Date
June 2, 2025, 2:11 p.m.
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 19.204282] ================================================================== [ 19.204342] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 19.204752] Read of size 1 at addr fff00000c3f75873 by task kunit_try_catch/197 [ 19.204925] [ 19.204961] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 19.207434] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.207491] Hardware name: linux,dummy-virt (DT) [ 19.207524] Call trace: [ 19.207549] show_stack+0x20/0x38 (C) [ 19.207605] dump_stack_lvl+0x8c/0xd0 [ 19.207652] print_report+0x118/0x608 [ 19.207700] kasan_report+0xdc/0x128 [ 19.207746] __asan_report_load1_noabort+0x20/0x30 [ 19.207798] ksize_unpoisons_memory+0x628/0x740 [ 19.207849] kunit_try_run_case+0x170/0x3f0 [ 19.207900] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.207959] kthread+0x328/0x630 [ 19.208005] ret_from_fork+0x10/0x20 [ 19.208058] [ 19.208075] Allocated by task 197: [ 19.208105] kasan_save_stack+0x3c/0x68 [ 19.208143] kasan_save_track+0x20/0x40 [ 19.208180] kasan_save_alloc_info+0x40/0x58 [ 19.208219] __kasan_kmalloc+0xd4/0xd8 [ 19.208258] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.208300] ksize_unpoisons_memory+0xc0/0x740 [ 19.208342] kunit_try_run_case+0x170/0x3f0 [ 19.208393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.208439] kthread+0x328/0x630 [ 19.208474] ret_from_fork+0x10/0x20 [ 19.208511] [ 19.208531] The buggy address belongs to the object at fff00000c3f75800 [ 19.208531] which belongs to the cache kmalloc-128 of size 128 [ 19.208588] The buggy address is located 0 bytes to the right of [ 19.208588] allocated 115-byte region [fff00000c3f75800, fff00000c3f75873) [ 19.208652] [ 19.208671] The buggy address belongs to the physical page: [ 19.208702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75 [ 19.208755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.208803] page_type: f5(slab) [ 19.208843] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.208894] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.208936] page dumped because: kasan: bad access detected [ 19.208966] [ 19.208984] Memory state around the buggy address: [ 19.209016] fff00000c3f75700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.209059] fff00000c3f75780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.209104] >fff00000c3f75800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.209142] ^ [ 19.209182] fff00000c3f75880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.209225] fff00000c3f75900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.209265] ================================================================== [ 19.214928] ================================================================== [ 19.214995] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 19.215085] Read of size 1 at addr fff00000c3f7587f by task kunit_try_catch/197 [ 19.215180] [ 19.215208] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 19.215291] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.215320] Hardware name: linux,dummy-virt (DT) [ 19.215364] Call trace: [ 19.215415] show_stack+0x20/0x38 (C) [ 19.215469] dump_stack_lvl+0x8c/0xd0 [ 19.215518] print_report+0x118/0x608 [ 19.215563] kasan_report+0xdc/0x128 [ 19.215607] __asan_report_load1_noabort+0x20/0x30 [ 19.215681] ksize_unpoisons_memory+0x690/0x740 [ 19.215741] kunit_try_run_case+0x170/0x3f0 [ 19.215800] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.215867] kthread+0x328/0x630 [ 19.215912] ret_from_fork+0x10/0x20 [ 19.215985] [ 19.216005] Allocated by task 197: [ 19.216031] kasan_save_stack+0x3c/0x68 [ 19.216089] kasan_save_track+0x20/0x40 [ 19.216126] kasan_save_alloc_info+0x40/0x58 [ 19.216171] __kasan_kmalloc+0xd4/0xd8 [ 19.216207] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.216266] ksize_unpoisons_memory+0xc0/0x740 [ 19.216333] kunit_try_run_case+0x170/0x3f0 [ 19.216387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.216432] kthread+0x328/0x630 [ 19.216468] ret_from_fork+0x10/0x20 [ 19.216535] [ 19.216574] The buggy address belongs to the object at fff00000c3f75800 [ 19.216574] which belongs to the cache kmalloc-128 of size 128 [ 19.216670] The buggy address is located 12 bytes to the right of [ 19.216670] allocated 115-byte region [fff00000c3f75800, fff00000c3f75873) [ 19.216800] [ 19.216827] The buggy address belongs to the physical page: [ 19.216858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75 [ 19.216936] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.217155] page_type: f5(slab) [ 19.217226] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.217296] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.217471] page dumped because: kasan: bad access detected [ 19.217502] [ 19.217838] Memory state around the buggy address: [ 19.217903] fff00000c3f75700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.217960] fff00000c3f75780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.218003] >fff00000c3f75800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.218041] ^ [ 19.218083] fff00000c3f75880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.218133] fff00000c3f75900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.218181] ================================================================== [ 19.210020] ================================================================== [ 19.210069] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 19.210122] Read of size 1 at addr fff00000c3f75878 by task kunit_try_catch/197 [ 19.210172] [ 19.210201] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 19.210284] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.210313] Hardware name: linux,dummy-virt (DT) [ 19.210345] Call trace: [ 19.210386] show_stack+0x20/0x38 (C) [ 19.210434] dump_stack_lvl+0x8c/0xd0 [ 19.210483] print_report+0x118/0x608 [ 19.210714] kasan_report+0xdc/0x128 [ 19.210864] __asan_report_load1_noabort+0x20/0x30 [ 19.211145] ksize_unpoisons_memory+0x618/0x740 [ 19.211270] kunit_try_run_case+0x170/0x3f0 [ 19.211417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.211531] kthread+0x328/0x630 [ 19.211589] ret_from_fork+0x10/0x20 [ 19.211750] [ 19.211799] Allocated by task 197: [ 19.211828] kasan_save_stack+0x3c/0x68 [ 19.212050] kasan_save_track+0x20/0x40 [ 19.212208] kasan_save_alloc_info+0x40/0x58 [ 19.212308] __kasan_kmalloc+0xd4/0xd8 [ 19.212420] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.212532] ksize_unpoisons_memory+0xc0/0x740 [ 19.212620] kunit_try_run_case+0x170/0x3f0 [ 19.212787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.212895] kthread+0x328/0x630 [ 19.213058] ret_from_fork+0x10/0x20 [ 19.213165] [ 19.213186] The buggy address belongs to the object at fff00000c3f75800 [ 19.213186] which belongs to the cache kmalloc-128 of size 128 [ 19.213502] The buggy address is located 5 bytes to the right of [ 19.213502] allocated 115-byte region [fff00000c3f75800, fff00000c3f75873) [ 19.213580] [ 19.213600] The buggy address belongs to the physical page: [ 19.213630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75 [ 19.213682] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.213729] page_type: f5(slab) [ 19.213767] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.213818] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.213861] page dumped because: kasan: bad access detected [ 19.213892] [ 19.213911] Memory state around the buggy address: [ 19.213943] fff00000c3f75700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.213987] fff00000c3f75780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.214031] >fff00000c3f75800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.214069] ^ [ 19.214110] fff00000c3f75880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.214153] fff00000c3f75900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.214192] ==================================================================
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 20.846512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 20.874458] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 20.808880] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 20.746616] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 20.751701] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
Failure - log-parser-boot - internal-error-oops-oops-smp
[ 93.564301] Internal error: Oops: 0000000096000005 [#1] SMP [ 93.566837] Modules linked in: [ 93.567898] CPU: 0 UID: 0 PID: 535 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 93.569002] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 93.569689] Hardware name: linux,dummy-virt (DT) [ 93.570311] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 93.571169] pc : kunit_test_null_dereference+0x70/0x170 [ 93.571893] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 93.572652] sp : ffff800080f47d30 [ 93.573143] x29: ffff800080f47d90 x28: 0000000000000000 x27: 0000000000000000 [ 93.574096] x26: 1ffe0000191ab7c1 x25: 0000000000000000 x24: 0000000000000004 [ 93.575054] x23: fff00000c8d5be0c x22: ffffaf0a381fd6f8 x21: fff00000c1b54988 [ 93.576009] x20: 1ffff000101e8fa6 x19: ffff800080087990 x18: 00000000cc33d32c [ 93.576968] x17: 000000006cf43a8a x16: 0000000000000100 x15: 00000000a803bcc5 [ 93.577890] x14: 00000000421eb631 x13: 1ffe00001b4943d0 x12: fffd8000194ea8b4 [ 93.578646] x11: 1ffe0000194ea8b3 x10: fffd8000194ea8b3 x9 : ffffaf0a381f4b60 [ 93.579018] x8 : ffff800080f47c38 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 93.579372] x5 : ffff7000101e8fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 93.579714] x2 : dfff800000000000 x1 : fff00000ca753cc0 x0 : ffff800080087990 [ 93.580171] Call trace: [ 93.580321] kunit_test_null_dereference+0x70/0x170 (P) [ 93.580582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 93.580826] kthread+0x328/0x630 [ 93.581008] ret_from_fork+0x10/0x20 [ 93.581460] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 93.582048] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 50.874720] ================================================================== [ 50.874793] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 50.874793] [ 50.874880] Use-after-free read at 0x00000000747a06e1 (in kfence-#148): [ 50.874933] test_krealloc+0x51c/0x830 [ 50.874978] kunit_try_run_case+0x170/0x3f0 [ 50.875029] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.875079] kthread+0x328/0x630 [ 50.875121] ret_from_fork+0x10/0x20 [ 50.875162] [ 50.875187] kfence-#148: 0x00000000747a06e1-0x0000000083fbea9d, size=32, cache=kmalloc-32 [ 50.875187] [ 50.875244] allocated by task 340 on cpu 0 at 50.874072s (0.001169s ago): [ 50.875312] test_alloc+0x29c/0x628 [ 50.875370] test_krealloc+0xc0/0x830 [ 50.875411] kunit_try_run_case+0x170/0x3f0 [ 50.875453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.875501] kthread+0x328/0x630 [ 50.875542] ret_from_fork+0x10/0x20 [ 50.875582] [ 50.875606] freed by task 340 on cpu 0 at 50.874328s (0.001273s ago): [ 50.875670] krealloc_noprof+0x148/0x360 [ 50.875709] test_krealloc+0x1dc/0x830 [ 50.875748] kunit_try_run_case+0x170/0x3f0 [ 50.875792] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.875840] kthread+0x328/0x630 [ 50.875878] ret_from_fork+0x10/0x20 [ 50.875919] [ 50.875964] CPU: 0 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 50.876046] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 50.876079] Hardware name: linux,dummy-virt (DT) [ 50.876114] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 50.810273] ================================================================== [ 50.810395] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 50.810395] [ 50.810502] Use-after-free read at 0x000000007a8ba17f (in kfence-#147): [ 50.810558] test_memcache_typesafe_by_rcu+0x280/0x560 [ 50.810609] kunit_try_run_case+0x170/0x3f0 [ 50.810657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.810708] kthread+0x328/0x630 [ 50.810754] ret_from_fork+0x10/0x20 [ 50.810795] [ 50.810820] kfence-#147: 0x000000007a8ba17f-0x000000006e06b1d9, size=32, cache=test [ 50.810820] [ 50.810874] allocated by task 338 on cpu 0 at 50.769994s (0.040876s ago): [ 50.810942] test_alloc+0x230/0x628 [ 50.810983] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 50.811033] kunit_try_run_case+0x170/0x3f0 [ 50.811076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.811122] kthread+0x328/0x630 [ 50.811162] ret_from_fork+0x10/0x20 [ 50.811201] [ 50.811226] freed by task 338 on cpu 0 at 50.770110s (0.041112s ago): [ 50.811283] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 50.811328] kunit_try_run_case+0x170/0x3f0 [ 50.811378] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.811426] kthread+0x328/0x630 [ 50.811466] ret_from_fork+0x10/0x20 [ 50.811507] [ 50.811554] CPU: 0 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 50.811639] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 50.811670] Hardware name: linux,dummy-virt (DT) [ 50.811705] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 28.221916] ================================================================== [ 28.222076] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 28.222076] [ 28.222181] Invalid read at 0x000000003b6bd4ab: [ 28.222340] test_invalid_access+0xdc/0x1f0 [ 28.222416] kunit_try_run_case+0x170/0x3f0 [ 28.222540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.222704] kthread+0x328/0x630 [ 28.222753] ret_from_fork+0x10/0x20 [ 28.222807] [ 28.222860] CPU: 0 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 28.223082] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 28.223135] Hardware name: linux,dummy-virt (DT) [ 28.223176] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 27.994363] ================================================================== [ 27.994473] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 27.994473] [ 27.994541] Corrupted memory at 0x00000000e15985a2 [ ! . . . . . . . . . . . . . . . ] (in kfence-#143): [ 27.994855] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 27.994907] kunit_try_run_case+0x170/0x3f0 [ 27.994953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.995002] kthread+0x328/0x630 [ 27.995051] ret_from_fork+0x10/0x20 [ 27.995091] [ 27.995117] kfence-#143: 0x00000000bc74ad36-0x000000006f48aea1, size=73, cache=kmalloc-96 [ 27.995117] [ 27.995173] allocated by task 328 on cpu 0 at 27.994076s (0.001094s ago): [ 27.995239] test_alloc+0x29c/0x628 [ 27.995279] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 27.995324] kunit_try_run_case+0x170/0x3f0 [ 27.995378] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.995426] kthread+0x328/0x630 [ 27.995465] ret_from_fork+0x10/0x20 [ 27.995507] [ 27.995532] freed by task 328 on cpu 0 at 27.994240s (0.001287s ago): [ 27.995596] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 27.995640] kunit_try_run_case+0x170/0x3f0 [ 27.995683] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.995730] kthread+0x328/0x630 [ 27.995771] ret_from_fork+0x10/0x20 [ 27.995812] [ 27.995856] CPU: 0 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 27.995942] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.995974] Hardware name: linux,dummy-virt (DT) [ 27.996008] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 27.786141] ================================================================== [ 27.786243] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 27.786243] [ 27.786365] Out-of-bounds read at 0x00000000a7aa7b52 (105B right of kfence-#141): [ 27.786429] test_kmalloc_aligned_oob_read+0x238/0x468 [ 27.786481] kunit_try_run_case+0x170/0x3f0 [ 27.786531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.786580] kthread+0x328/0x630 [ 27.786624] ret_from_fork+0x10/0x20 [ 27.786666] [ 27.786692] kfence-#141: 0x000000003af2b35f-0x000000007ba8227b, size=73, cache=kmalloc-96 [ 27.786692] [ 27.786747] allocated by task 326 on cpu 0 at 27.785897s (0.000847s ago): [ 27.786819] test_alloc+0x29c/0x628 [ 27.786858] test_kmalloc_aligned_oob_read+0x100/0x468 [ 27.786904] kunit_try_run_case+0x170/0x3f0 [ 27.786949] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.786994] kthread+0x328/0x630 [ 27.787038] ret_from_fork+0x10/0x20 [ 27.787079] [ 27.787127] CPU: 0 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 27.787213] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.787245] Hardware name: linux,dummy-virt (DT) [ 27.787281] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[ 24.562066] ================================================================== [ 24.562163] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 24.562163] [ 24.562226] Corrupted memory at 0x00000000c917c6ff [ ! ] (in kfence-#110): [ 24.562342] test_corruption+0x1d8/0x378 [ 24.562404] kunit_try_run_case+0x170/0x3f0 [ 24.562450] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.562499] kthread+0x328/0x630 [ 24.562540] ret_from_fork+0x10/0x20 [ 24.562584] [ 24.562607] kfence-#110: 0x00000000fbb31a04-0x000000000e636871, size=32, cache=test [ 24.562607] [ 24.562662] allocated by task 316 on cpu 1 at 24.561915s (0.000743s ago): [ 24.562722] test_alloc+0x230/0x628 [ 24.562761] test_corruption+0x198/0x378 [ 24.562802] kunit_try_run_case+0x170/0x3f0 [ 24.562845] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.562891] kthread+0x328/0x630 [ 24.562930] ret_from_fork+0x10/0x20 [ 24.562971] [ 24.562996] freed by task 316 on cpu 1 at 24.561975s (0.001016s ago): [ 24.563063] test_corruption+0x1d8/0x378 [ 24.563103] kunit_try_run_case+0x170/0x3f0 [ 24.563147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.563193] kthread+0x328/0x630 [ 24.563236] ret_from_fork+0x10/0x20 [ 24.563280] [ 24.563323] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 24.563415] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.563447] Hardware name: linux,dummy-virt (DT) [ 24.563481] ================================================================== [ 23.834331] ================================================================== [ 23.834446] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 23.834446] [ 23.834509] Corrupted memory at 0x00000000e3bab0a0 [ ! ] (in kfence-#103): [ 23.834640] test_corruption+0x284/0x378 [ 23.834686] kunit_try_run_case+0x170/0x3f0 [ 23.834733] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.834781] kthread+0x328/0x630 [ 23.834823] ret_from_fork+0x10/0x20 [ 23.834866] [ 23.834889] kfence-#103: 0x000000005d1e4a7c-0x0000000017862f58, size=32, cache=kmalloc-32 [ 23.834889] [ 23.834945] allocated by task 314 on cpu 1 at 23.834028s (0.000913s ago): [ 23.835006] test_alloc+0x29c/0x628 [ 23.835056] test_corruption+0x198/0x378 [ 23.835095] kunit_try_run_case+0x170/0x3f0 [ 23.835139] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.835189] kthread+0x328/0x630 [ 23.835227] ret_from_fork+0x10/0x20 [ 23.835267] [ 23.835290] freed by task 314 on cpu 1 at 23.834138s (0.001148s ago): [ 23.835364] test_corruption+0x284/0x378 [ 23.835404] kunit_try_run_case+0x170/0x3f0 [ 23.835448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.835495] kthread+0x328/0x630 [ 23.835538] ret_from_fork+0x10/0x20 [ 23.835578] [ 23.835619] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 23.835701] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.835732] Hardware name: linux,dummy-virt (DT) [ 23.835767] ================================================================== [ 23.937981] ================================================================== [ 23.938073] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 23.938073] [ 23.938137] Corrupted memory at 0x000000004374d445 [ ! . . . . . . . . . . . . . . . ] (in kfence-#104): [ 23.938465] test_corruption+0x120/0x378 [ 23.938512] kunit_try_run_case+0x170/0x3f0 [ 23.938559] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.938607] kthread+0x328/0x630 [ 23.938651] ret_from_fork+0x10/0x20 [ 23.938693] [ 23.938717] kfence-#104: 0x000000004096955c-0x00000000f9946d54, size=32, cache=test [ 23.938717] [ 23.938773] allocated by task 316 on cpu 1 at 23.937833s (0.000937s ago): [ 23.938835] test_alloc+0x230/0x628 [ 23.938876] test_corruption+0xdc/0x378 [ 23.938914] kunit_try_run_case+0x170/0x3f0 [ 23.938955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.939002] kthread+0x328/0x630 [ 23.939048] ret_from_fork+0x10/0x20 [ 23.939088] [ 23.939111] freed by task 316 on cpu 1 at 23.937894s (0.001213s ago): [ 23.939172] test_corruption+0x120/0x378 [ 23.939213] kunit_try_run_case+0x170/0x3f0 [ 23.939254] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.939301] kthread+0x328/0x630 [ 23.939339] ret_from_fork+0x10/0x20 [ 23.939389] [ 23.939431] CPU: 1 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 23.939510] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.939542] Hardware name: linux,dummy-virt (DT) [ 23.939575] ================================================================== [ 23.626994] ================================================================== [ 23.627110] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 23.627110] [ 23.627179] Corrupted memory at 0x00000000206bc285 [ ! . . . . . . . . . . . . . . . ] (in kfence-#101): [ 23.627632] test_corruption+0x278/0x378 [ 23.627683] kunit_try_run_case+0x170/0x3f0 [ 23.627733] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.627782] kthread+0x328/0x630 [ 23.627826] ret_from_fork+0x10/0x20 [ 23.627868] [ 23.627895] kfence-#101: 0x00000000477696e3-0x000000006c5861ac, size=32, cache=kmalloc-32 [ 23.627895] [ 23.627954] allocated by task 314 on cpu 1 at 23.626699s (0.001252s ago): [ 23.628017] test_alloc+0x29c/0x628 [ 23.628057] test_corruption+0xdc/0x378 [ 23.628098] kunit_try_run_case+0x170/0x3f0 [ 23.628140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.628187] kthread+0x328/0x630 [ 23.628227] ret_from_fork+0x10/0x20 [ 23.628267] [ 23.628291] freed by task 314 on cpu 1 at 23.626809s (0.001478s ago): [ 23.628365] test_corruption+0x278/0x378 [ 23.628406] kunit_try_run_case+0x170/0x3f0 [ 23.628449] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.628498] kthread+0x328/0x630 [ 23.628537] ret_from_fork+0x10/0x20 [ 23.628575] [ 23.628619] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 23.628702] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.628739] Hardware name: linux,dummy-virt (DT) [ 23.628774] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 23.522059] ================================================================== [ 23.522155] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 23.522155] [ 23.522219] Invalid free of 0x00000000035fa39e (in kfence-#100): [ 23.522273] test_invalid_addr_free+0xec/0x238 [ 23.522320] kunit_try_run_case+0x170/0x3f0 [ 23.522385] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.522433] kthread+0x328/0x630 [ 23.522478] ret_from_fork+0x10/0x20 [ 23.522521] [ 23.522547] kfence-#100: 0x00000000642f41dc-0x000000001bf7c2ab, size=32, cache=test [ 23.522547] [ 23.522602] allocated by task 312 on cpu 0 at 23.521925s (0.000673s ago): [ 23.522665] test_alloc+0x230/0x628 [ 23.522705] test_invalid_addr_free+0xd4/0x238 [ 23.522747] kunit_try_run_case+0x170/0x3f0 [ 23.522790] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.522837] kthread+0x328/0x630 [ 23.522878] ret_from_fork+0x10/0x20 [ 23.522918] [ 23.522963] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 23.523051] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.523083] Hardware name: linux,dummy-virt (DT) [ 23.523115] ================================================================== [ 23.418069] ================================================================== [ 23.418164] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 23.418164] [ 23.418228] Invalid free of 0x00000000deba894b (in kfence-#99): [ 23.418284] test_invalid_addr_free+0x1ac/0x238 [ 23.418333] kunit_try_run_case+0x170/0x3f0 [ 23.418396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.418444] kthread+0x328/0x630 [ 23.418489] ret_from_fork+0x10/0x20 [ 23.418530] [ 23.418555] kfence-#99: 0x0000000072609a7b-0x00000000cb1bbd59, size=32, cache=kmalloc-32 [ 23.418555] [ 23.418613] allocated by task 310 on cpu 0 at 23.417908s (0.000701s ago): [ 23.418676] test_alloc+0x29c/0x628 [ 23.418717] test_invalid_addr_free+0xd4/0x238 [ 23.418760] kunit_try_run_case+0x170/0x3f0 [ 23.418803] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.418851] kthread+0x328/0x630 [ 23.418890] ret_from_fork+0x10/0x20 [ 23.418932] [ 23.418980] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 23.419071] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.419104] Hardware name: linux,dummy-virt (DT) [ 23.419138] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[ 23.314056] ================================================================== [ 23.314147] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 23.314147] [ 23.314207] Invalid free of 0x000000008a9850cf (in kfence-#98): [ 23.314258] test_double_free+0x100/0x238 [ 23.314303] kunit_try_run_case+0x170/0x3f0 [ 23.314367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.314414] kthread+0x328/0x630 [ 23.314459] ret_from_fork+0x10/0x20 [ 23.314500] [ 23.314525] kfence-#98: 0x000000008a9850cf-0x000000004a2bfa56, size=32, cache=test [ 23.314525] [ 23.314580] allocated by task 308 on cpu 1 at 23.313863s (0.000713s ago): [ 23.314644] test_alloc+0x230/0x628 [ 23.314683] test_double_free+0xd4/0x238 [ 23.314724] kunit_try_run_case+0x170/0x3f0 [ 23.314765] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.314812] kthread+0x328/0x630 [ 23.314851] ret_from_fork+0x10/0x20 [ 23.314892] [ 23.314916] freed by task 308 on cpu 1 at 23.313921s (0.000991s ago): [ 23.314977] test_double_free+0xf0/0x238 [ 23.315022] kunit_try_run_case+0x170/0x3f0 [ 23.315065] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.315112] kthread+0x328/0x630 [ 23.315150] ret_from_fork+0x10/0x20 [ 23.315191] [ 23.315233] CPU: 1 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 23.315315] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.315345] Hardware name: linux,dummy-virt (DT) [ 23.315390] ================================================================== [ 23.210221] ================================================================== [ 23.210337] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 23.210337] [ 23.210426] Invalid free of 0x000000002729b025 (in kfence-#97): [ 23.210492] test_double_free+0x1bc/0x238 [ 23.210539] kunit_try_run_case+0x170/0x3f0 [ 23.210585] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.210633] kthread+0x328/0x630 [ 23.210675] ret_from_fork+0x10/0x20 [ 23.210716] [ 23.210743] kfence-#97: 0x000000002729b025-0x00000000cdf87e45, size=32, cache=kmalloc-32 [ 23.210743] [ 23.210800] allocated by task 306 on cpu 1 at 23.209910s (0.000885s ago): [ 23.210863] test_alloc+0x29c/0x628 [ 23.210904] test_double_free+0xd4/0x238 [ 23.210945] kunit_try_run_case+0x170/0x3f0 [ 23.210987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.211042] kthread+0x328/0x630 [ 23.211083] ret_from_fork+0x10/0x20 [ 23.211122] [ 23.211145] freed by task 306 on cpu 1 at 23.209981s (0.001161s ago): [ 23.211210] test_double_free+0x1ac/0x238 [ 23.211251] kunit_try_run_case+0x170/0x3f0 [ 23.211294] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.211342] kthread+0x328/0x630 [ 23.211393] ret_from_fork+0x10/0x20 [ 23.211434] [ 23.211482] CPU: 1 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 23.211568] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.211600] Hardware name: linux,dummy-virt (DT) [ 23.211635] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 22.795823] ================================================================== [ 22.795940] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 22.795940] [ 22.796375] Use-after-free read at 0x000000007dac9cc9 (in kfence-#93): [ 22.796451] test_use_after_free_read+0x114/0x248 [ 22.796663] kunit_try_run_case+0x170/0x3f0 [ 22.796730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.796827] kthread+0x328/0x630 [ 22.796886] ret_from_fork+0x10/0x20 [ 22.796929] [ 22.797070] kfence-#93: 0x000000007dac9cc9-0x00000000fccb9c80, size=32, cache=kmalloc-32 [ 22.797070] [ 22.797152] allocated by task 298 on cpu 0 at 22.794725s (0.002410s ago): [ 22.797237] test_alloc+0x29c/0x628 [ 22.797280] test_use_after_free_read+0xd0/0x248 [ 22.797334] kunit_try_run_case+0x170/0x3f0 [ 22.797781] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.798502] kthread+0x328/0x630 [ 22.798840] ret_from_fork+0x10/0x20 [ 22.798920] [ 22.799541] freed by task 298 on cpu 0 at 22.795164s (0.004244s ago): [ 22.799689] test_use_after_free_read+0x1c0/0x248 [ 22.799774] kunit_try_run_case+0x170/0x3f0 [ 22.799826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.799885] kthread+0x328/0x630 [ 22.799943] ret_from_fork+0x10/0x20 [ 22.800009] [ 22.800077] CPU: 0 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 22.800170] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 22.800211] Hardware name: linux,dummy-virt (DT) [ 22.800247] ================================================================== [ 22.900062] ================================================================== [ 22.900141] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 22.900141] [ 22.900231] Use-after-free read at 0x00000000f1efe5a8 (in kfence-#94): [ 22.900520] test_use_after_free_read+0x114/0x248 [ 22.900749] kunit_try_run_case+0x170/0x3f0 [ 22.900803] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.900859] kthread+0x328/0x630 [ 22.900958] ret_from_fork+0x10/0x20 [ 22.901124] [ 22.901268] kfence-#94: 0x00000000f1efe5a8-0x000000007c598985, size=32, cache=test [ 22.901268] [ 22.901409] allocated by task 300 on cpu 0 at 22.899520s (0.001865s ago): [ 22.901716] test_alloc+0x230/0x628 [ 22.901942] test_use_after_free_read+0xd0/0x248 [ 22.902153] kunit_try_run_case+0x170/0x3f0 [ 22.902307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.902815] kthread+0x328/0x630 [ 22.902914] ret_from_fork+0x10/0x20 [ 22.903075] [ 22.903152] freed by task 300 on cpu 0 at 22.899865s (0.003268s ago): [ 22.903656] test_use_after_free_read+0xf0/0x248 [ 22.903748] kunit_try_run_case+0x170/0x3f0 [ 22.903846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.903897] kthread+0x328/0x630 [ 22.904451] ret_from_fork+0x10/0x20 [ 22.904520] [ 22.904798] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 22.905117] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 22.905251] Hardware name: linux,dummy-virt (DT) [ 22.905321] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 22.691559] ================================================================== [ 22.691662] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 22.691662] [ 22.692065] Out-of-bounds write at 0x00000000ce04b6bb (1B left of kfence-#92): [ 22.692139] test_out_of_bounds_write+0x100/0x240 [ 22.692191] kunit_try_run_case+0x170/0x3f0 [ 22.692250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.692300] kthread+0x328/0x630 [ 22.692343] ret_from_fork+0x10/0x20 [ 22.692399] [ 22.692425] kfence-#92: 0x00000000a0452051-0x000000005acc513b, size=32, cache=test [ 22.692425] [ 22.692847] allocated by task 296 on cpu 0 at 22.691114s (0.001691s ago): [ 22.692936] test_alloc+0x230/0x628 [ 22.692980] test_out_of_bounds_write+0xc8/0x240 [ 22.693032] kunit_try_run_case+0x170/0x3f0 [ 22.693335] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.693473] kthread+0x328/0x630 [ 22.693519] ret_from_fork+0x10/0x20 [ 22.693568] [ 22.693745] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 22.694307] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 22.694426] Hardware name: linux,dummy-virt (DT) [ 22.694532] ================================================================== [ 22.587199] ================================================================== [ 22.587752] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 22.587752] [ 22.587939] Out-of-bounds write at 0x000000001b9cb504 (1B left of kfence-#91): [ 22.588022] test_out_of_bounds_write+0x100/0x240 [ 22.588128] kunit_try_run_case+0x170/0x3f0 [ 22.588410] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.588483] kthread+0x328/0x630 [ 22.588868] ret_from_fork+0x10/0x20 [ 22.588938] [ 22.589045] kfence-#91: 0x00000000e441684f-0x00000000d503a72e, size=32, cache=kmalloc-32 [ 22.589045] [ 22.589421] allocated by task 294 on cpu 0 at 22.587004s (0.002367s ago): [ 22.589625] test_alloc+0x29c/0x628 [ 22.589691] test_out_of_bounds_write+0xc8/0x240 [ 22.589816] kunit_try_run_case+0x170/0x3f0 [ 22.589871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.589926] kthread+0x328/0x630 [ 22.589966] ret_from_fork+0x10/0x20 [ 22.590222] [ 22.590605] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 22.590897] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 22.590957] Hardware name: linux,dummy-virt (DT) [ 22.591315] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 22.275693] ================================================================== [ 22.275793] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 22.275793] [ 22.276041] Out-of-bounds read at 0x000000004227ce04 (1B left of kfence-#88): [ 22.276103] test_out_of_bounds_read+0x114/0x3e0 [ 22.276169] kunit_try_run_case+0x170/0x3f0 [ 22.276598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.276667] kthread+0x328/0x630 [ 22.276715] ret_from_fork+0x10/0x20 [ 22.276795] [ 22.276826] kfence-#88: 0x00000000a912b1f8-0x00000000f79150a5, size=32, cache=test [ 22.276826] [ 22.276906] allocated by task 292 on cpu 0 at 22.275432s (0.001463s ago): [ 22.277400] test_alloc+0x230/0x628 [ 22.277766] test_out_of_bounds_read+0xdc/0x3e0 [ 22.277835] kunit_try_run_case+0x170/0x3f0 [ 22.278288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.278658] kthread+0x328/0x630 [ 22.278847] ret_from_fork+0x10/0x20 [ 22.278919] [ 22.279004] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 22.279823] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 22.279885] Hardware name: linux,dummy-virt (DT) [ 22.280331] ================================================================== [ 21.652091] ================================================================== [ 21.652327] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 21.652327] [ 21.652768] Out-of-bounds read at 0x000000008108b6c5 (1B left of kfence-#82): [ 21.653015] test_out_of_bounds_read+0x114/0x3e0 [ 21.653074] kunit_try_run_case+0x170/0x3f0 [ 21.653122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.653170] kthread+0x328/0x630 [ 21.653212] ret_from_fork+0x10/0x20 [ 21.653255] [ 21.653441] kfence-#82: 0x00000000d0e8dd57-0x00000000f02c3e86, size=32, cache=kmalloc-32 [ 21.653441] [ 21.654044] allocated by task 290 on cpu 0 at 21.650302s (0.003494s ago): [ 21.654885] test_alloc+0x29c/0x628 [ 21.654980] test_out_of_bounds_read+0xdc/0x3e0 [ 21.655037] kunit_try_run_case+0x170/0x3f0 [ 21.655081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.655151] kthread+0x328/0x630 [ 21.655192] ret_from_fork+0x10/0x20 [ 21.655288] [ 21.655429] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.655657] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.655696] Hardware name: linux,dummy-virt (DT) [ 21.655887] ================================================================== [ 22.379063] ================================================================== [ 22.379158] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 22.379158] [ 22.379252] Out-of-bounds read at 0x00000000ef087641 (32B right of kfence-#89): [ 22.379312] test_out_of_bounds_read+0x1c8/0x3e0 [ 22.379383] kunit_try_run_case+0x170/0x3f0 [ 22.379435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.379698] kthread+0x328/0x630 [ 22.379953] ret_from_fork+0x10/0x20 [ 22.380402] [ 22.380558] kfence-#89: 0x00000000e7da6a85-0x00000000fc0a8b87, size=32, cache=test [ 22.380558] [ 22.380623] allocated by task 292 on cpu 0 at 22.378955s (0.001663s ago): [ 22.380696] test_alloc+0x230/0x628 [ 22.380951] test_out_of_bounds_read+0x198/0x3e0 [ 22.381067] kunit_try_run_case+0x170/0x3f0 [ 22.381142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.381646] kthread+0x328/0x630 [ 22.381776] ret_from_fork+0x10/0x20 [ 22.381838] [ 22.382246] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 22.382369] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 22.382703] Hardware name: linux,dummy-virt (DT) [ 22.382841] ================================================================== [ 21.754841] ================================================================== [ 21.755150] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 21.755150] [ 21.755275] Out-of-bounds read at 0x0000000041f0a6ff (32B right of kfence-#83): [ 21.755474] test_out_of_bounds_read+0x1c8/0x3e0 [ 21.755531] kunit_try_run_case+0x170/0x3f0 [ 21.755578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.755784] kthread+0x328/0x630 [ 21.755860] ret_from_fork+0x10/0x20 [ 21.755905] [ 21.755933] kfence-#83: 0x00000000c0812c2f-0x0000000085b31b41, size=32, cache=kmalloc-32 [ 21.755933] [ 21.756158] allocated by task 290 on cpu 0 at 21.754613s (0.001537s ago): [ 21.756372] test_alloc+0x29c/0x628 [ 21.756429] test_out_of_bounds_read+0x198/0x3e0 [ 21.756481] kunit_try_run_case+0x170/0x3f0 [ 21.756532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.756595] kthread+0x328/0x630 [ 21.756635] ret_from_fork+0x10/0x20 [ 21.757586] [ 21.757791] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.759437] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.759478] Hardware name: linux,dummy-virt (DT) [ 21.759513] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 21.449277] ================================================================== [ 21.449412] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 21.449479] Write of size 121 at addr fff00000c3f9e800 by task kunit_try_catch/288 [ 21.449884] [ 21.450011] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.450185] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.450271] Hardware name: linux,dummy-virt (DT) [ 21.450447] Call trace: [ 21.450571] show_stack+0x20/0x38 (C) [ 21.450627] dump_stack_lvl+0x8c/0xd0 [ 21.450681] print_report+0x118/0x608 [ 21.450732] kasan_report+0xdc/0x128 [ 21.450780] kasan_check_range+0x100/0x1a8 [ 21.451066] __kasan_check_write+0x20/0x30 [ 21.451238] strncpy_from_user+0x3c/0x2a0 [ 21.451366] copy_user_test_oob+0x5c0/0xec8 [ 21.451474] kunit_try_run_case+0x170/0x3f0 [ 21.451644] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.451771] kthread+0x328/0x630 [ 21.451920] ret_from_fork+0x10/0x20 [ 21.451972] [ 21.452006] Allocated by task 288: [ 21.452090] kasan_save_stack+0x3c/0x68 [ 21.452207] kasan_save_track+0x20/0x40 [ 21.452291] kasan_save_alloc_info+0x40/0x58 [ 21.452861] __kasan_kmalloc+0xd4/0xd8 [ 21.452949] __kmalloc_noprof+0x198/0x4c8 [ 21.453006] kunit_kmalloc_array+0x34/0x88 [ 21.453050] copy_user_test_oob+0xac/0xec8 [ 21.453089] kunit_try_run_case+0x170/0x3f0 [ 21.453133] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.453578] kthread+0x328/0x630 [ 21.453829] ret_from_fork+0x10/0x20 [ 21.454081] [ 21.454389] The buggy address belongs to the object at fff00000c3f9e800 [ 21.454389] which belongs to the cache kmalloc-128 of size 128 [ 21.454482] The buggy address is located 0 bytes inside of [ 21.454482] allocated 120-byte region [fff00000c3f9e800, fff00000c3f9e878) [ 21.454730] [ 21.454779] The buggy address belongs to the physical page: [ 21.454864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9e [ 21.454928] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.455147] page_type: f5(slab) [ 21.455227] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.455282] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.455902] page dumped because: kasan: bad access detected [ 21.456009] [ 21.456031] Memory state around the buggy address: [ 21.456144] fff00000c3f9e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.456196] fff00000c3f9e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.456447] >fff00000c3f9e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.456494] ^ [ 21.456590] fff00000c3f9e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.456908] fff00000c3f9e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.456966] ================================================================== [ 21.458405] ================================================================== [ 21.458456] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 21.458509] Write of size 1 at addr fff00000c3f9e878 by task kunit_try_catch/288 [ 21.458563] [ 21.458596] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.458686] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.458727] Hardware name: linux,dummy-virt (DT) [ 21.458896] Call trace: [ 21.459017] show_stack+0x20/0x38 (C) [ 21.459103] dump_stack_lvl+0x8c/0xd0 [ 21.459343] print_report+0x118/0x608 [ 21.459862] kasan_report+0xdc/0x128 [ 21.460390] __asan_report_store1_noabort+0x20/0x30 [ 21.460641] strncpy_from_user+0x270/0x2a0 [ 21.460722] copy_user_test_oob+0x5c0/0xec8 [ 21.460773] kunit_try_run_case+0x170/0x3f0 [ 21.460827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.460886] kthread+0x328/0x630 [ 21.460934] ret_from_fork+0x10/0x20 [ 21.461265] [ 21.461506] Allocated by task 288: [ 21.461989] kasan_save_stack+0x3c/0x68 [ 21.462135] kasan_save_track+0x20/0x40 [ 21.462285] kasan_save_alloc_info+0x40/0x58 [ 21.462419] __kasan_kmalloc+0xd4/0xd8 [ 21.462467] __kmalloc_noprof+0x198/0x4c8 [ 21.462507] kunit_kmalloc_array+0x34/0x88 [ 21.462603] copy_user_test_oob+0xac/0xec8 [ 21.462643] kunit_try_run_case+0x170/0x3f0 [ 21.462685] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.462968] kthread+0x328/0x630 [ 21.463016] ret_from_fork+0x10/0x20 [ 21.463057] [ 21.463080] The buggy address belongs to the object at fff00000c3f9e800 [ 21.463080] which belongs to the cache kmalloc-128 of size 128 [ 21.463154] The buggy address is located 0 bytes to the right of [ 21.463154] allocated 120-byte region [fff00000c3f9e800, fff00000c3f9e878) [ 21.463542] [ 21.463617] The buggy address belongs to the physical page: [ 21.463654] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9e [ 21.464159] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.464455] page_type: f5(slab) [ 21.464622] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.464718] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.464788] page dumped because: kasan: bad access detected [ 21.464928] [ 21.464986] Memory state around the buggy address: [ 21.465022] fff00000c3f9e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.465102] fff00000c3f9e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.465191] >fff00000c3f9e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.465333] ^ [ 21.465384] fff00000c3f9e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.465429] fff00000c3f9e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.465509] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 21.408731] ================================================================== [ 21.408821] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 21.408882] Read of size 121 at addr fff00000c3f9e800 by task kunit_try_catch/288 [ 21.409201] [ 21.409382] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.409487] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.409665] Hardware name: linux,dummy-virt (DT) [ 21.409950] Call trace: [ 21.409989] show_stack+0x20/0x38 (C) [ 21.410066] dump_stack_lvl+0x8c/0xd0 [ 21.410377] print_report+0x118/0x608 [ 21.410501] kasan_report+0xdc/0x128 [ 21.410659] kasan_check_range+0x100/0x1a8 [ 21.410906] __kasan_check_read+0x20/0x30 [ 21.411083] copy_user_test_oob+0x728/0xec8 [ 21.411251] kunit_try_run_case+0x170/0x3f0 [ 21.411542] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.411724] kthread+0x328/0x630 [ 21.412034] ret_from_fork+0x10/0x20 [ 21.412282] [ 21.412505] Allocated by task 288: [ 21.412653] kasan_save_stack+0x3c/0x68 [ 21.412829] kasan_save_track+0x20/0x40 [ 21.413083] kasan_save_alloc_info+0x40/0x58 [ 21.413318] __kasan_kmalloc+0xd4/0xd8 [ 21.413442] __kmalloc_noprof+0x198/0x4c8 [ 21.413483] kunit_kmalloc_array+0x34/0x88 [ 21.413803] copy_user_test_oob+0xac/0xec8 [ 21.414001] kunit_try_run_case+0x170/0x3f0 [ 21.414167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.414230] kthread+0x328/0x630 [ 21.414277] ret_from_fork+0x10/0x20 [ 21.414641] [ 21.414865] The buggy address belongs to the object at fff00000c3f9e800 [ 21.414865] which belongs to the cache kmalloc-128 of size 128 [ 21.415143] The buggy address is located 0 bytes inside of [ 21.415143] allocated 120-byte region [fff00000c3f9e800, fff00000c3f9e878) [ 21.415286] [ 21.415310] The buggy address belongs to the physical page: [ 21.415520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9e [ 21.415666] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.415864] page_type: f5(slab) [ 21.415912] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.416153] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.416300] page dumped because: kasan: bad access detected [ 21.416397] [ 21.416429] Memory state around the buggy address: [ 21.416467] fff00000c3f9e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.416699] fff00000c3f9e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.416902] >fff00000c3f9e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.417067] ^ [ 21.417216] fff00000c3f9e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.417308] fff00000c3f9e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.417491] ================================================================== [ 21.392854] ================================================================== [ 21.393278] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 21.393488] Write of size 121 at addr fff00000c3f9e800 by task kunit_try_catch/288 [ 21.393691] [ 21.393831] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.394156] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.394310] Hardware name: linux,dummy-virt (DT) [ 21.394435] Call trace: [ 21.394627] show_stack+0x20/0x38 (C) [ 21.394836] dump_stack_lvl+0x8c/0xd0 [ 21.395105] print_report+0x118/0x608 [ 21.395365] kasan_report+0xdc/0x128 [ 21.395531] kasan_check_range+0x100/0x1a8 [ 21.395665] __kasan_check_write+0x20/0x30 [ 21.395825] copy_user_test_oob+0x234/0xec8 [ 21.396060] kunit_try_run_case+0x170/0x3f0 [ 21.396251] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.396414] kthread+0x328/0x630 [ 21.396552] ret_from_fork+0x10/0x20 [ 21.396806] [ 21.396906] Allocated by task 288: [ 21.397071] kasan_save_stack+0x3c/0x68 [ 21.397157] kasan_save_track+0x20/0x40 [ 21.397390] kasan_save_alloc_info+0x40/0x58 [ 21.397517] __kasan_kmalloc+0xd4/0xd8 [ 21.397795] __kmalloc_noprof+0x198/0x4c8 [ 21.398015] kunit_kmalloc_array+0x34/0x88 [ 21.398068] copy_user_test_oob+0xac/0xec8 [ 21.398107] kunit_try_run_case+0x170/0x3f0 [ 21.398150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.398686] kthread+0x328/0x630 [ 21.398894] ret_from_fork+0x10/0x20 [ 21.399130] [ 21.399213] The buggy address belongs to the object at fff00000c3f9e800 [ 21.399213] which belongs to the cache kmalloc-128 of size 128 [ 21.399308] The buggy address is located 0 bytes inside of [ 21.399308] allocated 120-byte region [fff00000c3f9e800, fff00000c3f9e878) [ 21.399498] [ 21.399602] The buggy address belongs to the physical page: [ 21.399759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9e [ 21.399977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.400125] page_type: f5(slab) [ 21.400323] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.400535] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.400734] page dumped because: kasan: bad access detected [ 21.400806] [ 21.400827] Memory state around the buggy address: [ 21.401085] fff00000c3f9e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.401147] fff00000c3f9e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.401451] >fff00000c3f9e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.401551] ^ [ 21.401730] fff00000c3f9e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.401942] fff00000c3f9e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.402052] ================================================================== [ 21.442321] ================================================================== [ 21.442390] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 21.442473] Read of size 121 at addr fff00000c3f9e800 by task kunit_try_catch/288 [ 21.442527] [ 21.442779] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.442882] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.442915] Hardware name: linux,dummy-virt (DT) [ 21.442947] Call trace: [ 21.443105] show_stack+0x20/0x38 (C) [ 21.443172] dump_stack_lvl+0x8c/0xd0 [ 21.443227] print_report+0x118/0x608 [ 21.443321] kasan_report+0xdc/0x128 [ 21.443496] kasan_check_range+0x100/0x1a8 [ 21.443683] __kasan_check_read+0x20/0x30 [ 21.443835] copy_user_test_oob+0x4a0/0xec8 [ 21.443888] kunit_try_run_case+0x170/0x3f0 [ 21.443940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.444015] kthread+0x328/0x630 [ 21.444223] ret_from_fork+0x10/0x20 [ 21.444376] [ 21.444559] Allocated by task 288: [ 21.444840] kasan_save_stack+0x3c/0x68 [ 21.444963] kasan_save_track+0x20/0x40 [ 21.445050] kasan_save_alloc_info+0x40/0x58 [ 21.445095] __kasan_kmalloc+0xd4/0xd8 [ 21.445213] __kmalloc_noprof+0x198/0x4c8 [ 21.445297] kunit_kmalloc_array+0x34/0x88 [ 21.445371] copy_user_test_oob+0xac/0xec8 [ 21.445416] kunit_try_run_case+0x170/0x3f0 [ 21.445458] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.445518] kthread+0x328/0x630 [ 21.445556] ret_from_fork+0x10/0x20 [ 21.445595] [ 21.445617] The buggy address belongs to the object at fff00000c3f9e800 [ 21.445617] which belongs to the cache kmalloc-128 of size 128 [ 21.445934] The buggy address is located 0 bytes inside of [ 21.445934] allocated 120-byte region [fff00000c3f9e800, fff00000c3f9e878) [ 21.446114] [ 21.446289] The buggy address belongs to the physical page: [ 21.446386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9e [ 21.446464] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.446522] page_type: f5(slab) [ 21.446736] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.446909] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.447095] page dumped because: kasan: bad access detected [ 21.447182] [ 21.447466] Memory state around the buggy address: [ 21.447575] fff00000c3f9e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.447723] fff00000c3f9e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.447827] >fff00000c3f9e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.447907] ^ [ 21.447994] fff00000c3f9e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.448039] fff00000c3f9e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.448326] ================================================================== [ 21.430294] ================================================================== [ 21.430363] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 21.430416] Read of size 121 at addr fff00000c3f9e800 by task kunit_try_catch/288 [ 21.430469] [ 21.430500] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.430587] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.430620] Hardware name: linux,dummy-virt (DT) [ 21.430652] Call trace: [ 21.430677] show_stack+0x20/0x38 (C) [ 21.430726] dump_stack_lvl+0x8c/0xd0 [ 21.430776] print_report+0x118/0x608 [ 21.430825] kasan_report+0xdc/0x128 [ 21.430873] kasan_check_range+0x100/0x1a8 [ 21.430923] __kasan_check_read+0x20/0x30 [ 21.430973] copy_user_test_oob+0x3c8/0xec8 [ 21.431028] kunit_try_run_case+0x170/0x3f0 [ 21.431078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.431136] kthread+0x328/0x630 [ 21.431184] ret_from_fork+0x10/0x20 [ 21.431235] [ 21.431256] Allocated by task 288: [ 21.431287] kasan_save_stack+0x3c/0x68 [ 21.431328] kasan_save_track+0x20/0x40 [ 21.433690] kasan_save_alloc_info+0x40/0x58 [ 21.433776] __kasan_kmalloc+0xd4/0xd8 [ 21.433817] __kmalloc_noprof+0x198/0x4c8 [ 21.433856] kunit_kmalloc_array+0x34/0x88 [ 21.433899] copy_user_test_oob+0xac/0xec8 [ 21.433938] kunit_try_run_case+0x170/0x3f0 [ 21.433981] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.434030] kthread+0x328/0x630 [ 21.434069] ret_from_fork+0x10/0x20 [ 21.434109] [ 21.434134] The buggy address belongs to the object at fff00000c3f9e800 [ 21.434134] which belongs to the cache kmalloc-128 of size 128 [ 21.434192] The buggy address is located 0 bytes inside of [ 21.434192] allocated 120-byte region [fff00000c3f9e800, fff00000c3f9e878) [ 21.434257] [ 21.434281] The buggy address belongs to the physical page: [ 21.434314] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9e [ 21.434378] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.434628] page_type: f5(slab) [ 21.434916] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.435131] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.435308] page dumped because: kasan: bad access detected [ 21.435406] [ 21.435438] Memory state around the buggy address: [ 21.435477] fff00000c3f9e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.435524] fff00000c3f9e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.435571] >fff00000c3f9e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.435613] ^ [ 21.435779] fff00000c3f9e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.435834] fff00000c3f9e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.435976] ================================================================== [ 21.436843] ================================================================== [ 21.436893] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 21.436946] Write of size 121 at addr fff00000c3f9e800 by task kunit_try_catch/288 [ 21.436998] [ 21.437030] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.437135] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.437178] Hardware name: linux,dummy-virt (DT) [ 21.437212] Call trace: [ 21.437236] show_stack+0x20/0x38 (C) [ 21.437285] dump_stack_lvl+0x8c/0xd0 [ 21.437359] print_report+0x118/0x608 [ 21.437408] kasan_report+0xdc/0x128 [ 21.437457] kasan_check_range+0x100/0x1a8 [ 21.437508] __kasan_check_write+0x20/0x30 [ 21.437574] copy_user_test_oob+0x434/0xec8 [ 21.437625] kunit_try_run_case+0x170/0x3f0 [ 21.437676] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.437734] kthread+0x328/0x630 [ 21.437783] ret_from_fork+0x10/0x20 [ 21.437833] [ 21.437855] Allocated by task 288: [ 21.437884] kasan_save_stack+0x3c/0x68 [ 21.437935] kasan_save_track+0x20/0x40 [ 21.437975] kasan_save_alloc_info+0x40/0x58 [ 21.438026] __kasan_kmalloc+0xd4/0xd8 [ 21.438065] __kmalloc_noprof+0x198/0x4c8 [ 21.438105] kunit_kmalloc_array+0x34/0x88 [ 21.438146] copy_user_test_oob+0xac/0xec8 [ 21.438187] kunit_try_run_case+0x170/0x3f0 [ 21.438229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.438289] kthread+0x328/0x630 [ 21.438327] ret_from_fork+0x10/0x20 [ 21.439158] [ 21.439267] The buggy address belongs to the object at fff00000c3f9e800 [ 21.439267] which belongs to the cache kmalloc-128 of size 128 [ 21.439398] The buggy address is located 0 bytes inside of [ 21.439398] allocated 120-byte region [fff00000c3f9e800, fff00000c3f9e878) [ 21.439567] [ 21.439706] The buggy address belongs to the physical page: [ 21.439794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9e [ 21.439934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.440034] page_type: f5(slab) [ 21.440138] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.440205] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.440255] page dumped because: kasan: bad access detected [ 21.440290] [ 21.440310] Memory state around the buggy address: [ 21.440355] fff00000c3f9e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.440402] fff00000c3f9e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.440448] >fff00000c3f9e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.440688] ^ [ 21.440879] fff00000c3f9e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.440956] fff00000c3f9e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.440995] ================================================================== [ 21.425040] ================================================================== [ 21.425152] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 21.425236] Write of size 121 at addr fff00000c3f9e800 by task kunit_try_catch/288 [ 21.425294] [ 21.425536] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.425829] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.425864] Hardware name: linux,dummy-virt (DT) [ 21.425900] Call trace: [ 21.426213] show_stack+0x20/0x38 (C) [ 21.426370] dump_stack_lvl+0x8c/0xd0 [ 21.427404] print_report+0x118/0x608 [ 21.427468] kasan_report+0xdc/0x128 [ 21.427518] kasan_check_range+0x100/0x1a8 [ 21.427567] __kasan_check_write+0x20/0x30 [ 21.427620] copy_user_test_oob+0x35c/0xec8 [ 21.427670] kunit_try_run_case+0x170/0x3f0 [ 21.427720] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.427778] kthread+0x328/0x630 [ 21.427828] ret_from_fork+0x10/0x20 [ 21.427880] [ 21.427900] Allocated by task 288: [ 21.427933] kasan_save_stack+0x3c/0x68 [ 21.427976] kasan_save_track+0x20/0x40 [ 21.428015] kasan_save_alloc_info+0x40/0x58 [ 21.428058] __kasan_kmalloc+0xd4/0xd8 [ 21.428096] __kmalloc_noprof+0x198/0x4c8 [ 21.428137] kunit_kmalloc_array+0x34/0x88 [ 21.428178] copy_user_test_oob+0xac/0xec8 [ 21.428218] kunit_try_run_case+0x170/0x3f0 [ 21.428264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.428315] kthread+0x328/0x630 [ 21.428363] ret_from_fork+0x10/0x20 [ 21.428403] [ 21.428426] The buggy address belongs to the object at fff00000c3f9e800 [ 21.428426] which belongs to the cache kmalloc-128 of size 128 [ 21.428487] The buggy address is located 0 bytes inside of [ 21.428487] allocated 120-byte region [fff00000c3f9e800, fff00000c3f9e878) [ 21.428551] [ 21.428575] The buggy address belongs to the physical page: [ 21.428610] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9e [ 21.428665] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.428717] page_type: f5(slab) [ 21.428760] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.428813] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.428856] page dumped because: kasan: bad access detected [ 21.428891] [ 21.428915] Memory state around the buggy address: [ 21.428953] fff00000c3f9e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.429000] fff00000c3f9e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.429045] >fff00000c3f9e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.429087] ^ [ 21.429131] fff00000c3f9e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.429176] fff00000c3f9e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.429217] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 21.307616] ================================================================== [ 21.307686] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 21.307759] Read of size 8 at addr fff00000c3f9e778 by task kunit_try_catch/284 [ 21.309517] [ 21.309727] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.309847] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.309879] Hardware name: linux,dummy-virt (DT) [ 21.310322] Call trace: [ 21.310475] show_stack+0x20/0x38 (C) [ 21.310748] dump_stack_lvl+0x8c/0xd0 [ 21.310822] print_report+0x118/0x608 [ 21.311383] kasan_report+0xdc/0x128 [ 21.311470] __asan_report_load8_noabort+0x20/0x30 [ 21.311955] copy_to_kernel_nofault+0x204/0x250 [ 21.312227] copy_to_kernel_nofault_oob+0x158/0x418 [ 21.312590] kunit_try_run_case+0x170/0x3f0 [ 21.313110] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.313689] kthread+0x328/0x630 [ 21.314003] ret_from_fork+0x10/0x20 [ 21.314064] [ 21.314087] Allocated by task 284: [ 21.314445] kasan_save_stack+0x3c/0x68 [ 21.314688] kasan_save_track+0x20/0x40 [ 21.314797] kasan_save_alloc_info+0x40/0x58 [ 21.314842] __kasan_kmalloc+0xd4/0xd8 [ 21.314880] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.315506] copy_to_kernel_nofault_oob+0xc8/0x418 [ 21.315616] kunit_try_run_case+0x170/0x3f0 [ 21.315833] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.316034] kthread+0x328/0x630 [ 21.316077] ret_from_fork+0x10/0x20 [ 21.316117] [ 21.316576] The buggy address belongs to the object at fff00000c3f9e700 [ 21.316576] which belongs to the cache kmalloc-128 of size 128 [ 21.316690] The buggy address is located 0 bytes to the right of [ 21.316690] allocated 120-byte region [fff00000c3f9e700, fff00000c3f9e778) [ 21.316758] [ 21.317310] The buggy address belongs to the physical page: [ 21.317365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9e [ 21.317810] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.317934] page_type: f5(slab) [ 21.318707] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.319075] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.319164] page dumped because: kasan: bad access detected [ 21.319277] [ 21.319311] Memory state around the buggy address: [ 21.319715] fff00000c3f9e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.319781] fff00000c3f9e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.319830] >fff00000c3f9e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.319873] ^ [ 21.319920] fff00000c3f9e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.319967] fff00000c3f9e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.320009] ================================================================== [ 21.323411] ================================================================== [ 21.323472] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 21.323530] Write of size 8 at addr fff00000c3f9e778 by task kunit_try_catch/284 [ 21.324672] [ 21.324733] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.324826] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.325430] Hardware name: linux,dummy-virt (DT) [ 21.325898] Call trace: [ 21.326141] show_stack+0x20/0x38 (C) [ 21.326217] dump_stack_lvl+0x8c/0xd0 [ 21.326362] print_report+0x118/0x608 [ 21.326647] kasan_report+0xdc/0x128 [ 21.327286] kasan_check_range+0x100/0x1a8 [ 21.327396] __kasan_check_write+0x20/0x30 [ 21.327457] copy_to_kernel_nofault+0x8c/0x250 [ 21.327768] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 21.328443] kunit_try_run_case+0x170/0x3f0 [ 21.328538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.328847] kthread+0x328/0x630 [ 21.328913] ret_from_fork+0x10/0x20 [ 21.329470] [ 21.329518] Allocated by task 284: [ 21.329555] kasan_save_stack+0x3c/0x68 [ 21.329761] kasan_save_track+0x20/0x40 [ 21.330075] kasan_save_alloc_info+0x40/0x58 [ 21.330447] __kasan_kmalloc+0xd4/0xd8 [ 21.330521] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.331013] copy_to_kernel_nofault_oob+0xc8/0x418 [ 21.331336] kunit_try_run_case+0x170/0x3f0 [ 21.331399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.331449] kthread+0x328/0x630 [ 21.331488] ret_from_fork+0x10/0x20 [ 21.331528] [ 21.331550] The buggy address belongs to the object at fff00000c3f9e700 [ 21.331550] which belongs to the cache kmalloc-128 of size 128 [ 21.332164] The buggy address is located 0 bytes to the right of [ 21.332164] allocated 120-byte region [fff00000c3f9e700, fff00000c3f9e778) [ 21.332276] [ 21.332323] The buggy address belongs to the physical page: [ 21.332367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9e [ 21.332804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.333047] page_type: f5(slab) [ 21.333097] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.333154] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.333202] page dumped because: kasan: bad access detected [ 21.333680] [ 21.333706] Memory state around the buggy address: [ 21.333820] fff00000c3f9e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.333872] fff00000c3f9e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.334063] >fff00000c3f9e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 21.334133] ^ [ 21.334282] fff00000c3f9e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.334682] fff00000c3f9e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.334819] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 21.230227] ================================================================== [ 21.230299] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 21.230395] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/272 [ 21.230448] [ 21.230564] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.230760] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.230983] Hardware name: linux,dummy-virt (DT) [ 21.231054] Call trace: [ 21.231549] show_stack+0x20/0x38 (C) [ 21.231646] dump_stack_lvl+0x8c/0xd0 [ 21.231763] print_report+0x310/0x608 [ 21.231812] kasan_report+0xdc/0x128 [ 21.231965] __asan_report_load1_noabort+0x20/0x30 [ 21.232029] vmalloc_oob+0x578/0x5d0 [ 21.232078] kunit_try_run_case+0x170/0x3f0 [ 21.232133] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.232322] kthread+0x328/0x630 [ 21.232390] ret_from_fork+0x10/0x20 [ 21.232666] [ 21.232700] The buggy address belongs to the virtual mapping at [ 21.232700] [ffff80008010b000, ffff80008010d000) created by: [ 21.232700] vmalloc_oob+0x98/0x5d0 [ 21.232779] [ 21.232828] The buggy address belongs to the physical page: [ 21.232870] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f87 [ 21.233142] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.233232] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 21.233299] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.233390] page dumped because: kasan: bad access detected [ 21.233441] [ 21.233462] Memory state around the buggy address: [ 21.233499] ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.233703] ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.233890] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 21.233939] ^ [ 21.234107] ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 21.234160] ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 21.234206] ================================================================== [ 21.234829] ================================================================== [ 21.234878] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 21.235079] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/272 [ 21.235229] [ 21.235264] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.235617] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.235659] Hardware name: linux,dummy-virt (DT) [ 21.235803] Call trace: [ 21.235847] show_stack+0x20/0x38 (C) [ 21.235901] dump_stack_lvl+0x8c/0xd0 [ 21.235956] print_report+0x310/0x608 [ 21.236195] kasan_report+0xdc/0x128 [ 21.236446] __asan_report_load1_noabort+0x20/0x30 [ 21.236582] vmalloc_oob+0x51c/0x5d0 [ 21.236637] kunit_try_run_case+0x170/0x3f0 [ 21.236801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.236981] kthread+0x328/0x630 [ 21.237044] ret_from_fork+0x10/0x20 [ 21.237097] [ 21.237123] The buggy address belongs to the virtual mapping at [ 21.237123] [ffff80008010b000, ffff80008010d000) created by: [ 21.237123] vmalloc_oob+0x98/0x5d0 [ 21.237207] [ 21.237320] The buggy address belongs to the physical page: [ 21.237387] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f87 [ 21.237440] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.237503] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 21.237555] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.237619] page dumped because: kasan: bad access detected [ 21.237652] [ 21.237672] Memory state around the buggy address: [ 21.238062] ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.238187] ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.238298] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 21.238339] ^ [ 21.238392] ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 21.238438] ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 21.238519] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 21.023168] ================================================================== [ 21.023320] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 21.023408] Read of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.023551] [ 21.023588] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.023693] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.023785] Hardware name: linux,dummy-virt (DT) [ 21.023818] Call trace: [ 21.023844] show_stack+0x20/0x38 (C) [ 21.024051] dump_stack_lvl+0x8c/0xd0 [ 21.024119] print_report+0x118/0x608 [ 21.024167] kasan_report+0xdc/0x128 [ 21.024234] kasan_check_range+0x100/0x1a8 [ 21.024288] __kasan_check_read+0x20/0x30 [ 21.024342] kasan_atomics_helper+0xdd4/0x4858 [ 21.024405] kasan_atomics+0x198/0x2e0 [ 21.024510] kunit_try_run_case+0x170/0x3f0 [ 21.024574] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.024649] kthread+0x328/0x630 [ 21.024706] ret_from_fork+0x10/0x20 [ 21.024758] [ 21.024780] Allocated by task 268: [ 21.024812] kasan_save_stack+0x3c/0x68 [ 21.024854] kasan_save_track+0x20/0x40 [ 21.024894] kasan_save_alloc_info+0x40/0x58 [ 21.024936] __kasan_kmalloc+0xd4/0xd8 [ 21.024976] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.025022] kasan_atomics+0xb8/0x2e0 [ 21.025069] kunit_try_run_case+0x170/0x3f0 [ 21.025112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.025162] kthread+0x328/0x630 [ 21.025201] ret_from_fork+0x10/0x20 [ 21.025240] [ 21.025261] The buggy address belongs to the object at fff00000c3f85080 [ 21.025261] which belongs to the cache kmalloc-64 of size 64 [ 21.025320] The buggy address is located 0 bytes to the right of [ 21.025320] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.025822] [ 21.026125] The buggy address belongs to the physical page: [ 21.026421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.026509] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.026652] page_type: f5(slab) [ 21.026705] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.026866] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.026934] page dumped because: kasan: bad access detected [ 21.027004] [ 21.027205] Memory state around the buggy address: [ 21.027254] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.027312] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.027394] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.027527] ^ [ 21.027608] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.027685] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.027829] ================================================================== [ 21.040542] ================================================================== [ 21.040711] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 21.040885] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.040977] [ 21.041027] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.041116] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.041263] Hardware name: linux,dummy-virt (DT) [ 21.041310] Call trace: [ 21.041336] show_stack+0x20/0x38 (C) [ 21.041497] dump_stack_lvl+0x8c/0xd0 [ 21.041695] print_report+0x118/0x608 [ 21.041754] kasan_report+0xdc/0x128 [ 21.041936] __asan_report_store8_noabort+0x20/0x30 [ 21.042010] kasan_atomics_helper+0x3e5c/0x4858 [ 21.042125] kasan_atomics+0x198/0x2e0 [ 21.042371] kunit_try_run_case+0x170/0x3f0 [ 21.042464] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.042635] kthread+0x328/0x630 [ 21.042715] ret_from_fork+0x10/0x20 [ 21.042897] [ 21.042934] Allocated by task 268: [ 21.042966] kasan_save_stack+0x3c/0x68 [ 21.043044] kasan_save_track+0x20/0x40 [ 21.043085] kasan_save_alloc_info+0x40/0x58 [ 21.043364] __kasan_kmalloc+0xd4/0xd8 [ 21.043414] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.043599] kasan_atomics+0xb8/0x2e0 [ 21.043666] kunit_try_run_case+0x170/0x3f0 [ 21.043746] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.044003] kthread+0x328/0x630 [ 21.044054] ret_from_fork+0x10/0x20 [ 21.044129] [ 21.044252] The buggy address belongs to the object at fff00000c3f85080 [ 21.044252] which belongs to the cache kmalloc-64 of size 64 [ 21.044340] The buggy address is located 0 bytes to the right of [ 21.044340] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.044502] [ 21.044524] The buggy address belongs to the physical page: [ 21.044557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.044640] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.044875] page_type: f5(slab) [ 21.044924] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.045004] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.045080] page dumped because: kasan: bad access detected [ 21.045299] [ 21.045369] Memory state around the buggy address: [ 21.045408] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.045578] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.045630] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.045672] ^ [ 21.045962] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.046088] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.046209] ================================================================== [ 21.210735] ================================================================== [ 21.210788] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 21.210985] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.211045] [ 21.211076] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.211165] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.211255] Hardware name: linux,dummy-virt (DT) [ 21.211359] Call trace: [ 21.211387] show_stack+0x20/0x38 (C) [ 21.211438] dump_stack_lvl+0x8c/0xd0 [ 21.211491] print_report+0x118/0x608 [ 21.211565] kasan_report+0xdc/0x128 [ 21.211775] kasan_check_range+0x100/0x1a8 [ 21.211900] __kasan_check_write+0x20/0x30 [ 21.211967] kasan_atomics_helper+0x17ec/0x4858 [ 21.212026] kasan_atomics+0x198/0x2e0 [ 21.212246] kunit_try_run_case+0x170/0x3f0 [ 21.212312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.212439] kthread+0x328/0x630 [ 21.212495] ret_from_fork+0x10/0x20 [ 21.212637] [ 21.212707] Allocated by task 268: [ 21.212774] kasan_save_stack+0x3c/0x68 [ 21.212838] kasan_save_track+0x20/0x40 [ 21.212963] kasan_save_alloc_info+0x40/0x58 [ 21.213006] __kasan_kmalloc+0xd4/0xd8 [ 21.213047] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.213093] kasan_atomics+0xb8/0x2e0 [ 21.213130] kunit_try_run_case+0x170/0x3f0 [ 21.213174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.213479] kthread+0x328/0x630 [ 21.213596] ret_from_fork+0x10/0x20 [ 21.213782] [ 21.213852] The buggy address belongs to the object at fff00000c3f85080 [ 21.213852] which belongs to the cache kmalloc-64 of size 64 [ 21.214006] The buggy address is located 0 bytes to the right of [ 21.214006] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.214368] [ 21.214411] The buggy address belongs to the physical page: [ 21.214446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.214502] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.214553] page_type: f5(slab) [ 21.214917] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.215252] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.215514] page dumped because: kasan: bad access detected [ 21.215592] [ 21.215724] Memory state around the buggy address: [ 21.215946] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.216084] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.216149] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.216187] ^ [ 21.216545] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.216716] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.216815] ================================================================== [ 21.016144] ================================================================== [ 21.016377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 21.016453] Read of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.016532] [ 21.016568] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.016757] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.016866] Hardware name: linux,dummy-virt (DT) [ 21.016956] Call trace: [ 21.016998] show_stack+0x20/0x38 (C) [ 21.017051] dump_stack_lvl+0x8c/0xd0 [ 21.017121] print_report+0x118/0x608 [ 21.017173] kasan_report+0xdc/0x128 [ 21.017388] __asan_report_load4_noabort+0x20/0x30 [ 21.017508] kasan_atomics_helper+0x3e04/0x4858 [ 21.017790] kasan_atomics+0x198/0x2e0 [ 21.017953] kunit_try_run_case+0x170/0x3f0 [ 21.018051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.018246] kthread+0x328/0x630 [ 21.018300] ret_from_fork+0x10/0x20 [ 21.018556] [ 21.018584] Allocated by task 268: [ 21.018617] kasan_save_stack+0x3c/0x68 [ 21.018691] kasan_save_track+0x20/0x40 [ 21.018766] kasan_save_alloc_info+0x40/0x58 [ 21.018872] __kasan_kmalloc+0xd4/0xd8 [ 21.018938] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.019179] kasan_atomics+0xb8/0x2e0 [ 21.019335] kunit_try_run_case+0x170/0x3f0 [ 21.019413] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.019551] kthread+0x328/0x630 [ 21.019636] ret_from_fork+0x10/0x20 [ 21.019678] [ 21.019699] The buggy address belongs to the object at fff00000c3f85080 [ 21.019699] which belongs to the cache kmalloc-64 of size 64 [ 21.020028] The buggy address is located 0 bytes to the right of [ 21.020028] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.020146] [ 21.020363] The buggy address belongs to the physical page: [ 21.020425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.020606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.020701] page_type: f5(slab) [ 21.020799] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.020853] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.021019] page dumped because: kasan: bad access detected [ 21.021062] [ 21.021115] Memory state around the buggy address: [ 21.021253] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.021327] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.021657] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.021840] ^ [ 21.021921] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.021997] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.022118] ================================================================== [ 21.204497] ================================================================== [ 21.204562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 21.204639] Read of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.204692] [ 21.204742] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.204827] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.204933] Hardware name: linux,dummy-virt (DT) [ 21.205017] Call trace: [ 21.205075] show_stack+0x20/0x38 (C) [ 21.205165] dump_stack_lvl+0x8c/0xd0 [ 21.205317] print_report+0x118/0x608 [ 21.205381] kasan_report+0xdc/0x128 [ 21.205428] __asan_report_load8_noabort+0x20/0x30 [ 21.205494] kasan_atomics_helper+0x3e20/0x4858 [ 21.205546] kasan_atomics+0x198/0x2e0 [ 21.205718] kunit_try_run_case+0x170/0x3f0 [ 21.205948] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.206145] kthread+0x328/0x630 [ 21.206228] ret_from_fork+0x10/0x20 [ 21.206280] [ 21.206302] Allocated by task 268: [ 21.206331] kasan_save_stack+0x3c/0x68 [ 21.206384] kasan_save_track+0x20/0x40 [ 21.206425] kasan_save_alloc_info+0x40/0x58 [ 21.206913] __kasan_kmalloc+0xd4/0xd8 [ 21.207027] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.207192] kasan_atomics+0xb8/0x2e0 [ 21.207395] kunit_try_run_case+0x170/0x3f0 [ 21.207439] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.207550] kthread+0x328/0x630 [ 21.207648] ret_from_fork+0x10/0x20 [ 21.207821] [ 21.207923] The buggy address belongs to the object at fff00000c3f85080 [ 21.207923] which belongs to the cache kmalloc-64 of size 64 [ 21.208019] The buggy address is located 0 bytes to the right of [ 21.208019] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.208087] [ 21.208108] The buggy address belongs to the physical page: [ 21.208295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.208362] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.208457] page_type: f5(slab) [ 21.208623] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.208716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.208971] page dumped because: kasan: bad access detected [ 21.209235] [ 21.209358] Memory state around the buggy address: [ 21.209436] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.209579] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.209652] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.209691] ^ [ 21.209726] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.209787] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.209828] ================================================================== [ 20.968369] ================================================================== [ 20.968434] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 20.968502] Write of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 20.968568] [ 20.968600] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 20.968688] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 20.968747] Hardware name: linux,dummy-virt (DT) [ 20.968782] Call trace: [ 20.968818] show_stack+0x20/0x38 (C) [ 20.968909] dump_stack_lvl+0x8c/0xd0 [ 20.968966] print_report+0x118/0x608 [ 20.969021] kasan_report+0xdc/0x128 [ 20.969068] kasan_check_range+0x100/0x1a8 [ 20.969119] __kasan_check_write+0x20/0x30 [ 20.969308] kasan_atomics_helper+0xb70/0x4858 [ 20.969414] kasan_atomics+0x198/0x2e0 [ 20.969502] kunit_try_run_case+0x170/0x3f0 [ 20.969630] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.969726] kthread+0x328/0x630 [ 20.969833] ret_from_fork+0x10/0x20 [ 20.969976] [ 20.970016] Allocated by task 268: [ 20.970081] kasan_save_stack+0x3c/0x68 [ 20.970259] kasan_save_track+0x20/0x40 [ 20.970429] kasan_save_alloc_info+0x40/0x58 [ 20.970496] __kasan_kmalloc+0xd4/0xd8 [ 20.970538] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.970591] kasan_atomics+0xb8/0x2e0 [ 20.970630] kunit_try_run_case+0x170/0x3f0 [ 20.970673] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.970723] kthread+0x328/0x630 [ 20.970978] ret_from_fork+0x10/0x20 [ 20.971040] [ 20.971158] The buggy address belongs to the object at fff00000c3f85080 [ 20.971158] which belongs to the cache kmalloc-64 of size 64 [ 20.971466] The buggy address is located 0 bytes to the right of [ 20.971466] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 20.971624] [ 20.971928] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.972875] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.974578] Read of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 20.975818] kunit_try_run_case+0x170/0x3f0 [ 20.976131] [ 20.976304] page_type: f5(slab) [ 20.977932] ^ [ 20.979750] [ 20.981367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.983448] The buggy address is located 0 bytes to the right of [ 20.983448] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 20.984542] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.984934] ================================================================== [ 21.028166] ================================================================== [ 21.028308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 21.028382] Read of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.028435] [ 21.028470] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.028810] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.028925] Hardware name: linux,dummy-virt (DT) [ 21.028961] Call trace: [ 21.029032] show_stack+0x20/0x38 (C) [ 21.029109] dump_stack_lvl+0x8c/0xd0 [ 21.029175] print_report+0x118/0x608 [ 21.029313] kasan_report+0xdc/0x128 [ 21.029376] __asan_report_load8_noabort+0x20/0x30 [ 21.029432] kasan_atomics_helper+0x3f58/0x4858 [ 21.029490] kasan_atomics+0x198/0x2e0 [ 21.029539] kunit_try_run_case+0x170/0x3f0 [ 21.029864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.030070] kthread+0x328/0x630 [ 21.030313] ret_from_fork+0x10/0x20 [ 21.030549] [ 21.030573] Allocated by task 268: [ 21.030629] kasan_save_stack+0x3c/0x68 [ 21.030682] kasan_save_track+0x20/0x40 [ 21.030911] kasan_save_alloc_info+0x40/0x58 [ 21.031140] __kasan_kmalloc+0xd4/0xd8 [ 21.031220] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.031296] kasan_atomics+0xb8/0x2e0 [ 21.031590] kunit_try_run_case+0x170/0x3f0 [ 21.031766] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.031841] kthread+0x328/0x630 [ 21.031905] ret_from_fork+0x10/0x20 [ 21.032139] [ 21.032167] The buggy address belongs to the object at fff00000c3f85080 [ 21.032167] which belongs to the cache kmalloc-64 of size 64 [ 21.032253] The buggy address is located 0 bytes to the right of [ 21.032253] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.032373] [ 21.032417] The buggy address belongs to the physical page: [ 21.032685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.032880] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.032936] page_type: f5(slab) [ 21.032985] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.033214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.033290] page dumped because: kasan: bad access detected [ 21.033325] [ 21.033371] Memory state around the buggy address: [ 21.033444] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.033727] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.033780] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.033961] ^ [ 21.034184] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.034241] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.034331] ================================================================== [ 20.946026] ================================================================== [ 20.946079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 20.946131] Write of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 20.946184] [ 20.946215] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 20.946646] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 20.946729] Hardware name: linux,dummy-virt (DT) [ 20.946800] Call trace: [ 20.946840] show_stack+0x20/0x38 (C) [ 20.946926] dump_stack_lvl+0x8c/0xd0 [ 20.947110] print_report+0x118/0x608 [ 20.947162] kasan_report+0xdc/0x128 [ 20.947243] kasan_check_range+0x100/0x1a8 [ 20.947366] __kasan_check_write+0x20/0x30 [ 20.947428] kasan_atomics_helper+0x99c/0x4858 [ 20.947479] kasan_atomics+0x198/0x2e0 [ 20.947534] kunit_try_run_case+0x170/0x3f0 [ 20.947598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.947662] kthread+0x328/0x630 [ 20.947728] ret_from_fork+0x10/0x20 [ 20.947794] [ 20.947821] Allocated by task 268: [ 20.947860] kasan_save_stack+0x3c/0x68 [ 20.947919] kasan_save_track+0x20/0x40 [ 20.947966] kasan_save_alloc_info+0x40/0x58 [ 20.948010] __kasan_kmalloc+0xd4/0xd8 [ 20.948054] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.948109] kasan_atomics+0xb8/0x2e0 [ 20.948156] kunit_try_run_case+0x170/0x3f0 [ 20.948204] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.948259] kthread+0x328/0x630 [ 20.948306] ret_from_fork+0x10/0x20 [ 20.948365] [ 20.948387] The buggy address belongs to the object at fff00000c3f85080 [ 20.948387] which belongs to the cache kmalloc-64 of size 64 [ 20.948445] The buggy address is located 0 bytes to the right of [ 20.948445] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 20.948509] [ 20.948533] The buggy address belongs to the physical page: [ 20.948566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 20.948642] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.948693] page_type: f5(slab) [ 20.948734] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.948787] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.948830] page dumped because: kasan: bad access detected [ 20.948863] [ 20.948885] Memory state around the buggy address: [ 20.948921] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.948990] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.949050] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.949167] ^ [ 20.949222] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.949298] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.949371] ================================================================== [ 21.089316] ================================================================== [ 21.091743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 21.091912] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.092298] [ 21.092344] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.092448] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.092732] Hardware name: linux,dummy-virt (DT) [ 21.093186] Call trace: [ 21.093482] show_stack+0x20/0x38 (C) [ 21.094201] dump_stack_lvl+0x8c/0xd0 [ 21.095075] print_report+0x118/0x608 [ 21.095215] kasan_report+0xdc/0x128 [ 21.095282] kasan_check_range+0x100/0x1a8 [ 21.095583] __kasan_check_write+0x20/0x30 [ 21.095750] kasan_atomics_helper+0x1128/0x4858 [ 21.095816] kasan_atomics+0x198/0x2e0 [ 21.095974] kunit_try_run_case+0x170/0x3f0 [ 21.096059] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.096182] kthread+0x328/0x630 [ 21.096269] ret_from_fork+0x10/0x20 [ 21.096401] [ 21.096423] Allocated by task 268: [ 21.096464] kasan_save_stack+0x3c/0x68 [ 21.096569] kasan_save_track+0x20/0x40 [ 21.096834] kasan_save_alloc_info+0x40/0x58 [ 21.097055] __kasan_kmalloc+0xd4/0xd8 [ 21.097104] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.097283] kasan_atomics+0xb8/0x2e0 [ 21.097369] kunit_try_run_case+0x170/0x3f0 [ 21.097415] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.097515] kthread+0x328/0x630 [ 21.097667] ret_from_fork+0x10/0x20 [ 21.097745] [ 21.097794] The buggy address belongs to the object at fff00000c3f85080 [ 21.097794] which belongs to the cache kmalloc-64 of size 64 [ 21.098130] The buggy address is located 0 bytes to the right of [ 21.098130] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.098205] [ 21.098250] The buggy address belongs to the physical page: [ 21.098292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.098600] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.098739] page_type: f5(slab) [ 21.098850] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.099064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.099137] page dumped because: kasan: bad access detected [ 21.099272] [ 21.099325] Memory state around the buggy address: [ 21.099392] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.099439] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.099758] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.099830] ^ [ 21.099878] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.099924] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.099964] ================================================================== [ 21.127909] ================================================================== [ 21.127959] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 21.128011] Read of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.128064] [ 21.128098] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.128183] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.128240] Hardware name: linux,dummy-virt (DT) [ 21.128275] Call trace: [ 21.128372] show_stack+0x20/0x38 (C) [ 21.128446] dump_stack_lvl+0x8c/0xd0 [ 21.128502] print_report+0x118/0x608 [ 21.128568] kasan_report+0xdc/0x128 [ 21.128665] __asan_report_load8_noabort+0x20/0x30 [ 21.128722] kasan_atomics_helper+0x3f04/0x4858 [ 21.128850] kasan_atomics+0x198/0x2e0 [ 21.128903] kunit_try_run_case+0x170/0x3f0 [ 21.128956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.129015] kthread+0x328/0x630 [ 21.129223] ret_from_fork+0x10/0x20 [ 21.129319] [ 21.129554] Allocated by task 268: [ 21.129797] kasan_save_stack+0x3c/0x68 [ 21.129866] kasan_save_track+0x20/0x40 [ 21.129923] kasan_save_alloc_info+0x40/0x58 [ 21.130076] __kasan_kmalloc+0xd4/0xd8 [ 21.130143] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.130221] kasan_atomics+0xb8/0x2e0 [ 21.130323] kunit_try_run_case+0x170/0x3f0 [ 21.130389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.130631] kthread+0x328/0x630 [ 21.130682] ret_from_fork+0x10/0x20 [ 21.130774] [ 21.130862] The buggy address belongs to the object at fff00000c3f85080 [ 21.130862] which belongs to the cache kmalloc-64 of size 64 [ 21.130973] The buggy address is located 0 bytes to the right of [ 21.130973] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.131106] [ 21.131257] The buggy address belongs to the physical page: [ 21.131584] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.131658] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.131712] page_type: f5(slab) [ 21.132174] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.132254] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.132620] page dumped because: kasan: bad access detected [ 21.132667] [ 21.132688] Memory state around the buggy address: [ 21.132745] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.133052] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.133136] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.133435] ^ [ 21.133672] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.133726] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.133820] ================================================================== [ 21.195260] ================================================================== [ 21.195307] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 21.195373] Read of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.195426] [ 21.195460] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.195546] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.195777] Hardware name: linux,dummy-virt (DT) [ 21.195839] Call trace: [ 21.195867] show_stack+0x20/0x38 (C) [ 21.195984] dump_stack_lvl+0x8c/0xd0 [ 21.196089] print_report+0x118/0x608 [ 21.196259] kasan_report+0xdc/0x128 [ 21.196310] __asan_report_load8_noabort+0x20/0x30 [ 21.196386] kasan_atomics_helper+0x3e10/0x4858 [ 21.196528] kasan_atomics+0x198/0x2e0 [ 21.196584] kunit_try_run_case+0x170/0x3f0 [ 21.196658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.196721] kthread+0x328/0x630 [ 21.196770] ret_from_fork+0x10/0x20 [ 21.196857] [ 21.196916] Allocated by task 268: [ 21.196966] kasan_save_stack+0x3c/0x68 [ 21.197050] kasan_save_track+0x20/0x40 [ 21.197125] kasan_save_alloc_info+0x40/0x58 [ 21.197169] __kasan_kmalloc+0xd4/0xd8 [ 21.197207] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.197253] kasan_atomics+0xb8/0x2e0 [ 21.197306] kunit_try_run_case+0x170/0x3f0 [ 21.197359] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.197408] kthread+0x328/0x630 [ 21.197694] ret_from_fork+0x10/0x20 [ 21.197798] [ 21.197864] The buggy address belongs to the object at fff00000c3f85080 [ 21.197864] which belongs to the cache kmalloc-64 of size 64 [ 21.198045] The buggy address is located 0 bytes to the right of [ 21.198045] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.198196] [ 21.198396] The buggy address belongs to the physical page: [ 21.198578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.198677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.198751] page_type: f5(slab) [ 21.198794] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.199314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.199379] page dumped because: kasan: bad access detected [ 21.199413] [ 21.199435] Memory state around the buggy address: [ 21.199472] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.199517] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.199562] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.199601] ^ [ 21.199637] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.199683] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.199723] ================================================================== [ 21.200113] ================================================================== [ 21.200167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 21.200228] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.200281] [ 21.200363] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.200454] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.200486] Hardware name: linux,dummy-virt (DT) [ 21.200520] Call trace: [ 21.200545] show_stack+0x20/0x38 (C) [ 21.200610] dump_stack_lvl+0x8c/0xd0 [ 21.200661] print_report+0x118/0x608 [ 21.200709] kasan_report+0xdc/0x128 [ 21.200756] kasan_check_range+0x100/0x1a8 [ 21.200806] __kasan_check_write+0x20/0x30 [ 21.200858] kasan_atomics_helper+0x175c/0x4858 [ 21.200912] kasan_atomics+0x198/0x2e0 [ 21.200960] kunit_try_run_case+0x170/0x3f0 [ 21.201011] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.201069] kthread+0x328/0x630 [ 21.201118] ret_from_fork+0x10/0x20 [ 21.201169] [ 21.201190] Allocated by task 268: [ 21.201231] kasan_save_stack+0x3c/0x68 [ 21.201275] kasan_save_track+0x20/0x40 [ 21.201314] kasan_save_alloc_info+0x40/0x58 [ 21.201365] __kasan_kmalloc+0xd4/0xd8 [ 21.201404] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.201465] kasan_atomics+0xb8/0x2e0 [ 21.201514] kunit_try_run_case+0x170/0x3f0 [ 21.201557] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.201612] kthread+0x328/0x630 [ 21.201652] ret_from_fork+0x10/0x20 [ 21.201692] [ 21.201722] The buggy address belongs to the object at fff00000c3f85080 [ 21.201722] which belongs to the cache kmalloc-64 of size 64 [ 21.201782] The buggy address is located 0 bytes to the right of [ 21.201782] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.201849] [ 21.201871] The buggy address belongs to the physical page: [ 21.201906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.201961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.202028] page_type: f5(slab) [ 21.202070] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.202122] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.202173] page dumped because: kasan: bad access detected [ 21.202206] [ 21.202228] Memory state around the buggy address: [ 21.202263] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.202317] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.203300] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.203436] ^ [ 21.203602] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.204038] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.204135] ================================================================== [ 20.963531] ================================================================== [ 20.963582] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 20.963630] Read of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 20.963682] [ 20.963872] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 20.963983] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 20.964065] Hardware name: linux,dummy-virt (DT) [ 20.964099] Call trace: [ 20.964141] show_stack+0x20/0x38 (C) [ 20.964205] dump_stack_lvl+0x8c/0xd0 [ 20.964341] print_report+0x118/0x608 [ 20.964427] kasan_report+0xdc/0x128 [ 20.964492] __asan_report_load4_noabort+0x20/0x30 [ 20.964567] kasan_atomics_helper+0x3dcc/0x4858 [ 20.964620] kasan_atomics+0x198/0x2e0 [ 20.964695] kunit_try_run_case+0x170/0x3f0 [ 20.964771] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.964832] kthread+0x328/0x630 [ 20.964899] ret_from_fork+0x10/0x20 [ 20.964961] [ 20.965014] Allocated by task 268: [ 20.965052] kasan_save_stack+0x3c/0x68 [ 20.965095] kasan_save_track+0x20/0x40 [ 20.965137] kasan_save_alloc_info+0x40/0x58 [ 20.965179] __kasan_kmalloc+0xd4/0xd8 [ 20.965218] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.965395] kasan_atomics+0xb8/0x2e0 [ 20.965481] kunit_try_run_case+0x170/0x3f0 [ 20.965555] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.965623] kthread+0x328/0x630 [ 20.965709] ret_from_fork+0x10/0x20 [ 20.965826] [ 20.965878] The buggy address belongs to the object at fff00000c3f85080 [ 20.965878] which belongs to the cache kmalloc-64 of size 64 [ 20.965972] The buggy address is located 0 bytes to the right of [ 20.965972] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 20.966161] [ 20.966302] The buggy address belongs to the physical page: [ 20.966380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 20.966478] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.966551] page_type: f5(slab) [ 20.966659] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.966737] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.966810] page dumped because: kasan: bad access detected [ 20.966930] [ 20.966949] Memory state around the buggy address: [ 20.966983] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.967033] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.967099] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.967140] ^ [ 20.967422] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.967545] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.967586] ================================================================== [ 21.035462] ================================================================== [ 21.035532] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 21.035834] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.035910] [ 21.035945] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.036035] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.036185] Hardware name: linux,dummy-virt (DT) [ 21.036231] Call trace: [ 21.036256] show_stack+0x20/0x38 (C) [ 21.036312] dump_stack_lvl+0x8c/0xd0 [ 21.036449] print_report+0x118/0x608 [ 21.036498] kasan_report+0xdc/0x128 [ 21.036556] kasan_check_range+0x100/0x1a8 [ 21.036607] __kasan_check_write+0x20/0x30 [ 21.036665] kasan_atomics_helper+0xe44/0x4858 [ 21.036716] kasan_atomics+0x198/0x2e0 [ 21.036771] kunit_try_run_case+0x170/0x3f0 [ 21.036824] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.036883] kthread+0x328/0x630 [ 21.036938] ret_from_fork+0x10/0x20 [ 21.036995] [ 21.037016] Allocated by task 268: [ 21.037048] kasan_save_stack+0x3c/0x68 [ 21.037090] kasan_save_track+0x20/0x40 [ 21.037130] kasan_save_alloc_info+0x40/0x58 [ 21.037184] __kasan_kmalloc+0xd4/0xd8 [ 21.037230] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.037283] kasan_atomics+0xb8/0x2e0 [ 21.037329] kunit_try_run_case+0x170/0x3f0 [ 21.037385] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.037468] kthread+0x328/0x630 [ 21.037953] ret_from_fork+0x10/0x20 [ 21.038009] [ 21.038034] The buggy address belongs to the object at fff00000c3f85080 [ 21.038034] which belongs to the cache kmalloc-64 of size 64 [ 21.038104] The buggy address is located 0 bytes to the right of [ 21.038104] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.038170] [ 21.038192] The buggy address belongs to the physical page: [ 21.038226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.038280] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.038329] page_type: f5(slab) [ 21.038531] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.038617] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.038835] page dumped because: kasan: bad access detected [ 21.038901] [ 21.039135] Memory state around the buggy address: [ 21.039209] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.039337] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.039649] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.039727] ^ [ 21.039788] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.040049] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.040129] ================================================================== [ 21.010668] ================================================================== [ 21.010726] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 21.011269] Write of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.011371] [ 21.011483] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.011592] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.011628] Hardware name: linux,dummy-virt (DT) [ 21.011676] Call trace: [ 21.011723] show_stack+0x20/0x38 (C) [ 21.011839] dump_stack_lvl+0x8c/0xd0 [ 21.011892] print_report+0x118/0x608 [ 21.012122] kasan_report+0xdc/0x128 [ 21.012196] kasan_check_range+0x100/0x1a8 [ 21.012256] __kasan_check_write+0x20/0x30 [ 21.012307] kasan_atomics_helper+0xd3c/0x4858 [ 21.012539] kasan_atomics+0x198/0x2e0 [ 21.012623] kunit_try_run_case+0x170/0x3f0 [ 21.012710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.012773] kthread+0x328/0x630 [ 21.012822] ret_from_fork+0x10/0x20 [ 21.012876] [ 21.013032] Allocated by task 268: [ 21.013080] kasan_save_stack+0x3c/0x68 [ 21.013127] kasan_save_track+0x20/0x40 [ 21.013261] kasan_save_alloc_info+0x40/0x58 [ 21.013316] __kasan_kmalloc+0xd4/0xd8 [ 21.013368] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.013415] kasan_atomics+0xb8/0x2e0 [ 21.013615] kunit_try_run_case+0x170/0x3f0 [ 21.013809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.013874] kthread+0x328/0x630 [ 21.013914] ret_from_fork+0x10/0x20 [ 21.014116] [ 21.014162] The buggy address belongs to the object at fff00000c3f85080 [ 21.014162] which belongs to the cache kmalloc-64 of size 64 [ 21.014225] The buggy address is located 0 bytes to the right of [ 21.014225] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.014355] [ 21.014412] The buggy address belongs to the physical page: [ 21.014470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.014533] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.014595] page_type: f5(slab) [ 21.014643] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.014713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.014756] page dumped because: kasan: bad access detected [ 21.014788] [ 21.014810] Memory state around the buggy address: [ 21.014852] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.014919] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.014966] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.015019] ^ [ 21.015068] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.015126] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.015195] ================================================================== [ 21.118693] ================================================================== [ 21.118759] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 21.118835] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.118889] [ 21.118984] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.119110] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.119412] Hardware name: linux,dummy-virt (DT) [ 21.119459] Call trace: [ 21.119486] show_stack+0x20/0x38 (C) [ 21.119551] dump_stack_lvl+0x8c/0xd0 [ 21.119654] print_report+0x118/0x608 [ 21.119708] kasan_report+0xdc/0x128 [ 21.119755] kasan_check_range+0x100/0x1a8 [ 21.119929] __kasan_check_write+0x20/0x30 [ 21.120026] kasan_atomics_helper+0x12d8/0x4858 [ 21.120088] kasan_atomics+0x198/0x2e0 [ 21.120136] kunit_try_run_case+0x170/0x3f0 [ 21.120238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.120301] kthread+0x328/0x630 [ 21.120481] ret_from_fork+0x10/0x20 [ 21.120551] [ 21.120603] Allocated by task 268: [ 21.120732] kasan_save_stack+0x3c/0x68 [ 21.120798] kasan_save_track+0x20/0x40 [ 21.120844] kasan_save_alloc_info+0x40/0x58 [ 21.120888] __kasan_kmalloc+0xd4/0xd8 [ 21.121196] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.121287] kasan_atomics+0xb8/0x2e0 [ 21.121330] kunit_try_run_case+0x170/0x3f0 [ 21.121384] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.121491] kthread+0x328/0x630 [ 21.121536] ret_from_fork+0x10/0x20 [ 21.121603] [ 21.121792] The buggy address belongs to the object at fff00000c3f85080 [ 21.121792] which belongs to the cache kmalloc-64 of size 64 [ 21.121901] The buggy address is located 0 bytes to the right of [ 21.121901] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.122057] [ 21.122117] The buggy address belongs to the physical page: [ 21.122176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.122359] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.122449] page_type: f5(slab) [ 21.122492] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.122605] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.122720] page dumped because: kasan: bad access detected [ 21.122782] [ 21.122965] Memory state around the buggy address: [ 21.123036] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.123178] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.123233] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.123369] ^ [ 21.123409] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.123455] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.123642] ================================================================== [ 21.175334] ================================================================== [ 21.175399] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 21.175451] Read of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.175502] [ 21.175539] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.175625] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.175657] Hardware name: linux,dummy-virt (DT) [ 21.175692] Call trace: [ 21.175717] show_stack+0x20/0x38 (C) [ 21.175767] dump_stack_lvl+0x8c/0xd0 [ 21.175820] print_report+0x118/0x608 [ 21.175867] kasan_report+0xdc/0x128 [ 21.175916] __asan_report_load8_noabort+0x20/0x30 [ 21.175971] kasan_atomics_helper+0x3db0/0x4858 [ 21.176020] kasan_atomics+0x198/0x2e0 [ 21.176068] kunit_try_run_case+0x170/0x3f0 [ 21.176119] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.176178] kthread+0x328/0x630 [ 21.176225] ret_from_fork+0x10/0x20 [ 21.176279] [ 21.176298] Allocated by task 268: [ 21.176327] kasan_save_stack+0x3c/0x68 [ 21.179279] kasan_save_track+0x20/0x40 [ 21.179325] kasan_save_alloc_info+0x40/0x58 [ 21.179379] __kasan_kmalloc+0xd4/0xd8 [ 21.179419] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.179465] kasan_atomics+0xb8/0x2e0 [ 21.179503] kunit_try_run_case+0x170/0x3f0 [ 21.179546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.179595] kthread+0x328/0x630 [ 21.179634] ret_from_fork+0x10/0x20 [ 21.179674] [ 21.179695] The buggy address belongs to the object at fff00000c3f85080 [ 21.179695] which belongs to the cache kmalloc-64 of size 64 [ 21.179757] The buggy address is located 0 bytes to the right of [ 21.179757] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.179823] [ 21.179846] The buggy address belongs to the physical page: [ 21.179880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.179935] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.179988] page_type: f5(slab) [ 21.180029] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.180082] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.180125] page dumped because: kasan: bad access detected [ 21.180159] [ 21.180179] Memory state around the buggy address: [ 21.180211] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.180256] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.180300] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.180343] ^ [ 21.180388] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.180434] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.180475] ================================================================== [ 21.190118] ================================================================== [ 21.190168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 21.190385] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.190543] [ 21.190580] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.190708] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.190758] Hardware name: linux,dummy-virt (DT) [ 21.190828] Call trace: [ 21.190875] show_stack+0x20/0x38 (C) [ 21.190927] dump_stack_lvl+0x8c/0xd0 [ 21.191088] print_report+0x118/0x608 [ 21.191150] kasan_report+0xdc/0x128 [ 21.191266] kasan_check_range+0x100/0x1a8 [ 21.191325] __kasan_check_write+0x20/0x30 [ 21.191388] kasan_atomics_helper+0x16d0/0x4858 [ 21.191506] kasan_atomics+0x198/0x2e0 [ 21.191601] kunit_try_run_case+0x170/0x3f0 [ 21.191703] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.191793] kthread+0x328/0x630 [ 21.191879] ret_from_fork+0x10/0x20 [ 21.191931] [ 21.191953] Allocated by task 268: [ 21.191984] kasan_save_stack+0x3c/0x68 [ 21.192159] kasan_save_track+0x20/0x40 [ 21.192203] kasan_save_alloc_info+0x40/0x58 [ 21.192317] __kasan_kmalloc+0xd4/0xd8 [ 21.192372] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.192420] kasan_atomics+0xb8/0x2e0 [ 21.192489] kunit_try_run_case+0x170/0x3f0 [ 21.192568] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.192643] kthread+0x328/0x630 [ 21.192725] ret_from_fork+0x10/0x20 [ 21.192970] [ 21.193035] The buggy address belongs to the object at fff00000c3f85080 [ 21.193035] which belongs to the cache kmalloc-64 of size 64 [ 21.193197] The buggy address is located 0 bytes to the right of [ 21.193197] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.193396] [ 21.193454] The buggy address belongs to the physical page: [ 21.193530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.193610] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.193691] page_type: f5(slab) [ 21.193742] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.193802] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.194055] page dumped because: kasan: bad access detected [ 21.194327] [ 21.194411] Memory state around the buggy address: [ 21.194546] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.194826] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.194880] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.194930] ^ [ 21.194967] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.195016] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.195057] ================================================================== [ 21.149487] ================================================================== [ 21.149565] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 21.149727] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.150147] [ 21.150208] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.150300] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.150625] Hardware name: linux,dummy-virt (DT) [ 21.151017] Call trace: [ 21.151083] show_stack+0x20/0x38 (C) [ 21.151224] dump_stack_lvl+0x8c/0xd0 [ 21.151282] print_report+0x118/0x608 [ 21.151331] kasan_report+0xdc/0x128 [ 21.151428] kasan_check_range+0x100/0x1a8 [ 21.151496] __kasan_check_write+0x20/0x30 [ 21.152165] kasan_atomics_helper+0x14e4/0x4858 [ 21.152251] kasan_atomics+0x198/0x2e0 [ 21.152336] kunit_try_run_case+0x170/0x3f0 [ 21.152504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.152579] kthread+0x328/0x630 [ 21.152968] ret_from_fork+0x10/0x20 [ 21.153631] [ 21.153678] Allocated by task 268: [ 21.153715] kasan_save_stack+0x3c/0x68 [ 21.153762] kasan_save_track+0x20/0x40 [ 21.153802] kasan_save_alloc_info+0x40/0x58 [ 21.154156] __kasan_kmalloc+0xd4/0xd8 [ 21.154243] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.154529] kasan_atomics+0xb8/0x2e0 [ 21.154919] kunit_try_run_case+0x170/0x3f0 [ 21.155034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.155432] kthread+0x328/0x630 [ 21.156007] ret_from_fork+0x10/0x20 [ 21.156192] [ 21.156273] The buggy address belongs to the object at fff00000c3f85080 [ 21.156273] which belongs to the cache kmalloc-64 of size 64 [ 21.156345] The buggy address is located 0 bytes to the right of [ 21.156345] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.156462] [ 21.156486] The buggy address belongs to the physical page: [ 21.156556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.156919] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.157394] page_type: f5(slab) [ 21.157799] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.158136] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.158259] page dumped because: kasan: bad access detected [ 21.158343] [ 21.158412] Memory state around the buggy address: [ 21.158533] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.158600] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.158813] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.158985] ^ [ 21.159054] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.159403] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.159519] ================================================================== [ 21.101032] ================================================================== [ 21.101091] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 21.101199] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.101279] [ 21.101425] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.101556] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.101794] Hardware name: linux,dummy-virt (DT) [ 21.101852] Call trace: [ 21.101957] show_stack+0x20/0x38 (C) [ 21.102055] dump_stack_lvl+0x8c/0xd0 [ 21.102135] print_report+0x118/0x608 [ 21.102221] kasan_report+0xdc/0x128 [ 21.102468] kasan_check_range+0x100/0x1a8 [ 21.102531] __kasan_check_write+0x20/0x30 [ 21.102593] kasan_atomics_helper+0x1190/0x4858 [ 21.102646] kasan_atomics+0x198/0x2e0 [ 21.102693] kunit_try_run_case+0x170/0x3f0 [ 21.102871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.102958] kthread+0x328/0x630 [ 21.103205] ret_from_fork+0x10/0x20 [ 21.103269] [ 21.103392] Allocated by task 268: [ 21.103447] kasan_save_stack+0x3c/0x68 [ 21.103517] kasan_save_track+0x20/0x40 [ 21.103653] kasan_save_alloc_info+0x40/0x58 [ 21.103751] __kasan_kmalloc+0xd4/0xd8 [ 21.103830] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.104176] kasan_atomics+0xb8/0x2e0 [ 21.104255] kunit_try_run_case+0x170/0x3f0 [ 21.104301] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.104371] kthread+0x328/0x630 [ 21.104462] ret_from_fork+0x10/0x20 [ 21.104582] [ 21.104631] The buggy address belongs to the object at fff00000c3f85080 [ 21.104631] which belongs to the cache kmalloc-64 of size 64 [ 21.104748] The buggy address is located 0 bytes to the right of [ 21.104748] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.104976] [ 21.105026] The buggy address belongs to the physical page: [ 21.105104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.105215] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.105382] page_type: f5(slab) [ 21.105571] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.105716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.105785] page dumped because: kasan: bad access detected [ 21.105881] [ 21.105920] Memory state around the buggy address: [ 21.105970] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.106195] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.106251] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.106311] ^ [ 21.106406] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.106453] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.106608] ================================================================== [ 21.068534] ================================================================== [ 21.068596] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 21.068651] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.068850] [ 21.068892] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.069062] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.069130] Hardware name: linux,dummy-virt (DT) [ 21.069165] Call trace: [ 21.069324] show_stack+0x20/0x38 (C) [ 21.069412] dump_stack_lvl+0x8c/0xd0 [ 21.069476] print_report+0x118/0x608 [ 21.069527] kasan_report+0xdc/0x128 [ 21.069574] kasan_check_range+0x100/0x1a8 [ 21.069625] __kasan_check_write+0x20/0x30 [ 21.069675] kasan_atomics_helper+0xff0/0x4858 [ 21.069725] kasan_atomics+0x198/0x2e0 [ 21.069771] kunit_try_run_case+0x170/0x3f0 [ 21.069825] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.070178] kthread+0x328/0x630 [ 21.070339] ret_from_fork+0x10/0x20 [ 21.070405] [ 21.070428] Allocated by task 268: [ 21.070623] kasan_save_stack+0x3c/0x68 [ 21.070671] kasan_save_track+0x20/0x40 [ 21.070772] kasan_save_alloc_info+0x40/0x58 [ 21.070872] __kasan_kmalloc+0xd4/0xd8 [ 21.070981] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.071263] kasan_atomics+0xb8/0x2e0 [ 21.071418] kunit_try_run_case+0x170/0x3f0 [ 21.071467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.071546] kthread+0x328/0x630 [ 21.071732] ret_from_fork+0x10/0x20 [ 21.071787] [ 21.071850] The buggy address belongs to the object at fff00000c3f85080 [ 21.071850] which belongs to the cache kmalloc-64 of size 64 [ 21.071957] The buggy address is located 0 bytes to the right of [ 21.071957] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.072053] [ 21.072282] The buggy address belongs to the physical page: [ 21.072341] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.072433] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.072577] page_type: f5(slab) [ 21.072622] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.072675] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.072871] page dumped because: kasan: bad access detected [ 21.072910] [ 21.072933] Memory state around the buggy address: [ 21.073032] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.073109] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.073192] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.073359] ^ [ 21.073404] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.073715] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.073812] ================================================================== [ 20.999642] ================================================================== [ 20.999696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 21.000044] Read of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.000132] [ 21.000167] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.000257] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.000402] Hardware name: linux,dummy-virt (DT) [ 21.000449] Call trace: [ 21.000475] show_stack+0x20/0x38 (C) [ 21.000531] dump_stack_lvl+0x8c/0xd0 [ 21.000763] print_report+0x118/0x608 [ 21.000899] kasan_report+0xdc/0x128 [ 21.000953] __asan_report_load4_noabort+0x20/0x30 [ 21.001163] kasan_atomics_helper+0x3dd8/0x4858 [ 21.001233] kasan_atomics+0x198/0x2e0 [ 21.001301] kunit_try_run_case+0x170/0x3f0 [ 21.001409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.001636] kthread+0x328/0x630 [ 21.001695] ret_from_fork+0x10/0x20 [ 21.001786] [ 21.001893] Allocated by task 268: [ 21.001953] kasan_save_stack+0x3c/0x68 [ 21.002127] kasan_save_track+0x20/0x40 [ 21.002193] kasan_save_alloc_info+0x40/0x58 [ 21.002237] __kasan_kmalloc+0xd4/0xd8 [ 21.002277] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.002360] kasan_atomics+0xb8/0x2e0 [ 21.002399] kunit_try_run_case+0x170/0x3f0 [ 21.002625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.002854] kthread+0x328/0x630 [ 21.002921] ret_from_fork+0x10/0x20 [ 21.003106] [ 21.003196] The buggy address belongs to the object at fff00000c3f85080 [ 21.003196] which belongs to the cache kmalloc-64 of size 64 [ 21.003323] The buggy address is located 0 bytes to the right of [ 21.003323] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.003468] [ 21.003533] The buggy address belongs to the physical page: [ 21.005473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.006299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.006517] page_type: f5(slab) [ 21.006567] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.008270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.008506] page dumped because: kasan: bad access detected [ 21.008558] [ 21.008719] Memory state around the buggy address: [ 21.008794] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.008926] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.009002] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.009249] ^ [ 21.009440] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.009543] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.009737] ================================================================== [ 21.053241] ================================================================== [ 21.053300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 21.053469] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.053564] [ 21.053609] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.053708] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.053860] Hardware name: linux,dummy-virt (DT) [ 21.053918] Call trace: [ 21.053964] show_stack+0x20/0x38 (C) [ 21.054136] dump_stack_lvl+0x8c/0xd0 [ 21.054195] print_report+0x118/0x608 [ 21.054270] kasan_report+0xdc/0x128 [ 21.054560] kasan_check_range+0x100/0x1a8 [ 21.054738] __kasan_check_write+0x20/0x30 [ 21.054842] kasan_atomics_helper+0xf20/0x4858 [ 21.055006] kasan_atomics+0x198/0x2e0 [ 21.055123] kunit_try_run_case+0x170/0x3f0 [ 21.055302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.055422] kthread+0x328/0x630 [ 21.055498] ret_from_fork+0x10/0x20 [ 21.055674] [ 21.055723] Allocated by task 268: [ 21.055779] kasan_save_stack+0x3c/0x68 [ 21.055825] kasan_save_track+0x20/0x40 [ 21.056043] kasan_save_alloc_info+0x40/0x58 [ 21.056099] __kasan_kmalloc+0xd4/0xd8 [ 21.056391] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.056802] kasan_atomics+0xb8/0x2e0 [ 21.056859] kunit_try_run_case+0x170/0x3f0 [ 21.056956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.057027] kthread+0x328/0x630 [ 21.057249] ret_from_fork+0x10/0x20 [ 21.057328] [ 21.057405] The buggy address belongs to the object at fff00000c3f85080 [ 21.057405] which belongs to the cache kmalloc-64 of size 64 [ 21.057679] The buggy address is located 0 bytes to the right of [ 21.057679] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.057776] [ 21.057830] The buggy address belongs to the physical page: [ 21.057886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.058096] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.058157] page_type: f5(slab) [ 21.058272] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.058330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.058515] page dumped because: kasan: bad access detected [ 21.058589] [ 21.058657] Memory state around the buggy address: [ 21.058953] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.059127] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.059185] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.059458] ^ [ 21.059515] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.059613] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.059692] ================================================================== [ 20.950025] ================================================================== [ 20.950078] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 20.950141] Write of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 20.950202] [ 20.950248] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 20.950338] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 20.950505] Hardware name: linux,dummy-virt (DT) [ 20.950587] Call trace: [ 20.950663] show_stack+0x20/0x38 (C) [ 20.950736] dump_stack_lvl+0x8c/0xd0 [ 20.950835] print_report+0x118/0x608 [ 20.950890] kasan_report+0xdc/0x128 [ 20.950956] kasan_check_range+0x100/0x1a8 [ 20.951017] __kasan_check_write+0x20/0x30 [ 20.951066] kasan_atomics_helper+0xa04/0x4858 [ 20.951117] kasan_atomics+0x198/0x2e0 [ 20.951165] kunit_try_run_case+0x170/0x3f0 [ 20.951472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.951534] kthread+0x328/0x630 [ 20.951632] ret_from_fork+0x10/0x20 [ 20.951715] [ 20.951754] Allocated by task 268: [ 20.951803] kasan_save_stack+0x3c/0x68 [ 20.951859] kasan_save_track+0x20/0x40 [ 20.951899] kasan_save_alloc_info+0x40/0x58 [ 20.952023] __kasan_kmalloc+0xd4/0xd8 [ 20.952110] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.952187] kasan_atomics+0xb8/0x2e0 [ 20.952247] kunit_try_run_case+0x170/0x3f0 [ 20.952291] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.952338] kthread+0x328/0x630 [ 20.952417] ret_from_fork+0x10/0x20 [ 20.952514] [ 20.952544] The buggy address belongs to the object at fff00000c3f85080 [ 20.952544] which belongs to the cache kmalloc-64 of size 64 [ 20.952604] The buggy address is located 0 bytes to the right of [ 20.952604] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 20.952675] [ 20.952704] The buggy address belongs to the physical page: [ 20.952739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 20.952791] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.952852] page_type: f5(slab) [ 20.952910] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.952963] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.953019] page dumped because: kasan: bad access detected [ 20.953062] [ 20.953091] Memory state around the buggy address: [ 20.953127] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.953173] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.953219] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.953259] ^ [ 20.953405] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.953464] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.953506] ================================================================== [ 21.123970] ================================================================== [ 21.124024] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 21.124077] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.124289] [ 21.124336] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.124643] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.124688] Hardware name: linux,dummy-virt (DT) [ 21.124724] Call trace: [ 21.124750] show_stack+0x20/0x38 (C) [ 21.124805] dump_stack_lvl+0x8c/0xd0 [ 21.124886] print_report+0x118/0x608 [ 21.125080] kasan_report+0xdc/0x128 [ 21.125144] kasan_check_range+0x100/0x1a8 [ 21.125257] __kasan_check_write+0x20/0x30 [ 21.125323] kasan_atomics_helper+0x1384/0x4858 [ 21.125386] kasan_atomics+0x198/0x2e0 [ 21.125499] kunit_try_run_case+0x170/0x3f0 [ 21.125587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.125648] kthread+0x328/0x630 [ 21.125696] ret_from_fork+0x10/0x20 [ 21.125766] [ 21.125787] Allocated by task 268: [ 21.125816] kasan_save_stack+0x3c/0x68 [ 21.125876] kasan_save_track+0x20/0x40 [ 21.125939] kasan_save_alloc_info+0x40/0x58 [ 21.125983] __kasan_kmalloc+0xd4/0xd8 [ 21.126023] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.126069] kasan_atomics+0xb8/0x2e0 [ 21.126117] kunit_try_run_case+0x170/0x3f0 [ 21.126170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.126219] kthread+0x328/0x630 [ 21.126258] ret_from_fork+0x10/0x20 [ 21.126298] [ 21.126328] The buggy address belongs to the object at fff00000c3f85080 [ 21.126328] which belongs to the cache kmalloc-64 of size 64 [ 21.126408] The buggy address is located 0 bytes to the right of [ 21.126408] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.126486] [ 21.126523] The buggy address belongs to the physical page: [ 21.126577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.126640] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.126691] page_type: f5(slab) [ 21.126738] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.126790] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.126842] page dumped because: kasan: bad access detected [ 21.126885] [ 21.126914] Memory state around the buggy address: [ 21.126956] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.127015] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.127072] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.127112] ^ [ 21.127149] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.127194] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.127235] ================================================================== [ 20.959740] ================================================================== [ 20.959796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 20.959849] Write of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 20.959900] [ 20.959933] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 20.960164] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 20.960200] Hardware name: linux,dummy-virt (DT) [ 20.960234] Call trace: [ 20.960261] show_stack+0x20/0x38 (C) [ 20.960315] dump_stack_lvl+0x8c/0xd0 [ 20.960376] print_report+0x118/0x608 [ 20.960581] kasan_report+0xdc/0x128 [ 20.960767] kasan_check_range+0x100/0x1a8 [ 20.960848] __kasan_check_write+0x20/0x30 [ 20.960900] kasan_atomics_helper+0xad4/0x4858 [ 20.960951] kasan_atomics+0x198/0x2e0 [ 20.960999] kunit_try_run_case+0x170/0x3f0 [ 20.961072] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.961132] kthread+0x328/0x630 [ 20.961180] ret_from_fork+0x10/0x20 [ 20.961232] [ 20.961254] Allocated by task 268: [ 20.961486] kasan_save_stack+0x3c/0x68 [ 20.961537] kasan_save_track+0x20/0x40 [ 20.961579] kasan_save_alloc_info+0x40/0x58 [ 20.961622] __kasan_kmalloc+0xd4/0xd8 [ 20.961661] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.961707] kasan_atomics+0xb8/0x2e0 [ 20.961744] kunit_try_run_case+0x170/0x3f0 [ 20.961787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.961837] kthread+0x328/0x630 [ 20.961875] ret_from_fork+0x10/0x20 [ 20.961913] [ 20.961936] The buggy address belongs to the object at fff00000c3f85080 [ 20.961936] which belongs to the cache kmalloc-64 of size 64 [ 20.961997] The buggy address is located 0 bytes to the right of [ 20.961997] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 20.962063] [ 20.962085] The buggy address belongs to the physical page: [ 20.962118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 20.962170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.962220] page_type: f5(slab) [ 20.962260] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.962314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.962366] page dumped because: kasan: bad access detected [ 20.962453] [ 20.962503] Memory state around the buggy address: [ 20.962552] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.962667] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.962722] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.962791] ^ [ 20.962977] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.963135] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.963234] ================================================================== [ 21.180703] ================================================================== [ 21.180751] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 21.180799] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.180850] [ 21.180882] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.180968] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.181000] Hardware name: linux,dummy-virt (DT) [ 21.181032] Call trace: [ 21.181056] show_stack+0x20/0x38 (C) [ 21.181107] dump_stack_lvl+0x8c/0xd0 [ 21.181157] print_report+0x118/0x608 [ 21.181205] kasan_report+0xdc/0x128 [ 21.181252] kasan_check_range+0x100/0x1a8 [ 21.181303] __kasan_check_write+0x20/0x30 [ 21.181381] kasan_atomics_helper+0x1644/0x4858 [ 21.181518] kasan_atomics+0x198/0x2e0 [ 21.181591] kunit_try_run_case+0x170/0x3f0 [ 21.181644] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.181702] kthread+0x328/0x630 [ 21.181749] ret_from_fork+0x10/0x20 [ 21.181802] [ 21.181823] Allocated by task 268: [ 21.182143] kasan_save_stack+0x3c/0x68 [ 21.182189] kasan_save_track+0x20/0x40 [ 21.182267] kasan_save_alloc_info+0x40/0x58 [ 21.182391] __kasan_kmalloc+0xd4/0xd8 [ 21.182532] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.182628] kasan_atomics+0xb8/0x2e0 [ 21.182695] kunit_try_run_case+0x170/0x3f0 [ 21.182989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.183070] kthread+0x328/0x630 [ 21.183171] ret_from_fork+0x10/0x20 [ 21.183213] [ 21.183243] The buggy address belongs to the object at fff00000c3f85080 [ 21.183243] which belongs to the cache kmalloc-64 of size 64 [ 21.183312] The buggy address is located 0 bytes to the right of [ 21.183312] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.183388] [ 21.183412] The buggy address belongs to the physical page: [ 21.183445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.183520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.183572] page_type: f5(slab) [ 21.183614] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.183681] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.183724] page dumped because: kasan: bad access detected [ 21.183759] [ 21.183780] Memory state around the buggy address: [ 21.183812] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.183858] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.183910] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.183950] ^ [ 21.183987] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.184031] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.184072] ================================================================== [ 21.107671] ================================================================== [ 21.107737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 21.107802] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.107854] [ 21.107887] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.107977] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.108010] Hardware name: linux,dummy-virt (DT) [ 21.108075] Call trace: [ 21.108116] show_stack+0x20/0x38 (C) [ 21.108173] dump_stack_lvl+0x8c/0xd0 [ 21.108226] print_report+0x118/0x608 [ 21.108275] kasan_report+0xdc/0x128 [ 21.108321] kasan_check_range+0x100/0x1a8 [ 21.108392] __kasan_check_write+0x20/0x30 [ 21.108444] kasan_atomics_helper+0x11f8/0x4858 [ 21.108493] kasan_atomics+0x198/0x2e0 [ 21.108540] kunit_try_run_case+0x170/0x3f0 [ 21.108598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.108657] kthread+0x328/0x630 [ 21.108704] ret_from_fork+0x10/0x20 [ 21.108765] [ 21.108794] Allocated by task 268: [ 21.108846] kasan_save_stack+0x3c/0x68 [ 21.108898] kasan_save_track+0x20/0x40 [ 21.108946] kasan_save_alloc_info+0x40/0x58 [ 21.108998] __kasan_kmalloc+0xd4/0xd8 [ 21.109038] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.109084] kasan_atomics+0xb8/0x2e0 [ 21.109122] kunit_try_run_case+0x170/0x3f0 [ 21.109165] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.109214] kthread+0x328/0x630 [ 21.109261] ret_from_fork+0x10/0x20 [ 21.109302] [ 21.109324] The buggy address belongs to the object at fff00000c3f85080 [ 21.109324] which belongs to the cache kmalloc-64 of size 64 [ 21.109798] The buggy address is located 0 bytes to the right of [ 21.109798] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.110103] [ 21.110181] The buggy address belongs to the physical page: [ 21.110233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.110291] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.110361] page_type: f5(slab) [ 21.110410] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.110465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.110509] page dumped because: kasan: bad access detected [ 21.110546] [ 21.110566] Memory state around the buggy address: [ 21.110763] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.110847] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.110995] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.111271] ^ [ 21.111367] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.111459] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.111565] ================================================================== [ 21.047423] ================================================================== [ 21.047479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 21.047752] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.047842] [ 21.047885] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.048072] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.048127] Hardware name: linux,dummy-virt (DT) [ 21.048184] Call trace: [ 21.048210] show_stack+0x20/0x38 (C) [ 21.048264] dump_stack_lvl+0x8c/0xd0 [ 21.048401] print_report+0x118/0x608 [ 21.048448] kasan_report+0xdc/0x128 [ 21.048497] kasan_check_range+0x100/0x1a8 [ 21.048556] __kasan_check_write+0x20/0x30 [ 21.048623] kasan_atomics_helper+0xeb8/0x4858 [ 21.048672] kasan_atomics+0x198/0x2e0 [ 21.048718] kunit_try_run_case+0x170/0x3f0 [ 21.048777] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.048836] kthread+0x328/0x630 [ 21.048885] ret_from_fork+0x10/0x20 [ 21.048937] [ 21.048959] Allocated by task 268: [ 21.048991] kasan_save_stack+0x3c/0x68 [ 21.049035] kasan_save_track+0x20/0x40 [ 21.049075] kasan_save_alloc_info+0x40/0x58 [ 21.049118] __kasan_kmalloc+0xd4/0xd8 [ 21.049155] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.049200] kasan_atomics+0xb8/0x2e0 [ 21.049238] kunit_try_run_case+0x170/0x3f0 [ 21.049281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.049338] kthread+0x328/0x630 [ 21.049388] ret_from_fork+0x10/0x20 [ 21.049442] [ 21.050037] The buggy address belongs to the object at fff00000c3f85080 [ 21.050037] which belongs to the cache kmalloc-64 of size 64 [ 21.050116] The buggy address is located 0 bytes to the right of [ 21.050116] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.050431] [ 21.050506] The buggy address belongs to the physical page: [ 21.050565] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.050787] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.051033] page_type: f5(slab) [ 21.051103] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.051206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.051269] page dumped because: kasan: bad access detected [ 21.051384] [ 21.051445] Memory state around the buggy address: [ 21.051508] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.051727] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.051809] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.052006] ^ [ 21.052063] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.052129] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.052371] ================================================================== [ 20.937073] ================================================================== [ 20.937134] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 20.937204] Read of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 20.937707] show_stack+0x20/0x38 (C) [ 20.939485] The buggy address is located 0 bytes to the right of [ 20.939485] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 20.940247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.940515] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.942598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.942675] kthread+0x328/0x630 [ 20.942724] ret_from_fork+0x10/0x20 [ 20.943054] [ 20.943112] Allocated by task 268: [ 20.943169] kasan_save_stack+0x3c/0x68 [ 20.943213] kasan_save_track+0x20/0x40 [ 20.943269] kasan_save_alloc_info+0x40/0x58 [ 20.943326] __kasan_kmalloc+0xd4/0xd8 [ 20.943430] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.943489] kasan_atomics+0xb8/0x2e0 [ 20.943548] kunit_try_run_case+0x170/0x3f0 [ 20.943702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.943753] kthread+0x328/0x630 [ 20.943801] ret_from_fork+0x10/0x20 [ 20.943874] [ 20.943971] The buggy address belongs to the object at fff00000c3f85080 [ 20.943971] which belongs to the cache kmalloc-64 of size 64 [ 20.944058] The buggy address is located 0 bytes to the right of [ 20.944058] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 20.944177] [ 20.944227] The buggy address belongs to the physical page: [ 20.944285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 20.944385] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.944472] page_type: f5(slab) [ 20.944537] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.944635] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.944706] page dumped because: kasan: bad access detected [ 20.944861] [ 20.944883] Memory state around the buggy address: [ 20.944928] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.945045] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.945190] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.945283] ^ [ 20.945320] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.945376] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.945417] ================================================================== [ 21.160035] ================================================================== [ 21.160248] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 21.160304] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.160703] [ 21.160811] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.160977] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.161035] Hardware name: linux,dummy-virt (DT) [ 21.161081] Call trace: [ 21.161118] show_stack+0x20/0x38 (C) [ 21.161181] dump_stack_lvl+0x8c/0xd0 [ 21.161237] print_report+0x118/0x608 [ 21.161403] kasan_report+0xdc/0x128 [ 21.161761] kasan_check_range+0x100/0x1a8 [ 21.161885] __kasan_check_write+0x20/0x30 [ 21.161961] kasan_atomics_helper+0x154c/0x4858 [ 21.162064] kasan_atomics+0x198/0x2e0 [ 21.162179] kunit_try_run_case+0x170/0x3f0 [ 21.162238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.162556] kthread+0x328/0x630 [ 21.162719] ret_from_fork+0x10/0x20 [ 21.163081] [ 21.163153] Allocated by task 268: [ 21.163222] kasan_save_stack+0x3c/0x68 [ 21.163336] kasan_save_track+0x20/0x40 [ 21.163420] kasan_save_alloc_info+0x40/0x58 [ 21.163546] __kasan_kmalloc+0xd4/0xd8 [ 21.163615] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.163738] kasan_atomics+0xb8/0x2e0 [ 21.163808] kunit_try_run_case+0x170/0x3f0 [ 21.163918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.163983] kthread+0x328/0x630 [ 21.164023] ret_from_fork+0x10/0x20 [ 21.164089] [ 21.164248] The buggy address belongs to the object at fff00000c3f85080 [ 21.164248] which belongs to the cache kmalloc-64 of size 64 [ 21.164483] The buggy address is located 0 bytes to the right of [ 21.164483] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.164814] [ 21.165207] The buggy address belongs to the physical page: [ 21.165271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.165372] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.165597] page_type: f5(slab) [ 21.165650] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.165761] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.166010] page dumped because: kasan: bad access detected [ 21.166271] [ 21.166440] Memory state around the buggy address: [ 21.166502] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.166714] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.166924] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.166987] ^ [ 21.167166] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.167421] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.167469] ================================================================== [ 21.080551] ================================================================== [ 21.080608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 21.080660] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.080712] [ 21.080745] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.080834] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.080874] Hardware name: linux,dummy-virt (DT) [ 21.080917] Call trace: [ 21.080942] show_stack+0x20/0x38 (C) [ 21.080993] dump_stack_lvl+0x8c/0xd0 [ 21.081043] print_report+0x118/0x608 [ 21.081092] kasan_report+0xdc/0x128 [ 21.081138] kasan_check_range+0x100/0x1a8 [ 21.081194] __kasan_check_write+0x20/0x30 [ 21.081247] kasan_atomics_helper+0x10c0/0x4858 [ 21.081297] kasan_atomics+0x198/0x2e0 [ 21.081343] kunit_try_run_case+0x170/0x3f0 [ 21.081418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.081730] kthread+0x328/0x630 [ 21.081794] ret_from_fork+0x10/0x20 [ 21.081847] [ 21.081877] Allocated by task 268: [ 21.081910] kasan_save_stack+0x3c/0x68 [ 21.081954] kasan_save_track+0x20/0x40 [ 21.081994] kasan_save_alloc_info+0x40/0x58 [ 21.082067] __kasan_kmalloc+0xd4/0xd8 [ 21.082108] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.082321] kasan_atomics+0xb8/0x2e0 [ 21.082690] kunit_try_run_case+0x170/0x3f0 [ 21.082761] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.082995] kthread+0x328/0x630 [ 21.083065] ret_from_fork+0x10/0x20 [ 21.083142] [ 21.083205] The buggy address belongs to the object at fff00000c3f85080 [ 21.083205] which belongs to the cache kmalloc-64 of size 64 [ 21.083510] The buggy address is located 0 bytes to the right of [ 21.083510] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.083728] [ 21.083789] The buggy address belongs to the physical page: [ 21.083940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.084024] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.084225] page_type: f5(slab) [ 21.084282] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.084368] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.084471] page dumped because: kasan: bad access detected [ 21.084529] [ 21.084549] Memory state around the buggy address: [ 21.084585] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.084783] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.084852] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.084900] ^ [ 21.084949] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.085058] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.085133] ================================================================== [ 21.184257] ================================================================== [ 21.184303] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 21.184367] Read of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.184419] [ 21.184450] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.184533] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.184566] Hardware name: linux,dummy-virt (DT) [ 21.184628] Call trace: [ 21.184654] show_stack+0x20/0x38 (C) [ 21.184707] dump_stack_lvl+0x8c/0xd0 [ 21.184757] print_report+0x118/0x608 [ 21.184980] kasan_report+0xdc/0x128 [ 21.185049] __asan_report_load8_noabort+0x20/0x30 [ 21.185104] kasan_atomics_helper+0x3df4/0x4858 [ 21.185156] kasan_atomics+0x198/0x2e0 [ 21.185202] kunit_try_run_case+0x170/0x3f0 [ 21.185276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.185336] kthread+0x328/0x630 [ 21.185394] ret_from_fork+0x10/0x20 [ 21.185452] [ 21.185508] Allocated by task 268: [ 21.185691] kasan_save_stack+0x3c/0x68 [ 21.185984] kasan_save_track+0x20/0x40 [ 21.186151] kasan_save_alloc_info+0x40/0x58 [ 21.186239] __kasan_kmalloc+0xd4/0xd8 [ 21.186439] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.186507] kasan_atomics+0xb8/0x2e0 [ 21.186561] kunit_try_run_case+0x170/0x3f0 [ 21.186609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.186659] kthread+0x328/0x630 [ 21.186893] ret_from_fork+0x10/0x20 [ 21.186981] [ 21.187041] The buggy address belongs to the object at fff00000c3f85080 [ 21.187041] which belongs to the cache kmalloc-64 of size 64 [ 21.187284] The buggy address is located 0 bytes to the right of [ 21.187284] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.187428] [ 21.187658] The buggy address belongs to the physical page: [ 21.187833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.187898] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.188090] page_type: f5(slab) [ 21.188177] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.188231] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.188445] page dumped because: kasan: bad access detected [ 21.188596] [ 21.188676] Memory state around the buggy address: [ 21.188744] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.188916] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.189046] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.189231] ^ [ 21.189295] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.189525] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.189674] ================================================================== [ 20.953635] ================================================================== [ 20.953710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 20.953786] Write of size 4 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 20.953865] [ 20.953920] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 20.954147] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 20.954252] Hardware name: linux,dummy-virt (DT) [ 20.954400] Call trace: [ 20.954481] show_stack+0x20/0x38 (C) [ 20.954565] dump_stack_lvl+0x8c/0xd0 [ 20.954646] print_report+0x118/0x608 [ 20.954695] kasan_report+0xdc/0x128 [ 20.954743] kasan_check_range+0x100/0x1a8 [ 20.954812] __kasan_check_write+0x20/0x30 [ 20.954863] kasan_atomics_helper+0xa6c/0x4858 [ 20.955034] kasan_atomics+0x198/0x2e0 [ 20.955083] kunit_try_run_case+0x170/0x3f0 [ 20.955136] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.955210] kthread+0x328/0x630 [ 20.955286] ret_from_fork+0x10/0x20 [ 20.955407] [ 20.955447] Allocated by task 268: [ 20.955510] kasan_save_stack+0x3c/0x68 [ 20.955570] kasan_save_track+0x20/0x40 [ 20.955712] kasan_save_alloc_info+0x40/0x58 [ 20.955800] __kasan_kmalloc+0xd4/0xd8 [ 20.955973] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.956051] kasan_atomics+0xb8/0x2e0 [ 20.956137] kunit_try_run_case+0x170/0x3f0 [ 20.956217] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.956313] kthread+0x328/0x630 [ 20.956437] ret_from_fork+0x10/0x20 [ 20.956516] [ 20.956538] The buggy address belongs to the object at fff00000c3f85080 [ 20.956538] which belongs to the cache kmalloc-64 of size 64 [ 20.956597] The buggy address is located 0 bytes to the right of [ 20.956597] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 20.956897] [ 20.956968] The buggy address belongs to the physical page: [ 20.957068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 20.957155] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.957229] page_type: f5(slab) [ 20.957271] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 20.957329] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.957383] page dumped because: kasan: bad access detected [ 20.957416] [ 20.957436] Memory state around the buggy address: [ 20.957509] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.957555] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.957601] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 20.957639] ^ [ 20.957958] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.958088] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.958147] ================================================================== [ 21.074771] ================================================================== [ 21.075006] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 21.075120] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.075174] [ 21.075225] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.075437] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.075483] Hardware name: linux,dummy-virt (DT) [ 21.075518] Call trace: [ 21.075545] show_stack+0x20/0x38 (C) [ 21.075748] dump_stack_lvl+0x8c/0xd0 [ 21.075826] print_report+0x118/0x608 [ 21.075908] kasan_report+0xdc/0x128 [ 21.076007] kasan_check_range+0x100/0x1a8 [ 21.076075] __kasan_check_write+0x20/0x30 [ 21.076127] kasan_atomics_helper+0x1058/0x4858 [ 21.076317] kasan_atomics+0x198/0x2e0 [ 21.076385] kunit_try_run_case+0x170/0x3f0 [ 21.076457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.076519] kthread+0x328/0x630 [ 21.076622] ret_from_fork+0x10/0x20 [ 21.076676] [ 21.076717] Allocated by task 268: [ 21.076750] kasan_save_stack+0x3c/0x68 [ 21.076854] kasan_save_track+0x20/0x40 [ 21.076912] kasan_save_alloc_info+0x40/0x58 [ 21.077094] __kasan_kmalloc+0xd4/0xd8 [ 21.077153] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.077224] kasan_atomics+0xb8/0x2e0 [ 21.077272] kunit_try_run_case+0x170/0x3f0 [ 21.077325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.077491] kthread+0x328/0x630 [ 21.077586] ret_from_fork+0x10/0x20 [ 21.077852] [ 21.078126] The buggy address belongs to the object at fff00000c3f85080 [ 21.078126] which belongs to the cache kmalloc-64 of size 64 [ 21.078245] The buggy address is located 0 bytes to the right of [ 21.078245] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.078335] [ 21.078373] The buggy address belongs to the physical page: [ 21.078407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.078598] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.078679] page_type: f5(slab) [ 21.078730] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.078783] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.078885] page dumped because: kasan: bad access detected [ 21.078957] [ 21.079055] Memory state around the buggy address: [ 21.079112] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.079188] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.079560] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.079628] ^ [ 21.079667] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.079732] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.079827] ================================================================== [ 21.143113] ================================================================== [ 21.143427] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 21.143601] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.143655] [ 21.143700] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.143790] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.143822] Hardware name: linux,dummy-virt (DT) [ 21.143858] Call trace: [ 21.143885] show_stack+0x20/0x38 (C) [ 21.143936] dump_stack_lvl+0x8c/0xd0 [ 21.143990] print_report+0x118/0x608 [ 21.144038] kasan_report+0xdc/0x128 [ 21.144101] kasan_check_range+0x100/0x1a8 [ 21.144174] __kasan_check_write+0x20/0x30 [ 21.144228] kasan_atomics_helper+0x147c/0x4858 [ 21.144280] kasan_atomics+0x198/0x2e0 [ 21.144327] kunit_try_run_case+0x170/0x3f0 [ 21.144395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.144453] kthread+0x328/0x630 [ 21.144513] ret_from_fork+0x10/0x20 [ 21.144580] [ 21.144606] Allocated by task 268: [ 21.144639] kasan_save_stack+0x3c/0x68 [ 21.144681] kasan_save_track+0x20/0x40 [ 21.144722] kasan_save_alloc_info+0x40/0x58 [ 21.144774] __kasan_kmalloc+0xd4/0xd8 [ 21.144822] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.144869] kasan_atomics+0xb8/0x2e0 [ 21.144907] kunit_try_run_case+0x170/0x3f0 [ 21.144950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.145006] kthread+0x328/0x630 [ 21.145045] ret_from_fork+0x10/0x20 [ 21.145085] [ 21.145115] The buggy address belongs to the object at fff00000c3f85080 [ 21.145115] which belongs to the cache kmalloc-64 of size 64 [ 21.145174] The buggy address is located 0 bytes to the right of [ 21.145174] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.145257] [ 21.145281] The buggy address belongs to the physical page: [ 21.145315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.146376] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.146439] page_type: f5(slab) [ 21.146490] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.146657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.146942] page dumped because: kasan: bad access detected [ 21.147303] [ 21.147370] Memory state around the buggy address: [ 21.147423] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.147470] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.147843] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.147915] ^ [ 21.147963] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.148020] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.148060] ================================================================== [ 21.134715] ================================================================== [ 21.134772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 21.134834] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.134889] [ 21.135114] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.135384] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.135429] Hardware name: linux,dummy-virt (DT) [ 21.135465] Call trace: [ 21.135695] show_stack+0x20/0x38 (C) [ 21.135768] dump_stack_lvl+0x8c/0xd0 [ 21.135926] print_report+0x118/0x608 [ 21.135988] kasan_report+0xdc/0x128 [ 21.136035] kasan_check_range+0x100/0x1a8 [ 21.136088] __kasan_check_write+0x20/0x30 [ 21.136141] kasan_atomics_helper+0x1414/0x4858 [ 21.136193] kasan_atomics+0x198/0x2e0 [ 21.136241] kunit_try_run_case+0x170/0x3f0 [ 21.136293] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.136855] kthread+0x328/0x630 [ 21.136934] ret_from_fork+0x10/0x20 [ 21.137056] [ 21.137097] Allocated by task 268: [ 21.137134] kasan_save_stack+0x3c/0x68 [ 21.137190] kasan_save_track+0x20/0x40 [ 21.137314] kasan_save_alloc_info+0x40/0x58 [ 21.137401] __kasan_kmalloc+0xd4/0xd8 [ 21.137445] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.137908] kasan_atomics+0xb8/0x2e0 [ 21.137985] kunit_try_run_case+0x170/0x3f0 [ 21.138061] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.138385] kthread+0x328/0x630 [ 21.138441] ret_from_fork+0x10/0x20 [ 21.138678] [ 21.139053] The buggy address belongs to the object at fff00000c3f85080 [ 21.139053] which belongs to the cache kmalloc-64 of size 64 [ 21.139164] The buggy address is located 0 bytes to the right of [ 21.139164] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.139444] [ 21.139490] The buggy address belongs to the physical page: [ 21.139526] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.139900] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.140320] page_type: f5(slab) [ 21.140471] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.140529] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.140574] page dumped because: kasan: bad access detected [ 21.140868] [ 21.141369] Memory state around the buggy address: [ 21.141449] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.141618] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.141686] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.142016] ^ [ 21.142147] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.142297] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.142421] ================================================================== [ 21.112582] ================================================================== [ 21.112657] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 21.112721] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.112833] [ 21.112868] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.113076] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.113120] Hardware name: linux,dummy-virt (DT) [ 21.113261] Call trace: [ 21.113301] show_stack+0x20/0x38 (C) [ 21.113375] dump_stack_lvl+0x8c/0xd0 [ 21.113582] print_report+0x118/0x608 [ 21.113672] kasan_report+0xdc/0x128 [ 21.113755] kasan_check_range+0x100/0x1a8 [ 21.113854] __kasan_check_write+0x20/0x30 [ 21.113944] kasan_atomics_helper+0x126c/0x4858 [ 21.114072] kasan_atomics+0x198/0x2e0 [ 21.114151] kunit_try_run_case+0x170/0x3f0 [ 21.114258] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.114345] kthread+0x328/0x630 [ 21.114429] ret_from_fork+0x10/0x20 [ 21.114629] [ 21.114653] Allocated by task 268: [ 21.114684] kasan_save_stack+0x3c/0x68 [ 21.114755] kasan_save_track+0x20/0x40 [ 21.114854] kasan_save_alloc_info+0x40/0x58 [ 21.114954] __kasan_kmalloc+0xd4/0xd8 [ 21.115075] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.115280] kasan_atomics+0xb8/0x2e0 [ 21.115336] kunit_try_run_case+0x170/0x3f0 [ 21.115437] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.115530] kthread+0x328/0x630 [ 21.115600] ret_from_fork+0x10/0x20 [ 21.115668] [ 21.115805] The buggy address belongs to the object at fff00000c3f85080 [ 21.115805] which belongs to the cache kmalloc-64 of size 64 [ 21.115869] The buggy address is located 0 bytes to the right of [ 21.115869] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.116078] [ 21.116107] The buggy address belongs to the physical page: [ 21.116141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.116232] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.116364] page_type: f5(slab) [ 21.116428] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.116612] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.116686] page dumped because: kasan: bad access detected [ 21.116723] [ 21.116769] Memory state around the buggy address: [ 21.116819] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.116865] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.116909] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.117124] ^ [ 21.117224] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.117299] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.117362] ================================================================== [ 21.168232] ================================================================== [ 21.168293] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 21.168361] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.168415] [ 21.168450] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.168539] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.168963] Hardware name: linux,dummy-virt (DT) [ 21.169097] Call trace: [ 21.169221] show_stack+0x20/0x38 (C) [ 21.169282] dump_stack_lvl+0x8c/0xd0 [ 21.169338] print_report+0x118/0x608 [ 21.169487] kasan_report+0xdc/0x128 [ 21.169598] kasan_check_range+0x100/0x1a8 [ 21.169698] __kasan_check_write+0x20/0x30 [ 21.169752] kasan_atomics_helper+0x15b4/0x4858 [ 21.169805] kasan_atomics+0x198/0x2e0 [ 21.169851] kunit_try_run_case+0x170/0x3f0 [ 21.170150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.170578] kthread+0x328/0x630 [ 21.170664] ret_from_fork+0x10/0x20 [ 21.170827] [ 21.170878] Allocated by task 268: [ 21.170935] kasan_save_stack+0x3c/0x68 [ 21.171068] kasan_save_track+0x20/0x40 [ 21.171139] kasan_save_alloc_info+0x40/0x58 [ 21.171202] __kasan_kmalloc+0xd4/0xd8 [ 21.171243] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.171896] kasan_atomics+0xb8/0x2e0 [ 21.171998] kunit_try_run_case+0x170/0x3f0 [ 21.172053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.173608] kthread+0x328/0x630 [ 21.173670] ret_from_fork+0x10/0x20 [ 21.173713] [ 21.173737] The buggy address belongs to the object at fff00000c3f85080 [ 21.173737] which belongs to the cache kmalloc-64 of size 64 [ 21.174391] The buggy address is located 0 bytes to the right of [ 21.174391] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.174473] [ 21.174499] The buggy address belongs to the physical page: [ 21.174534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.174592] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.174646] page_type: f5(slab) [ 21.174690] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.174743] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.174787] page dumped because: kasan: bad access detected [ 21.174822] [ 21.174842] Memory state around the buggy address: [ 21.174878] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.174922] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.174969] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.175014] ^ [ 21.175050] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.175095] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.175134] ================================================================== [ 21.061162] ================================================================== [ 21.061223] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 21.061280] Write of size 8 at addr fff00000c3f850b0 by task kunit_try_catch/268 [ 21.061365] [ 21.061406] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 21.061605] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.061970] Hardware name: linux,dummy-virt (DT) [ 21.062040] Call trace: [ 21.062080] show_stack+0x20/0x38 (C) [ 21.062144] dump_stack_lvl+0x8c/0xd0 [ 21.062221] print_report+0x118/0x608 [ 21.062270] kasan_report+0xdc/0x128 [ 21.062520] kasan_check_range+0x100/0x1a8 [ 21.062592] __kasan_check_write+0x20/0x30 [ 21.062843] kasan_atomics_helper+0xf88/0x4858 [ 21.062960] kasan_atomics+0x198/0x2e0 [ 21.063059] kunit_try_run_case+0x170/0x3f0 [ 21.063277] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.063395] kthread+0x328/0x630 [ 21.063748] ret_from_fork+0x10/0x20 [ 21.064007] [ 21.064076] Allocated by task 268: [ 21.064116] kasan_save_stack+0x3c/0x68 [ 21.064165] kasan_save_track+0x20/0x40 [ 21.064362] kasan_save_alloc_info+0x40/0x58 [ 21.064467] __kasan_kmalloc+0xd4/0xd8 [ 21.064643] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.064823] kasan_atomics+0xb8/0x2e0 [ 21.064982] kunit_try_run_case+0x170/0x3f0 [ 21.065079] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.065193] kthread+0x328/0x630 [ 21.065238] ret_from_fork+0x10/0x20 [ 21.065435] [ 21.065529] The buggy address belongs to the object at fff00000c3f85080 [ 21.065529] which belongs to the cache kmalloc-64 of size 64 [ 21.065700] The buggy address is located 0 bytes to the right of [ 21.065700] allocated 48-byte region [fff00000c3f85080, fff00000c3f850b0) [ 21.066019] [ 21.066091] The buggy address belongs to the physical page: [ 21.066146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f85 [ 21.066214] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.066277] page_type: f5(slab) [ 21.066484] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.066636] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.066695] page dumped because: kasan: bad access detected [ 21.066774] [ 21.066835] Memory state around the buggy address: [ 21.067006] fff00000c3f84f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.067124] fff00000c3f85000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.067178] >fff00000c3f85080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 21.067219] ^ [ 21.067257] fff00000c3f85100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.067423] fff00000c3f85180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.067496] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 20.572968] ================================================================== [ 20.573023] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 20.573084] Free of addr fff00000c3f9e301 by task kunit_try_catch/244 [ 20.573126] [ 20.573159] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 20.573318] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 20.573382] Hardware name: linux,dummy-virt (DT) [ 20.573452] Call trace: [ 20.573507] show_stack+0x20/0x38 (C) [ 20.573615] dump_stack_lvl+0x8c/0xd0 [ 20.573705] print_report+0x118/0x608 [ 20.573758] kasan_report_invalid_free+0xc0/0xe8 [ 20.573812] check_slab_allocation+0xfc/0x108 [ 20.573877] __kasan_mempool_poison_object+0x78/0x150 [ 20.573944] mempool_free+0x28c/0x328 [ 20.573997] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 20.574059] mempool_kmalloc_invalid_free+0xc0/0x118 [ 20.574118] kunit_try_run_case+0x170/0x3f0 [ 20.574206] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.574445] kthread+0x328/0x630 [ 20.574527] ret_from_fork+0x10/0x20 [ 20.574592] [ 20.574643] Allocated by task 244: [ 20.574710] kasan_save_stack+0x3c/0x68 [ 20.574819] kasan_save_track+0x20/0x40 [ 20.574885] kasan_save_alloc_info+0x40/0x58 [ 20.574929] __kasan_mempool_unpoison_object+0x11c/0x180 [ 20.574977] remove_element+0x130/0x1f8 [ 20.575024] mempool_alloc_preallocated+0x58/0xc0 [ 20.575080] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 20.575141] mempool_kmalloc_invalid_free+0xc0/0x118 [ 20.575188] kunit_try_run_case+0x170/0x3f0 [ 20.575269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.575382] kthread+0x328/0x630 [ 20.575483] ret_from_fork+0x10/0x20 [ 20.575586] [ 20.575608] The buggy address belongs to the object at fff00000c3f9e300 [ 20.575608] which belongs to the cache kmalloc-128 of size 128 [ 20.575679] The buggy address is located 1 bytes inside of [ 20.575679] 128-byte region [fff00000c3f9e300, fff00000c3f9e380) [ 20.575740] [ 20.575762] The buggy address belongs to the physical page: [ 20.575806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9e [ 20.575871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.576014] page_type: f5(slab) [ 20.576109] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.576216] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.576293] page dumped because: kasan: bad access detected [ 20.576376] [ 20.576397] Memory state around the buggy address: [ 20.576431] fff00000c3f9e200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.576702] fff00000c3f9e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.576779] >fff00000c3f9e300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.576878] ^ [ 20.577019] fff00000c3f9e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.577156] fff00000c3f9e400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.577218] ================================================================== [ 20.583509] ================================================================== [ 20.583568] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 20.583632] Free of addr fff00000c65c4001 by task kunit_try_catch/246 [ 20.583677] [ 20.583710] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 20.583798] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 20.583829] Hardware name: linux,dummy-virt (DT) [ 20.583864] Call trace: [ 20.583888] show_stack+0x20/0x38 (C) [ 20.583940] dump_stack_lvl+0x8c/0xd0 [ 20.583992] print_report+0x118/0x608 [ 20.584039] kasan_report_invalid_free+0xc0/0xe8 [ 20.584093] __kasan_mempool_poison_object+0xfc/0x150 [ 20.584148] mempool_free+0x28c/0x328 [ 20.584200] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 20.584258] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 20.584318] kunit_try_run_case+0x170/0x3f0 [ 20.584427] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.584490] kthread+0x328/0x630 [ 20.584558] ret_from_fork+0x10/0x20 [ 20.584610] [ 20.584652] The buggy address belongs to the physical page: [ 20.584687] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c4 [ 20.584801] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.584889] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.584946] page_type: f8(unknown) [ 20.586061] >fff00000c65c4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.594749] [ 20.594844] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47bf1 [ 20.595209] ffffaf0a3e9f1400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.620509] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 20.620867] Read of size 1 at addr ffff800080a37c2a by task kunit_try_catch/252 [ 20.620942] [ 20.621164] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 20.622733] ret_from_fork+0x10/0x20 [ 20.626362] [ 20.626515] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.626847] ffff800080a37b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.637117] [ 20.638255] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.647627] [ 20.648998] [ 20.649653] [ 20.650616] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 20.555708] ================================================================== [ 20.555764] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 20.555902] Free of addr fff00000c65c4000 by task kunit_try_catch/240 [ 20.555961] [ 20.556039] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 20.556128] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 20.556187] Hardware name: linux,dummy-virt (DT) [ 20.556225] Call trace: [ 20.556306] show_stack+0x20/0x38 (C) [ 20.556419] dump_stack_lvl+0x8c/0xd0 [ 20.556492] print_report+0x118/0x608 [ 20.556559] kasan_report_invalid_free+0xc0/0xe8 [ 20.556612] __kasan_mempool_poison_object+0x14c/0x150 [ 20.556664] mempool_free+0x28c/0x328 [ 20.556714] mempool_double_free_helper+0x150/0x2e8 [ 20.556854] mempool_kmalloc_large_double_free+0xc0/0x118 [ 20.556912] kunit_try_run_case+0x170/0x3f0 [ 20.556977] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.557076] kthread+0x328/0x630 [ 20.557142] ret_from_fork+0x10/0x20 [ 20.557242] [ 20.557280] The buggy address belongs to the physical page: [ 20.557331] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c4 [ 20.557397] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.557446] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.557508] page_type: f8(unknown) [ 20.557604] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.557751] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.557804] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.557856] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.557908] head: 0bfffe0000000002 ffffc1ffc3197101 00000000ffffffff 00000000ffffffff [ 20.558093] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.558134] page dumped because: kasan: bad access detected [ 20.558168] [ 20.558243] Memory state around the buggy address: [ 20.558458] fff00000c65c3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.558918] fff00000c65c3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.559005] >fff00000c65c4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.559276] ^ [ 20.559324] fff00000c65c4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.559382] fff00000c65c4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.559426] ================================================================== [ 20.544063] ================================================================== [ 20.544123] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 20.544184] Free of addr fff00000c3e64f00 by task kunit_try_catch/238 [ 20.544226] [ 20.544256] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 20.544343] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 20.544426] Hardware name: linux,dummy-virt (DT) [ 20.544461] Call trace: [ 20.544502] show_stack+0x20/0x38 (C) [ 20.544589] dump_stack_lvl+0x8c/0xd0 [ 20.544666] print_report+0x118/0x608 [ 20.544769] kasan_report_invalid_free+0xc0/0xe8 [ 20.544822] check_slab_allocation+0xd4/0x108 [ 20.544954] __kasan_mempool_poison_object+0x78/0x150 [ 20.545007] mempool_free+0x28c/0x328 [ 20.545063] mempool_double_free_helper+0x150/0x2e8 [ 20.545252] mempool_kmalloc_double_free+0xc0/0x118 [ 20.545321] kunit_try_run_case+0x170/0x3f0 [ 20.545424] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.545499] kthread+0x328/0x630 [ 20.545623] ret_from_fork+0x10/0x20 [ 20.545784] [ 20.545867] Allocated by task 238: [ 20.545923] kasan_save_stack+0x3c/0x68 [ 20.546023] kasan_save_track+0x20/0x40 [ 20.546152] kasan_save_alloc_info+0x40/0x58 [ 20.546193] __kasan_mempool_unpoison_object+0x11c/0x180 [ 20.546415] remove_element+0x130/0x1f8 [ 20.546460] mempool_alloc_preallocated+0x58/0xc0 [ 20.546669] mempool_double_free_helper+0x94/0x2e8 [ 20.546767] mempool_kmalloc_double_free+0xc0/0x118 [ 20.546857] kunit_try_run_case+0x170/0x3f0 [ 20.547041] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.547183] kthread+0x328/0x630 [ 20.547389] ret_from_fork+0x10/0x20 [ 20.547545] [ 20.547657] Freed by task 238: [ 20.547863] kasan_save_stack+0x3c/0x68 [ 20.547918] kasan_save_track+0x20/0x40 [ 20.548174] kasan_save_free_info+0x4c/0x78 [ 20.548268] __kasan_mempool_poison_object+0xc0/0x150 [ 20.548445] mempool_free+0x28c/0x328 [ 20.548515] mempool_double_free_helper+0x100/0x2e8 [ 20.548609] mempool_kmalloc_double_free+0xc0/0x118 [ 20.548733] kunit_try_run_case+0x170/0x3f0 [ 20.548818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.548927] kthread+0x328/0x630 [ 20.548966] ret_from_fork+0x10/0x20 [ 20.549210] [ 20.549233] The buggy address belongs to the object at fff00000c3e64f00 [ 20.549233] which belongs to the cache kmalloc-128 of size 128 [ 20.549332] The buggy address is located 0 bytes inside of [ 20.549332] 128-byte region [fff00000c3e64f00, fff00000c3e64f80) [ 20.549492] [ 20.549521] The buggy address belongs to the physical page: [ 20.549552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e64 [ 20.549761] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.549812] page_type: f5(slab) [ 20.549851] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.549903] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 20.549971] page dumped because: kasan: bad access detected [ 20.550040] [ 20.550060] Memory state around the buggy address: [ 20.550092] fff00000c3e64e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.550145] fff00000c3e64e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.550197] >fff00000c3e64f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.550235] ^ [ 20.550273] fff00000c3e64f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.550315] fff00000c3e65000: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc [ 20.550364] ================================================================== [ 20.565493] ================================================================== [ 20.565556] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 20.565629] Free of addr fff00000c65c4000 by task kunit_try_catch/242 [ 20.565675] [ 20.565708] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 20.565796] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 20.565828] Hardware name: linux,dummy-virt (DT) [ 20.565861] Call trace: [ 20.565886] show_stack+0x20/0x38 (C) [ 20.565940] dump_stack_lvl+0x8c/0xd0 [ 20.566012] print_report+0x118/0x608 [ 20.566130] kasan_report_invalid_free+0xc0/0xe8 [ 20.566283] __kasan_mempool_poison_pages+0xe0/0xe8 [ 20.566373] mempool_free+0x24c/0x328 [ 20.566471] mempool_double_free_helper+0x150/0x2e8 [ 20.566628] mempool_page_alloc_double_free+0xbc/0x118 [ 20.566684] kunit_try_run_case+0x170/0x3f0 [ 20.566738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.567410] kthread+0x328/0x630 [ 20.568161] ret_from_fork+0x10/0x20 [ 20.568234] [ 20.568263] The buggy address belongs to the physical page: [ 20.568307] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c4 [ 20.568371] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.568439] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.568491] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.568534] page dumped because: kasan: bad access detected [ 20.568568] [ 20.568588] Memory state around the buggy address: [ 20.568623] fff00000c65c3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.568670] fff00000c65c3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.568715] >fff00000c65c4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.568756] ^ [ 20.568786] fff00000c65c4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.568831] fff00000c65c4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.568872] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 20.532863] ================================================================== [ 20.532927] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 20.533028] Read of size 1 at addr fff00000c65c0000 by task kunit_try_catch/236 [ 20.533085] [ 20.533124] CPU: 0 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 20.533214] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 20.533272] Hardware name: linux,dummy-virt (DT) [ 20.533305] Call trace: [ 20.533329] show_stack+0x20/0x38 (C) [ 20.533397] dump_stack_lvl+0x8c/0xd0 [ 20.533447] print_report+0x118/0x608 [ 20.533494] kasan_report+0xdc/0x128 [ 20.533547] __asan_report_load1_noabort+0x20/0x30 [ 20.533599] mempool_uaf_helper+0x314/0x340 [ 20.533702] mempool_page_alloc_uaf+0xc0/0x118 [ 20.533827] kunit_try_run_case+0x170/0x3f0 [ 20.533997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.534087] kthread+0x328/0x630 [ 20.534196] ret_from_fork+0x10/0x20 [ 20.534246] [ 20.534269] The buggy address belongs to the physical page: [ 20.534574] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c0 [ 20.534631] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.534696] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.534789] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.534880] page dumped because: kasan: bad access detected [ 20.534945] [ 20.534964] Memory state around the buggy address: [ 20.535019] fff00000c65bff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.535103] fff00000c65bff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.535241] >fff00000c65c0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.535358] ^ [ 20.535422] fff00000c65c0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.535478] fff00000c65c0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.535829] ================================================================== [ 20.497502] ================================================================== [ 20.497585] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 20.497648] Read of size 1 at addr fff00000c65c0000 by task kunit_try_catch/232 [ 20.497697] [ 20.497730] CPU: 0 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 20.497866] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 20.497964] Hardware name: linux,dummy-virt (DT) [ 20.497998] Call trace: [ 20.498070] show_stack+0x20/0x38 (C) [ 20.498217] dump_stack_lvl+0x8c/0xd0 [ 20.498395] print_report+0x118/0x608 [ 20.498495] kasan_report+0xdc/0x128 [ 20.498641] __asan_report_load1_noabort+0x20/0x30 [ 20.498754] mempool_uaf_helper+0x314/0x340 [ 20.498807] mempool_kmalloc_large_uaf+0xc4/0x120 [ 20.499006] kunit_try_run_case+0x170/0x3f0 [ 20.499065] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.499123] kthread+0x328/0x630 [ 20.499255] ret_from_fork+0x10/0x20 [ 20.499425] [ 20.499505] The buggy address belongs to the physical page: [ 20.499625] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c0 [ 20.499711] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.499839] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.499957] page_type: f8(unknown) [ 20.500103] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.500221] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.500306] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.500386] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.500496] head: 0bfffe0000000002 ffffc1ffc3197001 00000000ffffffff 00000000ffffffff [ 20.500690] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.500731] page dumped because: kasan: bad access detected [ 20.500778] [ 20.500893] Memory state around the buggy address: [ 20.500984] fff00000c65bff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.501065] fff00000c65bff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.501196] >fff00000c65c0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.501302] ^ [ 20.501390] fff00000c65c0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.501469] fff00000c65c0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 20.501569] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 20.485264] ================================================================== [ 20.485412] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 20.485527] Read of size 1 at addr fff00000c3e64b00 by task kunit_try_catch/230 [ 20.485634] [ 20.485760] CPU: 0 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 20.485991] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 20.486027] Hardware name: linux,dummy-virt (DT) [ 20.486062] Call trace: [ 20.486087] show_stack+0x20/0x38 (C) [ 20.486141] dump_stack_lvl+0x8c/0xd0 [ 20.486194] print_report+0x118/0x608 [ 20.486240] kasan_report+0xdc/0x128 [ 20.486287] __asan_report_load1_noabort+0x20/0x30 [ 20.486340] mempool_uaf_helper+0x314/0x340 [ 20.486459] mempool_kmalloc_uaf+0xc4/0x120 [ 20.486583] kunit_try_run_case+0x170/0x3f0 [ 20.486759] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.486909] kthread+0x328/0x630 [ 20.486978] ret_from_fork+0x10/0x20 [ 20.487161] [ 20.487205] Allocated by task 230: [ 20.487416] kasan_save_stack+0x3c/0x68 [ 20.487554] kasan_save_track+0x20/0x40 [ 20.487727] kasan_save_alloc_info+0x40/0x58 [ 20.487839] __kasan_mempool_unpoison_object+0x11c/0x180 [ 20.487948] remove_element+0x130/0x1f8 [ 20.488012] mempool_alloc_preallocated+0x58/0xc0 [ 20.488057] mempool_uaf_helper+0xa4/0x340 [ 20.488283] mempool_kmalloc_uaf+0xc4/0x120 [ 20.488369] kunit_try_run_case+0x170/0x3f0 [ 20.488441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.488511] kthread+0x328/0x630 [ 20.488571] ret_from_fork+0x10/0x20 [ 20.488709] [ 20.488799] Freed by task 230: [ 20.488827] kasan_save_stack+0x3c/0x68 [ 20.488865] kasan_save_track+0x20/0x40 [ 20.489072] kasan_save_free_info+0x4c/0x78 [ 20.489292] __kasan_mempool_poison_object+0xc0/0x150 [ 20.489436] mempool_free+0x28c/0x328 [ 20.489550] mempool_uaf_helper+0x104/0x340 [ 20.489638] mempool_kmalloc_uaf+0xc4/0x120 [ 20.489736] kunit_try_run_case+0x170/0x3f0 [ 20.489776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.490073] kthread+0x328/0x630 [ 20.490113] ret_from_fork+0x10/0x20 [ 20.490151] [ 20.490171] The buggy address belongs to the object at fff00000c3e64b00 [ 20.490171] which belongs to the cache kmalloc-128 of size 128 [ 20.490262] The buggy address is located 0 bytes inside of [ 20.490262] freed 128-byte region [fff00000c3e64b00, fff00000c3e64b80) [ 20.490375] [ 20.490412] The buggy address belongs to the physical page: [ 20.490466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e64 [ 20.490784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.490922] page_type: f5(slab) [ 20.491025] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.491116] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.491184] page dumped because: kasan: bad access detected [ 20.491336] [ 20.491419] Memory state around the buggy address: [ 20.491637] fff00000c3e64a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.491684] fff00000c3e64a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.491728] >fff00000c3e64b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.491767] ^ [ 20.491796] fff00000c3e64b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.491874] fff00000c3e64c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.491973] ================================================================== [ 20.511248] ================================================================== [ 20.511317] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 20.511394] Read of size 1 at addr fff00000c3fa9240 by task kunit_try_catch/234 [ 20.511444] [ 20.511479] CPU: 0 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 20.511582] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 20.511613] Hardware name: linux,dummy-virt (DT) [ 20.511647] Call trace: [ 20.511670] show_stack+0x20/0x38 (C) [ 20.511723] dump_stack_lvl+0x8c/0xd0 [ 20.511773] print_report+0x118/0x608 [ 20.511820] kasan_report+0xdc/0x128 [ 20.511865] __asan_report_load1_noabort+0x20/0x30 [ 20.511918] mempool_uaf_helper+0x314/0x340 [ 20.511970] mempool_slab_uaf+0xc0/0x118 [ 20.512015] kunit_try_run_case+0x170/0x3f0 [ 20.512066] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.512124] kthread+0x328/0x630 [ 20.512185] ret_from_fork+0x10/0x20 [ 20.512237] [ 20.512256] Allocated by task 234: [ 20.512293] kasan_save_stack+0x3c/0x68 [ 20.512336] kasan_save_track+0x20/0x40 [ 20.512382] kasan_save_alloc_info+0x40/0x58 [ 20.512424] __kasan_mempool_unpoison_object+0xbc/0x180 [ 20.512466] remove_element+0x16c/0x1f8 [ 20.512513] mempool_alloc_preallocated+0x58/0xc0 [ 20.512557] mempool_uaf_helper+0xa4/0x340 [ 20.512596] mempool_slab_uaf+0xc0/0x118 [ 20.512634] kunit_try_run_case+0x170/0x3f0 [ 20.512673] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.512720] kthread+0x328/0x630 [ 20.512755] ret_from_fork+0x10/0x20 [ 20.512792] [ 20.512811] Freed by task 234: [ 20.512837] kasan_save_stack+0x3c/0x68 [ 20.512875] kasan_save_track+0x20/0x40 [ 20.512919] kasan_save_free_info+0x4c/0x78 [ 20.512960] __kasan_mempool_poison_object+0xc0/0x150 [ 20.513013] mempool_free+0x28c/0x328 [ 20.513050] mempool_uaf_helper+0x104/0x340 [ 20.513092] mempool_slab_uaf+0xc0/0x118 [ 20.513149] kunit_try_run_case+0x170/0x3f0 [ 20.513190] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.513236] kthread+0x328/0x630 [ 20.513277] ret_from_fork+0x10/0x20 [ 20.513323] [ 20.513343] The buggy address belongs to the object at fff00000c3fa9240 [ 20.513343] which belongs to the cache test_cache of size 123 [ 20.513411] The buggy address is located 0 bytes inside of [ 20.513411] freed 123-byte region [fff00000c3fa9240, fff00000c3fa92bb) [ 20.513473] [ 20.513493] The buggy address belongs to the physical page: [ 20.513525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fa9 [ 20.513577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.513627] page_type: f5(slab) [ 20.513665] raw: 0bfffe0000000000 fff00000c3ef3780 dead000000000122 0000000000000000 [ 20.513717] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 20.513757] page dumped because: kasan: bad access detected [ 20.513789] [ 20.513806] Memory state around the buggy address: [ 20.513841] fff00000c3fa9100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.513886] fff00000c3fa9180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.513931] >fff00000c3fa9200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 20.513969] ^ [ 20.514005] fff00000c3fa9280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.514049] fff00000c3fa9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.514088] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 20.456783] ================================================================== [ 20.456863] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 20.457213] Read of size 1 at addr fff00000c3fa42bb by task kunit_try_catch/228 [ 20.457363] [ 20.457455] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 20.457557] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 20.457611] Hardware name: linux,dummy-virt (DT) [ 20.457819] Call trace: [ 20.457893] show_stack+0x20/0x38 (C) [ 20.457950] dump_stack_lvl+0x8c/0xd0 [ 20.458000] print_report+0x118/0x608 [ 20.458058] kasan_report+0xdc/0x128 [ 20.458109] __asan_report_load1_noabort+0x20/0x30 [ 20.458182] mempool_oob_right_helper+0x2ac/0x2f0 [ 20.458236] mempool_slab_oob_right+0xc0/0x118 [ 20.458286] kunit_try_run_case+0x170/0x3f0 [ 20.458372] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.458720] kthread+0x328/0x630 [ 20.458866] ret_from_fork+0x10/0x20 [ 20.458947] [ 20.459051] Allocated by task 228: [ 20.459097] kasan_save_stack+0x3c/0x68 [ 20.459167] kasan_save_track+0x20/0x40 [ 20.459207] kasan_save_alloc_info+0x40/0x58 [ 20.459247] __kasan_mempool_unpoison_object+0xbc/0x180 [ 20.459325] remove_element+0x16c/0x1f8 [ 20.459424] mempool_alloc_preallocated+0x58/0xc0 [ 20.459469] mempool_oob_right_helper+0x98/0x2f0 [ 20.459531] mempool_slab_oob_right+0xc0/0x118 [ 20.459721] kunit_try_run_case+0x170/0x3f0 [ 20.459760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.459847] kthread+0x328/0x630 [ 20.460042] ret_from_fork+0x10/0x20 [ 20.460080] [ 20.460104] The buggy address belongs to the object at fff00000c3fa4240 [ 20.460104] which belongs to the cache test_cache of size 123 [ 20.460169] The buggy address is located 0 bytes to the right of [ 20.460169] allocated 123-byte region [fff00000c3fa4240, fff00000c3fa42bb) [ 20.460333] [ 20.460376] The buggy address belongs to the physical page: [ 20.460409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fa4 [ 20.460484] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.460564] page_type: f5(slab) [ 20.461004] raw: 0bfffe0000000000 fff00000c3ef3640 dead000000000122 0000000000000000 [ 20.461208] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 20.461272] page dumped because: kasan: bad access detected [ 20.461373] [ 20.461408] Memory state around the buggy address: [ 20.461714] fff00000c3fa4180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.461795] fff00000c3fa4200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 20.461841] >fff00000c3fa4280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 20.461880] ^ [ 20.462112] fff00000c3fa4300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.462192] fff00000c3fa4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.462231] ================================================================== [ 20.435057] ================================================================== [ 20.435133] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 20.435212] Read of size 1 at addr fff00000c3e64773 by task kunit_try_catch/224 [ 20.435263] [ 20.435305] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 20.435457] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 20.435503] Hardware name: linux,dummy-virt (DT) [ 20.435537] Call trace: [ 20.435564] show_stack+0x20/0x38 (C) [ 20.435622] dump_stack_lvl+0x8c/0xd0 [ 20.435676] print_report+0x118/0x608 [ 20.435724] kasan_report+0xdc/0x128 [ 20.435770] __asan_report_load1_noabort+0x20/0x30 [ 20.435823] mempool_oob_right_helper+0x2ac/0x2f0 [ 20.435877] mempool_kmalloc_oob_right+0xc4/0x120 [ 20.435930] kunit_try_run_case+0x170/0x3f0 [ 20.435984] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.436042] kthread+0x328/0x630 [ 20.436090] ret_from_fork+0x10/0x20 [ 20.436143] [ 20.436162] Allocated by task 224: [ 20.436194] kasan_save_stack+0x3c/0x68 [ 20.436238] kasan_save_track+0x20/0x40 [ 20.436277] kasan_save_alloc_info+0x40/0x58 [ 20.436319] __kasan_mempool_unpoison_object+0x11c/0x180 [ 20.436375] remove_element+0x130/0x1f8 [ 20.436449] mempool_alloc_preallocated+0x58/0xc0 [ 20.436493] mempool_oob_right_helper+0x98/0x2f0 [ 20.436538] mempool_kmalloc_oob_right+0xc4/0x120 [ 20.436582] kunit_try_run_case+0x170/0x3f0 [ 20.436623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.436671] kthread+0x328/0x630 [ 20.436707] ret_from_fork+0x10/0x20 [ 20.436746] [ 20.436767] The buggy address belongs to the object at fff00000c3e64700 [ 20.436767] which belongs to the cache kmalloc-128 of size 128 [ 20.436826] The buggy address is located 0 bytes to the right of [ 20.436826] allocated 115-byte region [fff00000c3e64700, fff00000c3e64773) [ 20.436890] [ 20.436911] The buggy address belongs to the physical page: [ 20.436947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e64 [ 20.437002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.437056] page_type: f5(slab) [ 20.437100] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.437151] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.437193] page dumped because: kasan: bad access detected [ 20.437225] [ 20.437243] Memory state around the buggy address: [ 20.437277] fff00000c3e64600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.437321] fff00000c3e64680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.437373] >fff00000c3e64700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.437412] ^ [ 20.437452] fff00000c3e64780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.437529] fff00000c3e64800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.437594] ================================================================== [ 20.445849] ================================================================== [ 20.445985] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 20.446181] Read of size 1 at addr fff00000c65c2001 by task kunit_try_catch/226 [ 20.446232] [ 20.446276] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 20.446380] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 20.446409] Hardware name: linux,dummy-virt (DT) [ 20.446442] Call trace: [ 20.446466] show_stack+0x20/0x38 (C) [ 20.446519] dump_stack_lvl+0x8c/0xd0 [ 20.446568] print_report+0x118/0x608 [ 20.446616] kasan_report+0xdc/0x128 [ 20.446660] __asan_report_load1_noabort+0x20/0x30 [ 20.446715] mempool_oob_right_helper+0x2ac/0x2f0 [ 20.446767] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 20.446823] kunit_try_run_case+0x170/0x3f0 [ 20.446876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.446933] kthread+0x328/0x630 [ 20.446980] ret_from_fork+0x10/0x20 [ 20.447038] [ 20.447058] The buggy address belongs to the physical page: [ 20.447095] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c0 [ 20.447150] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.447198] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.447254] page_type: f8(unknown) [ 20.447297] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.447359] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.448423] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.448724] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 20.448823] head: 0bfffe0000000002 ffffc1ffc3197001 00000000ffffffff 00000000ffffffff [ 20.449180] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.449342] page dumped because: kasan: bad access detected [ 20.449389] [ 20.449544] Memory state around the buggy address: [ 20.449958] fff00000c65c1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.450018] fff00000c65c1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.450063] >fff00000c65c2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.450104] ^ [ 20.450136] fff00000c65c2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.450180] fff00000c65c2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.450217] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 18.038720] ================================================================== [ 18.040270] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 18.040381] Write of size 4 at addr fff00000c3f75575 by task kunit_try_catch/177 [ 18.040432] [ 18.040471] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 18.040556] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.040584] Hardware name: linux,dummy-virt (DT) [ 18.040616] Call trace: [ 18.040640] show_stack+0x20/0x38 (C) [ 18.040691] dump_stack_lvl+0x8c/0xd0 [ 18.040740] print_report+0x118/0x608 [ 18.040785] kasan_report+0xdc/0x128 [ 18.040828] kasan_check_range+0x100/0x1a8 [ 18.040875] __asan_memset+0x34/0x78 [ 18.040919] kmalloc_oob_memset_4+0x150/0x300 [ 18.040968] kunit_try_run_case+0x170/0x3f0 [ 18.041017] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.041071] kthread+0x328/0x630 [ 18.041116] ret_from_fork+0x10/0x20 [ 18.041166] [ 18.041185] Allocated by task 177: [ 18.041212] kasan_save_stack+0x3c/0x68 [ 18.041252] kasan_save_track+0x20/0x40 [ 18.041288] kasan_save_alloc_info+0x40/0x58 [ 18.041327] __kasan_kmalloc+0xd4/0xd8 [ 18.044885] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.045740] kmalloc_oob_memset_4+0xb0/0x300 [ 18.045829] kunit_try_run_case+0x170/0x3f0 [ 18.045872] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.046089] kthread+0x328/0x630 [ 18.046134] ret_from_fork+0x10/0x20 [ 18.046275] [ 18.046297] The buggy address belongs to the object at fff00000c3f75500 [ 18.046297] which belongs to the cache kmalloc-128 of size 128 [ 18.046376] The buggy address is located 117 bytes inside of [ 18.046376] allocated 120-byte region [fff00000c3f75500, fff00000c3f75578) [ 18.046441] [ 18.046462] The buggy address belongs to the physical page: [ 18.046495] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75 [ 18.046550] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.046601] page_type: f5(slab) [ 18.046644] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.046693] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.046731] page dumped because: kasan: bad access detected [ 18.046761] [ 18.046779] Memory state around the buggy address: [ 18.046812] fff00000c3f75400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.046854] fff00000c3f75480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.046896] >fff00000c3f75500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.046932] ^ [ 18.046972] fff00000c3f75580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.047021] fff00000c3f75600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.047057] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 19.869146] ================================================================== [ 19.869235] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 19.869319] Read of size 1 at addr fff00000c3ef33c0 by task kunit_try_catch/218 [ 19.869386] [ 19.869428] CPU: 0 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 19.869557] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.869588] Hardware name: linux,dummy-virt (DT) [ 19.869622] Call trace: [ 19.869648] show_stack+0x20/0x38 (C) [ 19.869705] dump_stack_lvl+0x8c/0xd0 [ 19.869759] print_report+0x118/0x608 [ 19.869807] kasan_report+0xdc/0x128 [ 19.869851] __kasan_check_byte+0x54/0x70 [ 19.869899] kmem_cache_destroy+0x34/0x218 [ 19.869949] kmem_cache_double_destroy+0x174/0x300 [ 19.870003] kunit_try_run_case+0x170/0x3f0 [ 19.870055] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.870114] kthread+0x328/0x630 [ 19.870163] ret_from_fork+0x10/0x20 [ 19.870216] [ 19.870236] Allocated by task 218: [ 19.870268] kasan_save_stack+0x3c/0x68 [ 19.870310] kasan_save_track+0x20/0x40 [ 19.870386] kasan_save_alloc_info+0x40/0x58 [ 19.870429] __kasan_slab_alloc+0xa8/0xb0 [ 19.870468] kmem_cache_alloc_noprof+0x10c/0x398 [ 19.870510] __kmem_cache_create_args+0x178/0x280 [ 19.870557] kmem_cache_double_destroy+0xc0/0x300 [ 19.870601] kunit_try_run_case+0x170/0x3f0 [ 19.870640] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.870688] kthread+0x328/0x630 [ 19.870726] ret_from_fork+0x10/0x20 [ 19.870765] [ 19.870785] Freed by task 218: [ 19.870830] kasan_save_stack+0x3c/0x68 [ 19.870870] kasan_save_track+0x20/0x40 [ 19.870907] kasan_save_free_info+0x4c/0x78 [ 19.870948] __kasan_slab_free+0x6c/0x98 [ 19.870987] kmem_cache_free+0x260/0x468 [ 19.871029] slab_kmem_cache_release+0x38/0x50 [ 19.871071] kmem_cache_release+0x1c/0x30 [ 19.871114] kobject_put+0x17c/0x420 [ 19.871153] sysfs_slab_release+0x1c/0x30 [ 19.871192] kmem_cache_destroy+0x118/0x218 [ 19.871230] kmem_cache_double_destroy+0x128/0x300 [ 19.871276] kunit_try_run_case+0x170/0x3f0 [ 19.871315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.871463] kthread+0x328/0x630 [ 19.871545] ret_from_fork+0x10/0x20 [ 19.871582] [ 19.871603] The buggy address belongs to the object at fff00000c3ef33c0 [ 19.871603] which belongs to the cache kmem_cache of size 208 [ 19.871663] The buggy address is located 0 bytes inside of [ 19.871663] freed 208-byte region [fff00000c3ef33c0, fff00000c3ef3490) [ 19.871726] [ 19.871749] The buggy address belongs to the physical page: [ 19.871785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ef3 [ 19.871840] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.871895] page_type: f5(slab) [ 19.871940] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 19.871991] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 19.872032] page dumped because: kasan: bad access detected [ 19.872063] [ 19.872083] Memory state around the buggy address: [ 19.872119] fff00000c3ef3280: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.872165] fff00000c3ef3300: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 19.872209] >fff00000c3ef3380: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 19.872249] ^ [ 19.872285] fff00000c3ef3400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.872328] fff00000c3ef3480: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.872378] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 19.813963] ================================================================== [ 19.814100] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 19.814200] Read of size 1 at addr fff00000c3fa1000 by task kunit_try_catch/216 [ 19.814255] [ 19.814304] CPU: 0 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 19.814420] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.814449] Hardware name: linux,dummy-virt (DT) [ 19.814486] Call trace: [ 19.814513] show_stack+0x20/0x38 (C) [ 19.814571] dump_stack_lvl+0x8c/0xd0 [ 19.814627] print_report+0x118/0x608 [ 19.814674] kasan_report+0xdc/0x128 [ 19.814721] __asan_report_load1_noabort+0x20/0x30 [ 19.814773] kmem_cache_rcu_uaf+0x388/0x468 [ 19.814825] kunit_try_run_case+0x170/0x3f0 [ 19.814879] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.814936] kthread+0x328/0x630 [ 19.814986] ret_from_fork+0x10/0x20 [ 19.815044] [ 19.815063] Allocated by task 216: [ 19.815097] kasan_save_stack+0x3c/0x68 [ 19.815138] kasan_save_track+0x20/0x40 [ 19.815178] kasan_save_alloc_info+0x40/0x58 [ 19.815218] __kasan_slab_alloc+0xa8/0xb0 [ 19.815255] kmem_cache_alloc_noprof+0x10c/0x398 [ 19.815298] kmem_cache_rcu_uaf+0x12c/0x468 [ 19.815339] kunit_try_run_case+0x170/0x3f0 [ 19.815391] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.815438] kthread+0x328/0x630 [ 19.815475] ret_from_fork+0x10/0x20 [ 19.815513] [ 19.815531] Freed by task 0: [ 19.815559] kasan_save_stack+0x3c/0x68 [ 19.815597] kasan_save_track+0x20/0x40 [ 19.815632] kasan_save_free_info+0x4c/0x78 [ 19.815672] __kasan_slab_free+0x6c/0x98 [ 19.815710] slab_free_after_rcu_debug+0xd4/0x2f8 [ 19.815750] rcu_core+0x9f4/0x1e20 [ 19.815789] rcu_core_si+0x18/0x30 [ 19.815824] handle_softirqs+0x374/0xb28 [ 19.815863] __do_softirq+0x1c/0x28 [ 19.815899] [ 19.815921] Last potentially related work creation: [ 19.815949] kasan_save_stack+0x3c/0x68 [ 19.815988] kasan_record_aux_stack+0xb4/0xc8 [ 19.816030] kmem_cache_free+0x120/0x468 [ 19.816067] kmem_cache_rcu_uaf+0x16c/0x468 [ 19.816109] kunit_try_run_case+0x170/0x3f0 [ 19.816150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.816197] kthread+0x328/0x630 [ 19.816234] ret_from_fork+0x10/0x20 [ 19.816271] [ 19.816290] The buggy address belongs to the object at fff00000c3fa1000 [ 19.816290] which belongs to the cache test_cache of size 200 [ 19.816358] The buggy address is located 0 bytes inside of [ 19.816358] freed 200-byte region [fff00000c3fa1000, fff00000c3fa10c8) [ 19.816420] [ 19.816442] The buggy address belongs to the physical page: [ 19.816477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fa1 [ 19.816535] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.816590] page_type: f5(slab) [ 19.816635] raw: 0bfffe0000000000 fff00000c3ef3280 dead000000000122 0000000000000000 [ 19.816687] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 19.816730] page dumped because: kasan: bad access detected [ 19.816760] [ 19.816780] Memory state around the buggy address: [ 19.816815] fff00000c3fa0f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.816860] fff00000c3fa0f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.816904] >fff00000c3fa1000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.816942] ^ [ 19.816970] fff00000c3fa1080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 19.817013] fff00000c3fa1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.817052] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 19.695833] ================================================================== [ 19.696405] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 19.696641] Free of addr fff00000c3f48001 by task kunit_try_catch/214 [ 19.696687] [ 19.696803] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 19.696905] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.697000] Hardware name: linux,dummy-virt (DT) [ 19.697038] Call trace: [ 19.697063] show_stack+0x20/0x38 (C) [ 19.697132] dump_stack_lvl+0x8c/0xd0 [ 19.697192] print_report+0x118/0x608 [ 19.697474] kasan_report_invalid_free+0xc0/0xe8 [ 19.697738] check_slab_allocation+0xfc/0x108 [ 19.697822] __kasan_slab_pre_free+0x2c/0x48 [ 19.697903] kmem_cache_free+0xf0/0x468 [ 19.698031] kmem_cache_invalid_free+0x184/0x3c8 [ 19.698130] kunit_try_run_case+0x170/0x3f0 [ 19.698322] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.698617] kthread+0x328/0x630 [ 19.698717] ret_from_fork+0x10/0x20 [ 19.698823] [ 19.698929] Allocated by task 214: [ 19.698976] kasan_save_stack+0x3c/0x68 [ 19.699587] kasan_save_track+0x20/0x40 [ 19.699671] kasan_save_alloc_info+0x40/0x58 [ 19.699859] __kasan_slab_alloc+0xa8/0xb0 [ 19.699952] kmem_cache_alloc_noprof+0x10c/0x398 [ 19.700011] kmem_cache_invalid_free+0x12c/0x3c8 [ 19.700432] kunit_try_run_case+0x170/0x3f0 [ 19.700541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.700695] kthread+0x328/0x630 [ 19.700776] ret_from_fork+0x10/0x20 [ 19.700848] [ 19.700932] The buggy address belongs to the object at fff00000c3f48000 [ 19.700932] which belongs to the cache test_cache of size 200 [ 19.701001] The buggy address is located 1 bytes inside of [ 19.701001] 200-byte region [fff00000c3f48000, fff00000c3f480c8) [ 19.701415] [ 19.701525] The buggy address belongs to the physical page: [ 19.701603] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f48 [ 19.701725] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.701798] page_type: f5(slab) [ 19.701858] raw: 0bfffe0000000000 fff00000c586f780 dead000000000122 0000000000000000 [ 19.702013] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 19.702373] page dumped because: kasan: bad access detected [ 19.702525] [ 19.702575] Memory state around the buggy address: [ 19.702630] fff00000c3f47f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.703254] fff00000c3f47f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.703508] >fff00000c3f48000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.703556] ^ [ 19.706100] fff00000c3f48080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 19.706155] fff00000c3f48100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.706217] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 19.655830] ================================================================== [ 19.655909] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 19.656245] Free of addr fff00000c3f3d000 by task kunit_try_catch/212 [ 19.656289] [ 19.656426] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 19.656546] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.656576] Hardware name: linux,dummy-virt (DT) [ 19.656843] Call trace: [ 19.656868] show_stack+0x20/0x38 (C) [ 19.656923] dump_stack_lvl+0x8c/0xd0 [ 19.656972] print_report+0x118/0x608 [ 19.657031] kasan_report_invalid_free+0xc0/0xe8 [ 19.657081] check_slab_allocation+0xd4/0x108 [ 19.657129] __kasan_slab_pre_free+0x2c/0x48 [ 19.657178] kmem_cache_free+0xf0/0x468 [ 19.657369] kmem_cache_double_free+0x190/0x3c8 [ 19.657442] kunit_try_run_case+0x170/0x3f0 [ 19.657506] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.659665] kthread+0x328/0x630 [ 19.659747] ret_from_fork+0x10/0x20 [ 19.659815] [ 19.659836] Allocated by task 212: [ 19.659869] kasan_save_stack+0x3c/0x68 [ 19.659949] kasan_save_track+0x20/0x40 [ 19.660006] kasan_save_alloc_info+0x40/0x58 [ 19.660049] __kasan_slab_alloc+0xa8/0xb0 [ 19.660085] kmem_cache_alloc_noprof+0x10c/0x398 [ 19.660127] kmem_cache_double_free+0x12c/0x3c8 [ 19.660171] kunit_try_run_case+0x170/0x3f0 [ 19.660216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.660263] kthread+0x328/0x630 [ 19.660300] ret_from_fork+0x10/0x20 [ 19.660337] [ 19.660365] Freed by task 212: [ 19.660393] kasan_save_stack+0x3c/0x68 [ 19.660430] kasan_save_track+0x20/0x40 [ 19.660467] kasan_save_free_info+0x4c/0x78 [ 19.662370] __kasan_slab_free+0x6c/0x98 [ 19.662429] kmem_cache_free+0x260/0x468 [ 19.662484] kmem_cache_double_free+0x140/0x3c8 [ 19.662529] kunit_try_run_case+0x170/0x3f0 [ 19.662765] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.662848] kthread+0x328/0x630 [ 19.663334] ret_from_fork+0x10/0x20 [ 19.663423] [ 19.663447] The buggy address belongs to the object at fff00000c3f3d000 [ 19.663447] which belongs to the cache test_cache of size 200 [ 19.663517] The buggy address is located 0 bytes inside of [ 19.663517] 200-byte region [fff00000c3f3d000, fff00000c3f3d0c8) [ 19.663612] [ 19.663670] The buggy address belongs to the physical page: [ 19.663737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f3d [ 19.664079] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.664156] page_type: f5(slab) [ 19.664251] raw: 0bfffe0000000000 fff00000c586f640 dead000000000122 0000000000000000 [ 19.664324] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 19.664416] page dumped because: kasan: bad access detected [ 19.664479] [ 19.664500] Memory state around the buggy address: [ 19.664741] fff00000c3f3cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.664820] fff00000c3f3cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.664891] >fff00000c3f3d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.664993] ^ [ 19.665052] fff00000c3f3d080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 19.665278] fff00000c3f3d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.665321] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 19.456019] ================================================================== [ 19.456083] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 19.456151] Read of size 1 at addr fff00000c3f410c8 by task kunit_try_catch/210 [ 19.456202] [ 19.456450] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 19.457063] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.457405] Hardware name: linux,dummy-virt (DT) [ 19.457443] Call trace: [ 19.457894] show_stack+0x20/0x38 (C) [ 19.458288] dump_stack_lvl+0x8c/0xd0 [ 19.458341] print_report+0x118/0x608 [ 19.458400] kasan_report+0xdc/0x128 [ 19.459335] __asan_report_load1_noabort+0x20/0x30 [ 19.460079] kmem_cache_oob+0x344/0x430 [ 19.460154] kunit_try_run_case+0x170/0x3f0 [ 19.460404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.460781] kthread+0x328/0x630 [ 19.461012] ret_from_fork+0x10/0x20 [ 19.461273] [ 19.461306] Allocated by task 210: [ 19.461358] kasan_save_stack+0x3c/0x68 [ 19.461561] kasan_save_track+0x20/0x40 [ 19.461694] kasan_save_alloc_info+0x40/0x58 [ 19.461977] __kasan_slab_alloc+0xa8/0xb0 [ 19.462067] kmem_cache_alloc_noprof+0x10c/0x398 [ 19.462234] kmem_cache_oob+0x12c/0x430 [ 19.462498] kunit_try_run_case+0x170/0x3f0 [ 19.462725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.462800] kthread+0x328/0x630 [ 19.462845] ret_from_fork+0x10/0x20 [ 19.463061] [ 19.463499] The buggy address belongs to the object at fff00000c3f41000 [ 19.463499] which belongs to the cache test_cache of size 200 [ 19.464034] The buggy address is located 0 bytes to the right of [ 19.464034] allocated 200-byte region [fff00000c3f41000, fff00000c3f410c8) [ 19.464442] [ 19.464782] The buggy address belongs to the physical page: [ 19.464976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f41 [ 19.465039] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.465447] page_type: f5(slab) [ 19.465901] raw: 0bfffe0000000000 fff00000c586f500 dead000000000122 0000000000000000 [ 19.465954] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 19.466138] page dumped because: kasan: bad access detected [ 19.466512] [ 19.466539] Memory state around the buggy address: [ 19.466799] fff00000c3f40f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.467060] fff00000c3f41000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.467413] >fff00000c3f41080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 19.467482] ^ [ 19.467682] fff00000c3f41100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.467730] fff00000c3f41180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.467769] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 19.398933] ================================================================== [ 19.399373] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 19.399447] Read of size 8 at addr fff00000c3faa940 by task kunit_try_catch/203 [ 19.399730] [ 19.399777] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 19.400860] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.401000] Hardware name: linux,dummy-virt (DT) [ 19.401255] Call trace: [ 19.401723] show_stack+0x20/0x38 (C) [ 19.401812] dump_stack_lvl+0x8c/0xd0 [ 19.401864] print_report+0x118/0x608 [ 19.401909] kasan_report+0xdc/0x128 [ 19.401955] __asan_report_load8_noabort+0x20/0x30 [ 19.402005] workqueue_uaf+0x480/0x4a8 [ 19.402232] kunit_try_run_case+0x170/0x3f0 [ 19.402582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.402709] kthread+0x328/0x630 [ 19.402962] ret_from_fork+0x10/0x20 [ 19.403189] [ 19.403213] Allocated by task 203: [ 19.403278] kasan_save_stack+0x3c/0x68 [ 19.403461] kasan_save_track+0x20/0x40 [ 19.403822] kasan_save_alloc_info+0x40/0x58 [ 19.403880] __kasan_kmalloc+0xd4/0xd8 [ 19.403924] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.403969] workqueue_uaf+0x13c/0x4a8 [ 19.404547] kunit_try_run_case+0x170/0x3f0 [ 19.404664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.404844] kthread+0x328/0x630 [ 19.405076] ret_from_fork+0x10/0x20 [ 19.405164] [ 19.405512] Freed by task 24: [ 19.405550] kasan_save_stack+0x3c/0x68 [ 19.405782] kasan_save_track+0x20/0x40 [ 19.405835] kasan_save_free_info+0x4c/0x78 [ 19.405877] __kasan_slab_free+0x6c/0x98 [ 19.405913] kfree+0x214/0x3c8 [ 19.405958] workqueue_uaf_work+0x18/0x30 [ 19.405998] process_one_work+0x530/0xf98 [ 19.406036] worker_thread+0x618/0xf38 [ 19.406072] kthread+0x328/0x630 [ 19.406109] ret_from_fork+0x10/0x20 [ 19.406146] [ 19.406286] Last potentially related work creation: [ 19.406376] kasan_save_stack+0x3c/0x68 [ 19.406715] kasan_record_aux_stack+0xb4/0xc8 [ 19.406758] __queue_work+0x65c/0x1008 [ 19.406796] queue_work_on+0xbc/0xf8 [ 19.406833] workqueue_uaf+0x210/0x4a8 [ 19.406873] kunit_try_run_case+0x170/0x3f0 [ 19.406915] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.406962] kthread+0x328/0x630 [ 19.406998] ret_from_fork+0x10/0x20 [ 19.407434] [ 19.407461] The buggy address belongs to the object at fff00000c3faa940 [ 19.407461] which belongs to the cache kmalloc-32 of size 32 [ 19.408142] The buggy address is located 0 bytes inside of [ 19.408142] freed 32-byte region [fff00000c3faa940, fff00000c3faa960) [ 19.408515] [ 19.408544] The buggy address belongs to the physical page: [ 19.408661] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103faa [ 19.408766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.409061] page_type: f5(slab) [ 19.409299] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 19.409825] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 19.409873] page dumped because: kasan: bad access detected [ 19.410012] [ 19.410031] Memory state around the buggy address: [ 19.410065] fff00000c3faa800: 00 00 00 fc fc fc fc fc 00 00 03 fc fc fc fc fc [ 19.410110] fff00000c3faa880: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 19.410154] >fff00000c3faa900: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc [ 19.410415] ^ [ 19.410835] fff00000c3faa980: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.410909] fff00000c3faaa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.410948] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 19.370979] ================================================================== [ 19.371127] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 19.371204] Read of size 4 at addr fff00000c3faa740 by task swapper/1/0 [ 19.371251] [ 19.371291] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 19.371393] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.371423] Hardware name: linux,dummy-virt (DT) [ 19.371456] Call trace: [ 19.371482] show_stack+0x20/0x38 (C) [ 19.371533] dump_stack_lvl+0x8c/0xd0 [ 19.371584] print_report+0x118/0x608 [ 19.371629] kasan_report+0xdc/0x128 [ 19.371675] __asan_report_load4_noabort+0x20/0x30 [ 19.371727] rcu_uaf_reclaim+0x64/0x70 [ 19.371773] rcu_core+0x9f4/0x1e20 [ 19.371820] rcu_core_si+0x18/0x30 [ 19.371864] handle_softirqs+0x374/0xb28 [ 19.371911] __do_softirq+0x1c/0x28 [ 19.371956] ____do_softirq+0x18/0x30 [ 19.372000] call_on_irq_stack+0x24/0x58 [ 19.372047] do_softirq_own_stack+0x24/0x38 [ 19.372094] __irq_exit_rcu+0x1fc/0x318 [ 19.372140] irq_exit_rcu+0x1c/0x80 [ 19.372185] el1_interrupt+0x38/0x58 [ 19.372232] el1h_64_irq_handler+0x18/0x28 [ 19.372282] el1h_64_irq+0x6c/0x70 [ 19.374047] arch_local_irq_enable+0x4/0x8 (P) [ 19.374621] do_idle+0x384/0x4e8 [ 19.374683] cpu_startup_entry+0x64/0x80 [ 19.374734] secondary_start_kernel+0x288/0x340 [ 19.374788] __secondary_switched+0xc0/0xc8 [ 19.374844] [ 19.374864] Allocated by task 201: [ 19.374896] kasan_save_stack+0x3c/0x68 [ 19.374938] kasan_save_track+0x20/0x40 [ 19.374977] kasan_save_alloc_info+0x40/0x58 [ 19.375023] __kasan_kmalloc+0xd4/0xd8 [ 19.375061] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.375105] rcu_uaf+0xb0/0x2d8 [ 19.375142] kunit_try_run_case+0x170/0x3f0 [ 19.375185] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.375235] kthread+0x328/0x630 [ 19.375274] ret_from_fork+0x10/0x20 [ 19.375310] [ 19.375328] Freed by task 0: [ 19.375366] kasan_save_stack+0x3c/0x68 [ 19.375405] kasan_save_track+0x20/0x40 [ 19.375443] kasan_save_free_info+0x4c/0x78 [ 19.375484] __kasan_slab_free+0x6c/0x98 [ 19.375521] kfree+0x214/0x3c8 [ 19.375556] rcu_uaf_reclaim+0x28/0x70 [ 19.375596] rcu_core+0x9f4/0x1e20 [ 19.375630] rcu_core_si+0x18/0x30 [ 19.375665] handle_softirqs+0x374/0xb28 [ 19.375702] __do_softirq+0x1c/0x28 [ 19.375738] [ 19.375757] Last potentially related work creation: [ 19.375783] kasan_save_stack+0x3c/0x68 [ 19.375821] kasan_record_aux_stack+0xb4/0xc8 [ 19.375863] __call_rcu_common.constprop.0+0x70/0x8b0 [ 19.375906] call_rcu+0x18/0x30 [ 19.375939] rcu_uaf+0x14c/0x2d8 [ 19.375974] kunit_try_run_case+0x170/0x3f0 [ 19.376015] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.376063] kthread+0x328/0x630 [ 19.376098] ret_from_fork+0x10/0x20 [ 19.376135] [ 19.376155] The buggy address belongs to the object at fff00000c3faa740 [ 19.376155] which belongs to the cache kmalloc-32 of size 32 [ 19.376213] The buggy address is located 0 bytes inside of [ 19.376213] freed 32-byte region [fff00000c3faa740, fff00000c3faa760) [ 19.376273] [ 19.376295] The buggy address belongs to the physical page: [ 19.376329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103faa [ 19.378632] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.378691] page_type: f5(slab) [ 19.378735] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 19.378787] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 19.378829] page dumped because: kasan: bad access detected [ 19.378862] [ 19.378880] Memory state around the buggy address: [ 19.378916] fff00000c3faa600: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc [ 19.378961] fff00000c3faa680: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 19.379005] >fff00000c3faa700: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 19.379051] ^ [ 19.379087] fff00000c3faa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.379129] fff00000c3faa800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.379168] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 19.230386] ================================================================== [ 19.230466] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 19.230522] Read of size 1 at addr fff00000c3f75900 by task kunit_try_catch/199 [ 19.230598] [ 19.230630] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 19.230715] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.230762] Hardware name: linux,dummy-virt (DT) [ 19.230794] Call trace: [ 19.230816] show_stack+0x20/0x38 (C) [ 19.230862] dump_stack_lvl+0x8c/0xd0 [ 19.230921] print_report+0x118/0x608 [ 19.230967] kasan_report+0xdc/0x128 [ 19.231029] __asan_report_load1_noabort+0x20/0x30 [ 19.231085] ksize_uaf+0x598/0x5f8 [ 19.231198] kunit_try_run_case+0x170/0x3f0 [ 19.231253] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.231314] kthread+0x328/0x630 [ 19.231378] ret_from_fork+0x10/0x20 [ 19.231455] [ 19.231523] Allocated by task 199: [ 19.231560] kasan_save_stack+0x3c/0x68 [ 19.231618] kasan_save_track+0x20/0x40 [ 19.231655] kasan_save_alloc_info+0x40/0x58 [ 19.231696] __kasan_kmalloc+0xd4/0xd8 [ 19.231733] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.231774] ksize_uaf+0xb8/0x5f8 [ 19.231821] kunit_try_run_case+0x170/0x3f0 [ 19.231860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.231931] kthread+0x328/0x630 [ 19.231978] ret_from_fork+0x10/0x20 [ 19.232097] [ 19.232156] Freed by task 199: [ 19.232191] kasan_save_stack+0x3c/0x68 [ 19.232299] kasan_save_track+0x20/0x40 [ 19.232394] kasan_save_free_info+0x4c/0x78 [ 19.232442] __kasan_slab_free+0x6c/0x98 [ 19.232498] kfree+0x214/0x3c8 [ 19.232534] ksize_uaf+0x11c/0x5f8 [ 19.232570] kunit_try_run_case+0x170/0x3f0 [ 19.232792] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.232895] kthread+0x328/0x630 [ 19.232931] ret_from_fork+0x10/0x20 [ 19.232997] [ 19.233037] The buggy address belongs to the object at fff00000c3f75900 [ 19.233037] which belongs to the cache kmalloc-128 of size 128 [ 19.233116] The buggy address is located 0 bytes inside of [ 19.233116] freed 128-byte region [fff00000c3f75900, fff00000c3f75980) [ 19.233234] [ 19.233289] The buggy address belongs to the physical page: [ 19.233399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75 [ 19.233557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.233607] page_type: f5(slab) [ 19.233659] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.233986] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.234153] page dumped because: kasan: bad access detected [ 19.234263] [ 19.234466] Memory state around the buggy address: [ 19.234501] fff00000c3f75800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.234792] fff00000c3f75880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.234984] >fff00000c3f75900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.235121] ^ [ 19.235214] fff00000c3f75980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.235274] fff00000c3f75a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.235312] ================================================================== [ 19.236052] ================================================================== [ 19.236214] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 19.236323] Read of size 1 at addr fff00000c3f75978 by task kunit_try_catch/199 [ 19.236421] [ 19.236470] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 19.236555] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.236623] Hardware name: linux,dummy-virt (DT) [ 19.236654] Call trace: [ 19.236676] show_stack+0x20/0x38 (C) [ 19.236833] dump_stack_lvl+0x8c/0xd0 [ 19.236992] print_report+0x118/0x608 [ 19.237041] kasan_report+0xdc/0x128 [ 19.237106] __asan_report_load1_noabort+0x20/0x30 [ 19.237159] ksize_uaf+0x544/0x5f8 [ 19.237206] kunit_try_run_case+0x170/0x3f0 [ 19.237262] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.237384] kthread+0x328/0x630 [ 19.237451] ret_from_fork+0x10/0x20 [ 19.237499] [ 19.237519] Allocated by task 199: [ 19.237782] kasan_save_stack+0x3c/0x68 [ 19.237832] kasan_save_track+0x20/0x40 [ 19.237917] kasan_save_alloc_info+0x40/0x58 [ 19.238044] __kasan_kmalloc+0xd4/0xd8 [ 19.238160] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.238272] ksize_uaf+0xb8/0x5f8 [ 19.238374] kunit_try_run_case+0x170/0x3f0 [ 19.238415] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.238565] kthread+0x328/0x630 [ 19.238602] ret_from_fork+0x10/0x20 [ 19.238816] [ 19.238898] Freed by task 199: [ 19.238959] kasan_save_stack+0x3c/0x68 [ 19.239003] kasan_save_track+0x20/0x40 [ 19.239045] kasan_save_free_info+0x4c/0x78 [ 19.239095] __kasan_slab_free+0x6c/0x98 [ 19.239132] kfree+0x214/0x3c8 [ 19.239170] ksize_uaf+0x11c/0x5f8 [ 19.239207] kunit_try_run_case+0x170/0x3f0 [ 19.239257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.239304] kthread+0x328/0x630 [ 19.239340] ret_from_fork+0x10/0x20 [ 19.239386] [ 19.239405] The buggy address belongs to the object at fff00000c3f75900 [ 19.239405] which belongs to the cache kmalloc-128 of size 128 [ 19.239463] The buggy address is located 120 bytes inside of [ 19.239463] freed 128-byte region [fff00000c3f75900, fff00000c3f75980) [ 19.239524] [ 19.239543] The buggy address belongs to the physical page: [ 19.239571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75 [ 19.239748] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.239798] page_type: f5(slab) [ 19.239836] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.239887] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.239927] page dumped because: kasan: bad access detected [ 19.239958] [ 19.239977] Memory state around the buggy address: [ 19.240009] fff00000c3f75800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.240126] fff00000c3f75880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.240293] >fff00000c3f75900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.240489] ^ [ 19.240576] fff00000c3f75980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.240687] fff00000c3f75a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.240728] ================================================================== [ 19.224771] ================================================================== [ 19.224913] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 19.224982] Read of size 1 at addr fff00000c3f75900 by task kunit_try_catch/199 [ 19.225039] [ 19.225087] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 19.225195] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.225263] Hardware name: linux,dummy-virt (DT) [ 19.225311] Call trace: [ 19.225362] show_stack+0x20/0x38 (C) [ 19.225420] dump_stack_lvl+0x8c/0xd0 [ 19.225497] print_report+0x118/0x608 [ 19.225546] kasan_report+0xdc/0x128 [ 19.225591] __kasan_check_byte+0x54/0x70 [ 19.225748] ksize+0x30/0x88 [ 19.225830] ksize_uaf+0x168/0x5f8 [ 19.225947] kunit_try_run_case+0x170/0x3f0 [ 19.226090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.226217] kthread+0x328/0x630 [ 19.226333] ret_from_fork+0x10/0x20 [ 19.226407] [ 19.226426] Allocated by task 199: [ 19.226455] kasan_save_stack+0x3c/0x68 [ 19.226515] kasan_save_track+0x20/0x40 [ 19.226553] kasan_save_alloc_info+0x40/0x58 [ 19.226593] __kasan_kmalloc+0xd4/0xd8 [ 19.226630] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.226674] ksize_uaf+0xb8/0x5f8 [ 19.226711] kunit_try_run_case+0x170/0x3f0 [ 19.226752] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.226951] kthread+0x328/0x630 [ 19.227084] ret_from_fork+0x10/0x20 [ 19.227164] [ 19.227198] Freed by task 199: [ 19.227225] kasan_save_stack+0x3c/0x68 [ 19.227263] kasan_save_track+0x20/0x40 [ 19.227299] kasan_save_free_info+0x4c/0x78 [ 19.227339] __kasan_slab_free+0x6c/0x98 [ 19.227527] kfree+0x214/0x3c8 [ 19.227610] ksize_uaf+0x11c/0x5f8 [ 19.227735] kunit_try_run_case+0x170/0x3f0 [ 19.227848] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.228003] kthread+0x328/0x630 [ 19.228052] ret_from_fork+0x10/0x20 [ 19.228087] [ 19.228150] The buggy address belongs to the object at fff00000c3f75900 [ 19.228150] which belongs to the cache kmalloc-128 of size 128 [ 19.228231] The buggy address is located 0 bytes inside of [ 19.228231] freed 128-byte region [fff00000c3f75900, fff00000c3f75980) [ 19.228301] [ 19.228331] The buggy address belongs to the physical page: [ 19.228383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75 [ 19.228450] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.228505] page_type: f5(slab) [ 19.228559] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.228611] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.228653] page dumped because: kasan: bad access detected [ 19.228685] [ 19.228704] Memory state around the buggy address: [ 19.228761] fff00000c3f75800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.228814] fff00000c3f75880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.228867] >fff00000c3f75900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.228905] ^ [ 19.228932] fff00000c3f75980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.228986] fff00000c3f75a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.229039] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[ 19.191539] ================================================================== [ 19.191709] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 19.191774] Free of addr fff00000c5915980 by task kunit_try_catch/195 [ 19.191819] [ 19.191852] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 19.191985] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.192016] Hardware name: linux,dummy-virt (DT) [ 19.192048] Call trace: [ 19.192082] show_stack+0x20/0x38 (C) [ 19.192133] dump_stack_lvl+0x8c/0xd0 [ 19.192183] print_report+0x118/0x608 [ 19.192230] kasan_report_invalid_free+0xc0/0xe8 [ 19.192280] check_slab_allocation+0xd4/0x108 [ 19.192329] __kasan_slab_pre_free+0x2c/0x48 [ 19.192643] kfree+0xe8/0x3c8 [ 19.192713] kfree_sensitive+0x3c/0xb0 [ 19.192770] kmalloc_double_kzfree+0x168/0x308 [ 19.192853] kunit_try_run_case+0x170/0x3f0 [ 19.192971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.193030] kthread+0x328/0x630 [ 19.193093] ret_from_fork+0x10/0x20 [ 19.193367] [ 19.193411] Allocated by task 195: [ 19.193490] kasan_save_stack+0x3c/0x68 [ 19.193558] kasan_save_track+0x20/0x40 [ 19.193692] kasan_save_alloc_info+0x40/0x58 [ 19.193770] __kasan_kmalloc+0xd4/0xd8 [ 19.193968] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.194024] kmalloc_double_kzfree+0xb8/0x308 [ 19.194067] kunit_try_run_case+0x170/0x3f0 [ 19.194235] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.194321] kthread+0x328/0x630 [ 19.194449] ret_from_fork+0x10/0x20 [ 19.194537] [ 19.194559] Freed by task 195: [ 19.194586] kasan_save_stack+0x3c/0x68 [ 19.194858] kasan_save_track+0x20/0x40 [ 19.194931] kasan_save_free_info+0x4c/0x78 [ 19.195049] __kasan_slab_free+0x6c/0x98 [ 19.195116] kfree+0x214/0x3c8 [ 19.195172] kfree_sensitive+0x80/0xb0 [ 19.195425] kmalloc_double_kzfree+0x11c/0x308 [ 19.195554] kunit_try_run_case+0x170/0x3f0 [ 19.195715] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.195870] kthread+0x328/0x630 [ 19.195940] ret_from_fork+0x10/0x20 [ 19.196026] [ 19.196056] The buggy address belongs to the object at fff00000c5915980 [ 19.196056] which belongs to the cache kmalloc-16 of size 16 [ 19.196173] The buggy address is located 0 bytes inside of [ 19.196173] 16-byte region [fff00000c5915980, fff00000c5915990) [ 19.196268] [ 19.196372] The buggy address belongs to the physical page: [ 19.196411] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105915 [ 19.196483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.196690] page_type: f5(slab) [ 19.196755] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.196823] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.196923] page dumped because: kasan: bad access detected [ 19.196972] [ 19.197023] Memory state around the buggy address: [ 19.197094] fff00000c5915880: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 19.197213] fff00000c5915900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.197258] >fff00000c5915980: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.197324] ^ [ 19.197542] fff00000c5915a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.197608] fff00000c5915a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.197659] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 19.181013] ================================================================== [ 19.181076] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 19.181178] Read of size 1 at addr fff00000c5915980 by task kunit_try_catch/195 [ 19.181247] [ 19.181283] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 19.181739] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.181873] Hardware name: linux,dummy-virt (DT) [ 19.182030] Call trace: [ 19.182080] show_stack+0x20/0x38 (C) [ 19.182216] dump_stack_lvl+0x8c/0xd0 [ 19.182291] print_report+0x118/0x608 [ 19.182336] kasan_report+0xdc/0x128 [ 19.182508] __kasan_check_byte+0x54/0x70 [ 19.182559] kfree_sensitive+0x30/0xb0 [ 19.182746] kmalloc_double_kzfree+0x168/0x308 [ 19.182854] kunit_try_run_case+0x170/0x3f0 [ 19.182963] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.183053] kthread+0x328/0x630 [ 19.183101] ret_from_fork+0x10/0x20 [ 19.183426] [ 19.183465] Allocated by task 195: [ 19.183531] kasan_save_stack+0x3c/0x68 [ 19.183655] kasan_save_track+0x20/0x40 [ 19.183722] kasan_save_alloc_info+0x40/0x58 [ 19.183782] __kasan_kmalloc+0xd4/0xd8 [ 19.183826] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.184081] kmalloc_double_kzfree+0xb8/0x308 [ 19.184150] kunit_try_run_case+0x170/0x3f0 [ 19.184311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.184509] kthread+0x328/0x630 [ 19.184636] ret_from_fork+0x10/0x20 [ 19.184744] [ 19.184805] Freed by task 195: [ 19.184913] kasan_save_stack+0x3c/0x68 [ 19.185053] kasan_save_track+0x20/0x40 [ 19.185440] kasan_save_free_info+0x4c/0x78 [ 19.185573] __kasan_slab_free+0x6c/0x98 [ 19.185688] kfree+0x214/0x3c8 [ 19.185785] kfree_sensitive+0x80/0xb0 [ 19.185938] kmalloc_double_kzfree+0x11c/0x308 [ 19.186150] kunit_try_run_case+0x170/0x3f0 [ 19.186239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.186407] kthread+0x328/0x630 [ 19.186477] ret_from_fork+0x10/0x20 [ 19.186599] [ 19.186624] The buggy address belongs to the object at fff00000c5915980 [ 19.186624] which belongs to the cache kmalloc-16 of size 16 [ 19.186692] The buggy address is located 0 bytes inside of [ 19.186692] freed 16-byte region [fff00000c5915980, fff00000c5915990) [ 19.186969] [ 19.187036] The buggy address belongs to the physical page: [ 19.187103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105915 [ 19.187234] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.187335] page_type: f5(slab) [ 19.187443] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.187505] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.187691] page dumped because: kasan: bad access detected [ 19.187812] [ 19.187857] Memory state around the buggy address: [ 19.187923] fff00000c5915880: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 19.188023] fff00000c5915900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.188082] >fff00000c5915980: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.188256] ^ [ 19.188378] fff00000c5915a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.188448] fff00000c5915a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.188550] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 19.158560] ================================================================== [ 19.158617] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 19.158673] Read of size 1 at addr fff00000c3fb2d28 by task kunit_try_catch/191 [ 19.158724] [ 19.158756] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 19.158841] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.159185] Hardware name: linux,dummy-virt (DT) [ 19.159374] Call trace: [ 19.159580] show_stack+0x20/0x38 (C) [ 19.161659] dump_stack_lvl+0x8c/0xd0 [ 19.161777] print_report+0x118/0x608 [ 19.162017] kasan_report+0xdc/0x128 [ 19.162331] __asan_report_load1_noabort+0x20/0x30 [ 19.162637] kmalloc_uaf2+0x3f4/0x468 [ 19.164224] kunit_try_run_case+0x170/0x3f0 [ 19.164323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.164519] kthread+0x328/0x630 [ 19.164616] ret_from_fork+0x10/0x20 [ 19.164675] [ 19.165030] Allocated by task 191: [ 19.165089] kasan_save_stack+0x3c/0x68 [ 19.165148] kasan_save_track+0x20/0x40 [ 19.165233] kasan_save_alloc_info+0x40/0x58 [ 19.165345] __kasan_kmalloc+0xd4/0xd8 [ 19.165434] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.165605] kmalloc_uaf2+0xc4/0x468 [ 19.165661] kunit_try_run_case+0x170/0x3f0 [ 19.165977] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.166060] kthread+0x328/0x630 [ 19.166186] ret_from_fork+0x10/0x20 [ 19.166253] [ 19.166310] Freed by task 191: [ 19.166422] kasan_save_stack+0x3c/0x68 [ 19.166501] kasan_save_track+0x20/0x40 [ 19.166634] kasan_save_free_info+0x4c/0x78 [ 19.166724] __kasan_slab_free+0x6c/0x98 [ 19.166788] kfree+0x214/0x3c8 [ 19.167100] kmalloc_uaf2+0x134/0x468 [ 19.167175] kunit_try_run_case+0x170/0x3f0 [ 19.167326] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.167403] kthread+0x328/0x630 [ 19.167562] ret_from_fork+0x10/0x20 [ 19.167609] [ 19.167647] The buggy address belongs to the object at fff00000c3fb2d00 [ 19.167647] which belongs to the cache kmalloc-64 of size 64 [ 19.167760] The buggy address is located 40 bytes inside of [ 19.167760] freed 64-byte region [fff00000c3fb2d00, fff00000c3fb2d40) [ 19.167824] [ 19.167844] The buggy address belongs to the physical page: [ 19.167887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fb2 [ 19.167963] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.168029] page_type: f5(slab) [ 19.168070] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.168135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.168190] page dumped because: kasan: bad access detected [ 19.168221] [ 19.168238] Memory state around the buggy address: [ 19.168288] fff00000c3fb2c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.168331] fff00000c3fb2c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.168401] >fff00000c3fb2d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.168449] ^ [ 19.168481] fff00000c3fb2d80: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 19.168525] fff00000c3fb2e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.168575] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 19.147536] ================================================================== [ 19.147664] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 19.147757] Write of size 33 at addr fff00000c3fb2b80 by task kunit_try_catch/189 [ 19.147910] [ 19.147949] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 19.148038] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.148202] Hardware name: linux,dummy-virt (DT) [ 19.148286] Call trace: [ 19.148312] show_stack+0x20/0x38 (C) [ 19.148394] dump_stack_lvl+0x8c/0xd0 [ 19.148453] print_report+0x118/0x608 [ 19.148502] kasan_report+0xdc/0x128 [ 19.148556] kasan_check_range+0x100/0x1a8 [ 19.148606] __asan_memset+0x34/0x78 [ 19.148653] kmalloc_uaf_memset+0x170/0x310 [ 19.148705] kunit_try_run_case+0x170/0x3f0 [ 19.148787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.148856] kthread+0x328/0x630 [ 19.148902] ret_from_fork+0x10/0x20 [ 19.148952] [ 19.148970] Allocated by task 189: [ 19.148999] kasan_save_stack+0x3c/0x68 [ 19.149040] kasan_save_track+0x20/0x40 [ 19.149078] kasan_save_alloc_info+0x40/0x58 [ 19.149129] __kasan_kmalloc+0xd4/0xd8 [ 19.149165] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.149216] kmalloc_uaf_memset+0xb8/0x310 [ 19.149264] kunit_try_run_case+0x170/0x3f0 [ 19.149313] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.149615] kthread+0x328/0x630 [ 19.149863] ret_from_fork+0x10/0x20 [ 19.149914] [ 19.150057] Freed by task 189: [ 19.150184] kasan_save_stack+0x3c/0x68 [ 19.150229] kasan_save_track+0x20/0x40 [ 19.150276] kasan_save_free_info+0x4c/0x78 [ 19.150565] __kasan_slab_free+0x6c/0x98 [ 19.150644] kfree+0x214/0x3c8 [ 19.150707] kmalloc_uaf_memset+0x11c/0x310 [ 19.150836] kunit_try_run_case+0x170/0x3f0 [ 19.150905] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.151059] kthread+0x328/0x630 [ 19.151125] ret_from_fork+0x10/0x20 [ 19.151189] [ 19.151425] The buggy address belongs to the object at fff00000c3fb2b80 [ 19.151425] which belongs to the cache kmalloc-64 of size 64 [ 19.151517] The buggy address is located 0 bytes inside of [ 19.151517] freed 64-byte region [fff00000c3fb2b80, fff00000c3fb2bc0) [ 19.151655] [ 19.151724] The buggy address belongs to the physical page: [ 19.151793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fb2 [ 19.151964] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.152018] page_type: f5(slab) [ 19.152312] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.152412] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.152474] page dumped because: kasan: bad access detected [ 19.152603] [ 19.152642] Memory state around the buggy address: [ 19.152711] fff00000c3fb2a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.152811] fff00000c3fb2b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.152864] >fff00000c3fb2b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.153141] ^ [ 19.153211] fff00000c3fb2c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.153266] fff00000c3fb2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.153418] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 19.134850] ================================================================== [ 19.134942] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 19.135019] Read of size 1 at addr fff00000c5915968 by task kunit_try_catch/187 [ 19.135070] [ 19.135283] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 19.135409] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.135450] Hardware name: linux,dummy-virt (DT) [ 19.135488] Call trace: [ 19.135512] show_stack+0x20/0x38 (C) [ 19.135566] dump_stack_lvl+0x8c/0xd0 [ 19.135613] print_report+0x118/0x608 [ 19.135659] kasan_report+0xdc/0x128 [ 19.135706] __asan_report_load1_noabort+0x20/0x30 [ 19.135758] kmalloc_uaf+0x300/0x338 [ 19.135802] kunit_try_run_case+0x170/0x3f0 [ 19.135852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.135915] kthread+0x328/0x630 [ 19.135962] ret_from_fork+0x10/0x20 [ 19.136010] [ 19.136029] Allocated by task 187: [ 19.136056] kasan_save_stack+0x3c/0x68 [ 19.136097] kasan_save_track+0x20/0x40 [ 19.136134] kasan_save_alloc_info+0x40/0x58 [ 19.136173] __kasan_kmalloc+0xd4/0xd8 [ 19.136210] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.136252] kmalloc_uaf+0xb8/0x338 [ 19.136289] kunit_try_run_case+0x170/0x3f0 [ 19.136329] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.136769] kthread+0x328/0x630 [ 19.136825] ret_from_fork+0x10/0x20 [ 19.136883] [ 19.136948] Freed by task 187: [ 19.136996] kasan_save_stack+0x3c/0x68 [ 19.137037] kasan_save_track+0x20/0x40 [ 19.137097] kasan_save_free_info+0x4c/0x78 [ 19.137266] __kasan_slab_free+0x6c/0x98 [ 19.137398] kfree+0x214/0x3c8 [ 19.137447] kmalloc_uaf+0x11c/0x338 [ 19.137574] kunit_try_run_case+0x170/0x3f0 [ 19.137629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.137674] kthread+0x328/0x630 [ 19.137735] ret_from_fork+0x10/0x20 [ 19.137990] [ 19.138048] The buggy address belongs to the object at fff00000c5915960 [ 19.138048] which belongs to the cache kmalloc-16 of size 16 [ 19.138163] The buggy address is located 8 bytes inside of [ 19.138163] freed 16-byte region [fff00000c5915960, fff00000c5915970) [ 19.138251] [ 19.138499] The buggy address belongs to the physical page: [ 19.138562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105915 [ 19.138641] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.138751] page_type: f5(slab) [ 19.138814] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.138930] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.138975] page dumped because: kasan: bad access detected [ 19.139013] [ 19.139064] Memory state around the buggy address: [ 19.139310] fff00000c5915800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.139426] fff00000c5915880: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 19.139505] >fff00000c5915900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 19.139779] ^ [ 19.139885] fff00000c5915980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.139951] fff00000c5915a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.140065] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 19.116792] ================================================================== [ 19.116856] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 19.117131] Read of size 64 at addr fff00000c3fb2884 by task kunit_try_catch/185 [ 19.117197] [ 19.117247] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 19.117568] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.117599] Hardware name: linux,dummy-virt (DT) [ 19.117892] Call trace: [ 19.118715] show_stack+0x20/0x38 (C) [ 19.119223] dump_stack_lvl+0x8c/0xd0 [ 19.119295] print_report+0x118/0x608 [ 19.119395] kasan_report+0xdc/0x128 [ 19.119620] kasan_check_range+0x100/0x1a8 [ 19.119742] __asan_memmove+0x3c/0x98 [ 19.119790] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 19.119876] kunit_try_run_case+0x170/0x3f0 [ 19.120313] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.120423] kthread+0x328/0x630 [ 19.120494] ret_from_fork+0x10/0x20 [ 19.120909] [ 19.120950] Allocated by task 185: [ 19.120980] kasan_save_stack+0x3c/0x68 [ 19.121051] kasan_save_track+0x20/0x40 [ 19.121130] kasan_save_alloc_info+0x40/0x58 [ 19.121911] __kasan_kmalloc+0xd4/0xd8 [ 19.122171] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.122239] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 19.122319] kunit_try_run_case+0x170/0x3f0 [ 19.122404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.122479] kthread+0x328/0x630 [ 19.122709] ret_from_fork+0x10/0x20 [ 19.122749] [ 19.122770] The buggy address belongs to the object at fff00000c3fb2880 [ 19.122770] which belongs to the cache kmalloc-64 of size 64 [ 19.122829] The buggy address is located 4 bytes inside of [ 19.122829] allocated 64-byte region [fff00000c3fb2880, fff00000c3fb28c0) [ 19.123306] [ 19.123389] The buggy address belongs to the physical page: [ 19.123452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fb2 [ 19.123518] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.123771] page_type: f5(slab) [ 19.123826] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 19.123876] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.123948] page dumped because: kasan: bad access detected [ 19.124017] [ 19.124064] Memory state around the buggy address: [ 19.124655] fff00000c3fb2780: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 19.124733] fff00000c3fb2800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.125041] >fff00000c3fb2880: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.125285] ^ [ 19.125486] fff00000c3fb2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.125583] fff00000c3fb2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.125659] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 18.268860] ================================================================== [ 18.268957] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 18.269034] Read of size 18446744073709551614 at addr fff00000ffe7afc4 by task kunit_try_catch/183 [ 18.269116] [ 18.269155] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 18.281479] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.281586] Hardware name: linux,dummy-virt (DT) [ 18.281631] Call trace: [ 18.281678] show_stack+0x20/0x38 (C) [ 18.281740] dump_stack_lvl+0x8c/0xd0 [ 18.281791] print_report+0x118/0x608 [ 18.281837] kasan_report+0xdc/0x128 [ 18.281989] kasan_check_range+0x100/0x1a8 [ 18.285444] __asan_memmove+0x3c/0x98 [ 18.287504] kmalloc_memmove_negative_size+0x154/0x2e0 [ 18.287582] kunit_try_run_case+0x170/0x3f0 [ 18.288574] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.290855] kthread+0x328/0x630 [ 18.290960] ret_from_fork+0x10/0x20 [ 18.293403] [ 18.293447] Allocated by task 2846403498: [ 18.298216] ------------[ cut here ]------------ [ 18.298291] pool index 44973 out of bounds (211) for stack id adacafae [ 18.301263] WARNING: CPU: 1 PID: 183 at lib/stackdepot.c:451 depot_fetch_stack+0x6c/0x90 [ 19.010058] Modules linked in: [ 19.011688] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 19.013148] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.013871] Hardware name: linux,dummy-virt (DT) [ 19.014688] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 19.015906] pc : depot_fetch_stack+0x6c/0x90 [ 19.016559] lr : depot_fetch_stack+0x6c/0x90 [ 19.017307] sp : ffff800080977a20 [ 19.017951] x29: ffff800080977a20 x28: ffffaf0a3e9f1000 x27: 1ffff00010010f60 [ 19.019065] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffaf0a37949884 [ 19.019880] x23: ffffc1ffc3ff9e80 x22: ffffaf0a3c3dd278 x21: ffffaf0a3c3e0498 [ 19.020857] x20: fff00000ffe7afc4 x19: ffff800080977b30 x18: 00000000fc2f539e [ 19.021864] x17: 0000000000000001 x16: 00000000f1f1f1f1 x15: 0000000000000007 [ 19.022643] x14: 0000000000000000 x13: 0000000000000007 x12: ffff70001012eea1 [ 19.023018] x11: 1ffff0001012eea0 x10: ffff70001012eea0 x9 : ffffaf0a372e4724 [ 19.023436] x8 : ffff800080977507 x7 : 0000000000000001 x6 : ffff70001012eea0 [ 19.023786] x5 : ffff800080977500 x4 : 1ffe000018ef9799 x3 : dfff800000000000 [ 19.024142] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c77cbcc0 [ 19.024783] Call trace: [ 19.025084] depot_fetch_stack+0x6c/0x90 (P) [ 19.025547] stack_depot_print+0x24/0x60 [ 19.025958] print_report+0x5e4/0x608 [ 19.026344] kasan_report+0xdc/0x128 [ 19.026735] kasan_check_range+0x100/0x1a8 [ 19.027194] __asan_memmove+0x3c/0x98 [ 19.027592] kmalloc_memmove_negative_size+0x154/0x2e0 [ 19.028097] kunit_try_run_case+0x170/0x3f0 [ 19.028543] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.029474] kthread+0x328/0x630 [ 19.029992] ret_from_fork+0x10/0x20 [ 19.030678] ---[ end trace 0000000000000000 ]--- [ 19.031668] ------------[ cut here ]------------ [ 19.031719] corrupt handle or use after stack_depot_put() [ 19.031810] WARNING: CPU: 1 PID: 183 at lib/stackdepot.c:723 stack_depot_print+0x54/0x60 [ 19.034074] Modules linked in: [ 19.034562] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 19.035612] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.036227] Hardware name: linux,dummy-virt (DT) [ 19.036828] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 19.037422] pc : stack_depot_print+0x54/0x60 [ 19.037641] lr : stack_depot_print+0x54/0x60 [ 19.037840] sp : ffff800080977a30 [ 19.037997] x29: ffff800080977a30 x28: ffffaf0a3e9f1000 x27: 1ffff00010010f60 [ 19.038368] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffaf0a37949884 [ 19.039406] x23: ffffc1ffc3ff9e80 x22: ffffaf0a3c3dd278 x21: ffffaf0a3c3e0498 [ 19.040170] x20: fff00000ffe7afc4 x19: ffff800080977b30 x18: 00000000fc2f539e [ 19.040935] x17: 0000000000000001 x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3 [ 19.041710] x14: ffff70001012ef26 x13: 1ffe000018ef9799 x12: ffff75e147c20809 [ 19.042464] x11: 1ffff5e147c20808 x10: ffff75e147c20808 x9 : ffffaf0a372e4724 [ 19.043216] x8 : ffffaf0a3e104043 x7 : 0000000000000001 x6 : ffff75e147c20808 [ 19.043971] x5 : ffffaf0a3e104040 x4 : 1ffe000018ef9799 x3 : dfff800000000000 [ 19.044724] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c77cbcc0 [ 19.045482] Call trace: [ 19.045787] stack_depot_print+0x54/0x60 (P) [ 19.046158] print_report+0x5e4/0x608 [ 19.046552] kasan_report+0xdc/0x128 [ 19.046863] kasan_check_range+0x100/0x1a8 [ 19.047078] __asan_memmove+0x3c/0x98 [ 19.047267] kmalloc_memmove_negative_size+0x154/0x2e0 [ 19.047854] kunit_try_run_case+0x170/0x3f0 [ 19.048320] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.048895] kthread+0x328/0x630 [ 19.049277] ret_from_fork+0x10/0x20 [ 19.049707] ---[ end trace 0000000000000000 ]--- [ 19.050211] [ 19.050245] Last potentially related work creation: [ 19.050283] ------------[ cut here ]------------ [ 19.050310] pool index 43945 out of bounds (211) for stack id a9a8abaa [ 19.050431] WARNING: CPU: 1 PID: 183 at lib/stackdepot.c:451 depot_fetch_stack+0x6c/0x90 [ 19.052151] Modules linked in: [ 19.052343] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 19.053323] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.053849] Hardware name: linux,dummy-virt (DT) [ 19.054329] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 19.055012] pc : depot_fetch_stack+0x6c/0x90 [ 19.055489] lr : depot_fetch_stack+0x6c/0x90 [ 19.055922] sp : ffff800080977a00 [ 19.056083] x29: ffff800080977a00 x28: ffffaf0a3e9f1000 x27: 1ffff00010010f60 [ 19.056443] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffaf0a37949884 [ 19.056791] x23: ffffc1ffc3ff9e80 x22: ffffaf0a3c3dd278 x21: ffffaf0a3c3e0498 [ 19.057135] x20: fff00000ffe7afc4 x19: fff00000ffe7a040 x18: 00000000fc2f539e [ 19.057759] x17: 0000000000000001 x16: 00000000f1f1f1f1 x15: 0000000000000007 [ 19.058515] x14: 0000000000000000 x13: 0000000000000007 x12: ffff75e147c20809 [ 19.059288] x11: 1ffff5e147c20808 x10: ffff75e147c20808 x9 : ffffaf0a372e4724 [ 19.060042] x8 : ffffaf0a3e104043 x7 : 0000000000000001 x6 : ffff75e147c20808 [ 19.060790] x5 : ffffaf0a3e104040 x4 : 1ffe000018ef9799 x3 : dfff800000000000 [ 19.061670] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c77cbcc0 [ 19.062454] Call trace: [ 19.062734] depot_fetch_stack+0x6c/0x90 (P) [ 19.063227] stack_depot_print+0x24/0x60 [ 19.063490] kasan_print_aux_stacks+0x50/0x98 [ 19.063713] print_report+0x348/0x608 [ 19.063902] kasan_report+0xdc/0x128 [ 19.064082] kasan_check_range+0x100/0x1a8 [ 19.064280] __asan_memmove+0x3c/0x98 [ 19.064710] kmalloc_memmove_negative_size+0x154/0x2e0 [ 19.065264] kunit_try_run_case+0x170/0x3f0 [ 19.065738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.066306] kthread+0x328/0x630 [ 19.066701] ret_from_fork+0x10/0x20 [ 19.067115] ---[ end trace 0000000000000000 ]--- [ 19.067621] ------------[ cut here ]------------ [ 19.067649] corrupt handle or use after stack_depot_put() [ 19.067731] WARNING: CPU: 1 PID: 183 at lib/stackdepot.c:723 stack_depot_print+0x54/0x60 [ 19.069458] Modules linked in: [ 19.069820] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 19.070658] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.070866] Hardware name: linux,dummy-virt (DT) [ 19.071071] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 19.071365] pc : stack_depot_print+0x54/0x60 [ 19.071820] lr : stack_depot_print+0x54/0x60 [ 19.072286] sp : ffff800080977a10 [ 19.072635] x29: ffff800080977a10 x28: ffffaf0a3e9f1000 x27: 1ffff00010010f60 [ 19.073387] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffaf0a37949884 [ 19.074156] x23: ffffc1ffc3ff9e80 x22: ffffaf0a3c3dd278 x21: ffffaf0a3c3e0498 [ 19.074906] x20: fff00000ffe7afc4 x19: fff00000ffe7a040 x18: 00000000fc2f539e [ 19.075671] x17: 0000000000000001 x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3 [ 19.076406] x14: ffff70001012ef22 x13: 1ffe000018ef9799 x12: ffff75e147c20809 [ 19.076761] x11: 1ffff5e147c20808 x10: ffff75e147c20808 x9 : ffffaf0a372e4724 [ 19.077109] x8 : ffffaf0a3e104043 x7 : 0000000000000001 x6 : ffff75e147c20808 [ 19.077476] x5 : ffffaf0a3e104040 x4 : 1ffe000018ef9799 x3 : dfff800000000000 [ 19.077917] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c77cbcc0 [ 19.078309] Call trace: [ 19.078499] stack_depot_print+0x54/0x60 (P) [ 19.078766] kasan_print_aux_stacks+0x50/0x98 [ 19.079053] print_report+0x348/0x608 [ 19.079296] kasan_report+0xdc/0x128 [ 19.079536] kasan_check_range+0x100/0x1a8 [ 19.079782] __asan_memmove+0x3c/0x98 [ 19.080052] kmalloc_memmove_negative_size+0x154/0x2e0 [ 19.080382] kunit_try_run_case+0x170/0x3f0 [ 19.080669] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.081023] kthread+0x328/0x630 [ 19.081235] ret_from_fork+0x10/0x20 [ 19.081521] ---[ end trace 0000000000000000 ]--- [ 19.081790] [ 19.081827] Second to last potentially related work creation: [ 19.081879] ------------[ cut here ]------------ [ 19.081906] pool index 44973 out of bounds (211) for stack id adacafae [ 19.082025] WARNING: CPU: 1 PID: 183 at lib/stackdepot.c:451 depot_fetch_stack+0x6c/0x90 [ 19.083329] Modules linked in: [ 19.083572] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 19.084123] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.084463] Hardware name: linux,dummy-virt (DT) [ 19.084739] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 19.085109] pc : depot_fetch_stack+0x6c/0x90 [ 19.085391] lr : depot_fetch_stack+0x6c/0x90 [ 19.085649] sp : ffff800080977a00 [ 19.085860] x29: ffff800080977a00 x28: ffffaf0a3e9f1000 x27: 1ffff00010010f60 [ 19.086285] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffaf0a37949884 [ 19.086745] x23: ffffc1ffc3ff9e80 x22: ffffaf0a3c3dd278 x21: ffffaf0a3c3e0498 [ 19.087227] x20: fff00000ffe7afc4 x19: fff00000ffe7a040 x18: 00000000fc2f539e [ 19.087677] x17: 0000000000000001 x16: 00000000f1f1f1f1 x15: 0000000000000007 [ 19.088077] x14: 0000000000000000 x13: 0000000000000007 x12: ffff75e147c20809 [ 19.088562] x11: 1ffff5e147c20808 x10: ffff75e147c20808 x9 : ffffaf0a372e4724 [ 19.088983] x8 : ffffaf0a3e104043 x7 : 0000000000000001 x6 : ffff75e147c20808 [ 19.089445] x5 : ffffaf0a3e104040 x4 : 1ffe000018ef9799 x3 : dfff800000000000 [ 19.089914] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c77cbcc0 [ 19.090329] Call trace: [ 19.090511] depot_fetch_stack+0x6c/0x90 (P) [ 19.090803] stack_depot_print+0x24/0x60 [ 19.091076] kasan_print_aux_stacks+0x78/0x98 [ 19.091345] print_report+0x348/0x608 [ 19.091610] kasan_report+0xdc/0x128 [ 19.091871] kasan_check_range+0x100/0x1a8 [ 19.092132] __asan_memmove+0x3c/0x98 [ 19.092375] kmalloc_memmove_negative_size+0x154/0x2e0 [ 19.092695] kunit_try_run_case+0x170/0x3f0 [ 19.092985] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.093294] kthread+0x328/0x630 [ 19.093496] ret_from_fork+0x10/0x20 [ 19.093773] ---[ end trace 0000000000000000 ]--- [ 19.093991] ------------[ cut here ]------------ [ 19.094020] corrupt handle or use after stack_depot_put() [ 19.094097] WARNING: CPU: 1 PID: 183 at lib/stackdepot.c:723 stack_depot_print+0x54/0x60 [ 19.095030] Modules linked in: [ 19.095266] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B W N 6.15.1-rc1 #1 PREEMPT [ 19.095717] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 19.096002] Hardware name: linux,dummy-virt (DT) [ 19.096229] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 19.096650] pc : stack_depot_print+0x54/0x60 [ 19.096935] lr : stack_depot_print+0x54/0x60 [ 19.097185] sp : ffff800080977a10 [ 19.097403] x29: ffff800080977a10 x28: ffffaf0a3e9f1000 x27: 1ffff00010010f60 [ 19.097851] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffaf0a37949884 [ 19.098270] x23: ffffc1ffc3ff9e80 x22: ffffaf0a3c3dd278 x21: ffffaf0a3c3e0498 [ 19.098728] x20: fff00000ffe7afc4 x19: fff00000ffe7a040 x18: 00000000fc2f539e [ 19.099163] x17: 0000000000000001 x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3 [ 19.099638] x14: ffff70001012ef22 x13: 1ffe000018ef9799 x12: ffff75e147c20809 [ 19.100133] x11: 1ffff5e147c20808 x10: ffff75e147c20808 x9 : ffffaf0a372e4724 [ 19.100622] x8 : ffffaf0a3e104043 x7 : 0000000000000001 x6 : ffff75e147c20808 [ 19.101093] x5 : ffffaf0a3e104040 x4 : 1ffe000018ef9799 x3 : dfff800000000000 [ 19.101572] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c77cbcc0 [ 19.101980] Call trace: [ 19.102156] stack_depot_print+0x54/0x60 (P) [ 19.102469] kasan_print_aux_stacks+0x78/0x98 [ 19.102744] print_report+0x348/0x608 [ 19.103016] kasan_report+0xdc/0x128 [ 19.103257] kasan_check_range+0x100/0x1a8 [ 19.103540] __asan_memmove+0x3c/0x98 [ 19.103804] kmalloc_memmove_negative_size+0x154/0x2e0 [ 19.104123] kunit_try_run_case+0x170/0x3f0 [ 19.104403] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.104733] kthread+0x328/0x630 [ 19.104979] ret_from_fork+0x10/0x20 [ 19.105229] ---[ end trace 0000000000000000 ]--- [ 19.105539] [ 19.105580] The buggy address belongs to the object at fff00000ffe7a000 [ 19.105580] which belongs to the cache kmalloc-64 of size 64 [ 19.105654] The buggy address is located 3972 bytes to the right of [ 19.105654] 64-byte region [fff00000ffe7a000, fff00000ffe7a040) [ 19.105730] [ 19.105754] The buggy address belongs to the physical page: [ 19.105789] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x13fe7a [ 19.105850] memcg:fff00000d9d6f461 [ 19.105881] flags: 0xbfffe0000002000(reserved|node=0|zone=2|lastcpupid=0x1ffff) [ 19.105941] page_type: f5(slab) [ 19.105983] raw: 0bfffe0000002000 fff00000c00018c0 ffffc1ffc3ff9e88 0000000000000000 [ 19.106035] raw: 0000000000000000 0000000000010000 00000001f5000000 fff00000d9d6f461 [ 19.106076] page dumped because: kasan: bad access detected [ 19.106108] [ 19.106128] Memory state around the buggy address: [ 19.106163] fff00000ffe7ae80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.106207] fff00000ffe7af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.106251] >fff00000ffe7af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.106289] ^ [ 19.106326] fff00000ffe7b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.106380] fff00000ffe7b080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.106419] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 18.133148] ================================================================== [ 18.133227] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 18.133296] Write of size 16 at addr fff00000c3f75769 by task kunit_try_catch/181 [ 18.133345] [ 18.133842] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 18.139646] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.140604] Hardware name: linux,dummy-virt (DT) [ 18.141566] Call trace: [ 18.146453] show_stack+0x20/0x38 (C) [ 18.146554] dump_stack_lvl+0x8c/0xd0 [ 18.149413] print_report+0x118/0x608 [ 18.149700] kasan_report+0xdc/0x128 [ 18.149898] kasan_check_range+0x100/0x1a8 [ 18.149972] __asan_memset+0x34/0x78 [ 18.150025] kmalloc_oob_memset_16+0x150/0x2f8 [ 18.150078] kunit_try_run_case+0x170/0x3f0 [ 18.150132] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.150187] kthread+0x328/0x630 [ 18.150235] ret_from_fork+0x10/0x20 [ 18.150287] [ 18.150305] Allocated by task 181: [ 18.150334] kasan_save_stack+0x3c/0x68 [ 18.150384] kasan_save_track+0x20/0x40 [ 18.150420] kasan_save_alloc_info+0x40/0x58 [ 18.150459] __kasan_kmalloc+0xd4/0xd8 [ 18.150495] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.150538] kmalloc_oob_memset_16+0xb0/0x2f8 [ 18.150578] kunit_try_run_case+0x170/0x3f0 [ 18.150616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.150661] kthread+0x328/0x630 [ 18.150696] ret_from_fork+0x10/0x20 [ 18.150732] [ 18.150753] The buggy address belongs to the object at fff00000c3f75700 [ 18.150753] which belongs to the cache kmalloc-128 of size 128 [ 18.150809] The buggy address is located 105 bytes inside of [ 18.150809] allocated 120-byte region [fff00000c3f75700, fff00000c3f75778) [ 18.150868] [ 18.150889] The buggy address belongs to the physical page: [ 18.150921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75 [ 18.150976] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.151033] page_type: f5(slab) [ 18.151075] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.151123] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.151162] page dumped because: kasan: bad access detected [ 18.151193] [ 18.151210] Memory state around the buggy address: [ 18.151245] fff00000c3f75600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.151288] fff00000c3f75680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.151330] >fff00000c3f75700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.151374] ^ [ 18.151413] fff00000c3f75780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.151453] fff00000c3f75800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.151489] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 18.069430] ================================================================== [ 18.069557] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 18.069630] Write of size 8 at addr fff00000c3f75671 by task kunit_try_catch/179 [ 18.069679] [ 18.069719] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 18.069804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.069830] Hardware name: linux,dummy-virt (DT) [ 18.069862] Call trace: [ 18.069887] show_stack+0x20/0x38 (C) [ 18.069938] dump_stack_lvl+0x8c/0xd0 [ 18.069987] print_report+0x118/0x608 [ 18.070033] kasan_report+0xdc/0x128 [ 18.070076] kasan_check_range+0x100/0x1a8 [ 18.070123] __asan_memset+0x34/0x78 [ 18.070167] kmalloc_oob_memset_8+0x150/0x2f8 [ 18.070216] kunit_try_run_case+0x170/0x3f0 [ 18.070266] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.070320] kthread+0x328/0x630 [ 18.070378] ret_from_fork+0x10/0x20 [ 18.070429] [ 18.070448] Allocated by task 179: [ 18.070476] kasan_save_stack+0x3c/0x68 [ 18.070516] kasan_save_track+0x20/0x40 [ 18.070554] kasan_save_alloc_info+0x40/0x58 [ 18.070594] __kasan_kmalloc+0xd4/0xd8 [ 18.070633] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.070678] kmalloc_oob_memset_8+0xb0/0x2f8 [ 18.076505] kunit_try_run_case+0x170/0x3f0 [ 18.076577] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.076632] kthread+0x328/0x630 [ 18.076670] ret_from_fork+0x10/0x20 [ 18.076709] [ 18.076731] The buggy address belongs to the object at fff00000c3f75600 [ 18.076731] which belongs to the cache kmalloc-128 of size 128 [ 18.076789] The buggy address is located 113 bytes inside of [ 18.076789] allocated 120-byte region [fff00000c3f75600, fff00000c3f75678) [ 18.076850] [ 18.076871] The buggy address belongs to the physical page: [ 18.076904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75 [ 18.077099] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.077171] page_type: f5(slab) [ 18.077408] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.077647] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.077897] page dumped because: kasan: bad access detected [ 18.078027] [ 18.078046] Memory state around the buggy address: [ 18.078082] fff00000c3f75500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.078429] fff00000c3f75580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.078828] >fff00000c3f75600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.078872] ^ [ 18.078913] fff00000c3f75680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.078955] fff00000c3f75700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.078991] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 18.010531] ================================================================== [ 18.010620] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 18.010696] Write of size 2 at addr fff00000c3f75477 by task kunit_try_catch/175 [ 18.010745] [ 18.010785] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 18.010870] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.010896] Hardware name: linux,dummy-virt (DT) [ 18.010928] Call trace: [ 18.010953] show_stack+0x20/0x38 (C) [ 18.011004] dump_stack_lvl+0x8c/0xd0 [ 18.011060] print_report+0x118/0x608 [ 18.011104] kasan_report+0xdc/0x128 [ 18.011151] kasan_check_range+0x100/0x1a8 [ 18.011199] __asan_memset+0x34/0x78 [ 18.011243] kmalloc_oob_memset_2+0x150/0x2f8 [ 18.011292] kunit_try_run_case+0x170/0x3f0 [ 18.011342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.011692] kthread+0x328/0x630 [ 18.011741] ret_from_fork+0x10/0x20 [ 18.011793] [ 18.011812] Allocated by task 175: [ 18.013893] kasan_save_stack+0x3c/0x68 [ 18.013959] kasan_save_track+0x20/0x40 [ 18.013996] kasan_save_alloc_info+0x40/0x58 [ 18.014037] __kasan_kmalloc+0xd4/0xd8 [ 18.014122] __kmalloc_cache_noprof+0x16c/0x3c0 [ 18.014217] kmalloc_oob_memset_2+0xb0/0x2f8 [ 18.014286] kunit_try_run_case+0x170/0x3f0 [ 18.015100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.015190] kthread+0x328/0x630 [ 18.015264] ret_from_fork+0x10/0x20 [ 18.015389] [ 18.015446] The buggy address belongs to the object at fff00000c3f75400 [ 18.015446] which belongs to the cache kmalloc-128 of size 128 [ 18.015538] The buggy address is located 119 bytes inside of [ 18.015538] allocated 120-byte region [fff00000c3f75400, fff00000c3f75478) [ 18.017401] [ 18.018257] The buggy address belongs to the physical page: [ 18.018987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75 [ 18.022685] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.022811] page_type: f5(slab) [ 18.023327] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 18.023404] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.024379] page dumped because: kasan: bad access detected [ 18.024434] [ 18.024453] Memory state around the buggy address: [ 18.025866] fff00000c3f75300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.026065] fff00000c3f75380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.026114] >fff00000c3f75400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.026151] ^ [ 18.027461] fff00000c3f75480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.027530] fff00000c3f75500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.027568] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 17.909983] ================================================================== [ 17.910065] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 17.910135] Write of size 128 at addr fff00000c3f75300 by task kunit_try_catch/173 [ 17.910185] [ 17.910223] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.910308] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.910334] Hardware name: linux,dummy-virt (DT) [ 17.912446] Call trace: [ 17.912487] show_stack+0x20/0x38 (C) [ 17.912550] dump_stack_lvl+0x8c/0xd0 [ 17.912601] print_report+0x118/0x608 [ 17.913645] kasan_report+0xdc/0x128 [ 17.915309] kasan_check_range+0x100/0x1a8 [ 17.915678] __asan_memset+0x34/0x78 [ 17.915735] kmalloc_oob_in_memset+0x144/0x2d0 [ 17.915787] kunit_try_run_case+0x170/0x3f0 [ 17.918762] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.919533] kthread+0x328/0x630 [ 17.920153] ret_from_fork+0x10/0x20 [ 17.923644] [ 17.925472] Allocated by task 173: [ 17.925518] kasan_save_stack+0x3c/0x68 [ 17.926369] kasan_save_track+0x20/0x40 [ 17.926430] kasan_save_alloc_info+0x40/0x58 [ 17.926471] __kasan_kmalloc+0xd4/0xd8 [ 17.926508] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.926551] kmalloc_oob_in_memset+0xb0/0x2d0 [ 17.926592] kunit_try_run_case+0x170/0x3f0 [ 17.926632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.926678] kthread+0x328/0x630 [ 17.926714] ret_from_fork+0x10/0x20 [ 17.928451] [ 17.928477] The buggy address belongs to the object at fff00000c3f75300 [ 17.928477] which belongs to the cache kmalloc-128 of size 128 [ 17.928539] The buggy address is located 0 bytes inside of [ 17.928539] allocated 120-byte region [fff00000c3f75300, fff00000c3f75378) [ 17.928600] [ 17.928621] The buggy address belongs to the physical page: [ 17.928656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75 [ 17.928713] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.928765] page_type: f5(slab) [ 17.928808] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.928857] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.928896] page dumped because: kasan: bad access detected [ 17.928927] [ 17.928945] Memory state around the buggy address: [ 17.928980] fff00000c3f75200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.929025] fff00000c3f75280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.929068] >fff00000c3f75300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.929104] ^ [ 17.929143] fff00000c3f75380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.929183] fff00000c3f75400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.930922] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 17.858127] ================================================================== [ 17.858218] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 17.858292] Read of size 16 at addr fff00000c5915940 by task kunit_try_catch/171 [ 17.858343] [ 17.859650] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.859740] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.861466] Hardware name: linux,dummy-virt (DT) [ 17.861540] Call trace: [ 17.861565] show_stack+0x20/0x38 (C) [ 17.862836] dump_stack_lvl+0x8c/0xd0 [ 17.862935] print_report+0x118/0x608 [ 17.862988] kasan_report+0xdc/0x128 [ 17.863042] __asan_report_load16_noabort+0x20/0x30 [ 17.863125] kmalloc_uaf_16+0x3bc/0x438 [ 17.864483] kunit_try_run_case+0x170/0x3f0 [ 17.865970] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.866726] kthread+0x328/0x630 [ 17.866792] ret_from_fork+0x10/0x20 [ 17.866846] [ 17.866865] Allocated by task 171: [ 17.866895] kasan_save_stack+0x3c/0x68 [ 17.868442] kasan_save_track+0x20/0x40 [ 17.869456] kasan_save_alloc_info+0x40/0x58 [ 17.869739] __kasan_kmalloc+0xd4/0xd8 [ 17.869782] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.869825] kmalloc_uaf_16+0x140/0x438 [ 17.869863] kunit_try_run_case+0x170/0x3f0 [ 17.869904] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.869950] kthread+0x328/0x630 [ 17.869988] ret_from_fork+0x10/0x20 [ 17.870024] [ 17.870043] Freed by task 171: [ 17.870071] kasan_save_stack+0x3c/0x68 [ 17.870107] kasan_save_track+0x20/0x40 [ 17.872434] kasan_save_free_info+0x4c/0x78 [ 17.872511] __kasan_slab_free+0x6c/0x98 [ 17.872549] kfree+0x214/0x3c8 [ 17.872585] kmalloc_uaf_16+0x190/0x438 [ 17.872623] kunit_try_run_case+0x170/0x3f0 [ 17.872677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.872865] kthread+0x328/0x630 [ 17.872902] ret_from_fork+0x10/0x20 [ 17.872939] [ 17.872961] The buggy address belongs to the object at fff00000c5915940 [ 17.872961] which belongs to the cache kmalloc-16 of size 16 [ 17.873075] The buggy address is located 0 bytes inside of [ 17.873075] freed 16-byte region [fff00000c5915940, fff00000c5915950) [ 17.873489] [ 17.873515] The buggy address belongs to the physical page: [ 17.873548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105915 [ 17.873607] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.873660] page_type: f5(slab) [ 17.873704] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.873754] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.873793] page dumped because: kasan: bad access detected [ 17.873825] [ 17.873843] Memory state around the buggy address: [ 17.873877] fff00000c5915800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.873919] fff00000c5915880: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 17.873961] >fff00000c5915900: fa fb fc fc 00 00 fc fc fa fb fc fc fc fc fc fc [ 17.873998] ^ [ 17.874032] fff00000c5915980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.874072] fff00000c5915a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.874108] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 17.800828] ================================================================== [ 17.800927] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 17.801001] Write of size 16 at addr fff00000c59158e0 by task kunit_try_catch/169 [ 17.801051] [ 17.801091] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.801174] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.801200] Hardware name: linux,dummy-virt (DT) [ 17.801232] Call trace: [ 17.801256] show_stack+0x20/0x38 (C) [ 17.801308] dump_stack_lvl+0x8c/0xd0 [ 17.805469] print_report+0x118/0x608 [ 17.806594] kasan_report+0xdc/0x128 [ 17.807431] __asan_report_store16_noabort+0x20/0x30 [ 17.808545] kmalloc_oob_16+0x3a0/0x3f8 [ 17.811018] kunit_try_run_case+0x170/0x3f0 [ 17.811115] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.811174] kthread+0x328/0x630 [ 17.811223] ret_from_fork+0x10/0x20 [ 17.811278] [ 17.814522] Allocated by task 169: [ 17.814582] kasan_save_stack+0x3c/0x68 [ 17.814635] kasan_save_track+0x20/0x40 [ 17.814706] kasan_save_alloc_info+0x40/0x58 [ 17.814745] __kasan_kmalloc+0xd4/0xd8 [ 17.814781] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.814828] kmalloc_oob_16+0xb4/0x3f8 [ 17.815067] kunit_try_run_case+0x170/0x3f0 [ 17.815115] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.815443] kthread+0x328/0x630 [ 17.815487] ret_from_fork+0x10/0x20 [ 17.815527] [ 17.815549] The buggy address belongs to the object at fff00000c59158e0 [ 17.815549] which belongs to the cache kmalloc-16 of size 16 [ 17.815607] The buggy address is located 0 bytes inside of [ 17.815607] allocated 13-byte region [fff00000c59158e0, fff00000c59158ed) [ 17.815667] [ 17.815688] The buggy address belongs to the physical page: [ 17.815721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105915 [ 17.815777] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.815830] page_type: f5(slab) [ 17.815875] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.815924] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.815963] page dumped because: kasan: bad access detected [ 17.815993] [ 17.816011] Memory state around the buggy address: [ 17.816044] fff00000c5915780: 00 02 fc fc 00 05 fc fc fa fb fc fc 00 02 fc fc [ 17.816086] fff00000c5915800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.816128] >fff00000c5915880: fa fb fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc [ 17.816164] ^ [ 17.816201] fff00000c5915900: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.816241] fff00000c5915980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.816277] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 17.731672] ================================================================== [ 17.732466] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 17.732570] Read of size 1 at addr fff00000c5adea00 by task kunit_try_catch/167 [ 17.732623] [ 17.733486] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.734392] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.734423] Hardware name: linux,dummy-virt (DT) [ 17.734456] Call trace: [ 17.734501] show_stack+0x20/0x38 (C) [ 17.734565] dump_stack_lvl+0x8c/0xd0 [ 17.734614] print_report+0x118/0x608 [ 17.737370] kasan_report+0xdc/0x128 [ 17.737436] __kasan_check_byte+0x54/0x70 [ 17.737507] krealloc_noprof+0x44/0x360 [ 17.737553] krealloc_uaf+0x180/0x520 [ 17.738411] kunit_try_run_case+0x170/0x3f0 [ 17.738478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.738538] kthread+0x328/0x630 [ 17.738585] ret_from_fork+0x10/0x20 [ 17.738639] [ 17.738657] Allocated by task 167: [ 17.738687] kasan_save_stack+0x3c/0x68 [ 17.739503] kasan_save_track+0x20/0x40 [ 17.740635] kasan_save_alloc_info+0x40/0x58 [ 17.742355] __kasan_kmalloc+0xd4/0xd8 [ 17.742513] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.742561] krealloc_uaf+0xc8/0x520 [ 17.742599] kunit_try_run_case+0x170/0x3f0 [ 17.742640] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.744751] kthread+0x328/0x630 [ 17.744801] ret_from_fork+0x10/0x20 [ 17.744860] [ 17.744950] Freed by task 167: [ 17.744992] kasan_save_stack+0x3c/0x68 [ 17.745264] kasan_save_track+0x20/0x40 [ 17.745652] kasan_save_free_info+0x4c/0x78 [ 17.745703] __kasan_slab_free+0x6c/0x98 [ 17.748100] kfree+0x214/0x3c8 [ 17.748238] krealloc_uaf+0x12c/0x520 [ 17.750776] kunit_try_run_case+0x170/0x3f0 [ 17.750841] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.750888] kthread+0x328/0x630 [ 17.750927] ret_from_fork+0x10/0x20 [ 17.750985] [ 17.751496] The buggy address belongs to the object at fff00000c5adea00 [ 17.751496] which belongs to the cache kmalloc-256 of size 256 [ 17.754650] The buggy address is located 0 bytes inside of [ 17.754650] freed 256-byte region [fff00000c5adea00, fff00000c5adeb00) [ 17.754987] [ 17.755024] The buggy address belongs to the physical page: [ 17.755059] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ade [ 17.755145] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.755197] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.755255] page_type: f5(slab) [ 17.755300] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.755360] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.755409] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.755456] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.755503] head: 0bfffe0000000001 ffffc1ffc316b781 00000000ffffffff 00000000ffffffff [ 17.755550] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.755587] page dumped because: kasan: bad access detected [ 17.755618] [ 17.757495] Memory state around the buggy address: [ 17.758457] fff00000c5ade900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.758522] fff00000c5ade980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.758565] >fff00000c5adea00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.758627] ^ [ 17.758671] fff00000c5adea80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.758712] fff00000c5adeb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.758749] ================================================================== [ 17.764093] ================================================================== [ 17.764158] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 17.764224] Read of size 1 at addr fff00000c5adea00 by task kunit_try_catch/167 [ 17.764273] [ 17.764312] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.770692] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.770732] Hardware name: linux,dummy-virt (DT) [ 17.770766] Call trace: [ 17.770791] show_stack+0x20/0x38 (C) [ 17.770856] dump_stack_lvl+0x8c/0xd0 [ 17.770959] print_report+0x118/0x608 [ 17.771017] kasan_report+0xdc/0x128 [ 17.771062] __asan_report_load1_noabort+0x20/0x30 [ 17.771430] krealloc_uaf+0x4c8/0x520 [ 17.771491] kunit_try_run_case+0x170/0x3f0 [ 17.771543] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.771599] kthread+0x328/0x630 [ 17.771647] ret_from_fork+0x10/0x20 [ 17.772720] [ 17.772975] Allocated by task 167: [ 17.773011] kasan_save_stack+0x3c/0x68 [ 17.773072] kasan_save_track+0x20/0x40 [ 17.773116] kasan_save_alloc_info+0x40/0x58 [ 17.773155] __kasan_kmalloc+0xd4/0xd8 [ 17.773192] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.773252] krealloc_uaf+0xc8/0x520 [ 17.773301] kunit_try_run_case+0x170/0x3f0 [ 17.773341] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.773599] kthread+0x328/0x630 [ 17.773637] ret_from_fork+0x10/0x20 [ 17.773673] [ 17.773692] Freed by task 167: [ 17.773719] kasan_save_stack+0x3c/0x68 [ 17.773755] kasan_save_track+0x20/0x40 [ 17.773790] kasan_save_free_info+0x4c/0x78 [ 17.773828] __kasan_slab_free+0x6c/0x98 [ 17.773864] kfree+0x214/0x3c8 [ 17.773901] krealloc_uaf+0x12c/0x520 [ 17.773939] kunit_try_run_case+0x170/0x3f0 [ 17.773977] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.774157] kthread+0x328/0x630 [ 17.774193] ret_from_fork+0x10/0x20 [ 17.774229] [ 17.774249] The buggy address belongs to the object at fff00000c5adea00 [ 17.774249] which belongs to the cache kmalloc-256 of size 256 [ 17.774306] The buggy address is located 0 bytes inside of [ 17.774306] freed 256-byte region [fff00000c5adea00, fff00000c5adeb00) [ 17.774395] [ 17.774416] The buggy address belongs to the physical page: [ 17.774449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ade [ 17.774504] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.774788] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.774851] page_type: f5(slab) [ 17.774896] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.774946] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.774997] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.775051] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.775098] head: 0bfffe0000000001 ffffc1ffc316b781 00000000ffffffff 00000000ffffffff [ 17.775145] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.775182] page dumped because: kasan: bad access detected [ 17.775212] [ 17.775231] Memory state around the buggy address: [ 17.775268] fff00000c5ade900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.775311] fff00000c5ade980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.775371] >fff00000c5adea00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.775407] ^ [ 17.775435] fff00000c5adea80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.775475] fff00000c5adeb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.775511] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 17.600032] ================================================================== [ 17.600083] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 17.600139] Write of size 1 at addr fff00000c5ade8ea by task kunit_try_catch/161 [ 17.600188] [ 17.600220] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.600299] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.600325] Hardware name: linux,dummy-virt (DT) [ 17.602081] Call trace: [ 17.602113] show_stack+0x20/0x38 (C) [ 17.602168] dump_stack_lvl+0x8c/0xd0 [ 17.602523] print_report+0x118/0x608 [ 17.602574] kasan_report+0xdc/0x128 [ 17.602876] __asan_report_store1_noabort+0x20/0x30 [ 17.602933] krealloc_less_oob_helper+0xae4/0xc50 [ 17.603282] krealloc_less_oob+0x20/0x38 [ 17.603768] kunit_try_run_case+0x170/0x3f0 [ 17.603999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.604242] kthread+0x328/0x630 [ 17.604293] ret_from_fork+0x10/0x20 [ 17.604344] [ 17.605016] Allocated by task 161: [ 17.605054] kasan_save_stack+0x3c/0x68 [ 17.605101] kasan_save_track+0x20/0x40 [ 17.605138] kasan_save_alloc_info+0x40/0x58 [ 17.605177] __kasan_krealloc+0x118/0x178 [ 17.605213] krealloc_noprof+0x128/0x360 [ 17.605249] krealloc_less_oob_helper+0x168/0xc50 [ 17.605291] krealloc_less_oob+0x20/0x38 [ 17.605331] kunit_try_run_case+0x170/0x3f0 [ 17.605382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.605428] kthread+0x328/0x630 [ 17.606214] ret_from_fork+0x10/0x20 [ 17.606744] [ 17.606771] The buggy address belongs to the object at fff00000c5ade800 [ 17.606771] which belongs to the cache kmalloc-256 of size 256 [ 17.606830] The buggy address is located 33 bytes to the right of [ 17.606830] allocated 201-byte region [fff00000c5ade800, fff00000c5ade8c9) [ 17.607619] [ 17.607642] The buggy address belongs to the physical page: [ 17.607675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ade [ 17.607731] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.607777] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.607831] page_type: f5(slab) [ 17.607870] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.607920] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.607969] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.608016] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.608065] head: 0bfffe0000000001 ffffc1ffc316b781 00000000ffffffff 00000000ffffffff [ 17.608113] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.608152] page dumped because: kasan: bad access detected [ 17.608183] [ 17.608202] Memory state around the buggy address: [ 17.608233] fff00000c5ade780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.608276] fff00000c5ade800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.608317] >fff00000c5ade880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.609382] ^ [ 17.609425] fff00000c5ade900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.609492] fff00000c5ade980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.609528] ================================================================== [ 17.575613] ================================================================== [ 17.575663] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 17.575716] Write of size 1 at addr fff00000c5ade8d0 by task kunit_try_catch/161 [ 17.575764] [ 17.575795] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.575874] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.575900] Hardware name: linux,dummy-virt (DT) [ 17.575930] Call trace: [ 17.575952] show_stack+0x20/0x38 (C) [ 17.576001] dump_stack_lvl+0x8c/0xd0 [ 17.576049] print_report+0x118/0x608 [ 17.576095] kasan_report+0xdc/0x128 [ 17.576139] __asan_report_store1_noabort+0x20/0x30 [ 17.576190] krealloc_less_oob_helper+0xb9c/0xc50 [ 17.576241] krealloc_less_oob+0x20/0x38 [ 17.576289] kunit_try_run_case+0x170/0x3f0 [ 17.576338] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.578884] kthread+0x328/0x630 [ 17.578976] ret_from_fork+0x10/0x20 [ 17.579549] [ 17.579584] Allocated by task 161: [ 17.579615] kasan_save_stack+0x3c/0x68 [ 17.580481] kasan_save_track+0x20/0x40 [ 17.580535] kasan_save_alloc_info+0x40/0x58 [ 17.580575] __kasan_krealloc+0x118/0x178 [ 17.580612] krealloc_noprof+0x128/0x360 [ 17.580650] krealloc_less_oob_helper+0x168/0xc50 [ 17.580691] krealloc_less_oob+0x20/0x38 [ 17.580729] kunit_try_run_case+0x170/0x3f0 [ 17.580769] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.580814] kthread+0x328/0x630 [ 17.580851] ret_from_fork+0x10/0x20 [ 17.580887] [ 17.580908] The buggy address belongs to the object at fff00000c5ade800 [ 17.580908] which belongs to the cache kmalloc-256 of size 256 [ 17.580964] The buggy address is located 7 bytes to the right of [ 17.580964] allocated 201-byte region [fff00000c5ade800, fff00000c5ade8c9) [ 17.581026] [ 17.581046] The buggy address belongs to the physical page: [ 17.581077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ade [ 17.581129] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.581175] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.581228] page_type: f5(slab) [ 17.581269] raw: 0 [ 17.581269] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.581318] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.581383] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.581431] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.581486] head: 0bfffe0000000001 ffffc1ffc316b781 00000000ffffffff 00000000ffffffff [ 17.581532] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.581571] page dumped because: kasan: bad access detected [ 17.581601] [ 17.581619] Memory state around the buggy address: [ 17.581649] fff00000c5ade780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.581691] fff00000c5ade800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.581732] >fff00000c5ade880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.581768] ^ [ 17.581802] fff00000c5ade900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.581842] fff00000c5ade980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.581878] ================================================================== [ 17.688197] ================================================================== [ 17.688249] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 17.688301] Write of size 1 at addr fff00000c65aa0d0 by task kunit_try_catch/165 [ 17.688386] [ 17.688417] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.688497] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.688532] Hardware name: linux,dummy-virt (DT) [ 17.688571] Call trace: [ 17.688593] show_stack+0x20/0x38 (C) [ 17.688643] dump_stack_lvl+0x8c/0xd0 [ 17.688692] print_report+0x118/0x608 [ 17.688737] kasan_report+0xdc/0x128 [ 17.688792] __asan_report_store1_noabort+0x20/0x30 [ 17.688846] krealloc_less_oob_helper+0xb9c/0xc50 [ 17.688907] krealloc_large_less_oob+0x20/0x38 [ 17.688959] kunit_try_run_case+0x170/0x3f0 [ 17.689009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.689064] kthread+0x328/0x630 [ 17.689109] ret_from_fork+0x10/0x20 [ 17.689158] [ 17.689177] The buggy address belongs to the physical page: [ 17.689215] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a8 [ 17.689276] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.689322] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.689383] page_type: f8(unknown) [ 17.689421] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.689495] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.689551] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.689598] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.689645] head: 0bfffe0000000002 ffffc1ffc3196a01 00000000ffffffff 00000000ffffffff [ 17.689691] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.689844] page dumped because: kasan: bad access detected [ 17.689910] [ 17.690032] Memory state around the buggy address: [ 17.690066] fff00000c65a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.690109] fff00000c65aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.690150] >fff00000c65aa080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.690188] ^ [ 17.690223] fff00000c65aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.690263] fff00000c65aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.690410] ================================================================== [ 17.587486] ================================================================== [ 17.587543] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 17.587600] Write of size 1 at addr fff00000c5ade8da by task kunit_try_catch/161 [ 17.587649] [ 17.587681] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.587764] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.587790] Hardware name: linux,dummy-virt (DT) [ 17.587821] Call trace: [ 17.587843] show_stack+0x20/0x38 (C) [ 17.587892] dump_stack_lvl+0x8c/0xd0 [ 17.587941] print_report+0x118/0x608 [ 17.587986] kasan_report+0xdc/0x128 [ 17.588030] __asan_report_store1_noabort+0x20/0x30 [ 17.588081] krealloc_less_oob_helper+0xa80/0xc50 [ 17.588132] krealloc_less_oob+0x20/0x38 [ 17.588180] kunit_try_run_case+0x170/0x3f0 [ 17.588229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.588287] kthread+0x328/0x630 [ 17.588334] ret_from_fork+0x10/0x20 [ 17.588401] [ 17.588419] Allocated by task 161: [ 17.588447] kasan_save_stack+0x3c/0x68 [ 17.588486] kasan_save_track+0x20/0x40 [ 17.588521] kasan_save_alloc_info+0x40/0x58 [ 17.588559] __kasan_krealloc+0x118/0x178 [ 17.588595] krealloc_noprof+0x128/0x360 [ 17.588631] krealloc_less_oob_helper+0x168/0xc50 [ 17.588672] krealloc_less_oob+0x20/0x38 [ 17.588710] kunit_try_run_case+0x170/0x3f0 [ 17.588748] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.588794] kthread+0x328/0x630 [ 17.588829] ret_from_fork+0x10/0x20 [ 17.588865] [ 17.588886] The buggy address belongs to the object at fff00000c5ade800 [ 17.588886] which belongs to the cache kmalloc-256 of size 256 [ 17.588942] The buggy address is located 17 bytes to the right of [ 17.588942] allocated 201-byte region [fff00000c5ade800, fff00000c5ade8c9) [ 17.589005] [ 17.589024] The buggy address belongs to the physical page: [ 17.589055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ade [ 17.589107] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.589152] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.589202] page_type: f5(slab) [ 17.589240] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.589290] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.589338] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.593859] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.593913] head: 0bfffe0000000001 ffffc1ffc316b781 00000000ffffffff 00000000ffffffff [ 17.599050] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.599101] page dumped because: kasan: bad access detected [ 17.599133] [ 17.599160] Memory state around the buggy address: [ 17.599195] fff00000c5ade780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.599238] fff00000c5ade800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.599280] >fff00000c5ade880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.599317] ^ [ 17.599364] fff00000c5ade900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.599406] fff00000c5ade980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.599443] ================================================================== [ 17.682971] ================================================================== [ 17.683051] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 17.683122] Write of size 1 at addr fff00000c65aa0c9 by task kunit_try_catch/165 [ 17.683952] [ 17.684011] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.684247] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.684321] Hardware name: linux,dummy-virt (DT) [ 17.684478] Call trace: [ 17.684555] show_stack+0x20/0x38 (C) [ 17.684661] dump_stack_lvl+0x8c/0xd0 [ 17.684712] print_report+0x118/0x608 [ 17.684759] kasan_report+0xdc/0x128 [ 17.684803] __asan_report_store1_noabort+0x20/0x30 [ 17.684878] krealloc_less_oob_helper+0xa48/0xc50 [ 17.685020] krealloc_large_less_oob+0x20/0x38 [ 17.685166] kunit_try_run_case+0x170/0x3f0 [ 17.685308] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.685411] kthread+0x328/0x630 [ 17.685496] ret_from_fork+0x10/0x20 [ 17.685651] [ 17.685673] The buggy address belongs to the physical page: [ 17.685707] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a8 [ 17.685762] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.685816] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.685874] page_type: f8(unknown) [ 17.685935] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.685986] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.686034] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.686081] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.686128] head: 0bfffe0000000002 ffffc1ffc3196a01 00000000ffffffff 00000000ffffffff [ 17.686175] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.686213] page dumped because: kasan: bad access detected [ 17.686243] [ 17.686261] Memory state around the buggy address: [ 17.686293] fff00000c65a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.686335] fff00000c65aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.686396] >fff00000c65aa080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.686433] ^ [ 17.686467] fff00000c65aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.686671] fff00000c65aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.686965] ================================================================== [ 17.614619] ================================================================== [ 17.614670] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 17.614724] Write of size 1 at addr fff00000c5ade8eb by task kunit_try_catch/161 [ 17.614772] [ 17.614805] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.614884] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.614910] Hardware name: linux,dummy-virt (DT) [ 17.614941] Call trace: [ 17.614963] show_stack+0x20/0x38 (C) [ 17.615021] dump_stack_lvl+0x8c/0xd0 [ 17.615070] print_report+0x118/0x608 [ 17.615115] kasan_report+0xdc/0x128 [ 17.615161] __asan_report_store1_noabort+0x20/0x30 [ 17.615214] krealloc_less_oob_helper+0xa58/0xc50 [ 17.615266] krealloc_less_oob+0x20/0x38 [ 17.615314] kunit_try_run_case+0x170/0x3f0 [ 17.619408] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.619477] kthread+0x328/0x630 [ 17.619525] ret_from_fork+0x10/0x20 [ 17.619575] [ 17.619593] Allocated by task 161: [ 17.619622] kasan_save_stack+0x3c/0x68 [ 17.619661] kasan_save_track+0x20/0x40 [ 17.619699] kasan_save_alloc_info+0x40/0x58 [ 17.619738] __kasan_krealloc+0x118/0x178 [ 17.619775] krealloc_noprof+0x128/0x360 [ 17.619812] krealloc_less_oob_helper+0x168/0xc50 [ 17.619853] krealloc_less_oob+0x20/0x38 [ 17.619891] kunit_try_run_case+0x170/0x3f0 [ 17.619930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.620024] kthread+0x328/0x630 [ 17.620307] ret_from_fork+0x10/0x20 [ 17.620932] [ 17.620958] The buggy address belongs to the object at fff00000c5ade800 [ 17.620958] which belongs to the cache kmalloc-256 of size 256 [ 17.621187] The buggy address is located 34 bytes to the right of [ 17.621187] allocated 201-byte region [fff00000c5ade800, fff00000c5ade8c9) [ 17.621334] [ 17.621411] The buggy address belongs to the physical page: [ 17.621534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ade [ 17.621780] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.621879] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.621945] page_type: f5(slab) [ 17.621986] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.622035] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.622441] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.622535] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.622624] head: 0bfffe0000000001 ffffc1ffc316b781 00000000ffffffff 00000000ffffffff [ 17.622691] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.622819] page dumped because: kasan: bad access detected [ 17.624201] [ 17.624315] Memory state around the buggy address: [ 17.624490] fff00000c5ade780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.624581] fff00000c5ade800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.624635] >fff00000c5ade880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.624964] ^ [ 17.625033] fff00000c5ade900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.625106] fff00000c5ade980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.625764] ================================================================== [ 17.563146] ================================================================== [ 17.563206] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 17.563266] Write of size 1 at addr fff00000c5ade8c9 by task kunit_try_catch/161 [ 17.563315] [ 17.566610] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.566710] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.566737] Hardware name: linux,dummy-virt (DT) [ 17.566769] Call trace: [ 17.566794] show_stack+0x20/0x38 (C) [ 17.566854] dump_stack_lvl+0x8c/0xd0 [ 17.566903] print_report+0x118/0x608 [ 17.566950] kasan_report+0xdc/0x128 [ 17.566995] __asan_report_store1_noabort+0x20/0x30 [ 17.567052] krealloc_less_oob_helper+0xa48/0xc50 [ 17.567105] krealloc_less_oob+0x20/0x38 [ 17.567153] kunit_try_run_case+0x170/0x3f0 [ 17.567206] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.567262] kthread+0x328/0x630 [ 17.567310] ret_from_fork+0x10/0x20 [ 17.567375] [ 17.567393] Allocated by task 161: [ 17.567421] kasan_save_stack+0x3c/0x68 [ 17.567461] kasan_save_track+0x20/0x40 [ 17.567498] kasan_save_alloc_info+0x40/0x58 [ 17.567536] __kasan_krealloc+0x118/0x178 [ 17.567573] krealloc_noprof+0x128/0x360 [ 17.567609] krealloc_less_oob_helper+0x168/0xc50 [ 17.567650] krealloc_less_oob+0x20/0x38 [ 17.567688] kunit_try_run_case+0x170/0x3f0 [ 17.567726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.567771] kthread+0x328/0x630 [ 17.567806] ret_from_fork+0x10/0x20 [ 17.567841] [ 17.567861] The buggy address belongs to the object at fff00000c5ade800 [ 17.567861] which belongs to the cache kmalloc-256 of size 256 [ 17.567918] The buggy address is located 0 bytes to the right of [ 17.567918] allocated 201-byte region [fff00000c5ade800, fff00000c5ade8c9) [ 17.567979] [ 17.567999] The buggy address belongs to the physical page: [ 17.568030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ade [ 17.568083] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.568130] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.568185] page_type: f5(slab) [ 17.568226] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.568275] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.568324] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.571659] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.571974] head: 0bfffe0000000001 ffffc1ffc316b781 00000000ffffffff 00000000ffffffff [ 17.572027] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.572067] page dumped because: kasan: bad access detected [ 17.572098] [ 17.572484] Memory state around the buggy address: [ 17.572968] fff00000c5ade780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.573089] fff00000c5ade800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.573443] >fff00000c5ade880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 17.573564] ^ [ 17.573913] fff00000c5ade900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.573960] fff00000c5ade980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.573998] ================================================================== [ 17.691492] ================================================================== [ 17.691740] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 17.691956] Write of size 1 at addr fff00000c65aa0da by task kunit_try_catch/165 [ 17.692014] [ 17.692051] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.692131] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.692157] Hardware name: linux,dummy-virt (DT) [ 17.692186] Call trace: [ 17.692208] show_stack+0x20/0x38 (C) [ 17.692259] dump_stack_lvl+0x8c/0xd0 [ 17.692308] print_report+0x118/0x608 [ 17.692370] kasan_report+0xdc/0x128 [ 17.692415] __asan_report_store1_noabort+0x20/0x30 [ 17.692467] krealloc_less_oob_helper+0xa80/0xc50 [ 17.692519] krealloc_large_less_oob+0x20/0x38 [ 17.692569] kunit_try_run_case+0x170/0x3f0 [ 17.692618] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.692674] kthread+0x328/0x630 [ 17.692721] ret_from_fork+0x10/0x20 [ 17.692772] [ 17.692791] The buggy address belongs to the physical page: [ 17.692822] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a8 [ 17.692873] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.692919] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.692970] page_type: f8(unknown) [ 17.693023] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.693072] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.693120] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.693167] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.693214] head: 0bfffe0000000002 ffffc1ffc3196a01 00000000ffffffff 00000000ffffffff [ 17.693260] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.693298] page dumped because: kasan: bad access detected [ 17.693328] [ 17.693345] Memory state around the buggy address: [ 17.694512] fff00000c65a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.694584] fff00000c65aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.694628] >fff00000c65aa080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.694666] ^ [ 17.694704] fff00000c65aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.694746] fff00000c65aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.694783] ================================================================== [ 17.704749] ================================================================== [ 17.704797] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 17.704853] Write of size 1 at addr fff00000c65aa0eb by task kunit_try_catch/165 [ 17.704901] [ 17.704936] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.705015] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.705040] Hardware name: linux,dummy-virt (DT) [ 17.705071] Call trace: [ 17.705094] show_stack+0x20/0x38 (C) [ 17.705143] dump_stack_lvl+0x8c/0xd0 [ 17.705191] print_report+0x118/0x608 [ 17.705236] kasan_report+0xdc/0x128 [ 17.705280] __asan_report_store1_noabort+0x20/0x30 [ 17.705332] krealloc_less_oob_helper+0xa58/0xc50 [ 17.705402] krealloc_large_less_oob+0x20/0x38 [ 17.705453] kunit_try_run_case+0x170/0x3f0 [ 17.705507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.705562] kthread+0x328/0x630 [ 17.705608] ret_from_fork+0x10/0x20 [ 17.705658] [ 17.705677] The buggy address belongs to the physical page: [ 17.705708] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a8 [ 17.706149] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.706237] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.706292] page_type: f8(unknown) [ 17.706489] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.706545] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.706596] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.706644] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.706693] head: 0bfffe0000000002 ffffc1ffc3196a01 00000000ffffffff 00000000ffffffff [ 17.706803] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.707634] page dumped because: kasan: bad access detected [ 17.708413] [ 17.708448] Memory state around the buggy address: [ 17.708497] fff00000c65a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.709092] fff00000c65aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.709141] >fff00000c65aa080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.709178] ^ [ 17.709217] fff00000c65aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.711091] fff00000c65aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.711140] ================================================================== [ 17.695225] ================================================================== [ 17.695273] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 17.695555] Write of size 1 at addr fff00000c65aa0ea by task kunit_try_catch/165 [ 17.695618] [ 17.695649] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.696015] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.696145] Hardware name: linux,dummy-virt (DT) [ 17.696882] Call trace: [ 17.697167] show_stack+0x20/0x38 (C) [ 17.697342] dump_stack_lvl+0x8c/0xd0 [ 17.697501] print_report+0x118/0x608 [ 17.698782] kasan_report+0xdc/0x128 [ 17.698846] __asan_report_store1_noabort+0x20/0x30 [ 17.698899] krealloc_less_oob_helper+0xae4/0xc50 [ 17.698952] krealloc_large_less_oob+0x20/0x38 [ 17.699003] kunit_try_run_case+0x170/0x3f0 [ 17.699063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.699119] kthread+0x328/0x630 [ 17.699166] ret_from_fork+0x10/0x20 [ 17.699217] [ 17.699238] The buggy address belongs to the physical page: [ 17.699271] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a8 [ 17.699325] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.699760] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.699970] page_type: f8(unknown) [ 17.700071] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.700164] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.700213] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.701203] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.701276] head: 0bfffe0000000002 ffffc1ffc3196a01 00000000ffffffff 00000000ffffffff [ 17.701329] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.701384] page dumped because: kasan: bad access detected [ 17.702289] [ 17.702317] Memory state around the buggy address: [ 17.702444] fff00000c65a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.702490] fff00000c65aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.702534] >fff00000c65aa080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 17.702570] ^ [ 17.702609] fff00000c65aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.703119] fff00000c65aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.704203] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 17.544296] ================================================================== [ 17.544344] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 17.544419] Write of size 1 at addr fff00000c5ade6f0 by task kunit_try_catch/159 [ 17.544467] [ 17.544498] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.544577] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.544603] Hardware name: linux,dummy-virt (DT) [ 17.544633] Call trace: [ 17.544655] show_stack+0x20/0x38 (C) [ 17.544704] dump_stack_lvl+0x8c/0xd0 [ 17.544753] print_report+0x118/0x608 [ 17.544798] kasan_report+0xdc/0x128 [ 17.544842] __asan_report_store1_noabort+0x20/0x30 [ 17.544894] krealloc_more_oob_helper+0x5c0/0x678 [ 17.544945] krealloc_more_oob+0x20/0x38 [ 17.544993] kunit_try_run_case+0x170/0x3f0 [ 17.545047] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.545104] kthread+0x328/0x630 [ 17.545151] ret_from_fork+0x10/0x20 [ 17.545199] [ 17.545217] Allocated by task 159: [ 17.545246] kasan_save_stack+0x3c/0x68 [ 17.545285] kasan_save_track+0x20/0x40 [ 17.545320] kasan_save_alloc_info+0x40/0x58 [ 17.549622] __kasan_krealloc+0x118/0x178 [ 17.549679] krealloc_noprof+0x128/0x360 [ 17.550239] krealloc_more_oob_helper+0x168/0x678 [ 17.550622] krealloc_more_oob+0x20/0x38 [ 17.550665] kunit_try_run_case+0x170/0x3f0 [ 17.550706] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.551036] kthread+0x328/0x630 [ 17.551076] ret_from_fork+0x10/0x20 [ 17.551113] [ 17.551133] The buggy address belongs to the object at fff00000c5ade600 [ 17.551133] which belongs to the cache kmalloc-256 of size 256 [ 17.551862] The buggy address is located 5 bytes to the right of [ 17.551862] allocated 235-byte region [fff00000c5ade600, fff00000c5ade6eb) [ 17.551929] [ 17.551950] The buggy address belongs to the physical page: [ 17.551988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ade [ 17.552041] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.552087] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.552139] page_type: f5(slab) [ 17.552177] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.552227] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.552276] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.552327] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.552388] head: 0bfffe0000000001 ffffc1ffc316b781 00000000ffffffff 00000000ffffffff [ 17.552435] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.552474] page dumped because: kasan: bad access detected [ 17.552504] [ 17.552522] Memory state around the buggy address: [ 17.552553] fff00000c5ade580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.552596] fff00000c5ade600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.552638] >fff00000c5ade680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 17.552675] ^ [ 17.552713] fff00000c5ade700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.552753] fff00000c5ade780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.552790] ================================================================== [ 17.534661] ================================================================== [ 17.534726] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 17.534793] Write of size 1 at addr fff00000c5ade6eb by task kunit_try_catch/159 [ 17.534842] [ 17.534878] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.534961] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.534986] Hardware name: linux,dummy-virt (DT) [ 17.535025] Call trace: [ 17.535048] show_stack+0x20/0x38 (C) [ 17.535101] dump_stack_lvl+0x8c/0xd0 [ 17.535152] print_report+0x118/0x608 [ 17.535197] kasan_report+0xdc/0x128 [ 17.535242] __asan_report_store1_noabort+0x20/0x30 [ 17.535293] krealloc_more_oob_helper+0x60c/0x678 [ 17.535345] krealloc_more_oob+0x20/0x38 [ 17.535407] kunit_try_run_case+0x170/0x3f0 [ 17.535458] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.535513] kthread+0x328/0x630 [ 17.535559] ret_from_fork+0x10/0x20 [ 17.535609] [ 17.535627] Allocated by task 159: [ 17.535655] kasan_save_stack+0x3c/0x68 [ 17.535694] kasan_save_track+0x20/0x40 [ 17.535730] kasan_save_alloc_info+0x40/0x58 [ 17.535768] __kasan_krealloc+0x118/0x178 [ 17.535803] krealloc_noprof+0x128/0x360 [ 17.535841] krealloc_more_oob_helper+0x168/0x678 [ 17.535882] krealloc_more_oob+0x20/0x38 [ 17.535920] kunit_try_run_case+0x170/0x3f0 [ 17.535958] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.536003] kthread+0x328/0x630 [ 17.536037] ret_from_fork+0x10/0x20 [ 17.536073] [ 17.536092] The buggy address belongs to the object at fff00000c5ade600 [ 17.536092] which belongs to the cache kmalloc-256 of size 256 [ 17.536150] The buggy address is located 0 bytes to the right of [ 17.536150] allocated 235-byte region [fff00000c5ade600, fff00000c5ade6eb) [ 17.536211] [ 17.536231] The buggy address belongs to the physical page: [ 17.536264] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ade [ 17.536317] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.541361] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.541438] page_type: f5(slab) [ 17.541727] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.541779] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.541828] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 17.542573] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.542627] head: 0bfffe0000000001 ffffc1ffc316b781 00000000ffffffff 00000000ffffffff [ 17.542873] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 17.543148] page dumped because: kasan: bad access detected [ 17.543182] [ 17.543200] Memory state around the buggy address: [ 17.543236] fff00000c5ade580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.543570] fff00000c5ade600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.543620] >fff00000c5ade680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 17.543657] ^ [ 17.543697] fff00000c5ade700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.543738] fff00000c5ade780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.543775] ================================================================== [ 17.665742] ================================================================== [ 17.665792] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 17.665851] Write of size 1 at addr fff00000c65aa0f0 by task kunit_try_catch/163 [ 17.665902] [ 17.665938] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.666018] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.666044] Hardware name: linux,dummy-virt (DT) [ 17.666075] Call trace: [ 17.666098] show_stack+0x20/0x38 (C) [ 17.666146] dump_stack_lvl+0x8c/0xd0 [ 17.666196] print_report+0x118/0x608 [ 17.666241] kasan_report+0xdc/0x128 [ 17.666285] __asan_report_store1_noabort+0x20/0x30 [ 17.666338] krealloc_more_oob_helper+0x5c0/0x678 [ 17.666403] krealloc_large_more_oob+0x20/0x38 [ 17.666454] kunit_try_run_case+0x170/0x3f0 [ 17.666504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.666559] kthread+0x328/0x630 [ 17.666605] ret_from_fork+0x10/0x20 [ 17.666654] [ 17.666673] The buggy address belongs to the physical page: [ 17.666704] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a8 [ 17.666757] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.666804] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.666855] page_type: f8(unknown) [ 17.666893] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.666943] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.666993] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.667047] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.668782] head: 0bfffe0000000002 ffffc1ffc3196a01 00000000ffffffff 00000000ffffffff [ 17.669028] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.669296] page dumped because: kasan: bad access detected [ 17.669606] [ 17.669628] Memory state around the buggy address: [ 17.669664] fff00000c65a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.669709] fff00000c65aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.669752] >fff00000c65aa080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 17.669789] ^ [ 17.669853] fff00000c65aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.669897] fff00000c65aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.669934] ================================================================== [ 17.652331] ================================================================== [ 17.652422] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 17.652496] Write of size 1 at addr fff00000c65aa0eb by task kunit_try_catch/163 [ 17.652546] [ 17.652585] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.652669] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.652696] Hardware name: linux,dummy-virt (DT) [ 17.652729] Call trace: [ 17.652752] show_stack+0x20/0x38 (C) [ 17.652803] dump_stack_lvl+0x8c/0xd0 [ 17.652853] print_report+0x118/0x608 [ 17.652898] kasan_report+0xdc/0x128 [ 17.652942] __asan_report_store1_noabort+0x20/0x30 [ 17.652993] krealloc_more_oob_helper+0x60c/0x678 [ 17.653045] krealloc_large_more_oob+0x20/0x38 [ 17.653095] kunit_try_run_case+0x170/0x3f0 [ 17.653146] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.656740] kthread+0x328/0x630 [ 17.656869] ret_from_fork+0x10/0x20 [ 17.657338] [ 17.658718] The buggy address belongs to the physical page: [ 17.660077] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a8 [ 17.661455] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.661551] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.661612] page_type: f8(unknown) [ 17.662438] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.662511] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.662696] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.662843] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.663052] head: 0bfffe0000000002 ffffc1ffc3196a01 00000000ffffffff 00000000ffffffff [ 17.663144] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.663290] page dumped because: kasan: bad access detected [ 17.663342] [ 17.663373] Memory state around the buggy address: [ 17.663409] fff00000c65a9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.663794] fff00000c65aa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.663992] >fff00000c65aa080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 17.664084] ^ [ 17.664152] fff00000c65aa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.664254] fff00000c65aa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.665145] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 17.502805] ================================================================== [ 17.502872] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 17.502940] Read of size 1 at addr fff00000c77b0000 by task kunit_try_catch/157 [ 17.502990] [ 17.503036] CPU: 1 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.503119] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.503144] Hardware name: linux,dummy-virt (DT) [ 17.503176] Call trace: [ 17.503200] show_stack+0x20/0x38 (C) [ 17.503258] dump_stack_lvl+0x8c/0xd0 [ 17.503312] print_report+0x118/0x608 [ 17.504200] kasan_report+0xdc/0x128 [ 17.504263] __asan_report_load1_noabort+0x20/0x30 [ 17.504471] page_alloc_uaf+0x328/0x350 [ 17.504528] kunit_try_run_case+0x170/0x3f0 [ 17.505067] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.505128] kthread+0x328/0x630 [ 17.505176] ret_from_fork+0x10/0x20 [ 17.505228] [ 17.505250] The buggy address belongs to the physical page: [ 17.505283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b0 [ 17.505337] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.505403] page_type: f0(buddy) [ 17.505446] raw: 0bfffe0000000000 fff00000ff616020 fff00000ff616020 0000000000000000 [ 17.505523] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000 [ 17.505563] page dumped because: kasan: bad access detected [ 17.505594] [ 17.505617] Memory state around the buggy address: [ 17.505653] fff00000c77aff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.505697] fff00000c77aff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.505739] >fff00000c77b0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.505776] ^ [ 17.505806] fff00000c77b0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.505848] fff00000c77b0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.505885] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[ 17.462044] ================================================================== [ 17.462130] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 17.462199] Free of addr fff00000c65a4001 by task kunit_try_catch/153 [ 17.462242] [ 17.462276] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.466248] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.466285] Hardware name: linux,dummy-virt (DT) [ 17.466317] Call trace: [ 17.466342] show_stack+0x20/0x38 (C) [ 17.466672] dump_stack_lvl+0x8c/0xd0 [ 17.466727] print_report+0x118/0x608 [ 17.467284] kasan_report_invalid_free+0xc0/0xe8 [ 17.467369] __kasan_kfree_large+0x5c/0xa8 [ 17.467422] free_large_kmalloc+0x64/0x190 [ 17.467474] kfree+0x270/0x3c8 [ 17.467520] kmalloc_large_invalid_free+0x108/0x270 [ 17.467572] kunit_try_run_case+0x170/0x3f0 [ 17.467623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.467679] kthread+0x328/0x630 [ 17.467725] ret_from_fork+0x10/0x20 [ 17.467774] [ 17.467795] The buggy address belongs to the physical page: [ 17.467828] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a4 [ 17.467881] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.467927] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.467981] page_type: f8(unknown) [ 17.468021] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.468069] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.468117] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.468163] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.468210] head: 0bfffe0000000002 ffffc1ffc3196901 00000000ffffffff 00000000ffffffff [ 17.468257] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.468295] page dumped because: kasan: bad access detected [ 17.468324] [ 17.468342] Memory state around the buggy address: [ 17.468385] fff00000c65a3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.468427] fff00000c65a3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.468468] >fff00000c65a4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.468505] ^ [ 17.468533] fff00000c65a4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.468574] fff00000c65a4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.468624] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 17.447022] ================================================================== [ 17.447101] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 17.447496] Read of size 1 at addr fff00000c65a4000 by task kunit_try_catch/151 [ 17.447854] [ 17.447935] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.448020] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.448053] Hardware name: linux,dummy-virt (DT) [ 17.448209] Call trace: [ 17.448311] show_stack+0x20/0x38 (C) [ 17.448452] dump_stack_lvl+0x8c/0xd0 [ 17.448552] print_report+0x118/0x608 [ 17.448681] kasan_report+0xdc/0x128 [ 17.448725] __asan_report_load1_noabort+0x20/0x30 [ 17.448780] kmalloc_large_uaf+0x2cc/0x2f8 [ 17.449019] kunit_try_run_case+0x170/0x3f0 [ 17.449140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.449194] kthread+0x328/0x630 [ 17.449246] ret_from_fork+0x10/0x20 [ 17.451762] [ 17.451807] The buggy address belongs to the physical page: [ 17.451933] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a4 [ 17.452087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.452161] raw: 0bfffe0000000000 ffffc1ffc3196a08 fff00000da4a5d80 0000000000000000 [ 17.452211] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 17.452250] page dumped because: kasan: bad access detected [ 17.452445] [ 17.452740] Memory state around the buggy address: [ 17.452787] fff00000c65a3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.452903] fff00000c65a3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.452948] >fff00000c65a4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.453184] ^ [ 17.453329] fff00000c65a4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.453436] fff00000c65a4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.453536] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 17.416223] ================================================================== [ 17.416296] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 17.416401] Write of size 1 at addr fff00000c65a200a by task kunit_try_catch/149 [ 17.416450] [ 17.416485] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.416567] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.416592] Hardware name: linux,dummy-virt (DT) [ 17.416623] Call trace: [ 17.416647] show_stack+0x20/0x38 (C) [ 17.416698] dump_stack_lvl+0x8c/0xd0 [ 17.416746] print_report+0x118/0x608 [ 17.416791] kasan_report+0xdc/0x128 [ 17.416834] __asan_report_store1_noabort+0x20/0x30 [ 17.416884] kmalloc_large_oob_right+0x278/0x2b8 [ 17.416935] kunit_try_run_case+0x170/0x3f0 [ 17.416983] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.417037] kthread+0x328/0x630 [ 17.417083] ret_from_fork+0x10/0x20 [ 17.417132] [ 17.417164] The buggy address belongs to the physical page: [ 17.420861] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a0 [ 17.420933] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.420983] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.421053] page_type: f8(unknown) [ 17.421097] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.421151] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.421199] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.421246] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.421294] head: 0bfffe0000000002 ffffc1ffc3196801 00000000ffffffff 00000000ffffffff [ 17.421340] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.421389] page dumped because: kasan: bad access detected [ 17.421420] [ 17.421438] Memory state around the buggy address: [ 17.422535] fff00000c65a1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.422584] fff00000c65a1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.422626] >fff00000c65a2000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.422662] ^ [ 17.422693] fff00000c65a2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.422733] fff00000c65a2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 17.422770] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 17.395541] ================================================================== [ 17.395629] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 17.395691] Write of size 1 at addr fff00000c7789f00 by task kunit_try_catch/147 [ 17.395747] [ 17.395780] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.395862] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.395888] Hardware name: linux,dummy-virt (DT) [ 17.395927] Call trace: [ 17.395951] show_stack+0x20/0x38 (C) [ 17.396008] dump_stack_lvl+0x8c/0xd0 [ 17.396158] print_report+0x118/0x608 [ 17.396282] kasan_report+0xdc/0x128 [ 17.396334] __asan_report_store1_noabort+0x20/0x30 [ 17.396452] kmalloc_big_oob_right+0x2a4/0x2f0 [ 17.396520] kunit_try_run_case+0x170/0x3f0 [ 17.396605] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.396679] kthread+0x328/0x630 [ 17.396726] ret_from_fork+0x10/0x20 [ 17.396784] [ 17.396803] Allocated by task 147: [ 17.396837] kasan_save_stack+0x3c/0x68 [ 17.397051] kasan_save_track+0x20/0x40 [ 17.397100] kasan_save_alloc_info+0x40/0x58 [ 17.397182] __kasan_kmalloc+0xd4/0xd8 [ 17.397231] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.397282] kmalloc_big_oob_right+0xb8/0x2f0 [ 17.397340] kunit_try_run_case+0x170/0x3f0 [ 17.397391] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.397436] kthread+0x328/0x630 [ 17.397499] ret_from_fork+0x10/0x20 [ 17.397536] [ 17.397556] The buggy address belongs to the object at fff00000c7788000 [ 17.397556] which belongs to the cache kmalloc-8k of size 8192 [ 17.397751] The buggy address is located 0 bytes to the right of [ 17.397751] allocated 7936-byte region [fff00000c7788000, fff00000c7789f00) [ 17.397880] [ 17.397919] The buggy address belongs to the physical page: [ 17.397983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107788 [ 17.398085] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.398168] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.398223] page_type: f5(slab) [ 17.398285] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 17.398334] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 17.398522] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 17.398625] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 17.398743] head: 0bfffe0000000003 ffffc1ffc31de201 00000000ffffffff 00000000ffffffff [ 17.398824] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 17.398901] page dumped because: kasan: bad access detected [ 17.398991] [ 17.399035] Memory state around the buggy address: [ 17.399093] fff00000c7789e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.399205] fff00000c7789e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.399294] >fff00000c7789f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.399361] ^ [ 17.399517] fff00000c7789f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.399684] fff00000c778a000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.399811] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 17.378595] ================================================================== [ 17.378665] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 17.379069] Write of size 1 at addr fff00000c3f75178 by task kunit_try_catch/145 [ 17.379169] [ 17.379205] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.379288] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.379327] Hardware name: linux,dummy-virt (DT) [ 17.379373] Call trace: [ 17.379415] show_stack+0x20/0x38 (C) [ 17.379471] dump_stack_lvl+0x8c/0xd0 [ 17.379521] print_report+0x118/0x608 [ 17.379700] kasan_report+0xdc/0x128 [ 17.379782] __asan_report_store1_noabort+0x20/0x30 [ 17.379836] kmalloc_track_caller_oob_right+0x40c/0x488 [ 17.379908] kunit_try_run_case+0x170/0x3f0 [ 17.379976] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.380044] kthread+0x328/0x630 [ 17.380100] ret_from_fork+0x10/0x20 [ 17.380167] [ 17.380215] Allocated by task 145: [ 17.380253] kasan_save_stack+0x3c/0x68 [ 17.380300] kasan_save_track+0x20/0x40 [ 17.380336] kasan_save_alloc_info+0x40/0x58 [ 17.380387] __kasan_kmalloc+0xd4/0xd8 [ 17.380437] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 17.380482] kmalloc_track_caller_oob_right+0xa8/0x488 [ 17.380528] kunit_try_run_case+0x170/0x3f0 [ 17.380572] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.380626] kthread+0x328/0x630 [ 17.380661] ret_from_fork+0x10/0x20 [ 17.380704] [ 17.380906] The buggy address belongs to the object at fff00000c3f75100 [ 17.380906] which belongs to the cache kmalloc-128 of size 128 [ 17.381014] The buggy address is located 0 bytes to the right of [ 17.381014] allocated 120-byte region [fff00000c3f75100, fff00000c3f75178) [ 17.381079] [ 17.381099] The buggy address belongs to the physical page: [ 17.381138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75 [ 17.381203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.381546] page_type: f5(slab) [ 17.381645] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.381710] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.381782] page dumped because: kasan: bad access detected [ 17.381852] [ 17.381882] Memory state around the buggy address: [ 17.381964] fff00000c3f75000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.382016] fff00000c3f75080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.382057] >fff00000c3f75100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.382094] ^ [ 17.382345] fff00000c3f75180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.382722] fff00000c3f75200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.383022] ================================================================== [ 17.383756] ================================================================== [ 17.383810] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 17.383864] Write of size 1 at addr fff00000c3f75278 by task kunit_try_catch/145 [ 17.383911] [ 17.383949] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.384030] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.384055] Hardware name: linux,dummy-virt (DT) [ 17.384085] Call trace: [ 17.384107] show_stack+0x20/0x38 (C) [ 17.384154] dump_stack_lvl+0x8c/0xd0 [ 17.384203] print_report+0x118/0x608 [ 17.384248] kasan_report+0xdc/0x128 [ 17.384293] __asan_report_store1_noabort+0x20/0x30 [ 17.384344] kmalloc_track_caller_oob_right+0x418/0x488 [ 17.384412] kunit_try_run_case+0x170/0x3f0 [ 17.384473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.384537] kthread+0x328/0x630 [ 17.384584] ret_from_fork+0x10/0x20 [ 17.384632] [ 17.384650] Allocated by task 145: [ 17.384677] kasan_save_stack+0x3c/0x68 [ 17.384715] kasan_save_track+0x20/0x40 [ 17.384757] kasan_save_alloc_info+0x40/0x58 [ 17.384805] __kasan_kmalloc+0xd4/0xd8 [ 17.384840] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 17.384893] kmalloc_track_caller_oob_right+0x184/0x488 [ 17.384943] kunit_try_run_case+0x170/0x3f0 [ 17.384983] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.385028] kthread+0x328/0x630 [ 17.385062] ret_from_fork+0x10/0x20 [ 17.385105] [ 17.385124] The buggy address belongs to the object at fff00000c3f75200 [ 17.385124] which belongs to the cache kmalloc-128 of size 128 [ 17.385187] The buggy address is located 0 bytes to the right of [ 17.385187] allocated 120-byte region [fff00000c3f75200, fff00000c3f75278) [ 17.385248] [ 17.385266] The buggy address belongs to the physical page: [ 17.385295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75 [ 17.385787] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.386318] page_type: f5(slab) [ 17.386386] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.386437] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.386494] page dumped because: kasan: bad access detected [ 17.386978] [ 17.387030] Memory state around the buggy address: [ 17.387065] fff00000c3f75100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.387126] fff00000c3f75180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.387443] >fff00000c3f75200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.387562] ^ [ 17.387641] fff00000c3f75280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.387699] fff00000c3f75300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.387992] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 17.362990] ================================================================== [ 17.363081] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 17.363139] Read of size 1 at addr fff00000c6525000 by task kunit_try_catch/143 [ 17.363187] [ 17.363457] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.363593] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.363632] Hardware name: linux,dummy-virt (DT) [ 17.363683] Call trace: [ 17.363735] show_stack+0x20/0x38 (C) [ 17.363789] dump_stack_lvl+0x8c/0xd0 [ 17.363838] print_report+0x118/0x608 [ 17.363884] kasan_report+0xdc/0x128 [ 17.364130] __asan_report_load1_noabort+0x20/0x30 [ 17.364229] kmalloc_node_oob_right+0x2f4/0x330 [ 17.364283] kunit_try_run_case+0x170/0x3f0 [ 17.364344] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.364418] kthread+0x328/0x630 [ 17.364465] ret_from_fork+0x10/0x20 [ 17.364523] [ 17.364542] Allocated by task 143: [ 17.364569] kasan_save_stack+0x3c/0x68 [ 17.364616] kasan_save_track+0x20/0x40 [ 17.364684] kasan_save_alloc_info+0x40/0x58 [ 17.364730] __kasan_kmalloc+0xd4/0xd8 [ 17.364766] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 17.364815] kmalloc_node_oob_right+0xbc/0x330 [ 17.364872] kunit_try_run_case+0x170/0x3f0 [ 17.364919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.364974] kthread+0x328/0x630 [ 17.365010] ret_from_fork+0x10/0x20 [ 17.365060] [ 17.365088] The buggy address belongs to the object at fff00000c6524000 [ 17.365088] which belongs to the cache kmalloc-4k of size 4096 [ 17.365144] The buggy address is located 0 bytes to the right of [ 17.365144] allocated 4096-byte region [fff00000c6524000, fff00000c6525000) [ 17.365206] [ 17.365225] The buggy address belongs to the physical page: [ 17.365298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106520 [ 17.365638] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.365689] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.365754] page_type: f5(slab) [ 17.365859] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 17.365945] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 17.366085] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 17.366209] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 17.366276] head: 0bfffe0000000003 ffffc1ffc3194801 00000000ffffffff 00000000ffffffff [ 17.366398] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 17.366484] page dumped because: kasan: bad access detected [ 17.366516] [ 17.366539] Memory state around the buggy address: [ 17.366571] fff00000c6524f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.366613] fff00000c6524f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.366781] >fff00000c6525000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.366827] ^ [ 17.366877] fff00000c6525080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.366998] fff00000c6525100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.367116] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 17.353221] ================================================================== [ 17.353279] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 17.353368] Read of size 1 at addr fff00000c59158bf by task kunit_try_catch/141 [ 17.353884] [ 17.353967] CPU: 1 UID: 0 PID: 141 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.354058] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.354111] Hardware name: linux,dummy-virt (DT) [ 17.354142] Call trace: [ 17.354198] show_stack+0x20/0x38 (C) [ 17.354277] dump_stack_lvl+0x8c/0xd0 [ 17.354329] print_report+0x118/0x608 [ 17.354387] kasan_report+0xdc/0x128 [ 17.354627] __asan_report_load1_noabort+0x20/0x30 [ 17.354695] kmalloc_oob_left+0x2ec/0x320 [ 17.354830] kunit_try_run_case+0x170/0x3f0 [ 17.355038] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.355147] kthread+0x328/0x630 [ 17.355211] ret_from_fork+0x10/0x20 [ 17.355280] [ 17.355298] Allocated by task 52: [ 17.355328] kasan_save_stack+0x3c/0x68 [ 17.355384] kasan_save_track+0x20/0x40 [ 17.355609] kasan_save_alloc_info+0x40/0x58 [ 17.355680] __kasan_kmalloc+0xd4/0xd8 [ 17.355792] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 17.355880] kvasprintf+0xe0/0x180 [ 17.355970] __kthread_create_on_node+0x16c/0x350 [ 17.356051] kthread_create_on_node+0xe4/0x130 [ 17.356127] create_worker+0x380/0x6b8 [ 17.356200] worker_thread+0x808/0xf38 [ 17.356234] kthread+0x328/0x630 [ 17.356283] ret_from_fork+0x10/0x20 [ 17.356339] [ 17.356810] The buggy address belongs to the object at fff00000c59158a0 [ 17.356810] which belongs to the cache kmalloc-16 of size 16 [ 17.356871] The buggy address is located 19 bytes to the right of [ 17.356871] allocated 12-byte region [fff00000c59158a0, fff00000c59158ac) [ 17.356954] [ 17.357177] The buggy address belongs to the physical page: [ 17.357279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105915 [ 17.357407] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.357497] page_type: f5(slab) [ 17.357538] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 17.357766] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.357872] page dumped because: kasan: bad access detected [ 17.357917] [ 17.357944] Memory state around the buggy address: [ 17.357977] fff00000c5915780: 00 02 fc fc 00 05 fc fc fa fb fc fc 00 02 fc fc [ 17.358035] fff00000c5915800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.358076] >fff00000c5915880: fa fb fc fc 00 04 fc fc 00 07 fc fc fc fc fc fc [ 17.358112] ^ [ 17.358145] fff00000c5915900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.358186] fff00000c5915980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.358222] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 17.326034] ================================================================== [ 17.326397] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 17.327235] Write of size 1 at addr fff00000c3f75073 by task kunit_try_catch/139 [ 17.327343] [ 17.328960] CPU: 1 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G N 6.15.1-rc1 #1 PREEMPT [ 17.329111] Tainted: [N]=TEST [ 17.329143] Hardware name: linux,dummy-virt (DT) [ 17.329387] Call trace: [ 17.329785] show_stack+0x20/0x38 (C) [ 17.329991] dump_stack_lvl+0x8c/0xd0 [ 17.330063] print_report+0x118/0x608 [ 17.330112] kasan_report+0xdc/0x128 [ 17.330157] __asan_report_store1_noabort+0x20/0x30 [ 17.330209] kmalloc_oob_right+0x5a4/0x660 [ 17.330259] kunit_try_run_case+0x170/0x3f0 [ 17.330312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.330389] kthread+0x328/0x630 [ 17.330437] ret_from_fork+0x10/0x20 [ 17.330606] [ 17.330643] Allocated by task 139: [ 17.330756] kasan_save_stack+0x3c/0x68 [ 17.330822] kasan_save_track+0x20/0x40 [ 17.330859] kasan_save_alloc_info+0x40/0x58 [ 17.330897] __kasan_kmalloc+0xd4/0xd8 [ 17.330933] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.330976] kmalloc_oob_right+0xb0/0x660 [ 17.331021] kunit_try_run_case+0x170/0x3f0 [ 17.331060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.331105] kthread+0x328/0x630 [ 17.331141] ret_from_fork+0x10/0x20 [ 17.331194] [ 17.331253] The buggy address belongs to the object at fff00000c3f75000 [ 17.331253] which belongs to the cache kmalloc-128 of size 128 [ 17.331345] The buggy address is located 0 bytes to the right of [ 17.331345] allocated 115-byte region [fff00000c3f75000, fff00000c3f75073) [ 17.331422] [ 17.331509] The buggy address belongs to the physical page: [ 17.331719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75 [ 17.332002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.332295] page_type: f5(slab) [ 17.332616] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.332680] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.332784] page dumped because: kasan: bad access detected [ 17.332824] [ 17.332849] Memory state around the buggy address: [ 17.333079] fff00000c3f74f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.333145] fff00000c3f74f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.333200] >fff00000c3f75000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.333254] ^ [ 17.333336] fff00000c3f75080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.333392] fff00000c3f75100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.333453] ================================================================== [ 17.342052] ================================================================== [ 17.342118] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 17.342186] Read of size 1 at addr fff00000c3f75080 by task kunit_try_catch/139 [ 17.342236] [ 17.342268] CPU: 1 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.342364] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.342390] Hardware name: linux,dummy-virt (DT) [ 17.342420] Call trace: [ 17.342441] show_stack+0x20/0x38 (C) [ 17.342493] dump_stack_lvl+0x8c/0xd0 [ 17.342541] print_report+0x118/0x608 [ 17.342710] kasan_report+0xdc/0x128 [ 17.342845] __asan_report_load1_noabort+0x20/0x30 [ 17.342984] kmalloc_oob_right+0x5d0/0x660 [ 17.343066] kunit_try_run_case+0x170/0x3f0 [ 17.343118] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.343182] kthread+0x328/0x630 [ 17.343560] ret_from_fork+0x10/0x20 [ 17.343656] [ 17.343676] Allocated by task 139: [ 17.343703] kasan_save_stack+0x3c/0x68 [ 17.343743] kasan_save_track+0x20/0x40 [ 17.343779] kasan_save_alloc_info+0x40/0x58 [ 17.343963] __kasan_kmalloc+0xd4/0xd8 [ 17.344009] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.344053] kmalloc_oob_right+0xb0/0x660 [ 17.344200] kunit_try_run_case+0x170/0x3f0 [ 17.344249] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.344315] kthread+0x328/0x630 [ 17.344367] ret_from_fork+0x10/0x20 [ 17.344403] [ 17.344423] The buggy address belongs to the object at fff00000c3f75000 [ 17.344423] which belongs to the cache kmalloc-128 of size 128 [ 17.344496] The buggy address is located 13 bytes to the right of [ 17.344496] allocated 115-byte region [fff00000c3f75000, fff00000c3f75073) [ 17.344568] [ 17.344754] The buggy address belongs to the physical page: [ 17.344808] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75 [ 17.344861] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.344929] page_type: f5(slab) [ 17.344969] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.345023] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.345063] page dumped because: kasan: bad access detected [ 17.345093] [ 17.345120] Memory state around the buggy address: [ 17.345152] fff00000c3f74f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.345193] fff00000c3f75000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.345235] >fff00000c3f75080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.345280] ^ [ 17.345308] fff00000c3f75100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.345370] fff00000c3f75180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.345405] ================================================================== [ 17.335332] ================================================================== [ 17.335419] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 17.335546] Write of size 1 at addr fff00000c3f75078 by task kunit_try_catch/139 [ 17.335600] [ 17.335634] CPU: 1 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G B N 6.15.1-rc1 #1 PREEMPT [ 17.335783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.335894] Hardware name: linux,dummy-virt (DT) [ 17.335927] Call trace: [ 17.335950] show_stack+0x20/0x38 (C) [ 17.336005] dump_stack_lvl+0x8c/0xd0 [ 17.336054] print_report+0x118/0x608 [ 17.336100] kasan_report+0xdc/0x128 [ 17.336162] __asan_report_store1_noabort+0x20/0x30 [ 17.336215] kmalloc_oob_right+0x538/0x660 [ 17.336494] kunit_try_run_case+0x170/0x3f0 [ 17.336564] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.336650] kthread+0x328/0x630 [ 17.336785] ret_from_fork+0x10/0x20 [ 17.336863] [ 17.336882] Allocated by task 139: [ 17.336920] kasan_save_stack+0x3c/0x68 [ 17.337403] kasan_save_track+0x20/0x40 [ 17.337664] kasan_save_alloc_info+0x40/0x58 [ 17.337925] __kasan_kmalloc+0xd4/0xd8 [ 17.338297] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.338374] kmalloc_oob_right+0xb0/0x660 [ 17.338445] kunit_try_run_case+0x170/0x3f0 [ 17.338530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.338599] kthread+0x328/0x630 [ 17.338654] ret_from_fork+0x10/0x20 [ 17.338722] [ 17.338793] The buggy address belongs to the object at fff00000c3f75000 [ 17.338793] which belongs to the cache kmalloc-128 of size 128 [ 17.338894] The buggy address is located 5 bytes to the right of [ 17.338894] allocated 115-byte region [fff00000c3f75000, fff00000c3f75073) [ 17.338957] [ 17.338976] The buggy address belongs to the physical page: [ 17.339007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f75 [ 17.339112] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.339204] page_type: f5(slab) [ 17.339244] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.339294] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.339333] page dumped because: kasan: bad access detected [ 17.339375] [ 17.339514] Memory state around the buggy address: [ 17.339564] fff00000c3f74f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.339645] fff00000c3f74f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.339687] >fff00000c3f75000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.340757] ^ [ 17.340810] fff00000c3f75080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.341003] fff00000c3f75100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.341078] ==================================================================
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------ [ 94.464294] WARNING: CPU: 1 PID: 659 at lib/math/int_log.c:120 intlog10+0x38/0x48 [ 94.466919] Modules linked in: [ 94.467344] CPU: 1 UID: 0 PID: 659 Comm: kunit_try_catch Tainted: G B D W N 6.15.1-rc1 #1 PREEMPT [ 94.468475] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 94.469016] Hardware name: linux,dummy-virt (DT) [ 94.469398] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 94.469681] pc : intlog10+0x38/0x48 [ 94.469869] lr : intlog10_test+0xe4/0x200 [ 94.470058] sp : ffff800082237c10 [ 94.470424] x29: ffff800082237c90 x28: 0000000000000000 x27: 0000000000000000 [ 94.471219] x26: 1ffe000019553581 x25: 0000000000000000 x24: ffff800082237ce0 [ 94.471976] x23: ffff800082237d00 x22: 0000000000000000 x21: 1ffff00010446f82 [ 94.472783] x20: ffffaf0a3ac24e80 x19: ffff800080087990 x18: 000000006cf4f7d4 [ 94.473573] x17: 00000000a5a15f74 x16: fff00000c096e03c x15: 000000007f201a4e [ 94.474443] x14: 00000000c16f9dd7 x13: 1ffe00001b49000d x12: ffff75e147d37769 [ 94.475183] x11: 1ffff5e147d37768 x10: ffff75e147d37768 x9 : ffffaf0a3821011c [ 94.475963] x8 : ffffaf0a3e9bbb43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 94.476579] x5 : ffff700010446f82 x4 : 1ffff00010010f3a x3 : 1ffff5e1475849d0 [ 94.477344] x2 : 1ffff5e1475849d0 x1 : 0000000000000003 x0 : 0000000000000000 [ 94.478062] Call trace: [ 94.478410] intlog10+0x38/0x48 (P) [ 94.478658] kunit_try_run_case+0x170/0x3f0 [ 94.478876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 94.479507] kthread+0x328/0x630 [ 94.479885] ret_from_fork+0x10/0x20 [ 94.480279] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------ [ 94.425594] WARNING: CPU: 1 PID: 641 at lib/math/int_log.c:63 intlog2+0xd8/0xf8 [ 94.428421] Modules linked in: [ 94.428850] CPU: 1 UID: 0 PID: 641 Comm: kunit_try_catch Tainted: G B D W N 6.15.1-rc1 #1 PREEMPT [ 94.429862] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 94.430596] Hardware name: linux,dummy-virt (DT) [ 94.431119] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 94.431610] pc : intlog2+0xd8/0xf8 [ 94.431813] lr : intlog2_test+0xe4/0x200 [ 94.432002] sp : ffff800082197c10 [ 94.432159] x29: ffff800082197c90 x28: 0000000000000000 x27: 0000000000000000 [ 94.432533] x26: 1ffe000019500941 x25: 0000000000000000 x24: ffff800082197ce0 [ 94.432986] x23: ffff800082197d00 x22: 0000000000000000 x21: 1ffff00010432f82 [ 94.433428] x20: ffffaf0a3ac24d80 x19: ffff800080087990 x18: 00000000db9f298a [ 94.433870] x17: 00000000ccbbed2b x16: fff00000c096e03c x15: fff00000ff616b08 [ 94.434294] x14: 00000000f1f1f1f1 x13: 1ffe00001b49000d x12: ffff75e147d37769 [ 94.434695] x11: 1ffff5e147d37768 x10: ffff75e147d37768 x9 : ffffaf0a3821031c [ 94.435138] x8 : ffffaf0a3e9bbb43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 94.435608] x5 : ffff700010432f82 x4 : 1ffff00010010f3a x3 : 1ffff5e1475849b0 [ 94.436057] x2 : 1ffff5e1475849b0 x1 : 0000000000000003 x0 : 0000000000000000 [ 94.436454] Call trace: [ 94.436643] intlog2+0xd8/0xf8 (P) [ 94.436863] kunit_try_run_case+0x170/0x3f0 [ 94.437104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 94.437435] kthread+0x328/0x630 [ 94.437693] ret_from_fork+0x10/0x20 [ 94.437897] ---[ end trace 0000000000000000 ]---