x68 [ 19.560636] kasan_save_track+0x20/0x40 [ 19.561006] kasan_save_free_info+0x4c/0x78 [ 19.561378] __kasan_slab_free+0x6c/0x98 [ 19.561773] kmem_cache_free+0x260/0x470 [ 19.562172] kmem_cache_double_free+0x140/0x3c8 [ 19.562949] kunit_try_run_case+0x170/0x3f0 [ 19.563774] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.564569] kthread+0x318/0x620 [ 19.565209] ret_from_fork+0x10/0x20 [ 19.565794] [ 19.565966] The buggy address belongs to the object at fff00000c6572000 [ 19.565966] which belongs to the cache test_cache of size 200 [ 19.567241] The buggy address is located 0 bytes inside of [ 19.567241] 200-byte region [fff00000c6572000, fff00000c65720c8) [ 19.568284] [ 19.568474] The buggy address belongs to the physical page: [ 19.569042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106572 [ 19.569641] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.569898] page_type: f5(slab) [ 19.570083] raw: 0bfffe0000000000 fff00000c656d140 dead000000000122 0000000000000000 [ 19.570339] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 19.570573] page dumped because: kasan: bad access detected [ 19.572429] [ 19.572567] Memory state around the buggy address: [ 19.572765] fff00000c6571f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.573189] fff00000c6571f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.573514] >fff00000c6572000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.573880] ^ [ 19.574133] fff00000c6572080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 19.574448] fff00000c6572100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.575641] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 19.485889] ================================================================== [ 19.486621] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x33c/0x428 [ 19.487399] Read of size 1 at addr fff00000c656f0c8 by task kunit_try_catch/196 [ 19.487953] [ 19.488335] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 19.488528] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.488593] Hardware name: linux,dummy-virt (DT) [ 19.488666] Call trace: [ 19.488721] show_stack+0x20/0x38 (C) [ 19.488860] dump_stack_lvl+0x8c/0xd0 [ 19.488982] print_report+0x118/0x608 [ 19.489064] kasan_report+0xdc/0x128 [ 19.489121] __asan_report_load1_noabort+0x20/0x30 [ 19.489206] kmem_cache_oob+0x33c/0x428 [ 19.489323] kunit_try_run_case+0x170/0x3f0 [ 19.489445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.489520] kthread+0x318/0x620 [ 19.489575] ret_from_fork+0x10/0x20 [ 19.489633] [ 19.494366] Allocated by task 196: [ 19.495338] kasan_save_stack+0x3c/0x68 [ 19.495992] kasan_save_track+0x20/0x40 [ 19.496556] kasan_save_alloc_info+0x40/0x58 [ 19.497181] __kasan_slab_alloc+0xa8/0xb0 [ 19.497681] kmem_cache_alloc_noprof+0x10c/0x3a0 [ 19.498250] kmem_cache_oob+0x12c/0x428 [ 19.499118] kunit_try_run_case+0x170/0x3f0 [ 19.499400] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.500062] kthread+0x318/0x620 [ 19.500350] ret_from_fork+0x10/0x20 [ 19.500656] [ 19.500926] The buggy address belongs to the object at fff00000c656f000 [ 19.500926] which belongs to the cache test_cache of size 200 [ 19.501798] The buggy address is located 0 bytes to the right of [ 19.501798] allocated 200-byte region [fff00000c656f000, fff00000c656f0c8) [ 19.502197] [ 19.502304] The buggy address belongs to the physical page: [ 19.502926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10656f [ 19.503959] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.504494] page_type: f5(slab) [ 19.504839] raw: 0bfffe0000000000 fff00000c656d000 dead000000000122 0000000000000000 [ 19.505423] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 19.506863] page dumped because: kasan: bad access detected [ 19.507212] [ 19.507672] Memory state around the buggy address: [ 19.507988] fff00000c656ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.508757] fff00000c656f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.509501] >fff00000c656f080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 19.510252] ^ [ 19.511072] fff00000c656f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.512051] fff00000c656f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.512759] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 19.416504] ================================================================== [ 19.417283] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 19.418000] Read of size 8 at addr fff00000c6534e40 by task kunit_try_catch/189 [ 19.418763] [ 19.419099] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 19.419305] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.419365] Hardware name: linux,dummy-virt (DT) [ 19.419466] Call trace: [ 19.419516] show_stack+0x20/0x38 (C) [ 19.419643] dump_stack_lvl+0x8c/0xd0 [ 19.419783] print_report+0x118/0x608 [ 19.419906] kasan_report+0xdc/0x128 [ 19.420001] __asan_report_load8_noabort+0x20/0x30 [ 19.420104] workqueue_uaf+0x480/0x4a8 [ 19.420199] kunit_try_run_case+0x170/0x3f0 [ 19.420309] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.420438] kthread+0x318/0x620 [ 19.420552] ret_from_fork+0x10/0x20 [ 19.420660] [ 19.425805] Allocated by task 189: [ 19.426311] kasan_save_stack+0x3c/0x68 [ 19.427231] kasan_save_track+0x20/0x40 [ 19.427667] kasan_save_alloc_info+0x40/0x58 [ 19.428252] __kasan_kmalloc+0xd4/0xd8 [ 19.428648] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.429229] workqueue_uaf+0x13c/0x4a8 [ 19.429676] kunit_try_run_case+0x170/0x3f0 [ 19.430227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.431239] kthread+0x318/0x620 [ 19.431796] ret_from_fork+0x10/0x20 [ 19.431994] [ 19.432101] Freed by task 47: [ 19.432238] kasan_save_stack+0x3c/0x68 [ 19.432405] kasan_save_track+0x20/0x40 [ 19.432560] kasan_save_free_info+0x4c/0x78 [ 19.432720] __kasan_slab_free+0x6c/0x98 [ 19.433219] kfree+0x214/0x3c8 [ 19.433661] workqueue_uaf_work+0x18/0x30 [ 19.434198] process_one_work+0x530/0xf98 [ 19.435065] worker_thread+0x614/0xf28 [ 19.435600] kthread+0x318/0x620 [ 19.436051] ret_from_fork+0x10/0x20 [ 19.436547] [ 19.436822] Last potentially related work creation: [ 19.437319] kasan_save_stack+0x3c/0x68 [ 19.437869] kasan_record_aux_stack+0xb4/0xc8 [ 19.438366] __queue_work+0x65c/0x1010 [ 19.439340] queue_work_on+0xbc/0xf8 [ 19.439761] workqueue_uaf+0x210/0x4a8 [ 19.440233] kunit_try_run_case+0x170/0x3f0 [ 19.440650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.441184] kthread+0x318/0x620 [ 19.441582] ret_from_fork+0x10/0x20 [ 19.442006] [ 19.442263] The buggy address belongs to the object at fff00000c6534e40 [ 19.442263] which belongs to the cache kmalloc-32 of size 32 [ 19.443324] The buggy address is located 0 bytes inside of [ 19.443324] freed 32-byte region [fff00000c6534e40, fff00000c6534e60) [ 19.444373] [ 19.444693] The buggy address belongs to the physical page: [ 19.445195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106534 [ 19.445947] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.446746] page_type: f5(slab) [ 19.447158] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 19.447785] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 19.448370] page dumped because: kasan: bad access detected [ 19.448865] [ 19.449138] Memory state around the buggy address: [ 19.449683] fff00000c6534d00: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc [ 19.450302] fff00000c6534d80: 00 00 07 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 19.451298] >fff00000c6534e00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 19.451726] ^ [ 19.452133] fff00000c6534e80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.452821] fff00000c6534f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.453432] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 19.355431] ================================================================== [ 19.356296] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 19.356831] Read of size 4 at addr fff00000c6549980 by task swapper/0/0 [ 19.357438] [ 19.357770] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G B N 6.14.7-rc1 #1 [ 19.357964] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.358027] Hardware name: linux,dummy-virt (DT) [ 19.358121] Call trace: [ 19.358180] show_stack+0x20/0x38 (C) [ 19.358309] dump_stack_lvl+0x8c/0xd0 [ 19.358427] print_report+0x118/0x608 [ 19.358806] kasan_report+0xdc/0x128 [ 19.358938] __asan_report_load4_noabort+0x20/0x30 [ 19.359020] rcu_uaf_reclaim+0x64/0x70 [ 19.359072] rcu_core+0x9f4/0x1e20 [ 19.359129] rcu_core_si+0x18/0x30 [ 19.359176] handle_softirqs+0x374/0xb28 [ 19.359229] __do_softirq+0x1c/0x28 [ 19.359276] ____do_softirq+0x18/0x30 [ 19.359325] call_on_irq_stack+0x24/0x58 [ 19.359376] do_softirq_own_stack+0x24/0x38 [ 19.359427] __irq_exit_rcu+0x1fc/0x318 [ 19.359476] irq_exit_rcu+0x1c/0x80 [ 19.359522] el1_interrupt+0x38/0x58 [ 19.359576] el1h_64_irq_handler+0x18/0x28 [ 19.359626] el1h_64_irq+0x6c/0x70 [ 19.359781] arch_local_irq_enable+0x4/0x8 (P) [ 19.359848] do_idle+0x384/0x4e8 [ 19.359898] cpu_startup_entry+0x68/0x80 [ 19.359947] rest_init+0x160/0x188 [ 19.359996] start_kernel+0x310/0x3d8 [ 19.360053] __primary_switched+0x8c/0xa0 [ 19.360115] [ 19.369951] Allocated by task 187: [ 19.370439] kasan_save_stack+0x3c/0x68 [ 19.371317] kasan_save_track+0x20/0x40 [ 19.371869] kasan_save_alloc_info+0x40/0x58 [ 19.372414] __kasan_kmalloc+0xd4/0xd8 [ 19.372822] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.373346] rcu_uaf+0xb0/0x2d0 [ 19.373776] kunit_try_run_case+0x170/0x3f0 [ 19.374246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.375079] kthread+0x318/0x620 [ 19.375498] ret_from_fork+0x10/0x20 [ 19.376006] [ 19.376271] Freed by task 0: [ 19.376655] kasan_save_stack+0x3c/0x68 [ 19.377130] kasan_save_track+0x20/0x40 [ 19.377654] kasan_save_free_info+0x4c/0x78 [ 19.378187] __kasan_slab_free+0x6c/0x98 [ 19.378973] kfree+0x214/0x3c8 [ 19.379600] rcu_uaf_reclaim+0x28/0x70 [ 19.380327] rcu_core+0x9f4/0x1e20 [ 19.380768] rcu_core_si+0x18/0x30 [ 19.381272] handle_softirqs+0x374/0xb28 [ 19.381696] __do_softirq+0x1c/0x28 [ 19.382226] [ 19.382613] Last potentially related work creation: [ 19.383332] kasan_save_stack+0x3c/0x68 [ 19.383856] kasan_record_aux_stack+0xb4/0xc8 [ 19.384345] __call_rcu_common.constprop.0+0x74/0xa10 [ 19.384937] call_rcu+0x18/0x30 [ 19.385353] rcu_uaf+0x14c/0x2d0 [ 19.385791] kunit_try_run_case+0x170/0x3f0 [ 19.386255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.387115] kthread+0x318/0x620 [ 19.387569] ret_from_fork+0x10/0x20 [ 19.388038] [ 19.388392] The buggy address belongs to the object at fff00000c6549980 [ 19.388392] which belongs to the cache kmalloc-32 of size 32 [ 19.389391] The buggy address is located 0 bytes inside of [ 19.389391] freed 32-byte region [fff00000c6549980, fff00000c65499a0) [ 19.390419] [ 19.391005] The buggy address belongs to the physical page: [ 19.391313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106549 [ 19.392192] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.392838] page_type: f5(slab) [ 19.393278] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 19.394091] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 19.394894] page dumped because: kasan: bad access detected [ 19.395627] [ 19.395916] Memory state around the buggy address: [ 19.396480] fff00000c6549880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 19.397079] fff00000c6549900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 19.397862] >fff00000c6549980: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 19.398609] ^ [ 19.399177] fff00000c6549a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.399687] fff00000c6549a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.400466] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 19.292292] ================================================================== [ 19.293173] BUG: KASAN: slab-use-after-free in ksize_uaf+0x548/0x600 [ 19.293931] Read of size 1 at addr fff00000c59c2a78 by task kunit_try_catch/185 [ 19.294208] [ 19.294340] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 19.294443] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.294496] Hardware name: linux,dummy-virt (DT) [ 19.294594] Call trace: [ 19.294647] show_stack+0x20/0x38 (C) [ 19.294769] dump_stack_lvl+0x8c/0xd0 [ 19.294861] print_report+0x118/0x608 [ 19.294949] kasan_report+0xdc/0x128 [ 19.295052] __asan_report_load1_noabort+0x20/0x30 [ 19.295149] ksize_uaf+0x548/0x600 [ 19.295226] kunit_try_run_case+0x170/0x3f0 [ 19.295334] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.295442] kthread+0x318/0x620 [ 19.295522] ret_from_fork+0x10/0x20 [ 19.295617] [ 19.303060] Allocated by task 185: [ 19.303319] kasan_save_stack+0x3c/0x68 [ 19.303719] kasan_save_track+0x20/0x40 [ 19.304112] kasan_save_alloc_info+0x40/0x58 [ 19.304530] __kasan_kmalloc+0xd4/0xd8 [ 19.305896] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.306201] ksize_uaf+0xb8/0x600 [ 19.306359] kunit_try_run_case+0x170/0x3f0 [ 19.307036] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.308853] kthread+0x318/0x620 [ 19.309320] ret_from_fork+0x10/0x20 [ 19.309923] [ 19.310132] Freed by task 185: [ 19.310592] kasan_save_stack+0x3c/0x68 [ 19.311907] kasan_save_track+0x20/0x40 [ 19.312170] kasan_save_free_info+0x4c/0x78 [ 19.312411] __kasan_slab_free+0x6c/0x98 [ 19.312636] kfree+0x214/0x3c8 [ 19.312842] ksize_uaf+0x11c/0x600 [ 19.313050] kunit_try_run_case+0x170/0x3f0 [ 19.313285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.313564] kthread+0x318/0x620 [ 19.315232] ret_from_fork+0x10/0x20 [ 19.315546] [ 19.315768] The buggy address belongs to the object at fff00000c59c2a00 [ 19.315768] which belongs to the cache kmalloc-128 of size 128 [ 19.317095] The buggy address is located 120 bytes inside of [ 19.317095] freed 128-byte region [fff00000c59c2a00, fff00000c59c2a80) [ 19.318042] [ 19.318366] The buggy address belongs to the physical page: [ 19.319049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c2 [ 19.320454] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.321204] page_type: f5(slab) [ 19.321764] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.322586] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.323189] page dumped because: kasan: bad access detected [ 19.323609] [ 19.324186] Memory state around the buggy address: [ 19.324905] fff00000c59c2900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.325603] fff00000c59c2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.326353] >fff00000c59c2a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.327167] ^ [ 19.327744] fff00000c59c2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.328270] fff00000c59c2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.329785] ================================================================== [ 19.259123] ================================================================== [ 19.260101] BUG: KASAN: slab-use-after-free in ksize_uaf+0x59c/0x600 [ 19.260673] Read of size 1 at addr fff00000c59c2a00 by task kunit_try_catch/185 [ 19.261267] [ 19.261578] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 19.261816] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.261892] Hardware name: linux,dummy-virt (DT) [ 19.261965] Call trace: [ 19.262023] show_stack+0x20/0x38 (C) [ 19.262178] dump_stack_lvl+0x8c/0xd0 [ 19.262301] print_report+0x118/0x608 [ 19.262378] kasan_report+0xdc/0x128 [ 19.262430] __asan_report_load1_noabort+0x20/0x30 [ 19.262489] ksize_uaf+0x59c/0x600 [ 19.262859] kunit_try_run_case+0x170/0x3f0 [ 19.262968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.263071] kthread+0x318/0x620 [ 19.263166] ret_from_fork+0x10/0x20 [ 19.263272] [ 19.265526] Allocated by task 185: [ 19.265683] kasan_save_stack+0x3c/0x68 [ 19.266208] kasan_save_track+0x20/0x40 [ 19.266865] kasan_save_alloc_info+0x40/0x58 [ 19.268570] __kasan_kmalloc+0xd4/0xd8 [ 19.269203] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.269804] ksize_uaf+0xb8/0x600 [ 19.270366] kunit_try_run_case+0x170/0x3f0 [ 19.271111] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.271976] kthread+0x318/0x620 [ 19.272345] ret_from_fork+0x10/0x20 [ 19.272675] [ 19.272859] Freed by task 185: [ 19.273101] kasan_save_stack+0x3c/0x68 [ 19.273342] kasan_save_track+0x20/0x40 [ 19.273573] kasan_save_free_info+0x4c/0x78 [ 19.273864] __kasan_slab_free+0x6c/0x98 [ 19.274209] kfree+0x214/0x3c8 [ 19.275806] ksize_uaf+0x11c/0x600 [ 19.276243] kunit_try_run_case+0x170/0x3f0 [ 19.276852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.277468] kthread+0x318/0x620 [ 19.277985] ret_from_fork+0x10/0x20 [ 19.278503] [ 19.278885] The buggy address belongs to the object at fff00000c59c2a00 [ 19.278885] which belongs to the cache kmalloc-128 of size 128 [ 19.279884] The buggy address is located 0 bytes inside of [ 19.279884] freed 128-byte region [fff00000c59c2a00, fff00000c59c2a80) [ 19.280484] [ 19.280625] The buggy address belongs to the physical page: [ 19.280907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c2 [ 19.281268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.281580] page_type: f5(slab) [ 19.282913] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.283483] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.284556] page dumped because: kasan: bad access detected [ 19.285122] [ 19.285418] Memory state around the buggy address: [ 19.285912] fff00000c59c2900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.287499] fff00000c59c2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.288128] >fff00000c59c2a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.288807] ^ [ 19.289289] fff00000c59c2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.289950] fff00000c59c2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.290462] ================================================================== [ 19.223047] ================================================================== [ 19.224264] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x600 [ 19.224985] Read of size 1 at addr fff00000c59c2a00 by task kunit_try_catch/185 [ 19.225556] [ 19.225823] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 19.226016] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.226098] Hardware name: linux,dummy-virt (DT) [ 19.226181] Call trace: [ 19.226246] show_stack+0x20/0x38 (C) [ 19.226407] dump_stack_lvl+0x8c/0xd0 [ 19.226543] print_report+0x118/0x608 [ 19.226671] kasan_report+0xdc/0x128 [ 19.226799] __kasan_check_byte+0x54/0x70 [ 19.226898] ksize+0x30/0x88 [ 19.226954] ksize_uaf+0x168/0x600 [ 19.227005] kunit_try_run_case+0x170/0x3f0 [ 19.227061] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.227119] kthread+0x318/0x620 [ 19.227167] ret_from_fork+0x10/0x20 [ 19.227223] [ 19.231449] Allocated by task 185: [ 19.231902] kasan_save_stack+0x3c/0x68 [ 19.232454] kasan_save_track+0x20/0x40 [ 19.233009] kasan_save_alloc_info+0x40/0x58 [ 19.233515] __kasan_kmalloc+0xd4/0xd8 [ 19.233792] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.234079] ksize_uaf+0xb8/0x600 [ 19.234335] kunit_try_run_case+0x170/0x3f0 [ 19.234805] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.235447] kthread+0x318/0x620 [ 19.235914] ret_from_fork+0x10/0x20 [ 19.236383] [ 19.236667] Freed by task 185: [ 19.237081] kasan_save_stack+0x3c/0x68 [ 19.237475] kasan_save_track+0x20/0x40 [ 19.237846] kasan_save_free_info+0x4c/0x78 [ 19.238198] __kasan_slab_free+0x6c/0x98 [ 19.238701] kfree+0x214/0x3c8 [ 19.239165] ksize_uaf+0x11c/0x600 [ 19.239610] kunit_try_run_case+0x170/0x3f0 [ 19.240163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.240791] kthread+0x318/0x620 [ 19.241218] ret_from_fork+0x10/0x20 [ 19.241648] [ 19.241922] The buggy address belongs to the object at fff00000c59c2a00 [ 19.241922] which belongs to the cache kmalloc-128 of size 128 [ 19.242752] The buggy address is located 0 bytes inside of [ 19.242752] freed 128-byte region [fff00000c59c2a00, fff00000c59c2a80) [ 19.243700] [ 19.244049] The buggy address belongs to the physical page: [ 19.244627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c2 [ 19.245134] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.245732] page_type: f5(slab) [ 19.246192] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.247183] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.248001] page dumped because: kasan: bad access detected [ 19.248679] [ 19.249001] Memory state around the buggy address: [ 19.249463] fff00000c59c2900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.252373] fff00000c59c2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.253115] >fff00000c59c2a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.253699] ^ [ 19.254003] fff00000c59c2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.256297] fff00000c59c2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.257096] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 19.159577] ================================================================== [ 19.160115] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750 [ 19.160681] Read of size 1 at addr fff00000c5a05378 by task kunit_try_catch/183 [ 19.162331] [ 19.162694] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 19.163032] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.163106] Hardware name: linux,dummy-virt (DT) [ 19.163163] Call trace: [ 19.163192] show_stack+0x20/0x38 (C) [ 19.163264] dump_stack_lvl+0x8c/0xd0 [ 19.163320] print_report+0x118/0x608 [ 19.163375] kasan_report+0xdc/0x128 [ 19.163428] __asan_report_load1_noabort+0x20/0x30 [ 19.163481] ksize_unpoisons_memory+0x628/0x750 [ 19.163535] kunit_try_run_case+0x170/0x3f0 [ 19.163590] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.163647] kthread+0x318/0x620 [ 19.163698] ret_from_fork+0x10/0x20 [ 19.163782] [ 19.169137] Allocated by task 183: [ 19.169658] kasan_save_stack+0x3c/0x68 [ 19.170264] kasan_save_track+0x20/0x40 [ 19.171017] kasan_save_alloc_info+0x40/0x58 [ 19.171553] __kasan_kmalloc+0xd4/0xd8 [ 19.172076] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.172586] ksize_unpoisons_memory+0xc0/0x750 [ 19.173084] kunit_try_run_case+0x170/0x3f0 [ 19.173615] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.174209] kthread+0x318/0x620 [ 19.174946] ret_from_fork+0x10/0x20 [ 19.175497] [ 19.175812] The buggy address belongs to the object at fff00000c5a05300 [ 19.175812] which belongs to the cache kmalloc-128 of size 128 [ 19.176805] The buggy address is located 5 bytes to the right of [ 19.176805] allocated 115-byte region [fff00000c5a05300, fff00000c5a05373) [ 19.177889] [ 19.178242] The buggy address belongs to the physical page: [ 19.178913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a05 [ 19.179579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.180242] page_type: f5(slab) [ 19.180642] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.182190] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.182938] page dumped because: kasan: bad access detected [ 19.183181] [ 19.183284] Memory state around the buggy address: [ 19.183452] fff00000c5a05200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.183673] fff00000c5a05280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.183910] >fff00000c5a05300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.184123] ^ [ 19.184341] fff00000c5a05380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.184563] fff00000c5a05400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.185051] ================================================================== [ 19.186081] ================================================================== [ 19.188626] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750 [ 19.189228] Read of size 1 at addr fff00000c5a0537f by task kunit_try_catch/183 [ 19.189960] [ 19.190238] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 19.190400] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.190436] Hardware name: linux,dummy-virt (DT) [ 19.190913] Call trace: [ 19.190971] show_stack+0x20/0x38 (C) [ 19.191044] dump_stack_lvl+0x8c/0xd0 [ 19.191101] print_report+0x118/0x608 [ 19.191155] kasan_report+0xdc/0x128 [ 19.191207] __asan_report_load1_noabort+0x20/0x30 [ 19.191262] ksize_unpoisons_memory+0x6a0/0x750 [ 19.191316] kunit_try_run_case+0x170/0x3f0 [ 19.191372] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.191430] kthread+0x318/0x620 [ 19.191481] ret_from_fork+0x10/0x20 [ 19.191537] [ 19.196968] Allocated by task 183: [ 19.197277] kasan_save_stack+0x3c/0x68 [ 19.197681] kasan_save_track+0x20/0x40 [ 19.198403] kasan_save_alloc_info+0x40/0x58 [ 19.199187] __kasan_kmalloc+0xd4/0xd8 [ 19.199571] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.199948] ksize_unpoisons_memory+0xc0/0x750 [ 19.200318] kunit_try_run_case+0x170/0x3f0 [ 19.200680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.201519] kthread+0x318/0x620 [ 19.201877] ret_from_fork+0x10/0x20 [ 19.202245] [ 19.202476] The buggy address belongs to the object at fff00000c5a05300 [ 19.202476] which belongs to the cache kmalloc-128 of size 128 [ 19.203769] The buggy address is located 12 bytes to the right of [ 19.203769] allocated 115-byte region [fff00000c5a05300, fff00000c5a05373) [ 19.204863] [ 19.205268] The buggy address belongs to the physical page: [ 19.205560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a05 [ 19.206432] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.207205] page_type: f5(slab) [ 19.207456] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.207854] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.208176] page dumped because: kasan: bad access detected [ 19.208357] [ 19.208455] Memory state around the buggy address: [ 19.208621] fff00000c5a05200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.210228] fff00000c5a05280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.210924] >fff00000c5a05300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.211162] ^ [ 19.211385] fff00000c5a05380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.211605] fff00000c5a05400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.211893] ================================================================== [ 19.130358] ================================================================== [ 19.131604] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750 [ 19.132256] Read of size 1 at addr fff00000c5a05373 by task kunit_try_catch/183 [ 19.132922] [ 19.133725] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 19.133868] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.133903] Hardware name: linux,dummy-virt (DT) [ 19.133941] Call trace: [ 19.133970] show_stack+0x20/0x38 (C) [ 19.134037] dump_stack_lvl+0x8c/0xd0 [ 19.134107] print_report+0x118/0x608 [ 19.134164] kasan_report+0xdc/0x128 [ 19.134218] __asan_report_load1_noabort+0x20/0x30 [ 19.134273] ksize_unpoisons_memory+0x638/0x750 [ 19.134327] kunit_try_run_case+0x170/0x3f0 [ 19.134382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.134440] kthread+0x318/0x620 [ 19.134560] ret_from_fork+0x10/0x20 [ 19.134669] [ 19.139732] Allocated by task 183: [ 19.139918] kasan_save_stack+0x3c/0x68 [ 19.140103] kasan_save_track+0x20/0x40 [ 19.140265] kasan_save_alloc_info+0x40/0x58 [ 19.140430] __kasan_kmalloc+0xd4/0xd8 [ 19.140588] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.140821] ksize_unpoisons_memory+0xc0/0x750 [ 19.142066] kunit_try_run_case+0x170/0x3f0 [ 19.142570] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.143826] kthread+0x318/0x620 [ 19.144170] ret_from_fork+0x10/0x20 [ 19.144516] [ 19.144768] The buggy address belongs to the object at fff00000c5a05300 [ 19.144768] which belongs to the cache kmalloc-128 of size 128 [ 19.145583] The buggy address is located 0 bytes to the right of [ 19.145583] allocated 115-byte region [fff00000c5a05300, fff00000c5a05373) [ 19.146406] [ 19.146687] The buggy address belongs to the physical page: [ 19.147713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a05 [ 19.149331] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.149880] page_type: f5(slab) [ 19.150228] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.150861] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.151689] page dumped because: kasan: bad access detected [ 19.152314] [ 19.152565] Memory state around the buggy address: [ 19.153089] fff00000c5a05200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.153862] fff00000c5a05280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.154831] >fff00000c5a05300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.155414] ^ [ 19.156038] fff00000c5a05380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.156758] fff00000c5a05400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.157391] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[ 19.087241] ================================================================== [ 19.087976] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 19.088689] Free of addr fff00000c59b8560 by task kunit_try_catch/181 [ 19.089214] [ 19.089767] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 19.089949] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.090043] Hardware name: linux,dummy-virt (DT) [ 19.090105] Call trace: [ 19.090154] show_stack+0x20/0x38 (C) [ 19.090223] dump_stack_lvl+0x8c/0xd0 [ 19.090280] print_report+0x118/0x608 [ 19.090334] kasan_report_invalid_free+0xc0/0xe8 [ 19.090390] check_slab_allocation+0xd4/0x108 [ 19.090444] __kasan_slab_pre_free+0x2c/0x48 [ 19.090682] kfree+0xe8/0x3c8 [ 19.090818] kfree_sensitive+0x3c/0xb0 [ 19.090916] kmalloc_double_kzfree+0x168/0x308 [ 19.091027] kunit_try_run_case+0x170/0x3f0 [ 19.091137] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.091257] kthread+0x318/0x620 [ 19.091358] ret_from_fork+0x10/0x20 [ 19.091481] [ 19.098406] Allocated by task 181: [ 19.099653] kasan_save_stack+0x3c/0x68 [ 19.100306] kasan_save_track+0x20/0x40 [ 19.100888] kasan_save_alloc_info+0x40/0x58 [ 19.101295] __kasan_kmalloc+0xd4/0xd8 [ 19.101475] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.101656] kmalloc_double_kzfree+0xb8/0x308 [ 19.101853] kunit_try_run_case+0x170/0x3f0 [ 19.102022] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.102236] kthread+0x318/0x620 [ 19.102387] ret_from_fork+0x10/0x20 [ 19.103667] [ 19.103891] Freed by task 181: [ 19.104236] kasan_save_stack+0x3c/0x68 [ 19.104607] kasan_save_track+0x20/0x40 [ 19.104961] kasan_save_free_info+0x4c/0x78 [ 19.105325] __kasan_slab_free+0x6c/0x98 [ 19.105668] kfree+0x214/0x3c8 [ 19.106677] kfree_sensitive+0x80/0xb0 [ 19.107284] kmalloc_double_kzfree+0x11c/0x308 [ 19.107653] kunit_try_run_case+0x170/0x3f0 [ 19.107911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.108104] kthread+0x318/0x620 [ 19.108251] ret_from_fork+0x10/0x20 [ 19.108399] [ 19.108506] The buggy address belongs to the object at fff00000c59b8560 [ 19.108506] which belongs to the cache kmalloc-16 of size 16 [ 19.109786] The buggy address is located 0 bytes inside of [ 19.109786] 16-byte region [fff00000c59b8560, fff00000c59b8570) [ 19.111828] [ 19.112032] The buggy address belongs to the physical page: [ 19.112498] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059b8 [ 19.113072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.113570] page_type: f5(slab) [ 19.114327] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.115354] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.116186] page dumped because: kasan: bad access detected [ 19.116732] [ 19.117008] Memory state around the buggy address: [ 19.117539] fff00000c59b8400: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 00 fc fc [ 19.118078] fff00000c59b8480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.119456] >fff00000c59b8500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.119933] ^ [ 19.120612] fff00000c59b8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.121179] fff00000c59b8600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.121862] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 19.051847] ================================================================== [ 19.052754] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 19.053536] Read of size 1 at addr fff00000c59b8560 by task kunit_try_catch/181 [ 19.054136] [ 19.054474] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 19.054699] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.054779] Hardware name: linux,dummy-virt (DT) [ 19.055582] Call trace: [ 19.055623] show_stack+0x20/0x38 (C) [ 19.055698] dump_stack_lvl+0x8c/0xd0 [ 19.055784] print_report+0x118/0x608 [ 19.055837] kasan_report+0xdc/0x128 [ 19.055884] __kasan_check_byte+0x54/0x70 [ 19.055933] kfree_sensitive+0x30/0xb0 [ 19.055983] kmalloc_double_kzfree+0x168/0x308 [ 19.056033] kunit_try_run_case+0x170/0x3f0 [ 19.056082] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.056134] kthread+0x318/0x620 [ 19.056180] ret_from_fork+0x10/0x20 [ 19.056230] [ 19.060230] Allocated by task 181: [ 19.060445] kasan_save_stack+0x3c/0x68 [ 19.060677] kasan_save_track+0x20/0x40 [ 19.061853] kasan_save_alloc_info+0x40/0x58 [ 19.062405] __kasan_kmalloc+0xd4/0xd8 [ 19.062806] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.063060] kmalloc_double_kzfree+0xb8/0x308 [ 19.063303] kunit_try_run_case+0x170/0x3f0 [ 19.063535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.064597] kthread+0x318/0x620 [ 19.065248] ret_from_fork+0x10/0x20 [ 19.066004] [ 19.066564] Freed by task 181: [ 19.067305] kasan_save_stack+0x3c/0x68 [ 19.067715] kasan_save_track+0x20/0x40 [ 19.067964] kasan_save_free_info+0x4c/0x78 [ 19.068185] __kasan_slab_free+0x6c/0x98 [ 19.068395] kfree+0x214/0x3c8 [ 19.068585] kfree_sensitive+0x80/0xb0 [ 19.068797] kmalloc_double_kzfree+0x11c/0x308 [ 19.069018] kunit_try_run_case+0x170/0x3f0 [ 19.069233] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.069493] kthread+0x318/0x620 [ 19.069690] ret_from_fork+0x10/0x20 [ 19.070468] [ 19.071059] The buggy address belongs to the object at fff00000c59b8560 [ 19.071059] which belongs to the cache kmalloc-16 of size 16 [ 19.073051] The buggy address is located 0 bytes inside of [ 19.073051] freed 16-byte region [fff00000c59b8560, fff00000c59b8570) [ 19.074401] [ 19.074815] The buggy address belongs to the physical page: [ 19.075126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059b8 [ 19.075684] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.076146] page_type: f5(slab) [ 19.077009] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.077716] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.078488] page dumped because: kasan: bad access detected [ 19.079179] [ 19.079427] Memory state around the buggy address: [ 19.079768] fff00000c59b8400: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 00 fc fc [ 19.080782] fff00000c59b8480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.081427] >fff00000c59b8500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.082339] ^ [ 19.083029] fff00000c59b8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.083910] fff00000c59b8600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.084611] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 19.003345] ================================================================== [ 19.003949] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 19.004785] Read of size 1 at addr fff00000c5a02e28 by task kunit_try_catch/177 [ 19.005419] [ 19.005760] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 19.006015] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.006139] Hardware name: linux,dummy-virt (DT) [ 19.006227] Call trace: [ 19.006282] show_stack+0x20/0x38 (C) [ 19.006404] dump_stack_lvl+0x8c/0xd0 [ 19.006462] print_report+0x118/0x608 [ 19.006587] kasan_report+0xdc/0x128 [ 19.006713] __asan_report_load1_noabort+0x20/0x30 [ 19.006822] kmalloc_uaf2+0x3f4/0x468 [ 19.006932] kunit_try_run_case+0x170/0x3f0 [ 19.007028] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.007122] kthread+0x318/0x620 [ 19.007173] ret_from_fork+0x10/0x20 [ 19.007227] [ 19.012229] Allocated by task 177: [ 19.012776] kasan_save_stack+0x3c/0x68 [ 19.013323] kasan_save_track+0x20/0x40 [ 19.013811] kasan_save_alloc_info+0x40/0x58 [ 19.014258] __kasan_kmalloc+0xd4/0xd8 [ 19.015082] __kmalloc_cache_noprof+0x15c/0x3c0 [ 19.015534] kmalloc_uaf2+0xc4/0x468 [ 19.016036] kunit_try_run_case+0x170/0x3f0 [ 19.016573] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.016969] kthread+0x318/0x620 [ 19.017411] ret_from_fork+0x10/0x20 [ 19.017860] [ 19.018161] Freed by task 177: [ 19.018581] kasan_save_stack+0x3c/0x68 [ 19.019391] kasan_save_track+0x20/0x40 [ 19.019660] kasan_save_free_info+0x4c/0x78 [ 19.020173] __kasan_slab_free+0x6c/0x98 [ 19.020659] kfree+0x214/0x3c8 [ 19.021098] kmalloc_uaf2+0x134/0x468 [ 19.021518] kunit_try_run_case+0x170/0x3f0 [ 19.022022] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.022482] kthread+0x318/0x620 [ 19.023150] ret_from_fork+0x10/0x20 [ 19.023348] [ 19.023453] The buggy address belongs to the object at fff00000c5a02e00 [ 19.023453] which belongs to the cache kmalloc-64 of size 64 [ 19.023805] The buggy address is located 40 bytes inside of [ 19.023805] freed 64-byte region [fff00000c5a02e00, fff00000c5a02e40) [ 19.024120] [ 19.024219] The buggy address belongs to the physical page: [ 19.024393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02 [ 19.024632] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.025180] page_type: f5(slab) [ 19.025620] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.026405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.027698] page dumped because: kasan: bad access detected [ 19.028312] [ 19.028544] Memory state around the buggy address: [ 19.028951] fff00000c5a02d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.029474] fff00000c5a02d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.030797] >fff00000c5a02e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.031336] ^ [ 19.032039] fff00000c5a02e80: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 19.032860] fff00000c5a02f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.033513] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 18.960378] ================================================================== [ 18.960973] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 18.961783] Write of size 33 at addr fff00000c5a02d00 by task kunit_try_catch/175 [ 18.962522] [ 18.962963] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 18.963215] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.963289] Hardware name: linux,dummy-virt (DT) [ 18.963390] Call trace: [ 18.963459] show_stack+0x20/0x38 (C) [ 18.963576] dump_stack_lvl+0x8c/0xd0 [ 18.963686] print_report+0x118/0x608 [ 18.963802] kasan_report+0xdc/0x128 [ 18.963902] kasan_check_range+0x100/0x1a8 [ 18.964018] __asan_memset+0x34/0x78 [ 18.964123] kmalloc_uaf_memset+0x170/0x310 [ 18.964225] kunit_try_run_case+0x170/0x3f0 [ 18.964344] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.964501] kthread+0x318/0x620 [ 18.964624] ret_from_fork+0x10/0x20 [ 18.964728] [ 18.969834] Allocated by task 175: [ 18.970384] kasan_save_stack+0x3c/0x68 [ 18.971012] kasan_save_track+0x20/0x40 [ 18.971455] kasan_save_alloc_info+0x40/0x58 [ 18.971965] __kasan_kmalloc+0xd4/0xd8 [ 18.972525] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.972773] kmalloc_uaf_memset+0xb8/0x310 [ 18.973326] kunit_try_run_case+0x170/0x3f0 [ 18.973877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.974193] kthread+0x318/0x620 [ 18.974530] ret_from_fork+0x10/0x20 [ 18.974977] [ 18.975307] Freed by task 175: [ 18.975763] kasan_save_stack+0x3c/0x68 [ 18.976227] kasan_save_track+0x20/0x40 [ 18.976682] kasan_save_free_info+0x4c/0x78 [ 18.977224] __kasan_slab_free+0x6c/0x98 [ 18.977680] kfree+0x214/0x3c8 [ 18.978027] kmalloc_uaf_memset+0x11c/0x310 [ 18.978649] kunit_try_run_case+0x170/0x3f0 [ 18.979132] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.979465] kthread+0x318/0x620 [ 18.979711] ret_from_fork+0x10/0x20 [ 18.980092] [ 18.980346] The buggy address belongs to the object at fff00000c5a02d00 [ 18.980346] which belongs to the cache kmalloc-64 of size 64 [ 18.981414] The buggy address is located 0 bytes inside of [ 18.981414] freed 64-byte region [fff00000c5a02d00, fff00000c5a02d40) [ 18.982617] [ 18.982927] The buggy address belongs to the physical page: [ 18.983325] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02 [ 18.984098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.984881] page_type: f5(slab) [ 18.985366] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.986022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.986703] page dumped because: kasan: bad access detected [ 18.987326] [ 18.987599] Memory state around the buggy address: [ 18.988130] fff00000c5a02c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.988606] fff00000c5a02c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.989335] >fff00000c5a02d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.989900] ^ [ 18.990353] fff00000c5a02d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.991110] fff00000c5a02e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.991890] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 18.919162] ================================================================== [ 18.920019] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 18.920683] Read of size 1 at addr fff00000c59b8548 by task kunit_try_catch/173 [ 18.921242] [ 18.921590] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 18.921861] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.921936] Hardware name: linux,dummy-virt (DT) [ 18.922026] Call trace: [ 18.922104] show_stack+0x20/0x38 (C) [ 18.922230] dump_stack_lvl+0x8c/0xd0 [ 18.922357] print_report+0x118/0x608 [ 18.922456] kasan_report+0xdc/0x128 [ 18.922614] __asan_report_load1_noabort+0x20/0x30 [ 18.922754] kmalloc_uaf+0x300/0x338 [ 18.922858] kunit_try_run_case+0x170/0x3f0 [ 18.922960] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.923074] kthread+0x318/0x620 [ 18.923166] ret_from_fork+0x10/0x20 [ 18.923277] [ 18.928053] Allocated by task 173: [ 18.928498] kasan_save_stack+0x3c/0x68 [ 18.929035] kasan_save_track+0x20/0x40 [ 18.929473] kasan_save_alloc_info+0x40/0x58 [ 18.929949] __kasan_kmalloc+0xd4/0xd8 [ 18.930430] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.931026] kmalloc_uaf+0xb8/0x338 [ 18.931328] kunit_try_run_case+0x170/0x3f0 [ 18.931624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.932300] kthread+0x318/0x620 [ 18.932793] ret_from_fork+0x10/0x20 [ 18.933285] [ 18.933538] Freed by task 173: [ 18.933962] kasan_save_stack+0x3c/0x68 [ 18.934443] kasan_save_track+0x20/0x40 [ 18.935010] kasan_save_free_info+0x4c/0x78 [ 18.935691] __kasan_slab_free+0x6c/0x98 [ 18.936208] kfree+0x214/0x3c8 [ 18.936686] kmalloc_uaf+0x11c/0x338 [ 18.937133] kunit_try_run_case+0x170/0x3f0 [ 18.937629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.938277] kthread+0x318/0x620 [ 18.938948] ret_from_fork+0x10/0x20 [ 18.939392] [ 18.939757] The buggy address belongs to the object at fff00000c59b8540 [ 18.939757] which belongs to the cache kmalloc-16 of size 16 [ 18.940638] The buggy address is located 8 bytes inside of [ 18.940638] freed 16-byte region [fff00000c59b8540, fff00000c59b8550) [ 18.941456] [ 18.941809] The buggy address belongs to the physical page: [ 18.942521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059b8 [ 18.943290] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.944126] page_type: f5(slab) [ 18.944646] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.945188] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.946048] page dumped because: kasan: bad access detected [ 18.946547] [ 18.946712] Memory state around the buggy address: [ 18.947269] fff00000c59b8400: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 00 fc fc [ 18.947798] fff00000c59b8480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.948294] >fff00000c59b8500: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 18.948850] ^ [ 18.949338] fff00000c59b8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.949875] fff00000c59b8600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.950409] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 18.881487] ================================================================== [ 18.882446] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e8 [ 18.883843] Read of size 64 at addr fff00000c5a02c04 by task kunit_try_catch/171 [ 18.884399] [ 18.884650] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 18.884823] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.884857] Hardware name: linux,dummy-virt (DT) [ 18.884896] Call trace: [ 18.884927] show_stack+0x20/0x38 (C) [ 18.885008] dump_stack_lvl+0x8c/0xd0 [ 18.885062] print_report+0x118/0x608 [ 18.885110] kasan_report+0xdc/0x128 [ 18.885157] kasan_check_range+0x100/0x1a8 [ 18.885206] __asan_memmove+0x3c/0x98 [ 18.885251] kmalloc_memmove_invalid_size+0x154/0x2e8 [ 18.885302] kunit_try_run_case+0x170/0x3f0 [ 18.885350] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.885402] kthread+0x318/0x620 [ 18.885448] ret_from_fork+0x10/0x20 [ 18.885499] [ 18.891680] Allocated by task 171: [ 18.892110] kasan_save_stack+0x3c/0x68 [ 18.893212] kasan_save_track+0x20/0x40 [ 18.893678] kasan_save_alloc_info+0x40/0x58 [ 18.894035] __kasan_kmalloc+0xd4/0xd8 [ 18.895000] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.895500] kmalloc_memmove_invalid_size+0xb0/0x2e8 [ 18.896205] kunit_try_run_case+0x170/0x3f0 [ 18.896778] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.897426] kthread+0x318/0x620 [ 18.897945] ret_from_fork+0x10/0x20 [ 18.898504] [ 18.899220] The buggy address belongs to the object at fff00000c5a02c00 [ 18.899220] which belongs to the cache kmalloc-64 of size 64 [ 18.899963] The buggy address is located 4 bytes inside of [ 18.899963] allocated 64-byte region [fff00000c5a02c00, fff00000c5a02c40) [ 18.901643] [ 18.901831] The buggy address belongs to the physical page: [ 18.902196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02 [ 18.903261] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.903881] page_type: f5(slab) [ 18.904368] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.904932] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.905585] page dumped because: kasan: bad access detected [ 18.906091] [ 18.906378] Memory state around the buggy address: [ 18.906900] fff00000c5a02b00: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 18.907463] fff00000c5a02b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.907996] >fff00000c5a02c00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 18.908584] ^ [ 18.909199] fff00000c5a02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.909708] fff00000c5a02d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.910426] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 18.842342] ================================================================== [ 18.843188] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 18.843658] Read of size 18446744073709551614 at addr fff00000c1eecc04 by task kunit_try_catch/169 [ 18.844315] [ 18.844663] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 18.844887] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.844943] Hardware name: linux,dummy-virt (DT) [ 18.845017] Call trace: [ 18.845072] show_stack+0x20/0x38 (C) [ 18.845199] dump_stack_lvl+0x8c/0xd0 [ 18.845312] print_report+0x118/0x608 [ 18.845412] kasan_report+0xdc/0x128 [ 18.845516] kasan_check_range+0x100/0x1a8 [ 18.845664] __asan_memmove+0x3c/0x98 [ 18.845771] kmalloc_memmove_negative_size+0x154/0x2e0 [ 18.845896] kunit_try_run_case+0x170/0x3f0 [ 18.846014] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.846089] kthread+0x318/0x620 [ 18.846144] ret_from_fork+0x10/0x20 [ 18.846201] [ 18.852334] Allocated by task 169: [ 18.852922] kasan_save_stack+0x3c/0x68 [ 18.853482] kasan_save_track+0x20/0x40 [ 18.854041] kasan_save_alloc_info+0x40/0x58 [ 18.854783] __kasan_kmalloc+0xd4/0xd8 [ 18.855383] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.855909] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 18.856467] kunit_try_run_case+0x170/0x3f0 [ 18.856987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.857651] kthread+0x318/0x620 [ 18.858145] ret_from_fork+0x10/0x20 [ 18.858667] [ 18.858902] The buggy address belongs to the object at fff00000c1eecc00 [ 18.858902] which belongs to the cache kmalloc-64 of size 64 [ 18.859706] The buggy address is located 4 bytes inside of [ 18.859706] 64-byte region [fff00000c1eecc00, fff00000c1eecc40) [ 18.860385] [ 18.860578] The buggy address belongs to the physical page: [ 18.861509] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101eec [ 18.862448] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.862996] page_type: f5(slab) [ 18.863325] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 18.863908] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.864415] page dumped because: kasan: bad access detected [ 18.864905] [ 18.865171] Memory state around the buggy address: [ 18.865753] fff00000c1eecb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.866555] fff00000c1eecb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.867263] >fff00000c1eecc00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 18.867958] ^ [ 18.868696] fff00000c1eecc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.869307] fff00000c1eecd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.869958] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 18.808665] ================================================================== [ 18.809289] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 18.809626] Write of size 16 at addr fff00000c59c2969 by task kunit_try_catch/167 [ 18.810128] [ 18.810325] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 18.810422] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.810452] Hardware name: linux,dummy-virt (DT) [ 18.812163] Call trace: [ 18.812214] show_stack+0x20/0x38 (C) [ 18.812284] dump_stack_lvl+0x8c/0xd0 [ 18.812335] print_report+0x118/0x608 [ 18.812383] kasan_report+0xdc/0x128 [ 18.812429] kasan_check_range+0x100/0x1a8 [ 18.812478] __asan_memset+0x34/0x78 [ 18.812525] kmalloc_oob_memset_16+0x150/0x2f8 [ 18.812571] kunit_try_run_case+0x170/0x3f0 [ 18.812619] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.812669] kthread+0x318/0x620 [ 18.812715] ret_from_fork+0x10/0x20 [ 18.812793] [ 18.817250] Allocated by task 167: [ 18.817465] kasan_save_stack+0x3c/0x68 [ 18.817704] kasan_save_track+0x20/0x40 [ 18.818016] kasan_save_alloc_info+0x40/0x58 [ 18.819048] __kasan_kmalloc+0xd4/0xd8 [ 18.819528] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.819898] kmalloc_oob_memset_16+0xb0/0x2f8 [ 18.820244] kunit_try_run_case+0x170/0x3f0 [ 18.820556] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.820954] kthread+0x318/0x620 [ 18.821224] ret_from_fork+0x10/0x20 [ 18.821656] [ 18.821955] The buggy address belongs to the object at fff00000c59c2900 [ 18.821955] which belongs to the cache kmalloc-128 of size 128 [ 18.823973] The buggy address is located 105 bytes inside of [ 18.823973] allocated 120-byte region [fff00000c59c2900, fff00000c59c2978) [ 18.825109] [ 18.825317] The buggy address belongs to the physical page: [ 18.825592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c2 [ 18.826457] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.827094] page_type: f5(slab) [ 18.827793] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.828624] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.829318] page dumped because: kasan: bad access detected [ 18.829719] [ 18.829937] Memory state around the buggy address: [ 18.830350] fff00000c59c2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.831213] fff00000c59c2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.831591] >fff00000c59c2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.831984] ^ [ 18.832845] fff00000c59c2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.833384] fff00000c59c2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.834074] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 18.770491] ================================================================== [ 18.771321] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 18.771796] Write of size 8 at addr fff00000c59c2871 by task kunit_try_catch/165 [ 18.772499] [ 18.772840] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 18.773015] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.773081] Hardware name: linux,dummy-virt (DT) [ 18.773157] Call trace: [ 18.773212] show_stack+0x20/0x38 (C) [ 18.773359] dump_stack_lvl+0x8c/0xd0 [ 18.773449] print_report+0x118/0x608 [ 18.773552] kasan_report+0xdc/0x128 [ 18.773662] kasan_check_range+0x100/0x1a8 [ 18.773783] __asan_memset+0x34/0x78 [ 18.773896] kmalloc_oob_memset_8+0x150/0x2f8 [ 18.773982] kunit_try_run_case+0x170/0x3f0 [ 18.774042] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.774146] kthread+0x318/0x620 [ 18.774200] ret_from_fork+0x10/0x20 [ 18.774257] [ 18.781296] Allocated by task 165: [ 18.781703] kasan_save_stack+0x3c/0x68 [ 18.782143] kasan_save_track+0x20/0x40 [ 18.782515] kasan_save_alloc_info+0x40/0x58 [ 18.783758] __kasan_kmalloc+0xd4/0xd8 [ 18.784205] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.784806] kmalloc_oob_memset_8+0xb0/0x2f8 [ 18.785256] kunit_try_run_case+0x170/0x3f0 [ 18.785790] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.786386] kthread+0x318/0x620 [ 18.786876] ret_from_fork+0x10/0x20 [ 18.787317] [ 18.787561] The buggy address belongs to the object at fff00000c59c2800 [ 18.787561] which belongs to the cache kmalloc-128 of size 128 [ 18.788233] The buggy address is located 113 bytes inside of [ 18.788233] allocated 120-byte region [fff00000c59c2800, fff00000c59c2878) [ 18.789652] [ 18.789970] The buggy address belongs to the physical page: [ 18.790422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c2 [ 18.791999] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.792548] page_type: f5(slab) [ 18.792963] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.793618] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.794256] page dumped because: kasan: bad access detected [ 18.795156] [ 18.795391] Memory state around the buggy address: [ 18.795789] fff00000c59c2700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.796312] fff00000c59c2780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.796985] >fff00000c59c2800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.797532] ^ [ 18.798189] fff00000c59c2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.798926] fff00000c59c2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.799761] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 18.735932] ================================================================== [ 18.736647] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 18.737669] Write of size 4 at addr fff00000c5a05275 by task kunit_try_catch/163 [ 18.738176] [ 18.738828] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 18.739041] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.739133] Hardware name: linux,dummy-virt (DT) [ 18.739215] Call trace: [ 18.739275] show_stack+0x20/0x38 (C) [ 18.739372] dump_stack_lvl+0x8c/0xd0 [ 18.739428] print_report+0x118/0x608 [ 18.739480] kasan_report+0xdc/0x128 [ 18.739530] kasan_check_range+0x100/0x1a8 [ 18.739582] __asan_memset+0x34/0x78 [ 18.739630] kmalloc_oob_memset_4+0x150/0x300 [ 18.739680] kunit_try_run_case+0x170/0x3f0 [ 18.739733] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.739809] kthread+0x318/0x620 [ 18.739859] ret_from_fork+0x10/0x20 [ 18.739915] [ 18.744553] Allocated by task 163: [ 18.745031] kasan_save_stack+0x3c/0x68 [ 18.745553] kasan_save_track+0x20/0x40 [ 18.746025] kasan_save_alloc_info+0x40/0x58 [ 18.746450] __kasan_kmalloc+0xd4/0xd8 [ 18.746977] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.747405] kmalloc_oob_memset_4+0xb0/0x300 [ 18.747957] kunit_try_run_case+0x170/0x3f0 [ 18.748410] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.749007] kthread+0x318/0x620 [ 18.749366] ret_from_fork+0x10/0x20 [ 18.749712] [ 18.749961] The buggy address belongs to the object at fff00000c5a05200 [ 18.749961] which belongs to the cache kmalloc-128 of size 128 [ 18.751337] The buggy address is located 117 bytes inside of [ 18.751337] allocated 120-byte region [fff00000c5a05200, fff00000c5a05278) [ 18.752255] [ 18.752572] The buggy address belongs to the physical page: [ 18.753128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a05 [ 18.753786] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.754405] page_type: f5(slab) [ 18.754771] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.755449] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.756069] page dumped because: kasan: bad access detected [ 18.756530] [ 18.756794] Memory state around the buggy address: [ 18.757286] fff00000c5a05100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.757889] fff00000c5a05180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.758498] >fff00000c5a05200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.759088] ^ [ 18.759661] fff00000c5a05280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.760249] fff00000c5a05300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.760812] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 18.697634] ================================================================== [ 18.698363] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 18.699474] Write of size 2 at addr fff00000c59c2777 by task kunit_try_catch/161 [ 18.700508] [ 18.700885] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 18.701040] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.701108] Hardware name: linux,dummy-virt (DT) [ 18.701347] Call trace: [ 18.701384] show_stack+0x20/0x38 (C) [ 18.701454] dump_stack_lvl+0x8c/0xd0 [ 18.701510] print_report+0x118/0x608 [ 18.701562] kasan_report+0xdc/0x128 [ 18.701611] kasan_check_range+0x100/0x1a8 [ 18.701663] __asan_memset+0x34/0x78 [ 18.701710] kmalloc_oob_memset_2+0x150/0x2f8 [ 18.701786] kunit_try_run_case+0x170/0x3f0 [ 18.701844] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.701900] kthread+0x318/0x620 [ 18.701949] ret_from_fork+0x10/0x20 [ 18.702004] [ 18.707775] Allocated by task 161: [ 18.708305] kasan_save_stack+0x3c/0x68 [ 18.708796] kasan_save_track+0x20/0x40 [ 18.709233] kasan_save_alloc_info+0x40/0x58 [ 18.709703] __kasan_kmalloc+0xd4/0xd8 [ 18.710152] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.710924] kmalloc_oob_memset_2+0xb0/0x2f8 [ 18.711325] kunit_try_run_case+0x170/0x3f0 [ 18.711860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.712458] kthread+0x318/0x620 [ 18.712915] ret_from_fork+0x10/0x20 [ 18.713371] [ 18.713671] The buggy address belongs to the object at fff00000c59c2700 [ 18.713671] which belongs to the cache kmalloc-128 of size 128 [ 18.714902] The buggy address is located 119 bytes inside of [ 18.714902] allocated 120-byte region [fff00000c59c2700, fff00000c59c2778) [ 18.716234] [ 18.716438] The buggy address belongs to the physical page: [ 18.716629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c2 [ 18.716906] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.717130] page_type: f5(slab) [ 18.717284] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.717518] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.717770] page dumped because: kasan: bad access detected [ 18.718371] [ 18.718647] Memory state around the buggy address: [ 18.720213] fff00000c59c2600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.721168] fff00000c59c2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.721830] >fff00000c59c2700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.722352] ^ [ 18.723252] fff00000c59c2780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.723912] fff00000c59c2800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.724634] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 18.658079] ================================================================== [ 18.658688] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 18.659516] Write of size 128 at addr fff00000c5a05100 by task kunit_try_catch/159 [ 18.660361] [ 18.661083] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 18.661629] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.661667] Hardware name: linux,dummy-virt (DT) [ 18.661704] Call trace: [ 18.661733] show_stack+0x20/0x38 (C) [ 18.661824] dump_stack_lvl+0x8c/0xd0 [ 18.661878] print_report+0x118/0x608 [ 18.661929] kasan_report+0xdc/0x128 [ 18.661978] kasan_check_range+0x100/0x1a8 [ 18.662029] __asan_memset+0x34/0x78 [ 18.662086] kmalloc_oob_in_memset+0x144/0x2d0 [ 18.662139] kunit_try_run_case+0x170/0x3f0 [ 18.662191] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.662246] kthread+0x318/0x620 [ 18.662294] ret_from_fork+0x10/0x20 [ 18.662347] [ 18.667945] Allocated by task 159: [ 18.668239] kasan_save_stack+0x3c/0x68 [ 18.668605] kasan_save_track+0x20/0x40 [ 18.670069] kasan_save_alloc_info+0x40/0x58 [ 18.670533] __kasan_kmalloc+0xd4/0xd8 [ 18.671326] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.671789] kmalloc_oob_in_memset+0xb0/0x2d0 [ 18.672320] kunit_try_run_case+0x170/0x3f0 [ 18.672790] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.673408] kthread+0x318/0x620 [ 18.673761] ret_from_fork+0x10/0x20 [ 18.674236] [ 18.674504] The buggy address belongs to the object at fff00000c5a05100 [ 18.674504] which belongs to the cache kmalloc-128 of size 128 [ 18.676130] The buggy address is located 0 bytes inside of [ 18.676130] allocated 120-byte region [fff00000c5a05100, fff00000c5a05178) [ 18.677192] [ 18.677441] The buggy address belongs to the physical page: [ 18.678003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a05 [ 18.678706] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.679500] page_type: f5(slab) [ 18.679786] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.680686] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.681315] page dumped because: kasan: bad access detected [ 18.681876] [ 18.682128] Memory state around the buggy address: [ 18.683439] fff00000c5a05000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.684088] fff00000c5a05080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.684720] >fff00000c5a05100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.685351] ^ [ 18.685961] fff00000c5a05180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.686573] fff00000c5a05200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.687170] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 18.618327] ================================================================== [ 18.619445] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 18.619802] Read of size 16 at addr fff00000c1e7a0c0 by task kunit_try_catch/157 [ 18.620873] [ 18.621149] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 18.621553] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.621595] Hardware name: linux,dummy-virt (DT) [ 18.621635] Call trace: [ 18.621662] show_stack+0x20/0x38 (C) [ 18.621731] dump_stack_lvl+0x8c/0xd0 [ 18.621813] print_report+0x118/0x608 [ 18.621866] kasan_report+0xdc/0x128 [ 18.621917] __asan_report_load16_noabort+0x20/0x30 [ 18.621969] kmalloc_uaf_16+0x3bc/0x438 [ 18.622018] kunit_try_run_case+0x170/0x3f0 [ 18.622086] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.622146] kthread+0x318/0x620 [ 18.622197] ret_from_fork+0x10/0x20 [ 18.622253] [ 18.627309] Allocated by task 157: [ 18.627765] kasan_save_stack+0x3c/0x68 [ 18.628284] kasan_save_track+0x20/0x40 [ 18.628781] kasan_save_alloc_info+0x40/0x58 [ 18.629251] __kasan_kmalloc+0xd4/0xd8 [ 18.629721] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.630282] kmalloc_uaf_16+0x140/0x438 [ 18.630850] kunit_try_run_case+0x170/0x3f0 [ 18.631326] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.632008] kthread+0x318/0x620 [ 18.632394] ret_from_fork+0x10/0x20 [ 18.632875] [ 18.633212] Freed by task 157: [ 18.633609] kasan_save_stack+0x3c/0x68 [ 18.634138] kasan_save_track+0x20/0x40 [ 18.634663] kasan_save_free_info+0x4c/0x78 [ 18.635080] __kasan_slab_free+0x6c/0x98 [ 18.635420] kfree+0x214/0x3c8 [ 18.635707] kmalloc_uaf_16+0x190/0x438 [ 18.636247] kunit_try_run_case+0x170/0x3f0 [ 18.636664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.637173] kthread+0x318/0x620 [ 18.637564] ret_from_fork+0x10/0x20 [ 18.638104] [ 18.638458] The buggy address belongs to the object at fff00000c1e7a0c0 [ 18.638458] which belongs to the cache kmalloc-16 of size 16 [ 18.639175] The buggy address is located 0 bytes inside of [ 18.639175] freed 16-byte region [fff00000c1e7a0c0, fff00000c1e7a0d0) [ 18.640305] [ 18.640597] The buggy address belongs to the physical page: [ 18.641196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e7a [ 18.641951] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.642622] page_type: f5(slab) [ 18.642951] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.643752] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.644473] page dumped because: kasan: bad access detected [ 18.644988] [ 18.645257] Memory state around the buggy address: [ 18.645826] fff00000c1e79f80: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.646571] fff00000c1e7a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.646987] >fff00000c1e7a080: 00 04 fc fc 00 00 fc fc fa fb fc fc fc fc fc fc [ 18.647477] ^ [ 18.648221] fff00000c1e7a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.648815] fff00000c1e7a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.649592] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 18.583704] ================================================================== [ 18.584416] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 18.585158] Write of size 16 at addr fff00000c59b8500 by task kunit_try_catch/155 [ 18.585871] [ 18.586210] CPU: 1 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 18.586432] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.586497] Hardware name: linux,dummy-virt (DT) [ 18.586569] Call trace: [ 18.586623] show_stack+0x20/0x38 (C) [ 18.586808] dump_stack_lvl+0x8c/0xd0 [ 18.586915] print_report+0x118/0x608 [ 18.587027] kasan_report+0xdc/0x128 [ 18.587129] __asan_report_store16_noabort+0x20/0x30 [ 18.587218] kmalloc_oob_16+0x3a0/0x3f8 [ 18.587305] kunit_try_run_case+0x170/0x3f0 [ 18.587393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.587458] kthread+0x318/0x620 [ 18.587509] ret_from_fork+0x10/0x20 [ 18.587564] [ 18.592320] Allocated by task 155: [ 18.592717] kasan_save_stack+0x3c/0x68 [ 18.593270] kasan_save_track+0x20/0x40 [ 18.593751] kasan_save_alloc_info+0x40/0x58 [ 18.594260] __kasan_kmalloc+0xd4/0xd8 [ 18.594791] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.595265] kmalloc_oob_16+0xb4/0x3f8 [ 18.595590] kunit_try_run_case+0x170/0x3f0 [ 18.596042] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.596599] kthread+0x318/0x620 [ 18.596909] ret_from_fork+0x10/0x20 [ 18.597389] [ 18.597707] The buggy address belongs to the object at fff00000c59b8500 [ 18.597707] which belongs to the cache kmalloc-16 of size 16 [ 18.599224] The buggy address is located 0 bytes inside of [ 18.599224] allocated 13-byte region [fff00000c59b8500, fff00000c59b850d) [ 18.600207] [ 18.600498] The buggy address belongs to the physical page: [ 18.601050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059b8 [ 18.601774] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.602437] page_type: f5(slab) [ 18.602957] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 18.603836] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.604504] page dumped because: kasan: bad access detected [ 18.605016] [ 18.605258] Memory state around the buggy address: [ 18.605688] fff00000c59b8400: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 00 fc fc [ 18.606223] fff00000c59b8480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.607800] >fff00000c59b8500: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc [ 18.608430] ^ [ 18.608832] fff00000c59b8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.609446] fff00000c59b8600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.610073] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 18.537659] ================================================================== [ 18.538288] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 18.538981] Read of size 1 at addr fff00000c49e1200 by task kunit_try_catch/153 [ 18.539716] [ 18.540063] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 18.540310] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.540378] Hardware name: linux,dummy-virt (DT) [ 18.540438] Call trace: [ 18.540485] show_stack+0x20/0x38 (C) [ 18.540587] dump_stack_lvl+0x8c/0xd0 [ 18.540667] print_report+0x118/0x608 [ 18.540770] kasan_report+0xdc/0x128 [ 18.540854] __asan_report_load1_noabort+0x20/0x30 [ 18.540955] krealloc_uaf+0x4c8/0x520 [ 18.541045] kunit_try_run_case+0x170/0x3f0 [ 18.541127] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.541221] kthread+0x318/0x620 [ 18.541303] ret_from_fork+0x10/0x20 [ 18.541395] [ 18.547228] Allocated by task 153: [ 18.547675] kasan_save_stack+0x3c/0x68 [ 18.548279] kasan_save_track+0x20/0x40 [ 18.548795] kasan_save_alloc_info+0x40/0x58 [ 18.549273] __kasan_kmalloc+0xd4/0xd8 [ 18.549761] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.550321] krealloc_uaf+0xc8/0x520 [ 18.550943] kunit_try_run_case+0x170/0x3f0 [ 18.551478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.552114] kthread+0x318/0x620 [ 18.552529] ret_from_fork+0x10/0x20 [ 18.553034] [ 18.553307] Freed by task 153: [ 18.553687] kasan_save_stack+0x3c/0x68 [ 18.554201] kasan_save_track+0x20/0x40 [ 18.554899] kasan_save_free_info+0x4c/0x78 [ 18.555395] __kasan_slab_free+0x6c/0x98 [ 18.555837] kfree+0x214/0x3c8 [ 18.556195] krealloc_uaf+0x12c/0x520 [ 18.556631] kunit_try_run_case+0x170/0x3f0 [ 18.557096] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.557659] kthread+0x318/0x620 [ 18.558076] ret_from_fork+0x10/0x20 [ 18.558707] [ 18.558961] The buggy address belongs to the object at fff00000c49e1200 [ 18.558961] which belongs to the cache kmalloc-256 of size 256 [ 18.560677] The buggy address is located 0 bytes inside of [ 18.560677] freed 256-byte region [fff00000c49e1200, fff00000c49e1300) [ 18.561657] [ 18.561907] The buggy address belongs to the physical page: [ 18.562501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049e0 [ 18.563148] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.563727] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.564564] page_type: f5(slab) [ 18.564992] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.565684] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.566406] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.567237] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.567854] head: 0bfffe0000000001 ffffc1ffc3127801 ffffffffffffffff 0000000000000000 [ 18.568487] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 18.569113] page dumped because: kasan: bad access detected [ 18.569554] [ 18.569853] Memory state around the buggy address: [ 18.570296] fff00000c49e1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.571188] fff00000c49e1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.571863] >fff00000c49e1200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.572437] ^ [ 18.572734] fff00000c49e1280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.573357] fff00000c49e1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.573956] ================================================================== [ 18.497371] ================================================================== [ 18.498162] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 18.499491] Read of size 1 at addr fff00000c49e1200 by task kunit_try_catch/153 [ 18.500480] [ 18.500715] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 18.500923] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.500983] Hardware name: linux,dummy-virt (DT) [ 18.501052] Call trace: [ 18.501104] show_stack+0x20/0x38 (C) [ 18.501222] dump_stack_lvl+0x8c/0xd0 [ 18.501325] print_report+0x118/0x608 [ 18.501419] kasan_report+0xdc/0x128 [ 18.501514] __kasan_check_byte+0x54/0x70 [ 18.501607] krealloc_noprof+0x44/0x360 [ 18.501666] krealloc_uaf+0x180/0x520 [ 18.501727] kunit_try_run_case+0x170/0x3f0 [ 18.502147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.502207] kthread+0x318/0x620 [ 18.502258] ret_from_fork+0x10/0x20 [ 18.502314] [ 18.507393] Allocated by task 153: [ 18.507996] kasan_save_stack+0x3c/0x68 [ 18.508656] kasan_save_track+0x20/0x40 [ 18.509179] kasan_save_alloc_info+0x40/0x58 [ 18.509773] __kasan_kmalloc+0xd4/0xd8 [ 18.510295] __kmalloc_cache_noprof+0x15c/0x3c0 [ 18.511103] krealloc_uaf+0xc8/0x520 [ 18.511621] kunit_try_run_case+0x170/0x3f0 [ 18.512178] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.512713] kthread+0x318/0x620 [ 18.513141] ret_from_fork+0x10/0x20 [ 18.513628] [ 18.513921] Freed by task 153: [ 18.514342] kasan_save_stack+0x3c/0x68 [ 18.515049] kasan_save_track+0x20/0x40 [ 18.515404] kasan_save_free_info+0x4c/0x78 [ 18.515899] __kasan_slab_free+0x6c/0x98 [ 18.516394] kfree+0x214/0x3c8 [ 18.516791] krealloc_uaf+0x12c/0x520 [ 18.517024] kunit_try_run_case+0x170/0x3f0 [ 18.517580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.518151] kthread+0x318/0x620 [ 18.519773] ret_from_fork+0x10/0x20 [ 18.520050] [ 18.520385] The buggy address belongs to the object at fff00000c49e1200 [ 18.520385] which belongs to the cache kmalloc-256 of size 256 [ 18.521554] The buggy address is located 0 bytes inside of [ 18.521554] freed 256-byte region [fff00000c49e1200, fff00000c49e1300) [ 18.522803] [ 18.523130] The buggy address belongs to the physical page: [ 18.523868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049e0 [ 18.524595] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.525288] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.525964] page_type: f5(slab) [ 18.526405] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.527042] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.527861] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.528491] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.529145] head: 0bfffe0000000001 ffffc1ffc3127801 ffffffffffffffff 0000000000000000 [ 18.529864] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 18.530825] page dumped because: kasan: bad access detected [ 18.531272] [ 18.531542] Memory state around the buggy address: [ 18.532038] fff00000c49e1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.532502] fff00000c49e1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.533242] >fff00000c49e1200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.533786] ^ [ 18.534237] fff00000c49e1280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.535035] fff00000c49e1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.535551] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 18.402799] ================================================================== [ 18.404419] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 18.404996] Write of size 1 at addr fff00000c609a0d0 by task kunit_try_catch/151 [ 18.405559] [ 18.405832] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 18.406013] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.406085] Hardware name: linux,dummy-virt (DT) [ 18.406161] Call trace: [ 18.406218] show_stack+0x20/0x38 (C) [ 18.406344] dump_stack_lvl+0x8c/0xd0 [ 18.406457] print_report+0x118/0x608 [ 18.406841] kasan_report+0xdc/0x128 [ 18.406920] __asan_report_store1_noabort+0x20/0x30 [ 18.406974] krealloc_less_oob_helper+0xb9c/0xc50 [ 18.407028] krealloc_large_less_oob+0x20/0x38 [ 18.407080] kunit_try_run_case+0x170/0x3f0 [ 18.407132] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.407186] kthread+0x318/0x620 [ 18.407235] ret_from_fork+0x10/0x20 [ 18.407288] [ 18.411720] The buggy address belongs to the physical page: [ 18.412273] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106098 [ 18.412861] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.413448] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.414132] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.414624] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.415349] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.415913] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.416502] head: 0bfffe0000000002 ffffc1ffc3182601 ffffffffffffffff 0000000000000000 [ 18.417303] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 18.417810] page dumped because: kasan: bad access detected [ 18.418285] [ 18.418786] Memory state around the buggy address: [ 18.419300] fff00000c6099f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.419813] fff00000c609a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.420371] >fff00000c609a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 18.420991] ^ [ 18.421449] fff00000c609a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.422010] fff00000c609a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.423520] ================================================================== [ 18.200538] ================================================================== [ 18.201472] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 18.202185] Write of size 1 at addr fff00000c49e10d0 by task kunit_try_catch/147 [ 18.203225] [ 18.203730] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 18.203925] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.203980] Hardware name: linux,dummy-virt (DT) [ 18.204045] Call trace: [ 18.204089] show_stack+0x20/0x38 (C) [ 18.204434] dump_stack_lvl+0x8c/0xd0 [ 18.204800] print_report+0x118/0x608 [ 18.204891] kasan_report+0xdc/0x128 [ 18.204941] __asan_report_store1_noabort+0x20/0x30 [ 18.204991] krealloc_less_oob_helper+0xb9c/0xc50 [ 18.205042] krealloc_less_oob+0x20/0x38 [ 18.205088] kunit_try_run_case+0x170/0x3f0 [ 18.205138] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.205189] kthread+0x318/0x620 [ 18.205236] ret_from_fork+0x10/0x20 [ 18.205286] [ 18.209870] Allocated by task 147: [ 18.210330] kasan_save_stack+0x3c/0x68 [ 18.210944] kasan_save_track+0x20/0x40 [ 18.211299] kasan_save_alloc_info+0x40/0x58 [ 18.211655] __kasan_krealloc+0x118/0x178 [ 18.212145] krealloc_noprof+0x128/0x360 [ 18.212657] krealloc_less_oob_helper+0x168/0xc50 [ 18.213217] krealloc_less_oob+0x20/0x38 [ 18.213708] kunit_try_run_case+0x170/0x3f0 [ 18.214182] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.214853] kthread+0x318/0x620 [ 18.215183] ret_from_fork+0x10/0x20 [ 18.215683] [ 18.215988] The buggy address belongs to the object at fff00000c49e1000 [ 18.215988] which belongs to the cache kmalloc-256 of size 256 [ 18.216888] The buggy address is located 7 bytes to the right of [ 18.216888] allocated 201-byte region [fff00000c49e1000, fff00000c49e10c9) [ 18.217861] [ 18.218155] The buggy address belongs to the physical page: [ 18.218635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049e0 [ 18.219341] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.219914] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.220386] page_type: f5(slab) [ 18.220861] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.221588] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.222242] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.222961] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.223663] head: 0bfffe0000000001 ffffc1ffc3127801 ffffffffffffffff 0000000000000000 [ 18.224344] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 18.224905] page dumped because: kasan: bad access detected [ 18.225303] [ 18.225564] Memory state around the buggy address: [ 18.225994] fff00000c49e0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.226722] fff00000c49e1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.227454] >fff00000c49e1080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 18.228034] ^ [ 18.228449] fff00000c49e1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.229147] fff00000c49e1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.229631] ================================================================== [ 18.171003] ================================================================== [ 18.172017] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 18.172628] Write of size 1 at addr fff00000c49e10c9 by task kunit_try_catch/147 [ 18.173366] [ 18.173692] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 18.173932] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.174001] Hardware name: linux,dummy-virt (DT) [ 18.174085] Call trace: [ 18.174157] show_stack+0x20/0x38 (C) [ 18.174301] dump_stack_lvl+0x8c/0xd0 [ 18.174417] print_report+0x118/0x608 [ 18.174530] kasan_report+0xdc/0x128 [ 18.174787] __asan_report_store1_noabort+0x20/0x30 [ 18.174939] krealloc_less_oob_helper+0xa48/0xc50 [ 18.175048] krealloc_less_oob+0x20/0x38 [ 18.175122] kunit_try_run_case+0x170/0x3f0 [ 18.175178] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.175234] kthread+0x318/0x620 [ 18.175284] ret_from_fork+0x10/0x20 [ 18.175339] [ 18.180775] Allocated by task 147: [ 18.181230] kasan_save_stack+0x3c/0x68 [ 18.181592] kasan_save_track+0x20/0x40 [ 18.182110] kasan_save_alloc_info+0x40/0x58 [ 18.182808] __kasan_krealloc+0x118/0x178 [ 18.183410] krealloc_noprof+0x128/0x360 [ 18.183879] krealloc_less_oob_helper+0x168/0xc50 [ 18.184313] krealloc_less_oob+0x20/0x38 [ 18.184774] kunit_try_run_case+0x170/0x3f0 [ 18.185208] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.185719] kthread+0x318/0x620 [ 18.186119] ret_from_fork+0x10/0x20 [ 18.186460] [ 18.186887] The buggy address belongs to the object at fff00000c49e1000 [ 18.186887] which belongs to the cache kmalloc-256 of size 256 [ 18.187713] The buggy address is located 0 bytes to the right of [ 18.187713] allocated 201-byte region [fff00000c49e1000, fff00000c49e10c9) [ 18.188650] [ 18.188958] The buggy address belongs to the physical page: [ 18.189479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049e0 [ 18.189786] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.190011] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.190263] page_type: f5(slab) [ 18.190414] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.192276] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.192637] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.192897] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.193124] head: 0bfffe0000000001 ffffc1ffc3127801 ffffffffffffffff 0000000000000000 [ 18.193347] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 18.193560] page dumped because: kasan: bad access detected [ 18.193731] [ 18.194914] Memory state around the buggy address: [ 18.195776] fff00000c49e0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.196309] fff00000c49e1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.196795] >fff00000c49e1080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 18.197271] ^ [ 18.197647] fff00000c49e1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.198528] fff00000c49e1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.199171] ================================================================== [ 18.424275] ================================================================== [ 18.424873] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 18.425635] Write of size 1 at addr fff00000c609a0da by task kunit_try_catch/151 [ 18.426297] [ 18.426617] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 18.426827] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.426890] Hardware name: linux,dummy-virt (DT) [ 18.426962] Call trace: [ 18.427015] show_stack+0x20/0x38 (C) [ 18.427135] dump_stack_lvl+0x8c/0xd0 [ 18.427250] print_report+0x118/0x608 [ 18.427354] kasan_report+0xdc/0x128 [ 18.427464] __asan_report_store1_noabort+0x20/0x30 [ 18.427577] krealloc_less_oob_helper+0xa80/0xc50 [ 18.427685] krealloc_large_less_oob+0x20/0x38 [ 18.427814] kunit_try_run_case+0x170/0x3f0 [ 18.427923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.428041] kthread+0x318/0x620 [ 18.428126] ret_from_fork+0x10/0x20 [ 18.428186] [ 18.433311] The buggy address belongs to the physical page: [ 18.433883] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106098 [ 18.434568] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.435060] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.436050] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.436647] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.437183] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.437841] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.438304] head: 0bfffe0000000002 ffffc1ffc3182601 ffffffffffffffff 0000000000000000 [ 18.439241] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 18.439841] page dumped because: kasan: bad access detected [ 18.440227] [ 18.440475] Memory state around the buggy address: [ 18.440914] fff00000c6099f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.441598] fff00000c609a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.442147] >fff00000c609a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 18.442864] ^ [ 18.443393] fff00000c609a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.444067] fff00000c609a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.444585] ================================================================== [ 18.381255] ================================================================== [ 18.381925] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 18.382938] Write of size 1 at addr fff00000c609a0c9 by task kunit_try_catch/151 [ 18.383829] [ 18.384136] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 18.384324] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.384377] Hardware name: linux,dummy-virt (DT) [ 18.384448] Call trace: [ 18.384487] show_stack+0x20/0x38 (C) [ 18.384554] dump_stack_lvl+0x8c/0xd0 [ 18.384609] print_report+0x118/0x608 [ 18.384661] kasan_report+0xdc/0x128 [ 18.384710] __asan_report_store1_noabort+0x20/0x30 [ 18.384797] krealloc_less_oob_helper+0xa48/0xc50 [ 18.384858] krealloc_large_less_oob+0x20/0x38 [ 18.384912] kunit_try_run_case+0x170/0x3f0 [ 18.384962] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.385013] kthread+0x318/0x620 [ 18.385059] ret_from_fork+0x10/0x20 [ 18.385109] [ 18.390162] The buggy address belongs to the physical page: [ 18.391009] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106098 [ 18.391656] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.392228] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.392800] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.393440] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.394150] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.395058] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.395601] head: 0bfffe0000000002 ffffc1ffc3182601 ffffffffffffffff 0000000000000000 [ 18.396280] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 18.396847] page dumped because: kasan: bad access detected [ 18.397220] [ 18.397456] Memory state around the buggy address: [ 18.397862] fff00000c6099f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.398439] fff00000c609a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.399065] >fff00000c609a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 18.399602] ^ [ 18.400033] fff00000c609a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.400586] fff00000c609a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.401397] ================================================================== [ 18.446395] ================================================================== [ 18.447204] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 18.447817] Write of size 1 at addr fff00000c609a0ea by task kunit_try_catch/151 [ 18.448381] [ 18.448687] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 18.448885] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.448951] Hardware name: linux,dummy-virt (DT) [ 18.449023] Call trace: [ 18.449076] show_stack+0x20/0x38 (C) [ 18.449200] dump_stack_lvl+0x8c/0xd0 [ 18.449312] print_report+0x118/0x608 [ 18.449425] kasan_report+0xdc/0x128 [ 18.449531] __asan_report_store1_noabort+0x20/0x30 [ 18.449638] krealloc_less_oob_helper+0xae4/0xc50 [ 18.449766] krealloc_large_less_oob+0x20/0x38 [ 18.449872] kunit_try_run_case+0x170/0x3f0 [ 18.449932] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.449989] kthread+0x318/0x620 [ 18.450039] ret_from_fork+0x10/0x20 [ 18.450116] [ 18.454778] The buggy address belongs to the physical page: [ 18.455584] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106098 [ 18.456278] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.456895] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.457509] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.458146] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.459115] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.459681] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.460382] head: 0bfffe0000000002 ffffc1ffc3182601 ffffffffffffffff 0000000000000000 [ 18.460993] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 18.461510] page dumped because: kasan: bad access detected [ 18.462009] [ 18.462286] Memory state around the buggy address: [ 18.463711] fff00000c6099f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.464300] fff00000c609a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.465003] >fff00000c609a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 18.465451] ^ [ 18.466103] fff00000c609a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.467017] fff00000c609a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.467524] ================================================================== [ 18.468588] ================================================================== [ 18.469157] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 18.469755] Write of size 1 at addr fff00000c609a0eb by task kunit_try_catch/151 [ 18.470337] [ 18.470588] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 18.470799] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.470868] Hardware name: linux,dummy-virt (DT) [ 18.471369] Call trace: [ 18.471450] show_stack+0x20/0x38 (C) [ 18.471538] dump_stack_lvl+0x8c/0xd0 [ 18.471593] print_report+0x118/0x608 [ 18.471645] kasan_report+0xdc/0x128 [ 18.471695] __asan_report_store1_noabort+0x20/0x30 [ 18.471777] krealloc_less_oob_helper+0xa58/0xc50 [ 18.471834] krealloc_large_less_oob+0x20/0x38 [ 18.471885] kunit_try_run_case+0x170/0x3f0 [ 18.471938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.471993] kthread+0x318/0x620 [ 18.472041] ret_from_fork+0x10/0x20 [ 18.472095] [ 18.476819] The buggy address belongs to the physical page: [ 18.477373] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106098 [ 18.478116] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.478908] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.479553] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.480067] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.480830] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.481432] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.482008] head: 0bfffe0000000002 ffffc1ffc3182601 ffffffffffffffff 0000000000000000 [ 18.482822] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 18.483441] page dumped because: kasan: bad access detected [ 18.483917] [ 18.484194] Memory state around the buggy address: [ 18.484681] fff00000c6099f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.485236] fff00000c609a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.485664] >fff00000c609a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 18.486272] ^ [ 18.487073] fff00000c609a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.487583] fff00000c609a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.488182] ================================================================== [ 18.261700] ================================================================== [ 18.262330] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 18.263160] Write of size 1 at addr fff00000c49e10ea by task kunit_try_catch/147 [ 18.263818] [ 18.264086] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 18.264286] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.264355] Hardware name: linux,dummy-virt (DT) [ 18.264440] Call trace: [ 18.264503] show_stack+0x20/0x38 (C) [ 18.264631] dump_stack_lvl+0x8c/0xd0 [ 18.264753] print_report+0x118/0x608 [ 18.264871] kasan_report+0xdc/0x128 [ 18.264986] __asan_report_store1_noabort+0x20/0x30 [ 18.265103] krealloc_less_oob_helper+0xae4/0xc50 [ 18.265212] krealloc_less_oob+0x20/0x38 [ 18.265323] kunit_try_run_case+0x170/0x3f0 [ 18.265430] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.265547] kthread+0x318/0x620 [ 18.265665] ret_from_fork+0x10/0x20 [ 18.265760] [ 18.270149] Allocated by task 147: [ 18.270599] kasan_save_stack+0x3c/0x68 [ 18.271082] kasan_save_track+0x20/0x40 [ 18.271634] kasan_save_alloc_info+0x40/0x58 [ 18.272158] __kasan_krealloc+0x118/0x178 [ 18.272637] krealloc_noprof+0x128/0x360 [ 18.272994] krealloc_less_oob_helper+0x168/0xc50 [ 18.273401] krealloc_less_oob+0x20/0x38 [ 18.273873] kunit_try_run_case+0x170/0x3f0 [ 18.274328] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.274997] kthread+0x318/0x620 [ 18.275346] ret_from_fork+0x10/0x20 [ 18.275673] [ 18.275957] The buggy address belongs to the object at fff00000c49e1000 [ 18.275957] which belongs to the cache kmalloc-256 of size 256 [ 18.277018] The buggy address is located 33 bytes to the right of [ 18.277018] allocated 201-byte region [fff00000c49e1000, fff00000c49e10c9) [ 18.277917] [ 18.278169] The buggy address belongs to the physical page: [ 18.279959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049e0 [ 18.280992] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.281877] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.282331] page_type: f5(slab) [ 18.282874] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.283180] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.283409] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.283631] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.283877] head: 0bfffe0000000001 ffffc1ffc3127801 ffffffffffffffff 0000000000000000 [ 18.284101] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 18.284312] page dumped because: kasan: bad access detected [ 18.284484] [ 18.284579] Memory state around the buggy address: [ 18.284765] fff00000c49e0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.285460] fff00000c49e1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.286213] >fff00000c49e1080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 18.286959] ^ [ 18.287549] fff00000c49e1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.288720] fff00000c49e1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.289344] ================================================================== [ 18.231083] ================================================================== [ 18.231836] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 18.232609] Write of size 1 at addr fff00000c49e10da by task kunit_try_catch/147 [ 18.233349] [ 18.233687] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 18.233924] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.233991] Hardware name: linux,dummy-virt (DT) [ 18.234074] Call trace: [ 18.234140] show_stack+0x20/0x38 (C) [ 18.234280] dump_stack_lvl+0x8c/0xd0 [ 18.234394] print_report+0x118/0x608 [ 18.234574] kasan_report+0xdc/0x128 [ 18.234703] __asan_report_store1_noabort+0x20/0x30 [ 18.234830] krealloc_less_oob_helper+0xa80/0xc50 [ 18.234967] krealloc_less_oob+0x20/0x38 [ 18.235062] kunit_try_run_case+0x170/0x3f0 [ 18.235196] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.235292] kthread+0x318/0x620 [ 18.235368] ret_from_fork+0x10/0x20 [ 18.235465] [ 18.240700] Allocated by task 147: [ 18.241330] kasan_save_stack+0x3c/0x68 [ 18.241773] kasan_save_track+0x20/0x40 [ 18.242235] kasan_save_alloc_info+0x40/0x58 [ 18.242935] __kasan_krealloc+0x118/0x178 [ 18.243317] krealloc_noprof+0x128/0x360 [ 18.243829] krealloc_less_oob_helper+0x168/0xc50 [ 18.244263] krealloc_less_oob+0x20/0x38 [ 18.244745] kunit_try_run_case+0x170/0x3f0 [ 18.245185] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.245685] kthread+0x318/0x620 [ 18.246101] ret_from_fork+0x10/0x20 [ 18.246499] [ 18.247076] The buggy address belongs to the object at fff00000c49e1000 [ 18.247076] which belongs to the cache kmalloc-256 of size 256 [ 18.247940] The buggy address is located 17 bytes to the right of [ 18.247940] allocated 201-byte region [fff00000c49e1000, fff00000c49e10c9) [ 18.248898] [ 18.249146] The buggy address belongs to the physical page: [ 18.249667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049e0 [ 18.250278] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.250927] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.251602] page_type: f5(slab) [ 18.252016] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.252719] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.253282] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.253943] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.254590] head: 0bfffe0000000001 ffffc1ffc3127801 ffffffffffffffff 0000000000000000 [ 18.255155] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 18.255591] page dumped because: kasan: bad access detected [ 18.256109] [ 18.256361] Memory state around the buggy address: [ 18.256814] fff00000c49e0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.257504] fff00000c49e1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.258048] >fff00000c49e1080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 18.258405] ^ [ 18.259002] fff00000c49e1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.259680] fff00000c49e1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.260393] ================================================================== [ 18.290873] ================================================================== [ 18.291929] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 18.293137] Write of size 1 at addr fff00000c49e10eb by task kunit_try_catch/147 [ 18.293711] [ 18.294080] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 18.294317] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.294390] Hardware name: linux,dummy-virt (DT) [ 18.294461] Call trace: [ 18.294653] show_stack+0x20/0x38 (C) [ 18.294819] dump_stack_lvl+0x8c/0xd0 [ 18.295070] print_report+0x118/0x608 [ 18.295191] kasan_report+0xdc/0x128 [ 18.295247] __asan_report_store1_noabort+0x20/0x30 [ 18.295298] krealloc_less_oob_helper+0xa58/0xc50 [ 18.295348] krealloc_less_oob+0x20/0x38 [ 18.295394] kunit_try_run_case+0x170/0x3f0 [ 18.295446] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.295498] kthread+0x318/0x620 [ 18.295544] ret_from_fork+0x10/0x20 [ 18.295595] [ 18.300486] Allocated by task 147: [ 18.300980] kasan_save_stack+0x3c/0x68 [ 18.301507] kasan_save_track+0x20/0x40 [ 18.302001] kasan_save_alloc_info+0x40/0x58 [ 18.302704] __kasan_krealloc+0x118/0x178 [ 18.303257] krealloc_noprof+0x128/0x360 [ 18.303618] krealloc_less_oob_helper+0x168/0xc50 [ 18.304134] krealloc_less_oob+0x20/0x38 [ 18.304575] kunit_try_run_case+0x170/0x3f0 [ 18.305091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.305586] kthread+0x318/0x620 [ 18.305931] ret_from_fork+0x10/0x20 [ 18.306335] [ 18.306589] The buggy address belongs to the object at fff00000c49e1000 [ 18.306589] which belongs to the cache kmalloc-256 of size 256 [ 18.307636] The buggy address is located 34 bytes to the right of [ 18.307636] allocated 201-byte region [fff00000c49e1000, fff00000c49e10c9) [ 18.308578] [ 18.308859] The buggy address belongs to the physical page: [ 18.309287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049e0 [ 18.309904] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.311468] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.311928] page_type: f5(slab) [ 18.312284] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.312783] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.313493] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.314122] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.314697] head: 0bfffe0000000001 ffffc1ffc3127801 ffffffffffffffff 0000000000000000 [ 18.315324] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 18.316189] page dumped because: kasan: bad access detected [ 18.316544] [ 18.316815] Memory state around the buggy address: [ 18.317295] fff00000c49e0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.317915] fff00000c49e1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.318571] >fff00000c49e1080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 18.319370] ^ [ 18.319839] fff00000c49e1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.320447] fff00000c49e1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.320984] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 18.097420] ================================================================== [ 18.098153] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680 [ 18.099308] Write of size 1 at addr fff00000c49e0eeb by task kunit_try_catch/145 [ 18.100082] [ 18.100380] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 18.100587] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.100656] Hardware name: linux,dummy-virt (DT) [ 18.100746] Call trace: [ 18.100792] show_stack+0x20/0x38 (C) [ 18.100865] dump_stack_lvl+0x8c/0xd0 [ 18.100946] print_report+0x118/0x608 [ 18.101048] kasan_report+0xdc/0x128 [ 18.101146] __asan_report_store1_noabort+0x20/0x30 [ 18.101255] krealloc_more_oob_helper+0x614/0x680 [ 18.101374] krealloc_more_oob+0x20/0x38 [ 18.101476] kunit_try_run_case+0x170/0x3f0 [ 18.101593] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.101686] kthread+0x318/0x620 [ 18.101765] ret_from_fork+0x10/0x20 [ 18.101830] [ 18.106605] Allocated by task 145: [ 18.107296] kasan_save_stack+0x3c/0x68 [ 18.107801] kasan_save_track+0x20/0x40 [ 18.108260] kasan_save_alloc_info+0x40/0x58 [ 18.108610] __kasan_krealloc+0x118/0x178 [ 18.109080] krealloc_noprof+0x128/0x360 [ 18.109418] krealloc_more_oob_helper+0x168/0x680 [ 18.109927] krealloc_more_oob+0x20/0x38 [ 18.110287] kunit_try_run_case+0x170/0x3f0 [ 18.111049] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.111565] kthread+0x318/0x620 [ 18.111889] ret_from_fork+0x10/0x20 [ 18.112321] [ 18.112564] The buggy address belongs to the object at fff00000c49e0e00 [ 18.112564] which belongs to the cache kmalloc-256 of size 256 [ 18.113504] The buggy address is located 0 bytes to the right of [ 18.113504] allocated 235-byte region [fff00000c49e0e00, fff00000c49e0eeb) [ 18.114367] [ 18.115143] The buggy address belongs to the physical page: [ 18.115563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049e0 [ 18.116137] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.116814] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.117402] page_type: f5(slab) [ 18.117780] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.118378] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.119275] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.119928] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.120557] head: 0bfffe0000000001 ffffc1ffc3127801 ffffffffffffffff 0000000000000000 [ 18.121202] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 18.121818] page dumped because: kasan: bad access detected [ 18.122250] [ 18.122790] Memory state around the buggy address: [ 18.123252] fff00000c49e0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.123870] fff00000c49e0e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.124487] >fff00000c49e0e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 18.125148] ^ [ 18.125668] fff00000c49e0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.126298] fff00000c49e0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.127087] ================================================================== [ 18.330011] ================================================================== [ 18.331120] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680 [ 18.332412] Write of size 1 at addr fff00000c64ce0eb by task kunit_try_catch/149 [ 18.332860] [ 18.333098] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 18.333288] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.333355] Hardware name: linux,dummy-virt (DT) [ 18.333426] Call trace: [ 18.333474] show_stack+0x20/0x38 (C) [ 18.333592] dump_stack_lvl+0x8c/0xd0 [ 18.333690] print_report+0x118/0x608 [ 18.333805] kasan_report+0xdc/0x128 [ 18.333912] __asan_report_store1_noabort+0x20/0x30 [ 18.334026] krealloc_more_oob_helper+0x614/0x680 [ 18.334153] krealloc_large_more_oob+0x20/0x38 [ 18.334255] kunit_try_run_case+0x170/0x3f0 [ 18.334315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.334379] kthread+0x318/0x620 [ 18.334457] ret_from_fork+0x10/0x20 [ 18.334543] [ 18.339483] The buggy address belongs to the physical page: [ 18.340355] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064cc [ 18.341019] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.341610] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.342261] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.343192] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.343879] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.344439] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.345062] head: 0bfffe0000000002 ffffc1ffc3193301 ffffffffffffffff 0000000000000000 [ 18.345593] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 18.346171] page dumped because: kasan: bad access detected [ 18.346923] [ 18.347119] Memory state around the buggy address: [ 18.347392] fff00000c64cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.348034] fff00000c64ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.348544] >fff00000c64ce080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 18.349178] ^ [ 18.349596] fff00000c64ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.350282] fff00000c64ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.351109] ================================================================== [ 18.131443] ================================================================== [ 18.131979] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680 [ 18.132484] Write of size 1 at addr fff00000c49e0ef0 by task kunit_try_catch/145 [ 18.133063] [ 18.133381] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 18.133590] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.133654] Hardware name: linux,dummy-virt (DT) [ 18.133724] Call trace: [ 18.133792] show_stack+0x20/0x38 (C) [ 18.133918] dump_stack_lvl+0x8c/0xd0 [ 18.134036] print_report+0x118/0x608 [ 18.134165] kasan_report+0xdc/0x128 [ 18.134239] __asan_report_store1_noabort+0x20/0x30 [ 18.134293] krealloc_more_oob_helper+0x5c8/0x680 [ 18.134347] krealloc_more_oob+0x20/0x38 [ 18.134398] kunit_try_run_case+0x170/0x3f0 [ 18.134453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.134572] kthread+0x318/0x620 [ 18.134667] ret_from_fork+0x10/0x20 [ 18.134790] [ 18.139624] Allocated by task 145: [ 18.139950] kasan_save_stack+0x3c/0x68 [ 18.140424] kasan_save_track+0x20/0x40 [ 18.140948] kasan_save_alloc_info+0x40/0x58 [ 18.141461] __kasan_krealloc+0x118/0x178 [ 18.141951] krealloc_noprof+0x128/0x360 [ 18.142365] krealloc_more_oob_helper+0x168/0x680 [ 18.143077] krealloc_more_oob+0x20/0x38 [ 18.143600] kunit_try_run_case+0x170/0x3f0 [ 18.144128] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.144640] kthread+0x318/0x620 [ 18.145084] ret_from_fork+0x10/0x20 [ 18.145532] [ 18.145823] The buggy address belongs to the object at fff00000c49e0e00 [ 18.145823] which belongs to the cache kmalloc-256 of size 256 [ 18.146959] The buggy address is located 5 bytes to the right of [ 18.146959] allocated 235-byte region [fff00000c49e0e00, fff00000c49e0eeb) [ 18.148093] [ 18.148368] The buggy address belongs to the physical page: [ 18.149103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1049e0 [ 18.149979] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.150990] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.151649] page_type: f5(slab) [ 18.152179] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.152836] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.153488] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 18.154165] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.154823] head: 0bfffe0000000001 ffffc1ffc3127801 ffffffffffffffff 0000000000000000 [ 18.155201] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 18.155877] page dumped because: kasan: bad access detected [ 18.156477] [ 18.156767] Memory state around the buggy address: [ 18.157259] fff00000c49e0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.157916] fff00000c49e0e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.158465] >fff00000c49e0e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 18.159154] ^ [ 18.159711] fff00000c49e0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.160364] fff00000c49e0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.161017] ================================================================== [ 18.352406] ================================================================== [ 18.352831] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680 [ 18.353357] Write of size 1 at addr fff00000c64ce0f0 by task kunit_try_catch/149 [ 18.354003] [ 18.354316] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 18.354534] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.354593] Hardware name: linux,dummy-virt (DT) [ 18.354655] Call trace: [ 18.354700] show_stack+0x20/0x38 (C) [ 18.354823] dump_stack_lvl+0x8c/0xd0 [ 18.354916] print_report+0x118/0x608 [ 18.355016] kasan_report+0xdc/0x128 [ 18.355107] __asan_report_store1_noabort+0x20/0x30 [ 18.355193] krealloc_more_oob_helper+0x5c8/0x680 [ 18.355274] krealloc_large_more_oob+0x20/0x38 [ 18.355363] kunit_try_run_case+0x170/0x3f0 [ 18.355459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.355569] kthread+0x318/0x620 [ 18.355664] ret_from_fork+0x10/0x20 [ 18.355777] [ 18.360136] The buggy address belongs to the physical page: [ 18.360482] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064cc [ 18.362338] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.363282] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.363912] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.364481] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.365079] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.365640] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.366207] head: 0bfffe0000000002 ffffc1ffc3193301 ffffffffffffffff 0000000000000000 [ 18.367022] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 18.367906] page dumped because: kasan: bad access detected [ 18.368611] [ 18.368862] Memory state around the buggy address: [ 18.369243] fff00000c64cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.369828] fff00000c64ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.370363] >fff00000c64ce080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 18.371277] ^ [ 18.371965] fff00000c64ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.372496] fff00000c64ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 18.372990] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 18.071481] ================================================================== [ 18.072160] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 18.072398] Read of size 1 at addr fff00000c6510000 by task kunit_try_catch/143 [ 18.072617] [ 18.072732] CPU: 0 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 18.072928] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.072984] Hardware name: linux,dummy-virt (DT) [ 18.073117] Call trace: [ 18.073179] show_stack+0x20/0x38 (C) [ 18.073330] dump_stack_lvl+0x8c/0xd0 [ 18.073438] print_report+0x118/0x608 [ 18.073536] kasan_report+0xdc/0x128 [ 18.073639] __asan_report_load1_noabort+0x20/0x30 [ 18.073762] page_alloc_uaf+0x328/0x350 [ 18.073937] kunit_try_run_case+0x170/0x3f0 [ 18.074101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.074277] kthread+0x318/0x620 [ 18.074431] ret_from_fork+0x10/0x20 [ 18.074636] [ 18.079416] The buggy address belongs to the physical page: [ 18.080138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106510 [ 18.080825] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.081448] page_type: f0(buddy) [ 18.081900] raw: 0bfffe0000000000 fff00000ff6150e0 fff00000ff6150e0 0000000000000000 [ 18.082922] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000 [ 18.083601] page dumped because: kasan: bad access detected [ 18.083812] [ 18.083908] Memory state around the buggy address: [ 18.084067] fff00000c650ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.084270] fff00000c650ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.084475] >fff00000c6510000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.084663] ^ [ 18.084945] fff00000c6510080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.085593] fff00000c6510100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.086130] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[ 18.034437] ================================================================== [ 18.035245] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 18.035976] Free of addr fff00000c6094001 by task kunit_try_catch/139 [ 18.036777] [ 18.037147] CPU: 1 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 18.037380] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.037453] Hardware name: linux,dummy-virt (DT) [ 18.037527] Call trace: [ 18.037565] show_stack+0x20/0x38 (C) [ 18.037635] dump_stack_lvl+0x8c/0xd0 [ 18.037689] print_report+0x118/0x608 [ 18.037767] kasan_report_invalid_free+0xc0/0xe8 [ 18.037828] __kasan_kfree_large+0x5c/0xa8 [ 18.037880] free_large_kmalloc+0x58/0x140 [ 18.037932] kfree+0x270/0x3c8 [ 18.037978] kmalloc_large_invalid_free+0x108/0x270 [ 18.038031] kunit_try_run_case+0x170/0x3f0 [ 18.038099] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.038156] kthread+0x318/0x620 [ 18.038205] ret_from_fork+0x10/0x20 [ 18.038260] [ 18.043096] The buggy address belongs to the physical page: [ 18.043298] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106094 [ 18.043551] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 18.043878] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 18.044730] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.045610] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.046326] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 18.046981] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.047232] head: 0bfffe0000000002 ffffc1ffc3182501 ffffffffffffffff 0000000000000000 [ 18.047463] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 18.047683] page dumped because: kasan: bad access detected [ 18.048271] [ 18.048582] Memory state around the buggy address: [ 18.049180] fff00000c6093f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.049928] fff00000c6093f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.050521] >fff00000c6094000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.051074] ^ [ 18.051389] fff00000c6094080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.051938] fff00000c6094100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.052594] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 18.009329] ================================================================== [ 18.010131] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 18.010873] Read of size 1 at addr fff00000c6094000 by task kunit_try_catch/137 [ 18.012115] [ 18.012399] CPU: 1 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 18.012527] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.012560] Hardware name: linux,dummy-virt (DT) [ 18.012623] Call trace: [ 18.012652] show_stack+0x20/0x38 (C) [ 18.012721] dump_stack_lvl+0x8c/0xd0 [ 18.012865] print_report+0x118/0x608 [ 18.012972] kasan_report+0xdc/0x128 [ 18.013089] __asan_report_load1_noabort+0x20/0x30 [ 18.013214] kmalloc_large_uaf+0x2cc/0x2f8 [ 18.013316] kunit_try_run_case+0x170/0x3f0 [ 18.013375] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.013432] kthread+0x318/0x620 [ 18.013483] ret_from_fork+0x10/0x20 [ 18.013537] [ 18.017603] The buggy address belongs to the physical page: [ 18.018356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106094 [ 18.019358] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.019921] raw: 0bfffe0000000000 ffffc1ffc3182608 fff00000da4d1040 0000000000000000 [ 18.020172] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 18.020397] page dumped because: kasan: bad access detected [ 18.020575] [ 18.020675] Memory state around the buggy address: [ 18.021168] fff00000c6093f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.021982] fff00000c6093f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.022932] >fff00000c6094000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.023661] ^ [ 18.024140] fff00000c6094080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.024538] fff00000c6094100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 18.024781] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 17.981965] ================================================================== [ 17.983197] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 17.983584] Write of size 1 at addr fff00000c609600a by task kunit_try_catch/135 [ 17.983935] [ 17.984089] CPU: 1 UID: 0 PID: 135 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 17.984187] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.984219] Hardware name: linux,dummy-virt (DT) [ 17.984255] Call trace: [ 17.984282] show_stack+0x20/0x38 (C) [ 17.984340] dump_stack_lvl+0x8c/0xd0 [ 17.984392] print_report+0x118/0x608 [ 17.984442] kasan_report+0xdc/0x128 [ 17.984490] __asan_report_store1_noabort+0x20/0x30 [ 17.984540] kmalloc_large_oob_right+0x278/0x2b8 [ 17.984590] kunit_try_run_case+0x170/0x3f0 [ 17.984640] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.984694] kthread+0x318/0x620 [ 17.985054] ret_from_fork+0x10/0x20 [ 17.985196] [ 17.991111] The buggy address belongs to the physical page: [ 17.991905] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106094 [ 17.992629] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.993207] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.993486] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.993722] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 17.993980] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.994226] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 17.994460] head: 0bfffe0000000002 ffffc1ffc3182501 ffffffffffffffff 0000000000000000 [ 17.995524] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 17.996333] page dumped because: kasan: bad access detected [ 17.996848] [ 17.997133] Memory state around the buggy address: [ 17.997548] fff00000c6095f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.998081] fff00000c6095f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.998757] >fff00000c6096000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.999089] ^ [ 17.999243] fff00000c6096080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.999456] fff00000c6096100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.999659] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 17.941033] ================================================================== [ 17.942105] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 17.943035] Write of size 1 at addr fff00000c64e9f00 by task kunit_try_catch/133 [ 17.943719] [ 17.944042] CPU: 1 UID: 0 PID: 133 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 17.944405] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.944500] Hardware name: linux,dummy-virt (DT) [ 17.944566] Call trace: [ 17.944619] show_stack+0x20/0x38 (C) [ 17.944727] dump_stack_lvl+0x8c/0xd0 [ 17.944843] print_report+0x118/0x608 [ 17.944947] kasan_report+0xdc/0x128 [ 17.945046] __asan_report_store1_noabort+0x20/0x30 [ 17.945155] kmalloc_big_oob_right+0x2a4/0x2f0 [ 17.945255] kunit_try_run_case+0x170/0x3f0 [ 17.945356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.945497] kthread+0x318/0x620 [ 17.945592] ret_from_fork+0x10/0x20 [ 17.945716] [ 17.950936] Allocated by task 133: [ 17.951379] kasan_save_stack+0x3c/0x68 [ 17.951952] kasan_save_track+0x20/0x40 [ 17.952351] kasan_save_alloc_info+0x40/0x58 [ 17.952806] __kasan_kmalloc+0xd4/0xd8 [ 17.953208] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.953673] kmalloc_big_oob_right+0xb8/0x2f0 [ 17.954096] kunit_try_run_case+0x170/0x3f0 [ 17.954629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.955147] kthread+0x318/0x620 [ 17.955539] ret_from_fork+0x10/0x20 [ 17.955969] [ 17.956146] The buggy address belongs to the object at fff00000c64e8000 [ 17.956146] which belongs to the cache kmalloc-8k of size 8192 [ 17.957027] The buggy address is located 0 bytes to the right of [ 17.957027] allocated 7936-byte region [fff00000c64e8000, fff00000c64e9f00) [ 17.957835] [ 17.958565] The buggy address belongs to the physical page: [ 17.959013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064e8 [ 17.959672] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.960431] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.961104] page_type: f5(slab) [ 17.961439] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 17.962250] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 17.962920] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 17.963544] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 17.964360] head: 0bfffe0000000003 ffffc1ffc3193a01 ffffffffffffffff 0000000000000000 [ 17.965076] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000 [ 17.965779] page dumped because: kasan: bad access detected [ 17.966419] [ 17.966687] Memory state around the buggy address: [ 17.967455] fff00000c64e9e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.968034] fff00000c64e9e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.968791] >fff00000c64e9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.969476] ^ [ 17.970030] fff00000c64e9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.970625] fff00000c64ea000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.971365] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 17.873264] ================================================================== [ 17.873880] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x414/0x490 [ 17.874767] Write of size 1 at addr fff00000c59c2578 by task kunit_try_catch/131 [ 17.875611] [ 17.876506] CPU: 1 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 17.876724] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.876795] Hardware name: linux,dummy-virt (DT) [ 17.876840] Call trace: [ 17.876868] show_stack+0x20/0x38 (C) [ 17.876934] dump_stack_lvl+0x8c/0xd0 [ 17.876985] print_report+0x118/0x608 [ 17.877034] kasan_report+0xdc/0x128 [ 17.877081] __asan_report_store1_noabort+0x20/0x30 [ 17.877130] kmalloc_track_caller_oob_right+0x414/0x490 [ 17.877181] kunit_try_run_case+0x170/0x3f0 [ 17.877233] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.877283] kthread+0x318/0x620 [ 17.877328] ret_from_fork+0x10/0x20 [ 17.877378] [ 17.882366] Allocated by task 131: [ 17.883022] kasan_save_stack+0x3c/0x68 [ 17.884447] kasan_save_track+0x20/0x40 [ 17.884762] kasan_save_alloc_info+0x40/0x58 [ 17.885110] __kasan_kmalloc+0xd4/0xd8 [ 17.885553] __kmalloc_node_track_caller_noprof+0x18c/0x4c0 [ 17.885995] kmalloc_track_caller_oob_right+0xa8/0x490 [ 17.886625] kunit_try_run_case+0x170/0x3f0 [ 17.887424] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.887902] kthread+0x318/0x620 [ 17.888339] ret_from_fork+0x10/0x20 [ 17.888695] [ 17.888980] The buggy address belongs to the object at fff00000c59c2500 [ 17.888980] which belongs to the cache kmalloc-128 of size 128 [ 17.889855] The buggy address is located 0 bytes to the right of [ 17.889855] allocated 120-byte region [fff00000c59c2500, fff00000c59c2578) [ 17.891557] [ 17.891867] The buggy address belongs to the physical page: [ 17.892321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c2 [ 17.893006] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.893610] page_type: f5(slab) [ 17.893957] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.894957] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.895484] page dumped because: kasan: bad access detected [ 17.895970] [ 17.896261] Memory state around the buggy address: [ 17.896775] fff00000c59c2400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.897314] fff00000c59c2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.898020] >fff00000c59c2500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.898777] ^ [ 17.899214] fff00000c59c2580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.899542] fff00000c59c2600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.899867] ================================================================== [ 17.902176] ================================================================== [ 17.902633] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x420/0x490 [ 17.903914] Write of size 1 at addr fff00000c59c2678 by task kunit_try_catch/131 [ 17.904844] [ 17.905408] CPU: 1 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 17.905604] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.905669] Hardware name: linux,dummy-virt (DT) [ 17.905756] Call trace: [ 17.905797] show_stack+0x20/0x38 (C) [ 17.905869] dump_stack_lvl+0x8c/0xd0 [ 17.905945] print_report+0x118/0x608 [ 17.906005] kasan_report+0xdc/0x128 [ 17.906064] __asan_report_store1_noabort+0x20/0x30 [ 17.906125] kmalloc_track_caller_oob_right+0x420/0x490 [ 17.906184] kunit_try_run_case+0x170/0x3f0 [ 17.906239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.906294] kthread+0x318/0x620 [ 17.906344] ret_from_fork+0x10/0x20 [ 17.906399] [ 17.912783] Allocated by task 131: [ 17.913120] kasan_save_stack+0x3c/0x68 [ 17.913713] kasan_save_track+0x20/0x40 [ 17.914289] kasan_save_alloc_info+0x40/0x58 [ 17.914816] __kasan_kmalloc+0xd4/0xd8 [ 17.915351] __kmalloc_node_track_caller_noprof+0x18c/0x4c0 [ 17.915823] kmalloc_track_caller_oob_right+0x184/0x490 [ 17.916236] kunit_try_run_case+0x170/0x3f0 [ 17.916578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.916979] kthread+0x318/0x620 [ 17.917267] ret_from_fork+0x10/0x20 [ 17.917578] [ 17.918450] The buggy address belongs to the object at fff00000c59c2600 [ 17.918450] which belongs to the cache kmalloc-128 of size 128 [ 17.919252] The buggy address is located 0 bytes to the right of [ 17.919252] allocated 120-byte region [fff00000c59c2600, fff00000c59c2678) [ 17.920061] [ 17.920354] The buggy address belongs to the physical page: [ 17.920814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c2 [ 17.921505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.922141] page_type: f5(slab) [ 17.922680] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.923482] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.924229] page dumped because: kasan: bad access detected [ 17.924878] [ 17.925288] Memory state around the buggy address: [ 17.925720] fff00000c59c2500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.926778] fff00000c59c2580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.927198] >fff00000c59c2600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.927559] ^ [ 17.927938] fff00000c59c2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.928328] fff00000c59c2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.929277] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 17.832937] ================================================================== [ 17.833635] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 17.834327] Read of size 1 at addr fff00000c617d000 by task kunit_try_catch/129 [ 17.835918] [ 17.836228] CPU: 1 UID: 0 PID: 129 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 17.836378] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.836410] Hardware name: linux,dummy-virt (DT) [ 17.836467] Call trace: [ 17.836515] show_stack+0x20/0x38 (C) [ 17.836626] dump_stack_lvl+0x8c/0xd0 [ 17.836723] print_report+0x118/0x608 [ 17.836838] kasan_report+0xdc/0x128 [ 17.836889] __asan_report_load1_noabort+0x20/0x30 [ 17.836939] kmalloc_node_oob_right+0x2f4/0x330 [ 17.836988] kunit_try_run_case+0x170/0x3f0 [ 17.837038] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.837092] kthread+0x318/0x620 [ 17.837141] ret_from_fork+0x10/0x20 [ 17.837194] [ 17.841978] Allocated by task 129: [ 17.842327] kasan_save_stack+0x3c/0x68 [ 17.843951] kasan_save_track+0x20/0x40 [ 17.844356] kasan_save_alloc_info+0x40/0x58 [ 17.844847] __kasan_kmalloc+0xd4/0xd8 [ 17.845274] __kmalloc_cache_node_noprof+0x168/0x3d0 [ 17.845758] kmalloc_node_oob_right+0xbc/0x330 [ 17.846247] kunit_try_run_case+0x170/0x3f0 [ 17.847095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.847556] kthread+0x318/0x620 [ 17.847917] ret_from_fork+0x10/0x20 [ 17.848269] [ 17.848532] The buggy address belongs to the object at fff00000c617c000 [ 17.848532] which belongs to the cache kmalloc-4k of size 4096 [ 17.849421] The buggy address is located 0 bytes to the right of [ 17.849421] allocated 4096-byte region [fff00000c617c000, fff00000c617d000) [ 17.850295] [ 17.851439] The buggy address belongs to the physical page: [ 17.851848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106178 [ 17.852832] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.853475] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.854134] page_type: f5(slab) [ 17.854960] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 17.855489] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 17.856043] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 17.856666] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 17.857297] head: 0bfffe0000000003 ffffc1ffc3185e01 ffffffffffffffff 0000000000000000 [ 17.857844] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000 [ 17.858426] page dumped because: kasan: bad access detected [ 17.859727] [ 17.860016] Memory state around the buggy address: [ 17.860373] fff00000c617cf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.861097] fff00000c617cf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.861636] >fff00000c617d000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.862291] ^ [ 17.862632] fff00000c617d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.863243] fff00000c617d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.864240] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 17.792458] ================================================================== [ 17.793191] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 17.793885] Read of size 1 at addr fff00000c59b84df by task kunit_try_catch/127 [ 17.794488] [ 17.794823] CPU: 1 UID: 0 PID: 127 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 17.795018] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.795083] Hardware name: linux,dummy-virt (DT) [ 17.795157] Call trace: [ 17.795209] show_stack+0x20/0x38 (C) [ 17.795342] dump_stack_lvl+0x8c/0xd0 [ 17.795448] print_report+0x118/0x608 [ 17.795546] kasan_report+0xdc/0x128 [ 17.795647] __asan_report_load1_noabort+0x20/0x30 [ 17.795807] kmalloc_oob_left+0x2ec/0x320 [ 17.795934] kunit_try_run_case+0x170/0x3f0 [ 17.796028] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.796142] kthread+0x318/0x620 [ 17.796230] ret_from_fork+0x10/0x20 [ 17.796317] [ 17.801572] Allocated by task 29: [ 17.801971] kasan_save_stack+0x3c/0x68 [ 17.802339] kasan_save_track+0x20/0x40 [ 17.803296] kasan_save_alloc_info+0x40/0x58 [ 17.803786] __kasan_kmalloc+0xd4/0xd8 [ 17.804238] __kmalloc_node_track_caller_noprof+0x18c/0x4c0 [ 17.804807] kstrdup+0x54/0xc8 [ 17.805113] devtmpfs_work_loop+0x398/0x5b0 [ 17.805502] devtmpfsd+0x50/0x58 [ 17.805864] kthread+0x318/0x620 [ 17.806192] ret_from_fork+0x10/0x20 [ 17.807485] [ 17.807725] Freed by task 29: [ 17.808120] kasan_save_stack+0x3c/0x68 [ 17.808565] kasan_save_track+0x20/0x40 [ 17.808938] kasan_save_free_info+0x4c/0x78 [ 17.809405] __kasan_slab_free+0x6c/0x98 [ 17.809830] kfree+0x214/0x3c8 [ 17.810230] devtmpfs_work_loop+0x4b8/0x5b0 [ 17.811168] devtmpfsd+0x50/0x58 [ 17.811514] kthread+0x318/0x620 [ 17.811929] ret_from_fork+0x10/0x20 [ 17.812335] [ 17.812583] The buggy address belongs to the object at fff00000c59b84c0 [ 17.812583] which belongs to the cache kmalloc-16 of size 16 [ 17.813424] The buggy address is located 15 bytes to the right of [ 17.813424] allocated 16-byte region [fff00000c59b84c0, fff00000c59b84d0) [ 17.814324] [ 17.815471] The buggy address belongs to the physical page: [ 17.815777] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059b8 [ 17.816501] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.816931] page_type: f5(slab) [ 17.817323] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.817997] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.819030] page dumped because: kasan: bad access detected [ 17.819464] [ 17.819666] Memory state around the buggy address: [ 17.820127] fff00000c59b8380: 00 02 fc fc 00 02 fc fc fa fb fc fc 00 00 fc fc [ 17.820677] fff00000c59b8400: fa fb fc fc 00 03 fc fc 00 03 fc fc 00 00 fc fc [ 17.821282] >fff00000c59b8480: fa fb fc fc fa fb fc fc fa fb fc fc 00 07 fc fc [ 17.821838] ^ [ 17.822314] fff00000c59b8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.823684] fff00000c59b8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.824268] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 17.735243] ================================================================== [ 17.735957] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 17.736530] Write of size 1 at addr fff00000c5a05078 by task kunit_try_catch/125 [ 17.738043] [ 17.738400] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 17.738620] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.738692] Hardware name: linux,dummy-virt (DT) [ 17.738771] Call trace: [ 17.738824] show_stack+0x20/0x38 (C) [ 17.738938] dump_stack_lvl+0x8c/0xd0 [ 17.739036] print_report+0x118/0x608 [ 17.739124] kasan_report+0xdc/0x128 [ 17.739217] __asan_report_store1_noabort+0x20/0x30 [ 17.739306] kmalloc_oob_right+0x538/0x660 [ 17.739391] kunit_try_run_case+0x170/0x3f0 [ 17.739490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.739594] kthread+0x318/0x620 [ 17.739682] ret_from_fork+0x10/0x20 [ 17.739757] [ 17.743947] Allocated by task 125: [ 17.744255] kasan_save_stack+0x3c/0x68 [ 17.744767] kasan_save_track+0x20/0x40 [ 17.745217] kasan_save_alloc_info+0x40/0x58 [ 17.745674] __kasan_kmalloc+0xd4/0xd8 [ 17.746044] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.746543] kmalloc_oob_right+0xb0/0x660 [ 17.747010] kunit_try_run_case+0x170/0x3f0 [ 17.747470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.747952] kthread+0x318/0x620 [ 17.748341] ret_from_fork+0x10/0x20 [ 17.748804] [ 17.749025] The buggy address belongs to the object at fff00000c5a05000 [ 17.749025] which belongs to the cache kmalloc-128 of size 128 [ 17.749885] The buggy address is located 5 bytes to the right of [ 17.749885] allocated 115-byte region [fff00000c5a05000, fff00000c5a05073) [ 17.750988] [ 17.751213] The buggy address belongs to the physical page: [ 17.751658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a05 [ 17.752334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.752931] page_type: f5(slab) [ 17.753277] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.753803] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.754480] page dumped because: kasan: bad access detected [ 17.754962] [ 17.755236] Memory state around the buggy address: [ 17.755570] fff00000c5a04f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.756214] fff00000c5a04f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.756821] >fff00000c5a05000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.757354] ^ [ 17.757941] fff00000c5a05080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.758521] fff00000c5a05100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.759153] ================================================================== [ 17.699280] ================================================================== [ 17.700291] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 17.701943] Write of size 1 at addr fff00000c5a05073 by task kunit_try_catch/125 [ 17.703029] [ 17.704607] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G N 6.14.7-rc1 #1 [ 17.705534] Tainted: [N]=TEST [ 17.705578] Hardware name: linux,dummy-virt (DT) [ 17.705889] Call trace: [ 17.706094] show_stack+0x20/0x38 (C) [ 17.706277] dump_stack_lvl+0x8c/0xd0 [ 17.706351] print_report+0x118/0x608 [ 17.706407] kasan_report+0xdc/0x128 [ 17.706457] __asan_report_store1_noabort+0x20/0x30 [ 17.706573] kmalloc_oob_right+0x5a4/0x660 [ 17.706662] kunit_try_run_case+0x170/0x3f0 [ 17.706782] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.706852] kthread+0x318/0x620 [ 17.706905] ret_from_fork+0x10/0x20 [ 17.707097] [ 17.711373] Allocated by task 125: [ 17.711924] kasan_save_stack+0x3c/0x68 [ 17.712504] kasan_save_track+0x20/0x40 [ 17.713127] kasan_save_alloc_info+0x40/0x58 [ 17.713667] __kasan_kmalloc+0xd4/0xd8 [ 17.714175] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.714884] kmalloc_oob_right+0xb0/0x660 [ 17.715404] kunit_try_run_case+0x170/0x3f0 [ 17.715947] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.716505] kthread+0x318/0x620 [ 17.716913] ret_from_fork+0x10/0x20 [ 17.717325] [ 17.717760] The buggy address belongs to the object at fff00000c5a05000 [ 17.717760] which belongs to the cache kmalloc-128 of size 128 [ 17.719095] The buggy address is located 0 bytes to the right of [ 17.719095] allocated 115-byte region [fff00000c5a05000, fff00000c5a05073) [ 17.720123] [ 17.720680] The buggy address belongs to the physical page: [ 17.721678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a05 [ 17.722675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.723648] page_type: f5(slab) [ 17.724419] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.724986] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.725967] page dumped because: kasan: bad access detected [ 17.726645] [ 17.726981] Memory state around the buggy address: [ 17.727953] fff00000c5a04f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.728699] fff00000c5a04f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.729453] >fff00000c5a05000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.730023] ^ [ 17.730783] fff00000c5a05080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.731519] fff00000c5a05100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.732324] ================================================================== [ 17.761800] ================================================================== [ 17.762342] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 17.762982] Read of size 1 at addr fff00000c5a05080 by task kunit_try_catch/125 [ 17.763651] [ 17.763959] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 17.764158] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.764223] Hardware name: linux,dummy-virt (DT) [ 17.764299] Call trace: [ 17.764353] show_stack+0x20/0x38 (C) [ 17.764477] dump_stack_lvl+0x8c/0xd0 [ 17.764581] print_report+0x118/0x608 [ 17.764692] kasan_report+0xdc/0x128 [ 17.764823] __asan_report_load1_noabort+0x20/0x30 [ 17.764930] kmalloc_oob_right+0x5d0/0x660 [ 17.765032] kunit_try_run_case+0x170/0x3f0 [ 17.765097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.765151] kthread+0x318/0x620 [ 17.765197] ret_from_fork+0x10/0x20 [ 17.765249] [ 17.769334] Allocated by task 125: [ 17.769710] kasan_save_stack+0x3c/0x68 [ 17.770194] kasan_save_track+0x20/0x40 [ 17.770623] kasan_save_alloc_info+0x40/0x58 [ 17.771066] __kasan_kmalloc+0xd4/0xd8 [ 17.771434] __kmalloc_cache_noprof+0x15c/0x3c0 [ 17.771928] kmalloc_oob_right+0xb0/0x660 [ 17.772381] kunit_try_run_case+0x170/0x3f0 [ 17.772752] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.773348] kthread+0x318/0x620 [ 17.773781] ret_from_fork+0x10/0x20 [ 17.774236] [ 17.774465] The buggy address belongs to the object at fff00000c5a05000 [ 17.774465] which belongs to the cache kmalloc-128 of size 128 [ 17.775364] The buggy address is located 13 bytes to the right of [ 17.775364] allocated 115-byte region [fff00000c5a05000, fff00000c5a05073) [ 17.776378] [ 17.776610] The buggy address belongs to the physical page: [ 17.777183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a05 [ 17.777863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.778369] page_type: f5(slab) [ 17.778821] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.779437] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.779979] page dumped because: kasan: bad access detected [ 17.780394] [ 17.780648] Memory state around the buggy address: [ 17.781009] fff00000c5a04f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.781576] fff00000c5a05000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.782104] >fff00000c5a05080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.782721] ^ [ 17.783061] fff00000c5a05100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.783596] fff00000c5a05180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.784138] ==================================================================
Failure - log-parser-boot - internal-error-oops-oops-preempt-smp
KNOWN ISSUE - kunit_test_null_dereference internal oops on qemu-arm64 KUNIT KASAN
[ 101.206353] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP [ 101.207216] Modules linked in: [ 101.208470] CPU: 1 UID: 0 PID: 621 Comm: kunit_try_catch Tainted: G B N 6.14.7-rc1 #1 [ 101.209629] Tainted: [B]=BAD_PAGE, [N]=TEST [ 101.210219] Hardware name: linux,dummy-virt (DT) [ 101.210870] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 101.211528] pc : kunit_test_null_dereference+0x70/0x170 [ 101.212297] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 101.212848] sp : ffff8000834e7d30 [ 101.213298] x29: ffff8000834e7d90 x28: 0000000000000000 x27: 0000000000000000 [ 101.214236] x26: 1ffe000018c69221 x25: 0000000000000000 x24: fff00000c9a49900 [ 101.215240] x23: ffffac22043d8288 x22: ffffac22043e0e88 x21: fff00000c9a49908 [ 101.215925] x20: 1ffff0001069cfa6 x19: ffff800080087990 x18: ffffc1ffc3012700 [ 101.216569] x17: 0000000000000001 x16: fff00000da4ccd20 x15: 00000000dfcfe43c [ 101.217532] x14: 1ffe00001b499988 x13: fff00000da4ccd18 x12: fffd800018c59b3c [ 101.218387] x11: 1ffe000018c59b3b x10: fffd800018c59b3b x9 : ffffac22043d8310 [ 101.219387] x8 : ffff8000834e7c28 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 101.220224] x5 : ffff70001069cfa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 101.221041] x2 : dfff800000000000 x1 : fff00000c62cd100 x0 : ffff800080087990 [ 101.221916] Call trace: [ 101.222419] kunit_test_null_dereference+0x70/0x170 (P) [ 101.223224] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 101.223970] kthread+0x318/0x620 [ 101.224484] ret_from_fork+0x10/0x20 [ 101.225514] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 101.226569] ---[ end trace 0000000000000000 ]---